i
Optum Global Solutions
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.
Top trending discussions
I applied via Internshala
Logical thinking, verbal skills
Have to pentest a web app
Basic arrays, strings and dsa
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.
Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.
It helps organizations understand and defend against common attack patterns.
Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
I applied via AmbitionBox and was interviewed before Aug 2021. There was 1 interview round.
Arcsight & Splunk are SIEM tools used for log management and security analytics.
Arcsight is a legacy SIEM tool used for log management and security analytics.
Splunk is a modern SIEM tool used for log management, security analytics, and data visualization.
Both tools are used to collect, analyze, and correlate log data from various sources to detect security threats and incidents.
Arcsight has a complex architecture and r...
I applied via Naukri.com and was interviewed in Sep 2023. There were 2 interview rounds.
posted on 16 Sep 2022
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
Cyber attacks in network are a major threat to organizations and can cause significant damage.
Cyber attacks can come in various forms such as malware, phishing, ransomware, and DDoS attacks.
Network security measures such as firewalls, intrusion detection systems, and antivirus software can help prevent cyber attacks.
Regular security audits and employee training can also help mitigate the risk of cyber attacks.
In the ev...
Application layers in cyber security refer to the different levels of software and protocols that make up an application.
Application layer is the topmost layer in the OSI model
It includes protocols like HTTP, SMTP, FTP, etc.
Security measures at this layer include firewalls, intrusion detection systems, and web application firewalls
Vulnerabilities at this layer include SQL injection, cross-site scripting, and session hi
I applied via Company Website and was interviewed in Dec 2021. There were 8 interview rounds.
I'm attend the interview tomorrow
I applied via Recruitment Consultant and was interviewed in Sep 2021. There were 4 interview rounds.
based on 6 reviews
Rating in categories
Claims Associate
4.3k
salaries
| ₹1.6 L/yr - ₹5.6 L/yr |
Senior Software Engineer
2.8k
salaries
| ₹9.4 L/yr - ₹30 L/yr |
Software Engineer
2.6k
salaries
| ₹5.2 L/yr - ₹22 L/yr |
Senior Claims Associate
1.2k
salaries
| ₹2.1 L/yr - ₹5.8 L/yr |
Medical Coder
1.1k
salaries
| ₹1.5 L/yr - ₹8 L/yr |
Cognizant
Accenture
IBM
TCS