as per the business security requirements. The Security Analyst will work and ... mitigate identified vulnerabilities and promote security initiatives. Key Activities Include:...
independently. Desired Familiarity with aid system: Knowledge of the humanitarian program ... of staff. A location-dependent security and/or isolation adjustment is ...
report issues through bug-tracking system Design and execute test cases ... having experience in performance and security testing. What We Offer You ...
your passport. Complete all the system-required fields for experience, employment ... , Education, WASH, Livelihoods and Food Security, and Information Counselling and Legal ...
(RFT): Selection of Management Information System (MIS) Jordan - Remote Request for ... Subject: Selection of Management Information System (MIS) Purpose of the RFT ...
the Payroll Tax Calculation, Social Security/Insurance management for several locations ... the Payroll Tax & Social Security/Insurance calculation and ensure that ...
, humanitarian action and peace and security. UN Women Jordan Country Office ... Triple Modernization Agenda (the Political System Modernization, the Economic Modernization Vision ...
-to-day operations of the security operations center, investigate incidents and ... and security documentation, assist customers to fully optimize the SIEM system capabilities...
capabilities in high-risk security environments. Safety and security management related experience ... relation to humanitarian safety and security management. What you will...
the right competencies. 2. Human Resources System (Employees, Development & Training, Salaries ... employee matters related to social security, labor law, permits, health certificates...
adhering to best practices for security and performance in the crypto ... smooth user experience and robust system security. Troubleshoot and resolve complex technical ...
and the available electronic information system and transfer data from hard ... with data agreement and data security standards, as referenced in the ...
compliance with data privacy and security regulations. Collaborate with data scientists ... engineering processes, data flows, and system architectures to ensure knowledge sharing ...