Network Security Analyst
and CMMC, assisting with audits, documentation, and control implementation. · Deploy, administer, and monitor CrowdStrike...) platforms, such as CrowdStrike Falcon, SentinelOne, or Microsoft Defender for Endpoint....
and CMMC, assisting with audits, documentation, and control implementation. · Deploy, administer, and monitor CrowdStrike...) platforms, such as CrowdStrike Falcon, SentinelOne, or Microsoft Defender for Endpoint....
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern... world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep...
detection and response efforts by authoring CrowdStrike IOAs/IOCs, writing SIEM queries, and tuning alerts to reduce noise... of the following areas: identity (Okta), endpoint (CrowdStrike/Kandji), SaaS security, or detection engineering. Autonomy...
like PowerShell for advanced troubleshooting. Support security and authentication solutions such as OKTA and CrowdStrike..., and IP phone systems Familiarity with security tools such as OKTA and CrowdStrike Knowledge of cloud environments including...
from endpoint protection platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender), network security controls (e.g., secure web...) platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint), network security tooling, and cloud security...
/fanotify, auditd/seccomp, and ELF/ptrace. Experience with third-party endpoint security products such as CrowdStrike Falcon...
Black, Cisco secure endpoints, Crowdstrike). Email defense (Proofpoint, Mimecast, Exchange Online ATP). Vulnerability...
, VA area. RESPONSIBILITIES: Serve as the primary technical authority for CrowdStrike, guiding best practices..., investigation, and response using CrowdStrike, including threat hunting and malware analysis in collaboration with the SOC Deploy...
, VA area. RESPONSIBILITIES: Serve as the primary technical authority for CrowdStrike, guiding best practices..., investigation, and response using CrowdStrike, including threat hunting and malware analysis in collaboration with the SOC Deploy...
protection, threat analytics platforms, and Zero Trust architecture Exposure to tools such as CrowdStrike, Office 365, Microsoft...