Crowdstrike işler
...surface and enhancing the CIA triad. Please share some resources or links for further learning in cybersecurity. • Additional information and tips: 1. 1. Consider the use of tools such as PowerPoint, Prezi, Canva, Animoto, etc. to make your campaign more engaging and appealing. 2. For the research part, make use of online resources, such as the Verizon Data Breach Investigations Report, the CrowdStrike Global Threat Report, the MITRE ATT&CK Group's page, etc., to find out what types of attacks are most prevalent and impactful in your domain. You could also use some examples or case studies of real incidents or breaches that illustrate the severity and cost of cyberattacks. 3. When teaching your colleagues about protecting themselves from cyberattacks, be sure to...
...consegna sarà considerata completa quando i test di carico simulati (traffico DDoS), le scansioni di vulnerabilità e un penetration test indipendente dimostreranno un tasso di successo pari a zero per intrusioni non autorizzate e infezioni malware entro il perimetro definito. Strumenti a titolo indicativo (sono aperto a proposte equivalenti): Cloudflare, AWS WAF / Shield, Suricata o Snort, CrowdStrike, Grafana + Loki, Terraform per l’IaC. Preferisco milestone progressive: architettura, implementazione, hardening finale, test e documentazione....
...cloud workloads—so the design must collect and correlate telemetry from both sides without gaps. Core technologies are already chosen: a SIEM for log aggregation and correlation, network-based IDS/IPS for east-west and north-south traffic, and an Endpoint Detection & Response platform for host-level visibility. I’m open to specific vendor recommendations—Splunk, ELK, QRadar, Suricata, Snort, CrowdStrike, SentinelOne, etc.—as long as they integrate cleanly and can scale. To keep expectations clear, here’s what I need delivered: • A high-level SOC architecture diagram, bill of materials, and implementation roadmap. • Installation, configuration, and tuning of the SIEM, including log onboarding from firewalls, servers, SaaS services, ...
...platforms. They will need to install on virtual machines within the AWS cloud, physical machines the contractor has access to of both Apple & Windows systems. The final output will include a detailed Word report with key insights and a PowerPoint slide deck with screenshots of dashboards. Scope of Work: 1. Tool Selection & Setup Collaborate with us to finalize a list of cybersecurity tools (e.g., CrowdStrike Falcon, Qualys VMDR, Tenable, Microsoft Defender, Axonius, etc.) Procure trial licenses and coordinate with me for product access Configure a secure testing lab environment (cloud and on-prem) 2. Hands-On Testing & Evaluation Install and configure each tool Test core functionalities: threat detection, vulnerability scanning, asset discovery, endpoint protection,...
Conduct a combination of initial setup, environment review, standardized template creation, validation of previous testing, quarterly secondary research, and quarterly report creation.
...software license & IT solutions hub. • Provide an intuitive, B2B/B2C-friendly buying journey. • Offer advanced filters, search, and cross-linking to multiple company portals (Main site + Hardware site). • Support scalability, SEO, and promotions. 2. Pages & Design (UI/UX) A. Homepage (Landing Page) • Hero Banner / Slider: Highlight key vendors & products (Microsoft, Palo Alto, Trend Micro, CrowdStrike). • Featured Categories: Endpoint Security, Cloud Licenses, Server Licenses, Productivity Tools. • Vendor Showcase Section: Vendor logos with click-through to vendor-specific pages. • Promotional Banners: Dynamic offers, discounts, trending products. • Trust & Security Elements: SSL badge, certifications, support ...
Hello, We are looking for an experienced trainer to deliver a short-term training project on "CCFA (CrowdStrike Certified Falcon Administrator)". Responsibilities: - Conduct focused training sessions on CCFA (CrowdStrike Certified Falcon Administrator) - Create or adapt training material as required - Provide hands-on lab guidance (if applicable) Requirements: - Proven experience in CCFA (CrowdStrike Certified Falcon Administrator) - Prior corporate training experience preferred - Ability to deliver training effectively within a short-term timeline To Apply, Please Share: - Updated CV / Profile - Course contents (TOC) - Daily / Hourly commercial rates - Lab availability & charges (if applicable) - Your availability schedule Looking forward to collabo...
Hello, We are looking for an experienced trainer to deliver a short-term training project on "CCFA (CrowdStrike Certified Falcon Administrator)". Responsibilities: - Conduct focused training sessions on CCFA (CrowdStrike Certified Falcon Administrator) - Create or adapt training material as required - Provide hands-on lab guidance (if applicable) Requirements: - Proven experience in CCFA (CrowdStrike Certified Falcon Administrator) - Prior corporate training experience preferred - Ability to deliver training effectively within a short-term timeline To Apply, Please Share: - Updated CV / Profile - Course contents (TOC) - Daily / Hourly commercial rates - Lab availability & charges (if applicable) - Your availability schedule Looking forward to collabo...
...real risks lie. From there, I want concise, prioritized recommendations and hands-on help putting the most critical controls in place. Because our exact environment and policies will be shared after kickoff, I’m looking for someone comfortable adapting to a range of scenarios—on-prem or cloud, Windows or Linux, proprietary or open-source tooling. Whether you prefer Nessus, OpenVAS, Burp Suite, CrowdStrike, or another well-known platform, please explain why it fits and how you will keep costs reasonable while meeting industry best practices. Deliverables I expect at a minimum: • A risk assessment report I can hand to leadership, written in plain language • A remediation roadmap that separates quick wins from longer-term projects • Hands-on configur...
A. Homepage (Landing Page) • Hero Banner / Slider: Highlight key vendors & products (Microsoft, Palo Alto, Trend Micro, CrowdStrike). • Featured Categories: Endpoint Security, Cloud Licenses, Server Licenses, Productivity Tools. • Vendor Showcase Section: Vendor logos with click-through to vendor-specific pages. • Promotional Banners: Dynamic offers, discounts, trending products. • Trust & Security Elements: SSL badge, certifications, support contact. • Quick Navigation Links: Shop Licenses, Hardware (Coming Soon), About, Contact. • Cross-Linking & Announcements: o Link to Main Website. o Link to Hardware Website. o “Coming Soon” hardware block. o Exciting Offers section (rotating banners). B. Product Catalog ...
...targeted, hands-on help inside CrowdStrike Falcon to solve a stubborn settings problem: several endpoints show as “undetectable” or “offline” even though the sensor is installed. What I need from you • Quick analysis of why the endpoints disappear from the console (sensor version, network reachability, policy or CID mismatch—whatever the data reveals). • Concrete changes to the relevant settings so each device checks in reliably and policy updates flow without delay. • A short walkthrough so I can repeat the fix on future machines. You’ll have admin access to the Falcon console plus remote access to one affected endpoint for testing. Please be comfortable with sensor diagnostics, policy configuration and network-level t...
I need an expert to integrate Crowdstrike with Google Cloud Platform. The integration should cover: - Security Monitoring: Implement Crowdstrike's tools to monitor threats and vulnerabilities in real-time on our GCP environment. - Incident Response: Set up automated and manual response protocols using Crowdstrike to address security incidents swiftly. - Threat Intelligence: Leverage Crowdstrike's threat data to enhance our GCP security posture and predict potential threats. Ideal Skills & Experience: - Proven experience with Crowdstrike and GCP - Strong background in cloud security - Familiarity with incident response protocols - Expertise in threat intelligence analysis Looking for comprehensive solutions to fortify our GCP security.
...platforms. They will need to install on virtual machines within the AWS cloud, physical machines the contractor has access to of both Apple & Windows systems. The final output will include a detailed Word report with key insights and a PowerPoint slide deck with screenshots of dashboards. Scope of Work: 1. Tool Selection & Setup Collaborate with us to finalize a list of cybersecurity tools (e.g., CrowdStrike Falcon, Qualys VMDR, Tenable, Microsoft Defender, Axonius, etc.) Procure trial licenses and coordinate with me for product access Configure a secure testing lab environment (cloud and on-prem) 2. Hands-On Testing & Evaluation Install and configure each tool Test core functionalities: threat detection, vulnerability scanning, asset discovery, endpoint protection,...
I’m currently looking for Cloud Operations and Security Operations projects—freelance or contract-based. I bring hands-on experience in managing secure, scalable, and highly available cloud infrastructure with a strong focus on automat...orchestration Monitoring & alerting (Prometheus, Grafana, CloudWatch) SecurityOps: Threat detection & incident response Vulnerability scanning & patching IAM, policy enforcement & zero-trust architectures SIEM/SOAR tools (Splunk, ELK, Sentinel) Compliance (ISO 27001, SOC2, HIPAA-ready setups) Tools & Tech: AWS, Azure, GCP, Linux, Terraform, Ansible, Kubernetes, Docker, Git, Jenkins, CrowdStrike, Wazuh, etc. If you have a project that needs solid infrastructure or improved security posture—let’s ta...
I'm seeking a skilled logo designer to create a minimalist logo for my technology (cyber security) company. Ideal Skills and Experience: - Proven experience in designing minimalist and modern logos, particularly for tech companies. Similar to MNCs like Palo Alto Networks, CrowdStrike, and Cisco brand themselves. - Strong portfolio showcasing modern and clean design aesthetics. - Ability to create a unique and memorable brand identity. - Proficiency in color theory and typography. - Excellent communication skills for revisions and feedback. Please provide your portfolio and relevant experience. Looking forward to your creative proposals!
I'm seeking a skilled freelancer to set up SolarWinds SAM templates for monitoring several critical Windows services and applications. Key Monitoring Tasks: - Microsoft Windows Defender: Overall health check, ensuring service is running and signatures are updated. - Windows Updates: Check for the latest updates. - ManageEngine Central Endpoint Agent - Crowdstrike - Windows Firewall - DNS Client - BITS Requirements: - Set up email notifications for alerts on any detected issues. - Ensure all monitored services are logged accurately. Ideal Skills and Experience: - Experience with SolarWinds SAM - Familiarity with Microsoft Windows services and security tools - Strong background in system monitoring and alert configuration Looking forward to your bids!
I'm seeking an expert to build a fully automated N8N workflow that integrates with Crowdstrike and Netskope. The workflow will consume IOCs in JSON format. Key Requirements: - Validate IOCs against MITRE ATT&CK techniques referenced by Crowdstrike. - Log a ticket in Jira only when all conditions are met. - Close IOC in Crowdstrike if conditions are not met. - Link with OpenAI to for example, we can use it to analyze raw IOC descriptions, summarize threat context or even suggest relevant mitre techniques that could be associated - No user intervention required. Ideal Skills: - Experience with N8N automation - Familiarity with Crowdstrike and Netskope - Knowledge of MITRE ATT&CK framework - Jira integration expertise Please provide examples of simi...
I'm seeking an expert to build a fully automated N8N workflow that integrates with Crowdstrike and Netskope. The workflow will consume IOCs in JSON format. Key Requirements: - Validate IOCs against MITRE ATT&CK techniques referenced by Crowdstrike. - Log a ticket in Jira only when all conditions are met. - Close IOC in Crowdstrike if conditions are not met. - No user intervention required. Ideal Skills: - Experience with N8N automation - Familiarity with Crowdstrike and Netskope - Knowledge of MITRE ATT&CK framework - Jira integration expertise Please provide examples of similar work done.
...Peer-reviewed research papers Government or industry standards & protocols Whitepapers from reputable cybersecurity vendors Threat intelligence reports Technical guidance or playbooks --- Ideal Sources Include: Academic journals Government websites Corporate cybersecurity sites Think tanks / non-profits Specific examples: MITRE CISA NIST SANS Institute arXiv CERT Mandiant CrowdStrike Fortinet IBM Security Google Threat Intelligence --- Required Skills & Experience: Strong background in cybersecurity (red/blue team, threat intel, etc.) Experience curating or reviewing security-related documentation Ability to assess document quality and relevance for AI/data use Strong organization and metadata tagging skills --- Bonus Points For: Incl...
We need a logo for our brand, Porthas, that aligns with our new website design at porthas.com. Porthas specializes in cyber security services, and we want the logo to convey a classic and professional style. Key requirements: - The logo should have a classic and professional style. Authoritative font. Same capitalization. Just one word "Porthas" - Do NOT use a...Authoritative font. Same capitalization. Just one word "Porthas" - Do NOT use any more than 1 icon and stay away from shields or locks, it is overused. - Try to stay in 1-2 colors max. Ideal skills for this project include logo design, typography, and a strong understanding of modern and sleek design principles. Experience in designing for cyber security companies would be a plus. Best logos we like: Cro...
...tenants. ✅ CrowdStrike Integration for endpoint detection and response (EDR) logs within Azure Sentinel. ✅ Monitor Network Devices such as switches, routers, and firewalls to track potential security incidents. ✅ Intune Endpoint Security Monitoring to track compliance, device risks, and security posture. ✅ SIEM Use Case Development – Design and implement custom detection rules and analytics. ✅ Incident Response Playbooks – Configure automated responses to security threats. ✅ Dashboard & Reporting – Create real-time security insights and alerting mechanisms. Ideal Skills & Experience: ? Extensive experience with Azure Sentinel SIEM implementation. ? Strong expertise in AWS security monitoring & integration. ? Deep knowledge of Fortigate firewalls, O3...
I'm seeking an expert web designer/developer to create a sleek, mobile-responsive, and professional website for my cybersecurity company, S3cura Solutions Pvt. Ltd. The website's primary aim is to build brand credibility, paralleling industry leaders like Palo Alto Networks and CrowdStrike. Key Features: - Approximately 5-7 pages: Home, About, Services, Contact, etc. - Clean layout for 15+ services under 4 main categories. - Fast-loading, SEO-friendly, and fully responsive design. - Preferably WordPress but open to other suggestions. - Integration of a contact form. - Optional blog/news section. - Guidance on LinkedIn “Book My Time” feature integration on the contact page. Deliverables: - A fully functional website with an admin panel. - Basic documentation o...
...Question 5. Current State (Dropdown) 6. Tools in Use (Dropdown with free entry option) 7. Owner (Dropdown with free entry option) 8. Risk Level (Dropdown) 9. Comments 10. Score (Auto-calculated) --- 4. Dropdown Options (For Freelancer to Implement) Current State (Scored Automatically) Not Started → 0 In Progress → 1 Completed → 2 N/A → excluded from scoring Tools in Use CrowdStrike SentinelOne Defender for Endpoint Splunk Sysmon Darktrace Palo Alto Cortex Rapid7 Proofpoint Mimecast Other (Allow multiple selection via VBA) Owner SOC IT IAM Team AppSec GRC Endpoint Team Cloud Team Other (Allow multiple selection via VBA) Risk Level High Medium Low --- 5. Features & Automation Automated Scoring Add scori...
...Form: A simple “Get in Touch” form with fields for name, email, phone, and message, integrated with email notifications. • Customizable Future Features: Ensure the website can support future scalability (e.g., portals or integration with third-party systems). Site Requirements • Style and Branding: Modern and clean design in line with Argus’s logo and branding colors. • Inspiration Websites: o CrowdStrike o Finaxe o Fidelis Security o Gigamon Technical Specifications • CMS Preference: WordPress, will discuss others if the use case / feature set is compelling • Scalability: Extensible for future features such as customer portals or additional integrations. • SEO Optimization: Integrated SEO best practices for all pages. • Analyt...
...using a Flask API to enable real-time predictions. Frontend Dashboard: Develop a responsive web-based dashboard using React.js to: Display logs and detected incidents in real-time. Allow users to view system status and trigger manual responses. Provide configuration options for response playbooks. Integration with XDR Tools: Connect the system to third-party XDR solutions (e.g., SentinelOne, CrowdStrike) to fetch logs and automate responses. Automation of Incident Response: Create predefined playbooks to automate actions like: Blocking malicious IP addresses. Isolating infected endpoints. Sending alerts to administrators via email, Slack, or SMS. Deployment: Containerize the system using Docker for easy deployment. Provide setup instructions for deploying on Kubernetes or clo...
I am looking for an experienced CrowdStrike professional to assist with improving the platform and providing recommendations. My current security measures are outdated, and I need someone who can help make the platform a better use. Ideal Skills: - Extensive knowledge of Crowdstrike - Proficient in threat analysis - Ability to upgrade security measures The freelancer will have full access to all systems and data required for threat analysis and response.
As a managed security services provider, I require skilled incident response contractors with proficiency in CrowdStrike. Your role will primarily focus on managing incident response to various security threats. Key Responsibilities: - Respond to incidents involving data breaches, malware infections, and unauthorized access. - Leverage CrowdStrike tools and techniques to mitigate security threats. - Provide comprehensive incident response reports. Ideal Qualifications: - Proven experience in incident response. - Proficiency in using CrowdStrike for incident management. - Excellent communication skills for report generation and delivery.
I'm facing a major outage in my CrowdStrike setup due to a software bug. The situation is urgent and I need immediate help in resolving this issue. This project involves troubleshooting and resolving the software bug in my CrowdStrike configuration. Key requirements: - Troubleshoot and identify the root cause of the software bug - Provide a quick and effective fix to ensure normal functioning of CrowdStrike - Experience and expertise in CrowdStrike setup and troubleshooting is crucial - Ability to work under pressure and with a sense of urgency If you have the necessary skills and availability to work on this project immediately, please submit your bid.
I am looking for a freelancer who is well-versed in migrating McAfee Trillex to Crowdstrike endpoint agent on Windows systems. Have about 14,000 endpoints Key Requirements: - Experience: I am keen on seeing your detailed project proposals and your past work. Experience in endpoint security solutions is a plus. Please include your proposed timeline, methodology for the migration, and any challenges you foresee as part of your detailed project proposals.
I'm in need of an intermediate...-senior incident response/digital forensics specialist /Linux sysadmin familiar with triage, mitigation/containment , remediation and report writing. To do a on the job walk through of challenging tasks. So I can shadow watch ad take notes, for my thesis and upcoming internship. • Skills and Experience: - Incident response - Linux sysadmin - SOC Analysis with Sentinel, Splunk, Crowdstrike etc - Digital forensics - Report writing We are looking to record step by step actions taken on any job of your choice, preferably something you are already working on , company names will be changed . This project is to support my thesis and also to help improve skills and speed with incidents Looking for an affordable cost and a...
...platforms. The primary goal of this project is to evaluate and document the distinct strengths and weaknesses of each platform, focusing on their data sources, collection methods, and analysis/reporting capabilities. Platforms for Analysis: The analysis should cover the following threat intelligence platforms: 1. IBM QRadar 2. Recorded Future 3. Microsoft Azure Sentinel 4. Crowdstrike 5. AlienVault 6. Trend Micro 7. VirusTotal 8. Kaspersky Key Areas of Focus: - Data Sources and Collection Methods: Understand and evaluate how each platform gathers and utilizes data for threat intelligence. - Analysis and Reporting Capabilities: Assess the effectiveness of each platform in analyzing data and presenting actionable intelligence. - Pricin...
I'm seeking a professional to automate the process of collecting data every 7 days from Crowdstrike into Splunk. I don't need all data, just specific fields related to application installs on workstations. Kindly review the fields required: - Application name - Installation date and time - Workstation name - User name - Operating system - Installation status - Last used - Versions Ideal candidates demonstrate experience in working with Crowdstrike and Splunk and possess knowledge of data automation. Proven abilities in focusing on specific data fields would be beneficial in this role.
I'm seeking an expert in writing Splunk queries to detect threats, efficiently querying from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expertise include: - Proven skills in extracting and analyzing data from logs - The ability to use Regex queries to extract additional, nuanced information - Proficient querying from CrowdStrike EDR telemetry. The information to be extracted comprises of EDR fields like: - Process Name - File Hash - Command Line I look forward to working with a detail oriented and security savvy professional who will utilize this data to help us identify potential security threats and ensure system integrity.
...with this slide. Slide 2 - Pen Test Provider Summary: Construct a professional table to compare pen test companies. Slide 3: Please recreate the existing content in PowerPoint, maintaining clarity and professionalism. Slide 4 - CTA Strategic Plan Roadmap: Refresh the roadmap with a cleaner, more professional design. Aim for a layout that's easy to follow and visually appealing. Slide 5 - Crowdstrike MSSP Provider Comparison: Transfer the content into PowerPoint format. Enhance the design to make it more modern and professional....
I am seeking an expert specializing in CrowdStrike Identity Protection (IDP) and Ping federate, able to carry out comprehensive task that includes: 1. **User Access Management Improvement:** - Simplify the user provisioning process: The current method is tedious and may be prone to error; a simplified solution is required. - Enhance user authentication methods: I need a robust solution to improve user authentication. - Implement role-based access control: A system that assigns permissions based on roles in the organization. 2. **System Configuration:** - Update server settings: My project requires a professional to adjust server settings for optimal performance. - Configure single sign-on (SSO): Requires an expert to set up a single sign-on system for seamless login...
I need a data collection professional to collect exam questions with answers and put screenshots into google drive. Exams list: CCFA CrowdStrike Certified Falcon Administrator Exam HPE6-A72 Aruba Certified Switching Associate Exam GCP-GCX Genesys Cloud CX Certified Professional Exam NCP-MCI v6.5 Nutanix Certified Professional Exam HPE0-V25 HPE Hybrid Cloud Solutions Exam MB-330 Microsoft Dynamics 365 Supply Chain Management Exam MB-920 Microsoft Dynamics 365 Fundamentals Finance Exam MS-721 Collaboration Communications Systems Engineer Exam MB-800 Microsoft Dynamics 365 Business Central Functional Exam 2V0-21.23 VMware vSphere 8.x Professional Exam SPLK-3001 Splunk Enterprise Security Certified Admin Exam NS0-162 NetApp Certified Data Administrator, ONTAP Exam 5V0-22.23 VMware vSA...
...help me create a corporate identity for my business. Here are the details: Requirements: - Color scheme - Font for website and presentations - Logo - Presentation design Name: - Chronik Color scheme: - Recommend a color scheme that fits our brand. - We are a software solution that leverages AI for archiving files. - The scheme should be modern and clean. I like bold logos like SentinelOne, Crowdstrike or Cybereason - Possible colors: Red, Blue, Black, Purple - Please create a unique icon with it. Overall tone: - I want my corporate identity to convey a professional image. Ideal skills and experience: - Graphic design experience - Ability to create a unique and professional logo - Understanding of color psychology and how to use cool colors effectively - Strong attention to d...
Looking for product names for SaaS application (web based) serving cyber security industry. The name must be catchy like SentinelOne, CoalFire, CrowdStrike, CloudGuard, Archer, like one word or combination of two words. The product is a risk, information security and compliance management platform for cyber security professionals and will facilitate management of cyber security audits, assessments, identified risks, etc. The name must be formed using alphabets without hyphen or numbers, must contain one or two words not more than that, length must be less than 10-12 letters. Relevant terms - risk management, cyber security, information security, governance, compliance
...remediation scripts to be executed within the N-Able NCentral platform on customer equipment such as servers, workstations, and network equipment. -Review and audit customer environmental health, operational efficiency, and network security design maturity to support more effective and robust design and systems monitoring. -Respond to critical security events discovered and reported within Next7's CrowdStrike EDR solution and Cisco Umbrella. -Identify weaknesses in the above listed, design resolution paths, and receive approval from your direct supervisor to implement improvements in systems monitoring, operational efficiency, and network security practices. -Work directly with the Proactive Service team to improve procedural documentation, customer documentation, and th...
I have been asked to create a termination and lockout plan for the Senior Director of IT. This needs to be an all encompassing plan at least a page in length. The services that need to be disabled are Okta, Azure AD, Fortigate, Tactical RMM, Mimecast, Office 365, CrowdStrike to name the most critical. The document should be highly detailed with steps and timing. This is highly urgent and has a 4 hour requirement. The appropriate individual for this project would have experience terminating technical staff with a highly technical background with management experience and plan writing experience.
The objective is to compile a roster of ~1000 Salesperson/ Client Managers, holding the position of Lead to Senior Manager level in cybersecurity service providers such as CrowdStrike, Pwc, Accenture, Optiv, etc., along with their respective LinkedIn profile URLs. Most Important Note: I am not looking for employees that are just lead/managers. I am specifically looking for employees who are between lead-managers and their specifc role is to find clients (that need CyberSecurity services) for their company they work for. Note: The list of ~1000 Salesperson/ Client Managers should compromise of Individual for top Countries and Geo like Dubai, Saudi Arabia, India, Singapore, Australia, USA, UK, Europe, APAC etc. Please see all conditions that needs to be fulfilled , specifically...
Title: Patch Management Systems Administrator, Level 2 o NESSUS vulnerability scanner o Microsoft Endpoint Configuration Manager, o Microsoft Intune, o Microsoft System Center Configuration Manager, o Windows server and workstation administration. o SolarWinds o Linux/UNIX Server Administration o crowdstrike
Looking for Security Engineer who have experience and skills on Endpoint detection and prevention (EDR), CASB solution, and integration of Security Tools. plus, must know about API call.
We are a small business with several employees that needs continuous IT support. In the immediate term we support for: - Migration of Zoho (mail, calendar, contacts) to Office365 - Integration of Office 365 with different softwares - Set-up of Crowdstrike and OneLogin In the short-term - Integration between Nextcloud server and OneDrive - Installation of new computers (through OneLogin) - Other IT support needs Please when you bid mention your experience in ALL OF the items above. Skills needed - Operating systems: Windows 10 for PC and Android and IOS for mobiles; - Basic Networking: TCP/IP, wired and wireless networks configuration, VPNs; - PC Hardware configuration & diagnostic; - Network peripherals: multi-functional printers, scanners etc; - Networking services and ...
Crowdstrike implementation at one of our client in Delhi for 4000 users. Crowdstrike essential support will closely assist with setting up platform, policy configuration and support required. Consultant with hands on experience in endpoint protection and EDR solutions especially in Crowdstrike. Should be able to manage the project and documentation required. Can be handled remotely but may required to visit on site sometimes. estimated time to complete the project is 7 days but may need get extended due to customer delay for 15 days.
...) This one example is mostly what I am talking about: for the main view and bottom “pane”, this one is also on the same concept: For the tree-filter relationship with the events shown, look at this example for an idea: , I would like to have a vertical bar like the one shown to mark the “current date-time” (Now), note how in the calculations, the parent element’s length accounts for all the lengths of all the events from its children. Maybe there is a better way to show the data? I’m open to ideas. In general, this is a mix of a traditional “timeline” but with properties of a “gantt chart”
I require an animated header for a website. The header consist of a company logo that has to be animated and the background colour must suit the logo. The logo consist of words & two symbols (car and bird). The words should appear like (26. Crowdstrike): and the two symbols (car and bird) should be moving. If you could show me a proposal and convince me that you can create an impressive animation then I can consider your bid. Resource: The logo would be provided. It should be impressive. Also you should be flexible to accept changes and make adjustment if needed.
...demasiado "simple, colorida, a juego con la web" Algunos si/no ejemplos SI (quizas muy futurista y grafico? pero podria ir bien orientado) NO, demasiado tipico NO, tipico After Effects SI, perfectas visuales y elementos. Quizas much para nuestro producto, pero sin duda muy alto en calidad. [eliminado] SI, demasiado hightech y futurista, pero la calidad de animación y como algo así podría integrarse con el uso ed nuestra plataforma etc. Como veras por ideas nos sobran, y no buscamos aprovecharnos de alguien para que la busque para nosotros