Premium Employer

i

This company page is being actively managed by Persistent Systems Team. If you also belong to the team, you can get access from here

Persistent Systems Verified Tick

Compare button icon Compare button icon Compare
3.5

based on 3.8k Reviews

Filter interviews by

Persistent Systems Senior Security Analyst Interview Questions and Answers

Updated 22 Jul 2024

Persistent Systems Senior Security Analyst Interview Experiences

1 interview found

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. SOC roles and responsibilities

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed in Dec 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

Questions regarding the fundamentals of cybersecurity, including arithmetic operations and logical reasoning.

Round 2 - Technical 

(3 Questions)

  • Q1. What are the port numbers used for HTTP, SMTP, and TCP?
  • Q2. What is your approach to Vulnerability Assessment and Penetration Testing (VAPT) for web-based applications?
  • Q3. What is phishing
Round 3 - HR 

(2 Questions)

  • Q1. Why do you want to join this company
  • Q2. How do you believe you are a suitable candidate for this role?
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Sep 2024. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. ISE and Aci related questions
  • Q2. Firewall and network related questions
Round 2 - Technical 

(2 Questions)

  • Q1. ACI related questions
  • Q2. Firewall & Network related questions
Round 3 - HR 

(2 Questions)

  • Q1. Company policy discussion
  • Q2. Salary discussion
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

Easy 20 questions we need to complete in 30 mins.

Round 2 - One-on-one 

(1 Question)

  • Q1. Basic computer science questions like networking, coding language, dsa
Round 3 - HR 

(1 Question)

  • Q1. Normal hr questions rate your self tell me about yourself weeknesses

Interview Preparation Tips

Interview preparation tips for other job seekers - Don't search job after bsc computer science
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. How ospf is works ?
  • Ans. 

    OSPF (Open Shortest Path First) is a routing protocol that uses link-state routing algorithm to determine the best path for data packets.

    • OSPF routers exchange link-state advertisements (LSAs) to build a topology map of the network.

    • Each router calculates the shortest path to each network based on the information in the LSAs.

    • OSPF uses cost as a metric to determine the best path, with lower cost paths being preferred.

    • OSPF...

  • Answered by AI
  • Q2. What is bgp parameter ?
  • Ans. 

    BGP parameter refers to the various attributes and settings used in the Border Gateway Protocol for routing decisions.

    • BGP parameters include attributes like AS path, next hop, local preference, and MED.

    • These parameters help BGP routers make decisions on the best path to reach a destination.

    • Examples of BGP parameters are weight, local preference, and community values.

  • Answered by AI
Round 2 - Technical 

(3 Questions)

  • Q1. What network works and implements parts
  • Ans. 

    Network works and implements parts refer to the components and protocols involved in the functioning of a network.

    • Network devices such as routers, switches, firewalls, and access points work together to facilitate communication.

    • Protocols like TCP/IP, DNS, DHCP, and SSL/TLS are implemented to ensure data transmission and security.

    • Network segmentation, VLANs, and VPNs are used to separate and secure different parts of a ...

  • Answered by AI
  • Q2. Wireless wlc vlan configuration
  • Q3. Switch configuration

Interview Preparation Tips

Interview preparation tips for other job seekers - Good experience with company HR but management was not helpful in office environment

Skills evaluated in this interview

Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Say about current role and responsibilities
  • Ans. 

    I am currently working as a Security Analyst, responsible for monitoring and analyzing security threats, implementing security measures, and conducting security assessments.

    • Monitoring and analyzing security threats to identify potential risks

    • Implementing security measures to protect systems and data

    • Conducting security assessments to identify vulnerabilities and recommend solutions

    • Collaborating with IT teams to ensure s...

  • Answered by AI
  • Q2. What is cyber security
  • Ans. 

    Cyber security is the practice of protecting systems, networks, and data from digital attacks.

    • Involves protecting computers, servers, mobile devices, networks, and data from unauthorized access or damage

    • Includes implementing security measures such as firewalls, antivirus software, encryption, and multi-factor authentication

    • Cyber security professionals work to prevent, detect, and respond to cyber threats

    • Examples of cyb...

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. SSL Related ! Qualys VMDR Module scans related ! Application vuln !
  • Q2. Top 10 owasp How to prioritise and remediate vulnerabilities
  • Ans. 

    Prioritizing and remediating vulnerabilities using OWASP Top 10

    • Start by identifying the vulnerabilities that pose the highest risk to the organization

    • Use the OWASP Top 10 as a guide to prioritize vulnerabilities

    • Consider the likelihood and potential impact of each vulnerability

    • Remediate vulnerabilities based on their priority level

    • Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities

    • Example...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Make sure you have projects done with examples to present in interview
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.

    • Experienced in conducting security assessments and identifying vulnerabilities

    • Skilled in implementing security measures to protect against cyber threats

    • Proficient in analyzing security incidents and responding effectively

    • Certified in relevant security certifications such as CISSP or CISM

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different types of malware
  • Ans. 

    Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

    • Viruses: self-replicating programs that infect other files on a computer

    • Worms: standalone malware that spreads across networks

    • Trojans: disguised as legitimate software to trick users into installing them

    • Ransomware: encrypts files and demands payment for decryption

    • Spyware: secretly gathers information about...

  • Answered by AI
  • Q2. What would you first do if a machine is infected
  • Ans. 

    The first step would be to isolate the infected machine from the network to prevent further spread of the infection.

    • Isolate the infected machine from the network to prevent further spread of the infection

    • Identify the type of malware or virus that has infected the machine

    • Run a full system scan using antivirus software to detect and remove the malware

    • Update the operating system and all software to patch any vulnerabiliti...

  • Answered by AI

I applied via Approached by Company and was interviewed before Aug 2021. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. What is OWASP top 10?
  • Ans. 

    OWASP top 10 is a list of the most critical web application security risks.

    • It is published by the Open Web Application Security Project (OWASP)

    • It includes risks such as injection, broken authentication and session management, cross-site scripting (XSS), and more

    • It is updated every few years to reflect new threats and vulnerabilities

    • It is used by security professionals to prioritize their efforts and focus on the most i

  • Answered by AI
  • Q2. What is the difference between vulnerability assessment and penetration testing?
  • Ans. 

    Vulnerability assessment identifies vulnerabilities, while penetration testing exploits them to determine the impact.

    • Vulnerability assessment is a non-intrusive process that identifies vulnerabilities in a system or network.

    • Penetration testing is an intrusive process that exploits vulnerabilities to determine the impact on the system or network.

    • Vulnerability assessment is usually automated and performed regularly to id...

  • Answered by AI
  • Q3. What are some of the vulnerabilities during web application penetration testing?
  • Ans. 

    Vulnerabilities in web application penetration testing

    • Injection flaws (SQL, LDAP, etc.)

    • Cross-site scripting (XSS)

    • Broken authentication and session management

    • Insecure direct object references

    • Security misconfiguration

    • Sensitive data exposure

    • Insufficient logging and monitoring

  • Answered by AI
Round 3 - HR 

(2 Questions)

  • Q1. Why are u interested in Cybersecurity?
  • Ans. 

    I am interested in Cybersecurity because it allows me to protect and defend against cyber threats, ensuring the safety and privacy of individuals and organizations.

    • Passion for technology and problem-solving

    • Desire to make a positive impact by safeguarding sensitive information

    • Fascination with the constantly evolving nature of cyber threats

    • Opportunity to work on challenging and complex projects

    • Ability to contribute to th...

  • Answered by AI
  • Q2. What do you expect from the company during your full time employment?
  • Ans. 

    I expect the company to provide a supportive and challenging work environment, opportunities for growth and learning, fair compensation, and a strong commitment to security.

    • Supportive and challenging work environment

    • Opportunities for growth and learning

    • Fair compensation

    • Strong commitment to security

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Tata Elxsi Security Engineer interview:
  • NMAP
  • OWASP
  • CIA traits
  • Cybersecurity
  • VAPT
Interview preparation tips for other job seekers - Be confident, it's fine to not know a answer, avoid bluffing, don't hesitate to ask hints/clarifications for a question. The interviewer always wants the interviewee to succeed.
Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. What are the information in TCP IP Header?
  • Ans. 

    TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.

    • Source IP address

    • Destination IP address

    • Source port number

    • Destination port number

    • Sequence number

    • Acknowledgment number

    • Header length

    • Checksum

  • Answered by AI
  • Q2. What is App ID in Palo Alto Firewalls?
  • Ans. 

    App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.

    • App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.

    • It allows administrators to create policies based on specific applications rather than just ports or protocols.

    • App ID helps in enhancing security by allowing granular ...

  • Answered by AI
  • Q3. What is the SP3 Architecture of Palo Alto Firewalls?
  • Ans. 

    SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.

    • SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)

    • Security Processing Plane (SP) handles security functions like threat prevention and decryption

    • Control Plane (C) manages routing and firewall policies

    • Data Plane (D) processes and forwards traffic based on firewall pol...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Very Technical questions, starting from packet parsing and analysis.

Skills evaluated in this interview

Persistent Systems Interview FAQs

How many rounds are there in Persistent Systems Senior Security Analyst interview?
Persistent Systems interview process usually has 1 rounds. The most common rounds in the Persistent Systems interview process are Technical.

Tell us how to improve this page.

Persistent Systems Senior Security Analyst Interview Process

based on 1 interview

Interview experience

3
  
Average
View more
Join Persistent Systems See Beyond, Rise Above

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Infosys Interview Questions
3.7
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
LTIMindtree Interview Questions
3.8
 • 3k Interviews
DXC Technology Interview Questions
3.7
 • 805 Interviews
Mphasis Interview Questions
3.4
 • 797 Interviews
Nagarro Interview Questions
4.0
 • 776 Interviews
View all
Persistent Systems Senior Security Analyst Salary
based on 7 salaries
₹5.4 L/yr - ₹11 L/yr
11% less than the average Senior Security Analyst Salary in India
View more details

Persistent Systems Senior Security Analyst Reviews and Ratings

based on 2 reviews

1.5/5

Rating in categories

1.5

Skill development

1.0

Work-life balance

1.0

Salary

1.0

Job security

1.0

Company culture

1.0

Promotions

1.0

Work satisfaction

Explore 2 Reviews and Ratings
Software Engineer
4.4k salaries
unlock blur

₹2.5 L/yr - ₹9.5 L/yr

Senior Software Engineer
3.8k salaries
unlock blur

₹5 L/yr - ₹13 L/yr

Lead Engineer
3k salaries
unlock blur

₹9.8 L/yr - ₹30 L/yr

Lead Software Engineer
2.9k salaries
unlock blur

₹7.2 L/yr - ₹18.4 L/yr

Project Lead
1.8k salaries
unlock blur

₹13.2 L/yr - ₹38.8 L/yr

Explore more salaries
Compare Persistent Systems with

Cognizant

3.8
Compare

TCS

3.7
Compare

IBM

4.0
Compare

Wipro

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview