Upload Button Icon Add office photos

Filter interviews by

SISA Information Security Security Consultant Interview Questions and Answers

Updated 28 Apr 2023

SISA Information Security Security Consultant Interview Experiences

1 interview found

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. What is CryptoGraphy
  • Ans. 

    Cryptography is the practice of secure communication in the presence of third parties.

    • It involves techniques for secure communication and data protection

    • Uses mathematical algorithms to encrypt and decrypt data

    • Examples include AES, RSA, and SHA

    • Cryptography is used in various fields such as finance, military, and healthcare

  • Answered by AI
  • Q2. Difference between hashing and encryption
  • Ans. 

    Hashing is a one-way process of converting data into a fixed-length value while encryption is a two-way process of converting data into a coded message.

    • Hashing is used for data integrity checks and password storage while encryption is used for secure transmission of data.

    • Hashing is irreversible while encryption is reversible.

    • Hashing algorithms include MD5, SHA-1, SHA-256 while encryption algorithms include AES, RSA, DE...

  • Answered by AI

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
2
Poor
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. What is xss? And how can it be fixed?
  • Ans. 

    XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

    • XSS attacks can be prevented by properly validating and sanitizing user input.

    • Developers should also use output encoding to prevent malicious scripts from being executed.

    • Using Content Security Policy (CSP) can also help prevent XSS attacks.

    • Examples of XSS att...

  • Answered by AI
  • Q2. What is csrf? And how can it be fixed
  • Ans. 

    CSRF stands for Cross-Site Request Forgery. It is a type of attack that tricks a user into performing an action they did not intend to.

    • CSRF occurs when a malicious website or email tricks a user into clicking a link or button that performs an action on a different website where the user is already authenticated.

    • To prevent CSRF attacks, websites can use techniques such as CSRF tokens, which are unique values generated f...

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. Reason for job change
  • Q2. What is Expected salary
Round 3 - Technical 

(4 Questions)

  • Q1. Sql injection vulnerability
  • Q2. Owasp top 10 related questions
  • Q3. Reason for job change
  • Q4. When can you join the company

Interview Preparation Tips

Topics to prepare for TAC Security Security Engineer interview:
  • Owasp top 10
Interview preparation tips for other job seekers - Be prepared with owasp 10 ten

I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.

Interview Questionnaire 

1 Question

  • Q1. Introduce yourself based on my resume. Also cryptography related questions. Scenario based questions.

Interview Preparation Tips

Interview preparation tips for other job seekers - It's was overall good experience. Still waiting for their offer.
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. What is Routing please explain
  • Ans. 

    Routing is the process of selecting the best path for network traffic to travel from one network to another.

    • Routing involves analyzing network topology and determining the most efficient path for data to travel

    • Routing protocols such as OSPF and BGP are used to exchange routing information between routers

    • Routing tables are used to store information about network destinations and the best path to reach them

    • Routing can be...

  • Answered by AI
  • Q2. What is subnetting, please explain
  • Ans. 

    Subnetting is the process of dividing a network into smaller subnetworks.

    • Subnetting helps in efficient utilization of IP addresses

    • It improves network performance and security

    • Subnetting is done by borrowing bits from the host portion of an IP address

    • Example: 192.168.1.0/24 can be subnetted into 192.168.1.0/25 and 192.168.1.128/25

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Networking knowledge is must along with information security knowledge

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Aug 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Explain network subnetting with explain
  • Ans. 

    Subnetting is the process of dividing a network into smaller subnetworks to improve performance and security.

    • Subnetting involves creating multiple smaller networks within a larger network by dividing the IP address range.

    • It helps in reducing network congestion, improving security by isolating different departments or functions, and optimizing network performance.

    • Subnet masks are used to determine which part of an IP ad...

  • Answered by AI
  • Q2. Explain difference between router and switch
  • Ans. 

    Routers connect multiple networks together, while switches connect devices within a single network.

    • Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).

    • Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.

    • Routers are typically used to connect different networks, such as a home netw...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Knowledge of CCNA concepts will help

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Methodology approach for both api and web pen test
  • Ans. 

    The methodology approach for API and web pen test involves identifying vulnerabilities, testing for exploits, and reporting findings.

    • Identify the scope of the test and the target systems

    • Perform reconnaissance to gather information about the target

    • Test for common vulnerabilities such as SQL injection and cross-site scripting

    • Test for exploits to determine the impact of vulnerabilities

    • Report findings and provide recommend

  • Answered by AI
  • Q2. Why you used csrf tokens
  • Ans. 

    CSRF tokens are used to prevent unauthorized access to sensitive data or actions on a website.

    • CSRF tokens add an extra layer of security to web applications by ensuring that requests are coming from an authenticated user.

