Filter interviews by
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
The task was a Codility type
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
I applied via Referral and was interviewed in Jun 2021. There were 5 interview rounds.
Post covid-19, cyber-security market will see an increase in demand due to remote work and online transactions.
Remote work and online transactions have increased the risk of cyber-attacks.
Organizations will invest more in cyber-security solutions to protect their data and systems.
Cloud-based security solutions will become more popular.
Customers will prioritize solutions that offer remote management and monitoring capab...
Checkpoint's unique differentiators are advanced threat prevention, unified security management, and cloud security solutions.
Advanced threat prevention: Checkpoint's SandBlast technology provides real-time protection against zero-day and advanced threats.
Unified security management: Checkpoint's Security Management Portal allows for centralized management of security policies across multiple environments.
Cloud securit...
The approach for making a cyber case varies based on the client's size and type.
For MSPs, focus on the benefits of outsourcing security and the cost savings compared to hiring an in-house team.
For large enterprises, emphasize the need for a comprehensive security strategy and the potential financial and reputational damage of a breach.
For government entities, highlight compliance requirements and the importance of prot...
Gartner recommends a zero-trust approach to secure remote workforces. Best practices include multi-factor authentication, VPNs, and endpoint protection.
Gartner recommends a zero-trust approach to security
Implement multi-factor authentication for all remote access
Use VPNs to secure remote connections
Ensure endpoint protection is up-to-date and includes firewalls and anti-virus software
Train employees on secure remote wo...
Yes, I have experience working with compliances like RBI, PCIDSS, GDPR, HIPAA.
I have worked with the Reserve Bank of India (RBI) guidelines to ensure compliance in financial product sales.
I am familiar with the Payment Card Industry Data Security Standard (PCIDSS) and have implemented necessary measures to protect customer data.
I have worked with the General Data Protection Regulation (GDPR) to ensure the privacy and s...
IOT security focuses on securing devices and data in the Internet of Things, while OT security focuses on securing operational technology systems.
IOT security involves securing devices and data in the Internet of Things, which includes sensors, smart devices, and other connected devices.
OT security involves securing operational technology systems, which includes industrial control systems, SCADA systems, and other syst...
Top trending discussions
posted on 3 Mar 2024
I applied via Approached by Company
I have been working on a technology stack that includes Java, Spring Boot, Angular, and MySQL.
Java programming language for backend development
Spring Boot framework for building and deploying Java applications
Angular framework for frontend development
MySQL database for data storage and retrieval
The .Net framework is a powerful tool for developing microservices using Web APIs.
The .Net framework provides a set of libraries and tools for building scalable and reliable microservices.
Web APIs in .Net allow for easy communication between different services and clients.
Features like dependency injection and middleware in .Net make it easier to develop and maintain microservices.
Examples of popular frameworks for bui...
To troubleshoot a network bottleneck in a web API application hosted in a public cloud like Azure or AWS, one can analyze network traffic, monitor server performance, and optimize resource allocation.
Use network monitoring tools to analyze traffic patterns and identify potential bottlenecks.
Monitor server performance metrics such as CPU usage, memory usage, and disk I/O to pinpoint any resource constraints.
Optimize res...
Azure Service Fabric clusters are used to deploy and manage microservices-based applications on Microsoft Azure.
Azure Service Fabric clusters provide a platform for deploying and managing scalable and reliable microservices.
They offer automatic scaling, rolling upgrades, and health monitoring for microservices.
Service Fabric clusters can be used to deploy stateless or stateful microservices.
They support multiple progra...
posted on 16 Mar 2024
I applied via Company Website and was interviewed in Feb 2024. There were 2 interview rounds.
posted on 1 Aug 2023
I applied via Naukri.com and was interviewed in Jul 2023. There were 4 interview rounds.
Sometime it is taken
I was interviewed in Mar 2022.
