Filter interviews by
I am a dedicated and experienced Nnoc Engineer with a strong background in network operations and troubleshooting.
Over 5 years of experience in network operations
Proficient in troubleshooting network issues
Skilled in configuring and maintaining network equipment
Certified in Cisco networking technologies
Various technologies are used in Nnoc Engineer role, including networking, programming languages, cloud computing, and cybersecurity.
Networking technologies such as TCP/IP, DNS, DHCP
Programming languages like Python, Java, C++
Cloud computing platforms such as AWS, Azure, Google Cloud
Cybersecurity tools and techniques like firewalls, encryption, penetration testing
I led a team to design and implement a network operations center for a large telecommunications company.
Responsible for planning and designing the layout of the network operations center
Managed a team of engineers to implement the necessary infrastructure and systems
Ensured the network operations center met all performance and security requirements
Collaborated with stakeholders to gather requirements and provide regula
CICD stands for Continuous Integration/Continuous Deployment. Jenkinsfile functions include stages, steps, post, and more.
CICD stands for Continuous Integration/Continuous Deployment
Jenkinsfile functions include stages, steps, post, agent, environment, and more
Stages define a series of tasks to be executed in a pipeline
Steps define individual actions within a stage
Post defines actions to be taken after the pipeline has...
Kubernetes is an open-source container orchestration platform for automating deployment, scaling, and management of containerized applications.
Kubernetes helps in automating the deployment, scaling, and management of containerized applications.
It allows for easy scaling of applications by adding or removing containers based on demand.
Kubernetes provides features like service discovery, load balancing, and self-healing ...
Workspaces in Docker are isolated environments where developers can work on different projects without affecting each other.
Workspaces allow developers to have separate environments for each project, preventing conflicts between dependencies.
Each workspace has its own set of containers, volumes, and networks, ensuring isolation.
Developers can easily switch between workspaces to work on different projects.
Workspaces are...
Cost optimization in DevOps is achieved through efficient resource utilization, automation, and continuous monitoring.
Implementing auto-scaling to dynamically adjust resources based on demand
Using containerization to maximize resource utilization and reduce costs
Leveraging cloud services for pay-as-you-go pricing model
Implementing cost monitoring tools to identify and eliminate wasteful spending
Optimizing code and infr...
Monitoring is done using Prometheus and Grafana. Prometheus collects metrics and Grafana visualizes them.
Prometheus is an open-source monitoring and alerting toolkit
It collects metrics from monitored targets by scraping HTTP endpoints
Grafana is a visualization tool that creates dashboards for the collected metrics
It allows users to create graphs, charts, and alerts based on the data from Prometheus
posted on 28 Jul 2023
I applied via Job Portal and was interviewed in Jan 2023. There were 2 interview rounds.
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language
It is used to communicate with databases to retrieve, insert, update, and delete data
Some subtypes of SQL include MySQL, PostgreSQL, Oracle SQL, and Microsoft SQL Server
sed command is a stream editor for filtering and transforming text, while find command is used to search for files in a directory hierarchy.
sed command is used to perform text transformations on an input stream or file
find command is used to search for files in a directory hierarchy based on various criteria
sed command can be used to replace text, delete lines, or perform other text manipulations
find command can search...
PK is Primary Key which uniquely identifies a record in a table, while FK is Foreign Key which establishes a relationship between two tables.
PK ensures uniqueness of records in a table
FK establishes a relationship between tables
PK is used to enforce entity integrity, while FK is used to enforce referential integrity
Shell scraping is the process of extracting data from websites using automated tools or scripts.
Shell scraping involves writing scripts to automate the process of extracting data from websites
Tools like BeautifulSoup in Python or Scrapy can be used for shell scraping
Shell scraping is commonly used for web scraping and data mining purposes
The uptime command in Linux displays the current time, how long the system has been running, and the number of users currently logged in.
Displays the current time
Shows how long the system has been running
Indicates the number of users currently logged in
I applied via Job Fair and was interviewed in Jan 2022. There was 1 interview round.
I applied via Job Portal and was interviewed in Dec 2021. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2019. There were 6 interview rounds.
The question is about finding missing and repeating numbers in an array and adding two numbers using linked lists.
To find missing and repeating numbers in an array, use a hash set to track the occurrence of each number.
To add two numbers using linked lists, traverse both lists simultaneously and keep track of carry.
Remember to handle edge cases like different lengths of linked lists or a carry at the end.
Senior Manager
3
salaries
| ₹24 L/yr - ₹30 L/yr |
Executive Assistant
3
salaries
| ₹18.2 L/yr - ₹22 L/yr |
Desk Engineer
3
salaries
| ₹3.6 L/yr - ₹3.6 L/yr |
Tata Group
Aditya Birla Group
Reliance Industries
JSW Group