Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by SATTRIX Information Security Team. If you also belong to the team, you can get access from here

SATTRIX Information Security Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

SATTRIX Information Security Cyber Security Analyst Interview Questions and Answers for Experienced

Updated 21 Jan 2024

SATTRIX Information Security Cyber Security Analyst Interview Experiences for Experienced

1 interview found

I applied via Naukri.com and was interviewed in Sep 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - One-on-one 

(2 Questions)

  • Q1. Siem related question asked and day today responsibility
  • Q2. End point detection and response and anti virus related questions

Interview Preparation Tips

Interview preparation tips for other job seekers - Should be clear your concept and if you are an experienced candidate then you should go through your previous experience.

Interview questions from similar companies

Interview Questionnaire 

1 Question

  • Q1. Capital market, corporate action, accruals, why do u want to change job
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Methodology approach for both api and web pen test
  • Ans. 

    The methodology approach for API and web pen test involves identifying vulnerabilities, testing for exploits, and reporting findings.

    • Identify the scope of the test and the target systems

    • Perform reconnaissance to gather information about the target

    • Test for common vulnerabilities such as SQL injection and cross-site scripting

    • Test for exploits to determine the impact of vulnerabilities

    • Report findings and provide recommend

  • Answered by AI
  • Q2. Why you used csrf tokens
  • Ans. 

    CSRF tokens are used to prevent unauthorized access to sensitive data or actions on a website.

    • CSRF tokens add an extra layer of security to web applications by ensuring that requests are coming from an authenticated user.

    • They are generated by the server and included in forms or URLs to verify the authenticity of the request.

    • Without CSRF tokens, attackers can use cross-site scripting (XSS) attacks to trick users into un...

  • Answered by AI
Round 3 - Technical 

(1 Question)

  • Q1. Owasp vulnerabilities which you come across
  • Ans. 

    OWASP vulnerabilities commonly encountered in security analysis

    • Injection flaws (SQL, LDAP, OS command, etc.)

    • Cross-site scripting (XSS)

    • Broken authentication and session management

    • Security misconfiguration

    • Sensitive data exposure

    • Insufficient logging and monitoring

    • Using components with known vulnerabilities

    • Insecure communication (e.g. lack of encryption)

    • Broken access control

    • XML External Entities (XXE)

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - be confident about your experience and subjects, through about the thing you done previously

Skills evaluated in this interview

I applied via Naukri.com and was interviewed before Jul 2021. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. CSRF Owasp top 10 Web application
Round 3 - HR 

(1 Question)

  • Q1. Current CTC Expected CTC
  • Ans. 

    Discussed in person or over email

    • I prefer to discuss this in person or over email

    • I am open to negotiation based on the job requirements

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Netrika Consulting Cyber Security Consultant interview:
  • OWASP
Interview preparation tips for other job seekers - All the team members are very polite 😉 I so happy to join Netrikan

I applied via Naukri.com and was interviewed in Nov 2021. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Basic networking questions and also scenario based questions.

Interview Preparation Tips

Interview preparation tips for other job seekers - Whatever you know present the knowledge precisely not too much not too small
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Jul 2024. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. PHISHING ANALYSIS
Round 2 - Technical 

(1 Question)

  • Q1. MALWARE ALERT, CYBER KILL CHAIN, IPSVS IDS
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Jul 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(1 Question)

  • Q1. Describe yourself apart from resume.
Round 3 - Technical 

(1 Question)

  • Q1. What does CIA stands for?
  • Ans. 

    CIA stands for Confidentiality, Integrity, and Availability in the context of information security.

    • Confidentiality: Ensuring that information is only accessible to those who are authorized to view it.

    • Integrity: Ensuring that information is accurate and has not been tampered with.

    • Availability: Ensuring that information is accessible when needed by authorized users.

    • Example: Encrypting sensitive data to maintain confident...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be well prepared about topics mentioned in CV.

I applied via Approached by Company and was interviewed in Oct 2021. There were 3 interview rounds.

Round 1 - HR 

(5 Questions)

  • Q1. What are your salary expectations?
  • Q2. Share details of your previous job.
  • Q3. Why are you looking for a change?
  • Q4. What are your strengths and weaknesses?
  • Q5. Tell me about yourself.
Round 2 - Technical 

(1 Question)

  • Q1. Testing methodology, Agile, DB, SQL... etc
Round 3 - One-on-one 

(1 Question)

  • Q1. Salary discussion along with some normal questions about testing

Interview Preparation Tips

Interview preparation tips for other job seekers - Just be confident and you will get the job
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
No response

I was interviewed in Feb 2023.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. What is Solunk Architecture
  • Ans. 

    Solunk Architecture is a cloud-based security architecture that focuses on securing data and applications in the cloud.

    • Solunk Architecture emphasizes on securing data and applications in the cloud

    • It provides a comprehensive security framework for cloud environments

    • It includes features such as encryption, access control, and monitoring

    • Solunk Architecture helps organizations protect their sensitive information from cyber

  • Answered by AI
  • Q2. What is Cyber kill chain
  • Ans. 

    The Cyber kill chain is a model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.

    • The Cyber kill chain was developed by Lockheed Martin to help organizations understand and defend against cyber attacks.

    • The stages of the Cyber kill chain include reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

    • By understanding e...

  • Answered by AI
  • Q3. Mitre Attack framework

Interview Preparation Tips

Interview preparation tips for other job seekers - Be clear with your concepts
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - One-on-one 

(5 Questions)

  • Q1. What kind of vulnerability you came across
  • Ans. 

    I came across a vulnerability in a web application that allowed for SQL injection attacks.

    • Identified lack of input validation in user inputs

    • Discovered that the application was directly executing user-supplied SQL queries

    • Suggested implementing parameterized queries to prevent SQL injection

    • Tested the vulnerability by attempting to inject SQL code through input fields

  • Answered by AI
  • Q2. What issues you face in management regarding reporting some security issues
  • Q3. Tcp vs UDP which one is better
  • Ans. 

    It depends on the specific use case and requirements.

    • TCP is reliable and ensures all data is delivered in order, but it can be slower due to the overhead of error-checking and retransmission.

    • UDP is faster and more efficient for real-time applications like video streaming or online gaming, but it does not guarantee delivery or order of packets.

    • Choose TCP for applications that require reliable data transmission, such as ...

  • Answered by AI
  • Q4. Hashing and its examples in real world
  • Ans. 

    Hashing is a process of converting input data into a fixed-size string of bytes using a mathematical algorithm.

    • Hashing is commonly used in password storage to securely store user passwords without storing the actual password.

    • Hashing is used in digital signatures to ensure the integrity of the signed data.

    • Blockchain technology uses hashing to create a secure and tamper-proof record of transactions.

    • File integrity checks ...

  • Answered by AI
  • Q5. Pop3 and icmp what are work and port no.

Interview Preparation Tips

Topics to prepare for Wipro Information Security Analyst interview:
  • Networking
  • cybersecurity
  • reallife scenarios
  • attacks

Skills evaluated in this interview

SATTRIX Information Security Interview FAQs

How many rounds are there in SATTRIX Information Security Cyber Security Analyst interview for experienced candidates?
SATTRIX Information Security interview process for experienced candidates usually has 2 rounds. The most common rounds in the SATTRIX Information Security interview process for experienced candidates are Resume Shortlist and One-on-one Round.
How to prepare for SATTRIX Information Security Cyber Security Analyst interview for experienced candidates?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at SATTRIX Information Security. The most common topics and skills that interviewers at SATTRIX Information Security expect are Cloud Computing, Network Security, Penetration Testing, Security Testing and Vulnerability Assessment.
What are the top questions asked in SATTRIX Information Security Cyber Security Analyst interview for experienced candidates?

Some of the top questions asked at the SATTRIX Information Security Cyber Security Analyst interview for experienced candidates -

  1. If you match 60 percentage requirement then you can get their ...read more
  2. Siem related question asked and day today responsibil...read more
  3. End point detection and response and anti virus related questi...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Webdew Interview Questions
4.5
 • 106 Interviews
HyScaler Interview Questions
4.5
 • 91 Interviews
Quantsapp Interview Questions
2.8
 • 34 Interviews
View all
SATTRIX Information Security Cyber Security Analyst Salary
based on 49 salaries
₹1.9 L/yr - ₹6.5 L/yr
42% less than the average Cyber Security Analyst Salary in India
View more details

SATTRIX Information Security Cyber Security Analyst Reviews and Ratings

based on 10 reviews

3.0/5

Rating in categories

3.0

Skill development

3.0

Work-life balance

2.9

Salary

2.9

Job security

2.9

Company culture

3.0

Promotions

3.0

Work satisfaction

Explore 10 Reviews and Ratings
Cyber Security Engineer
55 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Cyber Security Analyst
49 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Security Analyst
36 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

SOC Analyst
31 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Information Security Analyst
26 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare SATTRIX Information Security with

Paladion Networks

3.7
Compare

Kratikal Tech Private Limited

3.7
Compare

Safe Security

2.9
Compare

TCS

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview