Hire the best Cybersecurity developers

Check out Cybersecurity developers with the skills you need for your next job.
Clients rate Cybersecurity developers
Rating is 4.8 out of 5.
4.8/5
based on 1,046 client reviews
  • US$99 hourly
    Let me help you unlock business opportunities and growth (💲millions) and sell to the likes of Disney, Pfizer, Uber, Siemens, Google, PWC, and so on. In the B2B space, you need Security, Privacy, and Compliance to sell to Enterprises! You focus on the business, and I'll take care of security, privacy, and compliance. Sleep well overnight because you know you are in good hands with the 🥇 Upwork virtual CISO, Security, Privacy, and Compliance consultant (1M+ earnings, 20+ years of enterprise experience)! CEO selling to Morgan Stanley: 🥂"The certification is enabling us to strike a deal with a Fortune 100 client." CEO selling to Philips: 🍾 "We have achieved the ISO 27001:2022 certification in record time." CEO selling to Pepsi:🎉 "Attila supported the growth of our business into Fortune 100 accounts." COO selling to Fannie Mae:👏 "We achieved a successful SOC 2 Type II attestation with no exception." 💭Securing your business, passing security assessments by clients or prospects, and achieving a security certification 𝙨𝙝𝙤𝙪𝙡𝙙 𝙣𝙤𝙩 𝙗𝙚 𝙖 𝙘𝙪𝙢𝙗𝙚𝙧𝙨𝙤𝙢𝙚 𝙖𝙣𝙙 𝙥𝙖𝙞𝙣𝙛𝙪𝙡 𝙚𝙭𝙚𝙧𝙘𝙞𝙨𝙚. 👌 All you need to do is ping me on Upwork, bring your problem, and after a 15-minute scoping call, I will provide you with a detailed Scope of Work. Specialized in business-to-business clients, providing 💸money-back guaranteed💸 ISO 27001, SOC 2, GDPR, HIPAA, PCI-DSS, CMMC, and FedRAMP projects and affordable virtual CISO (vCISO) services. ----> If you don’t get certified, all my fees will be refunded! <---- We are a good match if you are: 😢Busy developing your product or business and don’t have time and resources to be consumed by compliance efforts and endless meetings, halting your production for months 🤔Already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, Tugboat Logic, SecureFrame, Strike Graph, Audit Board, Trust Cloud, and so on) but 𝙙𝙤𝙣’𝙩 𝙠𝙣𝙤𝙬 𝙩𝙝𝙚 𝙣𝙚𝙭𝙩 𝙨𝙩𝙚𝙥 𝙤𝙧 𝙙𝙤𝙣’𝙩 𝙝𝙖𝙫𝙚 𝙩𝙞𝙢𝙚. 😢You quickly need quick security or privacy awareness training, cloud security posture assessment (AWS, GCP, Azure), endpoint security (MS 365 - Intune, Jumpcloud, Google Workspace), or penetration testing? 💪Want to decrease your sale cycle by being compliant and having all the answers for the security and privacy questionnaires? 💪Facing challenges with the security and privacy implications of AI products? 💪Want continuous access to a certified, creditable security, compliance, and privacy professional to manage your security framework? -> Continous virtual CISO (vCISO / fractional CISO) service with affordable weekly payments! 😟Need world-class, battle-proof security and privacy policies and you need it quickly? The kind of ones that have passed audits by KMPG, Deloitte, E&Y, Pepsi, Uber, Verizon, Philips, Facebook, and many others. 💪You want problems to be solved by the BEST Working with me, you will: ● Stop struggling with compliance requirements, security questionnaires, or useless document templates. ● Make the first steps on the journey to selling Enterprises ● Receive turnkey, Enterprise-grade security operation framework ensuring long-term effectiveness ● Work with an experienced senior team (architects, pen testers, endpoint engineers, developers, auditors, consultants) that regularly helps clients score Enterprise accounts. My stats are: ✅Saved tens of thousands $$$$$ for clients, advising them on the right security tools, solutions, and approach ✅#1 in Information Security and IT compliance categories (1M+ earned) ✅Supporting all time zones ✅Long-term engagements ✅Professional certifications (CISA, CISSP, ISO 27001 IA) About the Security Consultants team: QUALITY over QUANTITY is our ethos. Excellent quality, on time, always. We only take on projects when we can deliver outstanding results. The team consists of (only) senior experts in AWS, Azure, GCP DevOps, SecOps, Penetration testing, Google Workspace, MS 365 Intune, AppSec, auditing, and compliance. Professional Integrity: We are strongly committed to moral and ethical principles and values, such as honesty, honor, responsibility, trustworthiness, and objectivity. What we look for in a new client: ● Open-minded, relaxed attitude ● Values integrity & long-term relationships ● Willing to accept advice and guidance (security is a complex niche) Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, SIG Lite, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Process Unity Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS) CSAT, IRAP, PIPEDA, ISO 42001
