Senior Systems Engineer

filter-iconFilter interviews by

300+ Senior Systems Engineer Interview Questions and Answers

Updated 26 Feb 2025

Popular Companies

search-icon

Q1. 2. Explain COMP, COMP-2, COMP-3 and Display. What are the difference between Continue and Next Sentence? Why does SOC7 occur?

Ans.

Explanation of COMP, COMP-2, COMP-3, Display, Continue, Next Sentence, and SOC7.

  • COMP is a binary data type, COMP-2 is a packed decimal data type, COMP-3 is a packed decimal data type with sign, and Display is a character data type.

  • Continue is used to transfer control to the next statement within the same paragraph, while Next Sentence is used to transfer control to the first statement of the next paragraph.

  • SOC7 occurs due to a data exception error, such as an invalid numeric ...read more

Q2. LRU Cache Design Question

Design a data structure for a Least Recently Used (LRU) cache that supports the following operations:

1. get(key) - Return the value of the key if it exists in the cache; otherwise, re...read more

Ans.

Design a Least Recently Used (LRU) cache data structure that supports get and put operations with capacity constraint.

  • Implement a doubly linked list to keep track of the order of keys based on their recent usage.

  • Use a hashmap to store key-value pairs for quick access.

  • When capacity is reached, evict the least recently used item before inserting a new item.

  • Update the order of keys in the linked list whenever a key is accessed or inserted.

Frequently asked in,

Senior Systems Engineer Interview Questions and Answers for Freshers

illustration image

Q3. 1. Explain COND parameter in JCL. What parameters can be coded both in JOB level as well as STEP level. What are GDG and how to access previous version, next version and current version in any given job.

Ans.

COND parameter in JCL, parameters in JOB and STEP level, accessing GDG versions in a job.

  • COND parameter is used to specify a condition code that must be satisfied for the job or step to execute.

  • Parameters like TIME, REGION, MSGCLASS, etc. can be coded in both JOB and STEP level.

  • GDG (Generation Data Group) is a group of datasets related to each other by a common name and a generation number.

  • To access previous version, use (-1), next version use (+1), and current version use (0...read more

Q4. Nth Prime Number Problem Statement

Find the Nth prime number given a number N.

Explanation:

A prime number is greater than 1 and is not the product of two smaller natural numbers. A prime number has exactly two...read more

Ans.

To find the Nth prime number given a number N, implement a function that returns the Nth prime number.

  • Create a function that takes N as input and returns the Nth prime number.

  • Use a loop to iterate through numbers and check if they are prime.

  • Keep track of the count of prime numbers found until reaching N.

  • Optimize the algorithm by checking only up to the square root of the number for primality.

  • Example: For N = 7, the 7th prime number is 17.

Are these interview questions helpful?

Q5. What is Data Dictionary, an explanation about all the elements of DDIC?

Ans.

A Data Dictionary is a centralized repository that provides a detailed description of all data elements used in a system.

  • A Data Dictionary contains information about the structure, meaning, and usage of data elements.

  • It helps in maintaining data integrity and consistency across the system.

  • Data Dictionary entries typically include data element names, descriptions, data types, lengths, and validation rules.

  • It serves as a reference for developers, analysts, and users to understa...read more

Q6. 1. Use of Apache Spark - Dataframe, Datasets and RDD. 2. Transformations and Actions in Spark. 3. Optimization in Spark 4. HIVE - Dynamic and Static Partitioning. 5. HIVE - Partitioning and Bucketing. 6. SQL -...

read more
Ans.

Questions related to Apache Spark, HIVE, and SQL.

  • Apache Spark is a distributed computing framework used for big data processing.

  • Dataframe, Datasets, and RDD are the core abstractions in Spark.

  • Transformations and Actions are the two types of operations in Spark.

  • Optimization techniques like caching, partitioning, and broadcasting can improve Spark performance.

  • HIVE is a data warehousing tool that uses SQL-like syntax to query data stored in Hadoop.

  • Dynamic and Static Partitioning...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. 3. How to fetch more than one record from DB from COBOL? Explain the precompilation process. Why is bind necessary? SQL error code for duplicate record present in table?

Ans.

Fetching multiple records from DB in COBOL and precompilation process

  • Use SELECT statement with appropriate WHERE clause

  • Use cursor to fetch multiple records

  • Precompilation process involves converting COBOL code to C code

  • Bind is necessary to link the precompiled C code with DB

  • SQL error code for duplicate record present in table is -803

Q8. Explain threading and how to implement multithreading

Ans.

Threading is a technique to execute multiple tasks concurrently. Multithreading can be implemented using threads.

  • Threading allows multiple tasks to run concurrently, improving performance and responsiveness.

  • Threads are lightweight processes that share the same memory space.

  • Threads can be created using programming languages like Java, C++, or Python.

  • Multithreading can be implemented by creating and managing multiple threads within a program.

  • Thread synchronization techniques li...read more

Senior Systems Engineer Jobs

Senior systems engineer 5-6 years
Siemens Healthcare
4.3
Bangalore / Bengaluru
Senior Engineer Systems Engineering 4-6 years
Verizon Data Services India Pvt.Ltd
4.1
Hyderabad / Secunderabad
Senior Systems Engineer 8-12 years
TE Connectivity India Private Limited
4.1
Bangalore / Bengaluru

Q9. What is the difference between Index and subscript?

Ans.

Index and subscript are used to access elements in an array or list, but index refers to the position while subscript refers to the value.

  • Index is the position of an element in an array or list, starting from 0.

  • Subscript is the value used to access an element in an array or list.

  • For example, in the array [1, 2, 3], the index of 2 is 1 and the subscript of 2 is 2.

  • Index is an integer while subscript can be any data type that can be used as an index.

  • Index is used in programming ...read more

Q10. Suppose a part of code is on PRD, what is the first thing u need to check from DEV if there any other changes done in between.

Ans.

Check the version control system for any changes made to the code in DEV.

  • Check the commit history in the version control system.

  • Compare the code in PRD with the latest version in DEV.

  • Ensure that any changes made in DEV are properly tested and approved before deploying to PRD.

Q11. What is the ISP? Which ISP you use? Give some ISP name?

Ans.

ISP stands for Internet Service Provider. It is a company that provides internet access to customers.

  • Some popular ISPs are Comcast, AT&T, Verizon, and Spectrum.

  • ISPs offer different types of internet connections such as DSL, cable, and fiber optic.

  • ISPs may also offer additional services such as email, web hosting, and virtual private networks (VPNs).

Q12. What is EMC networker backup software? explain and type.

Ans.

EMC Networker is a backup software solution used for data protection and recovery in enterprise environments.

  • EMC Networker is a backup software developed by EMC Corporation.

  • It is used for backing up, archiving, and recovering data in enterprise environments.

  • Networker supports a wide range of operating systems, applications, and storage devices.

  • It provides features like data deduplication, encryption, and centralized management.

  • Networker allows for backup to disk, tape, and cl...read more

Q13. What is the difference between an abstract class and an interface in OOP?
Ans.

Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.

  • Abstract class can have constructors, fields, and methods, while interface cannot.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Abstract classes are used to define a common base class for related classes, while interfaces define a contract for classes to implement.

  • Example: Abstract class 'Animal' with abstract method 'eat' and...read more

Q14. Unix commands to copy the directory and delete contents of the directory

Ans.

The Unix command to copy a directory is 'cp -r' and to delete the contents of a directory is 'rm -r'.

  • To copy a directory, use the 'cp -r' command followed by the source directory and destination directory.

  • To delete the contents of a directory, use the 'rm -r' command followed by the directory name.

  • Be cautious when using the 'rm -r' command as it permanently deletes the contents of the directory.

Q15. What will you check if your computer dont connect with intranet or internet?

Ans.

I will check network connectivity, DNS settings, firewall, and proxy settings.

  • Check if other devices are able to connect to the network

  • Check if the network cable is properly connected

  • Check if the DNS settings are correct

  • Check if the firewall is blocking the connection

  • Check if the proxy settings are configured correctly

Q16. What is the reason of blacklist vehicle.what is new in ICD 2.5,cross tag cound,duplicated count,boom barrier connection,AVC related questions everything about your corrent organization system.

Ans.

Blacklisting vehicles is done for security reasons. ICD 2.5 introduces new features like cross tag count and boom barrier connection.

  • Blacklisting vehicles is done to prevent security threats.

  • ICD 2.5 has new features like cross tag count and boom barrier connection.

  • Duplicated count helps in identifying duplicate tags.

  • AVC related questions are related to Automatic Vehicle Classification.

  • Our current organization system focuses on enhancing security measures.

Q17. What is a thread scheduler and how does time slicing work?
Ans.

A thread scheduler is responsible for managing the execution of multiple threads in a system. Time slicing is a technique used by the scheduler to allocate CPU time to each thread.

  • Thread scheduler is a component of the operating system that decides which thread to run next

  • Time slicing involves dividing the CPU time among multiple threads based on a predefined time interval

  • Example: In a round-robin scheduling algorithm, each thread is given a time slice to execute before movin...read more

Q18. Which methodology I have worked on like Agile or Waterfall or both?

Ans.

I have worked on both Agile and Waterfall methodologies.

  • I have experience in Agile methodologies such as Scrum and Kanban.

  • I have also worked on Waterfall methodology in projects that require a more structured approach.

  • I understand the strengths and weaknesses of both methodologies and can adapt to the project's needs.

  • For example, I used Agile methodology in a project that required frequent changes and iterations, while I used Waterfall methodology in a project that had a clea...read more

Q19. How to build different environments in Aws using Terraform?

Ans.

To build different environments in AWS using Terraform, follow these steps:

  • Create a Terraform configuration file for each environment

  • Define the resources needed for each environment in the configuration file

  • Use Terraform commands to initialize, plan, and apply the configuration for each environment

  • Use variables to customize each environment

  • Use modules to reuse code across environments

Q20. What are the start() and run() methods of the Thread class?
Ans.

The start() method is used to start a new thread, while the run() method contains the code that will be executed by the thread.

  • start() method is used to start a new thread and calls the run() method.

  • run() method contains the code that will be executed by the thread.

  • Calling run() directly will not create a new thread, it will just execute the code in the current thread.

Q21. What is Client independent and client dependant? Describe some tables.

Ans.

Client independent and client dependent are two types of tables in a database.

  • Client independent tables contain data that is not specific to any particular client or user.

  • Client dependent tables contain data that is specific to a particular client or user.

  • Examples of client independent tables include product catalogs, while examples of client dependent tables include user profiles.

  • Client dependent tables often have a foreign key relationship with client independent tables.

Q22. Which is the latest OS today? Which is the latest application for office tools today?

Ans.

The latest OS is Windows 11. The latest application for office tools is Microsoft Office 2021.

  • The latest OS released by Microsoft is Windows 11.

  • Windows 11 was released on October 5, 2021.

  • The latest application for office tools is Microsoft Office 2021.

  • Microsoft Office 2021 was released on October 5, 2021.

  • Microsoft Office 2021 includes updated versions of Word, Excel, PowerPoint, and Outlook.

Q23. How do you monitor your application and what are the configurations?

Ans.

Application monitoring is done through various tools and configurations.

  • We use tools like Nagios, Zabbix, and Prometheus for monitoring.

  • We configure alerts for critical events and set up dashboards for easy visualization.

  • We also use log aggregation tools like ELK stack to monitor application logs.

  • We monitor system resources like CPU, memory, and disk usage.

  • We perform load testing to identify performance bottlenecks.

  • We use APM tools like New Relic and AppDynamics to monitor ap...read more

Q24. What is Unit testing. Which unit testing you have used?

Ans.

Unit testing is a software testing technique where individual units or components of a software application are tested in isolation.

  • Unit testing is done to ensure that each unit/component of the software application is working as expected.

  • It helps in identifying and fixing bugs early in the development cycle.

  • Unit tests are automated and can be run frequently to ensure that changes made to the code do not break existing functionality.

  • Examples of unit testing frameworks include...read more

Q25. How monotholic applications are broken down to microservices

Ans.

