• Hourly
  • Expert
  • Est. time: Less than 1 month, Less than 30 hrs/week

One of our colleagues had his personal Facebook hacked. This person changed his email and his phone number making recovery impossible. The hacker is acting as him and messaging clients and other friends and family. We just want to deactivate his account.

Digital ForensicsNetwork SecurityInformation SecuritySecurity Analysis
Posted 2 weeks ago
  • Hourly: $20.00 - $60.00
  • Intermediate
  • Est. time: More than 6 months, 30+ hrs/week

We are seeking a Security Specialist to contribute to our ongoing security initiatives. The ideal candidate will have a strong understanding of cybersecurity, current threats and the ability to apply security concepts in practical applications. Responsibilities: Assist our Lead Security Engineer to implement our security initiatives and operations. Assist in analyzing and reporting on security vulnerabilities and risks, and contribute to strategies for mitigating them. Support compliance efforts, adhering to SOC 2, GDPR, and other global regulations, while facilitating third-party audits. Monitoring security logs, alerts, and incident reports. Conducting regular risk assessments, vulnerability scans, and internal security audits for threat identification and policy compliance. Staying current with cybersecurity trends, technologies and sharing insights with the team. Required Skills: Understanding of network infrastructure, firewall configurations, and cloud technologies. In-depth knowledge of security protocols, concepts, SIEM tools, IDS/IPS systems, IAM solutions and security analysis techniques. Experience with vulnerability scanning, log analysis, security auditing, and compliance assessments. Exceptional problem-solving and analytical abilities, coupled with strong communication and documentation skills. Knowledge of compliance frameworks such as GDPR, SOC 2, and other relevant industry regulations Proficiency in Linux operating systems and virtualization technologies. Preferred Experience: Previous experience in a dedicated cybersecurity role, with hands-on responsibilities in threat detection, incident response, and security operations. Familiarity with advanced persistent threats (APTs), phishing campaigns, malware analysis, and other sophisticated attack vectors and techniques used by threat actors. Industry-recognized certification (CISSP, CISM, CompTIA Security+, etc.) or education in cybersecurity, computer science, or a related field. Proficiency in scripting languages such as Python or PowerShell for automation of security tasks. What Makes a Good Candidate: A strong candidate for this role should possess technical skills in cybersecurity, coupled with a proactive and analytical mindset. They should thrive in a collaborative team environment and demonstrate excellent communication abilities. Ideal candidates should exhibit a genuine passion for security, staying ahead of emerging threats and continuously enhancing their knowledge and expertise. They should be driven to anticipate and mitigate potential risks, while consistently seeking to fortify our organization's security posture. The ability to work closely with cross-functional teams, including the Lead Security Engineer, is crucial to ensuring our security initiatives are successfully implemented and compliance requirements are consistently met.

Security TestingPenetration TestingInformation Security ConsultationCybersecurity ManagementBusiness with 10-99 EmployeesInformation SecurityNetwork SecurityInternet SecuritySecurity AnalysisVulnerability Assessment
Posted 2 weeks ago
  • Hourly: $45.00 - $60.00
  • Intermediate
  • Est. time: More than 6 months, 30+ hrs/week

Job Description: Data Defenders is looking for a Cybersecurity Engineer in Chicago, IL to support a range of cybersecurity lifecycle activities that include the development of Security controls and Risk Management Framework (RMF) Assessment and Authorization. A successful candidate will work independently and as a team by planning, evaluating, and implementing the security systems that protects Informational Technology in Data Defenders infrastructure. Duties & Responsibilities: Implement vulnerability/risk assessment analysis to support accreditation and other program protection activities Understanding of complex networks including Servers, Network Devices, Service Interaction & Security Detect security risks and exposures, determine the causes of security violations, and suggest procedures to halt future incidents. Investigate and resolve security incidents and recommends enhancements to improve security. Apply various information system inspection tools to audit systems, analyze potential vulnerabilities and identify mitigation approaches Ensure systems and networks comply with state and local regulatory standards and internal policies. Measure business risks and evaluate the effectiveness of controls at the network, operating system, database, and application level. Conduct technical evaluation of information system designs, focusing on information security aspects and accreditation Monitors technology throughout the county for adherence to security best practices to achieve a greater overall security posture. Review completion and implementation of system additions and enhancements, and makes recommendations to management Maintain current knowledge of relevant technology and security threats as assigned Other duties as assigned Technical Qualifications Associates Degree in computer science, engineering, or a related technical discipline with 5 years of IT experience Bachelor’s degree in computer science, engineering, or a related technical discipline with 2 years of IT experience Must have a Recognized Security Certification including CISSP or CCSP (associated will be considered), CEH or Security+ Other Industry Certifications such as Network+, Microsoft, Cisco, AWS or GCP certifations preferred Other Qualifications Great Computer and Technical Skills Must be a team player who enjoys working in a collaborative/team environment Good soft skills including written and verbal communication and presentation Live in Greater, Chicago, IL area Able to pass a background screen (including criminal record and credit check) Job Types: Contract, Full-time Education: Bachelor's (Preferred) Experience: IT support: 2 years (Preferred) Cybersecurity: 1 year (Preferred) License/Certification: CISSP or CCSP (Required)

Network SecuritySecurity EngineeringInformation SecurityPenetration TestingFirewallSecurity InfrastructureSecurity AnalysisVulnerability Assessment
Posted 2 weeks ago
  • Hourly: $35.00 - $95.00
  • Entry Level
  • Est. time: 1 to 3 months, Less than 30 hrs/week

Are you passionate about safeguarding sensitive information and preventing cybersecurity threats? Join our team at EDGE Group as an Information Security Analyst and play a pivotal role in securing our organization's digital assets and ensuring the integrity of our operations. We are seeking a talented individual with a keen eye for detail and a strong understanding of information security concepts. As an Information Security Analyst at EDGE Group, you will be responsible for continually monitoring our systems, analyzing potential risks, and implementing measures to fortify our defenses against cyber attacks. Key Responsibilities: Conduct regular assessments of our network security infrastructure Identify vulnerabilities and potential security risks Monitor security events and investigate potential breaches Collaborate with IT and business teams to implement security solutions Stay abreast of the latest industry trends and best practices to enhance our security posture Qualifications: Bachelor's degree in computer science, information technology, or related field Certifications such as CISSP, CompTIA Security+, or CISM are a plus Experience with security tools and technologies Strong analytical and problem-solving skills Excellent communication and interpersonal abilities At EDGE Group, we prioritize the development and well-being of our employees. If you are looking for a challenging and rewarding opportunity to make a tangible impact on the security landscape of our organization, we encourage you to apply for this role. Join us in our mission to uphold the highest standards of information security and protect our company and its stakeholders from potential threats.

Information SecurityVulnerability AssessmentPenetration TestingSecurity AnalysisInformation Security AuditCertified Information Systems Security ProfessionalCybersecurity Management
  • Hourly: $50.00 - $100.00
  • Intermediate
  • Est. time: 3 to 6 months, Less than 30 hrs/week

We're embarking on a critical initiative requiring a seasoned consultant capable of navigating the intricate landscape of FedRAMP compliance within the Azure cloud ecosystem. This multifaceted project demands an individual with a robust skill set spanning consulting, implementation, and gap remediation. The ideal candidate will demonstrate a profound understanding of FedRAMP mandates and possess a wealth of hands-on experience in architecting, securing, and optimizing Azure environments to meet stringent compliance standards. In addition to technical prowess, exceptional project management acumen is paramount, as the consultant will be tasked with orchestrating the end-to-end process seamlessly. This entails conducting comprehensive gap assessments, devising and executing strategic implementation plans, and guiding stakeholders through remediation efforts with precision and clarity. The selected consultant must exhibit strong communication skills to effectively liaise between technical teams, executive leadership, and regulatory authorities, ensuring alignment of objectives and swift resolution of any compliance hurdles. Proven experience in shepherding organizations through the FedRAMP certification process, coupled with a demonstrable track record of delivering tangible results, will be highly regarded. If you possess the expertise, agility, and tenacity to excel in this dynamic role, we invite you to showcase your credentials and outline your approach to driving success in this pivotal endeavor.

Information Security ConsultationInformation SecuritySecurity AnalysisTech & ITFedRAMPMicrosoft AzureGap AnalysisImplementation
  • Hourly
  • Intermediate
  • Est. time: 3 to 6 months, Less than 30 hrs/week

We are seeking a skilled and experienced ISO 27001 & 27002 Certification Specialist to work with us remotely. In this role, you will play a crucial part in maintaining and enhancing our Information Security Management System (ISMS) by achieving and maintaining ISO certification ISO 27001 and ISO 27002. Key Responsibilities: -Internal Audits and Compliance: Plan and conduct internal audits to ensure compliance with ISO 27001 and ISO 27002 standards. -ISMS Development and Maintenance: Develop, implement, and maintain an effective Information Security -Management System (ISMS) aligned with ISO 27001 and ISO 27002 standards. -Policy and Procedure Management: Develop, review, and update information security policies, procedures, and guidelines to ensure compliance with ISO standards and industry best practices. -Training and Awareness: Conduct training sessions and workshops for employees on information security best practices and ISO standards. Promote a culture of security awareness throughout the organization. -Documentation and Reporting: Maintain accurate and up-to-date documentation of information security policies, procedures, and controls. Prepare reports for management on the status of the ISMS and audit findings. Qualifications: -Excellent communication: Fluent in English -Experience: Proven experience in implementing and maintaining ISO 27001 and ISO 27002 certifications. -Experience with other information security frameworks and standards is a plus. -Knowledge: In-depth knowledge of ISO 27001 and ISO 27002 standards, risk management, and information security best practices. If you are a dedicated professional with a passion for information security and a track record of success in ISO 27001 and ISO 27002 certifications, we encourage you to apply for this exciting opportunity. Join our team and contribute to the security and success of our organization.

Vulnerability AssessmentSecurity Policies & Procedures DocumentationInformation SecurityIT Compliance AuditISO 27001NIST SP 800-53Network AdministrationCertified Information Systems Security ProfessionalComputer NetworkCompliance ConsultationSecurity AnalysisCloud Security Framework
Posted 3 weeks ago
  • Hourly
  • Intermediate
  • Est. time: More than 6 months, Less than 30 hrs/week

We are a small company of about 50 users. All of our employees are utilizing laptops and located around the US. We are in need of someone that we can call upon whenever there is a hardware related issue that our internal software team cannot handle. This may include troubleshooting Chrome, Microsoft 365, and any Windows or home network related issues. Ideally, while we have employees in other time zones, we would like this person to be available Monday-Friday 8AM-5PM CST. We would like for billing to be only as a as needed basis. Meaning, billed only for the hours utilized.

Internet SecuritySecurity AnalysisLinux System AdministrationLAMP AdministrationNetwork AdministrationTechnical SupportWindows AdministrationHelpdeskMicrosoft WindowsData RecoveryOffice 365Incident ManagementMicrosoft Active DirectoryDatabase AdministrationMicrosoft Azure
Posted 4 weeks ago
  • Fixed price
  • Expert
  • Est. budget: $150.00

My instagram got hacked. I need an expert to help me recover it

Ethical HackingSecurity Analysis
Posted last month
  • Fixed price
  • Expert
  • Est. budget: $150.00

This is a simple fixed priced / fixed time gig where you and I will sit together and configure CyberSecurity policies on multiple business systems, including Microsoft Office Exchange, and Multiple Firewalls including WordFence, Cloud hosting vendors and a network appliance hardware. If it goes well, my preference is to meet for 1-2 hours a month on various cybersecurity issues. lets see how much we can get done in a 100 minute meeting, then the gig is done.

FirewallSecurity AnalysisVulnerability Assessment
  • Hourly: $30.00 - $200.00
  • Expert
  • Est. time: Less than 1 month, Less than 30 hrs/week

Hey there! We're a team from Israel that's looking to explore SaaS ideas in the cybersecurity space. We're looking to interview Information Security leaders 1:1 over Zoom to ask you some questions and learn about your needs and pain points: what you're doing now, what your biggest problems are, and where we can help. I'm looking to hire 10 people for this panel, so please apply even if it shows that someone has been hired. Please attach your LinkedIn profile.

Information Security ConsultationApplication SecurityEncryptionSystem SecurityBusiness with 10-99 EmployeesBusiness with 100-999 EmployeesSecurity AnalysisInformation SecurityNetwork Security
Jobs Per Page: Â