Information security officer Interview Questions

102

Information Security Officer interview questions shared by candidates

Top Interview Questions

Sort: Relevance|Popular|Date
Frontline Education
Information Security Officer was asked...30 January 2020

How many years of formal CISO title do you have?

4 Answers

More than enough to call out a lazy leader

I think nothing will change if all recruiters in the world are fired.

Finally, we hired somebody after 6 months. With COVID-19, we will fire him soon. Seems like a looser who will not survive Less

Show More Responses
MetroPlusHealth

How do you change a culture of insecurity?

2 Answers

You have to impress upon people the urgency of protecting the information. I can't change the culture, culture change comes from executives. Less

Most organizations can rationalize the basic need for security. Usually, if there is a cultural barrier it is because there has been high transactional cost in the past. If Security is seen as a barrier to staff doing their work, they will resist, and mightily. If you're trying to reset the culture, first ask about the experience of the staff and how they think about the workflow, the functionality of the IT system. With their feedback in mind, you can start to understand how to remove those blocks and develop influence over the culture. Less

Weiser Security

Can you work night shifts.

1 Answers

Yes, I prefer night shifts because I'm a night owl.

Korn Ferry

Why are you looking to leave your current employer?

1 Answers

I'm not actively looking but the opportunity you presented is compelling enough to give it the attention it deserves. Less

MetroPlusHealth

Have you ever worked with LogRhythm?

1 Answers

Yes, I had a team using LogRhythm as our SIEM

West Marine

Not "difficult", but "thorough". They understand the weaknesses of the job - the toughest question had to do with covering all the responsibilities of the job AND staying current.

1 Answers

Honestly - I struggle. You have to create structured opportunities that are hard scheduled and calendared, even if it's reading time. You have to press your vendors to provide more context. You have to press auditors to find out which way the wind is blowing and pursue those lines of inquiry. Less

Form3 Financial Cloud

What is the difference between encode, encrypt and hash ?

1 Answers

To encode effectively means to convert the data into a format readable in an exchange between different systems. Hashing ensures the integrity of data and Encryption protects the data from being made accessible to unauthorised parties. Less

TTTech Computertechnik

What can you bring to the workplace?

1 Answers

I can bring positive personality, positive addons to the team, good wroking ability, diligence and profesionalism. Less

Booz Allen Hamilton

How to re-image a computer?

1 Answers

What are the steps in the C&A process?

Government of Alberta - Service Alberta

Describe the CIA triad.

1 Answers

Confidentiality, Integrity, and Availability

Viewing 1 - 10 of 102 Interview Questions