Filter interviews by
I have handled high and critical alerts related to malware infections, data breaches, and phishing attacks.
Identifying the source and scope of the alert
Isolating affected systems to prevent further damage
Implementing security patches and updates
Conducting forensic analysis to determine the extent of the breach
Collaborating with IT teams to strengthen security measures
SIEM tool architecture includes data collection, normalization, correlation, and reporting components.
Data collection: Gathers security data from various sources like logs, network traffic, and endpoints.
Normalization: Standardizes the collected data into a common format for analysis.
Correlation: Identifies patterns and relationships in the data to detect security incidents.
Reporting: Generates reports and alerts ...
The last function I wrote calculates the factorial of a given number using recursion.
Uses a recursive approach to calculate factorial.
Base case: factorial(0) = 1.
Example: factorial(5) = 5 * factorial(4) = 120.
Handles positive integers only.
Implementing multilevel collections with bulk collect and record limiting for efficient data handling and error management.
Multilevel collections allow for hierarchical data organization, e.g., a collection of departments, each containing employees.
Bulk collect improves performance by fetching multiple records in a single operation, reducing context switches.
Record limiting can be applied to restrict the number of...
I review codes by conducting code reviews, using tools for static code analysis, and ensuring adherence to coding standards.
Conduct regular code reviews with team members to identify bugs, improve code quality, and share knowledge
Utilize tools like SonarQube or Checkmarx for static code analysis to identify potential issues
Ensure that coding standards and best practices are followed in the codebase
Provide construc...
Balancing loads involves prioritizing tasks, assigning resources efficiently, and adjusting schedules as needed.
Prioritize tasks based on deadlines and importance
Assign resources based on skill sets and availability
Adjust schedules to accommodate changes in workload
Use project management tools to track progress and allocate resources effectively
Efficient communication between modules can be achieved through clear documentation, regular meetings, use of communication tools, and establishing a communication plan.
Create clear documentation outlining the interfaces and dependencies between modules
Hold regular meetings to discuss progress, issues, and updates on each module
Utilize communication tools such as project management software, messaging apps, and em...
Encapsulation, Inheritance, Polymorphism, Abstraction
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Class in OOP
Inheritance: Ability of a class to inherit properties and behavior from another class. Example: Parent class and child class relationship
Polymorphism: Ability to present the same interface for different data types. Example: Method overloading and method ove...
Abstract class is a class that can have both abstract and non-abstract methods, while interface is a contract that defines methods that a class must implement.
Abstract class can have constructors, fields, and methods, while interface can only have abstract methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Abstract classes are used when some common functionality needs to...
DI stands for Dependency Injection and IOC stands for Inversion of Control.
DI is a design pattern where the dependencies of a class are injected from the outside rather than created within the class itself.
IOC is a design principle where the control of object creation and flow is inverted from the class to an external entity.
DI helps in making classes more modular, testable, and flexible.
IOC helps in decoupling co...
I applied via Referral and was interviewed in Jun 2024. There were 3 interview rounds.
I have handled high and critical alerts related to malware infections, data breaches, and phishing attacks.
Identifying the source and scope of the alert
Isolating affected systems to prevent further damage
Implementing security patches and updates
Conducting forensic analysis to determine the extent of the breach
Collaborating with IT teams to strengthen security measures
SIEM tool architecture includes data collection, normalization, correlation, and reporting components.
Data collection: Gathers security data from various sources like logs, network traffic, and endpoints.
Normalization: Standardizes the collected data into a common format for analysis.
Correlation: Identifies patterns and relationships in the data to detect security incidents.
Reporting: Generates reports and alerts based...
I applied via Approached by Company and was interviewed in May 2024. There were 4 interview rounds.
Basic array and vectors DSA questions
The last function I wrote calculates the factorial of a given number using recursion.
Uses a recursive approach to calculate factorial.
Base case: factorial(0) = 1.
Example: factorial(5) = 5 * factorial(4) = 120.
Handles positive integers only.
I applied via Approached by Company and was interviewed in Jan 2024. There were 4 interview rounds.
Yes, I am willing to work on older technology stacks if needed.
I believe in being adaptable and open to learning new technologies.
Working on older technology stacks can provide valuable experience and insights.
It is important to understand the context and requirements before making a decision.
Examples: Java Servlets, JSP, Struts, Hibernate, etc.
I attended XYZ College.
Attended XYZ College for my undergraduate degree.
Studied computer science and gained a strong foundation in Java programming.
Participated in various coding competitions and hackathons organized by the college.
Collaborated with fellow students on group projects to develop fullstack Java applications.
NO
No, I do not have bank statements with me.
Bank statements are confidential documents and should not be shared during an interview.
If required, I can provide proof of employment or salary through other means.
I applied via Recruitment Consulltant and was interviewed in Feb 2024. There were 2 interview rounds.
Performance tuning in PL/SQL can be enhanced using hints to optimize query execution plans.
Use the 'INDEX' hint to force the optimizer to use a specific index: SELECT /*+ INDEX(emp emp_idx) */ * FROM emp;
The 'FULL' hint can be used to force a full table scan: SELECT /*+ FULL(emp) */ * FROM emp;
Use 'LEADING' hint to specify the join order: SELECT /*+ LEADING(emp dept) */ * FROM emp, dept WHERE emp.dept_id = dept.id;
The ...
I applied via Recruitment Consulltant and was interviewed before May 2023. There were 2 interview rounds.
I review codes by conducting code reviews, using tools for static code analysis, and ensuring adherence to coding standards.
Conduct regular code reviews with team members to identify bugs, improve code quality, and share knowledge
Utilize tools like SonarQube or Checkmarx for static code analysis to identify potential issues
Ensure that coding standards and best practices are followed in the codebase
Provide constructive ...
Efficient communication between modules can be achieved through clear documentation, regular meetings, use of communication tools, and establishing a communication plan.
Create clear documentation outlining the interfaces and dependencies between modules
Hold regular meetings to discuss progress, issues, and updates on each module
Utilize communication tools such as project management software, messaging apps, and email f...
Balancing loads involves prioritizing tasks, assigning resources efficiently, and adjusting schedules as needed.
Prioritize tasks based on deadlines and importance
Assign resources based on skill sets and availability
Adjust schedules to accommodate changes in workload
Use project management tools to track progress and allocate resources effectively
I applied via Recruitment Consulltant and was interviewed in Mar 2023. There were 3 interview rounds.
I applied via Approached by Company and was interviewed before Jun 2023. There were 5 interview rounds.
Some basic aptitube and reasoning problems were asked. Easily solvable.
They asked multiple choice questions on oracle sql and pl/sql emphasizing more on reading a code block ask output questions. These were of medium hardness.
Implementing multilevel collections with bulk collect and record limiting for efficient data handling and error management.
Multilevel collections allow for hierarchical data organization, e.g., a collection of departments, each containing employees.
Bulk collect improves performance by fetching multiple records in a single operation, reducing context switches.
Record limiting can be applied to restrict the number of reco...
DML error logging functionality allows for capturing errors during data manipulation language operations.
DML error logging can be enabled at the table level using the LOG ERRORS clause in DML statements.
It helps in identifying and resolving data issues without causing the entire transaction to fail.
Errors are logged in a separate error table, allowing the main operation to continue processing.
Example: INSERT INTO table...
Top trending discussions
Some of the top questions asked at the TSYS|Total System Services interview for experienced candidates -
The duration of TSYS|Total System Services interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 16 interview experiences
Difficulty level
Duration
based on 540 reviews
Rating in categories
Senior Software Engineer
493
salaries
| ₹18.3 L/yr - ₹32 L/yr |
Software Engineer
324
salaries
| ₹11.3 L/yr - ₹20 L/yr |
Lead Software Engineer
111
salaries
| ₹24 L/yr - ₹39 L/yr |
Software Developer
109
salaries
| ₹10 L/yr - ₹32 L/yr |
Senior Associate Software Engineer
108
salaries
| ₹14 L/yr - ₹25 L/yr |
Wells Fargo
JPMorgan Chase & Co.
HSBC Group
Citicorp