information security analyst interview, possible questions...?
chickenlicken09
Member Posts: 537 ■■■■□□□□□□
Hi,
I have an initial phone interview for an info sec analyst role and wondered if you guys would be so kind as to suggest
possible questions that may come up Will be my first info sec role if i manage to land it.
Cheers
I have an initial phone interview for an info sec analyst role and wondered if you guys would be so kind as to suggest
possible questions that may come up Will be my first info sec role if i manage to land it.
Cheers
Comments
-
cyberguypr Mod Posts: 6,928 ModTitles mean nothing. A job description would be more useful for us to provide ideas.
-
E Double U Member Posts: 2,233 ■■■■■■■■■■I remember going into detail regarding my former roles at a telco (NOC, config/migrations, SOC). Then the CISO asked me a troubleshooting question and I drew a diagram of a network with a firewall in the center and three interfaces (inside, outside, dmz). I had some switches, routers, servers, and workstations on there too. I used the diagram to explain where I would begin troubleshooting and how I would do it.
Sorry if that's vague, but I'm pretty tired right now and it has been a few years since that day. Like cyberguypr says, it depends on the job description. When I spoke to the HR VP about the position, I was honest about the areas that I lacked in the job description (SQL, active directory). They also wanted someone with three years of security experience and I only had one. When I interviewed with the CISO, he didn't bother asking me questions about the things I already said I didn't know. He just focused on the skills from my resume that matched the job description.Alphabet soup from (ISC)2, ISACA, GIAC, EC-Council, Microsoft, ITIL, Cisco, Scrum, CompTIA, AWS -
chickenlicken09 Member Posts: 537 ■■■■□□□□□□cyberguypr wrote: »Titles mean nothing. A job description would be more useful for us to provide ideas.
The role of an Information Security Analyst is to develop, implement and manage effective information security controls, in line with the GECC Information Security Policy, and to fully meet our UK and US regulatory requirements. They also support Capital UK business initiatives to ensure compliance with policy and undertake security assessments of internal systems & controls, plus third-party service providers.
Essential Responsibilities:
The Information Security Analyst is responsible for the implementation of Information Security policies and procedures.Additionally this role will be responsible for the design, review and creation of regular security control metrics for inclusion in security dashboards and key risk indicators.
A thorough understanding of Information Security control design and implementation is essential. As a subject matter expert in Information Security you will be a point of contact for all matters related to IT security controls, security risk management and policy compliance.
The Security Analyst is accountable for:
Ensuring IT projects and changes meet the security policy, security activities are part of the software development life cycle, and drive standardisation across IT
Lead data loss prevention projects across applications, databases, end-points and servers
Perform IT Security risk assessments of information systems, document findings and prioritise remediation plans, engaging technical teams as required
Work with specialist teams to perform software security assessments, penetration tests and vulnerability scans
Serve as an internal consultant to the UK business and support internal and regulatory audits
Conduct security assessments on 3rd Party services
Work with technologies including Qualys, DLP, McAfee Endpoint Security and others, to detect, analyse, and remediate security defects across the enterprise
Lead security awareness initiatives
Lead digital security incident detection and response, and provide summary analysis for senior leadership briefings
Qualifications/Requirements:
Strong track record of managing IT Security in a regulated retail financial services environment
Deep understanding of the IT Security products applicable to this industry
Experience with leading and documenting IT Security Audits and Risk Assessments
Understanding of IT Security policy and procedures and their enforcement
Strong problem solving skills, communicates in a clear and succinct manner
Strong evidence of collaborating with multi-stakeholder teams with internal and external resource
Practical knowledge of COBIT 4 BS ISO/IEC 17799 and BS ISO/IEC 27001/27002, Sarbanes Oxley, with proven certification experience
Ability to work under tight deadlines and to prioritize under pressure
Broad business perspective with proven strategic analytical capability
BSc in Information Technology or related discipline
Applicable security certification desired e.g. CISSP, CISA, SSCP, GSEC, CLSP, MCP, CEH Security+ -
Danielm7 Member Posts: 2,310 ■■■■■■■■□□While it would be your first security position, do you have any experience with any of their requirements? Maybe anything close to that?
-
chickenlicken09 Member Posts: 537 ■■■■□□□□□□no just my security+ knowledge, they must see something i dont lol
But i would love to get it. -
cyberguypr Mod Posts: 6,928 ModHmm... I'm confused. For a job description like this I would be looking at a tried-and-true candidate. The requirements clearly stipulate experience is required and even refer to the candidate as an SME. Did you by any chance get this from a recruiter? Do you know the role of the person you will be talking to? That will determine the scope of the questions.
-
chickenlicken09 Member Posts: 537 ■■■■□□□□□□cyberguypr wrote: »Hmm... I'm confused. For a job description like this I would be looking at a tried-and-true candidate. The requirements clearly stipulate experience is required and even refer to the candidate as an SME. Did you by any chance get this from a recruiter? Do you know the role of the person you will be talking to? That will determine the scope of the questions.
yes a recruiter, interview is with GRC Security leader and governance analyst. -
dou2ble Member Posts: 160At a minimum you better have overview knowledge of all those laws and regulations, and how they pertain to US and UK. Not trying to pick on you but are you familiar or have experience with the tasks listed?
How would you handle this one?
"Lead digital security incident detection and response, and provide summary analysis for senior leadership briefings"
Recruiters often get ones hopes up and to be honest I think you're a few years away from being ready for a spot like this. I would still pursue it and get the interviewing experience. I used to do this because it gives you an idea of what that position requires. It's possible this employer doesn't want to pay much so they'll let you grow into it. But if it pays a lot then the expectations will be greater.2015 Goals: Masters in Cyber Security -
chickenlicken09 Member Posts: 537 ■■■■□□□□□□At a minimum you better have overview knowledge of all those laws and regulations. Not trying to pick on you but are you familiar with the tasks listed?
How would you handle this one?
"Lead digital security incident detection and response, and provide summary analysis for senior leadership briefings"
Recruiters often get ones hopes up and to be honest I think you're a few years away from being ready for a spot like this. It's possible this employer doesn't want to pay much so they'll let you grow into it. But if it pays a lot then the expectations will be greater.
ya i realise that, thats why i will let them take the lead. Im just going to be honest i dont have expectations tbh. if anything its experience. -
Cyberscum Member Posts: 795 ■■■■■□□□□□Typical GRC job. Better have experience....or be a killer interviewer. I know a few guys with little experience in GRC that landed nice roles because they showed great attitude, ability to learn and willingness to excel in the interviews. Good luck.
Possible questions:
What is the greatest threat to the "X" environment?
What is your main goal n INFOSEC?
How do you handle a data spill?
What would you do if you were Michael Jackson?
.......It all depends on who and what you are applying or.... -
TechGuru80 Member Posts: 1,539 ■■■■■■□□□□What do you know about xyz and complying?
What type of vulnerability assessment tools do you have experience with?
What types of things would you look for in audit logs?