Information Security Officer Interview Questions


Information Security Officer interview questions shared by candidates

Top Interview Questions

Sort: Relevance|Popular|Date
Information Security Analyst was asked...September 22, 2015

That is a SQL buffer Overflow

1 Answers

SQL buffer Overflow is a malicious actor trying to inject a SQL code within an SQL command to gain access and flood the connection of the desired attack Less


Fale da sua experiência

6 Answers

Tenho algumas experiências com vendas e preciso de um emprego

Tenho experiência com venda online,e gostaria muito de trabalhar nessa empresa

Tenho experiência em postagem de publicidade, informações e comunicação social.

Show More Responses
Frontline Education

How many years of formal CISO title do you have?

4 Answers

More than enough to call out a lazy leader

I think nothing will change if all recruiters in the world are fired.

Finally, we hired somebody after 6 months. With COVID-19, we will fire him soon. Seems like a looser who will not survive Less

Show More Responses

General and quality was directly proportional to the recruiters experience

3 Answers

And the role reports to a VP, customer success. What a joke and looks like they need a glorified secretary and a throat to choke Less

They will ask for your salary range and if you ask the range on their end they will say they don’t know yet Less

They hired somebody for cheap. With probably very minimal HIPAA knowledge and an expired CISSP credential. Less


There was not a difficult question. The process was straight forward.

2 Answers

Quick question. Does TraceSecurity require you to work in Baton Rouge while not on site with a client? Or do they have telecommuting options? Less

No. They don't have telecommute options.

Costco Wholesale

Most programmers and security personnel leave a back door or something open for future. If you had to choose one company or job that "if you suddenly turned evil" you would go back to and use that knowledge for profit or gain. Where would it be and what would you do?

2 Answers

Sounds like a honeypot question to ask ☺

This is what gets most people so be prepared to answer it.

Costco Wholesale

Do you have experience writing Policies?

2 Answers

I have considerable experience not only at IBM but working with JDE clients including Councils and pharma both UK and abroad Less

This would be a C level/senior management level task - so no, I didn't just forget to add that level position to my CV. Less

US Department of Veterans Affairs

How would you handle a disruptive customer?

2 Answers

Listen to them. Most of the time there is a legitimate problem and you can be the difference between a good outcome or bad. Listen to them and try to offer a solution before getting aggressive, calling the police or even back up. The irate person doesnt want to see more people show up, they want to see you TRYING to help. Less

I rambled since I was not impress with the whole process especially when the person asking the question muted their own phone when they stated to ask the question. Less

IG Group

TCP IP: what are common protocols that operate at each layer

2 Answers

TCP IP is a representation of suite of protocols for Open Systems Interconnection (OSI Model) At layer 7 - eg SFTP, Https, SSH for secured services At layer 6 - Session layer: port numbers At layer 5 - presentation eg ascii, mpeg, jpeg, etc At layer 4- Transmission Layer TCP Secure connection for encryption eg. AES, SHA 256 and higher algorithm and UDP protocols which are generally unreliable Layer 3- IP protocol network layer Layer 2 - Datagram layer eg. Mac address , ARP RARP Layer 1 - Physical Layer, Cat 5, Cat6, Cat 7, etc Less

TLS / SSL: what is it and what does it do


Will you be able to hold up our values of integrity? Give us an example of when you did.

2 Answers

There is no cyber security without integrity. I was raised under strict rules, went to private school all my life, I learned from little how to be ethical. And now it's imprinted in me. And I have no problem, actually, I feel joy when I do what's right. For example, I always follow written policies stating I cannot access co-worker's medical records so I just don't. And then I go home, knowing I did what was right. Less

Integrity is the act of keeping something unaltered or modify by an unauthorized party. It’s one of the core of cybersecurity called CIA trials There is no cybersecurity without integrity. I always follow policies stating I can’t have access to a particular information in our environment , so I just don’t try to get those information. I do what Is said to be done then go home Less

Viewing 1 - 10 of 708 interview questions

See Interview Questions for Similar Jobs

Glassdoor has 708 interview questions and reports from Information security officer interviews. Prepare for your interview. Get hired. Love your job.