26 Atos Interview Questions & Answers
Below is a list of our Atos interview questions. Click on any interview question to view our answer advice and answer examples. You may view six answer examples before our paywall loads. Afterwards, you'll be asked to upgrade to view the rest of our answers.
1. We're a company of innovative thinkers; we rely upon our innovative thinking to solve client problems. Tell me about a time when you came up with a breakthrough idea that was not obvious to others. Describe your idea and how you developed it?
How to Answer
Innovation is the cornerstone of any successful company. If you show me a highly successful company, I will show you people within that company that were innovative thinkers. Great examples are Steve Jobs from Apple, Bill gates from Microsoft, and Jeff Bezos of Amazon just to name a few. The hiring manager is posing this as a two-part question to see if your response is clear, concise, and related to the question. Stay on point with your response, because that's what they're looking for. Think about this question for a minute to dissect what they are asking. They are a company of innovators.....which means, will you fit into their culture and be able to come up with ideas that will be innovative. They will be listening attentively to how you articulate your message about your breakthrough idea. Walk them through how you came up with the idea, what your thought process was, how you got approval to move forward, and how you executed on the idea.
Written by Tom Dushaj on February 17th, 2019
1st Answer Example
"I've always considered myself an Outside the Box thinker. Settling for the norm has never been my working style. I always work with the expectation that my idea will serve many purposes, and bring value to our customers. One example is when I came up with an idea to train the trainer at multiple locations via remote video conferencing. This idea was well received, and was implemented at over 50 locations worldwide. I came up with the idea because I was responsible for training multiple divisions and didn't have the budget to fly everyone in from multiple locations for the training sessions."
Written by Tom Dushaj on February 17th, 2019
2nd Answer Example
"I was working on implementing a friendlier looking graphical user interface solution for a financial services client. The inspiration came from the feedback I received from people at the client site complaining about processing transactions on a mainframe computer that wasn't much fun to work with or look at. They were used to the dreaded Green Screen on a mainframe, but my solution had a Windows look and feel which they liked quite a lot."
2. Can you name some open source cloud computing platform databases?
How to Answer
By asking this question, the interviewer is testing your knowledge of open source cloud databases and trying to learn if you are familiar with and can offer options to your customers. The best way to answer this question is to name the databases you have knowledge of and recommending which one is best for your customer's requirements.
Written by William Swansen on February 17th, 2019
1st Answer Example
"There are three main open source cloud computing databases. They are Couch, Lucid and Mongo. These differ from proprietary databases based on there being no licenses required to use them and the ability of the IT community to make revisions in them to improve their performance. Of these, I believe (insert the name of the one you recommend here) is best suited for most client's needs. Not only does it have the features they require, but they won't have to pay any licensing fees, and they can upgrade it at any time."
Written by William Swansen on February 17th, 2019
2nd Answer Example
"The three main open source cloud databases are Couch DB, Lucid DB, and Mongo DB. For most situations I recommend (insert the one you recommend here.) In addition to having experience with this open-sourced cloud database, I have also worked with Oracle and SQL. This has given me a good perspective on the differences between these such as licensing requirements, scalability, reliability and stability of the platform. I'm comfortable recommending this one to my clients, but if you'd like, I can also discuss either open source or proprietary cloud databases with them."
3. Listening to our clients is absolutely essential to understanding their business and technology needs. Tell me about a time when you're listening skills helped exceed their expectations in the delivery of the project?
How to Answer
It's easy for a client to overlook small details, that's why they hire IT Consultants so they can stay in the know. IT Consultants typically take a deeper dive into a clients operation from a technology and business perspective. One of the biggest reasons that clients look to IT consultants is to look at their organization from an outsider's point of view. Having a vantage point into client operations, and how they do things tells the client that another pair of eyes sees things they might have missed. It's important to recognize that a client is relying on your expertise to give them a perspective that an internal employee would normally not see. Some of the areas you might want to address with the client is how they run their operations, and even have them rate their current level of expertise with all their technologies. This will reveal a few things. One of the most important is where you need to navigate and lead the interview discussion. Asking questions like what do you like and dislike about your current operations. Offer up that you like the challenge of solving problems, and working in different types of environments, and perfecting your craft.
Written by Tom Dushaj on February 17th, 2019
1st Answer Example
"I've worked with many clients at different levels of an organization, including executive level management personnel. Being a good listener is an absolute requirement, and getting the opportunity to collaborate with clients and help solve their problems is very rewarding for me. It's important for me to show clients that they are getting the highest value possible for their money. When I have conversations with clients, I sometimes find that they don't know what they don't know, and I find that this is a good base level start because you're starting from scratch and identifying problems as you walk through their environment from top to bottom. My basic qualifiers start with technology, and how they use it. Here's a basic outline of questions I posed.
