Devsecops Engineer

Devsecops Engineer Interview Questions and Answers

Updated 25 Jun 2025
search-icon
4d ago

Q. Which tools do you use for penetration and vulnerability testing?

Ans.

Various tools are used for penetration and vulnerability testing to identify security weaknesses in applications and systems.

  • OWASP ZAP: An open-source web application security scanner.

  • Burp Suite: A popular tool for web application security testing.

  • Nessus: A widely used vulnerability scanner for network security.

  • Metasploit: A penetration testing framework that helps find and exploit vulnerabilities.

  • Nmap: A network scanning tool used to discover hosts and services.

Asked in NTT

1d ago

Q. What AWS tools are you familiar with?

Ans.

I am familiar with AWS tools such as AWS CodePipeline, AWS CodeBuild, AWS CodeDeploy, AWS CloudFormation, AWS Config, and AWS Security Hub.

  • AWS CodePipeline

  • AWS CodeBuild

  • AWS CodeDeploy

  • AWS CloudFormation

  • AWS Config

  • AWS Security Hub

2d ago

Q. How do you maintain server security and backups?

Ans.

Implementing security measures and regular backups is essential for maintaining server integrity and data safety.

  • Regularly update your server's operating system and software to patch vulnerabilities.

  • Use firewalls and intrusion detection systems to monitor and control incoming and outgoing traffic.

  • Implement strong authentication methods, such as multi-factor authentication (MFA), to secure access.

  • Regularly back up data using automated tools and store backups in a secure, off-s...read more

Asked in bp

5d ago

Q. Describe the security services you have used previously.

Ans.

I have used security services such as AWS WAF, Cloudflare, and Nessus for vulnerability scanning.

  • Utilized AWS WAF to protect web applications from common web exploits

  • Implemented Cloudflare for DDoS protection and CDN services

  • Conducted vulnerability scanning using Nessus to identify security weaknesses

Are these interview questions helpful?

Asked in HARMAN

6d ago

Q. Write a Python program to parse JSON data from a given API.

Ans.

A Python program to fetch and parse JSON data from a specified API endpoint.

  • Use the 'requests' library to make HTTP requests to the API.

  • Parse the JSON response using 'response.json()' method.

  • Handle exceptions using try-except blocks for robust error handling.

  • Example: response = requests.get('https://api.example.com/data')

  • Example: data = response.json()

Asked in NTT

6d ago

Q. Do you program in Python?

Ans.

Yes, I am proficient in Python programming.

  • Yes, I have experience programming in Python for various projects.

  • I have used Python for automation, scripting, web development, and data analysis.

  • Familiar with popular Python libraries and frameworks like Django, Flask, and NumPy.

Devsecops Engineer Jobs

Oracle logo
Senior DevSecOps Engineer - Hyderabad/Bangalore 4-7 years
Oracle
3.7
₹ 17 L/yr - ₹ 24 L/yr
(AmbitionBox estimate)
Hyderabad / Secunderabad
Gallagher Service Center (GSC) logo
Devsecops Engineer|| Kochi, Kerala || 3-7 Years experience 3-7 years
Gallagher Service Center (GSC)
3.7
Kochi
QUEST DIAGNOSTICS HTAS INDIA PRIVATE LIMITED logo
Devsecops Engineer 4-7 years
QUEST DIAGNOSTICS HTAS INDIA PRIVATE LIMITED
4.1
Hyderabad / Secunderabad

Asked in bp

2d ago

Q. Describe complex VPC architectures

Ans.

Complex VPC architectures involve multiple subnets, route tables, security groups, and network ACLs to create a secure and scalable network environment.

  • Utilize multiple subnets to segment resources based on function or security requirements

  • Implement route tables to control traffic between subnets and to the internet

  • Use security groups to define inbound and outbound traffic rules for instances

  • Leverage network ACLs to provide an additional layer of security at the subnet level

  • C...read more

1d ago

Q. Explain cyber security and related tools.

Ans.

Cybersecurity involves protecting systems, networks, and data from digital attacks using various tools and practices.

  • Firewalls: Act as barriers between trusted and untrusted networks (e.g., Cisco ASA).

  • Intrusion Detection Systems (IDS): Monitor network traffic for suspicious activity (e.g., Snort).

  • Encryption Tools: Secure data by converting it into a coded format (e.g., AES, SSL/TLS).

  • Antivirus Software: Detect and remove malware from systems (e.g., Norton, McAfee).

  • Security Inf...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Interview Experiences of Popular Companies

HARMAN Logo
3.8
 • 276 Interviews
bp Logo
3.8
 • 69 Interviews
NTT Logo
3.9
 • 62 Interviews
WPP Logo
2.9
 • 19 Interviews
View all
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Devsecops Engineer Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Trusted by over 1.5 Crore job seekers to find their right fit company
80 L+

Reviews

10L+

Interviews

4 Cr+

Salaries

1.5 Cr+

Users

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter
Profile Image
Hello, Guest
AmbitionBox Employee Choice Awards 2025
Winners announced!
awards-icon
Contribute to help millions!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Add office benefits
Add office benefits