Filter interviews by
I applied via Company Website and was interviewed before Dec 2020. There was 1 interview round.
I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from another class.
Encapsulation is the practice of hiding data and methods within a class.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Example...
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
I applied via Referral and was interviewed before Nov 2019. There were 3 interview rounds.
SIEM stands for Security Information and Event Management. It is a software solution that helps organizations to detect and respond to security threats.
SIEM collects and analyzes security-related data from various sources such as network devices, servers, and applications.
It correlates the data to identify patterns and anomalies that may indicate a security breach.
SIEM provides real-time alerts and reports to security ...
I applied via Referral and was interviewed before Aug 2022. There were 3 interview rounds.
General aptitude test - Quant, DI/LR, English
I applied via Campus Placement and was interviewed in Apr 2024. There were 3 interview rounds.
Asked about Reasoning, English, Computer networks, Database Management system, Electronics
15 min discussion on any topic given on the spot, 1 min for thinking
Cloud computing is the delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.
Cloud computing allows users to access and store data and applications on remote servers instead of on their local devices.
It offers scalability, flexibility, cost-effectiveness, and the ability to access resources from anywhere with an internet connection.
Exa...
OOPs concepts refer to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation detail
I applied via LinkedIn and was interviewed in Feb 2021. There were 3 interview rounds.
Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Cyber security involves a range of technologies, processes, and practices designed to safeguard digital assets.
It includes measures such as firewalls, antivirus software, encryption, and intrusion detection systems.
Cyber security al...
Phishing attack is a type of social engineering attack where attackers trick victims into revealing sensitive information.
Phishing attacks can be carried out through emails, phone calls, or text messages.
Attackers often use fake websites or login pages to steal login credentials.
Phishing attacks can also be used to distribute malware or ransomware.
Examples of phishing attacks include spear phishing, whaling, and vishin...
To identify the genuine mail, check the sender's email address and verify the content and attachments.
Check the sender's email address for any discrepancies or variations.
Verify the content of the email for any grammatical errors or suspicious requests.
Check the attachments for any malware or suspicious file types.
Contact the sender directly to confirm the authenticity of the email.
Use email filtering and anti-phishing...
The constantly evolving nature of cyber threats and the challenge of staying ahead of them excites me about cyber security.
The thrill of solving complex puzzles and identifying vulnerabilities
The opportunity to work with cutting-edge technology and tools
The sense of purpose in protecting individuals and organizations from cyber attacks
The potential for continuous learning and professional growth
Examples: discovering a ...
To make the system secure from a user point of view, I would implement strong authentication measures and educate users on safe browsing habits.
Implement multi-factor authentication
Enforce strong password policies
Regularly update and patch software
Provide security awareness training to users
Restrict user access to sensitive data
Monitor user activity for suspicious behavior
I applied via Campus Placement and was interviewed in Aug 2023. There were 2 interview rounds.
There was group of 5 people in the gd and the topic was Electric Vehicles
20 minutes were given to conclude the gd
I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.
based on 4 reviews
Rating in categories
SOC Analyst
35
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Analyst Trainee
15
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Analyst
14
salaries
| ₹0 L/yr - ₹0 L/yr |
Soc Analyst Trainee
11
salaries
| ₹0 L/yr - ₹0 L/yr |
Soc Analyst 1
10
salaries
| ₹0 L/yr - ₹0 L/yr |
KPMG India
Deloitte
PwC
Ernst & Young