Filter interviews by
I have created use cases for network monitoring, incident response, threat intelligence, and vulnerability management.
Developed use cases for detecting abnormal network traffic patterns
Created use cases for identifying and responding to security incidents
Designed use cases for leveraging threat intelligence feeds
Implemented use cases for tracking and remediating vulnerabilities
Collaborated with cross-functional teams t
Top trending discussions
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
I applied via campus placement at Narula Institute of Technology, Kolkata and was interviewed before Nov 2020. There were 5 interview rounds.
Answering questions on Java code for Fibonacci series, inheritance, polymorphism, and OOP concepts.
Fibonacci series code in Java can be written using recursion or iteration.
Inheritance is a mechanism in OOP where a class inherits properties and methods from another class.
Polymorphism is the ability of an object to take on multiple forms.
OOP concepts include encapsulation, abstraction, inheritance, and polymorphism.
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Referral and was interviewed before Mar 2023. There were 3 interview rounds.
Basic aptitude test at a moderate level
Understand the coding proficiency of the candidate
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
I applied via Naukri.com and was interviewed in Jul 2022. There were 4 interview rounds.
based on 6 reviews
Rating in categories
Security Analyst
40
salaries
| ₹3 L/yr - ₹9.2 L/yr |
Information Security Analyst
31
salaries
| ₹2.7 L/yr - ₹10 L/yr |
Senior Network Engineer
19
salaries
| ₹5.2 L/yr - ₹20 L/yr |
Network Engineer
11
salaries
| ₹4 L/yr - ₹8.4 L/yr |
Senior Network Analyst
10
salaries
| ₹4.6 L/yr - ₹11 L/yr |
TCS
Infosys
Wipro
HCLTech