[Music] so hi everyone say the side from infos train and I welcome you all uh okay so today we'll be discussing about the interview prep for the sock section and we'll be going through some couple of questions they can be a bit of a scenario based we'll discuss some pointers over there some additional tips will be there as well as uh we'll see how we can enhance our skills right we'll discuss about those kind of a things so before we can jump into that and talk about those technicalities let me just give you a brief
about myself as mentioned site from infos train and I have decade years of experience into cyber security the main thing which people tend to ask and have this always this question whether that they can switch into cyber security or not uh just a quick thing regarding infrasture about infrastructure established in 2016 we are one of the finest security and technology training and consulting company wide range of professional training programs certifications and consulting services in the it and cyber security domain high quality Technical Services certifications or customized training programs curated with Professionals of over 15 years
of combined experience in the domain here are our endorsements for Place years of services 70 plus pool of trainers 200 plus cources offering 30,000 plus professional trained 10 plus valued Partners 150 plus corporate delivery 20 plus countries so these are the trusted clients and why INF for TR so first of all the trainers over here the instructors over here they are certified and experienced instructors and we have a flexible modes of training like asess per like timing is not an issue over here uh access to the recorded sessions whatever the sessions we go through we
record those sessions and those sessions are provided to you you have accessibility to them post tring completion support is also there and Tor mode Tor made training so as for the requirements custom requirements the training can also be provided now our agenda as mentioned we go with some interv questions some enhancing problem solving skills additional tips and some Q&A at the end from your end okay now next thing is Security operation Center which we going to discuss about when we talk about sock what do you understand by the term sock although we'll talk about different
different questions but first question is there what is sock to you it's a centralized unit okay sock when you talk about just about a sock it's more of a business unit it's a centralized unit which does what it detects or it it helps in terms of the security issues related to your operational and Technical level okay so what it does this centralized unit so yes as you guys have mentioned help us to identify you can say monitoring right you can say detect respond against the Cyber threats correct so if there is any attack for example
we try to make sure with the uh Security operation Center first we have monitoring the entire environment of the organization right what all things are happening so that in case in case if there is any malicious activity going on we'll be able to detect it we'll be able to identify what kind of activity it is going on and in respect to that we'll put the responses we'll try to mitigate it exactly shiny right make sense and then yes some further reporting documentation will be done in which if any policies or processes are need to be
changed need to be revised those things will also be done so it help us to make sure our environment is having the adequate amount of security it is also complied with the security that is one of the most important thing and help us to protect the brand reputation of the organization which is the most important thing for the organization right that is what socus perfect so that is sock for us okay now in sock different different uh things are there right different different scenarios occurs in the sock when you talk about any you know uh
situation or any incident occurring over there so when we talking about perspective of our interview based questions we earlier what used to happen earlier we just simply get to be very honest earlier we used to get simply like you know one line of questions like what is CIA Triad or like you know what is uh an attack in confidentiality this kind of a question used to be up previously nowadays what happens more of a situation the scenario based question has been put on okay now for you guys can also participate to that you can also
give your uh you can say inputs to this because few people are already you know having experience over here so first question is for example if an interview asks you that you notice multiple employees have received a fishing email that looks convincingly like a legitimate internal communication what immediate actions would you take to mitigate the risk and protect the organization so as for the pointers which we can see like when you have to answer you have to you can look out for these quick pointers whenever you answer these kind of questions so you can segregate
your answers in these uh formats alert and communicate right what I meant with that is you can look out for the communication internal communication immediately sending out the companywide alert uh by whatever multiple communication channels are there and clearly also describe the character sticks of the fishing email like whatever the center address is mentioned over there the subject line and any key indicators of those fishing okay then uh security team notification will be there so you can notify the security team and the stock analyst about the fishing attempt provide them with a copy of the
fishing email for further analysis right then technical measures will be taken place over here awareness right termo correct PR correct so when I'm saying technical measures so you can look out for the email filtering right you can work with the IT team to adjust email filters and block the senders email address as you guys have mentioned right any Associated domains over there or any IP address correct so this will be helping us this will be helping you to prevent further distribution of this fishing email in the organization right and you also mentioned that along with
the email filtering quarantining as as well quarantine the emails as well right so you use email security tools to identify and to quarantine any fishing email that have not yet been opened by the employees correct and you can also use anti fishing tools to make sure that uh anti fishing tools and you know your browser extens they're up to date and properly configured across all employee devices you have to make sure those are updated as well so that we can you know just uh block those kind of fishing emails over there now in case if
anything happens like insant response can also be there okay so an insent response what we can do is we can say we'll be identifying those who are affected users if there is any okay so we will use the email logs to identify all the recipients of the fishing email we reach out to these individuals to to make sure that they are aware of the fishing attempt right we'll analyze the email we'll analyze the fishing email to understand the tactics used like any malicious link or any attachment which is attached over there in that email and
we'll determine if any employee has clicked on links or opened the attachments and as for that we'll take the uh appropriate actions okay we'll scan those affected systems for any kind of a Mal over there right and we'll check for any compromisation as well so we'll monitor for any signs of uh account compromise or any unusual activity which are related to the fishing attempt so we will check for if maybe there can be any unauthorized logins or password changes or data access in the environment right and further one common will be there that en employment
uh employee training should be there after that and it has to be done everywhere every year to make people aware about these kind of things right so you should do the training sessions so these employee training and support should be there so you will be continuing like you know training sessions over there so conducting like these training session or sending out educational materials to remind employees about these kind of a dangerous things which fishing can do or how fishing can harm us or what kind of a uh how you can identify if there's any fishing
in right so this will be helping helping us to protect our organization because what happens fishing is going to be very common it has been common it's going to be very common in the future as well uh because see for attacker if you have to ask you this question think about in that perspective for an attacker which one is a more easier way either targeting an employee or a human or cracking the passwords or finding a vulnerability and exploiting it which one do you think is more easier way why so because we have this nature
to trust nature to believe and we are considered as a weakest l i exactly without proper training humans are considered to be the weakest link right so that's why and we are the ones those who can go inside the organization and those who can can also get outside the organization as well so we can carry the attack in short right and it's very easy to trick correct exactly so social attacks can be performed more easily would right so that's the reason these uh employee training should be there and apart from that you should also strength
your security posture the fifth pointer over here strengthen security posture right so you can use MFA multia authentication you can enforce it for all the employees accounts to make an additional layer of security for the compromise credentials which can be done using the fishing one right re correct I agree with that exactly so you can perform this for string security post you can go with the MFA you can do regular fishing test in the organization and you can review your security policies also okay so you can review and update security policies and also instant response
plan to make sure they are effective in handling the fishing attacks or any any other social engineering attacks over there these kind of a threats right so let's suppose you can also give an example like okay that uh in my previous role my organization experienced a fishing attack where employees received emails that appeared to come from HR department and they were that email was requesting them to click on a link to update their payroll information so you can also explain how you handle that situation you can say like I alerted in communication was there so
we sent ancy companywide email alert and posted messages on our internal communication channels warning the employees about the fishing emails and instructing them to delete it immediately right and the security team was immediately notified and provided with a copy of the fishing email for analysis for uh process then technical measures were taken into the place the ID team adjusted our email filters to block the senders email address and any Associated domain with that and using our email security tools we identified and quarantined all fishing emails that was still in employees in boxes and had not
been open then instant response you can say so we identified all recipients of the fishing email and directly inform them about the fishing attempt so our security anal you can see they analyz the email and found a malicious link which was designed to steal employees credential so we checked our logs to make sure no employee had clicked on the link and we monitored for any sign of compromise account or any unusual activity and we found none of it confirming that okay that immediate actually have been taken and they were very effective and then further we
uh conducted a quick refresher training session on fishing awareness and we give them a detailed guidelines on how to recognize the fishing emails also which help and post that we stand in of security posture we enabled MFA multiactor authentication over there right to make sure that accounts are not compromised and we provideed additional lay of security and we implemented regular fishing simulation test to make sure employees are uh you know have this dis ability to detect the fishing attempts and yeah so these things will be there how you can answer these kind of a questions
for fishing email response so you can point out or you can see the couple of pointers while you're answering it so let me write it you can say integration first of all I can see couple of you have already answered this one integrate it with your security tools right nice you can see you can get some contextual ideas or enrichment over there and it can be helpful in terms of proactive because thre intelligence is proactive right and can be helpful for your threat hunting as well I'll tell you that and instant respon as well okay
so when I'm saying integration with security tools uh as you guys have mentioned couple of you have already answered this one so integrating threat intelligence feed with your sim Solutions okay you can do that with your endpoint protection tools you can do that okay so it will be like you know automating the ingestion of thread intelligence to make sure we are getting the real- time updates and we are getting the actionable information over there so we are integrating the intelligence with our same solution so there in case if there is any uh uh you know
uh presence of those ioc's it will be helping us to detect them right Contex enrichment yes so you can use the threat intelligence to provide you context for security alerts this will be like including the details about threat actors attacking vectors your known ioc's you know so you can uh use it for making the alerts with thread intelligence it will be helping us to also prioritize the incidents and focus on the most significant threats over there thirdly which is saying about the proactive threat hunting uh thread hunting is what it is help helpful us to
uh decrease the dwell time right if you know about the thread hunting we hunt down for a Mal we hunt down for any presence of a threat in in our environment and we try to capture it if our security tools even if they fail it fail to detect it we have threat hunting to manually hunt down for those threats in the environment right exactly an we have that so it's a proactive approach so you can we also use threat intelligence over there so that we can guide our proactive threat hunting efforts right it will be
involving like you know we'll be searching for ioc's in our environment that will be matching with the known threats we'll be conducting the regular hunts based on those threats which are emerging and we look out for those ttps tactics techniques and procedures which are there in our thread diligence report also it can be helpful uh in our incident response so during any incident you can see you can take an advantage of thread intelligence to understand the scope and the nature of the attack so everything it will be including like you know your uh identifying any
ioc's you'll understand the attackers mod operand with the help of this how they perform an attack right uh you will use thread intelligence to um inform any remediation strategies right and what can be it will be helping us to also anticipate what's the potential next step of the attack that's what thre intelligence is used for right that's where you can use your M attack framework as well to identify those things isn't it so yeah these things are there so you can say like you know uh earlier like you know your thread intelligence feed like in
your previous role when you're trying to give an interview you can say your thre intelligence feed they reported a surge in attacks exploiting a zero day vulnerability in a popular web application framework let's suppose so the feed included some ioc's like specific IB address and domains which are associated with the attack so what you did you immediately checked for SIM for any sign of activity related to those ioc's and found several attempts to actually exploit the vulnerability so while none was success due to our existing defenses the intelligence allows us to take additional precautionary measures
and we patched the affected systems and updated our web application firewall and implied the rules to block any malicious block the malicious IPS and preventing our environment from that potential exploitation so in that approach what happened that was a proactive approach which was Guided by the threat intelligence and we improved our security poster along with that so this is how you can portray your answers you can just uh point cut it down into these quick pointers first of all and then you can give an example um that how you handle it an I just did
that right next is regarding Vol assessment and management although like okay in sock uh we can also include at times like for the Vol assessment management basically this is just to check also how you are how much is your knowledge in terms of different different sectors as well right and uh like vulnerability ass management so after for example after running a vulnerabil scan you identify several critical vulnerabilities in your infrastructure how do you prioritize which vulnerabilities address first to address first and what steps do you take to remediate them okay so your like how much
understanding you have from different different sectors this is also asking for the same thing so how would you answer this question what would be your take on this one so what we can do over here we'll assess criticality and impact we'll evaluate the exploitability we'll also determine the exposure explain them and how much business impact it could do okay so it's like you will evaluate the CVSs SS criticality and impact so I will agree with you guys as you have given a good answer over here common vulnerab scoring system right scores for each vulnerability higher
the score it tells you more critical vulnerability it is right so that is one thing we'll consider the potential impact on the business if the vulnerability were exploited so for example if vulnerability is in a customer facing application might be more critical than one in an internal one right then we evaluate the exploitability yes we check if there are non exploits available for the vulnerabilties which has been identified so we priortize the vulnerabilities that are being actively exploited as per our thread intelligence feeds over here we can include that as well and we determine the
exposure also so we identify if the vulnerable systems are exposed to the internet right whether they are exposed to the internet or whether they are behind the multiple layers of Defense right we have to check that as well so because publicly accessible system they are generally higher priority for the remediation as compared to the ones which are Intel ones are behind the layers of Defense then we also look out for the key point point which is business impact we assess the potential downtime and the impact on the business operations which are required to patch each
vulnerability So based you balance that urgency of patching with the need to maintain the business continuity so you can say you will be going with the patch Management in terms of remediation if you ask me like you know what steps do you take to remediate them so you can go with the patch management you apply patches or updates provided by the software or Hardware vendors right so we can schedule that patch deployment during maintenance Windows to minimize our business deceptions and mitigation measures will be there so if immediate patching is not possible we'll Implement temporary
mitigation like disabling vulnerable services or blocking maltia IP address or applying the configuration changes over there like in compensating controls then we verification will also be there in terms of remediation after applying the patches we'll conduct the vulnerability scan again to make sure the vulnerabilities has been successfully remediated okay so when we are talking about in terms of remediation as I mentioned the remediation part what we'll do we'll go with the patch patch management will be there right we'll go with the mitigation measures right like we can go with the comp uh this compensa controls
like in case if patch is not available we'll go with the temporary mitigation Solutions then verification again we'll perform the vulnerability scen to make sure the vulnerabilities which were identified are completely gone they're not there and finally last one will be like a document and Reporting things over there okay so document the vulnerabilities steps taken for remediation or any lesson learned over there so we report the remediation status to stakeholders and maintain a record for compliance purposes also so you can say like for example you know in my previous role our vulnerability scan revealed a
critical vulnerability in an external facing web application server maybe like okay there would be a CV CV for example like like uh cve any any I'm writing like randomly any number 2020 1472 and it was having a CVS's score of let's suppose 10.0 so we know it's a critical one so there were known exploits for this vulnerability which was making it high priority for us high priority right so we immediately passed the server during an off peak time and verified the patching through the scan right after that so make sure that okay the VAB has
been completely removed right and then we reviewed and tightened our firewall rules also to make it further secure the or to make it further uh server to make it more secure right so we tied in our fire rules also for forther securement so these things can also be put out when you are giving an answer in terms of your volum assessment management then we have intrusion detection your IDs IPS has detected suspicious activity that indicates a possible intrusion walk us through your process for inves and responding to this Alert in real time what will you
do the idas HP detect a suspicious activity that indicates a possible intrusion work us through your process for investigating and responding to this Alert in real time legitimate or not very good answer denish uh right shiny perfect bendra correct okay do you know what is incident triage iner Tri right exactly abish correct so we'll review the alert right the alert which was provided by the IDS IPS so which will be including the source and destination IP address the time stamp the types of suspicious activity and any threat signatures you can say or any ioc related
to that right perfect so yes so we do the uh Tri we'll make sure whether it is a false positive or true positive or what kind of an alert it is it could be a false positive as well right so we'll make sure it's we'll validate it and we'll verify it's really an incident or it's really a intrusion over there or not not just a false posit not a fake alarm right so we out for the evidence and we'll make sure it's not a false positive so you can say in instant alert triage then also
if there is it's a true positive what will will do if there's an intrusion from instant response perspective can we say we'll go with the containment part once we have confirm it's an intrusion right so we'll confirm the validity of the alert we look out for its evidences uh in the in the security logs right so that we can rule out whether it's a false positive or not correct then we'll determine we'll figure out which system or user are affected by the suspicious activity so this will be doing what this will be helping us to
narrow down the the scope of our investigation then we'll do what we'll do the containment right exactly so we'll isolate the affected systems over there okay just like in Corona when someone was got affected by a Corona virus we used to isolate them so that it won't spread out similarly we go with the containment over here we'll isolate the affected system okay so if the alert is confirmed it's legitimate one okay and it tells you it's a potential compromise we'll take the immediate steps to isolate the affected systems from the network so that we can
prented further spread of the intrusion over there right and yes we'll block the malicious IPS also correct over there so we'll use firewall rules or IDs IPS capabilities to block the traffic from that suspicious IP address or the domains which were identified in our alert and then further we can yes we can go for the in-depth analysis isn't it further we can go the inter Anis we can analyze the traffic patterns we can conduct a deeper analysis of network traffic patterns so that we can understand the nature of the suspicious activity we can look out
for the signs of data exfiltration command and control communication or any later movement within the network if there is any right so we'll examine the logs we look out for the artifacts those proof so we'll review our system logs we'll review the application logs and we'll look out for the any other relevant artifacts we can say on our affected systems so that we can gather more details about that intrusion we'll look out for any unusual process any file changes or any authorized unauthorized access attempts over there and as per that a response will be taken
place is my [Music] pen andent response will be yeah so we'll be engaging of instant response team right uh we'll Engage The broader in case if it it's a high thing we'll broader our instant response team to assist with the investigation and containment efforts over there right so we'll preserve the evidences we'll make sure that the all logs Network captures and other foreign evidence they are preserved for further analysis and for any potential legal proceeding further right and then we go with the remediation we'll identify the root cause right we'll uh identify the vulnerabilities of
misconfiguration that were exploited by the attack and then we'll fix it we'll eradicate it as well right in remediation part find the root cause and fixing it up Implement implement the patch meting getting it applying the necessary patches updating security configuration implementing the additional security control so that we can prevent similar in in the future and then we go the recovery to recover the data if there is any loss and yes documentation P agree with that further will be documentation the at the end right so reporting we can say communication reporting would be the end
part so yes you can say if there is any IDs IPS alert indicating any potential Brute Force attack targeting the organization VPN Gateway maybe so you'll go with the investigation steps you will have this initial alert St or alert triage the alert shows multiple fail login attempts from a single IP address targetting VPN Gateway right so you review the alert details you'll include the time stamps IP addresses then you go for the further investigation into that you'll check VPN logs to verify the failed logging attempts and you identify the usernames which are Target right you
look out for the cross references you you'll the suspicious IP address you'll go over the intell sources to check if there's any known malicious activity in which this IP has been uh involved or not like whether that IP address is a red flag or a green flag we'll check its reputation right then we go for the containment will temporary block the suspicious IP address using the firewalls to prevent the further login attempts and we will notify the IT team to monitor for any additional suspicious activity and then we go for the indepth analyses we analyze
VPN logs to determine if any successful login has been occurred from that suspicious IP address then we'll review other network logs also to identify any lateral movement or any additional malicious activity then simply we go with the instant response we'll involve the instant response team to assist with further investigation containment we'll preserve the logs and we'll uh do the network captures for further font anes also and simply go with the remediation we'll identify if any user account were compromised if they were compromised we'll reset the password and enable able your multifactor authentication for affected accounts
and then apply necessary patches or updates to the VPN gateway to mitigate any vulnerability and then simply recovery restore normal access to the leg users while maintaining the proper monitoring and we make sure all compromise accounts and systems are fully secured and we'll finally create a report regarding that and send it to the stakeholders right okay so for example okay next one is Sim Anis you receive multiple SIM alerts for unusual login attempts from various geographic location describe your realtime approach to analyze these alerts and determine if they indicator coordinated attack okay inant Tri will
be there first of all right correlation analysis account will be analyzed and further detailed investigation we can say and immediate response in action so yeah uh I've also written uh quick pointers over here so initial triage will be there as we have just discussed about the same we'll verify the alerts and do the priority over there like you know we'll confirm that the alerts are legitimate not a false positive right and uh we determine the severity and priority of the alerts based on the factors like number of attempt sensitivity of the targeted account and the
geographic distribution of the logs then we go for the correlation analysis we identify the patterns over here actually we use Sims correlation rule to identify patterns across the alerts we look out for any common common things like same user account being targeted similar IP addresses which are ranges or any or the use of similar user agents right those things we look out for then we'll cross reference with our threat intelligence also we'll uh take the alert data we'll use that with thread intelligence to check if the IP address or user agents are involved and are
known to be associated with malicious activities or not right as you guys have answered it then we go for the geoanalysis yes so we analyze the geographic distribution we map the geographic locations of the log attempts to identify if they are coming from a reason with a high likelihood of malicious activity unusual login attempts from multiple you know uh uh dis locations in a short time frame can be a strong indicator actually of a coordinated attack isn't it if you're getting multiple login attempts from multiple different different location in a short time frame it can
be a song indicator that okay some are performing this coordinat ATT anik yes U pattern matching exactly I will agree with that then time analysis check the time stamp of the login attempt to determine if they are occurring simultaneously or in a sequence that will be suggesting any coordination over there right then account analysis we check the targeted account we determine which account are being targeted focus on high value accounts like administrator or user with elevated privileges like that and we verify the login patterns also we compare the login attempts with the typical login patterns
of the targeted user unusual patterns if they are like such as like login from different countries within a short time frame can be indicating account compromise over there and further we'll go with the detail investigation we'll go with the log review all right um we'll detail uh review will be there right detail review will be there of the logs which are associated with the alert so we look out for if there is any additional suspicious activity like multiple fail log attempts or password you guys have mentioned password reset attempts or any unusual access patterns after
login you know in that way and we also look out for the endpoint analysis if possible we'll check the endpoints uh which are involved in the login attempts for signs of any compromise or any malare over there and then immediate response actions will be taken we'll lock the accounts right as you have mentioned if you suspect account compromise we lock the affected account to prevent any further unauthorized access and then we reset the password like it's like initiating the password resets for compromise accounts and we make sure MFA is enabled over there and blocking the
IP right that suspicious IP address so these things will be there so you can say like you know uh if it is asked or you can explain this like okay in my previous role we received multiple SIM alerts for login attempts from various Geographic locations which could targeting High several high privilege accounts so you can explain what we did or what you did as an approach what to this situation so you can say I agreed with the trient correlation so we uh we confirmed the alerts were valid and we use sim correlation rules to identify
that the same account were being targeted with login attempts from IP address in different different countries and we get for the GE analyses also after that we the log attempts were occurring almost simultaneously from countries where we had no users which is indicating a high likelihood of a coordinated attack then we for went for the uh detailed investigation we review the logs which showed multiple failed attempts which were which was a which was followed by a successful login for One account you can say so we got multiple login failure attempts you can see those https
codes will be there or Response Code HTTP Response Code you can look out for them and then we got one successful login right earlier we were getting the failed login attempts then we got a one successful login attempt from one account so we also notice unusual activities like from that account like maybe any access to sensitive files just after it got logged in so we got first failure multiple failure and then all of a sudden we got successful login attempt for an account and from that account what we also got to know is that that
account was accessing sensitive file just after it got successful login attemp then we took the immediate response over there we immediately locked the affected account and we reset their password and enforce the multifactor authentication we also block that IP address at the firewall right and then communication was also there for further like so team they were briefed and they affected users were notified to monitor their accounts and post Ines were there so inent repos was inent report was created and they updated their security policies to include stricter monitoring of lock attempts and gave the training
um to the employees to identify the fishing attempts also in case if this thing happens by a fishing attempt right so these things are there dis absolutely these things are made for that yes uh one last bit regarding in terms of communication during an incident and ongo ongoing security incident requires you to communicate with both technical teams and executive management how do you balance providing technical details and high level summaries in real time to ensure everyone is informed and aligned so you can simply say that I would prepare two separate reports one detailed technical report
for the technical teams and a high level summary for the executive management because you know your executive management is not much technical right isn't it so they work in the terms of fact and figures you can say so technically report would include specific such as nature of the incident affected systems technical indicators and whatever the immediate actions which you have taken high level summary would be focusing on overall impact the business risk importantly and the steps which were taken to mitigate the issue and any required executive decisions over there so regular updates make sure that
both teams are informed of the latest developments for example like you know uh like during a significant data breach you can say providing or giving these detailed report to the IT team help in quick remediation while high level summaries kept the executive management informed about the impact and the response strategies in respect to that okay check exactly like that is what I'm talking about in terms of more facts and figures right uh yes enhancing problem solving skills how you can do that um sa exactly C yes agree with that enhancing problem solving skills yes so
it's like you know you should understand common threats and vulnerabilities so that you can enhance your own problem solving skills for these job interviews so understand common threats and vulnerabilities stay updated to the latest cyber security threats and vulnerabilities like regarding any malware fishing R any zero exploit which are happening right so like like it's like regularly read the cyber security blogs attend webinars participate in security forums know how recent attacks are happening in that way and practice inent response scenarios familiarize yourself with different types of security incidents and practice how how to respond to
them effectively we have a lot of gamification platforms you can use them and create a mocked instant response plan for a simulated fishing attack so you can document your steps for detection to eradication and recovery so this will be helping you to build your structured approach to handle those real incidents and develop your analytical thinking improve your ability to analyze logs alerts and other data sources so that you can identify patterns and anomalies over there right so use tools like Splunk or curar to PR log analysis create queries find unusual login attempts or unauthorized file
access so this handson experience actually will improve your data interpretation skills and enhance your technical knowledge right deepen your understanding of network protocols operating system security tools set up a lab environment to practice configuring firewalls IDs IPS Sim systems you know get that thing and improve your communication skills be able to clearly explain your technical uh issues to both Technical and non- Technical audience also right and stay calm under the pressure security instance they can be very stressful we all know that so in interview you have to demonstrate your ability to stay compos and make
rational decisions under the pressure right so do that and additional tip for Asing job interviews research the company before going for the interview which is very obvious understand the company's business model security challenges and their recent news also okay so if you're interviewing with the fin financial institution research how the company address the compliance requirement like pcidss this shows your interest and preparedness over there okay showcase relevant experiences highlight your handson experience with security tools and inant response discuss specific incident you have handled like identifying and mitigating any Mal outbreak in a previous role like
that explain the steps you took in the outcome outcome you got out of it prepare the technical questions be ready to answer questions about specific Technologies protocols and security practices okay demonstrate your continuous learning show that you are committed to staying updated in the ever evolving field of the cyber security because you know the Cyber threat landscape keeps on changing right so you can put your resumés in your certifications also in your resumes as well so that you can have a stronghold ask thoughtful questions you know prepare question that show your interest in the role
and the company company's security post you can ask about the company's approach for threat hunting or how they stay updated on emerging threads that indicates your you know mindset proactive mindset and prepare for Behavior questions be ready to discuss how you handle teamwork conflict and stress right so this is method which is with the name star learn about that star method is there star means situational task action result this will be helping you to structure your answers right review pass incident be prepared to discuss specific incident you have handled in the past and the lesson
which you have learned from it okay you can talk about any for example fishing attack you medic ated how you identified it the steps taken to contain it how you improved the security posture so that you can prevent future occurrence in that way and showcase a problem solving skills clearly explain your methodology for tackling security issues prepare a portfolio very important create a portfolio for your work including reports instant response plan and security projects which you have done right and stay confident and stay honest okay confidence in your abilities and honesty about experience are will
be a key to your successful interview and in case if you're not honest make sure your lies are very honest you're lying honestly okay so yeah these will be the quick things when you're talking about DS you can say like if your network your network is experiencing a distributed den of service attack what immediate actions do you take to mitigate the impact and ensure the critical Services remain available as well in case if this question kind of questions are asked to you okay that your network is experienced a DS attack what immediate actions do you
take to mitigate the act and make sure the critical Services remain available so you can see I'll identify the attack I'll monitor the traffic I'll use network monitoring tools to identify any unusual spikes in the in traffic and determine if the increased load is due to a DS attack or not we look out for the patterns in the traffic like IP address ports protocol that are being targeted we'll also activate the DS protection we'll enabl enable the DS mitigation Services okay if you're using cloud cloudbased data datos protection you'll enable it immediately like Cloud Fair
Akamai a blush Shield can help to filter malicious traffic you can contact your ISP also for the same you can do the rate limiting and throttling is also there okay we generally go with the implementing rate limiting we set the rate limits on incoming traffic to prevent any any single IP address from uh overwhelming your servers right and throttling is there throttle the traffic to specific services to manage load and make sure critical Services remain available and we filter the traffic after that we block the malous IPS we use firewalls or inent IPS to block
the that are known to be part of the attack all right and geob blocking can also be there right from specific geography locations if there attack is coming we block it load balancing is also there right we distribute the traffic we use load balancer to distribute the traffic across multiple servers in the server farm this would be helping us to prevent single server from being getting lot of load of network and auto scaling is there so we dynamically allocate additional resources to handle the increased load right and communication internal communication will be there we inform
the sock team and other relevant stakeholders about the attack and actions being taken and if the attack is affecting customer facing Services we communicate with customers about the issues and what is being done to resolve it so that we can provide the regular updates and as for that inent response plan will be there we'll follow the predefined response plan for DS attacks we'll make sure all team members know their roles and responsibilities and we'll document each and everything which is being done over there okay