i
ENH iSecure
Filter interviews by
posted on 27 Feb 2024
I applied via Campus Placement and was interviewed in Aug 2023. There were 4 interview rounds.
This section includes the Basics of Networking, Basics of CyberSecurity and Attacks such as Phishing, Backdoor and General Aptitude Questions
In the GD round.. The topic we got is Pros and Cons of AI Evolution in the IT Industry
I hold certifications such as CISSP, CISM, and have completed projects on implementing IAM solutions for Fortune 500 companies.
Certifications include CISSP, CISM, etc.
Implemented IAM solutions for Fortune 500 companies
Completed projects on access control, identity governance, etc.
Basics of Java and the Interview based Java Question..
posted on 27 Feb 2024
The aptitude is all about the Logical reasoning, verbal and basic mathematics
The group contains about 10 members they gave us choice to defend the topic or against the topic.
posted on 11 May 2023
I applied via Campus Placement and was interviewed before May 2022. There were 6 interview rounds.
The round consists of aptitude question, computer fundaments and personality check questions. The questions were moderate. It was good.
In this round we had a group discussion on a common technology. It was a great experience.
posted on 22 Oct 2020
I applied via Recruitment Consultant and was interviewed before Oct 2019. There were 7 interview rounds.
ENH iSecure interview questions for designations
I applied via Naukri.com and was interviewed in Aug 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Feb 2020. There were 6 interview rounds.
I applied via Company Website and was interviewed before Feb 2020. There was 1 interview round.
I applied via Walk-in and was interviewed before Sep 2019. There were 5 interview rounds.
I applied via Campus Placement and was interviewed in Oct 2020. There were 4 interview rounds.
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Start from the first element and compare it with the next element
If the next element is smaller, swap them
Repeat this process for all elements in the array
Continue this process until no more swaps are needed
A program to print all prime numbers
Take input from user for range of numbers
Loop through the range and check if each number is prime
Print the prime numbers
Hashmap is a data structure that stores key-value pairs and allows constant time access to values based on their keys.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when multiple keys map to the same index, which can be resolved using techniques like chaining or open addressing.
Examples of hashmap implementations include Java's HashMap class and Python's dict type.
Inheritance is a mechanism in object-oriented programming where a new class is created by inheriting properties of an existing class.
Inheritance allows code reuse and promotes code organization.
The existing class is called the parent or superclass, and the new class is called the child or subclass.
The child class inherits all the properties and methods of the parent class and can also add new properties and methods.
For...
Some of the top questions asked at the ENH iSecure Identity and Access Management Engineer interview -
based on 3 interviews
Interview experience
based on 10 reviews
Rating in categories
Identity and Access Management Engineer
16
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Iam Engineer
14
salaries
| ₹0 L/yr - ₹0 L/yr |
IAM Consultant
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Assistant Manager
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Wipro
HCLTech
Tech Mahindra