i
Capgemini
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Company Website and was interviewed in Apr 2023. There were 5 interview rounds.
I have faced challenges in managing privileged accounts and securing them from cyber threats.
Managing and securing privileged accounts
Identifying and mitigating cyber threats
Ensuring compliance with security regulations
Educating employees on cybersecurity best practices
The biggest challenge during upgradation & migration is ensuring compatibility and minimizing downtime.
Ensuring compatibility of the new system with existing infrastructure
Minimizing downtime during the transition
Testing the new system thoroughly before deployment
Ensuring data integrity and security during migration
Training employees on the new system
Managing user access and permissions during migration
I was interviewed in Jun 2024.
I am a dedicated Cyber Security Analyst with a strong background in network security and threat detection.
Experienced in conducting security assessments and implementing security measures
Skilled in analyzing security incidents and responding to cyber threats
Proficient in using security tools such as SIEM, IDS/IPS, and endpoint protection
Certified in relevant cybersecurity certifications like CISSP or CEH
Seeking new challenges and opportunities for growth in the field of cyber security.
Desire to work on more advanced projects
Opportunity to learn new technologies and techniques
Seeking a more challenging and dynamic work environment
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.
Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.
It helps organizations understand and defend against common attack patterns.
Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.
I applied via Naukri.com and was interviewed in Oct 2023. There were 3 interview rounds.
I would troubleshoot the issue by checking the logs, verifying the policy rules, and ensuring proper configuration.
Check the logs to identify the specific error or issue
Verify the policy rules to ensure they are correctly configured
Check for any conflicts or overlapping rules that may be causing the failure
Ensure that the policy installation process was completed successfully
Consult with colleagues or documentation for
SIC (Security Intelligence Center) in Check Point is a centralized platform for monitoring and managing security events.
SIC collects and analyzes security data from various sources within the network
It provides real-time visibility into security incidents and alerts
SIC helps in identifying and responding to security threats effectively
It allows for centralized management of security policies and configurations
I applied via Naukri.com and was interviewed in Sep 2023. There were 2 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Jan 2022. There was 1 interview round.
I applied via Approached by Company and was interviewed before Oct 2022. There were 2 interview rounds.
posted on 18 Jan 2022
I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Jun 2021. There were 2 interview rounds.
Some of the top questions asked at the Capgemini Cyberark Security Analyst interview for experienced candidates -
Consultant
55.4k
salaries
| ₹5.1 L/yr - ₹18 L/yr |
Associate Consultant
52.2k
salaries
| ₹2.9 L/yr - ₹11.6 L/yr |
Senior Consultant
46k
salaries
| ₹7.3 L/yr - ₹24 L/yr |
Senior Analyst
20.5k
salaries
| ₹2 L/yr - ₹9 L/yr |
Senior Software Engineer
19.9k
salaries
| ₹3.5 L/yr - ₹12.5 L/yr |
Wipro
Accenture
Cognizant
TCS