i
Tech Mahindra
Filter interviews by
I applied via Approached by Company and was interviewed before Oct 2023. There were 2 interview rounds.
I am a Security Analyst responsible for monitoring and analyzing security threats, conducting risk assessments, and implementing security measures.
Monitor security alerts and incidents on a daily basis
Analyze security threats and vulnerabilities
Conduct risk assessments to identify potential security risks
Implement security measures to protect against cyber attacks
Collaborate with IT teams to ensure security best practi
I handle compliance in audits by ensuring all security measures are in place and regularly reviewed.
Regularly review and update security policies and procedures to ensure compliance with regulations
Conduct internal audits to identify any gaps in compliance and address them promptly
Collaborate with external auditors to provide necessary documentation and evidence of compliance
Implement security controls and measures to ...
I applied via Company Website and was interviewed in Apr 2022. There were 2 interview rounds.
Na
I applied via Naukri.com and was interviewed before Mar 2021. There were 4 interview rounds.
What people are saying about Tech Mahindra
I applied via Referral and was interviewed in Nov 2019. There were 3 interview rounds.
A Security Analyst is responsible for testing web applications, identifying vulnerabilities, and implementing security measures to protect against attacks.
Testing a web application involves various techniques such as penetration testing, vulnerability scanning, and code review.
CSRF (Cross-Site Request Forgery) is an attack that tricks a victim into performing unwanted actions on a web application.
SSRF (Server-Side Requ...
Tech Mahindra interview questions for designations
I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.
SIEM (Security Information and Event Management) tool is a software solution that aggregates and analyzes security data from various sources.
SIEM tools help in detecting and responding to security incidents in real-time.
They provide centralized visibility into an organization's security posture.
Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.
I have experience using Splunk for log management and security
Yes, I have configured policies in defender.
Yes, I have configured policies in Windows Defender to ensure proper security measures are in place.
I have set up policies for malware protection, network protection, firewall settings, and device control.
Regularly review and update policies to adapt to new threats and vulnerabilities.
Example: Configuring Windows Defender policies to block certain file types from being downlo
MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations.
MITRE ATT&CK provides a framework for understanding and categorizing cyber threats.
It consists of tactics, techniques, and procedures (TTPs) used by attackers.
Organizations can use MITRE ATT&CK to improve their threat detection and response capabilities.
Examples of MITRE ATT&CK techniques include spear ...
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Vulnerability management in cloud environment involves identifying, prioritizing, and mitigating security weaknesses.
Regularly scan cloud infrastructure for vulnerabilities
Patch and update software to address vulnerabilities
Implement access controls and encryption to protect data
Utilize security tools like intrusion detection systems and firewalls
Monitor and analyze security logs for suspicious activity
Storage maintenance in Azure involves monitoring, optimizing, and managing storage resources to ensure performance and availability.
Regularly monitor storage usage and performance metrics
Optimize storage by implementing tiered storage and data archiving
Manage access controls and permissions to prevent unauthorized access
Implement backup and disaster recovery strategies for data protection
Update storage configurations a
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
I am currently working as a Security Analyst, responsible for monitoring and analyzing security threats, implementing security measures, and conducting security assessments.
Monitoring and analyzing security threats to identify potential risks
Implementing security measures to protect systems and data
Conducting security assessments to identify vulnerabilities and recommend solutions
Collaborating with IT teams to ensure s...
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Involves protecting computers, servers, mobile devices, networks, and data from unauthorized access or damage
Includes implementing security measures such as firewalls, antivirus software, encryption, and multi-factor authentication
Cyber security professionals work to prevent, detect, and respond to cyber threats
Examples of cyb...
based on 1 interview
Interview experience
based on 51 reviews
Rating in categories
Software Engineer
26.4k
salaries
| ₹2 L/yr - ₹9.2 L/yr |
Senior Software Engineer
21.4k
salaries
| ₹5.5 L/yr - ₹23 L/yr |
Technical Lead
11.7k
salaries
| ₹9.5 L/yr - ₹38 L/yr |
Associate Software Engineer
5.4k
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Team Lead
5k
salaries
| ₹5.2 L/yr - ₹17 L/yr |
Infosys
Cognizant
Accenture
Wipro