Upload Button Icon Add office photos

Filter interviews by

Clear (1)

Barclays Shared Services Cyber Security Analyst Interview Questions, Process, and Tips

Updated 4 Mar 2025

Barclays Shared Services Cyber Security Analyst Interview Experiences

1 interview found

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is mean By cybersecurity
  • Ans. 

    Cybersecurity is the practice of protecting systems, networks, and data from digital attacks and unauthorized access.

    • Involves safeguarding information systems from cyber threats like malware and phishing.

    • Includes measures such as firewalls, encryption, and intrusion detection systems.

    • Examples of cyber threats: ransomware attacks, data breaches, and denial-of-service attacks.

    • Focuses on both hardware and software securit

  • Answered by AI
  • Q2. What is mean hashing
  • Ans. 

    Hashing is a process that transforms input data into a fixed-size string of characters, typically for data integrity and security.

    • Hash functions take an input (or 'message') and return a fixed-size string of bytes.

    • Common hashing algorithms include MD5, SHA-1, and SHA-256.

    • Hashing is used in password storage to securely store user credentials.

    • A hash is deterministic; the same input will always produce the same output.

    • Has...

  • Answered by AI
Round 2 - Technical 

(2 Questions)

  • Q1. What is encoding
  • Ans. 

    Encoding is the process of converting data into a specific format for efficient transmission or storage.

    • Encoding transforms data into a different format, such as converting text to binary.

    • Common encoding schemes include Base64, URL encoding, and ASCII.

    • Base64 is often used to encode binary data for transmission over text-based protocols.

    • URL encoding replaces unsafe ASCII characters with a '%' followed by two hexadecimal...

  • Answered by AI
  • Q2. Defrance betwwen sast and dast
Round 3 - Technical 

(2 Questions)

  • Q1. What is mean by Nmap
  • Ans. 

    Nmap is a powerful open-source network scanning tool used for network discovery and security auditing.

    • Nmap stands for Network Mapper.

    • It can identify hosts and services on a network, including open ports.

    • Commonly used for security assessments and vulnerability scanning.

    • Example command: 'nmap -sS 192.168.1.1' performs a stealth SYN scan.

    • Nmap can also detect operating systems and service versions.

  • Answered by AI
  • Q2. Waht is meant By zap
Round 4 - Technical 

(2 Questions)

  • Q1. Waht is mean by postman
  • Q2. Priniciples of CIA
  • Ans. 

    CIA principles ensure data security through Confidentiality, Integrity, and Availability.

    • Confidentiality: Protecting sensitive information from unauthorized access (e.g., encryption).

    • Integrity: Ensuring data accuracy and consistency (e.g., checksums to verify data integrity).

    • Availability: Ensuring that information is accessible when needed (e.g., redundant systems to prevent downtime).

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Cybersecurity networkings itsecurity socanalyst

Sun Pharmaceutical Industries

Join us and thrive in a company culture that inspires and empowers.

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
-

I applied via Campus Placement and was interviewed before Oct 2023. There were 3 interview rounds.

Round 1 - Aptitude Test 

Duration was 40 mins.

Round 2 - Technical 

(1 Question)

  • Q1. Question about 2 projects in my CV
Round 3 - HR 

(1 Question)

  • Q1. Where do you see yourself in 5 years?
  • Ans. 

    In 5 years, I see myself as a senior cybersecurity analyst leading a team of professionals in implementing cutting-edge security measures.

    • Advancing to a senior cybersecurity analyst role

    • Leading a team in implementing advanced security measures

    • Continuing to stay updated on the latest cybersecurity trends and technologies

  • Answered by AI

I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.

Round 1 - Technical 

(4 Questions)

  • Q1. Cyber security, VAPT
  • Q2. DAST, SAST & top 10 OWASP list
  • Q3. Cyber attacks in network
  • Ans. 

    Cyber attacks in network are a major threat to organizations and can cause significant damage.

    • Cyber attacks can come in various forms such as malware, phishing, ransomware, and DDoS attacks.

    • Network security measures such as firewalls, intrusion detection systems, and antivirus software can help prevent cyber attacks.

    • Regular security audits and employee training can also help mitigate the risk of cyber attacks.

    • In the ev...

  • Answered by AI
  • Q4. Applications layers in cyber security
  • Ans. 

    Application layers in cyber security refer to the different levels of software and protocols that make up an application.

    • Application layer is the topmost layer in the OSI model

    • It includes protocols like HTTP, SMTP, FTP, etc.

    • Security measures at this layer include firewalls, intrusion detection systems, and web application firewalls

    • Vulnerabilities at this layer include SQL injection, cross-site scripting, and session hi

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Accenture Cyber Security Analyst interview:
  • Cyber security
  • VAPT
  • DAST, SAT
Interview preparation tips for other job seekers - Most important everyone in cyber security knowledge

Skills evaluated in this interview

I applied via Company Website and was interviewed in Dec 2021. There were 8 interview rounds.

Round 1 - Aptitude Test 

I'm attend the interview tomorrow

Round 2 - Technical 

(1 Question)

  • Q1. Im attend the interview Monday
Round 3 - HR 

(3 Questions)

  • Q1. Tell me about yourself.
  • Q2. Weekneess and strength
  • Q3. Explain Ur final year project
Round 4 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 5 - Technical 

(2 Questions)

  • Q1. Based on cyber security
  • Q2. Networking questions
Round 6 - One-on-one 

(1 Question)

  • Q1. Networking questions
Round 7 - Assignment 
Round 8 - Assignment 

Interview Preparation Tips

Interview preparation tips for other job seekers - I'm interested this job I'm fresher

Interview Questionnaire 

1 Question

  • Q1. Arcsight component ,log analysis,reports.
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Cyber kill chain
  • Q2. Mitre Attack technique
  • Ans. 

    Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.

    • Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.

    • It helps organizations understand and defend against common attack patterns.

    • Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.

  • Answered by AI
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
-
Result
Selected Selected
Round 1 - Technical 

(2 Questions)

  • Q1. What is Cyber seurity
  • Q2. All

Interview Preparation Tips

Interview preparation tips for other job seekers - cyber security soc networkings

Interview Questionnaire 

2 Questions

  • Q1. Are you ok with rotational shifts
  • Ans. 

    Yes, I am okay with rotational shifts.

    • I am flexible and adaptable to different work schedules.

    • I understand the importance of rotational shifts in certain industries.

    • I have previous experience working in rotational shifts.

    • I am willing to adjust my personal schedule to accommodate rotational shifts.

  • Answered by AI
  • Q2. Why are you interested to join in our company
  • Ans. 

    I am interested in joining your company because of its strong reputation, innovative projects, and opportunities for growth.

    • Strong reputation: Your company has a solid track record of success and is highly regarded in the industry.

    • Innovative projects: I am excited about the chance to work on cutting-edge projects that push the boundaries of technology.

    • Opportunities for growth: Your company offers excellent career devel...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - My interview rounds were easy but some tricky. We require confidence while having interview.

Interview Questionnaire 

1 Question

  • Q1. Where do you see yourself after 5 years from now

I applied via Walk-in and was interviewed before Nov 2019. There were 4 interview rounds.

Interview Preparation Tips

Interview preparation tips for other job seekers - I would say, if you have strong reference in organization you Will be selected based on the reference.
Contribute & help others!
anonymous
You can choose to be anonymous

Barclays Shared Services Interview FAQs

How many rounds are there in Barclays Shared Services Cyber Security Analyst interview?
Barclays Shared Services interview process usually has 4 rounds. The most common rounds in the Barclays Shared Services interview process are Technical.
What are the top questions asked in Barclays Shared Services Cyber Security Analyst interview?

Some of the top questions asked at the Barclays Shared Services Cyber Security Analyst interview -

  1. what is mean By cybersecur...read more
  2. what is mean hash...read more
  3. what is encod...read more

Recently Viewed

JOBS

Gushwork

14 jobs

JOBS

Browse jobs

Discover jobs you love

JOBS

GroundTruth

33 jobs

PHOTOS

Growisto

7 office photos

JOBS

Global Indian International School

No Jobs

SALARIES

Global Indian International School

JOBS

Global Indian International School

No Jobs

SALARIES

Global Indian International School

SALARIES

Global Indian International School

COMPANY BENEFITS

Global Indian International School

No Benefits

Tell us how to improve this page.

Barclays Shared Services Cyber Security Analyst Interview Process

based on 1 interview

Interview experience

5
  
Excellent
View more

HCLTech

A more secure future awaits you

Interview Questions from Similar Companies

Accenture Interview Questions
3.8
 • 8.1k Interviews
Genpact Interview Questions
3.8
 • 3.1k Interviews
Infosys BPM Interview Questions
3.6
 • 940 Interviews
DXC Technology Interview Questions
3.7
 • 795 Interviews
Nagarro Interview Questions
4.0
 • 759 Interviews
NTT Data Interview Questions
3.9
 • 614 Interviews
Publicis Sapient Interview Questions
3.5
 • 612 Interviews
GlobalLogic Interview Questions
3.6
 • 584 Interviews
View all

Barclays Shared Services Cyber Security Analyst Reviews and Ratings

based on 1 review

5.0/5

Rating in categories

5.0

Skill development

5.0

Work-life balance

5.0

Salary

5.0

Job security

5.0

Company culture

5.0

Promotions

5.0

Work satisfaction

Explore 1 Review and Rating
Process Advisor
692 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Assistant Manager
510 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Assistant Vice President
430 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Analyst
314 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Process Associate
176 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare Barclays Shared Services with

HSBC Group

3.9
Compare

JPMorgan Chase & Co.

4.0
Compare

Standard Chartered

3.7
Compare

Deutsche Bank

3.9
Compare
Did you find this page helpful?
Yes No
write
Share an Interview