Analista de ciberseguranca Perguntas de Entrevista & Respostas
As entrevistas de ciberseguranca testam seu conhecimento tecnico, pensamento analitico e capacidade de responder com calma sob pressao. Espere perguntas sobre deteccao de ameacas, resposta a incidentes, frameworks de seguranca e cenarios de ataque reais.
Perguntas comportamentais
-
1. Tell me about a security incident you investigated. What was the outcome?
Resposta modelo
I detected anomalous outbound traffic from a workstation at 2 AM through our SIEM alerts — 500MB uploaded to an unknown IP over an encrypted channel. I immediately isolated the workstation from the network and began the investigation. Memory forensics revealed a Cobalt Strike beacon that had been active for 3 days, likely delivered via a spear-phishing email with a malicious macro. I traced the lateral movement to 2 additional workstations, none of which had accessed sensitive data stores. I contained all affected systems, reset credentials for the compromised accounts, and coordinated with the email security team to block the phishing domain. Total containment time was 4.5 hours. Post-incident, I implemented macro-blocking policies in Office, added behavioral detection rules for C2 beaconing patterns, and conducted targeted phishing awareness training. There were no further incidents from that threat actor.
-
2. Describe a time you identified a vulnerability that others had overlooked.
Resposta modelo
During a routine review of our web application, I noticed that our password reset flow sent a token via email, but the token didn't expire after use. I tested it and confirmed: the same reset token could be used multiple times for up to 24 hours. The development team had focused on implementing token expiration by time but missed the single-use requirement. I wrote up the vulnerability with a clear proof-of-concept showing how an attacker with access to someone's email could use a stale token days later. I rated it as medium severity since it required email access, but high urgency because it was a simple fix. The team deployed a one-line fix (invalidate token on use) within 2 hours. I then reviewed all other token-based flows and found a similar issue in the email verification flow, which we fixed in the same sprint.
-
3. Tell me about a time you had to convince management to invest in a security measure.
Resposta modelo
I wanted to implement a privileged access management (PAM) solution because we had 40+ shared admin accounts with no audit trail. Management saw it as a $60K expense with no visible ROI. I reframed the conversation: I calculated the cost of a privilege escalation breach using industry data ($4.5M average for our company size), multiplied by our estimated probability based on our current controls, and presented the expected loss. I also showed 3 recent audit findings that cited shared credentials as a risk, which could affect our SOC 2 certification — a requirement for 70% of our enterprise clients. Finally, I showed the operational cost: 15 hours monthly spent manually rotating shared credentials. The PAM solution would pay for itself in credential management time savings within 14 months. Management approved it. The lesson: security investments need to be framed in business risk and operational efficiency, not technical fear.
-
4. Give me an example of how you stayed current with evolving cybersecurity threats.
Resposta modelo
I maintain a structured approach to threat intelligence. Daily: I review curated feeds from CISA, Krebs on Security, and The Record. Weekly: I spend 2 hours on hands-on labs — TryHackMe rooms, HackTheBox challenges, or replaying recent CVE exploits in my home lab. Monthly: I attend our local OWASP chapter meeting and participate in an online threat intelligence sharing group with security professionals from 15 companies. Quarterly: I take one focused course — last quarter it was cloud security on AWS, this quarter it's malware analysis with Ghidra. When a major vulnerability drops (like Log4Shell), I immediately assess our exposure, create detection rules, and brief the team. This approach has paid off multiple times — I had detection rules for the MOVEit vulnerability ready within 6 hours of disclosure because I'd been tracking the threat actor's TTPs through my intel feeds.
Perguntas técnicas
-
1. Explain the MITRE ATT&CK framework and how you use it in your work.
Resposta modelo
MITRE ATT&CK is a knowledge base of adversary tactics, techniques, and procedures (TTPs) organized by stages of an attack lifecycle: initial access, execution, persistence, privilege escalation, defense evasion, credential access, discovery, lateral movement, collection, exfiltration, and command and control. I use it in three ways. First, for detection engineering: I map our SIEM detection rules to ATT&CK techniques to identify coverage gaps. When I find we have no detections for T1055 (Process Injection), I prioritize building those rules. Second, for threat hunting: I use ATT&CK to structure hypothesis-driven hunts. If threat intelligence suggests a specific APT group is targeting our industry, I hunt for their documented TTPs in our environment. Third, for incident investigation: when I detect one technique, ATT&CK tells me what the adversary likely did before and will do next, helping me scope the investigation more efficiently.
-
2. What's the difference between symmetric and asymmetric encryption? Give a real-world example of each.
Resposta modelo
Symmetric encryption uses the same key for encryption and decryption — it's fast but requires secure key exchange. AES-256 is the standard. Real-world example: encrypting data at rest in a database. The application server holds the key and encrypts/decrypts data as it reads and writes. Asymmetric encryption uses a key pair — public key encrypts, private key decrypts. It's slower but solves the key exchange problem. RSA and ECDSA are common algorithms. Real-world example: TLS handshake — when you visit a website, your browser uses the server's public key to establish a shared session key, then switches to symmetric encryption for the actual data transfer. This hybrid approach combines asymmetric encryption's security for key exchange with symmetric encryption's speed for bulk data. In practice, I always recommend AES-256 for data at rest, TLS 1.3 for data in transit, and proper key management through services like AWS KMS rather than storing keys alongside the data they protect.
-
3. How would you investigate a potential data exfiltration event?
Resposta modelo
I'd follow a structured investigation process. First, scope: identify the alert source and initial indicators — unusual data volume to an external IP, DNS tunneling patterns, or unauthorized cloud storage access. Preserve evidence immediately: snapshot affected systems, capture network logs, and note the timeline. Second, analyze: check SIEM logs for the source user/system's full activity timeline. What data was accessed? When did the anomalous behavior start? Is the destination IP known malicious? Cross-reference with DLP alerts, endpoint logs, and authentication logs. Third, determine: is this an actual exfiltration, an authorized data transfer, or a false positive? I'd check with the data owner and the user's manager before escalating. Fourth, if confirmed malicious: isolate affected systems, disable compromised accounts, block the exfiltration channel, and initiate the incident response plan including legal and compliance notification. Fifth, document everything in the incident tracking system with timeline, evidence, and chain of custody. The first 30 minutes are critical — containment speed directly correlates with data loss volume.
-
4. Explain Zero Trust architecture. How would you implement it?
Resposta modelo
Zero Trust operates on the principle 'never trust, always verify' — no implicit trust based on network location, device, or user identity alone. Every access request is authenticated, authorized, and encrypted regardless of where it originates. Implementation in phases: First, identity: strong authentication for all users (MFA mandatory, ideally phishing-resistant like FIDO2). Implement least-privilege access with just-in-time provisioning. Second, device: ensure devices meet security baselines (patched OS, endpoint protection, encryption) before granting access. Use device posture assessment at every connection. Third, network: micro-segmentation to limit lateral movement. Replace VPN with identity-aware proxies (like BeyondCorp/Zscaler) that grant per-application access. Fourth, data: classify data, encrypt at rest and in transit, and implement DLP controls. Fifth, monitoring: continuous verification — don't just authenticate at login, monitor behavior throughout the session. Anomalous behavior triggers re-authentication or access revocation. I'd implement this incrementally, starting with the most sensitive systems and expanding over 12-18 months.
Perguntas situacionais
-
1. You discover that an employee has been accessing files outside their role for weeks. How do you handle it?
Resposta modelo
I'd handle this carefully because it could be anything from an innocent access control misconfiguration to intentional insider threat. First, I'd verify the finding silently — confirm the access logs are accurate, check if the employee's role recently changed (role change without access update is common), and determine what data was accessed. I would not alert the employee. Second, I'd escalate to my security manager and HR with documented evidence: what was accessed, when, how frequently, and whether any data was downloaded or transferred externally. Third, based on their guidance, I'd either work with IT to quietly restrict access (if it appears to be an access control issue) or implement enhanced monitoring if insider threat is suspected. I'd preserve all evidence in case it becomes a legal matter. The key is proportional response — jumping to 'insider threat' when it's just a broken RBAC policy creates unnecessary drama and damages trust.
-
2. A critical zero-day vulnerability is announced for a system you use in production. No patch is available. What do you do?
Resposta modelo
Immediate actions (first hour): assess our exposure — is the vulnerable component reachable from the internet? What data does it have access to? Is there a known exploit in the wild? If we're actively exploitable, I'd implement emergency mitigations: WAF rules to block known exploit patterns, network-level restrictions to limit access to the vulnerable service, and disabling the affected feature if the business impact is acceptable. Short-term (first day): implement monitoring for the specific exploitation indicators, increase logging verbosity for the affected system, and hunt for signs of past exploitation. Communication: brief security leadership and affected system owners with a clear risk assessment and mitigation status. Medium-term: apply the vendor patch the moment it's available, have it pre-staged and tested in staging so we can deploy within hours of release. If no patch comes within a week, evaluate whether to migrate to an alternative or implement architectural changes to isolate the risk. Throughout: track the vulnerability in our risk register with compensating controls documented.
-
3. The marketing team wants to use a new SaaS tool that stores customer data. How do you evaluate the security risk?
Resposta modelo
I'd run a structured vendor risk assessment. First, data classification: what customer data will the tool process? PII, financial data, health data? This determines the regulatory requirements (GDPR, CCPA, HIPAA, PCI-DSS). Second, vendor security posture: request their SOC 2 Type II report, ISO 27001 certification, and penetration test results. Review their data encryption practices (at rest and in transit), access controls, and incident response capabilities. Third, technical review: how does the integration work? OAuth or password-based auth? What API permissions does it need? Where is data stored geographically (matters for GDPR)? Can we enforce SSO and MFA? Fourth, contract review: data processing agreement, breach notification timeline, data ownership and deletion clauses, right to audit. I'd score the vendor on a risk matrix and present a recommendation: approve, approve with conditions (specific security requirements), or reject with alternatives. If approved with conditions, I'd set a review date to verify the conditions are met.
-
4. You're conducting a penetration test and find a critical vulnerability in a production system. The system owner says they can't patch for 3 months. How do you respond?
Resposta modelo
I'd escalate the risk clearly without being adversarial. I'd present the finding with a concrete risk assessment: the vulnerability severity (CVSS score), exploitability (is there a public exploit? is it remotely exploitable?), the data at risk, and the estimated business impact of a breach. I'd propose compensating controls for the interim: network segmentation to limit exposure, WAF rules to block known attack patterns, enhanced monitoring and alerting for exploitation attempts, and reduced access permissions. I'd work with the system owner to understand why patching takes 3 months — sometimes the timeline is real (regulatory change windows, complex dependencies), sometimes it's just scheduling inertia. If compensating controls can reduce the risk to an acceptable level, I'd document the accepted residual risk with sign-off from the system owner and their management. If the risk is truly critical and no compensating controls suffice, I'd escalate to the CISO with a clear recommendation — this becomes a business decision, not just a technical one.
Dicas para a entrevista
Estude a industria da empresa e seu panorama de ameacas provavel. Para perguntas tecnicas, explique sempre seu raciocinio e os trade-offs. Esteja pronto para detalhar um incidente real passo a passo. Conheca seus frameworks (NIST, MITRE ATT&CK, ISO 27001).
Pratique estas perguntas com IA
Experimente uma entrevista simulada grátis
Pratique estas perguntas com IAPerguntas frequentes
- Quais certificacoes sao mais valorizadas?
- CompTIA Security+ para cargos de entrada. CEH e CySA+ para posicoes intermediarias. CISSP para roles senior. OSCP para testes de penetracao.
- Como as entrevistas cyber diferem das de desenvolvimento?
- Focam mais em perguntas baseadas em cenarios, conhecimento de frameworks de seguranca e experiencia pratica com ferramentas de seguranca.
- Devo construir um laboratorio caseiro?
- Sim. Demonstra iniciativa e habilidades praticas. Configure um ambiente virtual com Kali Linux, um alvo vulneravel e um SIEM.
- Programacao e importante para roles de analista cyber?
- Competencias em scripting (Python, Bash, PowerShell) sao cada vez mais esperadas para automacao e analise de logs.
Cargos relacionados
Precisa de um currículo primeiro? Ver exemplo de currículo para Analista de ciberseguranca →