i
JPMorgan Chase & Co.
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
posted on 3 Mar 2022
I applied via Newspaper Ad and was interviewed before Mar 2021. There were 2 interview rounds.
Risk, threat, and vulnerability are three distinct concepts in information security.
Risk is the potential for loss or damage to an asset or organization due to a threat exploiting a vulnerability.
Threat is any potential danger to an asset or organization, such as a cyber attack or natural disaster.
Vulnerability is a weakness or gap in security measures that can be exploited by a threat to cause harm.
Risk = Threat x Vul...
SOC 1 is for financial reporting while SOC 2 is for general use and covers security, availability, processing integrity, confidentiality, and privacy.
SOC 1 is a report on controls at a service organization that are relevant to user entities' internal control over financial reporting.
SOC 2 is a report on controls at a service organization that are relevant to security, availability, processing integrity, confidentiality...
posted on 29 Jul 2022
I applied via Naukri.com and was interviewed in Jul 2022. There were 2 interview rounds.
posted on 25 Sep 2024
I applied via Company Website and was interviewed before Sep 2023. There were 2 interview rounds.
RBAC stands for Role-Based Access Control, a method of restricting network access based on roles assigned to users.
RBAC assigns permissions to roles, and roles to users
It simplifies access management by grouping users with similar access needs
RBAC helps enforce the principle of least privilege, granting only necessary permissions
Example: Admin role has full access, while User role has limited access
Cybersecurity is crucial in application security to protect sensitive data and prevent cyber attacks.
Cybersecurity helps in identifying and mitigating vulnerabilities in applications.
It ensures the confidentiality, integrity, and availability of data within applications.
Implementing secure coding practices and regular security assessments are essential in application security.
Examples include using encryption to protec...
posted on 4 Oct 2024
I applied via Approached by Company and was interviewed before Oct 2023. There were 2 interview rounds.
posted on 1 Jun 2024
I applied via Recruitment Consulltant and was interviewed before Jun 2023. There were 2 interview rounds.
I can add value by identifying and mitigating security risks, implementing security measures, and ensuring compliance with regulations.
Identifying security risks and vulnerabilities in systems and networks
Implementing security measures such as firewalls, encryption, and access controls
Ensuring compliance with regulations and industry standards such as GDPR, HIPAA, and PCI DSS
Monitoring and responding to security incide...
posted on 29 Jul 2022
I applied via Naukri.com and was interviewed in Jul 2022. There were 2 interview rounds.
posted on 20 Mar 2024
I applied via Company Website and was interviewed before Mar 2023. There were 2 interview rounds.
Associate
10.1k
salaries
| ₹10.1 L/yr - ₹35 L/yr |
Team Lead
5.4k
salaries
| ₹5.6 L/yr - ₹16.5 L/yr |
Vice President
3.8k
salaries
| ₹20 L/yr - ₹68 L/yr |
Analyst
2.5k
salaries
| ₹6.3 L/yr - ₹25 L/yr |
Software Engineer
2.4k
salaries
| ₹11 L/yr - ₹35 L/yr |
Morgan Stanley
Goldman Sachs
TCS
Bank of America