Hire the best Certified Systems Security Practitioners

Check out Certified Systems Security Practitioners with the skills you need for your next job.
Clients rate Certified Systems Security Practitioners
Rating is 4.7 out of 5.
4.7/5
based on 295 client reviews
  • US$85 hourly
    Security engineer and technical editor/writer specializing in cybersecurity architecture, operations, compliance/audit readiness, vulnerability scanning/pen testing, and technical documentation. Experience drafting security policies/procedures, and conducting cybersecurity framework mapping/pre-audit prep for NIST, PCI DSS, SOC2, HIPAA, HITRUST, GDPR, ISO 27001, and privacy and security frameworks. Proven track record of technical team and project management.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    HIPAA
    Technical Documentation
    NIST SP 800-53
    ISO 27001
    Technical Writing
    IT Compliance Audit
    SOC 2 Report
    Internet Security
    Security Infrastructure
    Application Security
    Information Security
    Penetration Testing
    Cybersecurity Management
    System Security
  • US$25 hourly
    ✅ As a CREST/Offensive Security (OSCP) Certified Penetration Tester and Cyber Security Consultant, I have deep knowledge of Security Assessment Methodology to identify vulnerabilities in Network, API, Web, and Mobile Applications. ✅ I have conducted Penetration Test, Vulnerability Assessment and delivered professional reports to companies in the world complying with: ► CREST standards ► Offensive Security (OSCP) standards ► OWASP Top 10 Vulnerability ► OWASP API Security Top 10 Vulnerability ► OWASP Mobile Security Top 10 Vulnerability ► Application Security Verification Standard 4.0 (ASVS 4.0) ► CWE Top 25 Most Dangerous Software Errors ► ISO 27001 Penetration Testing ► Payment Card Industry Data Security Standard (PCI DSS) ► General Data Protection Regulation (GDPR) ► Common Vulnerability Scoring System (CVSS) ► Open Source Security Testing Methodology Manual (OSSTMM) ✅ I have some cybersecurity certifications including: ► CREST Registered Penetration Tester (CRT) ► CREST Practitioner Security Analyst (CPSA) ► Offensive Security Certified Professional (OSCP) ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ► Executive Summary ► Assessment Methodology ► Type of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings. Each finding listed within the report will contain CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ► Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, Zaproxy, Gobuster, etc.) ✅ Please contact me if you have any question. ✅ Thank you and have a good day!
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Security Analysis
    Software Testing
    White Box Testing
    Web App Penetration Testing
    OWASP
    Black Box Testing
    Network Penetration Testing
    Information Security
    Website Security
    System Security
    Penetration Testing
    Security Testing
    Vulnerability Assessment
  • US$30 hourly
    Thanks for reaching out 🚀 This is Mahmudul, I've been doing WordPress Development, Theme Development and WordPress Security works for the past 12 years. My few achievements are- ✅ Top 3% Upwork Freelance WordPress Security Expert ✅ Private Member of Upwork Talent Cloud ✅ 100+ Successfully completed big projects with 5-star ratings. In the past 12 years, I've worked with hundreds of clients in Upwork and gathered some specific skill sets in WordPress Development and WordPress Security. I can create WordPress themes from scratch, using page builders like Elementor, Divi, Beaver Builder, Guternberg etc. I can also recover your hacked website, remove malware, unblock from Google blacklist, secure your server, secure your website from future attacks, etc. my main services are- ✅ WordPress Theme Development ✅ Elementor, Divi, Beaver Builder, Gutenberg Theme builder ✅ WordPress Malware Removal ✅ WordPress Performance Optimization I'm a fun guy to work with! I'm super reliable and responsible, I deliver the work on time.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Linux System Administration
    WordPress Malware Removal
    WordPress Theme
    Page Speed Optimization
    Virus Removal
    Website Optimization
    Internet Security
    Network Penetration Testing
    Technical Support
    Website Security
    cPanel
    Linux
    WordPress e-Commerce
    Bug Fix
    System Security
  • US$70 hourly
    Greetings! 🛡️ Welcome to the forefront of Cybersecurity, where your digital safety is my utmost priority. With over 9 years of dedicated experience in IT Security, I'm not just an expert; I'm your strategic partner in fortifying your digital presence. As a Certified Ethical Hacker (CEHv9) and an OSCP Certified Tester, I bring a blend of expertise, passion, and precision to every challenge. Why Choose Me? 🔍 My expertise lies in conducting meticulous Security Assessments and Penetration Tests, designed to unearth vulnerabilities and bolster the defenses of your IT infrastructure. My mission? To elevate your organization's security posture and engineer robust solutions that safeguard your digital assets against the ever-evolving cyber threats. Specialized Services Tailored to Your Needs: ✅ Web Application Penetration Testing: Probing and fortifying web applications to withstand cyber assaults. ✅ Network Penetration Testing: Securing your network's nooks and crannies against intrusion. ✅ Mobile Application Penetration Testing: Shielding your mobile apps from the prying eyes of cyber adversaries. ✅ Security Audits: Comprehensive examinations to ensure your security measures are up to snuff. ✅ Vulnerability Assessments: Identifying chinks in your digital armor, paving the way for fortification. ✅ Dynamic Code Analyses: Scrutinizing the veins of your code for vulnerabilities. ✅ Infrastructure Penetration Test: A deep dive into your infrastructure to secure it from potential threats. 🚀 If you're on the hunt for a Cyber Security Vanguard who's passionate about crafting impenetrable digital domains, look no further. Hit the green "Invite" or "Hire Now" button to catapult your security to the next level. I'm eager to embark on this journey with you and transform your cyber defense mechanisms. Let's connect and explore how we can turn your IT environment into a bastion of security.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Cloud Security
    Internet Security
    Web App Penetration Testing
    Security Analysis
    Security Infrastructure
    Information Security Audit
    Web Application Security
    Information Security
    Vulnerability Assessment
    Security Testing
    Database Security
    System Security
    Application Security
    Network Security
    Penetration Testing
  • US$55 hourly
    ⭐Top-rated DevOps & Cloud Architect with about 80 completed projects on Upwork. I lead a team of highly motivated DevOps experts who are ready to provide advice and assistance with various issues and technologies. Just book a consultation, send us a request and we will choose who will best cover your inquiry. What you will get with me and my team? ✅Price & Value balance. With us, you get top-quality DevOps assistance at a reasonable price. We are sensitive to customer’s needs and use a proactive mindset and efficient workflow to exceed your expectations. ✅Long-term support. We tend to build reliable long-term relationship with our customers, supporting them throughout their product lifecycle. ✅Relevant expertise. Our team members use all modern DevOps tools & technologies to cover various challenges. We have AWS/GCP certified experts in team and internal DevOps training program which helps to grow strong talents in-house. ✅Business-oriented approach. We work with startups and businesses of different scale every day and know how to enable the efficient use of resources and save up to 80% in your infrastructure costs, how to improve deployment time from weeks to minutes, and how to make your setup secure. ===== Technologies that I adopt and I’m an expert at: - AWS, GCP, Azure - Docker - Kubernetes - Terraform - Ansible - Jenkins, CircleCI, GitHub/BitBucket pipelines - Prometheus - Grafana - Datadog etc. My area of expertise includes: DevOPS • CI/CD • Infrastructure as Code • Container Orchestration • Configuration Management SysOPS • Remote Infrastructure Management Services • Monitoring • Application Management • Infrastructure Upgrades/Migration CloudOPS • Cloud Administration (AWS, GCP, Azure, Digital Ocean) • Cloud Monitoring & Maintenance • Cloud Cost Optimization • Architecture Consulting • Cloud migration DbOPS • Remote Database Administration Services • Performance Optimization • Orchestrated Migration across platforms/ databases Industries I have experience with: - Fintech - Healthcare - Security - Marketing - Blockchain - Delivery, etc. ===== Case studies of the customers I have worked with: 🔸Safe and Cost-Effective Infrastructure to Bring One-Click Deployment For a Cyber-Security Provider: Deployment time decreased from 8 hours to 10 minutes (48x faster deployment). Fewer resources (time/costs/employee-hours) are now required as code deployment has moved from a tedious, manual process to a codified, automated mechanism. 🔸Backend Infrastructure Design & Development for all-in-one connectivity platform for restaurants & stores: Product provisioning time shortened from 1,5 weeks to 1 hour. Company can drive much more value to their customers now, due to being able to provision the product 200-300 times a month, instead of 5-6 monthly deployments. System redesign and automation allowed to save 30-35% of the budget and free the internal resources for more important tasks. Feel free to contact me or book a consultation, I’d love to discuss your project and help you reach business goals.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Containerization
    Blockchain
    Web3
    Cloud Architecture
    Terraform
    Ansible
    AI Chatbot
    Docker
    Infrastructure as Code
    Jenkins
    Kubernetes
    Azure DevOps
    Google Cloud Platform
    DevOps Engineering
    Amazon Web Services
  • US$30 hourly
    I'm a Penetration Tester and Cyber Security Specialist who is a professional in evaluating the security posture of Web-Applications (Websites) and ensuring the security of personal clients' online identities, accounts, devices, and networks, I've possessed my current knowledge through 3+ years of self-study and research plus 2+ years of work in the industry, protecting clients on a personal level and running vulnerability assessments against business websites, always leaving positive impression and impact, I hold a great record of being able to expertly provide the following services: - Perform comprehensive security checkups on Emails and Phone numbers and pinpoint security holes which often lead victims to be hacked with zero interaction nor awareness from them. - Assist in Account Recovery (Ex. Instagram, Facebook) - Educate thoroughly on the findings and remediations for a vulnerable target, equipping clients with enough information to trust themselves as they continue to utilize the technologies as normal with no fear of being targetted by hackers. - Investigate and educate on online frauds/scams, especially crypto ones, why and how they work, and how to distinguish between legit and not legit easily. - Clean up networks and devices from viruses/malware and ensure optimal patching for security. - Report fraud websites that impersonate legit businesses for a takedown. IMPORTANT: When it comes to cybersecurity-related services, there is a number of scammers not to be underestimated, whether within or outside of Upwork, therefore stay vigilant and keep in mind the following, 1. If you were scammed online via crypto, there's no one out there with the right to give a guarantee that they will be able to recover it for you despite how well furnished the so-called hacker's portfolio appears to be, the chance remains very slim and you should only pursue this kind of service for the sake of leaving no stone unturned knowing the high probability of failure, and you should only select a freelancer with a reputable profile and reviews to back up their activity because scammer accounts are usually fresh with no reviews and no verified ID, feel free to consult me to evaluate that. 2. Same applies to the request of hacking an account, there are complicated caveats that explain why it DOES NOT work the way you think it does but to keep it short, if you want someone's account hacked, aside from it being illegal and unethical and isn't the type of "service" I provide, the chance for it to work is about 1% to begin with, again, I'm available for consultation, account recovery is a different subject with a higher probability for success as long as it's your own account that was lost/hacked.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Malware Removal
    Information Security
    Vulnerability Assessment
    System Security
    Network Security
    Information Security Consultation
    Website Security
    Penetration Testing
    Network Penetration Testing
    Internet Security
    Ethical Hacking
    Security Testing
    Security Assessment & Testing
  • US$40 hourly
    "Erdem is an AMAZING freelancer that I will be working with in the future. His communication and professionalism is exactly what we were looking for. If you are looking for great talent, you found it with Erdem!" ⭐️⭐️⭐️⭐️⭐️ "Erdem was always available for us and helped us very well in a critical situation (website down). We highly recommend this freelancer, and we will work with him again without any doubt." ⭐️⭐️⭐️⭐️⭐️ Working with Erdem has been a great experience. He is very professional with communication. All things we assigned were done with ease and before our deadlines. Thanks again!" ⭐️⭐️⭐️⭐️⭐️ "Erdem is an amazing freelancer and will be working with him in the future on several different projects. He is helpful and wants to make sure the projects are completed perfectly. I have worked with tons of freelancers over the years and Erdem is one of the best." ⭐️⭐️⭐️⭐️⭐️ System administrator that brings both technical side and business side of things together. Having five years of experience in System Administration and business management brings forward the person to add value to your startup or business. It does not matter if you have a complete plan on your desk or just an idea on your mind, contact me and let’s eliminate all question marks. A short list of things I worked on before: ✅Setting up Dedicated and Cloud servers for clients and agencies. ✅Installing, configuring, and managing control panels (Cpanel, Plesk, Cyberpanel). ✅Virtualization of Dedicated server with Proxmox VE using different RAID configurations. ✅Installing and configuring BigBlueButton and Scalelite. ✅Configuration tweaks for existing servers of clients to achieve better performance and lower TTFB. ✅Configure local and remote backups. ✅Server migration between different operating systems or control panels. ✅Fixing webserver (apache, nginx, litespeed) related issues. ✅Mailserver configuration and setup. ✅DNS configuration and setup. ✅Total server management for agencies. I have worked with most of the server provider companies, including Hetzner, OVH, DigitalOcean, AWS, Linode, Google Cloud, Microsoft Azure, Contabo, and Vultr. "Erdem rescued my website from a dire situation. Traffic, revenue, and usability have been greatly improved in a matter of hours. Erdem did a great job of communicating what he was doing and why. The work was completed the day the contract started, and everything was delivered as promised. I would recommend working with Erdem over any user claiming to be an SEO or WordPress "expert"." ⭐️⭐️⭐️⭐️⭐️ "Excellent WordPress migration work carried out in record time. Efficient and serious. I highly recommend him." ⭐️⭐️⭐️⭐️⭐️ "It is rare to find good talent that you will work with in the future.....but Erdem is someone I will be coming back to, over and over. He is personable and very proficient in his duties. Having him on call when I need him will make my life easier going forward!." ⭐️⭐️⭐️⭐️⭐️ Five yearsof experience in WordPress Development and Project Management. Created or worked on more than a hundred projects. If you just started a Project, don’t know where to start with or what would be your total cost around mid to long term, I am the person you need on your side. I would love to share my experience and skillset with you. Contact me, and let’s start eliminating those question marks! A shortlist of things I worked on before: ✅Custom plugin development ✅Creating a website from scratch ✅Project Management ✅Speed optimizations on both server level and website level ✅Security enhancements ✅Cleaning Malware and fixing infected websites ✅Guidance on server budget ✅Website migration ✅CDN and Caching configuration My strengths: ✅Quick detection of a problem and coming up with a swift solution. ✅Communicating transparently in every situation possible to avoid a business relationship without trust. ✅Leadership and taking responsibility whenever it is necessary. ✅Flexible schedule and work hours depending on team and Project. ✅Ability to learn quickly and enjoying learning new things. ✅Fluent English I would love to work with people that can describe their requirements deductively, possess positive communication skills and an understanding of work ethics.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Moodle
    Learning Management System
    cPanel
    Website Optimization
    Cloud Management
    Website Migration
    WordPress
    WordPress Malware Removal
    Migration
    Proxmox VE
    Server
    System Security
    System Administration
    Linux
    Security Management
  • US$20 hourly
    I'm an experienced system administrator dealing with databases, networks configuration, and troubleshooting, Windows & Linux desktop and server support. During my experience, I accomplished projects successfully with major organizations. Primarily, I provide remote support to the end user facing the problem and always come up with an innovative approach and deal it efficiently. I believe in providing quality as I'm just passionate about IT rather than seeing it with a profession.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Network Design
    Cloud Architecture
    Red Hat Enterprise Linux
    Computer Network
    System Security
    ITIL
    Cybersecurity Management
    System Configuration
    Atlassian Confluence
    Linux System Administration
    Process Engineering
    System Administration
    Business with 1-9 Employees
    Linux
    Microsoft Azure
    Windows Server
  • US$30 hourly
    I am a crypto scam recovery expert with over 8 years of experience in the field. I am specialized in cyber crime investigation, cyber defense, penetration testing, and vulnerability assessment, Crypto scam recovery, Blackmailer Identification, Hack Investigation and Digital Forensic. I have began my career as a cyber crime investigator, where I worked on complex cases involving computer fraud, hacking, and identity theft. I was able to use my technical skills and attention to detail to uncover evidence and bring perpetrators to justice and quickly became known for my ability to navigate the digital landscape and track down the source of cyber attacks. After years of experience in cyber crime investigation, I was also responsible for conducting penetration testing to identify and address vulnerabilities in networks and systems, as well as conducting vulnerability assessments to identify potential weaknesses. I have a deep understanding of the latest security technologies and methods, and is always seeking new ways to stay ahead of the ever-evolving threat landscape. #Bitcoin recovery services #Crypto Wallet Recovery #Investigate Cryptocurrency Scams #Wallet Transaction Analysis #Stolen Funds Tracing And Recovery #Crypto Investment Farms Investigation #Crypto Asset Security & Protection
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Cryptocurrency Trading
    Web App Penetration Testing
    Crypto Wallet
    Cryptocurrency
    Data Recovery
    Ethical Hacking
    Social Engineering Assessment
    Crypto Exchange Platform
    Tech & IT
    Vulnerability Assessment
    System Security
    Digital Forensics
    Malware Removal
  • US$35 hourly
    I am ISO27001 certified cyber security expert with over 10 years of experience in desktop application development and cyber security. I love taking up challenges that may seem impossible to many, for all types of systems. My main expertise is bypassing defence (antiviruses/firewalls/EDR), removing false positive detections on virustotal, Malware development, web application hacking, penetration testing, API hacking, breaking application security, decompiling, reversing, scam/hacking/blackmail incident research, malware research, Desktop Application Development in C/C++/C# .NET/Python System Security Audits / Malware Cleaning/ System Hardening / System Forensics, bypassing AVs, evasion, injection through latest techniques Technical report writing / Technical Consultation and Analysis (Related to Cyber security)
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Virus Removal
    Writing
    Penetration Testing
    Security Assessment & Testing
    Security Analysis
    Desktop Application
    Article Writing
    Information Security
    System Security
    Security Testing
    Encryption
    Application Security
    Ethical Hacking
    Windows App Development
    C#
    C++
  • US$25 hourly
    🙋🏼‍♂️ I have helped companies eliminate their in-securities in Information Security. ⚡I offer practical consultancy with: ⚡ - Security Operations Center (SOC) - SOC Processes and SOC Manual - Implementation of CKC and Mitre Attack Framework-based Usecases - Security Incidents Management Lifecycle - Cloud Security Management - Cloud Security integrations on Azure - Regex writing and Automation - SIEM Engineer (Controls Integration and Configuration e.g SIEM, Firewalls, WAF) - SOAR Playbooks - SOC Gap Assessment based on SOC CMM - Security Analysis and Threat Hunting - Security Training, Coaching, and Awareness - Security Policy development - Basic Python Code Writing - SOC Team Shifts and Roster management Description: I, very humbly, propose myself to be a technically sophisticated, highly energetic, and motivated information security professional. I have worked in technical roles, security operation centers, and strategy roles with both national and international clients. I'm currently working as an Associate Manager Information Security Operations Center for a financial institute as well as a part-time freelance consultant. The vast majority of my experience is in the financial services sector, the most heavily regulated and mature industry for cybersecurity. Due to my previous freelancing experience, I excel in working directly with customers in identifying breaches and recommending how they can improve their security posture. With cyber security, a business can't focus on improving everything, so it is important to focus on those few areas which give the greatest return on investment. My specialty is simply explaining cyber-related businesses risk, and advising on solutions in a rational, quantified manner to maximize ROI, both in effort and cost. My Certifications : ⚡ IBM Security - Certified Information Security Analyst ⚡ 5+ Years of hands-on experience with national and international clients ⚡ Understanding your requirement and tailoring my methodology accordingly is my PRIORITY ⚡ ISACA CISM (Certified Information Security Manager) ⚡ CompTIA CySA+ Certified ⚡ EC-Council CEH Certified ⚡ Microsoft Azure: Fundamentals(AZ-900) Certified ⚡ CNSS | ICSI, UK Certified
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Cloud Security Framework
    Cloud Security
    Microsoft Azure
    Cyber Threat Intelligence
    Security Analysis
    Certified Information Systems Security Professional
    ISO 27001
    Project Management
    Security Operation Center
    Penetration Testing
    Information Security Consultation
    Network Security
    Security Policies & Procedures Documentation
    Vulnerability Assessment
    Cybersecurity Management
  • US$145 hourly
    In the B2B space, you need Security, Privacy, and Compliance to sell to Enterprises! Unlock business opportunities and growth (💲millions) by working with me, the 🥇 Upwork virtual CISO, Security, Privacy, and Compliance consultant (1M+ earnings, 20+ years of enterprise experience)! CEO selling to Morgan Stanley: 🥂"The certification is enabling us to strike a deal with a Fortune 100 client." CEO selling to Philips: 🍾 "We have achieved the ISO 27001:2022 certification in record time." CEO selling to Pepsi:🎉 "Attila supported the growth of our business into Fortune 100 accounts." COO selling to Fannie Mae:👏 "We achieved a successful SOC 2 Type II attestation with no exception." 💭Securing your business, passing security assessments by clients or prospects, and achieving a security certification 𝙨𝙝𝙤𝙪𝙡𝙙 𝙣𝙤𝙩 𝙗𝙚 𝙖 𝙘𝙪𝙢𝙗𝙚𝙧𝙨𝙤𝙢𝙚 𝙖𝙣𝙙 𝙥𝙖𝙞𝙣𝙛𝙪𝙡 𝙚𝙭𝙚𝙧𝙘𝙞𝙨𝙚. 👌 All you need to do is ping me on Upwork, bring your problem, and after a 15-minute scoping call, I will provide you with a detailed Scope of Work. Specialized in business-to-business clients, providing 💸money-back guaranteed💸 ISO 27001, SOC 2, GDPR, HIPAA, PCI-DSS, CMMC, and FedRAMP projects and affordable virtual CISO (vCISO) services. ----> If you don’t get certified, all my fees will be refunded! <---- We are a good match if you are: 😢Busy developing your product or business and don’t have time and resources to be consumed by compliance efforts and endless meetings, halting your production for months 🤔Already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, Tugboat Logic, SecureFrame, Strike Graph, Audit Board, Trust Cloud, and so on) but 𝙙𝙤𝙣’𝙩 𝙠𝙣𝙤𝙬 𝙩𝙝𝙚 𝙣𝙚𝙭𝙩 𝙨𝙩𝙚𝙥 𝙤𝙧 𝙙𝙤𝙣’𝙩 𝙝𝙖𝙫𝙚 𝙩𝙞𝙢𝙚. 😢You quickly need quick security or privacy awareness training, cloud security posture assessment (AWS, GCP, Azure), endpoint security (MS 365 - Intune, Jumpcloud, Google Workspace), or penetration testing? 💪Want to decrease your sale cycle by being compliant and having all the answers for the security and privacy questionnaires. 💪Facing challenges with the security and privacy implications of AI products? 💪Want continuous access to a certified, creditable security, compliance, and privacy professional to manage your security framework? -> Continous virtual CISO (vCISO / fractional CISO) service with affordable weekly payments! 😟Need world-class, battle-proof security and privacy policies and you need it quickly? The kind of ones that have passed audits by KMPG, Deloitte, E&Y, Pepsi, Uber, Verizon, Philips, Facebook, and many others. 💪You want problems to be solved, by the BEST Working with me you will: ● Stop struggling with compliance requirements, security questionnaires, or useless document templates -> We will take care of professional policies, provide the right answers, and advise on how to implement security. ● Make the first steps on the journey to selling Enterprises ● Receive turnkey, Enterprise-grade security operation framework ensuring long-term effectiveness ● Work with an experienced senior team (architects, pen testers, endpoint engineers, developers, auditors, consultants) that regularly helps clients score accounts like GOOGLE, MICROSOFT, BOSE, IKEA, PUMA, PFIZER, MORGAN STANLEY, CITIBANK, DISNEY, MAYO CLINICS, VERIZON, PHILIPS, SIEMENS. My stats are: ✅Saved tens of thousands $$$$$ for clients, advising them on the right security tools, solutions, and approach ✅#1 in Information Security and IT compliance categories (1M+ earned) ✅Supporting all time zones ✅Long-term engagements ✅Professional certifications (CISA, CISSP, ISO 27001 IA) About my Security Consultant team: QUALITY over QUANTITY is our ethos. Excellent quality, on time, always. We only take on projects when we can deliver outstanding results. The team consists of (only) senior experts in AWS, Azure, GCP DevOps, SecOps, Penetration testing, Google Workspace, MS 365 Intune, AppSec, auditing, and compliance. Professional Integrity: We are strongly committed to moral and ethical principles and values, such as honesty, honor, responsibility, trustworthiness, and objectivity. What we look for in a new client: ● Open-minded, relaxed attitude ● Values integrity & long-term relationships ● Willing to accept advice and guidance (security is a complex niche) Click on the green invite button at the top right corner to invite or message me. 📣 Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, SIG Lite, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS) CSAT, IRAP, PIPEDA, ISO 42001
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    ISO 27001
    SOC 2
    AI Security
    HIPAA
    SOC 2 Report
    Risk Management
    Cloud Security
    Information Security Audit
    Certified Information Systems Security Professional
    Governance, Risk Management & Compliance
    Information Security
    Information Security Consultation
    IT Compliance Audit
    Cybersecurity Management
    Security Policies & Procedures Documentation
  • US$39 hourly
    I am OSCP and CRTO Certified with 8 years of professional experience in different pentesting and red teaming trade crafts. Challenges make me work more efficiently. What is a better challenge than doing penetration testing in which knowledge and experience are the main factors to successfully finding a way inside Targets? - Manual testing approaches with real-impact vulnerabilities - Exposure to multinational companies and Swiss banks - Industry-renowned certifications (OSCP - CRTO - eWPTXv2 - CMSE - CPTE - CEI - CCNA) - "Find my way in" mentality therefore 80% of projects end up in successful breaches Key Skills for Pentesting Jobs ---------------------------------- Web Applications Pentesting Network Pentesting REST API/SOAP Pentesting Mobile Applications Pentesting Desktop Applications Pentesting Source Code Reviews Active Directory Assessment Key Skills for Offensive Jobs --------------------------------- Email Phishing (Maldoc or stats based) Social Engineering Assume Breach Scenarios MITRE ATT&CK framework Simulations Tactics, Techniques, and Procedures Testing against patched Infra Malware Development
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Black Box Testing
    Information Security
    Vulnerability Assessment
    System Security
    Application Security
    Network Security
    Information Security Consultation
    Cloud Security
    Penetration Testing
    Web App Penetration Testing
    Network Penetration Testing
    Web Application Security
    Ethical Hacking
    Security Testing
    Mobile App Testing
  • US$100 hourly
    I am Chartered IT Professional, Google Cybersecurity Career Certificate Graduate, OWASP Core Security Belt Certified, OWASP API Security Certified, Certified Information Systems Security Auditor, Certified ISO 27001 Lead Implementer, Certified ISO 27001 Lead Auditor, Certified Identity Governance Expert, Certified Identity and Access Manager, Certified GRC Professional, Certified GRC Auditor, Integrated Data Privacy Professional, Certified Scrum Master, BCG Certified Strategy Consultant, Six Sigma Black Belt Professional, GDPR Certified Data Protection Officer, Certified HIPAA Officer & results driven management consultant with 15 years experience in compliance, data protection, SOC 2 and ISO 27001 Controls Implementation, innovation, design thinking, ideating solutions, process improvement, pricing strategy, data analytics, business process outsource, project management, market research, financial analysis, investment banking, cybersecurity and diagnosing a range of problems, from small businesses to multi-million dollar corporations. I have done past projects with PwC, Skoda Minotti, DNX VC, Lum Chang, Syntervision, AI Chatbot, FourthRev and Loggi. Previously I have worked as Engagement Manager at KPMG and Senior Associate at Deloitte, where I took part in several consulting assignments in healthcare and life sciences, logistics, TMT, services, consumer and transportation sectors. I also have vast experience of managing projects from start to inception including projects funded by ADB, UNESCO and WHO. I have also completed more than 15 market research studies in different verticals for determining the market size and overall analysis of target markets. I also have experience of working as Head of Product Design where I led the development teams to identify customer pain-points, develop user needs and solve customer problems by creating products with built-in security features. I also worked on developing customer personas & identifying and recruiting sponsor users for A/B testing of product features and arranging Cognitive walkthroughs for establishing the usability of products. I also applied knowledge of Scrum Framework with sprint planning and delegation of tasks on product development projects for various public and private sector organizations. I managed 10 projects of more than $1 Million in total budget. Other than above, I also have hands on experience with various compliance frameworks including GDPR, HIPAA, PCI DSS, ISO 27001, HITRUST, CCPA and NCSF (NIST Cybersecurity Framework). Key Achievements: ✅ Successfully led 8 companies through the SOC 2 Type 2 attestation process, meeting stringent requirements and passing all audits in the first attempt. This achievement significantly enhanced their reputation for data privacy and security. ✅ Guided 4 clients through the rigorous process of achieving ISO 27001 certification, ensuring that all security controls and management processes were robust, auditable, and internationally recognized. ✅ Reduced the costs of IT infrastructure maintenance by 5% for 3 consulted clients ✅ Analyzed business conditions, market/industry trends, competitive influences and demographic factors to identify opportunities of business growth for 5 consulted clients ✅ Created advanced analytics for both internal and marketing use using Tableau, SQL and other BI tools for 4 consulted clients ✅ Managed $400 million donor funded projects as PMO and Project Lead ✅ Performed business process re-engineering for 3 consulted clients ✅ Consulted as lead revenue data analyst on a team responsible for collecting $60M receivables ✅ Repeatedly delivered cost reductions through the implementation of Lean principles, improved scheduling via resource loads and volume analysis ✅ Evaluated and increased operational effectiveness of organizations through the implementation of Continuous Improvement methods and Training/Coaching programs ✅ Identified opportunities within the client organization for improving productivity and operational efficiencies by installing a system by which the client can measure and realize improvement ✅ Analyzed existing processes and applied methodologies to eliminate wasted resources and time for 3 consulted clients
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Ransomware Mitigation
    Insurance & Risk Management
    User Authentication
    System Security
    Linux System Administration
    Vulnerability Assessment
    Risk Analysis
    Intrusion Detection
    NIST Cybersecurity Framework
    Information Security
    Network Security
    ISO 27001
    Amazon Web Services
    SOC 2 Report
    Python
  • US$99 hourly
    I am a professional freelancer with THIRD PARTY LIABILITY INSURANCE for over two and a half million dollars, so you are in safe hands. I am Microsoft Certified Trainer, Office 365, GCP, AWS, and Azure Expert. Honored as Microsoft Most Valuable Professional in Azure area. I cover architecting, security, administrating, and migration of all three major clouds – Azure, AWS, and GCP. Apart from the main area of Cloud expert in the field of infrastructure servers Windows Server 2003-2016, Microsoft Active Directory, Hyper-V Private Cloud, IIS, System Center, SQL. Private Cloud, System Center, Hyper-V, Open Stack Expert, and all Microsoft products Expert. Linux Server administrator. I am the holder of certificates: • pSeries AIX UNIX Support • First Certificate in English • PRINCE2 Practitioner • Microsoft Certified: Azure Administrator Associate • Microsoft® Certified Solutions Expert: Cloud Platform and Infrastructure • Microsoft® Certified Solutions Associate: Cloud Platform • Microsoft® Certified Solutions Expert: Productivity • Microsoft® Certified Solutions Expert: Data Management and Analytics • Microsoft® Certified Solutions Associate: Windows Server 2016 • Microsoft® Certified Solutions Associate: Windows 10 • Microsoft Specialist: Configuring Windows Devices • Microsoft Specialist: Architecting Microsoft Azure Solutions • Microsoft Certified Solutions Developer: Azure Solutions Architect • Microsoft Specialist: Developing Microsoft Azure Solutions • Microsoft® Certified Solutions Expert: Data Platform • Microsoft Specialist: Implementing Microsoft Azure Infrastructure Solutions • Microsoft® Certified Solutions Associate: Office 365 • Microsoft® Certified Solutions Expert: Private Cloud • Microsoft® Certified Solutions Expert: Messaging • Microsoft® Certified Solutions Associate: SQL Server 2012/2014 • Microsoft® Certified Solutions Associate: Windows Server 2012 • Microsoft® Certified Solutions Expert: Server Infrastructure • Microsoft® Certified IT Professional: Enterprise Administrator on Windows Server 2008 • Microsoft® Certified Solutions Associate: Windows Server 2008 • Microsoft® Certified Technology Specialist: Windows Server 2008 Applications • Microsoft® Certified Technology Specialist: Windows Server 2008 Network • Microsoft® Certified Technology Specialist: Windows Server 2008 Active Directory • Microsoft® Certified Technology Specialist: Microsoft Exchange Server 2010
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Database Administration
    Disaster Recovery
    Amazon ECS
    Alexa Skills Kit
    Azure App Service
    Microsoft Azure SQL Database
    Linux System Administration
    AWS Lambda
    Windows Server
    Microsoft Exchange Server
    Microsoft Azure
  • US$100 hourly
    Hello I am an experienced cyber security professional and owner of the UK based boutique consultancy Periculo.co.uk Having drawn on my experience over a number of years, working with a huge variety of customers ranging from construction companies to banks, charities and MOD contractors I became a freelancer to offer affordable expertise that benefits everyone. I strongly believe that every organisation needs to take security and compliance seriously however not all have the big budget that most consultancies demand for their work. Through my own internal processes I'm able to quickly deliver high quality, best in class security and compliance consultancy and testing. My organisation is accredited to the following; Cyber Essentials Cyber Essentials Plus IASME Gold GDPR readiness ISO27001 ISO9001 CREST Penetration Testing We are certified to these standards to provide assurance but also so I practice what I preach and know how to implement it in an efficient way. If you require an affordable security and compliance expert who always reaches a solution with the appropriate risk v reward balance then please get in touch. - Able to assess, audit and certify to GDPR ready, IASME Gold, Cyber Essentials and Cyber Essentials + - GDPR Advisory, DPO as a Service (as I have technical expertise I can often cover a lot more than your traditional DPO) - Providing project consultancy (From small changes to extensive, high risk programs) - Providing operational consultancy and escalation - Supplier and internal assessments - Infrastructure Security and configuration, AWS, Azure - Security operations consultancy and build - Business and technical policy, standards author Cover all aspects of security including penetration testing, vulnerability scanning etc. ** I am currently available for hire**
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Cybersecurity Management
    ISO 27001
    Information Security Audit
    Penetration Testing
    Security Testing
    Technical Writing
    Vulnerability Assessment
    Data Protection
    PCI
    Network Security
    Information Security
    Cloud Computing
  • US$45 hourly
    I'm a software developer / server administrator / MSP / and cybersecurity consultant from Canada with excellent communication skills and attention to client needs. I can develop new solutions, and update, migrate or secure existing applications and systems. I entered the IT industry in 1995 and hold a high standard, guarantee my work, and can provide continuing support and hosting. I look forward to meeting new clients. I especially am happy to discuss your project details with you before hiring to help us together gain insight in to your needs and expectations. My services include: - Custom development & hosting (including WordPress) - Technical and research writing for IT subjects - Marketing content writing for IT subjects - Updating and modifying existing apps / services - Migrating apps / services - Server maintenance, security, and automation scripting - Lead generation for business - Data-services such as scraping, statistical analysis, data-conversion, data-extraction, etc. - Developing educational content such as videos, lesson-plans, etc. I look forward to a discussion about your needs!
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Website Migration
    Linux System Administration
    Policy Analysis
    PHP
    Python
    System Security
    Vulnerability Assessment
    Data Science
    WordPress
    Web App Penetration Testing
    Website Security
    Data Scraping
    Cybersecurity Tool
    Content Writing
  • US$20 hourly
    Introducing a cybersecurity expert with 4 years of experience as a 𝐩𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐭𝐞𝐬𝐭𝐞𝐫 and 𝐜𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬 𝐢𝐧 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 𝐚𝐧𝐝 𝐀𝐖𝐒 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲. An expert in safeguarding digital domains, turning vulnerabilities into strengths. Your digital realm's ultimate support is here. I will ensure your digital fortress stands unyielding.🔒🌐 𝙈𝙮 𝙊𝙛𝙛𝙚𝙧𝙞𝙣𝙜𝙨: 1. Comprehensive vulnerability assessment 2. Thorough penetration testing 3. Identification of security weaknesses 4. Risk analysis and prioritized recommendations 5. Exploitation simulation to assess real-world impact 6. Client-specific testing based on unique needs 7. Compliance with industry standards (e.g., OWASP) 8. Detailed, actionable report with mitigation steps 9. Ongoing support for security enhancements 10. Confidential and professional engagement 𝙒𝙝𝙮 𝙈𝙚?? 1. 𝗘𝘅𝘁𝗲𝗻𝘀𝗶𝘃𝗲 𝗘𝘅𝗽𝗲𝗿𝘁𝗶𝘀𝗲: Years of specialized experience in penetration testing. 2. 𝗣𝗿𝗼𝘃𝗲𝗻 𝗧𝗿𝗮𝗰𝗸 𝗥𝗲𝗰𝗼𝗿𝗱: Demonstrated success in identifying critical vulnerabilities. 3. 𝗧𝗮𝗶𝗹𝗼𝗿𝗲𝗱 𝗔𝗽𝗽𝗿𝗼𝗮𝗰𝗵: Customized testing to match your unique security requirements. 4. 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲 𝗔𝘀𝘀𝘂𝗿𝗮𝗻𝗰𝗲: Adherence to industry standards and best practices. 5. 𝗖𝗼𝗺𝗽𝗿𝗲𝗵𝗲𝗻𝘀𝗶𝘃𝗲 𝗥𝗲𝗽𝗼𝗿𝘁𝘀: Detailed findings and actionable recommendations. 6. 𝗖𝗼𝗹𝗹𝗮𝗯𝗼𝗿𝗮𝘁𝗶𝘃𝗲 𝗣𝗮𝗿𝘁𝗻𝗲𝗿𝘀𝗵𝗶𝗽: Engaging in open communication and client involvement. 7. 𝗧𝗶𝗺𝗲𝗹𝘆 𝗗𝗲𝗹𝗶𝘃𝗲𝗿𝘆: Efficient testing and prompt delivery of results. 8.𝗧𝗶𝗺𝗲𝗹𝘆 𝗗𝗲𝗹𝗶𝘃𝗲𝗿𝘆: Highest standards in data privacy and protection. 𝘾𝙚𝙧𝙩𝙞𝙛𝙞𝙘𝙖𝙩𝙞𝙤𝙣𝙨: 1. Certified Ethical Hacker (𝗖𝗘𝗛) By EC-Council 2. AWS Certified 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗦𝗽𝗲𝗰𝗶𝗮𝗹𝘁𝘆 By AWS 3. Certified 𝗔𝗣𝗜 𝗣𝗲𝗻𝗲𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝗧𝗲𝘀𝘁𝗲𝗿 By APISec University 4. Network Defense Essentials (𝗡𝗗𝗘) By EC-Council 5. Digital Forensics Essentials (𝗗𝗙𝗘) By EC-Council 6. Ethical Hacking Essentials (𝗘𝗛𝗘) By EC-Council 7. Network Security Expert 1 (𝗡𝗦𝗘-𝟭) By Fortinet 8. Network Security Expert 2 (𝗡𝗦𝗘-𝟮) By Fortinet 9. Network Security Expert 3 (𝗡𝗦𝗘-𝟯) By Fortinet 𝙄𝙣𝙙𝙚𝙥𝙚𝙣𝙙𝙚𝙣𝙩 𝙀𝙭𝙥𝙚𝙧𝙩𝙞𝙨𝙚 𝙔𝙤𝙪 𝘾𝙖𝙣 𝙏𝙧𝙪𝙨𝙩 I 𝐓𝐫𝐲𝐇𝐚𝐜𝐤𝐌𝐞 𝐓𝐨𝐩 𝟏 % I 𝗖𝘆𝗯𝗲𝗿𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿𝘀 𝗚𝗹𝗼𝗯𝗮𝗹 𝗥𝗮𝗻𝗸 𝟭𝟲
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    AWS CloudTrail
    Security Operation Center
    Cloud Security
    WordPress Security
    Web Application Security
    Network Penetration Testing
    White Box Testing
    Black Box Testing
    Metasploit
    System Security
    Vulnerability Assessment
    Network Security
    Application Security
    Penetration Testing
    Information Security
  • US$60 hourly
    🚀 DevOps & Sys Admin Expert with 6 Years of Experience 🚀 🔹 65+ Total Jobs Completed 🔹 700+ Total Hours Worked 🔹 100% Job Success 🔹 Top Rated Are you seeking a seasoned DevOps and Sys Admin professional to streamline your development processes and fortify your infrastructure? Look no further! With a robust background in both DevOps methodologies and system administration, I bring a wealth of expertise to the table, ensuring seamless operations and optimal performance for your projects. 🔧 DevOps/Cloud Skills: Google Cloud, AWS, OVH Traefik, Docker/Podman, Kubernetes, Docker Swarm Cloudflare, Grafana & Prometheus, Harbor Jenkins, Groovy, Amazon ECR, Terraform, Ansible Git, Github Actions, Gitlab CI/Pipelines SonarQube, Nexus, Selenium, Hashicorp Vagrant Keycloak, Vault, Maven, Gradle, Npm, Node Containerization of Dev & Prod environments 🛠️ System Administration Proficiency: Nix/Linux, RHEL Nginx, Apache, Tomcat, Jboss PostgreSQL, Mysql, Mongodb Pacemaker Clusters, Corosync, LVM, VDO, Stratis Bash & Python Scripting Kannel, Jira, Alfresco, Munin, Zabbix Postfix, fail2ban 🔒 Network/Infrastructure Expertise: OPENVPN, IPSEC & L2L SDN, TCP/IP, SSL SMPP and SMS, SMTP, DNS, DHCP, NTP, FTP, SSH, T.38 pfSense, Cisco ASA, VMware With a proven track record of delivering high-quality solutions and optimizing IT operations for clients across various industries, I am committed to exceeding your expectations and driving your projects towards success. Let's collaborate and elevate your business to new heights!
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Computing & Networking
    Database Optimization
    MySQL Programming
    Containerization
    Docker Compose
    Linux System Administration
    Red Hat Enterprise Linux
    Application Server
    Database Administration
    System Security
    Web Server
    Google Cloud Platform
  • US$60 hourly
    Engaged in the IT sector since 2004 as an IT Specialist, assuming diverse responsibilities related to IT support. Holds certification in ITIL Foundation. Transitioned into an IT Auditor role in 2007 and obtained CISA certification. Boasts extensive experience in IT Audit across diverse domains such as banking, oil & gas, and IT services. Since 2018, focused on the Information Security domain, concentrating on Governance, Awareness, and Compliance aspects. Activities encompass policy and procedure reviews, evaluation of NIS Directive and ISO 27001 compliance, establishment of Security Awareness initiatives, and delivery of security training. Also adept in other facets of Information Security, including conducting Vulnerability Assessments utilizing tools like Nessus and OpenVAS for periodic scanning, report generation, and prioritization. Holds GSLC certification as well.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    IT General Controls Testing
    Information Security Governance
    IT Compliance Audit
    Information Security Awareness
    Information Security Audit
    Information Security Consultation
  • US$40 hourly
    I have more than 10 years of practical working experience in cyber security sector. I am crypto scam investigator and recovery specialist. I am expert on blackmailer and scammer Investigation. I can help you for blackmailer and scammer issues. My expertise areas: 1. Crypto Scam Investigator & Recovery Expert, I am a crypto scam investigator & recovery expert. I have done 80+ cases already. I understand the importance of recovering funds for clients and bringing scammers to justice. I am professional & worked with clients from USA, Canada, UK, Australia, and more locations. I will handle your case with the utmost professionalism and dedication. Normally Scammers manipulate clients to invest in scam sites. After that, they shows the fake growing amount. Then clients invest a huge amount for a handsome profit. But when the client want to withdraw the amount then the scammer tells the client to pay for taxes & services, etc. If the client even pay taxes they will never allow for withdrawal requests. These are the very common tricks that scammers apply nowadays. Here is an outline of how I will assist you in recovering your clients' funds and catching the criminal: a) I will track all the transactions and find the final holding wallet addresses b) I will lnvestigate Scammers Information & verify them c) I will check the scammer website for vulnerabilities d) I will provide a report that include every single step details for the law enforcement Hire me to get this service immediately 2. SOC Setup for monitoring your target devices. My project offers a comprehensive Security Operations Center (SOC) setup service that integrates Elastic Search, Wazuh, and Filebeat to provide an all-encompassing solution for monitoring and securing your IT infrastructure. This service is designed to help organizations of all sizes protect their digital assets, ensure compliance with industry standards, and respond swiftly to security incidents. #Elastic Search Installation: #Wazuh Installation: #Filebeat Installation: #Manager Installation on Client Machine: #Dashboard and Reporting Setup: #Testing and Validation: #Training and Handover: Providing training sessions to your team on how to use and manage the SOC setup. Key Benefits: Enhanced Security Posture: Gain comprehensive visibility into your network, identify threats in real-time, and respond swiftly to security incidents. Why Choose My Service? With 5 years of experience in cybersecurity and SOC implementations, I bring a wealth of knowledge and skills to ensure your project is successful. My background includes working with various organizations to enhance their security measures and protect their digital assets. Hire Me Now! 3. Cyber Crime Investigator: I investigate and prevents criminal activities in the digital world. I analyze digital evidence and work with law enforcement to protect individuals and organizations from online threats. Hire me to get this service immediately Hire me to get this service immediately 4. Digital Forensics Service: I specialize in digital forensics and cyber investigation services to uncover the truth behind cyber incidents. With 10 years of experience, I offer: a) Digital Forensics: Expert analysis of digital devices to retrieve critical evidence. b) Incident Response: Swift response to contain breaches and identify attack vectors. c) Network & System Analysis: Identification of unauthorized access and vulnerabilities. d) Malware Analysis: In-depth examination to determine malware nature and impact. e) Expert Witness Testimony: Qualified to provide clear technical support in legal proceedings Hire me to get this service immediate 5. Vulnerability Assessment & Penetration Testing (VA/PT) Service: With nearly 10 years of experience in vulnerability assessment & penetration testing, I aim to provide the highest level of security for clients' websites and applications. Through testing and a comprehensive report, I identify vulnerabilities and offer actionable recommendations for improvement. Please provide project details for an accurate estimate. Hire me to get this service immediately 6. Hack Investigation & Hack Removal Service: I offer comprehensive Hack Investigation & Removal services a) Thoroughly investigate the hack, identify its source and impact. b) Swiftly remove malicious code and unauthorized access. c) Recover compromised data and fortify security measures. d) Continuous monitoring and support for ongoing protection. Hire me to get this service immediately 7. Crypto transaction tracking service: I have done 50+ crypto scam cases already. I can tracking your scammed crypto money that you have send to the scammer unfortunately. I will track all the transactions & will find the final folding wallet addresses where your money is currently stored. By that information you can claim to retrieve your money back. 8. Ethical Hacking Service: I will do it to protect you from cyber criminals legally and ethically.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Cryptocurrency
    Growth Hacking
    iPhone
    Network Security
    Information & Communications Technology
    Penetration Testing
    Information Security
    Information Analysis
    MySQL
    Vulnerability Assessment
    Cybersecurity Management
    Digital Forensics
    System Security
    Cryptography
    Ethical Hacking
  • US$25 hourly
    A motivated cyber-security professional with diversified expertise and 5+ years of work experience in Information security, capable of quickly adapting of advance environments, a good team player, and an effective leader. Excellent working knowledge of Security Technologies and having a commitment to keep up to date with the latest developments. Being a Senior Security Analyst, I am skilled with the following: ✔SOC as a service ✔Threat Intelligence Service ✔VA/PT Service ✔SOC Gap Assessment Service ⚡⚡⚡⚡Technical Exposure⚡⚡⚡⚡ 🌟 Hands on Experience of managing on below SIEM technologies for monitoring, development of use-cases and parsing/mapping and integration of devices: ✔IBM QRadar, ✔Splunk, ✔LogSign, ✔LogPoint ✔Elastic Search. 🌟 Hands on Experience of managing, Deployment, triage analysis, investigation and manage incidents, create prevention policies on 3000+ Hosts including Windows, Linux, MacBook Platform through below EDR technologies. ✔CrowdStrike EDR ✔TrendMicro ✔Carbon Black ✔Fire Eye (HX/NX/EX) ✔Microsoft Defender for Endpoint 🌟 Hands on Experience of managing, Deployment, and monitoring Microsoft XDR technology and identify advance attacks. 🌟 Classification of malware after deep analysis, identification, validation and detection techniques and tactics. 🌟 Hands-on experience of preventing organization from brand impersonation through below mentioned tools which provides real-time visibility into potential underground cyber threats and analyzes domains to identify brand impersonation: ✔CrowdStrike falcon X Recon ✔CTM360 ✔Dark Owl 🌟 Hands-on experience of detecting policy violations (i.e., Block Mass Storage, Social Media Sites etc.), identifying known threats and IOC management in organizations through below Antivirus Solutions: ✔Symantec ✔Kaspersky ✔Trend Micro ✔CrowdStrike Prevent ✔McAfee 🌟 Hands-on experience of using and monitoring below listed network security controls for the detection of anomalies, suspicious Behavior, and policy violations. ✔Barracuda Email Security Appliance ✔Cisco Email Security Appliance ✔Microsoft Email Security Appliance ✔Palo Alto IDS/IPS Firewalls. ✔FortiGate IDS/IPS Firewalls. ✔Cisco IDS/IPS Firewalls. ✔Sophos Proxy ✔Cisco Proxy ✔Infoblox DNS Security ✔Trend Micro (DDI, DDEI, DDWI, DDAN) 🌟 Providing direction and guidance on customer security requirements and standards for monitoring, alerting and incident response. 🌟 Identifying strategy for containment, remediation steps and recovery procedures. 🌟 Identifying new security threats by conducting continual monitoring, security testing, vulnerability assessments and log analysis.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Linux
    Microsoft Azure
    Cybersecurity Monitoring
    CrowdStrike
    Security Operation Center
    Data Protection
    Cyber Threat Intelligence
    Network Security
    Incident Response Plan
    Penetration Testing
    Information Security Consultation
    Information Security
    Vulnerability Assessment
    System Security
    Malware Removal
  • US$30 hourly
    Red Team member, performing penetretion tests in all company's assets, vulenrability management and security analyst, Wordpress security expert, site cleanup and hardening. 10 years of experience with Linux servers in the hosting environment, with emphasis on web security, identification and malware removal(site cleanup) , investigation of how the hacking occurred, identify failures in web systems, pentest in web systems and solve other problems related to the hosting environment.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Malware Website
    WordPress
    Web Host Manager
    Python
    cPanel
    MySQL
    Network Penetration Testing
    Website Security
    Email Security
    Web App Penetration Testing
    Linux
    Kali Linux
    System Security
    Malware Removal
    Security Testing
  • US$13 hourly
    I'm a highly skilled and experienced Email Deliverability Specialist with expertise in DMARC, DKIM, SPF, and DNS management. If you're looking to optimize your email delivery rates and ensure maximum inbox placement, you've come to the right place. Here's a glimpse into my professional background: 💼 Email Deliverability Mastery: With a deep understanding of email authentication protocols and industry best practices, I specialize in helping businesses overcome email deliverability challenges. I can identify and resolve issues related to spam filters, blacklists, and bounce rates, ensuring your emails reach their intended recipients. 🔒 DMARC Implementation: Implementing Domain-based Message Authentication, Reporting, and Conformance (DMARC) is crucial for safeguarding your email reputation and preventing domain spoofing. I possess extensive experience in setting up and configuring DMARC policies, enabling you to protect your brand identity and enhance email security. 🔑 DKIM and SPF Setup: DKIM (DomainKeys Identified Mail) and SPF (Sender Policy Framework) are essential elements in email authentication. As an expert in these protocols, I can guide you through the process of generating DKIM signatures, setting up SPF records, and ensuring they are correctly configured in your DNS settings. This will boost your email deliverability and reduce the chances of your emails being flagged as spam. 🌐 DNS Management: A well-optimized Domain Name System (DNS) plays a crucial role in email deliverability. I have extensive experience in managing DNS settings for various email service providers and can help you configure the necessary DNS records, such as MX, TXT, and CNAME, to ensure smooth email delivery. 🚀 Results-Oriented Approach: My ultimate goal is to help you achieve optimal email deliverability rates and maximize the effectiveness of your email marketing campaigns. I stay updated with the latest industry trends and techniques to provide you with cutting-edge solutions tailored to your specific needs. If you're ready to improve your email deliverability, enhance your brand reputation, and ensure your messages reach the right audience, let's collaborate! Contact me today, and let's discuss how I can assist you in achieving your email deliverability goals. 📩 Please note that I am solely focused on email deliverability and related services. For other email marketing needs, kindly consider other experts specializing in those areas.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Email Security
    Email Campaign
    Email System
    Email Deliverability
    System Monitoring
    System Security
    Network Administration
    Office & Work Space
    System Administration
    Office 365
    Domain Migration
    Microsoft Excel
    Microsoft Endpoint Manager
    Google Workspace
    Email Support
  • US$165 hourly
    I am an accomplished and experienced Cyber Security Engineer, CISO, and consultant with over 20 years experience in government, commercial, non-profit and private organizations. I'm a Certified Information Systems Security Professional (CISSP) and CMMC Registered Practitioner. My education includes a Master's degree in Information Assurance and Security specializing in Digital Forensics, a Bachelor's Degree in Information Technology, and daily, hands-on work governing, securing and administering complex information technology environments. My current efforts include cybersecurity compliance implementations for regulated industries and government contractors including the NIST Cybersecurity Framework, Risk Management Framework, NIST SP 800-171, and Cybersecurity Maturity Model Certification (CMMC). For those not bound to other regulatory guidelines, I assist with implementation of the Center for Internet Security (CIS) Critical Security Controls and the CIS Risk Assessment Method. I assist with expert advice, gap assessments, requirements and implementation reviews. I help develop and refine cybersecurity documentation including System Security Plans, POA&Ms, and Policies and procedures. I will share national background check results for qualified opportunities.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Gap Analysis
    Vulnerability Assessment
    Cybersecurity Monitoring
    Amazon Web Services
    Governance, Risk Management & Compliance
    Security Engineering
    Cloud Security
    Security Policies & Procedures Documentation
    Information Security Awareness
    Cybersecurity Management
    Network Security
    Certified Information Systems Security Professional
    Information Security
  • US$20 hourly
    Founder of LEVILYN, a cybersecurity and digital forensics company with over 12 years of practical and field experience. My areas of specialization are: [cybersecurity and compliance services]  Penetration Testing and Vulnerability Assessments [VAPT]: web application and mobile applications  Cloud computing  Network security: Firewalls, IDS/IPS, OpenVPN  Research work on cybersecurity, Articles, Blogs, ebooks.  Compliance policies [ PCC DSS, HIPAA, COBIT, NIST, ISO 27001,GDPR]  Risk assessment  Business Continuity and Disaster Recovery Plan [BCDR]  Controls (NIST, ISO/IEC 27000, ISO27701 series)  Document the best IT audit standards and policies [Digital Forensic Services]  Mobile Forensics  Computer Forensic  Network Forensics  Cloud Forensics  Cyber Security Compliances Policies and Risk Assessment,  Cybercrime Investigations  Research Work  Digital Forensic Report Writing [Forensics Tools competency] ▪ Autopsy ▪ Belkasoft ▪ Cellebrite UFED ▪ FTK Imager ▪ Magnet Axiom ▪ OS Forensic ▪ OSINT ▪ Wireshark ▪ Nmap ▪ Netcat ▪ Network Minor ▪ Volatility ▪ Splank
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Research Papers
    System Security
    Malware Removal
    Artificial Intelligence
    Cloud Security
    ISO 27001
    Cloud Security Framework
    Cybersecurity Management
    Application Security
    Vulnerability Assessment
    NIST Cybersecurity Framework
    Digital Forensics
    Penetration Testing
    Network Security
  • US$20 hourly
    We are a group of Senior Cyber Security Experts with over 4+ years of Hands-on Digital Forensics (Windows/ Linux/ Mac OS) and Cyber Security Specialist. We've created multiple cyber security related services and training delivered them to several clients. Also provide a large number of Investigations and Consulting Services to our clients such as: • Malicious Emails Investigations • Email Attachments Investigations (Malware Analysis) • Email Inboxing Handling (Inbox any mail to any inbox) • Computer System Forensics (Digital Forensics) • Memory Forensics (Hard Drive, Ram Evidence Recovery) • Offensive Engagements (Penetration Testing Services) • Creating Cyber Security Training If your issue is not listed here, please don't be disappointed. We'll probably be able to help out so feel free to reach out with a message at least once. -----------------------------------------ANTI PHISHING------------------------------------- What is being investigated in Email Investigation:- - Header Analysis     - Identifying possible source of origin     - Identifying Spoofed emails     - Validate legitimacy by examining SPF, DKIM and DMARC Records     - Link Analysis     - Follow up investigation on any links the email contains or redirects to with a verdict on that site     - Verdict on attachments (Malicious / Non-Malicious) With our Advanced Investigation you'll receive Detailed Report (Malicious Reasons, Links and Attachments Information, Malware Analysis Information) also provide our ANTI-PHISHING EXTENSION for your browser security. -----------------------------------------ANTI PHISHING------------------------------------- ----------------------------------------- FORENSICS ----------------------------------------- What is being investigated in Forensics (Windows/ Linux/ Mac OS):- - Computer System Forensics     - Real-Time, on-line Evidence gathering     - Off-line Computer Disk Forensic     - Memory Forensics     - Physical Memory Forensic (With Destroyed Data Recovery)     - Critical Data pertaining to Threats exists solely in System Memory     - Non-cacheable Injected Code fragments ----------------------------------------- FORENSICS -----------------------------------------   It's important for us to build long term relationships with clients, so we provide the best quality of work  with the best price offers. We thought "A satisfied customer is the best business strategy". Looking forward to hearing from you! Thank You!
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Information Security Awareness
    Information Security Audit
    Information Security Governance
    Antivirus & Security Software
    Office 365
    Email Security
    Ethical Hacking
    OWASP
    Multiple Email Account Management
    Information Security
    System Security
    Information Security Consultation
    Application Security
    Digital Forensics
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Certified Systems Security Practitioner on Upwork?

You can hire a Certified Systems Security Practitioner on Upwork in four simple steps:

  • Create a job post tailored to your Certified Systems Security Practitioner project scope. We’ll walk you through the process step by step.
  • Browse top Certified Systems Security Practitioner talent on Upwork and invite them to your project.
  • Once the proposals start coming in, create a shortlist of top Certified Systems Security Practitioner profiles and start to interview.
  • Hire the right Certified Systems Security Practitioner for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Certified Systems Security Practitioner?

Rates charged by Certified Systems Security Practitioners on Upwork can vary with a number of factors including experience, location and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Certified Systems Security Practitioner on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Certified Systems Security Practitioners and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Certified Systems Security Practitioner team you need to succeed.

Can I hire a Certified Systems Security Practitioner within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Certified Systems Security Practitioner proposals within 24 hours of posting a job description.

Schedule a call