Filter interviews by
I applied via Referral and was interviewed in Jun 2021. There were 5 interview rounds.
Post covid-19, cyber-security market will see an increase in demand due to remote work and online transactions.
Remote work and online transactions have increased the risk of cyber-attacks.
Organizations will invest more in cyber-security solutions to protect their data and systems.
Cloud-based security solutions will become more popular.
Customers will prioritize solutions that offer remote management and monitoring capab...
Checkpoint's unique differentiators are advanced threat prevention, unified security management, and cloud security solutions.
Advanced threat prevention: Checkpoint's SandBlast technology provides real-time protection against zero-day and advanced threats.
Unified security management: Checkpoint's Security Management Portal allows for centralized management of security policies across multiple environments.
Cloud securit...
The approach for making a cyber case varies based on the client's size and type.
For MSPs, focus on the benefits of outsourcing security and the cost savings compared to hiring an in-house team.
For large enterprises, emphasize the need for a comprehensive security strategy and the potential financial and reputational damage of a breach.
For government entities, highlight compliance requirements and the importance of prot...
Gartner recommends a zero-trust approach to secure remote workforces. Best practices include multi-factor authentication, VPNs, and endpoint protection.
Gartner recommends a zero-trust approach to security
Implement multi-factor authentication for all remote access
Use VPNs to secure remote connections
Ensure endpoint protection is up-to-date and includes firewalls and anti-virus software
Train employees on secure remote wo...
Yes, I have experience working with compliances like RBI, PCIDSS, GDPR, HIPAA.
I have worked with the Reserve Bank of India (RBI) guidelines to ensure compliance in financial product sales.
I am familiar with the Payment Card Industry Data Security Standard (PCIDSS) and have implemented necessary measures to protect customer data.
I have worked with the General Data Protection Regulation (GDPR) to ensure the privacy and s...
IOT security focuses on securing devices and data in the Internet of Things, while OT security focuses on securing operational technology systems.
IOT security involves securing devices and data in the Internet of Things, which includes sensors, smart devices, and other connected devices.
OT security involves securing operational technology systems, which includes industrial control systems, SCADA systems, and other syst...
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
The task was a Codility type
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
Top trending discussions
I was interviewed in Jan 2025.
Online test was hackerrank was was og avg difficulty
Assignment was straightforward which could be done using trie. Did it in 1/6th throughout time for given queries then mentioned allowed still no reply. Keep on asking engineering manager and hr to which they replied not upto the mark.
I applied via LinkedIn and was interviewed in Aug 2024. There were 2 interview rounds.
Dataweave logic questions
Around 1 hour with 2 coding and few aptitude questions.
Easy problem on java
I applied via LinkedIn and was interviewed in Sep 2020. There was 1 interview round.
I applied via Company Website and was interviewed in Jan 2024. There was 1 interview round.
Some of the top questions asked at the Check Point Software Technologies interview -
based on 2 interviews
Interview experience
based on 39 reviews
Rating in categories
Technical Support Engineer
21
salaries
| ₹0 L/yr - ₹0 L/yr |
TAC Engineer
19
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Engineer
10
salaries
| ₹0 L/yr - ₹0 L/yr |
Order Management Coordinator
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Security Engineer
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Palo Alto Networks
Fortinet
Gen
McAfee