1. What platform do you run your ERP or enterprise software? Windows, UNIX, Linux, etc.? The reason I ask this questions is after I find out what they are using, it's easier for me to suggest a software solution. After explaining the pros and cons of their current set up, I recommend a solution that will help solve their problem.
2. What database are you using to store your data? SQL Server, Oracle, Sybase, BD2, etc. The reason I ask this question is to see if they are up to date with current versions, and the capacity of data and where it resides. I also ask whether their data is On-Premise or in the Cloud. Depending on the responses, I would be able to make suggestions on efficient ways to work with that data."
Written by Tom Dushaj on February 17th, 2019
2nd Answer Example
"My prior work has taught me that asking the right questions at the right time is very important. When I do discovery with a client, there are a number of questions that I ask to arrive at a few core problems they are facing. Let me give you an example of what I ask, and why.
1. Walk me through your current process, and highlight an area where you are experiencing pains and challenges? The reason I ask this is to build trust with the client, and get them to talk extensively about their problems, and how you can propose a solution.
2. Is it your belief that a software application will be able to solve these problems for you? I ask this question to see if they think they need a software solution, or is it just a process fix that can be achieved by process and productivity improvements, along with process re-engineering."
4. What is the difference between Asymmetric and Symmetric encryption and which one is better?
How to Answer
When comparing Asymmetric and Symmetric encryption, there are many things you need to be aware of. Not only will you need to know the difference between the two, but how they are used, and which one is better in a particular situation. It's important that you can articulate to the hiring manager examples of how you used both in specific situations and what you did to put an air-tight security solution in place that is impenetrable. Cyber Security has become one of the most important topics in technology today. Anytime you're processing credit card transactions through a payment gateway online, or at a brick and mortar retail store, you're dealing with vital consumer information, and hiring managers are going to want to hear how you keep these things protected.
Written by Tom Dushaj on February 17th, 2019
1st Answer Example
"When I work with Asymmetric encryption, I always take into account that there has to be a private key and a public key for anyone sending a message. I have to adhere to a decryption policy for where and how the public and private is stored and shared. The way I view the differences between the two are the execution of asymmetric encryption algorithms is slower than symmetric encryption algorithms. Although the asymmetric encryption is mostly used for exchanging keys in a secure manner, it is used for establishing a secure channel over a non-secure medium such as the internet. The most common form of an encryption algorithm is Diffie-Hellman."
Written by Tom Dushaj on February 17th, 2019
2nd Answer Example
"In my current role I do work with Symmetric encryption. Since Symmetric encryption which uses a single key for encryption and decryption, I am responsible for monitoring the data transmission of those communication messages to prevent a potential intrusion or breach alert. As with many symmetric encryption algorithms, they execute faster, and are less complex than Asymmetric encryption, and are a preferred method of encryption communication. The most commonly used symmetric encryption algorithms are 3 DES, AES, DES, and RC4."
5. The most successful Real Estate agents are highly motivated. What motivates you?
How to Answer
Typically, employees find motivation in environments where they feel supported and encouraged. The interviewer wants to know how they could motivate you - even on the toughest of days! Be open with the interviewer about the ways you can stay motivated on the job, even when the going gets tough.
1st Answer Example
"It does not take a lot to keep me motivated. If I work in a positive environment with a forward-thinking team, I am a very happy employee. If you see me going above and beyond, a quick thanks or a little token of recognition of my hard work is good enough for me."
2nd Answer Example
"I consider myself a self-motivated individual who is constantly striving to be better and do better. I draw inspiration from leaders in the industry and those around me to keep my motivation high."
6. As I understand it, the network is the most vulnerable part of a company's IT infrastructure. What is your opinion of this and how would you define the threat and risk to a company in terms of network security?
How to Answer
This is a 'set the table' question which provides the interviewer with an overview of your knowledge of and perspective on network security.
Written by William Swansen on February 17th, 2019
1st Answer Example
"The network infrastructure is the most vulnerable part of the IT system because it is the easiest part to access. Since all the company's data is transmitted via the network, hackers focus on this to get the data for malevolent uses. This is the threat to the system. The risk is the company's responsibility to secure their users' and customers' information or be subject to fines, injunctions or even shut down. Measures need to be taken to minimize both the threats and the risks related to network security. I am well versed in these and can expound on them if you would like me to."
Written by William Swansen on February 17th, 2019
2nd Answer Example
"I agree with you that the greatest threat to a company's IT infrastructure is the network. Hackers target the network because it is the easiest part of the system to access and because all the data is transmitted over the network. It's the data that hackers want and can cause the most disruption with. The risk to the company if the data is compromised is the loss of business, fines and injunctions and the possibility of being shut down. While the threat associated with network security will always remain, the risk can be minimized through prudent network security practices and procedures."
7. What are your salary expectations?
How to Answer
The best way to discuss your salary expectations is to use your current earnings as an example. Be open, and honest. Transparency is the best choice when salary based questions arise.
1st Answer Example
"Currently, I earn a base salary of $45,000 per year plus a potential 20% annual bonus. Last year my earnings were $52,000, and I would like to stay in the same range or slightly higher."
2nd Answer Example
"I am currently making $100,000 per year with two bonus opportunities. I am looking for compensation that is aligned with the role and provides an opportunity for growth."
8. What are the various ways to inform employees about information security policies and procedures?
How to Answer
Anyone in IT leadership that is responsible for establishing and maintaining company policy and procedures for security needs to ensure that there's a system in place for monitoring corporate computers and mobile devices to protect against email viruses, malware, and data breaches. You'll find that hiring managers tend to spend a bit more time on this question because they want to gauge your level of confidence on how you implement these practices across the company and the way you communicate the procedures to all employees. The experience you share with the manager will be a reflection of your capabilities and will show that you can think outside the box. It's not uncommon for a manager to ask you to talk at length about communicating effective ways to identify phishing emails, transferring confidential files securely, password management tips, and applying privacy and security updates for all employees. This helps the manager see the level of detail that you go through to protect your company's employees.
Written by Tom Dushaj on February 17th, 2019
1st Answer Example
"If you look at statistics on how attacks were established. You will find that over 50% of attacks came from employees within a company that inadvertently allowed access to a hacker, or simply disregarded company security policy. At my last company, I was directly involved in writing the security policies and procedures, as well as setting guidelines and conducting training sessions with employees to teach them to detect phishing emails and similar scams. I demonstrated in detail what a phishing email looks like, and what to look for when they receive one, and the procedure to follow once this type of scam is identified. I created an email account so that anyone who received these phishing emails,l could send them straight to that account."
Written by Tom Dushaj on February 17th, 2019
2nd Answer Example
"During my security training sessions with employees, I explained the importance of cyber security, and pointed out the risks of an attack and the negative impact it could have on our organization if personal employee or company information is compromised. As part of the training sessions, I discussed in detail the use of and management of strong passwords, and how to use unique characters when selecting new passwords. As a way of making sure all employees were adhering to our security policies, I set quarterly reminders for everyone to change their passwords. I also had everyone apply updates to their systems and privacy settings."
9. In your opinion, what has been the most exciting use of artificial intelligence this year?
How to Answer
The interviewer would like to see that you take the time to learn about the artificial intelligence industry and learn about the latest breakthroughs in AI technology. Show off your knowledge by discussing the details of an exciting event in AI this year.
Written by Rachelle Enns on February 17th, 2019
1st Answer Example
"I have been reading a lot on smart city schemes and am fascinated with the plans for self-driving, autonomous, shared vehicles. I have also read that; in this smart city, robots would take on tasks such as mail delivery. Once the structure is there, cities will be able to build on the concept but making it their own, and customizing needs based on population, and existing infrastructure."
Written by Rachelle Enns on February 17th, 2019
2nd Answer Example
"I am keeping tabs on the breakthroughs this year in robotic workforce plans, and find this entire concept to be very exciting. According to one article I read from Washington Post, people are anticipating that nearly 1/3 of American jobs will be taken over by the robotic workforce in the next 15 years."
10. Describe a situation where a project you were managing failed. What did you learn about this failure, and were you able to salvage or turn it around?
How to Answer
As much as we don't like to think about it, sometimes projects fail, and in some cases for reasons beyond our control. Hiring managers realize things do go wrong and projects have to get back on track and show a successful outcome quickly. The more complex the project, the higher the chances are that the project might fail. This question focuses on your ability to bounce back from failure, and what you did to turn it around. Give some thought as to how you might explain why the project failed, and outline the steps you took to turn it around. It is important to list what exactly happened, what lessons were learned, and what you do now to safeguard future projects from failure.
Written by Tom Dushaj on February 17th, 2019
1st Answer Example
"I was a consultant managing a project with five other team members, and our goal was to develop a loan application app to qualify a buyer for a mortgage. I noticed that we were not able to meet deadlines or present mock designs of the app when the client requested it. I later found several flaws in our methodology and approach which led to delays and cost over-runs. I had to take a step back a re-evaluate exactly what went wrong, and quickly make corrections. Here's what I did to turn it around, and the educational journey it took me through.