Monolithic applications can be broken down to microservices by identifying cohesive and loosely coupled components and separating them into independent services.

  • Identify the business capabilities of the application

  • Identify the cohesive and loosely coupled components

  • Separate the components into independent services

  • Define the interfaces between the services

  • Implement the services using appropriate technology stack

  • Deploy the services in a scalable and fault-tolerant manner

Q26. What is Proxy Server , How do u troubleshoot out look issue , what is firewalls , What is VMware , etc

Ans.

Proxy server, Outlook troubleshooting, firewalls, and VMware are all important components of modern IT infrastructure.

  • A proxy server acts as an intermediary between clients and servers, providing security and performance benefits.

  • Outlook issues can be caused by a variety of factors, including network connectivity problems, incorrect settings, and corrupted data files.

  • Firewalls are network security devices that monitor and control incoming and outgoing traffic based on predefi...read more

Q27. What is the difference between where and having clause?

Ans.

Where clause filters rows before grouping, having clause filters groups after grouping.

  • Where clause is used in the SELECT statement to filter rows based on a condition.

  • Having clause is used in the GROUP BY statement to filter groups based on a condition.

  • Where clause is used before grouping, having clause is used after grouping.

  • Where clause filters individual rows, having clause filters groups of rows.

  • Example: SELECT name, SUM(sales) FROM table WHERE sales > 1000 GROUP BY name...read more

Q28. Can you explain the SOLID principles in Object-Oriented Design?
Ans.

SOLID principles are a set of five design principles in object-oriented programming to make software more maintainable, flexible, and scalable.

  • Single Responsibility Principle (SRP) - A class should have only one reason to change.

  • Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.

  • Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affecting the program's...read more

Q29. If a Mac book is running slow how would you troubleshoot that. And A windows machine is not responding.

Ans.

To troubleshoot a slow Mac book, check for resource-intensive processes, clear cache and temporary files, and optimize startup items. For an unresponsive Windows machine, try restarting, checking for hardware issues, and running system diagnostics.

  • Check for resource-intensive processes and close unnecessary applications

  • Clear cache and temporary files to free up disk space

  • Optimize startup items by disabling unnecessary programs

  • Restart the Windows machine to resolve temporary i...read more

Q30. Oops from c#, Asp.net page cycle events, difference between abstract class and interface, collections, difference between constant, read-only, what's instance variables, Solid principles, extension method, diff...

read more
Ans.

Interview question for Senior Systems Engineer

  • Oops concepts in C#

  • ASP.NET page cycle events

  • Difference between abstract class and interface

  • Collections in C#

  • Difference between constant and read-only variables

  • Instance variables in C#

  • SOLID principles

  • Extension methods in C#

  • Difference between Hyperlink and LinkButton controls in ASP.NET

  • GridView events in ASP.NET

  • General questions in ADO.NET

  • Project details

Q31. What is a BlockingQueue in the context of multithreading?
Ans.

BlockingQueue is a thread-safe queue that supports operations that wait for the queue to become non-empty when retrieving an element.

  • BlockingQueue is part of the java.util.concurrent package in Java.

  • It is used to implement producer-consumer scenarios in multithreaded applications.

  • Operations like put() and take() are blocking, meaning they will wait until the queue is in a valid state to perform the operation.

  • Example: LinkedBlockingQueue, ArrayBlockingQueue.

Q32. We have three location how would you coordinate and fix issue.

Ans.

To coordinate and fix issues across three locations, establish clear communication channels, prioritize tasks, and leverage remote access tools.

  • Establish clear communication channels to ensure effective coordination

  • Prioritize tasks based on urgency and impact on business operations

  • Utilize remote access tools to diagnose and fix issues remotely

  • Assign dedicated resources to each location for faster resolution

  • Regularly communicate updates and progress to stakeholders

Q33. What is the difference between MS 365 MS Office 2016?

Ans.

MS 365 is a cloud-based subscription service while MS Office 2016 is a one-time purchase software.

