Filter interviews by
Be the first one to contribute and help others!
I was interviewed in Aug 2024.
Excel test
Logical Reasoning test
Quantitative aptitude test
An extensive case study for the corporate tax team that includes knowledge of US GAAP and transfer pricing.
posted on 9 Feb 2025
I was interviewed in Jan 2025.
They gave a case study where the candidate had to showcase the audience segmentation, create a brochure design with content and showcase the writing skills based on a product that they gave.
posted on 25 Jan 2025
I was interviewed in Dec 2024.
A standardized assessment that measures a person's skills, cognitive abilities, and potential to perform in a specific role.
For example, a โน10 LPA CTC could mean an in-hand salary of โน70,000โโน75,000 per month, depending on deductions and benefits.
โจ ๐ฃ๐ฟ๐ผ ๐ง๐ถ๐ฝ: Always request a detailed salary structure during negotiationsโitโs your roadmap to making informed decisions
๐๐ง๐ ๐๐ ๐๐ป-๐๐ฎ๐ป๐ฑ ๐ฆ๐ฎ๐น๐ฎ๐ฟ๐: ๐ง๐ต๐ฒ ๐ฅ๐ฒ๐ฎ๐น๐ถ๐๐ ๐๐ต๐ฒ๐ฐ๐ธ ๐๐๐ฒ๐ฟ๐ ๐ฃ๐ฟ๐ผ๐ณ๐ฒ๐๐๐ถ๐ผ๐ป๐ฎ๐น ๐ก๐ฒ๐ฒ๐ฑ๐!
Weโve all been thereโexcitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
I was interviewed in Jan 2025.
I was interviewed in Jan 2025.
I was interviewed in Dec 2024.
Our team follows a CI/CD workflow that includes automated testing, code reviews, and continuous integration.
Automated testing is run on every code change to catch bugs early.
Code reviews are conducted before merging changes to ensure code quality.
Continuous integration is used to automatically build and test code changes in a shared repository.
Deployment pipelines are set up to automate the release process.
Version cont...
Yes, there have been security incidents and I have handled them effectively.
Implemented security protocols to prevent future incidents
Conducted thorough investigation to identify the root cause
Collaborated with IT team to strengthen security measures
Communicated with stakeholders to ensure transparency and trust
Provided training to employees on cybersecurity best practices
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization determines the level of access or permissions a user has once their identity is confirmed.
Authentication is the process of logging in, while authorization is the process of granting or denyin...
LLD for an authentication and authorization system
Separate modules for authentication and authorization
Use of secure hashing algorithms for storing passwords
Role-based access control implementation
Audit logging for tracking user actions
Integration with external identity providers
Design a document managed storage like Google Drive as an E2E solution.
Implement user authentication and authorization for secure access.
Create a user-friendly interface for uploading, organizing, and sharing documents.
Include features like version control, file syncing, and search functionality.
Utilize cloud storage for scalability and accessibility.
Implement encryption for data security.
Integrate with third-party app
AML and KYC requirements are regulations that financial institutions must follow to prevent money laundering and verify the identity of their customers.
AML (Anti-Money Laundering) requirements involve monitoring transactions, reporting suspicious activities, and conducting customer due diligence.
KYC (Know Your Customer) requirements involve verifying the identity of customers, assessing their risk level, and maintainin...
I have a strong attention to detail and analytical skills that set me apart from my colleagues.
I have a proven track record of accurately identifying and resolving discrepancies in KYC documentation.
I excel at conducting thorough research and analysis to ensure compliance with regulations.
My ability to effectively communicate complex information to stakeholders sets me apart in team collaborations.
Strength: attention to detail, Weakness: perfectionism
Strength: Ability to meticulously review documents and identify discrepancies
Strength: Strong analytical skills to detect potential risks or fraudulent activities
Weakness: Striving for perfection may lead to spending too much time on a task
Weakness: Difficulty in delegating tasks due to desire for everything to be done perfectly
Implemented a new KYC process resulting in 30% reduction in onboarding time and 20% decrease in errors.
Led a team to revamp KYC procedures and systems
Introduced automation tools to streamline verification process
Trained staff on updated KYC regulations and best practices
Yes, I am a team player. I believe in open communication and collaboration. When conflicts arise, I address them directly and seek resolution.
I believe in open communication and collaboration within the team.
I address conflicts directly and seek resolution through constructive conversations.
I focus on finding common ground and working towards a solution that benefits the team as a whole.
I failed to meet a deadline due to poor time management.
Underestimated the time needed for a project
Did not prioritize tasks effectively
Learned to create a detailed schedule and set realistic deadlines
General English grammar knowledge and some calculations
US IT Recruiter
5
salaries
| โน3.6 L/yr - โน5.5 L/yr |
Software Developer
4
salaries
| โน2.8 L/yr - โน6 L/yr |
Technical Recruiter
4
salaries
| โน3 L/yr - โน4 L/yr |
Senior Accounts Manager
3
salaries
| โน12 L/yr - โน24 L/yr |
Senior Technical Recruiter
3
salaries
| โน4.2 L/yr - โน4.2 L/yr |
Wipro
Infosys
Tech Mahindra
WNS