Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Optiv Security India Private Limited Team. If you also belong to the team, you can get access from here

Optiv Security India Private Limited Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Optiv Security India Private Limited Interview Questions, Process, and Tips for Experienced

Updated 30 Nov 2024

Top Optiv Security India Private Limited Interview Questions and Answers for Experienced

Optiv Security India Private Limited Interview Experiences for Experienced

Popular Designations

5 interviews found

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Data Cannot be disclosed at this moment
  • Q2. Data cannot be disclosed at this time
Round 3 - Technical 

(1 Question)

  • Q1. This could be an inappropriate question to answer

Interview Preparation Tips

Interview preparation tips for other job seekers - Deal cool with Talent Aquisition team, they can make upside down.
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - One-on-one 

(2 Questions)

  • Q1. What is cyber attack kill chain ?
  • Ans. 

    Cyber attack kill chain is a framework that describes the stages of a successful cyber attack.

    • The kill chain consists of several stages including reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

    • Each stage represents a step in the attacker's process and can be used to identify and prevent attacks.

    • For example, in the reconnaissance stage, attackers gathe...

  • Answered by AI
  • Q2. What is Mitre attack
  • Ans. 

    Mitre attack is a framework for identifying and categorizing common attack techniques used by adversaries.

    • Mitre attack provides a standardized way of describing and communicating about cyber threats.

    • It includes a list of tactics and techniques used by attackers, as well as examples of real-world attacks.

    • The framework is used by security professionals to assess their organization's security posture and identify areas fo...

  • Answered by AI

Security Analyst Interview Questions asked at other Companies

Q1. How do you test a web application? What is CSRF and SSRF? What is LDAP injection? How does namp work while port scanning? (Result - open/filtered/closed) How does ssl work? Suppose a proxy server(Burpsuite) is in b/w server and client so wh... read more
View answer (2)
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Oct 2022. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Do not use an unprofessional email address such as cool_boy@email.com. It shows a lack of professionalism by the candidate.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Depends on job role
  • Q2. Be attentive to the questions
Round 3 - One-on-one 

(2 Questions)

  • Q1. Depends on Job Role
  • Q2. Be prepared and attentive
Round 4 - HR 

(2 Questions)

  • Q1. About salary negotiations
  • Q2. Be prepared for negotiations

Interview Preparation Tips

Interview preparation tips for other job seekers - Be prepared

Talent Acquisition Specialist Interview Questions asked at other Companies

Q1. Can you explain your experience with writing Boolean search queries and provide an example you have created live?
View answer (2)

What people are saying about Optiv Security India Private Limited

View All
an it service desk engineer
6d
Optiv Security Hi, Anybody working in Optiv Security, Bengaluru. Received offer letter from Optiv and LTIMINDTR. Which one should I join?
Got a question about Optiv Security India Private Limited?
Ask anonymously on communities.
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before May 2022. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. Why do you want to work for us?
  • Ans. 

    I am excited to work for your company because of its reputation for innovation and commitment to excellence.

    • I have researched your company and am impressed by the innovative solutions you provide to clients.

    • I am excited about the opportunity to work with a team of professionals who are committed to excellence.

    • I believe that my skills and experience align well with the needs of your organization.

    • I am looking for a chall...

  • Answered by AI
  • Q2. What problems you have faced and what did you do about them?
  • Ans. 

    I faced problems related to data analysis and communication, and I resolved them by improving my skills and seeking feedback.

    • I struggled with analyzing complex data sets, but I took courses and practiced using software like Excel and Tableau to improve my skills.

    • I had difficulty communicating technical information to non-technical stakeholders, so I sought feedback and adjusted my approach to be more clear and concise.

    • ...

  • Answered by AI
Round 3 - Technical 

(1 Question)

  • Q1. Explain service oriented and product oriented solutions for cyberscurity.
  • Ans. 

    Service-oriented solutions focus on continuous monitoring and response, while product-oriented solutions rely on implementing security measures through hardware and software.

    • Service-oriented solutions involve ongoing monitoring of systems and networks to detect and respond to threats in real-time.

    • Examples of service-oriented solutions include managed security services, threat intelligence platforms, and security inform...

  • Answered by AI
Round 4 - One-on-one 

(1 Question)

  • Q1. What is key man problem in cybersecurity.
  • Ans. 

    Key man problem in cybersecurity refers to the risk of a single person having too much access or knowledge, making them a single point of failure.

    • Key man problem arises when a single person has access to critical systems or information

    • If that person leaves or is unavailable, it can cause significant disruption or security breaches

    • This can be mitigated by implementing proper access controls and knowledge sharing among t...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Try to be Unique. My manager once told me that one small word I wrote in resume made him shortlist me. The word is 'soccer'. He said everyone used the word football, you are the only person who used the word 'Soccer'. So he found my attention to detail to shortlist me.

I have been very happy working for him. The culture at company is great.

Management Analyst Interview Questions asked at other Companies

Q1. What is key man problem in cybersecurity.
View answer (1)

Optiv Security India Private Limited interview questions for popular designations

 Analyst

 (2)

 Senior Threat Analyst

 (1)

 Talent Acquisition Specialist

 (1)

 Management Analyst

 (1)

 Soc Analyst 1

 (1)

 Associate Engineer

 (1)

 Associate Consultant

 (1)

 Consultant

 (1)

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Jan 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Assignment 

Application assessment , report development

Round 3 - Technical 

(2 Questions)

  • Q1. OWASP top 10, recommendation and discussion.
  • Q2. Previous role and recommendations on your project
  • Ans. 

    In my previous role as a Consultant, I successfully completed multiple projects and received positive recommendations.

    • Managed a project for a multinational company, delivering a cost-saving solution that increased efficiency by 20%.

    • Received recommendations from clients for my strong analytical skills and ability to provide innovative solutions.

    • Collaborated with cross-functional teams to implement a new software system,...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident and explain what actually is your profile

Consultant Interview Questions asked at other Companies

Q1. How would you pass an entry for travel expenses incurred and paid by employee and was reimbursed? How would the end to end flow happens
View answer (8)

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.

Round 1 - Technical 

(5 Questions)

  • Q1. How would you ensure a server is secure?
  • Ans. 

    To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.

    • Implement firewalls to control incoming and outgoing traffic

    • Use encryption to protect data in transit and at rest

    • Regularly update software and patches to fix vulnerabilities

    • Implement access control measures to restrict unauthorized access

    • Monitor server activity for an

  • Answered by AI
  • Q2. What steps can you take to prevent identity theft?
  • Ans. 

    To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.

    • Monitor financial accounts regularly for any suspicious activity

    • Use strong, unique passwords for online accounts

    • Be cautious when sharing personal information online or over the phone

    • Shred sensitive documents before disposing of

  • Answered by AI
  • Q3. Explain Social phishing and the steps you can take to prevent it?
  • Ans. 

    Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.

    • Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.

    • Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...

  • Answered by AI
  • Q4. What are spyware attacks and how to prevent them?
  • Ans. 

    Spyware attacks are malicious software that secretly gathers information about a person or organization.

    • Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.

    • To prevent spyware attacks, users should regularly update their operating systems and security software.

    • Avoid clicking on suspicious links or downloading attachments from unknown sources.

    • Use a repu...

  • Answered by AI
  • Q5. What are some of the most common types of cyberattacks
  • Ans. 

    Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.

    • Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information

    • Malware: malicious software designed to damage or gain unauthorized access to a computer system

    • Ransomware: encrypts files on a victim's system and demands payment for decryption

    • DDoS attacks: overwhelm a system with traff...

  • Answered by AI
Round 2 - HR 

(5 Questions)

  • Q1. Tell me about your self/ Introduce your self?
  • Q2. Why this role attracts you?
  • Q3. What do you know about the our company?
  • Q4. Can you work under pressure ?
  • Q5. Are you willing to relocate

Skills evaluated in this interview

Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Selected Selected

I applied via Campus Placement and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Coding Test 

Coding Questions on one of the preffered programming language. Most importantly Data Structures and algorithms.

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare Well
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What are your salary expectations?
  • Q2. Tell me about yourself.
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Aptitude Test 

Quantitive question

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare good for the aptitude test

I applied via Naukri.com and was interviewed before Mar 2021. There was 1 interview round.

Round 1 - HR 

(6 Questions)

  • Q1. What are your salary expectations?
  • Q2. What is your family background?
  • Q3. Share details of your previous job.
  • Q4. Where do you see yourself in 5 years?
  • Q5. Tell me about yourself.
  • Q6. Varshinihk Kavitha Venu

Interview Preparation Tips

Interview preparation tips for other job seekers - Beauty parlour
Work from home
At job

Optiv Security India Private Limited Interview FAQs

How many rounds are there in Optiv Security India Private Limited interview for experienced candidates?
Optiv Security India Private Limited interview process for experienced candidates usually has 3-4 rounds. The most common rounds in the Optiv Security India Private Limited interview process for experienced candidates are Resume Shortlist, Technical and One-on-one Round.
How to prepare for Optiv Security India Private Limited interview for experienced candidates?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Optiv Security India Private Limited. The most common topics and skills that interviewers at Optiv Security India Private Limited expect are Active Directory, Information Security, Linux, Python and SIEM.
What are the top questions asked in Optiv Security India Private Limited interview for experienced candidates?

Some of the top questions asked at the Optiv Security India Private Limited interview for experienced candidates -

  1. What is key man problem in cybersecuri...read more
  2. Explain service oriented and product oriented solutions for cyberscuri...read more
  3. What is cyber attack kill chai...read more

Tell us how to improve this page.

Optiv Security India Private Limited Interview Process for Experienced

based on 5 interviews

Interview experience

4.2
  
Good
View more

Interview Questions from Similar Companies

Softenger Interview Questions
4.1
 • 54 Interviews
TestingXperts Interview Questions
3.9
 • 41 Interviews
Credera Interview Questions
3.8
 • 40 Interviews
Stefanini Interview Questions
3.0
 • 36 Interviews
Aabasoft Interview Questions
4.0
 • 35 Interviews
Foray Software Interview Questions
3.5
 • 34 Interviews
View all

Optiv Security India Private Limited Reviews and Ratings

based on 68 reviews

4.2/5

Rating in categories

4.2

Skill development

4.2

Work-life balance

4.1

Salary

4.2

Job security

4.4

Company culture

3.7

Promotions

4.0

Work satisfaction

Explore 68 Reviews and Ratings
Principal Engineer
29 salaries
unlock blur

₹22.5 L/yr - ₹41 L/yr

Senior Engineer
25 salaries
unlock blur

₹15 L/yr - ₹26 L/yr

Threat Analyst
23 salaries
unlock blur

₹6 L/yr - ₹16.5 L/yr

Security Analyst
22 salaries
unlock blur

₹5.4 L/yr - ₹20 L/yr

Analyst 1
21 salaries
unlock blur

₹6 L/yr - ₹10 L/yr

Explore more salaries
Compare Optiv Security India Private Limited with

Softenger

4.1
Compare

Foray Software

3.5
Compare

Nelito System

3.5
Compare

Black Knight

3.6
Compare
Did you find this page helpful?
Yes No
write
Share an Interview