Hire the best CISM specialists

Check out CISM specialists with the skills you need for your next job.
Clients rate CISM specialists
Rating is 4.7 out of 5.
4.7/5
based on 1,807 client reviews
  • US$150 hourly
    I am a cybersecurity professional with a Master's Degree in Cyber Operations and two years of work experience in cybersecurity research and development at a world-class R&D laboratory. In that job, I gained experience in network traffic analysis, malware analysis, and cryptography. For over two years, I have worked as a freelancer, providing consulting, content development, and course creation in cybersecurity and blockchain security. I specialize in development of technical content (blogs, whitepapers, case studies, and courseware) in the field of cybersecurity. I currently hold the Certified Ethical Hacker and Certified Blockchain Security Professional certifications.
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Reverse Engineering
    Cryptocurrency
    Blockchain
    Cryptography
    Information Security
  • US$99 hourly
    Let me help you unlock business opportunities and growth (💲millions) and sell to the likes of Disney, Pfizer, Uber, Siemens, Google, PWC, and so on. In the B2B space, you need Security, Privacy, and Compliance to sell to Enterprises! You focus on the business, and I'll take care of security, privacy, and compliance. Sleep well overnight because you know you are in good hands with the 🥇 Upwork virtual CISO, Security, Privacy, and Compliance consultant (1M+ earnings, 20+ years of enterprise experience)! CEO selling to Morgan Stanley: 🥂"The certification is enabling us to strike a deal with a Fortune 100 client." CEO selling to Philips: 🍾 "We have achieved the ISO 27001:2022 certification in record time." CEO selling to Pepsi:🎉 "Attila supported the growth of our business into Fortune 100 accounts." COO selling to Fannie Mae:👏 "We achieved a successful SOC 2 Type II attestation with no exception." 💭Securing your business, passing security assessments by clients or prospects, and achieving a security certification 𝙨𝙝𝙤𝙪𝙡𝙙 𝙣𝙤𝙩 𝙗𝙚 𝙖 𝙘𝙪𝙢𝙗𝙚𝙧𝙨𝙤𝙢𝙚 𝙖𝙣𝙙 𝙥𝙖𝙞𝙣𝙛𝙪𝙡 𝙚𝙭𝙚𝙧𝙘𝙞𝙨𝙚. 👌 All you need to do is ping me on Upwork, bring your problem, and after a 15-minute scoping call, I will provide you with a detailed Scope of Work. Specialized in business-to-business clients, providing 💸money-back guaranteed💸 ISO 27001, SOC 2, GDPR, HIPAA, PCI-DSS, CMMC, and FedRAMP projects and affordable virtual CISO (vCISO) services. ----> If you don’t get certified, all my fees will be refunded! <---- We are a good match if you are: 😢Busy developing your product or business and don’t have time and resources to be consumed by compliance efforts and endless meetings, halting your production for months 🤔Already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, Tugboat Logic, SecureFrame, Strike Graph, Audit Board, Trust Cloud, and so on) but 𝙙𝙤𝙣’𝙩 𝙠𝙣𝙤𝙬 𝙩𝙝𝙚 𝙣𝙚𝙭𝙩 𝙨𝙩𝙚𝙥 𝙤𝙧 𝙙𝙤𝙣’𝙩 𝙝𝙖𝙫𝙚 𝙩𝙞𝙢𝙚. 😢You quickly need quick security or privacy awareness training, cloud security posture assessment (AWS, GCP, Azure), endpoint security (MS 365 - Intune, Jumpcloud, Google Workspace), or penetration testing? 💪Want to decrease your sale cycle by being compliant and having all the answers for the security and privacy questionnaires? 💪Facing challenges with the security and privacy implications of AI products? 💪Want continuous access to a certified, creditable security, compliance, and privacy professional to manage your security framework? -> Continous virtual CISO (vCISO / fractional CISO) service with affordable weekly payments! 😟Need world-class, battle-proof security and privacy policies and you need it quickly? The kind of ones that have passed audits by KMPG, Deloitte, E&Y, Pepsi, Uber, Verizon, Philips, Facebook, and many others. 💪You want problems to be solved by the BEST Working with me, you will: ● Stop struggling with compliance requirements, security questionnaires, or useless document templates. ● Make the first steps on the journey to selling Enterprises ● Receive turnkey, Enterprise-grade security operation framework ensuring long-term effectiveness ● Work with an experienced senior team (architects, pen testers, endpoint engineers, developers, auditors, consultants) that regularly helps clients score Enterprise accounts. My stats are: ✅Saved tens of thousands $$$$$ for clients, advising them on the right security tools, solutions, and approach ✅#1 in Information Security and IT compliance categories (1M+ earned) ✅Supporting all time zones ✅Long-term engagements ✅Professional certifications (CISA, CISSP, ISO 27001 IA) About the Security Consultants team: QUALITY over QUANTITY is our ethos. Excellent quality, on time, always. We only take on projects when we can deliver outstanding results. The team consists of (only) senior experts in AWS, Azure, GCP DevOps, SecOps, Penetration testing, Google Workspace, MS 365 Intune, AppSec, auditing, and compliance. Professional Integrity: We are strongly committed to moral and ethical principles and values, such as honesty, honor, responsibility, trustworthiness, and objectivity. What we look for in a new client: ● Open-minded, relaxed attitude ● Values integrity & long-term relationships ● Willing to accept advice and guidance (security is a complex niche) Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, SIG Lite, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Process Unity Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS) CSAT, IRAP, PIPEDA, ISO 42001
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Information Security Consultation
    GDPR
    Security Management
    Insurance & Risk Management
    ISO 27001
    SOC 2
    AI Security
    HIPAA
    SOC 2 Report
    Cloud Security
    Information Security Audit
    Certified Information Systems Security Professional
    Information Security
    Cybersecurity Management
    Security Policies & Procedures Documentation
  • US$50 hourly
    A seasoned professional with an extensive 10+ years background in regulatory compliance, anti-money laundering (AML), and financial crime (FinCrime). My career spans across diverse sectors, including FinTech, Regulatory Technology (RegTech), Cross-Border Payments, Employ on Record (EOR), Contractor Management, Money Services Businesses (MSB), Foreign Exchange, Cryptocurrency, Tokenization, Broker-Dealers, Crowdfunding, Non-Profit Organizations, and comprehensive Financial Services. Renowned for my leadership acumen and exceptional communication skills, I excel in fostering engagement and steering complex problem-solving initiatives. My expertise encompasses a broad spectrum of compliance-related responsibilities: from crafting and enforcing compliance processes, pioneering compliance automation solutions, to managing operational compliance. I am deeply passionate about all facets of financial crime compliance. My professional journey has been characterized by the successful development and implementation of robust compliance frameworks and cutting-edge, AI-enhanced RegTech solutions aimed at optimizing compliance operations and mitigating risk. This foundation not only ensures adherence to AML regulations but also supports sustainable product innovation, such as advancements in KYC and on-going monitoring technologies.
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Company Policy
    Compliance Consultation
    FinTech Consulting
    Information Security
    Compliance
    Risk Assessment
    Regulatory Compliance
    Anti-Money Laundering
    Cryptocurrency
    GDPR
    Bookkeeping
    Financial Audit
    Internal Control
    Sarbanes-Oxley Act
  • US$80 hourly
    passionate security enthusiast interested in assisting a team increase their security posture by providing guidance and consultation on building and improving security operation capabilities, reducing overall attack surface with proper vulnerability management, and security engineering/architectural improvements.
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Security Operation Center
    Security Engineering
    Cloud Engineering Consultation
    Cloud Computing
    Cloud Security
    Security Analysis
    Google Cloud Platform Administration
    Information Security Governance
    Information Security
    Network Security
    Configuration Management
  • US$50 hourly
    Need a process automated? You're in the right place! I specialize in: ✅ Web automation ✅ Mobile automation ✅ Desktop software automation I am also very experienced in information security: 🔒 Safeguarding businesses against cyber threats 🔒 Mitigating security vulnerabilities Let's explore: 🤖 AI and advanced automation solutions to scale your business 🔍 Cutting-edge information security technologies to strengthen your operations I’m here to help: 🚀 Achieve your growth goals with technology 🚀 Tailor our expertise to your specific security needs Your priorities are my focus: 🔑 Navigating the digital landscape securely 🔑 Addressing your unique concerns and aspirations Let's talk about your business journey: 🌟 What challenges do you anticipate in the digital world? 🌟 How can we work together to position your business at the forefront of innovation?
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Appium
    Selenium
    Computer Vision
    Natural Language Processing
    Reverse Engineering
    Artificial Intelligence
    Machine Learning
    Web Scraping
    C#
    Python
    Penetration Testing
    Information Security
  • US$10 hourly
    **I only bid on that project which I can deliver with complete satisfaction.** If your Instagram got HACKED or Locked and your Email or Number was Changed and Facing 2FA you are in the right place. *For Hacked Instagram or Facebook Accounts Recovery I Take Fix Price Which I Discuss before starting the project* I can provide solutions with the followings: ✅ Social media accounts set up and integration ✅ Social Media Management ✅ Social Media Optimization ✅ Social Media Error Fixing ✅ Hacked Instagram Recovery ✅ Assistance with your Instagram or Facebook removal ✅ Assistance with hacked Instagram account ✅ Assitance with stolen Facebook account ✅ Facebook business page recovery ✅ unauthorized ads payment on ads manager recovery ✅ Accounting ✅ Social media account recovery ✅ 2FA solution ✅ Google My Business ✅ Virtual Assitance ✅ All kinds of Social accounts Retrieve and All sorts of Error Fixing and name a few & I will let you know my experience. I am always eager to learn new skills. Also, please invite me for an interview if your's: Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Virtual assistance if your Instagram got disabled or restricted Facebook Business Suite hacked or compromised Facebook ads account recovery. Or if you are looking assistance for help: Recover hacked Instagram account Facebook Recovery Instagram restoration Social media Verification Facebook Business Suite verification Instagram & Facebook Integration Recovery of account in case of lost credentials Recovery from technical issues, bugs, and glitches Virtual Assitance Removal of old lost Instagram or Facebook profiles. assistance in Google My Business profile retrieval. Email accounts assistance. I Provide virtual assistance in all that and the result depends on them. Feel free to discuss the project before starting a contract. In response to your expectations: 1. I have expertise in the area required by you. 2. I can start the project immediately and complete your milestone as per your timeline. I believe communication is key to any successful project, and I'd like to start things off on the right foot, but I suggest we schedule a call to discuss the project further. This will enable us to make sure that we communicate well and are completely comfortable with the scope of the project. Please let me know the time that works best for you and I will make sure that I make myself available. Thank you for your time and consideration.
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Internet Security
    Data Recovery
    Instagram Reels
    Facebook
    WordPress Malware Removal
    Malware Removal
    Facebook Page
    Ethical Hacking
    Social Media Management
    Social Media Marketing
    Digital Marketing
    Instagram
    Information Security
    Technical Support
    Accounting
  • US$35 hourly
    ⭐⭐⭐⭐⭐ "It doesn't get better than Ezinne. The quality of what she delivers is outstanding...You won't be disappointed." Hello! I'm a dedicated grant writer focused on helping tech startups secure the funding they need to thrive. With a background in technical and proposal writing, I specialize in crafting compelling grant applications for startups in any field, worldwide, hourly or at a flat rate. What I Offer: - Funding Research: I conduct thorough research to help identify and analyze potential funding opportunities that align with your startup's objectives. - Grant Writing: Expertise in writing successful grant and funding proposals tailored to your specific needs and goals. - Technical Writing: Proficient in creating clear and concise technical documents including pitch decks that effectively communicate complex information. - Proposal Writing: Skilled in developing persuasive proposals that highlight the unique strengths and potential of your startup. Why Choose Me: - Proven Track Record: I'm experienced in securing funding for tech startups, with a deep understanding of what funders are looking for. - Global Reach: While based in East Africa, I offer my services to tech startups around the world. - Passion for Startups: I'm committed to helping innovative startups succeed, with a special focus on supporting impactful startups in Africa and around the world. - Collaborative Approach: I ensure client needs are met through effective collaboration. - Commitment to Deadlines: I'm dedicated to meeting deadlines and deliverables. - Simplifying Complexity: I'm able to simplify complex concepts for easy comprehension. - Attention to Detail: Meticulous attention to detail and accuracy. Success Stories: - Tony Elumelu Foundation Grant: I worked with a startup on their grant proposal, leading to pre-approval for the prestigious Tony Elumelu Foundation grant. - African Impact Initiative Grant: I assisted a startup in securing pre-incubation approval for the African Impact Initiative grant, which supports impactful startups in Africa. - VC Funding with Goodwell: I contributed to the initial application process for venture capital funding, resulting in the startup client being contacted by Goodwell for follow-up. Work Approach: - Understanding client objectives through detailed project analysis - Thorough online research and information gathering, where applicable - Drafting of initial content for client review - Revisions based on client feedback Client Testimonials: - "Easy to work with" - "Paid attention to details" - "Completed the job on time" - "Impressed by the quality of work" Let’s Work Together: If you're a tech startup looking to secure funding and need a skilled grant writer to help you achieve your goals, I’d love to hear from you. I offer flat-rate services to ensure transparency and predictability in pricing. Let's work together to turn your vision into reality! My working hours align with GMT+2 (currently based in Kigali, Rwanda, though originally from Ontario, Canada).
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Business Writing
    User Guide Writing
    NIST Cybersecurity Framework
    Quiz Writing
    Policy Writing
    Story Writing
    Grant Writing Consultation
    Report Writing
    Speech Writing
    Article Writing
    Grant Writing
    Blog Writing
    RFP Writing
    Content Writing
    Technical Writing
  • US$30 hourly
    With a degree in Computer Engineering and a passion for writing, my experience spans across writing whitepapers, blogs, research reports, content for websites, thesis for academic submissions, sales pitch, business proposals and more. I am highly organized and schedule my time to get things accomplished accordingly. I am detail-oriented and an excellent researcher. I can be entrusted with big projects as I prefer to complete my work before deadlines giving you ample time to review my work and provide feedback. I take pride in my work
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Amazon Web Services
    Artificial Intelligence
    Blockchain
    Network Security
    Web App Penetration Testing
    Network Penetration Testing
    Vulnerability Assessment
    Robotics
    Editing & Proofreading
    Website Copywriting
    ISO 27001
    Cloud Security
    Information Security
    Disaster Recovery
    Policy Writing
    Technical Writing
    PCI
    Project Risk Management
  • US$14 hourly
    I protect your content from getting stolen over the web and if someone is using your content without your permission, I report and take down the pirated content under DMCA. I provide services to online content creators such as writers, bloggers, photographers, and the companies who own intellectual content of any type, or copyright products. My motto is to end content piracy. Here is my Plan of action: 1) I start by searching for all the websites which are stealing and using your content, through all the web search engines (Google, Bing, Yahoo, AOL, Yandex, etc.) using multiple effective keywords. 2) I de-index (remove) those websites from the search engines. It will help to stop your audience go on the infringing website in the first place and this process also helps if the infringing website is not willing to remove the content directly. 3) Send DMCA takedown notices to the website owners and their hosting providers. 4) Reporting infringing content on social media platforms and video sharing websites like Facebook, Instagram, Pinterest, Reddit, YouTube, Twitter, Dailymotion, VK, OK, Youku, Archive.org, 4shared, Vimeo, Google-drive, and many more. 5) Keeping a complete follow-up of the work done. 6) Provide you with weekly reports regarding the work and progress. Why choose me? I leave no stones unturned in protecting your content. Moreover, I am committed to providing customer satisfaction. I make sure that my client is up to date about the work progress and is able to get a complete follow-up regularly. I put all my efforts in a task that I have assigned. Let me assist you with my quality service. Thank you.
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Intellectual Property Protection
    Legal
    Trademark
    Internet Security
    Copyright
    Legal Assistance
    Trademark Law
    Copyright Law
    Copyright Search
    Information Security
    Intellectual Property Law
    Legal Research
  • US$100 hourly
    I am Chartered IT Professional, Google Cybersecurity Career Certificate Graduate, OWASP Core Security Belt Certified, OWASP API Security Certified, Certified Information Systems Security Auditor, Certified ISO 27001 Lead Implementer, Certified ISO 27001 Lead Auditor, Certified Identity Governance Expert, Certified Identity and Access Manager, Certified GRC Professional, Certified GRC Auditor, Integrated Data Privacy Professional, Certified Scrum Master, BCG Certified Strategy Consultant, Six Sigma Black Belt Professional, GDPR Certified Data Protection Officer, Certified HIPAA Officer & results driven management consultant with 15 years experience in compliance, data protection, SOC 2, ISO 27001, HDS, C5 and NIS2 Controls Implementation, innovation, design thinking, ideating solutions, process improvement, pricing strategy, data analytics, business process outsource, project management, market research, financial analysis, investment banking, cybersecurity and diagnosing a range of problems, from small businesses to multi-million dollar corporations. I have done past projects with HouseCall MD, Varian Medical Systems, DNX VC, Syntervision, FourthRev and Loggi. Previously I have worked as Engagement Manager at KPMG and Senior Auditor at Grant Thornton, where I took part in several consulting assignments in healthcare and life sciences, logistics, TMT, services, consumer and transportation sectors. I also have vast experience of managing projects from start to inception including projects funded by ADB, UNESCO and WHO. I have also completed more than 15 market research studies in different verticals for determining the market size and overall analysis of target markets. I also have experience of working as Head of Product Design where I led the development teams to identify customer pain-points, develop user needs and solve customer problems by creating products with built-in security features. I also worked on developing customer personas & identifying and recruiting sponsor users for A/B testing of product features and arranging Cognitive walkthroughs for establishing the usability of products. I also applied knowledge of Scrum Framework with sprint planning and delegation of tasks on product development projects for various public and private sector organizations. I managed 10 projects of more than $1 Million in total budget. Other than above, I also have hands on experience with various compliance frameworks including GDPR, HIPAA, PCI DSS, ISO 27001, HITRUST, CCPA and NCSF (NIST Cybersecurity Framework). Key Achievements: ✅ Successfully led 8 companies through the SOC 2 Type 2 attestation process, meeting stringent requirements and passing all audits in the first attempt. This achievement significantly enhanced their reputation for data privacy and security. ✅ Guided 4 clients through the rigorous process of achieving ISO 27001 and NIS2 Directive Certificate, ensuring that all security controls and management processes were robust, auditable, and internationally recognized. ✅ Guided 2 clients through HDS and C5 certifications, ensuring that their security posture was aligned with the requirements of both compliance frameworks. ✅ Reduced the costs of IT infrastructure maintenance by 5% for 3 consulted clients ✅ Analyzed business conditions, market/industry trends, competitive influences and demographic factors to identify opportunities of business growth for 5 consulted clients ✅ Created advanced analytics for both internal and marketing use using Tableau, SQL and other BI tools for 4 consulted clients ✅ Managed $400 million donor funded projects as PMO and Project Lead ✅ Performed business process re-engineering for 3 consulted clients ✅ Consulted as lead revenue data analyst on a team responsible for collecting $60M receivables ✅ Repeatedly delivered cost reductions through the implementation of Lean principles, improved scheduling via resource loads and volume analysis ✅ Evaluated and increased operational effectiveness of organizations through the implementation of Continuous Improvement methods and Training/Coaching programs ✅ Identified opportunities within the client organization for improving productivity and operational efficiencies by installing a system by which the client can measure and realize improvement ✅ Analyzed existing processes and applied methodologies to eliminate wasted resources and time for 3 consulted clients
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Ransomware Mitigation
    Insurance & Risk Management
    User Authentication
    System Security
    Linux System Administration
    Vulnerability Assessment
    Risk Analysis
    Intrusion Detection
    NIST Cybersecurity Framework
    Information Security
    Network Security
    ISO 27001
    Amazon Web Services
    SOC 2 Report
    Python
  • US$90 hourly
    I am a self-motived technically skilled cyber security professional who is well versed in various security controls and has driven major security focused solutions through testing and enterprise implementation. Accomplished information security specialist with a passion for aligning security architecture plans and business processes and goals with security standards. I have established experience in developing, deploying, maintaining, supporting, and testing various security frameworks and security controls across the technology stacks. Technology-savvy self-starter who is adept at moving into new environments. I possess first-rate communications, strategic, and collaboration skills to lead and work in agreement with diverse groups and departments effectively.
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Palo Alto Firewalls
    Microsoft Intune
    Microsoft Azure Administration
    CrowdStrike
    Splunk
    Microsoft Azure
    Information Security
  • US$250 hourly
    As a Top Rated vCISO with a 100% job success rate, rest assured that I execute at a high level of expertise, integrity, and professionalism. I am the President & Founder of Aspire Cyber, a full-service consulting firm that rapidly delivers privacy and cybersecurity compliance solutions to help small and medium-sized businesses satisfy their legal, regulatory, and contractual requirements. Aspire Cyber was founded on the core belief that every business should have access to world-class cybersecurity talent, regardless of budget or security needs. I have over 20 years ​of experience managing information security projects and implementing strategic cybersecurity controls for the United States Army, Bank of America, and numerous Fortune 100 companies. We offer entirely “Done For You” solutions that help your business rapidly achieve compliance while we manage everything. Don’t waste 6-18 months trying to figure this out yourself. Regulatory and industry cybersecurity frameworks have hundreds of different controls you must comply with and require knowledge of IT, Cybersecurity, HR, Legal, and more. Aspire Cyber is a leading provider of comprehensive cybersecurity compliance solutions. Our team of experts has a proven track record of implementing NIST SP 800-171 practices to help defense contractors achieve Cybersecurity Maturity Model Certification (CMMC). We make it easy for your business to prove it's a safe choice for handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Schedule a free call with me to learn how our team of dedicated cybersecurity experts can help save you months of time and, in many cases, five or even six figures in excessive spending trying to become compliant without expert guidance. ★High Profile Clients ✔ I worked for the United States Army, Lockheed Martin, Bank of America, Hewlett-Packard Enterprise, and many others. Aspire Cyber specializes in the following areas: ★ Risk Assessment and Auditing - We have conducted over 200 Information Security, Business Continuity, and Cloud assessments. -Compliance (NIST, PCI, HIPAA, ISO 27001, GDPR, CCPA, COPPA, FedRAMP) - Cybersecurity Advisor -Cloud Secure Design -Data Privacy Officer (DPO) -Cloud Security -Policy Writing -Penetration Testing -Application Security -Incident Response -Vulnerability Management -Third-Party Risk Management -Security Awareness Training ★ I hold the following degrees and certifications: ✅ Certified CMMC Assessor (CCA) ✅ Certified CMMC Professional (CCP) ✅ CMMC Provisional Instructor ✅ Certified Information Systems Security Professional (CISSP) ✅ Certified Cloud Security Professional (CCSP) ✅ Certified Information Security Manager (CISM) ✅ Certified Risk and Information Systems Control (CRISC) ✅ CMMC Registered Practitioner ✅ CompTIA Security+ ✅ CompTIA A+ ✅ Master of Business Administration (MBA) ✅ Graduate Certificate Cybersecurity Technology WHY CHOOSE ASPIRE CYBER? -Professionalism: We treat all clients respectfully and adhere to the highest ethical standards. -Fast: We always aim to deliver your project ahead of schedule. -Expertise: We have vast experience across various cybersecurity and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. 🙋🏼‍♂️Our team is eager to partner with your organization to deliver cybersecurity compliance solutions rapidly. Contact Aspire Cyber today to learn how we can fulfill your cybersecurity needs.
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Cloud Security Framework
    NIST SP 800-53
    Policy Writing
    Information Security Governance
    FedRAMP
    Information Security Awareness
    Risk Assessment
    NIST Cybersecurity Framework
    Business Continuity Plan
    Information Security Audit
    Information Security
    Incident Response Plan
    Security Testing
    Vulnerability Assessment
  • US$20 hourly
    I am a Web Developer and Security analyst, Specialist creating, designing and developing a search engine friendly website with built-in security (against malware/virus) to grow your online business. Since 2017, I have developed a number of websites using PHP, Laravel , jQuery, HTML5, Ajax, Photoshop, JavaScript, using CMS like Joomla, Magento, WordPress, Drupal etc. Expert in : ✅ Web Security ✅ Wordpress/Shopify/Wix/Joomla/Drupal/Moodle ✅ PHP/Laravel/Bootstrap/Jquery ✅ Malware Remove/Security Setup
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    SEO-Based Website
    Website Optimization
    Web Application Security
    Malware Removal
    Information Security
    Website Migration
    Oracle PLSQL
    Ecommerce Website
    Website Security
  • US$55 hourly
    IT Professional with over 30 years experience. 15+ years experience in web development. 8+ Years experience in PCI-DSS Consultation, including level 1 companies, working with QSA's to swiftly obtain compliance. For the past five years, I have been providing GDPR consultation to many small to medium-sized companies. Three years experience with ISO 27001 helping clients get and maintain ISO 27001 accredited certification. I spent 20 years working in various IT roles, mainly support, engineering, and web development, within one of the largest companies in the world. I was awarded Charted IT Professional status from the British Computer Society in July 2008. Since then, I have run my own company with a small team producing web-based platforms and services and offering freelance compliance consultation to small businesses. I have also worked as a CTO on several start-up projects managing their entire IT infrastructure and gaining valuable PCI compliance experience, essential to all e-commerce projects. Due to my experience and varied IT roles, I have a good knowledge of web design, programming, databases, security, SEO, troubleshooting, technical writing & more. I am a highly organised and reliable individual, utilising existing knowledge and experiences to find practical solutions to even the most complex project.
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Compliance Consultation
    Data Privacy
    Vulnerability Assessment
    Information Security
    PCI DSS
    Data Protection
    Website Security
    PCI
    Compliance
    ISO 27001
    Risk Assessment
    Information Security Audit
    GDPR
    Web Content Accessibility Guidelines
    Security Analysis
  • US$50 hourly
    With a rich background spanning over 5+ years in designing and executing robust cybersecurity solutions, I am a Cybersecurity Specialist Consultant dedicated to safeguarding digital landscapes. My journey has taken me from the foundational steps of security analysis to spearheading roles as a Co-Founder and CTO, alongside pivotal positions in cybersecurity engineering and ethical hacking across global landscapes from Jakarta to Dallas, and Sydney to the Netherlands. My expertise lies in a deep understanding of cyber threats and vulnerabilities, backed by a Bachelor's degree in Cybersecurity from Deakin University and certified mastery in Blockchain Security, Advanced Penetration Testing, and Fuzzing and Crash Analysis. I've successfully led comprehensive security initiatives, including developing XDR and SIEM solutions, managing multi-layered security systems, and pioneering full-scale cybersecurity startups. My approach is rooted in innovation and efficiency, aiming to protect organizational assets against ever-evolving cyber threats with customized security strategies. At the heart of my service is a commitment to operational excellence and a proactive stance on cybersecurity, ensuring I'm always ready to counteract cyber threats swiftly. Through Encripti, my cybersecurity startup, and various contractor roles, I've honed my skills in vulnerability assessments, red/blue team engagements, and crafting defensive architectures against complex cyber attacks. My portfolio is a testament to my ability to communicate complex security concepts effectively and to collaborate towards enhancing cybersecurity resilience in dynamic environments. In seeking new opportunities on Upwork, I aim to bring my wealth of experience and a proactive approach to cybersecurity to organizations looking to fortify their defenses. Whether through strategic consulting, hands-on penetration testing, or crafting comprehensive security frameworks, my goal is to deliver unparalleled value and security assurance to my clients.
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Blockchain Security
    API Testing
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Risk Analysis
    Virus Removal
    Web Application Security
    Data Analytics
    Smart Contract
    Malware Removal
    Security Testing
    Vulnerability Assessment
    Application Security
    Cybersecurity Management
    Penetration Testing
    Digital Forensics
  • US$150 hourly
    I focus on providing cybersecurity compliance, cyber risk assessment, and cybersecurity consulting services to small businesses specializing on the implementation of and compliance with CMMC, DFARS 252.204-7012, and NIST 800-171 requirements. I have worked with NIST 800-171 since 2019 providing guidance to small businesses on meeting the requirements of NIST-171. This includes System Security Plan (SSP) development, Plan of Actions and Milestones (POA&M) creation, Policy and Procedure Development, and technical control implementation. There is more to CMMC compliance than buying a set of pre-made policy and procedure templates. As recent government legal action shows, the Department of Defense is pursuing legal action against companies not meeting CMMC and DFARS requirements after claiming to meet the requirements to win DoD contracts. Let me help your organization meet compliance and more importantly - stay compliant! I provide recommendations to small business owners that are cost-effective to meet cybersecurity compliance requirements and lessen cybersecurity risk. Specialties: cyber risk assessments, security gap analysis, policy and procedure development, system security plan (SSP) development, Plan of Action and Milestones (POA&M) creation Frameworks: CMMC, NIST 800-171, NIST Cybersecurity Framework Education: Doctorate - Cybersecurity (in-progress), Masters – Administration, Masters – Computer Science, Bachelors – IT Management Certifications: Certified CMMC Professional (CCP), CISSP, CRISC, CCSP, HCISPP, AWS Cloud Practitioner
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Policy Analysis
    Security Analysis
    Information Security Governance
    Information Security Audit
    Certified Information Systems Security Professional
    Cybersecurity Management
    Information Security
    Information Security Consultation
  • US$50 hourly
    Overview: 🏅 Expert-Vetted Freelancer on Upwork | 100% Job Success Greetings! I am a Cyber Security Consultant, well-versed in safeguarding organizations across the digital landscape. With expertise in Microsoft Security Solutions, Exchange Online Protection, Data Loss Prevention, Endpoint Security, Vulnerability Assessment, and Office 365 Security, I offer comprehensive protection against evolving cyber threats. Key Expertise:  Microsoft Defender for Endpoint (EDR): Mastery in EDR, including onboarding, troubleshooting, RBAC configuration, automation remediation, and leading large-scale onboarding projects.  Microsoft Defender for Antivirus: Proficiency in policy setup, performance optimization, exclusion management, and advanced threat protection.  Microsoft Defender for Cloud: Expertise in CSPM, regulatory compliance assessments, vulnerability assessments, and seamless integration with Defender for Endpoint.  Microsoft Defender for Cloud Apps: Proven skills in monitoring Shadow IT applications, risk assessment, and compliance-driven decision-making.  Exchange Online Protection: Ensuring robust email security, including threat protection, spam filtering, and anti-phishing measures.  Data Loss Prevention: Implementing strategies to prevent unauthorized access and sharing of sensitive data.  Endpoint Security: Comprehensive endpoint protection, ensuring device security and threat mitigation.  Vulnerability Assessment: Identifying and mitigating vulnerabilities to fortify your security posture.  Office 365 Security: Safeguarding your Office 365 environment against cyber threats and data breaches. Achievements:  Led global initiatives resulting in the successful onboarding and security enhancement of numerous organizations.  Reduced security incidents by implementing advanced threat protection measures and optimizing security policies.  Ensured regulatory compliance across diverse industries, including Cloud Security Benchmark, HIPAA HITRUST, BSMH, and ISO 27001:2013. Why Choose Me: My mission is to provide holistic, tailored cybersecurity solutions that align with your unique business needs. I bring a wealth of experience, technical prowess, and a relentless commitment to enhancing your organization's security posture. With a focus on knowledge transfer and client collaboration, I create a safer digital environment for your enterprise. Let's Collaborate: If you're ready to fortify your organization's cyber defenses and ensure peace of mind, let's connect. I'm here to discuss how to strategically protect your digital assets and mitigate cyber risks. Reach out to me to start the journey towards enhanced cyber security! Certifications: SC-900: Microsoft Security, Compliance, and Identity Fundamentals SC-200: Microsoft Security Operations Analyst
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Microsoft Windows
    Microsoft Azure
    Office 365
    Cybersecurity Tool
    Security Analysis
    Cyber Threat Intelligence
    Technical Support
    Cybersecurity Monitoring
    Microsoft Endpoint Manager
    Review
    Review Website
    Data Entry
    Microsoft Excel
    Microsoft Word
  • US$95 hourly
    I am a Cyber Security and Information Technology expert with 20 years experience ranging from small start-ups to multi-billion euro businesses. I hold a CISSP, the gold standard of Information Security Qualifications. I specialise in Strategy, Governance, Risk and Compliance - this makes me ideal for projects such as: Helping you achieve Cyber Essentials or IASME Governance status PCI-DSS & ISO 27001 compliance programs and audits Being your Cyber Security / Info Sec manager or CISO on a part-time basis Selecting and managing IT and Cyber Security suppliers on your behalf Writing, reviewing and updating your IT and Cyber Security policies Security Awareness Training I am an award winning public speaker and trainer and my Cyber Security Awareness Training is very popular delivered in person or from my online studio to clients around the world.
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    GDPR
    Security Infrastructure
    Information Security Awareness
    ISO 27001
    PCI DSS
    Information Security Audit
    Information Security Governance
    Certified Information Systems Security Professional
    PCI
    Information Security
    Security Policies & Procedures Documentation
    Incident Response Plan
    Vulnerability Assessment
    Security Assessment & Testing
    Network Security
  • US$50 hourly
