i
ValueLabs
Filter interviews by
I applied via Company Website and was interviewed before May 2023. There was 1 interview round.
SIEM works by collecting and analyzing security data to detect and respond to cyber threats. Mitre attack framework and Cyber kill chain are used to categorize and analyze attacks.
SIEM collects security data from various sources like logs, network traffic, and endpoints for analysis.
Mitre attack framework provides a structured way to categorize and analyze cyber threats based on tactics and techniques used by attackers...
I applied via Approached by Company and was interviewed before Aug 2021. There were 3 interview rounds.
OWASP top 10 is a list of the most critical web application security risks.
It is published by the Open Web Application Security Project (OWASP)
It includes risks such as injection, broken authentication and session management, cross-site scripting (XSS), and more
It is updated every few years to reflect new threats and vulnerabilities
It is used by security professionals to prioritize their efforts and focus on the most i
Vulnerability assessment identifies vulnerabilities, while penetration testing exploits them to determine the impact.
Vulnerability assessment is a non-intrusive process that identifies vulnerabilities in a system or network.
Penetration testing is an intrusive process that exploits vulnerabilities to determine the impact on the system or network.
Vulnerability assessment is usually automated and performed regularly to id...
Vulnerabilities in web application penetration testing
Injection flaws (SQL, LDAP, etc.)
Cross-site scripting (XSS)
Broken authentication and session management
Insecure direct object references
Security misconfiguration
Sensitive data exposure
Insufficient logging and monitoring
I am interested in Cybersecurity because it allows me to protect and defend against cyber threats, ensuring the safety and privacy of individuals and organizations.
Passion for technology and problem-solving
Desire to make a positive impact by safeguarding sensitive information
Fascination with the constantly evolving nature of cyber threats
Opportunity to work on challenging and complex projects
Ability to contribute to th...
I expect the company to provide a supportive and challenging work environment, opportunities for growth and learning, fair compensation, and a strong commitment to security.
Supportive and challenging work environment
Opportunities for growth and learning
Fair compensation
Strong commitment to security
posted on 18 Dec 2024
I was interviewed in Nov 2024.
Disadvantages of Zscaler proxy include potential latency issues, limited customization options, and reliance on a third-party service.
Potential latency issues due to traffic being routed through Zscaler's servers
Limited customization options compared to on-premises solutions
Reliance on a third-party service for network security, which may raise concerns about data privacy and security
IP Surrogate in Zscaler is a feature that allows users to access the internet using a virtual IP address instead of their actual IP address.
IP Surrogate helps to protect user privacy by masking their real IP address.
It can also help bypass geo-restrictions by appearing to be located in a different region.
Organizations can use IP Surrogate to enhance security and anonymity for their network traffic.
Example: A company us...
posted on 4 Sep 2024
OSPF (Open Shortest Path First) is a routing protocol that uses link-state routing algorithm to determine the best path for data packets.
OSPF routers exchange link-state advertisements (LSAs) to build a topology map of the network.
Each router calculates the shortest path to each network based on the information in the LSAs.
OSPF uses cost as a metric to determine the best path, with lower cost paths being preferred.
OSPF...
BGP parameter refers to the various attributes and settings used in the Border Gateway Protocol for routing decisions.
BGP parameters include attributes like AS path, next hop, local preference, and MED.
These parameters help BGP routers make decisions on the best path to reach a destination.
Examples of BGP parameters are weight, local preference, and community values.
Network works and implements parts refer to the components and protocols involved in the functioning of a network.
Network devices such as routers, switches, firewalls, and access points work together to facilitate communication.
Protocols like TCP/IP, DNS, DHCP, and SSL/TLS are implemented to ensure data transmission and security.
Network segmentation, VLANs, and VPNs are used to separate and secure different parts of a ...
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
I am currently working as a Security Analyst, responsible for monitoring and analyzing security threats, implementing security measures, and conducting security assessments.
Monitoring and analyzing security threats to identify potential risks
Implementing security measures to protect systems and data
Conducting security assessments to identify vulnerabilities and recommend solutions
Collaborating with IT teams to ensure s...
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Involves protecting computers, servers, mobile devices, networks, and data from unauthorized access or damage
Includes implementing security measures such as firewalls, antivirus software, encryption, and multi-factor authentication
Cyber security professionals work to prevent, detect, and respond to cyber threats
Examples of cyb...
posted on 22 Jul 2024
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Feb 2022. There was 1 interview round.
I applied via Approached by Company and was interviewed before Aug 2021. There were 3 interview rounds.
OWASP top 10 is a list of the most critical web application security risks.
It is published by the Open Web Application Security Project (OWASP)
It includes risks such as injection, broken authentication and session management, cross-site scripting (XSS), and more
It is updated every few years to reflect new threats and vulnerabilities
It is used by security professionals to prioritize their efforts and focus on the most i
Vulnerability assessment identifies vulnerabilities, while penetration testing exploits them to determine the impact.
Vulnerability assessment is a non-intrusive process that identifies vulnerabilities in a system or network.
Penetration testing is an intrusive process that exploits vulnerabilities to determine the impact on the system or network.
Vulnerability assessment is usually automated and performed regularly to id...
Vulnerabilities in web application penetration testing
Injection flaws (SQL, LDAP, etc.)
Cross-site scripting (XSS)
Broken authentication and session management
Insecure direct object references
Security misconfiguration
Sensitive data exposure
Insufficient logging and monitoring
I am interested in Cybersecurity because it allows me to protect and defend against cyber threats, ensuring the safety and privacy of individuals and organizations.
Passion for technology and problem-solving
Desire to make a positive impact by safeguarding sensitive information
Fascination with the constantly evolving nature of cyber threats
Opportunity to work on challenging and complex projects
Ability to contribute to th...
I expect the company to provide a supportive and challenging work environment, opportunities for growth and learning, fair compensation, and a strong commitment to security.
Supportive and challenging work environment
Opportunities for growth and learning
Fair compensation
Strong commitment to security
I applied via Approached by Company and was interviewed in Oct 2023. There were 2 interview rounds.
Senior Software Engineer
2.1k
salaries
| ₹4.7 L/yr - ₹23.9 L/yr |
Software Engineer
946
salaries
| ₹3.1 L/yr - ₹13.8 L/yr |
Analyst
535
salaries
| ₹8.3 L/yr - ₹30 L/yr |
Technical Lead
459
salaries
| ₹11.5 L/yr - ₹40 L/yr |
System Analyst
387
salaries
| ₹9.1 L/yr - ₹30 L/yr |
TCS
Infosys
Wipro
HCLTech