Akamai Technical Interview Experience: What Every Developer Should Know

akamai logo
akamai
Software Engineer IIIndia RemoteRejected
August 27, 2025 β€’ 27 reads

Summary

I interviewed with Akamai for a Software Engineer II role. I successfully cleared the initial technical round, which included a coding problem and conceptual questions on networking, security, and databases, but the position was unfortunately filled due to a staffing shortage, leading to a "Silver medalist" status.

Full Experience

The Talent Acquisition team first reached out to me, informing me that my resume had been shortlisted for the Software Engineer II position at Akamai. I promptly shared my availability for the initial interview.

First Technical Round (HackerRank)

The first round was scheduled on the HackerRank platform. After a brief introduction, the interviewer delved into my resume, specifically focusing on my most recent projects. He showed particular interest in the security-related components of my work.

Following the resume discussion, I was given a coding question:

Problem: Given a linked list, return a new linked list containing only odd numbers.
Input: 1 β†’ 2 β†’ 3 β†’ 4 β†’ 5 β†’ 6 β†’ 7 β†’ 8
Output: 1 β†’ 3 β†’ 5 β†’ 7

I was able to solve this problem quickly and proceeded to explain its time and space complexity. The interviewer also asked follow-up questions about circular linked lists and other variants.

Next, we transitioned to conceptual questions, covering a range of topics:

  • The distinction between HTTP and HTTPS
  • The application of HTTP protocols in development
  • What is JWT? Its elements and functions
  • The significance of the JWT signature element
  • The role of public and private keys in token signing
  • OAuth token functionality
  • The distinction between a refresh token and an access token
  • Deadlock: Semaphore vs. Mutex
  • CAP theorem and ACID properties
  • The distinctions between CAP and ACID
  • Concepts of Phantom Read and Dirty Read
  • There were also several experience-based inquiries about my prior work.

At the end of the session, the interviewer mentioned that he enjoyed our conversation and appreciated my confidence.

HR Follow-up and Outcome

Soon after, I received a call from HR informing me that I had successfully passed the first round and would be moving forward to an interview with a senior team member.

However, there was a twist. I later discovered that the position had already been filled due to a personnel shortage. Despite this, the HR staff assured me that my profile would be updated in Akamai's β€œSilver medalist” community, and I would be given priority for any future relevant opportunities. They even confirmed this via email.

Even though the immediate outcome wasn’t in my favor, I truly value this experience and the knowledge I gained. Every interview contributes to making me better prepared for the next one.

Interview Questions (13)

Q1
Filter Odd Numbers from Linked List
Data Structures & AlgorithmsEasy

Given a linked list, return a new linked list containing only odd numbers.
Input: 1 β†’ 2 β†’ 3 β†’ 4 β†’ 5 β†’ 6 β†’ 7 β†’ 8
Output: 1 β†’ 3 β†’ 5 β†’ 7

Q2
HTTP vs HTTPS
Other

What is the distinction between HTTP and HTTPS?

Q3
Application of HTTP Protocols
Other

How are HTTP protocols applied in development?

Q4
JWT: Elements and Functions
Other

What is JWT? What are its elements and functions?

Q5
Significance of JWT Signature
Other

What is the significance of the JWT signature element?

Q6
Public and Private Keys in Token Signing
Other

What is the function of public and private keys in token signing?

Q7
OAuth Token Functionality
Other

What is OAuth token functionality?

Q8
Refresh Token vs Access Token
Other

What is the distinction between a refresh token and an access token?

Q9
Deadlock: Semaphore vs Mutex
Other

Discuss Deadlock: Semaphore vs. Mutex.

Q10
CAP Theorem and ACID Properties
Other

Explain the CAP theorem and ACID properties.

Q11
CAP vs ACID Distinctions
Other

What are the distinctions between CAP and ACID?

Q12
Phantom Read and Dirty Read Concepts
Other

Explain the concepts of Phantom Read and Dirty Read.

Q13
Prior Work Experience
Behavioral

Inquiries about my prior work experience were also experience-based.

Preparation Tips

My preparation primarily focused on reviewing the security-related components of my recent projects, as these were highlighted in the interview. I also refreshed my knowledge on fundamental data structures and algorithms, particularly linked lists, given the coding question.

Additionally, I studied various conceptual areas including:

  • Networking protocols (HTTP/HTTPS)
  • Web security concepts (JWT, OAuth, public/private keys, token signing, refresh vs. access tokens)
  • Operating system concepts (Deadlock, Semaphore vs. Mutex)
  • Database properties and distributed systems (CAP theorem, ACID properties, Phantom Read, Dirty Read).

This comprehensive preparation helped me confidently address both the coding and theoretical questions during the interview.

Discussion (0)

Share your thoughts and ask questions

Join the Discussion

Sign in with Google to share your thoughts and ask questions

No comments yet

Be the first to share your thoughts and start the discussion!