Interview Questions Based on Cyber
Defense Centre (CDC) Security Analyst
Role
Technical and Role-Based Interview Questions
1. 1. How do you differentiate between a false positive and a real security incident in a
SIEM platform?
2. 2. Describe your experience working in a 24x7 SOC or CDC environment. How do you
manage shift rotations and incident handovers?
3. 3. How do you tune a SIEM rule or use case for better detection accuracy?
4. 4. What are the steps you take during malware analysis and incident response?
5. 5. How do you approach threat hunting across multiple client environments?
6. 6. Explain how endpoint detection and response (EDR) tools like CrowdStrike or
SentinelOne help in modern SOC operations.
7. 7. What SOPs or playbooks have you followed or created in your previous roles?
8. 8. How do you prioritize incidents when multiple alerts are triggered simultaneously?
9. 9. Explain a scenario where automation improved your investigation or response time.
10. 10. What methods do you use for network and endpoint forensic analysis?
11. 11. How would you handle a ransomware detection in a critical production system?
12. 12. What’s your process for handling bridge calls and communicating technical
incidents to non-technical stakeholders?
13. 13. How do you update or contribute to knowledge bases and documentation?
14. 14. What are some custom detection rules or IOAs you've written or tuned in a
SIEM/EDR?
15. 15. How do you detect lateral movement or privilege escalation in a compromised
network?
16. 16. Can you explain threat hunting using MITRE ATT&CK framework?
17. 17. What’s your experience with tools like Splunk, QRadar, or Azure Sentinel?
18. 18. How do you ensure consistency in service delivery across global SOC teams?
19. 19. How do you respond to a suspected data exfiltration incident?
20. 20. Give an example of a critical incident you resolved and how you handled it end-to-
end.
21. 21. How do you keep up with evolving cybersecurity threats and tools?
22. 22. What’s the importance of creating and using runbooks in SOC environments?
23. 23. What’s the role of containment during incident response, and how is it executed?
24. 24. Describe a case where you had to escalate an incident. How did you handle the
process?
25. 25. What are key indicators of ransomware activity on endpoints?
26. 26. How would you conduct forensic analysis on a compromised endpoint?
27. 27. What kind of logs do you consider during threat hunting?
28. 28. How do you ensure SLA compliance for incident resolution?
29. 29. How do you verify that an automation script or rule you built is safe and accurate?
30. 30. How do you handle burnout or mental fatigue in a high-pressure SOC role?