Security Engineer Interview Questions
5 exercises — practice structuring strong English answers to security engineering interview questions: OWASP Top 10, data breach response, threat modeling with STRIDE, API security layering, and least privilege implementation.
How to structure security engineering interview answers
- OWASP questions: cite the 2021 list order → give specific attack patterns under each category (IDOR, horizontal/vertical escalation) → precise mitigations
- Breach response questions: preserve evidence before changes → time-bound phases → regulatory deadlines (GDPR 72h, HIPAA 60d) → engage legal early
- Threat modeling questions: STRIDE on a DFD → trust boundaries → risk scoring → output a threat register → argue for shift-left timing
- API security questions: address all layers — transport, authn, authz (≠ authn!), input validation, rate limiting, logging, headers
- Least privilege questions: apply at all layers — human IAM, service identities, database, Kubernetes → mention just-in-time access → watch for permission drift
0 / 5 completed
1 / 5
The interviewer asks: "Walk me through the OWASP Top 10 and explain the two or three you consider most critical."
Which answer demonstrates the strongest security engineering depth?
Which answer demonstrates the strongest security engineering depth?
Option B is the strongest: it demonstrates knowledge of the current 2021 list (not the outdated 2017 version), gives the specific attack patterns under each category (IDOR, horizontal vs vertical privilege escalation), names precise mitigations with alternatives (bcrypt vs MD5, parameterised queries vs ORMs), and explains why each is critical — not just that it is. Key OWASP knowledge for security interviews: Know the 2021 list order by heart — interviewers often test whether you know Broken Access Control moved to #1 in 2021 (previously #5). Broken Access Control specifics: IDOR (Insecure Direct Object Reference) — /api/orders/1234 where 1234 is another user's order ID. If no authorization check, attacker reads any order. Horizontal privilege escalation — same-role, different user. Vertical privilege escalation — different role (regular → admin). Injection specifics: Always parameterised queries/prepared statements. Never string concatenation. ORMs reduce injection risk but don't eliminate it (raw queries in ORMs can still be vulnerable). Cryptographic Failures specifics: Password hashing ≠ encryption. MD5/SHA-1/SHA-256 are NOT suitable for passwords (too fast, rainbow table attacks). bcrypt, Argon2, scrypt are designed to be slow. Key differentiation: Argon2 won the Password Hashing Competition (2015) and is the current recommendation.