Filter interviews by
I applied via Referral and was interviewed before May 2022. There were 3 interview rounds.
Top trending discussions
posted on 16 May 2024
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization controls access to resources based on the authenticated user's permissions.
Solid principles refer to a set of object-oriented design principles like Single Responsibility Principle, Open/Clos
posted on 28 Mar 2024
It was easy test on Exam.
posted on 8 Sep 2023
I applied via Approached by Company and was interviewed before Sep 2022. There were 3 interview rounds.
IT security is crucial to protect sensitive data, prevent cyber attacks, ensure compliance, and maintain trust with customers.
Protects sensitive data from unauthorized access or theft
Prevents cyber attacks such as malware, ransomware, and phishing
Ensures compliance with regulations and standards like GDPR, HIPAA, and PCI DSS
Maintains trust with customers by safeguarding their information
Examples: Implementing firewalls...
I applied via Naukri.com and was interviewed before Jan 2023. There were 2 interview rounds.
posted on 16 May 2024
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization controls access to resources based on the authenticated user's permissions.
Solid principles refer to a set of object-oriented design principles like Single Responsibility Principle, Open/Clos
posted on 28 Mar 2024
It was easy test on Exam.
posted on 8 Sep 2023
I applied via Approached by Company and was interviewed before Sep 2022. There were 3 interview rounds.
IT security is crucial to protect sensitive data, prevent cyber attacks, ensure compliance, and maintain trust with customers.
Protects sensitive data from unauthorized access or theft
Prevents cyber attacks such as malware, ransomware, and phishing
Ensures compliance with regulations and standards like GDPR, HIPAA, and PCI DSS
Maintains trust with customers by safeguarding their information
Examples: Implementing firewalls...
I applied via Naukri.com and was interviewed before Jan 2023. There were 2 interview rounds.
based on 6 reviews
Rating in categories
Software Engineer
141
salaries
| ₹9.3 L/yr - ₹30 L/yr |
Senior Software Engineer
51
salaries
| ₹12.6 L/yr - ₹35.3 L/yr |
Software Developer
34
salaries
| ₹4.8 L/yr - ₹16.8 L/yr |
Associate Software Engineer
27
salaries
| ₹7 L/yr - ₹13.5 L/yr |
Advanced Software Engineer
25
salaries
| ₹16.4 L/yr - ₹35 L/yr |
Bosch
TCS
Wipro
Infosys