Filter interviews by
I was interviewed in Jun 2024.
I am a dedicated Cyber Security Analyst with a strong background in network security and threat detection.
Experienced in conducting security assessments and implementing security measures
Skilled in analyzing security incidents and responding to cyber threats
Proficient in using security tools such as SIEM, IDS/IPS, and endpoint protection
Certified in relevant cybersecurity certifications like CISSP or CEH
Seeking new challenges and opportunities for growth in the field of cyber security.
Desire to work on more advanced projects
Opportunity to learn new technologies and techniques
Seeking a more challenging and dynamic work environment
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.
Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.
It helps organizations understand and defend against common attack patterns.
Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.
I applied via Naukri.com and was interviewed in Oct 2023. There were 3 interview rounds.
I would troubleshoot the issue by checking the logs, verifying the policy rules, and ensuring proper configuration.
Check the logs to identify the specific error or issue
Verify the policy rules to ensure they are correctly configured
Check for any conflicts or overlapping rules that may be causing the failure
Ensure that the policy installation process was completed successfully
Consult with colleagues or documentation for
SIC (Security Intelligence Center) in Check Point is a centralized platform for monitoring and managing security events.
SIC collects and analyzes security data from various sources within the network
It provides real-time visibility into security incidents and alerts
SIC helps in identifying and responding to security threats effectively
It allows for centralized management of security policies and configurations
I applied via Naukri.com and was interviewed in Sep 2023. There were 2 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Jan 2022. There was 1 interview round.
I applied via Approached by Company and was interviewed before Oct 2022. There were 2 interview rounds.
posted on 18 Jan 2022
I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Jun 2021. There were 2 interview rounds.
Data Processing Analyst
694
salaries
| ₹3 L/yr - ₹4.7 L/yr |
Data Analyst
422
salaries
| ₹2.2 L/yr - ₹5.5 L/yr |
Data Processing Specialist
317
salaries
| ₹3 L/yr - ₹4.6 L/yr |
Software Engineer
227
salaries
| ₹8.8 L/yr - ₹21.7 L/yr |
Research Associate
179
salaries
| ₹2.9 L/yr - ₹5.5 L/yr |
Kantar
GfK MODE
Dun & Bradstreet
Euromonitor International