Get new jobs by email
- ...CMA) include availability and suitability of stores, safety and security of the storage facilities, availability of and accuracy of records... ...of private outlets on malaria commodities. Methodology Data Collection Method The audit will entail the following: Document...
- ...About The Job ~ The CPIMS / Data Officer will manage and coordinates all Child protection data across location of intervention and... ...respect to child protection, code of conduct, health and safety, security, equal opportunities and other relevant policies. Perform any...
- ...Job title : Security Guard Job Location : Borno Deadline : November 17, 2025 Quick Recommended Links General Objective / Summary ~ Under the direct supervision of the Logistics Officer, the Security Guard is responsible for ensuring the protection and security...
- Job title : Graduate Assistant (Cyber Security) Job Location : Borno Deadline : November 07, 2025 Quick Recommended Links Requirements ~ Candidates should possess a First Degree with First Class and Second-Class Upper.
- ...Job title : Lecturer II (Cyber Security) Job Location : Borno Deadline : November 07, 2025 Quick Recommended Links Requirements Candidates should possess a PhD, or a Master's Degree with relevant Experience and professional certifications. Candidates...
- ...Job title : Professor (Cyber Security) Job Location : Borno Deadline : November 07, 2025 Quick Recommended Links Requirements Requires a Ph.D Degree with 20 publications, 12 years of cognate experience and must be the lead author in at least 10 publications...
- ...Job title : Lecturer I (Cyber Security) Job Location : Borno Deadline : November 07, 2025 Quick Recommended Links Requirements Requires a PhD Degree with at least 5 publications plus 3 years' Post qualification experience or Master's Degree with 7 publications...
- ...Job title : Senior Lecturer (Cyber Security) Job Location : Borno Deadline : November 07, 2025 Quick Recommended Links Location: Biu, Borno Faculty: Computing Department: Cyber Security Requirements Candidates should possess a Ph.D with 10 publications...
- ...mobilizing community members to participate in vocational and entrepreneurship programs. Maintain attendance records, collect progress data, and support monitoring of trainees’ performance. Facilitate small-group mentoring sessions and promote peer learning among...
- ...Job title : Associate Professor (Cyber Security) Job Location : Borno Deadline : November 07, 2025 Quick Recommended Links Requirements Requires a Ph.D with 15 publications, 9 years of cognate experience and must be the lead author in at least 5 publications...
- ...Job title : Assistant Lecturer (Cyber Security) Job Location : Borno Deadline : November 07, 2025 Quick Recommended Links Location: Biu, Borno Faculty: Computing Department: Cyber Security Requirements Candidates should possess an Academic Master...
- ...indicators and setting baselines, Develop culturally appropriate data collection tools (household surveys, FGD guides, training... ...midline, and endline assessments. Design and operationalize a secure data management and dashboard reporting system. Ensure M&E...
- ...training curriculum and tools for nutrition training, Maintain a data base/report of the trained and active health workers, CNWs &... ...effectively under extreme circumstances, including stress, high-security risks, and harsh living conditions. Works and lives in a flexible...
- ...standards/ precautions, bio-hazard prevention and infection control, security rules and other protocols and procedures in the medical premises... ...situations and cases that may arise. Participating in data collection and keeping doctors/supervisors informed. Participating...
- ...training curriculum and tools for nutrition training, Maintain a data base/report of the trained and active health workers, CNWs &... ...effectively under extreme circumstances including stress, high-security risks, and harsh living conditions. Works and lives in a...
- ...for supervising the child protection, WASH, nutrition and Food security and livelihood component of the project and he/she is expected to... ...professionalism. Proficiency in Microsoft Office Suite and experience with data management and reporting tools. Application Closing Date...
- ...reporting of CMAM/IYCF activities, quality and completeness of data collection and reporting tools, level of community participation... ...Strengthening collaboration with other sectors (Health, Food Security & Livelihoods, and Protection) to promote an integrated response...
- ...reporting of CMAM/IYCF activities, quality and completeness of data collection and reporting tools, level of community participation... ...Communicate promptly to the Nutrition Officer any challenges, security concerns, or feedback received from beneficiaries or community stakeholders...
- ...accountability, and learning systems for CDHI’s projects. This includes data collection and analysis, reporting, facilitating learning... .... Ensure all MEAL documentation is backed up and stored securely. Qualifications and Experience Bachelor’s Degree in Statistics...
- ...and HR functions relating to this project. Maintain the HR Data Base, regularly update employee information, maintain an accurate... ...effectively under extreme circumstances including stress, high-security risks, and harsh living conditions. Works and lives in a flexible...
- ...confidence and clarify any issues Ensure confidentiality and security of financial information is maintained in line with document... ...that adequate backup arrangements exist for all the organization's data Liaise with internal and external auditors, promptly acting...
- ...management procedures in order to ensure the highest control and security and ensure cash availability. Prepare employment contracts... ...order to ensure local labour and fiscal law compliance. Enter data into the HR database and personal files and keep them up to date...
- ...authorities] and other stakeholders [returnees, host community, local leaders, on food security-related issues Professionally represent EYN at all times Ensure distribution data are filled accurately and submitted to your line manager daily. Any other duties...
- ...Job Description Assist in collecting data as per the program requirements for its different sites. Administer Vitamin A to all... ...Work according to the program needs and follow confidentiality/security procedures to ensure respondent privacy is protected Report to...
- ...Catering Services Accommodation Services Travel Agency Security Guards and Training Printing & Branding Event Management... ...Supplies (Hardware, Software, and Services) Communications (Airtime, Data, Satellite Services, etc.) General Supplies (Office equipment,...
- ...progress, and recommendations. Collect, analyze, and maintain data related to project performance. Train staff and partners on M... ...fit for appointment, confirmation of all documents, and security clearances. The appointment is subject to funding confirmation...
- ...movement, fuel usage, and procurement status. Share updates with management to inform operational decision-making. Safety and Security Support: ~ Support implementation of safety and security guidelines during logistics operations, especially during field...
- ...environments that support the well-being and development of all students. This involves ensuring that schools are equipped to provide a secure and nurturing space for children to learn and grow. Teacher Capacity Building: Providing training and support to teachers is a...
- ...contexts in a culturally appropriate manner. Has a capacity to make accurate self-assessments, particularly in high-stress and high-security contexts. Work style: ~ Is well-planned and organized even within a fluid working environment and has a capacity for...
- ...survivor-centred approach in all internal and external coordination meetings. Represent program goals and GBV standards. Security and Conduct Ensure compliance with security protocols and policies. Foster a safe and supportive working environment...