i
Tesco
Work with us
Filter interviews by
Implement an optimized search function for products using partial matching on names.
Use a loop to iterate through the products array.
Utilize the String.prototype.includes() method for partial matching.
Consider using a regular expression for more complex matching scenarios.
Optimize by returning early if a match is found.
Example: For products [{id: 1, name: 'Apple'}, {id: 2, name: 'Banana'}], searching for 'App' ret...
The current Chief Minister of Manipur is N. Biren Singh, who has been in office since March 2017, representing the BJP.
N. Biren Singh is the first BJP Chief Minister of Manipur.
He previously served as a journalist and a football player.
Under his leadership, the state has seen various developmental initiatives.
He has focused on improving law and order in the region.
The Prime Minister of India is Narendra Modi, who has been in office since May 2014, leading the Bharatiya Janata Party (BJP).
Narendra Modi was born on September 17, 1950, in Vadnagar, Gujarat.
He served as the Chief Minister of Gujarat from 2001 to 2014 before becoming Prime Minister.
Modi's government is known for initiatives like 'Make in India' and 'Digital India'.
He has been re-elected in 2019 with a larger maj...
The name of the company is Proprietor, a firm focused on innovative solutions in various industries.
Proprietor specializes in technology and consulting services.
The company aims to enhance business efficiency through tailored solutions.
Examples of services include software development and strategic planning.
Our CI/CD setup automates code integration, testing, and deployment for faster and reliable software delivery.
Version Control: We use Git for source code management, enabling collaboration and tracking changes.
Continuous Integration: Jenkins is configured to automatically build and test code on every commit, ensuring early detection of issues.
Automated Testing: We implement unit tests and integration tests using f...
Managing secrets in a pipeline involves secure storage, access control, and auditing to protect sensitive information.
Use secret management tools like HashiCorp Vault or AWS Secrets Manager to store sensitive data securely.
Implement environment variables to inject secrets into the pipeline without hardcoding them in the codebase.
Utilize CI/CD tools' built-in secret management features, such as GitHub Actions Secre...
Best practices for implementing microservices include modular design, independent deployment, and robust communication strategies.
Design for failure: Implement circuit breakers to handle service outages gracefully.
Use API gateways: Centralize requests and manage authentication, logging, and routing.
Decentralize data management: Each microservice should manage its own database to avoid tight coupling.
Implement serv...
Spring Boot simplifies Java application development by providing a framework for building stand-alone, production-ready applications.
Convention over configuration: Reduces the need for extensive configuration files.
Embedded servers: Supports embedded servers like Tomcat and Jetty for easy deployment.
Microservices support: Ideal for building microservices architectures with minimal setup.
Auto-configuration: Automat...
ORM translates Python objects to database queries, enabling seamless data manipulation without SQL knowledge.
ORM stands for Object-Relational Mapping, bridging Python objects and database tables.
When a query is made, ORM translates it into SQL syntax for the database.
Example: Using Django's ORM, 'MyModel.objects.all()' fetches all records from the 'MyModel' table.
ORM supports CRUD operations: Create, Read, Update,...
Django is a high-level Python web framework that encourages rapid development and clean, pragmatic design.
Built by experienced developers to help create web applications quickly.
Follows the 'Don't Repeat Yourself' (DRY) principle, promoting code reusability.
Includes an ORM (Object-Relational Mapping) for database interactions, e.g., using models to define database tables.
Offers built-in admin interface for easy ma...
I applied via Referral and was interviewed in Jul 2024. There were 4 interview rounds.
Solution architecture and block diagram involves designing the overall structure of a system and visually representing it.
Identify key components and their interactions
Define data flow and communication protocols
Consider scalability, security, and performance
Use tools like UML diagrams or flowcharts
Example: AWS architecture with EC2 instances, S3 storage, and RDS database
Program values and benefits are essential for successful project management, ensuring alignment with organizational goals and delivering value to stakeholders.
Program values define the principles and beliefs that guide decision-making and behavior within the program.
Benefits are the positive outcomes or results that the program aims to achieve, such as cost savings, increased efficiency, or improved customer satisfacti...
Assessing program benefits involves identifying key metrics, collecting data, analyzing results, and comparing against goals.
Identify key metrics to measure success, such as cost savings, revenue growth, customer satisfaction, etc.
Collect relevant data to track progress and measure impact of the program.
Analyze the data to determine if the program is meeting its objectives and delivering expected benefits.
Compare the r...
2 case study rounds for 1.5 hours, 1st case study is a small use case with 2 questions and there will be 10 mins given for preparation. 2nd case study will have 5 questions and time given for preparation will be 25 mins.
Effective conflict management involves understanding perspectives, facilitating communication, and finding common ground for resolution.
Identify the root cause of the conflict by listening to all parties involved.
Encourage open communication to express feelings and viewpoints without judgment.
Facilitate a collaborative discussion to brainstorm potential solutions.
Focus on interests rather than positions to find common ...
I have experienced failures in past projects and have learned valuable lessons from them.
Recognizing the importance of clear communication and setting expectations early on
Implementing regular project status updates to stakeholders to avoid surprises
Documenting lessons learned to prevent repeating the same mistakes in future projects
Schedule and effort estimation is crucial for successful project management.
Understand the scope of the project and break it down into smaller tasks
Estimate the time and resources required for each task
Consider dependencies between tasks and potential risks
Use historical data or expert judgment to improve accuracy
Regularly review and update the schedule as needed
Project phases are distinct stages in a project's lifecycle, each with specific goals and deliverables.
Initiation: Define project scope, objectives, and stakeholders.
Planning: Create a detailed project plan, including timelines and resources.
Execution: Implement the project plan and deliver the project's objectives.
Monitoring and Controlling: Track project progress, identify issues, and make necessary adjustments.
Closi...
Opex refers to operational expenses, while Capex refers to capital expenses.
Opex includes day-to-day expenses like salaries, rent, utilities, and maintenance.
Capex involves investments in assets that provide long-term value, such as equipment, property, and infrastructure.
Opex is typically incurred regularly and is fully tax-deductible in the year it is incurred.
Capex is usually depreciated over time as the asset is us...
Quality is crucial in delivering successful projects. Various tools like Jira, Confluence, and Jenkins are commonly used to ensure high quality.
Quality assurance processes are essential to maintain high standards in project deliverables
Tools like Jira are used for issue tracking and project management
Confluence is used for documentation and collaboration among team members
Jenkins is used for continuous integration and ...
Led a project to implement a cloud-based data analytics platform using AWS services and Python tech stack.
Designed architecture for data analytics platform using AWS services like S3, Glue, and Athena.
Implemented ETL processes using Python and Apache Spark for data transformation and analysis.
Integrated machine learning models into the platform for predictive analytics.
Ensured scalability and performance optimization o...
Managing conflicting priorities involves prioritizing tasks, communicating effectively, and being flexible.
Prioritize tasks based on importance and deadlines
Communicate with stakeholders to understand their needs and expectations
Be flexible and willing to adjust plans as needed
Use tools like project management software to track progress and manage tasks
Managing stakeholders expectations and demands is crucial for successful project delivery.
Establish clear communication channels with stakeholders
Set realistic expectations from the beginning
Regularly update stakeholders on project progress
Address any concerns or issues promptly
Seek feedback from stakeholders to ensure alignment
I appeared for an interview in May 2025, where I was asked the following questions.
Implement an optimized search function for products using partial matching on names.
Use a loop to iterate through the products array.
Utilize the String.prototype.includes() method for partial matching.
Consider using a regular expression for more complex matching scenarios.
Optimize by returning early if a match is found.
Example: For products [{id: 1, name: 'Apple'}, {id: 2, name: 'Banana'}], searching for 'App' returns ...
I applied via Referral and was interviewed in Jun 2024. There were 3 interview rounds.
I am currently working as a Senior Information Security Engineer at XYZ Company.
Leading the implementation of security measures to protect the organization's computer systems and networks
Conducting regular security assessments and audits to identify vulnerabilities and risks
Developing and implementing security policies and procedures
Responding to security incidents and conducting forensic investigations
Providing securi...
I would like to know about the specific responsibilities, team structure, technology stack, and opportunities for growth in this role at Tesco.
Responsibilities of the Information Security Engineer at Tesco
Team structure and collaboration within the Information Security team
Technology stack used for security measures at Tesco
Opportunities for career growth and professional development at Tesco
I am a dedicated Information Security Engineer with a strong background in cybersecurity and a passion for protecting data.
Experienced in implementing and maintaining security measures to protect networks and systems
Skilled in conducting security assessments and identifying vulnerabilities
Proficient in incident response and forensic analysis
Certified in relevant security certifications such as CISSP or CEH
Performing a security architecture review on the provided model.
Identify potential security vulnerabilities in the architecture
Evaluate the effectiveness of security controls in place
Assess the overall security posture of the system
Recommend improvements to enhance security measures
Identifying loopholes in a security model and proposing security controls to improve it.
Identify potential vulnerabilities such as weak authentication methods, lack of encryption, or inadequate access controls
Implement strong authentication measures like multi-factor authentication to prevent unauthorized access
Encrypt sensitive data both in transit and at rest to protect it from unauthorized access
Implement strict acc...
I am currently working in the domain of network security.
Designing and implementing network security measures to protect the organization's systems and data
Monitoring network traffic for potential security breaches
Conducting regular security assessments and audits to identify vulnerabilities
Responding to security incidents and implementing incident response procedures
Implementing and managing firewalls, intrusion detec...
Some challenges faced everyday include keeping up with evolving threats, managing security incidents, and balancing security with usability.
Keeping up with evolving threats and vulnerabilities
Managing security incidents and responding to breaches
Balancing security measures with usability for end users
It depends on the specific security requirements and resources of the organization.
Consider the sensitivity of the data being stored and processed.
Evaluate the organization's budget and resources for maintaining security measures.
Assess the expertise of the IT team in managing security for both SaaS and on-prem solutions.
SaaS may offer better scalability and accessibility, but on-prem may provide more control over secu...
I expect my next job to provide challenging projects, opportunities for growth, a supportive team environment, and a competitive salary.
Challenging projects that allow me to utilize my skills and knowledge
Opportunities for professional growth and development
A supportive team environment where collaboration is encouraged
Competitive salary and benefits package
Work-life balance and flexibility in scheduling
I applied via Company Website and was interviewed in Jul 2024. There were 3 interview rounds.
Designing a highly scalable inventory management system involves utilizing distributed databases, microservices architecture, and efficient data processing techniques.
Utilize distributed databases to handle large volumes of data and ensure high availability.
Implement microservices architecture to modularize the system and allow for easy scalability.
Use efficient data processing techniques such as batch processing and s...
Discussing design considerations for a software project, focusing on scalability, maintainability, and user experience.
Scalability: The design should handle increased load, e.g., using microservices to distribute traffic.
Maintainability: Code should be modular, e.g., implementing design patterns like MVC for clear separation of concerns.
User Experience: Prioritize intuitive UI/UX, e.g., conducting user testing to gathe...
Experienced software development manager with a strong background in leading teams and delivering high-quality products.
Over 10 years of experience in software development and management
Proven track record of successfully leading cross-functional teams
Strong technical background in various programming languages and technologies
Passionate about mentoring and developing team members
Focused on delivering innovative soluti...
I appeared for an interview in Apr 2025, where I was asked the following questions.
I prioritized tasks, utilized time management techniques, and maintained a positive attitude to handle a heavy workload effectively.
Prioritized tasks by urgency and importance, ensuring critical tasks were completed first.
Utilized a planner to schedule my day, breaking down larger tasks into manageable steps.
Maintained open communication with my team to delegate tasks when necessary, ensuring no one was overwhelmed.
Pra...
I prioritize effective communication and organization to manage interactions with multiple customers efficiently.
I greet each customer warmly, ensuring they feel acknowledged and valued.
I maintain eye contact and use active listening to understand their needs.
If a customer has a question while I’m assisting another, I politely let them know I’ll be with them shortly.
I use a notepad to jot down quick requests or questio...
I applied via Approached by Company and was interviewed in Jun 2024. There were 3 interview rounds.
System Design with High Level Design (HLD) involves creating a high-level architecture for a software system.
Identify the requirements and constraints of the system
Break down the system into smaller components/modules
Define the interactions between the components/modules
Consider scalability, performance, and security aspects
Create diagrams like UML diagrams to visualize the design
I applied via Campus Placement
2 coding questions and a few MCQs
Optimizing a solution involves improving efficiency and reducing complexity in code.
Analyze time complexity: For example, if your solution is O(n^2), consider using a hash map to reduce it to O(n).
Use built-in functions: Leverage language-specific libraries that are optimized for performance.
Avoid unnecessary computations: Cache results of expensive function calls if they are used multiple times.
Consider data structure...
I appeared for an interview in Mar 2025, where I was asked the following questions.
Our CI/CD setup automates code integration, testing, and deployment for faster and reliable software delivery.
Version Control: We use Git for source code management, enabling collaboration and tracking changes.
Continuous Integration: Jenkins is configured to automatically build and test code on every commit, ensuring early detection of issues.
Automated Testing: We implement unit tests and integration tests using framew...
Managing secrets in a pipeline involves secure storage, access control, and auditing to protect sensitive information.
Use secret management tools like HashiCorp Vault or AWS Secrets Manager to store sensitive data securely.
Implement environment variables to inject secrets into the pipeline without hardcoding them in the codebase.
Utilize CI/CD tools' built-in secret management features, such as GitHub Actions Secrets or...
I appeared for an interview in Mar 2025, where I was asked the following questions.
Django is a high-level Python web framework that encourages rapid development and clean, pragmatic design.
Built by experienced developers to help create web applications quickly.
Follows the 'Don't Repeat Yourself' (DRY) principle, promoting code reusability.
Includes an ORM (Object-Relational Mapping) for database interactions, e.g., using models to define database tables.
Offers built-in admin interface for easy managem...
ORM translates Python objects to database queries, enabling seamless data manipulation without SQL knowledge.
ORM stands for Object-Relational Mapping, bridging Python objects and database tables.
When a query is made, ORM translates it into SQL syntax for the database.
Example: Using Django's ORM, 'MyModel.objects.all()' fetches all records from the 'MyModel' table.
ORM supports CRUD operations: Create, Read, Update, Dele...
I applied via Referral and was interviewed in Sep 2024. There was 1 interview round.
I handled a tough situation at work by remaining calm, analyzing the problem, and collaborating with team members to find a solution.
Remained calm and composed under pressure
Analyzed the root cause of the problem
Collaborated with team members to brainstorm solutions
Implemented the best solution and monitored its effectiveness
Top trending discussions
The duration of Tesco interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 113 interview experiences
Difficulty level
Duration
based on 1.4k reviews
Rating in categories
Senior Associate
491
salaries
| ₹3.5 L/yr - ₹10.9 L/yr |
Software Development Engineer II
256
salaries
| ₹20.5 L/yr - ₹55 L/yr |
Associate
230
salaries
| ₹2.3 L/yr - ₹8.1 L/yr |
Team Lead
186
salaries
| ₹6.6 L/yr - ₹20 L/yr |
Senior System Analyst
155
salaries
| ₹7.3 L/yr - ₹20 L/yr |
Reliance Digital
Shoppers Stop
Landmark Group
V-Mart