Premium Employer

i

This company page is being actively managed by Kyndryl Team. If you also belong to the team, you can get access from here

Kyndryl Verified Tick

Compare button icon Compare button icon Compare

Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards

zig zag pattern zig zag pattern

Filter interviews by

Kyndryl Network Security Engineer Interview Questions and Answers

Updated 15 Dec 2024

Kyndryl Network Security Engineer Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Roles & responsibilities in WAF
  • Ans. 

    A Web Application Firewall (WAF) is a security solution that monitors and filters HTTP traffic between a web application and the Internet.

    • Monitoring and filtering HTTP traffic to protect against common web application attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF)

    • Configuring and maintaining rules to block malicious traffic while allowing legitimate traffic to pass throu...

  • Answered by AI
Round 2 - Behavioral 

(1 Question)

  • Q1. Compatibility with the job role and current experience
  • Ans. 

    I have extensive experience in network security and have successfully implemented various security measures in my previous roles.

    • I have a strong background in network security protocols and technologies

    • I have experience in implementing firewalls, intrusion detection systems, and VPNs

    • I have successfully managed security incidents and conducted security audits

    • I have a track record of staying up-to-date with the latest se

  • Answered by AI
Round 3 - HR 

(1 Question)

  • Q1. Will be able to do rotational shifts

Interview Preparation Tips

Topics to prepare for Kyndryl Network Security Engineer interview:
  • WAF
  • Firewalls
  • Load Balancers
  • Security Policies
  • DNS
  • Virtual Wire
Interview preparation tips for other job seekers - Be clear about your work experience. Need to know in depth about what you do and how you do, even the concepts and basics.

Network Security Engineer Jobs at Kyndryl

View all

Interview questions from similar companies

I applied via Naukri.com and was interviewed in Nov 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Generic network related questions. I was asked specific questions related to the job description that was shared.

Interview Preparation Tips

Interview preparation tips for other job seekers - Focus on the job descriptions that has been shared with you. Focus on the basic technologies that you are specialized with. Automaton, programming, devops skills are preferred.
Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Jul 2024. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. UST is good interviewer is not good
  • Q2. Even we don't know the question atleast Interviewer required minimum patience .Iritating
Round 2 - Technical 

(2 Questions)

  • Q1. Basic question only OSPF
  • Q2. Load balancer configuration
Round 3 - Technical 

(2 Questions)

  • Q1. OSPF, Load balancer
  • Q2. Load balancing configuration

Interview Preparation Tips

Interview preparation tips for other job seekers - UST is good but depends upon the interviewer if interviewer is good then ww can share if interviewer is rude is very uncomfortable becoz our positivity will lost

I applied via Referral and was interviewed before May 2021. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(8 Questions)

  • Q1. Tell about the SDWAN concept.
  • Ans. 

    SDWAN is a software-defined approach to managing and optimizing WAN connections.

    • SDWAN uses software to control and manage network traffic across multiple WAN connections.

    • It can dynamically route traffic based on network conditions and application requirements.

    • SDWAN can improve network performance, reduce costs, and simplify network management.

    • Examples of SDWAN vendors include Cisco, VMware, and Silver Peak.

  • Answered by AI
  • Q2. Difference between OSPF & EIGRP
  • Ans. 

    OSPF is a link-state protocol while EIGRP is a hybrid protocol.

    • OSPF uses Dijkstra's algorithm to calculate the shortest path while EIGRP uses a metric based on bandwidth, delay, reliability, load, and MTU.

    • OSPF supports VLSM and route summarization while EIGRP supports only route summarization.

    • OSPF is an open standard protocol while EIGRP is a Cisco proprietary protocol.

    • OSPF has a higher convergence time than EIGRP.

    • OSPF...

  • Answered by AI
  • Q3. What is the cost of the default route?
  • Ans. 

    The cost of default route varies depending on the network infrastructure and service provider.

    • The cost of default route is usually included in the overall cost of the internet service provided by the ISP.

    • The cost may also depend on the type of connection, such as fiber optic or cable.

    • In some cases, the cost may be higher for businesses that require more bandwidth and faster speeds.

    • The cost may also vary depending on th...

  • Answered by AI
  • Q4. How OSPF neighbourship occuures?
  • Ans. 

    OSPF neighbourship occurs when two OSPF routers establish a relationship to exchange routing information.

    • OSPF routers send hello packets to discover neighbours

    • If the hello packets are compatible, the routers become neighbours

    • The routers exchange database descriptors to synchronize their link-state databases

    • If the databases are the same, the routers become fully adjacent

    • Neighbourship can be affected by network topology

  • Answered by AI
  • Q5. What is AS path prepend?
  • Ans. 

