Security Engineer Interview Questions

Review this list of 7 security engineer interview questions and answers verified by hiring managers and candidates.
  • Amazon logoAsked at Amazon 
    +27

    "We had a huge launch on September 1st of this year where we completely redesigned our application from the grounds up and also migrated to a new platform (React.JS). This project took us 8 months and the launch was a huge deal for the team. Unfortunately the launch wasn't as smooth as we expected and despite doing multiple rounds of QA, some major issues cropped up in the core part of the app right after launch and our client was quite upset since it was disrupting their day-to-day workflow. "

    Aabid S. - "We had a huge launch on September 1st of this year where we completely redesigned our application from the grounds up and also migrated to a new platform (React.JS). This project took us 8 months and the launch was a huge deal for the team. Unfortunately the launch wasn't as smooth as we expected and despite doing multiple rounds of QA, some major issues cropped up in the core part of the app right after launch and our client was quite upset since it was disrupting their day-to-day workflow. "See full answer

    Security Engineer
    Behavioral
    +7 more
  • Blend logoAsked at Blend 
    +6

    "Let's imagine you want to open Google Maps, you type maps.google.com and hit Enter. Here is what happens: You type maps.google.com into the address bar of your browser. Browser completes the address, for example, maps.google.com → https://www.maps.google.com [Address decoding] → browser breaks down the URL into parts ‘https://’: protocol → how the browser should connect to the website Default is HTTP (Hypertext Transfer Protocol) which shows up as ‘ http:/"

    Jasmin R. - "Let's imagine you want to open Google Maps, you type maps.google.com and hit Enter. Here is what happens: You type maps.google.com into the address bar of your browser. Browser completes the address, for example, maps.google.com → https://www.maps.google.com [Address decoding] → browser breaks down the URL into parts ‘https://’: protocol → how the browser should connect to the website Default is HTTP (Hypertext Transfer Protocol) which shows up as ‘ http:/"See full answer

    Security Engineer
    Technical
    +1 more
  • Google logoAsked at Google 
    Video answer for 'Design a cyber attack.'
    Security Engineer
    Technical
  • Google logoAsked at Google 
    Video answer for 'How does the internet work?'

    "URL> DNS over UDP> IP address > TCP handshake > HTTP(SSL handshake) req, responses, websites architectures for any query DB, servers."

    Wizzy B. - "URL> DNS over UDP> IP address > TCP handshake > HTTP(SSL handshake) req, responses, websites architectures for any query DB, servers."See full answer

    Security Engineer
    Technical
  • Amazon logoAsked at Amazon 

    "During my internship at Datavibe Insights, I was initially brought on to assist with routine data cleaning and Excel reporting for the procurement team. My main task was to support weekly report generation, but I noticed inefficiencies in how data from multiple vendors was being manually compiled and formatted each week. Without being asked, I took the initiative to build an automated reporting tool using Excel Power Query and macros. It cleaned, merged, and visualized the data with a few clicks"

    Dhruv M. - "During my internship at Datavibe Insights, I was initially brought on to assist with routine data cleaning and Excel reporting for the procurement team. My main task was to support weekly report generation, but I noticed inefficiencies in how data from multiple vendors was being manually compiled and formatted each week. Without being asked, I took the initiative to build an automated reporting tool using Excel Power Query and macros. It cleaned, merged, and visualized the data with a few clicks"See full answer

    Security Engineer
    Behavioral
  • 🧠 Want an expert answer to a question? Saving questions lets us know what content to make next.

  • Salesforce logoAsked at Salesforce 
    Security Engineer
    Technical
    +1 more
  • Google logoAsked at Google 

    "A Denial of Service (DoS) attack is a type of cyberattack in which the attacker seeks to render a machine or network resources unavailable to its intended users by temporarily or indefinitely disrupting services. This is typically achieved by overwhelming the target with a flood of illegitimate requests. Steps to mitigate this type of attack can be varied but are not limited to the following: Network or Perimeter Security: Firewalls, IDS/IPS, Traffic and Rate Limiting, Realtime monitoring and"

    Robert W. - "A Denial of Service (DoS) attack is a type of cyberattack in which the attacker seeks to render a machine or network resources unavailable to its intended users by temporarily or indefinitely disrupting services. This is typically achieved by overwhelming the target with a flood of illegitimate requests. Steps to mitigate this type of attack can be varied but are not limited to the following: Network or Perimeter Security: Firewalls, IDS/IPS, Traffic and Rate Limiting, Realtime monitoring and"See full answer

    Security Engineer
    Technical
Showing 1-7 of 7