Q1
Walk me through how you would analyze a suspicious network packet capture file. What tools would you use, and what indicators of compromise would you prioritize looking for?
Why they ask this:* They want to assess your hands-on experience with network analysis tools (Wireshark, tcpdump) and your ability to identify attack patterns and malicious activity in real network traffic.
Q2
Describe your experience with vulnerability management. How would you prioritize vulnerabilities for remediation across multiple systems, and what frameworks or scoring systems would you use?
Why they ask this:* This evaluates your understanding of CVSS scoring, risk assessment methodology, and your ability to make informed prioritization decisions—a core responsibility of mid-level analysts.
Q3
Explain the difference between detection-based and prevention-based security controls. Can you provide examples of each that you've implemented or monitored in your previous roles?
Why they ask this:* They're testing whether you understand fundamental security architecture concepts and can demonstrate practical experience distinguishing between reactive and proactive security measures.
Q4
Walk me through your experience with SIEM platforms. How would you configure alerts for detecting lateral movement within a network, and what false positives might you encounter?