Upload Button Icon Add office photos
Premium Employer

i

This company page is being actively managed by NTT Data Team. If you also belong to the team, you can get access from here

NTT Data

Compare button icon Compare button icon Compare
3.9

based on 3.6k Reviews

Filter interviews by

NTT Data SAP Security & GRC Consultant Interview Questions, Process, and Tips

Updated 20 Dec 2022

NTT Data SAP Security & GRC Consultant Interview Experiences

1 interview found

SAP Security & GRC Consultant Interview Questions & Answers

user image sandeep vishnubhatla

posted on 20 Dec 2022

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via LinkedIn and was interviewed in Nov 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(10 Questions)

  • Q1. -Overview of your experience.
  • Q2. -Difference between SU24, SU25 and SU22?
  • Ans. 

    SU22 is used to maintain authorization defaults, SU24 is used to maintain authorization checks, and SU25 is used to maintain the upgrade of authorization objects.

    • SU22 is used to set default values for authorization fields

    • SU24 is used to maintain authorization checks for transactions and reports

    • SU25 is used to maintain the upgrade of authorization objects during system upgrades

    • All three transactions are used in SAP to m

  • Answered by AI
  • Q3. -Do you have any Fiori experience
  • Q4. -Have you worked on Password Self Service?
  • Q5. -Unable to submit a GRC ARM request? How do you troubleshoot?
  • Ans. 

    To troubleshoot GRC ARM request submission issue, follow these steps:

    • Check if the user has the necessary authorization to submit the request

    • Verify if the request is complete and all mandatory fields are filled

    • Check if there are any system errors or connectivity issues

    • Review the GRC logs to identify any errors or warnings

    • If the issue persists, escalate to the GRC support team for further investigation

  • Answered by AI
  • Q6. -Tell me about MSMP workflow and what is the usage of BRF+ application?
  • Ans. 

    MSMP workflow is a tool for defining and executing approval processes in SAP systems. BRF+ is an application used to create business rules.

    • MSMP workflow is used to define and execute approval processes for various business scenarios in SAP systems.

    • It allows for the creation of complex approval workflows with multiple levels of approval and parallel processing.

    • BRF+ is an application used to create business rules that ca...

  • Answered by AI
  • Q7. -How do you import roles in GRC?
  • Ans. 

    Roles can be imported in GRC using the Role Upload functionality.

    • Navigate to Access Management > Role Upload

    • Select the system and upload the role file in CSV format

    • Map the fields and validate the data

    • Submit the job for import

  • Answered by AI
  • Q8. -Custom Tcodes and how do get risk analysis for custom tcodes?
  • Ans. 

    Risk analysis for custom tcodes can be done using SAP GRC Access Control.

    • Create custom roles and assign tcodes to them

    • Run risk analysis using SAP GRC Access Control

    • Analyze the results and mitigate any identified risks

    • Regularly review and update custom roles and tcodes

    • Consider using SAP GRC Access Control's continuous compliance monitoring feature

  • Answered by AI
  • Q9. -Expert mode in PFCG?
  • Ans. 

    Expert mode in PFCG allows advanced customization of authorization roles.

    • Expert mode provides access to additional tabs and fields for fine-tuning roles.

    • It allows for more complex authorization logic and the ability to add custom fields.

    • Expert mode should only be used by experienced users as it can be complex and difficult to troubleshoot.

    • Examples of advanced customization include restricting access to specific transac

  • Answered by AI
  • Q10. -Difference between Centralized and Decentralized EAM system? Which is preferable?
  • Ans. 

    Centralized EAM system has a single database while Decentralized EAM system has multiple databases.

    • Centralized EAM system is easier to manage and maintain.

    • Decentralized EAM system provides more flexibility and autonomy to individual departments.

    • Preference depends on the organization's size, structure, and requirements.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - -Be aware of the basics and confident on your topics
-Revise your resume. Questions will be from your resume.

Skills evaluated in this interview

Interview questions from similar companies

I applied via LinkedIn and was interviewed in Jul 2021. There was 1 interview round.

Interview Questionnaire 

4 Questions

  • Q1. Scenario based questions like how do you troubleshoot Authorization issues if the authority is already there for a user.
  • Q2. Critical tables
  • Q3. Su24 tcode functions
  • Q4. Adding object to custom T code
  • Ans. 

    To add an object to a custom T code in SAP Security & GRC, you need to follow these steps:

    • Identify the custom T code where you want to add the object

    • Access the transaction code SE93 to maintain the T code

    • Enter the T code and click on the 'Create' button

    • Provide a short description and select the appropriate program type

    • In the 'Objects' tab, click on the 'Add Object' button

    • Enter the object name and description

    • Save the ch...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - I took very less time to answer all questions and if less than half an hour my technical discussion was done

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
-
Result
Selected Selected
Round 1 - Aptitude Test 

For example, a ₹10 LPA CTC could mean an in-hand salary of ₹70,000–₹75,000 per month, depending on deductions and benefits.

✨ 𝗣𝗿𝗼 𝗧𝗶𝗽: Always request a detailed salary structure during negotiations—it’s your roadmap to making informed decisions

Round 2 - Coding Test 

𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!

We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder

Round 3 - Technical 

(2 Questions)

  • Q1. 2️⃣ 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: This is the actual amount you take home after deductions like: • Employee’s contribution to PF • Income tax (TDS) • Professional tax
  • Q2. 𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀! We’ve all been there—excitedly discussing job offers and hearing about the impressi...

Interview Preparation Tips

Interview preparation tips for other job seekers - 𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!

We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder:

“𝘞𝘩𝘺 𝘥𝘰𝘦𝘴𝘯’𝘵 𝘮𝘺 𝘪𝘯-𝘩𝘢𝘯𝘥 𝘴𝘢𝘭𝘢𝘳𝘺 𝘮𝘢𝘵𝘤𝘩 𝘵𝘩𝘦 𝘊𝘛𝘊 𝘐 𝘸𝘢𝘴 𝘱𝘳𝘰𝘮𝘪𝘴𝘦𝘥?”
Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.

Round 1 - One-on-one 

(5 Questions)

  • Q1. What is security
  • Ans. 

    Security refers to measures taken to protect people, property, and information from harm or unauthorized access.

    • Security involves implementing procedures, technologies, and personnel to prevent and respond to threats

    • Examples include surveillance cameras, access control systems, security guards, and cybersecurity measures

    • Security measures can vary depending on the specific needs and risks of a particular environment or

  • Answered by AI
  • Q2. Why the Security officer in side tha industry
  • Ans. 

    Security officers are essential in the industry to protect people, property, and assets from potential threats and ensure a safe environment.

    • Prevent unauthorized access to facilities

    • Monitor surveillance cameras and alarms

    • Respond to emergencies and incidents

    • Enforce safety and security policies

    • Provide a visible deterrent to potential criminals

  • Answered by AI
  • Q3. How we check the veh before intar the gate.
  • Ans. 

    Vehicles are checked before entering the gate by security officers for safety and security purposes.

    • Check for valid identification and authorization to enter the premises

    • Inspect the vehicle for any suspicious items or signs of tampering

    • Verify the purpose of the visit and destination within the premises

    • Use mirrors to check the undercarriage of the vehicle for any hidden objects

    • Check the trunk and interior of the vehicle

  • Answered by AI
  • Q4. How we check the veh out the gate.
  • Ans. 

    Vehicles are checked at the gate by security officers for safety and security purposes.

    • Security officers visually inspect vehicles for any suspicious items or behavior

    • Security officers may use mirrors to check the undercarriage of vehicles for hidden items

    • Security officers may use metal detectors to check for weapons or other prohibited items

    • Security officers may ask drivers to open trunks or other compartments for ins

  • Answered by AI
  • Q5. And coy employee in and out check and activity

Interview Preparation Tips

Interview preparation tips for other job seekers - Security officer role in the company
Interview experience
3
Average
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.

Round 1 - Coding Test 

C,C#,C++,Dart,Go,Type script

Round 2 - Technical 

(2 Questions)

  • Q1. How can you create a virus to correct a crashed server? Answer : a. Read all data console. B. using any server detector . C. Use advance knowledge on cybersecurity difference system to quick recreate. Answ...
  • Q2. Answer my Q1 and try to contact me

Interview Preparation Tips

Interview preparation tips for other job seekers - Find me the answer for my question
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. SAP SECURITY and what is the use of this
  • Ans. 

    SAP Security involves protecting SAP systems from unauthorized access and ensuring data integrity.

    • SAP Security involves setting up user roles and authorizations to control access to sensitive data

    • It includes implementing security measures such as encryption, authentication, and monitoring

    • Regular security audits and updates are essential to maintain a secure SAP environment

  • Answered by AI
  • Q2. WHAT IS GRC AND WHY USE THIS
  • Ans. 

    GRC stands for Governance, Risk, and Compliance. It is used to manage regulations and policies within an organization.

    • GRC helps organizations align their operations with regulatory requirements and internal policies.

    • It provides a framework for managing risks and ensuring compliance with laws and regulations.

    • GRC solutions often include tools for policy management, risk assessment, and compliance monitoring.

    • Examples of G...

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Basic questions
Round 2 - Technical 

(1 Question)

  • Q1. Security basic questions
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Recent attack and cyber security questions
  • Q2. Mitre frameworks and mapping against the attack
  • Ans. 

    Mitre frameworks provide a structured approach to categorize and analyze cyber threats, mapping them against known attack techniques.

    • Mitre frameworks such as ATT&CK provide a comprehensive list of known adversary tactics and techniques.

    • Security analysts use these frameworks to map observed threats and attacks to specific techniques, aiding in threat intelligence and incident response.

    • By aligning observed behaviors with...

  • Answered by AI
Round 2 - HR 

(2 Questions)

  • Q1. Expectation and relocation
  • Q2. Hybrid and free cab

Interview Preparation Tips

Interview preparation tips for other job seekers - NA

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. SSL Related ! Qualys VMDR Module scans related ! Application vuln !
  • Q2. Top 10 owasp How to prioritise and remediate vulnerabilities
  • Ans. 

    Prioritizing and remediating vulnerabilities using OWASP Top 10

    • Start by identifying the vulnerabilities that pose the highest risk to the organization

    • Use the OWASP Top 10 as a guide to prioritize vulnerabilities

    • Consider the likelihood and potential impact of each vulnerability

    • Remediate vulnerabilities based on their priority level

    • Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities

    • Example...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Make sure you have projects done with examples to present in interview

NTT Data Interview FAQs

How many rounds are there in NTT Data SAP Security & GRC Consultant interview?
NTT Data interview process usually has 2 rounds. The most common rounds in the NTT Data interview process are Resume Shortlist and Technical.
What are the top questions asked in NTT Data SAP Security & GRC Consultant interview?

Some of the top questions asked at the NTT Data SAP Security & GRC Consultant interview -

  1. -Tell me about MSMP workflow and what is the usage of BRF+ applicati...read more
  2. -Unable to submit a GRC ARM request? How do you troublesho...read more
  3. -Custom Tcodes and how do get risk analysis for custom tcod...read more

Tell us how to improve this page.

People are getting interviews through

based on 1 NTT Data interview
Job Portal
100%
Low Confidence
?
Low Confidence means the data is based on a small number of responses received from the candidates.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.2k Interviews
Accenture Interview Questions
3.9
 • 8k Interviews
Infosys Interview Questions
3.7
 • 7.5k Interviews
Wipro Interview Questions
3.7
 • 5.5k Interviews
Cognizant Interview Questions
3.8
 • 5.5k Interviews
Capgemini Interview Questions
3.8
 • 4.7k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
Genpact Interview Questions
3.9
 • 3k Interviews
IBM Interview Questions
4.1
 • 2.4k Interviews
View all
NTT Data SAP Security & GRC Consultant Salary
based on 31 salaries
₹3.5 L/yr - ₹13 L/yr
11% more than the average SAP Security & GRC Consultant Salary in India
View more details
Software Engineer
932 salaries
unlock blur

₹2.8 L/yr - ₹11 L/yr

Senior Associate
767 salaries
unlock blur

₹1.1 L/yr - ₹7.5 L/yr

Network Engineer
647 salaries
unlock blur

₹1.8 L/yr - ₹10 L/yr

Software Developer
615 salaries
unlock blur

₹2.5 L/yr - ₹13 L/yr

Senior Software Engineer
512 salaries
unlock blur

₹6.5 L/yr - ₹24 L/yr

Explore more salaries
Compare NTT Data with

Tata Communications

4.1
Compare

Bharti Airtel

4.0
Compare

Reliance Communications

4.0
Compare

Vodafone Idea

4.1
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview