i
Tesco
Filter interviews by
Clear (1)
I applied via Referral and was interviewed in Jun 2024. There were 3 interview rounds.
I am currently working as a Senior Information Security Engineer at XYZ Company.
Leading the implementation of security measures to protect the organization's computer systems and networks
Conducting regular security assessments and audits to identify vulnerabilities and risks
Developing and implementing security policies and procedures
Responding to security incidents and conducting forensic investigations
Providing securi
I would like to know about the specific responsibilities, team structure, technology stack, and opportunities for growth in this role at Tesco.
Responsibilities of the Information Security Engineer at Tesco
Team structure and collaboration within the Information Security team
Technology stack used for security measures at Tesco
Opportunities for career growth and professional development at Tesco
I am a dedicated Information Security Engineer with a strong background in cybersecurity and a passion for protecting data.
Experienced in implementing and maintaining security measures to protect networks and systems
Skilled in conducting security assessments and identifying vulnerabilities
Proficient in incident response and forensic analysis
Certified in relevant security certifications such as CISSP or CEH
Performing a security architecture review on the provided model.
Identify potential security vulnerabilities in the architecture
Evaluate the effectiveness of security controls in place
Assess the overall security posture of the system
Recommend improvements to enhance security measures
Identifying loopholes in a security model and proposing security controls to improve it.
Identify potential vulnerabilities such as weak authentication methods, lack of encryption, or inadequate access controls
Implement strong authentication measures like multi-factor authentication to prevent unauthorized access
Encrypt sensitive data both in transit and at rest to protect it from unauthorized access
Implement strict acc...
I am currently working in the domain of network security.
Designing and implementing network security measures to protect the organization's systems and data
Monitoring network traffic for potential security breaches
Conducting regular security assessments and audits to identify vulnerabilities
Responding to security incidents and implementing incident response procedures
Implementing and managing firewalls, intrusion detec
Some challenges faced everyday include keeping up with evolving threats, managing security incidents, and balancing security with usability.
Keeping up with evolving threats and vulnerabilities
Managing security incidents and responding to breaches
Balancing security measures with usability for end users
It depends on the specific security requirements and resources of the organization.
Consider the sensitivity of the data being stored and processed.
Evaluate the organization's budget and resources for maintaining security measures.
Assess the expertise of the IT team in managing security for both SaaS and on-prem solutions.
SaaS may offer better scalability and accessibility, but on-prem may provide more control over secu...
I expect my next job to provide challenging projects, opportunities for growth, a supportive team environment, and a competitive salary.
Challenging projects that allow me to utilize my skills and knowledge
Opportunities for professional growth and development
A supportive team environment where collaboration is encouraged
Competitive salary and benefits package
Work-life balance and flexibility in scheduling
Top trending discussions
I applied via Naukri.com and was interviewed in Mar 2020. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed before Jul 2020. There was 1 interview round.
I was interviewed in Oct 2016.
I applied via Campus Placement
Boundary traversal of a tree is the process of visiting the nodes on the boundary of a tree in a specific order.
The boundary traversal can be done in three steps: left boundary, leaf nodes, and right boundary.
For the left boundary, start from the root and traverse down the left side of the tree until reaching a leaf node.
For the leaf nodes, perform an inorder traversal to visit all the leaf nodes of the tree.
For the ri...
Find the nearest greater value of a given value in a Binary Search Tree (BST).
Start from the root node and compare the given value with the current node's value.
If the given value is less than the current node's value, move to the left subtree.
If the given value is greater than the current node's value, move to the right subtree.
Keep track of the closest greater value encountered while traversing the tree.
Return the cl
Given an infinite staircase with a broken kth step, find the maximum height we can reach in n rounds of jumping i steps.
We can start by jumping the maximum number of steps in each round until we reach the broken step.
After reaching the broken step, we can discard the i steps that would land us on the broken step and jump the remaining steps.
We can continue this pattern until we reach the maximum height we can reach wit
Function to check if a string of parenthesis is balanced
Use a stack to keep track of opening parenthesis
If a closing parenthesis is encountered, pop from stack and check if it matches
If stack is empty and a closing parenthesis is encountered, return False
If all parenthesis are matched and stack is empty, return True
Count the occurrences of words in a paragraph.
Split the paragraph into words using whitespace as a delimiter.
Create a dictionary to store the count of each word.
Iterate through the words and increment the count in the dictionary.
Return the dictionary with the word counts.
Find common elements out of two sorted array
Use two pointers to traverse both arrays simultaneously
Compare elements at each pointer and move the pointer of the smaller element
If elements are equal, add to common elements list and move both pointers
Stop when either pointer reaches end of array
Convert a Binary Search Tree to a Doubly Linked List.
Create a DLL node class with left, right, and data fields.
Traverse the BST in-order and add each node to the DLL.
Adjust the left and right pointers of each node to create the DLL.
Return the head of the DLL.
The task is to fill the 'next' field of each node in a binary tree to point to the next node at the same level.
Use a level order traversal to process the tree nodes.
Maintain a queue to store the nodes at each level.
For each node, set its 'next' field to the next node in the queue.
If a node is the last node at its level, set its 'next' field to NULL.
To find anagrams of a given word in a dictionary, use a hash table to store sorted versions of each word as keys and their corresponding original words as values.
Create a hash table to store the anagrams
Iterate through each word in the dictionary
Sort the characters of the word and use it as a key in the hash table
If the key already exists, add the word to the list of values for that key
Print the list of values for the
Suggest a data structure for efficient search of a string in 10 files and print line number and file if string appears more than once.
Use a hash table to store the file name and line number of each occurrence of the string.
Iterate through each file and for each line, check if the string is present and update the hash table accordingly.
Print the hash table entries for the string.
Amazon is the right place for me because of its innovative culture, vast resources, and opportunities for growth.
Amazon's innovative culture aligns with my passion for pushing boundaries and finding creative solutions.
The company's vast resources provide the necessary tools and support to develop and deliver high-quality software.
Amazon offers numerous opportunities for growth and career advancement, allowing me to con...
I applied via Referral and was interviewed in Feb 2024. There were 5 interview rounds.
Coding test in Karat platform - 1 hr duration
Some of the top questions asked at the Tesco Information Security Engineer interview -
based on 1 interview
Interview experience
Senior Associate
474
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Development Engineer II
214
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate
202
salaries
| ₹0 L/yr - ₹0 L/yr |
Team Lead
187
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
154
salaries
| ₹0 L/yr - ₹0 L/yr |
Walmart
Carrefour
Amazon
Reliance Retail