Filter interviews by
Clear (1)
I applied via Campus Placement and was interviewed in Feb 2024. There was 1 interview round.
Top trending discussions
Hunting for ransomware involves proactively searching for indicators of compromise and suspicious activities to prevent or mitigate attacks.
Monitor network traffic for unusual patterns or spikes in data encryption
Analyze email attachments and links for potential ransomware payloads
Use threat intelligence feeds to stay updated on new ransomware variants
Implement endpoint detection and response solutions to quickly ident
I applied via Naukri.com and was interviewed in Dec 2021. There were 2 interview rounds.
Basic security review
I was interviewed before Feb 2023.
Was given some peace of code to identify security issues.
I applied via Referral and was interviewed in May 2024. There were 4 interview rounds.
SQL and python questions were asked
Strategic planning case were asked and the response were observed
Meesho offers a unique platform for social commerce, allowing me to leverage my analytical skills in a dynamic and innovative environment.
Meesho's focus on social commerce aligns with my interest in leveraging data analytics for customer engagement and growth.
The company's rapid growth and innovative approach to e-commerce present exciting challenges and opportunities for me to excel.
Meesho's strong company culture and...
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
To find a loop in a linked list, we use Floyd's cycle-finding algorithm.
Floyd's cycle-finding algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop in the linked list, the two pointers will eventually meet.
To detect the meeting point, we reset one of the pointers to the head of the linked list and move both pointers at the same speed.
The meeting point is the start of the loop.
LRU, MRU and LFU are caching algorithms used to manage memory in computer systems.
LRU stands for Least Recently Used and removes the least recently used items from the cache when the cache is full.
MRU stands for Most Recently Used and removes the most recently used items from the cache when the cache is full.
LFU stands for Least Frequently Used and removes the least frequently used items from the cache when the cache i...
I applied via Recruitment Consulltant and was interviewed before Apr 2023. There was 1 interview round.
I would start by reproducing the error, checking logs, reviewing code, and using debugging tools.
Reproduce the error to understand the exact conditions that trigger it
Check logs for any error messages or warnings
Review the code related to the error to identify potential issues
Use debugging tools like breakpoints, print statements, or a debugger to step through the code
Isolate the problem by narrowing down the scope of
posted on 13 Jun 2024
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
The task was a Codility type
I applied via Approached by Company and was interviewed before Oct 2022. There were 4 interview rounds.
Pair programming with engineer
Kubernetes is used for container orchestration, scaling, and management in cloud-native applications.
Automating deployment, scaling, and management of containerized applications
Ensuring high availability and fault tolerance
Facilitating easy scaling of applications based on demand
Managing updates and rollbacks seamlessly
Supporting multi-cloud deployments
Example: Running microservices architecture on Kubernetes for a sca
Some of the top questions asked at the FireCompass Security Analyst Intern interview -
based on 1 interview
Interview experience
Software Engineer
9
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Analyst
9
salaries
| ₹0 L/yr - ₹0 L/yr |
Program Manager
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Sales Manager
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Security Analyst
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Cyberbit
Securonix
Palo Alto Networks
CrowdStrike