Security Consultant / Resident Engineer - Security Assistance Center, UAE

Job Description

The candidate will be responsible for the proper and accurate handling of support requests of Help AG’s customers. He/she will receive requests by Email and Calls and handle those according to Help AG’s support workflow including:

Internal and external escalation;
Continuous communication with the customers;
Providing solution scenarios;
Proper and accurate use of tools (Ticket System, Time Tracking) and documentation of the tickets;
Follow-up on any escalations in time.
The primary measurement targets for this position are customer-satisfaction, professionalism, accuracy and an outstanding high quality in the work/duties.

Experience

At least 5 years of progressive experience in larger-scale organizations on customer side as a support engineer or similar roles, ie. in a service desk environment

Skills and other preferences

Bachelor’s degree in information security or IT-related matter or equivalent experience
Deep understanding of technical relations in a complex environment
An advantage to have experience and the highest certifications of the vendors Microsoft, Juniper, Blue Coat, RSA, Ironport, F5, Symantec/PGP, BalaBit PaloAlto, Infoblox, Sourcefire, CISCO )
Excellent and accent-free communication skills in English (Arabic an advantage)
Proper and structured documentation and diagramming
Excellent organizational skills in enterprise support
Understanding of information security concepts and related technology
Strong background and experience in TCP/IP networking of large-scale organizations
Flexible work approach, based on the job requirements
Able to identify new work areas and to set new goals for themselves
Excellent communication and training skills
Outstanding customer handling, friendly and goal-oriented
Ability to communicate / translate to Customer-level
Able to understand complex business processes and activities

**************************************************************************************************************************************************
PLEASE MAKE SURE TO COMPLETE FULL SURVEY AND PRESS DONE BUTTON IN THE END OF THE LAST PAGE OF THE SURVEY. THANK YOU!

Question Title

* 1. Enter your name.

Question Title

* 2. Enter your e-mail address.

Question Title

* 3. Enter your mobile phone number.

Question Title

* 4. Upload your CV

DOCX, DOC, JPEG, GIF, JPG, PDF, PNG file types only.
Choose File
No file chosen

Question Title

* 5. Native Arabic Speaker

Question Title

* 6. Have you been working in enterprise support for external customers with customer company size > 500 employees

Question Title

* 7. Are you based in the UAE already?

Question Title

* 8. Total number of years of professional experience?

Question Title

* 9. Which OSI layer header contains the address of a destination host that is on another network?

Question Title

* 10. Which of the following are Symmetric Encryption Algorithms

Question Title

* 11. Who issues the PASV command in Passive FTP?

Question Title

* 12. Which transport layer protocol provides best-effort delivery service with no acknowledgment
receipt required?

Question Title

* 13. How does a switch differ from a hub?

Question Title

* 14. Which protocol uses a connection-oriented service to deliver files between end systems?

Question Title

* 15. Which IP in F5 Device  monitors the Backend Servers in HA environment

Question Title

Answer the below questions

Answer the below questions

Question Title

* 16. Answer the following

Question Title

Image

Question Title

* 17. Refer the above exhibit
A network device needs to be installed in the place of the icon labeled Network Device to accommodate a leased line attachment to the Internet. Which network device and interface configuration meets the minimum requirements for this installation?

Question Title

Image

Question Title

* 18. Refer the above exhibit
PC is trying to communicate with printer, IP addresses are shown in diagram, all Single lines between devices are Ethernet CAT6 cables, PC is not able to send a print job to printer, User suspects an issue in the network, what could be the problem

Question Title

* 19. Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address?

Question Title

* 20. F5 Application Security Manager has inbuilt anti-virus capabilities to scan files and block malicious files

Question Title

* 21. While using a Proxy in the network, what is the destination-ip seen by the proxy in the request?

Question Title

* 22. For IPSEC VPN troubleshooting, if the VPN initiated by site-A to site-B is not establishing, which is the best place to look for error logs?

Question Title

* 23. Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets?

Question Title

* 24. What is the purpose of assigning an IP address to a switch?

Question Title

* 25. User accesses https://website.com is getting “Untrusted Certificate Warning”, What are the possible causes for this, select all that apply?

Question Title

* 26. The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router. No routing protocols or other static routes are configured on the router. Which statement is true about this command?

Question Title

* 27. How does TCP differ from UDP?

Question Title

* 28. What does a router do when it forwards a packet?

Question Title

* 29. Which options will help to solve the problem of a network that is suffering a broadcast storm?

Question Title

* 30. Which Protocol is used by IPsec Suite for Encryption?

Question Title

* 31. SSL Handshake is based on what type Cryptography method?

Question Title

* 32. In Which Proxy Deployment does the Proxy see actual Destination Server IP address in the Incoming Client Request?

Question Title

* 33. For the given IP address 192.168.1.6 can you determine the subnet mask.

Question Title

* 34. Rate your knowledge on below vendors from a technical perspective.

  Excellent Good Average None
F5 Networks
Fortinet
Cisco Systems
PALO ALTO
Splunk SIEM
Symantec
JUNIPER
INFOBLOX
RANDOM ACCESS MEMORY

Question Title

* 35. upload your vendor certifications

DOCX, DOC, JPEG, GIF, JPG, PDF, PNG file types only.
Choose File
No file chosen

Question Title

* 36. Rate your technical expertise skills on the below software.

  Excellent Good Average None
Windows 7
Microsoft Exchange server
Microsoft Active directory
VM ware ESX
PAN OS
TMOS
Wireshark
Phobos

Question Title

* 37. Select what fits you the best (multiple answers possible).

I am carrying out my day-to-day-work...

Dear Applicant,
Thank you for taking this exam. We review the results on a weekly basis and will get in touch with you to request your CV in case we've decided to go ahead with your application. Please do not send your CV to Help AG without our request. Job applications for the above position are processed on the basis of successful completion of the exam only.

Kind regards,

Your Help AG Recruiting Team

T