  • MS 365 includes cloud-based services such as OneDrive, SharePoint, and Teams

  • MS Office 2016 is a standalone software with no cloud-based services

  • MS 365 offers regular updates and new features while MS Office 2016 does not

  • MS 365 requires a monthly or yearly subscription fee while MS Office 2016 is a one-time purchase

  • MS 365 allows access to the latest versions of Office applications...read more

Q34. How Kubernetes runs applications and expose to outside world

Ans.

Kubernetes runs applications in containers and exposes them through services and ingress controllers.

  • Kubernetes uses containers to package and run applications.

  • Services provide a stable IP address and DNS name for accessing the application.

  • Ingress controllers route traffic from outside the cluster to the appropriate service.

  • Kubernetes also supports load balancing, scaling, and rolling updates for applications.

  • Examples of Kubernetes tools for managing applications include kube...read more

Q35. One simple use case and how you implement write program sudo code

Ans.

Implementing a program using sudo code for a simple use case

  • Identify the problem statement and requirements

  • Design the solution and choose the appropriate programming language

  • Write the sudo code using proper syntax and logic

  • Test and debug the program before implementation

Q36. How to resolve dot matrix printer ribbon not rotate issue

Ans.

To resolve the dot matrix printer ribbon not rotate issue, check for mechanical issues, ensure proper installation, clean the printer, and replace the ribbon if necessary.

  • Check for any mechanical issues such as jammed or misaligned parts

  • Ensure that the ribbon is properly installed and aligned with the printer

  • Clean the printer, including the ribbon cartridge and print head, to remove any dirt or debris that may be causing the issue

  • If the ribbon is worn out or damaged, replace ...read more

Q37. Terraform state files and where are they stored?

Ans.

Terraform state files store the current state of infrastructure managed by Terraform.

  • State files are JSON files that contain information about the resources being managed by Terraform.

  • They are stored locally by default, but can also be stored remotely in a backend like S3 or Consul.

  • State files should be treated as sensitive information and stored securely.

  • Terraform uses state files to plan and apply changes to infrastructure.

  • State files can be manually edited, but this is not...read more

Q38. What are different security patterns that can be implemented on soap and rest services?

Ans.

Security patterns for SOAP and REST services

  • Use HTTPS for secure communication

  • Implement authentication and authorization mechanisms

  • Use message encryption and decryption

  • Implement input validation and output encoding

  • Use rate limiting to prevent DoS attacks

  • Implement logging and monitoring for security incidents

  • Use OAuth for secure API access

  • Implement CORS to restrict access from unauthorized domains

Q39. When will you use stringbuilder and stringbuffer?

Ans.

Stringbuilder and Stringbuffer are used to manipulate strings efficiently.

  • Use Stringbuilder when you need to modify a string frequently.

  • Use Stringbuffer when you need thread safety.

  • Both classes provide methods for appending, inserting, and deleting characters.

  • Example: Building a long string in a loop.

  • Example: Concatenating multiple strings.

Q40. What is DHCP and how many type of DHCP and please explain how to work DHCP DORA Process ?

Ans.

DHCP is a network protocol that assigns IP addresses to devices on a network. There are two types of DHCP: DHCPv4 and DHCPv6.

  • DHCP stands for Dynamic Host Configuration Protocol.

  • DHCPv4 is used for assigning IPv4 addresses, while DHCPv6 is used for assigning IPv6 addresses.

  • DHCP DORA process stands for Discover, Offer, Request, Acknowledge.

  • Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.

  • Offer: DHCP server responds with a DHCP Offer message cont...read more

Q41. What is OU and how to configure and Please Explain ADC ?

Ans.

OU stands for Organizational Unit, used to organize objects within a domain. ADC stands for Active Directory Connector, used to synchronize data between on-premises AD and Azure AD.

  • OU is a container within a domain used to organize objects like users, groups, and computers.

  • OU helps in delegating administrative tasks and applying Group Policies.

  • Example: Sales department can have its own OU with specific users and policies.

  • ADC is used to synchronize on-premises Active Directory...read more

Q42. Which application you are using to connect servers?

Ans.

I primarily use SSH (Secure Shell) to connect servers.

  • SSH (Secure Shell) is a widely used application for securely connecting to servers

  • Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections

Q43. What are evalution metrics for classification

Ans.

Evaluation metrics for classification include accuracy, precision, recall, F1 score, and ROC curve.

  • Accuracy measures overall correctness of the model

  • Precision measures how many of the predicted positive cases are actually positive

  • Recall measures how many of the actual positive cases are correctly predicted

  • F1 score is the harmonic mean of precision and recall

  • ROC curve plots true positive rate against false positive rate

  • Examples: confusion matrix, AUC score

Q44. How do you analyze any bug on the process of production¿

Ans.

To analyze a bug in production, I follow a systematic approach that involves identifying, reproducing, isolating, and resolving the issue.

  • Identify the symptoms of the bug and gather relevant data such as logs, error messages, and user reports.

  • Reproduce the bug in a controlled environment to understand its root cause.

  • Isolate the bug by narrowing down the scope of the issue and ruling out other potential causes.

  • Resolve the bug by implementing a fix and testing it thoroughly to ...read more

Q45. What makes a HashSet different from a TreeSet?
Ans.

HashSet uses a hash table for storage, while TreeSet uses a red-black tree.

  • HashSet provides constant-time performance for basic operations like add, remove, contains.

  • TreeSet maintains elements in sorted order, allowing for efficient operations like range queries.

  • HashSet does not guarantee any specific order of elements, while TreeSet maintains a sorted order.

  • Example: HashSet<String> set = new HashSet<>(); TreeSet<Integer> treeSet = new TreeSet<>();

Q46. How you manage if future company is far away (60 km)??

Ans.

I would manage by planning my commute and utilizing remote work options.

  • I would plan my commute to ensure I arrive on time and avoid traffic

  • I would explore remote work options to reduce the frequency of my commute

  • I would stay organized and communicate effectively with my team to ensure productivity

  • I would consider relocating closer to the company if it becomes necessary

Q47. Which Object is challenging for you to develop?

Ans.

Developing complex algorithms for machine learning models is challenging for me.

  • Creating models that can accurately predict outcomes

  • Balancing accuracy with computational efficiency

  • Ensuring the model is not overfitting or underfitting

  • Examples: image recognition, natural language processing

Q48. How to select the duplicate values in sql

Ans.

To select duplicate values in SQL, use the GROUP BY clause and HAVING clause.

  • Use GROUP BY clause to group the data by the column that may have duplicates

  • Use HAVING clause to filter the groups that have more than one row

  • Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name HAVING COUNT(*) > 1;

Q49. What is FM, what is BAPI, Difference between BAPI and BDC.

Ans.

FM stands for Function Module, BAPI stands for Business Application Programming Interface. BAPI is a type of FM. BAPI is used for data transfer between SAP systems, BDC is used for data transfer between SAP and non-SAP systems.

  • FM stands for Function Module in SAP, which is a reusable function or subroutine that can be called by other programs.

  • BAPI stands for Business Application Programming Interface, which is a type of Function Module used for data transfer between SAP syste...read more

Q50. What is APIPA and how to work and what is APIPA Range.

Ans.

APIPA stands for Automatic Private IP Addressing, a feature in Windows that automatically assigns IP addresses to computers when DHCP server is not available.

  • APIPA is a feature in Windows operating systems that automatically assigns IP addresses in the range of 169.254.0.1 to 169.254.255.254 when a DHCP server is not available.

  • It is commonly used in small home or office networks where a DHCP server is not present.

  • APIPA helps devices on the network to communicate with each oth...read more

1
2
3
4
5
6
7
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10.4k Interviews
3.6
 • 7.5k Interviews
3.7
 • 5.6k Interviews
3.8
 • 5.6k Interviews
3.5
 • 3.8k Interviews
3.8
 • 2.9k Interviews
4.0
 • 2.3k Interviews
4.0
 • 480 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Recently Viewed
JOBS
Browse jobs
Discover jobs you love
JOBS
Browse jobs
Discover jobs you love
INTERVIEWS
Infosys
No Interviews
SALARIES
Ernst & Young
DESIGNATION
DESIGNATION
DESIGNATION
SALARIES
KPMG India
LIST OF COMPANIES
Discover companies
Find best workplace
DESIGNATION
Senior Systems Engineer Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter