Cutshort logo
Open Finanacial Technologies  logo
Chief Information Security Officer- CISO
Chief Information Security Officer- CISO
Open Finanacial Technologies 's logo

Chief Information Security Officer- CISO

Libin OK's profile picture
Posted by Libin OK
4 - 8 yrs
₹12L - ₹18L / yr
Bengaluru (Bangalore)
Skills
Information security
ISO/IEC 27001:2005
PCI DSS
ISO 27001
CISO

What you’ll be doing:
  • Establish, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program
  • Work directly with the business units to facilitate risk assessment and risk management processes
  • Develop and enhance an information security management framework
  • Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services
  • Provide leadership to the enterprise's information security organization
  • Partner with business stakeholders across the company to raise awareness of risk management concerns
  • Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems
  • Conduct regular internal audits in compliance with applicable legal and contractual requirements, ISO 27001 and PCI DSS requirements and companies internal requirements
  • Conduct regular Management reviews and update the management on information security aspects. The MRMs shall also focus on drawing Management attentions to the key areas for required management actions.
  • CISO is also responsible to ensure customer audits as well as re-certification and surveillance audits and successful.
  • Coordinate with relevant stakeholders to address the NC closures.
  • CISO shall ensure the information incidents are responded and resolved on time to ensure compliance with legal and contractual requirements.

What you’ll bring along:

  • Degree in business administration or a technology-related field required.
  • Professional security management certification
  • Minimum of 5 years of experience in a combination of risk management, information security and IT jobs
  • Knowledge of common information security management frameworks, such as ISO/IEC 27001, and PCI DSS.
  • Excellent written and verbal communication skills and high level of personal integrity
  • Innovative thinking and leadership with an ability to lead and motivate cross-functional, interdisciplinary teams
  • Experience with contract and vendor negotiations and management including managed services.
  • Specific experience in Agile (scaled) software development or other best in class development practices.
  • Experience with Cloud computing/Elastic computing across virtualized environments.
Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About Open Finanacial Technologies

Founded :
2017
Type
Size
Stage :
Raised funding
About

The world needs a superpower that revolutionizes digital banking for small businesses and financial institutions! That’s why we built Open - a digital banking enterprise that builds industry-defining banking products for businesses, startups, freelancers, financial institutions and more.


We have already built several powerful forces like Open Money - the world’s fastest growing SME neobanking platform, Zwitch - Asia’s first-ever no-code embedded finance platform, and BankingStack - a modern cloud-native digital baking OS.


Open has been awarded the ‘Most Innovative Neo bank’ & ‘Most Innovative Digital Bank’ at India Fintech Awards 2021 & Internet and Mobile Association of India (IAMAI) respectively. But this is just the beginning of a paradigm shift we are about to forge in the world of banking. On 3rd May 2022, Open became the 100th Unicorn of India.


Open is currently home to some of the smartest & brightest 500+ minds in the fintech space. We’re a Series D funded startup backed by leading international funds like Temasek, Google, Tiger Global, IIFL Finance Ltd., SBI Holdings Japan, 3one4 Capital, Speed Invest, Beenext, Tanglin Venture Partner Advisors & Angellist to name a few.


To build and strengthen this superpower, we’re on the lookout for some extraordinary folks. Are you up for this

challenge?

Read more
Company video
Open Finanacial Technologies 's video section
Open Finanacial Technologies 's video section
Photos
Company featured pictures
Connect with the team
Profile picture
Remya Ravikumar
Profile picture
Ambika Yadravi
Profile picture
Libin OK
Profile picture
Usha Radhakrishnan
Company social profiles
bloginstagramlinkedintwitterfacebook

Similar jobs

Upswing Financial Technologies Private Limited
at Upswing Financial Technologies Private Limited
2 candid answers
4 recruiters
Simran Bindra
Posted by Simran Bindra
Bengaluru (Bangalore)
3 - 6 yrs
Best in industry
Linux/Unix
Linux administration
Information security
Network Security
skill iconDocker
+4 more

At Upswing, we are committed to building a robust, scalable & secure API platform to power the world of Open Finance.

We are a passionate and self-driven team of thinkers who aspire to build the rails to connect the legacy financial sector with financial innovators through a simple and powerful banking-as-a-service (BaaS) platform.

