Skip to content

Senior Security Analyst

On-site
  • Dubai, Dubai, United Arab Emirates
MSS - Cyber Defense

CV or resume

Upload your CV or resume file

Upload a file or drag and drop here
Accepted files: PDF, DOC, DOCX, JPEG and PNG up to 50MB.
My information

Fill out the information below

Upload a file or drag and drop here
Accepted files: PNG, JPG and JPEG up to 20MB.

Upload your cover letter

Upload a file or drag and drop here
Accepted files: PDF, DOC, DOCX, JPEG and PNG up to 50MB.

Questions

Please fill in additional questions

What is your availability / notice period?
Are you open to relocate ?
Which of the following port and IP address scanner famous among the users?
Which one of the following statements is correct about Email security in the network security methods?
Which of the following statements is true about the VPN in Network security?
Which of the following malware's type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.
________ is any action that might compromise cyber-security.
In a _____________ attack, the extra data that holds some specific instructions in the memory for actions is projected by a cyber-criminal or penetration tester to crack the system.
A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.
Which of the following is not a type of scanning?
An algorithm in encryption is called _____________.
Which of the following Algorithms belong to symmetric encryption?