1.) Take a step back and evaluate how you arrived at this point
2.) Temporarily stop the project
3.) Figure out why the project is failing
4.) Set up a turn-around (war) room
5.) Draft an agenda to go over findings, from quantitative reports to team member interviews
6.) Re-assignment of team member tasks and roles
7.) Gather all notes and project collateral
8.) Set clear objectives, and ask each team member to provide you a work list with specific tasks they are responsible for on the project, and their understanding of the team goals"
Written by Tom Dushaj on February 17th, 2019
2nd Answer Example
"A failed project can be humbling, and eye-opening at the same time. If not managed and executed properly, it can go horribly wrong. That's why when I put together a team for a project; I religiously follow a methodology that works flawlessly. I've learned to become good at this methodology after a failed project a few years ago. It also made me good at spotting where projects go wrong, and where I needed to make immediate changes. Let me break down what I learned about the failed project, and what I did to turn it around:
1.) What did I learn from the process
2.) How did it affect me and the team
3.) What were the key issues that caused the failure
4.) I found that the key issues were.....Complexity, External Influence, Financial, Organizational, Technology, and Scheduling"
11. What type of manager brings out the best in you?
How to Answer
The interviewer wants to see that you are self-aware and understand the type of manager or employer that brings out the best in you. Some individuals prefer a close working relationship with a lot of accountability while others prefer space and autonomy. If you are unsure of the management style of the interviewing company, try to leave your answer as open as possible. You can certainly ask the interviewer to describe their management style.
1st Answer Example
"I have worked with a wide range of personalities and management styles with great success. If I could express a preference, I feel that I am best in an independent and autonomous environment. Can you describe the management style here?"
2nd Answer Example
"Here are some management styles:
- Directive Autocrat
- Permissive Autocrat
- Consultative Style
- Persuasive Style
- Inclusive
- Democratic Style
- MBWA (Management By Walking Around)
- Laissez-faire
- Mentorship Style"
12. What are the benefits of automating IT operations through the use of Artificial Intelligence?
How to Answer
The better you understand the concept of AIOps, the better you will be able to explain its benefits to the interviewer. Show that you are aware of the benefits related to automating IT operations through the use of AI.
For a business, some of the benefits include:
- Better use and disbursement of resources
- Improved storage management
- Elevated capacity planning capabilities
- Ability to detect anomalies faster, and more accurately
- Boosted threat detection and analysis
Written by Rachelle Enns on February 17th, 2019
1st Answer Example
"Although there are many critics since AIOps is somewhat in its infancy, I believe that the benefits include the ability to detect better and analyze IT threats. Also, AI is allowing us to better plan around those potential threats, and detect anomalies faster."
Written by Rachelle Enns on February 17th, 2019
2nd Answer Example
"There are a plethora of benefits to automating IT operations using AI. What first comes to mind is the ability to streamline operations, and better use and disperse resources. The implementation of AIOps will also significantly help when it comes to timely threat detection."
13. Would you be willing to work over 40 hours a week?
How to Answer
Before answering scheduling questions, it's important to be clear on the interviewer's expectations. If you haven't had a chance to clarify their scheduling needs, now would be the perfect time to ask!
Consider asking, 'What are the scheduling expectations for this position?' If they expect you to work 12 hour days, it would be important for you to know that before you respond with, 'Absolutely! No problem!' You want to be sure that you can meet their expectations.
If it turns out their schedule expectations won't work for you, think about what you CAN offer and see if you can meet in the middle. It's much better to discuss these things in an interview than for you to commit to a schedule that won't work for you.
Keep in mind that, in most states, an employer cannot demand that an employee work more than 44 hours per week.
1st Answer Example
"I am available for full-time work which is preferably 8-5 Monday to Friday. I am happy to be a team player and work some overtime, as required. Will these hours meet your expectations?"
2nd Answer Example
"If overtime is required in this role, I am happy to accommodate whenever I can. My only restriction is that I cannot work Wednesday nights as I have an evening course those days."
14. Many of our clients have been subject to repeated attempts to access their network from unauthorized sources. One type of attack we often see is brute force logins. How do you recommend they defend against this type of attack?
How to Answer
This is a direct question to determine your knowledge in this area. This type of attack is one of the more common ones related to network security, and you should be aware of and able to recommend measures to defend against it.
Written by William Swansen on February 17th, 2019
1st Answer Example
"Brute force login attacks are common, and there are three measures you can use to defend against them. The first is account lockout. Any account attempting this type of access can be locked until the administrator decides if it has been compromised or not. The second defense is called progressive delay. This involves locking the account for a set period of time after several unsuccessful login attempts. Finally, there is the challenge-response test, where users are asked to verify a predetermined security question they set up when registering for their account. I would recommend either one or a combination of these which best meet the client's business model."
Written by William Swansen on February 17th, 2019
2nd Answer Example
"There are three common methods used to defend a company's network from unauthorized access via a brute force login attack. These are account lockout, progressive delay, and challenge response. Account lockout involves intervention by a system administrator to lock out a user until the admin is satisfied that they are actually who they say they are and simply forgot their password. A progress delay defense employs a timed lockout, ranging from minutes to days to give the user time to legitimately retrieve or reset their password. The final defense, known as the challenge-response requires the user to provide a security reminder that they set up when they registered their account. All three are effective and can be used either alone or together."
15. How would you explain machine learning to someone who does not know the industry?
How to Answer
Machine learning (ML) is a part of the AI field (artificial intelligence). Machine learning allows computer systems to 'learn' from the data and statistics that we provide to it. The interviewer knows that the better you understand ML, the easier it will be for you to explain the concept to someone outside of the industry, who may not be as tech savvy as you are. Try preparing a 2-3 sentence 'elevator pitch' on what machine learning is. Keep your reply as simple as possible, and give an example if possible.
Written by Rachelle Enns on February 17th, 2019
1st Answer Example
"Machine learning is a term that refers to how computer technology is used to collect information about customers and businesses. The information is then used to help companies make business decisions related to marketing, advertising, and product development."
Written by Rachelle Enns on February 17th, 2019
2nd Answer Example
"To best way to explain machine learning to someone outside of the industry would be to give a relatable example. I like to use the example of the Hello Barbie toy. Using machine learning and language processing, Hello Barbie listens and responds to a child's questions. A microphone on the toy transmits the conversation to a hub. The recording is then analyzed to determine the appropriate response. Then, the correct response comes back to the child, in under one second. Answers are stored for future use, and used to help the machine 'learn,' ensuring more accurate answers as time goes on."
16. Can you describe the difference between a Black Hat, White Hat and Grey Hat hacker?
How to Answer
When it comes to cyber hackers, you will hear three terms used for hackers. They are Black Hat, White Hat, and Gray Hat hackers. These terms are also synonymous with Search Engine Optimization as well. For informational purposes, here's an overview of all three: Black Hat Hacker - Someone who has knowledge about breaking into or breaching computer systems and bypassing their security protocols. Their primary motivation is to financial or personal gain, and to spread malware or viruses in order to gain access to these computer systems. White Hat Hacker - Someone who is known to use their skills for good rather than evil. They typically work as Cyber Security consultants that are paid to find security vulnerabilities in systems, and work to strengthen those security holes for clients. In A hiring manager might pose a carefully crafted question to determine how well you know each one, and if you fall into one of the three categories. They want to know will you be able to defend against a cyber attack, and how you handle threats from hackers.
Written by Tom Dushaj on February 17th, 2019
1st Answer Example
"When I think of Black Hat Hackers, a few things come to mind. An individual or group of hackers whose intent is to either maliciously penetrate a company's system by writing and distributing malware that leaves a company vulnerable and susceptible to further attacks. The others are cyber espionage and political persuasion. I am directly responsible for following our company protocol when we are alerted that a Black Hat attack is in progress. Much like a chess game, I carefully engage and monitor the activities of the Black Hat Hacker to see what steps and moves I must execute to prevent loss of data or a breach. One of the biggest motivations for Black Hat hackers is personal or financial gain."
Written by Tom Dushaj on February 17th, 2019
2nd Answer Example
"On the flip side of Black Hat Hackers is White Hat Hackers, which serve a completely different purpose and role. White Hat Hackers are what's called ethical hackers. I worked with a company that employed a White Hat Hacker, and I was assigned to work with this individual on a project to perform penetration testing and vulnerability assessments on the security systems to attempt to find weak spots and holes in our system via various hacking methods. I'm also familiar with how Gray Hat Hackers work, and I'm careful how I work and interface with them. The reason being is they don't fall within the Black Hat or White Hat Hacker category, thus the name Gray Hat hacker. I've found that they tend to look for vulnerabilities in a system without notifying the owner of the systems knowledge, and offer to fix those issues for a small fee. There are also instances where I have seen Gray Hat Hackers where Gray Hat hackers post a company's vulnerability in a public forum or social media platform for all to see. I've found that not all hackers are created equal, but I do take precautions with all hackers anyway."
17. In Real Estate, timing is everything. How do you determine priorities when you have multiple projects due?
How to Answer
When you feel torn between multiple projects or tasks, how do you decide which one needs your attention the most? Assure the interviewer that you can be diligent when it comes to assessing your priorities.
1st Answer Example
"I will determine which project requires my attention by the number of hours we are behind and then the project size. I am comfortable delegating tasks when needed, but I am also aware that these times will require an additional commitment of hours from me. Never have I under delivered on a deadline."
2nd Answer Example
"I determine priorities based on project value and receptiveness of my client. The most engaged clients generally get my attention and the fastest turnaround."
18. Have you worked on application development projects, if so what technologies have you used, and what was your specific role on those projects?
