Upload Button Icon Add office photos

Unisys

Compare button icon Compare button icon Compare

Filter interviews by

Clear (1)

Unisys Cyber Security Analyst Interview Questions and Answers

Updated 21 Nov 2024

Unisys Cyber Security Analyst Interview Experiences

2 interviews found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.

Round 1 - Technical 

(3 Questions)

  • Q1. Cyber security attack and remediation
  • Q2. Scenario based questions
  • Q3. Tell me about yourself
Round 2 - HR 

(2 Questions)

  • Q1. Basic questions
  • Q2. Salary discussion
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. Cyber kill chain
  • Q2. Mitre Att&ck frame work
  • Q3. Event life cycle of any siem solution
  • Ans. 

    The event life cycle of a SIEM solution involves several stages from data collection to incident response.

    • Data collection: SIEM collects logs and events from various sources such as network devices, servers, and applications.

    • Normalization: The collected data is normalized to a common format for easier analysis and correlation.

    • Aggregation: Events are grouped together based on common attributes to identify patterns and t...

  • Answered by AI
  • Q4. Port numbers, protocols
  • Q5. Explain OSI model briefly
  • Ans. 

    The OSI model is a conceptual framework that defines the functions of a network protocol stack.

    • The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has a specific function and interacts with the layers above and below it.

    • The model helps in understanding how data is transmitted and received in a network.

    • For example, the Physical layer deals wi...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Basics much important in first round.
In second round expect some scenario based questions.

Skills evaluated in this interview

Cyber Security Analyst Interview Questions Asked at Other Companies

asked in PwC
Q1. 3- If you have received 2 mails from PwC with same name how will ... read more
Q2. When conducting dynamic analysis on a suspicious executable, desc ... read more
Q3. You come across an unknown piece of malware. What methods and too ... read more
asked in PwC
Q4. 5- How will you make your system secure from a user point of view ... read more
asked in PwC
Q5. 1- What do you know about cyber security?

Interview questions from similar companies

I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.

Interview Questionnaire 

3 Questions

  • Q1. What are the concepts in OOPS, with examples ?
  • Ans. 

    OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.

    • Inheritance allows a class to inherit properties and methods from another class.

    • Encapsulation is the practice of hiding data and methods within a class.

    • Polymorphism allows objects to take on multiple forms or behaviors.

    • Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.

    • Example...

  • Answered by AI
  • Q2. Join Operation in SQL, Queries for some problems ?
  • Q3. Python Basics

Interview Preparation Tips

Interview preparation tips for other job seekers - I got placed for the initial role of Assistant System Engineer and the interview was pretty much simple and they asked basic questions. Like about OOPS, Python, SQL etc. I also did an internship with TCS, so they asked me about that too. Other than that, they asked about the Main Project, Mini Project that I did during my school time.

I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Domain based

Interview Preparation Tips

Interview preparation tips for other job seekers - Give your best !
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - English language assessment 

(1 Question)

  • Q1. Easy english questions
Round 3 - Technical 

(1 Question)

  • Q1. This was interview round where generally basic cyber security questions were asked.

Interview Preparation Tips

Interview preparation tips for other job seekers - It is easy to get selected but they require that we complete comptia+ certification for full time employment

I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Questions around Risk and Compliance more from practical experience point of view rather than going by book

Interview Preparation Tips

Interview preparation tips for other job seekers - Technical rounds are not easy to crack and needs a good preparation more from JD perspective and one's own experience

I applied via Recruitment Consultant and was interviewed in Sep 2021. There were 4 interview rounds.

Interview Questionnaire 

2 Questions

  • Q1. Some technical question basic and overall knowledge
  • Q2. I have givne basic answer which I have done during preparation

Interview Preparation Tips

Interview preparation tips for other job seekers - Be what you know and tell Frankely
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Behavioral 

(5 Questions)

  • Q1. IP related work email blocking related
  • Q2. IP blocked login devices and check malicious IP in devices option.
  • Ans. 

    IP blocking is a common security measure to prevent unauthorized access to devices and networks.

    • Implement IP blocking on login devices to prevent unauthorized access from specific IPs.

    • Regularly check for malicious IPs in devices and block them to prevent security breaches.

    • Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.

    • Consider implementing automated scripts or tools to s...

  • Answered by AI
  • Q3. Email Gateway block the email spam if we received
  • Ans. 

    Yes, email gateways can block email spam if configured properly.

    • Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.

    • Spam emails are typically identified based on keywords, sender reputation, and other factors.

    • Advanced email gateways may also use machine learning algorithms to detect and block spam.

    • Regular updates and monitoring of email gateway s...

  • Answered by AI
  • Q4. F5device for security for white listing
  • Ans. 

    F5 devices can be used for security white listing to control access to specific applications or services.

    • F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.

    • This helps prevent unauthorized access and reduces the attack surface for potential threats.

    • For example, an organization can use F5 devices to white list specific IP addresses for remote

  • Answered by AI
  • Q5. Cisco devices for email and IP upgrade
  • Ans. 

    When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.

    • Ensure compatibility of new devices with existing infrastructure

    • Backup configurations and data before starting the upgrade

    • Test the new devices in a controlled environment before deploying them

    • Consider any security implications of the upgrade

    • Train staff on how to use the new devices effectively

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.

Round 1 - Coding Test 

C,C#,C++,Dart,Go,Type script

Round 2 - Technical 

(2 Questions)

  • Q1. How can you create a virus to correct a crashed server? Answer : a. Read all data console. B. using any server detector . C. Use advance knowledge on cybersecurity difference system to quick recreate. Answ...
  • Q2. Answer my Q1 and try to contact me

Interview Preparation Tips

Interview preparation tips for other job seekers - Find me the answer for my question
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - HR 

(1 Question)

  • Q1. Something say about yourself
Round 3 - Technical 

(1 Question)

  • Q1. Current environment
Round 4 - Technical 

(1 Question)

  • Q1. Deep drive synairo base question

Interview Preparation Tips

Interview preparation tips for other job seekers - Speak confedence
Contribute & help others!
anonymous
You can choose to be anonymous

Unisys Interview FAQs

How many rounds are there in Unisys Cyber Security Analyst interview?
Unisys interview process usually has 1-2 rounds. The most common rounds in the Unisys interview process are Technical and HR.
How to prepare for Unisys Cyber Security Analyst interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Unisys. The most common topics and skills that interviewers at Unisys expect are Access management, Audit Compliance, Firmware, Infrastructure and Networking.
What are the top questions asked in Unisys Cyber Security Analyst interview?

Some of the top questions asked at the Unisys Cyber Security Analyst interview -

  1. Event life cycle of any siem solut...read more
  2. Explain OSI model brie...read more
  3. Cyber security attack and remediat...read more

Recently Viewed

JOBS

Browse jobs

Discover jobs you love

COMPANY BENEFITS

KNR Constructions

20 benefits

COMPANY BENEFITS

IRB Infrastructure

60 benefits

COMPANY BENEFITS

Dilip Buildcon

304 benefits

COMPANY BENEFITS

Dilip Buildcon

304 benefits

INTERVIEWS

Emirates Airlines

No Interviews

INTERVIEWS

Born Group

No Interviews

INTERVIEWS

Ganit Inc

No Interviews

DESIGNATION

INTERVIEWS

Agilisium

No Interviews

Tell us how to improve this page.

Unisys Cyber Security Analyst Interview Process

based on 2 interviews

Interview experience

4.5
  
Good
View more
Unisys Cyber Security Analyst Salary
based on 41 salaries
₹5.5 L/yr - ₹17.2 L/yr
110% more than the average Cyber Security Analyst Salary in India
View more details

Unisys Cyber Security Analyst Reviews and Ratings

based on 6 reviews

3.0/5

Rating in categories

2.7

Skill development

3.0

Work-life balance

3.8

Salary

2.9

Job security

3.7

Company culture

2.0

Promotions

2.8

Work satisfaction

Explore 6 Reviews and Ratings
Software Engineer
315 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Technical Support Engineer
146 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

System Analyst
144 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Software Engineer
143 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Enterprise Associate
127 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare Unisys with

IBM

4.0
Compare

Accenture

3.8
Compare

HCLTech

3.5
Compare

TCS

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview