i
Mindpool Technologies
Filter interviews by
I applied via Naukri.com and was interviewed before Sep 2022. There were 2 interview rounds.
Yes, I am able to login early during SG hours.
I am comfortable with adjusting my schedule to accommodate SG hours.
I have experience working with teams in different time zones.
I am committed to meeting deadlines and being available during required hours.
To mitigate risks, I would conduct thorough risk assessments, implement risk management strategies, monitor risks regularly, and have contingency plans in place.
Conduct thorough risk assessments to identify potential risks
Implement risk management strategies to minimize the impact of risks
Regularly monitor risks to stay proactive in addressing them
Have contingency plans in place to respond effectively to unexpected ris
Top trending discussions
I applied via Monster and was interviewed before Jun 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
I applied via Walk-in
I applied via Referral and was interviewed before Dec 2023. There was 1 interview round.
I applied via Referral and was interviewed before Dec 2023. There were 3 interview rounds.
Yes, I have a laptop with Wifi connectivity.
Yes, I have a laptop with Wifi connectivity for remote work.
I use my laptop and Wifi to access necessary resources and communicate with clients.
Having Wifi connectivity allows me to work efficiently from anywhere.
Yes, I am able to travel to the office if required.
I have reliable transportation to commute to the office
I am willing to travel for work purposes
I have previous experience commuting to an office location
Hr team has some online test and their Ans are easily avlb on line you can complete 15-20 mins test in 8 to 10 min
Types of attacks include malware, phishing, DDoS, ransomware, and social engineering.
Malware attacks involve malicious software that can harm a computer system.
Phishing attacks use deceptive emails or websites to trick individuals into revealing sensitive information.
DDoS attacks overwhelm a network or server with a flood of traffic, causing it to become unavailable.
Ransomware attacks encrypt a user's files and demand ...
based on 2 interviews
Interview experience
based on 1 review
Rating in categories
Information Technology Recruiter
24
salaries
| ₹2.2 L/yr - ₹4.2 L/yr |
Senior IT Recruiter
18
salaries
| ₹3.8 L/yr - ₹5 L/yr |
Software Engineer
12
salaries
| ₹5 L/yr - ₹13 L/yr |
Software Developer
9
salaries
| ₹2.2 L/yr - ₹4 L/yr |
Senior Software Engineer
9
salaries
| ₹7.8 L/yr - ₹25.5 L/yr |
HCL Infosystems
ITSource Technologies
Karvy Innotech
Kellogg Brown and Root