i
Ernst & Young
Filter interviews by
Top key risks faced by an IT company
Cybersecurity threats and data breaches
Technological obsolescence
Intellectual property theft
Vendor or third-party risks
Regulatory compliance
Human error and insider threats
I am currently working as a Risk Consultant, where I assess and analyze potential risks for clients to help them make informed decisions.
Conducting risk assessments to identify potential threats and vulnerabilities
Analyzing data to evaluate the likelihood and impact of risks
Developing risk mitigation strategies and recommendations for clients
Communicating findings and recommendations to clients and stakeholders
Security aspects like application and infrastructure are crucial for risk management.
Application security involves securing software applications from threats like malware and unauthorized access.
Infrastructure security focuses on protecting the underlying IT infrastructure, including networks, servers, and databases.
Both aspects are essential for comprehensive risk management in organizations.
Examples of application s...
To mitigate identified risks, we implement risk management strategies, create contingency plans, conduct regular risk assessments, and ensure proper communication.
Implement risk management strategies such as risk avoidance, risk reduction, risk transfer, and risk acceptance.
Create contingency plans to address potential risks and minimize their impact.
Conduct regular risk assessments to identify new risks and evaluate t...
I applied via Campus Placement
Mostly logical reasoning questions
I applied via Campus Placement and was interviewed in Jun 2024. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed in Aug 2023. There were 2 interview rounds.
Case study on how to increase penetration of a global electronic manufacturer. The interviewer provide lot of data and charts.
I am currently working as a Risk Consultant, where I assess and analyze potential risks for clients to help them make informed decisions.
Conducting risk assessments to identify potential threats and vulnerabilities
Analyzing data to evaluate the likelihood and impact of risks
Developing risk mitigation strategies and recommendations for clients
Communicating findings and recommendations to clients and stakeholders
Security aspects like application and infrastructure are crucial for risk management.
Application security involves securing software applications from threats like malware and unauthorized access.
Infrastructure security focuses on protecting the underlying IT infrastructure, including networks, servers, and databases.
Both aspects are essential for comprehensive risk management in organizations.
Examples of application s...
To mitigate identified risks, we implement risk management strategies, create contingency plans, conduct regular risk assessments, and ensure proper communication.
Implement risk management strategies such as risk avoidance, risk reduction, risk transfer, and risk acceptance.
Create contingency plans to address potential risks and minimize their impact.
Conduct regular risk assessments to identify new risks and evaluate t...
I applied via Campus Placement and was interviewed in Aug 2023. There were 3 interview rounds.
Easy round yaarrr eassyyyyy
I applied via Naukri.com and was interviewed before Nov 2020. There were 3 interview rounds.
I applied via Referral and was interviewed in Mar 2023. There were 2 interview rounds.
I am a risk analyst with a strong background in data analysis and risk assessment.
I have a Bachelor's degree in Statistics and a Master's degree in Risk Management.
I have worked for 5 years in the insurance industry, analyzing data to identify potential risks and develop strategies to mitigate them.
I am proficient in statistical software such as R and Python, which I use to analyze large datasets and create risk models...
I applied via campus placement at SVNIT Sardar Vallabhbhai National Institute of Technology, Surat and was interviewed in Sep 2023. There were 2 interview rounds.
There were like job assigning problems, calendar problems like 1 works for sun and mon only, 2 works for 11 and 12 date of the month so tell me last working day of 3.
HTTPS is secured using SSL/TLS protocols to encrypt data transmitted between a web server and a browser.
HTTPS uses SSL/TLS protocols to encrypt data, providing secure communication over the internet.
SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are cryptographic protocols that provide secure communication over a computer network.
SSL/TLS certificates are used to verify the identity of a web...
based on 9 reviews
Rating in categories
Senior Consultant
15.5k
salaries
| ₹9.1 L/yr - ₹29.7 L/yr |
Consultant
11.8k
salaries
| ₹5.4 L/yr - ₹19 L/yr |
Manager
7.4k
salaries
| ₹16.5 L/yr - ₹51.2 L/yr |
Assistant Manager
6.3k
salaries
| ₹9.3 L/yr - ₹29.9 L/yr |
Associate Consultant
3.8k
salaries
| ₹3.5 L/yr - ₹12 L/yr |
Deloitte
PwC
EY Global Delivery Services ( EY GDS)
Accenture