i
Wipro
Filter interviews by
I was interviewed in Mar 2024.
Onboarding JDBC apps in Sailpoint involves configuring JDBC connectors and creating application definitions.
Configure JDBC connectors in Sailpoint IdentityNow
Create application definitions for the JDBC apps
Map the necessary attributes for provisioning and reconciliation
Test the connectivity and functionality of the JDBC apps
Developing and deploying rules in Sailpoint IDN involves creating custom rules in the IdentityNow platform and deploying them to enforce access controls.
Create custom rules using the IdentityNow Rule Editor
Test the rules in a non-production environment before deploying
Deploy the rules to the production environment to enforce access controls
Monitor and review the effectiveness of the rules regularly
I applied via Company Website and was interviewed in Apr 2023. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Oct 2023. There were 2 interview rounds.
I applied via Approached by Company and was interviewed before Aug 2021. There were 3 interview rounds.
Handling escalations involves prompt communication, prioritization, and collaboration with stakeholders.
Acknowledge the escalation and gather all relevant information
Assess the severity and prioritize based on impact
Communicate with stakeholders and provide regular updates
Collaborate with cross-functional teams to resolve the issue
Document the escalation and resolution process for future reference
posted on 24 Nov 2021
I applied via Recruitment Consultant and was interviewed before Nov 2020. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed before Oct 2020. There were 3 interview rounds.
To make an offline Symantec agent communicate back to SEPM, use a heartbeat mechanism and configure a communication schedule.
Implement a heartbeat mechanism to regularly check the agent's status
Configure the agent to communicate with SEPM at specific intervals
Use a communication schedule to define when the agent should attempt to connect
Ensure the agent has access to necessary network resources and ports
Consider using ...
I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.
SIEM (Security Information and Event Management) tool is a software solution that aggregates and analyzes security data from various sources.
SIEM tools help in detecting and responding to security incidents in real-time.
They provide centralized visibility into an organization's security posture.
Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.
I have experience using Splunk for log management and security
Yes, I have configured policies in defender.
Yes, I have configured policies in Windows Defender to ensure proper security measures are in place.
I have set up policies for malware protection, network protection, firewall settings, and device control.
Regularly review and update policies to adapt to new threats and vulnerabilities.
Example: Configuring Windows Defender policies to block certain file types from being downlo
A DNS server is a computer server that contains a database of public IP addresses and their associated hostnames.
Translates domain names to IP addresses
Resolves queries from clients
Helps in navigating the internet by mapping domain names to IP addresses
The Qualys agent is a lightweight software installed on endpoints to collect security data and perform security assessments.
Qualys agent is a lightweight software installed on endpoints to collect security data.
It helps in performing security assessments by scanning for vulnerabilities and compliance issues.
The agent continuously monitors the endpoint for any security threats and sends the data to the Qualys Cloud Plat...
I am a dedicated Information Security Analyst with a strong background in cybersecurity and a passion for protecting data.
Experienced in conducting security assessments and implementing security measures
Skilled in analyzing security breaches and responding effectively
Proficient in using security tools and technologies such as firewalls and encryption
Strong understanding of compliance regulations and best practices in i
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Vulnerability management in cloud environment involves identifying, prioritizing, and mitigating security weaknesses.
Regularly scan cloud infrastructure for vulnerabilities
Patch and update software to address vulnerabilities
Implement access controls and encryption to protect data
Utilize security tools like intrusion detection systems and firewalls
Monitor and analyze security logs for suspicious activity
Storage maintenance in Azure involves monitoring, optimizing, and managing storage resources to ensure performance and availability.
Regularly monitor storage usage and performance metrics
Optimize storage by implementing tiered storage and data archiving
Manage access controls and permissions to prevent unauthorized access
Implement backup and disaster recovery strategies for data protection
Update storage configurations a
based on 14 reviews
Rating in categories
Project Engineer
32.6k
salaries
| ₹1.8 L/yr - ₹8.3 L/yr |
Senior Software Engineer
23k
salaries
| ₹5.8 L/yr - ₹22.4 L/yr |
Senior Associate
21.2k
salaries
| ₹0.8 L/yr - ₹5.5 L/yr |
Senior Project Engineer
20.6k
salaries
| ₹5 L/yr - ₹19 L/yr |
Technical Lead
18.6k
salaries
| ₹8.2 L/yr - ₹36.5 L/yr |
TCS
Infosys
Tesla
Amazon