Filter interviews by
I applied via Naukri.com and was interviewed before Jun 2021. There were 2 interview rounds.
posted on 22 Feb 2024
Intermediate level of questions
Basic Aptitude Questions
Moderate level of coding questions
I am a highly experienced Cyber Security Analyst with a strong background in network security and incident response.
Over 8 years of experience in the field of cyber security
Specialize in network security and incident response
Certified in CISSP and CEH
Led multiple successful cyber security projects
Strong analytical and problem-solving skills
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
posted on 18 Jan 2022
I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.
I applied via AmbitionBox and was interviewed before Aug 2021. There was 1 interview round.
Arcsight & Splunk are SIEM tools used for log management and security analytics.
Arcsight is a legacy SIEM tool used for log management and security analytics.
Splunk is a modern SIEM tool used for log management, security analytics, and data visualization.
Both tools are used to collect, analyze, and correlate log data from various sources to detect security threats and incidents.
Arcsight has a complex architecture and r...
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.
Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.
It helps organizations understand and defend against common attack patterns.
Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.
I applied via Internshala
Logical thinking, verbal skills
Have to pentest a web app
Basic arrays, strings and dsa
based on 1 review
Rating in categories
Associate Consultant
5.2k
salaries
| ₹3 L/yr - ₹11.7 L/yr |
Consultant
3.8k
salaries
| ₹7 L/yr - ₹27 L/yr |
Senior Consultant
1.9k
salaries
| ₹10.9 L/yr - ₹34 L/yr |
System Engineer
914
salaries
| ₹2 L/yr - ₹6.3 L/yr |
Software Engineer
771
salaries
| ₹2.4 L/yr - ₹10 L/yr |
TCS
Infosys
Wipro
HCLTech