Filter interviews by
I applied via Campus Placement
Recent phishing attacks in the industry have been on the rise, targeting organizations of all sizes.
Phishing attacks often involve emails that appear to be from legitimate sources, tricking recipients into revealing sensitive information.
Common tactics used in phishing attacks include spoofed email addresses, fake websites, and urgent requests for personal information.
Organizations can protect themselves from phishing ...
Companies incorporate policies to prevent phishing attacks by educating employees, implementing email filters, conducting phishing simulations, and enforcing strong password policies.
Educating employees on how to recognize phishing emails and what to do if they suspect an attack
Implementing email filters to detect and block phishing emails before they reach employees' inboxes
Conducting regular phishing simulations to t...
I am open to working night shifts as I understand their importance in maintaining security and response times.
I have experience working flexible hours in previous roles, which has prepared me for night shifts.
I understand that cybersecurity threats can occur at any time, making night shifts crucial for monitoring.
I am adaptable and can manage my sleep schedule to ensure I am alert and effective during night shifts.
Yes, I can work on weekends to ensure timely response and support for security incidents.
I understand that cybersecurity is a 24/7 responsibility.
In my previous role, I often worked weekends during critical incidents.
I am flexible and can adjust my schedule to meet team needs.
I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.
Phishing attacks are fraudulent attempts to obtain sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity.
Phishing attacks often involve emails that appear to be from legitimate sources, asking recipients to click on a link or provide personal information.
Common types of phishing attacks include spear phishing, whaling, and pharming.
Phishing attacks can also be...
I hold certifications such as CISSP, CEH, and CompTIA Security+.
Certified Information Systems Security Professional (CISSP)
Certified Ethical Hacker (CEH)
CompTIA Security+
Interned at cybersecurity firm, analyzed network traffic, created incident reports
Analyzed network traffic for potential security threats
Assisted in creating incident reports for security incidents
Participated in security team meetings to discuss findings and recommendations
Yes, I can work night shifts as I understand their importance in maintaining security and incident response.
I have experience working in shifts, including nights, during my previous role as a SOC Analyst.
I understand that cyber threats can occur at any time, making night shifts crucial for continuous monitoring.
I am adaptable and can adjust my sleep schedule to ensure I am alert and effective during night hours.
In my l...
I applied via Referral
Top trending discussions
I applied via Naukri.com and was interviewed before Aug 2020. There were 4 interview rounds.
posted on 26 May 2022
I applied via Approached by Company and was interviewed before May 2021. There were 2 interview rounds.
based on 3 interview experiences
Difficulty level
Duration
based on 5 reviews
Rating in categories
Soc Analyst 1
8
salaries
| ₹3.5 L/yr - ₹7 L/yr |
Cloud Security Engineer
3
salaries
| ₹4 L/yr - ₹13 L/yr |
TCS
Accenture
Wipro
Cognizant