Filter interviews by
I applied via Approached by Company and was interviewed before Jan 2024. There was 1 interview round.
Experienced Accounts Manager with a strong background in financial analysis and team leadership.
Over 5 years of experience in managing accounts and financial reporting
Skilled in budgeting, forecasting, and variance analysis
Led a team of 10 accountants to streamline processes and improve efficiency
Proficient in using accounting software such as QuickBooks and SAP
I applied via Approached by Company
I cannot answer that question as it is illegal and unethical to make extortion calls to jobseekers.
Making extortion calls is illegal and unethical
It goes against the company's values and can lead to legal consequences
The focus should be on providing a fair and transparent background verification process
Building trust with jobseekers is crucial for the company's reputation and success
I was interviewed in Jun 2022.
I applied via Referral and was interviewed before Aug 2020. There was 1 interview round.
SecUR Credentials interview questions for popular designations
Top trending discussions
I applied via Company Website and was interviewed before Feb 2020. There was 1 interview round.
I applied via Walk-in and was interviewed before Sep 2019. There were 5 interview rounds.
I applied via Campus Placement and was interviewed in Oct 2020. There were 4 interview rounds.
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Start from the first element and compare it with the next element
If the next element is smaller, swap them
Repeat this process for all elements in the array
Continue this process until no more swaps are needed
A program to print all prime numbers
Take input from user for range of numbers
Loop through the range and check if each number is prime
Print the prime numbers
Hashmap is a data structure that stores key-value pairs and allows constant time access to values based on their keys.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when multiple keys map to the same index, which can be resolved using techniques like chaining or open addressing.
Examples of hashmap implementations include Java's HashMap class and Python's dict type.
Inheritance is a mechanism in object-oriented programming where a new class is created by inheriting properties of an existing class.
Inheritance allows code reuse and promotes code organization.
The existing class is called the parent or superclass, and the new class is called the child or subclass.
The child class inherits all the properties and methods of the parent class and can also add new properties and methods.
For...
based on 2 interviews
Interview experience
based on 96 reviews
Rating in categories
Verification Analyst
29
salaries
| ₹0 L/yr - ₹0 L/yr |
Client Coordinator
19
salaries
| ₹0 L/yr - ₹0 L/yr |
Quality Analyst
16
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Associate
11
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Verification Analyst
9
salaries
| ₹0 L/yr - ₹0 L/yr |
KPMG India
First Advantage
AuthBridge Research Services
HireRight