8 Cyber Security Engineer Interview Questions and Answers for 2025 | Himalayas

8 Cyber Security Engineer Interview Questions and Answers

Cyber Security Engineers are responsible for protecting an organization's computer systems and networks from cyber threats. They design, implement, and maintain security measures to safeguard sensitive data and prevent unauthorized access. Junior engineers focus on monitoring systems and addressing vulnerabilities, while senior engineers and architects lead the development of advanced security strategies, oversee incident response, and mentor teams. This role requires a deep understanding of security protocols, risk assessment, and emerging threats in the cybersecurity landscape. Need to practice for an interview? Try our AI interview practice for free then unlock unlimited access for just $9/month.

1. Junior Cyber Security Engineer Interview Questions and Answers

1.1. Can you describe a time when you identified a security vulnerability in a system? What steps did you take to address it?

Introduction

This question evaluates your analytical skills and proactive approach to cybersecurity, which are critical for a Junior Cyber Security Engineer.

How to answer

  • Outline the context of the system or application you were working on
  • Describe how you discovered the vulnerability, whether through testing, monitoring, or user reports
  • Detail the specific actions you took to address the vulnerability, including any tools or methodologies used
  • Discuss how you communicated the issue to your team or stakeholders
  • Mention any follow-up actions taken to ensure the vulnerability was fully resolved

What not to say

  • Vague descriptions of the vulnerability without technical specifics
  • Claiming to have fixed issues without mentioning collaboration with others
  • Failing to describe the impact of the vulnerability on the system
  • Overlooking the importance of documentation and communication

Example answer

While working on a university project, I conducted a security assessment of our web application and discovered a SQL injection vulnerability. I documented the issue and reported it to my team, suggesting we implement prepared statements to mitigate the risk. After the fix was applied, I performed additional tests to ensure the vulnerability was resolved, which was crucial for our project's integrity.

Skills tested

Analytical Skills
Problem-solving
Communication
Attention To Detail

Question type

Behavioral

1.2. How do you stay current with the latest cybersecurity threats and trends?

Introduction

This question assesses your commitment to continuous learning and your awareness of the evolving cybersecurity landscape.

How to answer

  • Mention specific resources you follow, such as cybersecurity blogs, podcasts, or forums
  • Discuss any certifications or training courses you are pursuing or have completed
  • Explain how you apply this knowledge to your work or studies
  • Share any personal projects or contributions to open-source security tools
  • Highlight your participation in cybersecurity communities or events

What not to say

  • Providing generic answers without mentioning specific resources or examples
  • Saying you don't actively seek out information on threats
  • Focusing solely on formal education without mentioning self-directed learning
  • Ignoring the importance of hands-on experience

Example answer

I regularly follow cybersecurity blogs like Krebs on Security and participate in forums like Reddit's r/netsec. I am currently pursuing the CompTIA Security+ certification to bolster my knowledge. Additionally, I recently contributed to an open-source project focused on improving password management tools, which allowed me to apply the latest security practices in a practical setting.

Skills tested

Self-motivation
Knowledge Of Industry Trends
Community Engagement
Continuous Learning

Question type

Competency

2. Cyber Security Engineer Interview Questions and Answers

2.1. Can you describe a security incident you managed and the steps you took to resolve it?

Introduction

This question is crucial as it assesses your hands-on experience in managing security incidents, a core responsibility for a Cyber Security Engineer.

How to answer

  • Use the STAR method (Situation, Task, Action, Result) to structure your response
  • Clearly outline the nature of the security incident and its impact
  • Detail the specific actions you took to mitigate the incident
  • Discuss collaboration with other teams and stakeholders
  • Reflect on the lessons learned and how it improved future security practices

What not to say

  • Minimizing the incident's severity or impact
  • Failing to mention collaboration with other team members
  • Neglecting to discuss any follow-up actions or improvements
  • Describing a situation without a clear resolution

Example answer

While working at a local financial institution, we experienced a phishing attack that compromised several employee accounts. I quickly organized an incident response team, conducted a root cause analysis, and implemented MFA across all accounts. We also conducted security awareness training for staff. As a result, we reduced phishing incidents by 70% in the following year and improved our incident handling procedures.

Skills tested

Incident Management
Problem-solving
Team Collaboration
Communication

Question type

Situational

2.2. How do you stay updated with the latest security threats and technologies?

Introduction

This question evaluates your commitment to continuous learning and adaptation in the rapidly evolving field of cyber security.

How to answer

  • Mention specific resources you follow, such as blogs, news sites, or security forums
  • Discuss any professional networks or communities you engage with
  • Highlight any certifications or training you pursue regularly
  • Explain how you apply new insights to your work
  • Share examples of recent threats that you learned about and addressed

What not to say

  • Claiming to be up-to-date without providing specific examples
  • Focusing solely on formal training without mentioning informal sources
  • Neglecting to mention the application of new knowledge
  • Being vague about your sources of information

Example answer

I actively follow cybersecurity blogs like Krebs on Security and subscribe to threat intelligence reports from sources like SANS. I'm also part of a local cybersecurity group that meets monthly to discuss emerging threats. Recently, I learned about a new ransomware variant and implemented preventive measures in our systems, effectively safeguarding against it.

Skills tested

Continuous Learning
Proactive Mindset
Networking
Application Of Knowledge

Question type

Motivational

2.3. What security frameworks are you familiar with, and how have you implemented them in your previous roles?

Introduction

This question tests your knowledge of industry standards and your ability to apply them to enhance security posture.

How to answer

  • List specific security frameworks you are familiar with, like NIST, ISO 27001, or CIS Controls
  • Provide examples of how you have implemented these frameworks in past positions
  • Discuss the challenges you faced during implementation and how you overcame them
  • Explain the benefits achieved from implementing the frameworks
  • Mention how you ensure compliance and keep documentation updated

What not to say

  • Naming frameworks without understanding their application
  • Providing generic examples without specific details
  • Failing to mention any challenges or resolutions
  • Ignoring the importance of compliance and documentation

Example answer

I have extensive experience with the NIST Cybersecurity Framework. At a tech company, I led the implementation process, which involved assessing our current practices against the framework's guidelines. We identified gaps in our incident response plan and developed a comprehensive strategy, resulting in a 40% reduction in response time to security incidents. I also ensured that all documentation was kept up to date for compliance audits.

Skills tested

Knowledge Of Security Frameworks
Implementation Skills
Problem-solving
Documentation

Question type

Technical

3. Mid-level Cyber Security Engineer Interview Questions and Answers

3.1. Can you describe a security incident you managed and the steps you took to resolve it?

Introduction

This question is crucial for assessing your practical experience in handling real security incidents, a key responsibility for a cyber security engineer.

How to answer

  • Use the STAR method to structure your answer (Situation, Task, Action, Result)
  • Clearly describe the security incident, including the type of attack and its impact on the organization
  • Detail your role in the incident response process and the specific actions you took
  • Explain how you communicated with stakeholders during the incident
  • Share the outcome and any improvements made to prevent future incidents

What not to say

  • Providing vague descriptions without clear actions taken
  • Taking all the credit without mentioning teamwork
  • Failing to discuss lessons learned or improvements made
  • Avoiding details about the incident's impact on the organization

Example answer

At Alibaba, I managed a phishing attack that targeted our employees. The situation escalated quickly, so I led the incident response team. We immediately quarantined affected accounts, communicated with all staff via email about the threat, and provided guidance on recognizing phishing attempts. Post-incident, we implemented mandatory security training, resulting in a 30% reduction in successful phishing attempts within three months.

Skills tested

Incident Response
Communication
Problem-solving
Teamwork

Question type

Behavioral

3.2. How do you stay updated with the latest security threats and trends?

Introduction

This question evaluates your commitment to continuous learning and your ability to adapt to the ever-evolving cyber security landscape.

How to answer

  • Mention specific resources you follow, such as blogs, podcasts, or news sites
  • Discuss any professional organizations or communities you are part of
  • Share how you apply new knowledge to your work
  • Highlight any certifications or training you pursue
  • Explain your approach to sharing knowledge with your team

What not to say

  • Claiming to rely solely on company training for knowledge
  • Being vague about your sources of information
  • Failing to show how you implement what you learn in your role
  • Not mentioning any personal initiatives for learning

Example answer

I stay updated by following cybersecurity news through sources like Krebs on Security and Dark Reading. I'm also a member of ISACA, where I engage in discussions with other professionals. I recently completed a course on threat hunting, which I applied in my current role to enhance our detection capabilities. I also share insights from these resources with my team during our weekly meetings.

Skills tested

Continuous Learning
Adaptability
Knowledge Sharing
Industry Awareness

Question type

Competency

4. Senior Cyber Security Engineer Interview Questions and Answers

4.1. Can you describe a complex security incident you managed and the steps you took to resolve it?

Introduction

This question assesses your incident response capabilities, technical expertise, and ability to work under pressure, which are critical for a Senior Cyber Security Engineer.

How to answer

  • Use the STAR method to structure your response: Situation, Task, Action, Result.
  • Clearly outline the nature of the security incident and its potential impact.
  • Detail your role in the incident response team and the steps you took to manage the situation.
  • Discuss the technical tools and methodologies you used to resolve the incident.
  • Highlight the lessons learned and how you improved security protocols post-incident.

What not to say

  • Failing to take responsibility or downplaying your role in the incident.
  • Using overly technical jargon without clarifying the implications.
  • Not providing measurable results or improvements after the incident.
  • Ignoring the importance of teamwork and collaboration.

Example answer

At Airbus, we faced a ransomware attack that encrypted critical systems. I led the incident response team, first isolating affected systems to prevent further spread. We used forensic tools to identify the entry point, which was a phishing email. After containing the threat, I coordinated with IT to restore systems from backups and implemented a company-wide phishing awareness program. This experience reinforced the importance of proactive security measures and collaboration across departments, ultimately reducing phishing incidents by 60%.

Skills tested

Incident Management
Technical Expertise
Team Collaboration
Problem-solving

Question type

Behavioral

4.2. What strategies would you implement to enhance our organization's security posture?

Introduction

This question evaluates your strategic thinking and ability to proactively protect the organization from cyber threats, which is essential for a senior role.

How to answer

  • Identify key areas of vulnerability within organizations similar to the one you're interviewing for.
  • Discuss specific frameworks or standards (like NIST, ISO 27001) that you would align with.
  • Detail a multi-layered security approach, including technical, administrative, and physical controls.
  • Explain how you would involve stakeholders and employees in the security process.
  • Share examples from your past experiences where you successfully implemented such strategies.

What not to say

  • Suggesting generic strategies without tailoring them to the organization's specific needs.
  • Overlooking the importance of employee training and awareness.
  • Failing to consider budget constraints or resource limitations.
  • Neglecting to mention metrics or KPIs to evaluate the effectiveness of the strategies.

Example answer

To enhance the security posture at Orange, I would implement a risk-based approach aligned with the NIST framework. This includes conducting regular vulnerability assessments and penetration testing to identify weaknesses. I would also advocate for comprehensive employee training to foster a security-aware culture. For example, at my last position, we reduced security incidents by 40% through targeted training and simulation exercises. Lastly, I would establish a continuous monitoring program to assess the effectiveness of our security measures and adjust strategies accordingly.

Skills tested

Strategic Thinking
Risk Assessment
Stakeholder Engagement
Continuous Improvement

Question type

Competency

5. Lead Cyber Security Engineer Interview Questions and Answers

5.1. Can you describe a time when you identified a major security vulnerability in a system? What steps did you take to address it?

Introduction

This question assesses your technical expertise in identifying security vulnerabilities and your problem-solving skills in mitigating risks, which are crucial for a Lead Cyber Security Engineer.

How to answer

  • Start by clearly defining the context of the vulnerability you discovered.
  • Explain the tools and methods you used to identify the vulnerability.
  • Detail the steps you took to remediate the issue, including collaboration with other teams if applicable.
  • Highlight the impact of your actions on the overall security posture of the organization.
  • Discuss any follow-up measures you implemented to prevent similar vulnerabilities in the future.

What not to say

  • Giving vague descriptions without specific details.
  • Neglecting to mention collaboration with other teams or stakeholders.
  • Focusing only on the vulnerability without discussing the remediation process.
  • Failing to quantify the impact or results of your actions.

Example answer

At Siemens, I identified a critical vulnerability in our web application firewall that could have allowed unauthorized access to sensitive data. Using automated scanning tools and manual testing, I confirmed the issue and immediately reported it to my team. We implemented a patch and revised our security protocols. This action not only secured our application but also led to a 30% decrease in security incidents over the next quarter, reinforcing our security measures.

Skills tested

Vulnerability Assessment
Risk Management
Technical Expertise
Collaboration

Question type

Technical

5.2. How do you stay updated on the latest cyber security threats and trends?

Introduction

This question is important as it evaluates your commitment to continuous learning and awareness of the rapidly evolving cyber security landscape, which is vital for a leadership role.

How to answer

  • Mention specific resources you use for staying informed, such as industry blogs, forums, or conferences.
  • Discuss any memberships in professional organizations or certifications that help you stay current.
  • Explain how you apply this knowledge to your work and share it with your team.
  • Provide examples of how this awareness has influenced your security strategies or decision-making.
  • Highlight the importance of sharing insights with colleagues to foster a culture of security.

What not to say

  • Saying you rely solely on your past knowledge without seeking new information.
  • Neglecting to mention any proactive learning methods.
  • Failing to show how you integrate this knowledge into your work.
  • Indicating a lack of interest in current events or trends in cyber security.

Example answer

I regularly follow top cyber security blogs like Krebs on Security and participate in webinars hosted by organizations such as ISACA. Additionally, I’m a member of the German Cyber Security Association, which provides valuable insights into emerging threats. This knowledge helps me anticipate potential risks and adapt our security strategies accordingly. For instance, after learning about a new phishing tactic, I led a training session for my team, enhancing our preparedness against similar attacks.

Skills tested

Continuous Learning
Industry Awareness
Communication
Leadership

Question type

Behavioral

6. Cyber Security Architect Interview Questions and Answers

6.1. Can you describe a time when you identified a significant security vulnerability in a system and how you addressed it?

Introduction

This question tests your ability to recognize and respond to security threats, a critical skill for a Cyber Security Architect responsible for protecting organizational assets.

How to answer

  • Use the STAR method (Situation, Task, Action, Result) to frame your response.
  • Clearly describe the context of the situation, including the system involved and the nature of the vulnerability.
  • Detail the steps you took to investigate and confirm the vulnerability.
  • Explain the actions you implemented to mitigate the risk and any collaboration with teams.
  • Discuss the outcome, including any measurable improvements to security posture.

What not to say

  • Vaguely describing the vulnerability without specifics.
  • Taking sole credit without acknowledging teamwork.
  • Failing to mention metrics or improvements post-implementation.
  • Not demonstrating a proactive approach to security.

Example answer

At a financial services company, I discovered a critical vulnerability in our web application that allowed unauthorized access to sensitive customer data. I immediately conducted a thorough analysis and coordinated with the development team to implement a patch. Additionally, I led a security awareness training for relevant staff, which reduced similar vulnerabilities by 45% in subsequent audits. This experience highlighted the importance of continuous monitoring and proactive risk management.

Skills tested

Vulnerability Assessment
Risk Management
Collaboration
Problem-solving

Question type

Behavioral

6.2. How do you approach designing a secure architecture for cloud-based applications?

Introduction

This question assesses your technical knowledge and architectural design skills in ensuring the security of cloud environments, which is vital for a Cyber Security Architect.

How to answer

  • Explain your understanding of cloud security principles and frameworks.
  • Describe the key components you consider in your architectural design, such as data encryption, identity management, and access control.
  • Discuss how you ensure compliance with industry standards and regulations.
  • Provide examples of security tools and technologies you would implement.
  • Mention how you would conduct ongoing assessments and updates to the architecture.

What not to say

  • Providing a generic answer without specific examples.
  • Ignoring the importance of compliance and regulations.
  • Neglecting to mention potential risks and how to mitigate them.
  • Failing to consider scalability and flexibility in your design.

Example answer

In designing a secure architecture for cloud applications, I start by adhering to the principle of least privilege for access control. I implement strong encryption for data at rest and in transit, utilize identity and access management (IAM) tools, and regularly review user permissions. I also ensure compliance with GDPR and other relevant regulations. For example, while working at a tech startup, I integrated AWS security services which allowed us to maintain a secure environment while ensuring scalability and performance. Regular security audits have since validated our approach.

Skills tested

Cloud Security
Architectural Design
Compliance
Technical Knowledge

Question type

Technical

6.3. What strategies would you implement to foster a security-first culture within an organization?

Introduction

This question evaluates your leadership and communication skills, as well as your ability to influence organizational culture towards prioritizing security.

