Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Oct 2023. There were 2 interview rounds.
Over 10 years of experience in security consulting, specializing in risk assessment and mitigation strategies.
10+ years of experience in security consulting
Specialize in risk assessment and mitigation strategies
Implemented security measures for various clients
Developed security policies and procedures
Conducted security audits and assessments
The Microsoft security stack includes a range of tools and services designed to protect against cyber threats.
Includes tools like Microsoft Defender for Endpoint, Azure Security Center, and Microsoft 365 Defender
Provides threat protection, detection, and response capabilities
Integrates with other Microsoft products and services for comprehensive security
Offers advanced analytics and AI-driven security features
Helps org...
The process involves planning, designing, and implementing security measures with the help of diagrams.
Start by identifying security requirements and risks
Create a detailed design diagram outlining security controls and configurations
Implement the designed security measures according to the diagram
Regularly review and update the design diagram to adapt to changing threats
Examples: Network security diagram, access contr
Top trending discussions
I applied via Naukri.com and was interviewed in Oct 2023. There were 3 interview rounds.
I applied via Job Fair and was interviewed in Dec 2024. There were 3 interview rounds.
Questions regarding the fundamentals of cybersecurity, including arithmetic operations and logical reasoning.
Easy 20 questions we need to complete in 30 mins.
posted on 4 Sep 2024
OSPF (Open Shortest Path First) is a routing protocol that uses link-state routing algorithm to determine the best path for data packets.
OSPF routers exchange link-state advertisements (LSAs) to build a topology map of the network.
Each router calculates the shortest path to each network based on the information in the LSAs.
OSPF uses cost as a metric to determine the best path, with lower cost paths being preferred.
OSPF...
BGP parameter refers to the various attributes and settings used in the Border Gateway Protocol for routing decisions.
BGP parameters include attributes like AS path, next hop, local preference, and MED.
These parameters help BGP routers make decisions on the best path to reach a destination.
Examples of BGP parameters are weight, local preference, and community values.
Network works and implements parts refer to the components and protocols involved in the functioning of a network.
Network devices such as routers, switches, firewalls, and access points work together to facilitate communication.
Protocols like TCP/IP, DNS, DHCP, and SSL/TLS are implemented to ensure data transmission and security.
Network segmentation, VLANs, and VPNs are used to separate and secure different parts of a ...
A DNS server is a computer server that contains a database of public IP addresses and their associated hostnames.
Translates domain names to IP addresses
Resolves queries from clients
Helps in navigating the internet by mapping domain names to IP addresses
The Qualys agent is a lightweight software installed on endpoints to collect security data and perform security assessments.
Qualys agent is a lightweight software installed on endpoints to collect security data.
It helps in performing security assessments by scanning for vulnerabilities and compliance issues.
The agent continuously monitors the endpoint for any security threats and sends the data to the Qualys Cloud Plat...
I am a dedicated Information Security Analyst with a strong background in cybersecurity and a passion for protecting data.
Experienced in conducting security assessments and implementing security measures
Skilled in analyzing security breaches and responding effectively
Proficient in using security tools and technologies such as firewalls and encryption
Strong understanding of compliance regulations and best practices in i
Kill Chain is a cybersecurity attack model while MITRE Framework is a knowledge base for cyber threats.
Kill Chain is a step-by-step model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.
MITRE Framework is a comprehensive list of known tactics, techniques, and procedures used by cyber adversaries.
Kill Chain helps organizations understand and defend against cyber attacks, whil...
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
I am currently working as a Security Analyst, responsible for monitoring and analyzing security threats, implementing security measures, and conducting security assessments.
Monitoring and analyzing security threats to identify potential risks
Implementing security measures to protect systems and data
Conducting security assessments to identify vulnerabilities and recommend solutions
Collaborating with IT teams to ensure s...
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Involves protecting computers, servers, mobile devices, networks, and data from unauthorized access or damage
Includes implementing security measures such as firewalls, antivirus software, encryption, and multi-factor authentication
Cyber security professionals work to prevent, detect, and respond to cyber threats
Examples of cyb...
posted on 22 Jul 2024
I applied via Company Website and was interviewed before May 2023. There was 1 interview round.
SIEM works by collecting and analyzing security data to detect and respond to cyber threats. Mitre attack framework and Cyber kill chain are used to categorize and analyze attacks.
SIEM collects security data from various sources like logs, network traffic, and endpoints for analysis.
Mitre attack framework provides a structured way to categorize and analyze cyber threats based on tactics and techniques used by attackers...
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
SOC Analyst
7
salaries
| ₹6.5 L/yr - ₹12.8 L/yr |
Information Security Consultant
6
salaries
| ₹11.2 L/yr - ₹42 L/yr |
Associate Security Engineer
4
salaries
| ₹4 L/yr - ₹9 L/yr |
Consultant
4
salaries
| ₹14 L/yr - ₹53 L/yr |
Security Engineer
4
salaries
| ₹15 L/yr - ₹16 L/yr |
HCLTech
Wipro
Tech Mahindra
Infosys