i
Deutsche Telekom Digital Labs
Filter interviews by
Clear (1)
I was interviewed in Aug 2024.
I have over 5 years of experience in cybersecurity, conducting risk assessments, implementing security measures, and responding to incidents.
Conducted risk assessments to identify vulnerabilities and recommend security measures
Implemented security measures such as firewalls, intrusion detection systems, and encryption protocols
Responded to security incidents by investigating, containing, and mitigating the impact
Collab...
Yes, I have experience in cloud security with a focus on securing data and applications in cloud environments.
Implemented security measures to protect data stored in cloud services
Configured and monitored security controls in cloud platforms like AWS and Azure
Performed regular security assessments and audits to identify vulnerabilities
Developed incident response plans for cloud security breaches
Stayed updated on indust...
I have extensive experience in CyberArk and EntraId, including implementation, configuration, and troubleshooting.
Implemented and configured CyberArk Privileged Access Security solution to manage and secure privileged accounts
Performed regular maintenance and troubleshooting of CyberArk components such as Vault, CPM, and PSM
Integrated CyberArk with EntraId for seamless access management and authentication
Provided train...
Yes, I am comfortable and eager to skill up and learn AWS security.
I have experience in cloud security and am familiar with AWS services.
I am proactive in seeking out training and certifications to enhance my skills.
I am excited about the opportunity to learn and grow in the field of AWS security.
Top trending discussions
posted on 22 Jul 2024
posted on 16 Jul 2024
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Can be hardware-based or software-based
Filters traffic based on IP addresses, ports, protocols, and other criteria
Helps prevent unauthorized access and cyber attacks
Examples include Cisco ASA, Pal
Some trending security technologies include zero trust security, cloud security, and AI-driven security solutions.
Zero trust security: Focuses on verifying identity and enforcing least privilege access controls.
Cloud security: Addresses security concerns related to cloud computing and storage.
AI-driven security solutions: Utilize artificial intelligence and machine learning to detect and respond to security threats.
Blo...
I applied via Job Portal and was interviewed in May 2024. There were 2 interview rounds.
Implemented a comprehensive security incident response framework to effectively detect, respond to, and recover from security incidents.
Developed incident response policies and procedures to outline roles, responsibilities, and escalation paths.
Established communication protocols for notifying stakeholders and coordinating response efforts.
Conducted regular tabletop exercises and simulations to test the effectiveness o...
I handle phishing incidents by promptly identifying and blocking malicious emails, educating users on how to recognize phishing attempts, and implementing security measures.
Promptly identify and block malicious emails
Educate users on how to recognize phishing attempts
Implement security measures such as email filtering and multi-factor authentication
Log4j vulnerability is a critical security flaw in the Apache Log4j logging library that allows remote code execution.
Log4j vulnerability (CVE-2021-44228) allows attackers to execute arbitrary code remotely.
The vulnerability affects versions 2.0 to 2.14.1 of Apache Log4j.
Exploiting the vulnerability can lead to serious security breaches and data exfiltration.
Organizations need to patch affected systems immediately and
I applied via Job Portal and was interviewed in May 2024. There was 1 interview round.
I have held roles such as Security Analyst, Incident Responder, and Security Engineer.
Security Analyst: Conducted security assessments and implemented security measures.
Incident Responder: Responded to security incidents and conducted forensic investigations.
Security Engineer: Designed and implemented security solutions to protect systems and data.
I applied via Referral and was interviewed before Apr 2023. There was 1 interview round.
Main event IDs to monitor as an SOC analyst
Event ID 4624 - Successful account logon
Event ID 4625 - Failed account logon
Event ID 4768 - Kerberos authentication ticket request
Event ID 4769 - Kerberos service ticket request
Event ID 5140 - Network share access
Event ID 5156 - Firewall rule added
Event ID 7035 - Service control manager event
Event ID 7045 - Service installation
Event ID 800 - Windows update installation
I applied via Approached by Company and was interviewed in Jan 2022. There were 3 interview rounds.
Precompilation unit is a compiled code that can be reused by multiple source files.
Precompilation unit is created by the compiler from the source code.
It contains the compiled code of header files and other dependencies.
It can be reused by multiple source files, reducing compilation time.
It is also known as precompiled header or PCH.
Example: stdafx.h in Visual Studio is a precompiled header file.
posted on 15 Feb 2016
The first 50 prime numbers are...
Start with 2, the first prime number
Check each odd number greater than 2
Use trial division to check if a number is prime
Stop when you have found 50 prime numbers
Sorting a file within a range
Use a sorting algorithm like quicksort or mergesort
Read the file and store the data in an array or list
Sort the array or list within the given range
Write the sorted data back to the file
I am a passionate software engineer with experience in developing web applications using various technologies.
Experienced in developing web applications using HTML, CSS, JavaScript, and frameworks like React and Angular
Proficient in backend development with Node.js, Express, and MongoDB
Familiar with version control systems like Git and project management tools like Jira
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Software Engineer
225
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
111
salaries
| ₹0 L/yr - ₹0 L/yr |
Devops Engineer
54
salaries
| ₹0 L/yr - ₹0 L/yr |
Sdet Automation Test Engineer
44
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
35
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Wipro
Infosys
HCLTech