Filter interviews by
I was interviewed in Oct 2024.
To create an IPsec tunnel, configure the necessary parameters on both ends of the connection.
Configure the IPsec parameters such as encryption algorithms, authentication methods, and key exchange protocols on both the source and destination devices.
Establish a secure communication channel by setting up the IPsec tunnel between the two endpoints.
Ensure that the IPsec tunnel is properly configured and tested for secure d...
To troubleshoot an IPsec tunnel, check configurations, verify connectivity, monitor logs, and use packet capture tools.
Check the IPsec configuration on both ends to ensure they match
Verify that the tunnel endpoints can reach each other
Monitor logs on both devices for any error messages related to the tunnel
Use packet capture tools like Wireshark to analyze traffic going through the tunnel
SSL VPN allows remote users to securely access the network from any location.
SSL VPN uses encryption to secure the connection between the remote user and the network.
It authenticates users before granting access to resources.
SSL VPN can be set up using a web browser or a client application.
It provides a secure way for remote employees to access company resources.
SSL VPN can be configured to restrict access based on use
Configuring IPsec tunnel for 3 different locations and explaining traffic flow
Configure IPsec tunnel on routers/firewalls at each location
Set up IPsec policies for encryption and authentication
Define IPsec tunnel endpoints and establish secure communication
Ensure proper routing between locations for traffic flow
Monitor and troubleshoot the IPsec tunnel for any issues
To upgrade to Palo Alto firewall and Fortigate, follow these steps: plan the upgrade, backup configurations, test the upgrade in a lab environment, schedule downtime, perform the upgrade, test functionality post-upgrade.
Plan the upgrade by determining the current firewall configurations and requirements for the new firewalls.
Backup configurations of the existing firewalls to ensure data safety in case of any issues dur...
To troubleshoot both locations IPsec tunnel being down, check configurations, network connectivity, and security policies.
Check the IPsec configurations on both ends to ensure they match
Verify network connectivity between the two locations
Check firewall and security policies to ensure they are not blocking the IPsec traffic
Review logs on both ends for any error messages or indications of the issue
Restart the IPsec serv
I applied via Naukri.com and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.
Ai interview backend microservices core java
I applied via Company Website and was interviewed in Sep 2024. There was 1 interview round.
Spring Boot is a Java-based framework used for creating standalone, production-grade Spring-based applications.
Spring Boot simplifies the process of creating Spring applications by providing a set of default configurations.
It allows for easy setup of Spring projects with minimal configuration.
Spring Boot includes embedded servers like Tomcat, Jetty, or Undertow, making it easy to deploy applications.
It provides product...
Serialisation is the process of converting an object into a stream of bytes to store or transmit data.
Serialisation is used to save the state of an object and recreate it when needed.
It allows objects to be converted into a format that can be easily stored or transmitted.
Common examples include JSON, XML, and binary serialisation.
Serialisation is important for data persistence and inter-process communication.
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Binary search is a fast search algorithm that finds the position of a target value within a sorted array.
Ensure the array is sorted before performing binary search.
Compare the target value with the middle element of the array.
If the target value is less than the middle element, search the left half of the array. If greater, search the right half.
Repeat the process until the target value is found or the subarray is empt
Merge sort is a divide and conquer algorithm that divides the input array into two halves, sorts them, and then merges them back together.
Divide the array into two halves recursively
Sort each half separately
Merge the sorted halves back together
Experienced Senior Engineer with a strong background in software development and project management.
Over 10 years of experience in software engineering
Proficient in multiple programming languages such as Java, Python, and C++
Led successful projects from conception to completion, delivering high-quality solutions on time and within budget
Strong problem-solving skills and ability to work well in a team environment
I am responsible for designing, implementing, and testing new features in the project.
Designing new features based on requirements provided by stakeholders
Implementing the designed features using appropriate technologies and best practices
Testing the implemented features to ensure they meet quality standards
Collaborating with team members to troubleshoot and resolve technical issues
Participating in code reviews and pro
My expected salary is based on my experience, skills, and the market rate for Senior Engineers.
Consider my years of experience in the field
Take into account my specialized skills and certifications
Research the current market rate for Senior Engineers in this location
Open to negotiation based on benefits package offered
I can join within 2 weeks of receiving an offer.
I can start within 2 weeks of receiving an offer.
My current notice period is 2 weeks.
I am available to start immediately.
I was interviewed in Sep 2024.
Hackerrank coding & techinical interview test
Difficulties faced during layout include space constraints, equipment compatibility, and regulatory compliance.
Space constraints can limit the placement of equipment and affect workflow.
Ensuring equipment compatibility can be challenging when integrating new technologies with existing systems.
Meeting regulatory compliance standards adds complexity to the layout design process.
Prevent latch up in layout by using guard rings, spacing between devices, and proper substrate connections.
Use guard rings around sensitive nodes to prevent latch up.
Ensure proper spacing between devices to avoid parasitic currents.
Connect substrate properly to prevent latch up.
Use well-taps to tie substrate to the most negative voltage in the circuit.
Avoid high substrate resistances that can lead to latch up.
I am a dedicated and experienced Senior Engineer with a strong background in project management and problem-solving.
Over 10 years of experience in engineering field
Expertise in project management and team leadership
Strong problem-solving skills and attention to detail
Proficient in various engineering software and tools
Excellent communication and interpersonal skills
Deloitte is a global leader in consulting and technology services, offering exciting opportunities for growth and innovation.
Deloitte is a prestigious global consulting firm known for its innovative solutions and industry expertise
Deloitte offers a wide range of opportunities for career growth and development
Deloitte values diversity and inclusion, creating a supportive and collaborative work environment
Deloitte's focu...
based on 3 reviews
Rating in categories
Technical Lead
19
salaries
| ₹5.9 L/yr - ₹9 L/yr |
Senior Engineer
17
salaries
| ₹4 L/yr - ₹5.8 L/yr |
Senior Technical Lead
16
salaries
| ₹7 L/yr - ₹8.6 L/yr |
Assistant Engineering Manager
14
salaries
| ₹9 L/yr - ₹10 L/yr |
Design Engineer
8
salaries
| ₹3.2 L/yr - ₹9 L/yr |
Tata Group
Reliance Industries
Adani Group
Infosys