Upload Button Icon Add office photos

Filter interviews by

Global IS Consulting Cyber Security Analyst Lead Interview Questions, Process, and Tips for Experienced

Updated 22 Nov 2024

Global IS Consulting Cyber Security Analyst Lead Interview Experiences for Experienced

1 interview found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - Technical 

(9 Questions)

  • Q1. About OWASP top 10, uses, and why we use?
  • Q2. Differentiate between different attacks (like; CSRF/SSRF, LFI/RFI Stored XSS/DOM based XSS, etc.)
  • Ans. 

    Different attacks have unique characteristics and targets, such as CSRF/SSRF, LFI/RFI, Stored XSS/DOM based XSS.

    • CSRF (Cross-Site Request Forgery) - attacker tricks a user into performing actions on a website without their knowledge

    • SSRF (Server-Side Request Forgery) - attacker can make the server perform requests to other servers

    • LFI (Local File Inclusion) - attacker can include files on a server through a web browser

    • RFI...

  • Answered by AI
  • Q3. How to preform privilege escalation if we have normal user access?
  • Ans. 

    Privilege escalation can be achieved by exploiting vulnerabilities in the system or using social engineering techniques.

    • Exploit vulnerabilities in the system to gain higher privileges

    • Use social engineering techniques to trick users into granting higher privileges

    • Utilize known privilege escalation techniques such as DLL hijacking or abusing misconfigured permissions

  • Answered by AI
  • Q4. Different types of xss, explain
  • Ans. 

    Cross-Site Scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

    • Reflected XSS: occurs when the malicious script is reflected off a web server, such as in search results or error messages

    • Stored XSS: the injected script is permanently stored on the target server, such as in a comment section or database

    • DOM-based XSS: the attack occurs i...

  • Answered by AI
  • Q5. List of common ports for network communication
  • Ans. 

    Common ports for network communication

    • Port 80 - HTTP (Hypertext Transfer Protocol)

    • Port 443 - HTTPS (Hypertext Transfer Protocol Secure)

    • Port 25 - SMTP (Simple Mail Transfer Protocol)

    • Port 22 - SSH (Secure Shell)

    • Port 21 - FTP (File Transfer Protocol)

  • Answered by AI
  • Q6. How to preform bruteforce
  • Ans. 

    Bruteforce is a method used to crack passwords by systematically trying all possible combinations until the correct one is found.

    • Use automated tools like Hydra or Burp Suite to try different combinations of usernames and passwords

    • Start with common passwords and then move on to more complex ones

    • Bruteforcing can be time-consuming and may trigger account lockouts if not done carefully

  • Answered by AI
  • Q7. How to use burpsuite, and nessus
  • Ans. 

    Burp Suite is a web vulnerability scanner and proxy tool, while Nessus is a vulnerability assessment tool.

    • Burp Suite is used for web application security testing, including scanning for vulnerabilities and intercepting and modifying HTTP traffic.

    • Nessus is used for network vulnerability scanning and assessment, identifying security issues in systems and applications.

    • Both tools are essential for identifying and addressin...

  • Answered by AI
  • Q8. Use repeater in burpsuite
  • Ans. 

    Repeater in Burp Suite is used to manually modify and re-send individual HTTP requests.

    • Repeater tool allows for manual editing of requests before sending them again

    • Useful for testing different parameters or payloads

    • Helps in analyzing server responses to modified requests

  • Answered by AI
  • Q9. What approach we follow to preform vapt on web applications, mobile applications, and network infra. If we have the url/ip address?
  • Ans. 

    We follow a systematic approach for performing VAPT on web applications, mobile applications, and network infra with the provided URL/IP address.

    • First, conduct a thorough reconnaissance phase to gather information about the target.

    • Next, perform vulnerability scanning to identify potential security weaknesses.

    • Then, conduct penetration testing to exploit the identified vulnerabilities.

    • Finally, provide a detailed report w...

  • Answered by AI
Round 2 - HR 

(3 Questions)

  • Q1. Certifications details
  • Q2. Salary expectation
  • Q3. Willing to relocate if needed

Interview Preparation Tips

Topics to prepare for Global IS Consulting Cyber Security Analyst Lead interview:
  • Ceh
  • CEH pratical
  • oscp
  • Cissp
  • crtp
  • Networking
  • Web Application
  • OWASP
  • cis benchmark
Interview preparation tips for other job seekers - If your are looking for jobs, then first please make your basic/base strong then go for advance, that will provide you extra support in your answer. Also have some hand-on practical practice to crack any technical interview.

Skills evaluated in this interview

Interview questions from similar companies

I applied via Recruitment Consultant and was interviewed before Nov 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Regarding firewalls, basic networking, troubleshooting techniques.

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare all the things.Including networking basic , firewall in security, troubleshooting techniques.

Interview Questionnaire 

1 Question

  • Q1. Splunk questions

I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Domain based

Interview Preparation Tips

Interview preparation tips for other job seekers - Give your best !

I applied via Walk-in and was interviewed in May 2020. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Questions on OAM , OIM , Cyberark

Interview Preparation Tips

Interview preparation tips for other job seekers - What ever product / technology / experience u mention, please mention those in which you have in depth knowledge.

It's the most basic thing , don't say things that you have not worked on or worked for 1-2months , that will surely cause issue.

