Upload Button Icon Add office photos

Filter interviews by

BT Group Security Analyst Interview Questions and Answers

Updated 3 Aug 2024

BT Group Security Analyst Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.

Round 1 - Aptitude Test 

Basic questions related to speed, time, efficiency

Round 2 - One-on-one 

(2 Questions)

  • Q1. Why do we need 5ghz when we already had 2.4 GHz
  • Ans. 

    5GHz offers faster speeds, less interference, and more channels compared to 2.4GHz.

    • 5GHz provides faster data transfer speeds compared to 2.4GHz, making it ideal for high-bandwidth activities like streaming HD video or online gaming.

    • 5GHz has less interference from other devices like microwaves and cordless phones that operate on the 2.4GHz frequency.

    • 5GHz offers more available channels, reducing the likelihood of congest...

  • Answered by AI
  • Q2. Can you convert switch into router
  • Ans. 

    Yes, a switch can be converted into a router by enabling routing features and configuring routing protocols.

    • Enable routing features on the switch

    • Configure routing protocols such as OSPF or EIGRP

    • Assign IP addresses to interfaces

    • Implement access control lists for security

    • Install a routing software image if necessary

  • Answered by AI

Interview Preparation Tips

Topics to prepare for BT Group Security Analyst interview:
  • Computer Networking
Interview preparation tips for other job seekers - study CN

Skills evaluated in this interview

Interview questions from similar companies

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.

    • Experienced in conducting security assessments and identifying vulnerabilities

    • Skilled in implementing security measures to protect against cyber threats

    • Proficient in analyzing security incidents and responding effectively

    • Certified in relevant security certifications such as CISSP or CISM

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different types of malware
  • Ans. 

    Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

    • Viruses: self-replicating programs that infect other files on a computer

    • Worms: standalone malware that spreads across networks

    • Trojans: disguised as legitimate software to trick users into installing them

    • Ransomware: encrypts files and demands payment for decryption

    • Spyware: secretly gathers information about...

  • Answered by AI
  • Q2. What would you first do if a machine is infected
  • Ans. 

    The first step would be to isolate the infected machine from the network to prevent further spread of the infection.

    • Isolate the infected machine from the network to prevent further spread of the infection

    • Identify the type of malware or virus that has infected the machine

    • Run a full system scan using antivirus software to detect and remove the malware

    • Update the operating system and all software to patch any vulnerabiliti...

  • Answered by AI
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Aug 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. About Experience on Technologies
  • Q2. Current CTC and Expected
Round 3 - Technical 

(4 Questions)

  • Q1. What are Azure Security Policies
  • Ans. 

    Azure Security Policies are a set of rules and configurations that help enforce security controls within Azure environments.

    • Azure Security Policies help ensure compliance with security standards and best practices

    • They can be used to enforce specific security configurations, such as requiring encryption for storage accounts

    • Policies can be assigned at the subscription, resource group, or resource level

  • Answered by AI
  • Q2. How do we use Conditional Access in Azure
  • Ans. 

    Conditional Access in Azure is used to control access to resources based on specific conditions.

    • Conditional Access policies can be set up to require multi-factor authentication for certain users or devices

    • It can restrict access based on location, device compliance, or other factors

    • Conditional Access can be used to enforce policies such as requiring a compliant device to access sensitive data

  • Answered by AI
  • Q3. Regarding MFA, VPN, GPO
  • Q4. What is Active Directory Federation Service
  • Ans. 

    Active Directory Federation Service (AD FS) is a feature in Windows Server that allows for single sign-on authentication across multiple systems.

    • AD FS allows users to access multiple applications with a single set of credentials

    • It enables secure sharing of identity information between trusted partners

    • AD FS uses claims-based authentication to verify user identity

    • It supports integration with cloud-based services like Off

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(2 Questions)

  • Q1. Questions about microservices
  • Q2. Deep understanding on vulnerabilities

Interview Preparation Tips

Interview preparation tips for other job seekers - Interview rounds can be rated on 3/5
Interview experience
3
Average
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Aug 2023. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. What is the security model you follow
  • Ans. 

    I follow the Zero Trust security model, which assumes all networks are untrusted and verifies every user and device attempting to connect.

    • Implementing strict access controls based on user identity and device health

    • Utilizing multi-factor authentication for added security

    • Regularly monitoring and analyzing network traffic for anomalies

    • Segmenting networks to limit the impact of a potential breach

  • Answered by AI
  • Q2. What is the APT Groups you follow
  • Ans. 

    I follow APT groups such as APT28, APT29, and APT33 for threat intelligence and analysis.

    • APT28, also known as Fancy Bear, is associated with Russian military intelligence.

    • APT29, also known as Cozy Bear, is another Russian cyber espionage group.

    • APT33 is linked to Iranian cyber espionage activities.

    • Tracking APT groups helps in understanding their tactics, techniques, and procedures (TTPs).

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - prepare well before going to the interview.
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. What is OWASP and it's attributes?
  • Ans. 

    OWASP stands for Open Web Application Security Project, a non-profit organization focused on improving software security.

    • OWASP provides resources such as tools, documentation, and guidelines for web application security.

    • It publishes a list of the top 10 most critical web application security risks.

    • OWASP also offers training and conferences to educate professionals on security best practices.

  • Answered by AI
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed before Oct 2023. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Information Security Engineer with a strong background in cybersecurity and a passion for protecting data.

    • Experienced in implementing and managing security measures to protect networks and systems

    • Skilled in conducting security assessments and identifying vulnerabilities

    • Proficient in developing and implementing security policies and procedures

    • Strong knowledge of security tools and technologies such as f...

  • Answered by AI
  • Q2. Question on domain knowledge like IAM and PAM
Round 2 - Behavioral 

(1 Question)

  • Q1. What is the risky work you have done?
  • Ans. 

    I have conducted penetration testing on critical infrastructure systems.

    • Identified vulnerabilities in network infrastructure

    • Performed penetration testing on industrial control systems

    • Tested security measures in place for critical infrastructure

    • Collaborated with IT and engineering teams to address security gaps

  • Answered by AI
Round 3 - HR 

(1 Question)

  • Q1. Why you want to join intel
  • Ans. 

    I want to join Intel because of their reputation for innovation and cutting-edge technology in the field of information security.

    • Intel is a leader in the technology industry, known for their advanced hardware and software solutions.

    • I am impressed by Intel's commitment to research and development, especially in the area of information security.

    • I believe that working at Intel will provide me with the opportunity to work ...

  • Answered by AI
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Mar 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Job description and all
Round 2 - Technical 

(1 Question)

  • Q1. Discussion about technical information security analysis.
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. SIEM Architecture
  • Q2. MITRE Framework

BT Group Interview FAQs

How many rounds are there in BT Group Security Analyst interview?
BT Group interview process usually has 2 rounds. The most common rounds in the BT Group interview process are Aptitude Test and One-on-one Round.
What are the top questions asked in BT Group Security Analyst interview?

Some of the top questions asked at the BT Group Security Analyst interview -

  1. why do we need 5ghz when we already had 2.4 ...read more
  2. can you convert switch into rou...read more

Tell us how to improve this page.

BT Group Security Analyst Interview Process

based on 1 interview

Interview experience

4
  
Good
View more
BT Group Security Analyst Salary
based on 27 salaries
₹5 L/yr - ₹12.8 L/yr
20% more than the average Security Analyst Salary in India
View more details

BT Group Security Analyst Reviews and Ratings

based on 2 reviews

5.0/5

Rating in categories

4.5

Skill development

4.1

Work-life balance

3.2

Salary

3.2

Job security

3.2

Company culture

3.2

Promotions

3.2

Work satisfaction

Explore 2 Reviews and Ratings
Associate
335 salaries
unlock blur

₹1.5 L/yr - ₹6.3 L/yr

Associate Engineer
275 salaries
unlock blur

₹2.8 L/yr - ₹8 L/yr

Financial Analyst
252 salaries
unlock blur

₹6.8 L/yr - ₹23 L/yr

Project Manager
238 salaries
unlock blur

₹7 L/yr - ₹23.3 L/yr

Network Engineer
203 salaries
unlock blur

₹2.7 L/yr - ₹9 L/yr

Explore more salaries
Compare BT Group with

Vodafone Idea

4.1
Compare

Bharti Airtel

4.0
Compare

Jio

3.9
Compare

Tata Communications

4.0
Compare
Did you find this page helpful?
Yes No
write
Share an Interview