i
INFOSEC
VENTURES
Filter interviews by
Vue.js is a progressive JavaScript framework for building user interfaces and single-page applications.
Reactive data binding: Vue.js allows for two-way data binding, making it easy to keep the UI in sync with the underlying data model.
Component-based architecture: Vue.js encourages building applications using reusable components, which helps in organizing code and improving maintainability.
Virtual DOM: Vue.js uses...
Node.js is a JavaScript runtime built on Chrome's V8 engine, enabling server-side scripting and building scalable network applications.
Node.js uses an event-driven, non-blocking I/O model, making it efficient and suitable for I/O-heavy applications.
It allows developers to use JavaScript on the server side, unifying the development process across the stack.
Node.js has a rich ecosystem of libraries and frameworks, s...
The constant evolution and challenges in the cyber security landscape excite me in sales.
I am passionate about helping organizations protect their sensitive data and assets from cyber threats.
I enjoy the fast-paced nature of the industry and the opportunity to work with cutting-edge technology.
Seeing the impact of cyber attacks on businesses motivates me to educate and provide solutions to prevent such incidents.
B...
I possess a solid foundation in sales knowledge, gained through experience and training in various roles.
Completed a sales training program that covered techniques like consultative selling and objection handling.
Worked as a sales associate where I consistently exceeded monthly sales targets by 20%.
Participated in cross-functional teams to develop sales strategies for new product launches.
Utilized CRM software to ...
Your name is a unique identifier that represents your identity and can carry personal, cultural, or familial significance.
Names can reflect cultural heritage, like 'Sofia' in many languages meaning wisdom.
Some names have historical significance, such as 'Alexander' linked to Alexander the Great.
Names can also be influenced by trends, like 'Liam' being popular in recent years.
I can join immediately or at a mutually convenient time based on your needs and my current commitments.
I am available to start immediately if needed.
If you have a specific start date in mind, I can accommodate that.
I can also discuss a flexible start date that works for both of us.
For example, if you prefer a two-week notice, I can arrange that.
I have 5 years of experience in software sales and solution consulting.
5 years of experience in software sales and solution consulting
Strong understanding of SDR 2 solutions
Proven track record of successful client engagements
Experience in presenting technical solutions to clients
Ability to understand and address client needs
Laravel is preferred for its elegant syntax, powerful features like routing, ORM, and authentication, and active community support.
Elegant syntax makes code clean and readable
Powerful features like routing, ORM, and authentication save time and effort
Active community support ensures quick resolution of issues
Built-in tools like Artisan make development easier and faster
Cyber security is crucial in protecting sensitive data and preventing cyber attacks.
Preventing unauthorized access to data and systems
Protecting against malware and viruses
Ensuring compliance with regulations and standards
Detecting and responding to security incidents
Securing networks and infrastructure
Examples: implementing firewalls, encryption, multi-factor authentication
In Laravel, a request refers to an instance of the Illuminate\Http\Request class that contains all the information about an incoming HTTP request.
Request class is used to retrieve input data, files, cookies, headers, and more from the incoming request.
Request instance can be accessed in controllers using type-hinting or by using the request() helper function.
Example: $request = request(); $name = $request->input('...
I applied via LinkedIn and was interviewed in Jun 2021. There were 4 interview rounds.
Managing incidents in EDR and SIEM involves detection, analysis, response, and recovery processes.
Identify the incident using EDR alerts and SIEM logs.
Correlate data from both EDR and SIEM to understand the attack vector.
Contain the incident by isolating affected endpoints via EDR.
Investigate the incident using SIEM for historical context and patterns.
Implement remediation steps based on findings from both tools.
Docume...
To validate a malicious file, use antivirus software and sandboxing techniques.
Scan the file with multiple antivirus software to detect any malicious code.
Use sandboxing techniques to run the file in a controlled environment and observe its behavior.
Check the file's digital signature and compare it with the signature of the legitimate file.
Analyze the file's metadata and check for any suspicious information.
Use online ...
I appeared for an interview in Nov 2024.
Your name is a unique identifier that represents your identity and can carry personal, cultural, or familial significance.
Names can reflect cultural heritage, like 'Sofia' in many languages meaning wisdom.
Some names have historical significance, such as 'Alexander' linked to Alexander the Great.
Names can also be influenced by trends, like 'Liam' being popular in recent years.
I possess a solid foundation in sales knowledge, gained through experience and training in various roles.
Completed a sales training program that covered techniques like consultative selling and objection handling.
Worked as a sales associate where I consistently exceeded monthly sales targets by 20%.
Participated in cross-functional teams to develop sales strategies for new product launches.
Utilized CRM software to track...
I can join immediately or at a mutually convenient time based on your needs and my current commitments.
I am available to start immediately if needed.
If you have a specific start date in mind, I can accommodate that.
I can also discuss a flexible start date that works for both of us.
For example, if you prefer a two-week notice, I can arrange that.
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
General syntax errors to be seen here
I have experience working with tools such as Ansible, Jenkins, Docker, and Git.
Ansible
Jenkins
Docker
Git
I appeared for an interview in May 2025, where I was asked the following questions.
I appeared for an interview in Feb 2025, where I was asked the following questions.
Successfully improved customer retention and satisfaction through strategic initiatives and personalized support.
Increased customer retention rate by 20% over one year by implementing a proactive outreach program.
Developed a customer feedback loop that led to a 30% improvement in product features based on user suggestions.
Trained and mentored a team of 5 new consultants, resulting in a 15% increase in overall team perf...
I applied via LinkedIn and was interviewed in Feb 2024. There was 1 interview round.
The constant evolution and challenges in the cyber security landscape excite me in sales.
I am passionate about helping organizations protect their sensitive data and assets from cyber threats.
I enjoy the fast-paced nature of the industry and the opportunity to work with cutting-edge technology.
Seeing the impact of cyber attacks on businesses motivates me to educate and provide solutions to prevent such incidents.
Buildi...
I applied via Company Website and was interviewed in Jul 2023. There were 4 interview rounds.
I was asked to prepeare a presentation on a company, show as if I belong to the company as I have to convience the client to purchase the SaaS product.
I applied via Indeed and was interviewed in Jul 2023. There were 5 interview rounds.
I applied via Naukri.com and was interviewed in Jul 2023. There were 4 interview rounds.
Top trending discussions
The duration of INFOSEC VENTURES interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 17 interview experiences
Difficulty level
Duration
based on 218 reviews
Rating in categories
1-3 Yrs
Not Disclosed
2-4 Yrs
Not Disclosed
AVP Operations
19
salaries
| ₹64.5 L/yr - ₹70 L/yr |
Business Manager and Consultant
16
salaries
| ₹27.5 L/yr - ₹44 L/yr |
Cyber Security Consultant
15
salaries
| ₹1.8 L/yr - ₹7 L/yr |
Software Developer
12
salaries
| ₹4.9 L/yr - ₹12.3 L/yr |
Solution Consultant
10
salaries
| ₹11 L/yr - ₹20 L/yr |