Get new jobs by email
- ...production, inventory and finance teams to maintain optimal stock levels and minimise disruptions -Negotiate with suppliers to secure favourable terms and pricing, while maintaining strong relationships -Ensure all purchasing activities comply with company policies...
- ...We need a productivity team members. Data entry clerks update, maintain and retrieve information held on computer systems: Autocount . They prepare source data for computer entry by compiling and sorting information, process customer and purchasing source documents...
- ...Our vision is to transform how the world uses information to enrich life for all . Micron Technology is a world leader in innovating memory and storage solutions that accelerate the transformation of information into intelligence inspiring the world to learn communicate...
- ...Our vision is to transform how the world uses information to enrich life for all . Micron Technology is a world leader in innovating memory and storage solutions that accelerate the transformation of information into intelligence inspiring the world to learn communicate...
- ...Our vision is to transform how the world uses information to enrich life for all . Micron Technology is a world leader in innovating memory and storage solutions that accelerate the transformation of information into intelligence inspiring the world to learn communicate...
- ...the world. Through its business model, Superprof offers an alternative to other market players by offering greater freedom and security to tutors. Want to give private lessons but can't find students? Superprof is your partner in finding the learners who need your...
- ...the world. Through its business model, Superprof offers an alternative to other market players by offering greater freedom and security to tutors. Want to give private lessons but can't find students? Superprof is your partner in finding the learners who need your...
- ...that support our digital paid performance media channels. Stay informed about industry trends, design tools, and emerging technologies... ...: Cryptocurrency in Every Wallet. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating...
- ...between MANDARIN and English speakers. The interpreter needs to be able to process information quickly and with accuracy in a professional manner. It is essential to ensure a quiet & secure environment. Note pads and writing utensils, glossaries, and dictionaries are...
- ...facilitating communication between Malay and English speakers. The interpreter must process information quickly and accurately in a professional manner while ensuring a quiet and secure environment. Note pads, writing utensils, glossaries, and dictionaries are useful tools....
- ...Management Foundations Practices, Workplace Health, Safety and Security.This role provides remote operational support to drive... ...Solutions, Customer Operations, Finance Operations, Human Resource, Information Technology, Legal Operations, Retail Centre of Excellence, Supply...
- ...sites and continuously reduce TCO (total cost ownership) and secure supply. DUTIES & RESPONSIBILITIES Strategy: •Proceed market... ...Buyers) across sites to share best practices, (new) supplier information, etc. SCOPE: GPO Sourcing and Suppliers Management in/...
- ...accordance with business requirements and standards. Monitoring security and preventing unauthorized access and follow compliance... ...Degree in Computer Engineering, Computer Science, IT, Management Information Systems, Data Science or relevant disciplines. A minimum of...
- ...including news stories and updates of the IPU website and other information sharing platforms Ensure visibility of IPU’s work,... ...principles Our guiding principle in selecting candidates is to secure the highest standards of efficiency, competence and integrity....
- ...strategy as required.* Obtain and advise on market rents and information, valuation reports etc. from agents, working with lawyers on contracts... ...process. We endeavour to keep your personal information secure with appropriate level of security and keep for as long as we...
- ...Country Manager - Malaysia and Indonesia Proto is bringing secure AI to everyone. We specialise in local languages and end-to-end... ...-person client presentations to C-level executives, including information discovery sessions, product demonstrations, and proposals....
- ...cabling, cross connects including testing and labelling. • Perform Security CCTV monitoring and tape change based on tape rotation... ...with other team members to co-ordinate proper dissemination of information and follow up on handing over of duties • Perform basic network...
- ...Session: Successfully pass a live evaluation. Background Check & Security Screening. Sign an Independent Contractor Agreement and... ..., gender identity or expression, marital status, genetic information, or any other characteristic protected by law. #J-18808-Ljbffr...
- ...design, implementation, and optimization of solutions that enable secure, scalable, and efficient digital workplaces. This role focuses... ...~ Bachelor’s or Master’s degree in Computer Science, Information Technology, or related field. ~5+ years in EUC architecture...
- ...resilience through data backup, data recovery, data portability, data security, and data intelligence. Based in Seattle, Veeam protects over... ...protected by federal, state or local law. All your information will be kept confidential. Please note that any personal data...
- ...enables you to store, send, and receive digital tokens instantly, securely, and globally, all at a fraction of the cost. Transparency is... ...tech, Web3, AI, and open‑source communities. Important information for candidates Recruitment scams have become increasingly common...
- ...SupportYourApp is a Support-as-a-Service company that provides secure technical, customer support, and CX services for tech... ...national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity, or any other reason prohibited...
- ...lasting relationships with customers Meet team KPIs Always be up-to-date with cutting-edge technology Securely work with customers’ sensitive information Apply the latest and greatest customer happiness practices Maintain working knowledge of our client’s...
- ...services. We take our responsibility to protect the personal information provided to us seriously. Generally the personal information we... ...recruitment process. We endeavour to keep your personal information secure with appropriate level of security and keep for as long as we...
- ...finger on the pulse of change. This is why inner source, FOSS, secure code, DevOps, infrastructure as code (IaC), data analytics,... ...the project team. Organization and control of the flow of information within their own project team. Regular recording and communication...
- ...efficiency, and operational resilience. Implement robust processes for development, CI/CD, testing, and deployment. Ensure security, compliance (SOC2, GDPR), and data‑protection standards are exceeded. 4. Execution & Delivery Oversee delivery of product and...
- ...comes to investing. Ship features like: electronic‑KYC flows, and UX improvements to reduce onboarding friction, and improved account security features. Contribute to core engineering platforms - Drive impact beyond your product domain by working on the shared...
- ...styles, and interests in order to provide the best learning outcomes possible. Regular students also provide teachers with financial security since your weekly schedule will be consistent and reliable. Because of our model of pairing students with teachers, all of our...
- ...If you are looking to excel and make a difference, take a closer look at us… Functional Meet sales target by securing new quality loans in line with Management decision on the portfolio mix of products and customers Maintain good business relationship with internal...
- ...sustainability solutions provider. Key Responsibilities Conduct audits in areas of CSR and Quality Management System audits such as Security C-TPAT, RBA VAP & SVAP, BSCI, SMETA and COC audits Ensure timely completion of audit/ surveillance and submission of audit...