    I'm a senior offensive security engineer conducting and leading penetration testing engagements. I have conducted and led security audits, penetration tests, and red team engagements for a variety of companies, ranging from enterprise level with thousands of hosts in scope to startups or small clients that want to have an edge over their competition security-wise. Daily activities include, but are not limited to: - Client meetings - Scoping - Hands-on activities (pentesting, etc) - Researching new vulnerabilities - Report writing My skillsets include: - Penetration Testing (web applications, APIs, internal/external networks, mobile (android) applications, server security review) - Vulnerability Assessments - Red Teaming Exercises - Phishing Simulation Owner of CVE-2023-4843. Volunteer at Hackout (a project/platform having collaboration with CERT) where I responsibly disclose vulnerabilities. Former contributor member/content creator at Try Hack Me. Certificates owned: [+] Certified Professional Penetration Tester (eCPPT) from eLearnSecurity [+] Network Defense Professional (eNDP/PND) from eLearnSecurity [+] Certified Red Team Professional (CRTP) from Pentester Academy [+] Certified Red Team Expert (CRTE) from Pentester Academy [+] Web Application Penetration Tester from eLearnSecurity [+] Red Team Operations - Windows Privilege Escalation from Sektor7 [+] Certified Enterprise Security Specialist (PACES) from Pentester Academy [+] Certified Penetration Tester Extreme - eLearnSecurity [+] Certified Red Team Operator - Zero Point Security [+] Offensive Security Experienced Pentester (OSEP) - Offensive Security
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Ethical Hacking
    Web Application Security
    Linux
    Information Security Audit
    OWASP
    Security Testing
    Information Security Consultation
    Security Assessment & Testing
    Application Security
    Network Penetration Testing
    Penetration Testing
    Web App Penetration Testing
    Vulnerability Assessment
    Information Security
    Network Security
  • US$100 hourly
    Hello I am an experienced cyber security professional and owner of the UK based boutique consultancy Periculo.co.uk who specialise in Digital health, medical devices, fintech, SaaS companies and more. Having drawn on my experience over a number of years, working with a huge variety of customers ranging from construction companies to banks, charities, medical devices, fintech and MOD contractors I became a freelancer to offer affordable expertise that benefits everyone. I strongly believe that every organisation needs to take security and compliance seriously however not all have the big budget that most consultancies demand for their work. Through my own internal processes I'm able to quickly deliver high quality, best in class security and compliance consultancy and testing. My organisation is accredited to the following; Cyber Essentials Cyber Essentials Plus IASME Gold GDPR readiness ISO27001 ISO9001 CREST Penetration Testing We are certified to these standards to provide assurance but also so I practice what I preach and know how to implement it in an efficient way. If you require an affordable security and compliance expert who always reaches a solution with the appropriate risk v reward balance then please get in touch. - Able to assess, audit and certify to GDPR ready, IASME Gold, Cyber Essentials and Cyber Essentials + - GDPR Advisory, DPO as a Service (as I have technical expertise I can often cover a lot more than your traditional DPO) - Providing project consultancy (From small changes to extensive, high risk programs) - Providing operational consultancy and escalation - Supplier and internal assessments - FDA submissions - EUMDR submissions - Penetration testing - Penetration testing for medical devices, inline with IEC60601-4-5 - SOUP management - Hazard analysis - CISO as a service - Digital health cyber security - Infrastructure Security and configuration, AWS, Azure - Security operations consultancy and build - Business and technical policy, standards author Cover all aspects of security including penetration testing, vulnerability scanning etc. ** I am currently available for hire**
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Cybersecurity Management
    ISO 27001
    Information Security Audit
    Penetration Testing
    Security Testing
    Technical Writing
    Vulnerability Assessment
    Data Protection
    PCI
    Network Security
    Information Security
    Cloud Computing
  • US$30 hourly
    Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP​ 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is our key differentiator. Please check my Upwork work history and client feedbacks. I look forward to hearing from you!
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Website Security
    OWASP
    Web Application Security
    Information Security Audit
    Certified Information Systems Security Professional
    Information Security
    Vulnerability Assessment
    Security Testing
    Network Security
    Penetration Testing
  • US$100 hourly
    I connect people with the right security technologies for their needs. Rely on my marketing expertise to demonstrate the value of complex security solutions to software engineering leaders, non-technical decision-makers, and everyone in between. ● Helped Aura grow from zero to 1 million+ monthly visitors and 6500+ top-ranking keywords within twelve months. ● Achieved 32% annualized growth with Lumifi building by linking its channel marketing strategy with comprehensive website content, making it one of CRN's Fastest-Growing Technology Vendors multiple years in a row. ● Leveraged best-in-class SEO tools to obtain ambitious growth goals: Ahrefs, SE Ranking, Clearscope, and HubSpot.
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Cybersecurity Monitoring
    Web Application Firewall
    Cloud Security
    Penetration Testing
    Cyber Threat Intelligence
    Information Security
    Cybersecurity Management
    NIST Cybersecurity Framework
    Article Writing
    Copywriting
    Content Writing
    Search Engine Optimization
    Search Engine Marketing
    Technical Writing
    English
  • US$999 hourly
    Computer Science Engineer/Ethical Hacker/Cyber Security Expert who has been providing security for corporate and individuals. ✌Cyber Security/Ethical Hacking - Securing mobile & Pc, running tests for vulnerabilities & server-side security (13+ experience) ✌Web development - JavaScript , Php (12+ experience) ✌CMS - Joomla, WordPress, Drupal (10+ experience) I usually develop cross-platform and Android apps and build dynamic websites. I can develop the product very quickly and with high accuracy. I believe in customer satisfaction. U say it I develop it any language any software you need and if you want to secure your self from attacks I am always available. My work is fast and secure. *Price will vary on the complexity of the project Happy new year 2024 !!!
