Get new jobs by email
- ...Commit to and strictly following all protocols and guidance on security Call clinic staff and village leaders in the morning to receive... ...will be reviewed on a rolling basis. Candidates short-listed based on their online applications will have to undergo a series...
- ...Support UNICEF field offices in the processing of funds for planned activities, verification of direct payments, beneficiary or payee lists and any other related tasks. Facilitate the development of Nutrition Programme Cooperation Agreements (PCAs) and Memorandum of...
- ...servers, workstations, network equipment, and internet connectivity. Administer company network (LAN/WAN), firewalls, and cyber-security measures. Provide technical support and troubleshooting for all staff (hardware, software, email, printers). Administer and...
- ...procurement of office supplies, stationery, and non-technical consumables. Manage vendor relationships for facility services (cleaning, security, catering, utilities). Maintain company records, filing systems, and correspondence. Coordinate staff welfare, accommodation...
- ...grievances, and community-related project disruptions promptly and diplomatically. Liaise with local government, state agencies, security agencies, and traditional rulers. Support the company CSR (Corporate Social Responsibility) programme in the Niger Delta....
- ...solver who can bridge the gap between visual design and server-side logic. You will be responsible for ensuring our portal remains secure, user-friendly, and capable of supporting our growing ecosystem of social entrepreneurship and digital education. Key...
- ...processes to drive modernization, efficiency, and future growth. Solution Developmen: Drive the adoption of best practices in security, performance optimization, and high availability to ensure robust, scalable, and resilient systems. Enforce code and other...
- ...including compliance with cash disbursement protocol, transportation safety and rate expectations, stakeholder engagement procedures, security reporting, communication and management protocols, and internal and external communication guidelines. Review compliance with...