Filter interviews by
I applied via Walk-in and was interviewed in Feb 2022. There were 2 interview rounds.
Cash payments rule is important
The aptitude for accenting knowledge involves the ability to effectively communicate information in a clear and understandable manner.
Strong verbal communication skills are essential for accenting knowledge
Ability to simplify complex information for better understanding
Active listening skills to ensure effective communication
Confidence in delivering information with clarity and precision
Money cards are used for making electronic payments and transactions.
Money cards can be used to make purchases online or in-store.
They can be loaded with a specific amount of money and used until the balance is depleted.
Money cards can be prepaid or linked to a bank account for automatic payments.
Some examples of money cards include debit cards, prepaid cards, and gift cards.
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Security refers to measures taken to protect people, property, and information from harm or unauthorized access.
Security involves implementing procedures, technologies, and personnel to prevent and respond to threats
Examples include surveillance cameras, access control systems, security guards, and cybersecurity measures
Security measures can vary depending on the specific needs and risks of a particular environment or
Security officers are essential in the industry to protect people, property, and assets from potential threats and ensure a safe environment.
Prevent unauthorized access to facilities
Monitor surveillance cameras and alarms
Respond to emergencies and incidents
Enforce safety and security policies
Provide a visible deterrent to potential criminals
Vehicles are checked before entering the gate by security officers for safety and security purposes.
Check for valid identification and authorization to enter the premises
Inspect the vehicle for any suspicious items or signs of tampering
Verify the purpose of the visit and destination within the premises
Use mirrors to check the undercarriage of the vehicle for any hidden objects
Check the trunk and interior of the vehicle
Vehicles are checked at the gate by security officers for safety and security purposes.
Security officers visually inspect vehicles for any suspicious items or behavior
Security officers may use mirrors to check the undercarriage of vehicles for hidden items
Security officers may use metal detectors to check for weapons or other prohibited items
Security officers may ask drivers to open trunks or other compartments for ins
I applied via Walk-in and was interviewed in Dec 2024. There were 4 interview rounds.
About my Background and my job
About my physical experience
Confirm the job on my capabilities
A supervisor is a person who oversees and manages a team or group of individuals.
Supervisors are responsible for delegating tasks and ensuring they are completed efficiently.
They provide guidance and support to their team members.
They are accountable for the performance and productivity of their team.
They communicate effectively with their team and higher-ups.
Examples include a retail store manager, a construction site
I applied via Company Website and was interviewed in Dec 2021. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Jan 2023. There were 2 interview rounds.
SIEM is a security information and event management system that collects and analyzes security data. XDR is an advanced threat detection and response platform that goes beyond SIEM.
SIEM collects and analyzes security data from various sources such as firewalls, servers, and endpoints.
XDR uses advanced analytics and machine learning to detect and respond to threats across multiple endpoints and networks.
SIEM is focused ...
PAM stands for Privileged Access Management and PIM stands for Privileged Identity Management.
PAM is a security solution that manages and monitors privileged access to critical systems and data.
PIM is a security solution that manages and secures privileged identities, such as administrator accounts.
Both PAM and PIM are important for protecting against insider threats and external attacks.
Examples of PAM and PIM solutio
I applied via Job Portal and was interviewed in Feb 2024. There was 1 interview round.
Tell about yourself and what is your achievements
based on 1 review
Rating in categories
Client Relationship Officer
129
salaries
| ₹0 L/yr - ₹0 L/yr |
Patrolling Officer
98
salaries
| ₹0 L/yr - ₹0 L/yr |
Quality Analyst
35
salaries
| ₹0 L/yr - ₹0 L/yr |
System Administrator
28
salaries
| ₹0 L/yr - ₹0 L/yr |
Team Lead
24
salaries
| ₹0 L/yr - ₹0 L/yr |
WNS
Genpact
Infosys BPM
TCS