Upload Button Icon Add office photos

Filter interviews by

Accenture Security Analyst Interview Questions and Answers

Updated 28 Jan 2024

Accenture Security Analyst Interview Experiences

3 interviews found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral and was interviewed in Feb 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Alll the details of OWASP top 10
  • Ans. 

    OWASP top 10 is a list of the top 10 most critical web application security risks.

    • Injection

    • Broken Authentication

    • Sensitive Data Exposure

    • XML External Entities (XXE)

    • Broken Access Control

    • Security Misconfiguration

    • Cross-Site Scripting (XSS)

    • Insecure Deserialization

    • Using Components with Known Vulnerabilities

    • Insufficient Logging and Monitoring

  • Answered by AI
  • Q2. Exploit including scripts to be written
  • Ans. 

    Writing exploit scripts is a crucial skill for a Security Analyst.

    • Understand the vulnerability and its impact

    • Research existing exploits and modify them for specific targets

    • Use scripting languages like Python or PowerShell

    • Test the exploit in a controlled environment before using it in production

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be prepared to write exploit scripts

Skills evaluated in this interview

Security Analyst Interview Questions & Answers

user image Nitin Sadhu Londhe

posted on 25 Jan 2024

Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed in Dec 2023. There was 1 interview round.

Round 1 - One-on-one 

(1 Question)

  • Q1. Tell me about yourself ?
  • Ans. I am Nitin Londhe. I have started my job career at Wipro with in year 2013 to jan 2024. Now I have recently join EXL magarpatt city. I have done my job at Wipro technologies like various post front office executive, ID batch coordinator, SOC operator,ACO etc.
  • Answered by Nitin Sadhu Londhe

Interview Preparation Tips

Interview preparation tips for other job seekers - Think be positive every time.

Security Analyst Interview Questions Asked at Other Companies

Q1. How do you test a web application? What is CSRF and SSRF? What is ... read more
asked in TCS
Q2. What protocols used by nmap Difference between public and private ... read more
Q3. 1. Describe your SOC scenario! 2. What kind of report you prepari ... read more
Q4. Difference between encryption and encoding? With examples and imp ... read more
asked in TCS
Q5. what are the major vulnerabilities you've encounterd? how did you ... read more

I applied via Naukri.com and was interviewed before Mar 2021. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. Tell about packet flow in HTTP, DNS, TCP etc. Tell about daily work Questions on specific products you are working on Understanding of VPNs and Load balancers.
  • Ans. 

    Packet flow in HTTP, DNS, TCP, daily work, specific products, VPNs, and Load balancers.

    • HTTP packets contain request and response headers and data

    • DNS packets contain queries and responses for domain name resolution

    • TCP packets establish and maintain connections between hosts

    • Daily work involves monitoring network traffic and identifying security threats

    • Specific products may include firewalls, intrusion detection systems, ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well on things you have mentioned on your resume.
It seems like a basic advice but it'll be very helpful.

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Explain about SIEM TOOL and which SIEM tool you have used ?
  • Ans. 

    SIEM (Security Information and Event Management) tool is a software solution that aggregates and analyzes security data from various sources.

    • SIEM tools help in detecting and responding to security incidents in real-time.

    • They provide centralized visibility into an organization's security posture.

    • Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.

    • I have experience using Splunk for log management and security

  • Answered by AI
  • Q2. Have you configured policies in defender ?
  • Ans. 

    Yes, I have configured policies in defender.

    • Yes, I have configured policies in Windows Defender to ensure proper security measures are in place.

    • I have set up policies for malware protection, network protection, firewall settings, and device control.

    • Regularly review and update policies to adapt to new threats and vulnerabilities.

    • Example: Configuring Windows Defender policies to block certain file types from being downlo

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well and be confident
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(1 Question)

  • Q1. Tell us about MITRE attack framework
  • Ans. 

    MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations.

    • MITRE ATT&CK provides a framework for understanding and categorizing cyber threats.

    • It consists of tactics, techniques, and procedures (TTPs) used by attackers.

    • Organizations can use MITRE ATT&CK to improve their threat detection and response capabilities.

    • Examples of MITRE ATT&CK techniques include spear ...

  • Answered by AI

Security Analyst Interview Questions & Answers

HCLTech user image Rosini Duraisamy

posted on 10 Jun 2024

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Vulnerability management in cloud environment
  • Ans. 

    Vulnerability management in cloud environment involves identifying, prioritizing, and mitigating security weaknesses.

    • Regularly scan cloud infrastructure for vulnerabilities

    • Patch and update software to address vulnerabilities

    • Implement access controls and encryption to protect data

    • Utilize security tools like intrusion detection systems and firewalls

    • Monitor and analyze security logs for suspicious activity

  • Answered by AI
  • Q2. Storage maintenance in Azure
  • Ans. 

    Storage maintenance in Azure involves monitoring, optimizing, and managing storage resources to ensure performance and availability.

    • Regularly monitor storage usage and performance metrics

    • Optimize storage by implementing tiered storage and data archiving

    • Manage access controls and permissions to prevent unauthorized access

    • Implement backup and disaster recovery strategies for data protection

    • Update storage configurations a

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Know your CV. And make sure your aware of basics

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

It had multiple aptitude questions with programming questions

Round 2 - Technical 

(1 Question)

  • Q1. Questions based on your resume
Round 3 - HR 

(1 Question)

  • Q1. Wat is your strength Will u work in night shift
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Sep 2023. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Questions regarding SIEM working especially around multitenancy and rules.
Round 2 - One-on-one 

(1 Question)

  • Q1. Discussion with the Manager regarding my experience and future aspirations
Interview experience
2
Poor
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

Easy test to crack with practice.

Round 2 - One-on-one 

(1 Question)

  • Q1. Focused on project and college subjects.

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

Accenture Interview FAQs

How many rounds are there in Accenture Security Analyst interview?
Accenture interview process usually has 1-2 rounds. The most common rounds in the Accenture interview process are Technical, Resume Shortlist and One-on-one Round.
How to prepare for Accenture Security Analyst interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Accenture. The most common topics and skills that interviewers at Accenture expect are Information Security, Powerpoint, Telecom, Consulting and Monitoring.
What are the top questions asked in Accenture Security Analyst interview?

Some of the top questions asked at the Accenture Security Analyst interview -

  1. Tell about packet flow in HTTP, DNS, TCP etc. Tell about daily work Questions o...read more
  2. Alll the details of OWASP top...read more
  3. Exploit including scripts to be writ...read more

Tell us how to improve this page.

People are getting interviews through

based on 3 Accenture interviews
Company Website
Job Portal
Referral
33%
33%
33%
1% candidates got the interview through other sources.
Moderate Confidence
?
Moderate Confidence means the data is based on a sufficient number of responses received from the candidates
Accenture Security Analyst Salary
based on 1.3k salaries
₹3 L/yr - ₹11 L/yr
11% more than the average Security Analyst Salary in India
View more details

Accenture Security Analyst Reviews and Ratings

based on 68 reviews

4.4/5

Rating in categories

4.2

Skill development

4.0

Work-Life balance

4.1

Salary & Benefits

4.1

Job Security

4.2

Company culture

3.7

Promotions/Appraisal

4.0

Work Satisfaction

Explore 68 Reviews and Ratings
Application Development Analyst
38.9k salaries
unlock blur

₹3 L/yr - ₹12 L/yr

Application Development - Senior Analyst
26.2k salaries
unlock blur

₹6.8 L/yr - ₹20.2 L/yr

Team Lead
24.1k salaries
unlock blur

₹7 L/yr - ₹25.3 L/yr

Senior Software Engineer
18.4k salaries
unlock blur

₹6 L/yr - ₹19 L/yr

Software Engineer
17.6k salaries
unlock blur

₹3.6 L/yr - ₹12.8 L/yr

Explore more salaries
Compare Accenture with

TCS

3.7
Compare

Cognizant

3.8
Compare

Capgemini

3.8
Compare

Infosys

3.7
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview