Upload Button Icon Add office photos

Filter interviews by

Positka FSI Senior Security Analyst Interview Questions and Answers

Updated 12 Apr 2024

Positka FSI Senior Security Analyst Interview Experiences

1 interview found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Apr 2023. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. OSI layer Cia triad
  • Q2. Networking concept
Round 2 - Case Study 

Current affairs , problem solving

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Job Portal and was interviewed in May 2024. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Tell me about Security incident response framework that you have worked on ?
  • Ans. 

    Implemented a comprehensive security incident response framework to effectively detect, respond to, and recover from security incidents.

    • Developed incident response policies and procedures to outline roles, responsibilities, and escalation paths.

    • Established communication protocols for notifying stakeholders and coordinating response efforts.

    • Conducted regular tabletop exercises and simulations to test the effectiveness o...

  • Answered by AI
  • Q2. Critical incident that you have worked on?
Round 2 - Technical 

(2 Questions)

  • Q1. How do you deal with phishing incidents
  • Ans. 

    I handle phishing incidents by promptly identifying and blocking malicious emails, educating users on how to recognize phishing attempts, and implementing security measures.

    • Promptly identify and block malicious emails

    • Educate users on how to recognize phishing attempts

    • Implement security measures such as email filtering and multi-factor authentication

  • Answered by AI
  • Q2. What is log4j vulnerability and how do you feel with it?
  • Ans. 

    Log4j vulnerability is a critical security flaw in the Apache Log4j logging library that allows remote code execution.

    • Log4j vulnerability (CVE-2021-44228) allows attackers to execute arbitrary code remotely.

    • The vulnerability affects versions 2.0 to 2.14.1 of Apache Log4j.

    • Exploiting the vulnerability can lead to serious security breaches and data exfiltration.

    • Organizations need to patch affected systems immediately and

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Tech Mahindra Senior Security Analyst interview:
  • Incident response
  • Siem tool
  • Edr
  • Xdr
  • Phishing analysis
  • Malware incidents
Interview preparation tips for other job seekers - Prepare for the things that you have mentioned and do not mention anything that you are not aware

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Job Portal and was interviewed in May 2024. There was 1 interview round.

Round 1 - One-on-one 

(2 Questions)

  • Q1. Give details of project
  • Q2. What roles I had
  • Ans. 

    I have held roles such as Security Analyst, Incident Responder, and Security Engineer.

    • Security Analyst: Conducted security assessments and implemented security measures.

    • Incident Responder: Responded to security incidents and conducted forensic investigations.

    • Security Engineer: Designed and implemented security solutions to protect systems and data.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare and give well. Easy to pass

Senior Security Analyst Interview Questions & Answers

TCS user image Sethumadhavan Nampoothiri VV

posted on 16 Jul 2024

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Can be hardware-based or software-based

    • Filters traffic based on IP addresses, ports, protocols, and other criteria

    • Helps prevent unauthorized access and cyber attacks

    • Examples include Cisco ASA, Pal

  • Answered by AI
  • Q2. What are the trending security technologies
  • Ans. 

    Some trending security technologies include zero trust security, cloud security, and AI-driven security solutions.

    • Zero trust security: Focuses on verifying identity and enforcing least privilege access controls.

    • Cloud security: Addresses security concerns related to cloud computing and storage.

    • AI-driven security solutions: Utilize artificial intelligence and machine learning to detect and respond to security threats.

    • Blo...

  • Answered by AI
Round 2 - HR 

(1 Question)

  • Q1. Salary discussion

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. About 3 way handshake
  • Q2. About difference between encoding and hashing
Interview experience
4
Good
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
No response

I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. All about siem and implementation

I applied via Recruitment Consultant and was interviewed in Sep 2021. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Normally they come up in interview with 4-5 guys, they were asking to start scenario based one by one person, question starting from infrastructure of organization, architecture of RSA Netwitness, descr...

Interview Preparation Tips

Interview preparation tips for other job seekers - Be bold & calm, show your interest, be confidence, stick with your answers

I applied via Referral and was interviewed in Jun 2021. There were 5 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Vuln Mgt,Daily task,IRP

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident and speak only what you know.
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. About the vormetric encryption tool
Round 3 - One-on-one 

(1 Question)

  • Q1. Customer round once technical round cleared
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Oct 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. What is EDR ?
  • Ans. 

    EDR stands for Endpoint Detection and Response, a security solution that monitors and responds to endpoint threats.

    • EDR solutions provide real-time visibility into endpoint activity and behavior.

    • They use advanced analytics and machine learning to detect and respond to threats.

    • EDR solutions can also provide forensic analysis to investigate incidents and identify root causes.

    • Examples of EDR solutions include Carbon Black,...

  • Answered by AI
  • Q2. How EDR works and
  • Ans. 

    EDR stands for Endpoint Detection and Response. It is a security solution that monitors and responds to endpoint threats.

    • EDR solutions use agents installed on endpoints to collect data and send it to a central server for analysis.

    • They use behavioral analysis and machine learning to detect and respond to threats in real-time.

    • EDR solutions can also provide forensic data to investigate incidents and improve security postu...

  • Answered by AI
  • Q3. Process related questions

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare your resume well and try to get the JD about the profile from HR and study the topics accordingly

Positka FSI Interview FAQs

How many rounds are there in Positka FSI Senior Security Analyst interview?
Positka FSI interview process usually has 2 rounds. The most common rounds in the Positka FSI interview process are Technical and Case Study.
What are the top questions asked in Positka FSI Senior Security Analyst interview?

Some of the top questions asked at the Positka FSI Senior Security Analyst interview -

  1. OSI layer Cia tr...read more
  2. Networking conc...read more

Tell us how to improve this page.

Positka FSI Senior Security Analyst Interview Process

based on 1 interview

Interview experience

5
  
Excellent
View more
Technology Analyst
4 salaries
unlock blur

₹3 L/yr - ₹8.4 L/yr

Analyst II
4 salaries
unlock blur

₹5 L/yr - ₹5.5 L/yr

Analyst
3 salaries
unlock blur

₹5 L/yr - ₹8 L/yr

Technical Trainee
3 salaries
unlock blur

₹1.8 L/yr - ₹3.3 L/yr

Explore more salaries
Compare Positka FSI with

TCS

3.7
Compare

Infosys

3.6
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview