Security Analyst Interview - Some of what you need to know:
Hey all,
Security is such a hot topic here in terms of getting in, certs, knowledge, etc. that I thought I would create a thread on my most recent interview for a Security Analyst position. This is for what they call an 'L1' interview; for those who may have little or no experience in security but have shown interest/understanding of security and bring knowledge to the table that would be useful in a security environment - or in my case having even a little experience gets me calls for new infosec jobs all the time.
In my case I have a small amount of experience working in a SOC doing network log analysis (SIEM), proxy changes, and firewall changes. Here are some of what was asked of me in an interview I had last week:
-First and foremost, Linux. It's everywhere in infosec as many of you know. I won't get too specific on this, but definitely dig in and learn Linux.
-Incident Response methodologies - Which IR methodology do you subscribe to, and please explain it. Can certain steps of your IR methodology be skipped or combined? Give examples.
-Name some infosec conferences you have attended. What security blogs do you review? Where do you get your security news? Who do you look up to in security and why?
-TCP/IP - What is TCP/IP? Explain how TCP works and be as detailed as possible. How does that differ from UDP? Explain from end-to-end how DNS works. Name as many protocols and their corresponding ports as you can. What is the difference between active and passive FTP, and how is it relevant to a stateful firewall? What is the difference between a stateful firewall and a packet-filtering firewall? What is the difference between IDS and IPS? Explain how each one might have an advantage over the other. As you can see, questions evolve from other questions, and the interview was very dynamic in the sense that new questions also stemmed from some of the answers I gave.
-Behavioral / point of view / maturity questions - One might be told that Company A wants to "downgrade" from Windows to Linux and asked how to go about doing that. These types of questions are geared toward weeding out the fanboys who cannot rise above their lust for a certain technology to admit that all platforms have advantages. Event if you don't truly believe all platforms have advantages it is vital to accept that the business runs the show, not the security department and sometimes we don't always get what we want.
-Experience questions: The interviewers handed me a piece of paper with a log on it. I was asked what kind of log it was and to analyze what it was telling me. From there, I was asked to make determinations about this traffic and explain exactly how I got to those conclusions. The reason I call this an "experience" question is because if one has never seen that type of log in their life, they may have no idea what it was or how to approach it. This is where manufacturing experience comes into play - setup different types of logging at home, review it, analyze it, etc. That way if you have never worked in security and someone hands you that log you can at least begin to assess what's going on. We do it for Cisco with our labs and the same holds true here. Examples of this are firewall logs, proxy, windows logging, linux.
-Code: I said this in a post the other day - Do yourselves a huge favor and learn to script and at least learn to read some code. I put it off forever and it is biting me in the butt. I'm basically drinking from the firehose trying to get up to speed. Much like the Linux thing I won't get too detailed about why/how, just learn it.
-Last but not least know what you claim to know. This applies to all jobs of course, but do not put anything on your resume that you cannot defend in detail with specific examples. This interviewer did an excellent job of attempting to weed out any BS. If I didn't know something, I flat out said I didn't know it. In cases like that showcase your resourcefulness and demonstrate how you go about finding the right answer. If you bomb an interview because you were asked a ton of application security questions, when you never claimed to know appsec in the first place, move on without dwelling on it - IMO that is a bad interview setup by people who did not properly match candidates with the job responsibilities.
There was much more to this interview, it was basically rapid fire for an hour and a half. I did want to put a high level overview out there of what I see / what is expected of me as an L1 in security. This is my perspective as a relative newb in security and I'm sure the more tenured and knowledgeable security people here will disagree with some things or maybe have more to add. I hope this helps some of you.