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Information Security Consultation
    GDPR
    Security Management
    Insurance & Risk Management
    ISO 27001
    SOC 2
    AI Security
    HIPAA
    SOC 2 Report
    Cloud Security
    Information Security Audit
    Certified Information Systems Security Professional
    Information Security
    Cybersecurity Management
    Security Policies & Procedures Documentation
  • US$65 hourly
    Hello, I have hands on experience in the following: - Writing governance, risk management policies - Technical writing and documentation - ISO 27001 preparation, implementation, maintenance - Risk management; assessment, mitigation. - Standing up or maintaining your GRC program - Incident management; detection, handling. - SIEM / Microsoft Sentinel (Baselining, monitoring, alerts, rule analytics, playbooks) - Cloud Forensics and incident response - AWS, Microsoft Azure & O365 - Incident awareness and preparedness - Build executive tabletop cyber exercises - Build educational material - Expert PowerPoint slide decks. - Communicate complex subjects in easy visual slides for your C-Suite
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Cybersecurity Management
    Risk Analysis
    Strategy
    Network Engineering
    Prompt Engineering
    NIST SP 800-53
    NIST Cybersecurity Framework
    Digital Forensics
    Incident Management
    Incident Response Readiness Assessment
    Enterprise Risk Management
    Certified Information Security Manager
    ISO 27001
    Risk Management
    Problem Solving
  • US$165 hourly
    I am an accomplished and experienced Cyber Security Engineer, CISO, and consultant with over 20 years experience in government, commercial, non-profit and private organizations. I'm a Certified Information Systems Security Professional (CISSP) and CMMC Registered Practitioner. My education includes a Master's degree in Information Assurance and Security specializing in Digital Forensics, a Bachelor's Degree in Information Technology, and daily, hands-on work governing, securing and administering complex information technology environments. My current efforts include cybersecurity compliance implementations for regulated industries and government contractors including the NIST Cybersecurity Framework, Risk Management Framework, NIST SP 800-171, and Cybersecurity Maturity Model Certification (CMMC). For those not bound to other regulatory guidelines, I assist with implementation of the Center for Internet Security (CIS) Critical Security Controls and the CIS Risk Assessment Method. I assist with expert advice, gap assessments, requirements and implementation reviews. I help develop and refine cybersecurity documentation including System Security Plans, POA&Ms, and Policies and procedures. I will share national background check results for qualified opportunities.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Gap Analysis
    Vulnerability Assessment
    Cybersecurity Monitoring
    Amazon Web Services
    Governance, Risk Management & Compliance
    Security Engineering
    Cloud Security
    Security Policies & Procedures Documentation
    Information Security Awareness
    Cybersecurity Management
    Network Security
    Certified Information Systems Security Professional
    Information Security
  • US$150 hourly
    I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startups and micro, small, and mid-sized companies create secure operating environments to increase business opportunities. I am also part of Upwork's Expert-Vetted Talent program. My priority is to create cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold a bachelor's degree in Telecommunications Engineering from the Airforce University in Argentina, a master's degree in Information Security Engineering from the SANS Technology Institute, and many cybersecurity certifications, including CISSP (Certified Information Systems Security Professional) and GSE (GIAC Security Expert).
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    WordPress Malware Removal
    Malware Removal
    CMMC
    Risk Assessment
    Cloud Security
    Internet Security
    Information Security Audit
    Information Security Awareness
    Security Engineering
    Security Analysis
    Email Security
    Penetration Testing
    Information Security
    Security Policies & Procedures Documentation
    Cybersecurity Management
  • US$150 hourly
    I have successfully completed 490+ jobs on Upwork with a 100% success rating. I mostly work with B2B tech companies. My current and past clients include HP, Seagate, BMC, Atos, Adobe, Wix, Tanium, Illumio, AB Tasty, TapClicks, Grytics, IBA Group, Traction, and more. I focus on translating complex, technical topics into clear, clean, and easy-to-digest stories. I produce a wide range of messaging and thought leadership for my clients, including: • Messaging development and brand positioning • Product/solution messaging frameworks and brochures • Website copywriting (end-to-end) • Case studies • eBooks and whitepapers • Articles and blogs • Email and LinkedIn marketing campaigns My clients have said: ——“Craig is a real talent, he doesn't just write, he does business development, asks useful questions and makes you think through your business strategy. He re-wrote our entire website, shaping our ideas and inspiring us to market new service packages. Craig is our go-to top gun from now on. Great work, couldn't be happier.” ——“You will not find a better writer, researcher and planner for whatever work you have in mind. This freelancer can do it all. If you need it done, hire him.” ——“Was great to work with. He always responded quickly and kept us regularly updated. All work was completed quickly to an excellent standard. Would not hesitate to recommend and would definitely rehire if we had another content writing project come along. Thanks!” ——"I recommend Craig to anyone who wants to move their content quality to the next level” If you feel we might be a good fit for each other, reach out, and we’ll chat about your project or ongoing needs. -Craig
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    B2B Marketing
    Brand Strategy
    Writing
    SEO Writing
    Content Writing
    Ghostwriting
    Article Writing
    White Paper Writing
    Case Studies
    Website Copywriting
    Content Strategy
    Content Marketing Strategy
    Copywriting
    Technical Writing
    Technical Case Study
  • US$100 hourly
    I am Chartered IT Professional, Google Cybersecurity Career Certificate Graduate, OWASP Core Security Belt Certified, OWASP API Security Certified, Certified Information Systems Security Auditor, Certified ISO 27001 Lead Implementer, Certified ISO 27001 Lead Auditor, Certified Identity Governance Expert, Certified Identity and Access Manager, Certified GRC Professional, Certified GRC Auditor, Integrated Data Privacy Professional, Certified Scrum Master, BCG Certified Strategy Consultant, Six Sigma Black Belt Professional, GDPR Certified Data Protection Officer, Certified HIPAA Officer & results driven management consultant with 15 years experience in compliance, data protection, SOC 2, ISO 27001, HDS, C5 and NIS2 Controls Implementation, innovation, design thinking, ideating solutions, process improvement, pricing strategy, data analytics, business process outsource, project management, market research, financial analysis, investment banking, cybersecurity and diagnosing a range of problems, from small businesses to multi-million dollar corporations. I have done past projects with HouseCall MD, Varian Medical Systems, DNX VC, Syntervision, FourthRev and Loggi. Previously I have worked as Engagement Manager at KPMG and Senior Auditor at Grant Thornton, where I took part in several consulting assignments in healthcare and life sciences, logistics, TMT, services, consumer and transportation sectors. I also have vast experience of managing projects from start to inception including projects funded by ADB, UNESCO and WHO. I have also completed more than 15 market research studies in different verticals for determining the market size and overall analysis of target markets. I also have experience of working as Head of Product Design where I led the development teams to identify customer pain-points, develop user needs and solve customer problems by creating products with built-in security features. I also worked on developing customer personas & identifying and recruiting sponsor users for A/B testing of product features and arranging Cognitive walkthroughs for establishing the usability of products. I also applied knowledge of Scrum Framework with sprint planning and delegation of tasks on product development projects for various public and private sector organizations. I managed 10 projects of more than $1 Million in total budget. Other than above, I also have hands on experience with various compliance frameworks including GDPR, HIPAA, PCI DSS, ISO 27001, HITRUST, CCPA and NCSF (NIST Cybersecurity Framework). Key Achievements: ✅ Successfully led 8 companies through the SOC 2 Type 2 attestation process, meeting stringent requirements and passing all audits in the first attempt. This achievement significantly enhanced their reputation for data privacy and security. ✅ Guided 4 clients through the rigorous process of achieving ISO 27001 and NIS2 Directive Certificate, ensuring that all security controls and management processes were robust, auditable, and internationally recognized. ✅ Guided 2 clients through HDS and C5 certifications, ensuring that their security posture was aligned with the requirements of both compliance frameworks. ✅ Reduced the costs of IT infrastructure maintenance by 5% for 3 consulted clients ✅ Analyzed business conditions, market/industry trends, competitive influences and demographic factors to identify opportunities of business growth for 5 consulted clients ✅ Created advanced analytics for both internal and marketing use using Tableau, SQL and other BI tools for 4 consulted clients ✅ Managed $400 million donor funded projects as PMO and Project Lead ✅ Performed business process re-engineering for 3 consulted clients ✅ Consulted as lead revenue data analyst on a team responsible for collecting $60M receivables ✅ Repeatedly delivered cost reductions through the implementation of Lean principles, improved scheduling via resource loads and volume analysis ✅ Evaluated and increased operational effectiveness of organizations through the implementation of Continuous Improvement methods and Training/Coaching programs ✅ Identified opportunities within the client organization for improving productivity and operational efficiencies by installing a system by which the client can measure and realize improvement ✅ Analyzed existing processes and applied methodologies to eliminate wasted resources and time for 3 consulted clients
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Ransomware Mitigation
    Insurance & Risk Management
    User Authentication
    System Security
    Linux System Administration
    Vulnerability Assessment
    Risk Analysis
    Intrusion Detection
    NIST Cybersecurity Framework
    Information Security
    Network Security
    ISO 27001
    Amazon Web Services
    SOC 2 Report
    Python
  • US$60 hourly
    SSO expert having Identity and Access Management expertise of 16+ years in SAML / OpenId Connect / Oauth 2.0 / JWT / FIDO2/ Webauthn / 2FA etc. I have experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, Okta, OneLogin, Auth0, Spring Security SAML, Keycloak, ForgeRock, IBM Security Access Manager etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, Ruby, Go, etc.) or framework (Node.js, Meteor, Angular, Django, CodeIgniter, Concrete5, Yii, Symfony, Laravel, WordPress etc.). I have a strong track record of helping clients succeed with: -Adding SAML authentication to custom applications -Troubleshooting SAML Identity Provider and Service Provider errors -Deploying SAML Identity Providers (IdPs) and Service Providers (SPs) -Finding the right architecture for layering SSO technologies (AD, LDAP, OAuth, OpenID Connect, CAS, Kerberos, JWT, multi-factor, etc.) -Providing training, documentation and third-party support -Deployment and architectures of LDAP solutions (OpenDJ, OpenLDAP, IBM Security Directory Server etc). Architectures with high availablity and custom schema. LDAP proxy / bridge solutions deployment. -Architectures and solution Implementation of Identity and Access governance solutions (Sailpoint IIQ , IBM Security Identity Manager, IBM Security directory integrator ). -Role based access control implementation in Identity management solutions. -Risk based access control implementation with Access Management solutions. Devops and cloud security - - Dockerize applications and platforms. - Deployment of applications on AWS EKS platform. - Deployment of applications on GCP GKE platform. Complex Integrations - - Rest API development and security with Oauth / JWT tokens. - API gateway integrations of API. SSO and Identity Access Management Integration Expert | Technical Project Manager
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Solution Architecture Consultation
    OKTA
    Vulnerability Assessment
    Application Security
    Single Sign-On
    API Integration
    OAuth
    Cybersecurity Management
    Security Analysis
    Information Security Consultation
    Auth0
    LDAP
    User Identity Management
    Amazon Cognito
  • US$100 hourly
    I'm working as an Account manager at the Apriorit company. My main responsibility is to manage existent projects and to seek new opportunities for our company. The key areas of development where we have a strong experience are File System Driver (Windows, Linux, MacOS), Embedded Linux development, IoT, Network Driver Development, Device Driver Development, Kernel development, C and C++ Programming (C++ development, C/C++), DLL injection, Virtualization solutions (all main types of Hypervisor), CyberSecurity, Cybersecurity solutions and Penetration Testing both Inside and Outside, API Hook, Embedded Solutions, Data Acquisition, Mobile Data Management (MDM). So, if you need high qualified Kernel Developer - we can help you! So main targets of solutions are focused on low-level development - management and development of file system filter driver, USB management driver, network adapter drivers, having strong experience for these we can do a project in time and limited budget. If we are talking about Virtualization - they are major complex solutions related to Remote access, Single sign-on software and solutions development, or Data Protection solution. Have advanced skills of working and understanding for main hypervisors, such as Hyper-V, Xen, ESXi, KVM. We can discuss more suitable architecture idea for a customer and scheme of work, and even propose a solution based on our own SDK, which can speed up the process of development. In addition, we are highly experienced in Image Processing and Computer Vision, CUDA and speed-up calculations of NVIDIA Video Card processing, GPU programming, OpenCV, OpenGL, Photo and Video Object recognition. We are working with Deep Learning modeling (TF, CoreML, Caffee, etc.) and computer Science/Machine learning. We have used Python3 (Anaconda, Spyder), Tensorflow, Numpy, Scipy, Keras, Theano, Scikit-learn. And we have an experienced Reverse Engineering Team, which can help you to dissect and analyse any system's objects and discover undocumented items. I'm open to different price and project working schemes, please feel free to contact me.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Desktop Application
    Rust
    Microsoft Windows
    Solution Architecture
    Golang
    Embedded System
    Driver Development
    Kernel
    Embedded Linux
    Cybersecurity Management
    TCP/IP
    macOS
    Network Security
    Embedded Application
    C++
  • US$165 hourly
    Sr. Architect and Engineer specializing in Cybersecurity, Networks, Cloud, and IT Systems with proven international business experience and management skills. UPWORK experience: 9000+ work hours, 100% Job Success, Top Rated Plus, Expert-Vetted With 15+ years of professional experience, I provide a complete set of services from proven advanced technical solutions and methodologies to business development, team-building, and management. I have successfully delivered complex projects across heterogeneous environments such as Telco/ISP providers, SMB, and Large International Enterprises in USA, Europe & Globally. Main offered services include: • Cybersecurity Architect • Network Architect • System Architect • Cloud Architect • Digital transformation • Solution design and implementation • IT strategy development • Information Security Manager • vCTO | vCIO | vCISO • Executive Consultant Highly experienced SME in the following technology fields: Information Security & Cyber Security • Develop & enhance Cybersecurity management frameworks. • Develop, implement & monitor strategic, comprehensive enterprise information security & IT risk management programs. • Develop, and maintain cybersecurity policies, standards, baselines, guidelines, and procedures. Network/IT/System Security • Firewall, UTM, NGFW & NG-IPS protection: Fortigate, FortiManager, FortiAnalyzer, Cisco (ASA FirePower), Barracuda, pfSense, Checkpoint, PaloAlto, SonicWall, WatchGuard • Email Security: Cisco, Barracuda, Mimecast, Microsoft • Web Security: Cisco, Barracuda, Fortinet, McAfee, Zscaler • Proxy and Reverse Proxy: Squid, Nginx, Dante • IPSec VPN & SDWAN: Cisco DMVPN, HPE ADVPN, Fortigate ADVPN • SSL VPN: Fortigate, Cisco, PaloAlto, Barracuda, SonicWall, OpenVPN, pfSense, Swan, OpenConnect • Network Access Control (802.1X, Radius, Tacacs+…), BYOD and MDM : Aruba ClearPass, Cisco ISE, PacketFence, NPS, Genians, Intune... • IAM SSO SAML2 Oauth: OKTA, Keycloack, Auth0 • DLP & CASB Bitglass, Forcepoint • EDR McAfee, Sophos, SentinelOne... • SIEM and SOC solutions - Wazuh, Fortinet, Splunk... IT Cloud/Systems/Virtualization/Backup/DR • Hybrid Cloud, Multi Cloud Architecture • Cloud Infrastructure Security, Networking, Storage, VPC (AWS, Azure, OVH, OpenStack...) • Virtualization planning, implementation, tuning (VMware, Proxmox, KVM, Hyper-V) • Hyperconverged HCI solutions ESXi & vSAN, Proxmox & CEPH • Linux Systems deployment, administration and development (Debian Ubuntu OpenSuSE CentOS RedHat) including performance optimization, hardening, scripting, HA, backup & restore • Windows Server architecture & administration (Hyper-V AD GPO DNS DHCP PKI File Server ...) • SAN (FC/FCoE), ISCSi, NAS(File) • VDI and Virtual App (Microsoft, VMware, Citrix) • Load Balancer/Application Delivery: HAproxy, Nginx, Barracuda, F5 • ElasticSearch & OpenSearch design & implementation • Critical HA Database clusters: PostgreSQL & MySQL • HA, Backup & Disaster Recovery planning & deployment (Veeam, VMware, Proxmox, Linux, AWS, Azure, Windows...etc) Network technologies • Switches: Cisco, HPE, Comware, Aruba OS, Arista, Alcatel, Juniper, Dell • Routers: Cisco, HPE, Comware, Alcatel, Juniper, Mikrotik • WiFi Mobility: Aruba OS & Central, Cisco, Meraki, Ubiquity, Mikrotik • MPLS L2/L3 VPN, MP-BGP, VPLS, SDWAN • BGP, OSPF, IS-IS, EIGRP routing protocols • FRR, VyOS, Bird • VLAN, QinQ, VXLAN, EVPN L2 scalable overlay networks • ACL, PBR, NAT, QoS, NAS; large-scale DHCP/DNS • IGMP L2 and PIM L3 multicast • Secure WiFi planning: controller managed & cloud-managed • NMS, EMS, FCPAS and OSS/BSS systems - LibreNMS, Zabbix, Nagios, Cacti Some of the most notable certifications I hold are: • CISSP - ISC2 • HPE Master Accredited Solution Expert - Network Solutions • HPE Accredited Solutions Expert - Network Architect • SUSE Cert. Linux Admin.: SLES In addition to technical skills, I deliver proven business operations experience for: • Business development planning and acquiring the correct technology • Project Management • Team building and management • RFP preparation Proposal preparation (technical/commercial) • Pre-sales & Sales Management • Business development, planning, and acquiring the correct technology • Project Management • Team building and management • RFP preparation Proposal preparation (technical/commercial) • Pre-sales & Sales Management • Business partnership establishment and management with leading companies such as HPE, Aruba, Fortinet, Cisco, IBM, Dell, Microsoft… and many more I am an avid learner, enabling me to swiftly adapt to new business environments and new project needs. Excellent communication and interpersonal skills combined with my long experience in team-leading & management enable me to collaborate strongly and work in global project teams with multiple members (in both leading or supporting roles).
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Certified Information Systems Security Professional
    Firewall
    High Availability and Disaster Recovery
    NIST Cybersecurity Framework
    Network Design
    Network Architecture
    Solution Architecture
    Cloud Architecture
    Cloud Security
    Business Development
    System Administration
    Cybersecurity Management
    Information Security
    VPN
    Network Security
  • US$50 hourly
    HI!! I am Virtual CISO, Cyber Security, Cyber defense, Ethical Hacker, expert I am prompt engineer working to create and maintain AI-generated content in Spanish. I love finding creative and innovative ways to ensure the perfect prompts are provided for our users I am a computer security scientist with an intensive hacking background. I do have a Msc in computer engineering I am working for severals Internationals Enterprises where I do intensive researches in Penetration Testing, Vulnerability managements, Technological Risk, Security Architecture and Forensic I am Professional with over 20 years experience in the area of information and communications technology, including 15 years of experience in networks and security infrastructure Analytical skills to solve problems, ability to work with new technologies, adaptable to any situation, pro-activity and motivation to individual and team achievements Self-management capacity of the learning process to successfully assume the continued improvement of my functions My passion is to help SMBs gain a fighting chance in an increasingly hostile information security threat environment by providing part-time vCISO services. Whether PCI , GDPR, NIST, ISO27000 and any other Security Standards gap analysis, information security risk assessments, audit remediation, strategic planning, interim CISO services, or anything else information security related, I offer you my vCISO Services, Information security ISO27001 consultancy and Policies Documentations With the following responsibilities and functions; Recommend modifications to application development, database design, networking, or infrastructure architecture with the goal of complying with internal information security policies and standards. Monitoring emerging products, technologies or best practices that will improve security for the organization and its stakeholders. Perform security audits, identify security gaps, and develop and implement risk mitigation solutions. Design and develops the organizations overall information security architecture to protect its information assets. Perform work and recomedations in relation to network, data, application and or cloud security and liaises with other areas of IT in the dissemination of this information to counter threats and internal and external vulnerabilities. Perform advanced research and identifying information security products, services, and trends, testing security configurations, and developing configuration architectures. Stong experience in Information security and Network Security: • Design Network security architecture • Design Cloud Security architecture ( AWS and Azure) • IT Vulnerability Assessment • API Security Evaluation • Cloud Security Assessment • Active Directory Security • Network and Web Application/Mobile Penetration Testing • Threat Hunting, • Red Team Program Development/Red Team Attack Simulations • Open Source Intelligence (OSINT) Gathering • IT Risk Management • Incidents Response management • Technical Writing; Information Security Policies,: ISO2700, NIST, HISPAA, PCI • Working experience of supporting Cyber Security tools such as, McAfee SIEM, Ms-SENTINEL, CISCO IPS, Citrix NetScaler, TrendMicro endpoint. Checkpoint Firewall, Bluecoat, AWS WAF, AWS Shield and AWS Firewall Manager, antivirus, CYNET security endpoint • Kali Linux Toolkit, Qualys, Nessus • MS-365 security, Defender for Cloud Strong experiece in IT Support and admin • Technical Supports Windows Server • Active Directory management • Technical Supports Azure Cloud • Technical Supports Intunes • Technical Supports Windows 10 and 11 • Technical SupportsMS- 365 • Technical writing IT Procedures,
