Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by LTIMindtree Team. If you also belong to the team, you can get access from here

LTIMindtree Verified Tick

Compare button icon Compare button icon Compare
3.8

based on 20.5k Reviews

Filter interviews by

LTIMindtree Cyber Security Manager Interview Questions and Answers

Updated 20 Dec 2024

LTIMindtree Cyber Security Manager Interview Experiences

2 interviews found

Round 1 - Technical 

(2 Questions)

  • Q1. Be specific to the questions that are asked by interviewer, don’t try to bake your own stories for the answers that you don’t know .
  • Q2. SOC related , ransomware threat hunting how to manage SOC

Interview Preparation Tips

Interview preparation tips for other job seekers - Be positive and be preppy for your interview

Cyber Security Manager Interview Questions & Answers

user image Navneet Dwivedi

posted on 20 Dec 2024

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Technical questions related to cybersecurity
Round 2 - Technical 

(1 Question)

  • Q1. Detailed discussion on technically.
Round 3 - HR 

(1 Question)

  • Q1. Questions related to experience.

Cyber Security Manager Interview Questions Asked at Other Companies

Q1. security work/contributions in embedded systems IoT products
asked in HCLTech
Q2. Commonly used network device
asked in Amazon
Q3. What is mother board

Interview questions from similar companies

I applied via Company Website and was interviewed in Dec 2021. There were 4 interview rounds.

Round 1 - Aptitude Test 

Cryptography, Network, Mathematics

Round 2 - Presentation 

(1 Question)

  • Q1. Commonly used network device
  • Ans. 

    Router is a commonly used network device.

    • Connects multiple devices to a network

    • Routes data packets between networks

    • Provides security features like firewall and VPN

    • Examples: Cisco, Netgear, TP-Link

  • Answered by AI
Round 3 - HR 

(3 Questions)

  • Q1. What is your family background?
  • Q2. What are your strengths and weaknesses?
  • Q3. Tell me about yourself.
Round 4 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips

Interview Preparation Tips

Topics to prepare for HCLTech Cyber Security Manager interview:
  • Computer Networking
  • Cryptography
Interview preparation tips for other job seekers - If you’re a covert job seeker, remember to turn off your activity broadcasts when you make edits to your LinkedIn profile. If your current boss or colleagues are connected to you on LinkedIn, they may get suspicious about all the frequent changes.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Tell me about the nature of work
  • Ans. 

    Cyber Security Analysts protect computer systems and networks from cyber threats by monitoring, detecting, and responding to security incidents.

    • Monitor computer networks for security breaches

    • Investigate security incidents and provide incident response

    • Implement security measures to protect against cyber attacks

    • Conduct security assessments and audits to identify vulnerabilities

    • Stay up-to-date on the latest cyber threats

  • Answered by AI
  • Q2. Web application security related and owasp top 10
Interview experience
3
Average
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.

Round 1 - Coding Test 

C,C#,C++,Dart,Go,Type script

Round 2 - Technical 

(2 Questions)

  • Q1. How can you create a virus to correct a crashed server? Answer : a. Read all data console. B. using any server detector . C. Use advance knowledge on cybersecurity difference system to quick recreate. Answ...
  • Q2. Answer my Q1 and try to contact me

Interview Preparation Tips

Interview preparation tips for other job seekers - Find me the answer for my question
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Cyber kill chain
  • Q2. Mitre Attack technique
  • Ans. 

    Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.

    • Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.

    • It helps organizations understand and defend against common attack patterns.

    • Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.

  • Answered by AI
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Behavioral 

(5 Questions)

  • Q1. IP related work email blocking related
  • Q2. IP blocked login devices and check malicious IP in devices option.
  • Ans. 

    IP blocking is a common security measure to prevent unauthorized access to devices and networks.

    • Implement IP blocking on login devices to prevent unauthorized access from specific IPs.

    • Regularly check for malicious IPs in devices and block them to prevent security breaches.

    • Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.

    • Consider implementing automated scripts or tools to s...

  • Answered by AI
  • Q3. Email Gateway block the email spam if we received
  • Ans. 

    Yes, email gateways can block email spam if configured properly.

    • Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.

    • Spam emails are typically identified based on keywords, sender reputation, and other factors.

    • Advanced email gateways may also use machine learning algorithms to detect and block spam.

    • Regular updates and monitoring of email gateway s...

  • Answered by AI
  • Q4. F5device for security for white listing
  • Ans. 

    F5 devices can be used for security white listing to control access to specific applications or services.

    • F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.

    • This helps prevent unauthorized access and reduces the attack surface for potential threats.

    • For example, an organization can use F5 devices to white list specific IP addresses for remote

  • Answered by AI
  • Q5. Cisco devices for email and IP upgrade
  • Ans. 

    When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.

    • Ensure compatibility of new devices with existing infrastructure

    • Backup configurations and data before starting the upgrade

    • Test the new devices in a controlled environment before deploying them

    • Consider any security implications of the upgrade

    • Train staff on how to use the new devices effectively

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

It has 40 Questions and time duration of more than 45 minutes

Round 2 - Coding Test 

It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.

Round 3 - HR 

(2 Questions)

  • Q1. Difference between GET and POST method.
  • Ans. 

    GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.

    • GET requests data from a specified resource

    • POST submits data to be processed to a specified resource

    • GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history

    • GET requests have length restrictions, while POST requests do

  • Answered by AI
  • Q2. About Cyber Security and Hashing Methods

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well for your Job Role

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in May 2023. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Assignment 

Assignment in cyber security analyst

Round 3 - One-on-one 

(2 Questions)

  • Q1. I am perfect in cyber security
  • Q2. Please ask me simple question
Round 4 - Technical 

(4 Questions)

  • Q1. Please ask cyber security question
  • Q2. Give me interview time table
  • Q3. It's enough To ask me simple question s
  • Q4. We conduct interview

Interview Preparation Tips

Interview preparation tips for other job seekers - Please conduct interview schedule
I have 2years experience
I am working in fast farwarding system
Round 1 - HR 

(1 Question)

  • Q1. How many years experience in SOC and SIEM
Round 2 - One-on-one 

(1 Question)

  • Q1. A to Z questions related to my work SIEM , experience etc.

Interview Preparation Tips

Interview preparation tips for other job seekers - Proper learn about your technology and work on that

LTIMindtree Interview FAQs

How many rounds are there in LTIMindtree Cyber Security Manager interview?
LTIMindtree interview process usually has 2 rounds. The most common rounds in the LTIMindtree interview process are Technical and HR.
What are the top questions asked in LTIMindtree Cyber Security Manager interview?

Some of the top questions asked at the LTIMindtree Cyber Security Manager interview -

  1. Be specific to the questions that are asked by interviewer, don’t try to bake...read more
  2. SOC related , ransomware threat hunting how to manage ...read more
  3. Technical questions related to cybersecur...read more

Tell us how to improve this page.

LTIMindtree Cyber Security Manager Interview Process

based on 1 interview

Interview experience

5
  
Excellent
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Accenture Interview Questions
3.9
 • 8.2k Interviews
Infosys Interview Questions
3.6
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Cognizant Interview Questions
3.8
 • 5.6k Interviews
Capgemini Interview Questions
3.7
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
Genpact Interview Questions
3.8
 • 3.1k Interviews
IBM Interview Questions
4.0
 • 2.4k Interviews
View all
Senior Software Engineer
21.3k salaries
unlock blur

₹4.7 L/yr - ₹18.7 L/yr

Software Engineer
16.2k salaries
unlock blur

₹2 L/yr - ₹10 L/yr

Module Lead
6.7k salaries
unlock blur

₹7 L/yr - ₹25.5 L/yr

Technical Lead
6.5k salaries
unlock blur

₹9.3 L/yr - ₹36 L/yr

Senior Engineer
4.4k salaries
unlock blur

₹4.2 L/yr - ₹16.5 L/yr

Explore more salaries
Compare LTIMindtree with

Cognizant

3.8
Compare

Capgemini

3.7
Compare

Accenture

3.9
Compare

TCS

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview