Premium Employer

i

This company page is being actively managed by Kyndryl Team. If you also belong to the team, you can get access from here

Kyndryl Verified Tick

Compare button icon Compare button icon Compare

Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards

zig zag pattern zig zag pattern

Filter interviews by

Kyndryl Network Security Engineer Interview Questions and Answers for Experienced

Updated 15 Dec 2024

Kyndryl Network Security Engineer Interview Experiences for Experienced

1 interview found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Roles & responsibilities in WAF
  • Ans. 

    A Web Application Firewall (WAF) is a security solution that monitors and filters HTTP traffic between a web application and the Internet.

    • Monitoring and filtering HTTP traffic to protect against common web application attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF)

    • Configuring and maintaining rules to block malicious traffic while allowing legitimate traffic to pass throu...

  • Answered by AI
Round 2 - Behavioral 

(1 Question)

  • Q1. Compatibility with the job role and current experience
  • Ans. 

    I have extensive experience in network security and have successfully implemented various security measures in my previous roles.

    • I have a strong background in network security protocols and technologies

    • I have experience in implementing firewalls, intrusion detection systems, and VPNs

    • I have successfully managed security incidents and conducted security audits

    • I have a track record of staying up-to-date with the latest se

  • Answered by AI
Round 3 - HR 

(1 Question)

  • Q1. Will be able to do rotational shifts

Interview Preparation Tips

Topics to prepare for Kyndryl Network Security Engineer interview:
  • WAF
  • Firewalls
  • Load Balancers
  • Security Policies
  • DNS
  • Virtual Wire
Interview preparation tips for other job seekers - Be clear about your work experience. Need to know in depth about what you do and how you do, even the concepts and basics.

Network Security Engineer Jobs at Kyndryl

View all

Interview questions from similar companies

I applied via Approached by Company and was interviewed before Mar 2021. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. Explain LSA Types in detail
  • Ans. 

    LSA Types are used in OSPF to describe the type of information contained in the LSA.

    • Type 1: Router LSA - contains information about the router and its directly connected networks

    • Type 2: Network LSA - describes the networks connected to a multi-access network

    • Type 3: Summary LSA - contains information about networks outside of the area

    • Type 4: ASBR Summary LSA - describes the ASBR router to the rest of the OSPF domain

    • Type...

  • Answered by AI
  • Q2. Static/ Default Routes
  • Q3. BGP Attributes in detail
  • Ans. 

    BGP attributes are used to determine the best path for routing traffic between autonomous systems.

    • BGP attributes include: AS Path, Next Hop, Local Preference, Weight, Multi-Exit Discriminator (MED), Origin, and Community

    • AS Path is a list of autonomous systems that the route has passed through

    • Next Hop is the IP address of the next router in the path

    • Local Preference is used to indicate the preferred path for outbound tra...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for NTT Data Network Engineer interview:
  • Bgp
  • OSPF
  • MPLS
  • Static Routing
Interview preparation tips for other job seekers - Confidence is the key. If you do not know the answer. Mention the same but also ensure that you will get it in the future

Skills evaluated in this interview

I applied via Company Website and was interviewed in Dec 2020. There was 1 interview round.

Interview Questionnaire 

6 Questions

  • Q1. Difference between access and trunk
  • Ans. 

    Access is a port that allows a single VLAN while trunk is a port that allows multiple VLANs.

    • Access ports are used to connect end devices like computers, printers, etc. to the network.

    • Trunk ports are used to connect switches to each other and carry traffic for multiple VLANs.

    • Access ports are assigned to a single VLAN while trunk ports can carry traffic for multiple VLANs.

    • Access ports do not tag frames while trunk ports ...

  • Answered by AI
  • Q2. Difference between lan and wan
  • Ans. 

    LAN is a local area network that connects devices within a limited area, while WAN is a wide area network that connects devices over a large geographical area.

    • LAN is typically used in homes, offices, or schools, while WAN is used to connect different LANs across cities, countries, or even continents.

    • LAN has a higher data transfer rate and lower latency compared to WAN.

