Upload Button Icon Add office photos

Filter interviews by

Mphasis Security Analyst Interview Questions and Answers

Updated 21 Aug 2024

Mphasis Security Analyst Interview Experiences

2 interviews found

Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Say about current role and responsibilities
  • Ans. 

    I am currently working as a Security Analyst, responsible for monitoring and analyzing security threats, implementing security measures, and conducting security assessments.

    • Monitoring and analyzing security threats to identify potential risks

    • Implementing security measures to protect systems and data

    • Conducting security assessments to identify vulnerabilities and recommend solutions

    • Collaborating with IT teams to ensure s...

  • Answered by AI
  • Q2. What is cyber security
  • Ans. 

    Cyber security is the practice of protecting systems, networks, and data from digital attacks.

    • Involves protecting computers, servers, mobile devices, networks, and data from unauthorized access or damage

    • Includes implementing security measures such as firewalls, antivirus software, encryption, and multi-factor authentication

    • Cyber security professionals work to prevent, detect, and respond to cyber threats

    • Examples of cyb...

  • Answered by AI

Skills evaluated in this interview

I applied via Recruitment Consultant and was interviewed in Sep 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Technical

Interview Preparation Tips

Interview preparation tips for other job seekers - It was good.

Security Analyst Interview Questions Asked at Other Companies

Q1. How do you test a web application? What is CSRF and SSRF? What is ... read more
asked in TCS
Q2. What protocols used by nmap Difference between public and private ... read more
Q3. 1. Describe your SOC scenario! 2. What kind of report you prepari ... read more
Q4. Difference between encryption and encoding? With examples and imp ... read more
asked in TCS
Q5. what are the major vulnerabilities you've encounterd? how did you ... read more

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Technology related Questions
  • Q2. Domain related Questions
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. SSL Related ! Qualys VMDR Module scans related ! Application vuln !
  • Q2. Top 10 owasp How to prioritise and remediate vulnerabilities
  • Ans. 

    Prioritizing and remediating vulnerabilities using OWASP Top 10

    • Start by identifying the vulnerabilities that pose the highest risk to the organization

    • Use the OWASP Top 10 as a guide to prioritize vulnerabilities

    • Consider the likelihood and potential impact of each vulnerability

    • Remediate vulnerabilities based on their priority level

    • Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities

    • Example...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Make sure you have projects done with examples to present in interview
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.

    • Experienced in conducting security assessments and identifying vulnerabilities

    • Skilled in implementing security measures to protect against cyber threats

    • Proficient in analyzing security incidents and responding effectively

    • Certified in relevant security certifications such as CISSP or CISM

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different types of malware
  • Ans. 

    Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

    • Viruses: self-replicating programs that infect other files on a computer

    • Worms: standalone malware that spreads across networks

    • Trojans: disguised as legitimate software to trick users into installing them

    • Ransomware: encrypts files and demands payment for decryption

    • Spyware: secretly gathers information about...

  • Answered by AI
  • Q2. What would you first do if a machine is infected
  • Ans. 

    The first step would be to isolate the infected machine from the network to prevent further spread of the infection.

    • Isolate the infected machine from the network to prevent further spread of the infection

    • Identify the type of malware or virus that has infected the machine

    • Run a full system scan using antivirus software to detect and remove the malware

    • Update the operating system and all software to patch any vulnerabiliti...

  • Answered by AI
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Aug 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. About Experience on Technologies
  • Q2. Current CTC and Expected
Round 3 - Technical 

(4 Questions)

  • Q1. What are Azure Security Policies
  • Ans. 

    Azure Security Policies are a set of rules and configurations that help enforce security controls within Azure environments.

    • Azure Security Policies help ensure compliance with security standards and best practices

    • They can be used to enforce specific security configurations, such as requiring encryption for storage accounts

    • Policies can be assigned at the subscription, resource group, or resource level

  • Answered by AI
  • Q2. How do we use Conditional Access in Azure
  • Ans. 

    Conditional Access in Azure is used to control access to resources based on specific conditions.

    • Conditional Access policies can be set up to require multi-factor authentication for certain users or devices

    • It can restrict access based on location, device compliance, or other factors

    • Conditional Access can be used to enforce policies such as requiring a compliant device to access sensitive data

  • Answered by AI
  • Q3. Regarding MFA, VPN, GPO
  • Q4. What is Active Directory Federation Service
  • Ans. 

    Active Directory Federation Service (AD FS) is a feature in Windows Server that allows for single sign-on authentication across multiple systems.

    • AD FS allows users to access multiple applications with a single set of credentials

    • It enables secure sharing of identity information between trusted partners

    • AD FS uses claims-based authentication to verify user identity

    • It supports integration with cloud-based services like Off

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed in Dec 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

Questions regarding the fundamentals of cybersecurity, including arithmetic operations and logical reasoning.

Round 2 - Technical 

(3 Questions)

  • Q1. What are the port numbers used for HTTP, SMTP, and TCP?
  • Q2. What is your approach to Vulnerability Assessment and Penetration Testing (VAPT) for web-based applications?
  • Q3. What is phishing
Round 3 - HR 

(2 Questions)

  • Q1. Why do you want to join this company
  • Q2. How do you believe you are a suitable candidate for this role?
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. How ospf is works ?
  • Ans. 

    OSPF (Open Shortest Path First) is a routing protocol that uses link-state routing algorithm to determine the best path for data packets.

    • OSPF routers exchange link-state advertisements (LSAs) to build a topology map of the network.

    • Each router calculates the shortest path to each network based on the information in the LSAs.

    • OSPF uses cost as a metric to determine the best path, with lower cost paths being preferred.

    • OSPF...

  • Answered by AI
  • Q2. What is bgp parameter ?
  • Ans. 

    BGP parameter refers to the various attributes and settings used in the Border Gateway Protocol for routing decisions.

    • BGP parameters include attributes like AS path, next hop, local preference, and MED.

    • These parameters help BGP routers make decisions on the best path to reach a destination.

    • Examples of BGP parameters are weight, local preference, and community values.

  • Answered by AI
Round 2 - Technical 

(3 Questions)

  • Q1. What network works and implements parts
  • Ans. 

    Network works and implements parts refer to the components and protocols involved in the functioning of a network.

    • Network devices such as routers, switches, firewalls, and access points work together to facilitate communication.

    • Protocols like TCP/IP, DNS, DHCP, and SSL/TLS are implemented to ensure data transmission and security.

    • Network segmentation, VLANs, and VPNs are used to separate and secure different parts of a ...

  • Answered by AI
  • Q2. Wireless wlc vlan configuration
  • Q3. Switch configuration

Interview Preparation Tips

Interview preparation tips for other job seekers - Good experience with company HR but management was not helpful in office environment

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. SOC roles and responsibilities

I applied via Approached by Company and was interviewed before Aug 2021. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. What is OWASP top 10?
  • Ans. 

    OWASP top 10 is a list of the most critical web application security risks.

    • It is published by the Open Web Application Security Project (OWASP)

    • It includes risks such as injection, broken authentication and session management, cross-site scripting (XSS), and more

    • It is updated every few years to reflect new threats and vulnerabilities

    • It is used by security professionals to prioritize their efforts and focus on the most i

  • Answered by AI
  • Q2. What is the difference between vulnerability assessment and penetration testing?
  • Ans. 

    Vulnerability assessment identifies vulnerabilities, while penetration testing exploits them to determine the impact.

    • Vulnerability assessment is a non-intrusive process that identifies vulnerabilities in a system or network.

    • Penetration testing is an intrusive process that exploits vulnerabilities to determine the impact on the system or network.

    • Vulnerability assessment is usually automated and performed regularly to id...

  • Answered by AI
  • Q3. What are some of the vulnerabilities during web application penetration testing?
  • Ans. 

    Vulnerabilities in web application penetration testing

    • Injection flaws (SQL, LDAP, etc.)

    • Cross-site scripting (XSS)

    • Broken authentication and session management

    • Insecure direct object references

    • Security misconfiguration

    • Sensitive data exposure

    • Insufficient logging and monitoring

  • Answered by AI
Round 3 - HR 

(2 Questions)

  • Q1. Why are u interested in Cybersecurity?
  • Ans. 

    I am interested in Cybersecurity because it allows me to protect and defend against cyber threats, ensuring the safety and privacy of individuals and organizations.

    • Passion for technology and problem-solving

    • Desire to make a positive impact by safeguarding sensitive information

    • Fascination with the constantly evolving nature of cyber threats

    • Opportunity to work on challenging and complex projects

    • Ability to contribute to th...

  • Answered by AI
  • Q2. What do you expect from the company during your full time employment?
  • Ans. 

    I expect the company to provide a supportive and challenging work environment, opportunities for growth and learning, fair compensation, and a strong commitment to security.

    • Supportive and challenging work environment

    • Opportunities for growth and learning

    • Fair compensation

    • Strong commitment to security

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Tata Elxsi Security Engineer interview:
  • NMAP
  • OWASP
  • CIA traits
  • Cybersecurity
  • VAPT
Interview preparation tips for other job seekers - Be confident, it's fine to not know a answer, avoid bluffing, don't hesitate to ask hints/clarifications for a question. The interviewer always wants the interviewee to succeed.

Mphasis Interview FAQs

How many rounds are there in Mphasis Security Analyst interview?
Mphasis interview process usually has 1 rounds. The most common rounds in the Mphasis interview process are Technical.
How to prepare for Mphasis Security Analyst interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Mphasis. The most common topics and skills that interviewers at Mphasis expect are Firewall, IPS, Information Security, Networking and SIEM.

Tell us how to improve this page.

Mphasis Security Analyst Interview Process

based on 1 interview

Interview experience

1
  
Bad
View more
Mphasis Security Analyst Salary
based on 85 salaries
₹3.5 L/yr - ₹9.8 L/yr
15% less than the average Security Analyst Salary in India
View more details

Mphasis Security Analyst Reviews and Ratings

based on 4 reviews

3.7/5

Rating in categories

4.2

Skill development

3.2

Work-life balance

3.2

Salary

3.1

Job security

2.6

Company culture

3.1

Promotions

3.3

Work satisfaction

Explore 4 Reviews and Ratings
Software Engineer
6.3k salaries
unlock blur

₹2 L/yr - ₹9.5 L/yr

Senior Software Engineer
5.6k salaries
unlock blur

₹6 L/yr - ₹23 L/yr

Associate Software Engineer
4.6k salaries
unlock blur

₹2 L/yr - ₹7 L/yr

Module Lead
2.4k salaries
unlock blur

₹8.1 L/yr - ₹33 L/yr

Transaction Processing Officer
2.3k salaries
unlock blur

₹1.4 L/yr - ₹4.5 L/yr

Explore more salaries
Compare Mphasis with

Cognizant

3.8
Compare

Wipro

3.7
Compare

Accenture

3.9
Compare

TCS

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview