Filter interviews by
Top trending discussions
I appeared for an interview before Jan 2016.
I am a cyber security professional with expertise in network security and threat analysis.
I have experience in implementing and managing firewalls, intrusion detection systems, and other security measures.
I am skilled in conducting vulnerability assessments and penetration testing to identify potential security risks.
I stay up-to-date with the latest security trends and technologies to ensure the highest level of prote...
Yes, I am open to relocation for the right opportunity.
I am open to relocation for career growth and new experiences.
I have relocated in the past for job opportunities and have found it to be a positive experience.
I am willing to consider relocation if it aligns with my long-term goals and aspirations.
Cyber Security is the practice of protecting systems, networks, and data from cyber attacks.
Cyber Security involves protecting computers, servers, mobile devices, networks, and data from malicious attacks.
It includes implementing security measures such as firewalls, antivirus software, encryption, and intrusion detection systems.
Cyber Security professionals work to prevent, detect, and respond to cyber threats to ensur...
I am passionate about protecting sensitive information and preventing cyber attacks.
Passion for technology and problem-solving
Interest in staying ahead of cyber threats
Desire to make a positive impact by securing data and systems
I can work on domains such as network security, application security, cloud security, and incident response.
Network security - securing network infrastructure, firewalls, VPNs, etc.
Application security - securing web and mobile applications, code review, etc.
Cloud security - securing cloud infrastructure, data protection, etc.
Incident response - responding to security incidents, investigating and mitigating threats, et
I implemented multiple authentication measures in my projects to ensure secure access.
Implemented password-based authentication with strong password policies
Utilized two-factor authentication for an added layer of security
Implemented biometric authentication using fingerprint or facial recognition
Used multi-factor authentication to combine multiple authentication methods
Implemented single sign-on (SSO) for seamless and...
Firewalls and application gateways are both security measures used to protect networks, but they differ in their approach.
Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Application gateways, also known as application-level gateways or application layer firewalls, operate at the application layer of the OSI model and can inspect...
HTTPS stands for Hypertext Transfer Protocol Secure. It is a secure version of HTTP that encrypts data sent between a website and a user's browser.
HTTPS uses SSL/TLS encryption to protect data
It ensures that the website being accessed is authentic
It prevents eavesdropping and tampering of data
It is indicated by a padlock icon in the browser's address bar
Examples of websites that use HTTPS include banking sites, e-comme
I applied via Campus Placement and was interviewed in Jul 2024. There were 3 interview rounds.
Aptittude test consist of basic quantitative and logical questions
Passion for protecting data and systems from cyber threats.
Fascination with technology and computers
Desire to protect individuals and organizations from cyber attacks
Opportunity for continuous learning and growth in a rapidly evolving field
I choose this company for its strong reputation, innovative cybersecurity solutions, and commitment to employee growth.
Strong reputation in the cybersecurity industry
Innovative cybersecurity solutions that stay ahead of emerging threats
Commitment to employee growth and development
Positive company culture and work environment
I applied via Recruitment Consultant and was interviewed in Oct 2020. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before May 2021. There were 3 interview rounds.
Internal case of a biscuit manufacturing company. Details about company background, sales, figures are given and based on those 3 questions were asked.
Part 2 of the same case study was asked where the company should go for IPO or expansion in local market. based on the facts, decision and justification had to be given
I am a highly experienced consultant with a strong background in problem-solving and strategic planning.
Over 10 years of experience in consulting for various industries
Expertise in analyzing complex business challenges and providing effective solutions
Proven track record of delivering successful projects on time and within budget
Strong communication and interpersonal skills, able to build rapport with clients
Ability to...
I applied via Approached by Company and was interviewed before Sep 2021. There were 3 interview rounds.
I applied via Referral and was interviewed before Jul 2021. There was 1 interview round.
I applied via LinkedIn and was interviewed in Apr 2021. There were 5 interview rounds.
based on 1 review
Rating in categories
Intern
5
salaries
| ₹1 L/yr - ₹6 L/yr |
Security Analyst
5
salaries
| ₹1 L/yr - ₹3.6 L/yr |
Internship Trainee
4
salaries
| ₹1 L/yr - ₹5 L/yr |
Cyber Security Analyst
3
salaries
| ₹1 L/yr - ₹1.8 L/yr |
Cyber Security Intern
3
salaries
| ₹1 L/yr - ₹2.9 L/yr |
TCS
Accenture
Wipro
Cognizant