2,701 Penetrationtester jobs in India
Information security
Posted today
Job Viewed
Job Description
Common accountabilities:
- Works autonomously within defined processes and procedures or methodologies, takes standard decisions and may support the development of solutions to complex problems of a recurring nature.
- Receives instruction, guidance and direction from more senior level roles or manager, with regular monitoring on the status of the assignments.
- May have specialized formal education or the equivalent work experience and has the required technical and functional skills and basic knowledge of the business.
Specific accountabilities:
Test strategy
* Attend to specification/architecture reviews (also on customer specification reviews when applicable), and provide feedback along with any potential impact, risk, issue or missed gap based on experience,
* Define test strategy and test plan containing test cases (functional and non-functional), ensure traceability with specifications and customer requirements,
* Ensure compliance of test strategy with CI/CD guidelines, Green IT guidelines and all quality guidelines (SDL, STDL), QA best practices/standards from the industry (ISTQB.),
Test expertise
* Design test cases and write test case scripts
* Prepare test environment, test data, and execute test cases
* Provide sign-off (go/no-go) on tested features based on defined exit criteria
Test automation
* Assess necessity to automate subset of (or all) test scripts
* Use test automation framework and contribute to its improvement
Defect management
* Open defects for software or documentation, assign relevant level of severity based on the importance of the issue, provide relevant investigation and information in order to fix defects
* Check defect fix, and give go/no-go for the load of production defects
Reporting
* Report and communicate on test activities to the line organization, software developers and product definitions analysts
* Provide visibility on testing campaign/milestones to all stakeholders
Quality assurance ambassador
* Show accountability for the project, product or release quality control
Technicity
* Efficiently use QA tooling stack and frameworks
* Be proactive about any issue/change that is likely to affect QA peers daily job
Continuous and sustainable improvement
* Participate to the understanding, measurement and reduction of the environmental impact of the tested applications and associated QA activities
Information Security
Posted 1 day ago
Job Viewed
Job Description
- **Technical / job functional knowledge**
- Understanding and working knowledge of control frameworks based on industry best practices such as ISO27001, PCI-DSS, GDPR.
- Responsible for conducting timely security assessments of third-party suppliers, recording results accurately and initiating appropriate assurance responses.
- Support the production of high quality, informative and accurate reports in respect of third-party assurance assessments.
- Provide advice and guidance to stakeholders on Information/Cyber Security Minimum Requirements.
- Conduct audits to verify the compliance to organizations security standards
- Assist in the improvement of risk management and Cyber Security controls.
- IT and cybersecurity policies and standards.
- Third Party Risk Frameworks
- Regulatory compliance
- Technology resiliency
- Data protection
Immediate joiner are preferred.
Experience : 1year minimum
Job Location : Mumbai
Contact Name : Swati/Arpita
Contact Number:
+91-XXX
/
Schedule:
- Monday to Friday
Ability to commute/relocate:
- Vashi, Navi Mumbai - , Maharashtra: Reliably commute or planning to relocate before starting work (required)
**Experience**:
- total work: 1 year (preferred)
**Speak with the employer**
+91
+91-XXX
Information Security
Posted 1 day ago
Job Viewed
Job Description
Thoucentric is a niche management consulting firm focused on helping organizations overcome business challenges, maximize growth & overall performance through effective problem solving, efficient people, process and technology solutioning, end to end execution and management.
We have been certified
**Great Place to Work **by AIM
** **and have been ranked as
**"50 Best Firms for Data Scientists to Work For"**
We help clients with Business Consulting, Program & Project Management, Digital Transformation, Product Management, Process & Technology Solutioning and Execution including Analytics & Emerging Tech areas cutting across functional areas such as Supply Chain, Finance & HR, Sales & Distribution.
We are a group of seasoned professionals having diverse industry, solution and product experience thereby making us effective business liaisons.
**We are 400+ consultants strong coming with strong diverse background fueling our growth story in India and across four other global locations viz. US, UK, Singapore and Australia.**
At Thoucentric, we work on various problem statements.
- The most popular ones are
- ** Building capabilities** that address a market need, **basis our ongoing research **effort.**
- ** Solving a specific use case** for a current or potential client **based on challenges on-**ground.**
- ** Developing new systems **that help be a better employer and a better partner to clients.
- All of these need the **best of minds to work on them day-to-day;** and **we do exactly that!**
- Your c**ontribution to organization development is as important** as outward facing consulting.
- ** We are invested in both, employee growth and client success!**
**About the Role**:
- This position is responsible for establishing and maintaining a corporate wide information security management program to ensure that information assets are adequately protected.
- The position is responsible for identifying, evaluating, and reporting on information security risks in a manner that meets compliance and regulatory requirements, and aligns with and supports the risk posture of the enterprise.
- Strategic Support and Management
- Develop, implement, and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality, and availability of information is owned, controlled, or processed by the organization.
- Develop, maintain, and publish up-to-date information security policies, standards, and guidelines. Oversee the approval, training, and dissemination of security policies and practices.
- Create, communicate, and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants, and other service providers.
- Develop and manage information security budgets and monitor them for variances.
- Create and manage information security and risk management awareness training programs for all employees, contractors, and approved system users.
- Create a framework for roles and responsibilities regarding information ownership, classification, accountability and protection
- Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.
- Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures.
- Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data, and the company's reputation.
- Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action.
Security Liaison
- Liaise among the information security team and corporate compliance, audit, legal and HR management teams as required.
- Manage security issues and incidents, and participate in problem and change management forums. Ensuring timely reporting and adequate participation in investigation for ICT security incidents
- Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation.
- Work with the IT and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program.
Architecture Support- Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools.
- Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with IT management to align existing technical installed base and skills with future architectural requirement
**Requirements**:
**Education qual
Information Security
Posted 1 day ago
Job Viewed
Job Description
**Role Description**: Join our team in Mumbai, Noida, NCR as a full-time Information Security Consultant, where you will be immersed in a dynamic on-site role. As an integral part of our organization, you will take charge of critical tasks such as conducting thorough security assessments, auditing information systems, and playing a key role in the formulation and implementation of policies, procedures, and essential solutions. Your responsibilities extend to performing risk assessments, providing insightful recommendations, and actively contributing to the ongoing efforts to mitigate identified risks. This role demands not only a deep understanding of information security practices but also the ability to translate that knowledge into effective strategies that enhance our overall security framework. If you are passionate about information security and possess the skills to drive positive change, we invite you to be part of our team and contribute to the continued success of our organization.
**Responsibilities**:
- Understanding of the ISO 27001 standard, with expertise in both its implementation and auditing processes.
- Knowledgeable in ISMS Policy, Procedure and SOP creation, Review and Update.
- Proficient in conducting thorough risk assessments.
- Familiarity with Business Continuity principles and practices.
- Collaborate effectively with diverse client stakeholders to ensure alignment with Information Security Management policies, procedures, guidelines, and processes.
- Take ownership of creating ISMS-related documents/checklists, conducting audits, and driving ISM activities.
- Showcase industry expertise, displaying a profound understanding of the industry, emerging trends, issues, challenges, key players, and leading practices.
- Maintain a client-centric focus by efficiently addressing client needs and fostering productive relationships with client personnel.
**Qualifications**:
- 2 to 5 years of experience in IT Audit, ITGC, ISO 27001 Consulting, regulatory compliance.
- Assessment experience in RBI, SEBI, IRDAI, NPCI, GRC Compliance.
- Excellent interpersonal and communication skills to work effectively with clients and internal teams.
- Any bachelor’s or master’s degree.
- Certification in information security, such as ISO 27001, CISA is preferred.
Senior Information Security Analyst - Information Security
Posted 9 days ago
Job Viewed
Job Description
Location: Bhubaneswar, Odisha, IN
Our client, a leading financial services firm, is seeking a highly competent Senior Information Security Analyst to join their dedicated security operations center in **Bhubaneswar, Odisha**. This is a critical on-site role, vital for maintaining the integrity and security of sensitive data.
The Senior Information Security Analyst will be responsible for identifying, assessing, and mitigating information security risks across the organization's IT infrastructure. The ideal candidate will possess extensive knowledge of cybersecurity principles, threat intelligence, vulnerability management, incident response, and security frameworks.
Key Responsibilities:
- Monitor and analyze security alerts from various security tools (SIEM, IDS/IPS, EDR).
- Investigate security incidents, conduct forensic analysis, and implement containment and eradication strategies.
- Perform vulnerability assessments and penetration testing on systems and applications.
- Develop and implement security policies, standards, and procedures.
- Manage and maintain security infrastructure, including firewalls, intrusion detection systems, and antivirus solutions.
- Conduct risk assessments and develop mitigation plans to address identified vulnerabilities.
- Stay current with emerging threats, vulnerabilities, and security technologies.
- Develop and deliver security awareness training to employees.
- Participate in security audits and ensure compliance with regulatory requirements.
- Collaborate with IT teams to implement security best practices in system design and deployment.
- Develop and refine incident response plans and playbooks.
- Contribute to the continuous improvement of the organization's security posture.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 6 years of experience in information security, cybersecurity operations, or risk management.
- In-depth knowledge of cybersecurity principles, threats, and attack vectors.
- Hands-on experience with SIEM tools (e.g., Splunk, LogRhythm), IDS/IPS, and endpoint security solutions.
- Experience with vulnerability scanning tools (e.g., Nessus, Qualys) and penetration testing methodologies.
- Familiarity with security frameworks (e.g., NIST, ISO 27001) and compliance requirements.
- Strong analytical and problem-solving skills with meticulous attention to detail.
- Excellent communication and interpersonal skills, with the ability to work effectively in a team.
- Relevant certifications such as CISSP, CISM, CEH, or GSEC are highly desirable.
- Ability to work under pressure and respond effectively to security incidents.
This is a critical role in protecting our client's digital assets in **Bhubaneswar**. If you are a dedicated security professional committed to safeguarding information, we encourage you to apply.
Ethical Hacker
Posted today
Job Viewed
Job Description
Responsibilities
END -->Our Principles
These are some of the principles that we strongly believe in, preach and actually follow as well.
Commitments
We clearly commit what we can do, by when can we do it and how we would do it, And then we do it.
Confidentiality
We are extremely paranoid about protecting the confidentiality of what we do, for whom and how we do it.
Comfortability
We ensure comfortability of you and your team with ours, which can only come from complete transparency.
Capability
We keep improving our already awesome capabilities by investing all resources at our disposal.
Certified Ethical Hacking Jobs
Ethical Hacker Requirements
Ethical Hacker Job Description
• Documentation and presentation of security-testing results (final reports and presentations) to the executive, middle management, and technical teams.
• Review of network architecture and security.
• He or She will be Managing online security of all our and client websites.
• Risk assessments, vulnerability assessments, and manage intrusion detection/prevention mechanisms.
• Assist the other Ethical Hackers in projects & cases.
• Management and Remediation of the results of various security incidents as/when they occur.
• Evaluation of new and proposed security systems and technologies.
• Definition of monitoring criteria and process for ensuring that industry best practices are maintained.
• Assessment of security awareness training using social engineering.
• He/She will be Responsible for Handling, Operating, Management.
• Meeting/liaising with Trainers to discuss status of project.
Ethical Hacker Qualifications
• Any Graduate with excellent knowledge of Ethical Hacking
• Certified Ethical hacker jobs for Freshers
• Excellent Aptitude, Manipulative, Behavioural, Computational, Presentation, Verbal, Written, Interpersonal, Communications and Teaching Skills and should be Fluent in English.
• Should be Willing and Ready to Travel.
• Should be open to work in Flexible Hours. As a member of the Ethical Hacking Team you will be responsible for performing security assessments of a wide range of products and services in an equally wide range of technologies.
• Keen to Keep Researching for New, Interactive and Latest updates.
• Should be well versed with Industry Knowledge.
• Up-to-Date with Recent Technological and Software Developments, Advances in Computer Technology and How This Affects the Business Environment and have a
• Strong Client Focus.
• Should be Creative, with Artistic Flair and with Good Imagination, Analytics and High Order Thinking Skills.
• Should believe in Teamwork, Cooperation and Helping Others Out Whenever Needed.
Perception Perfection
CryptoMize is dedicated to ensure a prominent progress to how the world perceives you. We help you to establish your perception to the extent of perfection with our devised strategic plan and techniques.
Reputation
Sentiment
Promotional Parlance
CryptoMize introduces you to Promotional Parlance which not only promotes your cause but provides a personalized-edge. Our solutions are tailored in a strategic way that attracts the audience in a way that they are most receptive to.
Marketing
Outreach
Public Relations
CryptoMize formulates a proactive strategy to amplify your Media Outreach without compromising your reputation. CryptoMize assists you in communicating with your intended audience to achieve a global outreach.
Brand
Media
Political Catalysis
We bring efficiency to governance operations through intelligence and strategic thinking. By integrating digital approaches, CryptoMize seeks to improve Campaign Strategies and governance in general.
Politics
Consultancy
Policing Phronesis
CryptoMize, with the help of its special mix of Forensics and Consultancy, aims to handle all sorts of cyber crimes affecting your organisation and provide you with the best guidance for such situations.
Intelligence
Forensics
Privacy Enforcement
CryptoMize is driven by the belief that none of your valuable data should go unprotected. Our experts put concerted effort to preserve your privacy in order to minimize the impact of cybercrime.
Privacy
Security
What Makes Us Different?
CryptoMize offers a full spectrum of elite services derived with preemptive analysis and strategic planning to our clients. We work efficiently with our proficient and proactive team by utilising extraordinary tools.
Collaboration with Dignitaries
We collaborate with highly influential and prominent personalities around the world. Being transcendental and visionary has its own benefits, our supremacy of being omnipresent empowers us to command, control and maneuver information from the internet.
01Powerful Team
CryptoMize is the combination of a powerful team that works on a supportive, transparent and encouraging platform. With spontaneity and dedication to the advancement of technology, we aspire to be better at what we do for people who trust us with their information and projects.
02Triple-Proof Approach
We execute a triple-proof approach from conducting thorough research, developing strong strategies, to guaranteeing information security. This proves beneficial for our clients to reach their desired goal.
03Our Core Values
Trust
We seek to connect and build relationships with our clients.That is our core principle of our work ethic which we fully-abide to. We works on 3 principles: Respect, Honesty and Transparency.
Reliability
Commitment is an act, not a word. We believe in delivering and living up to your expectations. We have grown into a global agency only through our commitment to deliver and our reliability factor.
Safety
We are extremely paranoid about protecting our client’s safety of what we do, for whom and how we do it. We maintain absolute non disclosure and confidentiality to ensure that nothing sensitive goes out.
Passion
Our passion generates enthusiasm for what we do and how we do it. We inspire, find creative ways and nurture ideas with passion. We strategize based on audience attention.
Innovation
We believe in innovation, change and risk taking. With technology, we reinvent ourselves. Innovation is the reason how we are able to eliminate obstacles for cultivating growth.
Excellence
We ensure to maintain your eminence by reinventing ourselves with our core values that inspire excellence. We strive for quality in everything we do.
OUR PRESENCE
Our Journey So Far
Our presence is all across the globe. Our impact can be seen in 03+ continents and 30+ countries, we know how to shape people's digital lives. We have a vast range of projects, from running political campaigns, shaping people's perceptions to enforcing privacy, we work with a futuristic approach and always look ahead of time. We never restrict ourselves to specific sectors rather make sure that our services are requisites for any and everybody in the world. With our elite clientele we show supremacy of work and build trustworthy relationships. We believe intelligence is the future and aim towards collective good and growth of all! 3+ Our PresenceSuccessfully establishing ourselves globally in 3+ continents.
70+ Our ServicesGiving us an edge over everyone else who is trying to solve similar problems.
10+ Years of ExperienceServing great value to our clients since the past decade.
NEVERENDING OPPORTUNITIES FOR YOUOur Vision
In the days of yore, gathering intelligence was a matter of sending out spies. Today the world has changed, and intelligence is as much about technology as it is about people. We are redefining what it means to truly protect you and your business. From network security, to cloud recovery, to data recovery, CryptoMize focuses on your technology’s vulnerabilities so you can avoid pitfalls and stay ahead.
Ethical Hacker
Posted 1 day ago
Job Viewed
Job Description
- Meeting with clients to discuss the security system currently in place.
- Researching the company's system, network structure, and possible penetration sites.
- Conducting multiple penetration tests on the system.
- Identifying and recording security flaws and breaches.
- Identifying areas of high-level security.
- Reviewing and rating the security network.
- Creating suggestions for security upgrades.
- Compiling penetration test reports for the client.
- Conducting penetration tests once new security features have been implemented.
- Suggesting alternate upgrades.
**Certified Ethical Hacker Requirements**:
- Bachelor’s degree in information technology or computer science.
- CEH Certification.
- Proven work experience as a certified ethical hacker.
- Advanced knowledge of networking systems and security software.
- In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.
- Technical knowledge of routers, firewalls, and server systems.
- Good written and verbal communication skills.
- Good troubleshooting skills.
- Ability to see big-picture system flaws.
**Salary**: ₹25,000.00 - ₹35,000.00 per month
Ability to commute/relocate:
- Bengaluru, Karnataka: Reliably commute or planning to relocate before starting work (required)
**Experience**:
- total work: 1 year (preferred)
Work Location: One location
Be The First To Know
About the latest Penetrationtester Jobs in India !
Ethical Hacker
Posted 1 day ago
Job Viewed
Job Description
**Position
**Overview**:
ExamRoom.AI is seeking a highly skilled and motivated Ethical
Hacker to join our team. As an Ethical Hacker, you will play a crucial role in
identifying vulnerabilities, assessing risks, and implementing robust security
measures to protect our organization's digital assets. You will be responsible for
conducting both offensive and defensive security activities, ensuring the
confidentiality, integrity, and availability of our systems and data.
**Position Required Skills, Knowledge and Abilities**:
- Proven work experience as a certified Ethical Hacker.
- Advanced knowledge of modern distributed systems and security
software.
- In-depth knowledge of modern attack vectors. Technical knowledge of
routers, firewalls, and server systems.
- Bachelor’s degree in computer science, information technology security,
or related field.
- Practical security certifications including but not limited to OSCP, eWPTX,
CRTO, or SANS certifications.
- Demonstrable expertise in penetration tests, vulnerability assessment,
security monitoring and auditing, incident response, threat hunting,
malware, and forensics analysis.
- Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless
networking.
- Experience with common network infrastructures, cloud infrastructures,
and security tools.
- Knowledge of security testing methodologies like PTES, OWASP, MITRE
ATT&CK.
- Ability to work in a fast-paced environment.
- Good written, and verbal communication skills and great troubleshooting
skills.
- Ability to see big-picture system flaws.
- Working Knowledge of threat modelling and security best practices like
CIS benchmarks.
- Excellent documentation development ability.
**Certified Ethical Hacker Responsibilities**:
- Ethical hacking and penetration testing, vulnerability assessment, security
monitoring, and alerting.
security, reverse engineering, network security threat modelling, and risk
assessment.
- Work with other penetration testers and information security analysts.
- Meet with stakeholders to discuss the security system currently in place.
- Discovering the company's attack surface in real-time.
- Conducting multiple penetration tests on the system.
- Identifying and recording security flaws and breaches and areas of highlevel security.
- Reviewing and rating the security posture and creating suggestions for
security upgrades.
- Conducting penetration tests once new security features have been
implemented and compiling professional-grade penetration test reports
for the appropriate audience.
- Suggesting alternate upgrades.
- Ensuring compliance with security policies and standards.
- Contribute to developing SRT/SIR protocols.
- Other security-related duties as assigned.
Specialist - Information Security

Posted 12 days ago
Job Viewed
Job Description
**Position Overview:**
This position is responsible for overseeing and implementing security measures to protect the organization's data and infrastructure. This role involves developing security strategies, managing risks, ensuring compliance, and leading incident response efforts. A key aspect of this role is fostering strong relationships and partnerships with business leaders and stakeholders to ensure security measures align with business objectives.
**Key Responsibilities:**
+ **Security Strategy:** Develop and implement security strategies tailored to the segment to ensure the protection of data and infrastructure.
+ **Risk Management:** Identify, assess, and mitigate security risks associated.
+ **Incident Response:** Lead incident response efforts for security breaches within the segment, including investigation, containment, and remediation.
+ **Compliance:** Ensure compliance with relevant regulations and standards.
+ **Collaboration:** Work closely with other IT teams and segment leaders to integrate security measures into services and applications.
+ **Training and Awareness:** Support security training and awareness programs for employees within the segment to promote a security-conscious culture.
+ **Policy Development:** Develop and enforce security policies and procedures.
+ **Audit and Assessment:** Facilitate information security (e.g. ISO 27001, NIST) and regulatory audits, as well as security assurance activities that verify the effectiveness of implemented security controls.
+ **Business Partnership:** Foster strong relationships with business leaders and stakeholders to ensure security measures support and enhance business objectives. Collaborate with business units to understand their needs and provide tailored security solutions.
**Qualifications:**
+ 3-5 Years of Experience
+ Proven experience in developing and implementing security strategies.
+ Strong knowledge of risk management and security architecture.
+ Experience in leading incident response efforts.
+ Knowledge of compliance regulations US & India (such as HIPAA & IT Act) and experience with security monitoring tools.
+ Excellent collaboration and communication skills.
+ Ability to conduct training and develop security policies.
+ Experience in conducting security audits and assessments.
+ Demonstrated ability to build and maintain relationships with business leaders and stakeholders.
+ Should understand all aspects of Security environment, TLS Versions
+ Understands Data - Data at rest, data in motion, Compliance, Data Relevance
+ Should be able to assess and share the Vulnerability to Business
+ System Security Plan (SSP)
+ Understands Encryptions
_At UnitedHealth Group, our mission is to help people live healthier lives and make the health system work better for everyone. We believe everyone - of every race, gender, sexuality, age, location and income - deserves the opportunity to live their healthiest life. Today, however, there are still far too many barriers to good health which are disproportionately experienced by people of color, historically marginalized groups and those with lower incomes. We are committed to mitigating our impact on the environment and enabling and delivering equitable care that addresses health disparities and improves health outcomes - an enterprise priority reflected in our mission._
Information Security Manager

Posted 12 days ago
Job Viewed
Job Description
This position is responsible for the leadership of the India Information Security (IS) department as part of the Global Information Security Directorate. Areas of responsibility will include coordination with the other IS Departments to ensure standard enforcement of security polices and controls, interfacing with local India IT teams and business leaders, and mitigating risks to the organization's information assets.
**Responsibilities :**
+ Manage India Information Security team's day to day operations.
+ Support the global Security Operations (SecOps) department to safeguard digital assets by assisting with detecting, investigating, and resolving cybersecurity threats
+ Assist the global Governance, Risk & Compliance (GRC) department with enforcing cybersecurity policies, overseeing cybersecurity risk, facilitating cybersecurity compliance audits, and conducting cybersecurity awareness training.
+ Assist the global Cybersecurity Infrastructure and Design (CID) department with management and maintenance of the cybersecurity systems, platforms, and controls.
+ Implement Secure Software Development Lifecycle (SSDLC) in India office by enforcing the compliance of global policies, processes, procedures and principles.
**Qualifications**
+ Bachelor's degree in Cyber/Information Security or Information Technology, Computer Science, Computer Engineering
+ Professional certifications such as CISSP, CISM, or equivalent multi-domain cybersecurity focused certification.
+ At least 10 years of experience in IT security management, with a proven track record of managing teams in global matrix environment
+ Experience with security technologies: EDR, SIEM, SOAR, CASM, CASB, CSPM, IAM, PAM
+ Excellent communication and interpersonal skills to effectively engage internal stakeholders.
+ Demonstrated ability to analyze complex security issues, devise solutions, and enforce established security controls.
+ Strong leadership skills to drive standardization of processes, procedures, and principles.
**Job** Engineering
**Primary Location** India-Maharashtra-Mumbai
**Schedule:** Full-time
**Travel:** No
**Req ID:**
**Job Hire Type** Experienced Not Applicable #BMI N/A