    • They are generated by the server and included in forms or URLs to verify the authenticity of the request.

    • Without CSRF tokens, attackers can use cross-site scripting (XSS) attacks to trick users into un...

  • Answered by AI
Round 3 - Technical 

(1 Question)

  • Q1. Owasp vulnerabilities which you come across
  • Ans. 

    OWASP vulnerabilities commonly encountered in security analysis

    • Injection flaws (SQL, LDAP, OS command, etc.)

    • Cross-site scripting (XSS)

    • Broken authentication and session management

    • Security misconfiguration

    • Sensitive data exposure

    • Insufficient logging and monitoring

    • Using components with known vulnerabilities

    • Insecure communication (e.g. lack of encryption)

    • Broken access control

    • XML External Entities (XXE)

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - be confident about your experience and subjects, through about the thing you done previously

Skills evaluated in this interview

I applied via Naukri.com and was interviewed before Jul 2021. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. CSRF Owasp top 10 Web application
Round 3 - HR 

(1 Question)

  • Q1. Current CTC Expected CTC
  • Ans. 

    Discussed in person or over email

    • I prefer to discuss this in person or over email

    • I am open to negotiation based on the job requirements

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Netrika Consulting Cyber Security Consultant interview:
  • OWASP
Interview preparation tips for other job seekers - All the team members are very polite 😉 I so happy to join Netrikan

I applied via LinkedIn and was interviewed before Nov 2021. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - One-on-one 

(2 Questions)

  • Q1. Applied through LinkedIn and was shortlisted 1st round was a discussion about current experience and domain knowledge, questions around revenue assurance areas
  • Q2. Later was asked some domain questions around telecom frameworks and TMforum frameworks
Round 3 - Case Study 

Was given a business case and was asked to come up with a PPT presentation for a consulting engagement with

Scope
Approach
Timelines
Deliverables
Recommendations

In the area of revenue assurance for a telecom client

Interview Preparation Tips

Topics to prepare for Subex Senior Consultant interview:
  • Telecom
  • SQL
  • Revenue Assurance
  • Analytics
  • Consulting
  • Software developement
Interview preparation tips for other job seekers - This organisation is mostly into telecom domain with expertise in the are of Business Assurance, Revenue Assurance, Fraud management.

Subex has their own analytics product/software such as ROC RA/FM, partner settlement, Hypersense ( Data analytics platform)

There will be ample of international working opportunities and exposure as subex's major customer base are in middle East, Africa, Asia and South America. Recently they have gained some footprints in the US region as well

I applied via Referral and was interviewed in Aug 2020. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Network security, Windows Technical, CCNA based questions.

Interview Preparation Tips

Interview preparation tips for other job seekers - This is not important how much you have knowledge of IT. It's important how much are you confidence about your knowledge. Don't be panic of interview just be confidence from your self and your knowledge.

SISA Information Security Interview FAQs

How many rounds are there in SISA Information Security Security Consultant interview?
SISA Information Security interview process usually has 2 rounds. The most common rounds in the SISA Information Security interview process are Resume Shortlist and Technical.
How to prepare for SISA Information Security Security Consultant interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at SISA Information Security. The most common topics and skills that interviewers at SISA Information Security expect are Vulnerability Assessment, Adobe Acrobat Professional, Client Management, ISO 27001 and ISO Audit.
What are the top questions asked in SISA Information Security Security Consultant interview?

Some of the top questions asked at the SISA Information Security Security Consultant interview -

  1. Difference between hashing and encrypt...read more
  2. What is CryptoGra...read more

Tell us how to improve this page.

SISA Information Security Security Consultant Interview Process

based on 1 interview

Interview experience

5
  
Excellent
View more

Interview Questions from Similar Companies

Zeta Interview Questions
3.3
 • 69 Interviews
embedUR Systems Interview Questions
3.3
 • 48 Interviews
Subex Interview Questions
3.5
 • 35 Interviews
CoinDCX Interview Questions
3.8
 • 29 Interviews
Seclore Interview Questions
4.1
 • 26 Interviews
XenonStack Interview Questions
3.3
 • 25 Interviews
MoEngage Interview Questions
4.0
 • 24 Interviews
View all
SISA Information Security Security Consultant Salary
based on 9 salaries
₹4 L/yr - ₹10 L/yr
61% less than the average Security Consultant Salary in India
View more details
Associate Consultant
87 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Security Analyst
59 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Security Analyst
23 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Associate Consultant
19 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

SOC Analyst
14 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare SISA Information Security with

Paladion Networks

3.7
Compare

Kratikal Tech Private Limited

3.7
Compare

Instasafe Technologies

3.0
Compare

Safe Security

2.9
Compare
Did you find this page helpful?
Yes No
write
Share an Interview