Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2022. There were 2 interview rounds.
I have 3 years of experience in cyber security.
Experience in threat hunting and incident response
Knowledge of SIEM tools such as Splunk and QRadar
Familiarity with network security protocols and technologies
Experience in vulnerability assessments and penetration testing
Certifications such as CompTIA Security+ and CISSP
SIEM stands for Security Information and Event Management, while SOAR stands for Security Orchestration, Automation and Response.
SIEM is a software solution that collects and analyzes security event data from different sources to identify potential security threats.
SOAR is a platform that automates and orchestrates security operations tasks, enabling faster and more efficient incident response.
SIEM and SOAR are often u...
Endpoint Security is my primary skill, focusing on protecting and securing endpoints from cyber threats.
Expertise in implementing and managing endpoint security solutions such as antivirus, firewalls, and intrusion detection systems
Proficient in analyzing and responding to security incidents on endpoints
Skilled in conducting vulnerability assessments and patch management for endpoints
Experience in endpoint forensics an...
Top trending discussions
I applied via Campus Placement and was interviewed in Dec 2020. There were 3 interview rounds.
I applied via Company Website and was interviewed before Jun 2021. There were 4 interview rounds.
I applied via Naukri.com and was interviewed before Jun 2020. There was 1 interview round.
To create Changes only extra, identify existing changes and add new ones without modifying the existing ones.
Identify existing changes
Add new changes without modifying existing ones
Ensure new changes do not conflict with existing ones
Document all changes made
Secured View and Table are two different ways of presenting data.
Secured View is a restricted view of data that only shows certain information to certain users.
Table is a way of presenting data in a structured format with rows and columns.
Secured View is used to protect sensitive information from unauthorized access.
Table is used to organize and display data in a clear and concise manner.
Secured View can be customized ...
Balance groups can be created by analyzing usage patterns and grouping similar items together.
Analyze usage patterns to identify similar items
Group similar items together to create balance groups
Consider factors such as frequency of use and importance of items in the group
Examples include grouping similar products in a store or grouping tasks by priority in a to-do list
Extract is a process of retrieving data from a source system, while BIP is a tool used for creating and managing reports.
Extract involves pulling data from a source system and storing it in a separate location for analysis or reporting.
BIP is a tool used for creating and managing reports, which can be based on data extracted from a source system.
Extract is typically a one-time process, while BIP can be used to generate...
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
I appeared for an interview before Mar 2021.
There will be one round of coding
I applied via Naukri.com and was interviewed before Jun 2020. There were 3 interview rounds.
Handle a P1 situation by prioritizing the issue, communicating effectively, and collaborating with team members.
Prioritize the issue based on impact and urgency
Communicate with stakeholders about the situation and potential solutions
Collaborate with team members to address the issue efficiently
It would be challenging to work all rotational shifts without shift allowance.
Working all rotational shifts without shift allowance can lead to burnout and decreased job satisfaction.
It may be difficult to maintain work-life balance without shift allowance.
Financial compensation for working rotational shifts is a common practice in many industries.
Without shift allowance, employees may feel undervalued and demotivated.
...
Technical Executive
7
salaries
| ₹1.9 L/yr - ₹5.2 L/yr |
Cyber Security Engineer
7
salaries
| ₹1.9 L/yr - ₹4.5 L/yr |
Security Engineer
5
salaries
| ₹3 L/yr - ₹4.2 L/yr |
SOC Analyst
5
salaries
| ₹2.6 L/yr - ₹3.6 L/yr |
Citrix Administrator
4
salaries
| ₹1.8 L/yr - ₹7.5 L/yr |
TCS
Accenture
Wipro
Cognizant