i
FIS
Filter interviews by
I applied via Recruitment Consultant and was interviewed in Apr 2021. There were 5 interview rounds.
The deliverables of a Business Analyst include requirements documents, process models, and test plans.
Requirements documents: Business Analysts gather and document the functional and non-functional requirements of a project.
Process models: Business Analysts create process flow diagrams and models to illustrate the current and future state of business processes.
Test plans: Business Analysts develop test plans and test c...
Lending origination and servicing involves the process of granting loans and managing them throughout their lifecycle.
Lending origination refers to the process of evaluating loan applications, determining eligibility, and approving or rejecting loans.
Lending servicing involves managing the loan after it has been originated, including collecting payments, handling customer inquiries, and managing any changes or modifica...
Disposable income is the amount of money a person or household has available to spend or save after taxes and essential expenses.
Disposable income is the net income or take-home pay after deducting taxes.
It represents the amount of money that can be used for discretionary spending or saving.
Disposable income is calculated by subtracting taxes and essential expenses, such as rent, utilities, and food, from the total inc...
I applied via Naukri.com and was interviewed in Jan 2022. There were 4 interview rounds.
I was interviewed before Feb 2022.
I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.
Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.
Configure authentication settings within the application to enable SSO
Integrate the application with identity providers such as Okta, Azure AD, or PingFederate
Test the SSO functionality to ensure seamless user experience
Provide documentation and training for users on how
I handle outages by following established procedures and prioritize tasks based on impact.
Immediately assess the situation to determine the root cause of the outage
Communicate with stakeholders to keep them informed of the issue and expected resolution time
Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible
Document the outage incident and steps taken for future reference and i...
I handle change management by implementing structured processes, communication, and stakeholder involvement.
Implementing a change management process to track and document changes
Communicating changes effectively to all stakeholders
Involving key stakeholders in decision-making and planning
Ensuring proper testing and validation of changes before implementation
Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.
Integrate with identity providers such as Okta, Azure AD, or Google Workspace
Configure authentication protocols like SAML, OAuth, or OpenID Connect
Implement single sign-on functionality in the application code
Ensure secure communication between the application and the identity provider
RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.
RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.
It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.
For ex...
I primarily use SSH (Secure Shell) to connect servers.
SSH (Secure Shell) is a widely used application for securely connecting to servers
Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections
Yes, I am experienced in vulnerability management.
I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.
I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.
I have implemented patch management processes to address vulnerabilities in a timely manner.
I have conducted vulnerability assessments and penetration testing to identify weakness...
I have experience working with both connected and disconnected applications.
I have experience developing applications that can function both online and offline.
I have worked on projects where data synchronization is crucial for seamless user experience.
Examples include mobile apps that can work offline and sync data when connected to the internet.
Yes, I have experience in taking care of the Authorization part in various projects.
Implemented role-based access control (RBAC) to manage user permissions
Configured and managed authentication protocols such as OAuth and SAML
Worked on setting up access control lists (ACLs) for network security
Experience with managing user roles and permissions in Active Directory
Utilized single sign-on (SSO) solutions for seamless user
I applied via Referral and was interviewed before Jul 2023. There were 3 interview rounds.
Microservice architecture is an architectural style that structures an application as a collection of loosely coupled services.
Microservices are small, independent, and autonomous services that communicate with each other through APIs.
Each microservice is responsible for a specific business capability and can be developed, deployed, and scaled independently.
Microservices promote flexibility, scalability, and fault tole...
I applied via Referral and was interviewed before May 2023. There were 3 interview rounds.
Use subqueries to handle a situation in SQL without putting join condition
Use subqueries to retrieve data from another table without explicitly joining them
Subqueries can be used in SELECT, WHERE, or FROM clauses
Example: SELECT * FROM table1 WHERE column1 IN (SELECT column2 FROM table2)
I applied via Naukri.com and was interviewed before Nov 2022. There were 2 interview rounds.
Linux commands are used to interact with the operating system and perform various tasks.
Commands are case-sensitive
Most commands have options and arguments
Common commands include ls, cd, pwd, mkdir, rm, cp, mv, grep, ps, top, systemctl
Use man command_name to get more information about a specific command
Linux is an open-source operating system, while Windows is a proprietary operating system developed by Microsoft.
Linux is open-source and free to use, while Windows is proprietary and requires a license.
Linux is highly customizable and can be modified by users, while Windows has limited customization options.
Linux is known for its stability and security, while Windows is more vulnerable to viruses and malware.
Linux use...
posted on 17 Aug 2023
I applied via Walk-in and was interviewed before Aug 2022. There were 3 interview rounds.
Contains aptitude and reasoning and verbal
Have to discuss about a topic provided by them
I was interviewed before Apr 2022.
Asked to create unix shell scripts for deployment in weblogic
based on 18 reviews
Rating in categories
Senior Software Engineer
2.7k
salaries
| ₹7 L/yr - ₹29 L/yr |
Software Engineer
1.6k
salaries
| ₹4.2 L/yr - ₹16 L/yr |
Lead Engineer
681
salaries
| ₹7.3 L/yr - ₹26.4 L/yr |
Team Member
675
salaries
| ₹1.5 L/yr - ₹6 L/yr |
Senior Leader Engineer
634
salaries
| ₹9.9 L/yr - ₹30.5 L/yr |
TCS
Infosys
Wipro
HCLTech