i
Voya
India
Work with us
Filter interviews by
Identity and Access Management (IAM) ensures the right individuals access the right resources at the right times for the right reasons.
IAM involves user identity verification and management, ensuring secure access to systems.
Examples include Single Sign-On (SSO) systems like Okta or Microsoft Azure AD.
IAM policies define user roles and permissions, controlling access to sensitive data.
Multi-Factor Authentication (...
The Identity Lifecycle encompasses the stages of managing user identities from creation to deletion.
1. Identity Creation: The process of registering a new user, e.g., signing up on a website.
2. Identity Management: Ongoing management of user attributes and permissions, e.g., updating profile information.
3. Identity Authentication: Verifying user identity through methods like passwords or biometrics, e.g., logging ...
Authentication verifies identity; authorization determines access rights.
Authentication is the process of verifying who a user is.
Authorization is the process of verifying what a user has access to.
Example of authentication: Logging in with a username and password.
Example of authorization: A user with admin rights can access all files, while a regular user cannot.
Authentication can occur without authorization, but...
An identity is a set of characteristics that define an individual or entity, distinguishing them from others.
Identity can refer to personal attributes like name, age, and gender.
In digital contexts, identity often relates to user accounts and authentication.
Examples include social media profiles, email addresses, and government IDs.
In philosophy, identity explores concepts of self and existence.
RBAC is a security model that restricts system access based on user roles, enhancing security and simplifying management.
Role Assignment: Users are assigned roles that define their permissions, such as 'Admin', 'Editor', or 'Viewer'.
Permission Management: Each role has specific permissions, like 'create', 'read', 'update', or 'delete' for resources.
Separation of Duties: RBAC helps enforce separation of duties by e...
I led a team to develop a web application for a client, from initial requirements gathering to deployment and maintenance.
Gathered requirements from client and stakeholders
Designed architecture and database schema
Implemented front-end using React and back-end using Node.js
Tested application for functionality and performance
Deployed application on AWS and monitored for issues
Provided ongoing maintenance and support...
Rollovers refer to the process of transferring funds from one retirement account to another without incurring tax penalties.
Rollovers are commonly done when changing jobs or consolidating retirement accounts.
There are different types of rollovers, such as direct rollovers and indirect rollovers.
Rollovers must be completed within a certain time frame to avoid tax consequences.
Example: Rolling over funds from a 401(...
Handling missing data involves identifying missing values, deciding on a strategy, and implementing it.
Identify missing data using summary statistics or visualization techniques.
Decide on a strategy: imputation, deletion, or modeling.
Imputation: replace missing values with mean, median, mode, or regression predictions.
Deletion: remove rows or columns with missing values.
Modeling: treat missingness as a separate ca...
Use dimensionality reduction techniques like PCA or t-SNE to reduce the number of features and plot the scatter plot.
Apply Principal Component Analysis (PCA) to reduce the dimensionality of the data
Use t-Distributed Stochastic Neighbor Embedding (t-SNE) for non-linear dimensionality reduction
Plot the scatter plot using the reduced feature set
The time complexity of KNN algorithm is O(n log n) for training and O(kn) for testing.
The time complexity for training the KNN algorithm is O(n log n), where n is the number of training samples.
The time complexity for testing the KNN algorithm is O(kn), where k is the number of nearest neighbors to consider and n is the number of training samples.
The time complexity can be further optimized using data structures l...
I appeared for an interview in Apr 2025, where I was asked the following questions.
Effectively managing poor employee performance involves clear communication, support, and structured feedback mechanisms.
Establish clear performance expectations: Define specific goals and metrics for employees to understand what is expected of them.
Provide regular feedback: Schedule consistent one-on-one meetings to discuss performance, allowing for timely adjustments and support.
Identify root causes: Investigate unde...
Led a team through a critical project deadline while managing interpersonal conflicts and resource constraints.
Identified the root cause of conflicts through one-on-one meetings with team members.
Implemented a daily stand-up meeting to improve communication and accountability.
Reallocated resources based on team strengths to enhance productivity.
Encouraged a collaborative environment by organizing team-building activiti...
I appeared for an interview in Apr 2025, where I was asked the following questions.
I applied via Naukri.com and was interviewed in Jun 2024. There were 2 interview rounds.
I am a recent graduate with a degree in Business Administration and a passion for learning and growing in a professional setting.
Recent graduate with a degree in Business Administration
Passionate about learning and professional growth
Strong communication and organizational skills
Experience in internships or part-time jobs related to business
Goal-oriented and eager to contribute to a team
I am motivated to seek employment with your company because of your reputation for innovation and commitment to employee development.
I am impressed by the company's track record of success and growth.
I am excited about the opportunity to work with a team of talented professionals.
I believe that the company's values align with my own personal values and career goals.
In five years, I see myself as a skilled and experienced professional in this field, taking on more responsibilities and contributing to the growth of the organization.
Continuing to learn and grow in my role
Taking on leadership positions within the company
Contributing innovative ideas to improve processes
Building strong relationships with colleagues and clients
Possibly pursuing further education or certifications
Yes, I am satisfied with the compensation as it aligns with industry standards and my level of experience.
The compensation offered is competitive compared to similar positions in the industry.
I feel that my skills and experience are appropriately rewarded with the compensation package.
I have researched and compared the compensation with other companies in the same field.
I am content with the benefits and perks that com...
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Overfitting occurs when a model is too complex and fits the training data too closely, resulting in poor generalization to new data.
Overfitting happens when a model learns the noise in the training data instead of the underlying pattern.
It occurs when the model is too complex or has too many parameters relative to the amount of training data.
Overfitting can be identified by comparing the model's performance on the trai...
Handling missing data involves identifying missing values, deciding on a strategy, and implementing it.
Identify missing data using summary statistics or visualization techniques.
Decide on a strategy: imputation, deletion, or modeling.
Imputation: replace missing values with mean, median, mode, or regression predictions.
Deletion: remove rows or columns with missing values.
Modeling: treat missingness as a separate categor...
The time complexity of KNN algorithm is O(n log n) for training and O(kn) for testing.
The time complexity for training the KNN algorithm is O(n log n), where n is the number of training samples.
The time complexity for testing the KNN algorithm is O(kn), where k is the number of nearest neighbors to consider and n is the number of training samples.
The time complexity can be further optimized using data structures like K...
Use dimensionality reduction techniques like PCA or t-SNE to reduce the number of features and plot the scatter plot.
Apply Principal Component Analysis (PCA) to reduce the dimensionality of the data
Use t-Distributed Stochastic Neighbor Embedding (t-SNE) for non-linear dimensionality reduction
Plot the scatter plot using the reduced feature set
Yes, random forest can be used for text data with important features.
Random forest can handle both numerical and categorical features, including text data.
Text data needs to be converted into numerical features using techniques like bag-of-words or TF-IDF.
Important features can be identified using feature importance scores provided by random forest.
Examples: Classifying emails as spam or not spam, sentiment analysis of...
I appeared for an interview in Oct 2024, where I was asked the following questions.
Identity and Access Management (IAM) ensures the right individuals access the right resources at the right times for the right reasons.
IAM involves user identity verification and management, ensuring secure access to systems.
Examples include Single Sign-On (SSO) systems like Okta or Microsoft Azure AD.
IAM policies define user roles and permissions, controlling access to sensitive data.
Multi-Factor Authentication (MFA) ...
Authentication verifies identity; authorization determines access rights.
Authentication is the process of verifying who a user is.
Authorization is the process of verifying what a user has access to.
Example of authentication: Logging in with a username and password.
Example of authorization: A user with admin rights can access all files, while a regular user cannot.
Authentication can occur without authorization, but auth...
RBAC is a security model that restricts system access based on user roles, enhancing security and simplifying management.
Role Assignment: Users are assigned roles that define their permissions, such as 'Admin', 'Editor', or 'Viewer'.
Permission Management: Each role has specific permissions, like 'create', 'read', 'update', or 'delete' for resources.
Separation of Duties: RBAC helps enforce separation of duties by ensuri...
An identity is a set of characteristics that define an individual or entity, distinguishing them from others.
Identity can refer to personal attributes like name, age, and gender.
In digital contexts, identity often relates to user accounts and authentication.
Examples include social media profiles, email addresses, and government IDs.
In philosophy, identity explores concepts of self and existence.
The Identity Lifecycle encompasses the stages of managing user identities from creation to deletion.
1. Identity Creation: The process of registering a new user, e.g., signing up on a website.
2. Identity Management: Ongoing management of user attributes and permissions, e.g., updating profile information.
3. Identity Authentication: Verifying user identity through methods like passwords or biometrics, e.g., logging in wi...
Zero Trust, Birthright Access, and Least Privilege Access are security concepts aimed at minimizing risks in digital environments.
Zero Trust: Assumes no user or device is trustworthy by default, requiring verification for every access request.
Example: Multi-factor authentication (MFA) is often used in Zero Trust models to ensure user identity.
Birthright Access: Refers to the automatic access rights granted to users bas...
I applied via Recruitment Consulltant and was interviewed in May 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in May 2024. There were 2 interview rounds.
Rollovers refer to the process of transferring funds from one retirement account to another without incurring tax penalties.
Rollovers are commonly done when changing jobs or consolidating retirement accounts.
There are different types of rollovers, such as direct rollovers and indirect rollovers.
Rollovers must be completed within a certain time frame to avoid tax consequences.
Example: Rolling over funds from a 401(k) to...
I applied via Recruitment Consulltant
Top trending discussions
The duration of Voya India interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 37 interview experiences
Difficulty level
Duration
based on 405 reviews
Rating in categories
Bangalore / Bengaluru
5-10 Yrs
Not Disclosed
Senior Associate
326
salaries
| ₹4 L/yr - ₹9 L/yr |
Associate Lead
208
salaries
| ₹5.9 L/yr - ₹12.5 L/yr |
Senior Software Engineer
204
salaries
| ₹5.8 L/yr - ₹15.9 L/yr |
Team Lead
163
salaries
| ₹13 L/yr - ₹22.1 L/yr |
Software Engineer
155
salaries
| ₹3.8 L/yr - ₹8.5 L/yr |
SBI Cards & Payment Services
Axis Direct
Kotak Securities
Aadhar Housing Finance