i
Deloitte
Filter interviews by
A PL/SQL function to validate email addresses using regex patterns.
Define a function with a VARCHAR2 parameter for the email address.
Use regular expressions to match the email format.
Return TRUE if the email matches the pattern, otherwise FALSE.
Example regex: '^[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.[A-Z|a-z]{2,}$'.
Consider edge cases like missing '@' or domain parts.
A trigger can automate data insertion in response to changes in a specified table.
Triggers are database objects that automatically execute when a specified event occurs.
To create a trigger for INSERT, DELETE, or UPDATE, use the CREATE TRIGGER statement.
Example: CREATE TRIGGER trg_after_insert AFTER INSERT ON source_table FOR EACH ROW INSERT INTO target_table (column1) VALUES (:NEW.column1);
You can define the timin...
Change management ensures smooth transitions during ERP implementation, minimizing resistance and maximizing user adoption.
Change management involves preparing, supporting, and helping individuals to make organizational changes.
Effective communication is crucial; for example, regular updates can alleviate employee concerns during ERP transitions.
Training programs are essential; hands-on workshops can help users ad...
Count the number of characters that appear more than once in a given string.
Use a dictionary to track character frequencies. Example: 'hello' -> {'h': 1, 'e': 1, 'l': 2, 'o': 1}
Iterate through the dictionary to count characters with frequency > 1. Example: From 'hello', count 'l' as repeated.
Consider case sensitivity. 'A' and 'a' are different characters.
Ignore spaces and punctuation if required. Example: 'a...
What people are saying about Deloitte
Object-Oriented Programming (OOP) is a programming paradigm based on objects and classes, emphasizing code reusability and organization.
Encapsulation: Bundling data and methods that operate on the data within one unit (e.g., a class).
Inheritance: Mechanism to create a new class using properties and methods of an existing class (e.g., a 'Dog' class inheriting from an 'Animal' class).
Polymorphism: Ability to present...
Reversing a string involves rearranging its characters in the opposite order, from last to first.
Use a loop to iterate through the string from the end to the beginning. Example: 'hello' becomes 'olleh'.
Utilize built-in functions in programming languages. Example in Python: 'hello'[::-1] results in 'olleh'.
Convert the string to a list of characters, reverse the list, and join it back. Example: list('hello')[::-1] g...
Batch Apex allows processing large volumes of records asynchronously in Salesforce, optimizing performance and resource usage.
Designed for handling large data sets, Batch Apex processes records in manageable chunks.
It consists of three main methods: start, execute, and finish.
Example: A Batch Apex job can be used to update thousands of records in a single transaction.
Batch jobs can be scheduled to run at specific ...
AI is revolutionizing customer interactions through personalization, automation, and enhanced support.
Personalized Recommendations: AI algorithms analyze customer behavior to suggest products, like Netflix recommending shows based on viewing history.
24/7 Customer Support: Chatbots provide instant responses to customer inquiries, improving satisfaction and reducing wait times.
Sentiment Analysis: AI tools analyze cu...
Linear regression models the relationship between a dependent variable and one or more independent variables using a linear equation.
The basic equation is: Y = β0 + β1X1 + β2X2 + ... + βnXn + ε.
Y is the dependent variable (target), while X1, X2, ..., Xn are independent variables (features).
β0 is the y-intercept, and β1, β2, ..., βn are the coefficients representing the impact of each feature.
ε represents the error...
Evaluate classification models using metrics like accuracy, precision, recall, F1-score, and ROC-AUC.
Accuracy: Proportion of correct predictions. E.g., 90% accuracy means 90 out of 100 predictions were correct.
Precision: True positive rate. E.g., if 80 out of 100 predicted positives are actual positives, precision is 80%.
Recall: Sensitivity or true positive rate. E.g., if 80 out of 100 actual positives are predict...
I applied via Naukri.com
I appeared for an interview in Jan 2025.
Yes, open for fixed term hire and working from client location at Gurgaon for 3 days a week.
Open for fixed term hire
Willing to work from client location at Gurgaon for 3 days a week
Implemented automated testing using Selenium WebDriver and JUnit in Agile environment
Implemented automated testing framework using Selenium WebDriver
Utilized JUnit for test case management
Worked in Agile environment to ensure continuous testing and integration
Pilot testing is done by a small group of users before the full release, while beta testing is done by a larger group of users. Automation testing can be used for regression testing, smoke testing, and performance testing.
Pilot testing involves a small group of users testing the functionality in a controlled environment.
Beta testing involves a larger group of users testing the functionality in a real-world environment.
...
Primary key uniquely identifies a record, while unique key allows only one instance of a value in a column. Query to find last id involves using ORDER BY and LIMIT.
Primary key enforces uniqueness and not null constraint on a column
Unique key enforces uniqueness but allows null values
To find row with last id, use ORDER BY id DESC LIMIT 1 in SQL query
Software Testing Life Cycle (STLC) involves planning, designing, executing, and reporting on tests. Defect Life Cycle includes identification, logging, fixing, and retesting defects.
STLC includes requirements analysis, test planning, test design, test execution, and test closure.
Defect Life Cycle involves defect identification, defect logging, defect fixing, defect retesting, and defect closure.
STLC ensures that the so...
303 status code in API means 'See Other'. PUT method is used to update data, while DELETE method is used to remove data. 3 point estimation technique in Agile is used to estimate tasks.
303 status code indicates that the resource can be found at a different URI and should be retrieved from there
PUT method is used to update an existing resource in the API
DELETE method is used to remove a resource from the API
3 point esti...
Links and labels that can be tagged to a bug in Jira
Links: related issues, documents, websites
Labels: priority, severity, type, status
Shell scripting is a way to automate tasks in Unix/Linux systems. Grep is used to search for specific patterns in text files. Href is not a standard Unix command.
Shell scripting automates tasks by writing scripts in a Unix/Linux environment
Grep command is used to search for specific patterns in text files
Example: grep 'search_pattern' file.txt
Href is not a standard Unix command, it may be a typo or a custom script
To resolve conflict with a team member, communication is key. Prioritize understanding, address the issue calmly, find common ground, and work towards a solution together.
Listen to the team member's perspective and concerns
Communicate openly and calmly about the issue
Find common ground and areas of agreement
Work together to find a solution that benefits both parties
Seek input from other team members or a mediator if ne...
Open to relocating to Bangalore, working in night shifts, long hours, and 24X7 culture. Goal is to excel in automation testing.
Yes, open to relocating to Bangalore and working from client's office
Yes, open to working in night/rotational shifts
Yes, open to working in long extendable hours or 24X7 culture
Goal is to excel in automation testing
I appeared for an interview in Jan 2025.
Code to read a CSV file into a DataFrame using PySpark
Import necessary libraries: from pyspark.sql import SparkSession
Create a Spark session: spark = SparkSession.builder.appName('example').getOrCreate()
Read CSV file into DataFrame: df = spark.read.csv('file.csv', header=True, inferSchema=True)
I approach refactoring code by breaking it down into smaller tasks, identifying areas for improvement, and testing changes incrementally.
Break down the code into smaller, manageable tasks
Identify areas for improvement such as performance, readability, and maintainability
Test changes incrementally to ensure functionality is not compromised
Optimizing pyspark code involves tuning configurations, using efficient transformations/actions, caching data, and leveraging partitioning.
Tune configurations such as adjusting memory allocation, parallelism, and executor cores.
Use efficient transformations/actions like map, filter, reduceByKey instead of groupByKey.
Cache intermediate data using persist() or cache() to avoid recomputation.
Leverage partitioning to optim...
SQL query to join employee departments with count of employees in each department
Use JOIN to combine employee and department tables
Use GROUP BY to group by department and COUNT() to get employee count
Include department name and employee count in SELECT statement
Lazy evaluation in PySpark delays the execution of transformations until an action is called.
