Upload Button Icon Add office photos

Filter interviews by

SISA Information Security Interview Questions, Process, and Tips

Updated 20 May 2024

Top SISA Information Security Interview Questions and Answers

View all 6 questions

SISA Information Security Interview Experiences

Popular Designations

7 interviews found

Soc Analyst 1 Interview Questions & Answers

user image mahendra babu

posted on 11 Mar 2024

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Sep 2023. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. Complete phishing analysis
  • Ans. 

    Phishing analysis involves examining suspicious emails or websites to identify potential threats.

    • Check the sender's email address for any inconsistencies or misspellings

    • Look for urgent language or requests for personal information

    • Verify the legitimacy of any links by hovering over them before clicking

    • Check for poor grammar or spelling errors in the email content

    • Report any suspicious emails to the appropriate IT or secu

  • Answered by AI
  • Q2. All about malware analysis
  • Q3. And also mostly they asked on networking topics by firewall and those things

Interview Preparation Tips

Interview preparation tips for other job seekers - who are trying to attending interviews? for soc analyst under domain of cyber security it was very simple to crack the interview so please you make sure that questions are answered.

Thanks for giving a chance to me like express my self ...

Soc Analyst 1 Interview Questions asked at other Companies

Q1. How do you investigate an email phishing?
View answer (1)

Project Trainee Interview Questions & Answers

user image Shivangi Bhardwaj

posted on 31 Oct 2023

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Aptitude Test 

It was easy, anyone can crack it

Round 3 - One-on-one 

(1 Question)

  • Q1. Tell me about yourself

Interview Preparation Tips

Interview preparation tips for other job seekers - Yes

Project Trainee Interview Questions asked at other Companies

Q1. What is the basic difference between Quality Assurance and Quality Control?
View answer (1)
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. What is CryptoGraphy
  • Ans. 

    Cryptography is the practice of secure communication in the presence of third parties.

    • It involves techniques for secure communication and data protection

    • Uses mathematical algorithms to encrypt and decrypt data

    • Examples include AES, RSA, and SHA

    • Cryptography is used in various fields such as finance, military, and healthcare

  • Answered by AI
  • Q2. Difference between hashing and encryption
  • Ans. 

    Hashing is a one-way process of converting data into a fixed-length value while encryption is a two-way process of converting data into a coded message.

    • Hashing is used for data integrity checks and password storage while encryption is used for secure transmission of data.

    • Hashing is irreversible while encryption is reversible.

    • Hashing algorithms include MD5, SHA-1, SHA-256 while encryption algorithms include AES, RSA, DE...

  • Answered by AI

Skills evaluated in this interview

Security Consultant Interview Questions asked at other Companies

Q1. What are the security headers used in an application?
View answer (1)
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-

I was interviewed in Dec 2022.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Examples for False Positive identified in SIEM
  • Ans. 

    False positives in SIEM

    • Misconfigured rules triggering alerts

    • Legitimate traffic being flagged as malicious

    • Inaccurate threat intelligence data

    • Inadequate correlation rules

    • Outdated signatures or patterns

  • Answered by AI
  • Q2. Explain cyber kill chain
  • Ans. 

    Cyber kill chain is a framework that describes the stages of a cyber attack.

    • It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

    • The goal is to identify and disrupt the attack at an early stage.

    • For example, if an attacker is in the reconnaissance stage, organizations can implement measures to detect and prevent the attacker from...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be prepared with the contents in your resume, cyber security concepts

Security Analyst Interview Questions asked at other Companies

Q1. How do you test a web application? What is CSRF and SSRF? What is LDAP injection? How does namp work while port scanning? (Result - open/filtered/closed) How does ssl work? Suppose a proxy server(Burpsuite) is in b/w server and client so wh... read more
View answer (2)

SISA Information Security interview questions for popular designations

 Project Trainee

 (1)

 Security Consultant

 (1)

 Soc Analyst 1

 (1)

 Security Analyst 1

 (1)

 Security Analyst

 (1)

 Developer Associate

 (1)

 Supervisor

 (1)

Interview experience
4
Good
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed before May 2023. There were 3 interview rounds.

Round 1 - Aptitude Test 

Verbal reasoning and logical reasoning

Round 2 - One-on-one 

(1 Question)

  • Q1. Technical security questions
Round 3 - HR 

(1 Question)

  • Q1. Behavioural based questions

Security Analyst 1 Interview Questions asked at other Companies

Q1. What is SIEM, how parsing will be done
View answer (1)

Interview Questionnaire 

5 Questions

  • Q1. I was asked questions on C#.
  • Ans. Make sure your basics are strong. Const vs Readonly, Out vs Ref, Multi threading.
  • Answered Anonymously
  • Q2. MVC questions: Routing, Page life cycle, Exception Handling, Filters.
  • Ans. Answers you can find on Google.
  • Answered Anonymously
  • Q3. Linq questions: First vs Firstordefault, single vs singleordefault, convert generic list to non generic type.
  • Ans. 

    Explanation of Linq methods First, FirstOrDefault, Single, SingleOrDefault and converting generic list to non generic type.

    • First returns the first element of a sequence, throws an exception if sequence is empty.

    • FirstOrDefault returns the first element of a sequence or default value if sequence is empty.

    • Single returns the only element of a sequence, throws an exception if sequence has more than one element or is empty.

    • S...

