The interviewer would like to know if you understand what it takes to keep on top of ordering medical supplies and inventory. Assure the interviewer that you are capable of foreseeing needs, and making the appropriate action. Highlight your ability to be responsible when it comes to related administrative tasks.
Nomura Research Institute Interview Questions
Have you ever been involved in ordering medical supplies, maintaining inventory, or other types of health care related administrative duties?
The interviewer would like to know if you understand what it takes to keep on top of ordering medical supplies and inventory. Assure the interviewer that you are capable of foreseeing needs, and making the appropriate action. Highlight your ability to be responsible when it comes to related administrative tasks.
"I have experience in ordering medical supplies and maintaining inventory. I fully understand that there is an art to being properly organized when it comes to the availability of supplies. For medical ordering and inventory, I have used a variety of software and programs such as ABC and XYZ."
"Yes. I used to do this in my former position. I was responsible for maintaining supplies on the general surgery ward for five years. It was great at working behind the scenes with the result being efficiency for others."
Describe a time you helped implement a new technology for your client. Did you encounter any challenges, and how did you address them?
Anytime you are introducing new technology to a client, you'll have your fair share of people who agree with you, and an equal amount of naysayers in that group too. This is an opportunity to talk about how you were involved in the process from start to finish, and where you encountered challenges, either with the software or personnel and what you did in a problem solver role to resolve those problems. If you look at it, the real purpose of introducing software to an organization is to improve the performance of a business. Give a couple examples of how you were able to get a consensus from department managers and their subordinates to move forward with the implementation. As you're going through these examples, be sure to mention how exactly they will be able to achieve their goals using the new software, and that you'll be able to bring value to the project immediately.
"I find that ultimately it's up to the client to make a final decision on whether or not they choose new software. It's up to me to provide all the necessary information needed for them to make an informed decision. There are many factors involved when evaluating new software. I'd like to provide some details about what goes into an evaluation and deployment of new software, and how challenges might be overcome.
1. Strategy and Technology Alignment - what are the goals of the organization, and how is the new software able to meet their business needs?
2. Is there Buy-in from senior leadership or stakeholders - Did management request to look at new software technology, or did it come from an external source?
3. Possible challenges that might come up - Is there anyone in the company that is against implementing new software, and why?
4. Will the new software integrate with existing technology infrastructure - Perform a system analysis to see if additional hardware is needed to support the new software?
5. Team training - How many people within all the departments will need training. My recommendation would be the train-the-trainer method.
6. Who will be maintaining the system once it goes live - Is there internal resources within the company with the proper expertise to maintain the system?"
"It is my belief that when a company is exploring the possibility of implementing new software, there needs to be alignment from executive leadership and everyone else that could be impacted by new implementation. This includes the strategic, operational, and tactical perspective of the company. Let me give you an example of how I was able to propose a new software and the approach that I took to address challenges.
1. I showed examples of what the Risk vs Reward would look like after the software was implemented.
2. I inventoried all existing software to see if there were any other software packages that could address current issues without having to buy new software.
3. I gave management a timeline of how long it would take to implement, and how much it would cost.
4. I provided a post-implementation plan that included support and maintenance so that they knew what to expect going forward, and that there weren't going to be any surprises."
Explain what the difference is between Data Mining and Data Analytics, and tell me how you have used both in your recent projects?
Data Mining and Data Analytics go hand In hand in the world of big data. Data Mining is used to find patterns among large datasets, while Data Analytics is used to test hypothetical models on particular datasets. Over a period of time, you acquire skills that companies see as valuable to their organization. It's these skills that set you apart in the market. As you hone these skills over time, you become good at many different soft skills that accompany the technical skills. Here's where you can use a combination of these skills to articulate a compelling message that explains the differences between Data Mining and Data Analytics.
A very important question that might come from an interviewer is how much data do you analyze, and how do you manage that data without risking a security breach. Large scale big data projects use tools like Hadoop as a repository for this data. The reason I mention it is the hiring manger might ask what repository you use to store it, and what your level of confidence using this tool is.
"Data Mining and Data Analytics data is compiled by a number of different sources throughout a company. This data comes into the organization in many different forms from different formats, platforms, media, etc. It comes in different shapes, sizes, and venues like social media, social activity reports, customer surveys, emails, weblogs, sensors and bots related to the Internet of Things. I take this data and put it in the correct silos of a data warehouse, then break it down into data points that have relevant and usable data that the business can understand and use it to make business decisions. I was responsible for a data mining project that needed data to calculate operational expenses within the marketing group. They needed to know what it cost the Marketing department to run lead generation campaigns, and what the customer acquisition costs were."
"To me, comparing and contrasting two things like Data Mining and Data Analytics is an exercise that I enjoy a lot. I'm very passionate about data in general. Let me give you an example of these two, and how I used them in my current and past projects. Let's examine the difference between the two, and my experience using both. The Data Analytics process goes into the following steps: Project Definition, Data Collection, Data Analysis, Statistical Analysis, Data Modeling, and Deployment. The Data Mining process is a little different. The steps are Problem Definition, Data Collection, Data Analysis, Statistical Analysis, Data Modeling, Verification and Validation, and Insights. Now for my experience: In a recent project, I collected data from our websites to look at patterns in user behavior and website traffic for all our pages. This data was helpful to the Search Engine Optimization team so they could focus on redeveloping pages that were getting inquires and orders."
Big Data can be an efficient tool to monitor and grow a business, but can have challenges if not properly implemented. What challenges have you encountered while working with big data?
Any implementation if not monitored and managed correctly can turn into a complete disaster. This is especially true of Big Data. When you're dealing with large volumes of sales data, customer data, even confidential data, it makes it that much more important to ensure that you mitigate risk at every level of the implementation process. Having prior experience with successful implementations in the big data space will give you a distinct advantage.
A hiring manager wants to hear about the challenges you had with past big data implementations. Managers know that implementations don't always go as planned, so they will be listening carefully to see if you own up to your mistakes or blame others for things that go wrong. It goes without saying, but you never badmouth your company, subordinates or colleagues. A good way to turn this question around is to give an example of a big data implementation that didn't go as planned, but that you were able to get it back on track by re-evaluating the process, the requirements and your team's ability and experience to get this implementation completed successfully.
"I have used Business Intelligence tools like ETL, Informatica, Tableau, QLIK, and Power BI. These tools have helped me shape my knowledge base and career path over the years. I enjoy working with data because it's fun to work with, and I get enjoyment out of it. It has been my experience that big data doesn't always work as advertised. I did have some set-backs on a couple of projects that I managed, and the way I was able to resolve some of the impending issues was I had to re-assess the overall situation, and after doing that, was able to figure out that there was miscommunication between team members and the understanding of the final delivery of the implementation. The issue was the data wasn't being analyzed thoroughly enough to use it as accurate data for the business."
"A lot of technologies are used simultaneously in the implementation process of a big data project. One area that can't be overlooked is storage. My experience with implementations is that if you have the right infrastructure in place like software-defined storage, compression, duplication, and tiering; it can reduce the amount of space and costs associated with big data implementations. If you don't have these in place before you start the implementation, then you're setting yourself up for failure. I was involved in a project that was delayed for a few reasons. One was that the data wasn't validated, another reason was we were working with disparate data sources, and lastly, we came across organizational resistance (Insufficient alignment and lack of middle management understanding)."
When dealing with data, in your opinion, is it better to have too many false positives, or too many false negatives? Please explain.
There has been much discussion and speculation about false positives and false negatives, and not all data scientists are in 100% agreement with what is interpreted as a false negative and false negative. Let's say for example you were diagnosed with not having a disease, but after numerous tests, it was verified and confirmed that the disease was in fact still present. That would be considered a false positive. If on the other hand you were diagnosed with a disease, but found out later that you didn't have a disease, which would be considered a false negative. In this type of interview situation, the hiring manager is looking for two things. Your opinion and explanation about false positives and false negatives when it comes to dealing with data management.
Data results can be misleading at times, and you need to be able to explain why this is the case, and in your opinion how the data is viewed negatively or positively based on whatever tests were run to arrive at the result from the data. It would help to offer your perspective to the interviewer on the way you determine whether you think it's better to have too many false positives or too many false negatives to sort out.
"The way I approach false negatives and false positives is to form a null hypothesis which leads you to try and reject it, thus giving me a positive result. I know that data scientists don't like the notion of swapping hypothesis, but they do give us situations where arriving at a false negative is not ideal. I've heard cases where false positives have had bad outcomes because of how the data was analyzed. Everything is not so Black and White. There are examples that have a hypothesis that cannot be switched due to the nature of science and law, which shows that errors are interchangeable. It comes down to how you design and research your study."
"Although false positives and false negatives have been debated on probably every topic available, it has been my experience that having too many false negatives over false positive results have been better for our work environment. Especially when you're dealing with something as sensitive as data. There are times when I run QA or validation tests on data, and depending on what we're looking at, we could get a false positive or false negative. That's why having too many false negatives helps weed out the false positives."
Many companies are new to the cloud computing environment. How do you brief them about what security aspects come with a cloud?
The interviewer is testing your knowledge of security measures associated with the cloud environment and your ability to help customers manage their company's cloud.
Knowing how to advise Nomura Research Institute's clients on the benefits of the cloud, specifically on security issues, will be a huge selling point for you landing the job.
"Cloud environments can be as secure as computing environments hosted on-premise based on two key attributes. These are Authentication and authorization, and Control of access. Authentication allows only those users who are authorized to access the resources hosted in the cloud. These include data, applications, and storage. Control of access is a system administrator tool which enables them to allow or deny access to specific users. Together, these tools provide a safe and secure cloud environment."
"There are two control mechanisms which keep hosted cloud compute environments safe and secure. These are Authentication and authorization, and Control of access. Authentication and authorization prevent unauthorized parties from accessing a company's data and applications. This is also known as 'Hacking." Control of access is the methodology system administrators use to provide authorization to known users. By only allowing authorized users to enter the system and then requiring them to authenticate themselves, companies can be assured their data and other computing resources are safe from theft and misuse."
The way we approach clients in our business is we identify client needs and recommend solutions to their needs. Tell me about a time when your knowledge and expertise allowed you to make a recommendation to resolve a problem or address a pain point?
The is a classic example of the hiring manager asking you to role play your response. The way it works is the hiring manager asks you to role play as the consultant, and he/she is the client who asks you to give them a pitch about why your company is a firm that they need to work with. There are a few ways to make this role play work in your favor. Here are a few examples you can use in a response. 1. Act as a problem solving adviser that can find and recommend solutions quickly, 2. Tell the client they have accessibility to you and other team members as needed, 3. Point out the benefits that they will get when they hire your company, 4. Share some examples of successes from companies of a similar industry, size or market.
"I've been a firm believer that the customer is always our highest priority and that I need to be the eyes and ears of the customer. With that said, there some examples I can share that will hopefully resonate with you. I typically ask what solutions have been proposed in the past, and how they have worked. Are there metrics to track the success or failure of past efforts? Having data to review helps me understand the process and approach previously used. Knowing the team makeup, and what methodology they used will also give me a deeper insight into what they were thinking. I like to conduct a voice of the customer survey, which I believe adds tremendous value to this campaign. Lastly, it's important for me to analyze the cause & effect relationships from the customer surveys, because It reveals a lot of underlying issues like task failures, root cause problems, and how good or bad the data is."
"My recommendations would be based on what the customer wants and how well they articulated the deliverable. If, for example, the client wanted something that resembles a ketchup bottle, but the team delivered a salt shaker, that would indicate a miscommunication of what the client requested. My approach would be to closely dissect the customer requirements, then build a mock-up of what they requested, and have them review for approval before going to the next phase of development. After this phase is approved, I would do testing and debugging before presenting it to the customer. Mapping the customer journey is a visualization process a customer goes through and tracks each step along the way with the vendor, so everyone is on the same page."
Since you are interviewing for a position in which you will make recommendations to customers about protecting their company's network, I'm curious about what you do to protect your own network at home.
This is a 'trick' question which many applicants won't expect. You need to be prepared for this and should answer it honestly.
If you do not protect your own home as you would a client's network, then suggest to the interviewer the main reason being is that you don't work from home.
"That's a great question and one I've never been asked before. I take my family's security as serious as I do that of the companies I work with. My home network has all the same security measures I recommend to my customers at work. These include a strong firewall, user authentication, access control, and frequent audits. I also upgrade my network hardware, such as routers and NICs periodically as new security features are released."
"Funny you should say that. Many of the practices I recommend to secure a company's network I learned while setting up my personal network. These include using the latest versions of the network hardware and software with the most current virus protection, maintaining a strong firewall, and implementing strong user authentication, or passwords, which are updated frequently. I also monitor the network traffic on my home system to determine if any threats exist. To date, I have discovered many attacks on my system from sources around the world, but so far none of them have been successful at breaching my network."
How can Nomura Research Institute motivate you on the job?
Every employer should know how each staff member is best motivated. Talk to the interviewer about the variety of ways in which you find motivation on the job.
"I am best motivated through words of praise and recognition for a job well done. I do like to know that my efforts are noticed. In my current position, we have a leaderboard and I do like that concept because it creates a healthy bit of personal competition for me as well."
"I am very much self-driven and self-motivated. As long as I am being treated with respect and feel appreciated, you will get the best work from me."
We're a company of innovative thinkers; we rely upon our innovative thinking to solve client problems. Tell me about a time when you came up with a breakthrough idea that was not obvious to others. Describe your idea and how you developed it?
Innovation is the cornerstone of any successful company. If you show me a highly successful company, I will show you people within that company that were innovative thinkers. Great examples are Steve Jobs from Apple, Bill gates from Microsoft, and Jeff Bezos of Amazon just to name a few. The hiring manager is posing this as a two-part question to see if your response is clear, concise, and related to the question. Stay on point with your response, because that's what they're looking for. Think about this question for a minute to dissect what they are asking. They are a company of innovators.....which means, will you fit into their culture and be able to come up with ideas that will be innovative. They will be listening attentively to how you articulate your message about your breakthrough idea. Walk them through how you came up with the idea, what your thought process was, how you got approval to move forward, and how you executed on the idea.
"I've always considered myself an Outside the Box thinker. Settling for the norm has never been my working style. I always work with the expectation that my idea will serve many purposes, and bring value to our customers. One example is when I came up with an idea to train the trainer at multiple locations via remote video conferencing. This idea was well received, and was implemented at over 50 locations worldwide. I came up with the idea because I was responsible for training multiple divisions and didn't have the budget to fly everyone in from multiple locations for the training sessions."
"I was working on implementing a friendlier looking graphical user interface solution for a financial services client. The inspiration came from the feedback I received from people at the client site complaining about processing transactions on a mainframe computer that wasn't much fun to work with or look at. They were used to the dreaded Green Screen on a mainframe, but my solution had a Windows look and feel which they liked quite a lot."
Your customer wants you to explain the benefits of the Big Data model you developed, how do you communicate the insights they can use for their business?
Everywhere you look in corporate America; you will find Big Data. It's fast becoming one of the most important facets of a business's operation. Big Data is used for data analytics and data management. If you want to know if your company is profitable or losing money, big data analytics can provide that. If you want to see what product sold best in a specific region of the country or world, big data analytics can provide that information. It's like having a dashboard with multiple screens in one that shows the performance of your company, people, processes, etc. Everyone talks about this concept, but very few can articulate the benefits of big data and how it can help a business. This is especially true for data consultants who are new to big data. Depending on the level of experience that you have, one of the most important areas that you should focus your response on is highlighting the insights that the customer is going to realize when they implement a big data solution.
The interviewer is interested in hearing about how you present benefits to the customer in a way that connects with the customer's pain and adds value to the company. Effective communication is key here. They might ask for a hypothetical scenario where you clearly presented a case for big data and it's benefits. It would help to mention that they would be able to calculate metrics for data gathered from multiple sources like social media, customer profile data, company website, etc.
"My expertise has been in Data Analysis, so Big Data to me was a pretty flat and easy learning curve. When you're working with large volumes of data, you need to make sure that the data is scrubbed (clean) so that the information can be interpreted by the organization so they can use that data to make better business decisions. I was able to do this by using data warehouse applications that broke down the data in smaller manageable groups that had relevant information about each customer or prospect. Based on my knowledge, there are a lot of benefits that a company can get out of big data. Here's a short list that I have compiled based on my experience:
1. Ability to acquire, extract, modify, analyze, and blend the data with various business intelligence tools in order to get the information you need to run your business.
2. You can evaluate risk by a portfolio of products or services.
3. Be able to customize customer experiences.
4. You can identify important information or performance data to improve decision making.
5. Real-time forecasting and monitoring across company-wide locations, divisions, and business units.
6. You can monitor sales and marketing campaigns, and track customer purchasing habits."
"In years past when I worked with data management tools, it was systems like ETL and Data Warehouses that I used to compile and structure data that the business could use. These were typical Business Intelligence solutions at the time, but they weren't as robust as they are now. My responsibility was to extract and cleanse data so I could present it in a way that was easy to understand to a non-technical person. Having a strong analytical background helped me to analyze different forms of data so I could optimize and index data structures in order to present the many benefits that big data has to offer."
Can you give me an example of some of the widely used cryptographic algorithms, and how they work?
Cryptographic Algorithms put simply, is math however you look at it. It's broken down into three cryptography terms that make up its cryptosystem. The first one is Brute Force Attack. The second one is Encryption Key Sizes, and the third one is Block sizes.
There are also Cryptographic Algorithms that follow encryption and decryption security standards. In this line of interview questioning, Nomura Research Institute wants to test your knowledge of cryptology as a whole, and dive deeper into your experience about the different algorithms, and how they work together.
A good example to use is to illustrate the relationship between cryptography and its algorithms, and talk about the structure and architecture between the two. This would be best illustrated on a white-board if they have one available. It's also important to demonstrate a list of algorithms that work in unison with cryptography so they can see where the relationships take place. This will undoubtedly show the interview your level of competency in this area.
"I find that working with different algorithms gives me a broader array of skills and experience that I can use in a new position. Given that cryptographic algorithms are a strong suit for me, I tend to excel in roles where I am challenged to find solutions to problems in this area. My hands-on knowledge of algorithms includes examples like RSA Algorithms, Blowfish, Twofish, AES, Serpent, and MARS. All of which have heavy decryption capabilities in different ways such as reverse decryption algorithms, bit blocks, and block ciphers."
"One of my strengths has always been math, so learning cryptography and algorithmic math came relatively easy for me. It was a natural progression to navigate into cryptography and working with algorithms and Blockchain technologies as a whole. Since this is an area of tremendous growth, I plan to take my career in this direction. Working with different technologies is exciting since I need to be challenged to excel in my role. One of the things I find interesting and challenging is working with Symmetric Key Algorithms. They are known as the secret key algorithm, which is used to encrypt and decrypt files."
As I understand it, the network is the most vulnerable part of a company's IT infrastructure. What is your opinion of this and how would you define the threat and risk to a company in terms of network security?
This is a 'set the table' question which provides the interviewer with an overview of your knowledge of and perspective on network security.
"The network infrastructure is the most vulnerable part of the IT system because it is the easiest part to access. Since all the company's data is transmitted via the network, hackers focus on this to get the data for malevolent uses. This is the threat to the system. The risk is the company's responsibility to secure their users' and customers' information or be subject to fines, injunctions or even shut down. Measures need to be taken to minimize both the threats and the risks related to network security. I am well versed in these and can expound on them if you would like me to."
"I agree with you that the greatest threat to a company's IT infrastructure is the network. Hackers target the network because it is the easiest part of the system to access and because all the data is transmitted over the network. It's the data that hackers want and can cause the most disruption with. The risk to the company if the data is compromised is the loss of business, fines and injunctions and the possibility of being shut down. While the threat associated with network security will always remain, the risk can be minimized through prudent network security practices and procedures."
At Nomura Research Institute we seek to hire individuals who have ambitions of growing their career. Where do you see yourself in 3-5 years?
Every hiring manager would like to know that their investment of time and training will pay off. Assure the interviewer that you see this position as a long-term fit. How does this role with Nomura Research Institute fit into your longer-term plans?
"In 3-5 years I would like to see my career with Nomura Research Institute include a path towards a leadership role. I am very keen on paving a long-term career in the healthcare services realm and would love the opportunity to do that here."
"One of the attractive points of working for Nomura Research Institute is that you care about the growth of your employees. I'm motivated to learn and am looking for a long-term fit. In 3-5 years I'd like to be grounded in the clinic, learn about this site, your patient base and earn certifications that would help the unit advance. Personally, I'd like to get involved in some of the local volunteer organizations. I speak Spanish, and I have an interest in urban outreach so it would be nice to do something formal in that context...health-education or fundraising."
Describe some of the benefits of how edge computing addresses privacy and security issues companies may face.
Edge computing is considered a revolutionary method to optimize cloud computing, but some challenges should be taken into account. The two most important are Data Security and Privacy. These two topic areas will come up in an interview, because the interviewer is interested in how you describe the benefits of Privacy and Security in an Edge computing environment. They will want to hear things like the way you utilize wireless sensor networks, peer-to-peer networking, mobile data acquisition, grid/mesh computing, mobile signature analysis, distributed data storage, etc. These are all areas that touch on Privacy and Security of the network architecture. You can highlight a few entities that you have worked on yourself, and how they are benefited your organization.
"In my previous role, I used several methods to optimize cloud computing (Edge Computing) for tackling network bottlenecks and latency issues. One of the most notable was when I applied advanced security mechanisms to the Edge computing network which resulted in a robust system design that prevented information leakage and misuse. I also applied privacy-enhanced cryptographic techniques, authentication auditing, intrusion detection, access controls, as well as Software Wide Area Network (SW-WAN) that further strengthened our edge computing systems. These were just some of the benefits that were realized after incorporating these technologies and techniques into our system."
"I have found that when working with security and privacy, it does present some challenges, but with proper planning and execution, you can realize some significant benefits. One example is using sensors to collect data from smart devices, and applying mobile user authentication and authorization for security protection which enables a high-level view of how that data is collected and authenticated. Using this technique can also work for secure mobile and wireless application development as well."
IT projects rely on teams and each other to succeed. Describe a scenario were you lead your team to a successful outcome?
In your opinion, what is the best way to build a private Blockchain network in an organization?
Can you explain the impact edge computing has on a company's network and why this is important?
A client wants to implement a new software system that was recommended by a different division of the same company. How do you evaluate it to ensure it's the right choice?
Do you have a Real Estate License or Broker's License?
Listening to our clients is absolutely essential to understanding their business and technology needs. Tell me about a time when you're listening skills helped exceed their expectations in the delivery of the project?
There have been several virus attacks recently, what have you done to protect your organization from these cyber attacks?
In the healthcare services industry there are many emotions in a day. Have your emotions ever been in the way of your productivity?
There are times when you need to consider a broad range of options before recommending a solution. What was the situation, and did the solution help the client?