Filter interviews by
I appeared for an interview in Dec 2022.
False positives in SIEM
Misconfigured rules triggering alerts
Legitimate traffic being flagged as malicious
Inaccurate threat intelligence data
Inadequate correlation rules
Outdated signatures or patterns
Cyber kill chain is a framework that describes the stages of a cyber attack.
It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
The goal is to identify and disrupt the attack at an early stage.
For example, if an attacker is in the reconnaissance stage, organizations can implement measures to detect and prevent the attacker from...
Top trending discussions
I applied via Referral and was interviewed before Jan 2024. There were 3 interview rounds.
They gave us to write a short aptitude
I have learned various analytical techniques, communication skills, and how to work effectively in a team.
Learned how to conduct data analysis using tools like Excel, SQL, and Python
Improved communication skills through presenting findings to stakeholders
Collaborated with team members on projects to achieve common goals
I came to know about your company through a job search website.
I found your company listed on Indeed while searching for job opportunities.
A friend recommended your company to me and I looked it up online.
I saw a job posting from your company on LinkedIn and decided to apply.
I attended a career fair where your company had a booth and learned more about it there.
I can join for work within 2 weeks of receiving an offer.
I can start within 2 weeks of receiving an offer.
I need to give notice to my current employer.
I may need time to relocate if necessary.
posted on 2 May 2024
I applied via Walk-in and was interviewed in Nov 2023. There were 2 interview rounds.
It was a basic aptitude test with a technical topic essay
VAPT stands for Vulnerability Assessment and Penetration Testing, while Bug Bounty is a program that rewards individuals for finding and reporting bugs in a company's software.
Vulnerability Assessment involves identifying and assessing vulnerabilities in a system or network.
Penetration Testing involves simulating cyber attacks to identify security weaknesses that could be exploited by real attackers.
Bug Bounty programs...
posted on 19 Oct 2021
I applied via Naukri.com and was interviewed before Oct 2020. There were 3 interview rounds.
I will use a combination of messaging systems, data replication, and versioning to ensure consistency and availability.
Use messaging systems like Kafka or RabbitMQ to ensure reliable communication between systems
Implement data replication to ensure that data is available on multiple nodes
Use versioning to ensure that all nodes are working with the same data
Implement conflict resolution strategies to handle conflicts th...
I applied via Campus Placement and was interviewed before Sep 2019. There were 5 interview rounds.
C is a programming language used to create software and operating systems.
C is a low-level language that allows direct access to computer hardware.
It is used to create efficient and fast programs.
C is the foundation for many other programming languages such as C++, Java, and Python.
Examples of C programs include operating systems, device drivers, and video games.
My hobbies include hiking, photography, and cooking.
Hiking: I enjoy exploring nature trails and challenging myself physically.
Photography: I love capturing beautiful moments and landscapes through my camera lens.
Cooking: I find joy in experimenting with new recipes and creating delicious meals for my friends and family.
I applied via Referral and was interviewed before Jun 2023. There were 2 interview rounds.
Matrix and logical assigment questions
Coding question on DSA
posted on 25 Jan 2023
I applied via AmbitionBox and was interviewed in Dec 2022. There were 4 interview rounds.
Basic grammer, maths questions,
I am a software engineer with experience in developing and maintaining software applications.
Proficient in programming languages such as Java, C++, and Python
Experience in developing web applications using frameworks like Spring and Django
Strong problem-solving and analytical skills
Familiarity with version control systems like Git
Ability to work in a team and collaborate effectively
I am open to discussing salary based on the responsibilities and requirements of the position.
I am flexible and open to negotiation.
I am looking for a competitive salary based on my skills and experience.
I am interested in discussing the overall compensation package, including benefits and bonuses.
I am open to considering other forms of compensation, such as stock options or profit sharing.
I would like to learn more ab...
posted on 28 Feb 2022
I applied via Naukri.com and was interviewed in Jan 2022. There were 3 interview rounds.
To create a complete schema for a hotel, you need to consider various entities like rooms, guests, reservations, staff, amenities, etc.
Entities to include: rooms, guests, reservations, staff, amenities, invoices, payments
Relationships between entities: guest stays in a room, staff manages reservations, amenities are available in rooms
Attributes for each entity: room number, guest name, reservation date, staff ID, ameni
based on 2 interviews
Interview experience
based on 8 reviews
Rating in categories
Associate Consultant
86
salaries
| ₹3.9 L/yr - ₹15.5 L/yr |
Security Analyst
59
salaries
| ₹2.5 L/yr - ₹8.4 L/yr |
Senior Security Analyst
23
salaries
| ₹4 L/yr - ₹14 L/yr |
Senior Associate Consultant
19
salaries
| ₹7 L/yr - ₹22.5 L/yr |
SOC Analyst
14
salaries
| ₹3 L/yr - ₹6.1 L/yr |
Subex
Innovatiview India Ltd
Watchyourhealth.com
Zeta