Filter interviews by
I have 5 years of experience in conducting vulnerability assessments and penetration testing for various clients.
Conducted vulnerability assessments on web applications, networks, and mobile applications
Performed penetration testing to identify security weaknesses and recommend solutions
Utilized tools such as Burp Suite, Metasploit, and Nmap for testing purposes
Worked with clients to understand their security requireme...
I faced a vulnerability in a web application due to improper input validation.
Discovered SQL injection vulnerability during penetration testing.
Identified cross-site scripting (XSS) vulnerability in a login form.
Found insecure direct object reference vulnerability allowing access to unauthorized data.
Top trending discussions
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Vapt Engineers are responsible for identifying vulnerabilities in computer systems and networks to prevent cyber attacks.
Conduct vulnerability assessments and penetration testing on systems and networks
Analyze and report on security vulnerabilities found
Recommend and implement security measures to protect against cyber attacks
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
I applied via Approached by Company and was interviewed in Jul 2023. There were 3 interview rounds.
SAST stands for Static Application Security Testing and DAST stands for Dynamic Application Security Testing.
SAST involves analyzing the application's source code or binary code for security vulnerabilities without executing the code.
DAST involves testing the application while it is running to identify security vulnerabilities by sending malicious input.
SAST is typically performed earlier in the development cycle while...
Union-based SQL injection is a type of attack that allows an attacker to extract information from a database by using the UNION SQL operator.
Union-based SQL injection involves injecting a malicious SQL query that uses the UNION operator to combine the results of the original query with the attacker's query.
The attacker can use the UNION operator to retrieve data from other tables in the database, potentially accessing ...
IDOR, DOM XSS, and Nessus are common security vulnerabilities and tools used in penetration testing.
IDOR stands for Insecure Direct Object Reference, where an attacker can access unauthorized data by manipulating object references.
DOM XSS (Cross-Site Scripting) is a type of XSS attack that occurs in the Document Object Model.
Nessus is a popular vulnerability scanner used in penetration testing to identify security vuln
I applied via Naukri.com and was interviewed in Jan 2023. There were 2 interview rounds.
CAN is a protocol used for communication between electronic devices in vehicles.
CAN stands for Controller Area Network.
It is a serial communication protocol that allows multiple electronic control units (ECUs) to communicate with each other.
CAN uses a two-wire bus system, consisting of a CAN High (CANH) and a CAN Low (CANL) wire.
It employs a message-based communication scheme, where each message is identified by a uniq...
CAN V and CAN P are two types of messages used in Controller Area Network (CAN) communication protocol.
CAN V stands for CAN Voltage and is used for transmitting data at a higher voltage level.
CAN P stands for CAN Protocol and is used for transmitting data at a lower voltage level.
CAN V is used for high-speed communication, while CAN P is used for low-speed communication.
CAN V is used for critical data transmission, whi...
UDS stands for Unified Diagnostic Services, a protocol used in automotive electronics for communication between ECUs.
UDS is used for diagnostic communication between ECUs in vehicles
It is based on the ISO 14229 standard
UDS allows for diagnostic services such as reading and clearing fault codes, accessing sensor data, and performing tests
It uses a request-response mechanism, with the diagnostic tool sending a request an...
I applied via Naukri.com and was interviewed before Oct 2023. There was 1 interview round.
I am a dedicated and experienced banker with a strong background in finance and customer service.
Over 5 years of experience in the banking industry
Proficient in financial analysis and risk management
Excellent communication and interpersonal skills
Strong track record of building and maintaining client relationships
My hobby is photography, where I love capturing moments and telling stories through images.
I enjoy exploring different locations to find unique shots
I like experimenting with different lighting techniques
I often participate in photography contests to challenge myself
Some of my favorite subjects to photograph are landscapes and portraits
I applied via Naukri.com and was interviewed in Jan 2022. There were 2 interview rounds.
CSV stands for Computer System Validation. Automation testing is the use of software to execute tests.
CSV is a process of ensuring that a computer-based system meets its intended requirements and is compliant with regulatory standards.
Automation testing involves using software tools to run tests automatically, reducing the need for manual testing.
CSV and automation testing are often used together to ensure that compute...
There are several categories of software, including system software, application software, programming software, and malware.
System software
Application software
Programming software
Malware
SDLC refers to the software development life cycle. There are various types of hardware such as input, output, storage, and processing devices.
SDLC is a process followed by software development teams to design, develop, and test software.
Hardware can be classified into four types: input devices (e.g. keyboard, mouse), output devices (e.g. monitor, printer), storage devices (e.g. hard disk, USB drive), and processing de...
Testing tools are software applications used to automate and manage the testing process.
Automated testing tools like Selenium, Appium, and TestComplete
Performance testing tools like JMeter and LoadRunner
Bug tracking tools like JIRA and Bugzilla
Code coverage tools like JaCoCo and Cobertura
Continuous integration tools like Jenkins and Travis CI
posted on 16 Mar 2022
I applied via Walk-in and was interviewed in Sep 2021. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Vapt Engineers are responsible for identifying vulnerabilities in computer systems and networks to prevent cyber attacks.
Conduct vulnerability assessments and penetration testing on systems and networks
Analyze and report on security vulnerabilities found
Recommend and implement security measures to protect against cyber attacks
Interview experience
Information Security Consultant
28
salaries
| ₹2.8 L/yr - ₹10.1 L/yr |
Associate Consultant
23
salaries
| ₹2.5 L/yr - ₹6 L/yr |
Associate Information Security Consultant
11
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Consultant
6
salaries
| ₹5.5 L/yr - ₹8.5 L/yr |
Information Security Analyst
6
salaries
| ₹2.2 L/yr - ₹5.5 L/yr |
TCS
Infosys
Wipro
HCLTech