Get new jobs by email
- ...Job Description The Network & Security Operations Officer is responsible for maintaining... ..., and intrusion detection/prevention systems. Investigate anomalies, threats,... ...Bachelor’s Degree in Computer Science, Information Technology, Electrical/Electronic Engineering...
- ...Description ~ A Permanent Security Guardprotects property, assets, and people by patrolling, monitoring surveillance, controlling access... ...(doors, windows, gates), and watch surveillance cameras/systems to detect threats. Access Control: Manage entry/exit points,...
- ...Buckler Systems is a Nigerian defense solutions provider with strong expertise in manufacturing civilian armored vehicles, design, and prototyping of military vehicles and ordnance equipment. We are recruiting to fill the position below: Job Title: Executive Assistant...
- Urgent Hiring: Security Guard Our client in the hospitality sector is in need of trustworthy and alert Security Guard. Salary: ₦40,000 - ₦50,000 Location: Osapa London, Lekki Accommodation: Available Requirements: - Must have basic security training or experience...
- ...Surveillance cameras monitoring, patrol, log books management, maintaining surveillance in the facility, reporting, investigation and risk assessment, gate relationship officer. Providing Security and Safety for all staff, guests, properties and installations in the organization.
- ...Responsibilities Manage information technology and computer systems. Plan, organize, control and evaluate IT and electronic data operations. Manage... ...systems, policies and procedures. Ensure security of data, network access and backup systems. Act in...
- ...smooth functioning of all IT systems, hardware, and software within... ..., configure, and maintain computer systems, applications, and peripherals... ...and ensure adherence to IT security standards. Assist with... ...OND in Computer Science, Information Technology, or a related field...
- ...managing and optimizing our IT systems to support seamless... ...infrastructure, ensuring data security, and providing technical support... ...protect customer and business information. Stay updated with emerging... ...Degree in Information Technology, Computer Science, or related field....
- ...Develop and implement enterprise-wide information security and risk management strategies. •Conduct... ..., virtualization, and storage systems. •Manage corporate directory services... ...Requirements -Bachelor’s Degree in Computer Science, Information Technology, Cybersecurity...
- ...data across various company systems while ensuring confidentiality... ...documentation and ensure data security. Assist in basic... ...departments to verify and validate information. Ensure timely delivery of... ...Microsoft Excel, Word, and basic computer applications. Strong...
- ...tools and trouble-ticketing systems. This includes diagnosing... ...standards, capturing all necessary information and saving it in DMS, in... ...degree in Telecom Engineering, Computer Science, or Equivalent in... ...technologies. TCP/IP, Network Security, VoIP and OSPF networking...
- ...managing IT infrastructure, systems, and projects within the context... ...in ensuring the reliability, security, and optimization of our... ...the organization's data and information assets. · Ensure compliance... ...Requirements · Bachelor’s degree in computer science, information...
- ...vulnerability assessments, penetration testing, and security architecture engagements. Drive innovation and develop new information security products, services, and sector... ...Qualification: Bachelor’s degree in computer science, Engineering, or related field; Master...
- ...data across various company systems while ensuring confidentiality... ...documentation and ensure data security. Assist in basic... ...departments to verify and validate information. Ensure timely delivery of... ...Microsoft Excel, Word, and basic computer applications. Strong...
- ...high application standards. Implement secure coding practices and uphold digital... ...throughout the development life cycle. Stay informed about the latest developments in Flutter... ...Requirements A Bachelor’s Degree in Computer Science or a related field. Minimum...
- ...directories; giving instructions. Maintains security by following procedures; monitoring log... .... Provides guests with necessary information. Answers guest’s queries and deals... ...player ~ Hospitality Ethics Compliant ~ Computer literacy a must. Renumeration...
- ....6 → 3.12, modern async frameworks, distributed computing tools, and advanced backend architecture. This... ...and delivered cloud-native microservices, secure enterprise platforms, complex business-logic–driven systems, and data-intensive solutions across FinTech, HealthTech...
- ...over five years of proven expertise in the Information Technology sector, managing complex... ...Monitor project performance using appropriate systems, tools, and techniques; report progress... ...’s Degree in Information Technology, Computer Science, Engineering, Business Administration...
- ...about new products. Providing product information, pricing quotations and follow-up on... ...and to observe and follow the relevant systems, rules, and methods of working Key Performance... ...and planning skills. ~ Excellent computer skills Microsoft office suite …. ~ Proven...
- ...initiatives for enterprise-grade software systems. This is not a standard data science... ...with engineering teams to ensure robust, secure, and high-performance ML/AI infrastructure... ...PowerBI, Looker ~ Advanced Techniques: NLP, Computer Vision, Recommendation Systems,...
- ...execution for complex, enterprise-grade software systems. This is not a generic BA role — the... ...microservices, distributed systems, and secure enterprise platforms, and a proven... ...Translate business objectives into architecture-informed, system-level requirements. Evaluate...
- ...refactor existing codebases to improve performance and security. Troubleshoot, debug, and upgrade systems when necessary. Lead code reviews, enforce... ...perspective. Requirements ~ Bachelor’s Degree in Computer Science, Software Engineering, or equivalent...
- ...directories; giving instructions. Maintains security by following procedures, monitoring the... .... Provides guests with the necessary information. Answers guests’ queries and deals... ...~ Hospitality Ethics Compliant ~ Computer literacy is a must. Remuneration...
- ...delivering complex, enterprise-grade software systems across FinTech, Insurance, Banking,... ..., distributed systems, and high-security platforms. Candidates must meet US Technical... ...enterprise-grade systems. Lead architecture-informed requirements gathering, ensuring all...
- ...implement new clinic operating processes and systems to enhance patient flow, improve clinic... ...of current clinical treatment and information in the assigned area. Admit patients... ...Strong written and oral skills including computer literacy in the main processing, spreadsheet...
- ...COURE has been focused on the accurate, secure and timely provision of relevant Data and... ...& Experience ~ A Bachelor’s Degree in Computer Science, Engineering, or a related field.... ...Cypress). ~ Experience with version control systems (e.g., Git) and Agile methodologies (...
- ...The Driver will be responsible for ensuring the timely and secure travel of company staff, while maintaining a high standard of... ...and respect at all times. Ensure the confidentiality of all information, conversations, and materials that are shared during transportation...
- ...management of customer relations and data systems. This role involves maintaining client... ...correct any identified errors and inform the MD if system-related issues arise.... ...any differences. Support in maintaining secure storage and accurate documentation of stock...
- ...waiting area Answer client inquiries and provide information about spa services and products Coordinate with... ...(spa or hospitality industry preferred) Basic computer literacy and familiarity with booking systems A positive attitude and passion for wellness and...
- ...packages, and correspondence. Maintain visitor logs and ensure security protocols are followed. Provide administrative support such... .... Ability to maintain confidentiality and manage sensitive information. Customer service orientation and a proactive attitude....
