Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Softtek Team. If you also belong to the team, you can get access from here

Softtek Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Softtek Senior Security Engineer Interview Questions and Answers

Updated 17 Jun 2022

Softtek Senior Security Engineer Interview Experiences

2 interviews found

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. What is your day to day work?
  • Q2. What is your company architecture
Round 3 - HR 

(1 Question)

  • Q1. Why are you changing the job

Interview Preparation Tips

Interview preparation tips for other job seekers - work life balance is good. management is very helpful.

I applied via Naukri.com and was interviewed in Sep 2021. There were 3 interview rounds.

Interview Questionnaire 

5 Questions

  • Q1. Day to day activities
  • Q2. Components of CYberark
  • Ans. 

    CyberArk is a privileged access management solution that includes components such as Password Vault, Privileged Session Manager, and Endpoint Privilege Manager.

    • Password Vault - stores and manages privileged account credentials

    • Privileged Session Manager - monitors and records privileged sessions for auditing purposes

    • Endpoint Privilege Manager - enforces least privilege policies on endpoints

    • Application Identity Manager -...

  • Answered by AI
  • Q3. Current company security architecture (Cyberark)
  • Ans. 

    Our current company security architecture is based on Cyberark.

    • We use Cyberark to manage privileged access to critical systems and applications.

    • Cyberark helps us enforce least privilege access and monitor privileged activity.

    • We have integrated Cyberark with our SIEM solution for better visibility and threat detection.

    • We regularly review and update our Cyberark policies and configurations to ensure maximum security.

    • Over...

  • Answered by AI
  • Q4. Difference between change and re concile account and verify
  • Ans. 

    Change account modifies the account while reconcile and verify ensure accuracy of account information.

    • Change account involves modifying the account information

    • Reconcile account ensures that the account balance is accurate

    • Verify account ensures that the account information is correct

    • Change account is proactive while reconcile and verify are reactive

    • Example: Changing the account holder's name is a change account action w...

  • Answered by AI
  • Q5. Some scenario based questions

Interview Preparation Tips

Interview preparation tips for other job seekers - be cool and join 5 min early to the call

Senior Security Engineer Interview Questions Asked at Other Companies

asked in Cognizant
Q1. How can we make an Symantec agent that is offline for too long ti ... read more
asked in Citrix
Q2. How nmap works, how will you recreate similar tool.
asked in Experian
Q3. How would you deal with developer push back for security issues?
Q4. What is Sql injection ? Epo installation and implementation steps
asked in Softtek
Q5. difference between change and re concile account and verify

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.

Round 1 - Technical 

(3 Questions)

  • Q1. Cyber security attack and remediation
  • Q2. Scenario based questions
  • Q3. Tell me about yourself
Round 2 - HR 

(2 Questions)

  • Q1. Basic questions
  • Q2. Salary discussion
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via campus placement at Narsee Monjee Institute Of Management Studies (NMIMS) and was interviewed in Nov 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Aptitude Test 

It was aptitude test with quantitative logical and coding sections

Round 3 - Technical 

(5 Questions)

  • Q1. Asked questions on cybersecurity
  • Q2. Do you know about CIA
  • Q3. Which one is most important in CIA according to you
  • Ans. 

    Confidentiality is the most important in CIA according to me.

    • Confidentiality ensures that sensitive information is protected from unauthorized access.

    • It involves implementing access controls, encryption, and secure communication channels.

    • Examples include securing user data, protecting trade secrets, and safeguarding classified information.

    • Confidentiality is crucial in maintaining trust, privacy, and preventing data bre

  • Answered by AI
  • Q4. SQL injection, various attacks , SSL certificate etc
  • Q5. SSL CERTIFICATE

Interview Preparation Tips

Interview preparation tips for other job seekers - For this role it's good if you have cyber security knowledge about various threats and attacks
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. Cyber kill chain
  • Q2. Mitre Att&ck frame work
  • Q3. Event life cycle of any siem solution
  • Ans. 

    The event life cycle of a SIEM solution involves several stages from data collection to incident response.

    • Data collection: SIEM collects logs and events from various sources such as network devices, servers, and applications.

    • Normalization: The collected data is normalized to a common format for easier analysis and correlation.

    • Aggregation: Events are grouped together based on common attributes to identify patterns and t...

  • Answered by AI
  • Q4. Port numbers, protocols
  • Q5. Explain OSI model briefly
  • Ans. 

    The OSI model is a conceptual framework that defines the functions of a network protocol stack.

    • The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has a specific function and interacts with the layers above and below it.

    • The model helps in understanding how data is transmitted and received in a network.

    • For example, the Physical layer deals wi...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Basics much important in first round.
In second round expect some scenario based questions.

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
6-8 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before May 2023. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. Easy, CSPM,CWPP Policy related question,Networking, Data structures
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
-

I was interviewed before Jun 2023.

Round 1 - Technical 

(1 Question)

  • Q1. Cyber Kill Chain
Round 2 - Technical 

(1 Question)

  • Q1. Explain Natting
  • Ans. 

    Natting stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.

    • Natting allows multiple devices on a local network to share a single public IP address

    • Types of Natting include Static NAT, Dynamic NAT, and Port Address Translation (PAT)

    • Natting helps improve security by hiding internal IP addresses from external networks

    • Example: A company uses NAT to ...

  • Answered by AI

Skills evaluated in this interview

I applied via LinkedIn and was interviewed in Jun 2022. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. SQL Injection and CSS Attacks
  • Q2. Port Numbers of different protocols
  • Ans. 

    Port numbers for different protocols

    • HTTP - 80

    • HTTPS - 443

    • FTP - 20, 21

    • SSH - 22

    • SMTP - 25

    • DNS - 53

    • POP3 - 110

    • IMAP - 143

    • LDAP - 389

    • RDP - 3389

  • Answered by AI
  • Q3. Steps to consider after Phishing attack
  • Ans. 

    Steps to take after a phishing attack

    • Immediately disconnect from the internet

    • Change all passwords associated with the compromised account

    • Notify the appropriate parties (IT department, bank, etc.)

    • Run a virus scan on all devices used to access the compromised account

    • Educate yourself and others on how to identify and avoid phishing attacks

  • Answered by AI
  • Q4. Some Alerts/incidents and their remediations.
  • Q5. A couple behavioural questions too

Interview Preparation Tips

Interview preparation tips for other job seekers - Interviewers were quite friendly and cool.
Everything went well.

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before Apr 2023. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Basic Cybersecurity questions
  • Q2. Scenario based questions
Round 2 - Technical 

(2 Questions)

  • Q1. Basic day to day responsibility
  • Ans. 

    Monitoring and analyzing security measures to protect an organization's computer systems and networks

    • Monitoring security measures to ensure they are effective

    • Analyzing security breaches to determine the cause and prevent future incidents

    • Implementing security protocols and procedures

    • Conducting regular security audits and risk assessments

  • Answered by AI
  • Q2. Experience and skill set
Round 3 - HR 

(2 Questions)

  • Q1. Salary expectation
  • Q2. About myself and strength and weakness

Interview Preparation Tips

Topics to prepare for Allianz Technology Information Security Analyst interview:
  • Cybersecurity

Softtek Interview FAQs

How many rounds are there in Softtek Senior Security Engineer interview?
Softtek interview process usually has 3 rounds. The most common rounds in the Softtek interview process are Resume Shortlist, Technical and HR.
What are the top questions asked in Softtek Senior Security Engineer interview?

Some of the top questions asked at the Softtek Senior Security Engineer interview -

  1. difference between change and re concile account and ver...read more
  2. current company security architecture (Cybera...read more
  3. components of CYber...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Infosys Interview Questions
3.6
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
LTIMindtree Interview Questions
3.8
 • 3k Interviews
Mphasis Interview Questions
3.4
 • 805 Interviews
KPIT Technologies Interview Questions
3.4
 • 294 Interviews
ThoughtWorks Interview Questions
3.9
 • 145 Interviews
View all
Softtek Senior Security Engineer Salary
based on 10 salaries
₹7.5 L/yr - ₹14 L/yr
23% less than the average Senior Security Engineer Salary in India
View more details

Softtek Senior Security Engineer Reviews and Ratings

based on 2 reviews

3.2/5

Rating in categories

3.2

Skill development

4.1

Work-life balance

3.2

Salary

4.1

Job security

4.1

Company culture

3.2

Promotions

3.2

Work satisfaction

Explore 2 Reviews and Ratings
Software Engineer
171 salaries
unlock blur

₹3.5 L/yr - ₹13 L/yr

Senior Software Engineer
130 salaries
unlock blur

₹5 L/yr - ₹21 L/yr

Technical Specialist
48 salaries
unlock blur

₹7.2 L/yr - ₹17 L/yr

Software Specialist
38 salaries
unlock blur

₹9 L/yr - ₹26.3 L/yr

Support Engineer
32 salaries
unlock blur

₹2.8 L/yr - ₹7.5 L/yr

Explore more salaries
Compare Softtek with

TCS

3.7
Compare

Wipro

3.7
Compare

Infosys

3.6
Compare

HCLTech

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview