Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2022. There were 2 interview rounds.
I have 3 years of experience in cyber security.
Experience in threat hunting and incident response
Knowledge of SIEM tools such as Splunk and QRadar
Familiarity with network security protocols and technologies
Experience in vulnerability assessments and penetration testing
Certifications such as CompTIA Security+ and CISSP
SIEM stands for Security Information and Event Management, while SOAR stands for Security Orchestration, Automation and Response.
SIEM is a software solution that collects and analyzes security event data from different sources to identify potential security threats.
SOAR is a platform that automates and orchestrates security operations tasks, enabling faster and more efficient incident response.
SIEM and SOAR are often u...
Endpoint Security is my primary skill, focusing on protecting and securing endpoints from cyber threats.
Expertise in implementing and managing endpoint security solutions such as antivirus, firewalls, and intrusion detection systems
Proficient in analyzing and responding to security incidents on endpoints
Skilled in conducting vulnerability assessments and patch management for endpoints
Experience in endpoint forensics an...
Top trending discussions
I applied via Company Website and was interviewed in Jul 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Dec 2020. There was 1 interview round.
I applied via Company Website and was interviewed before Mar 2021. There were 3 interview rounds.
A tap library is a collection of pre-built code snippets that can be easily integrated into software applications.
Tap libraries can save developers time and effort by providing pre-built code for common functions.
Examples of tap libraries include Google's Tap Target Library for Android and the Tapku Library for iOS.
Tap libraries can be open source or proprietary, and may be free or require a license fee.
Using a tap lib...
To troubleshoot netbackup 13 backup failure, check logs, verify connectivity, and ensure proper configuration.
Check the logs for any error messages or warnings
Verify connectivity between the backup server and the client
Ensure that the backup policy is properly configured
Check for any conflicts with other backup jobs or processes
Verify that the backup media is available and properly configured
Consider running a test bac
SQL database is a software used to manage and store data in a structured manner.
SQL stands for Structured Query Language
It is used to create, modify, and query relational databases
Examples of SQL databases include MySQL, Oracle, and Microsoft SQL Server
To delete vlan dat file, use the delete flash:vlan.dat command in privileged EXEC mode.
Access privileged EXEC mode on the switch
Use the delete flash:vlan.dat command
Confirm deletion when prompted
Save the configuration to prevent the file from being recreated on reboot
I applied via Campus Placement and was interviewed before Apr 2020. There were 4 interview rounds.
I applied via Referral and was interviewed before Oct 2021. There were 2 interview rounds.
I applied via Walk-in and was interviewed in May 2020. There were 4 interview rounds.
Technical Executive
7
salaries
| ₹1.9 L/yr - ₹5.2 L/yr |
SOC Analyst
7
salaries
| ₹1.8 L/yr - ₹4.8 L/yr |
Cyber Security Engineer
7
salaries
| ₹1.9 L/yr - ₹4.5 L/yr |
Security Engineer
5
salaries
| ₹3 L/yr - ₹4.2 L/yr |
Citrix Administrator
4
salaries
| ₹1.8 L/yr - ₹7.5 L/yr |
TCS
Accenture
Wipro
Cognizant