What is a Security Engineer at Dun & Bradstreet?
As a Security Engineer at Dun & Bradstreet, you are a primary guardian of the world’s most comprehensive business decisioning data. Our organization manages a Data Cloud containing hundreds of millions of business records, and your role is to ensure the integrity, availability, and confidentiality of this massive intelligence engine. You are not just managing firewalls; you are architecting the trust that global enterprises place in our data every single day.
This position is critical because Dun & Bradstreet operates at a unique intersection of finance, data analytics, and global trade. You will work on protecting high-scale distributed systems and ensuring that our product delivery pipelines—which serve nearly all of the Fortune 500—remain resilient against evolving threats. Your work directly impacts the stability of global commerce by securing the insights that businesses use to manage risk and find opportunities.
The environment is one of strategic complexity. You will collaborate with cross-functional teams in Engineering, Data Science, and Cloud Operations to bake security into the lifecycle of our products. Whether you are hardening network infrastructure, automating threat detection, or consulting on secure application design, your influence will be felt across the entire enterprise architecture.
Common Interview Questions
See every interview question for this role
Sign up free to access the full question bank for this company and role.
Sign up freeAlready have an account? Sign inPractice questions from our question bank
Curated questions for Dun & Bradstreet from real interviews. Click any question to practice and review the answer.
Explain how symmetric and asymmetric encryption differ in key usage, performance, and real-world application.
Explain the concept of defense in depth and its significance in security architecture.
Choose the CIS control with the best ROI to uplift a newly acquired subsidiary’s security posture under tight time and budget constraints.
Sign up to see all questions
Create a free account to access every interview question for this role.
Sign up freeAlready have an account? Sign inGetting Ready for Your Interviews
Success in the Dun & Bradstreet interview process requires a balance of deep technical specialization and the ability to communicate risk to non-technical stakeholders. We look for engineers who don't just identify vulnerabilities but provide scalable, business-aligned solutions.
Role-Related Knowledge – This is the foundation of the evaluation. You must demonstrate a mastery of network security, cloud infrastructure, and secure coding practices. Interviewers will look for your ability to apply these concepts to large-scale, data-centric environments typical of a global enterprise.
Problem-Solving Ability – We value engineers who approach challenges with a systemic mindset. You will be evaluated on how you deconstruct complex security incidents or architectural flaws and your methodology for implementing long-term remediations rather than quick fixes.
Communication and Influence – Security is a shared responsibility at Dun & Bradstreet. You need to show that you can collaborate effectively with developers and product managers, influencing them to prioritize security without unnecessarily hindering velocity.
Culture Fit and Values – We seek candidates who are intellectually curious and resilient. You should be prepared to discuss how you navigate ambiguity, stay current with the threat landscape, and align your work with our core values of data-driven decision-making and relentless improvement.
Interview Process Overview
The interview process at Dun & Bradstreet is designed to be thorough yet efficient, typically spanning a few weeks from initial contact to offer. We focus on identifying candidates who possess both the "hands-on" technical skills required for immediate impact and the strategic mindset necessary for long-term growth within our global security organization.
The journey usually begins with a conversation with a Hiring Manager to align on the role's scope and your background. This is followed by a series of technical evaluations that may include a programming assessment or a deep-dive technical interview. A unique aspect of our process is the involvement of senior leadership; it is common for finalists to meet with the CISO or other high-level executives to discuss broader security strategy and organizational alignment.
Tip
The timeline above outlines the standard progression from the initial recruiter touchpoint to the final decision. Candidates should use this to pace their preparation, ensuring they are ready for high-level strategic discussions by the final stages. While the pace is generally steady, the depth of technical questioning in the middle stages requires focused review of core security principles.
Deep Dive into Evaluation Areas
Network and Infrastructure Security
This area is often the most rigorous part of the technical evaluation. Given our massive global footprint, we need engineers who understand the nuances of securing complex, multi-tenant network environments. You must demonstrate a clear understanding of how traffic flows through an enterprise and where the critical chokepoints reside.
Be ready to go over:
- Network Protocol Security – Deep understanding of TCP/IP, BGP security, and DNSSEC.
- Micro-segmentation – Strategies for isolating workloads in a cloud-native or hybrid environment.
- Perimeter Defense – Implementation and management of WAFs, IDS/IPS, and Next-Gen Firewalls.
Advanced concepts (less common):
- Zero Trust Network Access (ZTNA) implementation at scale.
- Software-Defined Networking (SDN) security.
- Hardware Security Modules (HSM) integration.
Example questions or scenarios:
- "How would you design a secure connectivity model between an on-premises data center and a multi-region AWS environment?"
- "Describe the process of mitigating a high-volume Layer 7 DDoS attack targeting a critical API endpoint."
- "What are the security implications of moving from a traditional perimeter-based model to a Zero Trust architecture?"
Application and Programming Security
While we are a data company, our delivery mechanisms are software-based. We evaluate your ability to identify vulnerabilities in code and your familiarity with the SDLC. You should be comfortable discussing how to automate security checks within a CI/CD pipeline.
Be ready to go over:
- OWASP Top 10 – Real-world remediation strategies for common web vulnerabilities.
- Secure Code Review – Identifying logic flaws and injection points in languages like Python, Java, or Go.
- Identity and Access Management (IAM) – Mastering OAuth2, SAML, and the principle of least privilege.
Example questions or scenarios:
- "Walk me through a time you found a critical vulnerability in a third-party library. How did you manage the remediation?"
- "How do you ensure that secrets and credentials are not exposed during the build and deployment process?"




