Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by UST Team. If you also belong to the team, you can get access from here

UST Verified Tick

Compare button icon Compare button icon Compare
3.8

based on 4.1k Reviews

Filter interviews by

UST Security Analyst Interview Questions and Answers

Updated 19 Mar 2024

UST Security Analyst Interview Experiences

2 interviews found

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. SSL Related ! Qualys VMDR Module scans related ! Application vuln !
  • Q2. Top 10 owasp How to prioritise and remediate vulnerabilities
  • Ans. 

    Prioritizing and remediating vulnerabilities using OWASP Top 10

    • Start by identifying the vulnerabilities that pose the highest risk to the organization

    • Use the OWASP Top 10 as a guide to prioritize vulnerabilities

    • Consider the likelihood and potential impact of each vulnerability

    • Remediate vulnerabilities based on their priority level

    • Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities

    • Example...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Make sure you have projects done with examples to present in interview
Interview experience
4
Good
Difficulty level
Hard
Process Duration
4-6 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Mar 2023. There were 3 interview rounds.

Round 1 - Aptitude Test 

Basic aptitude test at a moderate level

Round 2 - Coding Test 

Understand the coding proficiency of the candidate

Round 3 - Technical 

(1 Question)

  • Q1. Candidate should be prepared on questions security related level

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident and answer to the point. No amount of gaslighting is gonna help you

Security Analyst Interview Questions Asked at Other Companies

Q1. How do you test a web application? What is CSRF and SSRF? What is ... read more
asked in TCS
Q2. What protocols used by nmap Difference between public and private ... read more
Q3. 1. Describe your SOC scenario! 2. What kind of report you prepari ... read more
Q4. Difference between encryption and encoding? With examples and imp ... read more
asked in TCS
Q5. what are the major vulnerabilities you've encounterd? how did you ... read more

Interview questions from similar companies

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Basic questions
Round 2 - Technical 

(1 Question)

  • Q1. Security basic questions

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.

    • Experienced in conducting security assessments and identifying vulnerabilities

    • Skilled in implementing security measures to protect against cyber threats

    • Proficient in analyzing security incidents and responding effectively

    • Certified in relevant security certifications such as CISSP or CISM

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different types of malware
  • Ans. 

    Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

    • Viruses: self-replicating programs that infect other files on a computer

    • Worms: standalone malware that spreads across networks

    • Trojans: disguised as legitimate software to trick users into installing them

    • Ransomware: encrypts files and demands payment for decryption

    • Spyware: secretly gathers information about...

  • Answered by AI
  • Q2. What would you first do if a machine is infected
  • Ans. 

    The first step would be to isolate the infected machine from the network to prevent further spread of the infection.

    • Isolate the infected machine from the network to prevent further spread of the infection

    • Identify the type of malware or virus that has infected the machine

    • Run a full system scan using antivirus software to detect and remove the malware

    • Update the operating system and all software to patch any vulnerabiliti...

  • Answered by AI
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Aug 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. About Experience on Technologies
  • Q2. Current CTC and Expected
Round 3 - Technical 

(4 Questions)

  • Q1. What are Azure Security Policies
  • Ans. 

    Azure Security Policies are a set of rules and configurations that help enforce security controls within Azure environments.

    • Azure Security Policies help ensure compliance with security standards and best practices

    • They can be used to enforce specific security configurations, such as requiring encryption for storage accounts

    • Policies can be assigned at the subscription, resource group, or resource level

  • Answered by AI
  • Q2. How do we use Conditional Access in Azure
  • Ans. 

    Conditional Access in Azure is used to control access to resources based on specific conditions.

    • Conditional Access policies can be set up to require multi-factor authentication for certain users or devices

    • It can restrict access based on location, device compliance, or other factors

    • Conditional Access can be used to enforce policies such as requiring a compliant device to access sensitive data

  • Answered by AI
  • Q3. Regarding MFA, VPN, GPO
  • Q4. What is Active Directory Federation Service
  • Ans. 

    Active Directory Federation Service (AD FS) is a feature in Windows Server that allows for single sign-on authentication across multiple systems.

    • AD FS allows users to access multiple applications with a single set of credentials

    • It enables secure sharing of identity information between trusted partners

    • AD FS uses claims-based authentication to verify user identity

    • It supports integration with cloud-based services like Off

  • Answered by AI

Skills evaluated in this interview

I applied via Referral

Interview Questionnaire 

3 Questions

  • Q1. Incident, Change, Problem management
  • Q2. Business Process related
  • Q3. Technical Tools related

Interview Preparation Tips

Interview preparation tips for other job seekers - Just be confident while giving the interview. Try to stick with the topic. If don't know the answer simply say sto.
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I was interviewed in Oct 2024.

Round 1 - Technical 

(1 Question)

  • Q1. Hashing and Encryption
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Selected Selected

I was interviewed before Apr 2022.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. What is ISO 27001 ?
  • Ans. 

    ISO 27001 is a globally recognized standard for information security management.

    • ISO 27001 provides a framework for managing and protecting sensitive information.

    • It outlines a risk management process to identify, assess, and treat information security risks.

    • ISO 27001 requires organizations to implement and maintain a set of policies, procedures, and controls to ensure the confidentiality, integrity, and availability of ...

  • Answered by AI
  • Q2. What are DLP policies?
  • Ans. 

    DLP policies are rules and procedures that prevent sensitive data from being accessed, used, or shared inappropriately.

    • DLP policies can be used to prevent data breaches and protect sensitive information.

    • They can include rules for identifying and classifying sensitive data, as well as procedures for monitoring and controlling access to that data.

    • Examples of DLP policies include restricting access to certain files or fol...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be thorough with what is written in the CV. Learn and Understand the key items of the Information security processes like Risk Management, Assessment.

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Basic questions
Round 2 - Technical 

(1 Question)

  • Q1. Security basic questions

UST Interview FAQs

How many rounds are there in UST Security Analyst interview?
UST interview process usually has 2-3 rounds. The most common rounds in the UST interview process are Technical, Resume Shortlist and Aptitude Test.
How to prepare for UST Security Analyst interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at UST. The most common topics and skills that interviewers at UST expect are Risk Assessment, SIEM, SOC and Security Audit.
What are the top questions asked in UST Security Analyst interview?

Some of the top questions asked at the UST Security Analyst interview -

  1. Top 10 owasp How to prioritise and remediate vulnerabilit...read more
  2. Candidate should be prepared on questions security related le...read more
  3. SSL Related ! Qualys VMDR Module scans related ! Application vul...read more

Tell us how to improve this page.

People are getting interviews through

based on 1 UST interview
Referral
100%
Low Confidence
?
Low Confidence means the data is based on a small number of responses received from the candidates.
UST Security Analyst Salary
based on 61 salaries
₹3.8 L/yr - ₹8.8 L/yr
8% less than the average Security Analyst Salary in India
View more details

UST Security Analyst Reviews and Ratings

based on 2 reviews

3.3/5

Rating in categories

3.3

Skill development

3.3

Work-Life balance

3.3

Salary & Benefits

3.3

Job Security

3.3

Company culture

3.3

Promotions/Appraisal

3.3

Work Satisfaction

Explore 2 Reviews and Ratings
Software Developer
2k salaries
unlock blur

₹3.5 L/yr - ₹12.1 L/yr

Senior Software Engineer
1.6k salaries
unlock blur

₹6.5 L/yr - ₹26 L/yr

Software Engineer
1.3k salaries
unlock blur

₹3.7 L/yr - ₹14.6 L/yr

System Analyst
1.2k salaries
unlock blur

₹6.5 L/yr - ₹22.2 L/yr

Senior Software Developer
1.1k salaries
unlock blur

₹5.5 L/yr - ₹19.6 L/yr

Explore more salaries
Compare UST with

TCS

3.7
Compare

Infosys

3.7
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview