i
Infosys
Filter interviews by
What people are saying about Infosys
For example, a ₹10 LPA CTC could mean an in-hand salary of ₹70,000–₹75,000 per month, depending on deductions and benefits.
✨ 𝗣𝗿𝗼 𝗧𝗶𝗽: Always request a detailed salary structure during negotiations—it’s your roadmap to making informed decisions
𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!
We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
I applied via Walk-in and was interviewed in Dec 2024. There were 4 interview rounds.
About my Background and my job
About my physical experience
Confirm the job on my capabilities
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Security refers to measures taken to protect people, property, and information from harm or unauthorized access.
Security involves implementing procedures, technologies, and personnel to prevent and respond to threats
Examples include surveillance cameras, access control systems, security guards, and cybersecurity measures
Security measures can vary depending on the specific needs and risks of a particular environment or
Security officers are essential in the industry to protect people, property, and assets from potential threats and ensure a safe environment.
Prevent unauthorized access to facilities
Monitor surveillance cameras and alarms
Respond to emergencies and incidents
Enforce safety and security policies
Provide a visible deterrent to potential criminals
Vehicles are checked before entering the gate by security officers for safety and security purposes.
Check for valid identification and authorization to enter the premises
Inspect the vehicle for any suspicious items or signs of tampering
Verify the purpose of the visit and destination within the premises
Use mirrors to check the undercarriage of the vehicle for any hidden objects
Check the trunk and interior of the vehicle
Vehicles are checked at the gate by security officers for safety and security purposes.
Security officers visually inspect vehicles for any suspicious items or behavior
Security officers may use mirrors to check the undercarriage of vehicles for hidden items
Security officers may use metal detectors to check for weapons or other prohibited items
Security officers may ask drivers to open trunks or other compartments for ins
I applied via Naukri.com and was interviewed in Nov 2023. There were 2 interview rounds.
I was interviewed in Aug 2022.
Vulnerability is a weakness, threat is a potential danger, and risk is the likelihood of a threat exploiting a vulnerability.
Vulnerability: a weakness in a system that can be exploited by a threat
Threat: a potential danger that can exploit a vulnerability
Risk: the likelihood of a threat exploiting a vulnerability
Example: A vulnerability in a software program can be exploited by a hacker (threat), resulting in a data br
Secure session layer protocols include SSL and TLS.
SSL (Secure Sockets Layer)
TLS (Transport Layer Security)
A supervisor is a person who oversees and manages a team or group of individuals.
Supervisors are responsible for delegating tasks and ensuring they are completed efficiently.
They provide guidance and support to their team members.
They are accountable for the performance and productivity of their team.
They communicate effectively with their team and higher-ups.
Examples include a retail store manager, a construction site
I applied via Company Website and was interviewed in Dec 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
Experienced security professional with a background in law enforcement and risk management.
Former law enforcement officer with 10+ years of experience
Extensive knowledge in risk management and security protocols
Proven track record of implementing effective security measures
Strong leadership and communication skills
Certified in security management and emergency response
I am looking for Wipro company because of its reputation for providing top-notch security solutions and opportunities for career growth.
Wipro has a strong reputation in the industry for providing top-notch security solutions
I am impressed by Wipro's commitment to innovation and staying ahead of the curve in the security field
I believe Wipro offers great opportunities for career growth and development
I have heard positi...
My soft skills include excellent communication, problem-solving, leadership, and teamwork abilities.
Strong communication skills to effectively convey information and instructions
Exceptional problem-solving skills to identify and resolve security issues
Effective leadership abilities to guide and motivate security team members
Strong teamwork skills to collaborate with colleagues and other departments
Ability to remain cal
Cyber security work experience skills involve knowledge of network security, threat detection, incident response, and security tools.
Understanding of network security principles and protocols
Experience with threat detection and analysis
Proficiency in incident response procedures
Familiarity with security tools such as firewalls, antivirus software, and intrusion detection systems
Security controls are measures put in place to protect information, systems, and assets from security threats.
Security controls can be technical, administrative, or physical in nature.
Examples of security controls include firewalls, encryption, access control mechanisms, security policies, and security awareness training.
Security controls are implemented to reduce the risk of security breaches and protect against unaut...
Technology Analyst
56.3k
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Systems Engineer
49.4k
salaries
| ₹2.8 L/yr - ₹9.2 L/yr |
System Engineer
38.9k
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Technical Lead
30.7k
salaries
| ₹5.2 L/yr - ₹19.5 L/yr |
Senior Associate Consultant
27.1k
salaries
| ₹6.2 L/yr - ₹17 L/yr |
TCS
Wipro
Cognizant
Accenture