Filter interviews by
Be the first one to contribute and help others!
posted on 16 Dec 2024
I applied via Referral and was interviewed in Jun 2024. There were 3 interview rounds.
I have handled high and critical alerts related to malware infections, data breaches, and phishing attacks.
Identifying the source and scope of the alert
Isolating affected systems to prevent further damage
Implementing security patches and updates
Conducting forensic analysis to determine the extent of the breach
Collaborating with IT teams to strengthen security measures
SIEM tool architecture includes data collection, normalization, correlation, and reporting components.
Data collection: Gathers security data from various sources like logs, network traffic, and endpoints.
Normalization: Standardizes the collected data into a common format for analysis.
Correlation: Identifies patterns and relationships in the data to detect security incidents.
Reporting: Generates reports and alerts based...
I applied via campus placement at Birla Institute of Technology and Science (BITS), Pilani and was interviewed in Sep 2024. There was 1 interview round.
I am a skilled DOT NET Developer with 5 years of experience in developing web applications and software solutions.
5 years of experience in DOT NET development
Proficient in developing web applications and software solutions
Strong knowledge of C#, ASP.NET, MVC, and SQL Server
Experience with front-end technologies like HTML, CSS, and JavaScript
Familiar with Agile development methodologies
I have worked on various projects including e-commerce websites, inventory management systems, and data analysis tools.
Developed e-commerce website using ASP.NET MVC and SQL Server for backend
Implemented inventory management system using C# and Entity Framework
Created data analysis tool using LINQ and JavaScript for frontend
OOPS concepts used in projects include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Reusing code by creating a new class based on an existing class.
Encapsulation: Restricting access to certain components of an object.
Polymorphism: Objects of different classes can be treated as objects of a common superclass.
Abstraction: Hiding the implementation details and showing only the necessary features.
SQL is a programming language used for managing and manipulating databases.
SQL stands for Structured Query Language
It is used to communicate with databases to perform tasks like querying data, updating data, and creating databases
Common SQL commands include SELECT, INSERT, UPDATE, DELETE
SQL is used in various database management systems like MySQL, SQL Server, Oracle
I applied via Company Website and was interviewed in Nov 2024. There was 1 interview round.
I applied via Referral and was interviewed in Nov 2024. There was 1 interview round.
I applied via Referral and was interviewed in Jul 2024. There were 3 interview rounds.
Simple java questions, one coding question and one design question
Visitor pattern is a design pattern where a visitor class is used to perform operations on elements of a data structure.
Visitor pattern allows adding new operations to existing classes without modifying them
It separates the algorithm from the object structure on which it operates
Commonly used in compilers, interpreters, and other complex systems
Calculate sum of elements at 1st position in each array using Java 8.
Use Java 8 stream to map each array to its 1st element and then sum them up.
Example: {{1,2},{1,3},{5,6}} -> 1 + 1 + 5 = 7
Thread collector class to manage and organize threads in a system
Create a ThreadCollector class with methods to add, remove, and retrieve threads
Implement a data structure like a list or queue to store the threads
Ensure thread safety by using synchronization mechanisms like locks or semaphores
Volatile refers to a type of memory storage that is temporary and can change frequently.
Volatile memory loses its data when power is turned off, unlike non-volatile memory.
Volatile memory is commonly used for temporary storage of data that needs to be quickly accessed and modified.
Examples of volatile memory include RAM (Random Access Memory) in computers and cache memory in processors.
Use the DISTINCT keyword in a SELECT statement to remove duplicates from a table.
Use the SELECT DISTINCT statement to retrieve unique rows from a table.
For example: SELECT DISTINCT column_name FROM table_name;
Another way is to use the GROUP BY clause with the COUNT() function to remove duplicates.
For example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name;
Seeking new challenges and opportunities for growth.
Desire for new challenges and opportunities
Looking for career advancement
Seeking a more innovative and dynamic work environment
posted on 13 Dec 2024
posted on 6 Nov 2024
I applied via Referral
The mutual fund industry size refers to the total value of assets under management by mutual funds.
The size of the mutual fund industry can be measured by the total assets under management (AUM) of all mutual funds.
It includes both equity and debt mutual funds, as well as other types like money market funds.
The industry size can vary greatly depending on market conditions and investor sentiment.
As of 2021, the global m...
based on 32 reviews
Rating in categories
Assistant Manager
13
salaries
| ₹3.6 L/yr - ₹5.2 L/yr |
Manager
9
salaries
| ₹5.7 L/yr - ₹8.6 L/yr |
Relationship Executive
7
salaries
| ₹2 L/yr - ₹4.8 L/yr |
Back Office Executive
6
salaries
| ₹1 L/yr - ₹2.5 L/yr |
Senior Manager
6
salaries
| ₹8.1 L/yr - ₹9.1 L/yr |
Edelweiss
Bajaj Capital
Kotak Mahindra Bank
HDFC Bank