140 Incident Response jobs in Bengaluru
Incident Response Analyst

Posted 11 days ago
Job Viewed
Job Description
25WD90131
**Position Overview**
The Incident Response Analyst is responsible for monitoring, identifying, assessing, containing, and responding to various information security events in a large and complex environment, as well as analyse, triage, and report on these incidents and investigations. The candidate must have knowledge of system security design, network/cloud security best practices and in-depth knowledge of systems security operations, threat actors frequently used attack vectors, and general user behaviour analytics. The candidate will be part of an established security team and work closely with teams across the company in remediating security issues and driving Incident Response. The candidate should have a strong passion for security and growth and be willing to accept challenging projects and incidents.
**Responsibilities:**
+ Responsible for handling day-to day operations to monitor, identity, triage and investigate security events from various Endpoint (EDR), Network and Cloud security tools and detect anomalies, and report remediation actions
+ Analyze firewall logs, server, and application logs to investigate events and incidents for anomalous activity and produce reports of findings
+ Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents
+ Help create and maintain process tools and documentation
+ Perform all stage of incident response from detection to postmortem
+ Collaborate with stakeholders in building and improving our Security Orchestration Platform
+ Clearly document notes for incidents in our case management solution
+ Perform basic forensics and malware analysis based on our playbooks and procedures
+ Responsible for working in a 24/7 environment including night shifts and the shifts are decided based on the business requirement
+ Maintain a high level of confidentiality and Integrity
**Minimum Qualifications:**
+ BS in Computer Science, Information Security, or equivalent professional experience
+ 2+ years of cyber security experience in incident response
+ Technical depth in one or more specialties including: Malware analysis, Host analysis and Digital forensics
+ Strong understanding of Security Operations and Incident Response process and practices
+ Experience performing security monitoring, response capabilities, log analysis and forensic tools
+ Strong understanding of operating systems including Windows, Linux and OSX
+ Experience with SIEM, SOAR, EDR, Network, AWS, and Azure security tools
+ Excellent critical thinking and analytical skills, organizational skills, and the ability to work as part of a team
+ Excellent verbal and written communication skills
+ Ability to design playbooks for responding to security incidents
+ Ability to support off-hours, weekends, and holidays if needed in support of incident response
**Preferred Qualifications:**
+ Advanced interpersonal skills to effectively promote ideas and collaboration at various levels of the organization
+ One or more security-related certifications from any of the following organizations: GCIH, GCFE, GCFA, AWS, Azure Cloud security Certifications or equivalent is desired
#LI-PJ1
**Learn More**
**About Autodesk**
Welcome to Autodesk! Amazing things are created every day with our software - from the greenest buildings and cleanest cars to the smartest factories and biggest hit movies. We help innovators turn their ideas into reality, transforming not only how things are made, but what can be made.
We take great pride in our culture here at Autodesk - it's at the core of everything we do. Our culture guides the way we work and treat each other, informs how we connect with customers and partners, and defines how we show up in the world.
When you're an Autodesker, you can do meaningful work that helps build a better world designed and made for all. Ready to shape the world and your future? Join us!
**Salary transparency**
Salary is one part of Autodesk's competitive compensation package. Offers are based on the candidate's experience and geographic location. In addition to base salaries, our compensation package may include annual cash bonuses, commissions for sales roles, stock grants, and a comprehensive benefits package.
**Diversity & Belonging**
We take pride in cultivating a culture of belonging where everyone can thrive. Learn more here: you an existing contractor or consultant with Autodesk?**
Please search for open jobs and apply internally (not on this external site).
Incident Response Analyst
Posted today
Job Viewed
Job Description
Position Overview
The Incident Response Analyst is responsible for monitoring, identifying, assessing, containing, and responding to various information security events in a large and complex environment, as well as analyse, triage, and report on these incidents and investigations. The candidate must have knowledge of system security design, network/cloud security best practices and in-depth knowledge of systems security operations, threat actors frequently used attack vectors, and general user behaviour analytics. The candidate will be part of an established security team and work closely with teams across the company in remediating security issues and driving Incident Response. The candidate should have a strong passion for security and growth and be willing to accept challenging projects and incidents.
