Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Optiv Security India Private Limited Team. If you also belong to the team, you can get access from here

Optiv Security India Private Limited Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Optiv Security India Private Limited Interview Questions and Answers

Updated 17 Jun 2025
Popular Designations

10 Interview questions

A Senior Software Engineer was asked 1mo ago
Q. Given a scenario, how do you plan to build a system?
Ans. 

To build a system, I would follow a structured approach focusing on requirements, architecture, development, testing, and deployment.

  • 1. Gather Requirements: Collaborate with stakeholders to understand needs. Example: Conduct interviews with users to gather feature requests.

  • 2. Design Architecture: Choose appropriate architecture (e.g., microservices, monolithic). Example: Use microservices for scalability in a larg...

View all Senior Software Engineer interview questions
A Senior Software Engineer was asked 1mo ago
Q. How do you implement a cache?
Ans. 

Implementing a cache involves storing frequently accessed data for quick retrieval, improving performance and reducing latency.

  • Choose a caching strategy: in-memory (e.g., Redis, Memcached) or disk-based (e.g., file system cache).

  • Define cache expiration policies (e.g., time-based, size-based) to manage stale data.

  • Implement cache invalidation mechanisms to ensure data consistency (e.g., on data update).

  • Use a suitabl...

View all Senior Software Engineer interview questions
An Analyst was asked 7mo ago
Q. What security incident have you worked on recently?
Ans. 

Recently, I managed a phishing incident that targeted our organization, leading to a comprehensive response and mitigation strategy.

  • Identified a phishing email that bypassed our filters, targeting employees with a fake login page.

  • Conducted a thorough investigation to assess the impact and identify affected accounts.

  • Implemented immediate measures, including password resets and user training on recognizing phishing ...

View all Analyst interview questions
An Analyst was asked 7mo ago
Q. What use cases are you familiar with?
Ans. 

Analyzing customer feedback to improve product features and enhance user satisfaction.

  • Collect feedback through surveys and reviews to identify common pain points.

  • Use sentiment analysis to gauge overall customer satisfaction.

  • Prioritize feature requests based on frequency and impact on user experience.

  • Example: A software company may find users want a dark mode feature.

  • Implement changes and track user engagement metr...

View all Analyst interview questions
A Security Analyst was asked
Q. What is the MITRE ATT&CK framework?
Ans. 

Mitre attack is a framework for identifying and categorizing common attack techniques used by adversaries.

  • Mitre attack provides a standardized way of describing and communicating about cyber threats.

  • It includes a list of tactics and techniques used by attackers, as well as examples of real-world attacks.

  • The framework is used by security professionals to assess their organization's security posture and identify are...

View all Security Analyst interview questions
A Security Analyst was asked
Q. What is a cyber attack kill chain?
Ans. 

Cyber attack kill chain is a framework that describes the stages of a successful cyber attack.

  • The kill chain consists of several stages including reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

  • Each stage represents a step in the attacker's process and can be used to identify and prevent attacks.

  • For example, in the reconnaissance stage, attackers ...

View all Security Analyst interview questions
A Management Analyst was asked
Q. What is the key man problem in cybersecurity?
Ans. 

Key man problem in cybersecurity refers to the risk of a single person having too much access or knowledge, making them a single point of failure.

  • Key man problem arises when a single person has access to critical systems or information

  • If that person leaves or is unavailable, it can cause significant disruption or security breaches

  • This can be mitigated by implementing proper access controls and knowledge sharing am...

View all Management Analyst interview questions
Are these interview questions helpful?
A Management Analyst was asked
Q. Explain service-oriented and product-oriented solutions for cybersecurity.
Ans. 

Service-oriented solutions focus on continuous monitoring and response, while product-oriented solutions rely on implementing security measures through hardware and software.

  • Service-oriented solutions involve ongoing monitoring of systems and networks to detect and respond to threats in real-time.

  • Examples of service-oriented solutions include managed security services, threat intelligence platforms, and security i...

View all Management Analyst interview questions
A Soc Analyst 1 was asked
Q. What is cross site scripting? how does lateral movement work in attack scenario?
Ans. 

Cross site scripting is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

  • Cross site scripting (XSS) occurs when an attacker injects malicious scripts into web pages viewed by other users.

  • Lateral movement in an attack scenario involves an attacker moving horizontally across a network to gain access to different systems.

  • Attackers can use lateral ...

View all Soc Analyst 1 interview questions
An Associate Engineer was asked
Q. Nat behaviour while accessing Google
Ans. 

Nat behavior while accessing Google is to search for information, browse websites, and possibly interact with ads.

