JOB INTERVIEW DIALOGUE
JOB DESC :
1. Al Ferdaus Leon Wagge ( 1202210058 ) as Interviewer 3 2. Dimas Jaya Kusuma ( 1202210404 ) as Interviewer 1 3. Fairuz Ichsan ( 1202210173 ) as Interviewer 2
4. Hilmy Adlan Ahmad Ghifari ( 1202210138 ) as Cyber Security Candidate
5. Muhammad Rayhan Maulana Al Rasyid (1202210288 ) as Network Engineer Candidate
Company Introduction
Interviewer 1 (Dimas Jaya Kusuma):Good morning, thank you for taking the time to come to PT.
Sehat Jaya Abadi. We are a company specializing in IT solutions, particularly in developing digital healthcare systems. Today, we will conduct an interview for the position you applied for.
Let’s start with a brief introduction.
Applicant 1: Cyber Security
Interviewer 1 (Dimas Jaya Kusuma):Can you tell us a bit about yourself and your experience relevant to this position?
Applicant (Hilmy Adlan Ahmad Ghifari - Cyber Security):Good morning, my name is Hilmy Adlan Ahmad Ghifari. I am a graduate in Information Systems with a special interest in cybersecurity. I worked on a project developing an AI-based firewall system during my studies and hold a CEH (Certified Ethical Hacker) certification.
Interviewer 2 (Fairuz Ichsan):That’s very interesting, Hilmy. Why did you choose cybersecurity as your career path?
Applicant (Hilmy):I see the increasing threats in the digital era, and I want to be part of the solution to protect sensitive data and information. Also, I enjoy the challenges of identifying security vulnerabilities and fixing them.
Interviewer 3 (Al Ferdaus Leon Wagge):If you encounter a ransomware attack in the company’s system, what would be your first step?
Applicant (Hilmy):My first step would be to isolate the affected system to prevent the spread.
Then, I would conduct an in-depth analysis to identify the type of ransomware and ensure that backup data is secure and accessible.
Interviewer 1 (Dimas Jaya Kusuma):You mentioned having a CEH certification. Can you explain one ethical hacking technique you have used in a project?
Applicant (Hilmy):I have used penetration testing with the OWASP methodology to identify vulnerabilities in web applications. I successfully identified an SQL Injection vulnerability and provided solutions to fix it.
Interviewer 2 (Fairuz Ichsan):How do you keep yourself updated with the latest cybersecurity threats?
Applicant (Hilmy):I regularly attend cybersecurity webinars, read current journals, and join cybersecurity communities on platforms like GitHub and LinkedIn.
Interviewer 3 (Al Ferdaus Leon Wagge):What would you do if you found a team member not complying with security policies?
Applicant (Hilmy):I would professionally address the team member, explain the potential risks, and escalate the issue to management if the problem persists.
Interviewer 1 (Dimas Jaya Kusuma):Thank you, Hilmy. Let’s proceed to the next candidate.
Applicant 2: Network Engineer
Interviewer 1 (Dimas Jaya Kusuma):Rayhan, you are applying for the Network Engineer position. Can you share your experience in this field?
Applicant (Muhammad Rayhan Maulana Al Rasyid - Network Engineer):Sure, I have experience building network infrastructure in the campus lab and completing a network
optimization project for a local startup. I also hold a CCNA (Cisco Certified Network Associate) certification.
Interviewer 2 (Fairuz Ichsan):What strategy would you use to reduce latency in the company’s network?
Applicant (Rayhan):I would identify bottlenecks in the network using monitoring tools like Wireshark or SolarWinds. Then, I would optimize routing and consider bandwidth upgrades if necessary.
Interviewer 3 (Al Ferdaus Leon Wagge):How would you handle a situation where there is a major network downtime affecting the company’s operations?
Applicant (Rayhan):I would immediately prioritize recovery by analyzing the root cause of the downtime, utilizing redundancy protocols if available, and ensuring quick communication with the relevant teams to minimize the impact.
Interviewer 1 (Dimas Jaya Kusuma):Have you worked with SD-WAN technology before? If so, what was your experience?
Applicant (Rayhan):Yes, I worked with SD-WAN technology during my internship project. It helped improve efficiency and security, especially in managing branch offices’ network
infrastructures.
Interviewer 2 (Fairuz Ichsan):How do you ensure network security in an organization?
Applicant (Rayhan):I implement advanced firewalls, use encryption for transmitted data, and conduct regular security audits.
Interviewer 3 (Al Ferdaus Leon Wagge):What is the biggest challenge you have faced in managing a network, and how did you overcome it?
Applicant (Rayhan):The biggest challenge was handling a DDoS attack during a campus project. I overcame it by implementing filtering systems and blocking suspicious IPs through the firewall.
Interviewer 1 (Dimas Jaya Kusuma):Thank you for your explanation. Do you have any questions for us?
Applicant (Rayhan):Yes, I would like to know more about the career development process at PT. Sehat Jaya Abadi.
Interviewer 2 (Fairuz Ichsan):We provide regular training, certifications, and opportunities to be involved in innovative projects to support employee career growth.
Closing
Interviewer 1 (Dimas Jaya Kusuma):Alright, that concludes the interview. We will contact you regarding the results. Thank you for your time.