Upload Button Icon Add office photos

Filter interviews by

Excel Software Solutions Security Engineer Interview Questions and Answers

Be the first one to contribute and help others!

Interview questions from similar companies

Interview experience
1
Bad
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Threat modeling concepts
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before May 2023. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. How Siem works Mitre attack framework Cyber kill chain Different types of attack
  • Ans. 

    SIEM works by collecting and analyzing security data to detect and respond to cyber threats. Mitre attack framework and Cyber kill chain are used to categorize and analyze attacks.

    • SIEM collects security data from various sources like logs, network traffic, and endpoints for analysis.

    • Mitre attack framework provides a structured way to categorize and analyze cyber threats based on tactics and techniques used by attackers...

  • Answered by AI
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Referral and was interviewed in Jul 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Types of malware, port numbers, basics of SOC, basics of SIEM
  • Q2. Projects mentioned in the resume, OSI layers

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare CV, have command on basic networking, SIEM, SOC.
Even though the technicall interviwer was impressed with my answers, but still didnt received the offer 🤷🏻‍♀️
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Ospf, bgp states
  • Q2. How stp work in 3 switches
  • Ans. 

    STP (Spanning Tree Protocol) is used to prevent loops in a network by blocking redundant paths between switches.

    • STP elects a root bridge to serve as the central point in the network

    • Each switch determines the best path to the root bridge based on the lowest path cost

    • Ports on switches are designated as root ports, designated ports, or blocking ports to create a loop-free topology

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. What is OWASP and it's attributes?
  • Ans. 

    OWASP stands for Open Web Application Security Project, a non-profit organization focused on improving software security.

    • OWASP provides resources such as tools, documentation, and guidelines for web application security.

    • It publishes a list of the top 10 most critical web application security risks.

    • OWASP also offers training and conferences to educate professionals on security best practices.

  • Answered by AI

I applied via Referral

Interview Questionnaire 

3 Questions

  • Q1. Incident, Change, Problem management
  • Q2. Business Process related
  • Q3. Technical Tools related

Interview Preparation Tips

Interview preparation tips for other job seekers - Just be confident while giving the interview. Try to stick with the topic. If don't know the answer simply say sto.
Interview experience
1
Bad
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Threat modeling concepts
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before May 2023. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. How Siem works Mitre attack framework Cyber kill chain Different types of attack
  • Ans. 

    SIEM works by collecting and analyzing security data to detect and respond to cyber threats. Mitre attack framework and Cyber kill chain are used to categorize and analyze attacks.

    • SIEM collects security data from various sources like logs, network traffic, and endpoints for analysis.

    • Mitre attack framework provides a structured way to categorize and analyze cyber threats based on tactics and techniques used by attackers...

  • Answered by AI
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What do you understand by RSA?
  • Ans. 

    RSA stands for Rivest-Shamir-Adleman, a widely used encryption algorithm for secure communication.

    • RSA is a public-key cryptosystem used for secure data transmission.

    • It involves generating a public key and a private key for encryption and decryption.

    • RSA encryption is based on the difficulty of factoring large prime numbers.

    • It is commonly used in secure communication protocols like HTTPS.

    • RSA can be used for digital signa

  • Answered by AI
  • Q2. Basic principles of security management?
  • Ans. 

    Basic principles of security management involve risk assessment, access control, incident response, and security awareness.

    • Risk assessment: Identifying and evaluating potential risks to the organization's security.

    • Access control: Implementing measures to control who has access to sensitive information or resources.

    • Incident response: Developing plans and procedures to respond to security incidents effectively.

    • Security a...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Just be yourself

I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Lots of questions asked, difficulty level easy to difficult. You can find easy questions Just typing cyber security analyst interview questions on Google. About difficult if you have good understanding the...
Round 2 - Technical 

(1 Question)

  • Q1. Managerial technical round, some technical questions, mostly generally discussion, senior manager is assessing you , so keep yourself calm and decent.

Interview Preparation Tips

Interview preparation tips for other job seekers - Give your ans very precisely, referring to some case study or real time vulnerability.

Tell us how to improve this page.

Interview Questions from Similar Companies

Teleperformance Interview Questions
3.9
 • 1.7k Interviews
Nagarro Interview Questions
4.0
 • 761 Interviews
FIS Interview Questions
3.9
 • 470 Interviews
Optum Interview Questions
4.0
 • 412 Interviews
Dell Interview Questions
4.1
 • 386 Interviews
Quest Global Interview Questions
3.6
 • 292 Interviews
Qualcomm Interview Questions
3.8
 • 270 Interviews
NeoSOFT Interview Questions
4.0
 • 253 Interviews
Episource Interview Questions
3.9
 • 221 Interviews
FactSet Interview Questions
4.0
 • 206 Interviews
View all
Compare Excel Software Solutions with

Teleperformance

3.9
Compare

FIS

3.9
Compare

Nagarro

4.0
Compare

Optum

4.0
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview