Skip to main content

匿名分享一下阿里巴巴西雅图新site的面试过程:

http://gengwg.blogspot.com/

匿名分享一下阿里巴巴西雅图新site的面试过程:

猎头帮我联系。然后总共五轮,一轮screen,三轮技术,最后有个和其他科技公司都不
一样的HR主管的半个多小时聊天。

screen和前面三轮技术面试跟其他美国主流科技公司面试完全不一样。基本都是非常露
骨得打听任何我现在公司(美国top几个公司之一)他们关心的项目的情况。问出的问题
包括,现在一些前沿项目的开始时间,预计需要时间,团队人力配置,一些他们想过但
是估计还没想通的技术架构。谈话中如果有一些发散,比如发散到和应聘职位无关的项
目上,面试者也会立即开始问题到项目的情况,尽量多的搜集信息。有时面试官直接把
自己的笔记拿出来,上面记的一些他研究的美国大公司技术里面他们不懂的细节,直接
对着你问。也会问一些对一个技术方向商业价值的理解。

问的问题非常关心最热门的前沿项目。我有朋友做的比较成熟的项目,问过一轮就据了
。感觉问题也问不深,前因后果大概清楚,不需要上手那种知识,总体就能过。

我被拒了的朋友,也问了很详细的关于他们正在进行项目的情况。感觉这样阿里巴巴很
赚啊,不招人也能得到很多情报。

有三轮技术面试里面有一小半到一大半不等的时间会问问coding。大概平均是亚马逊
sde2面试的难度。

最后是跟阿里云的HR主管半个多小时的聊天。HR主管话姿态和气场和其他IT公司面试过
程只露个脸的HR/recruiter不太一样,有点真正主人的味道。聊天还明示了阿里巴巴会
很忙,不像美国IT公司那么悠闲。呵呵。

Offer package还是非常不错。大概是比美国几个主流公司对应级别高30%。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...