Cutshort logo
Emids Technologies logo
Information Security Engineer
Information Security Engineer
Emids Technologies's logo

Information Security Engineer

Kiranmai Badisetty's profile picture
Posted by Kiranmai Badisetty
7 - 10 yrs
₹5L - ₹10L / yr
Bengaluru (Bangalore)
Skills
ISO/IEC 27001:2005
ISO/IEC 27000-series
CISA
CISM
Risk Management
IT security

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Joining requirement: - Not later than second week of June 2023.


Requirements: -

1.      Mandatory - ISO 27001:2013 lead implementor certified

2.      Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)

3.      Good to have – CISA, CISM, Risk management certification, Privacy certifications.

4.      Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.

5.      This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.

6.      Good documentation skills.

7.      Develop, implement, maintain, review and continually improve Information Security policies.

8.      Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.

9.      Manage and maintain a risk register / risk database along with risk treatment plans.

10.  Good understanding of physical and environmental security.

11.  Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.

12.  Provide training to the employees on Privacy & Information Security Management System on regular intervals.

13.  The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.

14.  Mandatory: Good verbal and written communication skills. Eye for details.

15.  Good presentation skills.

16.  Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.

Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About Emids Technologies

Founded :
1999
Type
Size :
1000-5000
Stage :
Profitable
About

Emids Technologies is an IT services organization specializing in US healthcare. Our purpose is to use technology to make global healthcare accessible, affordable and of high-quality.

Established in 1999, emids employees over 2000+ employees spread across 3 continents. We are headquartered out of Nashville, Tennessee and have a presence in UK and India. In India we have 3 delivery centres in Bangalore and one delivery centre in Hyderabad which will largely cater to product engineering and R&D type of work, we started our office in Noida location also.

Emids has worked extensively on agile based product engineering using modern technologies providing solutions into healthcare technology, life sciences, payers and providers. In September 2019, Emids announced a partnership with New Mountain Capital.

100% of our revenue comes from the Healthcare domain. We support all different segments of the Healthcare vertical – Payers, Providers and Lifesciences organizations developing products for the Healthcare companies. emids is a leader in the Healthcare space and we have received numerous industry accolades. Emids has been rated as one of the top 50 fastest-growing firms in middle Tennessee. We are also one of the top 3 Healthcare IT co.’s in Nashville. Over 90 million lives are touched by clinical systems built by us. Systems built by us record over 2 million daily transactions. 3 of the top 5 payers use us. Epic and Cerner, 2 of the world’s most prominent EHR systems have signed us as their premium partners.

Healthcare organizations largely use Emids to help develop their application and product roadmap. Our strong domain knowledge coupled with a very strong development and R&D mindset has established us as a niche Healthcare IT co. focussed on innovation. Bulk of the work that we do is in the application or product development space.

Read more
Tech Stack
Frontend
Salesforce
Fullstack Developer
DevOps
Google Cloud Platform (GCP)
Software Testing (QA)
Dotnet
Backend
skill iconJava
Project Management
PMO
Etc
Candid answers by the company
What does the company do?
What is the location preference of jobs?

Working at the intersection of design, engineering and domain expertise, our passionate team of problem solvers work closely with customers to blaze new trails that will positively impact the future of health.

Using technology and insights, we move nimbly and provide trusted advice, seeking ways to amplify results.

We focus on what matters. Creating transformative outcomes for patients, providers and partners.

We’re committed to bettering healthcare and empowering wellness.

Photos
Company featured pictures
Company social profiles
linkedintwitterfacebook

Similar jobs

Emids Technologies
at Emids Technologies
2 candid answers
Darshan K
Posted by Darshan K
Bengaluru (Bangalore)
7 - 14 yrs
Best in industry
Information security
Implementation
Risk Management
Cyber Security
ISO 27001:2013
+7 more

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Requirements: -

  1. Mandatory - ISO 27001:2013 lead implementor certified
  2. Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)
  3. Good to have – CISA, CISM, Risk management certification, Privacy certifications.
  4. Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.
  5. This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.
  6. Good documentation skills.
  7. Develop, implement, maintain, review and continually improve Information Security policies.
  8. Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.
  9. Manage and maintain a risk register / risk database along with risk treatment plans.
  10. Good understanding of physical and environmental security.
  11. Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.
  12. Provide training to the employees on Privacy & Information Security Management System on regular intervals.
  13. The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.
  14. Mandatory: Good verbal and written communication skills. Eye for details.
  15. Good presentation skills.
  16. Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.
Read more
Octro Inc
at Octro Inc
1 recruiter
Akansha Gupta
Posted by Akansha Gupta
Noida
6 - 10 yrs
₹10L - ₹25L / yr
ISO 9000
IT security
Information security
Information security management system
Data security
+1 more