I applied via Referral and was interviewed in Nov 2019. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. How do you test a web application? What is CSRF and SSRF? What is LDAP injection? How does namp work while port scanning? (Result - open/filtered/closed) How does ssl work? Suppose a proxy server(Burp...
  • Ans. 

    A Security Analyst is responsible for testing web applications, identifying vulnerabilities, and implementing security measures to protect against attacks.

    • Testing a web application involves various techniques such as penetration testing, vulnerability scanning, and code review.

    • CSRF (Cross-Site Request Forgery) is an attack that tricks a victim into performing unwanted actions on a web application.

    • SSRF (Server-Side Requ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Keep learning from your each and every failure. It will help you in learning and to become a more successful and productive.

Skills evaluated in this interview

Interview Questionnaire 

1 Question

  • Q1. What is the tcode for user creation?
  • Ans. 

    The transaction code (tcode) for user creation in SAP is SU01.

    • The tcode SU01 is used to create, modify, and display user master records in SAP.

    • It is commonly used by SAP Security Consultants to manage user accounts and authorizations.

    • To access the SU01 transaction, you can either enter it directly in the command field or navigate through the SAP menu path: Tools -> Administration -> User Maintenance -> Users.

    • Once in th...

  • Answered by AI

Skills evaluated in this interview

I applied via Campus Placement and was interviewed before Sep 2021. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Had a great technical discussion for around 45 mins regarding computer science and coding.
  • Q2. Write a c program for designing calculator using C language.
  • Ans. 

    A C program for designing calculator

    • Use switch case for different operations

    • Use scanf to take input from user

    • Use printf to display output

    • Use functions for each operation

    • Use loops for continuous calculations

  • Answered by AI
Round 3 - HR 

(1 Question)

  • Q1. General one to one talk.

Interview Preparation Tips

Interview preparation tips for other job seekers - Please be composed and yes you can achieve it.

Skills evaluated in this interview

I applied via Campus Placement and was interviewed before Nov 2021. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Aptitude Test 

It was abasic MBA leven quat and reasoning questions

Round 3 - Technical 

(2 Questions)

  • Q1. Basic regarding java
  • Q2. Basic regarding database

Interview Preparation Tips

Interview preparation tips for other job seekers - Keep calm and study the basics properly and practice basic coding logics

I applied via Naukri.com and was interviewed in Apr 2021. There was 1 interview round.

Interview Questionnaire 

2 Questions

  • Q1. Complete security testing performed throught SDLC life cycle
  • Ans. 

    Security testing should be performed at every stage of SDLC to ensure a secure product.

    • Security requirements should be defined at the planning stage

    • Threat modeling should be done during the design phase

    • Code review and vulnerability scanning should be done during the development phase

    • Penetration testing and security acceptance testing should be done during the testing phase

    • Security monitoring and incident response plann...

  • Answered by AI
  • Q2. OWASP top 10 with mitigation
  • Ans. 

    OWASP top 10 is a list of common web application vulnerabilities. Mitigation involves implementing security controls to prevent or reduce the impact of these vulnerabilities.

    • Injection attacks can be mitigated by input validation and parameterized queries

    • Cross-site scripting (XSS) can be mitigated by input validation and output encoding

    • Broken authentication and session management can be mitigated by implementing strong ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Study well

Skills evaluated in this interview

Global IS Consulting Interview FAQs

How many rounds are there in Global IS Consulting Cyber Security Analyst Lead interview for experienced candidates?
Global IS Consulting interview process for experienced candidates usually has 2 rounds. The most common rounds in the Global IS Consulting interview process for experienced candidates are Technical and HR.
What are the top questions asked in Global IS Consulting Cyber Security Analyst Lead interview for experienced candidates?

Some of the top questions asked at the Global IS Consulting Cyber Security Analyst Lead interview for experienced candidates -

  1. what approach we follow to preform vapt on web applications, mobile application...read more
  2. how to preform privilege escalation if we have normal user acce...read more
  3. differentiate between different attacks (like; CSRF/SSRF, LFI/RFI Stored XSS/DO...read more

Tell us how to improve this page.

Global IS Consulting Cyber Security Analyst Lead Interview Process for Experienced

based on 1 interview

Interview experience

5
  
Excellent
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.7k Interviews
Accenture Interview Questions
3.8
 • 8.3k Interviews
Infosys Interview Questions
3.6
 • 7.7k Interviews
Wipro Interview Questions
3.7
 • 5.7k Interviews
Cognizant Interview Questions
3.7
 • 5.7k Interviews
Amazon Interview Questions
4.0
 • 5.1k Interviews
Capgemini Interview Questions
3.7
 • 4.9k Interviews
HCLTech Interview Questions
3.5
 • 3.9k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.9k Interviews
Genpact Interview Questions
3.8
 • 3.2k Interviews
View all

Global IS Consulting Cyber Security Analyst Lead Reviews and Ratings

based on 1 review

4.0/5

Rating in categories

4.0

Skill development

4.0

Work-life balance

3.0

Salary

4.0

Job security

4.0

Company culture

3.0

Promotions

5.0

Work satisfaction

Explore 1 Review and Rating
Compare Global IS Consulting with

TCS

3.7
Compare

Accenture

3.8
Compare

Wipro

3.7
Compare

Cognizant

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview