Get new jobs by email
- ...future. The Role The Inventory Manager oversees end-to-end control of vehicle and parts inventory, ensuring record accuracy, secure custody, disciplined receiving and issuing, and audit-ready documentation. The role manages inventory movements from receiving to...
- ...understand and scope properly Business Associate organization structure to apply necessary controls to be assessed Perform and manage Security Assessment and remediation of identified findings as per process documents Review supplied evidence, reports and provide...
- ...ICT/Low current systems Design Specific Required Knowledge, Skills, And Abilities Excellent knowledge of Communication and Security Systems Design standards, Principles, Guidelines, regulatory codes, and related laws. Comprehensive knowledge of and ability to...
- ...cargo to designated destinations. Conduct regular preventive maintenance to ensure the vehicle is in good working condition. Secure vehicle and cargo at all times during transportation. Assist in loading and unloading company products or stocks. Collaborate...
- ...Gamigo Philippines Incorporated is seeking a Security Administrator (Cybersecurity) to join our growing team. This role is crucial for ensuring the integrity, confidentiality, and availability of our digital assets while protecting them from cyber threats. As Security...
- ...IT needs including IT development, implementation, and maintenance services. We also provide excellent support for data entry, IT security, website hosting, backup, and disaster recovery as well as internal projects to support our own growing business. Check the House...
- ...post-program evaluations. # # Territory Leadership ~ Support launches by building robust bottom-up campaigns, securing pipeline volumes, and ensuring distribution, merchandising, and pricing compliance. # ~ Develop consumer campaigns to...
- ...Work Setup: Onsite (Ayala Cebu) Work Schedule: Dayshift The Information Security Head is primarily responsible for designing communicating and monitoring reliable information security safeguards across the banks information technology infrastructure; assisting...
- ...IT needs including IT development, implementation, and maintenance services. We also provide excellent support for data entry, IT security, website hosting, backup, and disaster recovery as well as internal projects to support our own growing business. Check the House...
- ...features Integrate third-party APIs and backend services Conduct debugging, testing, and performance optimization Ensure application security, scalability, and optimal performance RECRUITMENT PROCESS: (ONLINE) HR Interview Technical Assessment Hiring Manager...
- ...packaging and labeling them accordingly. Moving all outgoing merchandise to the delivery area. Ensuring that all merchandise is properly secured in the delivery vehicles to prevent damage during transit. Maintaining accurate records of all incoming and outgoing merchandise....
- ...commission rates on all closed and paid sales transactions • Performance bonuses for hitting and exceeding targets • Rewards for securing major projects and new accounts • Flexible work schedule with the independence of a freelance setup Apply Now! Send your...
GDS Consulting | Cyber Security - Strategy, Risk, Compliance and Resilience (SRCR) Senior Consultant
...even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (SRCR) – Technology Consulting – Senior As part of our EY Strategy, Risk, Compliance and Resilience (SRCR) Technology Consulting...- ...and miles spent driving Comply with truck driving rules and regulations (size, weight, route designations, parking, break periods) Secure cargo for transport using appropriate equipment Communicate with dispatchers, customers, and other drivers Report defects,...
- ...team and across multiple teams. - Monitor database performance and implement optimizations as necessary. - Ensure data integrity and security through regular audits and updates. - Document database configurations, procedures, and changes for future reference. Professional...
- ...Escalate complex issues to the appropriate teams when necessary • Maintain compliance with company standards, data privacy, and security policies Qualifications • Minimum 6 months to 2 years of voice process/customer service experience (BPO preferred) • Excellent...
- ...Environmental, Occupational Health and Safety, Asset Management, Energy Management, Business Continuity Management System and Information Security Management Systems policies, standards, procedures, and guidelines based on ISO 9001, ISO 14001, ISO 45001, ISO 27001, ISO 55001,...
- ...translate them into BI solutions. Optimize performance of dashboards and queries for large datasets. Ensure data accuracy, security, and compliance with governance standards. Maintain documentation and provide support for BI tools and solutions. Key Job Qualifications...
- ...escalating items as needed throughout all of the IT departments, including infrastructure, site administrators, unified communications, security, and applications. This position reports to the IT Director of Operations and Security. Duties & Responsibilities:...
- ...proud to be family owned and operated. Job Summary: The SAP Basis Administrator supports the stability, performance, and security of the SAP landscape at Woodgrain. This role will help to manage installations, configurations, upgrades, and daily operations across...
- ...Develop performance-optimized pipelines using Snowflake-native capabilities and modern ELT tools. • Establish data governance, security models, RBAC, and masking policies in line with compliance standards. • Conduct performance tuning, workload monitoring, and optimization...
- ...A Senior Software Developer's primary goal is to design, develop, and optimize high-quality software while ensuring security, performance, and maintainability. They lead and mentor junior developers, follow best coding practices, and collaborate with cross-functional...
- ...Cross-Functional Support Coordinate fit-to-work assessments and medical clearances Collaborate with facilities, admin, and security during emergencies Serve as a health resource for managers and staff Requirements Must-Have Qualifications...
- ...capability of Salesforce. Maintain the health and stability of Salesforce Platform, software updates, advanced User Management, security, and best practice. Map business processes to Salesforce functionalities. Manage the onboarding and Offboarding of users,...
- ...Terraform patterns and contribute to IaC standards and best practices. Monitor platform systems for performance, availability, and security, and troubleshoot complex infrastructure issues. Implement security controls and compliance policies (e.g., GDPR, HIPAA, PCI...
- ...methodologies and recommend process improvements ~ Contribute to technical solution and data architecture decisions to build secure, compliant, and scalable systems Requirements ~ Proven experience building and maintaining Power BI reports ~...
- ...training for team members on how to best use these software platforms. ~ Data Management: Ensure data is organized, accessible, and secure across all platforms. Assist in data migration, integration, and reporting tasks. ~ Troubleshooting: Act as the go-to problem...
- ...experience through an internship opportunity prior to graduation. By becoming an intern, you can significantly enhance your prospects of securing employment post-graduation. Join us at one of the prestigious organizations recognized as a Great Place to Work in the...
- ...development team in troubleshooting and resolving technical issues related to architecture. Assist in ensuring compliance with security standards, data privacy regulations, and industry best practices. Bachelor's degree in Computer Science, Information Technology...
- ...practices and coding standards · Troubleshoot, debug, and optimize application performance and database queries · Conduct regular security audits and implement security best practices to protect systems and data · Participate in code reviews to maintain code...

