Filter interviews by
I appeared for an interview before Feb 2024.
The CIA Triad is a foundational security model that consists of three core principles: Confidentiality, Integrity, and Availability.
Confidentiality: Ensuring that information is only accessible to authorized individuals or systems.
Integrity: Ensuring that information is accurate and has not been tampered with.
Availability: Ensuring that information and systems are accessible when needed by authorized users.
Example: Enc...
SOC operations involve monitoring, detecting, analyzing, and responding to security incidents within an organization.
24/7 monitoring of security alerts and incidents
Incident detection and analysis using SIEM tools
Incident response and mitigation strategies
Collaboration with other teams like IT, network, and application teams
Continuous improvement through threat intelligence and security assessments
Various types of attacks observed include phishing, malware, DDoS, insider threats, and social engineering.
Phishing attacks involve tricking individuals into providing sensitive information through deceptive emails or websites.
Malware attacks involve malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
DDoS attacks overwhelm a system with a flood of traffic, causing it to beco...
The process for creating use cases involves identifying system requirements, defining actors and goals, outlining main and alternate flows, and validating with stakeholders.
Identify system requirements and objectives
Define actors and their roles in the system
Outline main and alternate flows of events
Validate use cases with stakeholders
I have extensive experience in maintaining use cases by regularly updating and refining them to align with changing security threats and business needs.
Regularly reviewing and updating use cases to ensure they reflect current security threats
Collaborating with stakeholders to gather feedback and make necessary adjustments
Refining use cases based on new information or changes in the organization's infrastructure
Document...
Creating policies based on client requests involves understanding their needs, conducting research, drafting the policy, and obtaining client approval.
Understand the specific requirements and constraints of the client.
Conduct research on industry best practices and legal requirements.
Draft the policy document outlining the specific guidelines and procedures.
Present the policy to the client for review and approval.
Imple...
I am flexible with travel and working hours, willing to adjust as needed.
I am open to travel for work if required
I am willing to work flexible hours, including evenings and weekends if necessary
I can adjust my schedule to accommodate any urgent security incidents or projects
I have experience working remotely and can effectively manage my time and tasks
I applied via Company Website and was interviewed before Apr 2023. There was 1 interview round.
Top trending discussions
I appeared for an interview in Aug 2020.
Developed a real-time data processing system for a financial institution
Implemented a distributed system using Apache Kafka and Apache Storm
Designed a fault-tolerant architecture with multiple redundancy layers
Optimized the system for high throughput and low latency
Provided real-time monitoring and alerting using Grafana and Prometheus
posted on 14 Oct 2021
I applied via Walk-in and was interviewed before Oct 2020. There were 5 interview rounds.
I applied via Recruitment Consultant and was interviewed in Jun 2019. There were 4 interview rounds.
Answering questions related to Spring Boot and core Java
Spring Boot addons include Spring Security, Spring Data, and Spring Cloud
Spring Boot is a framework for building standalone, production-grade Spring-based applications
Ways of configuring a bean in Spring include XML configuration, Java-based configuration, and annotation-based configuration
Core Java topics include OOP concepts, collections, multithreading, and exc
I applied via Naukri.com and was interviewed before Oct 2019. There were 3 interview rounds.
I applied via Walk-in and was interviewed before Oct 2020. There was 1 interview round.
I applied via Other and was interviewed before Apr 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed before Aug 2020. There were 3 interview rounds.
based on 4 interviews
Interview experience
based on 11 reviews
Rating in categories
Security Analyst
15
salaries
| ₹3 L/yr - ₹7.4 L/yr |
Associate Security Analyst
13
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Senior Security Engineer
10
salaries
| ₹5.5 L/yr - ₹10 L/yr |
Associate Security Consultant
9
salaries
| ₹3 L/yr - ₹6 L/yr |
Security Consultant
5
salaries
| ₹4.2 L/yr - ₹6 L/yr |
TCS
Accenture
Wipro
Cognizant