
Fechado
Publicado
Pago na entrega
I need my CrowdStrike console fully configured for Exposure Management with the focus on Attack Surface Reduction. The goal is to gain a clear, actionable view of vulnerabilities across our endpoints, network devices, and cloud infrastructure, then apply the right controls so the overall attack surface noticeably shrinks. Scope of work • Turn on and tune CrowdStrike Exposure Management modules required for Attack Surface Reduction. • Bring endpoints, network devices, and all current cloud accounts under unified visibility. • Map the discovered findings to practical hardening steps inside the platform (policy tweaks, device groups, real-time response scripts, etc.). • Produce concise documentation that shows what was enabled, key settings, and next steps for ongoing monitoring. Additional notes I’m unsure how much of our existing security policy set can be imported, so I’ll rely on your guidance there—flag any gaps and suggest the smoothest way to integrate or rebuild them. Acceptance criteria 1. The dashboard highlights all three asset types with accurate risk scores. 2. At least one measurable reduction action is applied and verified on each asset category. 3. Handover document and a short walkthrough call conclude the engagement.
ID do Projeto: 40338717
4 propostas
Projeto remoto
Ativo há 12 dias
Defina seu orçamento e seu prazo
Seja pago pelo seu trabalho
Descreva sua proposta
É grátis para se inscrever e fazer ofertas em trabalhos
4 freelancers estão ofertando em média ₹8.625 INR for esse trabalho

Hello, I can help you configure CrowdStrike Exposure Management with a clear focus on reducing your attack surface and turning findings into actionable security improvements. In my current role as a Security Engineer, I work directly with CrowdStrike, XDR, and enterprise security controls to monitor endpoints, enforce policies, and improve overall security posture. I am used to translating vulnerability data into practical hardening actions across infrastructure. For this project, I will: • Enable and properly tune Exposure Management modules aligned with Attack Surface Reduction • Bring endpoints, network assets, and cloud environments into unified visibility • Review findings and map them into actionable controls such as policy adjustments, device grouping, and response actions • Identify gaps in your current security policies and recommend the most practical way to integrate or rebuild them • Apply measurable risk reduction actions and validate the impact You will receive a clean, actionable dashboard, concise documentation, and a short walkthrough so your team can maintain the setup confidently. Best regards, Rifqi
₹10.000 INR em 4 dias
0,0
0,0

Worked on implementing and managing CrowdStrike Falcon for endpoint security across enterprise environments. Integrated CrowdStrike with SIEM tools like Splunk for real-time monitoring, alerting, and incident response. Handled deployment, policy configuration, threat investigation, and coordination with tools like Forescout for enhanced security posture.
₹5.000 INR em 7 dias
0,0
0,0

Hi! I can help you configure CrowdStrike Exposure Management with a strong focus on measurable Attack Surface Reduction. Before confirming scope and pricing, I’d like to clarify a few key points. Environment: - Are Falcon agents already deployed? Approx. how many endpoints? - Which OS are in scope (Windows, Linux, macOS)? - Do you already use device groups and policies? Cloud & Network: - Which cloud providers (AWS, Azure, GCP)? Are they already connected? - Do you currently have network device visibility in CrowdStrike? Licensing: - Which modules are licensed (Exposure Management, EASM, Spotlight)? - Is this a fresh setup or partially configured? Security Baseline: Do you have existing policies or standards to align with (CIS, NIST, etc.)? Access & Goals: - Will admin access be available for integrations and RTR actions? - Do you expect active remediation or mainly visibility + recommendations? - Any specific KPIs for attack surface reduction? Logistics: Preferred timeline and availability for final walkthrough? With this info, I’ll provide a clear plan, milestones, and fixed price. Looking forward to your answers.
₹12.500 INR em 7 dias
0,0
0,0

Hello, My name is Arnav Tiwari, a Cybersecurity Analyst and Penetration Tester with hands-on experience using Kali Linux and industry-standard security tools. I can start immediately and provide a concise, actionable security assessment of your environment. Approach & Methodology I recommend a hybrid (Gray-box) assessment combining limited internal knowledge with external testing to simulate realistic attack scenarios. Assessment Scope • Network architecture review (segmentation, firewall rules, exposure points) • Endpoint security evaluation (patching, configuration, EDR/AV) • Authentication practices (MFA, password policies, access control) • Data handling workflow analysis (storage, transfer, permissions) Tools Nessus/OpenVAS, Burp Suite, Nmap, Wireshark, Metasploit, and custom Kali Linux scripts. Deliverables • Concise assessment report • Prioritized vulnerabilities with risk ratings • Evidence (screenshots, logs, scan outputs) • Actionable remediation plan (immediate, mid-term, long-term) • Debrief call or recorded walkthrough for your team Timeline Assessment: 2–3 days Report & remediation plan: 1 day Debrief: same day delivery I focus on practical, cost-effective security improvements with clear communication for both technical and non-technical stakeholders. I’m ready to begin immediately. Best regards, Arnav Tiwari Cybersecurity Analyst | Penetration Tester
₹7.000 INR em 7 dias
0,0
0,0

Bengaluru, India
Método de pagamento verificado
Membro desde mar. 31, 2026
₹1500-12500 INR
$30-250 CAD
$250-750 AUD
$10-200 USD
₹1500-12500 INR
$250-750 USD
$15-25 USD / hora
$30-250 USD
$10-100 USD
$2-8 USD / hora
$5000-10000 USD
£20-250 GBP
$2-8 USD / hora
$10-50 USD
₹100-400 INR / hora
$10-30 USD
$15-25 USD / hora
₹12500-37500 INR
€12-18 EUR / hora
$2-8 AUD / hora
$10-70 USD