Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Tech Mahindra Team. If you also belong to the team, you can get access from here

Tech Mahindra Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Clear (1)

Tech Mahindra Cyber Security Analyst Interview Questions, Process, and Tips

Updated 2 Jan 2024

Top Tech Mahindra Cyber Security Analyst Interview Questions and Answers

Tech Mahindra Cyber Security Analyst Interview Experiences

2 interviews found

Cyber Security Analyst Interview Questions & Answers

user image Mushtaque Hashmi

posted on 2 Jan 2024

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Behavioral 

(5 Questions)

  • Q1. IP related work email blocking related
  • Q2. IP blocked login devices and check malicious IP in devices option.
  • Ans. 

    IP blocking is a common security measure to prevent unauthorized access to devices and networks.

    • Implement IP blocking on login devices to prevent unauthorized access from specific IPs.

    • Regularly check for malicious IPs in devices and block them to prevent security breaches.

    • Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.

    • Consider implementing automated scripts or tools to s...

  • Answered by AI
  • Q3. Email Gateway block the email spam if we received
  • Ans. 

    Yes, email gateways can block email spam if configured properly.

    • Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.

    • Spam emails are typically identified based on keywords, sender reputation, and other factors.

    • Advanced email gateways may also use machine learning algorithms to detect and block spam.

    • Regular updates and monitoring of email gateway s...

  • Answered by AI
  • Q4. F5device for security for white listing
  • Ans. 

    F5 devices can be used for security white listing to control access to specific applications or services.

    • F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.

    • This helps prevent unauthorized access and reduces the attack surface for potential threats.

    • For example, an organization can use F5 devices to white list specific IP addresses for remote

  • Answered by AI
  • Q5. Cisco devices for email and IP upgrade
  • Ans. 

    When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.

    • Ensure compatibility of new devices with existing infrastructure

    • Backup configurations and data before starting the upgrade

    • Test the new devices in a controlled environment before deploying them

    • Consider any security implications of the upgrade

    • Train staff on how to use the new devices effectively

  • Answered by AI

Skills evaluated in this interview

I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Questions around Risk and Compliance more from practical experience point of view rather than going by book

Interview Preparation Tips

Interview preparation tips for other job seekers - Technical rounds are not easy to crack and needs a good preparation more from JD perspective and one's own experience

Cyber Security Analyst Interview Questions Asked at Other Companies

asked in PwC
Q1. 3- If you have received 2 mails from PwC with same name how will ... read more
Q2. When conducting dynamic analysis on a suspicious executable, desc ... read more
Q3. You come across an unknown piece of malware. What methods and too ... read more
asked in PwC
Q4. 5- How will you make your system secure from a user point of view ... read more
asked in PwC
Q5. 1- What do you know about cyber security?

Interview questions from similar companies

I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.

Interview Questionnaire 

3 Questions

  • Q1. What are the concepts in OOPS, with examples ?
  • Ans. 

    OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.

    • Inheritance allows a class to inherit properties and methods from another class.

    • Encapsulation is the practice of hiding data and methods within a class.

    • Polymorphism allows objects to take on multiple forms or behaviors.

    • Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.

    • Example...

  • Answered by AI
  • Q2. Join Operation in SQL, Queries for some problems ?
  • Q3. Python Basics

Interview Preparation Tips

Interview preparation tips for other job seekers - I got placed for the initial role of Assistant System Engineer and the interview was pretty much simple and they asked basic questions. Like about OOPS, Python, SQL etc. I also did an internship with TCS, so they asked me about that too. Other than that, they asked about the Main Project, Mini Project that I did during my school time.

I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Domain based

Interview Preparation Tips

Interview preparation tips for other job seekers - Give your best !
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - English language assessment 

(1 Question)

  • Q1. Easy english questions
Round 3 - Technical 

(1 Question)

  • Q1. This was interview round where generally basic cyber security questions were asked.

Interview Preparation Tips

Interview preparation tips for other job seekers - It is easy to get selected but they require that we complete comptia+ certification for full time employment

I applied via Recruitment Consultant and was interviewed in Sep 2021. There were 4 interview rounds.

Interview Questionnaire 

2 Questions

  • Q1. Some technical question basic and overall knowledge
  • Q2. I have givne basic answer which I have done during preparation

Interview Preparation Tips

Interview preparation tips for other job seekers - Be what you know and tell Frankely
Interview experience
3
Average
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.

Round 1 - Coding Test 

C,C#,C++,Dart,Go,Type script

Round 2 - Technical 

(2 Questions)

  • Q1. How can you create a virus to correct a crashed server? Answer : a. Read all data console. B. using any server detector . C. Use advance knowledge on cybersecurity difference system to quick recreate. Answ...
  • Q2. Answer my Q1 and try to contact me

Interview Preparation Tips

Interview preparation tips for other job seekers - Find me the answer for my question
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - HR 

(1 Question)

  • Q1. Something say about yourself
Round 3 - Technical 

(1 Question)

  • Q1. Current environment
Round 4 - Technical 

(1 Question)

  • Q1. Deep drive synairo base question

Interview Preparation Tips

Interview preparation tips for other job seekers - Speak confedence

I applied via Company Website and was interviewed in Oct 2021. There was 1 interview round.

Interview Questionnaire 

3 Questions

  • Q1. Basic Networking Ques- OSI Model, Http, Https, TCP/IP Model etc.
  • Q2. Ques on Project.
  • Q3. Basic Security Terminologies

Interview Preparation Tips

Interview preparation tips for other job seekers - Interview was quite easy, Interviewer was very frank. Just prepare whatever you have mentioned in your Resume.
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - Technical 

(1 Question)

  • Q1. What is cyber security
  • Ans. 

    Cyber security is the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.

    • Cyber security involves implementing measures to prevent cyber attacks and data breaches

    • It includes protecting against viruses, malware, and other malicious software

    • Cyber security also involves educating users on safe online practices

    • Examples of cyber security measures include fi...

  • Answered by AI
Round 3 - Technical 

(1 Question)

  • Q1. What is security
  • Ans. 

    Security refers to the measures taken to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information.

    • Security involves protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction

    • It includes measures such as encryption, firewalls, access controls, and security policies

    • Security is important in all areas, including personal, b...

  • Answered by AI

Skills evaluated in this interview

Contribute & help others!
anonymous
You can choose to be anonymous

Tech Mahindra Interview FAQs

How many rounds are there in Tech Mahindra Cyber Security Analyst interview?
Tech Mahindra interview process usually has 1 rounds. The most common rounds in the Tech Mahindra interview process are Behavioral.
What are the top questions asked in Tech Mahindra Cyber Security Analyst interview?

Some of the top questions asked at the Tech Mahindra Cyber Security Analyst interview -

  1. IP blocked login devices and check malicious IP in devices opti...read more
  2. email Gateway block the email spam if we recei...read more
  3. F5device for security for white list...read more

Recently Viewed

INTERVIEWS

KPMG India

No Interviews

INTERVIEWS

Khazana Jewellery

No Interviews

INTERVIEWS

Khazana Jewellery

No Interviews

INTERVIEWS

Khazana Jewellery

No Interviews

INTERVIEWS

Khazana Jewellery

No Interviews

DESIGNATION

INTERVIEWS

Khazana Jewellery

No Interviews

SALARIES

Kashtam Technologies

INTERVIEWS

3 Minds Digital

No Interviews

INTERVIEWS

SecurView Systems

No Interviews

Tell us how to improve this page.

Tech Mahindra Cyber Security Analyst Interview Process

based on 1 interview

Interview experience

4
  
Good
View more
Tech Mahindra Cyber Security Analyst Salary
based on 139 salaries
₹2.8 L/yr - ₹8.5 L/yr
17% less than the average Cyber Security Analyst Salary in India
View more details

Tech Mahindra Cyber Security Analyst Reviews and Ratings

based on 8 reviews

2.6/5

Rating in categories

3.0

Skill development

2.6

Work-life balance

2.1

Salary

2.5

Job security

2.0

Company culture

1.7

Promotions

2.7

Work satisfaction

Explore 8 Reviews and Ratings
Software Engineer
26.3k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Software Engineer
21.4k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Technical Lead
11.7k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Associate Software Engineer
5.5k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Team Lead
5k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare Tech Mahindra with

Infosys

3.6
Compare

Cognizant

3.7
Compare

Accenture

3.8
Compare

Wipro

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview