i
LTIMindtree
Filter interviews by
Clear (1)
I applied via Campus Placement and was interviewed before Dec 2023. There were 3 interview rounds.
Aptitude, reasoning and english
Yes, I am flexible to relocate for the right opportunity.
I am open to relocating for the right job opportunity
I have relocated in the past for career advancement
I am willing to consider relocation based on the specifics of the job offer
Yes, I am flexible to shifts and can adapt to different schedules as needed.
I am willing to work different shifts, including nights and weekends
I understand the importance of being flexible in a fast-paced work environment
I have previous experience working rotating shifts in a similar role
The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.
Developed by MITRE Corporation
Provides a comprehensive list of tactics and techniques used by adversaries during cyber attacks
Used by cybersecurity professionals to improve threat detection and response
Helps organizations understand and defend against common attack patterns
Example: Credential Dumping is a
Company X experienced a data breach due to a phishing attack on employee email accounts.
Phishing attack targeted employee email accounts
Sensitive data such as customer information or financial records may have been compromised
Company X is working on improving cybersecurity measures to prevent future breaches
I applied via Naukri.com and was interviewed before Mar 2023. There were 4 interview rounds.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model helps in understanding how data is transmitted over a network.
Each layer has specific functions and interacts with adjacent layers.
Examples of OSI layers include Physical, Data Link, Network, Transport, Session, Presentation, and Application la
A SOC analyst's day-to-day activities involve monitoring and analyzing security events, investigating incidents, and responding to threats.
Monitoring security events and alerts from various sources
Analyzing and investigating potential security incidents
Responding to and mitigating security threats
Performing vulnerability assessments and penetration testing
Creating and maintaining security incident reports
Collaborating ...
I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 3 interview rounds.
I am a dedicated and detail-oriented individual with a passion for analyzing social trends and behaviors.
I have a degree in Sociology with a focus on research methods
I have experience conducting surveys and interviews to gather data
I am proficient in data analysis software such as SPSS and Excel
DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.
DDoS stands for Distributed Denial of Service
Attackers use multiple compromised systems to flood the target with traffic
Goal is to make the target inaccessible to its intended users
Common types include UDP flood, ICMP flood, and SYN flood
Examples: Mirai botnet attack
I applied via Referral and was interviewed before Jun 2023. There were 3 interview rounds.
Basic aptitude topics
Scenario based questions
I applied via Walk-in and was interviewed in Sep 2024. There was 1 interview round.
based on 1 interview
Interview experience
based on 3 reviews
Rating in categories
Senior Software Engineer
21.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
16.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
6.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Module Lead
5.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Engineer
4.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Cognizant
Capgemini
Accenture
TCS