Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by TCS Team. If you also belong to the team, you can get access from here

TCS Verified Tick

Compare button icon Compare button icon Compare
3.7

based on 87k Reviews

Filter interviews by

TCS Senior Security Analyst Interview Questions and Answers

Updated 16 Jul 2024

TCS Senior Security Analyst Interview Experiences

1 interview found

Senior Security Analyst Interview Questions & Answers

user image Sethumadhavan Nampoothiri VV

posted on 16 Jul 2024

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Can be hardware-based or software-based

    • Filters traffic based on IP addresses, ports, protocols, and other criteria

    • Helps prevent unauthorized access and cyber attacks

    • Examples include Cisco ASA, Pal

  • Answered by AI
  • Q2. What are the trending security technologies
  • Ans. 

    Some trending security technologies include zero trust security, cloud security, and AI-driven security solutions.

    • Zero trust security: Focuses on verifying identity and enforcing least privilege access controls.

    • Cloud security: Addresses security concerns related to cloud computing and storage.

    • AI-driven security solutions: Utilize artificial intelligence and machine learning to detect and respond to security threats.

    • Blo...

  • Answered by AI
Round 2 - HR 

(1 Question)

  • Q1. Salary discussion

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Job Portal and was interviewed in May 2024. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Tell me about Security incident response framework that you have worked on ?
  • Ans. 

    Implemented a comprehensive security incident response framework to effectively detect, respond to, and recover from security incidents.

    • Developed incident response policies and procedures to outline roles, responsibilities, and escalation paths.

    • Established communication protocols for notifying stakeholders and coordinating response efforts.

    • Conducted regular tabletop exercises and simulations to test the effectiveness o...

  • Answered by AI
  • Q2. Critical incident that you have worked on?
Round 2 - Technical 

(2 Questions)

  • Q1. How do you deal with phishing incidents
  • Ans. 

    I handle phishing incidents by promptly identifying and blocking malicious emails, educating users on how to recognize phishing attempts, and implementing security measures.

    • Promptly identify and block malicious emails

    • Educate users on how to recognize phishing attempts

    • Implement security measures such as email filtering and multi-factor authentication

  • Answered by AI
  • Q2. What is log4j vulnerability and how do you feel with it?
  • Ans. 

    Log4j vulnerability is a critical security flaw in the Apache Log4j logging library that allows remote code execution.

    • Log4j vulnerability (CVE-2021-44228) allows attackers to execute arbitrary code remotely.

    • The vulnerability affects versions 2.0 to 2.14.1 of Apache Log4j.

    • Exploiting the vulnerability can lead to serious security breaches and data exfiltration.

    • Organizations need to patch affected systems immediately and

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Tech Mahindra Senior Security Analyst interview:
  • Incident response
  • Siem tool
  • Edr
  • Xdr
  • Phishing analysis
  • Malware incidents
Interview preparation tips for other job seekers - Prepare for the things that you have mentioned and do not mention anything that you are not aware

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Job Portal and was interviewed in May 2024. There was 1 interview round.

Round 1 - One-on-one 

(2 Questions)

  • Q1. Give details of project
  • Q2. What roles I had
  • Ans. 

    I have held roles such as Security Analyst, Incident Responder, and Security Engineer.

    • Security Analyst: Conducted security assessments and implemented security measures.

    • Incident Responder: Responded to security incidents and conducted forensic investigations.

    • Security Engineer: Designed and implemented security solutions to protect systems and data.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare and give well. Easy to pass
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. About 3 way handshake
  • Q2. About difference between encoding and hashing
Interview experience
4
Good
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
No response

I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. All about siem and implementation
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Dec 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. Explain different ransomware attacks
  • Ans. 

    Ransomware attacks encrypt files and demand payment for decryption.

    • Encrypts files and demands payment for decryption

    • May use social engineering tactics to trick victims into downloading malware

    • May spread through phishing emails, malicious websites, or infected software

    • Examples include WannaCry, Petya, and Locky

  • Answered by AI
  • Q2. What is Port number of SMB
  • Ans. 

    The port number of SMB is 445.

    • SMB stands for Server Message Block.

    • SMB is a protocol used for file sharing and printer sharing.

    • Port 445 is used for direct TCP/IP connection without NetBIOS.

    • Port 139 is also used for SMB over NetBIOS.

  • Answered by AI
  • Q3. What is SMB relay attack
  • Ans. 

    SMB relay attack is a type of attack where an attacker intercepts and relays SMB traffic to gain unauthorized access to a target system.

    • The attacker intercepts SMB traffic between two systems and relays it to gain access to the target system.

    • The attack can be carried out using tools like Responder or Metasploit.

    • The attack can be prevented by disabling SMBv1, using SMB signing, and implementing network segmentation.

    • An e...

  • Answered by AI
Round 3 - HR 

(1 Question)

  • Q1. General discussion about yourself

Interview Preparation Tips

Interview preparation tips for other job seekers - Learn in detail and study based on real life cyberattack and tactics

Skills evaluated in this interview

I applied via Recruitment Consultant and was interviewed in Sep 2021. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Normally they come up in interview with 4-5 guys, they were asking to start scenario based one by one person, question starting from infrastructure of organization, architecture of RSA Netwitness, descr...

Interview Preparation Tips

Interview preparation tips for other job seekers - Be bold & calm, show your interest, be confidence, stick with your answers
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. About the vormetric encryption tool
Round 3 - One-on-one 

(1 Question)

  • Q1. Customer round once technical round cleared
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Oct 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. What is EDR ?
  • Ans. 

    EDR stands for Endpoint Detection and Response, a security solution that monitors and responds to endpoint threats.

    • EDR solutions provide real-time visibility into endpoint activity and behavior.

    • They use advanced analytics and machine learning to detect and respond to threats.

    • EDR solutions can also provide forensic analysis to investigate incidents and identify root causes.

    • Examples of EDR solutions include Carbon Black,...

  • Answered by AI
  • Q2. How EDR works and
  • Ans. 

    EDR stands for Endpoint Detection and Response. It is a security solution that monitors and responds to endpoint threats.

    • EDR solutions use agents installed on endpoints to collect data and send it to a central server for analysis.

    • They use behavioral analysis and machine learning to detect and respond to threats in real-time.

    • EDR solutions can also provide forensic data to investigate incidents and improve security postu...

  • Answered by AI
  • Q3. Process related questions

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare your resume well and try to get the JD about the profile from HR and study the topics accordingly
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Apr 2023. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. As an SOC analyst, what are the main event IDs that you need to monitor?
  • Ans. 

    Main event IDs to monitor as an SOC analyst

    • Event ID 4624 - Successful account logon

    • Event ID 4625 - Failed account logon

    • Event ID 4768 - Kerberos authentication ticket request

    • Event ID 4769 - Kerberos service ticket request

    • Event ID 5140 - Network share access

    • Event ID 5156 - Firewall rule added

    • Event ID 7035 - Service control manager event

    • Event ID 7045 - Service installation

    • Event ID 800 - Windows update installation

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare in detail about the incidents that you have worked on. Read about Phishing analysis, Malware analysis, windows event ID, OSI layer attacks on various layers.

TCS Interview FAQs

How many rounds are there in TCS Senior Security Analyst interview?
TCS interview process usually has 2 rounds. The most common rounds in the TCS interview process are Technical and HR.
What are the top questions asked in TCS Senior Security Analyst interview?

Some of the top questions asked at the TCS Senior Security Analyst interview -

  1. What are the trending security technolog...read more
  2. What is firew...read more

Tell us how to improve this page.

TCS Senior Security Analyst Interview Process

based on 1 interview

Interview experience

5
  
Excellent
View more
TCS Senior Security Analyst Salary
based on 180 salaries
₹3.9 L/yr - ₹16 L/yr
21% less than the average Senior Security Analyst Salary in India
View more details

TCS Senior Security Analyst Reviews and Ratings

based on 7 reviews

3.7/5

Rating in categories

3.6

Skill development

4.1

Work-life balance

2.8

Salary

4.5

Job security

3.9

Company culture

2.5

Promotions

3.7

Work satisfaction

Explore 7 Reviews and Ratings
System Engineer
1.1L salaries
unlock blur

₹1 L/yr - ₹9 L/yr

IT Analyst
67.4k salaries
unlock blur

₹5.1 L/yr - ₹16 L/yr

AST Consultant
51.3k salaries
unlock blur

₹8 L/yr - ₹25 L/yr

Assistant System Engineer
29.9k salaries
unlock blur

₹2.2 L/yr - ₹5.6 L/yr

Associate Consultant
29k salaries
unlock blur

₹9 L/yr - ₹32 L/yr

Explore more salaries
Compare TCS with

Amazon

4.1
Compare

Wipro

3.7
Compare

Infosys

3.6
Compare

Accenture

3.9
Compare
Did you find this page helpful?
Yes No
write
Share an Interview