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Information Security
    Security Engineering
    Ripple
    Bitcoin
    Internet Security
    Android App Development
    XML
    Ethical Hacking
    Cryptocurrency
    Digital Marketing
    PHP
    JavaScript
  • US$80 hourly
    A seasoned IT and Compliance Professional with 20+ years experience in IT Operational Systems, Information Security Governanceand Compliance. I have been working as an ISO Consultant and Auditor for 8 years and manage projects for preparation of ISO 27k1 compliance, Data Governance & Compliance or supporting organisations in creating better Security Policies or Information Management Awareness. Strengths: I am good at adapting to situations in any circumstance, and I remain calm under pressure to ensure we don't lose focus on the end game. I am a great team player, both onsite and remote, and look to support the team, not stand out against the crowd. No work is "above" or "beneath" me; I roll my sleeves up and get to work. Weaknesses: I am susceptible to perfecting my output, which sometimes causes me to overthink my delivery. Projects: I have recently completed projects related to GDPR, legal preparation on GDPR Compliance for Policy and Procedures, data protection, analysis of information and how it is transported within client organizations, and risk assessments on large scale projects for European Institutions in Intellectual Property and Financial Sectors. Achievements and Education: I have a Masters in Business Administration, and I operate my company from Prague, Czech Republic. I employ a humble 16 staff who all work in specific areas around Information Security and GDPR / Data Protection. It has been an extremely rewarding struggle, but a challenge is not fraught without difficulties :-) I am CISSP Certified, GDPR P Certified, ISO 27001 Certified (looking to become Auditor) with a broad knowledge of public speaking ( I have been a speaker for conferences in Eastern Europe on InfSec). I also lecture at King Charles University Post Grads in Prague, Czech Republic, because I believe that the key to identifying good talent is to interface at the source of discovery, which ultimately begins High School / College / University. I am also working to become the Rugby coach for under 21s rugby in the Czech Republic :-)
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    International Law
    GDPR
    Data Protection
    Security Analysis
    Security Infrastructure
    Compliance Consultation
    Legal Writing
    Information Management
    Data Privacy
    Compliance
    Risk Assessment
    Regulatory Compliance
    Contract Drafting
    Legal
    Contract Law
    Information Security
  • US$20 hourly
    Need help to recover your HACKED & DISABLED social media accounts in the least possible time? You are at right place if you have lost access to your personal or business social media account (s). Lost credentials or your account got hacked. Your account was disabled by a mistake. You want to remove old accounts or remove your content from search engines or social media. Or if have any other Instagram and Facebook related issue. You might have tried available support options and scrolled through forums but could not find help because: I have been providing virtual assistance with the related issues for a long time and enjoying my successful journey. I have proudly offered my clients to pay only after the successful results and resolved dozens of cases. You will find the support and solution for almost every kind of issue related to the Instagram and Facebook and other social media platforms with full compliance to ethics and respective platform's terms and service. I would love to answer your queries for free of cost and will suggest a way forward that would help you to accomplish your goals. Please send me a message with issue details and screenshots (if feasible). Invite me for the interview if your: Facebook account is disabled. Instagram account is disabled. Facebook account is restricted. Instagram account is restricted. Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Or if you are seeking help for: Recover hacked Instagram account Facebook recovery Instagram restoration Facebook restoration Instagram security Facebook security Instagram verification Facebook verification Instagram & Facebook Integration Instagram & Facebook Marketing Recovery of account in case of lost credentials Recovery from underlying technical issues, bugs and glitches Snapchat issues LinkedIn issues TikTok issues Social media content removal Facebook Instagram Integration Facebook and Instagram verification problem Facebook content removal Instagram content removal Instagram fake followers removal Instagram fake accounts removal Facebook fake accounts removal ''DON'T FORGET TO READ THE REVIEWS ON MY PROFILE'' Disclaimer: Write me about the issues related to your ''own'' social media account (s) or only if you are an authorized representative. Avoid making requests that are not compliant with Upwork and Instagram's terms of service. You will get ethical virtual assistance to get your problem resolved through this channel. Thank you for your precious attention. Looking forward to your invites. Anxiously waiting for assisting you better. :)
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Social Media Marketing
    Social Media Account Setup
    Instagram API
    Internet Security
    Technical Support
    Information Security
    Network Security
    Vulnerability Assessment
    Ethical Hacking
    Troubleshooting
    Data Recovery
    Cybersecurity Management
    Social Media Management
    Instagram
    Facebook
  • US$145 hourly
    Vastly experience IT expert and top ranked AWS consultant on Upwork that specializes in AWS consulting and migrating business environments, applications and data centers to the AWS cloud. Certified AWS Solutions Architect and AWS Certified Security - Specialty and specialist at creating secure, highly available and cost efficient environments in the AWS cloud that meet all modern compliance standards such as HIPAA, PCI and SOC2. AWS instructor and SME for Simplilearn, an online IT training and certification site and instructor for A Cloud Guru, world leader in cloud computing training. Over 15 years experience of in-house IT consulting for large investment banks in London, Sydney & New York. Contact me if you need highly recommended AWS certified consulting services to evaluate your needs, make the move to the cloud, and vastly improve your technology environment. Specialties: - All things AWS - Cloud migrations - Cloud architecture - Cloud cost optimization - Compliance: HIPAA/SOC2 - IaaS/PaaS/SaaS - Disaster Recovery - Storage solutions - Databases
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Application Security
    Security Infrastructure
    AWS Server Migration
    Amazon EC2
    Microsoft SQL Server Administration
    MySQL
    AWS Lambda
    Amazon Web Services
    Amazon RDS
    Amazon S3
    IT Management
    Database Administration
    Vulnerability Assessment
  • US$65 hourly
    Hello, I have hands on experience in the following: - Writing governance, risk management policies - Technical writing and documentation - ISO 27001 preparation, implementation, maintenance - Risk management; assessment, mitigation. - Standing up or maintaining your GRC program - Incident management; detection, handling. - SIEM / Microsoft Sentinel (Baselining, monitoring, alerts, rule analytics, playbooks) - Cloud Forensics and incident response - AWS, Microsoft Azure & O365 - Incident awareness and preparedness - Build executive tabletop cyber exercises - Build educational material - Expert PowerPoint slide decks. - Communicate complex subjects in easy visual slides for your C-Suite
    vsuc_fltilesrefresh_TrophyIcon CISM Specialists
    Cybersecurity Management
    Risk Analysis
    Strategy
    Network Engineering
    Prompt Engineering
    NIST SP 800-53
    NIST Cybersecurity Framework
    Digital Forensics
    Incident Management
    Incident Response Readiness Assessment
    Enterprise Risk Management
    Certified Information Security Manager
    ISO 27001
    Risk Management
    Problem Solving
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a CISM Specialist on Upwork?

You can hire a CISM Specialist on Upwork in four simple steps:

  • Create a job post tailored to your CISM Specialist project scope. We’ll walk you through the process step by step.
  • Browse top CISM Specialist talent on Upwork and invite them to your project.
  • Once the proposals start coming in, create a shortlist of top CISM Specialist profiles and start to interview.
  • Hire the right CISM Specialist for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a CISM Specialist?

Rates charged by CISM Specialists on Upwork can vary with a number of factors including experience, location and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a CISM Specialist on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance CISM Specialists and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream CISM Specialist team you need to succeed.

Can I hire a CISM Specialist within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive CISM Specialist proposals within 24 hours of posting a job description.

Schedule a call