Upload Button Icon Add office photos

Filter interviews by

LanzeIntegra Technologies Security Engineer Interview Questions and Answers

Updated 18 Oct 2023

13 Interview questions

A Security Engineer was asked
Q. What is the penetration testing methodology?
Ans. 

Pentesting methodology is a systematic approach used to identify and exploit vulnerabilities in a system to improve security.

  • 1. Reconnaissance: Gather information about the target system.

  • 2. Scanning: Identify open ports and services on the target system.

  • 3. Gaining access: Exploit vulnerabilities to gain access to the system.

  • 4. Maintaining access: Maintain access to the system for further testing.

  • 5. Covering tracks...

A Security Engineer was asked
Q. What is your forte in security?
Ans. 

My forte in security lies in network security, penetration testing, and incident response.

  • Specialize in network security protocols and technologies

  • Skilled in conducting penetration tests to identify vulnerabilities

  • Experienced in responding to security incidents and mitigating risks

  • Certifications such as CISSP, CEH, or OSCP demonstrate expertise

Security Engineer Interview Questions Asked at Other Companies

asked in Synopsys
Q1. 1. What is Cryptography? Cryptography is the practice and study o ... read more
asked in Accenture
Q2. Give a practical example of Broken Authentication & authorisa ... read more
Q3. What is more important to you: procedure or end goal?
Q4. What standards are used for security testing of APIs and Web Appl ... read more
Q5. Which technologies or languages do you have knowledge about?
A Security Engineer was asked
Q. What is the difference between white hat and black hat hacking?
Ans. 

White hat hackers are ethical hackers who use their skills to improve security, while black hat hackers are malicious hackers who exploit vulnerabilities for personal gain.

  • White hat hackers are ethical hackers who work to improve security by finding and fixing vulnerabilities in systems.

  • Black hat hackers are malicious hackers who exploit vulnerabilities for personal gain or to cause harm.

  • White hat hackers may be h...

A Security Engineer was asked
Q. What is blind SQL injection?
Ans. 

Blind based SQL injection is a type of SQL injection attack where the attacker sends SQL queries to the database and observes the result without actually seeing the output.

  • Attacker sends SQL queries to the database and observes the behavior of the application to determine if the query was successful or not.

  • No error messages are displayed to the attacker, making it harder to detect.

  • Time-based blind SQL injection in...

A Security Engineer was asked
Q. Which technologies or languages do you have knowledge about?
Ans. 

I have knowledge in technologies such as Python, Java, C++, Linux, and network security.

  • Python

  • Java

  • C++

  • Linux

  • Network Security

A Security Engineer was asked
Q. What is the difference between LFI and RFI?
Ans. 

LFI allows an attacker to include files on a server through the web browser, while RFI allows an attacker to execute arbitrary code on a server.

  • LFI stands for Local File Inclusion, where an attacker can include files on a server using a vulnerable script.

  • RFI stands for Remote File Inclusion, where an attacker can execute arbitrary code on a server by including a remote file.

  • LFI is limited to files that are already...

A Security Engineer was asked
Q. What are the working differences between a blue team and a red team?
Ans. 

Blue team focuses on defense and prevention, while red team simulates attacks to test defenses.

  • Blue team is responsible for defending against cyber threats and implementing security measures.

  • Red team simulates real-world attacks to test the effectiveness of the blue team's defenses.

  • Blue team works proactively to prevent security breaches, while red team works reactively to identify vulnerabilities.

  • Blue team focuse...

Are these interview questions helpful?
A Security Engineer was asked
Q. What methods do you know for securing authentication?
Ans. 

Secure authentication methods are crucial for protecting sensitive information.

  • Use multi-factor authentication (MFA) to add an extra layer of security

  • Implement strong password policies, including regular password changes

  • Utilize biometric authentication such as fingerprint or facial recognition

  • Employ single sign-on (SSO) for centralized authentication management

  • Monitor and analyze authentication logs for suspicious...

A Security Engineer was asked
Q. How can you mitigate brute force attacks?
Ans. 

Implement account lockout, use strong passwords, and implement CAPTCHA

  • Implement account lockout after a certain number of failed login attempts

  • Encourage users to use strong passwords with a combination of letters, numbers, and special characters

  • Implement CAPTCHA to prevent automated brute force attacks

  • Consider implementing rate limiting to restrict the number of login attempts within a certain time frame

A Security Engineer was asked
Q. What are some mitigations for SQL injection?
Ans. 

Mitigations for SQL injection include input validation, parameterized queries, stored procedures, and least privilege access.

  • Implement input validation to ensure only expected data is accepted

  • Use parameterized queries to separate SQL code from user input

  • Utilize stored procedures to encapsulate SQL logic and prevent direct user input execution

  • Follow the principle of least privilege to restrict database access right...

LanzeIntegra Technologies Security Engineer Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed in Apr 2023. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - One-on-one 

(7 Questions)

  • Q1. What is your fortay in security ?
  • Ans. 

    My forte in security lies in network security, penetration testing, and incident response.

    • Specialize in network security protocols and technologies

    • Skilled in conducting penetration tests to identify vulnerabilities

    • Experienced in responding to security incidents and mitigating risks

    • Certifications such as CISSP, CEH, or OSCP demonstrate expertise

  • Answered by AI
  • Q2. Which technologies or languages you have knowledge about
  • Ans. 

    I have knowledge in technologies such as Python, Java, C++, Linux, and network security.

    • Python

    • Java

    • C++

    • Linux

    • Network Security

  • Answered by AI
  • Q3. Where do you stay currently
  • Ans. 

    I currently live in a vibrant city known for its tech scene, cultural diversity, and beautiful parks, offering a dynamic lifestyle.

    • Urban Environment: The city is bustling with activity, featuring numerous tech startups and established companies, creating a rich professional network.

    • Cultural Diversity: I enjoy the multicultural atmosphere, with various festivals, cuisines, and art events that reflect the city's inclusiv...

  • Answered by AI
  • Q4. What was your final CGPA
  • Q5. Do you have any hands-on experience besides internship
  • Ans. 

    I have hands-on experience in security engineering through personal projects and contributions to open-source security tools.

    • Personal Projects: Developed a web application with integrated security features, including user authentication and data encryption.

    • Open-Source Contributions: Contributed to security-focused projects on GitHub, such as improving vulnerability scanning tools.

    • Capture The Flag (CTF) Competitions: Pa...

  • Answered by AI
  • Q6. How do you come to know about us
  • Ans. Via referral from a known person
  • Answered Anonymously
  • Q7. What you do to enhance your skill set
  • Ans. 

    To enhance my skill set as a Security Engineer, I engage in continuous learning, hands-on practice, and community involvement.

    • Online Courses: I take courses on platforms like Coursera and Udemy to stay updated on the latest security practices and tools, such as ethical hacking.

    • Certifications: I pursue relevant certifications like CISSP or CEH to validate my skills and knowledge in cybersecurity.

    • Hands-On Labs: I partici...

  • Answered by AI
Round 3 - Technical 

(14 Questions)

  • Q1. What is pentesting methodology
  • Ans. 

    Pentesting methodology is a systematic approach used to identify and exploit vulnerabilities in a system to improve security.

    • 1. Reconnaissance: Gather information about the target system.

    • 2. Scanning: Identify open ports and services on the target system.

    • 3. Gaining access: Exploit vulnerabilities to gain access to the system.

    • 4. Maintaining access: Maintain access to the system for further testing.

    • 5. Covering tracks: Rem...

  • Answered by AI
  • Q2. Tell any standard used for security testing of APIs and Web Applications
  • Ans. 

    OWASP is a standard used for security testing of APIs and Web Applications

    • OWASP Top 10 is a widely recognized standard for web application security

    • OWASP API Security Top 10 provides guidelines for securing APIs

    • OWASP ZAP (Zed Attack Proxy) is a popular tool for testing web application security

  • Answered by AI
  • Q3. White hat and black hat difference
  • Ans. 

    White hat hackers are ethical hackers who use their skills to improve security, while black hat hackers are malicious hackers who exploit vulnerabilities for personal gain.

    • White hat hackers are ethical hackers who work to improve security by finding and fixing vulnerabilities in systems.

    • Black hat hackers are malicious hackers who exploit vulnerabilities for personal gain or to cause harm.

    • White hat hackers may be hired ...

  • Answered by AI
  • Q4. Blue team and red team working difference
  • Ans. 

    Blue team focuses on defense and prevention, while red team simulates attacks to test defenses.

    • Blue team is responsible for defending against cyber threats and implementing security measures.

    • Red team simulates real-world attacks to test the effectiveness of the blue team's defenses.

    • Blue team works proactively to prevent security breaches, while red team works reactively to identify vulnerabilities.

    • Blue team focuses on ...

  • Answered by AI
  • Q5. Authentication vs authorisation
  • Ans. 

    Authentication verifies a user's identity, while authorization determines what actions a user is allowed to perform.

    • Authentication confirms the user's identity through credentials like passwords or biometrics.

    • Authorization controls access to resources based on the authenticated user's permissions.

    • Example: Logging into a system with a username and password is authentication, while being able to view or edit specific fil...

  • Answered by AI
  • Q6. Any methods to secure authentication
  • Ans. 

    Secure authentication methods are crucial for protecting sensitive information.

    • Use multi-factor authentication (MFA) to add an extra layer of security

    • Implement strong password policies, including regular password changes

    • Utilize biometric authentication such as fingerprint or facial recognition

    • Employ single sign-on (SSO) for centralized authentication management

    • Monitor and analyze authentication logs for suspicious acti...

  • Answered by AI
  • Q7. Difference between hashing and encryption
  • Ans. 

    Hashing is one-way function for data integrity while encryption is two-way function for data confidentiality.

    • Hashing is irreversible and used for data integrity verification.

    • Encryption is reversible and used for data confidentiality protection.

    • Hashing produces a fixed-length output (hash value) while encryption output length can vary.

    • Example: Hashing - MD5, SHA-256; Encryption - AES, RSA

  • Answered by AI
  • Q8. Lfi vs Rfi difference
  • Ans. 

    LFI allows an attacker to include files on a server through the web browser, while RFI allows an attacker to execute arbitrary code on a server.

    • LFI stands for Local File Inclusion, where an attacker can include files on a server using a vulnerable script.

    • RFI stands for Remote File Inclusion, where an attacker can execute arbitrary code on a server by including a remote file.

    • LFI is limited to files that are already pres...

  • Answered by AI
  • Q9. What are some mitigation for SQL injection
  • Ans. 

    Mitigations for SQL injection include input validation, parameterized queries, stored procedures, and least privilege access.

    • Implement input validation to ensure only expected data is accepted

    • Use parameterized queries to separate SQL code from user input

    • Utilize stored procedures to encapsulate SQL logic and prevent direct user input execution

    • Follow the principle of least privilege to restrict database access rights

  • Answered by AI
  • Q10. What is blind based SQL injection
  • Ans. 

    Blind based SQL injection is a type of SQL injection attack where the attacker sends SQL queries to the database and observes the result without actually seeing the output.

    • Attacker sends SQL queries to the database and observes the behavior of the application to determine if the query was successful or not.

    • No error messages are displayed to the attacker, making it harder to detect.

    • Time-based blind SQL injection involve...

  • Answered by AI
  • Q11. What is password spraying
  • Ans. 

    Password spraying is a type of cyber attack where attackers try a few common passwords against many usernames.

    • Attackers use common passwords to try and gain access to multiple accounts.

    • Unlike brute force attacks, password spraying involves trying a few passwords against many accounts.

    • Attackers aim to avoid detection by not triggering account lockouts.

    • Organizations can defend against password spraying by enforcing stron...

  • Answered by AI
  • Q12. How can you mitigate brute forcing
  • Ans. 

    Implement account lockout, use strong passwords, and implement CAPTCHA

    • Implement account lockout after a certain number of failed login attempts

    • Encourage users to use strong passwords with a combination of letters, numbers, and special characters

    • Implement CAPTCHA to prevent automated brute force attacks

    • Consider implementing rate limiting to restrict the number of login attempts within a certain time frame

  • Answered by AI
  • Q13. Rest were scenario based questions involving attacks and their mitigation
  • Q14. 3 - 4 questions related to coding are asked
  • Ans. Answer these questions as per security perspective and may not have direct solutions.
  • Answered Anonymously
Round 4 - HR 

(8 Questions)

  • Q1. Tell us something about yourself
  • Ans. 

    I am a dedicated Security Engineer with a passion for safeguarding systems and data through innovative security solutions.

    • Extensive Experience: I have over 5 years of experience in cybersecurity, focusing on threat analysis and vulnerability management.

    • Certifications: I hold certifications such as CISSP and CEH, which demonstrate my commitment to staying updated with industry standards.

