Premium Employer

i

This company page is being actively managed by FIS Team. If you also belong to the team, you can get access from here

FIS

Compare button icon Compare button icon Compare
3.9

based on 5.3k Reviews

Filter interviews by

FIS Senior Systems Engineer Interview Questions and Answers

Updated 28 Oct 2021

FIS Senior Systems Engineer Interview Experiences

2 interviews found

I applied via Job Portal and was interviewed before Oct 2020. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Technical Scenario+Behavioural

Interview Preparation Tips

Interview preparation tips for other job seekers - All questions are related to your skills in resume.

I applied via Naukri.com and was interviewed in Oct 2019. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. I was hired for the Profile of Applications Support, Environment Integration and Deployment.I was asked questions based on Deployments, applying upgrades, patches, fixes, monitoring and troubleshooting. Al...

Interview Preparation Tips

Interview preparation tips for other job seekers - I Advice you all to thouroghly go through your Resume, check each and every line of tools, professional summary and projects taken and answer it in generic terms used in industry and not specific to what used in your Application you are currently working upon. Be patient and open to learn whatever comes to you and wish you all the best.
I also advice you to have your interview scheduled near to your last working day in your current organization and be an immediate joiner to get yourself booked for the the position cent percent.

Senior Systems Engineer Interview Questions Asked at Other Companies

asked in Siemens
Q1. Find Nth PrimeYou are given a number 'N'. Your task is to find Nt ... read more
asked in Infosys
Q2. 2. Explain COMP, COMP-2, COMP-3 and Display. What are the differe ... read more
asked in Siemens
Q3. LRU Cache ImplementationDesign and implement a data structure for ... read more
asked in Infosys
Q4. 1. Explain COND parameter in JCL. What parameters can be coded bo ... read more
asked in Infosys
Q5. What is Data Dictionary, an explanation about all the elements of ... read more

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.

Round 1 - HR 

(2 Questions)

  • Q1. HR will call you and ask your current roles and responsibilities ?
  • Q2. Job designation senior system engineer (IAM, Azure portal, SaaS Applications, API integrations, Vulnerability Management)
Round 2 - Technical 

(7 Questions)

  • Q1. Do you anything related vulnerability management?
  • Q2. How do you support application for sso enablement?
  • Ans. 

    Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.

    • Configure authentication settings within the application to enable SSO

    • Integrate the application with identity providers such as Okta, Azure AD, or PingFederate

    • Test the SSO functionality to ensure seamless user experience

    • Provide documentation and training for users on how

  • Answered by AI
  • Q3. Haw you handle outages and any regular task you performed?
  • Ans. 

    I handle outages by following established procedures and prioritize tasks based on impact.

    • Immediately assess the situation to determine the root cause of the outage

    • Communicate with stakeholders to keep them informed of the issue and expected resolution time

    • Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible

    • Document the outage incident and steps taken for future reference and i...

  • Answered by AI
  • Q4. How you deal with change management?
  • Ans. 

    I handle change management by implementing structured processes, communication, and stakeholder involvement.

    • Implementing a change management process to track and document changes

    • Communicating changes effectively to all stakeholders

    • Involving key stakeholders in decision-making and planning

    • Ensuring proper testing and validation of changes before implementation

  • Answered by AI
  • Q5. How do you enable sso for applications for saas?
  • Ans. 

    Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.

    • Integrate with identity providers such as Okta, Azure AD, or Google Workspace

    • Configure authentication protocols like SAML, OAuth, or OpenID Connect

    • Implement single sign-on functionality in the application code

    • Ensure secure communication between the application and the identity provider

  • Answered by AI
  • Q6. What is RTO in disaster recovery?
  • Ans. 

    RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.

    • RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.

    • It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.

    • For ex...

  • Answered by AI
  • Q7. Which application you are using to connect servers?
  • Ans. 

    I primarily use SSH (Secure Shell) to connect servers.

    • SSH (Secure Shell) is a widely used application for securely connecting to servers

    • Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections

  • Answered by AI
Round 3 - Behavioral 

(4 Questions)

  • Q1. Hiring manager will brief about jd and ask questions based on related job and you are working
  • Q2. Do you vulnerability management?
  • Ans. 

    Yes, I am experienced in vulnerability management.

    • I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.

    • I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.

    • I have implemented patch management processes to address vulnerabilities in a timely manner.

    • I have conducted vulnerability assessments and penetration testing to identify weakness...

  • Answered by AI
  • Q3. You worked applications were connected or disconnected one?
  • Ans. 

    I have experience working with both connected and disconnected applications.

    • I have experience developing applications that can function both online and offline.

    • I have worked on projects where data synchronization is crucial for seamless user experience.

    • Examples include mobile apps that can work offline and sync data when connected to the internet.

  • Answered by AI
  • Q4. Have you taken care of Authorization part?
  • Ans. 

    Yes, I have experience in taking care of the Authorization part in various projects.

    • Implemented role-based access control (RBAC) to manage user permissions

    • Configured and managed authentication protocols such as OAuth and SAML

    • Worked on setting up access control lists (ACLs) for network security

    • Experience with managing user roles and permissions in Active Directory

    • Utilized single sign-on (SSO) solutions for seamless user

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well be confident do some research on the jd

Skills evaluated in this interview

Round 1 - Technical 

(1 Question)

  • Q1. Most of the questions were from leetcode

Interview Preparation Tips

Interview preparation tips for other job seekers - Focus on Datastructe and algoriths
Interview experience
4
Good
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Jul 2023. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Previous Work experience and projects
  • Q2. Questions related to platform engineering, vmware, devops and chef.
Round 2 - One-on-one 

(2 Questions)

  • Q1. Why do you want to leave your current company
  • Q2. Are you fine with the jobs role if assigned.
Round 3 - HR 

(2 Questions)

  • Q1. Salary expectations
  • Q2. How soon can you join.
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. 1.Java8 and multithreading concepts. 2.Microservices architecutre . 3.Angular lifecycle hooks.
  • Q2. Microservice architecture level
  • Ans. 

    Microservice architecture is an architectural style that structures an application as a collection of loosely coupled services.

    • Microservices are small, independent, and autonomous services that communicate with each other through APIs.

    • Each microservice is responsible for a specific business capability and can be developed, deployed, and scaled independently.

    • Microservices promote flexibility, scalability, and fault tole...

  • Answered by AI
  • Q3. Good answer for interview of java
Round 3 - Technical 

(2 Questions)

  • Q1. Microservices architecutre
  • Q2. Microservices architecutre Angular

Interview Preparation Tips

Interview preparation tips for other job seekers - Good interview questions they are asking for experience candidates.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Nov 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - One-on-one 

(2 Questions)

  • Q1. Commands in linux
  • Ans. 

    Linux commands are used to interact with the operating system and perform various tasks.

    • Commands are case-sensitive

    • Most commands have options and arguments

    • Common commands include ls, cd, pwd, mkdir, rm, cp, mv, grep, ps, top, systemctl

    • Use man command_name to get more information about a specific command

  • Answered by AI
  • Q2. What is linux and window Os difference
  • Ans. 

    Linux is an open-source operating system, while Windows is a proprietary operating system developed by Microsoft.

    • Linux is open-source and free to use, while Windows is proprietary and requires a license.

    • Linux is highly customizable and can be modified by users, while Windows has limited customization options.

    • Linux is known for its stability and security, while Windows is more vulnerable to viruses and malware.

    • Linux use...

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Walk-in and was interviewed before Aug 2022. There were 3 interview rounds.

Round 1 - Assignment 

Contains aptitude and reasoning and verbal

Round 2 - Group Discussion 

Have to discuss about a topic provided by them

Round 3 - One-on-one 

(1 Question)

  • Q1. Technical that you have learnt
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.

Round 1 - HR 

(2 Questions)

  • Q1. HR will call you and ask your current roles and responsibilities ?
  • Q2. Job designation senior system engineer (IAM, Azure portal, SaaS Applications, API integrations, Vulnerability Management)
Round 2 - Technical 

(7 Questions)

  • Q1. Do you anything related vulnerability management?
  • Q2. How do you support application for sso enablement?
  • Ans. 

    Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.

    • Configure authentication settings within the application to enable SSO

    • Integrate the application with identity providers such as Okta, Azure AD, or PingFederate

    • Test the SSO functionality to ensure seamless user experience

    • Provide documentation and training for users on how

  • Answered by AI
  • Q3. Haw you handle outages and any regular task you performed?
  • Ans. 

    I handle outages by following established procedures and prioritize tasks based on impact.

    • Immediately assess the situation to determine the root cause of the outage

    • Communicate with stakeholders to keep them informed of the issue and expected resolution time

    • Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible

    • Document the outage incident and steps taken for future reference and i...

  • Answered by AI
  • Q4. How you deal with change management?
  • Ans. 

    I handle change management by implementing structured processes, communication, and stakeholder involvement.

    • Implementing a change management process to track and document changes

    • Communicating changes effectively to all stakeholders

    • Involving key stakeholders in decision-making and planning

    • Ensuring proper testing and validation of changes before implementation

  • Answered by AI
  • Q5. How do you enable sso for applications for saas?
  • Ans. 

    Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.

    • Integrate with identity providers such as Okta, Azure AD, or Google Workspace

    • Configure authentication protocols like SAML, OAuth, or OpenID Connect

    • Implement single sign-on functionality in the application code

    • Ensure secure communication between the application and the identity provider

  • Answered by AI
  • Q6. What is RTO in disaster recovery?
  • Ans. 

    RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.

    • RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.

    • It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.

    • For ex...

  • Answered by AI
  • Q7. Which application you are using to connect servers?
  • Ans. 

    I primarily use SSH (Secure Shell) to connect servers.

    • SSH (Secure Shell) is a widely used application for securely connecting to servers

    • Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections

  • Answered by AI
Round 3 - Behavioral 

(4 Questions)

  • Q1. Hiring manager will brief about jd and ask questions based on related job and you are working
  • Q2. Do you vulnerability management?
  • Ans. 

    Yes, I am experienced in vulnerability management.

    • I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.

    • I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.

    • I have implemented patch management processes to address vulnerabilities in a timely manner.

    • I have conducted vulnerability assessments and penetration testing to identify weakness...

  • Answered by AI
  • Q3. You worked applications were connected or disconnected one?
  • Ans. 

    I have experience working with both connected and disconnected applications.

    • I have experience developing applications that can function both online and offline.

    • I have worked on projects where data synchronization is crucial for seamless user experience.

    • Examples include mobile apps that can work offline and sync data when connected to the internet.

  • Answered by AI
  • Q4. Have you taken care of Authorization part?
  • Ans. 

    Yes, I have experience in taking care of the Authorization part in various projects.

    • Implemented role-based access control (RBAC) to manage user permissions

    • Configured and managed authentication protocols such as OAuth and SAML

    • Worked on setting up access control lists (ACLs) for network security

    • Experience with managing user roles and permissions in Active Directory

    • Utilized single sign-on (SSO) solutions for seamless user

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well be confident do some research on the jd

Skills evaluated in this interview

Interview experience
2
Poor
Difficulty level
Hard
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before May 2023. There were 3 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Write a way to handle a situation in SQL without putting join condition
  • Ans. 

    Use subqueries to handle a situation in SQL without putting join condition

    • Use subqueries to retrieve data from another table without explicitly joining them

    • Subqueries can be used in SELECT, WHERE, or FROM clauses

    • Example: SELECT * FROM table1 WHERE column1 IN (SELECT column2 FROM table2)

  • Answered by AI
Round 2 - One-on-one 

(1 Question)

  • Q1. Situational question on handling certain Product Management issues
Round 3 - HR 

(1 Question)

  • Q1. Explain various components of the previous salary

Interview Preparation Tips

Interview preparation tips for other job seekers - Be very prepared; Questions are not run on the mill questions and seeks more than what is expected of the role

Skills evaluated in this interview

FIS Interview FAQs

What are the top questions asked in FIS Senior Systems Engineer interview?

Some of the top questions asked at the FIS Senior Systems Engineer interview -

  1. I was hired for the Profile of Applications Support, Environment Integration an...read more
  2. Technical Scenario+Behaviou...read more

Tell us how to improve this page.

People are getting interviews through

based on 2 FIS interviews
Job Portal
100%
Moderate Confidence
?
Moderate Confidence means the data is based on a sufficient number of responses received from the candidates
Join FIS Advancing the way the world pays, banks and investments
FIS Senior Systems Engineer Salary
based on 244 salaries
₹5.1 L/yr - ₹16.7 L/yr
67% more than the average Senior Systems Engineer Salary in India
View more details

FIS Senior Systems Engineer Reviews and Ratings

based on 35 reviews

4.3/5

Rating in categories

4.1

Skill development

4.5

Work-Life balance

4.3

Salary & Benefits

4.2

Job Security

4.4

Company culture

4.0

Promotions/Appraisal

4.1

Work Satisfaction

Explore 35 Reviews and Ratings
Senior Software Engineer
2.7k salaries
unlock blur

₹7 L/yr - ₹29 L/yr

Software Engineer
1.6k salaries
unlock blur

₹4.1 L/yr - ₹16 L/yr

Lead Engineer
677 salaries
unlock blur

₹7.3 L/yr - ₹26.4 L/yr

Team Member
675 salaries
unlock blur

₹1.5 L/yr - ₹6 L/yr

Senior Leader Engineer
629 salaries
unlock blur

₹9.9 L/yr - ₹30.5 L/yr

Explore more salaries
Compare FIS with

TCS

3.7
Compare

Infosys

3.7
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview