Upload Button Icon Add office photos
Premium Employer

i

This company page is being actively managed by NTT DATA, Inc. Team. If you also belong to the team, you can get access from here

NTT DATA, Inc.

Compare button icon Compare button icon Compare

Filter interviews by

NTT DATA, Inc. Senior Security Engineer Interview Questions and Answers

Updated 16 Jul 2023

NTT DATA, Inc. Senior Security Engineer Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Recruitment Consulltant and was interviewed before Jul 2022. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. Network security basic questions
Round 3 - Technical 

(1 Question)

  • Q1. Depth round for technical like TCP flags , app I'd ,
Round 4 - HR 

(1 Question)

  • Q1. Why you are switching job

Interview Preparation Tips

Interview preparation tips for other job seekers - Cisco ASA, paloalto firewall, FTD ISE required. Work load is to much and work load based attendance in service now

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-

I was interviewed in Mar 2024.

Round 1 - Technical 

(2 Questions)

  • Q1. How to onboard JDBC apps in Sailpoint?
  • Ans. 

    Onboarding JDBC apps in Sailpoint involves configuring JDBC connectors and creating application definitions.

    • Configure JDBC connectors in Sailpoint IdentityNow

    • Create application definitions for the JDBC apps

    • Map the necessary attributes for provisioning and reconciliation

    • Test the connectivity and functionality of the JDBC apps

  • Answered by AI
  • Q2. How to develop and deploy rules in Sailpoint IDN?
  • Ans. 

    Developing and deploying rules in Sailpoint IDN involves creating custom rules in the IdentityNow platform and deploying them to enforce access controls.

    • Create custom rules using the IdentityNow Rule Editor

    • Test the rules in a non-production environment before deploying

    • Deploy the rules to the production environment to enforce access controls

    • Monitor and review the effectiveness of the rules regularly

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed in Apr 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. Prepare all the security topic which you have worked and hands on your resume.
Round 3 - Technical 

(1 Question)

  • Q1. Security and VPN
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Apr 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. About previous experience and pressure handling technics
Round 2 - Technical 

(3 Questions)

  • Q1. About Experience and Some Networking Security related topics
  • Q2. And some basics from networks
  • Q3. General from resume

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident and enjoy as much

I applied via Approached by Company and was interviewed before Aug 2021. There were 3 interview rounds.

Round 1 - One-on-one 

(3 Questions)

  • Q1. Handling customers, BAU
  • Q2. Critical issues handling
  • Q3. Handling escalations
  • Ans. 

    Handling escalations involves prompt communication, prioritization, and collaboration with stakeholders.

    • Acknowledge the escalation and gather all relevant information

    • Assess the severity and prioritize based on impact

    • Communicate with stakeholders and provide regular updates

    • Collaborate with cross-functional teams to resolve the issue

    • Document the escalation and resolution process for future reference

  • Answered by AI
Round 2 - Technical 

(4 Questions)

  • Q1. Change management questions
  • Q2. Critical thinking and abilities
  • Q3. Business as usual and procedures
  • Q4. Incident management and handling
Round 3 - HR 

(1 Question)

  • Q1. Salary negotiation and basic details

Interview Preparation Tips

Interview preparation tips for other job seekers - Keep it clear and simple during the interviews

I applied via Recruitment Consultant and was interviewed before Oct 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. How can we make an Symantec agent that is offline for too long time to communicate back to SEPM?
  • Ans. 

    To make an offline Symantec agent communicate back to SEPM, use a heartbeat mechanism and configure a communication schedule.

    • Implement a heartbeat mechanism to regularly check the agent's status

    • Configure the agent to communicate with SEPM at specific intervals

    • Use a communication schedule to define when the agent should attempt to connect

    • Ensure the agent has access to necessary network resources and ports

    • Consider using ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be clear about what you know and what you have done till date. Explain clearly about what you can offer to the company and what are your expectations both in terms of job role and salary

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. What is OWASP and it's attributes?
  • Ans. 

    OWASP stands for Open Web Application Security Project, a non-profit organization focused on improving software security.

    • OWASP provides resources such as tools, documentation, and guidelines for web application security.

    • It publishes a list of the top 10 most critical web application security risks.

    • OWASP also offers training and conferences to educate professionals on security best practices.

  • Answered by AI
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. SIEM Architecture
  • Q2. MITRE Framework
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. SSL Related ! Qualys VMDR Module scans related ! Application vuln !
  • Q2. Top 10 owasp How to prioritise and remediate vulnerabilities
  • Ans. 

    Prioritizing and remediating vulnerabilities using OWASP Top 10

    • Start by identifying the vulnerabilities that pose the highest risk to the organization

    • Use the OWASP Top 10 as a guide to prioritize vulnerabilities

    • Consider the likelihood and potential impact of each vulnerability

    • Remediate vulnerabilities based on their priority level

    • Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities

    • Example...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Make sure you have projects done with examples to present in interview

I applied via Company Website and was interviewed in Aug 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Definition seniors farewell sql injection
  • Ans. 

    Seniors farewell SQL injection is a type of cyber attack that targets web applications.

    • SQL injection is a technique used to exploit vulnerabilities in web applications that use SQL databases

    • Seniors farewell SQL injection is a specific type of SQL injection that targets farewell messages or other content posted by senior members of an organization

    • This type of attack can allow an attacker to gain unauthorized access to s...

  • Answered by AI
  • Q2. What is vunerliblites sql Injection
  • Ans. 

    SQL injection is a type of cyber attack where an attacker injects malicious SQL code into a vulnerable website or application.

    • SQL injection attacks exploit vulnerabilities in web applications that allow an attacker to inject malicious SQL code into a database

    • Attackers can use SQL injection to steal sensitive data, modify or delete data, or even take control of the entire database

    • Preventing SQL injection involves using ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Have a job Target you believe In create plan developer your carrier

Skills evaluated in this interview

NTT DATA, Inc. Interview FAQs

How many rounds are there in NTT DATA, Inc. Senior Security Engineer interview?
NTT DATA, Inc. interview process usually has 4 rounds. The most common rounds in the NTT DATA, Inc. interview process are Technical, HR and Resume Shortlist.
What are the top questions asked in NTT DATA, Inc. Senior Security Engineer interview?

Some of the top questions asked at the NTT DATA, Inc. Senior Security Engineer interview -

  1. Depth round for technical like TCP flags , app I'...read more
  2. Network security basic questi...read more

Tell us how to improve this page.

NTT DATA, Inc. Senior Security Engineer Interview Process

based on 1 interview

Interview experience

4
  
Good
View more
NTT DATA, Inc. Senior Security Engineer Salary
based on 29 salaries
₹5.5 L/yr - ₹18.5 L/yr
7% less than the average Senior Security Engineer Salary in India
View more details

NTT DATA, Inc. Senior Security Engineer Reviews and Ratings

based on 3 reviews

4.5/5

Rating in categories

4.5

Skill development

3.5

Work-life balance

4.2

Salary

4.5

Job security

4.5

Company culture

4.2

Promotions

4.5

Work satisfaction

Explore 3 Reviews and Ratings
Senior Associate
460 salaries
unlock blur

₹2 L/yr - ₹8 L/yr

Software Development Senior Analyst
418 salaries
unlock blur

₹4.5 L/yr - ₹16 L/yr

Software Development Analyst
406 salaries
unlock blur

₹3.3 L/yr - ₹11.5 L/yr

Software Development Specialist
315 salaries
unlock blur

₹6.8 L/yr - ₹18.5 L/yr

Software Engineer
309 salaries
unlock blur

₹3 L/yr - ₹12.7 L/yr

Explore more salaries
Compare NTT DATA, Inc. with

Accenture

3.8
Compare

TCS

3.7
Compare

Infosys

3.6
Compare

Wipro

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview