Upload Button Icon Add office photos

PwC

Compare button icon Compare button icon Compare

Filter interviews by

Clear (1)

PwC Cyber Security Analyst Interview Questions, Process, and Tips

Updated 11 Jun 2024

Top PwC Cyber Security Analyst Interview Questions and Answers

  • Q1. 3- If you have received 2 mails from PwC with same name how will you identify that which one is fake and which one is genuine?
  • Q2. 5- How will you make your system secure from a user point of view?
  • Q3. 1- What do you know about cyber security?
View all 12 questions

PwC Cyber Security Analyst Interview Experiences

5 interviews found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Campus Placement and was interviewed in Dec 2023. There were 2 interview rounds.

Round 1 - Coding Test 

2 hours, basic dsa questions, cyber security related mcqs

Round 2 - Technical 

(4 Questions)

  • Q1. What is normalization in dbms
  • Ans. 

    Normalization in DBMS is the process of organizing data in a database to reduce redundancy and improve data integrity.

    • Normalization involves breaking down a database into smaller, more manageable tables and defining relationships between them.

    • It helps in reducing data redundancy by storing data in a structured and organized manner.

    • Normalization also helps in improving data integrity by ensuring that data is consistent ...

  • Answered by AI
  • Q2. Difference between truncate and delete
  • Ans. 

    Truncate is a DDL command that removes all records from a table, while delete is a DML command that removes specific records.

    • Truncate is faster than delete as it does not log individual row deletions.

    • Truncate resets identity columns, while delete does not.

    • Truncate cannot be rolled back, while delete can be rolled back using a transaction.

    • Truncate does not fire triggers, while delete does.

  • Answered by AI
  • Q3. How will your protect your digital data
  • Ans. 

    I will protect my digital data by implementing strong encryption, regular backups, and strict access controls.

    • Implement strong encryption algorithms to secure data in transit and at rest

    • Regularly backup data to prevent loss in case of cyber attacks or hardware failures

    • Enforce strict access controls by using multi-factor authentication and least privilege principle

  • Answered by AI
  • Q4. Some types of cyber attacks
  • Ans. 

    Some types of cyber attacks include phishing, malware, ransomware, DDoS attacks, and social engineering.

    • Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information

    • Malware: malicious software designed to damage or gain unauthorized access to a computer system

    • Ransomware: encrypts files on a victim's system and demands payment for decryption

    • DDoS attacks: overwhelming a system with a f...

  • Answered by AI

Skills evaluated in this interview

I applied via Referral and was interviewed in Oct 2022. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. What are your area of cybersecurity you are experienced in ?
  • Q2. Thats depends on you

Interview Preparation Tips

Interview preparation tips for other job seekers - Join but not for long time, so make sure you keep everything known before joining

Cyber Security Analyst Interview Questions Asked at Other Companies

asked in PwC
Q1. 3- If you have received 2 mails from PwC with same name how will ... read more
Q2. When conducting dynamic analysis on a suspicious executable, desc ... read more
Q3. You come across an unknown piece of malware. What methods and too ... read more
asked in PwC
Q4. 5- How will you make your system secure from a user point of view ... read more
asked in PwC
Q5. 1- What do you know about cyber security?
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before Aug 2022. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - Aptitude Test 

Easy aptitude test, just check the accuracy.

Round 3 - Coding Test 

Bit tough one, Question is from linked list.

Round 4 - HR 

(1 Question)

  • Q1. Genral questions regarding your carrier based on your resume

I applied via LinkedIn and was interviewed in Feb 2021. There were 3 interview rounds.

Interview Questionnaire 

5 Questions

  • Q1. 1- What do you know about cyber security?
  • Ans. 

    Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.

    • Cyber security involves a range of technologies, processes, and practices designed to safeguard digital assets.

    • It includes measures such as firewalls, antivirus software, encryption, and intrusion detection systems.

    • Cyber security al...

  • Answered by AI
  • Q2. 2- what is phishing attack?
  • Ans. 

    Phishing attack is a type of social engineering attack where attackers trick victims into revealing sensitive information.

    • Phishing attacks can be carried out through emails, phone calls, or text messages.

    • Attackers often use fake websites or login pages to steal login credentials.

    • Phishing attacks can also be used to distribute malware or ransomware.

    • Examples of phishing attacks include spear phishing, whaling, and vishin...

  • Answered by AI
  • Q3. 3- If you have received 2 mails from PwC with same name how will you identify that which one is fake and which one is genuine?
  • Ans. 

    To identify the genuine mail, check the sender's email address and verify the content and attachments.

    • Check the sender's email address for any discrepancies or variations.

    • Verify the content of the email for any grammatical errors or suspicious requests.

    • Check the attachments for any malware or suspicious file types.

    • Contact the sender directly to confirm the authenticity of the email.

    • Use email filtering and anti-phishing...

  • Answered by AI
  • Q4. 4- What exites you about Cyber security?
  • Ans. 

    The constantly evolving nature of cyber threats and the challenge of staying ahead of them excites me about cyber security.

    • The thrill of solving complex puzzles and identifying vulnerabilities

    • The opportunity to work with cutting-edge technology and tools

    • The sense of purpose in protecting individuals and organizations from cyber attacks

    • The potential for continuous learning and professional growth

    • Examples: discovering a ...

  • Answered by AI
  • Q5. 5- How will you make your system secure from a user point of view?
  • Ans. 

    To make the system secure from a user point of view, I would implement strong authentication measures and educate users on safe browsing habits.

    • Implement multi-factor authentication

    • Enforce strong password policies

    • Regularly update and patch software

    • Provide security awareness training to users

    • Restrict user access to sensitive data

    • Monitor user activity for suspicious behavior

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - The questions they used to ask they will try to trick you with your answers so advice will be that, be very precise and clear with your answers don't say anything about which you are not having any knowledge. Always try to show the real one of you, don't try to be oversmart. Only the basic understanding of the things can easily help you to clear the interview. All the best!!!

Skills evaluated in this interview

PwC interview questions for designations

 Senior Cyber Security Analyst

 (1)

 Cyber Security Consultant

 (1)

 Cyber Security Associate

 (4)

 Senior Security Analyst

 (2)

 Information Security Analyst

 (1)

 Security Consultant

 (1)

 Senior Security Engineer

 (1)

 SAP Security Consultant

 (1)

Interview Questionnaire 

5 Questions

  • Q1. Cyber attack
  • Q2. What is fileless malware
  • Ans. 

    Fileless malware is a type of malicious software that operates in memory without leaving any trace on the hard drive.

    • Fileless malware is also known as memory-based malware or non-malware.

    • It uses legitimate system tools and processes to carry out its malicious activities.

    • It is difficult to detect and remove as it does not leave any files on the system.

    • Examples of fileless malware include PowerShell-based attacks and mac...

  • Answered by AI
  • Q3. Ransomware and their mitigation
  • Ans. 

    Ransomware is a type of malware that encrypts files and demands payment for decryption. Mitigation involves backups, security software, and user education.

    • Regularly backup important data to prevent loss

    • Use anti-malware software to detect and prevent ransomware

    • Educate users on how to identify and avoid phishing emails and suspicious downloads

    • Implement network segmentation to limit the spread of ransomware

    • Have an inciden...

  • Answered by AI
  • Q4. Alerts in SIEM tool
  • Ans. 

    Alerts in SIEM tool

    • SIEM tools generate alerts based on predefined rules and thresholds

    • Alerts can be categorized based on severity levels

    • Alerts can be investigated and triaged to determine if they are true positives or false positives

    • SIEM tools can also automate response actions based on certain alerts

    • Examples of alerts include failed login attempts, malware detections, and suspicious network traffic

  • Answered by AI
  • Q5. DOS and DDOS attack
  • Ans. 

    DOS and DDOS attacks are malicious attempts to disrupt the normal functioning of a website or network.

    • DOS (Denial of Service) attack is a type of attack where a single system floods the target system with traffic, making it unavailable to legitimate users.

    • DDOS (Distributed Denial of Service) attack is a more sophisticated version of DOS attack, where multiple systems are used to flood the target system with traffic.