    • Incident Response: I successfully...

  • Answered by AI
  • Q2. Tell me something that is not written in your resume
  • Ans. 

    I have a passion for cybersecurity that extends beyond my job, including personal projects and community involvement.

    • Personal Projects: I developed a home lab to practice penetration testing and vulnerability assessments, enhancing my hands-on skills.

    • Community Engagement: I actively participate in local cybersecurity meetups and workshops, sharing knowledge and learning from peers.

    • Continuous Learning: I dedicate time t...

  • Answered by AI
  • Q3. What is more important to you procedure or end goal ?
  • Ans. 

    End goal is more important as it drives the overall direction and success of a project.

    • End goal provides a clear vision and purpose for the project

    • Procedures are important for achieving the end goal efficiently

    • Flexibility in procedures may be necessary to adapt to changing circumstances

    • Examples: In cybersecurity, the end goal of protecting sensitive data may require constantly evolving procedures to combat new threats

  • Answered by AI
  • Q4. What will be your next step if your internship period is extended or you're not retained beyond probation
  • Ans. 

    If my internship is extended or I am not retained, I will seek feedback, enhance my skills, and explore new opportunities.

    • Seek Feedback: I would ask my supervisor for constructive feedback on my performance to identify areas for improvement.

    • Skill Enhancement: I would take online courses or certifications in security tools and practices to strengthen my expertise.

    • Networking: I would connect with professionals in the fie...

  • Answered by AI
  • Q5. What is your salary expectation with this job
  • Ans. 

    Salary expectations should reflect market rates, experience, and the specific responsibilities of the Security Engineer role.

    • Market Research: I have researched the average salary for Security Engineers in this region, which typically ranges from $90,000 to $130,000.

    • Experience Level: Given my 5 years of experience in cybersecurity and previous roles, I believe a salary in the range of $110,000 to $120,000 is appropriate...

  • Answered by AI
  • Q6. Will you join us or look for other opportunities
  • Q7. How you will ensure you are up to date with latest developments in your field (it was informed that currently there is no mentorship at organisation and hence the question)
  • Ans. 

    Staying updated as a Security Engineer involves continuous learning through various resources and community engagement.

    • Online Courses: Enroll in platforms like Coursera or Udemy for courses on the latest security technologies and practices.

    • Webinars and Conferences: Attend industry webinars and conferences such as Black Hat or DEF CON to learn from experts and network.

    • Security Blogs and Podcasts: Follow reputable securi...

  • Answered by AI
  • Q8. Are you flexible with the shifts if you have to work on that basis
  • Ans. 

    I am flexible with shifts and understand the importance of adaptability in a security role to ensure continuous protection.

    • Availability: I can adjust my schedule to meet the demands of the job, whether it requires night shifts or weekends.

    • Past Experience: In my previous role, I often covered shifts for colleagues, ensuring that security protocols were always upheld.

    • Team Support: I believe that being flexible with shift...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for LanzeIntegra Technologies Security Engineer interview:
  • Web Application Testing
  • API Testing
  • Cyber Security
  • Standards
  • Communication Skills
  • Identity and Access Management
  • Shell Scripting
Interview preparation tips for other job seekers - Be prepared in the interview and read your resume thoroughly. Brush your skills (both hard and soft). Don't exaggerate or over emphasize. Wear neat and nice fit clothes if going for on site interview. Project yourself as eager learner, self motivated worker and a team player. Be confident in your replies and take the disagreement lightly without getting your patience affected.

Have a proper sleep (as per your need to look fresh and keep mind active) and have plenty of water too for keeping your throat hydrated

Skills evaluated in this interview

Top trending discussions

View All
Interview Tips & Stories
6d (edited)
a team lead
Why are women still asked such personal questions in interview?
I recently went for an interview… and honestly, m still trying to process what just happened. Instead of being asked about my skills, experience, or how I could add value to the company… the questions took a totally unexpected turn. The interviewer started asking things like When are you getting married? Are you engaged? And m sure, if I had said I was married, the next question would’ve been How long have you been married? What does my personal life have to do with the job m applying for? This is where I felt the gender discrimination hit hard. These types of questions are so casually thrown at women during interviews but are they ever asked to men? No one asks male candidates if they’re planning a wedding or how old their kids are. So why is it okay to ask women? Can we please stop normalising this kind of behaviour in interviews? Our careers shouldn’t be judged by our relationship status. Period.
Got a question about LanzeIntegra Technologies?
Ask anonymously on communities.