How to Answer
Application development is a broad set of technologies, and it can apply to building applications using tools from several software brands. There are typically two categories of technologies within application development. The first is client-side scripting/coding using technologies such as HTML, JavaScript, jQuery, etc. The second is Server side scripting/coding using technologies such as PHP, ASP (Microsoft), Cold Fusion, Python, etc. The reason a hiring manager at Atos would ask this question is to see which category you fall under. They want to know if you're qualified to do both. Most consultants who have spent considerable time consulting on application development projects should have a solid working knowledge of both. The hiring manager might also ask about the application development lifecycle which is now more geared toward web application development. Almost all applications nowadays will be developed for the web. When you answer these questions, make sure you understand what they are asking before giving a full explanation.
Written by Tom Dushaj on February 17th, 2019
1st Answer Example
"I've worked on several client-side coding projects in my current role, and in past roles as well. My preference and strength is client-side coding, but it doesn't discount the fact that I'm equally as strong on server-side coding. Most recently, I'm leading a team of web developers on a few projects. On one of our projects, we're using HTML, JavaScript, Ajax, and jQuery frameworks development tools to develop an e-commerce web portal to sell our company products globally. I Incorporated Magento as the shopping cart solution to make it easy to order using a credit card or other online payment options."
Written by Tom Dushaj on February 17th, 2019
2nd Answer Example
"Although I can work on both client-side and server-side, I'm mindful that web servers need to be addressed a little differently so both server-side and client-side can co-exist in harmony. As part of any development project, there are certain guidelines and standards that need to be followed to ensure the project is a success. My role is to be hands-on when it comes to identifying which web application frameworks to use for specific projects and to make sure the team is adhering to coding guidelines and standards like folder structure, file names, coding logic, file organization, classes and functions, and naming conventions. As with any development project, I do follow the web applications lifecycle model which covers; defining the application requirements, analysis, architecture design, team development, programming testing and bug fixing, and implementation."
19. Many companies are new to the cloud computing environment. How do you brief them about what security aspects come with a cloud?
How to Answer
The interviewer is testing your knowledge of security measures associated with the cloud environment and your ability to help customers manage their company's cloud.
Knowing how to advise Atos's clients on the benefits of the cloud, specifically on security issues, will be a huge selling point for you landing the job.
Written by William Swansen on February 17th, 2019
1st Answer Example
"Cloud environments can be as secure as computing environments hosted on-premise based on two key attributes. These are Authentication and authorization, and Control of access. Authentication allows only those users who are authorized to access the resources hosted in the cloud. These include data, applications, and storage. Control of access is a system administrator tool which enables them to allow or deny access to specific users. Together, these tools provide a safe and secure cloud environment."
Written by William Swansen on February 17th, 2019
2nd Answer Example
"There are two control mechanisms which keep hosted cloud compute environments safe and secure. These are Authentication and authorization, and Control of access. Authentication and authorization prevent unauthorized parties from accessing a company's data and applications. This is also known as 'Hacking." Control of access is the methodology system administrators use to provide authorization to known users. By only allowing authorized users to enter the system and then requiring them to authenticate themselves, companies can be assured their data and other computing resources are safe from theft and misuse."
20. IT projects rely on teams and each other to succeed. Describe a scenario were you lead your team to a successful outcome?
How to Answer
Here's a great opportunity to show the value and worth that you can bring to the organization. While you were managing a team, you can describe how you motivated and empowered your team so they could have ownership and accountability on the project. Your goals should be to illustrate how you recognized the team's achievements, and inspired them to work towards a successful outcome. Don't forget to provide examples of when you were able to meet deadlines, and overcome obstacles that might have delayed your project. Lastly, provide a purpose for the project, and how important their involvement is, and why it's important to have a successful outcome for the project.
Written by Tom Dushaj on February 17th, 2019
1st Answer Example
"Teams respond in different ways based on how their manager leads. I found this to be true in many cases when I manage teams. I feel that effective collaboration and leveraging the appropriate resources is important to reach a goal or target. I strongly believe that building strong relationships with my team and stakeholders separates me from mediocre managers. Igniting a passion in my team has helped me show them that anything is possible when you work together as a team to achieve a successful outcome. It's not difficult to envision a goal if you nurture a belief in your team, and trust their capabilities. Case in point, I was tasked with creating and documenting a sequence of events for our IT Project Management team so that projects could be assigned more efficiently, and everyone from the project management team would get task notifications to complete before the next phase of a project could be assigned to another project manager. This resulted in projects starting and completing 40% faster, and with an established sequence in place, this was easy to follow and maintain for the department manager."
Written by Tom Dushaj on February 17th, 2019
2nd Answer Example
"There was a particular instance where my team and I were assigned a project to re-write the functionality of a module from our enterprise software. Our goal was to develop new features in the manufacturing module so it could perform real-time data analytics and the plant manager could track inventory levels, and error rates in the production environment. I made sure that my team was well prepared and understood what needed to be done for this to be a success. This initiative resulted in timely reorders when stock was low, and it also reduced error rates by 70% which also resulted in cost savings to our bottom line."
21. How would your most recent manager describe you?
How to Answer
When you answer this question, draw from your last performance review and a piece of feedback you have received from your most recent boss or coworkers. You do not want to guess what your manager thinks of you. Solidify your answer by referring to the strong employment references you are able to provide.
1st Answer Example
"In my recent performance reviews and discussions, my manager describes me as a hard worker, motivated and consistent employee. I always strive to exceed expectations when I can. My current manager is happy to speak on my behalf as a positive reference as well."
2nd Answer Example
"My last manager and I had a close relationship. She appreciated all of my efforts when it came to working overtime and taking my work home when required. I believe she would describe me as unique, reliable and energetic."
22. Why is this job with Atos right for you, at this time in your career?
How to Answer
Discuss with the interviewer why you are looking to make a change, and how this particular role fits well with the changes that you are seeking. Be sure to give a more in-depth answer than the typical 'I am looking for growth' answer that so many interviewers hear. Be thoughtful and draw upon the research you have done on the company.
1st Answer Example
"I have been passively seeking a new position for quite some time and haven't jumped on anything yet because I want to make sure it's the right fit. I feel that this job is right for me, at this point in my career, because it offers an opportunity for me to utilize my recent education in IT while giving me an opportunity to advance in my management skills."
2nd Answer Example
"This job is right for me at this time in my career because I am prepared and ready to take on a management position. I feel that your company would nurture my desire for growth and prepare me with the appropriate training."
23. As part of the IT team, how do you approach your role in the implementation and roll out of new software and technical programs?
How to Answer
The interviewer is asking this question to determine if the candidate is ready and willing to provide training and operational support to employees and users of new software and technical programs when they are being rolled out by the IT department. While it is the role of other individuals within the IT department to lead the development and/or selection of these programs, when it is time to roll them out to end users, these users will rely on the business process and operations staff for training, technical assistance, and best-practice information. The candidate can successfully answer this question by providing details on how they would develop and execute a training plan, and a stronger answer would include an example of how they have approached a similar situation in the past in one of their professional positions.
For example, "As a business process and operations professional, I understand it is my responsibility to assist with the training of staff and end users when a new software program or application is being rolled out. When faced with this type of situation at Atos, I will do everything I can to ensure the software implementation goes smoothly, and that includes learning all the ins-and-outs of the software application, developing user manuals and process flows, hosting user training, and ensuring help desk staff has in-depth training so they can offer adequate support to users. I understand that effective training on new software applications is key to getting staff and users to adopt the new systems, and in my business process and operations role, I will do everything I can to ensure employees at Atos feel supported."
Written by Kelly Burlison on February 17th, 2019
1st Answer Example
"As a business process and operations professional, I understand it is my responsibility to assist with the training of staff and end users when a new software program or application is being rolled out. When faced with this type of situation at Atos, I will do everything I can to ensure the software implementation goes smoothly, and that includes learning all the ins-and-outs of the software application, developing user manuals and process flows, hosting user training, and ensuring help desk staff has in-depth training so they can offer adequate support to users. I understand that effective training on new software applications is key to getting staff and users to adopt the new systems, and in my business process and operations role, I will do everything I can to ensure employees at Atos feel supported."
Written by Kelly Burlison on February 17th, 2019
2nd Answer Example
"My current company recently went through a software upgrade that made a significant impact on daily staff operations, and because of the significant impact the upgrade had, I stepped in and supported the upgrade by hosting training sessions, developing user manuals, process flows, and best practice guides help sheets. By preparing these documents and offering the training sessions, I was able to help staff adjust to the upgraded software much more quickly, which prevented our overall operations from suffering. Helpdesk staff was prepared to receive a massive influx of calls once the upgrade went live, they found that their call volumes were light, compared to what they were anticipating. The ease of transition to the upgraded software has been attributed to the thorough training I provided to staff. This is only an example of when I supported a software rollout, as I have supported many in the past, and with my experience, I know I will be able to successfully support such rollouts at Atos."
24. There have been several virus attacks recently, what have you done to protect your organization from these cyber attacks?
How to Answer
This a great question from a manager and there are some very useful responses to this question. The very first thing is having an in-depth knowledge of how cyber security attacks occur. There are several situational examples that a hiring manager might ask you to walk through to see what you did to thwart those attacks. Some of the core questions will relate to what you did to identify those threats, what authentication you used to combat the threats, and how frequently you do risk assessments. A couple of other questions that may come up will cover how often you communicated your security and sign-off policy to employees if there was compliance corporate-wide, and what you did to maintain that compliance.
Written by Tom Dushaj on February 17th, 2019
1st Answer Example
"I realize that attacks can happen at any time, and we need to be ready. One of the most important tasks that I'm involved in when I come into work every day is to look at our security dashboard which shows a real-time report of events, threats, intrusions, and possible breaches. This tells us what actions we need to take, or improvements that need to be addressed to strengthen our network further. The real-time report gives me a view of events that have occurred and are occurring in real-time. As a directive by our CIO, we are required to do research on public and private corporations that were hacked so we could analyze how those organizations handled data loss and what they did to remedy those issues."
Written by Tom Dushaj on February 17th, 2019
2nd Answer Example
"There are several steps that I take to safeguard our environment. Let me outline those steps and tasks to get you familiar with our process, planning and execution:
1.) The first step is to identify the threats - this involves the unauthorized access of our company networks. Since our company has sensitive information, we go to great lengths to protect it.
2.) I keep employees honest - Employees have access to a lot of valuable company information, and if leaked to the wrong people, could be disastrous for the company. It's part of my responsibility to have employees reset passwords, and have them use two-factor authentication for additional security.
3.) I keep up to date on Cybercrimes that have happened in the past - I always look at what types of data hackers are attracted to so I know what kind of strategy to put in place for those types of potential attacks.
4.) I carry out risk assessments and audits on a regular basis - This is done to mitigate risk, and data loss. I work closely with external Cyber Security consultants to implement a security that is successfully executed."
25. Give me your opinion on Blockchain technology, and how do you think it will revolutionize cyber security?
How to Answer
Ever since Blockchain was introduced to the market, security technologists have been busy trying to keep Blockchain transactions secure through distributed networks so people can use bitcoin or crypto-currency as a payment gateway. Hiring managers, especially in the finance/banking industries, are well aware of this technology, so when they ask this question, they are looking for your opinion on how it applies to cyber security. If you have experience working in an environment that uses Blockchain, showcase that experience in a way that makes you stand out from the crowd. For example, use a scenario (without giving away sensitive company information) where you used it, and how you were able to protect web servers and ID systems so the transactions were safe and secure. If you have limited knowledge in Blockchain, show your eagerness to learn the technology, and how your skills would apply in those situations.
Written by Tom Dushaj on February 17th, 2019
1st Answer Example
"Anytime I see the introduction of a new technology or payment gateway, I take it upon myself to research that technology to see where it is relevant in the world of Cyber Security. When Blockchain came out, I did extensive research on where it might have vulnerabilities, and susceptible to attacks. According to my research, Blockchain has around for about a decade and was initially introduced to store and/or send crypto-currency like Bitcoin. Blockchains are distributed networks with millions of users all over the world. Since Blockchain uses cryptology, it's easier for businesses to authenticate devices and users without the need for a password. This definitely eliminates manual intervention in the process of authentication, thereby avoiding potential attacks."
Written by Tom Dushaj on February 17th, 2019
2nd Answer Example
"The way I view Blockchain revolutionizing Cyber Security is through decentralized storage, record keeping, and peer-to-peer sharing. Furthermore, Blockchain users will be able to store all their data on their network or computer if they choose to do so. Basically, a blockchain is a decentralized, digitized, public ledger of all cryptocurrency transactions known as Distributed Ledger Technology. One of the big reasons why I think blockchain is going to be an integral part of Cyber Security is (Distributed Denial of Service. In a nutshell, Blockchain transactions can be denied easily if the send-receive participants are impeded from sending transactions. Blockchains provide a non 'hackable' entrance point, thereby, provide more security when compared with database-driven transactional structures."
26. What are the benefits of leasing a private data center vs. building one from scratch?
How to Answer
There are many benefits to either leasing a data center as opposed to building one and vice versa. The interviewer would like to see that you understand the expenditure and risk that comes with either option.
When it comes to leasing a private data center the benefits include:
- Fewer upfront costs
- More predictable expenditure
- Ability to scale more easily
- Option to contract the experts as opposed to hiring them full time
If a company built their own data center the benefits could be:
- Ownership and complete control of all operations
- More control over your location
- Ability to lease out extra space to other businesses
Discuss with the interviewer the benefits of each, without swaying too far when it comes to your opinion.
Written by Rachelle Enns on February 17th, 2019
1st Answer Example
"I believe there are benefits to each, and the choice would depend greatly on budget and how much control a company would like to have. If leasing, you can reduce expenditure significantly. If building one from scratch, you would have full control. In my opinion, there are pros and cons to each side."
Written by Rachelle Enns on February 17th, 2019
2nd Answer Example
"I have worked for data centers that lease their space, and data centers who own their space. From the leasing side, it is more challenging to scale; however, the costs are much lower. From the ownership side, there are more headaches when it comes to IT staffing; however, there is more control over space, location, and operations."