i
Intercontinental Exchange
Filter interviews by
I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.
ES6 (ECMAScript 6) is the 6th major release of the ECMAScript language specification, bringing many new features and enhancements.
Arrow functions for more concise syntax
Let and const for block-scoped variables
Classes for object-oriented programming
Template literals for string interpolation
Destructuring assignment for easily extracting values from arrays or objects
Spread syntax for easily expanding elements in arrays or...
Performance improvement in React involves optimizing rendering, reducing bundle size, and utilizing memoization.
Optimize rendering by using shouldComponentUpdate or React.memo
Reduce bundle size by code splitting and lazy loading components
Utilize memoization with useMemo or useCallback for expensive computations
Top trending discussions
I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.
Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.
Configure authentication settings within the application to enable SSO
Integrate the application with identity providers such as Okta, Azure AD, or PingFederate
Test the SSO functionality to ensure seamless user experience
Provide documentation and training for users on how
I handle outages by following established procedures and prioritize tasks based on impact.
Immediately assess the situation to determine the root cause of the outage
Communicate with stakeholders to keep them informed of the issue and expected resolution time
Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible
Document the outage incident and steps taken for future reference and i...
I handle change management by implementing structured processes, communication, and stakeholder involvement.
Implementing a change management process to track and document changes
Communicating changes effectively to all stakeholders
Involving key stakeholders in decision-making and planning
Ensuring proper testing and validation of changes before implementation
Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.
Integrate with identity providers such as Okta, Azure AD, or Google Workspace
Configure authentication protocols like SAML, OAuth, or OpenID Connect
Implement single sign-on functionality in the application code
Ensure secure communication between the application and the identity provider
RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.
RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.
It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.
For ex...
I primarily use SSH (Secure Shell) to connect servers.
SSH (Secure Shell) is a widely used application for securely connecting to servers
Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections
Yes, I am experienced in vulnerability management.
I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.
I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.
I have implemented patch management processes to address vulnerabilities in a timely manner.
I have conducted vulnerability assessments and penetration testing to identify weakness...
I have experience working with both connected and disconnected applications.
I have experience developing applications that can function both online and offline.
I have worked on projects where data synchronization is crucial for seamless user experience.
Examples include mobile apps that can work offline and sync data when connected to the internet.
Yes, I have experience in taking care of the Authorization part in various projects.
Implemented role-based access control (RBAC) to manage user permissions
Configured and managed authentication protocols such as OAuth and SAML
Worked on setting up access control lists (ACLs) for network security
Experience with managing user roles and permissions in Active Directory
Utilized single sign-on (SSO) solutions for seamless user
I applied via LinkedIn and was interviewed in Nov 2024. There were 2 interview rounds.
Testing an payment flow on the application
posted on 24 Sep 2024
1 hour, the coding test was based on a project given to us
Oops concept, spring framework, java core
OOPs concepts refer to Object-Oriented Programming principles such as Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation det
Hibernate is an ORM tool that simplifies database interactions in Java applications.
Hibernate configuration involves setting up database connection details in hibernate.cfg.xml
Entities are mapped to database tables using annotations or XML mapping files
SessionFactory is created to obtain Session objects for database operations
Transactions are managed using Session object to ensure data consistency
Example: Entity class ...
I applied via Approached by Company and was interviewed in Jul 2024. There were 3 interview rounds.
Normal DSA round from hacker rank
DSA round from hacker rank or leetcode
I applied via LinkedIn and was interviewed before Oct 2023. There were 3 interview rounds.
It was more based on array/string manipulation, stack/queue based, if you have solved questions before then it will be easy/medium difficulty level for yo
posted on 25 Jun 2024
I applied via Approached by Company
Implement rate limiting for a platform serving 100K requests per second.
Use a token bucket algorithm to limit the rate of incoming requests.
Set a maximum number of tokens in the bucket to control the rate.
Refill the bucket at a constant rate to allow bursts of requests.
Track the timestamp of the last request to enforce the rate limit.
Consider using a distributed rate limiting system for scalability.
Monitor and adjust t...
Data Researcher
135
salaries
| ₹3.3 L/yr - ₹6.1 L/yr |
Reference Data Analyst
86
salaries
| ₹4.6 L/yr - ₹8.5 L/yr |
Document Processor
71
salaries
| ₹2.3 L/yr - ₹4.3 L/yr |
Senior Software Engineer
63
salaries
| ₹12 L/yr - ₹42.8 L/yr |
Data Analyst
49
salaries
| ₹2.4 L/yr - ₹8.6 L/yr |
CME Group
NASDAQ
London Stock Exchange Group
Deutsche Börse