Upload Button Icon Add office photos
Premium Employer

i

This company page is being actively managed by NTT Data Team. If you also belong to the team, you can get access from here

NTT Data

Compare button icon Compare button icon Compare
3.9

based on 3.6k Reviews

Filter interviews by

NTT Data Senior Security Engineer Interview Questions and Answers

Updated 15 Apr 2024

NTT Data Senior Security Engineer Interview Experiences

1 interview found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Apr 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. About previous experience and pressure handling technics
Round 2 - Technical 

(3 Questions)

  • Q1. About Experience and Some Networking Security related topics
  • Q2. And some basics from networks
  • Q3. General from resume

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident and enjoy as much

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-

I was interviewed in Mar 2024.

Round 1 - Technical 

(2 Questions)

  • Q1. How to onboard JDBC apps in Sailpoint?
  • Ans. 

    Onboarding JDBC apps in Sailpoint involves configuring JDBC connectors and creating application definitions.

    • Configure JDBC connectors in Sailpoint IdentityNow

    • Create application definitions for the JDBC apps

    • Map the necessary attributes for provisioning and reconciliation

    • Test the connectivity and functionality of the JDBC apps

  • Answered by AI
  • Q2. How to develop and deploy rules in Sailpoint IDN?
  • Ans. 

    Developing and deploying rules in Sailpoint IDN involves creating custom rules in the IdentityNow platform and deploying them to enforce access controls.

    • Create custom rules using the IdentityNow Rule Editor

    • Test the rules in a non-production environment before deploying

    • Deploy the rules to the production environment to enforce access controls

    • Monitor and review the effectiveness of the rules regularly

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed in Apr 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. Prepare all the security topic which you have worked and hands on your resume.
Round 3 - Technical 

(1 Question)

  • Q1. Security and VPN

I applied via Approached by Company and was interviewed before Aug 2021. There were 3 interview rounds.

Round 1 - One-on-one 

(3 Questions)

  • Q1. Handling customers, BAU
  • Q2. Critical issues handling
  • Q3. Handling escalations
  • Ans. 

    Handling escalations involves prompt communication, prioritization, and collaboration with stakeholders.

    • Acknowledge the escalation and gather all relevant information

    • Assess the severity and prioritize based on impact

    • Communicate with stakeholders and provide regular updates

    • Collaborate with cross-functional teams to resolve the issue

    • Document the escalation and resolution process for future reference

  • Answered by AI
Round 2 - Technical 

(4 Questions)

  • Q1. Change management questions
  • Q2. Critical thinking and abilities
  • Q3. Business as usual and procedures
  • Q4. Incident management and handling
Round 3 - HR 

(1 Question)

  • Q1. Salary negotiation and basic details

Interview Preparation Tips

Interview preparation tips for other job seekers - Keep it clear and simple during the interviews

I applied via Recruitment Consultant and was interviewed before Oct 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. How can we make an Symantec agent that is offline for too long time to communicate back to SEPM?
  • Ans. 

    To make an offline Symantec agent communicate back to SEPM, use a heartbeat mechanism and configure a communication schedule.

    • Implement a heartbeat mechanism to regularly check the agent's status

    • Configure the agent to communicate with SEPM at specific intervals

    • Use a communication schedule to define when the agent should attempt to connect

    • Ensure the agent has access to necessary network resources and ports

    • Consider using ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be clear about what you know and what you have done till date. Explain clearly about what you can offer to the company and what are your expectations both in terms of job role and salary

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Explain about SIEM TOOL and which SIEM tool you have used ?
  • Ans. 

    SIEM (Security Information and Event Management) tool is a software solution that aggregates and analyzes security data from various sources.

    • SIEM tools help in detecting and responding to security incidents in real-time.

    • They provide centralized visibility into an organization's security posture.

    • Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.

    • I have experience using Splunk for log management and security

  • Answered by AI
  • Q2. Have you configured policies in defender ?
  • Ans. 

    Yes, I have configured policies in defender.

    • Yes, I have configured policies in Windows Defender to ensure proper security measures are in place.

    • I have set up policies for malware protection, network protection, firewall settings, and device control.

    • Regularly review and update policies to adapt to new threats and vulnerabilities.

    • Example: Configuring Windows Defender policies to block certain file types from being downlo

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well and be confident
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Explain the role of Virtual router and virtual system
  • Ans. 

    Virtual router and virtual system play a crucial role in network security by providing isolated environments for routing and security policies.

    • Virtual router is a software-based routing instance that operates within a virtualized environment.

    • Virtual system is a logical division of a physical firewall that allows for separate security policies and configurations.

    • Both virtual router and virtual system help in creating is...

  • Answered by AI
  • Q2. What is app-id, content-id
  • Ans. 

    App-ID and Content-ID are features used in network security to identify and control applications and content.

    • App-ID is used to identify applications based on their behavior, not just port and protocol

    • Content-ID is used to identify and control content within applications

    • Both features are commonly used in next-generation firewalls for advanced security policies

    • Example: App-ID can identify and block social media applicati...

  • Answered by AI
Round 2 - Technical 

(3 Questions)

  • Q1. What is U-turn Nat
  • Ans. 

    U-turn NAT is a network configuration where traffic enters and exits the same interface on a network device.

    • U-turn NAT is also known as hairpin NAT or NAT loopback.

    • It allows internal hosts to access resources using their public IP address from within the same network.

    • This is commonly used in scenarios where internal hosts need to access a server using its public IP address.

    • U-turn NAT can be configured on firewalls or r

  • Answered by AI
  • Q2. What is service route
  • Ans. 

    A service route is the path that a service takes to reach its destination, including all the network devices it passes through.

    • Service routes can include routers, switches, firewalls, and other network devices.

    • Understanding service routes is important for network security to identify potential vulnerabilities or points of failure.

    • Examples of service routes include the path an email takes from sender to recipient, or th...

  • Answered by AI
  • Q3. What is wildfire
  • Ans. 

    Wildfire is a type of malware analysis service provided by Palo Alto Networks.

    • Malware analysis service

    • Identifies and blocks unknown threats in real-time

    • Utilizes machine learning and AI for threat detection

  • Answered by AI

Skills evaluated in this interview

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.

    • Experienced in conducting security assessments and identifying vulnerabilities

    • Skilled in implementing security measures to protect against cyber threats

    • Proficient in analyzing security incidents and responding effectively

    • Certified in relevant security certifications such as CISSP or CISM

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different types of malware
  • Ans. 

    Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

    • Viruses: self-replicating programs that infect other files on a computer

    • Worms: standalone malware that spreads across networks

    • Trojans: disguised as legitimate software to trick users into installing them

    • Ransomware: encrypts files and demands payment for decryption

    • Spyware: secretly gathers information about...

  • Answered by AI
  • Q2. What would you first do if a machine is infected
  • Ans. 

    The first step would be to isolate the infected machine from the network to prevent further spread of the infection.

    • Isolate the infected machine from the network to prevent further spread of the infection

    • Identify the type of malware or virus that has infected the machine

    • Run a full system scan using antivirus software to detect and remove the malware

    • Update the operating system and all software to patch any vulnerabiliti...

  • Answered by AI

I applied via Recruitment Consultant

Interview Questionnaire 

4 Questions

  • Q1. What is Symantec DLP.
  • Ans. 

    Symantec DLP is a data loss prevention software that helps organizations protect sensitive data from being leaked or stolen.

    • Symantec DLP uses advanced detection techniques to identify and prevent data breaches.

    • It can monitor and control data across various channels, including email, web, and cloud applications.

    • Symantec DLP can also classify and encrypt sensitive data to ensure its protection.

    • It helps organizations comp...

  • Answered by AI
  • Q2. How many types to protect data from dlp solution.
  • Ans. 

    There are several types of solutions to protect data from DLP, including network-based, endpoint-based, and cloud-based solutions.

    • Network-based solutions monitor traffic on the network and can block or quarantine sensitive data.

    • Endpoint-based solutions monitor data on individual devices and can prevent unauthorized access or transmission.

    • Cloud-based solutions monitor data stored in the cloud and can prevent unauthorize...

  • Answered by AI
  • Q3. In Which port the data base communication with DLP server.
  • Ans. 

    The database communication with DLP server can happen through various ports depending on the configuration.

    • The port number can be configured during the installation of the DLP server.

    • Commonly used ports for database communication are 1433 for SQL Server, 1521 for Oracle, and 3306 for MySQL.

    • Firewalls and network security policies may also affect the port used for communication.

    • It is important to ensure that the appropri...

  • Answered by AI
  • Q4. What is Classification
  • Ans. 

    Classification is the process of categorizing data or information based on certain criteria.

    • It involves grouping similar items together.

    • It helps in organizing and managing data effectively.

    • Examples include classifying emails as spam or not spam, or categorizing documents based on their content.

    • Classification can also be used in machine learning to train models to recognize patterns and make predictions.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be Curious dont hesitate from the interviewer.
Focus on your basic skills.

Skills evaluated in this interview

NTT Data Interview FAQs

How many rounds are there in NTT Data Senior Security Engineer interview?
NTT Data interview process usually has 2 rounds. The most common rounds in the NTT Data interview process are HR and Technical.
How to prepare for NTT Data Senior Security Engineer interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at NTT Data. The most common topics and skills that interviewers at NTT Data expect are Bluecoat, Checkpoint, F5, Firewall and Fortinet.
What are the top questions asked in NTT Data Senior Security Engineer interview?

Some of the top questions asked at the NTT Data Senior Security Engineer interview -

  1. And some basics from netwo...read more
  2. General from res...read more

Tell us how to improve this page.

People are getting interviews through

based on 1 NTT Data interview
Company Website
100%
Low Confidence
?
Low Confidence means the data is based on a small number of responses received from the candidates.
NTT Data Senior Security Engineer Salary
based on 26 salaries
₹6.6 L/yr - ₹20.5 L/yr
8% less than the average Senior Security Engineer Salary in India
View more details

NTT Data Senior Security Engineer Reviews and Ratings

based on 2 reviews

1.1/5

Rating in categories

1.1

Skill development

1.1

Work-Life balance

1.0

Salary & Benefits

1.2

Job Security

1.1

Company culture

1.1

Promotions/Appraisal

1.2

Work Satisfaction

Explore 2 Reviews and Ratings
Software Engineer
932 salaries
unlock blur

₹2.8 L/yr - ₹11 L/yr

Senior Associate
766 salaries
unlock blur

₹1.1 L/yr - ₹7.3 L/yr

Network Engineer
647 salaries
unlock blur

₹1.8 L/yr - ₹10 L/yr

Software Developer
615 salaries
unlock blur

₹2.5 L/yr - ₹13 L/yr

Senior Software Engineer
512 salaries
unlock blur

₹6.5 L/yr - ₹24 L/yr

Explore more salaries
Compare NTT Data with

Tata Communications

4.1
Compare

Bharti Airtel

4.0
Compare

Reliance Communications

4.0
Compare

Vodafone Idea

4.1
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview