i
GlobalLogic
Filter interviews by
Design a user access control system with granular control for pages, controls, data, and response masking.
Implement role-based access control (RBAC) to assign permissions to users based on their roles.
Utilize attribute-based access control (ABAC) for more fine-grained control over access to specific pages, controls, and data.
Implement data masking techniques to ensure sensitive information is not exposed in respon...
Optimizing sparse array access involves using data structures like hash maps or trees to efficiently store and retrieve values.
Use a hash map to store only non-null values and their corresponding indices.
Implement a tree-based data structure like a binary search tree or a trie for faster access to sparse array elements.
Consider using a compressed sparse row (CSR) format for large sparse arrays to reduce memory usa...
Microservices architecture for a wealth management app involves breaking down the application into smaller, independent services.
Each microservice focuses on a specific business function, such as client onboarding, portfolio management, or reporting.
Services communicate through APIs, allowing for flexibility and scalability.
Each microservice can be developed, deployed, and scaled independently, leading to faster d...
Improve legacy app performance by optimizing code, implementing caching, and scaling resources.
Optimize code by identifying and removing bottlenecks
Implement caching to reduce database calls and improve response time
Scale resources by using containers or serverless architecture
Use asynchronous processing for long-running tasks
Upgrade hardware or infrastructure if necessary
What people are saying about GlobalLogic
Non functional requirements are criteria that specify how a system should behave, rather than what it should do.
Performance - system should respond within 2 seconds for all user interactions
Scalability - system should be able to handle 1000 concurrent users
Reliability - system should have a 99.99% uptime
Security - system should encrypt all sensitive data
Usability - system should have a user-friendly interface
Security in microservices involves implementing authentication, authorization, encryption, and monitoring to protect data and services.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices and external clients.
Implement monitoring and logging to detect and respond to security incidents.
Consider using API gateways for ce...
I applied via Naukri.com and was interviewed in Jun 2024. There were 2 interview rounds.
Non functional requirements are criteria that specify how a system should behave, rather than what it should do.
Performance - system should respond within 2 seconds for all user interactions
Scalability - system should be able to handle 1000 concurrent users
Reliability - system should have a 99.99% uptime
Security - system should encrypt all sensitive data
Usability - system should have a user-friendly interface
Improve legacy app performance by optimizing code, implementing caching, and scaling resources.
Optimize code by identifying and removing bottlenecks
Implement caching to reduce database calls and improve response time
Scale resources by using containers or serverless architecture
Use asynchronous processing for long-running tasks
Upgrade hardware or infrastructure if necessary
Security in microservices involves implementing authentication, authorization, encryption, and monitoring to protect data and services.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices and external clients.
Implement monitoring and logging to detect and respond to security incidents.
Consider using API gateways for central...
Microservices architecture for a wealth management app involves breaking down the application into smaller, independent services.
Each microservice focuses on a specific business function, such as client onboarding, portfolio management, or reporting.
Services communicate through APIs, allowing for flexibility and scalability.
Each microservice can be developed, deployed, and scaled independently, leading to faster develo...
I applied via Company Website and was interviewed before Sep 2023. There were 3 interview rounds.
Design a user access control system with granular control for pages, controls, data, and response masking.
Implement role-based access control (RBAC) to assign permissions to users based on their roles.
Utilize attribute-based access control (ABAC) for more fine-grained control over access to specific pages, controls, and data.
Implement data masking techniques to ensure sensitive information is not exposed in responses.
U...
Optimizing sparse array access involves using data structures like hash maps or trees to efficiently store and retrieve values.
Use a hash map to store only non-null values and their corresponding indices.
Implement a tree-based data structure like a binary search tree or a trie for faster access to sparse array elements.
Consider using a compressed sparse row (CSR) format for large sparse arrays to reduce memory usage an...
I applied via Naukri.com and was interviewed in Jun 2021. There were 3 interview rounds.
What people are saying about GlobalLogic
I applied via Naukri.com and was interviewed before Apr 2023. There were 2 interview rounds.
Virtual DOM is a lightweight copy of the actual DOM in React, used for efficient updates.
Virtual DOM is a concept where a lightweight copy of the actual DOM is created in memory.
When changes are made to the virtual DOM, React compares it with the actual DOM to identify the minimal number of updates needed.
This process helps in optimizing performance by reducing the number of actual DOM manipulations.
Example: When a use...
Implementing passwordless system involves using alternative authentication methods.
Use email or SMS verification codes
Implement biometric authentication
Utilize hardware security keys
Implement OAuth or OpenID Connect for single sign-on
Leverage FIDO2 standards for passwordless authentication
To create a cookieless system, use alternative methods like local storage or URL parameters for tracking user data.
Use local storage to store user data on the client side
Utilize URL parameters to pass data between pages
Implement server-side session management for user authentication
Consider using JSON Web Tokens (JWT) for secure data transmission
S.O.L.I.D principles are a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.
Single Responsibility Principle (SRP) - A class should have only one reason to change.
Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.
Liskov Substitution Principle (LSP) - Objects of a superclass should b...
posted on 17 Mar 2023
I applied via Naukri.com and was interviewed in Feb 2023. There were 2 interview rounds.
Mine sweeper logic for a box click
To delete an element from a linked list, update the pointers of the previous node to skip the node to be deleted.
Traverse the linked list to find the node to be deleted
Update the 'next' pointer of the previous node to skip the node to be deleted
Free the memory allocated to the node to be deleted
I expect a competitive salary that reflects my skills, experience, and the industry standards for a Senior Software Engineer.
Research industry standards: For example, Glassdoor or Payscale can provide insights into average salaries for similar roles.
Consider my experience: With over 5 years in software development and expertise in multiple programming languages, I bring significant value.
Location matters: Salaries can ...
I applied via LinkedIn and was interviewed in Jul 2020. There was 1 interview round.
posted on 1 Aug 2022
I applied via Recruitment Consulltant and was interviewed before Aug 2021. There was 1 interview round.
posted on 26 Feb 2021
I applied via Company Website and was interviewed before Feb 2020. There were 4 interview rounds.
Handled high pressure from client by prioritizing tasks and communicating effectively.
Identified critical issues and addressed them first
Communicated regularly with the client to provide updates and manage expectations
Collaborated with team members to delegate tasks and ensure timely delivery
Maintained a calm and professional demeanor to avoid escalating the situation
Release management is the process of planning, scheduling, coordinating, and deploying software releases.
It involves identifying the scope of the release and the features to be included
Creating a release plan and schedule
Coordinating with different teams involved in the release process
Testing the release to ensure it meets quality standards
Deploying the release to production
Monitoring the release to ensure it is stable...
Some of the top questions asked at the GlobalLogic Technical Architect interview -
based on 2 interview experiences
Difficulty level
Duration
based on 5 reviews
Rating in categories
Associate Analyst
4.4k
salaries
| ₹1.7 L/yr - ₹4 L/yr |
Senior Software Engineer
3.6k
salaries
| ₹4 L/yr - ₹28.8 L/yr |
Analyst
3.2k
salaries
| ₹1.8 L/yr - ₹4 L/yr |
Software Engineer
3.2k
salaries
| ₹5 L/yr - ₹12 L/yr |
Associate Consultant
3.1k
salaries
| ₹16.1 L/yr - ₹30 L/yr |
Genpact
DXC Technology
Sutherland Global Services
Optum Global Solutions