i
Filter interviews by
Cyber attack kill chain is a framework that describes the stages of a successful cyber attack.
The kill chain consists of several stages including reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
Each stage represents a step in the attacker's process and can be used to identify and prevent attacks.
For example, in the reconnaissance stage, attackers gathe...
Mitre attack is a framework for identifying and categorizing common attack techniques used by adversaries.
Mitre attack provides a standardized way of describing and communicating about cyber threats.
It includes a list of tactics and techniques used by attackers, as well as examples of real-world attacks.
The framework is used by security professionals to assess their organization's security posture and identify areas fo...
I applied via Naukri.com and was interviewed before Oct 2022. There were 4 interview rounds.
What people are saying about Optiv Security India Private Limited
I applied via LinkedIn and was interviewed before May 2022. There were 4 interview rounds.
I am excited to work for your company because of its reputation for innovation and commitment to excellence.
I have researched your company and am impressed by the innovative solutions you provide to clients.
I am excited about the opportunity to work with a team of professionals who are committed to excellence.
I believe that my skills and experience align well with the needs of your organization.
I am looking for a chall...
I faced problems related to data analysis and communication, and I resolved them by improving my skills and seeking feedback.
I struggled with analyzing complex data sets, but I took courses and practiced using software like Excel and Tableau to improve my skills.
I had difficulty communicating technical information to non-technical stakeholders, so I sought feedback and adjusted my approach to be more clear and concise.
...
Service-oriented solutions focus on continuous monitoring and response, while product-oriented solutions rely on implementing security measures through hardware and software.
Service-oriented solutions involve ongoing monitoring of systems and networks to detect and respond to threats in real-time.
Examples of service-oriented solutions include managed security services, threat intelligence platforms, and security inform...
Key man problem in cybersecurity refers to the risk of a single person having too much access or knowledge, making them a single point of failure.
Key man problem arises when a single person has access to critical systems or information
If that person leaves or is unavailable, it can cause significant disruption or security breaches
This can be mitigated by implementing proper access controls and knowledge sharing among t...
Optiv Security India Private Limited interview questions for popular designations
I applied via Naukri.com and was interviewed before Jan 2022. There were 3 interview rounds.
Application assessment , report development
In my previous role as a Consultant, I successfully completed multiple projects and received positive recommendations.
Managed a project for a multinational company, delivering a cost-saving solution that increased efficiency by 20%.
Received recommendations from clients for my strong analytical skills and ability to provide innovative solutions.
Collaborated with cross-functional teams to implement a new software system,...
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
I applied via Campus Placement and was interviewed before Feb 2023. There was 1 interview round.
Coding Questions on one of the preffered programming language. Most importantly Data Structures and algorithms.
Quantitive question
I applied via Naukri.com and was interviewed before Mar 2021. There was 1 interview round.
based on 5 interviews
Interview experience
based on 68 reviews
Rating in categories
4-8 Yrs
Not Disclosed
5-7 Yrs
Not Disclosed
2-4 Yrs
Not Disclosed
Principal Engineer
29
salaries
| ₹22.5 L/yr - ₹41 L/yr |
Senior Engineer
25
salaries
| ₹15 L/yr - ₹26 L/yr |
Threat Analyst
23
salaries
| ₹6 L/yr - ₹16.5 L/yr |
Security Analyst
22
salaries
| ₹5.4 L/yr - ₹20 L/yr |
Analyst 1
21
salaries
| ₹6 L/yr - ₹10 L/yr |
Softenger
Foray Software
Nelito System
Black Knight