    • Examples of LAN technologies include Ethernet, Wi-F...

  • Answered by AI
  • Q3. How would we convert access into trunk
  • Ans. 

    To convert access into trunk, we need to configure the switch port as a trunk port.

    • Configure the switch port as a trunk port using the 'switchport mode trunk' command.

    • Verify the trunk configuration using the 'show interfaces trunk' command.

    • Ensure that the VLANs allowed on the trunk are configured using the 'switchport trunk allowed vlan' command.

    • Ensure that the native VLAN is configured using the 'switchport trunk nati

  • Answered by AI
  • Q4. How load balancer works
  • Ans. 

    Load balancer distributes incoming network traffic across multiple servers to improve performance and availability.

    • Load balancer acts as a reverse proxy server

    • It distributes traffic based on various algorithms such as round-robin, least connections, IP hash, etc.

    • It monitors server health and redirects traffic to healthy servers

    • It can be hardware-based or software-based

    • Examples of load balancers include F5, HAProxy, Ngi

  • Answered by AI
  • Q5. Where we could use trunk and where we can use access
  • Ans. 

    Trunk is used to carry multiple VLANs between switches, while access is used to connect end devices to the network.

    • Trunk is used to connect switches together and carry multiple VLANs

    • Access is used to connect end devices like computers, printers, etc. to the network

    • Trunk ports are configured with VLAN tagging, while access ports are not

    • Examples of trunk ports are inter-switch links, while examples of access ports are po

  • Answered by AI
  • Q6. What we can do in security as port wise
  • Ans. 

    Port-based security involves controlling access to network resources based on the physical port of the device.

    • Port security can be implemented by limiting the number of MAC addresses that can be learned on a port.

    • It can also involve configuring the port to only allow traffic from specific VLANs.

    • Port security can be used to prevent unauthorized access to the network by limiting the devices that can connect to it.

    • It can ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It was totally technical, and asked from your work experience as well as what is written in your resume. It was good.

Skills evaluated in this interview

I applied via Naukri.com and was interviewed in Nov 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Generic network related questions. I was asked specific questions related to the job description that was shared.

Interview Preparation Tips

Interview preparation tips for other job seekers - Focus on the job descriptions that has been shared with you. Focus on the basic technologies that you are specialized with. Automaton, programming, devops skills are preferred.

I applied via Newspaper Ad and was interviewed in Jul 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Coding Test 

Coding test contains 2 questions

Interview Preparation Tips

Interview preparation tips for other job seekers - we want to prepare well for any assessment and interviews
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Walk-in and was interviewed before Oct 2023. There were 3 interview rounds.

Round 1 - One-on-one 

(3 Questions)

  • Q1. What OSPF and its state and LSAs
  • Ans. 

    OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.

    • OSPF is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path to each network.

    • OSPF routers exchange Link State Advertisements (LSAs) to build a topology database.

    • There are several types of LSAs, including Router LSAs, Network LSAs, Summary LSAs, and AS External LSAs.

    • O...

  • Answered by AI
  • Q2. VLAN and DTP, STP. RSTP, HSRP/VRRP protocols
  • Q3. Etherchannel, EIGRP
Round 2 - One-on-one 

(2 Questions)

  • Q1. BGP and its states and attributes
  • Ans. 

    BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems.

    • BGP has four main states: Idle, Connect, OpenSent, and Established.

    • BGP attributes include AS_PATH, NEXT_HOP, LOCAL_PREF, and ORIGIN.

    • AS_PATH attribute shows the path the route has taken through different autonomous systems.

    • NEXT_HOP attribute specifies the next hop IP address to reach a particular...

  • Answered by AI
  • Q2. Monitoring tool
Round 3 - HR 

(1 Question)

  • Q1. Salary negotiation

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is bgp and working
  • Ans. 

    BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different networks on the internet.

    • BGP is used by internet service providers to make routing decisions.

    • It operates on TCP port 179.

    • BGP uses path attributes to determine the best route to a destination.

    • BGP can be configured in different ways such as eBGP (external BGP) and iBGP (internal BGP).

  • Answered by AI
  • Q2. What was you network experience

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I appeared for an interview in Oct 2023.

Round 1 - Technical 

(3 Questions)

  • Q1. What is VRRP ?
  • Ans. 

    VRRP stands for Virtual Router Redundancy Protocol, used to provide high availability for routers by creating a virtual IP address.

    • VRRP allows multiple routers to work together in a group, with one router acting as the master and others as backups.

    • If the master router fails, one of the backup routers takes over the virtual IP address to ensure continuous network connectivity.

    • VRRP uses a priority value to determine whic...

  • Answered by AI
  • Q2. Why do we create VLAN?
  • Ans. 

    VLANs are created to segment network traffic, improve network performance, enhance security, and simplify network management.

    • Segment network traffic to improve performance and reduce congestion

    • Enhance security by isolating sensitive data or devices

    • Simplify network management by grouping devices logically

    • Allow for easier troubleshooting and maintenance

    • Enable better control over broadcast domains

    • Example: Creating separat

  • Answered by AI
  • Q3. How do we configure FAILOVER via static Route?
  • Ans. 

    Configuring FAILOVER via static Route involves setting up multiple routes with different priorities.

    • Create multiple static routes with different next-hop IP addresses

    • Assign different administrative distances to each static route

    • Configure IP SLA to track the primary route and switch to the secondary route if the primary route fails

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is osi model
  • Ans. 

    The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI model stands for Open Systems Interconnection model.

    • It helps in understanding how different networking protocols work together.

    • Each layer in the OSI model has specific functions and communicates with adjacent layers.

    • Examples of OSI model layers include physical layer, data link la

  • Answered by AI
  • Q2. It is reference model

Skills evaluated in this interview

Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Jul 2024. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. UST is good interviewer is not good
  • Q2. Even we don't know the question atleast Interviewer required minimum patience .Iritating
Round 2 - Technical 

(2 Questions)

  • Q1. Basic question only OSPF
  • Q2. Load balancer configuration
Round 3 - Technical 

(2 Questions)

  • Q1. OSPF, Load balancer
  • Q2. Load balancing configuration

Interview Preparation Tips

Interview preparation tips for other job seekers - UST is good but depends upon the interviewer if interviewer is good then ww can share if interviewer is rude is very uncomfortable becoz our positivity will lost

Kyndryl Interview FAQs

How many rounds are there in Kyndryl Network Security Engineer interview for experienced candidates?
Kyndryl interview process for experienced candidates usually has 3 rounds. The most common rounds in the Kyndryl interview process for experienced candidates are Technical, Behavioral and HR.
How to prepare for Kyndryl Network Security Engineer interview for experienced candidates?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Kyndryl. The most common topics and skills that interviewers at Kyndryl expect are Bgp, EIGRP, OSPF, Troubleshooting and Cyber Security.

Tell us how to improve this page.

Kyndryl Network Security Engineer Interview Process for Experienced

based on 1 interview

Interview experience

4
  
Good
View more
Join Kyndryl Kyndryl is the world's largest provider of IT infrastructure services.
Kyndryl Network Security Engineer Salary
based on 22 salaries
₹5 L/yr - ₹14.5 L/yr
14% more than the average Network Security Engineer Salary in India
View more details
System Administrator
1.3k salaries
unlock blur

₹2.9 L/yr - ₹12 L/yr

Associate Technical Engineer
654 salaries
unlock blur

₹4 L/yr - ₹6.6 L/yr

Project Manager
620 salaries
unlock blur

₹7.1 L/yr - ₹28.5 L/yr

Infrastructure Specialist
603 salaries
unlock blur

₹4.2 L/yr - ₹23 L/yr

SME
419 salaries
unlock blur

₹7.5 L/yr - ₹25.5 L/yr

Explore more salaries
Compare Kyndryl with

Genpact

3.8
Compare

DXC Technology

3.7
Compare

Sutherland Global Services

3.5
Compare

Optum Global Solutions

4.0
Compare
Did you find this page helpful?
Yes No
write
Share an Interview