Filter interviews by
I applied via Campus Placement and was interviewed in Nov 2021. There were 4 interview rounds.
Technical questions and aptitude questions
Top trending discussions
I applied via Job Fair and was interviewed before Sep 2021. There were 2 interview rounds.
Yes, I am okay with the offered salary of 15K CTC.
I understand the company's budget constraints and I am willing to work within it.
I am more focused on gaining experience and learning new skills than just the salary.
I am confident that with my hard work and dedication, I can prove my worth and earn a higher salary in the future.
I appeared for an interview in Apr 2022.
General aptitude , general maths
I appeared for an interview before Nov 2016.
Yes, I am willing to work at any location for the Senior Engineer position.
I am open to relocating for the right opportunity
I have experience working in different locations
I am flexible and adaptable to new environments
I have a proven track record of staying calm and focused in challenging situations, allowing me to problem-solve effectively.
I have experience working in high-pressure environments and have successfully delivered projects on time despite obstacles.
I am adaptable and can quickly assess a situation to determine the best course of action.
I have strong problem-solving skills and can think creatively to find solutions in ad
I applied via Referral and was interviewed in Sep 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed before Jan 2021. There were 4 interview rounds.
Manager related
I applied via Company Website and was interviewed before Jan 2021. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Mar 2022. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed in Jan 2022. There were 3 interview rounds.
Man in the middle attack is a type of cyber attack where the attacker intercepts communication between two parties.
The attacker intercepts communication between two parties and can eavesdrop or alter the communication
It can be done through various methods such as ARP spoofing, DNS spoofing, etc.
It can be prevented by using encryption, digital signatures, and secure communication protocols
SIEM tools are used for security information management and event management.
SIEM tools collect and analyze security-related data from various sources
They provide real-time monitoring and alerting of security incidents
Examples of SIEM tools include Splunk, IBM QRadar, and LogRhythm
Yes, I am willing to relocate for the position of Assistant Manager.
I am open to new opportunities and challenges in my career.
I understand that this is a wfo mode and relocation may be necessary.
I am willing to relocate to ensure the success of the company and my own career growth.
I have experience in relocating for work in the past and am comfortable with the process.
based on 5 reviews
Rating in categories
Deputy Associate
66
salaries
| ₹1.7 L/yr - ₹2.9 L/yr |
Senior Engineer
47
salaries
| ₹4.4 L/yr - ₹7.8 L/yr |
Assistant Manager
34
salaries
| ₹5 L/yr - ₹11.3 L/yr |
Deputy Manager
32
salaries
| ₹9.5 L/yr - ₹16 L/yr |
Diploma Trainee Engineer
30
salaries
| ₹1.8 L/yr - ₹2.3 L/yr |
Suzlon Group
Adani Power
Adani Group
Torrent Power