Round duration - 60 Minutes
Round difficulty - Easy
LLD Round (but with machine coding sort of expectations in whatever that can be done in 60 mins)
Design a snake game
Use a 2D array to represent the game board
Keep track of the snake's position and direction
Handle user input to change the snake's direction
Update the snake's position and check for collisions with walls or itself
Add food to the board and handle eating it to grow the snake
Keep track of the score and display it to the player
Round duration - 60 Minutes
Round difficulty - Easy
DSA
Given an array of N
non-empty words and an integer K
, return the K
most frequent words sorted by their frequency from highest to lowest.
N = 6, K...
Given an array of words and an integer k, return the k most frequent words sorted by frequency.
Use a hashmap to count the frequency of each word
Use a priority queue to keep track of the k most frequent words
Sort the priority queue based on frequency and lexicographical order
Round duration - 60 Minutes
Round difficulty - Easy
Round duration - 60 Minutes
Round difficulty - Easy
Managerial Round (Some questions on projects and general situation based questions)
Round duration - 45 minutes
Round difficulty - Easy
Values round
Tip 1 : Practised topic wise leetcode questions from basics
Tip 2 : Watched so many system design mock interviews
Tip 3 : Did mock interviews with friends for DSA and System design rounds.
Tip 1 : Single page resume.
Tip 2 : Get it proof read by friends and professionals and take feedback.
posted on 15 Jun 2021
I applied via Referral and was interviewed in Mar 2022. There were 2 interview rounds.
I was interviewed in Jan 2021.
Round duration - 90 minutes
Round difficulty - Medium
It was an online coding round which had 2 questions.
You are given a binary matrix with 'M' rows and 'N' columns, initially consisting of all 0s. You will receive 'Q' queries, which can be of four types:
Query 1: 1 R inde...
A simple idea is to traverse the given row or column. If you come across a query that is of type 1 then swap 0 with 1 and vice-versa and for the query of type 2 initialize a variable ‘COUNT’ and increment count when you encounter ‘0’ and return ‘COUNT’.
The steps are as follows:
Given a 2-D matrix mat
with 'N' rows and 'M' columns, where each element at position (i, j) is mat[i][j]
, determine the length of the longest increasing...
Algorithm
Round duration - 45 minutes
Round difficulty - Easy
The next round was a debugging round. There were approximately 20 people in this round and all of us had to give this round simultaneously. 9 people were shortlisted from this round.
Round duration - 60 minutes
Round difficulty - Medium
The first F2F interview was a DSA round. Initial 5 mins went in the introduction. Then I had to log in to the code pair link on hackerrank and the interviewer gave me a question. So the question had sort of like a common premise on which follow-up questions were asked.
A thief is planning to steal from several houses along a street. Each house has a certain amount of money stashed. However, the thief cannot loot two adjacent houses. Determi...
Suppose that the robber is at the ith house. The robber has two options:
You will follow the same for the rest of the houses. Thus, if maxLoot(i) is the maximum loot possible when we’re at the ith house, t...
Round duration - 60 minutes
Round difficulty - Easy
Tip 1 : Make sure that your aim is not solving as many questions as possible but rather solving questions in a manner that clears your concepts and maximizes your probabillity of being able to solve the next question given to you on that particular topic.
Tip 2 : Make sure you communicate effectively with the interviewer and walk him/her through your approach and solutions.
Tip 1 : Do not cram in stuff. A 1 page resume is more than enough for an entry level position.
Tip 2 : Try and have a neat layout and highlight important points and achievements on your resume.
Interview experience
based on 39 reviews
Rating in categories
TAC Engineer
23
salaries
| ₹5.5 L/yr - ₹13.1 L/yr |
Technical Support Engineer
21
salaries
| ₹5.5 L/yr - ₹19.1 L/yr |
Security Engineer
10
salaries
| ₹15 L/yr - ₹32 L/yr |
Network Security Engineer
9
salaries
| ₹6.3 L/yr - ₹21.5 L/yr |
Associate Security Engineer
7
salaries
| ₹10 L/yr - ₹14.9 L/yr |
Palo Alto Networks
Fortinet
NortonLifeLock's
McAfee