Crowdstrike specialists For Hire
Showing 39 results
Sponsored Freelancers
-
Hire arunagirinathans
Certified Ethical Hacking, Certified Information Systems Security Professional (CISSP), Cloud Security, Computer Science, Computer SecurityCybersecurity Professional | Bachelor of Engineering in Electronics and Communications Engineering | Information Security | Architecture & Engineering | Third Party Risk Management | Cyber Maturity Assessment | Exception & Change Management | Application assessment | Framework & Documentation Building | POCs &...Cybersecurity Professional | Bachelor of Engineering in Electronics and Communications Engineering | Information Security | Architecture & Engineering | Third Party Risk Management | Cyber Maturity Assessment | Exception & Change Management | Application assessment | Framework & Documentation Building | POCs & Implementation | Administration & Maintenance | Review & Advising | Detection Investigation | Information Security Metrics Programs | Reporting & Consulting | Breach analysis & RCA | Audit Coordination in ISO 27001:2013, Hi-Trust, SOC 2-Type 2 | ISMS & ISC projects | BCP & DR Drills| Tech Sales & Demonstrations | Awareness & Training programs | AZ-900 | PCI DSS V4 foundation by TUV | EDR / XDR | Firewalls | Proxy & Internet Security | DLP | Encryption | Vulnerability Management | CNAPP | NAC | Phishing Simulation | Attack Surface Monitoring | O365 | Windows Active Directory & Exchange On-prem | Azure. less -
Hire PeetMAN007
Professional Summary I am a Senior Cybersecurity Consultant and Certified CrowdStrike Falcon Administrator with 20+ years of IT and security leadership experience. I specialize in designing, deploying, and optimizing endpoint security solutions for organizations ranging from small businesses to enterprises with...Professional Summary I am a Senior Cybersecurity Consultant and Certified CrowdStrike Falcon Administrator with 20+ years of IT and security leadership experience. I specialize in designing, deploying, and optimizing endpoint security solutions for organizations ranging from small businesses to enterprises with 40,000+ endpoints. My expertise spans CrowdStrike Falcon (all modules), endpoint protection platforms (Microsoft, Trellix, Trend Micro, Symantec, Cybereason), and SOC/MDR operations. I have trained and led endpoint teams globally, using extensive lab environments to provide real-world, hands-on learning. Whether you need CrowdStrike training, endpoint security architecture, SOC process optimization, or compliance alignment (NIST, ISO 27001, GDPR, POPIA), I deliver measurable outcomes and practical knowledge transfer. less -
Hire andres972
An it engineer with over a decade worth of experience working in a variety of different sectors. Proficient in cloud computing with experience in securityAn it engineer with over a decade worth of experience working in a variety of different sectors. Proficient in cloud computing with experience in security less -
Hire atulkr6795
Certified Information Systems Security Professional (CISSP), Cloud Security, Crowdstrike, Security SystemsI am a well versed cybersecurity professional with experience in Microsoft Sentinel, Endpoint detection and response, Data loss prevention and CASB. I am looking for projects to which will allow me to assist in setting up these tools.I am a well versed cybersecurity professional with experience in Microsoft Sentinel, Endpoint detection and response, Data loss prevention and CASB. I am looking for projects to which will allow me to assist in setting up these tools. less -
Hire somtochukwu98
somtochukwu98 somtochukwu98
$50 USD / hour
Infosec, Compliance & Cybersecurity ProfessionalUnited KingdomI’m an Information Security and Cyber Risk professional with hands-on experience securing organisational environments and managing risk across endpoint, cloud, identity, and email security domains. I work across the full security lifecycle, including threat detection and response, vulnerability management, identity...I’m an Information Security and Cyber Risk professional with hands-on experience securing organisational environments and managing risk across endpoint, cloud, identity, and email security domains. I work across the full security lifecycle, including threat detection and response, vulnerability management, identity and access control, cloud security governance, and human risk management. My approach focuses on proactively identifying vulnerabilities, assessing risk, and implementing effective controls aligned with frameworks such as GDPR, ISO 27001, NIST, and SOC 2. I have experience working with a modern enterprise security stack including CrowdStrike XDR, SIEM solutions, Microsoft Intune, Microsoft Entra ID, Netskope (CASB), Microsoft Purview, Cisco security solutions, Egress, Red Sift OnDMARC, AppCheck, KnowBe4, Egnyte, Vicarius patch management, Amazon S3, FTK Imager, and Linux. I also have hands-on experience with network analysis and simulation tools such as Wireshark and Cisco Packet Tracer. Beyond technical security, I collaborate with stakeholders to embed security into business processes, improve user awareness, and support compliance initiatives. My experience spans multiple environments, providing a strong understanding of real-world cybersecurity challenges and risk management strategies. I’m particularly interested in advancing in cyber risk, cloud security, and security engineering, with a focus on automation and modern security operations. less -
Hire nayanasb698
SOC Analyst with 2+ years of experience in cybersecurity operations, incident response, and threat intelligence. Skilled in 24/7 monitoring using SIEM tools, EDR solutions, and phishing analysis. Monitoring security alerts and incidents using SIEM tools, analyzing suspicious activities, and escalating threats....SOC Analyst with 2+ years of experience in cybersecurity operations, incident response, and threat intelligence. Skilled in 24/7 monitoring using SIEM tools, EDR solutions, and phishing analysis. Monitoring security alerts and incidents using SIEM tools, analyzing suspicious activities, and escalating threats. Performed incident response, threat hunting, and malware analysis. Worked with vulnerability management, log monitoring, and creating reports. Collaborated with cross-functional teams to ensure security compliance and reduce risks. less -
Hire umis60
saya pernah bekerja partaim , untuk membatu ekonomi keluarga, saya pernh bekerja di loket pasar malem, saya juga pernh berkerja di cafe sebagai pelayan, untuk membantu ekonomi keluargasaya pernah bekerja partaim , untuk membatu ekonomi keluarga, saya pernh bekerja di loket pasar malem, saya juga pernh berkerja di cafe sebagai pelayan, untuk membantu ekonomi keluarga less -
Hire Anandhjith
Certified Ethical Hacking, Certified Information Systems Security Professional (CISSP), Cloud Security, Crowdstrike, Internet SecurityCybersecurity Analyst with extensive expertise in Microsoft Sentinel, Splunk, TrendMicro, Crowdstrike.Cybersecurity Analyst with extensive expertise in Microsoft Sentinel, Splunk, TrendMicro, Crowdstrike. less -
Hire rrsecurity
I as an Security Engineer is capable of providing service like : VAPT, Solution Deployment, Competitor Analysis, Digital Forensic, Security Solution Presales. My projects includes : VAPT services : Web , network , application , api , cloud Competitor Analysis between 2 major cyber security OEM's 100+ users...I as an Security Engineer is capable of providing service like : VAPT, Solution Deployment, Competitor Analysis, Digital Forensic, Security Solution Presales. My projects includes : VAPT services : Web , network , application , api , cloud Competitor Analysis between 2 major cyber security OEM's 100+ users Privileged Access Management(PAM) solution deployment. 500+ Endpoint Detection & Response (EDR) solution deployment Breach & Attack simulation solution deployment DAST & SAST solution deployment Vulnerability Scanner solution Deployment SIEM Deployment Digital Forensic less -
Hire ayusha047
I’m Ayush , a results-driven Cybersecurity Analyst and Developer specializing in threat detection, digital forensics, and secure system design. My work revolves around building and protecting digital environments that are intelligent, resilient, and ahead of evolving threats. Over the past few years, I’ve worked on...I’m Ayush , a results-driven Cybersecurity Analyst and Developer specializing in threat detection, digital forensics, and secure system design. My work revolves around building and protecting digital environments that are intelligent, resilient, and ahead of evolving threats. Over the past few years, I’ve worked on multiple projects that bridge AI and cybersecurity, including deepfake video detection, fake email identification, and phishing anomaly analysis. My professional journey has allowed me to analyze complex attack patterns, strengthen defense systems, and enhance the overall integrity of digital infrastructures. At Wayspire Tech Pvt. Ltd., I served as a Cyber Attack Analyst, actively monitoring and evaluating potential threats using tools like Wireshark, SpiderFoot, OSINT Frameworks, Recorded Future, and Whois domain utilities. My role demanded not just technical proficiency but also a sharp analytical mindset to interpret threat data, detect vulnerabilities, and support real-time security alerts for the team. During my tenure with Reliance Jio, I gained extensive exposure to large-scale data environments — ensuring security accuracy, validating system integrity, and handling process-level risk assessments with precision. I learned to identify weaknesses before they turned into threats, combining practical cybersecurity operations with analytical problem-solving. My flagship project, “Anomaly Phishing Detection System,” demonstrates my ability to integrate AI-driven models with anomaly-based detection for identifying phishing attempts. This system merges data analytics, pattern recognition, and machine learning to deliver a proactive security framework suitable for real-world deployment. Alongside my cybersecurity work, I develop secure, production-level web applications — ensuring clean architecture, strong backend validation, and minimal attack surfaces. My recent focus on Rust programming reflects my drive to master high-performance, memory-safe development for next-generation systems. I’m skilled in: 1.)Threat Analysis & Incident Response 2.)OSINT and Network Forensics 3.)AI-Integrated Security Systems 4.)Vulnerability & Risk Assessment 5.)Secure Web Application Development 6.)Automation & Scripting for Cyber Defense What sets me apart is my hands-on approach — I don’t just research cybersecurity concepts; I implement, test, and refine them for real-world use. My goal is simple: create and secure. Every system I build or analyze is treated as a mission to make technology more trustworthy and adaptive. If you’re looking for someone who combines deep technical skill with clarity, accountability, and innovation — I’m ready to deliver results that truly strengthen your digital ecosystem. less