Get new jobs by email
- ...creative agency based in Ikeja is seeking a dedicated and reliable Security Guard to ensure the safety and smooth operation of our office... ...ideal candidate will oversee general security duties, manage access control, assist with client vehicle parking, and help maintain a...
- ...Responsibilities Coordinates security operations to prevent security breaches and ensure asset protection. Develops and implements... ...activities at the finished goods warehouse, factory, and access points, ensuring zero security breach in activities with items...
- ...Responsibilities Conducting confidential investigations on control breaches. Vault cash count and register Ensure the physical... ...deposited in correspondent banks, and any deposited funds are securely boxed in the vault. Verifying and Sending of disbursement advice...
- ...Job Summary ~ We are looking for a detail-oriented and proactiveInventory Controller to manage stock records, monitor supply levels, and ensure accuracy in our store’s inventory system. Key Responsibilities Maintain accurate stock records (incoming and outgoing...
- ...Role Summary The Chief Security Officer (CSO) is responsible for the development, implementation, and oversight of the organization... ...with security standards. Implement and maintain access control systems, surveillance, and monitoring technologies. Risk,...
- ...Job Description ~ We are looking for competent and result oriented Internal Control Officer to strengthen and drive a more result-oriented department. Responsibilities Assessing, controlling and monitoring risks on an ongoing firm-wide and individual entity basis...
- ...Role Purpose Responsible for corporate security practices to effectively deal with uncertainty and associated risk and opportunity, enhancing the unit’s capacity to build value for the business. Play a pivotal role in safeguarding the assets and personnel of the...
- ...Job Title: Business Development Manager (with experience in security companies) Location: Ikeja Lagos Reports To: Chief... ...and technology-driven security solutions (CCTV surveillance access control alarm systems GPS tracking etc.).. You will develop innovative...
- Responsibilities Manage the company's accounting operations and providing strategic financial guidance by overseeing day-to-day financial activities, preparing reports and budgets, ensuring regulatory compliance, and developing financial policies and procedures. ...
- ...Job Summary We are seeking a detail-oriented and proactive Quality Control Officer to ensure that our products meet internal and external quality standards. The ideal candidate will be responsible for monitoring all production stages, ensuring that quality procedures...
- ...work independently of clusters in the planning and execution of control review activities and maintenance of assurance oversight of... ...Managers and Branch Team As part of the Bank’s Information Security requirements, maintain the security of all Information entrusted...
- ...Responsibilities Conduct daily call-over of transactions. Carry out spot checks and cash counts. Review petty cash for budgetary control. Confirm and review all branch purchases. Perform periodic sampling/full audit of Loan Officers. Review KYC compliance for...
- ...Key Responsibilities Financial Planning, Control & Reporting: Oversee day-to-day financial operations, budgeting, forecasting, and cash flow management. Lead the preparation and timely submission of financial statements, including: Management accounts (Income...
- Responsibilties Conduct routine inspection and functionality tests on finished products. Document and report defects or deviations. Ensure compliance with quality and safety requirements. Support production teams with corrective feedback. Maintain clean ...
- ...design normalized schemas and optimize queries. Authentication & Authorization: Implementing secure user authentication (JWT, OAuth2) Role-based access control (RBAC). Version Control: Proficiency with Git and workflows (e.g., GitFlow) Experience with...
- ...systems Monitoring database efficiency Sustaining the security and integrity of data Creating complex query definitions... ...Training colleagues in how to input and extract data Controlling access permissions and privileges; Developing, managing and testing...
- ...deploy configure and maintain highly available scalable and secure Linux server environments (primarily Red Hat Enterprise Linux... ...security best practices perform vulnerability patching manage access controls (LDAP/Kerberos) and ensure compliance with internal and external...
- ...computer software and systems, internet access, hardware and peripheral equipment. Refer... ...program. Enter commands and activate controls on computer and peripheral equipment.... ...provide technical assistance and support. Secure all backup tapes and computer/telephone rooms...
- ...in alignment with plant projects. Possess the capability to secure, sustain, and renew, when necessary, local, state, and federal permits... ...sessions Ergonomic office chairs Recruiter dashboard access Career counseling Professional portfolio websites Job application...
- ...Take note of the environmental factors, neighborhood conditions, accessibility, level of safety, and other context that may influence credit... ....g., in a savings account or investment/s, kept privately and secured, etc.). Client and Spouse’s available savings and net...
- ...excellent Guest and Member experience while training staff and controlling costs. What will I be doing As a Butcher you are... ...and Food Safety standards and legislation Comply with hotel security and fire regulations Report maintenance hygiene and hazard...
- ...team to deliver exceptional service Overseeing budgets, cost controls, and performance metrics Ensuring compliance with... ...Professional growth and leadership development opportunities Access to Loans ~ If you're ready to make an impact and grow your career...
- ...the Front Office Food & Drinks Kitchen Housekeeping Engineering Security and other relevant departments. The role ensures that these... ...hotel and company Service Standards Ensure that costs are controlled throughout the operational departments and results are analyzed...
- ...cabling, wireless networks, network switches, WAN/LAN, domain controller, Active Directory, firewall and VPN applications. Set up new... ...utilization of resources. Stay up-to-date on the latest security threats and vulnerabilities. Develop and implement data backup...
- ...Program (LMTP) is a comprehensive training program designed to access evaluate train & prepare CREATIVE INNOVATIVE TALENTED and GOAL-... ...company. The personal information data each applicant provides is securely collected stored and used only for the purposes of considering...
- ...with cross-functional teams to design and implement scalable, secure, and high-performing solutions. Key Responsibilities Design... ..., and performance tuning. Hands-on experience with version control systems (Git). Familiarity with cloud platforms (Azure/AWS)...
- ...excellent Guest and Member experience while assisting with food cost controls. What will I be doing A Chef de Partie will supervise... ...maintenance hygiene and hazard issues Comply with hotel security fire regulations and all health and safety and food safety legislation...
- ...recommendations for informed decision-making. Build Strong Relationships by connecting with key stakeholders across the industry to secure partnerships, access opportunities, and generate leads. Premium Services Sales Optimization: Supercharge Real Estate Premium Sales by...
- ...accommodations. Follow sales techniques to maximize revenue. Input and access data in reservation system. Indicate special room reservation... ...information; protect company assets; protect the privacy and security of guests and coworkers. Welcome and acknowledge all guests...
- ...tools. Set up and maintain email accounts, user profiles, and access permissions for new and existing employees. Troubleshoot... ...connections across offices and site offices. Support data backup, security, and system update procedures to protect company information....