i
Filter interviews by
Cross site scripting is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Cross site scripting (XSS) occurs when an attacker injects malicious scripts into web pages viewed by other users.
Lateral movement in an attack scenario involves an attacker moving horizontally across a network to gain access to different systems.
Attackers can use lateral movem...
What people are saying about Optiv Security India Private Limited
Optiv Security India Private Limited interview questions for popular designations
I applied via Campus Placement
Cant share for confidential reasons
Cant share for confidential reasons sorry
Nat behavior while accessing Google is to search for information, browse websites, and possibly interact with ads.
Typing search queries in the search bar
Clicking on search results to visit websites
Interacting with ads displayed on the search results page
Cyber attack kill chain is a framework that describes the stages of a successful cyber attack.
The kill chain consists of several stages including reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
Each stage represents a step in the attacker's process and can be used to identify and prevent attacks.
For example, in the reconnaissance stage, attackers gathe...
Mitre attack is a framework for identifying and categorizing common attack techniques used by adversaries.
Mitre attack provides a standardized way of describing and communicating about cyber threats.
It includes a list of tactics and techniques used by attackers, as well as examples of real-world attacks.
The framework is used by security professionals to assess their organization's security posture and identify areas fo...
I applied via Naukri.com and was interviewed before Jan 2023. There was 1 interview round.
I applied via Naukri.com and was interviewed before Oct 2022. There were 4 interview rounds.
I applied via LinkedIn and was interviewed before May 2022. There were 4 interview rounds.
I am excited to work for your company because of its reputation for innovation and commitment to excellence.
I have researched your company and am impressed by the innovative solutions you provide to clients.
I am excited about the opportunity to work with a team of professionals who are committed to excellence.
I believe that my skills and experience align well with the needs of your organization.
I am looking for a chall...
I faced problems related to data analysis and communication, and I resolved them by improving my skills and seeking feedback.
I struggled with analyzing complex data sets, but I took courses and practiced using software like Excel and Tableau to improve my skills.
I had difficulty communicating technical information to non-technical stakeholders, so I sought feedback and adjusted my approach to be more clear and concise.
...
Service-oriented solutions focus on continuous monitoring and response, while product-oriented solutions rely on implementing security measures through hardware and software.
Service-oriented solutions involve ongoing monitoring of systems and networks to detect and respond to threats in real-time.
Examples of service-oriented solutions include managed security services, threat intelligence platforms, and security inform...
Key man problem in cybersecurity refers to the risk of a single person having too much access or knowledge, making them a single point of failure.
Key man problem arises when a single person has access to critical systems or information
If that person leaves or is unavailable, it can cause significant disruption or security breaches
This can be mitigated by implementing proper access controls and knowledge sharing among t...
I applied via Naukri.com and was interviewed before Jan 2022. There were 3 interview rounds.
Application assessment , report development
In my previous role as a Consultant, I successfully completed multiple projects and received positive recommendations.
Managed a project for a multinational company, delivering a cost-saving solution that increased efficiency by 20%.
Received recommendations from clients for my strong analytical skills and ability to provide innovative solutions.
Collaborated with cross-functional teams to implement a new software system,...
Some of the top questions asked at the Optiv Security India Private Limited interview -
based on 11 interviews
Interview experience
based on 68 reviews
Rating in categories
4-8 Yrs
Not Disclosed
4-7 Yrs
₹ 26-30.6 LPA
8-10 Yrs
₹ 15-18 LPA
Principal Engineer
29
salaries
| ₹22.5 L/yr - ₹41 L/yr |
Senior Engineer
24
salaries
| ₹15 L/yr - ₹24.2 L/yr |
Threat Analyst
23
salaries
| ₹6 L/yr - ₹16.5 L/yr |
Security Analyst
21
salaries
| ₹5.4 L/yr - ₹19 L/yr |
Analyst 1
21
salaries
| ₹6 L/yr - ₹10 L/yr |
Softenger
Foray Software
Nelito System
Black Knight