Microsoft SDE Intern Interview Experience
💼 LTIMindtree Interview Experience (On-Campus) | Fresher | 2026
Salesforce SMTS | Interview Experience | Rejected
JPMC | SDE2 (Associate) - Java Backend - Interview Experience + Compensation
Microsoft - SDE2 - Coding Round
Amazon SDE 2 (Interview Experience)
Summary
The candidate describes their interview process for an SDE 2 role at Amazon, which included an Online Assessment, two coding/LLD rounds, and a final HLD round with the hiring manager. Despite multiple rounds and taking preparation time, the candidate ultimately received a rejection email.
Full Experience
Current Experience: Product based Applied via a LinkedIn job post shared by a recruiter, Got OA link on the after 1 week.
✅ Online Assessment (OA) Date: 25th May 2025 1 Leetcode Medium and 1 hard coding questions in 90 mins Followed by scenario-based System design questions + Behavioural questions
Question: The developers at Amazon IAM are working on identifying vulnerabilities in their key generation process. The key is represented by an array of n integers, where the th integer is denoted by keyli]. The vulnerability factor of the array (key) is defined as the maximum length of a subarray that has a Greatest Common Divisor (GCD) greater than 1. You are allowed to make a maximum of maxchange modifications to the array, where each modification consists of changing any one element in the array to any other value. Given an integer array key and an integer maxChange, find the least possible vulnerability factor of the key after making at most maxChange changes. Note: The length of an empty subarray is considered to be zero. Example key = [2, 2, 4, 9, 6] maxChange = 1
Got the call for interviews after 1 week and i ask one week for preparation.
Round 1 and 2 happened in same day without break, time like 12-1 and 1-2.
🔹 Round 1 – Coding (With SSE) LP Focus: Deliver Results, Learn and Be Curious LP Questions: Tell me about a time you worked in a new technnology Tell me about a time when you handle a project fully owned by yourself
Able to solve only one question, no time left so, he didn't ask any other question
Simillar type of question but need to return largest string: https://leetcode.com/problems/concatenated-words?envType=problem-list-v2&envId=trie
🔹 Round 2 – LLD (With SSE) LP Focus: Insist on the Highest Standards, Have Backbone; Disagree and Commit LP Questions: I didn't remember the questions
LLD Question : Design stackoverflow system
Mostly focus on post part, what i can use in post for e.g voteUp button, best Answer, comments, feedback etc.
Didn't go well. interview helped me a lot.
Got a recuriter call same day to ask availabilty for HM- round(HLD)
I didn't prepare for any HLD and it's my first time. So, i ask one week for preparation.
After one week interview scheduled.
Recruiter told me before interview, your LLD interview didn't went well. So, if you got good feedback from this round then we go forward for another round.
🔹 Round 3 – HLD (With Hiring Manager) LP Focus: Earn Trust & Ownership LP Questions: I didn't remember questions, but he ask me question for 30 mins only about my project and another scenarios.
Design Sync bookmark system,
like if a user bookmark a website in laptop and then if user open browser in Mobile, user can see that same bookmark on that.
Received a Bluescape whiteboard link beforehand, but that didn't work. So, he told me to use any other site, i use excalidraw
clarified requirements, spoke out my thoughts then drew a design diagram Ask many question DB, which, why, is it good to use two different DB? also discuss the flow of the design. when user login in new device, how the flow will happened.
I call recruiter after the one day. she didn't pick-up. i tried after one week for feedback, but she didn't pick the call.
After one week got rejection mail 😒 😔
Interview Questions (6)
The developers at Amazon IAM are working on identifying vulnerabilities in their key generation process. The key is represented by an array of n integers, where the th integer is denoted by keyli]. The vulnerability factor of the array (key) is defined as the maximum length of a subarray that has a Greatest Common Divisor (GCD) greater than 1. You are allowed to make a maximum of maxchange modifications to the array, where each modification consists of changing any one element in the array to any other value. Given an integer array key and an integer maxChange, find the least possible vulnerability factor of the key after making at most maxChange changes. Note: The length of an empty subarray is considered to be zero. Example key = [2, 2, 4, 9, 6], maxChange = 1
Tell me about a time you worked in a new technnology
Tell me about a time when you handle a project fully owned by yourself
Similar type of question but need to return largest string. (Referenced: https://leetcode.com/problems/concatenated-words?envType=problem-list-v2&envId=trie)
Design stackoverflow system. Mostly focus on post part, what i can use in post for e.g voteUp button, best Answer, comments, feedback etc.
Design Sync bookmark system, like if a user bookmark a website in laptop and then if user open browser in Mobile, user can see that same bookmark on that. clarified requirements, spoke out my thoughts then drew a design diagram Ask many question DB, which, why, is it good to use two different DB? also discuss the flow of the design. when user login in new device, how the flow will happened.
Preparation Tips
Got the call for interviews after 1 week and i ask one week for preparation. I didn't prepare for any HLD and it's my first time. So, i ask one week for preparation.