Filter interviews by
I appeared for an interview before Feb 2023.
Expected CTC will depend on the company's salary structure and my qualifications and experience.
Expected CTC will be based on the company's salary range for the position
My qualifications and experience will also play a role in determining the expected CTC
I am open to discussing and negotiating the CTC based on the overall compensation package offered
Top trending discussions
I applied via Company Website and was interviewed in Oct 2020. There were 3 interview rounds.
I applied via Company Website and was interviewed before Jan 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Jan 2021. There were 4 interview rounds.
Manager related
I appeared for an interview in Sep 2020.
I applied via Company Website and was interviewed in Apr 2024. There were 2 interview rounds.
Gear box replacement work
Belt clamping take-up pulley up and blumber block top cover open and slue Barring remove and new slue Barring checking and replace and bolts nut tightening sure and top cover fixed and bolts nut tightening sure and belt clamping and tackup pulley down and paper work cancelled and conveyer belt running ok
Old motor bolts nut open and new motor replace and bolts nut tightening sure and Dayal gauge eliminate process ok and paper work cancelled and conveyer belt running ok
Walked away clean and fresh and bolts nut open and old gear box remove and new gear box replace and bolts nut tightening sure and Dayal gauge eliminate process ok paper work cancelled and conveyer belt running ok
I applied via Naukri.com and was interviewed before Nov 2021. There were 4 interview rounds.
I applied via Company Website and was interviewed before Feb 2022. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Jan 2022. There were 3 interview rounds.
Man in the middle attack is a type of cyber attack where the attacker intercepts communication between two parties.
The attacker intercepts communication between two parties and can eavesdrop or alter the communication
It can be done through various methods such as ARP spoofing, DNS spoofing, etc.
It can be prevented by using encryption, digital signatures, and secure communication protocols
SIEM tools are used for security information management and event management.
SIEM tools collect and analyze security-related data from various sources
They provide real-time monitoring and alerting of security incidents
Examples of SIEM tools include Splunk, IBM QRadar, and LogRhythm
Yes, I am willing to relocate for the position of Assistant Manager.
I am open to new opportunities and challenges in my career.
I understand that this is a wfo mode and relocation may be necessary.
I am willing to relocate to ensure the success of the company and my own career growth.
I have experience in relocating for work in the past and am comfortable with the process.
I applied via Company Website and was interviewed in Nov 2021. There were 2 interview rounds.
based on 1 interview
Interview experience
Safety Officer
8
salaries
| ₹2.7 L/yr - ₹4.8 L/yr |
Senior Engineer
5
salaries
| ₹12 L/yr - ₹23 L/yr |
Deputy Manager
5
salaries
| ₹23 L/yr - ₹29.4 L/yr |
Finance Coordinator
5
salaries
| ₹2.7 L/yr - ₹6.1 L/yr |
Safety Engineer
5
salaries
| ₹3.6 L/yr - ₹6.4 L/yr |
Suzlon Group
Adani Group
NTPC
Torrent Power