Responsibilities:
Responsible for handling day-to day operations to monitor, identity, triage and investigate security events from various Endpoint (EDR), Network and Cloud security tools and detect anomalies, and report remediation actions
Analyze firewall logs, server, and application logs to investigate events and incidents for anomalous activity and produce reports of findings
Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents
Help create and maintain process tools and documentation
Perform all stage of incident response from detection to postmortem
Collaborate with stakeholders in building and improving our Security Orchestration Platform
Clearly document notes for incidents in our case management solution
Perform basic forensics and malware analysis based on our playbooks and procedures
Responsible for working in a 24/7 environment including night shifts and the shifts are decided based on the business requirement
Maintain a high level of confidentiality and Integrity
Minimum Qualifications:
BS in Computer Science, Information Security, or equivalent professional experience
2+ years of cyber security experience in incident response
Technical depth in one or more specialties including: Malware analysis, Host analysis and Digital forensics
Strong understanding of Security Operations and Incident Response process and practices
Experience performing security monitoring, response capabilities, log analysis and forensic tools
Strong understanding of operating systems including Windows, Linux and OSX
Experience with SIEM, SOAR, EDR, Network, AWS, and Azure security tools
Excellent critical thinking and analytical skills, organizational skills, and the ability to work as part of a team
Excellent verbal and written communication skills
Ability to design playbooks for responding to security incidents
Ability to support off-hours, weekends, and holidays if needed in support of incident response
Preferred Qualifications:
Advanced interpersonal skills to effectively promote ideas and collaboration at various levels of the organization
One or more security-related certifications from any of the following organizations: GCIH, GCFE, GCFA, AWS, Azure Cloud security Certifications or equivalent is desired
#LI-PJ1
Learn More
About Autodesk
Welcome to Autodesk! Amazing things are created every day with our software – from the greenest buildings and cleanest cars to the smartest factories and biggest hit movies. We help innovators turn their ideas into reality, transforming not only how things are made, but what can be made.
We take great pride in our culture here at Autodesk – it’s at the core of everything we do. Our culture guides the way we work and treat each other, informs how we connect with customers and partners, and defines how we show up in the world.
When you’re an Autodesker, you can do meaningful work that helps build a better world designed and made for all. Ready to shape the world and your future? Join us!
Salary transparency
Salary is one part of Autodesk’s competitive compensation package. Offers are based on the candidate’s experience and geographic location. In addition to base salaries, our compensation package may include annual cash bonuses, commissions for sales roles, stock grants, and a comprehensive benefits package.Diversity & Belonging
We take pride in cultivating a culture of belonging where everyone can thrive. Learn more here:
Are you an existing contractor or consultant with Autodesk?
Please search for open jobs and apply internally (not on this external site).
Manager - Security Incident Response
Posted 7 days ago
Job Viewed
Job Description
Work Location : Bangalore / NCR / Mumbai / Hyderabad / Pune
Job Summary :
We are seeking a highly skilled Security Incident Response Analyst with at least 10 years of experience in cybersecurity, specifically in incident response. The ideal candidate will possess strong analytical and communication skills, enabling them to effectively investigate security incidents and convey complex information to both technical and non-technical stakeholders. The candidate should have a proven track record in designing and/or implementing automation workflows to enhance incident response processes.
Key Responsibilities :
- Incident Management: Lead investigations into security incidents, utilizing advanced analytical skills to determine root causes and impacts while developing effective containment and remediation strategies.
- Automation Workflow Design: Collaborate in designing and implementing automation workflows to streamline incident response processes, improving efficiency and effectiveness.
- Cross-Functional Collaboration: Work closely with IT, legal, and other relevant teams, including Genpact clients, to coordinate incident response activities and ensure timely communication throughout the incident lifecycle.
- Communication: Serve as the primary point of contact for incident escalations, clearly articulating security risks and response actions to stakeholders at all levels.
- Documentation and Reporting: Maintain comprehensive documentation of incidents and responses, preparing detailed reports that summarize findings and recommendations for improvement.
- Post-Incident Review: Conduct thorough post-incident analyses to identify lessons learned and areas for process enhancement.
Qualifications:
- Education: Bachelor’s degree in Computer Science, Information Security, or a related field. Advanced degrees or relevant certifications (e.g., CISSP, GCIH) are preferred.
- Experience: At least 10 years in cybersecurity with a focus on incident response; significant experience in analytical roles is essential. Good to have hands-on experience in coding languages such as Python.
Other Skills:
- Sound knowledge of basic IT concepts and technologies such as network architecture, virtualization, operating systems.
- Familiarity with SIEM systems and threat intelligence platforms.
Manager - Security Incident Response
Posted today
Job Viewed
Job Description
Job Summary :
We are seeking a highly skilled Security Incident Response Analyst with at least 10 years of experience in cybersecurity, specifically in incident response. The ideal candidate will possess strong analytical and communication skills, enabling them to effectively investigate security incidents and convey complex information to both technical and non-technical stakeholders. The candidate should have a proven track record in designing and/or implementing automation workflows to enhance incident response processes.
Key Responsibilities :
- Incident Management: Lead investigations into security incidents, utilizing advanced analytical skills to determine root causes and impacts while developing effective containment and remediation strategies.
- Automation Workflow Design: Collaborate in designing and implementing automation workflows to streamline incident response processes, improving efficiency and effectiveness.
- Cross-Functional Collaboration: Work closely with IT, legal, and other relevant teams, including Genpact clients, to coordinate incident response activities and ensure timely communication throughout the incident lifecycle.
- Communication: Serve as the primary point of contact for incident escalations, clearly articulating security risks and response actions to stakeholders at all levels.
- Documentation and Reporting: Maintain comprehensive documentation of incidents and responses, preparing detailed reports that summarize findings and recommendations for improvement.
- Post-Incident Review: Conduct thorough post-incident analyses to identify lessons learned and areas for process enhancement.
Qualifications:
- Education: Bachelor’s degree in Computer Science, Information Security, or a related field. Advanced degrees or relevant certifications (e.g., CISSP, GCIH) are preferred.
- Experience: At least 10 years in cybersecurity with a focus on incident response; significant experience in analytical roles is essential. Good to have hands-on experience in coding languages such as Python.
Other Skills:
- Sound knowledge of basic IT concepts and technologies such as network architecture, virtualization, operating systems.
- Familiarity with SIEM systems and threat intelligence platforms.
Manager - Security Incident Response
Posted today
Job Viewed
Job Description
Work Location : Bangalore / NCR / Mumbai / Hyderabad / Pune
Job Summary :
We are seeking a highly skilled Security Incident Response Analyst with at least 10 years of experience in cybersecurity, specifically in incident response. The ideal candidate will possess strong analytical and communication skills, enabling them to effectively investigate security incidents and convey complex information to both technical and non-technical stakeholders. The candidate should have a proven track record in designing and/or implementing automation workflows to enhance incident response processes.
Key Responsibilities :
- Incident Management: Lead investigations into security incidents, utilizing advanced analytical skills to determine root causes and impacts while developing effective containment and remediation strategies.
- Automation Workflow Design: Collaborate in designing and implementing automation workflows to streamline incident response processes, improving efficiency and effectiveness.
- Cross-Functional Collaboration: Work closely with IT, legal, and other relevant teams, including Genpact clients, to coordinate incident response activities and ensure timely communication throughout the incident lifecycle.
- Communication: Serve as the primary point of contact for incident escalations, clearly articulating security risks and response actions to stakeholders at all levels.
- Documentation and Reporting: Maintain comprehensive documentation of incidents and responses, preparing detailed reports that summarize findings and recommendations for improvement.
- Post-Incident Review: Conduct thorough post-incident analyses to identify lessons learned and areas for process enhancement.
Qualifications:
- Education: Bachelor’s degree in Computer Science, Information Security, or a related field. Advanced degrees or relevant certifications (e.g., CISSP, GCIH) are preferred.
- Experience: At least 10 years in cybersecurity with a focus on incident response; significant experience in analytical roles is essential. Good to have hands-on experience in coding languages such as Python.
Other Skills:
- Sound knowledge of basic IT concepts and technologies such as network architecture, virtualization, operating systems.
- Familiarity with SIEM systems and threat intelligence platforms.
Manager - Security Incident Response
Posted 17 days ago
Job Viewed
Job Description
Work Location : Bangalore / NCR / Mumbai / Hyderabad / Pune
Job Summary :
We are seeking a highly skilled Security Incident Response Analyst with at least 10 years of experience in cybersecurity, specifically in incident response. The ideal candidate will possess strong analytical and communication skills, enabling them to effectively investigate security incidents and convey complex information to both technical and non-technical stakeholders. The candidate should have a proven track record in designing and/or implementing automation workflows to enhance incident response processes.
Key Responsibilities :
- Incident Management: Lead investigations into security incidents, utilizing advanced analytical skills to determine root causes and impacts while developing effective containment and remediation strategies.
- Automation Workflow Design: Collaborate in designing and implementing automation workflows to streamline incident response processes, improving efficiency and effectiveness.
- Cross-Functional Collaboration: Work closely with IT, legal, and other relevant teams, including Genpact clients, to coordinate incident response activities and ensure timely communication throughout the incident lifecycle.
- Communication: Serve as the primary point of contact for incident escalations, clearly articulating security risks and response actions to stakeholders at all levels.
- Documentation and Reporting: Maintain comprehensive documentation of incidents and responses, preparing detailed reports that summarize findings and recommendations for improvement.
- Post-Incident Review: Conduct thorough post-incident analyses to identify lessons learned and areas for process enhancement.
Qualifications:
- Education: Bachelor’s degree in Computer Science, Information Security, or a related field. Advanced degrees or relevant certifications (e.g., CISSP, GCIH) are preferred.
- Experience: At least 10 years in cybersecurity with a focus on incident response; significant experience in analytical roles is essential. Good to have hands-on experience in coding languages such as Python.
Other Skills:
- Sound knowledge of basic IT concepts and technologies such as network architecture, virtualization, operating systems.
- Familiarity with SIEM systems and threat intelligence platforms.
Manager - Security Incident Response
Posted today
Job Viewed
Job Description
Work Location : Bangalore / NCR / Mumbai / Hyderabad / Pune
Job Summary :
We are seeking a highly skilled Security Incident Response Analyst with at least 10 years of experience in cybersecurity, specifically in incident response. The ideal candidate will possess strong analytical and communication skills, enabling them to effectively investigate security incidents and convey complex information to both technical and non-technical stakeholders. The candidate should have a proven track record in designing and/or implementing automation workflows to enhance incident response processes.
Key Responsibilities :
- Incident Management: Lead investigations into security incidents, utilizing advanced analytical skills to determine root causes and impacts while developing effective containment and remediation strategies.
- Automation Workflow Design: Collaborate in designing and implementing automation workflows to streamline incident response processes, improving efficiency and effectiveness.
- Cross-Functional Collaboration: Work closely with IT, legal, and other relevant teams, including Genpact clients, to coordinate incident response activities and ensure timely communication throughout the incident lifecycle.
- Communication: Serve as the primary point of contact for incident escalations, clearly articulating security risks and response actions to stakeholders at all levels.
- Documentation and Reporting: Maintain comprehensive documentation of incidents and responses, preparing detailed reports that summarize findings and recommendations for improvement.
- Post-Incident Review: Conduct thorough post-incident analyses to identify lessons learned and areas for process enhancement.
Qualifications:
- Education: Bachelor’s degree in Computer Science, Information Security, or a related field. Advanced degrees or relevant certifications (e.g., CISSP, GCIH) are preferred.
- Experience: At least 10 years in cybersecurity with a focus on incident response; significant experience in analytical roles is essential. Good to have hands-on experience in coding languages such as Python.
Other Skills:
- Sound knowledge of basic IT concepts and technologies such as network architecture, virtualization, operating systems.
- Familiarity with SIEM systems and threat intelligence platforms.
Be The First To Know
About the latest Incident response Jobs in Bengaluru !
Major Incident Response Manager
Posted 7 days ago
Job Viewed
Job Description
We are seeking a highly skilled Major Incident Response Manager to lead our organization's response to significant incidents that impact our operations and services. The ideal candidate will be responsible for managing the end-to-end incident response process, coordinating cross-functional teams, and ensuring effective communication during major incidents. This role requires strong leadership, excellent problem-solving skills, and the ability to work under pressure in a fast-paced environment.
**Responsibilities and Accountabilities:**
+ Establish and maintain a fully resourced 24x7 global support model, enabling rapid response to major incidents through a follow-the-sun framework.
+ Lead the response to major incidents, ensuring timely detection , assessment, escalations and resolution of major incidents that impact business operations.
+ Develop and maintain the Major Incident Management process, including policies, procedures, knowledge base with critical contacts and best practices.
+ Work closely with End User Technology Support and the Digital Desk to enhance observability and resolve emerging incidents before escalation into major incidents.
+ Coordinate with Chapter and Value Teams across DigitalX, Legal, Communications and other Functional Units to ensure a unified response to major incidents.
+ Facilitate incident review meetings, ensuring all stakeholders are informed and engaged throughout the incident lifecycle.
+ Provide clear, timely updates and impact assessments to senior management and stakeholders during major incidents to support executive decision making.
+ Conduct post-incident reviews to identify root causes, lessons learned, and opportunities for process improvement.
+ Implement and optimize incident response tools and technologies to enhance incident detection and response capabilities.
+ Deliver training and guidance to team members and stakeholders on major incident management protocols .
+ Champion a culture of preparedness across Service Enablement, TechX and DigitalX.
+ Stay current with industry trends, threats, and best practices related to incident management.
**Required Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
+ Atleast 5 years of experience in incident management, with a focus on major incidents in a complex global environment.
+ Strong understanding of IT service management (ITSM) frameworks, such as ITIL.
+ Excellent leadership and team management skills, with the ability to motivate and guide cross-functional teams.
+ Strong analytical and problem-solving abilities, with a focus on root cause analysis and continuous improvement.
+ Exceptional communication skills, both written and verbal, with the ability to convey complex information to diverse audiences.
+ Relevant certifications (e.g., ITIL, CISSP, CISM) are a plus.
**Preferred Qualifications:**
+ Experience in managing IT budgets and vendor relationships.
+ Relevant certifications, such as ITIL, PMP, or AWS, are a plus
**Working Environment**
**Astellas' Global Capability Centres - Overview**
_Astellas' Global Capability Centres (GCCs) are strategically located sites that give Astellas the ability to access talent across various functions in the value chain and to co-locate core capabilities that are currently dispersed._ _?_ _Our three GCCs are located in India, Poland and Mexico._ _?_
_?_ _The GCCs will enhance our operational efficiency, resilience and innovation potential, enabling a timely response to changing business demands._ _?_
_?_ _Our GCCs are an integral part of Astellas, guided by our shared values and behaviors, and are critical enablers of the company's strategic priorities, sustainable growth, and commitment to turn innovative science into VALUE for patients._
Category
Astellas is committed to equality of opportunity in all aspects of employment.
EOE including Disability/Protected Veterans
Major Incident Response Analyst
Posted 8 days ago
Job Viewed
Job Description
We are looking for a detail-oriented and proactive Major Incident Response Analyst to join our incident response team. The ideal candidate will be responsible for analyzing and managing major incidents that affect our operations, ensuring timely resolution and minimizing impact on the business. This role requires strong analytical skills, effective communication, and the ability to work collaboratively in a fast-paced environment.
**Responsibilities and Accountabilities:**
+ Proactively monitor and analyze incidents to identify major incidents that require immediate attention and escalation.
+ Collaborate with End User Technology Support, the Digital Desk, Security Operations, and other relevant teams to support effective response and resolution of major incidents.
+ Assist in investigations of major incidents to determine root causes and impact on business operations.
+ Maintain detailed incident records, including timelines, actions taken, communications, and resolution outcomes to support reporting and analysis.
+ Maintain and update the Major Incident Management process, including policies, procedures, knowledge base with critical contacts and best practices.
+ Organise and participate in post-incident reviews to identify lessons learned and recommend improvements to incident management processes.
+ Maintain and update incident management tools and documentation to ensure accurate tracking and reporting of major incidents.
+ Provide support and guidance to team members during major incidents, ensuring adherence to established processes and protocols.
+ Stay informed about industry trends, latest security threats, and best practices related to incident response and management.
+ Contribute to a culture of preparedness across Service Enablement, TechX and DigitalX.
+ Work closely with End User Technology Support, SecOps & Incident Response and the Digital Desk
+ Capable of identifying potential signs of external threat actor involvement which could indicate a security incident.
+ Stay current with industry trends, threats, and best practices related to incident management
**Required Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
+ Atleast 3 years of experience in incident management, with a focus on major incidents in a complex global environment.
+ Strong understanding of IT service management (ITSM) frameworks, such as ITIL.
+ Excellent leadership and team management skills, with the ability to motivate and guide cross-functional teams.
+ Strong analytical and problem-solving abilities, with a focus on root cause analysis and continuous improvement.
+ Exceptional communication skills, both written and verbal, with the ability to convey complex information to diverse audiences.
+ Relevant certifications (e.g., ITIL, CISSP, CISM) are a plus.
**Preferred Qualifications:**
+ Experience in managing IT budgets and vendor relationships.
+ Relevant certifications, such as ITIL, PMP, or AWS, are a plus
**Working Environment**
**Astellas' Global Capability Centres - Overview**
_Astellas' Global Capability Centres (GCCs) are strategically located sites that give Astellas the ability to access talent across various functions in the value chain and to co-locate core capabilities that are currently dispersed._ _?_ _Our three GCCs are located in India, Poland and Mexico._ _?_
_?_ _The GCCs will enhance our operational efficiency, resilience and innovation potential, enabling a timely response to changing business demands._ _?_
_?_ _Our GCCs are an integral part of Astellas, guided by our shared values and behaviors, and are critical enablers of the company's strategic priorities, sustainable growth, and commitment to turn innovative science into VALUE for patients._
Category
Astellas is committed to equality of opportunity in all aspects of employment.
EOE including Disability/Protected Veterans
Manager, Incident Response Management
Posted today
Job Viewed
Job Description
About This Team:
As the Manager for our Incident Response team, you will be a key leader in driving the success of our Enterprise Support organization. Your primary responsibility is to provide high-level support and guidance to your team of Incident Response Managers (IRMs) & Critical Situation Managers, who are on the front lines of remediating highly visible, production-down incidents.
You will empower your team to effectively manage critical customer situations, reduce environmental risks, and maximize the value of Citrix products. This role requires a strong leader with a deep understanding of our product portfolio, exceptional communication skills, and the ability to mentor and develop a high-performing team. Your leadership will be instrumental in building customer trust and ensuring a high standard of service delivery.
Job Description/Responsibilities:
Team Leadership and Development: Manage, mentor, and coach a team of Incident Response Managers. Conduct regular performance reviews and provide continuous feedback to foster professional growth and expertise.
Incident Oversight: Provide strategic oversight and guidance during major incidents. You will act as a senior escalation point for your team, ensuring they have the support and resources needed to successfully remediate complex customer issues.
Strategic Planning: Develop and refine incident response strategies, processes, and best practices. Work to continuously improve the team's efficiency and effectiveness in handling high-impact situations.
Executive Communication: Be prepared to lead and participate in high-stakes business discussions. This includes communicating incident status, resolution plans, and risk mitigation strategies to senior leadership and key stakeholders.
Cross-Functional Collaboration: Partner with leadership across Support, Sales, and Product Engineering to ensure a coordinated approach to customer challenges and to drive improvements in our products and services.
Customer Relationship Management: Maintain a strong focus on customer satisfaction and trust. You will work with your team to ensure every customer engagement is a positive one, even under the most challenging circumstances.
Required Experience/Skills:
Proven Leadership Experience: A demonstrated ability to lead, motivate, and manage a team in a fast-paced, high-pressure environment. Typically requires a University Degree or equivalent experience and minimum 7 years prior relevant experience.
Incident Management Expertise: Extensive experience in a critical incident or crisis management role, with a solid understanding of incident response principles.
Technical Acumen: A proficient and comprehensive understanding of the Citrix product portfolio is essential to guide your team and make sound decisions.
Exceptional Communication: Superior written and verbal communication skills are non-negotiable for this role, as you will be communicating at both a technical and executive level.
Strategic Thinking: The ability to think strategically about customer risk, team development, and process improvement to drive long-term success.
About Us:
Cloud Software Group is one of the world’s largest cloud solution providers, serving more than million users around the globe. When you join Cloud Software Group, you are making a difference for real people, each of whom count on our suite of cloud-based products to get work done — from anywhere. Members of our team will tell you that we value passion for technology and the courage to take risks. Everyone is empowered to learn, dream, and build the future of work. We are on the brink of another Cambrian leap -- a moment of immense evolution and growth. And we need your expertise and experience to do it. Now is the perfect time to move your skills to the cloud.
Cloud Software Group is firmly committed to Equal Employment Opportunity (EEO) and to compliance with all federal, state and local laws that prohibit employment discrimination. All qualified applicants will receive consideration for employment without regard to age, race, color, creed, sex or gender, sexual orientation, gender identity, gender expression, ethnicity, national origin, ancestry, citizenship, religion, genetic carrier status, disability, pregnancy, childbirth or related medical conditions (including lactation status), marital status, military service, protected veteran status, political activity or affiliation, taking or requesting statutorily protected leave and other protected classifications.
If you need a reasonable accommodation due to a disability during any part of the application process, please email us at for assistance.