Filter interviews by
Yes, I have experience in managing big data projects.
Managed a project for a retail company to analyze customer data and improve sales
Implemented a data lake solution for a financial institution to store and analyze large amounts of financial data
Worked with a team to develop a predictive analytics model for a healthcare organization to improve patient outcomes
Familiar with Hadoop, Spark, and other big data technologie
Started as a software engineer, transitioned to project management with experience in various industries.
Began career as a software engineer at XYZ company
Transitioned to project management role at ABC company
Managed projects in healthcare, finance, and technology industries
Implemented agile methodologies to improve project efficiency
Led cross-functional teams to successful project completion
I expect clear communication, defined goals, and a supportive team environment.
Clear communication of project requirements and expectations
Defined goals and timelines for project completion
A supportive team environment that encourages collaboration and problem-solving
Regular check-ins and updates to ensure project is on track
Flexibility to adapt to changes and challenges that may arise
Top trending discussions
I was interviewed in Jan 2025.
2 MCQs sections based on SQL and Power BI.
posted on 21 Feb 2025
Types of denials in client partnerships include authorization, eligibility, medical necessity, and timely filing denials.
Authorization denials occur when services are provided without proper approval from insurance.
Eligibility denials happen when the patient's insurance coverage is not active or does not cover the service.
Medical necessity denials occur when the service provided is not deemed medically necessary by the...
Authentication (Auth) is the process of verifying the identity of a user or system. There are various types of authentication methods.
Authentication is crucial for ensuring security in systems and applications.
Types of authentication include password-based, biometric, two-factor authentication, and OAuth.
Examples: Password-based authentication requires users to enter a password to access their accounts. Biometric authe...
Non-covered refers to services not included in an insurance policy. Types include cosmetic procedures, experimental treatments, and certain elective surgeries.
Non-covered services are typically outlined in the insurance policy's exclusions section.
Examples of non-covered services may include cosmetic procedures like teeth whitening, experimental treatments not approved by the FDA, and elective surgeries like plastic su
I was interviewed in Jan 2025.
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There were 4 interview rounds.
S/4 HANA implementation involves migrating business processes to SAP's latest ERP system for improved efficiency and real-time analytics.
Data migration from legacy systems to S/4 HANA
Business process reengineering to align with S/4 HANA functionalities
Customization and configuration of S/4 HANA modules
Training employees on using the new system effectively
Testing and validation of the implemented solution
Setting up a master data set involves identifying data sources, cleansing data, defining data attributes, and establishing data governance.
Identify all relevant data sources that will be included in the master data set
Cleanse the data to ensure accuracy and consistency
Define data attributes such as data types, formats, and relationships
Establish data governance policies and procedures to maintain data quality and integ
I was interviewed in Dec 2024.
Our team follows a CI/CD workflow that includes automated testing, code reviews, and continuous integration.
Automated testing is run on every code change to catch bugs early.
Code reviews are conducted before merging changes to ensure code quality.
Continuous integration is used to automatically build and test code changes in a shared repository.
Deployment pipelines are set up to automate the release process.
Version cont...
Yes, there have been security incidents and I have handled them effectively.
Implemented security protocols to prevent future incidents
Conducted thorough investigation to identify the root cause
Collaborated with IT team to strengthen security measures
Communicated with stakeholders to ensure transparency and trust
Provided training to employees on cybersecurity best practices
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization determines the level of access or permissions a user has once their identity is confirmed.
Authentication is the process of logging in, while authorization is the process of granting or denyin...
LLD for an authentication and authorization system
Separate modules for authentication and authorization
Use of secure hashing algorithms for storing passwords
Role-based access control implementation
Audit logging for tracking user actions
Integration with external identity providers
Design a document managed storage like Google Drive as an E2E solution.
Implement user authentication and authorization for secure access.
Create a user-friendly interface for uploading, organizing, and sharing documents.
Include features like version control, file syncing, and search functionality.
Utilize cloud storage for scalability and accessibility.
Implement encryption for data security.
Integrate with third-party app
posted on 2 Dec 2024
I applied via Walk-in and was interviewed in Nov 2024. There were 4 interview rounds.
GD was an great experience
Moderate test easy to clear
I applied via Campus Placement
First round Aptitude + Technical questions on CS fundamentals
Remove zeroes from a numbers only string and insert at last while maintaining relative order.
Iterate through the string and separate numbers and zeroes
Store numbers in an array and zeroes in a separate array
Concatenate the numbers array with the zeroes array at the end
posted on 14 Nov 2024
I applied via Naukri.com and was interviewed in Oct 2024. There were 5 interview rounds.
I chose this place because of its reputation for providing excellent international voice process services.
Reputation for excellent international voice process services
Positive feedback from current employees
Opportunities for growth and development
Convenient location for commuting
Positive work culture and environment
Aptitude, logical Reasoning, English grammar.
It's a easy round. This round will be conducted through Microsoft teams. Just confident and expressive while speaking that's it.
based on 1 interview
Interview experience
based on 18 reviews
Rating in categories
Programmer
14
salaries
| ₹5 L/yr - ₹10 L/yr |
Data Scientist
13
salaries
| ₹6.5 L/yr - ₹18 L/yr |
Senior Programmer
13
salaries
| ₹7.8 L/yr - ₹13.9 L/yr |
Full Stack Developer
9
salaries
| ₹8 L/yr - ₹10.8 L/yr |
Associate Technical Leader
9
salaries
| ₹11.4 L/yr - ₹28.5 L/yr |
Mu Sigma
Fractal Analytics
Tiger Analytics
LatentView Analytics