Accenture
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
For example, a ₹10 LPA CTC could mean an in-hand salary of ₹70,000–₹75,000 per month, depending on deductions and benefits.
✨ 𝗣𝗿𝗼 𝗧𝗶𝗽: Always request a detailed salary structure during negotiations—it’s your roadmap to making informed decisions
𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!
We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
I applied via LinkedIn and was interviewed in Jan 2023. There were 2 interview rounds.
SIEM is a security information and event management system that collects and analyzes security data. XDR is an advanced threat detection and response platform that goes beyond SIEM.
SIEM collects and analyzes security data from various sources such as firewalls, servers, and endpoints.
XDR uses advanced analytics and machine learning to detect and respond to threats across multiple endpoints and networks.
SIEM is focused ...
PAM stands for Privileged Access Management and PIM stands for Privileged Identity Management.
PAM is a security solution that manages and monitors privileged access to critical systems and data.
PIM is a security solution that manages and secures privileged identities, such as administrator accounts.
Both PAM and PIM are important for protecting against insider threats and external attacks.
Examples of PAM and PIM solutio
I was interviewed in Aug 2022.
Vulnerability is a weakness, threat is a potential danger, and risk is the likelihood of a threat exploiting a vulnerability.
Vulnerability: a weakness in a system that can be exploited by a threat
Threat: a potential danger that can exploit a vulnerability
Risk: the likelihood of a threat exploiting a vulnerability
Example: A vulnerability in a software program can be exploited by a hacker (threat), resulting in a data br
Secure session layer protocols include SSL and TLS.
SSL (Secure Sockets Layer)
TLS (Transport Layer Security)
I applied via Walk-in and was interviewed in Dec 2024. There were 4 interview rounds.
About my Background and my job
About my physical experience
Confirm the job on my capabilities
A supervisor is a person who oversees and manages a team or group of individuals.
Supervisors are responsible for delegating tasks and ensuring they are completed efficiently.
They provide guidance and support to their team members.
They are accountable for the performance and productivity of their team.
They communicate effectively with their team and higher-ups.
Examples include a retail store manager, a construction site
I applied via Company Website and was interviewed in Dec 2021. There were 3 interview rounds.
Modification of behavior is a process of changing one's actions or reactions to certain stimuli.
Behavior modification involves identifying the target behavior, setting goals, and implementing a plan to change the behavior.
Positive reinforcement is often used to encourage desired behavior, while negative reinforcement is used to discourage undesired behavior.
Examples of behavior modification include training a dog to si...
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
Experienced security professional with a background in law enforcement and risk management.
Former law enforcement officer with 10+ years of experience
Extensive knowledge in risk management and security protocols
Proven track record of implementing effective security measures
Strong leadership and communication skills
Certified in security management and emergency response
I am looking for Wipro company because of its reputation for providing top-notch security solutions and opportunities for career growth.
Wipro has a strong reputation in the industry for providing top-notch security solutions
I am impressed by Wipro's commitment to innovation and staying ahead of the curve in the security field
I believe Wipro offers great opportunities for career growth and development
I have heard positi...
My soft skills include excellent communication, problem-solving, leadership, and teamwork abilities.
Strong communication skills to effectively convey information and instructions
Exceptional problem-solving skills to identify and resolve security issues
Effective leadership abilities to guide and motivate security team members
Strong teamwork skills to collaborate with colleagues and other departments
Ability to remain cal
Cyber security work experience skills involve knowledge of network security, threat detection, incident response, and security tools.
Understanding of network security principles and protocols
Experience with threat detection and analysis
Proficiency in incident response procedures
Familiarity with security tools such as firewalls, antivirus software, and intrusion detection systems
Security controls are measures put in place to protect information, systems, and assets from security threats.
Security controls can be technical, administrative, or physical in nature.
Examples of security controls include firewalls, encryption, access control mechanisms, security policies, and security awareness training.
Security controls are implemented to reduce the risk of security breaches and protect against unaut...
based on 2 reviews
Rating in categories
Application Development Analyst
38.9k
salaries
| ₹3 L/yr - ₹12 L/yr |
Application Development - Senior Analyst
26.2k
salaries
| ₹6.8 L/yr - ₹20.2 L/yr |
Team Lead
24.1k
salaries
| ₹7 L/yr - ₹25.2 L/yr |
Senior Software Engineer
18.3k
salaries
| ₹6 L/yr - ₹19 L/yr |
Software Engineer
17.6k
salaries
| ₹3.6 L/yr - ₹12.8 L/yr |
TCS
Cognizant
Capgemini
Infosys