i
Saint-Gobain
Filter interviews by
posted on 12 Apr 2023
I applied via Job Fair and was interviewed in Mar 2023. There were 2 interview rounds.
I have a strong educational background in cyber security and relevant experience in the field.
Bachelor's degree in Computer Science with a specialization in Cyber Security
Certifications in CISSP and CEH
Worked as a Cyber Security Analyst at XYZ Company for 3 years
Experience in conducting vulnerability assessments and penetration testing
Knowledge of network security protocols and tools
Strong problem-solving and analytica
As a Cyber Security Analyst, my role in the previous company was to monitor and analyze security events, investigate incidents, and implement security measures to protect the organization's systems and data.
Monitored and analyzed security events to identify potential threats and vulnerabilities.
Investigated security incidents to determine the root cause and extent of the breach.
Implemented security measures such as fir...
posted on 21 May 2024
I applied via Naukri.com and was interviewed in Apr 2024. There were 7 interview rounds.
An aptitude is a component of a competence to do a certain kind of work at a certain level. Outstanding aptitude can be considered "talent", or "skill". Aptitude is inborn potential to perform certain kinds of activities, whether physical or mental, and whether developed or undeveloped
Coding is the process of allowing humans to speak to computers. As computers only understand binary language — a series of zeros and ones — humans need to use a programming language as a translator of sorts.
Group discussion is a discussion between a group of participants on a given subject. A group discussion typically forms a part of the selection process used by organisations and educational institutions. The candidates talk about the given topic to present facts, opinions and conclusions.
An assignment is a task that someone in authority has asked you to do. The word assignment is just the noun form of the common verb assign, which you use when you want to give someone a duty or a job. When you assign something, that something is called an assignment.
Case study is an appropriate research design when you want to gain concrete, contextual, in-depth knowledge about a specific real-world subject. It allows you to explore the key characteristics, meanings, and implications of the case. Case studies are often a good choice in a
Technical skills often require specific education, such as programming languages, technical writing, or data analysis.
Programming languages: Examples include Java, Python, C++, etc.
Technical writing: Ability to write technical documentation, manuals, and reports.
Data analysis: Skills in analyzing and interpreting data using tools like Excel, SQL, or R.
OSI and TCP model are networking models that define how data is transmitted over a network. OSPF is a routing protocol used in networking.
OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application
TCP model has 4 layers: Process/Application, Host-to-Host, Internet, Network Access
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets...
posted on 12 Apr 2023
I applied via Job Fair and was interviewed in Mar 2023. There were 2 interview rounds.
I have a strong educational background in cyber security and relevant experience in the field.
Bachelor's degree in Computer Science with a specialization in Cyber Security
Certifications in CISSP and CEH
Worked as a Cyber Security Analyst at XYZ Company for 3 years
Experience in conducting vulnerability assessments and penetration testing
Knowledge of network security protocols and tools
Strong problem-solving and analytica
As a Cyber Security Analyst, my role in the previous company was to monitor and analyze security events, investigate incidents, and implement security measures to protect the organization's systems and data.
Monitored and analyzed security events to identify potential threats and vulnerabilities.
Investigated security incidents to determine the root cause and extent of the breach.
Implemented security measures such as fir...
posted on 11 Oct 2024
I applied via Approached by Company and was interviewed before Oct 2023. There were 4 interview rounds.
I have experience securing embedded systems IoT products through implementing encryption, authentication, and secure coding practices.
Implemented encryption algorithms such as AES for data protection in IoT devices
Implemented secure authentication mechanisms like two-factor authentication for user access control
Ensured secure coding practices such as input validation and buffer overflow prevention in embedded systems c...
Embedded c coding challenges
I am looking for a competitive salary based on my experience and skills. Recent job switches were due to seeking growth opportunities and challenges.
I am seeking a competitive salary that reflects my experience and skills in the cyber security field.
My recent job switches were motivated by a desire for growth opportunities and new challenges.
I believe that a fair compensation package is important for attracting and ret
posted on 23 Jun 2022
I applied via Recruitment Consulltant and was interviewed in May 2022. There was 1 interview round.
based on 1 review
Rating in categories
Team Member
495
salaries
| ₹1.2 L/yr - ₹7.8 L/yr |
Software Engineer
183
salaries
| ₹3.6 L/yr - ₹11.9 L/yr |
Key Account Manager
171
salaries
| ₹6.2 L/yr - ₹17 L/yr |
Senior Software Engineer
159
salaries
| ₹6.5 L/yr - ₹24 L/yr |
Production Engineer
136
salaries
| ₹1.9 L/yr - ₹8.6 L/yr |
Asahi India Glass
Hindustan Unilever
Asian Paints
Berger Paints