Interview questions from similar companies

I applied via Company Website and was interviewed before Feb 2020. There was 1 interview round.

Interview Questionnaire 

2 Questions

  • Q1. They asked about dbms questions in the form of table formate
  • Q2. They asked code for some python program

Interview Preparation Tips

Interview preparation tips for other job seekers - Firstly they conducted computer based technical exam and then after qualifying that then we will go for face face interview and then lastly HR round will be held.

Security Engineer Interview Questions Asked at Other Companies

asked in Synopsys
Q1. 1. What is Cryptography? Cryptography is the practice and study o ... read more
asked in Accenture
Q2. Give a practical example of Broken Authentication & authorisa ... read more
Q3. What is more important to you: procedure or end goal?
Q4. What standards are used for security testing of APIs and Web Appl ... read more
Q5. Which technologies or languages do you have knowledge about?

I applied via Job Portal and was interviewed before Dec 2019. There was 1 interview round.

Interview Questionnaire 

1 Question

  • Q1. First they ask basic questions like HTML SQL Java.

Interview Preparation Tips

Interview preparation tips for other job seekers - First we learn basics programming knowledge and we confident to attend interview and speak bold.

I applied via Naukri.com and was interviewed in Aug 2018. There was 0 interview round.

Interview Preparation Tips

General Tips: All Java basic questions will be asked including servlets and jsp even about application and web servers. To clear,1st round you should have strong core Java knowledge along with few real time examples. Collections are mandatory.
Database knowledge could be expected. RestFul and soap along with spring and spring boot, your project details and your responsibilities.
Skills: SOAP, RestFul, Spring, Springboot, Java Application Development, Java Programming, Javascript, Communication, Body Language, Problem Solving, Analytical Skills, Decision Making Skills
Duration: 1-4 weeks

I applied via Company Website and was interviewed before Jun 2020. There was 1 interview round.

Interview Questionnaire 

3 Questions

  • Q1. By Rajkumar Bharathi, I stay at Trichy
  • Q2. I have completed my B.E from kalasalingam university in 2020, with a score of 6.33
  • Q3. I am a fresher need this jobs

Interview Preparation Tips

Interview preparation tips for other job seekers - Dress for the job or company

I applied via Campus Placement and was interviewed before May 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Basic coding questions

Interview Preparation Tips

Interview preparation tips for other job seekers - Just be confident , easy to crack

I applied via Applied in more than one job portal can't remember now. and was interviewed before Jan 2020. There was 1 interview round.

Interview Questionnaire 

1 Question

  • Q1. About struts framework.

Interview Preparation Tips

Interview preparation tips for other job seekers - I had three rounds of telephonic, technical, HR, interviews, I can say this confidence is important in all aspects.
Are these interview questions helpful?

I applied via Naukri.com and was interviewed in Mar 2018. There were 5 interview rounds.

Interview Questionnaire 

3 Questions

  • Q1. Core Java, spring, hibernate,web services
  • Q2. 01:00 hour technical round
  • Q3. They will not gives the expected packages. for 3+ years experienced people they will give 3.5 lpa.

Interview Preparation Tips

Round: Test
Experience: Java related 20 questions only.

General Tips: Company is very good but if you are expecting more packages then dont go for Infosys.
Duration: 1-3 Months

I appeared for an interview before Sep 2016.

Interview Preparation Tips

Round: Test
Experience: There were 30 questions that needs to be answered and then there was this one question where we had to complete one story writing within 10 minutes with some provided sets of words that needs to be included in the story.
Tips: It's not tough and doesn't need any extra effort. You will find some website wherein you get past years tcs ques, and believe me, tcs repeats questions.
You have to have a descent typing speed as well to finish the story on time.
Duration: 50 minutes
Total Questions: 30

Round: Technical Interview
Experience: If something has to happen, it will happen. For me what happened is that whatever I knew/wanted to speak, exactly same was asked by the interviewer.
They don't have much idea about the technical stuff, whatever you say will make sence to them, provided you say that confidently.

Round: HR Interview
Experience: A lady interviewed me for this, she had a couple of routine things, for example she had rejected atleast 5 students before me as they didn't know what was trending at that given point of time. I gave the answer correctly and then she asked about family, my flexibility in working hours, etc
. And this was it.
Tips: Be calm, smile and be confident.

College Name: Priyadarshini Institute of Engineering and Technology

I appeared for an interview before Sep 2020.

Round 1 - Coding Test 

(1 Question)

Round duration - 60 minutes
Round difficulty - Easy

It was in the morning. We're provided with 60 minutes.
We're provided with desktop as it was online test.
Almost 3-4 interviewer were there.

  • Q1. 

    Leap Year Checker

    Determine if a given year, represented as an integer 'N', is a leap year.

    A leap year is defined as a year with 366 days, unlike a normal year which has 365 days.

    Input:

    The initial i...
  • Ans. 

    The task is to determine if a given year is a leap year or not.

    • Check if the year is divisible by 4, if yes then proceed to the next step.

    • If the year is divisible by 100, then it should also be divisible by 400 to be a leap year.

    • If the year satisfies the above conditions, output 'Yes', else output 'No'.

  • Answered by AI
Round 2 - Face to Face 

Round duration - 30 minutes
Round difficulty - Easy

It was in the early morning.
I was the first one who selected for the interview.
There were 4 interviewers and they all are especialist in their domain

Round 3 - HR 

Round duration - 15 minutes
Round difficulty - Medium

It was mid in the afternoon. They called me and said you're shortlisted and come to campus again.
There were 2 interviewers who talked to me and ask different questions regarding my company, my experience in college etc.
It was kind of chit chat but basically they were testing my conversation skills.

Interview Preparation Tips

Professional and academic backgroundI completed Computer Science Engineering from Banasthali University. I applied for the job as Software Engineer in PuneEligibility criteriaNo crieteriaTata Consultancy Services (TCS) interview preparation:Topics to prepare for the interview - Dtaa structure, Algorithm, Java , Operating System, C++Time required to prepare for the interview - 3 monthsInterview preparation tips for other job seekers

Tip 1 : Try to give mock interview as much as you can
Tip 2 : Good with technical skills
 

Application resume tips for other job seekers

Tip 1 : Mention good projects
Tip 2 : Any internship will be add-on

Final outcome of the interviewSelected

Skills evaluated in this interview

LanzeIntegra Technologies Interview FAQs

How many rounds are there in LanzeIntegra Technologies Security Engineer interview?
LanzeIntegra Technologies interview process usually has 4 rounds. The most common rounds in the LanzeIntegra Technologies interview process are Resume Shortlist, One-on-one Round and Technical.
What are the top questions asked in LanzeIntegra Technologies Security Engineer interview?

Some of the top questions asked at the LanzeIntegra Technologies Security Engineer interview -

  1. What is more important to you procedure or end goa...read more
  2. Tell any standard used for security testing of APIs and Web Applicati...read more
  3. Which technologies or languages you have knowledge ab...read more

Tell us how to improve this page.

Overall Interview Experience Rating

4/5

based on 1 interview experience

Difficulty level

Moderate 100%

Duration

2-4 weeks 100%
View more
LanzeIntegra Technologies Security Engineer Salary
based on 8 salaries
₹2.5 L/yr - ₹4.7 L/yr
68% less than the average Security Engineer Salary in India
View more details

LanzeIntegra Technologies Security Engineer Reviews and Ratings

based on 1 review

3.0/5

Rating in categories

3.0

Skill development

2.0

Work-life balance

1.0

Salary

1.0

Job security

1.0

Company culture

1.0

Promotions

1.0

Work satisfaction

Explore 1 Review and Rating
Security Engineer
8 salaries
unlock blur

₹2.5 L/yr - ₹4.7 L/yr

Senior Security Engineer
7 salaries
unlock blur

₹4 L/yr - ₹9.7 L/yr

Security Analyst
4 salaries
unlock blur

₹2.5 L/yr - ₹4 L/yr

HR Executive
3 salaries
unlock blur

₹2.1 L/yr - ₹4.2 L/yr

Security System Engineer
3 salaries
unlock blur

₹3.6 L/yr - ₹5 L/yr

Explore more salaries
Compare LanzeIntegra Technologies with

TCS

3.6
Compare

Accenture

3.7
Compare

Wipro

3.7
Compare

Cognizant

3.7
Compare
write
Share an Interview