Upload Button Icon Add office photos

Filter interviews by

Clear (1)

Grant Thornton Bharat Cyber Security Analyst Interview Questions and Answers

Updated 17 Mar 2024

Grant Thornton Bharat Cyber Security Analyst Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(1 Question)

  • Q1. Questions related to iso27001

Interview questions from similar companies

I applied via Referral and was interviewed before Nov 2019. There were 3 interview rounds.

Interview Questionnaire 

3 Questions

  • Q1. Why you want to join this company and this domain?
  • Q2. What is SIEM?
  • Ans. 

    SIEM stands for Security Information and Event Management. It is a software solution that helps organizations to detect and respond to security threats.

    • SIEM collects and analyzes security-related data from various sources such as network devices, servers, and applications.

    • It correlates the data to identify patterns and anomalies that may indicate a security breach.

    • SIEM provides real-time alerts and reports to security ...

  • Answered by AI
  • Q3. Which SIEM you have worked with?

Interview Preparation Tips

Interview preparation tips for other job seekers - The main advice is that, you might not know everything but it doesn't mean that you're lacking something just be confident and give answers with clarity also accept the fact that you don't know a particular topic rather than blabbering anything.
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all Resume tips
Round 2 - Technical 

(3 Questions)

  • Q1. Basic web application attacks
  • Q2. Active Directory attacks
  • Q3. Network security pentesting mythology
Round 3 - HR 

(1 Question)

  • Q1. Asking about ctc and notice period or general questions

Interview Preparation Tips

Interview preparation tips for other job seekers - All good
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Campus Placement and was interviewed in Apr 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

Asked about Reasoning, English, Computer networks, Database Management system, Electronics

Round 2 - Group Discussion 

15 min discussion on any topic given on the spot, 1 min for thinking

Round 3 - Technical 

(3 Questions)

  • Q1. What do you know about Cloud Computing?
  • Ans. 

    Cloud computing is the delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.

    • Cloud computing allows users to access and store data and applications on remote servers instead of on their local devices.

    • It offers scalability, flexibility, cost-effectiveness, and the ability to access resources from anywhere with an internet connection.

    • Exa...

  • Answered by AI
  • Q2. OOPs concepts and examples
  • Ans. 

    OOPs concepts refer to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.

    • Inheritance: Allows a class to inherit properties and behavior from another class.

    • Encapsulation: Bundling data and methods that operate on the data into a single unit.

    • Polymorphism: Ability to present the same interface for different data types.

    • Abstraction: Hiding the complex implementation detail

  • Answered by AI
  • Q3. SQL queries like Joins and Selection

Interview Preparation Tips

Topics to prepare for KPMG India Cyber Security Analyst interview:
  • DSA
  • Cloud Computing
  • Network Security
  • OOPS
Interview preparation tips for other job seekers - Prepare well for Cloud computing, SQL, OOPs and basic coding

Skills evaluated in this interview

Interview Questionnaire 

5 Questions

  • Q1. Cyber attack
  • Q2. What is fileless malware
  • Ans. 

    Fileless malware is a type of malicious software that operates in memory without leaving any trace on the hard drive.

    • Fileless malware is also known as memory-based malware or non-malware.

    • It uses legitimate system tools and processes to carry out its malicious activities.

    • It is difficult to detect and remove as it does not leave any files on the system.

    • Examples of fileless malware include PowerShell-based attacks and mac...

  • Answered by AI
  • Q3. Ransomware and their mitigation
  • Ans. 

    Ransomware is a type of malware that encrypts files and demands payment for decryption. Mitigation involves backups, security software, and user education.

    • Regularly backup important data to prevent loss

    • Use anti-malware software to detect and prevent ransomware

    • Educate users on how to identify and avoid phishing emails and suspicious downloads

    • Implement network segmentation to limit the spread of ransomware

    • Have an inciden...

  • Answered by AI
  • Q4. Alerts in SIEM tool
  • Ans. 

    Alerts in SIEM tool

    • SIEM tools generate alerts based on predefined rules and thresholds

    • Alerts can be categorized based on severity levels

    • Alerts can be investigated and triaged to determine if they are true positives or false positives

    • SIEM tools can also automate response actions based on certain alerts

    • Examples of alerts include failed login attempts, malware detections, and suspicious network traffic

  • Answered by AI
  • Q5. DOS and DDOS attack
  • Ans. 

    DOS and DDOS attacks are malicious attempts to disrupt the normal functioning of a website or network.

    • DOS (Denial of Service) attack is a type of attack where a single system floods the target system with traffic, making it unavailable to legitimate users.

    • DDOS (Distributed Denial of Service) attack is a more sophisticated version of DOS attack, where multiple systems are used to flood the target system with traffic.

    • DDO...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - prepare your homework and be confident
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Campus Placement and was interviewed in Dec 2023. There were 2 interview rounds.

Round 1 - Coding Test 

2 hours, basic dsa questions, cyber security related mcqs

Round 2 - Technical 

(4 Questions)

  • Q1. What is normalization in dbms
  • Ans. 

    Normalization in DBMS is the process of organizing data in a database to reduce redundancy and improve data integrity.

    • Normalization involves breaking down a database into smaller, more manageable tables and defining relationships between them.

    • It helps in reducing data redundancy by storing data in a structured and organized manner.

    • Normalization also helps in improving data integrity by ensuring that data is consistent ...

  • Answered by AI
  • Q2. Difference between truncate and delete
  • Ans. 

    Truncate is a DDL command that removes all records from a table, while delete is a DML command that removes specific records.

    • Truncate is faster than delete as it does not log individual row deletions.

    • Truncate resets identity columns, while delete does not.

    • Truncate cannot be rolled back, while delete can be rolled back using a transaction.

    • Truncate does not fire triggers, while delete does.

  • Answered by AI
  • Q3. How will your protect your digital data
  • Ans. 

    I will protect my digital data by implementing strong encryption, regular backups, and strict access controls.

    • Implement strong encryption algorithms to secure data in transit and at rest

    • Regularly backup data to prevent loss in case of cyber attacks or hardware failures

    • Enforce strict access controls by using multi-factor authentication and least privilege principle

  • Answered by AI
  • Q4. Some types of cyber attacks
  • Ans. 

    Some types of cyber attacks include phishing, malware, ransomware, DDoS attacks, and social engineering.

    • Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information

    • Malware: malicious software designed to damage or gain unauthorized access to a computer system

    • Ransomware: encrypts files on a victim's system and demands payment for decryption

    • DDoS attacks: overwhelming a system with a f...

  • Answered by AI

Skills evaluated in this interview

I applied via Campus Placement and was interviewed in Jul 2022. There were 3 interview rounds.

Round 1 - Aptitude Test 

The aptitude test conprised of verbal and critical reasoning section, quant and logical reasoning section and then a coding section. Easy to clear if proper preparation is done.

Round 2 - Technical 

(1 Question)

  • Q1. Round 2 was the technical interview. They asked me questions on cyber security applications, along with computer network, OS and DBMS..out of which OS and DBMS were mentioned in my resume. It was overall a...
Round 3 - HR 

(1 Question)

  • Q1. Round 3 was HR round. Here they asked my where I was from, what were my hobbies, what were my projects and which language I was comfortable in. They also asked me basic HR questions like what would you do ...

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare thoroughly for the aptitude test and practice mock tests. Practice coding from hackerrank, hackerearth and quant amd reasoning from prepinsta, freshersnow, faceprep. Go through interview questions in interviewbit and research about the company you are going to join. Be calm and be yourself. That's it and you are ready to get placed!!

I applied via LinkedIn and was interviewed in Apr 2021. There was 1 interview round.

Interview Questionnaire 

2 Questions

  • Q1. Qradar Only,
  • Q2. Nothing related to Cybersecurity

Interview Preparation Tips

Interview preparation tips for other job seekers - They Only listen to, What they actually want to.
Simple.
Don't doubt your Skills, It doesn't matter you are not worth it.
keep Try.
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Referral and was interviewed in Jan 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Questions related to DKIM, SPF
  • Q2. Different ports and example of UDP port
  • Ans. 

    Different ports are used for communication in networking. UDP port 53 is used for DNS.

    • Ports are used to identify different services or processes on a network

    • UDP port 53 is used for DNS (Domain Name System)

    • Other common UDP ports include 67 (DHCP), 161 (SNMP), and 123 (NTP)

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before Aug 2022. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - Aptitude Test 

Easy aptitude test, just check the accuracy.

Round 3 - Coding Test 

Bit tough one, Question is from linked list.

Round 4 - HR 

(1 Question)

  • Q1. Genral questions regarding your carrier based on your resume
Contribute & help others!
anonymous
You can choose to be anonymous

Grant Thornton Bharat Interview FAQs

How many rounds are there in Grant Thornton Bharat Cyber Security Analyst interview?
Grant Thornton Bharat interview process usually has 1 rounds. The most common rounds in the Grant Thornton Bharat interview process are One-on-one Round.

Recently Viewed

INTERVIEWS

Performics.Convonix

No Interviews

INTERVIEWS

Performics.Convonix

No Interviews

SALARIES

Prayagraj Power Generation

INTERVIEWS

King George's Medical University

No Interviews

INTERVIEWS

Indiamart Intermesh

No Interviews

SALARIES

Sierra Instrumentation & Controls

SALARIES

King George's Medical University

SALARIES

King George's Medical University

INTERVIEWS

6D Technologies

No Interviews

INTERVIEWS

Federal Bank

No Interviews

Tell us how to improve this page.

Grant Thornton Bharat Cyber Security Analyst Interview Process

based on 1 interview

Interview experience

4
  
Good
View more

Interview Questions from Similar Companies

Deloitte Interview Questions
3.8
 • 2.8k Interviews
PwC Interview Questions
3.4
 • 1.4k Interviews
Ernst & Young Interview Questions
3.4
 • 1.1k Interviews
KPMG India Interview Questions
3.5
 • 788 Interviews
BDO India LLP Interview Questions
3.5
 • 77 Interviews
RSM India Interview Questions
3.4
 • 54 Interviews
BDO Interview Questions
3.3
 • 45 Interviews
View all
Consultant
304 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Assistant Manager
134 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Consultant
109 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Manager
80 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Associate Director
47 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare Grant Thornton Bharat with

Deloitte

3.8
Compare

KPMG India

3.5
Compare

PwC

3.4
Compare

Ernst & Young

3.4
Compare
Did you find this page helpful?
Yes No
write
Share an Interview
Rate your experience using AmbitionBox
Terrible
Terrible
Poor
Poor
Average
Average
Good
Good
Excellent
Excellent