MBA507: Generative AI Analysis
Individual Written Analysis
Student Name:
Student ID:
Q.1
1. Copy the following prompt into ChatGPT:
Simulate a job interview for a [Job Title] by asking four job interview questions as if you are a potential
employer recruiting for the following position:
[Insert Job Advertisement]
In this scenario, I am taking the role of the employee and you ask four job interview questions to screen my competence.
Q 2
2. Copy and paste the job advertisement that you chose for Assessment 1 into the [Insert Job Advertisement] section of the prompt, change [Job Title] to the title of the job in the advertisement, and click ‘Send message’.
Q 3
3. Copy the following prompt into ChatGPT: Simulate a job interview for a [Job Title] by answering four interview questions as if you are a potential employee. In this scenario, I am taking the role of the employer and will ask you four interview questions to screen your competence. Base your answers on the following resume: [Insert Resume with Personal Information Removed] [Insert Four Job Interview Questions]
Q 4
4. Copy and paste your resume with the personal information removed into the [Insert Resume with Personal Information Removed] section of the prompt, change [Job Title] to the title of the job in the advertisement, copy and paste the four job interview questions from Steps 1-2 into [Insert Four Job Interview Questions] section of the prompt and click ‘Send message’.
Q 5
5. Copy and paste the four interview questions and answers into a Word document and use the annotation tools – track changes, comments, etc. – to amend and expand upon the answers to more accurately reflect your professional skills and experience.
Thank you for the opportunity to discuss my qualifications for the Cybersecurity Analyst role. Below are my answers to the interview questions based on my experience and skills.
ChatGPT Answer:
1. Can you describe a time when you identified a significant security threat? How did you detect it, and what steps did you take to resolve the issue?
During my internship at Baker Marketing, I was involved in a vulnerability assessment of the company’s digital infrastructure. While reviewing logs and performing routine vulnerability scans, I identified a potential weakness in one of the firewall configurations. This misconfiguration left the internal network exposed to external threats.
I detected this issue by using an Intrusion Detection System (IDS) and manual log reviews, which revealed unusual traffic patterns from an external IP attempting to access restricted resources. After flagging the vulnerability, I immediately reported it to the security team. Working with them, I helped adjust the firewall rules and strengthened access controls.
We also conducted a thorough audit of the system to ensure no other areas were vulnerable. After resolving the issue, I drafted a detailed report of the incident and recommended continuous monitoring to prevent similar occurrences.
2. Given the importance of communication in this role, how do you explain complex security issues to non-technical stakeholders? Can you give an example of where you successfully did this?
As a Sales Consultant at Red Energy, I honed my ability to communicate complex concepts to non-technical individuals, a skill I have applied in cybersecurity as well.
Recently, at Baker Marketing, I was tasked with explaining the importance of multi-factor authentication (MFA) to the sales and marketing teams, who were unfamiliar with the technical specifics. To make the issue understandable, I avoided jargon and used relatable analogies. I compared MFA to a double-lock system on a door, where even if someone has the key (password), they still need an additional key (OTP or authentication app) to enter.
This approach helped them understand the importance of MFA in protecting sensitive client data. As a result, the team was more engaged in adopting the new security measure, and they actively supported its implementation.
---
3. Our systems need constant monitoring and swift incident response. Can you share an example where you had to react to a security breach or incident? What was your process, and what tools did you use?
At Tata Consultancy Services, I was part of the incident response team responsible for monitoring AWS cloud services. One night, an alert was triggered by the AWS CloudWatch regarding unusual resource usage on an EC2 instance, which indicated a potential security incident.
My first step was to isolate the compromised instance from the rest of the network to prevent any further unauthorized access. I then used AWS GuardDuty to assess the severity of the attack and began analyzing logs with Amazon CloudTrail to trace the source of the breach. It was identified that a compromised key was used to gain unauthorized access.
We immediately revoked the compromised credentials, rotated access keys, and patched the vulnerability. Post-incident, I worked with the team to review and enhance our IAM policies to prevent future occurrences. I documented the entire incident for management review and contributed to a post-mortem analysis to strengthen our defenses.
4. How do you stay up to date with the ever-changing cybersecurity landscape, and how do you ensure that your knowledge is aligned with the latest threats and solutions?
I prioritize continuous learning to stay current in the cybersecurity field. I am currently pursuing a Master of Information Technology with a specialization in Cybersecurity at Kaplan Business School, which helps me stay updated with academic research and the latest industry trends.
I also regularly attend webinars, subscribe to cybersecurity blogs, and participate in cybersecurity communities such as Reddit’s NetSec and LinkedIn groups. Additionally, I am preparing for Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) certifications to further deepen my technical knowledge.
I frequently practice on platforms like Hack The Box and TryHackMe, which provide real-world simulations of emerging threats. These platforms help me sharpen my skills in penetration testing and incident response, ensuring I remain effective in identifying and mitigating threats.