Roles and responsibilities:

- Audit the current Information Security system and procedures and do a Gap analysis

- Identify immediate potential Information Security Risks and manage remediation tasks through to closure

- Create an Information Security Compliance Roadmap and execute end-to-end compliance initiatives by that roadmap

- Design high-quality test plans and direct Data/Information security control test activities

- Continuously improve Octro Data/Information security control framework

- Maintain handbook pages and procedures related to Information security compliance

- Identify opportunities for Information security compliance control automation, execute them and then maintain

- Provide actionable and constructive advisement to cross-functional teams, including driving remediation activities for high and select moderate-risk Observations across all Octro departments

- Design, develop, and deploy scripts to automate continuous control monitoring, administrative tasks and metric reporting for all security compliance programs

- Direct and support external audits as and when necessary


Requirements


- A minimum of 6-8 years' experience working with Data/Information Security Compliance programs

- Detailed knowledge of common information security management frameworks, regulatory requirements and applicable standards such as: ISO, SOC 2, GDPR, PCI etc.


About Octro Inc :


We are one of the fastest-growing mobile gaming companies around, a technology-driven organization at heart, and take pride in the platforms we create.

Founded in 2006 with a mission to create productivity applications for Mobile Devices. After pioneering one of the first mobile Voice-over-IP infrastructures called OctroTalk, the company ventured into building mobile gaming platforms. Sequoia Capital has invested in Octro. The funding was announced in June 2014.

Read more
Bengaluru (Bangalore)
4 - 10 yrs
₹11L - ₹20L / yr
IT security audit
ISO/IEC 27001:2005
ISMS implementation

1) Determine client needs and expectations and participate in the development of the overall client service plan. Analyse, develop, and implement information security programs, including organizational design and key processes for our clients as per plans

2)Design and develop cyber security strategies and programs for large and complex organizations

3)Define and implement cyber risk management structures, governance models, organizational transformations in the areas of cyber security

4)Develop security policies, processes, procedures. Map controls and compliance requirements. Responsible for risk assessments, gap analysis (against standards and benchmarks), risk mitigation strategy development.

4)Roll out the GRC Cybersecurity controls framework while balancing the approach with end user experience and compliance

5)Develop and tailor approaches, methods and tools to support clients cyber risk programs and initiatives

6)Provide strategic and operational advice in the areas of safeguarding critical information. Identify areas requiring improvement in the client's business processes to enable preparation of recommendations. 7)Evaluate, implement and operationalize security controls, define metrics for measure performance and establish a framework for continuous monitoring and improvement and Play substantive role in internal and external client relationship and communication

8)Interact with CxOs to define the roadmap for GRC strategy.

9Help build Cyber Transformation practice by getting involved in areas beyond engagement delivery such as pre-sales, RFP response, solution designing, competency development and Go to market strategies

10)Create or help create though leadership content in the emerging areas of Cyber Strategy and Risk Transformation .


Immediate Joiners

Read more
Ongrid
at Ongrid
3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
Gurugram
6 - 15 yrs
₹10L - ₹15L / yr
Information security
Cyber Security
ISO/IEC 27000-series
GDPR
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field
- Relevant experience working with ISO Policies, and GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
Bengaluru (Bangalore)
4 - 5 yrs
₹13L - ₹14L / yr
Internal audit
Audit
QMS
Information security
IT security
+1 more
Our client is the Health-tech initiative of India's largest business house. Started in 2015, it empowers healthcare providers and consumers in India. All healthcare monitoring services are made available through an app that will help connect doctors, hospitals, pharmacies, laboratories and consumers, enabling preventive and predictive healthcare. It helps the care-givers to track the entire patient journey from the initial appointment and maintaining their records, generating lab test reports to providing virtual consultation and home-care solutions. It is expected that this futuristic guide will strengthen doctor-patient relationship and enhance the in-clinic experience.
 
As a Associate/ Sr Associate-Information Security, you will be responsible for helping the management in creating IT policies and assisting the various processes and the management team to ensure adherence to the adopted policies and established procedures.

What you will do:

  • Working closely with the external auditors to achieve common goals
  • Conducting Enabling Service Audit (HR, Admin, IT) once in 6 months for the verification of ISMS & QMS Standards
  • Performing ISMS and Internal Audit
  • Being part of the external Audits (ISMS, QMS & CMMI)
  • Managing of implementation of ISMS

 

Desired Candidate Profile

What you need to have:

  • Strong communication and team building skills with proficiency at grasping new technical concepts quickly and utilizing the same in a productive manner
  • Experience in ISO27001, Internal Audits, CMMI    

 

Read more
Yext
at Yext
3 recruiters
Yash Rathod
Posted by Yash Rathod
Hyderabad
5 - 10 yrs
₹5L - ₹15L / yr
IT security
Information security
Security Information and Event Management (SIEM)
Scripting language
skill iconAmazon Web Services (AWS)
+1 more

Responsibilities:

The Senior Information Security Engineer is responsible for the implementation, execution and maintenance of technology solutions to mitigate risk, to protect the IT and Engineering environments by reducing the probability of, and to minimize the effects of, damage caused by malware, malicious activities and security events.

The individual will help protect the company by deploying, tuning, and managing security tools across the computing environment, as well as provide security incident response cycle support. They should have a passion and skills for identifying the latest cyber threats. The individual will:



Basic Qualifications

  • Working knowledge of infrastructure-as-code and CI/CD pipelines tools (i.e. Jenkins, Teamcity, CircleCI etc..)
  • Lead and participate in major day-to-day operational aspects of the security engineering team including improvement of current security controls while constantly identifying areas of needed improvement
  • Deep hands-on security experience with cloud providers, such as AWS, GCP, Azure
  • Understanding of automated security testing approaches and tools
  • Experience with proactive integration of security into the development process
  • Lead continuous improvement efforts of out security tools and systems (Concertation on SIEM, IDS, EDR Tools)
  • Work with our customers (Security Operations, Incident Response, and Product teams) to incorporate high quality security alerting into their operational workflows
  • Improve overall security practitioner efficiency through process automation
  • Foster and promote collaboration among all members of the IT, Infrastructure, and Risk Management Departments.


Minimum Qualifications/Requirements

  • BS or MS in Computer Science or related field
  • Minimum 7+ years of cybersecurity experience
  • Must have previous experience performing threat hunting and incident response duties using SIEM tools, cybersecurity management consoles, and ticketing systems
  • Experience in deployment, development, and maintenance of SIEM
  • Experience writing and using Ansible server administration scripts, and create simple Python, BASH, or Powershell scripts to automate cybersecurity functions
  • Scripting experience to automate security operations, alerting, and compliance checks, CI/CD design, deployment, and management
  • Experience with managing endpoint response and detection infrastructure and endpoints at the enterprise level, including performing upgrades to the back end application and deploying new agent versions to endpoints
  • Understanding the investigative process and performing triage for cybersecurity incidents
  • Experience maintaining industry leading security technologies or infrastructure systems in complex technical IT operations environment
  • Must be detail-oriented and organized with ability to handle competing demands while meeting deadlines
  • Experience in authentication protocols and frameworks to include OAuth, and AWS IAM
  • Proactive and motivated; team player with a positive can-do attitude
  • Strong analytical/problem-solving skills and cross-functional knowledge across multiple IT operational and security disciplines
  • Ability to communicate technical concepts to a broad range of technical and non-technical staff
  • Must possess a high degree of integrity, be trustworthy, and have the ability to lead and inspire change
Read more
netmedscom
at netmedscom
3 recruiters
Vijay Hemnath
Posted by Vijay Hemnath
Chennai
5 - 10 yrs
₹10L - ₹30L / yr
Information security
IT security
WAF
skill iconDocker
Ethical Hacking
+16 more

We are seeking a Security Program Manager to effectively drive Privacy & Security Programs in collaboration with cross functional teams. You will partner with engineering leadership, product management and development teams to deliver more secure products.

 

Roles & Responsibilities:

  • Work with multiple stakeholders across various departments such as IT, Engineering, Business, Legal, Finance etc to implement controls defined in policies and processes.
  • Manage projects with security and audit requirements with internal and external teams and serve as a liaison among all stakeholders.
  • Managing penetration tests and security reviews for core applications and APIs.
  • Identify, create and guide on privacy and security requirements considering applicable Data Protection Laws and implement them across software modules developed at Netmeds.
  • Brainstorm with engineering teams to figure out how privacy and security controls can be applied to Netmeds tech stack.
  • Coordination with Infra Teams and Dev Teams on DB and application hardening, standardization of server images / containerization.
  • Assess vendors' security posture before onboarding them and after they qualify, review their security posture at a set frequency.
  • Manage auditors and ensure compliance for ISO 27001 and other data privacy audits.
  • Answer questions or resolve issues reported by the external security researchers & bug bounty hunters.
  • Investigate privacy breaches.
  • Educate employees on data privacy & security.
  • Prioritize security requirements based on their severity of impact and product roadmap.
  • Maintain a balance of security and business values across the organisation.

 Required Skills:

  • Web Application Security, Mobile Application Security, Web Application Firewall, DAST, SAST, Cloud Security (AWS), Docker Security, Manual Penetration Testing.
  • Good hands-on experience in handling tools such as vulnerability scanners, Burp suite, patch management, web filtering & WAF.
  • Familiar with cloud hosting technologies (ex. AWS, Azure). Understanding of IAM, RBAC, NACLs, and KMS.
  • Experience in Log Management, Security Event Correlation, SIEM.
  • Must have strong interpersonal skills and should be able to communicate complex ideas seamlessly in written and verbal communication.

 

Good to Have Skills:

  • Online Fraud Prevention.
  • Bug Bounty experience.
  • Security Operations Center (SOC) management.
  • Experience with Amazon AWS services (EC2, S3, VPC, RDS, Cloud watch).
  • Experience / Knowledge on tools like Fortify and Nessus.
  • Experience in handling logging tools on docker container images (ex. Fluentd).
Read more
A leading IT company
Bengaluru (Bangalore)
2 - 5 yrs
₹6L - ₹12L / yr
Information security
ISO/IEC 27001:2005
HIPAA

The Role

We are looking foran Information Security Analyst – Compliance to primarily strengthen our practice towards compliances such as HIPAA, HITRUST,etc. and ensure highest levels of security around sensitive data.

  • Identifying new risks and performing risk assessments.
  • Performing continuous gap analysis.
  • Auditing the applications, configurations, and internal practices against standards such as HIPAA, HITRUST etc.
  • Providing advice and implementing forward-thinking information security policies, procedures, and standards.
  • Assisting several teams (internal and external) with best practicesand security consultations.
  • Supporting with other information security activities as assigned.
  • Ensuring the organizational compliance during audits and certification efforts.

Requirements:

  • Demonstrated experience in implementing and maintaining security standards such as HIPAA, HITRUST, SOC2, ISO 27001 etc.
  • Ability to understand and interpret legal, regulatory, and contractual compliance requirements.
  • Experience in InfoSec policy creation and documentation.
  • Ability to understand technology and pertaining risks.
  • Knowledge on IT, Servers, SDLC, Database, etc.
  • Experience working with / securing cloud-based applications is an add-on.
  • 2+ years of experience.
  • Excellent written and verbal communication skills.
  • Relevant Security Certifications will be a good add-on.
Read more
Technomech Consultancy
at Technomech Consultancy
1 recruiter
Laxmi Ghoble
Posted by Laxmi Ghoble
Pune, Mumbai, Bengaluru (Bangalore)
5 - 12 yrs
₹15L - ₹25L / yr
CISA
CISSP
Cyber Security
Information security
CEH
+4 more

Position: IT Auditor

Experience: 4-12 Years

Location: Pune

Key Skills Required:

CISA, CISSP, CISM, IT Audit, Technology Audit, IT Infrastructure Audit, Application Security Audit, Information Security Audit, Cyber Security Audit, Cloud Security, Ethical Hacker

Additional key words: Vulnerability assessment, Penetration Testing, ITGC testing, Cloud Computing,

 

 

IT AUDITOR is responsible to plan and perform the audit assignment starting from audit announcement, audit planning, field work, audit quality reviews, pre-closing / closing meetings with the respective Directors / Head of the Departments including writing of the audit report and its finalization as well as follow up of the audit actions. Additionally IT AUDITOR will also be responsible to:
•    Evaluate IT systems, processes and projects in place;
•    Determine risks to the Group’s information assets, and help identify methods to minimize those risks;
•    Ensure information management processes are in compliance with IT-specific laws, policies and standards;
•    Determine inefficiencies in IT systems, IT projects and associated management processes and
•    Consult in IT projects, new initiatives and organizational frameworks.

Description

 

Audit Planning

1)    Perform audits at Volkswagen Group entities. and other concerned Volkswagen Group Companies with focus on IT processes keeping the associated business risks in mind.
2)    Participate in the preparation of audit objective & scope document along with audit schedule based on the audit objective and timeline specified by Head of IT Audit India Hub.
3)    Participate in the preparation of work program

Audit Process

1)     Prepare and conduct preparatory interviews with the Directors and Heads of the audited departments to identify the processes to be assessed during the audit.
2)     Request and collect relevant audit data for analysis from respective business areas.
3)     Prepare audit matrix on periodic basis to record the audit field work and update the progress of the audit to IT Audit Manager and the Head of IT Audit Hub India.
4)    Define actions including relevant controls to mitigate the business risks identified based on the evidences provided during the audit.
5)    Organize and conduct pre-closing meetings with business areas to agree upon audit observations and relevant actions.
6)    Prepare and conduct closing meetings with the Directors / Heads of the Department for audited division to agree upon the audit observations, risks and proposed actions.
7)    Prepare the draft audit report and submit the same to the  IT Audit Manager and the Head of IT Audit India Hub for review.
8)    Ensure that adequate documentation is prepared for the audit assignment. Peer review changes are done before release of the final audit report to the business area.
9)    Contact business area to review the progress of the implementation of audit actions defined in the final audit report. Based on the review, write the status of the follow up and submit the same for upload in RIAS.
10)    Obtain necessary certifications / qualifications to support the job requirements by attending relevant trainings
11)    Support the conduction of unscheduled audits/special investigations and audits from the anti-corruption system.
12)    Relevant knowledge is shared among the team members.
13)    Consult in IT projects, new initiatives and organizational frameworks.
14)    Ensure information management processes are in compliance with IT-specific laws, policies and standards.
15)    Determine risks to the Group’s information assets, and help identify methods to minimize those risks.
16)    Evaluate IT systems, processes and projects in place.
17)    Determine inefficiencies in IT systems, IT projects and associated management processes.

Read more
Open Finanacial Technologies
Bengaluru (Bangalore)
4 - 8 yrs
₹12L - ₹18L / yr
Information security
ISO/IEC 27001:2005
PCI DSS
ISO 27001
CISO

What you’ll be doing:
  • Establish, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program
  • Work directly with the business units to facilitate risk assessment and risk management processes
  • Develop and enhance an information security management framework
  • Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services
  • Provide leadership to the enterprise's information security organization
  • Partner with business stakeholders across the company to raise awareness of risk management concerns
  • Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems
  • Conduct regular internal audits in compliance with applicable legal and contractual requirements, ISO 27001 and PCI DSS requirements and companies internal requirements
  • Conduct regular Management reviews and update the management on information security aspects. The MRMs shall also focus on drawing Management attentions to the key areas for required management actions.
  • CISO is also responsible to ensure customer audits as well as re-certification and surveillance audits and successful.
  • Coordinate with relevant stakeholders to address the NC closures.
  • CISO shall ensure the information incidents are responded and resolved on time to ensure compliance with legal and contractual requirements.

What you’ll bring along:

  • Degree in business administration or a technology-related field required.
  • Professional security management certification
  • Minimum of 5 years of experience in a combination of risk management, information security and IT jobs
  • Knowledge of common information security management frameworks, such as ISO/IEC 27001, and PCI DSS.
  • Excellent written and verbal communication skills and high level of personal integrity
  • Innovative thinking and leadership with an ability to lead and motivate cross-functional, interdisciplinary teams
  • Experience with contract and vendor negotiations and management including managed services.
  • Specific experience in Agile (scaled) software development or other best in class development practices.
  • Experience with Cloud computing/Elastic computing across virtualized environments.
Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos