Get new jobs by email
- ...creative agency based in Ikeja is seeking a dedicated and reliable Security Guard to ensure the safety and smooth operation of our office... ...ideal candidate will oversee general security duties, manage access control, assist with client vehicle parking, and help maintain a...
- ...Responsibilities Coordinates security operations to prevent security breaches and ensure asset protection. Develops and implements... ...activities at the finished goods warehouse, factory, and access points, ensuring zero security breach in activities with items...
- ...Responsibilities Conducting confidential investigations on control breaches. Vault cash count and register Ensure the physical... ...deposited in correspondent banks, and any deposited funds are securely boxed in the vault. Verifying and Sending of disbursement advice...
- ...Job Summary ~ We are looking for a detail-oriented and proactiveInventory Controller to manage stock records, monitor supply levels, and ensure accuracy in our store’s inventory system. Key Responsibilities Maintain accurate stock records (incoming and outgoing...
- ...methods to confirm and measure different types of products and materials for quality purposes Basic knowledge of quality assurance /control measures Good understanding of safety procedures in the Laboratory Proficient in the use of Microsoft Office tools Years...
- ...Job Summary The GPS Control Room Manager is responsible for overseeing the 24/7 GPS monitoring operations, ensuring real-time tracking... ...incident response, data accuracy, and compliance with company security and transport requirements. The role ensures that all...
- ...Job Description ~ We are looking for competent and result oriented Internal Control Officer to strengthen and drive a more result-oriented department. Responsibilities Assessing, controlling and monitoring risks on an ongoing firm-wide and individual entity basis...
- ...Job Title: Business Development Manager (with experience in security companies) Location: Ikeja, Lagos Reports To:... ...and technology-driven security solutions (CCTV surveillance, access control, alarm systems, GPS tracking, etc.).. You will develop innovative...
- ...Role Purpose Responsible for corporate security practices to effectively deal with uncertainty and associated risk and opportunity, enhancing the unit’s capacity to build value for the business. Play a pivotal role in safeguarding the assets and personnel of the...
- ...Job Summary We are seeking a detail-oriented and proactive Quality Control Officer to ensure that our products meet internal and external quality standards. The ideal candidate will be responsible for monitoring all production stages, ensuring that quality procedures...
- Responsibilities Manage the company's accounting operations and providing strategic financial guidance by overseeing day-to-day financial activities, preparing reports and budgets, ensuring regulatory compliance, and developing financial policies and procedures. ...
- Job Description Wash and press clothes Sorting of garments/clothes Washing and pressing of clothes/garments Packaging of garments/clothes Ensure quality and maintain a clean production area. Requirements Candidates should possess an SSCE qualification...
- Responsibilties Conduct routine inspection and functionality tests on finished products. Document and report defects or deviations. Ensure compliance with quality and safety requirements. Support production teams with corrective feedback. Maintain clean ...
- ...Key Responsibilities Build responsive, accessible UI components for listing, search,... ...OAuth2 authentication & role-based access control (User, Admin) Build booking engine with... ...Optimize queries, add caching, and enforce security best practices (OWASP top-10). Key...
- ...design normalized schemas and optimize queries. Authentication & Authorization: Implementing secure user authentication (JWT, OAuth2) Role-based access control (RBAC). Version Control: Proficiency with Git and workflows (e.g., GitFlow) Experience with...
- ...systems Monitoring database efficiency Sustaining the security and integrity of data Creating complex query definitions... ...Training colleagues in how to input and extract data Controlling access permissions and privileges; Developing, managing and testing...
- ...deploy configure and maintain highly available scalable and secure Linux server environments (primarily Red Hat Enterprise Linux... ...security best practices perform vulnerability patching manage access controls (LDAP/Kerberos) and ensure compliance with internal and external...
- ...computer software and systems, internet access, hardware and peripheral equipment. Refer... ...program. Enter commands and activate controls on computer and peripheral equipment.... ...provide technical assistance and support. Secure all backup tapes and computer/telephone rooms...
- ...in alignment with plant projects. Possess the capability to secure, sustain, and renew, when necessary, local, state, and federal permits... ...sessions Ergonomic office chairs Recruiter dashboard access Career counseling Professional portfolio websites Job application...
- ...Take note of the environmental factors, neighborhood conditions, accessibility, level of safety, and other context that may influence credit... ....g., in a savings account or investment/s, kept privately and secured, etc.). Client and Spouse’s available savings and net...
- ...Forecasting: Support in preparing budgets, variance analysis, and cost control measures. Financial Statement Preparation: Assist in month-... .... Data Accuracy & Confidentiality: Strict validation and secure handling of financial data. Reporting to Management:...
- ...Front Office, Food & Drinks, Kitchen, Housekeeping, Engineering, Security and other relevant departments. The role ensures that these... ...hotel and company Service Standards Ensure that costs are controlled throughout the operational departments and results are analyzed...
- ...plugins, integrations) Systems administration & networking Business development and client engagement Knowledge of CCTV and access control (added advantage) Software documentation and user training (added advantage). Application Closing Date Not Specified....
- ...prototypes, and high-fidelity designs. Implement responsive, accessible, and pixel-perfect user interfaces using modern web/mobile... ...(WCAG), and usability principles. ~ Experience with version control (Git) and agile development practices. ~ Strong portfolio showcasing...
- ...cabling, wireless networks, network switches, WAN/LAN, domain controller, Active Directory, firewall and VPN applications. Set up new... ...utilization of resources. Stay up-to-date on the latest security threats and vulnerabilities. Develop and implement data backup...
- ...excellent Guest and Member experience while training staff and controlling costs. Responsibilities What will I be doing? ~ As a... ...and Food Safety standards and legislation Comply with hotel security and fire regulations Report maintenance, hygiene and hazard...
- ...team to deliver exceptional service Overseeing budgets, cost controls, and performance metrics Ensuring compliance with... ...Professional growth and leadership development opportunities Access to Loans ~ If you're ready to make an impact and grow your career...
- ...with cross-functional teams to design and implement scalable, secure, and high-performing solutions. Key Responsibilities Design... ..., and performance tuning. Hands-on experience with version control systems (Git). Familiarity with cloud platforms (Azure/AWS)...
- ...Program (LMTP) is a comprehensive training program designed to access evaluate train & prepare CREATIVE INNOVATIVE TALENTED and GOAL-... ...company. The personal information data each applicant provides is securely collected stored and used only for the purposes of considering...
- ...e.g., MySQL, MongoDB, PostgreSQL), ensuring data integrity and security. Collaborate with UI/UX designers to ensure seamless and responsive... ...APIs, cloud services (AWS, Azure, Google Cloud), and version control (Git). ~ Solid understanding of database systems, security...