FAQs
Any questions? We're here to help
What is the company’s approach to work-life balance?
We are working from Monday to Friday. We are also giving paid time off to our employees. Apart from this, employees can work twice a month from home.
Are there flexible work hours?
Yes, we work in 3 shifts(Day, Mid, and Night).
What is the increment policy?
We have two fixed months for the increments: July and January.
Can you tell me more about the benefits package (healthcare, retirement, bonuses)?
Yes, we are giving bonuses to our employees after achieving certain milestones. Also, we have ESIC and PF benefit for the employees.
What is the strength of the company
Currently, we have 80+ team members.
On what techstacks the company works?
We work on multiple tech stacks- React Js, Node Js, Next Js, Python, ML/AI, PHP, Laravel, and WordPress. We also work on UI/UX, graphic designing, SEO, digital marketing, etc.
How to apply for a job?
To apply, you can share your updated resume at hr@tekkiwebsolutions.com or apply directly from this link- https://tekkiwebsolutions.bitrix24.site/Drop_your_CV/
How often are performance reviews conducted?
Performance review audits are conducted every month.
What is the salary date?
Salary would be credited between 5th-7th of every month.
The company would provide the system, or do we need to bring our system?
Yes, the company provides systems to every employee working with TWS
Can we use mobile phones during office hours?
No, using mobile phones while working is strictly prohibited. However, one can use it in the waiting area in case of emergency calls or use official phones.
Is listening to music is allowed?
Yes, but from the official headphones.
Can we use AI tools?
Yes, only those that the CTO or seniors recommend.
How do you handle data breaches or unauthorized access to client data?
We are using monitoring tools to protect data, and external drives are also prohibited to handle data breaches.
What security measures are in place to prevent unauthorized access to data?
We are using a firewall to protect data.
What steps do you take to ensure your software is secure from vulnerabilities?
We use secure coding standards and different testing methodologies to secure software from vulnerabilities.