i
BNY
Filter interviews by
posted on 29 Jul 2022
I applied via Naukri.com and was interviewed in Jul 2022. There were 2 interview rounds.
Top trending discussions
I applied via Company Website and was interviewed in Aug 2023. There was 1 interview round.
I follow the Zero Trust security model, which assumes all networks are untrusted and verifies every user and device attempting to connect.
Implementing strict access controls based on user identity and device health
Utilizing multi-factor authentication for added security
Regularly monitoring and analyzing network traffic for anomalies
Segmenting networks to limit the impact of a potential breach
I follow APT groups such as APT28, APT29, and APT33 for threat intelligence and analysis.
APT28, also known as Fancy Bear, is associated with Russian military intelligence.
APT29, also known as Cozy Bear, is another Russian cyber espionage group.
APT33 is linked to Iranian cyber espionage activities.
Tracking APT groups helps in understanding their tactics, techniques, and procedures (TTPs).
I applied via Recruitment Consulltant and was interviewed before Oct 2023. There were 3 interview rounds.
Group discuaaions for real time scenarioa
UBS is a global financial services company that operates in wealth management, investment banking, asset management, and more.
UBS is a Swiss multinational investment bank and financial services company.
It offers services in wealth management, investment banking, asset management, and more.
UBS operates globally with offices in major financial centers around the world.
The company provides a range of financial products an...
posted on 25 Sep 2024
I applied via Company Website and was interviewed before Sep 2023. There were 2 interview rounds.
RBAC stands for Role-Based Access Control, a method of restricting network access based on roles assigned to users.
RBAC assigns permissions to roles, and roles to users
It simplifies access management by grouping users with similar access needs
RBAC helps enforce the principle of least privilege, granting only necessary permissions
Example: Admin role has full access, while User role has limited access
Cybersecurity is crucial in application security to protect sensitive data and prevent cyber attacks.
Cybersecurity helps in identifying and mitigating vulnerabilities in applications.
It ensures the confidentiality, integrity, and availability of data within applications.
Implementing secure coding practices and regular security assessments are essential in application security.
Examples include using encryption to protec...
posted on 4 Oct 2024
I applied via Approached by Company and was interviewed before Oct 2023. There were 2 interview rounds.
posted on 1 Jun 2024
I applied via Recruitment Consulltant and was interviewed before Jun 2023. There were 2 interview rounds.
I can add value by identifying and mitigating security risks, implementing security measures, and ensuring compliance with regulations.
Identifying security risks and vulnerabilities in systems and networks
Implementing security measures such as firewalls, encryption, and access controls
Ensuring compliance with regulations and industry standards such as GDPR, HIPAA, and PCI DSS
Monitoring and responding to security incide...
posted on 20 Mar 2024
I applied via Company Website and was interviewed before Mar 2023. There were 2 interview rounds.
based on 5 reviews
Rating in categories
Analyst
1.9k
salaries
| ₹2 L/yr - ₹9.5 L/yr |
Senior Analyst
1.7k
salaries
| ₹3.8 L/yr - ₹15 L/yr |
Senior Associate
1.2k
salaries
| ₹11.7 L/yr - ₹25 L/yr |
Intermediate Representative
1.1k
salaries
| ₹2.9 L/yr - ₹7.2 L/yr |
Vice President
968
salaries
| ₹15.2 L/yr - ₹52 L/yr |
State Street Corporation
Northern Trust
HSBC Group
JPMorgan Chase & Co.