Premium Employer

i

This company page is being actively managed by FIS Team. If you also belong to the team, you can get access from here

FIS Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

FIS Security Analyst Interview Questions, Process, and Tips

Updated 19 Jun 2024

Top FIS Security Analyst Interview Questions and Answers

FIS Security Analyst Interview Experiences

2 interviews found

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What do you understand by RSA?
  • Ans. 

    RSA stands for Rivest-Shamir-Adleman, a widely used encryption algorithm for secure communication.

    • RSA is a public-key cryptosystem used for secure data transmission.

    • It involves generating a public key and a private key for encryption and decryption.

    • RSA encryption is based on the difficulty of factoring large prime numbers.

    • It is commonly used in secure communication protocols like HTTPS.

    • RSA can be used for digital signa

  • Answered by AI
  • Q2. Basic principles of security management?
  • Ans. 

    Basic principles of security management involve risk assessment, access control, incident response, and security awareness.

    • Risk assessment: Identifying and evaluating potential risks to the organization's security.

    • Access control: Implementing measures to control who has access to sensitive information or resources.

    • Incident response: Developing plans and procedures to respond to security incidents effectively.

    • Security a...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Just be yourself
Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed before Oct 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. What is common between HTTP, FTP, and Telnet?
  • Ans. 

    They are all application layer protocols used for communication over a network.

    • They all operate at the application layer of the OSI model.

    • They all use client-server architecture for communication.

    • They all transmit data over a network.

    • Examples: HTTP is used for web browsing, FTP for file transfer, and Telnet for remote access.

  • Answered by AI
Round 3 - Technical 

(2 Questions)

  • Q1. "Attitude is everything" what do you think this means?
  • Q2. Favorite go-to tool for security investigation.
  • Ans. 

    My favorite go-to tool for security investigation is Wireshark.

    • Wireshark is a powerful network protocol analyzer used for troubleshooting, analysis, development, and education.

    • It allows me to capture and interactively browse the traffic running on a computer network.

    • I can use Wireshark to analyze network traffic, identify security vulnerabilities, and troubleshoot network issues.

    • Wireshark supports hundreds of protocols...

  • Answered by AI

Skills evaluated in this interview

Security Analyst Interview Questions Asked at Other Companies

Q1. How do you test a web application? What is CSRF and SSRF? What is ... read more
asked in TCS
Q2. What protocols used by nmap Difference between public and private ... read more
Q3. 1. Describe your SOC scenario! 2. What kind of report you prepari ... read more
Q4. Difference between encryption and encoding? With examples and imp ... read more
asked in TCS
Q5. what are the major vulnerabilities you've encounterd? how did you ... read more

Interview questions from similar companies

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Basic questions
Round 2 - Technical 

(1 Question)

  • Q1. Security basic questions
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
-
Result
-

I was interviewed in Jul 2024.

Round 1 - Technical 

(1 Question)

  • Q1. About yourself and responsibility
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

It had multiple aptitude questions with programming questions

Round 2 - Technical 

(1 Question)

  • Q1. Questions based on your resume
Round 3 - HR 

(1 Question)

  • Q1. Wat is your strength Will u work in night shift

Security Analyst Interview Questions & Answers

Accenture user image Nitin Sadhu Londhe

posted on 25 Jan 2024

Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed in Dec 2023. There was 1 interview round.

Round 1 - One-on-one 

(1 Question)

  • Q1. Tell me about yourself ?
  • Ans. I am Nitin Londhe. I have started my job career at Wipro with in year 2013 to jan 2024. Now I have recently join EXL magarpatt city. I have done my job at Wipro technologies like various post front office executive, ID batch coordinator, SOC operator,ACO etc.
  • Answered by Nitin Sadhu Londhe

Interview Preparation Tips

Interview preparation tips for other job seekers - Think be positive every time.

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.

    • Experienced in conducting security assessments and identifying vulnerabilities

    • Skilled in implementing security measures to protect against cyber threats

    • Proficient in analyzing security incidents and responding effectively

    • Certified in relevant security certifications such as CISSP or CISM

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different types of malware
  • Ans. 

    Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

    • Viruses: self-replicating programs that infect other files on a computer

    • Worms: standalone malware that spreads across networks

    • Trojans: disguised as legitimate software to trick users into installing them

    • Ransomware: encrypts files and demands payment for decryption

    • Spyware: secretly gathers information about...

  • Answered by AI
  • Q2. What would you first do if a machine is infected
  • Ans. 