    • DDO...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - prepare your homework and be confident

Get interview-ready with Top PwC Interview Questions

Interview questions from similar companies

I applied via Naukri.com and was interviewed before Nov 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Salesforce technic questions

Interview Preparation Tips

Interview preparation tips for other job seekers - Go through all collections and lightning concepts

I applied via Recruitment Consultant and was interviewed before Dec 2020. There were 5 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Knowledge of cutting edge technologies like internet of things, blockchain, etc

Interview Preparation Tips

Interview preparation tips for other job seekers - You must know about international topics

Senior Analyst Interview Questions & Answers

Deloitte user image blessedpineberry

posted on 10 Nov 2021

I applied via Referral and was interviewed before Nov 2020. There were 5 interview rounds.

Interview Questionnaire 

2 Questions

  • Q1. Are you open to new technology and business processes??
  • Q2. Yes I am open to new business processes and technology because what I learnt in my education is a base but certainly I have to learn to increase my expertise and knowledge. Plus policies in business change...

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident, don't make up things, share your perspective of things even if you feel it is contrasting. There is nothing right and wrong.
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Referral and was interviewed in Mar 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - One-on-one 

(2 Questions)

  • Q1. Kyc CDD questions,due diligence
  • Q2. End to end KYC,AML related questions

Interview Preparation Tips

Interview preparation tips for other job seekers - Match fixing,not selecting the candidates fairly,totaly they are biased in selecting

I applied via Naukri.com and was interviewed in Aug 2021. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - Assignment 

It's written test. They give one topic like social media, internet etc, we have to write on the topic in 400 words in 30 mins.

Round 3 - Technical 

(1 Question)

  • Q1. They ask questions related to AML and KYC

Interview Preparation Tips

Interview preparation tips for other job seekers - If you don't have good knowledge of AML/KYC so don't need to worry. Learn something about basic AML/KYC from Google and YouTube.
Contribute & help others!
anonymous
You can choose to be anonymous

PwC Interview FAQs

How many rounds are there in PwC Cyber Security Analyst interview?
PwC interview process usually has 2-3 rounds. The most common rounds in the PwC interview process are Resume Shortlist, Technical and Coding Test.
What are the top questions asked in PwC Cyber Security Analyst interview?

Some of the top questions asked at the PwC Cyber Security Analyst interview -

  1. 3- If you have received 2 mails from PwC with same name how will you identify t...read more
  2. 5- How will you make your system secure from a user point of vie...read more
  3. 1- What do you know about cyber securit...read more

Recently Viewed

DESIGNATION

INTERVIEWS

KPMG India

No Interviews

DESIGNATION

INTERVIEWS

Srinivasan Services Trust

No Interviews

INTERVIEWS

Visteon

No Interviews

INTERVIEWS

Hummingbird Web Solutions

No Interviews

INTERVIEWS

KPMG India

No Interviews

INTERVIEWS

Marpu Foundation

No Interviews

DESIGNATION

DESIGNATION

Tell us how to improve this page.

PwC Cyber Security Analyst Interview Process

based on 2 interviews

Interview experience

4
  
Good
View more

Interview Questions from Similar Companies

Deloitte Interview Questions
3.8
 • 2.8k Interviews
Ernst & Young Interview Questions
3.4
 • 1.1k Interviews
KPMG India Interview Questions
3.5
 • 789 Interviews
ZS Interview Questions
3.4
 • 449 Interviews
BCG Interview Questions
3.7
 • 196 Interviews
Bain & Company Interview Questions
3.8
 • 104 Interviews
Grant Thornton Interview Questions
3.7
 • 101 Interviews
Blackrock Interview Questions
3.8
 • 99 Interviews
WSP Interview Questions
4.2
 • 91 Interviews
View all
PwC Cyber Security Analyst Salary
based on 55 salaries
₹3.8 L/yr - ₹12 L/yr
13% more than the average Cyber Security Analyst Salary in India
View more details

PwC Cyber Security Analyst Reviews and Ratings

based on 4 reviews

4.3/5

Rating in categories

4.7

Skill development

4.0

Work-life balance

3.9

Salary

3.5

Job security

4.7

Company culture

3.5

Promotions

4.3

Work satisfaction

Explore 4 Reviews and Ratings
Senior Associate
15.3k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Associate
13.1k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Manager
6.8k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Consultant
4.4k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Associate2
4.3k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare PwC with

Deloitte

3.8
Compare

Ernst & Young

3.4
Compare

Accenture

3.8
Compare

TCS

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview
Rate your experience using AmbitionBox
Terrible
Terrible
Poor
Poor
Average
Average
Good
Good
Excellent
Excellent