Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Giesecke & Devrient Team. If you also belong to the team, you can get access from here

Giesecke & Devrient Verified Tick

Compare button icon Compare button icon Compare
3.7

based on 395 Reviews

Filter interviews by

Giesecke & Devrient Security Engineer Interview Questions and Answers

Updated 7 Jul 2024

Giesecke & Devrient Security Engineer Interview Experiences

1 interview found

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(2 Questions)

  • Q1. Qualys API and usage of python
  • Ans. 

    Qualys API allows for automated security assessments and reporting, and can be accessed using Python for scripting and automation.

    • Qualys API provides endpoints for scanning, reporting, asset management, and more.

    • Python can be used to interact with the Qualys API by sending HTTP requests and handling responses.

    • Examples of using Qualys API with Python include automating vulnerability scans, retrieving scan reports, and m

  • Answered by AI
  • Q2. What are the python libraries you use
  • Ans. 

    I primarily use the following Python libraries: requests, BeautifulSoup, pandas, numpy, scikit-learn, matplotlib.

    • requests: for making HTTP requests

    • BeautifulSoup: for web scraping

    • pandas: for data manipulation and analysis

    • numpy: for numerical computing

    • scikit-learn: for machine learning

    • matplotlib: for data visualization

  • Answered by AI

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via campus placement at Narsee Monjee Institute Of Management Studies (NMIMS) and was interviewed in Nov 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Aptitude Test 

It was aptitude test with quantitative logical and coding sections

Round 3 - Technical 

(5 Questions)

  • Q1. Asked questions on cybersecurity
  • Q2. Do you know about CIA
  • Q3. Which one is most important in CIA according to you
  • Ans. 

    Confidentiality is the most important in CIA according to me.

    • Confidentiality ensures that sensitive information is protected from unauthorized access.

    • It involves implementing access controls, encryption, and secure communication channels.

    • Examples include securing user data, protecting trade secrets, and safeguarding classified information.

    • Confidentiality is crucial in maintaining trust, privacy, and preventing data bre

  • Answered by AI
  • Q4. SQL injection, various attacks , SSL certificate etc
  • Q5. SSL CERTIFICATE

Interview Preparation Tips

Interview preparation tips for other job seekers - For this role it's good if you have cyber security knowledge about various threats and attacks
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
-

I was interviewed before Jun 2023.

Round 1 - Technical 

(1 Question)

  • Q1. Cyber Kill Chain
Round 2 - Technical 

(1 Question)

  • Q1. Explain Natting
  • Ans. 

    Natting stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.

    • Natting allows multiple devices on a local network to share a single public IP address

    • Types of Natting include Static NAT, Dynamic NAT, and Port Address Translation (PAT)

    • Natting helps improve security by hiding internal IP addresses from external networks

    • Example: A company uses NAT to ...

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.

Round 1 - Technical 

(3 Questions)

  • Q1. Cyber security attack and remediation
  • Q2. Scenario based questions
  • Q3. Tell me about yourself
Round 2 - HR 

(2 Questions)

  • Q1. Basic questions
  • Q2. Salary discussion

I applied via LinkedIn and was interviewed in Jun 2022. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. SQL Injection and CSS Attacks
  • Q2. Port Numbers of different protocols
  • Ans. 

    Port numbers for different protocols

    • HTTP - 80

    • HTTPS - 443

    • FTP - 20, 21

    • SSH - 22

    • SMTP - 25

    • DNS - 53

    • POP3 - 110

    • IMAP - 143

    • LDAP - 389

    • RDP - 3389

  • Answered by AI
  • Q3. Steps to consider after Phishing attack
  • Ans. 

    Steps to take after a phishing attack

    • Immediately disconnect from the internet

    • Change all passwords associated with the compromised account

    • Notify the appropriate parties (IT department, bank, etc.)

    • Run a virus scan on all devices used to access the compromised account

    • Educate yourself and others on how to identify and avoid phishing attacks

  • Answered by AI
  • Q4. Some Alerts/incidents and their remediations.
  • Q5. A couple behavioural questions too

Interview Preparation Tips

Interview preparation tips for other job seekers - Interviewers were quite friendly and cool.
Everything went well.

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before Apr 2023. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Basic Cybersecurity questions
  • Q2. Scenario based questions
Round 2 - Technical 

(2 Questions)

  • Q1. Basic day to day responsibility
  • Ans. 

    Monitoring and analyzing security measures to protect an organization's computer systems and networks

    • Monitoring security measures to ensure they are effective

    • Analyzing security breaches to determine the cause and prevent future incidents

    • Implementing security protocols and procedures

    • Conducting regular security audits and risk assessments

  • Answered by AI
  • Q2. Experience and skill set
Round 3 - HR 

(2 Questions)

  • Q1. Salary expectation
  • Q2. About myself and strength and weakness

Interview Preparation Tips

Topics to prepare for Allianz Technology Information Security Analyst interview:
  • Cybersecurity

I applied via Naukri.com and was interviewed in Jul 2020. There were 4 interview rounds.

Interview Questionnaire 

6 Questions

  • Q1. Do you have any experience in Penetration testing?
  • Ans. 

    Yes, I have experience in Penetration testing.

    • I have conducted penetration testing for various clients in different industries.

    • I am familiar with various tools and techniques used in penetration testing such as Metasploit, Nmap, and Burp Suite.

    • I have experience in both manual and automated penetration testing.

    • I have provided detailed reports on vulnerabilities found and recommendations for remediation.

    • I stay up-to-date...

  • Answered by AI
  • Q2. What is your role in previous organization?
  • Q3. How you can implement network segmentation?
  • Ans. 

    Network segmentation can be implemented by creating separate subnetworks and controlling access between them.

    • Identify the different types of data and systems that need to be protected

    • Create separate subnetworks for each type of data/system

    • Use firewalls and access controls to control traffic between subnetworks

    • Regularly review and update the segmentation strategy

    • Example: separating guest Wi-Fi network from corporate net

  • Answered by AI
  • Q4. What is the role of firewall and how it can be used efficiently to improve the security
  • Ans. 

    Firewall is a network security system that monitors and controls incoming and outgoing network traffic.

    • Firewall acts as a barrier between a trusted internal network and untrusted external network

    • It can be used to block unauthorized access to a network

    • It can also be used to block outgoing traffic to prevent data leakage

    • Firewalls can be hardware or software-based

    • Examples of firewalls include Cisco ASA, Fortinet FortiGate

  • Answered by AI
  • Q5. Basic TCP/IP questions
  • Q6. How did you managed to complete a task in which you don't have prior knowledge or experience?

Interview Preparation Tips

Interview preparation tips for other job seekers - Even though you don't know the exact answer, share your relevant ideas and experience

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via campus placement at Narsee Monjee Institute Of Management Studies (NMIMS) and was interviewed in Nov 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Aptitude Test 

It was aptitude test with quantitative logical and coding sections

Round 3 - Technical 

(5 Questions)

  • Q1. Asked questions on cybersecurity
  • Q2. Do you know about CIA
  • Q3. Which one is most important in CIA according to you
  • Ans. 

    Confidentiality is the most important in CIA according to me.

    • Confidentiality ensures that sensitive information is protected from unauthorized access.

    • It involves implementing access controls, encryption, and secure communication channels.

    • Examples include securing user data, protecting trade secrets, and safeguarding classified information.

    • Confidentiality is crucial in maintaining trust, privacy, and preventing data bre

  • Answered by AI
  • Q4. SQL injection, various attacks , SSL certificate etc
  • Q5. SSL CERTIFICATE

Interview Preparation Tips

Interview preparation tips for other job seekers - For this role it's good if you have cyber security knowledge about various threats and attacks
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
6-8 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before May 2023. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. Easy, CSPM,CWPP Policy related question,Networking, Data structures
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. Cyber kill chain
  • Q2. Mitre Att&ck frame work
  • Q3. Event life cycle of any siem solution
  • Ans. 

    The event life cycle of a SIEM solution involves several stages from data collection to incident response.

    • Data collection: SIEM collects logs and events from various sources such as network devices, servers, and applications.

    • Normalization: The collected data is normalized to a common format for easier analysis and correlation.

    • Aggregation: Events are grouped together based on common attributes to identify patterns and t...

  • Answered by AI
  • Q4. Port numbers, protocols
  • Q5. Explain OSI model briefly
  • Ans. 

    The OSI model is a conceptual framework that defines the functions of a network protocol stack.

    • The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has a specific function and interacts with the layers above and below it.

    • The model helps in understanding how data is transmitted and received in a network.

    • For example, the Physical layer deals wi...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Basics much important in first round.
In second round expect some scenario based questions.

Skills evaluated in this interview

Giesecke & Devrient Interview FAQs

How many rounds are there in Giesecke & Devrient Security Engineer interview?
Giesecke & Devrient interview process usually has 1 rounds. The most common rounds in the Giesecke & Devrient interview process are One-on-one Round.
What are the top questions asked in Giesecke & Devrient Security Engineer interview?

Some of the top questions asked at the Giesecke & Devrient Security Engineer interview -

  1. What are the python libraries you ...read more
  2. Qualys API and usage of pyt...read more

Tell us how to improve this page.

Giesecke & Devrient Security Engineer Interview Process

based on 1 interview

Interview experience

5
  
Excellent
View more

Interview Questions from Similar Companies

Synechron Interview Questions
3.6
 • 358 Interviews
Movate Interview Questions
3.3
 • 247 Interviews
SS&C TECHNOLOGIES Interview Questions
3.4
 • 165 Interviews
ThoughtWorks Interview Questions
3.9
 • 145 Interviews
Sopra Steria Interview Questions
3.9
 • 125 Interviews
Luxoft Interview Questions
3.7
 • 120 Interviews
TEKsystems Interview Questions
3.4
 • 115 Interviews
Tietoevry Interview Questions
4.3
 • 86 Interviews
View all
Software Engineer
100 salaries
unlock blur

₹2.9 L/yr - ₹9 L/yr

Senior Software Engineer
98 salaries
unlock blur

₹7.9 L/yr - ₹31 L/yr

Service Engineer
94 salaries
unlock blur

₹1.8 L/yr - ₹4.5 L/yr

Lead Engineer
80 salaries
unlock blur

₹11.5 L/yr - ₹27.5 L/yr

Assistant Engineer
70 salaries
unlock blur

₹1.8 L/yr - ₹4.1 L/yr

Explore more salaries
Compare Giesecke & Devrient with

Synechron

3.6
Compare

Movate

3.3
Compare

Sopra Steria

3.9
Compare

NCR Voyix

3.9
Compare
Did you find this page helpful?
Yes No
write
Share an Interview