Microsoft SDE Intern Interview Experience
πΌ LTIMindtree Interview Experience (On-Campus) | Fresher | 2026
Salesforce SMTS | Interview Experience | Rejected
JPMC | SDE2 (Associate) - Java Backend - Interview Experience + Compensation
Microsoft - SDE2 - Coding Round
Akamai Technical Interview Experience: What Every Developer Should Know
Summary
I interviewed with Akamai for a Software Engineer II role. I successfully cleared the initial technical round, which included a coding problem and conceptual questions on networking, security, and databases, but the position was unfortunately filled due to a staffing shortage, leading to a "Silver medalist" status.
Full Experience
The Talent Acquisition team first reached out to me, informing me that my resume had been shortlisted for the Software Engineer II position at Akamai. I promptly shared my availability for the initial interview.
First Technical Round (HackerRank)
The first round was scheduled on the HackerRank platform. After a brief introduction, the interviewer delved into my resume, specifically focusing on my most recent projects. He showed particular interest in the security-related components of my work.
Following the resume discussion, I was given a coding question:
Problem: Given a linked list, return a new linked list containing only odd numbers.
Input: 1 β 2 β 3 β 4 β 5 β 6 β 7 β 8
Output: 1 β 3 β 5 β 7
I was able to solve this problem quickly and proceeded to explain its time and space complexity. The interviewer also asked follow-up questions about circular linked lists and other variants.
Next, we transitioned to conceptual questions, covering a range of topics:
- The distinction between HTTP and HTTPS
- The application of HTTP protocols in development
- What is JWT? Its elements and functions
- The significance of the JWT signature element
- The role of public and private keys in token signing
- OAuth token functionality
- The distinction between a refresh token and an access token
- Deadlock: Semaphore vs. Mutex
- CAP theorem and ACID properties
- The distinctions between CAP and ACID
- Concepts of Phantom Read and Dirty Read
- There were also several experience-based inquiries about my prior work.
At the end of the session, the interviewer mentioned that he enjoyed our conversation and appreciated my confidence.
HR Follow-up and Outcome
Soon after, I received a call from HR informing me that I had successfully passed the first round and would be moving forward to an interview with a senior team member.
However, there was a twist. I later discovered that the position had already been filled due to a personnel shortage. Despite this, the HR staff assured me that my profile would be updated in Akamai's βSilver medalistβ community, and I would be given priority for any future relevant opportunities. They even confirmed this via email.
Even though the immediate outcome wasnβt in my favor, I truly value this experience and the knowledge I gained. Every interview contributes to making me better prepared for the next one.
Interview Questions (13)
Given a linked list, return a new linked list containing only odd numbers.
Input: 1 β 2 β 3 β 4 β 5 β 6 β 7 β 8
Output: 1 β 3 β 5 β 7
What is the distinction between HTTP and HTTPS?
How are HTTP protocols applied in development?
What is JWT? What are its elements and functions?
What is the significance of the JWT signature element?
What is the function of public and private keys in token signing?
What is OAuth token functionality?
What is the distinction between a refresh token and an access token?
Discuss Deadlock: Semaphore vs. Mutex.
Explain the CAP theorem and ACID properties.
What are the distinctions between CAP and ACID?
Explain the concepts of Phantom Read and Dirty Read.
Inquiries about my prior work experience were also experience-based.
Preparation Tips
My preparation primarily focused on reviewing the security-related components of my recent projects, as these were highlighted in the interview. I also refreshed my knowledge on fundamental data structures and algorithms, particularly linked lists, given the coding question.
Additionally, I studied various conceptual areas including:
- Networking protocols (HTTP/HTTPS)
- Web security concepts (JWT, OAuth, public/private keys, token signing, refresh vs. access tokens)
- Operating system concepts (Deadlock, Semaphore vs. Mutex)
- Database properties and distributed systems (CAP theorem, ACID properties, Phantom Read, Dirty Read).
This comprehensive preparation helped me confidently address both the coding and theoretical questions during the interview.