i
Kyndryl
Work with us
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
Experienced in Windows Server administration, managing systems, security, and user access for optimal performance and reliability.
Managed Active Directory for user account creation, modification, and deletion, ensuring proper access controls.
Configured and maintained DNS and DHCP services to ensure network connectivity and resource availability.
Implemented Group Policy Objects (GPOs) to enforce security settings a...
I have developed various automation scripts to streamline tasks and improve efficiency in IBM i administration.
Automated system backups using CL scripts to schedule and manage nightly backups.
Created a script to monitor system performance metrics and send alerts via email when thresholds are exceeded.
Developed a job scheduling script that optimizes resource allocation based on historical job run times.
Implemented ...
BRMS policies manage backup and recovery processes on IBM i systems, ensuring data integrity and availability.
BRMS (Backup, Recovery, and Media Services) automates backup tasks based on defined policies.
Policies can specify backup frequency, retention periods, and media management.
Example: A policy may dictate daily backups for critical data and weekly for less critical data.
Policies can also define recovery proce...
Switches enhance network efficiency by directing data traffic intelligently, reducing collisions and improving performance.
Improved Performance: Switches reduce network collisions by creating separate collision domains for each connected device.
Increased Bandwidth: By using switches, each device can communicate simultaneously, maximizing the available bandwidth.
Enhanced Security: Switches can implement VLANs (Virt...
The Data Link layer ensures reliable communication between directly connected devices in a network.
Provides error detection and correction to ensure data integrity.
Manages frame synchronization, ensuring data is sent and received in the correct order.
Handles MAC (Media Access Control) addressing to identify devices on the same local network.
Examples include Ethernet and Wi-Fi protocols, which operate at this layer...
TCP/IP is a set of communication protocols used for interconnecting network devices on the internet.
TCP (Transmission Control Protocol) ensures reliable data transmission by establishing a connection before data transfer.
IP (Internet Protocol) is responsible for addressing and routing packets of data between devices on a network.
TCP/IP is the foundation of the internet, enabling different devices and networks to c...
Allocating prefix SIDs in IOS-XE involves defining a range and assigning them based on network topology and requirements.
Define a range of prefix SIDs for each segment routing-enabled interface.
Use a consistent allocation strategy, such as assigning SIDs based on the interface's IP address.
Example: For an interface with IP 192.168.1.1, allocate a prefix SID of 16001.
Consider hierarchical allocation for scalability...
Validating the LSP involves ensuring its accuracy, reliability, and relevance through various methods and assessments.
Conduct a thorough literature review to compare LSP findings with existing research.
Utilize statistical methods to analyze the data collected from the LSP.
Engage with stakeholders to gather feedback on the LSP's applicability and effectiveness.
Perform pilot testing to assess the LSP in real-world s...
A sham link in OSPF is a virtual link used to connect discontiguous areas without a direct physical connection.
Sham links are used in OSPF to connect discontiguous areas, allowing for routing between them.
They are configured using the 'area' command in OSPF configuration mode.
Example configuration: 'router ospf 1' followed by 'area 1 sham-link 2.2.2.2 1.1.1.1'.
Sham links help maintain OSPF routing tables and ensur...
BGP attributes are key parameters that influence route selection and path advertisement in the Border Gateway Protocol.
AS Path: Lists the Autonomous Systems a route has traversed, helping to prevent routing loops.
Next Hop: Indicates the next IP address to which packets should be sent to reach the destination.
Local Preference: Used to prefer one exit point over another within an AS, higher values are preferred.
Mult...
I applied via Referral and was interviewed before Apr 2023. There were 2 interview rounds.
I appeared for an interview in Feb 2025.
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks and unauthorized access.
Involves measures to safeguard information technology assets.
Includes practices like encryption, firewalls, and intrusion detection systems.
Examples of threats include malware, phishing, and ransomware attacks.
Cybersecurity is crucial for protecting sensitive data in sectors like finance and healthcare.
The current version of Microsoft Windows Server is Windows Server 2019. Hyper-V is a virtualization platform. Active Directory is a directory service. DNS is a system that translates domain names to IP addresses. DHCP is a network protocol that assigns IP addresses to devices. WSUS is Windows Server Update Services. The current version of client Windows operating system is Windows 10.
Windows Server 2019 is the latest v...
VMware vSphere is a virtualization platform that provides virtualization, management, resource optimization, and more.
DRS (Distributed Resource Scheduler) in VMware is a feature that automatically balances computing workloads across a cluster of ESXi hosts.
High availability in VMware ensures that virtual machines are restarted on another host in case of a host failure.
Fault Tolerance in VMware provides continuous avail...
Microsoft Azure Cloud is a cloud computing service provided by Microsoft, offering a variety of services and resources for building, deploying, and managing applications.
Provides infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) offerings
Offers services such as virtual machines, databases, AI and machine learning tools, and more
Allows for scalability, flexibility, and co...
FSMO stands for Flexible Single Master Operations. They are specialized roles in Active Directory that handle specific tasks.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Each FSMO role is responsible for a specific aspect of the Active Directory environment.
For example, the PDC Emulator role handles password changes and time synchronization within a do...
Service Delivery involves providing services to customers in a timely and efficient manner.
Service Delivery focuses on meeting customer needs and expectations
It involves ensuring services are delivered on time and within budget
Service Delivery often includes managing relationships with customers and stakeholders
Examples of Service Delivery include IT support, logistics, and customer service
Incident is an unplanned event that disrupts or degrades a service, while Problem is the underlying cause of one or more incidents.
Incident is a specific event that causes an interruption or reduction in the quality of a service.
Problem is the root cause of one or more incidents and is identified through the analysis of incidents.
Incidents are typically resolved quickly to restore service, while problems require invest...
I prioritize tasks, stay organized, communicate effectively, and remain calm to manage work under pressure.
Prioritize tasks based on urgency and importance
Stay organized by creating to-do lists and setting deadlines
Communicate effectively with team members and stakeholders to manage expectations
Remain calm by taking deep breaths and focusing on solutions rather than problems
DNS is a domain name system that translates domain names to IP addresses.
DNS stands for Domain Name System
It translates human-readable domain names (like www.example.com) to IP addresses (like 192.168.1.1)
DNS helps in locating websites and other resources on the internet
DNS operates through a distributed database system that stores domain names and their corresponding IP addresses
DHCP is a protocol used to automatically assign IP addresses to devices on a network.
DHCP eliminates the need for manual IP address configuration on each device
It helps in efficient management of IP addresses in a network
DHCP servers lease IP addresses to devices for a specific period of time
Example: When a new device connects to a network, DHCP assigns it an available IP address
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
A Web Application Firewall (WAF) is a security solution that monitors and filters HTTP traffic between a web application and the Internet.
Monitoring and filtering HTTP traffic to protect against common web application attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF)
Configuring and maintaining rules to block malicious traffic while allowing legitimate traffic to pass throu...
I have extensive experience in network security and have successfully implemented various security measures in my previous roles.
I have a strong background in network security protocols and technologies
I have experience in implementing firewalls, intrusion detection systems, and VPNs
I have successfully managed security incidents and conducted security audits
I have a track record of staying up-to-date with the latest se...
I applied via Approached by Company
I have diverse work experience in project management, team leadership, and process optimization across various industries.
Led a cross-functional team to successfully launch a new product, resulting in a 20% increase in market share.
Implemented Agile methodologies in my previous role, which improved project delivery times by 30%.
Conducted training sessions for team members, enhancing their skills and boosting overall te...
As an SDM, my day involves team management, project oversight, and stakeholder communication to ensure successful project delivery.
Start the day with a team stand-up meeting to discuss progress and blockers.
Review project timelines and adjust resources as needed to meet deadlines.
Conduct one-on-one meetings with team members to provide support and feedback.
Collaborate with stakeholders to gather requirements and ensure...
Managing a team with an average worker involves motivation, skill development, and fostering collaboration for overall team success.
Identify strengths: Assess the average worker's strengths and leverage them in team tasks, such as assigning them roles that suit their skills.
Set clear goals: Establish specific, measurable objectives for the team, ensuring the average worker understands their contribution to the overall ...
Multiple questions are given to evaluate how you collaborate with others to reach a decision.
My area of interest is artificial intelligence and machine learning. I am well-informed about various technologies and stay updated through continuous learning.
I have a strong interest in artificial intelligence and machine learning, and have completed several projects in this field.
I regularly attend workshops, seminars, and online courses to stay updated on the latest technologies and trends.
I actively participate in...
My area of focus is strategic planning and implementation. I propose to use data-driven decision-making and cross-functional collaboration to drive change.
Utilize data analytics to identify key trends and opportunities for improvement
Implement agile methodologies to quickly adapt to changing market conditions
Foster a culture of innovation by encouraging team members to think creatively and share ideas
Collaborate with s...
TCP is a connection-oriented protocol that ensures reliable data delivery, while UDP is a connectionless protocol that focuses on speed.
TCP is reliable and ensures data delivery by establishing a connection before sending data.
UDP is faster but less reliable as it does not establish a connection before sending data.
TCP is commonly used for applications that require reliable data transmission, such as web browsing, emai...
To troubleshoot a user's system that cannot connect to the internet, I would follow these steps
Check if the internet connection is working on other devices
Restart the router and modem
Check network settings on the user's system
Run network diagnostics or troubleshoot network connection
Update network drivers or reset network settings
I applied via LinkedIn and was interviewed in Dec 2024. There was 1 interview round.
Top trending discussions
Some of the top questions asked at the Kyndryl interview -
The duration of Kyndryl interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 214 interview experiences
Difficulty level
Duration
based on 3.2k reviews
Rating in categories
System Administrator
1.3k
salaries
| ₹4.7 L/yr - ₹11.8 L/yr |
Infrastructure Specialist
712
salaries
| ₹5.9 L/yr - ₹22.8 L/yr |
Associate Technical Engineer
696
salaries
| ₹4 L/yr - ₹6.5 L/yr |
Project Manager
670
salaries
| ₹13 L/yr - ₹23 L/yr |
SME
460
salaries
| ₹14.1 L/yr - ₹26 L/yr |
Genpact
DXC Technology
Sutherland Global Services
Optum Global Solutions