Upload Button Icon Add office photos
Premium Employer

i

This company page is being actively managed by Deloitte Team. If you also belong to the team, you can get access from here

Deloitte Verified Tick

Compare button icon Compare button icon Compare
3.8

based on 16.9k Reviews

Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards

zig zag pattern zig zag pattern

Filter interviews by

Deloitte Cyber Security Analyst Interview Questions and Answers for Experienced

Updated 1 Jan 2025

Deloitte Cyber Security Analyst Interview Experiences for Experienced

2 interviews found

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. SOC related

Interview Preparation Tips

Interview preparation tips for other job seekers - I am working in Ernst and Young LLP since April 2023

I applied via LinkedIn and was interviewed in Apr 2021. There was 1 interview round.

Interview Questionnaire 

2 Questions

  • Q1. Qradar Only,
  • Q2. Nothing related to Cybersecurity

Interview Preparation Tips

Interview preparation tips for other job seekers - They Only listen to, What they actually want to.
Simple.
Don't doubt your Skills, It doesn't matter you are not worth it.
keep Try.

Cyber Security Analyst Interview Questions Asked at Other Companies for Experienced

Q1. What is scanning and explain about scanning?
Q2. What is pass the hash attack?
Q3. What is cybersecurity?
Q4. What is DLP and what is work of aDLP?
asked in PwC
Q5. what is fileless malware

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before Aug 2022. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Aptitude Test 

Easy aptitude test, just check the accuracy.

Round 3 - Coding Test 

Bit tough one, Question is from linked list.

Round 4 - HR 

(1 Question)

  • Q1. Genral questions regarding your carrier based on your resume

I applied via Referral and was interviewed before Nov 2019. There were 3 interview rounds.

Interview Questionnaire 

3 Questions

  • Q1. Why you want to join this company and this domain?
  • Q2. What is SIEM?
  • Ans. 

    SIEM stands for Security Information and Event Management. It is a software solution that helps organizations to detect and respond to security threats.

    • SIEM collects and analyzes security-related data from various sources such as network devices, servers, and applications.

    • It correlates the data to identify patterns and anomalies that may indicate a security breach.

    • SIEM provides real-time alerts and reports to security ...

  • Answered by AI
  • Q3. Which SIEM you have worked with?

Interview Preparation Tips

Interview preparation tips for other job seekers - The main advice is that, you might not know everything but it doesn't mean that you're lacking something just be confident and give answers with clarity also accept the fact that you don't know a particular topic rather than blabbering anything.
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

It was an MCQ test with questions from Quantitative Ability, Logical reasoning, Verbal Abililty

Round 2 - Technical 

(4 Questions)

  • Q1. Introduce yourself
  • Q2. Describe your internship experience and what was your contribution.
  • Q3. Why do you want to pivot to Cyber Security from your Electrical engineering degree?
  • Q4. Are you willing to learn?
Round 3 - HR 

(4 Questions)

  • Q1. Where are you from? What do you like about this city?
  • Q2. What do you think Consultants do?
  • Ans. 

    Consultants provide expert advice and guidance to clients in a specific field or industry.

    • Consultants analyze client needs and provide tailored solutions

    • They offer recommendations based on industry best practices

    • Consultants may also assist with implementation and training

    • They often work on a project basis or provide ongoing support

    • Examples: Cyber Security Consultants help organizations improve their security posture, I

  • Answered by AI
  • Q3. Would you like travelling for work?
  • Q4. Are you willing to relocate?

Interview Preparation Tips

Interview preparation tips for other job seekers - For a fresh college graduate, prepare your resume well and mention only those skills/experience you are able to defend well. Don't bluff on your resume. Revise the answers to common interview questions. And please know what Consulting is what consultants do.

Interview Questionnaire 

5 Questions

  • Q1. Cyber attack
  • Q2. What is fileless malware
  • Ans. 

    Fileless malware is a type of malicious software that operates in memory without leaving any trace on the hard drive.

    • Fileless malware is also known as memory-based malware or non-malware.

    • It uses legitimate system tools and processes to carry out its malicious activities.

    • It is difficult to detect and remove as it does not leave any files on the system.

    • Examples of fileless malware include PowerShell-based attacks and mac...

  • Answered by AI
  • Q3. Ransomware and their mitigation
  • Ans. 

    Ransomware is a type of malware that encrypts files and demands payment for decryption. Mitigation involves backups, security software, and user education.

    • Regularly backup important data to prevent loss

    • Use anti-malware software to detect and prevent ransomware

    • Educate users on how to identify and avoid phishing emails and suspicious downloads

    • Implement network segmentation to limit the spread of ransomware

    • Have an inciden...

  • Answered by AI
  • Q4. Alerts in SIEM tool
  • Ans. 

    Alerts in SIEM tool

    • SIEM tools generate alerts based on predefined rules and thresholds

    • Alerts can be categorized based on severity levels

    • Alerts can be investigated and triaged to determine if they are true positives or false positives

    • SIEM tools can also automate response actions based on certain alerts

    • Examples of alerts include failed login attempts, malware detections, and suspicious network traffic

  • Answered by AI
  • Q5. DOS and DDOS attack
  • Ans. 

    DOS and DDOS attacks are malicious attempts to disrupt the normal functioning of a website or network.

    • DOS (Denial of Service) attack is a type of attack where a single system floods the target system with traffic, making it unavailable to legitimate users.

    • DDOS (Distributed Denial of Service) attack is a more sophisticated version of DOS attack, where multiple systems are used to flood the target system with traffic.

    • DDO...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - prepare your homework and be confident
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.

Round 1 - Case Study 

They ask questions based on security

Round 2 - One-on-one 

(2 Questions)

  • Q1. What is injection
  • Ans. 

    Injection is a technique used to introduce code or data into a computer program or system.

    • Injection is commonly used in cyber attacks to exploit vulnerabilities in software.

    • Types of injection include SQL injection, cross-site scripting (XSS), and command injection.

    • Injection attacks can lead to unauthorized access, data theft, and system compromise.

  • Answered by AI
  • Q2. Type of injection
  • Ans. 

    SQL injection is a type of injection attack that allows an attacker to execute malicious SQL statements.

    • SQL injection involves inserting malicious SQL code into input fields of a web application

    • Attackers can manipulate databases, steal data, and even delete or modify records

    • Examples include entering ' OR '1'='1' into a login form to bypass authentication

  • Answered by AI
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in May 2024. There were 3 interview rounds.

Round 1 - One-on-one 

(1 Question)

  • Q1. What is iso , assessment audit
  • Ans. 

    ISO stands for International Organization for Standardization. An assessment audit is a process of evaluating an organization's compliance with ISO standards.

    • ISO is an international standard-setting body that develops and publishes standards for various industries to ensure quality, safety, and efficiency.

    • An assessment audit is a systematic examination of an organization's processes, procedures, and systems to determin...

  • Answered by AI
Round 2 - Technical 

(1 Question)

  • Q1. More deep dive into your domain
Round 3 - HR 

(1 Question)

  • Q1. General hr type your strength weakness, qualities

Interview Preparation Tips

Interview preparation tips for other job seekers - Be calm and confident, honest about what you don't know
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before Aug 2022. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Aptitude Test 

Easy aptitude test, just check the accuracy.

Round 3 - Coding Test 

Bit tough one, Question is from linked list.

Round 4 - HR 

(1 Question)

  • Q1. Genral questions regarding your carrier based on your resume

I applied via Referral and was interviewed before Nov 2019. There were 3 interview rounds.

Interview Questionnaire 

3 Questions

  • Q1. Why you want to join this company and this domain?
  • Q2. What is SIEM?
  • Ans. 

    SIEM stands for Security Information and Event Management. It is a software solution that helps organizations to detect and respond to security threats.

    • SIEM collects and analyzes security-related data from various sources such as network devices, servers, and applications.

    • It correlates the data to identify patterns and anomalies that may indicate a security breach.

    • SIEM provides real-time alerts and reports to security ...

  • Answered by AI
  • Q3. Which SIEM you have worked with?

Interview Preparation Tips

Interview preparation tips for other job seekers - The main advice is that, you might not know everything but it doesn't mean that you're lacking something just be confident and give answers with clarity also accept the fact that you don't know a particular topic rather than blabbering anything.

Deloitte Interview FAQs

How many rounds are there in Deloitte Cyber Security Analyst interview for experienced candidates?
Deloitte interview process for experienced candidates usually has 2 rounds. The most common rounds in the Deloitte interview process for experienced candidates are Resume Shortlist and Technical.
What are the top questions asked in Deloitte Cyber Security Analyst interview for experienced candidates?

Some of the top questions asked at the Deloitte Cyber Security Analyst interview for experienced candidates -

  1. Qradar On...read more
  2. Different ports and example of UDP p...read more
  3. Nothing related to Cybersecur...read more

Tell us how to improve this page.

People are getting interviews through

based on 1 Deloitte interview
Job Portal
100%
Low Confidence
?
Low Confidence means the data is based on a small number of responses received from the candidates.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.1k Interviews
Accenture Interview Questions
3.9
 • 7.9k Interviews
Capgemini Interview Questions
3.8
 • 4.7k Interviews
IBM Interview Questions
4.1
 • 2.3k Interviews
PwC Interview Questions
3.4
 • 1.3k Interviews
Ernst & Young Interview Questions
3.5
 • 1.1k Interviews
KPMG India Interview Questions
3.5
 • 770 Interviews
ZS Interview Questions
3.4
 • 466 Interviews
BCG Interview Questions
3.8
 • 191 Interviews
View all
Deloitte Cyber Security Analyst Salary
based on 112 salaries
₹3 L/yr - ₹11 L/yr
10% more than the average Cyber Security Analyst Salary in India
View more details

Deloitte Cyber Security Analyst Reviews and Ratings

based on 10 reviews

3.6/5

Rating in categories

2.9

Skill development

3.1

Work-Life balance

3.6

Salary & Benefits

3.4

Job Security

2.8

Company culture

2.6

Promotions/Appraisal

3.0

Work Satisfaction

Explore 10 Reviews and Ratings
Consultant
32.8k salaries
unlock blur

₹6.2 L/yr - ₹23 L/yr

Senior Consultant
20.9k salaries
unlock blur

₹11 L/yr - ₹42 L/yr

Analyst
13.9k salaries
unlock blur

₹3.8 L/yr - ₹12.6 L/yr

Assistant Manager
9.9k salaries
unlock blur

₹7.6 L/yr - ₹24 L/yr

Manager
7k salaries
unlock blur

₹15.7 L/yr - ₹52 L/yr

Explore more salaries
Compare Deloitte with

Accenture

3.9
Compare

PwC

3.4
Compare

Ernst & Young

3.5
Compare

Cognizant

3.8
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview