Filter interviews by
I applied via Walk-in and was interviewed before Nov 2022. There were 3 interview rounds.
Paper exam based assignment at office
I am interested in this job because of my passion for cybersecurity and my desire to protect organizations from potential threats.
I have always been fascinated by the field of cybersecurity and have actively pursued knowledge and skills in this area.
I enjoy the challenge of analyzing and identifying potential security vulnerabilities and finding effective solutions to mitigate them.
I believe that working as a Security ...
In the coming 5 years, I see myself as a highly skilled and experienced Security Analyst, leading a team and contributing to the development of innovative security solutions.
Becoming a subject matter expert in various security domains
Leading and mentoring a team of security analysts
Contributing to the development and implementation of advanced security measures
Staying updated with the latest security trends and technol...
Top trending discussions
I applied via Referral and was interviewed in Nov 2019. There were 3 interview rounds.
A Security Analyst is responsible for testing web applications, identifying vulnerabilities, and implementing security measures to protect against attacks.
Testing a web application involves various techniques such as penetration testing, vulnerability scanning, and code review.
CSRF (Cross-Site Request Forgery) is an attack that tricks a victim into performing unwanted actions on a web application.
SSRF (Server-Side Requ...
I applied via Campus Placement
Multithreading is the ability of a CPU to execute multiple threads concurrently, improving performance and responsiveness.
Multithreading allows for parallel execution of tasks, utilizing multiple CPU cores.
It enables concurrent processing, where multiple threads can execute simultaneously.
Thread synchronization mechanisms like locks and semaphores are used to prevent data inconsistencies.
Multithreading can be used to i...
Constructors are used to initialize objects while destructors are used to destroy objects.
Constructors are called when an object is created while destructors are called when an object is destroyed.
Constructors have the same name as the class while destructors have the same name as the class preceded by a tilde (~).
Constructors can be overloaded while destructors cannot be overloaded.
Constructors do not have a return ty...
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed in Dec 2020. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Nov 2019. There were 4 interview rounds.
I applied via Campus Placement and was interviewed in Sep 2020. There were 3 interview rounds.
I applied via Campus Placement
My final year project was on developing a web-based inventory management system using Java and MySQL.
Developed using Java and MySQL
Web-based inventory management system
Implemented basic OOPs concepts
Used MVC architecture for better code organization
Included features like user authentication, product management, and order tracking
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Information Security Analyst
22
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Internal Auditor
4
salaries
| ₹0.2 L/yr - ₹3.5 L/yr |
Digital Marketing Manager
4
salaries
| ₹4.8 L/yr - ₹5.3 L/yr |
Manager - HR & Admin
4
salaries
| ₹4.2 L/yr - ₹7 L/yr |
Branch Head
3
salaries
| ₹2.5 L/yr - ₹5 L/yr |
TCS
Accenture
Wipro
Cognizant