i
HCLTech
Filter interviews by
I applied via Naukri.com and was interviewed in Jul 2023. There was 1 interview round.
Check LDAP server settings, firewall rules, and CyberArk configuration for connectivity issues.
Verify LDAP server address and port in CyberArk configuration
Check firewall rules to ensure LDAP traffic is allowed
Ensure CyberArk has the necessary permissions to connect to LDAP server
Test connectivity using tools like telnet or LDAP browser
Review logs for error messages related to LDAP connectivity
PSM connection workflow involves initiating a connection, validating user credentials, and providing secure access to target systems.
Initiate connection request from user
Validate user credentials using Cyberark PSM
Establish secure connection to target system
Monitor and record session activities
Terminate connection after session ends
CP stands for Central Policy and CCP stands for Customized Central Policy.
CP is a predefined policy provided by Cyberark, while CCP is a policy customized by the administrator.
CP is a general policy that applies to all users, while CCP can be tailored to specific user roles or permissions.
CP may not meet all the organization's security requirements, whereas CCP can be adjusted to address specific needs.
CP is easier to ...
DR drill stands for Disaster Recovery drill, which is a planned exercise to test the effectiveness of a company's disaster recovery plan.
DR drill is a simulation of an actual disaster scenario to ensure that the organization's systems and processes can be restored in case of a real disaster.
It involves testing the backup and recovery procedures, communication protocols, and overall readiness of the organization to hand...
PSMGW & PSMApp users are CyberArk Privileged Session Manager Gateway and Application users used for managing privileged accounts and sessions.
PSMGW users are used for managing privileged accounts and sessions through the Privileged Session Manager Gateway.
PSMApp users are used for managing privileged accounts and sessions through the Privileged Session Manager Application.
The port to communicate with PVWA URL is 443.
PVWA URL uses port 443 for communication
Port 443 is the default port for HTTPS connections
What people are saying about HCLTech
I applied via Job Portal and was interviewed in Jan 2023. There were 4 interview rounds.
posted on 22 Dec 2024
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.
Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.
It helps organizations understand and defend against common attack patterns.
Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.
I applied via Naukri.com and was interviewed in Sep 2023. There were 2 interview rounds.
posted on 3 May 2023
I applied via Company Website and was interviewed in Apr 2023. There were 5 interview rounds.
I have faced challenges in managing privileged accounts and securing them from cyber threats.
Managing and securing privileged accounts
Identifying and mitigating cyber threats
Ensuring compliance with security regulations
Educating employees on cybersecurity best practices
The biggest challenge during upgradation & migration is ensuring compatibility and minimizing downtime.
Ensuring compatibility of the new system with existing infrastructure
Minimizing downtime during the transition
Testing the new system thoroughly before deployment
Ensuring data integrity and security during migration
Training employees on the new system
Managing user access and permissions during migration
I applied via Recruitment Consulltant and was interviewed in Jan 2022. There was 1 interview round.
I applied via Approached by Company and was interviewed before Oct 2022. There were 2 interview rounds.
I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.
I was interviewed in Jun 2024.
I am a dedicated Cyber Security Analyst with a strong background in network security and threat detection.
Experienced in conducting security assessments and implementing security measures
Skilled in analyzing security incidents and responding to cyber threats
Proficient in using security tools such as SIEM, IDS/IPS, and endpoint protection
Certified in relevant cybersecurity certifications like CISSP or CEH
Seeking new challenges and opportunities for growth in the field of cyber security.
Desire to work on more advanced projects
Opportunity to learn new technologies and techniques
Seeking a more challenging and dynamic work environment
Software Engineer
22.5k
salaries
| ₹1.2 L/yr - ₹8 L/yr |
Technical Lead
20.7k
salaries
| ₹6.9 L/yr - ₹25 L/yr |
Senior Software Engineer
15.4k
salaries
| ₹4 L/yr - ₹16.5 L/yr |
Lead Engineer
14.8k
salaries
| ₹4.2 L/yr - ₹14 L/yr |
Senior Analyst
13.9k
salaries
| ₹1 L/yr - ₹8.7 L/yr |
TCS
Wipro
Accenture
Cognizant