i
Cognizant
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Naukri.com and was interviewed in Oct 2023. There were 3 interview rounds.
I would troubleshoot the issue by checking the logs, verifying the policy rules, and ensuring proper configuration.
Check the logs to identify the specific error or issue
Verify the policy rules to ensure they are correctly configured
Check for any conflicts or overlapping rules that may be causing the failure
Ensure that the policy installation process was completed successfully
Consult with colleagues or documentation for
SIC (Security Intelligence Center) in Check Point is a centralized platform for monitoring and managing security events.
SIC collects and analyzes security data from various sources within the network
It provides real-time visibility into security incidents and alerts
SIC helps in identifying and responding to security threats effectively
It allows for centralized management of security policies and configurations
I applied via Referral and was interviewed in Nov 2020. There were 3 interview rounds.
Kill Chain is a cybersecurity attack model while MITRE Framework is a knowledge base for cyber threats.
Kill Chain is a step-by-step model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.
MITRE Framework is a comprehensive list of known tactics, techniques, and procedures used by cyber adversaries.
Kill Chain helps organizations understand and defend against cyber attacks, whil...
Cyber Security Analysts protect computer systems and networks from cyber threats by monitoring, detecting, and responding to security incidents.
Monitor computer networks for security breaches
Investigate security incidents and provide incident response
Implement security measures to protect against cyber attacks
Conduct security assessments and audits to identify vulnerabilities
Stay up-to-date on the latest cyber threats
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.
Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.
It helps organizations understand and defend against common attack patterns.
Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.
posted on 2 Jan 2024
IP blocking is a common security measure to prevent unauthorized access to devices and networks.
Implement IP blocking on login devices to prevent unauthorized access from specific IPs.
Regularly check for malicious IPs in devices and block them to prevent security breaches.
Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.
Consider implementing automated scripts or tools to s...
Yes, email gateways can block email spam if configured properly.
Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.
Spam emails are typically identified based on keywords, sender reputation, and other factors.
Advanced email gateways may also use machine learning algorithms to detect and block spam.
Regular updates and monitoring of email gateway s...
F5 devices can be used for security white listing to control access to specific applications or services.
F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.
This helps prevent unauthorized access and reduces the attack surface for potential threats.
For example, an organization can use F5 devices to white list specific IP addresses for remote
When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.
Ensure compatibility of new devices with existing infrastructure
Backup configurations and data before starting the upgrade
Test the new devices in a controlled environment before deploying them
Consider any security implications of the upgrade
Train staff on how to use the new devices effectively
posted on 18 Jan 2022
I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.
I applied via AmbitionBox and was interviewed before Aug 2021. There was 1 interview round.
Arcsight & Splunk are SIEM tools used for log management and security analytics.
Arcsight is a legacy SIEM tool used for log management and security analytics.
Splunk is a modern SIEM tool used for log management, security analytics, and data visualization.
Both tools are used to collect, analyze, and correlate log data from various sources to detect security threats and incidents.
Arcsight has a complex architecture and r...
Interview experience
based on 4 reviews
Rating in categories
Associate
72.3k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
Programmer Analyst
55.5k
salaries
| ₹2.4 L/yr - ₹9.6 L/yr |
Senior Associate
48.4k
salaries
| ₹8.9 L/yr - ₹27.3 L/yr |
Senior Processing Executive
28.8k
salaries
| ₹1.8 L/yr - ₹9.3 L/yr |
Technical Lead
17.6k
salaries
| ₹5.9 L/yr - ₹24.8 L/yr |
TCS
Infosys
Wipro
Accenture