i
Voya
India
Work with us
Filter interviews by
RBAC is a security model that restricts system access based on user roles, enhancing security and simplifying management.
Role Assignment: Users are assigned roles that define their permissions, such as 'Admin', 'Editor', or 'Viewer'.
Permission Management: Each role has specific permissions, like 'create', 'read', 'update', or 'delete' for resources.
Separation of Duties: RBAC helps enforce separation of duties by e...
Identity and Access Management (IAM) ensures the right individuals access the right resources at the right times for the right reasons.
IAM involves user identity verification and management, ensuring secure access to systems.
Examples include Single Sign-On (SSO) systems like Okta or Microsoft Azure AD.
IAM policies define user roles and permissions, controlling access to sensitive data.
Multi-Factor Authentication (...
An identity is a set of characteristics that define an individual or entity, distinguishing them from others.
Identity can refer to personal attributes like name, age, and gender.
In digital contexts, identity often relates to user accounts and authentication.
Examples include social media profiles, email addresses, and government IDs.
In philosophy, identity explores concepts of self and existence.
The Identity Lifecycle encompasses the stages of managing user identities from creation to deletion.
1. Identity Creation: The process of registering a new user, e.g., signing up on a website.
2. Identity Management: Ongoing management of user attributes and permissions, e.g., updating profile information.
3. Identity Authentication: Verifying user identity through methods like passwords or biometrics, e.g., logging ...
Zero Trust, Birthright Access, and Least Privilege Access are security concepts aimed at minimizing risks in digital environments.
Zero Trust: Assumes no user or device is trustworthy by default, requiring verification for every access request.
Example: Multi-factor authentication (MFA) is often used in Zero Trust models to ensure user identity.
Birthright Access: Refers to the automatic access rights granted to user...
I appeared for an interview in Oct 2024, where I was asked the following questions.
RBAC is a security model that restricts system access based on user roles, enhancing security and simplifying management.
Role Assignment: Users are assigned roles that define their permissions, such as 'Admin', 'Editor', or 'Viewer'.
Permission Management: Each role has specific permissions, like 'create', 'read', 'update', or 'delete' for resources.
Separation of Duties: RBAC helps enforce separation of duties by ensuri...
An identity is a set of characteristics that define an individual or entity, distinguishing them from others.
Identity can refer to personal attributes like name, age, and gender.
In digital contexts, identity often relates to user accounts and authentication.
Examples include social media profiles, email addresses, and government IDs.
In philosophy, identity explores concepts of self and existence.
The Identity Lifecycle encompasses the stages of managing user identities from creation to deletion.
1. Identity Creation: The process of registering a new user, e.g., signing up on a website.
2. Identity Management: Ongoing management of user attributes and permissions, e.g., updating profile information.
3. Identity Authentication: Verifying user identity through methods like passwords or biometrics, e.g., logging in wi...
Zero Trust, Birthright Access, and Least Privilege Access are security concepts aimed at minimizing risks in digital environments.
Zero Trust: Assumes no user or device is trustworthy by default, requiring verification for every access request.
Example: Multi-factor authentication (MFA) is often used in Zero Trust models to ensure user identity.
Birthright Access: Refers to the automatic access rights granted to users bas...
I appeared for an interview before Feb 2024.
I led a team to develop a web application for a client, from initial requirements gathering to deployment and maintenance.
Gathered requirements from client and stakeholders
Designed architecture and database schema
Implemented front-end using React and back-end using Node.js
Tested application for functionality and performance
Deployed application on AWS and monitored for issues
Provided ongoing maintenance and support to c...
Top trending discussions
Optimization techniques are methods used to improve the efficiency and performance of software applications.
Use of algorithms like dynamic programming and greedy algorithms
Profiling and performance tuning to identify bottlenecks
Code refactoring to improve readability and maintainability
Utilizing caching and memoization for faster access to data
Parallel processing and multi-threading for improved concurrency
I applied via Referral and was interviewed in Oct 2023. There were 2 interview rounds.
Pagination in SQL allows for displaying a subset of query results at a time.
Use LIMIT and OFFSET clauses in SQL queries to implement pagination.
LIMIT specifies the maximum number of rows to return.
OFFSET specifies the number of rows to skip before starting to return rows.
Abstract classes can have both abstract and non-abstract methods, while interfaces can only have abstract methods.
Abstract classes can have constructors, fields, and non-abstract methods.
Interfaces can only have abstract methods and constants.
A class can implement multiple interfaces but can only inherit from one abstract class.
I applied via Recruitment Consulltant and was interviewed in Jul 2022. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Jul 2022. There were 2 interview rounds.
I applied via Approached by Company and was interviewed in Mar 2024. There was 1 interview round.
REST API is a standard way of building web services, while Kafka is a distributed streaming platform for handling real-time data feeds.
REST API is used for building web services that follow the REST architectural style
Kafka is used for handling real-time data feeds and building real-time data pipelines
REST API is synchronous, while Kafka is asynchronous and can handle high throughput and low latency data streams
I applied via Referral and was interviewed in Jan 2024. There were 2 interview rounds.
Find k closest elements in an array
Sort the array based on the absolute difference between each element and the target element
Return the first k elements from the sorted array
Find the K closest elements to a given value in a sorted array.
Use binary search to find the closest element to the target.
Maintain a sliding window of size K around the closest element.
Consider edge cases where K is larger than the array size.
Example: For array [1, 2, 3, 4, 5] and target 3, K=2, output is [2, 3].
posted on 13 Aug 2024
Some of the top questions asked at the Voya India Senior Software Engineer interview -
based on 2 interview experiences
Difficulty level
Duration
based on 24 reviews
Rating in categories
Senior Associate
361
salaries
| ₹4.6 L/yr - ₹11.1 L/yr |
Associate Lead
216
salaries
| ₹6.1 L/yr - ₹13.8 L/yr |
Senior Software Engineer
202
salaries
| ₹6.8 L/yr - ₹17.9 L/yr |
Team Lead
174
salaries
| ₹13.4 L/yr - ₹24.2 L/yr |
Software Engineer
155
salaries
| ₹3.8 L/yr - ₹8.5 L/yr |
SBI Cards & Payment Services
Kotak Securities
Morningstar
Pine Labs