Filter interviews by
I applied via Referral
I applied via Naukri.com and was interviewed before Apr 2021. There were 3 interview rounds.
I have extensive domain experience in the field of finance.
I have worked in the finance industry for over 10 years.
I have experience in financial analysis, budgeting, and forecasting.
I have managed teams responsible for financial reporting and compliance.
I have worked with various financial software and tools such as QuickBooks and Excel.
I have also kept up-to-date with industry trends and regulations through attending
Top trending discussions
I applied via Approached by Company and was interviewed in Sep 2024. There were 5 interview rounds.
Print 10 to 1 without using any loops in C
print the number by toggling a bit of a given position
virtual functions -> what would be the output of the code and vtable concept explain in detail
information security standards, protocols, regulations
Implement security measures such as code reviews, penetration testing, and security training for developers.
Conduct thorough code reviews to identify and fix any security vulnerabilities
Perform penetration testing to simulate real-world attacks and identify weaknesses
Provide security training for developers to educate them on best practices and common security threats
The right approach to bake in security involves integrating security measures throughout the software development lifecycle.
Implementing security best practices from the beginning of the development process
Conducting regular security assessments and audits
Training developers on secure coding practices
Utilizing automated security testing tools
Implementing secure coding guidelines and standards
Incorporating security revi
Address knowledge deficit by providing training, resources, and mentorship to team members.
Conduct regular training sessions on security best practices and updates
Provide access to resources such as online courses, articles, and workshops
Assign mentors within the team to guide and support members in security areas
Encourage team members to ask questions and seek clarification on security topics
Implement peer review proc
Identifying reasonable security for products involves assessing potential risks, compliance requirements, industry standards, and customer expectations.
Conduct a thorough risk assessment to identify potential threats and vulnerabilities
Consider compliance requirements such as GDPR, HIPAA, or industry-specific regulations
Adhere to industry standards like ISO 27001 or NIST Cybersecurity Framework
Take into account custome...
I have extensive experience working with various systems and machines in major projects.
Implemented ERP system for streamlining operations
Managed deployment of CRM system for customer relationship management
Led team in upgrading manufacturing machines for increased efficiency
I applied via Naukri.com and was interviewed in Mar 2022. There were 2 interview rounds.
posted on 29 Dec 2020
Dominant frequencies of 1×, 2×, and 3× RPM in the spectrum indicate faults in rotating equipment.
1× RPM indicates misalignment or unbalance
2× RPM indicates gear or bearing faults
3× RPM indicates resonance or coupling issues
Diagnosing abnormal sound from mill motor without vibration analyzer
Check for any visible signs of damage or wear on the motor and surrounding components
Listen for any changes in the sound when the motor is turned off and on again
Check the lubrication system and oil levels
Inspect the belts and pulleys for any signs of wear or damage
Consult with experts or manufacturers for further guidance
Centrifugal pump performance characteristics refer to the relationship between flow rate, head, power, and efficiency.
Flow rate is the volume of fluid that passes through the pump per unit time.
Head is the energy added to the fluid by the pump and is proportional to the pressure increase.
Power is the energy required to operate the pump and is proportional to the flow rate and head.
Efficiency is the ratio of the energy ...
HP and KW are units of power measurement, with HP being the imperial unit and KW being the metric unit.
HP stands for horsepower and is commonly used in the United States and other countries that use the imperial system of measurement.
KW stands for kilowatt and is commonly used in countries that use the metric system of measurement.
1 horsepower is equal to 0.7457 kilowatts.
The relationship between HP and KW is important...
I applied via Recruitment Consultant and was interviewed before Jan 2021. There were 4 interview rounds.
posted on 10 Nov 2024
AML & screening stands for Anti-Money Laundering and screening is the process of checking individuals or entities against various watchlists to ensure compliance with regulations.
AML refers to the laws, regulations, and procedures intended to prevent criminals from disguising illegally obtained funds as legitimate income.
Screening involves checking individuals or entities against watchlists such as OFAC, PEP, and sanct...
I applied via Approached by Company and was interviewed before Nov 2019. There were 4 interview rounds.
I applied via Approached by Company and was interviewed in Sep 2024. There were 5 interview rounds.
Print 10 to 1 without using any loops in C
print the number by toggling a bit of a given position
virtual functions -> what would be the output of the code and vtable concept explain in detail
information security standards, protocols, regulations
Implement security measures such as code reviews, penetration testing, and security training for developers.
Conduct thorough code reviews to identify and fix any security vulnerabilities
Perform penetration testing to simulate real-world attacks and identify weaknesses
Provide security training for developers to educate them on best practices and common security threats
The right approach to bake in security involves integrating security measures throughout the software development lifecycle.
Implementing security best practices from the beginning of the development process
Conducting regular security assessments and audits
Training developers on secure coding practices
Utilizing automated security testing tools
Implementing secure coding guidelines and standards
Incorporating security revi
Address knowledge deficit by providing training, resources, and mentorship to team members.
Conduct regular training sessions on security best practices and updates
Provide access to resources such as online courses, articles, and workshops
Assign mentors within the team to guide and support members in security areas
Encourage team members to ask questions and seek clarification on security topics
Implement peer review proc
Identifying reasonable security for products involves assessing potential risks, compliance requirements, industry standards, and customer expectations.
Conduct a thorough risk assessment to identify potential threats and vulnerabilities
Consider compliance requirements such as GDPR, HIPAA, or industry-specific regulations
Adhere to industry standards like ISO 27001 or NIST Cybersecurity Framework
Take into account custome...
based on 5 reviews
Rating in categories
Deputy Manager
238
salaries
| ₹6 L/yr - ₹15.3 L/yr |
Manager
169
salaries
| ₹5.8 L/yr - ₹23 L/yr |
Senior Engineer
162
salaries
| ₹4 L/yr - ₹12.2 L/yr |
Engineer
86
salaries
| ₹3 L/yr - ₹8 L/yr |
Senior Manager
65
salaries
| ₹10 L/yr - ₹32 L/yr |
BHEL
Thermax Limited
Siemens
Alstom Transportation