    AS path prepend is a technique used in BGP to influence the path selection of traffic.

    • AS path prepend involves adding the same AS number multiple times to the AS path attribute of a BGP route advertisement.

    • This makes the path appear longer and less desirable, causing traffic to prefer other paths.

    • AS path prepend can be used to influence inbound or outbound traffic.

    • Inbound traffic can be influenced by adding the local A...

  • Answered by AI
  • Q6. What is the difference between overlay and underlay?
  • Ans. 

    Overlay is a network virtualization technique that adds a layer of abstraction over the physical network, while underlay refers to the physical network infrastructure.

    • Overlay is used to create virtual networks on top of the physical network infrastructure.

    • Underlay refers to the physical network infrastructure that provides connectivity between devices.

    • Overlay networks are used to provide network virtualization, multi-t...

  • Answered by AI
  • Q7. What is VRF and how it works?
  • Ans. 

    VRF stands for Virtual Routing and Forwarding. It is a technology that allows multiple instances of a routing table to coexist on the same router.

    • VRF provides logical separation of routing tables, allowing multiple routing domains to exist on a single physical router.

    • Each VRF has its own routing table and forwarding table, which allows for overlapping IP addresses to be used without conflict.

    • VRFs are commonly used in M...

  • Answered by AI
  • Q8. What is BGP damping?
  • Ans. 

    BGP damping is a technique used to reduce the impact of unstable routes on the internet.

    • BGP damping helps to prevent the propagation of unstable routes by temporarily suppressing them.

    • It is used to reduce the impact of route flapping, which occurs when a route repeatedly alternates between available and unavailable states.

    • BGP damping assigns a penalty value to unstable routes, and if the penalty exceeds a certain thres...

  • Answered by AI
Round 3 - HR 

(3 Questions)

  • Q1. Discussed about previous experience
  • Q2. Discussed about educational background
  • Q3. Discussed about salary negotiation.

Interview Preparation Tips

Interview preparation tips for other job seekers - UST interviewers are quite gentle, will not hurt you in any means. Yes should prepare for the usual industry questions.

Skills evaluated in this interview

Interview experience
2
Poor
Difficulty level
-
Process Duration
-
Result
-
Round 1 - HR 

(2 Questions)

  • Q1. Tell me about yourself
  • Ans. 

    I am a highly skilled Network Engineer with 5+ years of experience in designing, implementing, and managing complex network infrastructures.

    • Experienced in configuring and troubleshooting routers, switches, firewalls, and other network devices

    • Proficient in network security protocols such as VPNs, ACLs, and IDS/IPS

    • Strong knowledge of TCP/IP, DNS, DHCP, and other networking protocols

    • Certified in Cisco CCNA and CCNP

    • Excelle

  • Answered by AI
  • Q2. Tell me what you want to do you have to be a shift

I applied via Company Website and was interviewed in Dec 2020. There was 1 interview round.

Interview Questionnaire 

6 Questions

  • Q1. Difference between access and trunk
  • Ans. 

    Access is a port that allows a single VLAN while trunk is a port that allows multiple VLANs.

    • Access ports are used to connect end devices like computers, printers, etc. to the network.

    • Trunk ports are used to connect switches to each other and carry traffic for multiple VLANs.

    • Access ports are assigned to a single VLAN while trunk ports can carry traffic for multiple VLANs.

    • Access ports do not tag frames while trunk ports ...

  • Answered by AI
  • Q2. Difference between lan and wan
  • Ans. 

    LAN is a local area network that connects devices within a limited area, while WAN is a wide area network that connects devices over a large geographical area.

    • LAN is typically used in homes, offices, or schools, while WAN is used to connect different LANs across cities, countries, or even continents.

    • LAN has a higher data transfer rate and lower latency compared to WAN.

    • Examples of LAN technologies include Ethernet, Wi-F...

  • Answered by AI
  • Q3. How would we convert access into trunk
  • Ans. 

    To convert access into trunk, we need to configure the switch port as a trunk port.

    • Configure the switch port as a trunk port using the 'switchport mode trunk' command.

    • Verify the trunk configuration using the 'show interfaces trunk' command.

    • Ensure that the VLANs allowed on the trunk are configured using the 'switchport trunk allowed vlan' command.

    • Ensure that the native VLAN is configured using the 'switchport trunk nati

  • Answered by AI
  • Q4. How load balancer works
  • Ans. 

    Load balancer distributes incoming network traffic across multiple servers to improve performance and availability.

    • Load balancer acts as a reverse proxy server

    • It distributes traffic based on various algorithms such as round-robin, least connections, IP hash, etc.

    • It monitors server health and redirects traffic to healthy servers

    • It can be hardware-based or software-based

    • Examples of load balancers include F5, HAProxy, Ngi

  • Answered by AI
  • Q5. Where we could use trunk and where we can use access
  • Ans. 

    Trunk is used to carry multiple VLANs between switches, while access is used to connect end devices to the network.

    • Trunk is used to connect switches together and carry multiple VLANs

    • Access is used to connect end devices like computers, printers, etc. to the network

    • Trunk ports are configured with VLAN tagging, while access ports are not

    • Examples of trunk ports are inter-switch links, while examples of access ports are po

  • Answered by AI
  • Q6. What we can do in security as port wise
  • Ans. 

    Port-based security involves controlling access to network resources based on the physical port of the device.

    • Port security can be implemented by limiting the number of MAC addresses that can be learned on a port.

    • It can also involve configuring the port to only allow traffic from specific VLANs.

    • Port security can be used to prevent unauthorized access to the network by limiting the devices that can connect to it.

    • It can ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It was totally technical, and asked from your work experience as well as what is written in your resume. It was good.

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. What is hsrp,vrrp
  • Ans. 

    HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) are network protocols used for providing high availability in routing.

    • HSRP and VRRP are used to provide redundancy for routers in a network.

    • They allow for automatic failover in case of a router failure.

    • HSRP is a Cisco proprietary protocol, while VRRP is an open standard protocol.

    • Both protocols use a virtual IP address that clients use as t...

  • Answered by AI

Skills evaluated in this interview

I applied via Newspaper Ad and was interviewed in Jul 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Coding Test 

Coding test contains 2 questions

Interview Preparation Tips

Interview preparation tips for other job seekers - we want to prepare well for any assessment and interviews
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is osi model
  • Ans. 

    The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI model stands for Open Systems Interconnection model.

    • It helps in understanding how different networking protocols work together.

    • Each layer in the OSI model has specific functions and communicates with adjacent layers.

    • Examples of OSI model layers include physical layer, data link la

  • Answered by AI
  • Q2. It is reference model

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Jan 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. What is STP What is ping What is networking What is osi model What is ip address What are the classes of ip address What is mac adress What is ARP What is RRRP
  • Ans. 

    STP is a network protocol that prevents loops in Ethernet networks. Ping is a network utility used to test connectivity. OSI model is a framework for understanding how networks operate. IP address is a unique identifier for devices on a network. MAC address is a hardware address for network devices. ARP is a protocol used to map IP addresses to MAC addresses. RRRP is not a standard networking term.

    • STP stands for Spanni...

  • Answered by AI
Round 3 - HR 

(1 Question)

  • Q1. Nothing much Its all about our agree

Interview Preparation Tips

Interview preparation tips for other job seekers - The one problem of company is we have to be patience until the BGC get completes, it will take around 1 month

Skills evaluated in this interview

Kyndryl Interview FAQs

How many rounds are there in Kyndryl Network Security Engineer interview?
Kyndryl interview process usually has 3 rounds. The most common rounds in the Kyndryl interview process are Technical, Behavioral and HR.
How to prepare for Kyndryl Network Security Engineer interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Kyndryl. The most common topics and skills that interviewers at Kyndryl expect are Bgp, EIGRP, Network Security, OSPF and ITIL.

Tell us how to improve this page.

Kyndryl Network Security Engineer Interview Process

based on 2 interviews

Interview experience

4
  
Good
View more
Join Kyndryl Kyndryl is the world's largest provider of IT infrastructure services.
Kyndryl Network Security Engineer Salary
based on 21 salaries
₹5 L/yr - ₹11.7 L/yr
6% more than the average Network Security Engineer Salary in India
View more details
System Administrator
1.3k salaries
unlock blur

₹2.9 L/yr - ₹12.1 L/yr

Project Manager
621 salaries
unlock blur

₹7.1 L/yr - ₹28.1 L/yr

Infrastructure Specialist
589 salaries
unlock blur

₹5.3 L/yr - ₹23 L/yr

Associate Technical Engineer
581 salaries
unlock blur

₹3.5 L/yr - ₹6.5 L/yr

SME
419 salaries
unlock blur

₹7.5 L/yr - ₹25.5 L/yr

Explore more salaries
Compare Kyndryl with

Genpact

3.8
Compare

DXC Technology

3.7
Compare

Sutherland Global Services

3.6
Compare

Optum Global Solutions

4.0
Compare
Did you find this page helpful?
Yes No
write
Share an Interview