Crowdstrike specialists Para Contratação
Países
Localização específica
Exames
Remuneração por Hora (Dólares)
Avaliação
On-line
Mostrando 36 resultados
Freelancers Patrocinados
-
Crowdstrike, Análise de Dados, Arquitetura de Infraestrutura, Monitoramento de Rede, Segurança de RedeProfessional Summary I am a Senior Cybersecurity Consultant and Certified CrowdStrike Falcon Administrator with 20+ years of IT and security leadership experience. I specialize in designing, deploying, and optimizing endpoint security solutions for organizations ranging from small businesses to enterprises with...Professional Summary I am a Senior Cybersecurity Consultant and Certified CrowdStrike Falcon Administrator with 20+ years of IT and security leadership experience. I specialize in designing, deploying, and optimizing endpoint security solutions for organizations ranging from small businesses to enterprises with 40,000+ endpoints. My expertise spans CrowdStrike Falcon (all modules), endpoint protection platforms (Microsoft, Trellix, Trend Micro, Symantec, Cybereason), and SOC/MDR operations. I have trained and led endpoint teams globally, using extensive lab environments to provide real-world, hands-on learning. Whether you need CrowdStrike training, endpoint security architecture, SOC process optimization, or compliance alignment (NIST, ISO 27001, GDPR, POPIA), I deliver measurable outcomes and practical knowledge transfer. menos
Contratar PeetMAN007
-
Técnico de TI Certificado A+, Profissional Certificado A+, Active Directory, Adobe Systems, Chrome OSAn it engineer with over a decade worth of experience working in a variety of different sectors. Proficient in cloud computing with experience in securityAn it engineer with over a decade worth of experience working in a variety of different sectors. Proficient in cloud computing with experience in security menos
Contratar andres972
-
Hacking Ético Certificado, Profissional Certificado em Segurança de Sistemas de Informação (CISSP), Segurança em Nuvem, Ciência da Computação, Segurança de computadoresCybersecurity Professional | Bachelor of Engineering in Electronics and Communications Engineering | Information Security | Architecture & Engineering | Third Party Risk Management | Cyber Maturity Assessment | Exception & Change Management | Application assessment | Framework & Documentation Building | POCs &...Cybersecurity Professional | Bachelor of Engineering in Electronics and Communications Engineering | Information Security | Architecture & Engineering | Third Party Risk Management | Cyber Maturity Assessment | Exception & Change Management | Application assessment | Framework & Documentation Building | POCs & Implementation | Administration & Maintenance | Review & Advising | Detection Investigation | Information Security Metrics Programs | Reporting & Consulting | Breach analysis & RCA | Audit Coordination in ISO 27001:2013, Hi-Trust, SOC 2-Type 2 | ISMS & ISC projects | BCP & DR Drills| Tech Sales & Demonstrations | Awareness & Training programs | AZ-900 | PCI DSS V4 foundation by TUV | EDR / XDR | Firewalls | Proxy & Internet Security | DLP | Encryption | Vulnerability Management | CNAPP | NAC | Phishing Simulation | Attack Surface Monitoring | O365 | Windows Active Directory & Exchange On-prem | Azure. menos
Contratar arunagirinathans
-
Profissional Certificado em Segurança de Sistemas de Informação (CISSP), Segurança em Nuvem, Crowdstrike, Sistemas de SegurançaI am a well versed cybersecurity professional with experience in Microsoft Sentinel, Endpoint detection and response, Data loss prevention and CASB. I am looking for projects to which will allow me to assist in setting up these tools.I am a well versed cybersecurity professional with experience in Microsoft Sentinel, Endpoint detection and response, Data loss prevention and CASB. I am looking for projects to which will allow me to assist in setting up these tools. menos
Contratar atulkr6795
-
saya pernah bekerja partaim , untuk membatu ekonomi keluarga, saya pernh bekerja di loket pasar malem, saya juga pernh berkerja di cafe sebagai pelayan, untuk membantu ekonomi keluargasaya pernah bekerja partaim , untuk membatu ekonomi keluarga, saya pernh bekerja di loket pasar malem, saya juga pernh berkerja di cafe sebagai pelayan, untuk membantu ekonomi keluarga menos
Contratar umis60
-
SOC Analyst with 2+ years of experience in cybersecurity operations, incident response, and threat intelligence. Skilled in 24/7 monitoring using SIEM tools, EDR solutions, and phishing analysis. Monitoring security alerts and incidents using SIEM tools, analyzing suspicious activities, and escalating threats....SOC Analyst with 2+ years of experience in cybersecurity operations, incident response, and threat intelligence. Skilled in 24/7 monitoring using SIEM tools, EDR solutions, and phishing analysis. Monitoring security alerts and incidents using SIEM tools, analyzing suspicious activities, and escalating threats. Performed incident response, threat hunting, and malware analysis. Worked with vulnerability management, log monitoring, and creating reports. Collaborated with cross-functional teams to ensure security compliance and reduce risks. menos
Contratar nayanasb698
-
Criação de Arte com IA, Desenvolvimento de IA, Pesquisa em IA, Hacking Ético Certificado, CrowdstrikeDescribete a ti mismo: Apasionado por transformar ideas en soluciones digitales, proteger sistemas y dominar el mundo de los eSports. Introduce más detalles acerca de ti mismo: Soy un entusiasta de la tecnología con habilidades en desarrollo web, inteligencia artificial, investigación tecnológica y seguridad...Describete a ti mismo: Apasionado por transformar ideas en soluciones digitales, proteger sistemas y dominar el mundo de los eSports. Introduce más detalles acerca de ti mismo: Soy un entusiasta de la tecnología con habilidades en desarrollo web, inteligencia artificial, investigación tecnológica y seguridad informática. Combino creatividad y análisis para crear soluciones innovadoras, detectar vulnerabilidades y mejorar la experiencia digital. Además, vivo los eSports, participando y siguiendo competiciones, conectando mi pasión por los videojuegos con la tecnología. Siempre busco nuevos retos, aprender y dejar huella en cada proyecto que tomo. menos
Contratar IngEmmanuelram
-
I’m Ayush , a results-driven Cybersecurity Analyst and Developer specializing in threat detection, digital forensics, and secure system design. My work revolves around building and protecting digital environments that are intelligent, resilient, and ahead of evolving threats. Over the past few years, I’ve worked on...I’m Ayush , a results-driven Cybersecurity Analyst and Developer specializing in threat detection, digital forensics, and secure system design. My work revolves around building and protecting digital environments that are intelligent, resilient, and ahead of evolving threats. Over the past few years, I’ve worked on multiple projects that bridge AI and cybersecurity, including deepfake video detection, fake email identification, and phishing anomaly analysis. My professional journey has allowed me to analyze complex attack patterns, strengthen defense systems, and enhance the overall integrity of digital infrastructures. At Wayspire Tech Pvt. Ltd., I served as a Cyber Attack Analyst, actively monitoring and evaluating potential threats using tools like Wireshark, SpiderFoot, OSINT Frameworks, Recorded Future, and Whois domain utilities. My role demanded not just technical proficiency but also a sharp analytical mindset to interpret threat data, detect vulnerabilities, and support real-time security alerts for the team. During my tenure with Reliance Jio, I gained extensive exposure to large-scale data environments — ensuring security accuracy, validating system integrity, and handling process-level risk assessments with precision. I learned to identify weaknesses before they turned into threats, combining practical cybersecurity operations with analytical problem-solving. My flagship project, “Anomaly Phishing Detection System,” demonstrates my ability to integrate AI-driven models with anomaly-based detection for identifying phishing attempts. This system merges data analytics, pattern recognition, and machine learning to deliver a proactive security framework suitable for real-world deployment. Alongside my cybersecurity work, I develop secure, production-level web applications — ensuring clean architecture, strong backend validation, and minimal attack surfaces. My recent focus on Rust programming reflects my drive to master high-performance, memory-safe development for next-generation systems. I’m skilled in: 1.)Threat Analysis & Incident Response 2.)OSINT and Network Forensics 3.)AI-Integrated Security Systems 4.)Vulnerability & Risk Assessment 5.)Secure Web Application Development 6.)Automation & Scripting for Cyber Defense What sets me apart is my hands-on approach — I don’t just research cybersecurity concepts; I implement, test, and refine them for real-world use. My goal is simple: create and secure. Every system I build or analyze is treated as a mission to make technology more trustworthy and adaptive. If you’re looking for someone who combines deep technical skill with clarity, accountability, and innovation — I’m ready to deliver results that truly strengthen your digital ecosystem. menos
Contratar ayusha047
-
Worked in a 24x7 Security Operations Centre Environment. Monitoring real-time events using SIEM tool (ArcSight, Splunk). Installation & Troubleshooting of ArcSight Connectors. Worked on log sources integration of Windows servers & Syslog devices in ArcSight, Splunk. Troubleshooting of critical log sources when logs...Worked in a 24x7 Security Operations Centre Environment. Monitoring real-time events using SIEM tool (ArcSight, Splunk). Installation & Troubleshooting of ArcSight Connectors. Worked on log sources integration of Windows servers & Syslog devices in ArcSight, Splunk. Troubleshooting of critical log sources when logs are not reporting to SIEM. Creation of ArcSight, Splunk content like dashboards, filters, field sets, active channels, Query, Reports etc. Analyzing threats by taking the events from Firewalls, Endpoints, Servers, IDS/IPS etc. and identify whether it is true positive or false positive. Collecting the logs of all the network devices & Security devices and analyze the logs to find the suspicious activities. Monitor and identify any suspicious security events using the ArcSight ESM console, Splunk. Monitoring, investigation and mitigation of security incidents in pre-defined SLA. Investigating Phishing, Malware & port scanning related security incidents and recommend blocking of IP's, domains, hash values on security devices & AV if found malicious. Raising incident with concern teams, respond to the incidents and service requests and bring together additional information to either resolve or escalate the issue to the appropriate teams Perform Malware analysis using different types of web-based tool such as Hybrid Analysis, Virus Total. Monitoring of IOC’s (Indicators of Compromise). Making incident report and submitting it to Team Lead. Work with various teams across the organization to improve security posture. Preparation of SOP documents. Creating ad-hoc reports, daily, weekly and monthly reports as per client requirement. Preparation of Shift Handover's. menos
Contratar shashidharpente1
-
Profissional Certificado em Segurança de Sistemas de Informação (CISSP), Segurança em Nuvem, Segurança de computadores, Crowdstrike, Módulo de Segurança de HardwareA proactive Cybersecurity Analyst with strong expertise in Endpoint Detection & Response (CrowdStrike Falcon), SIEM operations (Wazuh), and threat detection. Recently expanded into technical presales, delivering product demonstrations, explaining security value to customers, and supporting solution design for...A proactive Cybersecurity Analyst with strong expertise in Endpoint Detection & Response (CrowdStrike Falcon), SIEM operations (Wazuh), and threat detection. Recently expanded into technical presales, delivering product demonstrations, explaining security value to customers, and supporting solution design for endpoint protection and SIEM modernization projects. Skilled in translating technical capabilities into business outcomes, assisting sales teams, and acting as a trusted advisor to prospects. menos
Contratar gshankarjnk