Upload Button Icon Add office photos
Premium Employer

i

This company page is being actively managed by NTT Data Team. If you also belong to the team, you can get access from here

NTT Data

Compare button icon Compare button icon Compare
3.9

based on 3.6k Reviews

Filter interviews by

NTT Data Senior Security Engineer Interview Questions and Answers

Updated 15 Apr 2024

NTT Data Senior Security Engineer Interview Experiences

1 interview found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Apr 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. About previous experience and pressure handling technics
Round 2 - Technical 

(3 Questions)

  • Q1. About Experience and Some Networking Security related topics
  • Q2. And some basics from networks
  • Q3. General from resume

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident and enjoy as much

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-

I was interviewed in Mar 2024.

Round 1 - Technical 

(2 Questions)

  • Q1. How to onboard JDBC apps in Sailpoint?
  • Ans. 

    Onboarding JDBC apps in Sailpoint involves configuring JDBC connectors and creating application definitions.

    • Configure JDBC connectors in Sailpoint IdentityNow

    • Create application definitions for the JDBC apps

    • Map the necessary attributes for provisioning and reconciliation

    • Test the connectivity and functionality of the JDBC apps

  • Answered by AI
  • Q2. How to develop and deploy rules in Sailpoint IDN?
  • Ans. 

    Developing and deploying rules in Sailpoint IDN involves creating custom rules in the IdentityNow platform and deploying them to enforce access controls.

    • Create custom rules using the IdentityNow Rule Editor

    • Test the rules in a non-production environment before deploying

    • Deploy the rules to the production environment to enforce access controls

    • Monitor and review the effectiveness of the rules regularly

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed in Apr 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. Prepare all the security topic which you have worked and hands on your resume.
Round 3 - Technical 

(1 Question)

  • Q1. Security and VPN

I applied via Approached by Company and was interviewed before Aug 2021. There were 3 interview rounds.

Round 1 - One-on-one 

(3 Questions)

  • Q1. Handling customers, BAU
  • Q2. Critical issues handling
  • Q3. Handling escalations
  • Ans. 

    Handling escalations involves prompt communication, prioritization, and collaboration with stakeholders.

    • Acknowledge the escalation and gather all relevant information

    • Assess the severity and prioritize based on impact

    • Communicate with stakeholders and provide regular updates

    • Collaborate with cross-functional teams to resolve the issue

    • Document the escalation and resolution process for future reference

  • Answered by AI
Round 2 - Technical 

(4 Questions)

  • Q1. Change management questions
  • Q2. Critical thinking and abilities
  • Q3. Business as usual and procedures
  • Q4. Incident management and handling
Round 3 - HR 

(1 Question)

  • Q1. Salary negotiation and basic details

Interview Preparation Tips

Interview preparation tips for other job seekers - Keep it clear and simple during the interviews

I applied via Recruitment Consultant and was interviewed before Oct 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. How can we make an Symantec agent that is offline for too long time to communicate back to SEPM?
  • Ans. 

    To make an offline Symantec agent communicate back to SEPM, use a heartbeat mechanism and configure a communication schedule.

    • Implement a heartbeat mechanism to regularly check the agent's status

    • Configure the agent to communicate with SEPM at specific intervals

    • Use a communication schedule to define when the agent should attempt to connect

    • Ensure the agent has access to necessary network resources and ports

    • Consider using ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be clear about what you know and what you have done till date. Explain clearly about what you can offer to the company and what are your expectations both in terms of job role and salary

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Explain about SIEM TOOL and which SIEM tool you have used ?
  • Ans. 

    SIEM (Security Information and Event Management) tool is a software solution that aggregates and analyzes security data from various sources.

    • SIEM tools help in detecting and responding to security incidents in real-time.

    • They provide centralized visibility into an organization's security posture.

    • Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.

    • I have experience using Splunk for log management and security

  • Answered by AI
  • Q2. Have you configured policies in defender ?
  • Ans. 

    Yes, I have configured policies in defender.

    • Yes, I have configured policies in Windows Defender to ensure proper security measures are in place.

    • I have set up policies for malware protection, network protection, firewall settings, and device control.

    • Regularly review and update policies to adapt to new threats and vulnerabilities.

    • Example: Configuring Windows Defender policies to block certain file types from being downlo

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well and be confident
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Basic questions
Round 2 - Technical 

(1 Question)

  • Q1. Security basic questions
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Explain the role of Virtual router and virtual system
  • Ans. 

    Virtual router and virtual system play a crucial role in network security by providing isolated environments for routing and security policies.

    • Virtual router is a software-based routing instance that operates within a virtualized environment.

    • Virtual system is a logical division of a physical firewall that allows for separate security policies and configurations.

    • Both virtual router and virtual system help in creating is...

  • Answered by AI
  • Q2. What is app-id, content-id
  • Ans. 

    App-ID and Content-ID are features used in network security to identify and control applications and content.

    • App-ID is used to identify applications based on their behavior, not just port and protocol

    • Content-ID is used to identify and control content within applications

    • Both features are commonly used in next-generation firewalls for advanced security policies

    • Example: App-ID can identify and block social media applicati...

  • Answered by AI
Round 2 - Technical 

(3 Questions)

  • Q1. What is U-turn Nat
  • Ans. 

    U-turn NAT is a network configuration where traffic enters and exits the same interface on a network device.

    • U-turn NAT is also known as hairpin NAT or NAT loopback.

    • It allows internal hosts to access resources using their public IP address from within the same network.

    • This is commonly used in scenarios where internal hosts need to access a server using its public IP address.

    • U-turn NAT can be configured on firewalls or r

  • Answered by AI
  • Q2. What is service route
  • Ans. 

    A service route is the path that a service takes to reach its destination, including all the network devices it passes through.

    • Service routes can include routers, switches, firewalls, and other network devices.

    • Understanding service routes is important for network security to identify potential vulnerabilities or points of failure.

    • Examples of service routes include the path an email takes from sender to recipient, or th...

  • Answered by AI
  • Q3. What is wildfire
  • Ans. 

    Wildfire is a type of malware analysis service provided by Palo Alto Networks.

    • Malware analysis service

    • Identifies and blocks unknown threats in real-time

    • Utilizes machine learning and AI for threat detection

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Recent attack and cyber security questions
  • Q2. Mitre frameworks and mapping against the attack
  • Ans. 

    Mitre frameworks provide a structured approach to categorize and analyze cyber threats, mapping them against known attack techniques.

    • Mitre frameworks such as ATT&CK provide a comprehensive list of known adversary tactics and techniques.

    • Security analysts use these frameworks to map observed threats and attacks to specific techniques, aiding in threat intelligence and incident response.

    • By aligning observed behaviors with...

  • Answered by AI
Round 2 - HR 

(2 Questions)

  • Q1. Expectation and relocation
  • Q2. Hybrid and free cab

Interview Preparation Tips

Interview preparation tips for other job seekers - NA

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

NTT Data Interview FAQs

How many rounds are there in NTT Data Senior Security Engineer interview?
NTT Data interview process usually has 2 rounds. The most common rounds in the NTT Data interview process are HR and Technical.
How to prepare for NTT Data Senior Security Engineer interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at NTT Data. The most common topics and skills that interviewers at NTT Data expect are Bluecoat, Checkpoint, F5, Firewall and Fortinet.
What are the top questions asked in NTT Data Senior Security Engineer interview?

Some of the top questions asked at the NTT Data Senior Security Engineer interview -

  1. And some basics from netwo...read more
  2. General from res...read more

Tell us how to improve this page.

People are getting interviews through

based on 1 NTT Data interview
Company Website
100%
Low Confidence
?
Low Confidence means the data is based on a small number of responses received from the candidates.
NTT Data Senior Security Engineer Salary
based on 26 salaries
₹6.6 L/yr - ₹20.5 L/yr
8% less than the average Senior Security Engineer Salary in India
View more details

NTT Data Senior Security Engineer Reviews and Ratings

based on 2 reviews

1.1/5

Rating in categories

1.1

Skill development

1.1

Work-Life balance

1.0

Salary & Benefits

1.2

Job Security

1.1

Company culture

1.1

Promotions/Appraisal

1.2

Work Satisfaction

Explore 2 Reviews and Ratings
Software Engineer
932 salaries
unlock blur

₹2.8 L/yr - ₹11 L/yr

Senior Associate
767 salaries
unlock blur

₹1.1 L/yr - ₹9.3 L/yr

Network Engineer
647 salaries
unlock blur

₹1.8 L/yr - ₹10 L/yr

Software Developer
615 salaries
unlock blur

₹2.5 L/yr - ₹13 L/yr

Senior Software Engineer
512 salaries
unlock blur

₹6.5 L/yr - ₹24 L/yr

Explore more salaries
Compare NTT Data with

Tata Communications

4.1
Compare

Bharti Airtel

4.0
Compare

Reliance Communications

4.0
Compare

Vodafone Idea

4.1
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview