i
U&D Square Solutions
Filter interviews by
Top trending discussions
I applied via Referral and was interviewed in Nov 2019. There were 3 interview rounds.
A Security Analyst is responsible for testing web applications, identifying vulnerabilities, and implementing security measures to protect against attacks.
Testing a web application involves various techniques such as penetration testing, vulnerability scanning, and code review.
CSRF (Cross-Site Request Forgery) is an attack that tricks a victim into performing unwanted actions on a web application.
SSRF (Server-Side Requ...
I applied via Recruitment Consultant and was interviewed in Sep 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
I am currently working as a Security Analyst, responsible for monitoring and analyzing security threats, implementing security measures, and conducting security assessments.
Monitoring and analyzing security threats to identify potential risks
Implementing security measures to protect systems and data
Conducting security assessments to identify vulnerabilities and recommend solutions
Collaborating with IT teams to ensure s...
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Involves protecting computers, servers, mobile devices, networks, and data from unauthorized access or damage
Includes implementing security measures such as firewalls, antivirus software, encryption, and multi-factor authentication
Cyber security professionals work to prevent, detect, and respond to cyber threats
Examples of cyb...
I applied via Approached by Company and was interviewed before Dec 2023. There was 1 interview round.
I applied via AmbitionBox and was interviewed before Oct 2021. There were 2 interview rounds.
Firewall is a security system that monitors and controls incoming and outgoing network traffic. OSI is a model for network communication.
Firewall is a hardware or software-based security system that filters network traffic based on predefined rules.
It acts as a barrier between a trusted internal network and an untrusted external network.
OSI (Open Systems Interconnection) is a model for network communication that define...
OWASP Top 10 is a list of the most critical web application security risks.
It is updated every 3-4 years by the Open Web Application Security Project (OWASP)
The current version is OWASP Top 10 2017
The list includes risks such as injection, broken authentication and session management, cross-site scripting (XSS), and more
It is used as a guide for developers and security professionals to prioritize security efforts
I applied via Company Website and was interviewed in Apr 2022. There were 2 interview rounds.
Na
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Vulnerability management in cloud environment involves identifying, prioritizing, and mitigating security weaknesses.
Regularly scan cloud infrastructure for vulnerabilities
Patch and update software to address vulnerabilities
Implement access controls and encryption to protect data
Utilize security tools like intrusion detection systems and firewalls
Monitor and analyze security logs for suspicious activity
Storage maintenance in Azure involves monitoring, optimizing, and managing storage resources to ensure performance and availability.
Regularly monitor storage usage and performance metrics
Optimize storage by implementing tiered storage and data archiving
Manage access controls and permissions to prevent unauthorized access
Implement backup and disaster recovery strategies for data protection
Update storage configurations a
based on 1 review
Rating in categories
System Administrator
80
salaries
| ₹0 L/yr - ₹0 L/yr |
System Engineer
32
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior System Administrator
17
salaries
| ₹0 L/yr - ₹0 L/yr |
Windows System Administrator
10
salaries
| ₹0 L/yr - ₹0 L/yr |
Backup Administrator
10
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech