i
TCS
Filter interviews by
I applied via Naukri.com and was interviewed in Mar 2024. There was 1 interview round.
Yes, I have experience in implementing SAP GRC and Security solutions.
Implemented SAP GRC Access Control to manage user access and segregation of duties
Configured SAP Security roles and authorizations to ensure data integrity
Executed SAP GRC Risk Management to identify and mitigate potential risks
Customized SAP GRC Process Control for monitoring and compliance purposes
Super user access refers to privileged access rights granted to users allowing them to perform actions beyond normal user capabilities.
Super user access is typically granted to IT administrators or system administrators.
These users have the ability to perform tasks such as configuring system settings, installing software, and managing user accounts.
Super user access should be carefully monitored and controlled to preve...
I applied via Walk-in and was interviewed in Apr 2024. There was 1 interview round.
posted on 5 Jul 2024
I applied via Recruitment Consulltant and was interviewed in Jun 2024. There was 1 interview round.
Yes, I have worked on GRC Access control implementation.
Implemented GRC Access Control for managing user access to critical systems and data
Configured and maintained user roles, authorization profiles, and segregation of duties (SoD) rules
Performed risk analysis and remediation for access violations
Provided training and support to end users on GRC Access Control functionalities
User buffer is a temporary storage area in memory used to hold user input before processing.
User buffer is used to store user input temporarily before processing it.
It helps in managing and processing user input efficiently.
User buffer can be used in various applications like data entry forms, command line interfaces, etc.
SAP Fiori is a user experience (UX) for SAP software, while SAP UI5 is a framework for developing web applications.
SAP Fiori is a collection of apps with a simple and easy-to-use interface.
SAP UI5 is a development toolkit for building web applications with HTML5 and JavaScript.
SAP Fiori is more focused on providing a seamless user experience, while SAP UI5 is more about development tools and frameworks.
SAP Fiori apps c...
posted on 10 Jun 2024
I applied via LinkedIn and was interviewed in Dec 2023. There was 1 interview round.
STAUTHTRACE is used for authorization trace while ST01 is used for system trace in SAP.
STAUTHTRACE is used to trace authorization checks in SAP system.
ST01 is used to trace all the activities happening in the SAP system.
STAUTHTRACE helps in identifying authorization issues while ST01 helps in monitoring system activities.
Example: Use STAUTHTRACE to trace authorization failures during a user's attempt to access a transa...
The app may not be assigned to the user's role in the Fiori launchpad.
Check if the app is assigned to the user's role in the Fiori launchpad configuration.
Ensure that the user has the necessary authorizations to access the app.
Verify if the app is hidden or disabled in the launchpad settings.
Check if there are any errors or issues with the app that are preventing it from being displayed.
posted on 8 May 2024
Role tables in SAP GRC and Security Consultant are used to define roles and their associated authorizations.
Role tables store information about roles, including role name, description, and associated authorizations.
Roles are assigned to users to grant them access to specific functions or data within the SAP system.
Examples of role tables in SAP GRC and Security Consultant include AGR_1251 (Role Names) and AGR_1252 (Rol
For example, a ₹10 LPA CTC could mean an in-hand salary of ₹70,000–₹75,000 per month, depending on deductions and benefits.
✨ 𝗣𝗿𝗼 𝗧𝗶𝗽: Always request a detailed salary structure during negotiations—it’s your roadmap to making informed decisions
𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!
We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
I applied via Walk-in and was interviewed in Dec 2024. There were 4 interview rounds.
About my Background and my job
About my physical experience
Confirm the job on my capabilities
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Security refers to measures taken to protect people, property, and information from harm or unauthorized access.
Security involves implementing procedures, technologies, and personnel to prevent and respond to threats
Examples include surveillance cameras, access control systems, security guards, and cybersecurity measures
Security measures can vary depending on the specific needs and risks of a particular environment or
Security officers are essential in the industry to protect people, property, and assets from potential threats and ensure a safe environment.
Prevent unauthorized access to facilities
Monitor surveillance cameras and alarms
Respond to emergencies and incidents
Enforce safety and security policies
Provide a visible deterrent to potential criminals
Vehicles are checked before entering the gate by security officers for safety and security purposes.
Check for valid identification and authorization to enter the premises
Inspect the vehicle for any suspicious items or signs of tampering
Verify the purpose of the visit and destination within the premises
Use mirrors to check the undercarriage of the vehicle for any hidden objects
Check the trunk and interior of the vehicle
Vehicles are checked at the gate by security officers for safety and security purposes.
Security officers visually inspect vehicles for any suspicious items or behavior
Security officers may use mirrors to check the undercarriage of vehicles for hidden items
Security officers may use metal detectors to check for weapons or other prohibited items
Security officers may ask drivers to open trunks or other compartments for ins
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular ...
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall pol...
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
based on 4 reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
67.7k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
AST Consultant
51k
salaries
| ₹8 L/yr - ₹25 L/yr |
Assistant System Engineer
29.8k
salaries
| ₹2.2 L/yr - ₹5.6 L/yr |
Associate Consultant
28.6k
salaries
| ₹8.9 L/yr - ₹31.8 L/yr |
Amazon
Wipro
Infosys
Accenture