Filter interviews by
I have created use cases for network monitoring, incident response, threat intelligence, and vulnerability management.
Developed use cases for detecting abnormal network traffic patterns
Created use cases for identifying and responding to security incidents
Designed use cases for leveraging threat intelligence feeds
Implemented use cases for tracking and remediating vulnerabilities
Collaborated with cross-functional teams t
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
I applied via campus placement at Narula Institute of Technology, Kolkata and was interviewed before Nov 2020. There were 5 interview rounds.
Answering questions on Java code for Fibonacci series, inheritance, polymorphism, and OOP concepts.
Fibonacci series code in Java can be written using recursion or iteration.
Inheritance is a mechanism in OOP where a class inherits properties and methods from another class.
Polymorphism is the ability of an object to take on multiple forms.
OOP concepts include encapsulation, abstraction, inheritance, and polymorphism.
posted on 22 Aug 2022
I applied via Campus Placement and was interviewed in Jul 2022. There were 4 interview rounds.
OS, DBMS, DLD, Networking, and Cryptography
Cryptography is the practice of secure communication in the presence of third parties. There are two types: symmetric and asymmetric.
Symmetric cryptography uses the same key for encryption and decryption, such as AES and DES.
Asymmetric cryptography uses a public key for encryption and a private key for decryption, such as RSA and ECC.
Other types include hashing algorithms like SHA-256 and digital signatures like DSA.
Cr...
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Referral and was interviewed before Mar 2023. There were 3 interview rounds.
Basic aptitude test at a moderate level
Understand the coding proficiency of the candidate
I applied via Recruitment Consulltant and was interviewed in Jan 2022. There was 1 interview round.
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
I applied via campus placement at Uttar Pradesh Technical University (UPTU) and was interviewed in Aug 2021. There were 3 interview rounds.
A virus is a self-replicating program that spreads by infecting other programs, while a Trojan is a program that appears harmless but actually has malicious intent.
Viruses attach themselves to clean files and spread when the infected file is executed.
Trojans are often disguised as legitimate software and trick users into installing them.
Viruses can cause damage to files and systems, while Trojans can steal data or give...
Interview experience
based on 6 reviews
Rating in categories
Security Analyst
40
salaries
| ₹3 L/yr - ₹9.2 L/yr |
Information Security Analyst
31
salaries
| ₹2.7 L/yr - ₹10 L/yr |
Senior Network Engineer
19
salaries
| ₹5.2 L/yr - ₹20 L/yr |
Network Engineer
11
salaries
| ₹4 L/yr - ₹8.4 L/yr |
Senior Network Analyst
10
salaries
| ₹4.6 L/yr - ₹11 L/yr |
TCS
Infosys
Wipro
HCLTech