  • Answered by AI
  • Q4. Google the answers or email me: *****
  • Q5. Questions on SQL, AWS, WEB API

Skills evaluated in this interview

Developer Associate Interview Questions asked at other Companies

Q1. Cycle Detection in a Singly Linked List Determine if a given singly linked list of integers forms a cycle or not. A cycle in a linked list occurs when a node's next points back to a previous node in the list. Thus, the list does not have a ... read more
View answer (1)

Jobs at SISA Information Security

View all

Supervisor Interview Questions & Answers

user image Anonymous

posted on 3 Jun 2021

Interview Questionnaire 

2 Questions

  • Q1. There are asking gernal questions about security.
  • Q2. For example inbound processing,out bound processing,flow through,micro audit, proper way of frisking, handling of manpower, about fire alarm system.

Supervisor Interview Questions asked at other Companies

Q1. Self introduction? & what is mean by eCommerce ? How it can do
View answer (10)

Interview questions from similar companies

I was interviewed in Feb 2017.

Interview Preparation Tips

Round: Test
Experience: Very first, the interviewers and their employees gave presentation about their products and company. They were very cool and very positive to motivate candidates. After that they started Round 1 that is test based on aptitude and logical problem, also containing c programmin and operating system problems.
Tips: If you have studied basics very well, you will clear the round 1 very easily. Study C programming and Linux Operating System concepts.
Duration: 1 hour 30 minutes
Total Questions: 60

Round: Technical Interview
Experience: I am not specifying any question above because 2nd round i.e Technical Round 1 was continued to abt 1 and hour hours taken by 1 interviewer. If you give all answers confindently, obviously they all must be correct, you will be qualified to next techincal round.
Tips: Same as mentioned in round 1.
Study C programming & Operating System.

Round: Technical Interview
Experience: This was Technical Round 2. It was taken by 3 interviewers asking questions randomly from random subject. Also, one took rapid fire round for 20-25 questions. If you qualified this round, then you can assume that you are selected. This round was also continued more than 1 hour.
Tips: Study Networking concepts

Round: HR Interview
Experience: If you are called for HR interview, then you can assume that you already selected as employee for company. This is round is just for formality to tell you CTC and location and joining, etc.
One thing I would like to mention that in each round they will ask you to tell about yourself. So prepare that too. In HR round, they asked me some tricky puzzles to solve since I mentioned that I am very good in maths so.

College Name: Datta Meghe College of Engineering

Interview Questionnaire 

3 Questions

  • Q1. Malware and its type
  • Ans. 

    Malware refers to any software designed to harm or exploit any device or network.

    • Malware is a broad term that includes viruses, worms, trojans, ransomware, spyware, adware, and more.

    • Viruses are malicious programs that replicate themselves and infect other files on the device.

    • Worms are self-replicating malware that spread through networks.

    • Trojans are disguised as legitimate software but contain malicious code.

    • Ransomware...

  • Answered by AI
  • Q2. TCP layer
  • Q3. OWASP

Interview Preparation Tips

Interview preparation tips for other job seekers - Learn about basic things

I applied via Campus Placement and was interviewed before Oct 2020. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Layers in the TCP-IP model
  • Ans. 

    TCP-IP model has 4 layers: Application, Transport, Internet, and Network Interface.

    • Application layer deals with user interface and application protocols (HTTP, FTP, SMTP, etc.)

    • Transport layer provides end-to-end data transfer and error recovery (TCP, UDP)

    • Internet layer handles routing and addressing (IP)

    • Network Interface layer deals with physical network connection (Ethernet, Wi-Fi, etc.)

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well for Computer Networks and Operating systems. Have good hands-on experience in research and development

Skills evaluated in this interview

SISA Information Security Interview FAQs

How many rounds are there in SISA Information Security interview?
SISA Information Security interview process usually has 2-3 rounds. The most common rounds in the SISA Information Security interview process are Resume Shortlist, Technical and Aptitude Test.
How to prepare for SISA Information Security interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at SISA Information Security. The most common topics and skills that interviewers at SISA Information Security expect are Information Security, Testing, Case, Computer science and Networking.
What are the top questions asked in SISA Information Security interview?

Some of the top questions asked at the SISA Information Security interview -

  1. Linq questions: First vs Firstordefault, single vs singleordefault, convert gen...read more
  2. Examples for False Positive identified in S...read more
  3. Difference between hashing and encrypt...read more

Tell us how to improve this page.

SISA Information Security Interview Process

based on 11 interviews

Interview experience

4
  
Good
View more

Interview Questions from Similar Companies

Zeta Interview Questions
3.3
 • 69 Interviews
embedUR Systems Interview Questions
3.3
 • 48 Interviews
Subex Interview Questions
3.5
 • 35 Interviews
Safe Security Interview Questions
2.9
 • 8 Interviews
TAC Security Interview Questions
2.7
 • 3 Interviews
View all

SISA Information Security Reviews and Ratings

based on 112 reviews

3.0/5

Rating in categories

3.1

Skill development

2.9

Work-life balance

2.8

Salary

3.1

Job security

2.9

Company culture

2.6

Promotions

3.0

Work satisfaction

Explore 112 Reviews and Ratings
Specialist_ Cloud Security

Bangalore / Bengaluru

2-5 Yrs

₹ 7-9 LPA

Consultant

Bangalore / Bengaluru

4-5 Yrs

Not Disclosed

Specialist

Bangalore / Bengaluru

6-8 Yrs

Not Disclosed

Explore more jobs
Associate Consultant
85 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Security Analyst
59 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Security Analyst
22 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Associate Consultant
19 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

SOC Analyst
14 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare SISA Information Security with

Paladion Networks

3.7
Compare

Kratikal Tech Private Limited

3.7
Compare

Instasafe Technologies

3.0
Compare

Safe Security

2.9
Compare
Did you find this page helpful?
Yes No
write
Share an Interview