Cutshort logo
Emids Technologies logo
Information Security Engineer
Information Security Engineer
Emids Technologies's logo

Information Security Engineer

Kiranmai Badisetty's profile picture
Posted by Kiranmai Badisetty
7 - 10 yrs
₹5L - ₹10L / yr
Bengaluru (Bangalore)
Skills
ISO/IEC 27001:2005
ISO/IEC 27000-series
CISA
CISM
Risk Management
IT security

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Joining requirement: - Not later than second week of June 2023.


Requirements: -

1.      Mandatory - ISO 27001:2013 lead implementor certified

2.      Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)

3.      Good to have – CISA, CISM, Risk management certification, Privacy certifications.

4.      Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.

5.      This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.

6.      Good documentation skills.

7.      Develop, implement, maintain, review and continually improve Information Security policies.

8.      Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.

9.      Manage and maintain a risk register / risk database along with risk treatment plans.

10.  Good understanding of physical and environmental security.

11.  Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.

12.  Provide training to the employees on Privacy & Information Security Management System on regular intervals.

13.  The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.

14.  Mandatory: Good verbal and written communication skills. Eye for details.

15.  Good presentation skills.

16.  Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.

Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About Emids Technologies

Founded :
1999
Type
Size :
1000-5000
Stage :
Profitable
About

Emids Technologies is an IT services organization specializing in US healthcare. Our purpose is to use technology to make global healthcare accessible, affordable and of high-quality.

Established in 1999, emids employees over 2000+ employees spread across 3 continents. We are headquartered out of Nashville, Tennessee and have a presence in UK and India. In India we have 3 delivery centres in Bangalore and one delivery centre in Hyderabad which will largely cater to product engineering and R&D type of work, we started our office in Noida location also.

Emids has worked extensively on agile based product engineering using modern technologies providing solutions into healthcare technology, life sciences, payers and providers. In September 2019, Emids announced a partnership with New Mountain Capital.

100% of our revenue comes from the Healthcare domain. We support all different segments of the Healthcare vertical – Payers, Providers and Lifesciences organizations developing products for the Healthcare companies. emids is a leader in the Healthcare space and we have received numerous industry accolades. Emids has been rated as one of the top 50 fastest-growing firms in middle Tennessee. We are also one of the top 3 Healthcare IT co.’s in Nashville. Over 90 million lives are touched by clinical systems built by us. Systems built by us record over 2 million daily transactions. 3 of the top 5 payers use us. Epic and Cerner, 2 of the world’s most prominent EHR systems have signed us as their premium partners.

Healthcare organizations largely use Emids to help develop their application and product roadmap. Our strong domain knowledge coupled with a very strong development and R&D mindset has established us as a niche Healthcare IT co. focussed on innovation. Bulk of the work that we do is in the application or product development space.

Read more
Tech Stack
Frontend
Salesforce
Fullstack Developer
DevOps
Google Cloud Platform (GCP)
Software Testing (QA)
Dotnet
Backend
skill iconJava
Project Management
PMO
Etc
Candid answers by the company
What does the company do?
What is the location preference of jobs?

Working at the intersection of design, engineering and domain expertise, our passionate team of problem solvers work closely with customers to blaze new trails that will positively impact the future of health.

Using technology and insights, we move nimbly and provide trusted advice, seeking ways to amplify results.

We focus on what matters. Creating transformative outcomes for patients, providers and partners.

We’re committed to bettering healthcare and empowering wellness.

Photos
Company featured pictures
Company social profiles
linkedintwitterfacebook

Similar jobs

Astra Security
at Astra Security
1 video
3 recruiters
Human Resources
Posted by Human Resources
Remote only
1 - 2 yrs
₹6L - ₹7L / yr
Web application security
Penetration testing
Vulnerability scanning
Vulnerability assessment
IT security
+4 more

About us:

Astra is a cyber security SaaS company that makes otherwise chaotic pen-tests a breeze with its one of a kind Pentest Platform.

Astra's continuous vulnerability scanner emulates hacker behavior to scan applications for 8300+ security tests. CTOs & CISOs love Astra because it helps them fix vulnerabilities in record time and move from DevOps to DevSecOps with Astra's CI/CD integrations.

Astra is loved by 650+ companies across the globe.


In 2023 Astra uncovered 2 million+ vulnerabilities for its customers, saving customers $69M+ in potential losses due to security vulnerabilities. 


We've been awarded by the President of France Mr. François Hollande at the La French Tech program and Prime Minister of India Shri Narendra Modi at the Global Conference on Cyber Security. Loom, MamaEarth, Muthoot Finance, Canara Robeco, ScripBox etc. are a few of Astra’s customers.


Your mission:  

  • Carrying out VA/PT for web apps, mobile apps, Cloud infrastructure, SaaS apps, network devices, open-source projects etc.
  • Developing and testing rule sets for our DAST scanner.
  • Interacting with clients over remediation calls.
  • Facilitating clients to map out the steps for fixing vulnerabilities.
  • Maintaining our vulnerability management system.


Requirements for the role:

  • CEH or OSCP or CREST certified
  • 1-2 years of experience in doing pentests on multiple assets including web apps, cloud infrastructure etc. Comfortable in Black Box/WhiteBox testing with capability of finding business logic vulnerabilities
  • Experience directly interfacing with customers over calls & emails
  • Able to write & understand code in any one programming language.

Good to have:

  • A few published CVE’s
  • Good bug bounty/CTF experience


Benefits of joining teh Astra Squad:

  • Embrace the cosy remote work lifestyle.
  • Feel the startup adrenaline pumping through your veins.
  • Your brilliance showcased to thousands of eager readers and users.
  • Revel in our open, growth-centric ambiance; it's like a digital playground.
  • Dive deep into the captivating world of cybersecurity.
  • And yes, get ready for some unforgettable workcations—think Chikmagalur & Jim Corbett. 


Read more
Stratogent Technology Services
Bengaluru (Bangalore)
10 - 15 yrs
₹15L - ₹25L / yr
Security Information and Event Management (SIEM)
IT security
Splunk
ArcSight
ITIL
+2 more

Position Title: Manager – Security Operations Organization /Function: Manager is responsible for day to day operational and project delivery for a set of customers Relevant Experience: 10+ years of experience in security area and at least 2 years as Security manager Educational Qualification: BE/B.Tech/ME/M.Tech/Graduate/Master in any stream with excellent academic record

Must-have Skills: • Must know common security policy frameworks and possess knowledge of how security programs are run at mid to large scale companies • Must have managed a team to deliver “Managed Security Service” or “Security Operations Center” • Prior working Background in either SIEM tools (Splunk, ArcSight, QRadar, DNIF etc.) or Vulnerability assessment and Management tool (Qualys/Rapid7) and process • Has broader context and understanding of managed security services • Must have service mindset and empathy. Must deal with a level of ambiguity, chaos and apparent stubbornness from customers, and manage around it by thinking through the issue or request from the customer’s perspective to drive to a reasonable conclusion • Must have prior experience on Project Management • Must have prior experience of onsite-offshore delivery model and should have directly worked with US/European customers or colleagues • Must have ITIL process knowledge

Read more
Emids Technologies
at Emids Technologies
2 candid answers
Darshan K
Posted by Darshan K
Bengaluru (Bangalore)
7 - 14 yrs
Best in industry
Information security
Implementation
Risk Management
Cyber Security
ISO 27001:2013
+7 more

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Requirements: -

  1. Mandatory - ISO 27001:2013 lead implementor certified
  2. Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)
  3. Good to have – CISA, CISM, Risk management certification, Privacy certifications.
  4. Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.
  5. This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.
  6. Good documentation skills.
  7. Develop, implement, maintain, review and continually improve Information Security policies.
  8. Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.
  9. Manage and maintain a risk register / risk database along with risk treatment plans.
  10. Good understanding of physical and environmental security.
  11. Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.
  12. Provide training to the employees on Privacy & Information Security Management System on regular intervals.
  13. The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.
  14. Mandatory: Good verbal and written communication skills. Eye for details.
  15. Good presentation skills.
  16. Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.
Read more
Rezo.AI
Aishwarya Srivastava
Posted by Aishwarya Srivastava
Noida
6 - 10 yrs
₹5L - ₹15L / yr
IT security
Data security
ISO 27001
ISO/IEC 27001:2005
Firewall
+2 more

About Us 

Rezo.ai is an AI-Powered Contact Centre that enables enterprises to enhance customer experience and boost revenue by automating and analyzing customer agent interactions across multiple channels including voice, email, chat/WhatsApp, and social, at the required scale, whilst training agents with minimal costs 


How do we do it 

Rezo’s AI-Powered contact center leverages ground-breaking technologies in AI, ML, ASR, NLP, RPA, and predictive intelligence to transform customer experience and reduce costs by automating, analyzing social media, whilst coaching them.


Overview

Providing leadership in the information security space, helping ensure ISO and GDPR certification, and establishing, maintaining, and enforcing our security policies. Working closely with our business and technology teams to ensure awareness and adherence to the policies and procedures established.

To ensure that the security solutions being designed and delivered are aligned with the enterprise security architecture, supporting the transition of the security architecture from its current to its planned future state.

To lead and provide strategic oversight to ensure and assure the beneficial and cost-effective security change across key accounts, through the evaluation of business strategies and requirements providing advice, guidance and assurance.


Role & Responsibility

  • Provide security advice and guidance to business and delivery teams ensuring solutions are consistent with the enterprise security roadmap whilst balancing business values and security risk.
  • Recommend changes to IT systems to bring them into compliance with security policy, standards, blueprints and roadmaps.
  • Influence stakeholders to adopt architecturally sound approaches to the management of risk.
  • Advise on the translation of business requirements into secure IT solutions and migration roadmaps.
  • Preparation and documentation of standard security operating procedures and protocols
  • Recommend technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
  • Advise on alternate solutions and countermeasures to mitigate identified information risks.
  • Provide assurance that identified solutions or countermeasures mitigate identified information risks.
  • Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement
  • Implements security improvements by assessing the current situation; evaluating trends; anticipating requirements.
  • Keeps users and businesses informed by preparing performance reports; communicating system status, and owning security incidents when they arise.

 

Technical Skills Required

  • Proven experience in the design, implementation and operation of scaled IT security services and capabilities, ideally within a large government organization or complex large-scale multi-supplier organization.
  • Strong technical aptitude and exposure to ISO 27001 or similar-based security policies and standards.
  • Excellent communication skills, with the ability to articulate complex technical issues into business-focused terms and communicate with Stakeholders.
  • Knowledge of GDPR, its business implications and the merits of various technical approaches
  • Expertise in IT security risk in a business context
  • Exposure to web application security and penetration testing.
  • Exposure to securing the software development life cycle and to project management disciplines.
  • Excellent organizational and technical documentation skills.
  • Strong understanding of Information Security including threats, attacks, and vulnerability management.
  • Deep understanding of secure development practices, with practical experience of cyber security, privacy protection, cloud security, identity management, situations awareness, protective monitoring, security operations, risk management and reporting.
Read more
Bengaluru (Bangalore)
4 - 10 yrs
₹11L - ₹20L / yr
IT security audit
ISO/IEC 27001:2005
ISMS implementation

1) Determine client needs and expectations and participate in the development of the overall client service plan. Analyse, develop, and implement information security programs, including organizational design and key processes for our clients as per plans

2)Design and develop cyber security strategies and programs for large and complex organizations

3)Define and implement cyber risk management structures, governance models, organizational transformations in the areas of cyber security

4)Develop security policies, processes, procedures. Map controls and compliance requirements. Responsible for risk assessments, gap analysis (against standards and benchmarks), risk mitigation strategy development.

4)Roll out the GRC Cybersecurity controls framework while balancing the approach with end user experience and compliance

5)Develop and tailor approaches, methods and tools to support clients cyber risk programs and initiatives

6)Provide strategic and operational advice in the areas of safeguarding critical information. Identify areas requiring improvement in the client's business processes to enable preparation of recommendations. 7)Evaluate, implement and operationalize security controls, define metrics for measure performance and establish a framework for continuous monitoring and improvement and Play substantive role in internal and external client relationship and communication

8)Interact with CxOs to define the roadmap for GRC strategy.

9Help build Cyber Transformation practice by getting involved in areas beyond engagement delivery such as pre-sales, RFP response, solution designing, competency development and Go to market strategies

10)Create or help create though leadership content in the emerging areas of Cyber Strategy and Risk Transformation .


Immediate Joiners

Read more
Ongrid
at Ongrid
3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
Gurugram
6 - 15 yrs
₹10L - ₹15L / yr
Information security
Cyber Security
ISO/IEC 27000-series
GDPR
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field
- Relevant experience working with ISO Policies, and GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
Statestreet HCL Services
at Statestreet HCL Services
5 recruiters
Mansi Lakhanpal
Posted by Mansi Lakhanpal
Delhi, Gurugram, Noida, Ghaziabad, Faridabad
10 - 15 yrs
₹1L - ₹19L / yr
GRC
NIST
ISO 9000
Risk Management
Security audit
+5 more

Dear Candidate,

Greetings from HCL Technologies Ltd.

 

  • Make sense of Cyber security and compliance frameworks that apply to your business or industry
    • Identify business risks, taking into account the role of your hosting service provider
    • Determine which Cyber security controls are required to mitigate your identified risks
    • Improve collaboration and communication during Cyber security Incident mitigation and response.
    • Establish the necessary framework based on NIST Framework to maintain and continually improve your information security program over time based on evolving scope and emerging risks
    • Document and track efforts for evidence collection and audit preparation

 

  • will have primary responsibility for coordinating and implementing effective Cyber Security management across the account. This role will ensure that all Supplier obligations are met regarding compliance with Security guidelines, data protection, regulations, Supplier policies, and key controls.
  • provide implementation and ongoing operation of Security management framework;
  • be responsible for coordinating activities to address the key Security risk exposures;
  • ensure Security awareness training of, and assistance in the implementation of robust Security management practices across Security operations;
  • direct the design of controls to address emerging or new Security risk and compliance requirements;
  • carry out regular and frequent assurance reviews of the design and operating effectiveness of Security controls;
  • implement, monitor and report on key Security risk indicators to identify and address emerging risks;
  • coordinate with other Service Providers and Security functions, to facilitate client’s audits and inspections;
  • manage and report on responses and actions to address Security audit points, inspection deficiencies, or control weakness identified during normal operations.
  • review outcome of cyber security risk assessment, timely implement open action items and report progress to stakeholders
  • incorporate vulnerability testing as an integral part of change management
  • Should have good knowledge of Cyber Security Framework and controls
  • CISA ,CISM or CISSP certification should be preferred.
  • Have good understanding of Security policy and process along with ITSM process.
Read more
Hyderabad
2 - 3 yrs
₹7L - ₹8.5L / yr
IT security
Security Information and Event Management (SIEM)
WAF
Firewall
security
+3 more
JOB TITLE : INFORMATION SECURITY Engineer

NOTE- we are looking for hose who can join  immediately or within notic period of 15-20days.
location_;Hyderabad
(wfh till pandemic)
JOB DESCRIPTION
• Job Scope
o Analyse incident in our security devices, conducting investigation and finding the
root cause of incidents.
o Managing endpoint detection security system
o Managing, configuration and fine tuning of on-prem firewall and WAF
o Provide and advise IT team on security and IT related issues such as network
configuration, firewall configuration, etc
o Ensuring all utilized cloud services are secured and the configuration comply to best
practices benchmark
o Communicate risk and recommendations to mitigate risk to the senior
administration by communicating in non-technical format
o Assists other department to ensure regulatory compliance to any necessary
compliance
• Minimum Requirements
o At least 2 years of experiences in managing endpoint detection system, WAF and
FW.
o Hands on experience on cloud environment preferably Microsoft Azure.
o Bachelor’s degree of any IT related courses.
o Strong understanding of incident detection and response process and procedure
o Strong knowledge in networking and in operating system such as
Linux/Unix/Windows
Read more
Technomech Consultancy
at Technomech Consultancy
1 recruiter
Laxmi Ghoble
Posted by Laxmi Ghoble
Pune, Mumbai, Bengaluru (Bangalore)
5 - 12 yrs
₹15L - ₹25L / yr
CISA
CISSP
Cyber Security
Information security
CEH
+4 more

Position: IT Auditor

Experience: 4-12 Years

Location: Pune

Key Skills Required:

CISA, CISSP, CISM, IT Audit, Technology Audit, IT Infrastructure Audit, Application Security Audit, Information Security Audit, Cyber Security Audit, Cloud Security, Ethical Hacker

Additional key words: Vulnerability assessment, Penetration Testing, ITGC testing, Cloud Computing,

 

 

IT AUDITOR is responsible to plan and perform the audit assignment starting from audit announcement, audit planning, field work, audit quality reviews, pre-closing / closing meetings with the respective Directors / Head of the Departments including writing of the audit report and its finalization as well as follow up of the audit actions. Additionally IT AUDITOR will also be responsible to:
•    Evaluate IT systems, processes and projects in place;
•    Determine risks to the Group’s information assets, and help identify methods to minimize those risks;
•    Ensure information management processes are in compliance with IT-specific laws, policies and standards;
•    Determine inefficiencies in IT systems, IT projects and associated management processes and
•    Consult in IT projects, new initiatives and organizational frameworks.

Description

 

Audit Planning

1)    Perform audits at Volkswagen Group entities. and other concerned Volkswagen Group Companies with focus on IT processes keeping the associated business risks in mind.
2)    Participate in the preparation of audit objective & scope document along with audit schedule based on the audit objective and timeline specified by Head of IT Audit India Hub.
3)    Participate in the preparation of work program

Audit Process

1)     Prepare and conduct preparatory interviews with the Directors and Heads of the audited departments to identify the processes to be assessed during the audit.
2)     Request and collect relevant audit data for analysis from respective business areas.
3)     Prepare audit matrix on periodic basis to record the audit field work and update the progress of the audit to IT Audit Manager and the Head of IT Audit Hub India.
4)    Define actions including relevant controls to mitigate the business risks identified based on the evidences provided during the audit.
5)    Organize and conduct pre-closing meetings with business areas to agree upon audit observations and relevant actions.
6)    Prepare and conduct closing meetings with the Directors / Heads of the Department for audited division to agree upon the audit observations, risks and proposed actions.
7)    Prepare the draft audit report and submit the same to the  IT Audit Manager and the Head of IT Audit India Hub for review.
8)    Ensure that adequate documentation is prepared for the audit assignment. Peer review changes are done before release of the final audit report to the business area.
9)    Contact business area to review the progress of the implementation of audit actions defined in the final audit report. Based on the review, write the status of the follow up and submit the same for upload in RIAS.
10)    Obtain necessary certifications / qualifications to support the job requirements by attending relevant trainings
11)    Support the conduction of unscheduled audits/special investigations and audits from the anti-corruption system.
12)    Relevant knowledge is shared among the team members.
13)    Consult in IT projects, new initiatives and organizational frameworks.
14)    Ensure information management processes are in compliance with IT-specific laws, policies and standards.
15)    Determine risks to the Group’s information assets, and help identify methods to minimize those risks.
16)    Evaluate IT systems, processes and projects in place.
17)    Determine inefficiencies in IT systems, IT projects and associated management processes.

Read more
Open Finanacial Technologies
Bengaluru (Bangalore)
4 - 8 yrs
₹12L - ₹18L / yr
Information security
ISO/IEC 27001:2005
PCI DSS
ISO 27001
CISO

What you’ll be doing:
  • Establish, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program
  • Work directly with the business units to facilitate risk assessment and risk management processes
  • Develop and enhance an information security management framework
  • Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services
  • Provide leadership to the enterprise's information security organization
  • Partner with business stakeholders across the company to raise awareness of risk management concerns
  • Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems
  • Conduct regular internal audits in compliance with applicable legal and contractual requirements, ISO 27001 and PCI DSS requirements and companies internal requirements
  • Conduct regular Management reviews and update the management on information security aspects. The MRMs shall also focus on drawing Management attentions to the key areas for required management actions.
  • CISO is also responsible to ensure customer audits as well as re-certification and surveillance audits and successful.
  • Coordinate with relevant stakeholders to address the NC closures.
  • CISO shall ensure the information incidents are responded and resolved on time to ensure compliance with legal and contractual requirements.

What you’ll bring along:

  • Degree in business administration or a technology-related field required.
  • Professional security management certification
  • Minimum of 5 years of experience in a combination of risk management, information security and IT jobs
  • Knowledge of common information security management frameworks, such as ISO/IEC 27001, and PCI DSS.
  • Excellent written and verbal communication skills and high level of personal integrity
  • Innovative thinking and leadership with an ability to lead and motivate cross-functional, interdisciplinary teams
  • Experience with contract and vendor negotiations and management including managed services.
  • Specific experience in Agile (scaled) software development or other best in class development practices.
  • Experience with Cloud computing/Elastic computing across virtualized environments.
Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos