CrowdstrikeJobs
I have a mature security stack built around CrowdStrike, Google SecOps (Splunk in some environments), Qualys, and a TIP layer that alternates between OpenCTI and MISP. What I need now is hands-on expertise that ties all of these platforms together: • Craft high-fidelity detection logic inside CrowdStrike and Google SecOps/Splunk, mapping each rule to MITRE ATT&CK and my own use-case catalogue. • Proactively hunt in both the EDR and SIEM data to validate those detections, surface hidden threats, and document repeatable hunt queries. • Integrate threat intelligence feeds into the TIP and push the relevant IOCs, TTPs, and context back down to CrowdStrike and the SIEM so automation can enrich alerts in real time. • Correlate Qualys vulnerabil...
I need my CrowdStrike console fully configured for Exposure Management with the focus on Attack Surface Reduction. The goal is to gain a clear, actionable view of vulnerabilities across our endpoints, network devices, and cloud infrastructure, then apply the right controls so the overall attack surface noticeably shrinks. Scope of work • Turn on and tune CrowdStrike Exposure Management modules required for Attack Surface Reduction. • Bring endpoints, network devices, and all current cloud accounts under unified visibility. • Map the discovered findings to practical hardening steps inside the platform (policy tweaks, device groups, real-time response scripts, etc.). • Produce concise documentation that shows what was enabled, key settings, and next...
I need a hands-on build that connects ArmorCode to CrowdStrike so I can see CrowdStrike events inside ArmorCode and automatically act on them. The connector must let ArmorCode use its Vulnerability management, Compliance tracking, and Security automation modules while pulling real-time data from CrowdStrike’s Endpoint protection and Threat intelligence APIs. Here’s the flow I’m after: CrowdStrike detects an endpoint alert → the integration pushes that alert into ArmorCode → ArmorCode correlates it with open vulnerabilities or compliance gaps → automated remediation or ticketing is triggered back to my ITSM. Bi-directional status sync is essential so nothing falls through the cracks. Please use native ArmorCode and CrowdStrike...
I want to get EASM data and other vulnariblities data from Exposure Management to armcode
...estate—specifically all employee workstations, desktops, and several business-critical on-prem servers. Your day-to-day work will center on spotting malicious behavior early, tuning alert logic to cut false positives, and feeding concise intelligence back to my internal IT team so we can respond fast and decisively. You’ll have direct access to our existing SIEM and EDR stack (Splunk and CrowdStrike), plus the freedom to recommend additional tooling or rule sets where you see gaps. Key outcomes I need: • Real-time, high-fidelity alerts for endpoint threats • Clear incident tickets with root-cause notes and containment steps • Weekly trend reports highlighting patterns, MITRE ATT&CK mapping, and any policy tweaks you suggest Success for ...
I want to get EASM data and other vulnariblities data from Exposure Management to armcode
...incident generated in Crowdstrike into a well-structured JIRA issue. For each incident the integration must pull over: • the original incident description • the severity level exactly as reported by Crowdstrike • the precise timestamp of occurrence Once in JIRA, issues have to be grouped by type of incident so our team can triage and report on them quickly. The job is complete when: 1. Incidents flow into the chosen JIRA project without manual intervention. 2. All three data fields map cleanly and display in their own JIRA fields. 3. Issues automatically land in the correct incident-type swim-lane or board column. 4. A concise setup guide is provided so we can maintain or replicate the connection in other environments. You are free t...
...surface and enhancing the CIA triad. Please share some resources or links for further learning in cybersecurity. • Additional information and tips: 1. 1. Consider the use of tools such as PowerPoint, Prezi, Canva, Animoto, etc. to make your campaign more engaging and appealing. 2. For the research part, make use of online resources, such as the Verizon Data Breach Investigations Report, the CrowdStrike Global Threat Report, the MITRE ATT&CK Group's page, etc., to find out what types of attacks are most prevalent and impactful in your domain. You could also use some examples or case studies of real incidents or breaches that illustrate the severity and cost of cyberattacks. 3. When teaching your colleagues about protecting themselves from cyberattacks, be sure to...
...consegna sarà considerata completa quando i test di carico simulati (traffico DDoS), le scansioni di vulnerabilità e un penetration test indipendente dimostreranno un tasso di successo pari a zero per intrusioni non autorizzate e infezioni malware entro il perimetro definito. Strumenti a titolo indicativo (sono aperto a proposte equivalenti): Cloudflare, AWS WAF / Shield, Suricata o Snort, CrowdStrike, Grafana + Loki, Terraform per l’IaC. Preferisco milestone progressive: architettura, implementazione, hardening finale, test e documentazione....
...cloud workloads—so the design must collect and correlate telemetry from both sides without gaps. Core technologies are already chosen: a SIEM for log aggregation and correlation, network-based IDS/IPS for east-west and north-south traffic, and an Endpoint Detection & Response platform for host-level visibility. I’m open to specific vendor recommendations—Splunk, ELK, QRadar, Suricata, Snort, CrowdStrike, SentinelOne, etc.—as long as they integrate cleanly and can scale. To keep expectations clear, here’s what I need delivered: • A high-level SOC architecture diagram, bill of materials, and implementation roadmap. • Installation, configuration, and tuning of the SIEM, including log onboarding from firewalls, servers, SaaS services, ...
...platforms. They will need to install on virtual machines within the AWS cloud, physical machines the contractor has access to of both Apple & Windows systems. The final output will include a detailed Word report with key insights and a PowerPoint slide deck with screenshots of dashboards. Scope of Work: 1. Tool Selection & Setup Collaborate with us to finalize a list of cybersecurity tools (e.g., CrowdStrike Falcon, Qualys VMDR, Tenable, Microsoft Defender, Axonius, etc.) Procure trial licenses and coordinate with me for product access Configure a secure testing lab environment (cloud and on-prem) 2. Hands-On Testing & Evaluation Install and configure each tool Test core functionalities: threat detection, vulnerability scanning, asset discovery, endpoint protection,...
Conduct a combination of initial setup, environment review, standardized template creation, validation of previous testing, quarterly secondary research, and quarterly report creation.
...software license & IT solutions hub. • Provide an intuitive, B2B/B2C-friendly buying journey. • Offer advanced filters, search, and cross-linking to multiple company portals (Main site + Hardware site). • Support scalability, SEO, and promotions. 2. Pages & Design (UI/UX) A. Homepage (Landing Page) • Hero Banner / Slider: Highlight key vendors & products (Microsoft, Palo Alto, Trend Micro, CrowdStrike). • Featured Categories: Endpoint Security, Cloud Licenses, Server Licenses, Productivity Tools. • Vendor Showcase Section: Vendor logos with click-through to vendor-specific pages. • Promotional Banners: Dynamic offers, discounts, trending products. • Trust & Security Elements: SSL badge, certifications, support ...
Hello, We are looking for an experienced trainer to deliver a short-term training project on "CCFA (CrowdStrike Certified Falcon Administrator)". Responsibilities: - Conduct focused training sessions on CCFA (CrowdStrike Certified Falcon Administrator) - Create or adapt training material as required - Provide hands-on lab guidance (if applicable) Requirements: - Proven experience in CCFA (CrowdStrike Certified Falcon Administrator) - Prior corporate training experience preferred - Ability to deliver training effectively within a short-term timeline To Apply, Please Share: - Updated CV / Profile - Course contents (TOC) - Daily / Hourly commercial rates - Lab availability & charges (if applicable) - Your availability schedule Looking forward to collabo...
Hello, We are looking for an experienced trainer to deliver a short-term training project on "CCFA (CrowdStrike Certified Falcon Administrator)". Responsibilities: - Conduct focused training sessions on CCFA (CrowdStrike Certified Falcon Administrator) - Create or adapt training material as required - Provide hands-on lab guidance (if applicable) Requirements: - Proven experience in CCFA (CrowdStrike Certified Falcon Administrator) - Prior corporate training experience preferred - Ability to deliver training effectively within a short-term timeline To Apply, Please Share: - Updated CV / Profile - Course contents (TOC) - Daily / Hourly commercial rates - Lab availability & charges (if applicable) - Your availability schedule Looking forward to collabo...
...real risks lie. From there, I want concise, prioritized recommendations and hands-on help putting the most critical controls in place. Because our exact environment and policies will be shared after kickoff, I’m looking for someone comfortable adapting to a range of scenarios—on-prem or cloud, Windows or Linux, proprietary or open-source tooling. Whether you prefer Nessus, OpenVAS, Burp Suite, CrowdStrike, or another well-known platform, please explain why it fits and how you will keep costs reasonable while meeting industry best practices. Deliverables I expect at a minimum: • A risk assessment report I can hand to leadership, written in plain language • A remediation roadmap that separates quick wins from longer-term projects • Hands-on configur...
A. Homepage (Landing Page) • Hero Banner / Slider: Highlight key vendors & products (Microsoft, Palo Alto, Trend Micro, CrowdStrike). • Featured Categories: Endpoint Security, Cloud Licenses, Server Licenses, Productivity Tools. • Vendor Showcase Section: Vendor logos with click-through to vendor-specific pages. • Promotional Banners: Dynamic offers, discounts, trending products. • Trust & Security Elements: SSL badge, certifications, support contact. • Quick Navigation Links: Shop Licenses, Hardware (Coming Soon), About, Contact. • Cross-Linking & Announcements: o Link to Main Website. o Link to Hardware Website. o “Coming Soon” hardware block. o Exciting Offers section (rotating banners). B. Product Catalog ...
...targeted, hands-on help inside CrowdStrike Falcon to solve a stubborn settings problem: several endpoints show as “undetectable” or “offline” even though the sensor is installed. What I need from you • Quick analysis of why the endpoints disappear from the console (sensor version, network reachability, policy or CID mismatch—whatever the data reveals). • Concrete changes to the relevant settings so each device checks in reliably and policy updates flow without delay. • A short walkthrough so I can repeat the fix on future machines. You’ll have admin access to the Falcon console plus remote access to one affected endpoint for testing. Please be comfortable with sensor diagnostics, policy configuration and network-level t...
I need an expert to integrate Crowdstrike with Google Cloud Platform. The integration should cover: - Security Monitoring: Implement Crowdstrike's tools to monitor threats and vulnerabilities in real-time on our GCP environment. - Incident Response: Set up automated and manual response protocols using Crowdstrike to address security incidents swiftly. - Threat Intelligence: Leverage Crowdstrike's threat data to enhance our GCP security posture and predict potential threats. Ideal Skills & Experience: - Proven experience with Crowdstrike and GCP - Strong background in cloud security - Familiarity with incident response protocols - Expertise in threat intelligence analysis Looking for comprehensive solutions to fortify our GCP security.
...platforms. They will need to install on virtual machines within the AWS cloud, physical machines the contractor has access to of both Apple & Windows systems. The final output will include a detailed Word report with key insights and a PowerPoint slide deck with screenshots of dashboards. Scope of Work: 1. Tool Selection & Setup Collaborate with us to finalize a list of cybersecurity tools (e.g., CrowdStrike Falcon, Qualys VMDR, Tenable, Microsoft Defender, Axonius, etc.) Procure trial licenses and coordinate with me for product access Configure a secure testing lab environment (cloud and on-prem) 2. Hands-On Testing & Evaluation Install and configure each tool Test core functionalities: threat detection, vulnerability scanning, asset discovery, endpoint protection,...
I’m currently looking for Cloud Operations and Security Operations projects—freelance or contract-based. I bring hands-on experience in managing secure, scalable, and highly available cloud infrastructure with a strong focus on automat...orchestration Monitoring & alerting (Prometheus, Grafana, CloudWatch) SecurityOps: Threat detection & incident response Vulnerability scanning & patching IAM, policy enforcement & zero-trust architectures SIEM/SOAR tools (Splunk, ELK, Sentinel) Compliance (ISO 27001, SOC2, HIPAA-ready setups) Tools & Tech: AWS, Azure, GCP, Linux, Terraform, Ansible, Kubernetes, Docker, Git, Jenkins, CrowdStrike, Wazuh, etc. If you have a project that needs solid infrastructure or improved security posture—let’s ta...
I'm seeking a skilled logo designer to create a minimalist logo for my technology (cyber security) company. Ideal Skills and Experience: - Proven experience in designing minimalist and modern logos, particularly for tech companies. Similar to MNCs like Palo Alto Networks, CrowdStrike, and Cisco brand themselves. - Strong portfolio showcasing modern and clean design aesthetics. - Ability to create a unique and memorable brand identity. - Proficiency in color theory and typography. - Excellent communication skills for revisions and feedback. Please provide your portfolio and relevant experience. Looking forward to your creative proposals!
I'm seeking a skilled freelancer to set up SolarWinds SAM templates for monitoring several critical Windows services and applications. Key Monitoring Tasks: - Microsoft Windows Defender: Overall health check, ensuring service is running and signatures are updated. - Windows Updates: Check for the latest updates. - ManageEngine Central Endpoint Agent - Crowdstrike - Windows Firewall - DNS Client - BITS Requirements: - Set up email notifications for alerts on any detected issues. - Ensure all monitored services are logged accurately. Ideal Skills and Experience: - Experience with SolarWinds SAM - Familiarity with Microsoft Windows services and security tools - Strong background in system monitoring and alert configuration Looking forward to your bids!
I'm seeking an expert to build a fully automated N8N workflow that integrates with Crowdstrike and Netskope. The workflow will consume IOCs in JSON format. Key Requirements: - Validate IOCs against MITRE ATT&CK techniques referenced by Crowdstrike. - Log a ticket in Jira only when all conditions are met. - Close IOC in Crowdstrike if conditions are not met. - Link with OpenAI to for example, we can use it to analyze raw IOC descriptions, summarize threat context or even suggest relevant mitre techniques that could be associated - No user intervention required. Ideal Skills: - Experience with N8N automation - Familiarity with Crowdstrike and Netskope - Knowledge of MITRE ATT&CK framework - Jira integration expertise Please provide examples of simi...
I'm seeking an expert to build a fully automated N8N workflow that integrates with Crowdstrike and Netskope. The workflow will consume IOCs in JSON format. Key Requirements: - Validate IOCs against MITRE ATT&CK techniques referenced by Crowdstrike. - Log a ticket in Jira only when all conditions are met. - Close IOC in Crowdstrike if conditions are not met. - No user intervention required. Ideal Skills: - Experience with N8N automation - Familiarity with Crowdstrike and Netskope - Knowledge of MITRE ATT&CK framework - Jira integration expertise Please provide examples of similar work done.
...Peer-reviewed research papers Government or industry standards & protocols Whitepapers from reputable cybersecurity vendors Threat intelligence reports Technical guidance or playbooks --- Ideal Sources Include: Academic journals Government websites Corporate cybersecurity sites Think tanks / non-profits Specific examples: MITRE CISA NIST SANS Institute arXiv CERT Mandiant CrowdStrike Fortinet IBM Security Google Threat Intelligence --- Required Skills & Experience: Strong background in cybersecurity (red/blue team, threat intel, etc.) Experience curating or reviewing security-related documentation Ability to assess document quality and relevance for AI/data use Strong organization and metadata tagging skills --- Bonus Points For: Incl...
We need a logo for our brand, Porthas, that aligns with our new website design at porthas.com. Porthas specializes in cyber security services, and we want the logo to convey a classic and professional style. Key requirements: - The logo should have a classic and professional style. Authoritative font. Same capitalization. Just one word "Porthas" - Do NOT use a...Authoritative font. Same capitalization. Just one word "Porthas" - Do NOT use any more than 1 icon and stay away from shields or locks, it is overused. - Try to stay in 1-2 colors max. Ideal skills for this project include logo design, typography, and a strong understanding of modern and sleek design principles. Experience in designing for cyber security companies would be a plus. Best logos we like: Cro...
...tenants. ✅ CrowdStrike Integration for endpoint detection and response (EDR) logs within Azure Sentinel. ✅ Monitor Network Devices such as switches, routers, and firewalls to track potential security incidents. ✅ Intune Endpoint Security Monitoring to track compliance, device risks, and security posture. ✅ SIEM Use Case Development – Design and implement custom detection rules and analytics. ✅ Incident Response Playbooks – Configure automated responses to security threats. ✅ Dashboard & Reporting – Create real-time security insights and alerting mechanisms. Ideal Skills & Experience: ? Extensive experience with Azure Sentinel SIEM implementation. ? Strong expertise in AWS security monitoring & integration. ? Deep knowledge of Fortigate firewalls, O3...
I'm seeking an expert web designer/developer to create a sleek, mobile-responsive, and professional website for my cybersecurity company, S3cura Solutions Pvt. Ltd. The website's primary aim is to build brand credibility, paralleling industry leaders like Palo Alto Networks and CrowdStrike. Key Features: - Approximately 5-7 pages: Home, About, Services, Contact, etc. - Clean layout for 15+ services under 4 main categories. - Fast-loading, SEO-friendly, and fully responsive design. - Preferably WordPress but open to other suggestions. - Integration of a contact form. - Optional blog/news section. - Guidance on LinkedIn “Book My Time” feature integration on the contact page. Deliverables: - A fully functional website with an admin panel. - Basic documentation o...
...Question 5. Current State (Dropdown) 6. Tools in Use (Dropdown with free entry option) 7. Owner (Dropdown with free entry option) 8. Risk Level (Dropdown) 9. Comments 10. Score (Auto-calculated) --- 4. Dropdown Options (For Freelancer to Implement) Current State (Scored Automatically) Not Started → 0 In Progress → 1 Completed → 2 N/A → excluded from scoring Tools in Use CrowdStrike SentinelOne Defender for Endpoint Splunk Sysmon Darktrace Palo Alto Cortex Rapid7 Proofpoint Mimecast Other (Allow multiple selection via VBA) Owner SOC IT IAM Team AppSec GRC Endpoint Team Cloud Team Other (Allow multiple selection via VBA) Risk Level High Medium Low --- 5. Features & Automation Automated Scoring Add scori...
...Form: A simple “Get in Touch” form with fields for name, email, phone, and message, integrated with email notifications. • Customizable Future Features: Ensure the website can support future scalability (e.g., portals or integration with third-party systems). Site Requirements • Style and Branding: Modern and clean design in line with Argus’s logo and branding colors. • Inspiration Websites: o CrowdStrike o Finaxe o Fidelis Security o Gigamon Technical Specifications • CMS Preference: WordPress, will discuss others if the use case / feature set is compelling • Scalability: Extensible for future features such as customer portals or additional integrations. • SEO Optimization: Integrated SEO best practices for all pages. • Analyt...
...using a Flask API to enable real-time predictions. Frontend Dashboard: Develop a responsive web-based dashboard using React.js to: Display logs and detected incidents in real-time. Allow users to view system status and trigger manual responses. Provide configuration options for response playbooks. Integration with XDR Tools: Connect the system to third-party XDR solutions (e.g., SentinelOne, CrowdStrike) to fetch logs and automate responses. Automation of Incident Response: Create predefined playbooks to automate actions like: Blocking malicious IP addresses. Isolating infected endpoints. Sending alerts to administrators via email, Slack, or SMS. Deployment: Containerize the system using Docker for easy deployment. Provide setup instructions for deploying on Kubernetes or clo...
I am looking for an experienced CrowdStrike professional to assist with improving the platform and providing recommendations. My current security measures are outdated, and I need someone who can help make the platform a better use. Ideal Skills: - Extensive knowledge of Crowdstrike - Proficient in threat analysis - Ability to upgrade security measures The freelancer will have full access to all systems and data required for threat analysis and response.
As a managed security services provider, I require skilled incident response contractors with proficiency in CrowdStrike. Your role will primarily focus on managing incident response to various security threats. Key Responsibilities: - Respond to incidents involving data breaches, malware infections, and unauthorized access. - Leverage CrowdStrike tools and techniques to mitigate security threats. - Provide comprehensive incident response reports. Ideal Qualifications: - Proven experience in incident response. - Proficiency in using CrowdStrike for incident management. - Excellent communication skills for report generation and delivery.
I'm facing a major outage in my CrowdStrike setup due to a software bug. The situation is urgent and I need immediate help in resolving this issue. This project involves troubleshooting and resolving the software bug in my CrowdStrike configuration. Key requirements: - Troubleshoot and identify the root cause of the software bug - Provide a quick and effective fix to ensure normal functioning of CrowdStrike - Experience and expertise in CrowdStrike setup and troubleshooting is crucial - Ability to work under pressure and with a sense of urgency If you have the necessary skills and availability to work on this project immediately, please submit your bid.
I am looking for a freelancer who is well-versed in migrating McAfee Trillex to Crowdstrike endpoint agent on Windows systems. Have about 14,000 endpoints Key Requirements: - Experience: I am keen on seeing your detailed project proposals and your past work. Experience in endpoint security solutions is a plus. Please include your proposed timeline, methodology for the migration, and any challenges you foresee as part of your detailed project proposals.
I'm in need of an intermediate...-senior incident response/digital forensics specialist /Linux sysadmin familiar with triage, mitigation/containment , remediation and report writing. To do a on the job walk through of challenging tasks. So I can shadow watch ad take notes, for my thesis and upcoming internship. • Skills and Experience: - Incident response - Linux sysadmin - SOC Analysis with Sentinel, Splunk, Crowdstrike etc - Digital forensics - Report writing We are looking to record step by step actions taken on any job of your choice, preferably something you are already working on , company names will be changed . This project is to support my thesis and also to help improve skills and speed with incidents Looking for an affordable cost and a...
...platforms. The primary goal of this project is to evaluate and document the distinct strengths and weaknesses of each platform, focusing on their data sources, collection methods, and analysis/reporting capabilities. Platforms for Analysis: The analysis should cover the following threat intelligence platforms: 1. IBM QRadar 2. Recorded Future 3. Microsoft Azure Sentinel 4. Crowdstrike 5. AlienVault 6. Trend Micro 7. VirusTotal 8. Kaspersky Key Areas of Focus: - Data Sources and Collection Methods: Understand and evaluate how each platform gathers and utilizes data for threat intelligence. - Analysis and Reporting Capabilities: Assess the effectiveness of each platform in analyzing data and presenting actionable intelligence. - Pricin...
I'm seeking a professional to automate the process of collecting data every 7 days from Crowdstrike into Splunk. I don't need all data, just specific fields related to application installs on workstations. Kindly review the fields required: - Application name - Installation date and time - Workstation name - User name - Operating system - Installation status - Last used - Versions Ideal candidates demonstrate experience in working with Crowdstrike and Splunk and possess knowledge of data automation. Proven abilities in focusing on specific data fields would be beneficial in this role.
I'm seeking an expert in writing Splunk queries to detect threats, efficiently querying from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expertise include: - Proven skills in extracting and analyzing data from logs - The ability to use Regex queries to extract additional, nuanced information - Proficient querying from CrowdStrike EDR telemetry. The information to be extracted comprises of EDR fields like: - Process Name - File Hash - Command Line I look forward to working with a detail oriented and security savvy professional who will utilize this data to help us identify potential security threats and ensure system integrity.
...with this slide. Slide 2 - Pen Test Provider Summary: Construct a professional table to compare pen test companies. Slide 3: Please recreate the existing content in PowerPoint, maintaining clarity and professionalism. Slide 4 - CTA Strategic Plan Roadmap: Refresh the roadmap with a cleaner, more professional design. Aim for a layout that's easy to follow and visually appealing. Slide 5 - Crowdstrike MSSP Provider Comparison: Transfer the content into PowerPoint format. Enhance the design to make it more modern and professional....
I am seeking an expert specializing in CrowdStrike Identity Protection (IDP) and Ping federate, able to carry out comprehensive task that includes: 1. **User Access Management Improvement:** - Simplify the user provisioning process: The current method is tedious and may be prone to error; a simplified solution is required. - Enhance user authentication methods: I need a robust solution to improve user authentication. - Implement role-based access control: A system that assigns permissions based on roles in the organization. 2. **System Configuration:** - Update server settings: My project requires a professional to adjust server settings for optimal performance. - Configure single sign-on (SSO): Requires an expert to set up a single sign-on system for seamless login...
I need a data collection professional to collect exam questions with answers and put screenshots into google drive. Exams list: CCFA CrowdStrike Certified Falcon Administrator Exam HPE6-A72 Aruba Certified Switching Associate Exam GCP-GCX Genesys Cloud CX Certified Professional Exam NCP-MCI v6.5 Nutanix Certified Professional Exam HPE0-V25 HPE Hybrid Cloud Solutions Exam MB-330 Microsoft Dynamics 365 Supply Chain Management Exam MB-920 Microsoft Dynamics 365 Fundamentals Finance Exam MS-721 Collaboration Communications Systems Engineer Exam MB-800 Microsoft Dynamics 365 Business Central Functional Exam 2V0-21.23 VMware vSphere 8.x Professional Exam SPLK-3001 Splunk Enterprise Security Certified Admin Exam NS0-162 NetApp Certified Data Administrator, ONTAP Exam 5V0-22.23 VMware vSA...
...help me create a corporate identity for my business. Here are the details: Requirements: - Color scheme - Font for website and presentations - Logo - Presentation design Name: - Chronik Color scheme: - Recommend a color scheme that fits our brand. - We are a software solution that leverages AI for archiving files. - The scheme should be modern and clean. I like bold logos like SentinelOne, Crowdstrike or Cybereason - Possible colors: Red, Blue, Black, Purple - Please create a unique icon with it. Overall tone: - I want my corporate identity to convey a professional image. Ideal skills and experience: - Graphic design experience - Ability to create a unique and professional logo - Understanding of color psychology and how to use cool colors effectively - Strong attention to d...
Looking for product names for SaaS application (web based) serving cyber security industry. The name must be catchy like SentinelOne, CoalFire, CrowdStrike, CloudGuard, Archer, like one word or combination of two words. The product is a risk, information security and compliance management platform for cyber security professionals and will facilitate management of cyber security audits, assessments, identified risks, etc. The name must be formed using alphabets without hyphen or numbers, must contain one or two words not more than that, length must be less than 10-12 letters. Relevant terms - risk management, cyber security, information security, governance, compliance
...remediation scripts to be executed within the N-Able NCentral platform on customer equipment such as servers, workstations, and network equipment. -Review and audit customer environmental health, operational efficiency, and network security design maturity to support more effective and robust design and systems monitoring. -Respond to critical security events discovered and reported within Next7's CrowdStrike EDR solution and Cisco Umbrella. -Identify weaknesses in the above listed, design resolution paths, and receive approval from your direct supervisor to implement improvements in systems monitoring, operational efficiency, and network security practices. -Work directly with the Proactive Service team to improve procedural documentation, customer documentation, and th...
I have been asked to create a termination and lockout plan for the Senior Director of IT. This needs to be an all encompassing plan at least a page in length. The services that need to be disabled are Okta, Azure AD, Fortigate, Tactical RMM, Mimecast, Office 365, CrowdStrike to name the most critical. The document should be highly detailed with steps and timing. This is highly urgent and has a 4 hour requirement. The appropriate individual for this project would have experience terminating technical staff with a highly technical background with management experience and plan writing experience.
The objective is to compile a roster of ~1000 Salesperson/ Client Managers, holding the position of Lead to Senior Manager level in cybersecurity service providers such as CrowdStrike, Pwc, Accenture, Optiv, etc., along with their respective LinkedIn profile URLs. Most Important Note: I am not looking for employees that are just lead/managers. I am specifically looking for employees who are between lead-managers and their specifc role is to find clients (that need CyberSecurity services) for their company they work for. Note: The list of ~1000 Salesperson/ Client Managers should compromise of Individual for top Countries and Geo like Dubai, Saudi Arabia, India, Singapore, Australia, USA, UK, Europe, APAC etc. Please see all conditions that needs to be fulfilled , specifically...
Title: Patch Management Systems Administrator, Level 2 o NESSUS vulnerability scanner o Microsoft Endpoint Configuration Manager, o Microsoft Intune, o Microsoft System Center Configuration Manager, o Windows server and workstation administration. o SolarWinds o Linux/UNIX Server Administration o crowdstrike
Looking for Security Engineer who have experience and skills on Endpoint detection and prevention (EDR), CASB solution, and integration of Security Tools. plus, must know about API call.