Cyber Security Consultant
Бюджет ₹1250-2500 INR / час
Job Description:
Need an expert who can support in
MDR / EDR: Endpoint detection and response (EDR) - Protecting an endpoint against cyber threats
Managed detection and response (MDR) - MDR includes everything that it needs to protect itself against the evolving cyber threat landscape.
MFA: Multifactor Authentication & required tools like Authenticator, VIP Access etc
Active Directory Hardening and LAPS
Active Directory Security Hardening to mitigate various attack techniques within privilege escalation, obtaining remote access, lateral movement and data exfiltration
Local Administrator Password Solution (LAPS) provides management of local account passwords of domain joined computers. Passwords are stored in Active Directory (AD) and protected by ACL, so only eligible users can read it or request its reset.
Quarterly Vulnerability Scanning:Good understaning of VA scans & various tools related to VA
Privileged Access management:Privileged access management (PAM) consists of the cybersecurity strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for users, accounts, processes, and systems across an IT environment.
Risk Assessment (NIST /ISO etc)
The National Institute of Standards and Technology (NIST) and the International Organization for Standardization (ISO) are the leading standards bodies in cybersecurity
Person needs to have SME level knowledge on these frameworks
Security Assessment Training
Security Policy Review and Development
- Process
- Assessment & Recommendations
Penetration Test Penetration Test
-Process
-Tools
- Assessment & Recommendations
Additional Logging and Monitoring (SIEM) Additional Logging and Monitoring (SIEM)
-Process
-Tools (SolarWinds Papertrail, LogDNA, Graylog, ManageEngine EventLog Analyzer, LogFusion, Netwrix Event Log Manager, XpoLog, Sumo Logic)
- Assessment & Reccomendations
DLP Data Loss Prevention (DLP) is the practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data . Organizations use DLP to protect and secure their data and comply with regulations.
11 фрилансеров(-а) готовы выполнить эту работу в среднем за ₹1970/час
Greeting Of the day, I hope you are doing great. I fortunately came across gig and gathered all that which you are looking for. I am more than willing to unify with the project as the skills mentioned by you fits my e Больше
Solutions focused, Meticulous and result oriented professional offering 13.9 years of successful career in Cyber Security distinguished by commended performance and proven results. Security Architect for Aarogya Setu Больше
I have 4.5+ years of experience in the below :- Strong expertise in MDR/EDR, with experience in protecting endpoints against cyber threats and managing the evolving cyber threat landscape. In-depth knowledge of multif Больше
Hello ; I Subhadeep Pramanik ; CyberSecurity Enthusiast , Web Application Penetration Tester , Bug Hunter For More info , checkout my profile ...
OSCP, CISM, CEH Certified, M tech OSCP, CISM, CEH Certified, Masters in Technology, Helping companies to secure their data, code and applications. Experienced Information Security Consultant with a demonstrated histo Больше
Expert on Cisco, Checkpoint, Forcepoint, EDR, DLP, Proxy, MDR. “Honestly, I possess all the skills and experience that you’re looking for. I’m pretty confident that I am the best candidate for this bid project.
PENETRATION TESTING and ethical hacking services provided by a certified ethical hacker . Totally legal process are accepted.
Passionate about cybersecurity and dedicated to learning more about this constantly-evolving field, I am a cybersecurity enthusiast with a hunger for knowledge and a desire to make a difference. While I may not have an Больше