i
Capgemini
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Job Portal and was interviewed in May 2024. There were 2 interview rounds.
Implemented a comprehensive security incident response framework to effectively detect, respond to, and recover from security incidents.
Developed incident response policies and procedures to outline roles, responsibilities, and escalation paths.
Established communication protocols for notifying stakeholders and coordinating response efforts.
Conducted regular tabletop exercises and simulations to test the effectiveness o...
I handle phishing incidents by promptly identifying and blocking malicious emails, educating users on how to recognize phishing attempts, and implementing security measures.
Promptly identify and block malicious emails
Educate users on how to recognize phishing attempts
Implement security measures such as email filtering and multi-factor authentication
Log4j vulnerability is a critical security flaw in the Apache Log4j logging library that allows remote code execution.
Log4j vulnerability (CVE-2021-44228) allows attackers to execute arbitrary code remotely.
The vulnerability affects versions 2.0 to 2.14.1 of Apache Log4j.
Exploiting the vulnerability can lead to serious security breaches and data exfiltration.
Organizations need to patch affected systems immediately and
I applied via Job Portal and was interviewed in May 2024. There was 1 interview round.
I have held roles such as Security Analyst, Incident Responder, and Security Engineer.
Security Analyst: Conducted security assessments and implemented security measures.
Incident Responder: Responded to security incidents and conducted forensic investigations.
Security Engineer: Designed and implemented security solutions to protect systems and data.
posted on 16 Jul 2024
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Can be hardware-based or software-based
Filters traffic based on IP addresses, ports, protocols, and other criteria
Helps prevent unauthorized access and cyber attacks
Examples include Cisco ASA, Pal
Some trending security technologies include zero trust security, cloud security, and AI-driven security solutions.
Zero trust security: Focuses on verifying identity and enforcing least privilege access controls.
Cloud security: Addresses security concerns related to cloud computing and storage.
AI-driven security solutions: Utilize artificial intelligence and machine learning to detect and respond to security threats.
Blo...
I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Dec 2022. There were 3 interview rounds.
Ransomware attacks encrypt files and demand payment for decryption.
Encrypts files and demands payment for decryption
May use social engineering tactics to trick victims into downloading malware
May spread through phishing emails, malicious websites, or infected software
Examples include WannaCry, Petya, and Locky
The port number of SMB is 445.
SMB stands for Server Message Block.
SMB is a protocol used for file sharing and printer sharing.
Port 445 is used for direct TCP/IP connection without NetBIOS.
Port 139 is also used for SMB over NetBIOS.
SMB relay attack is a type of attack where an attacker intercepts and relays SMB traffic to gain unauthorized access to a target system.
The attacker intercepts SMB traffic between two systems and relays it to gain access to the target system.
The attack can be carried out using tools like Responder or Metasploit.
The attack can be prevented by disabling SMBv1, using SMB signing, and implementing network segmentation.
An e...
I applied via Recruitment Consultant and was interviewed in Sep 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Feb 2021. There were 3 interview rounds.
posted on 14 Apr 2023
I applied via LinkedIn and was interviewed in Oct 2022. There were 2 interview rounds.
EDR stands for Endpoint Detection and Response, a security solution that monitors and responds to endpoint threats.
EDR solutions provide real-time visibility into endpoint activity and behavior.
They use advanced analytics and machine learning to detect and respond to threats.
EDR solutions can also provide forensic analysis to investigate incidents and identify root causes.
Examples of EDR solutions include Carbon Black,...
EDR stands for Endpoint Detection and Response. It is a security solution that monitors and responds to endpoint threats.
EDR solutions use agents installed on endpoints to collect data and send it to a central server for analysis.
They use behavioral analysis and machine learning to detect and respond to threats in real-time.
EDR solutions can also provide forensic data to investigate incidents and improve security postu...
based on 7 reviews
Rating in categories
Consultant
55.2k
salaries
| ₹5.2 L/yr - ₹18 L/yr |
Associate Consultant
52k
salaries
| ₹2.9 L/yr - ₹11.8 L/yr |
Senior Consultant
46k
salaries
| ₹7.5 L/yr - ₹25 L/yr |
Senior Analyst
20.6k
salaries
| ₹2 L/yr - ₹9.2 L/yr |
Senior Software Engineer
19.9k
salaries
| ₹3.5 L/yr - ₹12.5 L/yr |
Wipro
Accenture
Cognizant
TCS