i
IBM
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via LinkedIn and was interviewed in Sep 2023. There were 2 interview rounds.
Quants and Reasoning
Threat is a potential danger that can exploit a vulnerability, Risk is the likelihood of a threat occurring and causing harm, and VM stands for Vulnerability Management.
Threat: potential danger that can exploit a vulnerability
Risk: likelihood of a threat occurring and causing harm
VM: Vulnerability Management
Threats can be external or internal
Risk can be calculated by assessing the likelihood and impact of a threat
VM in...
I applied via Recruitment Consulltant and was interviewed before May 2023. There was 1 interview round.
What people are saying about IBM
I was interviewed before May 2023.
It was time based test.
IBM interview questions for designations
I applied via Company Website and was interviewed in Sep 2021. There were 2 interview rounds.
I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.
SIEM (Security Information and Event Management) tool is a software solution that aggregates and analyzes security data from various sources.
SIEM tools help in detecting and responding to security incidents in real-time.
They provide centralized visibility into an organization's security posture.
Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.
I have experience using Splunk for log management and security
Yes, I have configured policies in defender.
Yes, I have configured policies in Windows Defender to ensure proper security measures are in place.
I have set up policies for malware protection, network protection, firewall settings, and device control.
Regularly review and update policies to adapt to new threats and vulnerabilities.
Example: Configuring Windows Defender policies to block certain file types from being downlo
MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations.
MITRE ATT&CK provides a framework for understanding and categorizing cyber threats.
It consists of tactics, techniques, and procedures (TTPs) used by attackers.
Organizations can use MITRE ATT&CK to improve their threat detection and response capabilities.
Examples of MITRE ATT&CK techniques include spear ...
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Vulnerability management in cloud environment involves identifying, prioritizing, and mitigating security weaknesses.
Regularly scan cloud infrastructure for vulnerabilities
Patch and update software to address vulnerabilities
Implement access controls and encryption to protect data
Utilize security tools like intrusion detection systems and firewalls
Monitor and analyze security logs for suspicious activity
Storage maintenance in Azure involves monitoring, optimizing, and managing storage resources to ensure performance and availability.
Regularly monitor storage usage and performance metrics
Optimize storage by implementing tiered storage and data archiving
Manage access controls and permissions to prevent unauthorized access
Implement backup and disaster recovery strategies for data protection
Update storage configurations a
It had multiple aptitude questions with programming questions
I applied via Company Website and was interviewed in Dec 2023. There was 1 interview round.
based on 3 interviews
1 Interview rounds
based on 40 reviews
Rating in categories
Application Developer
11.7k
salaries
| ₹5.4 L/yr - ₹24 L/yr |
Software Engineer
5.5k
salaries
| ₹5.4 L/yr - ₹22.2 L/yr |
Advisory System Analyst
5.2k
salaries
| ₹9.4 L/yr - ₹26 L/yr |
Senior Software Engineer
4.8k
salaries
| ₹8 L/yr - ₹30 L/yr |
Senior Systems Engineer
4.6k
salaries
| ₹5.7 L/yr - ₹20.4 L/yr |
Oracle
TCS
Cognizant
Accenture