Cyber Analyst Interview Questions


Cyber Analyst interview questions shared by candidates

Top Interview Questions

Sort: Relevance|Popular|Date
American Institutes for Research
Senior Cyber Security Engineer was asked...July 28, 2015

What sort of anomalies would you look for to identify a compromised system?

1 Answers

I used a whiteboard to draw out a basic network architecture including security technologies like IPS/IDS, Firewalls, AV, etc, and described the type of traffic and logs I could use to identify a compromised system. Less

Thermo Fisher Scientific

Tell me about​ yourself?

7 Answers

I’m a fantastic person looking to pay my bills

I am a hairdresser for 23 years looking for different opportunities with benefits Less

I am a hairdresser for 23 years looking for different opportunities with benefits Less

Show More Responses
US Air Force

Do you have a high school diploma?

4 Answers

Yes. Here it is.



Show More Responses

What is cyber security? What does Deloitte do?

3 Answers

Did you hear back from them?

I have a second round office interview on November 3rd!

hey how did that interview go? what kind of questions do they ask?

Raytheon Technologies

Reverse the individual words in a string maintaining case sensitivity and white space. (char array). input[] = "Apple Banana Cherry" output[] = "elppA ananaB yrrehC"

3 Answers

#include #include using namespace std; void revstr(string &s, string &buf) { string delims = " \t"; buf = ""; int wsp; int i, j; for (i = 0; i < s.length(); i = wsp + 1) { wsp = s.find_first_of(delims, i); if (wsp == string::npos) { wsp = s.length(); } for (j = i; j < wsp; j++) { buf.append(1,s[wsp - (j-i) - 1]); } buf.append(1, s[wsp]); } } int main() { string str = "Apple Banana Cherry"; string buf; cout << "input = " << str << endl; revstr(str, buf); cout << "output = " << buf << endl; return 0; } Less

The above code is in c++. The first 2 lines ought to read "#include " and "#include " Less

wow, let's try this again; In the c++ code posted above, you need to include the iostream library and string library. Less


What is your availability and ability to get the job done

3 Answers

I am available 24/7 whenever wherever


I am available full time


What is the CIA Triad?

3 Answers

Confidentiality, Integrity and Availability*

“These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA triad. Together, these three principles form the cornerstone of any organization's security infrastructure; in fact, they (should) function as goals and objectives for every security program.” Less

confidentiality, integrity, accountablity

Metropolitan State University

Have you had much teaching experience?

2 Answers

Yes, I had taught numerous levels in education and in within non-education positions. Less


Best Buy

What is the difference between UDP and TCP?

2 Answers

TCP establishes connection before data transfer is done. In addition, any packet loss during transmission is re-transmitted for reliability. In UDP no connection is established before data is transferred. Less

How long did it take you to get the offer after the inteview ?


Analyze these 3 files

2 Answers


Because they had no tools and no lab to analyze within, I literally hashed them and compared the MD5 to reports online. Every malware analyst knows that this is NOT analysis, but short of building a lab with access to no VM's, having an isolated host, or wasting time by downloading static tools, this is all I could do. Less

Viewing 1 - 10 of 2,883 interview questions

See Interview Questions for Similar Jobs

security analystsecurity researcherthreat analystdigital forensic analyst

Glassdoor has 2,883 interview questions and reports from Cyber analyst interviews. Prepare for your interview. Get hired. Love your job.