  • Typing search queries in the search bar

  • Clicking on search results to visit websites

  • Interacting with ads displayed on the search results page

View all Associate Engineer interview questions

Optiv Security India Private Limited Interview Experiences

13 interviews found

Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
No response

I appeared for an interview in May 2025, where I was asked the following questions.

  • Q1. Will ask you to create PPT on technical points by Manager or Sr. Manager
  • Q2. Management level questions by Sr. Director.

Interview Preparation Tips

Interview preparation tips for other job seekers - I would suggest go for interview if you can join early and your salary expectation is less. Dont put paper in your current organization until Offer is rolled out from Optiv. In My case, all discussion with done positively with Sr. Director but after a week i got to know that they hired someone with less salary expectation and earlier joiner. So don't waste your time and energy with Optiv recruitment team until you meet their salary and early joining expectation.

Analyst Interview Questions & Answers

user image Anonymous

posted on 30 Nov 2024

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(2 Questions)

  • Q1. What is the security incident you have worked on recently
  • Ans. 

    Recently, I managed a phishing incident that targeted our organization, leading to a comprehensive response and mitigation strategy.

    • Identified a phishing email that bypassed our filters, targeting employees with a fake login page.

    • Conducted a thorough investigation to assess the impact and identify affected accounts.

    • Implemented immediate measures, including password resets and user training on recognizing phishing attem...

  • Answered by AI
  • Q2. Usecase you know
  • Ans. 

    Analyzing customer feedback to improve product features and enhance user satisfaction.

    • Collect feedback through surveys and reviews to identify common pain points.

    • Use sentiment analysis to gauge overall customer satisfaction.

    • Prioritize feature requests based on frequency and impact on user experience.

    • Example: A software company may find users want a dark mode feature.

    • Implement changes and track user engagement metrics p...

  • Answered by AI

Soc Analyst 1 Interview Questions & Answers

user image Anonymous

posted on 13 Mar 2024

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. What is cross site scripting? how does lateral movement work in attack scenario?
  • Ans. 

    Cross site scripting is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

    • Cross site scripting (XSS) occurs when an attacker injects malicious scripts into web pages viewed by other users.

    • Lateral movement in an attack scenario involves an attacker moving horizontally across a network to gain access to different systems.

    • Attackers can use lateral movem...

  • Answered by AI
Round 2 - Technical 

(1 Question)

  • Q1. Scenario based question what type of alerts you have worked in previous organisation
Round 3 - HR 

(1 Question)

  • Q1. Where you see yourself in next five years
  • Ans. 

    In five years, I envision myself as a skilled SOC Analyst, leading initiatives to enhance cybersecurity and mentoring junior analysts.

    • I aim to deepen my expertise in threat detection and incident response, possibly obtaining certifications like CISSP or CEH.

    • I see myself taking on leadership roles, guiding a team of analysts to improve our security posture and response strategies.

    • I plan to contribute to the development ...

  • Answered by AI
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(2 Questions)

  • Q1. Tell me about your self
  • Q2. Roles and responsibilities
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-

I applied via Campus Placement

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Case Study 

Cant share for confidential reasons

Round 3 - Group Discussion 

Cant share for confidential reasons sorry

Round 4 - One-on-one 

(1 Question)

  • Q1. Cyber security, compliance, risk management
Round 5 - One-on-one 

(1 Question)

  • Q1. Cyber security risk management HR questions
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Data Cannot be disclosed at this moment
  • Q2. Data cannot be disclosed at this time
Round 3 - Technical 

(1 Question)

  • Q1. This could be an inappropriate question to answer

Interview Preparation Tips

Interview preparation tips for other job seekers - Deal cool with Talent Aquisition team, they can make upside down.
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Nat behaviour while accessing Google
  • Ans. 

    Nat behavior while accessing Google is to search for information, browse websites, and possibly interact with ads.

    • Typing search queries in the search bar

    • Clicking on search results to visit websites

    • Interacting with ads displayed on the search results page

  • Answered by AI
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - One-on-one 

(2 Questions)

  • Q1. What is cyber attack kill chain ?
  • Ans. 

    Cyber attack kill chain is a framework that describes the stages of a successful cyber attack.

    • The kill chain consists of several stages including reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

    • Each stage represents a step in the attacker's process and can be used to identify and prevent attacks.

    • For example, in the reconnaissance stage, attackers gathe...

  • Answered by AI
  • Q2. What is Mitre attack
  • Ans. 

    Mitre attack is a framework for identifying and categorizing common attack techniques used by adversaries.

    • Mitre attack provides a standardized way of describing and communicating about cyber threats.

    • It includes a list of tactics and techniques used by attackers, as well as examples of real-world attacks.

    • The framework is used by security professionals to assess their organization's security posture and identify areas fo...

  • Answered by AI
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I appeared for an interview before Jun 2024, where I was asked the following questions.

  • Q1. How do you implement a cache?
  • Ans. 

    Implementing a cache involves storing frequently accessed data for quick retrieval, improving performance and reducing latency.

    • Choose a caching strategy: in-memory (e.g., Redis, Memcached) or disk-based (e.g., file system cache).

    • Define cache expiration policies (e.g., time-based, size-based) to manage stale data.

    • Implement cache invalidation mechanisms to ensure data consistency (e.g., on data update).

    • Use a suitable dat...

  • Answered by AI
  • Q2. Given a scenario, how do you plan to build a system
  • Ans. 

    To build a system, I would follow a structured approach focusing on requirements, architecture, development, testing, and deployment.

    • 1. Gather Requirements: Collaborate with stakeholders to understand needs. Example: Conduct interviews with users to gather feature requests.

    • 2. Design Architecture: Choose appropriate architecture (e.g., microservices, monolithic). Example: Use microservices for scalability in a large app...

  • Answered by AI

Analyst Interview Questions & Answers

user image Shivakumar Kabberalli

posted on 28 Jan 2024

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
6-8 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Jan 2023. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. Network and Cyber security basic, Phishing

Top trending discussions

View All
Interview Tips & Stories
1w (edited)
a team lead
Why are women still asked such personal questions in interview?
I recently went for an interview… and honestly, m still trying to process what just happened. Instead of being asked about my skills, experience, or how I could add value to the company… the questions took a totally unexpected turn. The interviewer started asking things like When are you getting married? Are you engaged? And m sure, if I had said I was married, the next question would’ve been How long have you been married? What does my personal life have to do with the job m applying for? This is where I felt the gender discrimination hit hard. These types of questions are so casually thrown at women during interviews but are they ever asked to men? No one asks male candidates if they’re planning a wedding or how old their kids are. So why is it okay to ask women? Can we please stop normalising this kind of behaviour in interviews? Our careers shouldn’t be judged by our relationship status. Period.
Got a question about Optiv Security India Private Limited?
Ask anonymously on communities.

Optiv Security India Private Limited Interview FAQs

How many rounds are there in Optiv Security India Private Limited interview?
Optiv Security India Private Limited interview process usually has 2-3 rounds. The most common rounds in the Optiv Security India Private Limited interview process are Technical, One-on-one Round and Resume Shortlist.
How to prepare for Optiv Security India Private Limited interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Optiv Security India Private Limited. The most common topics and skills that interviewers at Optiv Security India Private Limited expect are Information Security, Active Directory, Linux, SIEM and Python.
What are the top questions asked in Optiv Security India Private Limited interview?

Some of the top questions asked at the Optiv Security India Private Limited interview -

  1. given a scenario, how do you plan to build a sys...read more
  2. What is key man problem in cybersecuri...read more
  3. what is the security incident you have worked on recen...read more

Tell us how to improve this page.

Overall Interview Experience Rating

4.2/5

based on 13 interview experiences

Difficulty level

Moderate 100%

Duration

Less than 2 weeks 43%
2-4 weeks 43%
6-8 weeks 14%
View more

Interview Questions from Similar Companies

Softenger Interview Questions
4.0
 • 59 Interviews
TestingXperts Interview Questions
3.9
 • 41 Interviews
Credera Interview Questions
3.7
 • 41 Interviews
Foray Software Interview Questions
3.4
 • 37 Interviews
Aabasoft Interview Questions
4.1
 • 37 Interviews
View all

Optiv Security India Private Limited Reviews and Ratings

based on 76 reviews

4.1/5

Rating in categories

4.1

Skill development

4.2

Work-life balance

4.2

Salary

4.2

Job security

4.2

Company culture

3.7

Promotions

3.9

Work satisfaction

Explore 76 Reviews and Ratings
Principal Engineer
36 salaries
unlock blur

₹24.9 L/yr - ₹41 L/yr

Senior Engineer
33 salaries
unlock blur

₹14.8 L/yr - ₹26.2 L/yr

Security Analyst
29 salaries
unlock blur

₹9.3 L/yr - ₹35.1 L/yr

Senior Threat Analyst
27 salaries
unlock blur

₹11.4 L/yr - ₹22 L/yr

Threat Analyst
27 salaries
unlock blur

₹8.6 L/yr - ₹14.4 L/yr

Explore more salaries
Compare Optiv Security India Private Limited with

Softenger

4.0
Compare

Foray Software

3.4
Compare

Nelito System

3.4
Compare

Alchemy Techsol India

3.6
Compare
write
Share an Interview