    The first step would be to isolate the infected machine from the network to prevent further spread of the infection.

    • Isolate the infected machine from the network to prevent further spread of the infection

    • Identify the type of malware or virus that has infected the machine

    • Run a full system scan using antivirus software to detect and remove the malware

    • Update the operating system and all software to patch any vulnerabiliti...

  • Answered by AI
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Aug 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. About Experience on Technologies
  • Q2. Current CTC and Expected
Round 3 - Technical 

(4 Questions)

  • Q1. What are Azure Security Policies
  • Ans. 

    Azure Security Policies are a set of rules and configurations that help enforce security controls within Azure environments.

    • Azure Security Policies help ensure compliance with security standards and best practices

    • They can be used to enforce specific security configurations, such as requiring encryption for storage accounts

    • Policies can be assigned at the subscription, resource group, or resource level

  • Answered by AI
  • Q2. How do we use Conditional Access in Azure
  • Ans. 

    Conditional Access in Azure is used to control access to resources based on specific conditions.

    • Conditional Access policies can be set up to require multi-factor authentication for certain users or devices

    • It can restrict access based on location, device compliance, or other factors

    • Conditional Access can be used to enforce policies such as requiring a compliant device to access sensitive data

  • Answered by AI
  • Q3. Regarding MFA, VPN, GPO
  • Q4. What is Active Directory Federation Service
  • Ans. 

    Active Directory Federation Service (AD FS) is a feature in Windows Server that allows for single sign-on authentication across multiple systems.

    • AD FS allows users to access multiple applications with a single set of credentials

    • It enables secure sharing of identity information between trusted partners

    • AD FS uses claims-based authentication to verify user identity

    • It supports integration with cloud-based services like Off

  • Answered by AI

Skills evaluated in this interview

I applied via campus placement at Narula Institute of Technology, Kolkata and was interviewed before Nov 2020. There were 5 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Code for fibbonacci series in Java, inheritance and polymorphism, oops concept
  • Ans. 

    Answering questions on Java code for Fibonacci series, inheritance, polymorphism, and OOP concepts.

    • Fibonacci series code in Java can be written using recursion or iteration.

    • Inheritance is a mechanism in OOP where a class inherits properties and methods from another class.

    • Polymorphism is the ability of an object to take on multiple forms.

    • OOP concepts include encapsulation, abstraction, inheritance, and polymorphism.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Keep up a confidence in yourself while answering.Try to be clear in mind of what you are speaking . don't get confused on bits of things.

Skills evaluated in this interview

FIS Interview FAQs

How many rounds are there in FIS Security Analyst interview?
FIS interview process usually has 2 rounds. The most common rounds in the FIS interview process are Technical and Resume Shortlist.
How to prepare for FIS Security Analyst interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at FIS. The most common topics and skills that interviewers at FIS expect are Financial Services, IT Security, Information Security, Security Analysis and Encryption.
What are the top questions asked in FIS Security Analyst interview?

Some of the top questions asked at the FIS Security Analyst interview -

  1. What is common between HTTP, FTP, and Teln...read more
  2. Favorite go-to tool for security investigati...read more
  3. What do you understand by R...read more

Tell us how to improve this page.

FIS Security Analyst Interview Process

based on 2 interviews

Interview experience

5
  
Excellent
View more
Join FIS Advancing the way the world pays, banks and investments
FIS Security Analyst Salary
based on 38 salaries
₹3.6 L/yr - ₹11.1 L/yr
12% more than the average Security Analyst Salary in India
View more details

FIS Security Analyst Reviews and Ratings

based on 7 reviews

3.0/5

Rating in categories

2.9

Skill development

3.0

Work-life balance

3.0

Salary

3.0

Job security

3.0

Company culture

3.0

Promotions

2.8

Work satisfaction

Explore 7 Reviews and Ratings
Senior Software Engineer
2.7k salaries
unlock blur

₹8 L/yr - ₹30 L/yr

Software Engineer
1.7k salaries
unlock blur

₹4.1 L/yr - ₹16 L/yr

Lead Engineer
694 salaries
unlock blur

₹7.2 L/yr - ₹27 L/yr

Team Member
664 salaries
unlock blur

₹1.8 L/yr - ₹6 L/yr

Senior Leader Engineer
642 salaries
unlock blur

₹9.9 L/yr - ₹32.1 L/yr

Explore more salaries
Compare FIS with

TCS

3.7
Compare

Infosys

3.6
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview