Upload Button Icon Add office photos

Filter interviews by

System Electronics & Optronics Cyber Security Analyst Interview Questions and Answers

Be the first one to contribute and help others!

Interview questions from similar companies

I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Domain based

Interview Preparation Tips

Interview preparation tips for other job seekers - Give your best !

I applied via Campus Placement and was interviewed before Sep 2021. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Had a great technical discussion for around 45 mins regarding computer science and coding.
  • Q2. Write a c program for designing calculator using C language.
  • Ans. 

    A C program for designing calculator

    • Use switch case for different operations

    • Use scanf to take input from user

    • Use printf to display output

    • Use functions for each operation

    • Use loops for continuous calculations

  • Answered by AI
Round 3 - HR 

(1 Question)

  • Q1. General one to one talk.

Interview Preparation Tips

Interview preparation tips for other job seekers - Please be composed and yes you can achieve it.

Skills evaluated in this interview

Interview Questionnaire 

1 Question

  • Q1. Simple technical questions as write a simple program, what would be output of this pseudocode and also find the error if there is any

Interview Preparation Tips

Interview preparation tips for other job seekers - Easy interview but again questions depend upon the interviewer as well

Interview Questionnaire 

2 Questions

  • Q1. Mitra attack
  • Q2. Cyber kill chain

Interview Preparation Tips

Interview preparation tips for other job seekers - Study all the information about cyber security when you are going to do so.
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. What is cyber security
  • Ans. 

    Cyber security is the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.

    • Cyber security involves implementing measures to prevent cyber attacks and data breaches

    • It includes protecting against viruses, malware, and other malicious software

    • Cyber security also involves educating users on safe online practices

    • Examples of cyber security measures include fi...

  • Answered by AI
Round 3 - Technical 

(1 Question)

  • Q1. What is security
  • Ans. 

    Security refers to the measures taken to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information.

    • Security involves protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction

    • It includes measures such as encryption, firewalls, access controls, and security policies

    • Security is important in all areas, including personal, b...

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(5 Questions)

  • Q1. Basic cyber security cum devops questions
  • Q2. What is cloud? and types
  • Ans. 

    Cloud is a virtual space that allows users to store, manage, and access data and applications remotely.

    • Cloud is a virtualized infrastructure that provides on-demand access to computing resources.

    • It allows users to store and access data and applications remotely over the internet.

    • Cloud services are typically categorized into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a...

  • Answered by AI
  • Q3. What is devops?
  • Ans. 

    DevOps is a software development approach that combines development and operations teams to improve collaboration and efficiency.

    • DevOps is a cultural shift that promotes collaboration and communication between software developers and IT operations.

    • It aims to automate and streamline the software delivery process, from development to deployment and maintenance.

    • DevOps emphasizes continuous integration, continuous delivery...

  • Answered by AI
  • Q4. What is ci/cd in devops
  • Ans. 

    CI/CD stands for Continuous Integration/Continuous Deployment. It is a DevOps practice that involves automating the process of building, testing, and deploying software.

    • CI/CD is a software development approach that aims to deliver code changes more frequently and reliably.

    • Continuous Integration involves merging code changes into a shared repository and running automated tests to detect integration issues early.

    • Continuo...

  • Answered by AI
  • Q5. Implementing security in cloud
  • Ans. 

    Implementing security in the cloud involves various measures to protect data and systems from cyber threats.

    • Use strong authentication and access controls to prevent unauthorized access

    • Encrypt data both in transit and at rest to ensure confidentiality

    • Implement network security measures like firewalls and intrusion detection systems

    • Regularly update and patch software to address vulnerabilities

    • Monitor and log activities t...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - prepare well

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Behavioral 

(5 Questions)

  • Q1. IP related work email blocking related
  • Q2. IP blocked login devices and check malicious IP in devices option.
  • Ans. 

    IP blocking is a common security measure to prevent unauthorized access to devices and networks.

    • Implement IP blocking on login devices to prevent unauthorized access from specific IPs.

    • Regularly check for malicious IPs in devices and block them to prevent security breaches.

    • Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.

    • Consider implementing automated scripts or tools to s...

  • Answered by AI
  • Q3. Email Gateway block the email spam if we received
  • Ans. 

    Yes, email gateways can block email spam if configured properly.

    • Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.

    • Spam emails are typically identified based on keywords, sender reputation, and other factors.

    • Advanced email gateways may also use machine learning algorithms to detect and block spam.

    • Regular updates and monitoring of email gateway s...

  • Answered by AI
  • Q4. F5device for security for white listing
  • Ans. 

    F5 devices can be used for security white listing to control access to specific applications or services.

    • F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.

    • This helps prevent unauthorized access and reduces the attack surface for potential threats.

    • For example, an organization can use F5 devices to white list specific IP addresses for remote

  • Answered by AI
  • Q5. Cisco devices for email and IP upgrade
  • Ans. 

    When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.

    • Ensure compatibility of new devices with existing infrastructure

    • Backup configurations and data before starting the upgrade

    • Test the new devices in a controlled environment before deploying them

    • Consider any security implications of the upgrade

    • Train staff on how to use the new devices effectively

  • Answered by AI

Skills evaluated in this interview

I applied via Company Website and was interviewed in Oct 2021. There was 1 interview round.

Interview Questionnaire 

3 Questions

  • Q1. Basic Networking Ques- OSI Model, Http, Https, TCP/IP Model etc.
  • Q2. Ques on Project.
  • Q3. Basic Security Terminologies

Interview Preparation Tips

Interview preparation tips for other job seekers - Interview was quite easy, Interviewer was very frank. Just prepare whatever you have mentioned in your Resume.

I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Questions around Risk and Compliance more from practical experience point of view rather than going by book

Interview Preparation Tips

Interview preparation tips for other job seekers - Technical rounds are not easy to crack and needs a good preparation more from JD perspective and one's own experience
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Campus Placement and was interviewed in Dec 2023. There was 1 interview round.

Round 1 - One-on-one 

(2 Questions)

  • Q1. He ask me questions related to cyber security, He give me codes of network security in python and ask me to find the errors in the code
  • Q2. Only 2 rounds of interviews was there, both the interviews were of 45 min duration, first round was easy as compared to the second round

Tell us how to improve this page.

Compare System Electronics & Optronics with

TCS

3.7
Compare

Accenture

3.8
Compare

Wipro

3.7
Compare

Cognizant

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview