i
Prochant
Filter interviews by
Be the first one to contribute and help others!
I appeared for an interview before May 2016.
Intern is a leading company in the tech industry, specializing in software development and digital solutions.
Specializes in software development and digital solutions
Known for innovative projects and cutting-edge technology
Offers internship opportunities for students and recent graduates
I appeared for an interview in Feb 2017.
Intern is a leading company in the tech industry, specializing in software development and digital solutions.
Specializes in software development and digital solutions
Known for innovative projects and cutting-edge technology
Offers internship opportunities for students and recent graduates
I applied via Walk-in and was interviewed before Apr 2020. There was 1 interview round.
I applied via Company Website
Netscribes is a research and analytics firm providing business solutions to global clients.
Netscribes offers market intelligence, competitive intelligence, and technology intelligence services.
I applied because of their reputation for delivering high-quality research and analytics solutions.
Their focus on innovation and technology also appealed to me.
Netscribes has worked with clients in various industries, including h
I applied via Campus Placement and was interviewed in Mar 2024. There were 3 interview rounds.
There is Hackerank Test Consist of 2 Coding questions and MCQ's.
ABOUT CLOUD, DSA, DBMS, computer science fundamentals
I applied via Company Website and was interviewed in Sep 2021. There were 2 interview rounds.
I applied via LinkedIn and was interviewed before Oct 2022. There were 2 interview rounds.
Mitre ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.
Provides a comprehensive list of tactics and techniques used by attackers
Helps organizations understand and defend against cyber threats
Used for threat intelligence, red teaming, and blue teaming
Example: Credential Dumping technique under the Credential Access tactic
A type of attack refers to a specific method used by hackers to exploit vulnerabilities in a system or network.
Common types of attacks include phishing, malware, DDoS, and SQL injection
Attackers may use social engineering tactics to trick users into revealing sensitive information
Security measures such as firewalls, antivirus software, and encryption can help prevent attacks
Senior Process Associate
331
salaries
| ₹2 L/yr - ₹5.3 L/yr |
Process Associate
272
salaries
| ₹1 L/yr - ₹4.2 L/yr |
AR Caller
119
salaries
| ₹1.8 L/yr - ₹5 L/yr |
Quality Analyst
82
salaries
| ₹3.5 L/yr - ₹7 L/yr |
Lead Analyst
56
salaries
| ₹3 L/yr - ₹6 L/yr |
Crisil
CorroHealth infotech
Indegene
Acuity Knowledge Partners