How to answer

  • Discuss your approach to training and awareness programs for employees.
  • Explain how you would engage with different departments to promote collaboration on security initiatives.
  • Share ideas for integrating security practices into everyday workflows.
  • Describe how you would measure the effectiveness of these strategies.
  • Mention the importance of leadership buy-in and continuous communication.

What not to say

  • Suggesting that security is solely the IT department's responsibility.
  • Providing a one-time training solution without ongoing support.
  • Ignoring the need for different strategies tailored to various roles.
  • Failing to address the importance of reporting and feedback mechanisms.

Example answer

To foster a security-first culture, I would implement a comprehensive training program that includes regular workshops, phishing simulations, and security awareness campaigns tailored to different departments. Engaging department heads to lead discussions on security would help in promoting accountability. I would also introduce a feedback mechanism to continuously improve our security practices based on employee input. At my previous company, these initiatives led to a 60% increase in reported security incidents, indicating employees felt empowered to contribute to our security posture.

Skills tested

Leadership
Communication
Organizational Culture
Training And Development

Question type

Leadership

7. Cyber Security Manager Interview Questions and Answers

7.1. Can you describe a time when you successfully identified and mitigated a security threat in your organization?

Introduction

This question assesses your technical expertise in identifying vulnerabilities and your proactive approach to risk management, which are crucial for a Cyber Security Manager.

How to answer

  • Use the STAR method to structure your response: Situation, Task, Action, Result.
  • Clearly outline the nature of the security threat you encountered.
  • Detail your analysis process and the tools or methodologies you used to identify the threat.
  • Explain the measures you implemented to mitigate the threat and their effectiveness.
  • Share any lessons learned or improvements made to the security posture of the organization.

What not to say

  • Providing vague examples without specific details about the threat.
  • Failing to explain your role in the mitigation process.
  • Neglecting to mention the outcome or impact of your actions.
  • Overstating your individual contribution without acknowledging teamwork.

Example answer

At my previous role in a financial institution, I identified a phishing attack targeting our employees. Using our security analytics tools, I detected unusual login attempts. I led an incident response team that implemented two-factor authentication and conducted training sessions to educate staff about phishing. As a result, we reduced successful phishing attempts by 70% in the following year. This experience taught me the importance of continuous training and monitoring.

Skills tested

Risk Management
Technical Expertise
Incident Response
Communication

Question type

Behavioral

7.2. How do you stay updated with the latest cybersecurity threats and trends?

Introduction

This question evaluates your commitment to continuous learning and your ability to adapt to the rapidly evolving cybersecurity landscape.

How to answer

  • Mention specific resources you use, such as cybersecurity blogs, forums, or professional organizations.
  • Discuss any relevant certifications or training programs you have completed.
  • Explain how you share this knowledge with your team to enhance their skills.
  • Describe any involvement in cybersecurity communities or conferences.
  • Highlight the importance of staying informed for proactive threat management.

What not to say

  • Claiming you don’t need to stay updated as you have enough experience.
  • Mentioning only generic sources without specific examples.
  • Failing to demonstrate how you apply learned knowledge in your work.
  • Ignoring the importance of team knowledge sharing.

Example answer

I regularly follow cybersecurity blogs like Krebs on Security and participate in webinars hosted by ISACA. I also hold a CISSP certification, which I maintain through continuing education. I make it a point to share insights with my team during weekly meetings to ensure everyone is aware of emerging threats. This proactive approach has helped us enhance our security measures and respond more effectively to potential risks.

Skills tested

Continuous Learning
Knowledge Sharing
Proactivity
Networking

Question type

Competency

8. Director of Cyber Security Interview Questions and Answers

8.1. Can you describe a time when you successfully managed a cybersecurity incident?

Introduction

This question is critical for assessing your incident management skills and ability to respond to real-time threats, which are essential for a cybersecurity leadership role.

How to answer

  • Use the STAR method to structure your response (Situation, Task, Action, Result)
  • Clearly outline the nature of the cybersecurity incident, including its impact on the organization
  • Discuss the steps you took to manage the incident, including coordination with various teams
  • Highlight the tools and methodologies you employed to mitigate the threat
  • Share measurable outcomes and lessons learned to demonstrate growth and improvement

What not to say

  • Providing vague descriptions of incidents without specific details
  • Focusing solely on technical aspects while neglecting team dynamics
  • Failing to mention how you communicated with stakeholders during the incident
  • Not discussing the aftermath or preventive measures taken post-incident

Example answer

At a previous organization, we faced a ransomware attack that threatened our critical data. I led the incident response team, coordinating efforts with IT and legal departments to contain the breach. We isolated the affected systems within hours and communicated transparently with stakeholders about our actions. As a result, we restored operations with minimal data loss and implemented new protocols that reduced similar threats by 60% in the following year.

Skills tested

Incident Management
Leadership
Communication
Strategic Planning

Question type

Behavioral

8.2. How do you ensure your cybersecurity strategy aligns with the overall business objectives?

Introduction

This question assesses your ability to integrate cybersecurity with broader business goals, a key responsibility for a director-level position.

How to answer

  • Discuss your approach to understanding the business's goals and objectives
  • Explain how you engage with other departments to align strategies
  • Share specific frameworks or models you use for aligning cybersecurity with business needs
  • Highlight the importance of risk management in supporting business objectives
  • Provide examples of how alignment has led to successful outcomes in your previous roles

What not to say

  • Suggesting cybersecurity operates independently of business strategy
  • Failing to articulate specific methods for alignment
  • Overlooking the need for collaboration with other departments
  • Not providing concrete examples of successful alignment initiatives

Example answer

To ensure cybersecurity aligns with our business objectives, I regularly meet with department heads to understand their goals. At my last position, I implemented a risk management framework that prioritized initiatives based on their impact on business operations. This approach not only enhanced our security posture but also supported a successful product launch by ensuring compliance with industry standards, leading to a 20% increase in market trust.

Skills tested

Strategic Alignment
Collaboration
Risk Management
Communication

Question type

Competency

8.3. What measures do you take to foster a culture of cybersecurity awareness within an organization?

Introduction

This question evaluates your ability to build a proactive and security-conscious culture, which is vital for effective cybersecurity management.

How to answer

  • Describe your strategy for cybersecurity training and awareness programs
  • Highlight the importance of continuous education and engagement
  • Discuss how you tailor messages to different employee levels and roles
  • Share specific initiatives you have implemented in the past that increased awareness
  • Emphasize the role of leadership in modeling secure behavior

What not to say

  • Claiming it's solely the IT department's responsibility to manage awareness
  • Describing one-time training sessions without ongoing engagement strategies
  • Ignoring the importance of feedback and improvement in programs
  • Failing to mention how you measure the effectiveness of awareness initiatives

Example answer

At my previous job, I developed a comprehensive cybersecurity awareness program that included quarterly training sessions, monthly newsletters, and phishing simulations. We tailored content to different departments to ensure relevance. After implementing these initiatives, we saw a 35% reduction in phishing incidents and an increase in reporting suspicious activities, demonstrating a stronger culture of cybersecurity awareness across the organization.

Skills tested

Awareness Training
Communication
Leadership
Cultural Transformation

Question type

Competency

Similar Interview Questions and Sample Answers

Simple pricing, powerful features

Upgrade to Himalayas Plus and turbocharge your job search.

Himalayas

Free
Himalayas profile
AI-powered job recommendations
Apply to jobs
Job application tracker
Job alerts
Weekly
AI resume builder
1 free resume
AI cover letters
1 free cover letter
AI interview practice
1 free mock interview
AI career coach
1 free coaching session
AI headshots
Not included
Conversational AI interview
Not included
Recommended

Himalayas Plus

$9 / month
Himalayas profile
AI-powered job recommendations
Apply to jobs
Job application tracker
Job alerts
Daily
AI resume builder
Unlimited
AI cover letters
Unlimited
AI interview practice
Unlimited
AI career coach
Unlimited
AI headshots
100 headshots/month
Conversational AI interview
30 minutes/month

Himalayas Max

$29 / month
Himalayas profile
AI-powered job recommendations
Apply to jobs
Job application tracker
Job alerts
Daily
AI resume builder
Unlimited
AI cover letters
Unlimited
AI interview practice
Unlimited
AI career coach
Unlimited
AI headshots
500 headshots/month
Conversational AI interview
4 hours/month

Find your dream job

Sign up now and join over 100,000 remote workers who receive personalized job alerts, curated job matches, and more for free!

Sign up
Himalayas profile for an example user named Frankie Sullivan