We are looking for motivated engineers who will be working in a highly creative and cutting-edge technology environment to build a world-class financial services suite.

 

About the role

As part of the DevSecOps team at Upswing, you will get to work on building state-of-the-art infrastructure for the future. You will also be –

  • Managing security aspects of the Cloud Infrastructure 
  • Designing and Implementing Security measures, Incident Response guidelines 
  • Conducting Security Awareness Training
  • Developing SIEM tooling and pipelines end to end for vulnerability/security/incident reporting 
  • Developing automation and performing routine VAPT for Network and Applications
  • Integrating with 3rd party vendors for the services required to improve security posture 
  • Mentoring people across the teams to enable best practices 

What will you do if you join us?

  • Engage in a lot of cross-team collaboration to independently drive forward DevSecOps practices across the org 
  • Take Ownership of existing, ongoing, and future DevSecOps initiatives 
  • Plan and Engage in Architecture discussions to bring in different angles (especially security angles) to the table
  • Build Automation stack and tools for security pipeline 
  • Integrate different security measures and pipelines with the SIEM tool
  • Conducting routine VAPT using manual and automated workflows, generating and maintaining the report for the same
  • Introduce and Implement best practices across teams for a great security posture in the org

 

You should have

  • Curiosity for on-the-job learning and experimenting with new technologies and ideas
  • A strong background in Linux environment
  • Proven experience in Architecting networks with security first implementation
  • Experience with VAPT tooling for Networks and Applications is required 
  • Strong experience in Cloud technologies, multi-cloud environments, and best practices in Cloud 
  • Experience with at least one scripting language (Ruby/Python/Groovy)
  • Experience in Terraform is highly desirable but not mandatory
  • Some experience with Kubernetes, and Docker is required 
  • Understanding Java web applications and monitoring them for security vulnerabilities would be a plus 
  • Any other DevSecOps-related experience will be considered


Read more
Emids Technologies
at Emids Technologies
2 candid answers
Darshan K
Posted by Darshan K
Bengaluru (Bangalore)
7 - 14 yrs
Best in industry
Information security
Implementation
Risk Management
Cyber Security
ISO 27001:2013
+7 more

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Requirements: -

  1. Mandatory - ISO 27001:2013 lead implementor certified
  2. Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)
  3. Good to have – CISA, CISM, Risk management certification, Privacy certifications.
  4. Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.
  5. This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.
  6. Good documentation skills.
  7. Develop, implement, maintain, review and continually improve Information Security policies.
  8. Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.
  9. Manage and maintain a risk register / risk database along with risk treatment plans.
  10. Good understanding of physical and environmental security.
  11. Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.
  12. Provide training to the employees on Privacy & Information Security Management System on regular intervals.
  13. The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.
  14. Mandatory: Good verbal and written communication skills. Eye for details.
  15. Good presentation skills.
  16. Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.
Read more
Ongrid
at Ongrid
3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
Gurugram
6 - 15 yrs
₹10L - ₹15L / yr
Information security
Cyber Security
ISO/IEC 27000-series
GDPR
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field
- Relevant experience working with ISO Policies, and GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
Ongrid
at Ongrid
3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
Gurugram
4 - 8 yrs
₹10L - ₹18L / yr
Information security
Cyber Security
Compliance
Policies and procedures
Vulnerability assessment
+2 more
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks

- Routinely performing threat analysis, system checks, and security tests

- Defining and updating information security criteria and validation procedures

- Effectively discuss to understand safety and security and fix the problems along with different stakeholders

- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.

- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001

- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.

- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response

- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer

- Operate vulnerability scanning and compliance tools to identify system weaknesses

- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field

- Relevant experience working with ISO Policies, and GDPR guidelines.

- Strong knowledge of network architecture and security concepts related to routing

- Exceptional attention to detail

- Excellent analytical and problem-solving skills

- Great team player and able to work efficiently with minimal supervision

- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.

- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
MindTickle
at MindTickle
1 video
11 recruiters
Namrata Priya
Posted by Namrata Priya
Pune
5 - 14 yrs
₹10L - ₹35L / yr
Data security
Information security
Privacy
data privacy
GDPR
+2 more

Job Brief:

 

You'll be joining Mindtickle’s InfoSec and Compliance team, which is responsible for various functions related to Security, Privacy, and Compliance around Mindtickle's rapidly growing cloud platform. You'll play a crucial role in all our compliance & information security initiatives, including but not limited to those arising from regulations (e.g., GDPR, CCPA, UK DPA 2018, FINRA), audit requirements (e.g., SOC 2, HIPAA), and customer/ prospects requests (typically large enterprises).

 

As Data Privacy & Compliance Manager, you will champion the highest data privacy standards and drive forward compliance across all of Mindtickle. Crucial to this role will be an expert knowledge of international data protection laws and a proactive and pragmatic approach towards data privacy and compliance. 

 

Key Responsibilities:

  • Act as the single point of contact for all privacy-related topics, including communication with customers and prospects, including RFPs, emails, or privacy calls

  • Closely working with the internal legal team and external legal counsel to support the review of third parties/customer data processing addendums (DPAs), standard contractual clauses, contracts, and other data protection agreements

  • Maintain the data protection terms agreed with customers in a contract management software

  • Perform due diligence of new third parties and periodic risk review of existing third parties, including processes around sub-processors

  • Support in other industry compliance projects such as ADA, Section 508, WCAG, FINRA, 21 CFR Part 11, etc.

  • Lead the assessment of new legislation or other regulatory changes (GDPR, CCPA, UK DPA 2018, LGPD, PIPEDA, Swiss FDAP) and make recommendations as necessary to ensure that risks are mitigated as well as ongoing compliance

  • To work flexibly and collaboratively across all teams in the organization while driving privacy & compliance-related projects, including sales, customer success, product, and engineering

  • Own internal and external privacy audit projects, including planning, scoping, need analysis, ongoing project management, and communications with all relevant stakeholders

  • Onboard privacy solutions, design, build and deploy data privacy programs on the solutions to ensure compliance with privacy requirements

  • Maintain Records of Processing Activities (ROPA) and ensure Privacy By Design for new features/changes in the platform

  • Undertake all other reasonable and related tasks associated with this role

Desired Qualification:

  • 5-10 years of experience in data privacy and compliance, with exposure to cloud software platforms

  • Extensive experience in data protection and knowledge of relevant legislation, including GDPR, Standard Contractual Clauses, Transfer Impact Assessment, CCPA, UK DPA 2018, LGPD, PIPEDA, Swiss FDAP, etc.

  • Certifications such as CIPP/E, CIPP/US, CIPM, CIPT, etc., are preferred

  • Specialist knowledge in a relevant area, e.g., data security and individual rights requests

  • Excellent communication, interpersonal, project management, and issue resolution skills

  • Excellent analytical skills, organizational skills, ingenuity, and the ability to work as part of a team

  • Experience in managing privacy audits and risk management processes

  • Demonstrated ability to learn quickly, take the initiative, and drive complex projects

 

Read more
Delhi
7 - 12 yrs
Best in industry
ceh
OWASP
Cyber Security
Information security
clair
+3 more
b. Experience
i. Technology Graduate with 8+ years of experience in the IT industry & Information Security / Cyber Security
iii. Provide Security Vision & Strategy to the Organization, strategic direction, development, and implementation of information security programs and projects to address risks relevant to the attainment of organizational strategic goals.
iv. Experience in advising leadership team regarding Security Technology Land scape, product issues, and possible improvements
v. Expertise in providing executive roadmaps for continual improvement in teams, technology, and processes, process across various security & DevSecops teams
vi. Experienced in Information Security Risk Management, gap analyses, Audits.
vii. Hands-on Experience in formulating Cyber Security Policies, Design and implementation of Security Technologies, DevSecOps.
viii. Working Knowledge in implementation of Cyber Security Solution in Open Source, OpenStack environment.
ix. Ability to provide strategies to increase the ability to withstand cyber-attacks, as measured by annual sophisticated attack simulations.
x. Experience in upgrading, troubleshooting and tuning of Cyber Security Solutions, SOC Operations.
xi. Thorough understanding and good knowledge latest Cyber Security technologies, Security Architectures, vulnerabilities, security threats.
xii. Expertise in Test-Driven Development and establishing a DevSecOps practice. Multiple product launches under your belt - from design to launch, having played a key role in their success
xiii. Ability to setup PoC for latest security solutions
xiv. Good understanding of Open Source Technologies, Private Cloud Technologies.
Read more
Bengaluru (Bangalore)
4 - 5 yrs
₹13L - ₹14L / yr
Internal audit
Audit
QMS
Information security
IT security
+1 more
Our client is the Health-tech initiative of India's largest business house. Started in 2015, it empowers healthcare providers and consumers in India. All healthcare monitoring services are made available through an app that will help connect doctors, hospitals, pharmacies, laboratories and consumers, enabling preventive and predictive healthcare. It helps the care-givers to track the entire patient journey from the initial appointment and maintaining their records, generating lab test reports to providing virtual consultation and home-care solutions. It is expected that this futuristic guide will strengthen doctor-patient relationship and enhance the in-clinic experience.
 
As a Associate/ Sr Associate-Information Security, you will be responsible for helping the management in creating IT policies and assisting the various processes and the management team to ensure adherence to the adopted policies and established procedures.

What you will do:

  • Working closely with the external auditors to achieve common goals
  • Conducting Enabling Service Audit (HR, Admin, IT) once in 6 months for the verification of ISMS & QMS Standards
  • Performing ISMS and Internal Audit
  • Being part of the external Audits (ISMS, QMS & CMMI)
  • Managing of implementation of ISMS

 

Desired Candidate Profile

What you need to have:

  • Strong communication and team building skills with proficiency at grasping new technical concepts quickly and utilizing the same in a productive manner
  • Experience in ISO27001, Internal Audits, CMMI    

 

Read more
Yext
at Yext
3 recruiters
Yash Rathod
Posted by Yash Rathod
Hyderabad
5 - 10 yrs
₹5L - ₹15L / yr
IT security
Information security
Security Information and Event Management (SIEM)
Scripting language
skill iconAmazon Web Services (AWS)
+1 more

Responsibilities:

The Senior Information Security Engineer is responsible for the implementation, execution and maintenance of technology solutions to mitigate risk, to protect the IT and Engineering environments by reducing the probability of, and to minimize the effects of, damage caused by malware, malicious activities and security events.

The individual will help protect the company by deploying, tuning, and managing security tools across the computing environment, as well as provide security incident response cycle support. They should have a passion and skills for identifying the latest cyber threats. The individual will:



Basic Qualifications

  • Working knowledge of infrastructure-as-code and CI/CD pipelines tools (i.e. Jenkins, Teamcity, CircleCI etc..)
  • Lead and participate in major day-to-day operational aspects of the security engineering team including improvement of current security controls while constantly identifying areas of needed improvement
  • Deep hands-on security experience with cloud providers, such as AWS, GCP, Azure
  • Understanding of automated security testing approaches and tools
  • Experience with proactive integration of security into the development process
  • Lead continuous improvement efforts of out security tools and systems (Concertation on SIEM, IDS, EDR Tools)
  • Work with our customers (Security Operations, Incident Response, and Product teams) to incorporate high quality security alerting into their operational workflows
  • Improve overall security practitioner efficiency through process automation
  • Foster and promote collaboration among all members of the IT, Infrastructure, and Risk Management Departments.


Minimum Qualifications/Requirements

  • BS or MS in Computer Science or related field
  • Minimum 7+ years of cybersecurity experience
  • Must have previous experience performing threat hunting and incident response duties using SIEM tools, cybersecurity management consoles, and ticketing systems
  • Experience in deployment, development, and maintenance of SIEM
  • Experience writing and using Ansible server administration scripts, and create simple Python, BASH, or Powershell scripts to automate cybersecurity functions
  • Scripting experience to automate security operations, alerting, and compliance checks, CI/CD design, deployment, and management
  • Experience with managing endpoint response and detection infrastructure and endpoints at the enterprise level, including performing upgrades to the back end application and deploying new agent versions to endpoints
  • Understanding the investigative process and performing triage for cybersecurity incidents
  • Experience maintaining industry leading security technologies or infrastructure systems in complex technical IT operations environment
  • Must be detail-oriented and organized with ability to handle competing demands while meeting deadlines
  • Experience in authentication protocols and frameworks to include OAuth, and AWS IAM
  • Proactive and motivated; team player with a positive can-do attitude
  • Strong analytical/problem-solving skills and cross-functional knowledge across multiple IT operational and security disciplines
  • Ability to communicate technical concepts to a broad range of technical and non-technical staff
  • Must possess a high degree of integrity, be trustworthy, and have the ability to lead and inspire change
Read more
Banyan Data Services
at Banyan Data Services
1 recruiter
Sathish Kumar
Posted by Sathish Kumar
Bengaluru (Bangalore)
4 - 10 yrs
₹8L - ₹20L / yr
Information security
Splunk
Cyber Security
IT risk management
IT security audit
+9 more

Information Security Specialist

Notice Period: 45 days / Immediate Joining

 

Banyan Data Services (BDS) is a US-based data-focused Company that specializes in comprehensive data solutions and services, headquartered in San Jose, California, USA. 

 

We are looking Information Security Specialist who has the expertise and deep knowledge of Information security regulations, compliance, and SIEM tools, and the ability to develop, describe and implement Security Baselines and Policies.

 

It's a once-in-a-lifetime opportunity to join our rocket ship startup run by a world-class executive team. We are looking for candidates that aspire to be a part of the cutting-edge solutions and services we offer that address next-gen data evolution challenges. 

 

Key Qualifications

 

· Design, deploy, and support Information Security Solutions provided by BDS

 

· Assist clients to carry out the IT Risk Management assessment on both on-prem and cloud platforms

 

· Provide subject matter expertise on IT security compliances during the security audits to meet various security governances.

 

· Research and strategic analysis of existing, and evolving all IT and data security technologies

 

· Establish baselines to define required security controls for all infrastructure components and application stack

 

· Follow latest vulnerabilities and threats intelligence updates across a wide range of technologies and make recommendations for improvements in the security baselines.

 

· Overseeing security event monitoring, understand the impact, and coordinate remediation efforts

 

· Create and optimize the SIEM rules to adjust the specification of alerts in responding to incident follow up

 

· Must be able to work a flexible schedule during off-hours

 

Key Skills & Qualification

 

· Minimum of 4 years relevant work experience in information/cyber security, audit, and compliance

 

· Certifications in any of technical security specialty (e.g., CISA, CISSP, CISM)

 

· Experience in managing SIEM products like Arcsight, Qradar, Sumo Logic, RSA NetWitness Suite, ELK, Splunk

 

· Exposure of the security audit tools on public cloud platforms

 

· Solid understanding of the underlying LINUX/UNIX and Windows OS security architecture

 

· Certified Ethical Hacker would be a plus

 

· Handling of Security audits is a must

 

· Proven interpersonal skills while contributing to team effort by accomplishing related results

 

· Passion for learning new technologies and the ability to do so quickly.

http://www.banyandata.com" target="_blank">www.banyandata.com 

Read more
Hyderabad
2 - 3 yrs
₹7L - ₹8.5L / yr
IT security
Security Information and Event Management (SIEM)
WAF
Firewall
security
+3 more
JOB TITLE : INFORMATION SECURITY Engineer

NOTE- we are looking for hose who can join  immediately or within notic period of 15-20days.
location_;Hyderabad
(wfh till pandemic)
JOB DESCRIPTION
• Job Scope
o Analyse incident in our security devices, conducting investigation and finding the
root cause of incidents.
o Managing endpoint detection security system
o Managing, configuration and fine tuning of on-prem firewall and WAF
o Provide and advise IT team on security and IT related issues such as network
configuration, firewall configuration, etc
o Ensuring all utilized cloud services are secured and the configuration comply to best
practices benchmark
o Communicate risk and recommendations to mitigate risk to the senior
administration by communicating in non-technical format
o Assists other department to ensure regulatory compliance to any necessary
compliance
• Minimum Requirements
o At least 2 years of experiences in managing endpoint detection system, WAF and
FW.
o Hands on experience on cloud environment preferably Microsoft Azure.
o Bachelor’s degree of any IT related courses.
o Strong understanding of incident detection and response process and procedure
o Strong knowledge in networking and in operating system such as
Linux/Unix/Windows
Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos