Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Optum Global Solutions Team. If you also belong to the team, you can get access from here

Optum Global Solutions Verified Tick

Compare button icon Compare button icon Compare

Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards

zig zag pattern zig zag pattern

Filter interviews by

Optum Global Solutions Cyber Security Analyst Interview Questions and Answers

Updated 23 Jun 2022

Optum Global Solutions Cyber Security Analyst Interview Experiences

1 interview found

I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Lots of questions asked, difficulty level easy to difficult. You can find easy questions Just typing cyber security analyst interview questions on Google. About difficult if you have good understanding the...
Round 2 - Technical 

(1 Question)

  • Q1. Managerial technical round, some technical questions, mostly generally discussion, senior manager is assessing you , so keep yourself calm and decent.

Interview Preparation Tips

Interview preparation tips for other job seekers - Give your ans very precisely, referring to some case study or real time vulnerability.

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Not Selected

I applied via Internshala

Round 1 - Aptitude Test 

Logical thinking, verbal skills

Round 2 - Assignment 

Have to pentest a web app

Round 3 - Coding Test 

Basic arrays, strings and dsa

Interview Preparation Tips

Interview preparation tips for other job seekers - focus on technical skills
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Cyber kill chain
  • Q2. Mitre Attack technique
  • Ans. 

    Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.

    • Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.

    • It helps organizations understand and defend against common attack patterns.

    • Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.

  • Answered by AI
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

It has 40 Questions and time duration of more than 45 minutes

Round 2 - Coding Test 

It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.

Round 3 - HR 

(2 Questions)

  • Q1. Difference between GET and POST method.
  • Ans. 

    GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.

    • GET requests data from a specified resource

    • POST submits data to be processed to a specified resource

    • GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history

    • GET requests have length restrictions, while POST requests do

  • Answered by AI
  • Q2. About Cyber Security and Hashing Methods

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well for your Job Role

Skills evaluated in this interview

I applied via AmbitionBox and was interviewed before Aug 2021. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. Share experience Arcsight & Splunk tool
  • Ans. 

    Arcsight & Splunk are SIEM tools used for log management and security analytics.

    • Arcsight is a legacy SIEM tool used for log management and security analytics.

    • Splunk is a modern SIEM tool used for log management, security analytics, and data visualization.

    • Both tools are used to collect, analyze, and correlate log data from various sources to detect security threats and incidents.

    • Arcsight has a complex architecture and r...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Explain its your own experience based on knowledge.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
-

I applied via Naukri.com and was interviewed in Sep 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Interview was all about technical questions about network security , and skill set you have . Detail about packet flow and packet capture tshoot methods of NGFW.
  • Q2. Packet capture and Tshoot steps

Interview Preparation Tips

Interview preparation tips for other job seekers - Stick to your Skills and BASIC conceptual Knowledge.

Cyber Security Analyst Interview Questions & Answers

Accenture user image Anteshvari Gangadhar Ghumalwad

posted on 16 Sep 2022

I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.

Round 1 - Technical 

(4 Questions)

  • Q1. Cyber security, VAPT
  • Q2. DAST, SAST & top 10 OWASP list
  • Q3. Cyber attacks in network
  • Ans. 

    Cyber attacks in network are a major threat to organizations and can cause significant damage.

    • Cyber attacks can come in various forms such as malware, phishing, ransomware, and DDoS attacks.

    • Network security measures such as firewalls, intrusion detection systems, and antivirus software can help prevent cyber attacks.

    • Regular security audits and employee training can also help mitigate the risk of cyber attacks.

    • In the ev...

  • Answered by AI
  • Q4. Applications layers in cyber security
  • Ans. 

    Application layers in cyber security refer to the different levels of software and protocols that make up an application.

    • Application layer is the topmost layer in the OSI model

    • It includes protocols like HTTP, SMTP, FTP, etc.

    • Security measures at this layer include firewalls, intrusion detection systems, and web application firewalls

    • Vulnerabilities at this layer include SQL injection, cross-site scripting, and session hi

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Accenture Cyber Security Analyst interview:
  • Cyber security
  • VAPT
  • DAST, SAT
Interview preparation tips for other job seekers - Most important everyone in cyber security knowledge

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Cloud computing
  • Q2. Machine learning

I applied via Company Website and was interviewed in Dec 2021. There were 8 interview rounds.

Round 1 - Aptitude Test 

I'm attend the interview tomorrow

Round 2 - Technical 

(1 Question)

  • Q1. Im attend the interview Monday
Round 3 - HR 

(3 Questions)

  • Q1. Tell me about yourself.
  • Q2. Weekneess and strength
  • Q3. Explain Ur final year project
Round 4 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 5 - Technical 

(2 Questions)

  • Q1. Based on cyber security
  • Q2. Networking questions
Round 6 - One-on-one 

(1 Question)

  • Q1. Networking questions
Round 7 - Assignment 
Round 8 - Assignment 

Interview Preparation Tips

Interview preparation tips for other job seekers - I'm interested this job I'm fresher

I applied via Recruitment Consultant and was interviewed in Sep 2021. There were 4 interview rounds.

Interview Questionnaire 

2 Questions

  • Q1. Some technical question basic and overall knowledge
  • Q2. I have givne basic answer which I have done during preparation

Interview Preparation Tips

Interview preparation tips for other job seekers - Be what you know and tell Frankely

Optum Global Solutions Interview FAQs

How many rounds are there in Optum Global Solutions Cyber Security Analyst interview?
Optum Global Solutions interview process usually has 2 rounds. The most common rounds in the Optum Global Solutions interview process are Technical.

Tell us how to improve this page.

Optum Global Solutions Cyber Security Analyst Salary
based on 20 salaries
₹8.9 L/yr - ₹20 L/yr
85% more than the average Cyber Security Analyst Salary in India
View more details

Optum Global Solutions Cyber Security Analyst Reviews and Ratings

based on 6 reviews

4.6/5

Rating in categories

4.7

Skill development

4.5

Work-life balance

4.5

Salary

4.8

Job security

4.7

Company culture

4.4

Promotions

4.5

Work satisfaction

Explore 6 Reviews and Ratings
Claims Associate
4.3k salaries
unlock blur

₹1.6 L/yr - ₹5.6 L/yr

Senior Software Engineer
2.8k salaries
unlock blur

₹9.4 L/yr - ₹30 L/yr

Software Engineer
2.6k salaries
unlock blur

₹5.2 L/yr - ₹22 L/yr

Senior Claims Associate
1.2k salaries
unlock blur

₹2.1 L/yr - ₹5.8 L/yr

Medical Coder
1.1k salaries
unlock blur

₹1.5 L/yr - ₹8 L/yr

Explore more salaries
Compare Optum Global Solutions with

Cognizant

3.8
Compare

Accenture

3.8
Compare

IBM

4.0
Compare

TCS

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview