i
OnMobile Global
Filter interviews by
Clear (1)
I applied via Company Website and was interviewed in Nov 2021. There was 1 interview round.
During my graduation, I worked on several software projects that involved developing web applications and implementing algorithms.
Developed a web application for an online shopping platform using HTML, CSS, and JavaScript.
Implemented a sorting algorithm in Java as part of a data structures course project.
Created a mobile app prototype for a travel planning tool using React Native.
Collaborated with a team to build a dat...
I applied via Walk-in and was interviewed in Jan 2021. There were 4 interview rounds.
Top trending discussions
I appeared for an interview before Jan 2021.
Round duration - 60 minutes
Round difficulty - Easy
Two coding questions were given in the first round to be solved in 60 minutes.
Given an array A
containing 'N' integers and an integer m
, rearrange the elements of the array such that the differences between the array elements and m
are sor...
Rearrange array elements based on their differences from a given integer.
Calculate the differences between each element and the given integer.
Sort the elements based on their differences while maintaining the original order for elements with the same difference.
Implement a function to rearrange the array elements as per the given criteria.
Given an arbitrary binary tree, a node of the tree, and an integer 'K', find all nodes that are at a distance K from the specified node, and return a list of th...
The task is to find all nodes in a binary tree that are at a distance K from a given node.
Traverse the binary tree to find the given node
From the given node, perform a depth-first search to find all nodes at distance K
Use a list to store the values of the nodes at distance K
Return the list of values in any order
Round duration - 60 minutes
Round difficulty - Easy
This was a technical round with questions based on DSA, DBMS, Computer Networking and project based questions.
Ninja is tasked with printing a triangle pattern based on a given number 'N' for any test case.
N = 4
1
232
34545
4567654
The pat...
Print a triangle pattern of numbers based on a given number 'N'.
Iterate through each row and print the numbers accordingly
Use spaces to center-align the numbers in each row
Increment the numbers in each row as per the pattern
Web server serves static content over HTTP, while application server runs dynamic content and business logic.
Web server handles HTTP requests and responses, serving static content like HTML, images, and CSS.
Application server executes business logic, runs dynamic content, and interacts with databases.
Web server examples include Apache, Nginx, while application server examples include Tomcat, JBoss.
Web server focuses on...
The internet is a global network of interconnected computers that communicate using standardized protocols.
The internet is made up of a vast number of interconnected networks of computers.
Data is transmitted over the internet using protocols such as TCP/IP.
Websites are hosted on servers connected to the internet, and users access them using web browsers.
Internet Service Providers (ISPs) provide access to the internet f...
SQL query to find the nth highest salary
Use the 'SELECT DISTINCT' statement to get unique salary values
Order the salaries in descending order using 'ORDER BY' clause
Use 'LIMIT' and 'OFFSET' to get the nth highest salary
Round duration - 30 minutes
Round difficulty - Easy
Typical HR round with behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I appeared for an interview before Sep 2016.
I have worked on various technologies including Java, Python, AWS, Docker, and Kubernetes.
Java
Python
AWS
Docker
Kubernetes
Daily operational activities case studies
Case study of optimizing production line for efficiency
Case study of implementing new safety protocols in a manufacturing plant
Case study of troubleshooting and resolving technical issues in a software development team
Case study of streamlining inventory management in a retail store
Case study of improving customer service processes in a call center
Project management is the process of planning, organizing, and overseeing the execution of a project from start to finish.
It involves defining project goals and objectives
Creating a project plan and timeline
Assigning tasks and responsibilities to team members
Monitoring progress and making adjustments as needed
Ensuring that the project is completed on time, within budget, and meets the desired quality standards
Examples ...
Financial and cost control is the process of monitoring and managing project expenses to ensure they stay within budget.
Developing a detailed budget plan
Tracking expenses and comparing them to the budget plan
Identifying and addressing cost overruns
Negotiating with vendors to get the best prices
Implementing cost-saving measures
Regularly reporting on financial status to stakeholders
Resource management is the process of planning, allocating, and optimizing resources to achieve organizational goals.
It involves identifying the resources needed for a project or task
Allocating those resources in an efficient manner
Monitoring and controlling resource usage to ensure optimal performance
Examples include managing personnel, finances, equipment, and time
Effective resource management can lead to increased p
2G, 3G, and 4G call flow are the processes involved in establishing and maintaining a mobile phone call.
2G call flow involves circuit-switched technology and uses Time Division Multiple Access (TDMA) for voice transmission.
3G call flow uses packet-switched technology and supports both voice and data transmission.
4G call flow uses Long-Term Evolution (LTE) technology and provides high-speed data transmission.
All call fl...
Single RAN is a network architecture that allows multiple wireless technologies to be supported on a single physical network.
Single RAN stands for Single Radio Access Network.
It enables multiple wireless technologies such as 2G, 3G, 4G, and 5G to be supported on a single physical network.
This reduces the need for multiple hardware and software components, resulting in cost savings and simplified network management.
Sing...
VOLTE stands for Voice over LTE. It is a technology that allows voice calls to be made over a 4G LTE network.
VOLTE uses IP packets to transmit voice calls over the LTE network
It provides better call quality and faster call setup times compared to traditional 2G/3G networks
VOLTE also allows for simultaneous voice and data usage on the same network
Examples of VOLTE-enabled devices include iPhone 6 and above, Samsung Gala...
LTE is a standard for wireless broadband communication while VoLTE is a technology that enables voice calls over LTE network.
LTE stands for Long-Term Evolution and is a standard for wireless broadband communication.
VoLTE stands for Voice over LTE and is a technology that enables voice calls over LTE network.
LTE is used for data transfer while VoLTE is used for voice calls.
VoLTE provides better call quality and faster c...
Transport network refers to the infrastructure that enables the movement of people, goods, and information.
Transport network includes roads, railways, airports, seaports, and communication networks.
It plays a crucial role in the economy by facilitating trade and commerce.
Examples of transport networks include the interstate highway system in the US and the European railway network.
Transport network planning involves op...
ABIS over IP and ABIS over TDM are two different methods of transmitting biometric data.
ABIS over IP uses internet protocol to transmit biometric data while ABIS over TDM uses time-division multiplexing.
ABIS over IP is more flexible and scalable than ABIS over TDM.
ABIS over TDM is more reliable and secure than ABIS over IP.
ABIS over IP is suitable for remote locations while ABIS over TDM is suitable for local networks.
...
2G, 3G, and 4G are mobile network technologies with different architectures.
2G uses circuit-switched technology and is primarily used for voice calls and text messaging.
3G uses packet-switched technology and offers faster data transfer rates than 2G.
4G uses all-IP packet-switched technology and provides even faster data transfer rates than 3G.
4G also supports advanced features like VoLTE and carrier aggregation.
Each ge...
I am a Senior engineer with 10+ years of experience in software development, specializing in backend systems and cloud technologies.
10+ years of experience in software development
Specialize in backend systems and cloud technologies
Strong problem-solving skills
Experience with large-scale distributed systems
Proficient in programming languages such as Java, Python, and Go
I have worked in various companies ranging from startups to large corporations, gaining experience in diverse technologies and industries.
Worked in a startup where I was responsible for developing a scalable backend system using Node.js and MongoDB.
At a mid-sized company, I led a team in implementing CI/CD pipelines for faster and more reliable software delivery.
In a large corporation, I worked on optimizing performanc...
I am impressed by the company's innovative projects and strong reputation in the industry.
Company's reputation for cutting-edge technology
Opportunity to work on challenging projects
Positive reviews from current employees
My notice period is currently 3 months, but it may be negotiable depending on the circumstances.
My current notice period is 3 months
I am open to negotiation depending on the circumstances
I can provide examples of when I have negotiated notice periods in the past
I appeared for an interview before Mar 2021.
Round duration - 15 minutes
Round difficulty - Easy
This was a group discussion round where we were divided into groups of 10 and we had 15 minutes for GD.
Round duration - 60 minutes
Round difficulty - Medium
This is all about how good you are with the fundamentals. Out of 10 I would give it a 6.5 on difficulty.
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
STR = "abcde"
"e...
Reverse a given string containing alphabets, numbers, and special characters.
Iterate through the string from the end to the beginning and append each character to a new string.
Use built-in functions like reverse() or StringBuilder in languages like Python or Java for efficient reversal.
Handle special characters and numbers while reversing the string.
Ensure to consider the constraints on the length of the string and the
A deadlock is a situation in which two or more processes are unable to proceed because each is waiting for the other to release a resource.
Occurs in multitasking environments where processes compete for limited resources
Can be resolved using techniques like deadlock prevention, deadlock avoidance, and deadlock detection
Example: Process A holds Resource X and waits for Resource Y, while Process B holds Resource Y and wa
A thread is a lightweight sub-process that allows concurrent execution within a single process.
Threads share the same memory space within a process.
Threads are used to achieve parallelism and improve performance.
Examples of threads include the main thread in a program and worker threads in a multi-threaded application.
Multiprocessing involves multiple processors executing multiple tasks simultaneously, while multiprogramming involves multiple programs sharing a single processor by switching between them.
Multiprocessing utilizes multiple processors to execute multiple tasks concurrently.
Multiprogramming involves multiple programs sharing a single processor by switching between them.
Multiprocessing is more efficient in terms of perfor...
Process life cycle in an operating system involves creation, execution, termination, and resource management.
Creation: When a process is created, it is assigned a unique process ID and allocated necessary resources.
Execution: The process is then scheduled by the operating system to run on the CPU.
Termination: Once the process completes its task or is terminated by the user, it is removed from memory.
Resource Management...
Windows XP and Windows 7 are both operating systems developed by Microsoft, but they have several key differences.
User interface: Windows 7 has a more modern and user-friendly interface compared to Windows XP.
Performance: Windows 7 is generally faster and more stable than Windows XP.
Security: Windows 7 has more advanced security features and updates compared to Windows XP.
Hardware support: Windows 7 supports newer hard...
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DBMS and Networking mainly.
RDBMS is a type of DBMS that stores data in a structured format with relationships between tables.
RDBMS enforces referential integrity and allows for normalization of data.
DBMS is a general term for any system that manages databases, while RDBMS specifically refers to relational databases.
Examples of RDBMS include MySQL, Oracle, and SQL Server.
Examples of DBMS include MongoDB and Redis.
An Object-Oriented Database Management System (OODBMS) is a type of database management system that supports the creation and management of objects in a database.
OODBMS stores data in the form of objects, which can contain attributes and methods.
It allows for complex data structures and relationships to be represented more easily.
Examples of OODBMS include db4o, ObjectDB, and ObjectStore.
Use the COUNT DISTINCT function in SQL to find the number of unique values in a database.
Use the COUNT DISTINCT function along with the column name to count the number of unique values in that column.
For example, SELECT COUNT(DISTINCT column_name) FROM table_name;
You can also use GROUP BY to find the number of unique values for multiple columns.
A hub operates at the physical layer and broadcasts data to all devices on the network, while a switch operates at the data link layer and forwards data only to the intended recipient.
Hub operates at the physical layer, while switch operates at the data link layer
Hub broadcasts data to all devices on the network, while switch forwards data only to the intended recipient
Switch is more efficient and secure compared to a
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
Physical Layer: Deals with the physical connection between devices. Example: Ethernet cables.
Data Link Layer: Responsible for node-to-node communication. Example: MAC addresses.
Network Layer: Manages routing of data packets. Example: IP addresses.
T...
Different protocols supported at each OSI layer
Layer 1 (Physical): Ethernet, Wi-Fi, Bluetooth
Layer 2 (Data Link): MAC, PPP, HDLC
Layer 3 (Network): IP, ICMP, ARP
Layer 4 (Transport): TCP, UDP, SCTP
Layer 5 (Session): NetBIOS, PPTP
Layer 6 (Presentation): SSL, TLS
Layer 7 (Application): HTTP, FTP, SMTP
Round duration - 15 minutes
Round difficulty - Easy
IF you make it to the HR round you are selected. All 28 that attended got selected . It was more like stuff for formality. The usual questions.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I appeared for an interview before Feb 2021.
Round duration - 90 minutes
Round difficulty - Medium
Questions on aptitude, English, logical reasoning, C/C++ and 5 coding ques. (only pseudo code).
Bob and his wife are in the famous 'Arcade' mall in the city of Berland. This mall has a unique way of moving between shops using trampolines. Each shop is laid out in a st...
Find the minimum number of trampoline jumps Bob needs to make to reach the final shop, or return -1 if it's impossible.
Use Breadth First Search (BFS) algorithm to find the minimum number of jumps required.
Keep track of the visited shops to avoid revisiting them.
If a shop has an Arr value of 0, it is impossible to reach the final shop.
Return -1 if the final shop cannot be reached.
Given two strings, S
and X
, your task is to find the smallest substring in S
that contains all the characters present in X
.
S = "abdd", X = "bd"
Find the smallest substring in S that contains all characters in X.
Use a sliding window approach to find the smallest window in S containing all characters of X.
Maintain a hashmap to keep track of characters in X and their frequencies in the current window.
Slide the window to the right, updating the hashmap and shrinking the window until all characters in X are present.
Return the smallest window found.
Example: S = 'abd
You need to determine all possible paths for a rat starting at position (0, 0) in a square maze to reach its destination at (N-1, N-1). The maze is represented as an N*N ma...
Find all possible paths for a rat in a maze from start to destination.
Use backtracking to explore all possible paths in the maze.
Keep track of visited cells to avoid revisiting them.
Return paths in alphabetical order as a list of strings.
Round duration - 60 minutes
Round difficulty - Easy
Questions based on OOPS were asked in this round.
A virtual function is a function in a base class that is declared using the keyword 'virtual' and can be overridden by a function with the same signature in a derived class.
Virtual functions allow for dynamic polymorphism in C++
They are used in inheritance to achieve runtime polymorphism
Virtual functions are declared in a base class and can be overridden in derived classes
They are called based on the type of object bei...
Types of polymorphism in OOP include compile-time (method overloading) and runtime (method overriding) polymorphism.
Compile-time polymorphism is achieved through method overloading, where multiple methods have the same name but different parameters.
Runtime polymorphism is achieved through method overriding, where a subclass provides a specific implementation of a method that is already defined in its superclass.
Polymor...
Deep copy creates a new object and recursively copies all nested objects, while shallow copy creates a new object and copies only the references to nested objects.
Deep copy creates a new object and copies all nested objects, while shallow copy creates a new object and copies only the references to nested objects.
In deep copy, changes made to the original object do not affect the copied object, while in shallow copy, ch...
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Find the subset of an array with the largest sum of continuous positive numbers.
Iterate through the array and keep track of the current sum and the maximum sum seen so far.
If the current element is positive, add it to the current sum. If it is negative, reset the current sum to 0.
Also keep track of the start and end indices of the maximum sum subset.
Return the subset using the start and end indices.
Find smallest substring in s1 containing all characters of s2.
Create a hash table of characters in s2
Use sliding window technique to find smallest substring in s1
Check if all characters in s2 are present in the substring
Update the smallest substring if a smaller one is found
Algorithm to reverse a linked list
Create a new empty linked list
Traverse the original linked list and insert each node at the beginning of the new list
Return the new list
Lazy loading is a technique used to defer the loading of non-critical resources until they are needed.
Advantages: faster initial page load, reduced bandwidth usage, improved user experience
Disadvantages: increased complexity, potential for slower subsequent page loads, difficulty with SEO
Examples: images, videos, and other media files can be loaded only when they are visible on the screen
Ajax is a technique for creating fast and dynamic web pages. AngularJS is a framework for building dynamic web applications, while jQuery is a library for simplifying HTML DOM traversal and manipulation.
Ajax stands for Asynchronous JavaScript and XML
It allows web pages to be updated asynchronously by exchanging data with a web server behind the scenes
AngularJS is a JavaScript framework that extends HTML with new attrib...
A traffic light system controls the flow of traffic at intersections.
The system consists of three lights: red, yellow, and green.
Each light has a specific duration for which it stays on.
The system also includes sensors to detect the presence of vehicles and pedestrians.
The duration of each light can be adjusted based on traffic patterns.
The system can be connected to a central control system for remote monitoring and m
I appeared for an interview before Feb 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical round with 3 problems based on DSA and Algorithms.
Given a non-decreasing sorted array ARR
of N
positive numbers, determine the smallest positive integer that cannot be expressed as the sum of elements from...
Find the smallest positive integer that cannot be expressed as the sum of elements from any proper subset of a given array.
Sort the array in non-decreasing order.
Iterate through the array and keep track of the smallest sum that can be formed.
If the next element in the array is greater than the current sum + 1, then the answer is the current sum + 1.
Return the answer as the smallest integer not representable as a subset
Given a singly linked list of integers, return the head of the reversed linked list.
Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed link...
Reverse a singly linked list of integers and return the head of the reversed linked list.
Iterate through the linked list and reverse the pointers to point to the previous node instead of the next node.
Use three pointers to keep track of the current, previous, and next nodes while reversing the linked list.
Update the head of the reversed linked list to be the last node encountered during the reversal process.
Given two strings S
and X
containing random characters, the task is to find the smallest substring in S
which contains all the characters present in X
.
The first...
The task is to find the smallest substring in string S which contains all the characters present in string X.
Iterate through string S and keep track of characters in X using a hashmap
Use two pointers to maintain a sliding window and find the smallest window containing all characters in X
Return the smallest window found
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions based on OOPS and Angular.
OOP concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation restricts access to certain components of an object, protecting its integrity.
Polymorphism allows objects to be treated as instances of their parent class.
Abstraction hides the complex implementation details of an object and only shows the necessar
Round duration - 60 minutes
Round difficulty - Easy
Questions based on System Design, ajax, jquery were asked.
Designing a traffic light system involves creating a system that controls the flow of traffic at intersections.
Divide the traffic light system into three main lights: red, yellow, and green.
Implement timers to control the duration of each light.
Include sensors to detect the presence of vehicles and pedestrians.
Consider implementing a pedestrian crossing signal.
Integrate a central control system to coordinate the timing
AJAX allows for asynchronous communication between client and server without needing to reload the entire page.
AJAX stands for Asynchronous JavaScript and XML.
It allows for sending and receiving data from a server without reloading the entire page.
AJAX uses XMLHttpRequest object to make requests to the server.
It can update parts of a web page without requiring a full page reload.
Commonly used in web applications to pro
AngularJS is a full-fledged MVC framework for building dynamic web applications, while jQuery is a lightweight library for DOM manipulation and event handling.
AngularJS is a full-fledged MVC framework, providing features like two-way data binding, dependency injection, and routing.
jQuery is a lightweight library primarily used for DOM manipulation and event handling.
AngularJS is suitable for building single-page applic...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I appeared for an interview before Feb 2021.
Round duration - 65 minutes
Round difficulty - Easy
There were 2 sections –
Aptitude and Logical Reasoning and MCQ based on Java question ,C++, coding for 20 min and 45 min respectively.
Section A- Not very difficult to clear this round although less time was a problem.
Section B- It contains 15 multiple choice question on c/c++,java and 4 simple coding questions
Determine if a given singly linked list of integers forms a cycle or not.
A cycle in a linked list occurs when a node's next
points back to a previous node in the ...
Detect if a singly linked list forms a cycle by checking if a node's next pointer points back to a previous node.
Traverse the linked list using two pointers, one moving at double the speed of the other.
If the two pointers meet at any point, there is a cycle in the linked list.
Use Floyd's Cycle Detection Algorithm for O(N) time complexity and O(1) space complexity.
Round duration - 75 minutes
Round difficulty - Medium
It was an online coding test in which 3 coding question were given.
Given two strings, S
and X
, your task is to find the smallest substring in S
that contains all the characters present in X
.
S = "abdd", X = "bd"
Find the smallest substring in string S that contains all characters in string X.
Iterate through string S and keep track of characters in X found in a window
Use two pointers to maintain the window and slide it to find the smallest window
Return the smallest window containing all characters in X
Given a non-decreasing sorted array ARR
of N
positive numbers, determine the smallest positive integer that cannot be expressed as the sum of elements from...
Find the smallest positive integer that cannot be expressed as the sum of elements from any proper subset of a non-decreasing sorted array of positive numbers.
Start with the smallest possible integer that cannot be represented, which is 1.
Iterate through the array and update the smallest integer that cannot be represented.
If the current element is greater than the smallest integer that cannot be represented, return tha...
Given a square chessboard of size 'N x N', determine the minimum number of moves a Knight requires to reach a specified target position from its initial position...
Calculate the minimum number of moves a Knight needs to reach a target position on a chessboard.
Implement a function that takes knight's starting position, target position, and chessboard size as input
Use breadth-first search algorithm to find the shortest path for the Knight
Consider all possible 8 movements of the Knight on the chessboard
Return the minimum number of moves required for the Knight to reach the target po
Round duration - 60 minutes
Round difficulty - Easy
It started with a discussion on the programs given in coding round. They asked me about my interest field after that they directly jumped into Networking, Linux and Ethical Hacking part looking my interest domain. They asked me various question on networking and linux.
Then they asked me to code a simple c program
Given a singly linked list of integers, return the head of the reversed linked list.
Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed link...
Reverse a singly linked list of integers and return the head of the reversed linked list.
Iterate through the linked list and reverse the pointers to point to the previous node.
Keep track of the current, previous, and next nodes while reversing the linked list.
Update the head of the reversed linked list as the last node encountered during reversal.
FTP uses port number 21 and SMTP uses port number 25.
FTP uses port 21 for data transfer and port 20 for control information.
SMTP uses port 25 for email communication.
Understanding port numbers is important for network communication.
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: Layer 1 (Physical) deals with physi...
To copy files in Linux, you can use the 'cp' command.
Use the 'cp' command followed by the source file and destination directory to copy a file.
To copy a directory and its contents, use the '-r' flag with the 'cp' command.
You can also use wildcards like '*' to copy multiple files at once.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
based on 14 reviews
Rating in categories
Software Engineer
81
salaries
| ₹4 L/yr - ₹14.5 L/yr |
Operations Engineer
60
salaries
| ₹2.5 L/yr - ₹6 L/yr |
Devops Engineer
55
salaries
| ₹3.5 L/yr - ₹8 L/yr |
Senior Operations Engineer
39
salaries
| ₹4 L/yr - ₹10 L/yr |
Senior Software Engineer
32
salaries
| ₹7.7 L/yr - ₹22 L/yr |
Info Edge
JustDial
Matrimony.com
Indiamart Intermesh