Filter interviews by
Yes, I have knowledge in open source tools.
I have experience working with open source security tools like Snort and Suricata.
I am familiar with open source network monitoring tools like Nagios and Zabbix.
I have used open source vulnerability scanners like OpenVAS and Nessus.
I have worked with open source encryption tools like GnuPG and OpenSSL.
I am comfortable using open source log management tools like ELK Stack (Elas
I have experience in network security and have worked on various projects related to securing networks and systems.
Implemented firewall rules to restrict unauthorized access to network resources
Configured and monitored intrusion detection systems to detect and prevent cyber attacks
Conducted vulnerability assessments and penetration testing to identify and address security vulnerabilities
Collaborated with cross-function...
Top trending discussions
I applied via Monster and was interviewed in Jun 2023. There were 4 interview rounds.
Web application security testing involves assessing the security of web applications to identify vulnerabilities and weaknesses.
Identify potential security risks and threats in the web application
Conduct vulnerability assessments and penetration testing
Review code for security flaws and vulnerabilities
Test authentication and authorization mechanisms
Utilize tools like OWASP ZAP, Burp Suite, and Nmap for testing
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate databases. Mitigation involves input validation, parameterized queries, and using ORM frameworks.
Input validation: Validate and sanitize user input to prevent malicious SQL code from being executed.
Parameterized queries: Use parameterized queries to separate SQL code from user input, reducing the risk of SQL inj...
OWASP Top 10 is a list of the top 10 most critical web application security risks and their mitigation strategies.
Injection: Use parameterized queries to prevent SQL injection.
Broken Authentication: Implement strong password policies and multi-factor authentication.
Sensitive Data Exposure: Encrypt sensitive data both at rest and in transit.
XML External Entities (XXE): Disable external entity references in XML parsers.
S...
My expected CTC is negotiable based on the job responsibilities and market standards.
My expected CTC is based on my experience, skills, and the job requirements.
I am open to discussing the salary range during the interview process.
I am looking for a competitive salary package that aligns with my expertise in security consulting.
posted on 17 Mar 2024
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Senior Software Engineer
182
salaries
| ₹6 L/yr - ₹22 L/yr |
Software Engineer
95
salaries
| ₹3 L/yr - ₹12 L/yr |
Technical Lead
55
salaries
| ₹11.1 L/yr - ₹24.7 L/yr |
Tax Analyst
55
salaries
| ₹3.5 L/yr - ₹8 L/yr |
Associate Software Engineer
41
salaries
| ₹3.6 L/yr - ₹6.4 L/yr |
Intuit
Thomson Reuters
Deloitte
PwC