Upload Button Icon Add office photos

Unisys

Compare button icon Compare button icon Compare

Filter interviews by

Unisys Cyber Security Analyst Interview Questions and Answers

Updated 21 Nov 2024

Unisys Cyber Security Analyst Interview Experiences

2 interviews found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.

Round 1 - Technical 

(3 Questions)

  • Q1. Cyber security attack and remediation
  • Q2. Scenario based questions
  • Q3. Tell me about yourself
Round 2 - HR 

(2 Questions)

  • Q1. Basic questions
  • Q2. Salary discussion
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. Cyber kill chain
  • Q2. Mitre Att&ck frame work
  • Q3. Event life cycle of any siem solution
  • Ans. 

    The event life cycle of a SIEM solution involves several stages from data collection to incident response.

    • Data collection: SIEM collects logs and events from various sources such as network devices, servers, and applications.

    • Normalization: The collected data is normalized to a common format for easier analysis and correlation.

    • Aggregation: Events are grouped together based on common attributes to identify patterns and t...

  • Answered by AI
  • Q4. Port numbers, protocols
  • Q5. Explain OSI model briefly
  • Ans. 

    The OSI model is a conceptual framework that defines the functions of a network protocol stack.

    • The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has a specific function and interacts with the layers above and below it.

    • The model helps in understanding how data is transmitted and received in a network.

    • For example, the Physical layer deals wi...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Basics much important in first round.
In second round expect some scenario based questions.

Skills evaluated in this interview

Cyber Security Analyst Interview Questions Asked at Other Companies

asked in PwC
Q1. 3- If you have received 2 mails from PwC with same name how will ... read more
Q2. When conducting dynamic analysis on a suspicious executable, desc ... read more
Q3. You come across an unknown piece of malware. What methods and too ... read more
asked in PwC
Q4. 5- How will you make your system secure from a user point of view ... read more
asked in PwC
Q5. 1- What do you know about cyber security?

Interview questions from similar companies

I applied via LinkedIn and was interviewed in Jun 2022. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. SQL Injection and CSS Attacks
  • Q2. Port Numbers of different protocols
  • Ans. 

    Port numbers for different protocols

    • HTTP - 80

    • HTTPS - 443

    • FTP - 20, 21

    • SSH - 22

    • SMTP - 25

    • DNS - 53

    • POP3 - 110

    • IMAP - 143

    • LDAP - 389

    • RDP - 3389

  • Answered by AI
  • Q3. Steps to consider after Phishing attack
  • Ans. 

    Steps to take after a phishing attack

    • Immediately disconnect from the internet

    • Change all passwords associated with the compromised account

    • Notify the appropriate parties (IT department, bank, etc.)

    • Run a virus scan on all devices used to access the compromised account

    • Educate yourself and others on how to identify and avoid phishing attacks

  • Answered by AI
  • Q4. Some Alerts/incidents and their remediations.
  • Q5. A couple behavioural questions too

Interview Preparation Tips

Interview preparation tips for other job seekers - Interviewers were quite friendly and cool.
Everything went well.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Feb 2024. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Switching protocols port details
  • Q2. Routung protocols and port details
Round 2 - Technical 

(2 Questions)

  • Q1. Basic OSI, TCP,
  • Q2. DhCP dns working

Interview Preparation Tips

Interview preparation tips for other job seekers - Learn more OSI , protocols, routing ospf , firewall
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
6-8 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before May 2023. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. Easy, CSPM,CWPP Policy related question,Networking, Data structures

I applied via LinkedIn and was interviewed in Jun 2022. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. SQL Injection and CSS Attacks
  • Q2. Port Numbers of different protocols
  • Ans. 

    Port numbers for different protocols

    • HTTP - 80

    • HTTPS - 443

    • FTP - 20, 21

    • SSH - 22

    • SMTP - 25

    • DNS - 53

    • POP3 - 110

    • IMAP - 143

    • LDAP - 389

    • RDP - 3389

  • Answered by AI
  • Q3. Steps to consider after Phishing attack
  • Ans. 

    Steps to take after a phishing attack

    • Immediately disconnect from the internet

    • Change all passwords associated with the compromised account

    • Notify the appropriate parties (IT department, bank, etc.)

    • Run a virus scan on all devices used to access the compromised account

    • Educate yourself and others on how to identify and avoid phishing attacks

  • Answered by AI
  • Q4. Some Alerts/incidents and their remediations.
  • Q5. A couple behavioural questions too

Interview Preparation Tips

Interview preparation tips for other job seekers - Interviewers were quite friendly and cool.
Everything went well.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via campus placement at Madras University and was interviewed before Jun 2023. There were 4 interview rounds.

Round 1 - Aptitude Test 

1st round online aptitude test

Round 2 - Technical 

(2 Questions)

  • Q1. Basic cyber security
  • Q2. Basic networking
Round 3 - Technical 

(2 Questions)

  • Q1. Team management
  • Q2. Personal evaluation
Round 4 - HR 

(2 Questions)

  • Q1. About the company
  • Q2. Basic information

Interview Preparation Tips

Interview preparation tips for other job seekers - prepare well basic cyber security principles and about the company
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. About yourself and what you have done all these things
  • Q2. Why you are willing to join this company
Round 3 - Coding Test 

They test your coding skills how much you can code

Interview Preparation Tips

Interview preparation tips for other job seekers - Please be prepared for the job and speak with confidence

I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.

Interview Questionnaire 

2 Questions

  • Q1. Bgp, vrrp, basic troubleshooting and work experience
  • Q2. Ospf, WAN, LAN and process

Interview Preparation Tips

Interview preparation tips for other job seekers - Interview was about 3 technical rounds with Hr discussion

I applied via Naukri.com and was interviewed in Jul 2020. There were 4 interview rounds.

Interview Questionnaire 

6 Questions

  • Q1. Do you have any experience in Penetration testing?
  • Ans. 

    Yes, I have experience in Penetration testing.

    • I have conducted penetration testing for various clients in different industries.

    • I am familiar with various tools and techniques used in penetration testing such as Metasploit, Nmap, and Burp Suite.

    • I have experience in both manual and automated penetration testing.

    • I have provided detailed reports on vulnerabilities found and recommendations for remediation.

    • I stay up-to-date...

  • Answered by AI
  • Q2. What is your role in previous organization?
  • Q3. How you can implement network segmentation?
  • Ans. 

    Network segmentation can be implemented by creating separate subnetworks and controlling access between them.

    • Identify the different types of data and systems that need to be protected

    • Create separate subnetworks for each type of data/system

    • Use firewalls and access controls to control traffic between subnetworks

    • Regularly review and update the segmentation strategy

    • Example: separating guest Wi-Fi network from corporate net

  • Answered by AI
  • Q4. What is the role of firewall and how it can be used efficiently to improve the security
  • Ans. 

    Firewall is a network security system that monitors and controls incoming and outgoing network traffic.

    • Firewall acts as a barrier between a trusted internal network and untrusted external network

    • It can be used to block unauthorized access to a network

    • It can also be used to block outgoing traffic to prevent data leakage

    • Firewalls can be hardware or software-based

    • Examples of firewalls include Cisco ASA, Fortinet FortiGate

  • Answered by AI
  • Q5. Basic TCP/IP questions
  • Q6. How did you managed to complete a task in which you don't have prior knowledge or experience?

Interview Preparation Tips

Interview preparation tips for other job seekers - Even though you don't know the exact answer, share your relevant ideas and experience

Skills evaluated in this interview

Unisys Interview FAQs

How many rounds are there in Unisys Cyber Security Analyst interview?
Unisys interview process usually has 1-2 rounds. The most common rounds in the Unisys interview process are Technical and HR.
How to prepare for Unisys Cyber Security Analyst interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Unisys. The most common topics and skills that interviewers at Unisys expect are Access management, Audit Compliance, Firmware, Infrastructure and Networking.
What are the top questions asked in Unisys Cyber Security Analyst interview?

Some of the top questions asked at the Unisys Cyber Security Analyst interview -

  1. Event life cycle of any siem solut...read more
  2. Explain OSI model brie...read more
  3. Cyber security attack and remediat...read more

Tell us how to improve this page.

Unisys Cyber Security Analyst Interview Process

based on 2 interviews

Interview experience

4.5
  
Good
View more
Unisys Cyber Security Analyst Salary
based on 41 salaries
₹5.5 L/yr - ₹17.2 L/yr
110% more than the average Cyber Security Analyst Salary in India
View more details

Unisys Cyber Security Analyst Reviews and Ratings

based on 6 reviews

3.0/5

Rating in categories

2.7

Skill development

3.0

Work-life balance

3.8

Salary

2.9

Job security

3.7

Company culture

2.0

Promotions

2.8

Work satisfaction

Explore 6 Reviews and Ratings
Software Engineer
315 salaries
unlock blur

₹3.8 L/yr - ₹16 L/yr

System Analyst
144 salaries
unlock blur

₹4.7 L/yr - ₹16.4 L/yr

Technical Support Engineer
144 salaries
unlock blur

₹2.7 L/yr - ₹7.5 L/yr

Senior Software Engineer
142 salaries
unlock blur

₹7.9 L/yr - ₹27.2 L/yr

Senior Enterprise Associate
127 salaries
unlock blur

₹4.1 L/yr - ₹13 L/yr

Explore more salaries
Compare Unisys with

IBM

4.0
Compare

Accenture

3.8
Compare

HCLTech

3.5
Compare

TCS

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview