Filter interviews by
I am a Senior Manager with 10+ years of experience in leading cross-functional teams and driving strategic initiatives.
Led a team of 20+ employees in developing and implementing a new marketing strategy
Managed a budget of $1 million for a product launch campaign
Collaborated with senior leadership to set company goals and objectives
Top trending discussions
I applied via Company Website and was interviewed before Aug 2023. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.
Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.
Configure authentication settings within the application to enable SSO
Integrate the application with identity providers such as Okta, Azure AD, or PingFederate
Test the SSO functionality to ensure seamless user experience
Provide documentation and training for users on how
I handle outages by following established procedures and prioritize tasks based on impact.
Immediately assess the situation to determine the root cause of the outage
Communicate with stakeholders to keep them informed of the issue and expected resolution time
Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible
Document the outage incident and steps taken for future reference and i...
I handle change management by implementing structured processes, communication, and stakeholder involvement.
Implementing a change management process to track and document changes
Communicating changes effectively to all stakeholders
Involving key stakeholders in decision-making and planning
Ensuring proper testing and validation of changes before implementation
Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.
Integrate with identity providers such as Okta, Azure AD, or Google Workspace
Configure authentication protocols like SAML, OAuth, or OpenID Connect
Implement single sign-on functionality in the application code
Ensure secure communication between the application and the identity provider
RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.
RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.
It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.
For ex...
I primarily use SSH (Secure Shell) to connect servers.
SSH (Secure Shell) is a widely used application for securely connecting to servers
Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections
Yes, I am experienced in vulnerability management.
I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.
I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.
I have implemented patch management processes to address vulnerabilities in a timely manner.
I have conducted vulnerability assessments and penetration testing to identify weakness...
I have experience working with both connected and disconnected applications.
I have experience developing applications that can function both online and offline.
I have worked on projects where data synchronization is crucial for seamless user experience.
Examples include mobile apps that can work offline and sync data when connected to the internet.
Yes, I have experience in taking care of the Authorization part in various projects.
Implemented role-based access control (RBAC) to manage user permissions
Configured and managed authentication protocols such as OAuth and SAML
Worked on setting up access control lists (ACLs) for network security
Experience with managing user roles and permissions in Active Directory
Utilized single sign-on (SSO) solutions for seamless user
I applied via Referral and was interviewed in Nov 2024. There were 3 interview rounds.
Data structures and algo. 2 ques were asked in hackerrank
posted on 28 Dec 2024
I applied via LinkedIn and was interviewed in Jun 2024. There were 5 interview rounds.
Java coding questions, basic Java questions.
posted on 5 Jun 2024
Quite tough as it had all maths questions
Financial crime refers to illegal activities that involve the use of financial systems to deceive or defraud individuals or organizations.
Financial crime includes activities such as money laundering, fraud, embezzlement, and insider trading.
It often involves complex schemes to conceal the true source or destination of funds.
Financial crime can have serious consequences for individuals, businesses, and the economy as a ...
The stages of AML (Anti-Money Laundering) include customer due diligence, transaction monitoring, and reporting suspicious activities.
Customer Due Diligence: Verifying the identity of customers and assessing their risk level.
Transaction Monitoring: Monitoring transactions for any unusual or suspicious activities.
Reporting Suspicious Activities: Reporting any suspicious activities to the appropriate authorities.
Examples...
KYC stands for Know Your Customer, a process used by financial institutions to verify the identity of their clients.
KYC is a regulatory requirement to prevent money laundering and fraud.
It involves collecting personal information such as name, address, and identification documents.
KYC also includes assessing the risk of a customer and monitoring their transactions for suspicious activities.
Examples of KYC documents inc...
PEP stands for Politically Exposed Person, referring to individuals who are entrusted with prominent public functions.
PEPs are considered higher risk for potential involvement in bribery, corruption, and money laundering due to their position of influence.
Financial institutions are required to conduct enhanced due diligence on PEPs to mitigate risks.
Examples of PEPs include government officials, heads of state, and sen
I applied via Naukri.com and was interviewed in Sep 2024. There were 3 interview rounds.
Questions on skills and work exp
Normal questions about servuce sector
GD on domain knowledge
posted on 15 Jan 2025
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Software Developer
72
salaries
| ₹3.5 L/yr - ₹13.1 L/yr |
Business Analyst
53
salaries
| ₹5.5 L/yr - ₹20.5 L/yr |
Softwaretest Engineer
34
salaries
| ₹3.3 L/yr - ₹11.5 L/yr |
Senior Business Analyst
31
salaries
| ₹8.5 L/yr - ₹27.5 L/yr |
Senior Software Developer
29
salaries
| ₹6.5 L/yr - ₹19.6 L/yr |
Experian
Credit Information Bureau
Equifax
Nsdl Database Management