Lazy evaluation allows PySpark to optimize the execution plan by combining multiple transformations before executing them.
Transformations in PySpark are not executed immediately, but are stored as a directed acyclic graph (DAG) until an action is triggered.
Examples of transformations in PySpark include map, filter, and reduceBy...
SQL queries can be written in PySpark code using the Spark SQL module.
Use the SparkSession object to create DataFrames from data sources.
Register the DataFrames as temporary tables using the createOrReplaceTempView method.
Write SQL queries using the sql method of the SparkSession object.
Execute the SQL queries using the DataFrame API or collect the results as a DataFrame.
Various methods include bulk insert, ETL tools, APIs, and manual entry.
Bulk insert: Loading large amounts of data at once using SQL commands like BULK INSERT.
ETL tools: Extract, Transform, Load tools like Informatica or Talend for automated data loading.
APIs: Using application programming interfaces to transfer data from external sources.
Manual entry: Manually inputting data into the database through forms or interface...
Redshift Spectrum is a feature in Amazon Redshift that allows users to run queries against data stored in Amazon S3.
Redshift Spectrum extends Redshift's querying capabilities to include data stored in S3
It allows users to query and join data across Redshift tables and S3 data lakes
Redshift Spectrum uses Redshift's SQL engine to query data directly in S3 without the need to load it into Redshift
It can be used to query s...
Different types of indexing in databases include B-tree, hash, bitmap, and full-text indexing.
B-tree indexing is commonly used for range queries and sorting data efficiently.
Hash indexing is used for quick lookups but not suitable for range queries.
Bitmap indexing is efficient for low cardinality columns with repetitive values.
Full-text indexing is used for searching text fields with natural language queries.
Experience sharing PySpark code on mobile device in Teams call
I have experience sharing my screen on a mobile device to write PySpark code during Teams calls
I have used the screen sharing feature in Teams to collaborate with team members on PySpark code
I have successfully troubleshooted code issues while sharing my screen on a mobile device
Various types of documentation are created during a project, such as design documents, technical specifications, user manuals, and test plans.
Design documents outline the architecture and functionality of the system.
Technical specifications detail the technical requirements and constraints of the project.
User manuals provide instructions on how to use the system.
Test plans outline the testing strategy and procedures to...
I ensure optimal code quality through code reviews, performance testing, and continuous learning.
Conduct code reviews with team members to identify and address any inefficiencies or errors
Utilize performance testing tools to analyze code performance and make necessary optimizations
Stay updated on best practices and new technologies through continuous learning and training sessions
Documentation for pyspark code includes code comments, README files, and API documentation.
Code comments should explain the purpose of each function, class, and major code block.
README files should provide an overview of the project, installation instructions, and usage examples.
API documentation should detail the input/output parameters, data types, and usage guidelines.
Some best practices include data governance, scalability, security, and performance optimization.
Implement data governance policies to ensure data quality and compliance.
Design for scalability to handle growing data volumes and user loads.
Prioritize security measures to protect sensitive data from breaches.
Optimize performance through indexing, query optimization, and data partitioning.
I appeared for an interview in May 2025, where I was asked the following questions.
I appeared for an interview in Dec 2024.
Experienced Senior Analyst with a background in financial analysis and data interpretation.
Over 5 years of experience in analyzing financial data and providing insights to drive business decisions
Proficient in using various analytical tools and software such as Excel, Tableau, and SQL
Strong communication skills to effectively present findings to stakeholders and senior management
Ability to work independently and in a t...
Yes, I have experience working on devops.
Implemented CI/CD pipelines using tools like Jenkins and GitLab
Automated infrastructure provisioning with tools like Terraform
Managed containerized applications with Docker and Kubernetes
Tags can be deployed in Jenkins using the Git plugin and in UCD using the version control system integration.
In Jenkins, tags can be deployed by configuring the Git plugin to fetch tags from the repository.
In UCD, tags can be deployed by integrating with the version control system and selecting the specific tag to deploy.
Tags can be used to mark specific versions of code for deployment and tracking purposes.
I will first analyze the issue, identify the root cause, implement a temporary fix if needed, and then work on a permanent solution.
Analyze the issue to understand the impact and severity
Identify the root cause by checking logs, code, and configurations
Implement a temporary fix to restore service if necessary
Work on a permanent solution to prevent future occurrences
I would communicate with the team to understand their priorities and try to find a solution that addresses both the issue and their priorities.
Communicate with the team to understand their priorities and constraints
Highlight the impact of the issue on the overall project or organization
Collaborate with team members to find a mutually beneficial solution
Escalate the issue to higher management if necessary
The .NET Framework is a software framework developed by Microsoft that provides a large library of pre-coded solutions to common programming problems.
Developed by Microsoft
Provides a large library of pre-coded solutions
Supports multiple programming languages like C#, VB.NET, F#
Used for building Windows applications, web applications, and services
C# is a programming language developed by Microsoft for building a wide range of applications on the .NET framework.
Developed by Microsoft
Used for building applications on the .NET framework
Object-oriented language
Supports modern programming features like generics, LINQ, and async/await
Similar to Java and C++
ASP.NET page life cycle is a series of events that occur when a page is requested, processed, and rendered.
Page request is received by the server
Page is initialized, controls are created and properties are set
Page is loaded with data and events are handled
Page is rendered to HTML and sent to the client
Page is unloaded and resources are released
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Encapsulation helps in hiding the internal state of an object and only exposing the necessary functionalities.
It allows for better control over the data by preventing direct access from outside the class.
Example: A class 'Car' encapsulating variables like 'model', 'year', and methods like 'startEngine()', 'accelerate()...
Duplicate values in a table can be deleted by using the DELETE statement with a subquery.
Use the DELETE statement with a subquery to remove duplicate values.
Identify the duplicate values using a SELECT statement with GROUP BY and HAVING clauses.
Ensure to keep at least one unique record for each duplicate value.
Group by is used to group rows that have the same values into summary rows, while having is used to filter groups based on a specified condition. Union combines the result sets of two or more SELECT statements, while Union All includes duplicates.
Group by is used with aggregate functions to group rows based on one or more columns.
Having is used to filter groups based on a specified condition after the group by operatio...
Use SQL query with ORDER BY and LIMIT to select last 5 records in a table
Use SELECT statement to retrieve data from the table
Use ORDER BY clause to sort the records in descending order based on a column
Use LIMIT clause to limit the number of records returned to 5
SMTP stands for Simple Mail Transfer Protocol, used for sending emails.
SMTP is a protocol used for sending emails over the internet
It works by using a series of commands between the email client and the email server
The namespace for SMTP is defined by RFC 5321
Examples of SMTP servers include Gmail's smtp.gmail.com and Outlook's smtp.live.com
I have used namespaces such as std, boost, and Eigen in my code.
std
boost
Eigen
Web API is a set of rules and protocols that allow different software applications to communicate with each other over the internet.
Web API allows different software applications to interact with each other over the internet
It defines the methods and data formats that applications can use to request and exchange information
Examples include RESTful APIs like Twitter API, Google Maps API, etc.
Web API allows for more flexibility, scalability, and ease of use compared to traditional web services.
Web API supports multiple data formats like JSON, XML, etc., making it easier to work with different clients.
Web API is more lightweight and faster compared to SOAP-based web services.
Web API allows for better security through the use of tokens and authentication mechanisms.
Web API is easier to integrate with modern w...
Securing a WEB API involves using authentication, authorization, encryption, and monitoring.
Implement authentication mechanisms such as OAuth, JWT, or API keys to verify the identity of clients accessing the API.
Use authorization to control access to different parts of the API based on roles and permissions.
Encrypt sensitive data transmitted between clients and the API using HTTPS or TLS.
Implement rate limiting, input ...
Authentication verifies the identity of a user, while authorization determines what actions they are allowed to perform.
Authentication confirms the identity of a user through credentials like passwords, biometrics, or security tokens.
Authorization controls access to resources based on the authenticated user's permissions.
Examples include logging into a website with a username and password (authentication) and then acce...
JSON is lightweight, easy to read, and primarily used for web APIs. XML is more verbose, structured, and commonly used for data storage and configuration.
JSON stands for JavaScript Object Notation, while XML stands for eXtensible Markup Language.
JSON is more lightweight and easier to read compared to XML.
JSON is commonly used for web APIs, while XML is often used for data storage and configuration files.
JSON uses key-v...
Filters in MVC are used to perform logic before or after an action method is executed.
Filters can be used for authorization, logging, caching, error handling, etc.
They can be applied globally, at controller level, or at action level.
Examples include Authorize filter for authentication, OutputCache filter for caching.
Filters can be created by implementing specific filter interfaces or by inheriting from FilterAttribute ...
MVC stands for Model-View-Controller, a software design pattern used for organizing code in a structured way.
MVC separates the application into three main components: Model (data), View (UI), and Controller (logic).
Model represents the data and business logic, View displays the data to the user, and Controller handles user input and updates the Model.
MVC helps in achieving separation of concerns, making code more modul...
Routing in MVC is the process of mapping URLs to controller actions in order to handle incoming requests.
Routing determines which controller and action should handle a request based on the URL
Routes are defined in the RouteConfig.cs file in ASP.NET MVC applications
Routes can include parameters that are passed to the controller action
Routing can be used to create user-friendly URLs
An application interacts with an API by sending requests and receiving responses containing data or actions.
The application sends a request to the API specifying the desired action or data
The API processes the request and sends back a response containing the requested information
The application then uses the data or performs the action based on the response received
Examples: a weather app fetching current weather data ...
API architecture refers to the design and structure of the application programming interface.
API architecture defines how different components of the API interact with each other
It includes the endpoints, data formats, authentication methods, and communication protocols used
Well-designed API architecture ensures scalability, security, and ease of use
Examples of API architectures include REST, SOAP, and GraphQL
HTTP stands for Hypertext Transfer Protocol, a protocol used for transmitting data over the internet.
HTTP is the foundation of data communication on the World Wide Web.
It is a request-response protocol, where a client sends a request to a server and the server responds with the requested data.
HTTP uses TCP/IP as the underlying transport protocol.
Common HTTP methods include GET (retrieve data), POST (submit data), PUT (...
Securing a cloud environment involves implementing strong IAM policies, encryption, monitoring, and regular security audits.
Implement strong IAM policies to control access to resources
Enable encryption for data at rest and in transit
Set up monitoring and logging to detect and respond to security incidents
Regularly conduct security audits and assessments to identify vulnerabilities
Use security groups and network ACLs to...
Types of policies in IAM include identity-based policies, resource-based policies, permissions boundaries, and service control policies.
Identity-based policies: attached to IAM identities such as users, groups, and roles
Resource-based policies: attached to AWS resources such as S3 buckets or Lambda functions
Permissions boundaries: used to delegate permissions to IAM entities within an organization
Service control polici...
JSON syntax for providing permissions
Use 'Effect' key to specify whether the permission is 'Allow' or 'Deny'
Use 'Action' key to specify the actions allowed or denied
Use 'Resource' key to specify the AWS resource to which the permission applies
To deny permission to a specific user for a particular S3 bucket, you can use IAM policies.
Create a custom IAM policy that explicitly denies access to the specific user for the S3 bucket
Attach the custom IAM policy to the user or a group the user belongs to
Ensure that the deny permission takes precedence over any allow permissions in other policies
Test the permissions to verify that the user is denied access to the S3 ...
Cross-account role access in AWS can be provided through IAM roles and trust relationships.
Create an IAM role in the target account with the necessary permissions.
Define a trust relationship in the target account's IAM role that allows the source account to assume the role.
In the source account, create an IAM policy that grants the necessary permissions to assume the role in the target account.
Attach the IAM policy to ...
Implementing SQS and SNS in AWS cloud involves creating queues and topics, setting up permissions, and configuring subscriptions.
Create an SQS queue and configure its settings
Create an SNS topic and configure its settings
Set up permissions to allow SQS to send messages to SNS
Configure subscriptions to connect the SQS queue to the SNS topic
Considerations before migrating monolith into microservices
Understand the current monolith architecture and dependencies
Identify the boundaries for microservices and plan the decomposition
Ensure proper testing and monitoring strategies are in place
Address data management and consistency challenges
Prepare for potential performance overhead and increased complexity
Implement API security using token-based authentication and authorization
Use token-based authentication like JWT (JSON Web Tokens)
Implement custom authentication and authorization logic in the API endpoints
Utilize API keys for access control and rate limiting
Implement OAuth for secure authorization and delegation of access
API gateway is a server that acts as an API front-end, receiving API requests, enforcing throttling and security policies, passing requests to the back-end service, and then passing the response back to the requester.
API gateway acts as a single entry point for all API requests
It can handle tasks like authentication, authorization, rate limiting, and caching
Examples of API gateways include Amazon API Gateway, Apigee, a...
While loop exceptions are errors that occur during the execution of a while loop.
Common while loop exceptions include infinite loops, where the loop never terminates.
Another exception is when the loop condition is never met, causing the loop to never execute.
Handling exceptions in while loops can be done using try-catch blocks to catch and handle errors.
I appeared for an interview in Apr 2025, where I was asked the following questions.
Creating a controller with LINQ to retrieve specific order data involves defining routes, queries, and returning results.
Define a controller class, e.g., 'OrdersController'.
Inject the DbContext to access the database.
Create an action method, e.g., 'GetOrdersByCustomerId'.
Use LINQ to query the orders, e.g., 'context.Orders.Where(o => o.CustomerId == id)'.
Return the results as JSON using 'Ok()' or 'NotFound()' for err...
Create a higher-order component in React to fetch and share API data between components.
Define a higher-order component (HOC) that wraps around the target components.
Use the fetch API to retrieve data inside the HOC, typically in a useEffect hook.
Store the fetched data in the HOC's state using useState.
Pass the fetched data as props to the wrapped components.
Handle loading and error states to improve user experience.
Use ROW_NUMBER() to rank salaries and retrieve the highest salary from a table.
ROW_NUMBER() assigns a unique sequential integer to rows within a partition.
To get the highest salary, order by salary in descending order.
Example SQL query: SELECT Salary FROM (SELECT Salary, ROW_NUMBER() OVER (ORDER BY Salary DESC) AS rn FROM Employees) AS ranked WHERE rn = 1.
Denouncing and throttling optimize performance by controlling event handling and reducing unnecessary processing.
Debouncing: Ensures a function is only called after a specified delay, preventing multiple calls during rapid events. Example: Search input.
Throttling: Limits the number of times a function can be executed over time, ensuring it runs at regular intervals. Example: Scroll events.
Use cases: Debouncing is ideal...
A denouncing function in JavaScript is used to create a function that can cancel or prevent further execution of a task.
A denouncing function limits the rate at which a function can fire. For example, it can prevent a function from being called multiple times in quick succession.
It is commonly used in scenarios like handling window resizing or scrolling events to improve performance.
Example: A denouncing function can b...
Queues are data structures that store elements in a specific order, primarily FIFO (First In, First Out).
FIFO Queue: Standard queue where the first element added is the first to be removed. Example: Print job queue.
LIFO Queue (Stack): Last element added is the first to be removed. Example: Browser history.
Priority Queue: Elements are removed based on priority rather than order. Example: Task scheduling.
Circular Queue: ...
C# supports different loading types, including eager, lazy, and explicit loading, each affecting performance and resource management.
Eager Loading: Loads all related data upfront. Example: using Include() in Entity Framework.
Lazy Loading: Loads related data on demand. Example: Navigation properties in EF that load when accessed.
Explicit Loading: Manually loads related data. Example: using context.Entry(entity).Referenc...
I applied via LinkedIn and was interviewed in Dec 2024. There was 1 interview round.
Program to remove duplicate numbers from array of strings
Iterate through the array and keep track of the count of each number
Remove numbers with count greater than 1 from the array
String Buffer is synchronized and thread-safe, while String Builder is not synchronized.
String Buffer is slower due to synchronization, while String Builder is faster.
String Builder should be used in single-threaded scenarios for better performance.
String Buffer should be used in multi-threaded scenarios to ensure thread safety.
s1.equals(s2) will return true as both strings have the same value. s1==s2 will return false as they are different objects.
s1.equals(s2) compares the values of the strings, not the memory addresses
s1==s2 compares the memory addresses of the strings, not their values
Example: s1.equals(s2) will return true in this case because both s1 and s2 have the same value 'Deloitte'
Spring Boot is better than Spring because it simplifies the development process by providing out-of-the-box configurations and reducing boilerplate code.
Spring Boot provides a pre-configured environment for application development, reducing the need for manual configurations.
It includes embedded servers like Tomcat, Jetty, or Undertow, making it easier to deploy applications.
Spring Boot auto-configures components based...
Query to count employees in each department
Use SQL query with GROUP BY clause on department column
Count the number of employees in each department
Retrieve the department name and the count of employees
To create a React app using npm commands
Use 'npx create-react-app my-app' to create a new React app
Navigate into the newly created app directory using 'cd my-app'
Start the development server with 'npm start'
React routing allows for navigation between different components in a single-page application.
React Router is a popular library for handling routing in React applications
Routes are defined using <Route> components and nested within a <Router> component
Navigation between routes is typically done using <Link> components or programmatic navigation with history object
I appeared for an interview in Jan 2025.
I appeared for an interview in Dec 2024.
I am a data analyst with a background in statistics and experience in analyzing large datasets.
Background in statistics
Experience in analyzing large datasets
Proficient in data visualization tools like Tableau
Strong problem-solving skills
Excellent communication skills
I would rate myself a 4 out of 5 in SQL proficiency.
Proficient in writing complex SQL queries
Experienced in optimizing database performance
Familiar with data manipulation and analysis functions
Comfortable working with large datasets
I use Power BI to analyze and visualize data for insights and decision-making in my work.
Connect to data sources to import data
Transform and clean data using Power Query Editor
Create relationships between different data tables
Design interactive reports and dashboards
Use DAX formulas for calculations and measures
Share reports with stakeholders and collaborate on insights
Some of the top questions asked at the Deloitte interview -
The duration of Deloitte interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 2.3k interview experiences
Difficulty level
Duration
based on 19.5k reviews
Rating in categories
Hyderabad / Secunderabad,
Bangalore / Bengaluru
+16-9 Yrs
₹ 11-40 LPA
Hyderabad / Secunderabad,
Bangalore / Bengaluru
+13-8 Yrs
₹ 6-40 LPA
Hyderabad / Secunderabad,
Bangalore / Bengaluru
+12-7 Yrs
Not Disclosed
Consultant
39.2k
salaries
| ₹6.5 L/yr - ₹24 L/yr |
Senior Consultant
24.2k
salaries
| ₹11.1 L/yr - ₹42 L/yr |
Analyst
16.3k
salaries
| ₹3.9 L/yr - ₹13 L/yr |
Assistant Manager
11k
salaries
| ₹8 L/yr - ₹24.3 L/yr |
Manager
7.8k
salaries
| ₹16 L/yr - ₹55 L/yr |
Accenture
PwC
Ernst & Young
Cognizant