Computer security specialists design, install and manage security mechanisms that protect networks and information systems against hackers, breaches, viruses and spyware. They also respond to incidents, investigate violations and recommend enhancements to plug potential security gaps.
ATTENTION! Do not make any advance payments to any seller on Mobofree, not even for delivery! You may get scammed by unfair seller. Please report abuse to help us stop scam! To keep yourself safe, make sure to follow our Safety tips!
Sunhills Nigeria Limited – Our client, an innovation focused technology firm that works across sectors with governments, security agencies, corporate organizations and individuals to deliver turnkey, customized, complex and performance enhancing ente...
Developing avionic systems like navigation
instruments and communications.
Researching ways to make fuel-efficient
parts, such as wings, fuelage and engines
Using computer-aided design - CAD -
software to draw up project plans.
Carrying out ground an...
researching, collecting, storing, retrieving,
evaluating and manipulating data
checking the accuracy of maps
liaising with information providers, clients
and external contacts and accessing and
using aerial photographs and satellite
Quality managers ensure that the product or service an organization provides is fit for purpose, is consistent and meets both external and internal requirements. This includes legal compliance and customer expectations.
We are looking for a talented Web Designer to create amazing user experiences. The ideal candidate should have an eye for clean and artful design, possess superior user interface design skills and be able to translate high-lev...
Accomplishes information technology staff results by communicating job expectations; planning, monitoring, and appraising job results; coaching, counseling, and disciplining employees; initiating, coordinating, and enforcing systems, policies, and pr...
We are looking for a qualified IT Technician that will install and maintain computer systems and networks aiming for the highest functionality. You will also “train” users of the systems to make appropriate and safe usage of the IT...