Upload Button Icon Add office photos

Filter interviews by

Genpact SOC Analyst Interview Questions and Answers

Updated 4 Jul 2023

Genpact SOC Analyst Interview Experiences

1 interview found

SOC Analyst Interview Questions & Answers

user image Anonymous

posted on 4 Jul 2023

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Case Study 

How you can slove issue when there is malware alert triggered where No ioc or ioa is deducted its new and you are only one at the shift how you will come up .

Round 3 - Technical 

(2 Questions)

  • Q1. How you will rectify new attack
  • Ans. 

    To rectify a new attack, I would first analyze the attack vector, contain the attack, investigate the root cause, implement necessary security measures, and update incident response procedures.

    • Analyze the attack vector to understand how the attack occurred

    • Contain the attack by isolating affected systems and limiting further damage

    • Investigate the root cause of the attack to prevent future incidents

    • Implement necessary se...

  • Answered by AI
  • Q2. How you can solve or scan the vulnerability
  • Ans. 

    To solve or scan vulnerabilities, utilize vulnerability scanning tools, conduct penetration testing, implement security patches, and regularly update software.

    • Utilize vulnerability scanning tools such as Nessus, Qualys, or OpenVAS to identify vulnerabilities in systems and networks

    • Conduct penetration testing to simulate real-world attacks and identify potential vulnerabilities

    • Implement security patches provided by soft...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Genpact SOC Analyst interview:
  • Check company names in chathgpt
Interview preparation tips for other job seekers - Always trust and be patience and give your best.always hit the target any time one can achieve the target.

Interview questions from similar companies

SOC Analyst Interview Questions & Answers

TCS user image Saurabh Shinde

posted on 23 Sep 2024

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. WHAT IS HONETPOT
  • Ans. 

    A honeypot is a decoy system designed to lure cyber attackers and gather information about their tactics, techniques, and procedures.

    • Honeypots are used to detect and analyze cyber threats in a controlled environment.

    • They can be deployed within an organization's network to attract and monitor malicious activities.

    • Honeypots can help organizations improve their security posture by identifying vulnerabilities and understan...

  • Answered by AI
  • Q2. HOW YOU HANDLE SECURITY INCIDENT
  • Ans. 

    I handle security incidents by following established incident response procedures and utilizing various security tools.

    • Immediately isolate affected systems to prevent further damage

    • Collect and analyze relevant data to determine the scope and impact of the incident

    • Contain the incident by blocking malicious activity and removing threats

    • Communicate with stakeholders to keep them informed of the situation

    • Document the incid...

  • Answered by AI

SOC Analyst Interview Questions & Answers

HCLTech user image Jangam Vijayasree

posted on 23 Feb 2024

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is CIA triad
  • Ans. 

    CIA triad is a model designed to guide policies for information security within an organization.

    • CIA stands for Confidentiality, Integrity, and Availability

    • Confidentiality ensures that information is only accessible to those who are authorized to view it

    • Integrity ensures that information is accurate and trustworthy

    • Availability ensures that information is accessible when needed

    • Example: Encrypting sensitive data to mainta

  • Answered by AI
  • Q2. What is Port number of RDP
  • Ans. 

    The port number for RDP (Remote Desktop Protocol) is 3389.

    • Port number for RDP is 3389

    • RDP uses TCP protocol

    • Commonly used for remote desktop connections

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Basics of networking concepts Osi model Cyber attacks
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - One-on-one 

(5 Questions)

  • Q1. What kind of vulnerability you came across
  • Ans. 

    I came across a vulnerability in a web application that allowed for SQL injection attacks.

    • Identified lack of input validation in user inputs

    • Discovered that the application was directly executing user-supplied SQL queries

    • Suggested implementing parameterized queries to prevent SQL injection

    • Tested the vulnerability by attempting to inject SQL code through input fields

  • Answered by AI
  • Q2. What issues you face in management regarding reporting some security issues
  • Q3. Tcp vs UDP which one is better
  • Ans. 

    It depends on the specific use case and requirements.

    • TCP is reliable and ensures all data is delivered in order, but it can be slower due to the overhead of error-checking and retransmission.

    • UDP is faster and more efficient for real-time applications like video streaming or online gaming, but it does not guarantee delivery or order of packets.

    • Choose TCP for applications that require reliable data transmission, such as ...

  • Answered by AI
  • Q4. Hashing and its examples in real world
  • Ans. 

    Hashing is a process of converting input data into a fixed-size string of bytes using a mathematical algorithm.

    • Hashing is commonly used in password storage to securely store user passwords without storing the actual password.

    • Hashing is used in digital signatures to ensure the integrity of the signed data.

    • Blockchain technology uses hashing to create a secure and tamper-proof record of transactions.

    • File integrity checks ...

  • Answered by AI
  • Q5. Pop3 and icmp what are work and port no.

Interview Preparation Tips

Topics to prepare for Wipro Information Security Analyst interview:
  • Networking
  • cybersecurity
  • reallife scenarios
  • attacks

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Campus Placement and was interviewed in Sep 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

It is online test. In this test there is question of apti and also coding and from 5g question.

Round 2 - Coding Test 

There are two questions asked and time is enough to solve 60 minutes

Round 3 - Technical 

(5 Questions)

  • Q1. Wap for palindrome number
  • Ans. 

    A palindrome number is a number that remains the same when its digits are reversed.

    • Convert the number to a string

    • Reverse the string

    • Check if the reversed string is equal to the original string

  • Answered by AI
  • Q2. Add two numbers by function
  • Ans. 

    Create a function to add two numbers

    • Define a function that takes two parameters as input

    • Inside the function, add the two numbers together and return the result

    • Example: function addNumbers(num1, num2) { return num1 + num2; }

  • Answered by AI
  • Q3. Write a code for Binary search
  • Ans. 

    Binary search code implementation in Python

    • Define a function that takes a sorted array and a target value as input

    • Initialize two pointers, low and high, to the start and end of the array respectively

    • While low is less than or equal to high, calculate mid as (low + high) // 2 and compare array[mid] with target

    • If array[mid] is equal to target, return mid

    • If array[mid] is less than target, update low to mid + 1

    • If array[mid]...

  • Answered by AI
  • Q4. Wap for check your name is palindrome not
  • Ans. 

    A program to check if a given name is a palindrome or not.

    • Convert the name to lowercase to handle case-insensitivity

    • Remove any spaces or special characters from the name

    • Reverse the name and compare it with the original name to check for palindrome

  • Answered by AI
  • Q5. What is malloc and calloc function
  • Ans. 

    malloc and calloc are functions in C programming used for dynamic memory allocation.

    • malloc function is used to allocate a single block of memory of a specified size.

    • calloc function is used to allocate multiple blocks of memory of a specified size, initialized to zero.

    • Example: int *ptr = (int*)malloc(5 * sizeof(int));

    • Example: int *ptr = (int*)calloc(5, sizeof(int));

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Capgemini Network Engineer interview:
  • Basic programming

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
Selected Selected
Round 1 - One-on-one 

(2 Questions)

  • Q1. CCNA SWITCHING and switching
  • Q2. Routing
Round 2 - Technical 

(1 Question)

  • Q1. Manager round CCNA routing and switching
Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Not Selected

I applied via Job Portal and was interviewed in Nov 2024. There were 2 interview rounds.

Round 1 - Coding Test 

I would like simple test

Round 2 - HR 

(5 Questions)

  • Q1. I would like to lisen the words of company maganement .. And the process of company rules and regulations ..
  • Q2. I will occupy the group of my team to secrue the entire the company to first stage
  • Q3. I want to.Get a job inMahindra
  • Q4. I didn't learn the computertyping but will learn definitely.. in tech Mahindr company basics
  • Q5. I am a student degree first year.. ButI would like work in techMahindra..

Interview Preparation Tips

Interview preparation tips for other job seekers - I say hole job seekers
The tech Mahindra was better than the future
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(3 Questions)

  • Q1. Share you internship exp
  • Ans. 

    I interned at a telecommunications company where I gained hands-on experience in configuring network devices and troubleshooting network issues.

    • Configured routers and switches to optimize network performance

    • Assisted in setting up VLANs and implementing security protocols

    • Troubleshooted network connectivity issues for end users

    • Participated in network infrastructure upgrades and maintenance

  • Answered by AI
  • Q2. All question based on the resume only
  • Q3. Prepare whatever written in your resume

Interview Preparation Tips

Interview preparation tips for other job seekers - read your resume
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. BGP and ospf and vlan
  • Q2. VSS and stacking switch
Round 2 - Technical 

(2 Questions)

  • Q1. BGP in depth ospf and vlan
  • Q2. Vss and switch stacking switch routing

Interview Preparation Tips

Interview preparation tips for other job seekers - Please prepare strong technical on routing switching and f5.

Genpact Interview FAQs

How many rounds are there in Genpact SOC Analyst interview?
Genpact interview process usually has 3 rounds. The most common rounds in the Genpact interview process are Resume Shortlist, Case Study and Technical.
How to prepare for Genpact SOC Analyst interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Genpact. The most common topics and skills that interviewers at Genpact expect are SOC, Arcsight, Log Analysis, Management Services and Reverse Engineering.
What are the top questions asked in Genpact SOC Analyst interview?

Some of the top questions asked at the Genpact SOC Analyst interview -

  1. How you can solve or scan the vulnerabil...read more
  2. How you will rectify new att...read more

Tell us how to improve this page.

Genpact SOC Analyst Interview Process

based on 1 interview

Interview experience

5
  
Excellent
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Accenture Interview Questions
3.9
 • 8.1k Interviews
Infosys Interview Questions
3.7
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Cognizant Interview Questions
3.8
 • 5.5k Interviews
Capgemini Interview Questions
3.8
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
IBM Interview Questions
4.0
 • 2.4k Interviews
DXC Technology Interview Questions
3.7
 • 805 Interviews
View all
Genpact SOC Analyst Salary
based on 57 salaries
₹2.8 L/yr - ₹9.8 L/yr
At par with the average SOC Analyst Salary in India
View more details

Genpact SOC Analyst Reviews and Ratings

based on 3 reviews

4.7/5

Rating in categories

4.3

Skill development

4.5

Work-life balance

4.3

Salary

5.0

Job security

4.5

Company culture

4.3

Promotions

4.3

Work satisfaction

Explore 3 Reviews and Ratings
Process Developer
36.2k salaries
unlock blur

₹1 L/yr - ₹6.8 L/yr

Process Associate
28k salaries
unlock blur

₹0.9 L/yr - ₹6.5 L/yr

Assistant Manager
19.8k salaries
unlock blur

₹5 L/yr - ₹14 L/yr

Management Trainee
19.2k salaries
unlock blur

₹1.6 L/yr - ₹8.5 L/yr

Manager
7.4k salaries
unlock blur

₹5.7 L/yr - ₹24 L/yr

Explore more salaries
Compare Genpact with

Accenture

3.9
Compare

Capgemini

3.7
Compare

TCS

3.7
Compare

Cognizant

3.8
Compare
Did you find this page helpful?
Yes No
write
Share an Interview