i
Techdefence
Filter interviews by
A Security Operations Center (SOC) is a centralized unit that monitors, detects, and responds to security incidents in real-time.
SOC teams consist of security analysts and engineers who monitor security systems.
They use tools like SIEM (Security Information and Event Management) to analyze security alerts.
SOC operates 24/7 to ensure continuous monitoring and rapid incident response.
For example, a SOC might respond...
XSS attack is a type of cyber attack where attackers inject malicious scripts into web pages viewed by other users.
XSS stands for Cross-Site Scripting.
Attackers inject malicious scripts into web pages viewed by other users.
These scripts can steal sensitive information, deface websites, redirect users to malicious sites, etc.
There are three types of XSS attacks: stored, reflected, and DOM-based.
Preventing XSS attac...
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection occurs when an attacker inserts malicious SQL code into input fields on a website.
This code can then manipulate the database, steal data, or perform other unauthorized actions.
Example: Entering ' OR '1'='1' into a login form to bypass authentication.
Resource flooding is a type of cyber attack where an attacker overwhelms a system with excessive requests, causing it to become slow or unresponsive.
Resource flooding is a type of denial of service (DoS) attack.
Attackers flood a system with excessive requests, such as HTTP requests or network traffic, to overwhelm its resources.
This can lead to the system becoming slow or unresponsive, disrupting normal operations...
OTP flooding is a type of cyber attack where a large number of one-time passwords are sent to a target in order to overwhelm them.
OTP flooding is a form of denial-of-service attack.
Attackers flood the target with numerous OTPs, making it difficult for the target to use their legitimate OTP.
This type of attack can be used to disrupt services or gain unauthorized access to accounts.
Examples of OTP flooding include s...
Active Directory is a directory service developed by Microsoft for Windows domain networks, providing centralized management of network resources.
Active Directory stores information about objects on the network such as computers, users, groups, and printers.
It allows administrators to manage and secure resources within the network by assigning permissions and policies.
Active Directory uses a hierarchical structure...
I prefer using a combination of COBIT and ISO 27001 frameworks for IT compliance audits.
I prefer COBIT for its comprehensive coverage of IT governance and control objectives.
I choose ISO 27001 for its focus on information security management best practices.
Combining both frameworks provides a holistic approach to IT compliance audits.
I appeared for an interview in Apr 2025, where I was asked the following questions.
A Security Operations Center (SOC) is a centralized unit that monitors, detects, and responds to security incidents in real-time.
SOC teams consist of security analysts and engineers who monitor security systems.
They use tools like SIEM (Security Information and Event Management) to analyze security alerts.
SOC operates 24/7 to ensure continuous monitoring and rapid incident response.
For example, a SOC might respond to a...
I applied via Naukri.com and was interviewed in Mar 2024. There were 2 interview rounds.
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection occurs when an attacker inserts malicious SQL code into input fields on a website.
This code can then manipulate the database, steal data, or perform other unauthorized actions.
Example: Entering ' OR '1'='1' into a login form to bypass authentication.
XSS attack is a type of cyber attack where attackers inject malicious scripts into web pages viewed by other users.
XSS stands for Cross-Site Scripting.
Attackers inject malicious scripts into web pages viewed by other users.
These scripts can steal sensitive information, deface websites, redirect users to malicious sites, etc.
There are three types of XSS attacks: stored, reflected, and DOM-based.
Preventing XSS attacks in...
OTP flooding is a type of cyber attack where a large number of one-time passwords are sent to a target in order to overwhelm them.
OTP flooding is a form of denial-of-service attack.
Attackers flood the target with numerous OTPs, making it difficult for the target to use their legitimate OTP.
This type of attack can be used to disrupt services or gain unauthorized access to accounts.
Examples of OTP flooding include sendin...
Resource flooding is a type of cyber attack where an attacker overwhelms a system with excessive requests, causing it to become slow or unresponsive.
Resource flooding is a type of denial of service (DoS) attack.
Attackers flood a system with excessive requests, such as HTTP requests or network traffic, to overwhelm its resources.
This can lead to the system becoming slow or unresponsive, disrupting normal operations.
Comm...
I applied via Approached by Company and was interviewed in Jan 2023. There were 3 interview rounds.
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
I prefer using a combination of COBIT and ISO 27001 frameworks for IT compliance audits.
I prefer COBIT for its comprehensive coverage of IT governance and control objectives.
I choose ISO 27001 for its focus on information security management best practices.
Combining both frameworks provides a holistic approach to IT compliance audits.
Active Directory is a directory service developed by Microsoft for Windows domain networks, providing centralized management of network resources.
Active Directory stores information about objects on the network such as computers, users, groups, and printers.
It allows administrators to manage and secure resources within the network by assigning permissions and policies.
Active Directory uses a hierarchical structure with...
I applied via Campus Placement and was interviewed in Apr 2023. There were 4 interview rounds.
It was related to the Soc analyst and vapt medium to hard level
I appeared for an interview before Apr 2024, where I was asked the following questions.
Standards are guidelines for best practices, while regulations are mandatory rules enforced by authorities.
Standards are often developed by organizations (e.g., ISO, ANSI) to promote quality and safety.
Regulations are legally binding and must be followed, such as environmental laws or health regulations.
Example of a standard: ISO 9001 for quality management systems.
Example of a regulation: FDA regulations for food and ...
Policies are guiding principles, while procedures are specific steps to implement those policies.
Policies provide a framework for decision-making, e.g., a company's code of conduct.
Procedures outline the specific actions to achieve policy goals, e.g., the steps for reporting misconduct.
Policies are generally broad and long-term, while procedures are detailed and often short-term.
Policies are usually established by high...
I applied via Naukri.com and was interviewed before Mar 2017. There were 2 interview rounds.
Top trending discussions
I appeared for an interview in Feb 2025, where I was asked the following questions.
Enhancing Amazon's global operation security involves proactive measures, continuous monitoring, and employee training.
Implement multi-factor authentication (MFA) for all employee accounts to reduce unauthorized access.
Conduct regular security audits and vulnerability assessments to identify and mitigate potential risks.
Enhance employee training programs on cybersecurity best practices, including phishing awareness.
Uti...
Yes, I am ready for a role in Amazon SLP India operations, bringing my skills in security analysis and operational efficiency.
Strong understanding of security protocols and risk management, ensuring compliance with industry standards.
Experience in analyzing security incidents and implementing preventive measures, such as conducting regular audits.
Proficient in using security tools and technologies, like SIEM systems, t...
I applied via Company Website and was interviewed before Oct 2020. There was 1 interview round.
IndiaMart is a leading B2B marketplace, connecting buyers and suppliers, fostering growth and innovation in the Indian economy.
Strong market presence: IndiaMart is one of the largest online B2B marketplaces in India, with millions of registered users.
Diverse product range: The platform offers a wide variety of products across multiple categories, catering to various industries.
Empowering SMEs: IndiaMart supports small ...
I possess strong analytical, communication, and teamwork skills, which I will leverage to drive success in your organization.
Analytical Skills: I excel in data analysis, demonstrated by my previous project where I improved efficiency by 20% through data-driven decisions.
Communication: I have experience presenting complex ideas clearly, as shown in my role where I led team meetings and reported to stakeholders.
Teamwork:...
I applied via Naukri.com and was interviewed before Jan 2021. There were 6 interview rounds.
In my previous role as a team leader, I managed projects, coordinated with clients, and ensured timely delivery of services.
Led a team of 10 in executing a project that increased client satisfaction by 20%.
Implemented a new project management tool that improved workflow efficiency by 30%.
Conducted regular training sessions for team members to enhance their skills and productivity.
Collaborated with cross-functional team...
I can sell you a pen by showing you how it can solve your problems and increase your productivity.
I understand that you need a pen to write down important information and ideas.
This pen has a comfortable grip and writes smoothly, making it easy to use for extended periods of time.
It also has a clip that can attach to your notebook or shirt pocket, ensuring that you always have it on hand.
By investing in this pen, you'l...
Some of the top questions asked at the Techdefence interview -
The duration of Techdefence interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 6 interview experiences
Difficulty level
Duration
based on 67 reviews
Rating in categories
Security Analyst
18
salaries
| ₹3.1 L/yr - ₹7 L/yr |
SOC Analyst
7
salaries
| ₹1.5 L/yr - ₹4 L/yr |
Soc Analyst 1
6
salaries
| ₹2.4 L/yr - ₹6.5 L/yr |
Enterprise Business Manager
6
salaries
| ₹6.5 L/yr - ₹12.6 L/yr |
SOC Analyst Intern
6
salaries
| ₹0.5 L/yr - ₹1.8 L/yr |
Amazon
Flipkart
Indiamart Intermesh
JustDial