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Mobile App Testing
    Amazon EC2
    Blockchain
    ISO 27001
    Cloud Security
    Vulnerability Assessment
    Office 365
    Information Security
    Microsoft Azure
    Cybersecurity Management
    Penetration Testing
    Nessus
    WordPress
    Ethical Hacking
    Network Security
  • US$125 hourly
    ##Upwork Expert-Vetted - Top 1% of Talent## AWS architecture and implementation, DevSec(Ops), SDN, Windows/Linux systems administration, ESXi/VMware builds/upgrades, root-cause analysis on infrastructure including networks, enterprise endpoint product test and eval, test case builds. Selective experience working through NIST/CMMC security controls and documentation. Throughout my 15 years I've seen and touched almost everything. Very efficient, communicative and thorough.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Governance, Risk Management & Compliance
    Cybersecurity Management
    Solution Architecture
    Cloud Engineering Consultation
    Systems Engineering
    Network Design
    Network Security
    Infrastructure Management
    Information Security
    VMware Administration
    Security Engineering
    Microsoft Azure
    Server Virtualization
    Amazon Web Services
    Microsoft Active Directory
  • US$150 hourly
    Cybersecurity Expert Helping Companies Establish Robust Security Postures. Cybersecurity leader with over 25 years of experience securing critical systems and data for global corporations. Helped clients improve security compliance scores by 95% and reduce incidents by 75%. Passionate about making cybersecurity understandable and developing resilient security strategies Security audits and risk assessments ($150/hr) I evaluate your infrastructure, policies, and procedures to identify vulnerabilities and provide a risk-rated report with remediation recommendations. Compliance consulting for regulations like HIPAA, PCI DSS, etc. ($200/hr) I ensure your security controls, processes, and governance meet industry compliance standards through gap assessments, audits, and ongoing advisory. Incident response and forensic analysis ($250/hr) I contain breaches, investigate compromised systems, preserve evidence, and provide reporting to understand impact and prevent future incidents. Cloud security reviews and best practices ($175/hr) I assess your cloud architecture, configurations, and controls to identify risks, optimize security posture, and apply cloud-native protections. Security awareness training ($150/hr) I develop engaging training customized to your organization to educate staff on cybersecurity best practices and threats through interactive modules. Virtual CISO services ($300/hr) I act as your outsourced CISO to provide ongoing strategy, leadership, and expertise to build a resilient cybersecurity program. Cybersecurity program development ($250/hr) I partner with you to build a cybersecurity program from the ground up, including policies, controls, technologies, training, and governance. Let me know if you need any clarification or have additional questions! I look forward to working with you and your team! Thank you! Sam Sawalhi
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Cybersecurity Monitoring
    NIST Cybersecurity Framework
    Cyber Threat Intelligence
    Security Infrastructure
    Security Management
    Security Framework
    Compliance Consultation
    Governance, Risk & Compliance Software
    Expert
    Compliance
    Government Reporting Compliance
    Information Security Consultation
    Cybersecurity Management
    Security Assessment & Testing
    Information Security
  • US$25 hourly
    "Truly amazing developer. Very smart, organized, and knowledgeable. A true pleasure to work with him. I highly recommend him. A+++++" Hi, Sergey here. I am a highly skilled developer from Ukraine. When you hire me, my main goal is to make your project run successfully. I specialize in web development, Python\Bash\Powershell\NSIS scripting, and desktop development. I have a long track record of projects for web: - development of e-commerce websites, building custom blogs, landing pages, fixing custom scripts and much more; - customizing existing web solutions (securing poorly written scripts, extending the functionality of existing scripts, mobile-friendly and adaptive web design, CSS/JS bug fixes); - implementing plugins and themes for Wordpress. I am an expert in development for Windows OS: - Powershell scripting - installers of any complexity; - Windows services; - parsers/scrapers; - shell extensions; - browser add-ons; - network utilities etc I provide websites security services : - investigation of compromised websites - web scripts audits - weblogs analysis - fixing bugs in existing scripts - measures to prevent intrusions in future I specialize in Python development: - websites parsing and crawling; - automation of OS tasks (bulk image and file processing, various automation); - computer vision projects. There are 4 rules I follow in my work: 1) I have used to do work of high quality and my reputation is the most important to me; 2) I try to avoid conflicts with my clients; 3) If I bid on a project, be sure I'll be able to do it within a specified time frame or faster; 4) I don't bid on projects if I doubt or not confident If you feel I am the exact guy you are looking for, please send me a note about your project and your goals. If it seems like a good fit, then we can discuss it.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Malware Detection
    Malware Removal
    WordPress Malware Removal
    WordPress SEO Plugin
    .NET Framework
    Scripts & Utilities
    C#
    WordPress
    Google Apps Script
    Python
    Microsoft Windows PowerShell
    Scripting
    API Integration
  • US$50 hourly
    I am dual-skilled in the application of cybersecurity and Azure AI solutions and have been a Wine Advocate and enthusiast for over twenty years. I have completed the implementation of cyber-security architecture design patterns and frameworks for many custom Azure, AWS, and GCP platform-based solutions. My specialist areas include Auditing, Compliance, Development, Governance, Infrastructure, Planning, Platforms, Risk, SIEM/SOAR, and Threat Intelligence needs. In the last 2 years, I have been working on AI/ML (Artificial Intelligence/Machine Learning) projects, integrating Azure AI services into other Microsoft Services, such as Microsoft Defender, Microsoft 365 and web services. I have experience working with Artificial Intelligence workloads and considerations, providing fundamental principles of machine learning on Azure and applying features of computer vision workloads, Natural Language Processing (NLP) workloads, and generative AI workloads on Azure. Since the beginning of the COVID pandemic in 2019, I have become qualified for the WSET (Wine Spirit and Education Trust) Wine Awards, studying up to level 3. I have gained strong knowledge of the principal grape varieties of the world, the regions in which they are grown, and the styles of wine they produce. I have built a combination of high-end tasting, exploring the factors that impact specific styles and quality and learning how to describe these wines with confidence. I can build tasting 'maps' describing various wine types, using the Wine Spirit Education Trust (WSET) Systematic Approach to Tasting Wine (SAT); these 'maps' cover descriptions for appearance, nose, palate and quality. Across principal grape varieties, understand and gain applied knowledge across environmental factors, grape-growing, winemaking and maturation options influence the style and quality of wines. I have strong technical wine knowledge and the capability to write copy for wine products. I create meaningful content that engages customers and drives business across various platforms, such as blogs, social media, and websites.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Information Security
    Content Writing
    Unified Threat Management
    Creative Writing
    Security Operation Center
    Security Management
    Cybersecurity Management
    Blog Writing
    Editing & Proofreading
    Cloud Security
    Copywriting
    Certified Information Security Manager
    Website Content
    Blog Content
    Security Analysis
  • US$35 hourly
    ⭐⭐⭐⭐⭐ "It doesn't get better than Ezinne. The quality of what she delivers is outstanding...You won't be disappointed." Hello! I'm a dedicated grant writer focused on helping tech startups secure the funding they need to thrive. With a background in technical and proposal writing, I specialize in crafting compelling grant applications for startups in any field, worldwide, hourly or at a flat rate. What I Offer: - Funding Research: I conduct thorough research to help identify and analyze potential funding opportunities that align with your startup's objectives. - Grant Writing: Expertise in writing successful grant and funding proposals tailored to your specific needs and goals. - Technical Writing: Proficient in creating clear and concise technical documents including pitch decks that effectively communicate complex information. - Proposal Writing: Skilled in developing persuasive proposals that highlight the unique strengths and potential of your startup. Why Choose Me: - Proven Track Record: I'm experienced in securing funding for tech startups, with a deep understanding of what funders are looking for. - Global Reach: While based in East Africa, I offer my services to tech startups around the world. - Passion for Startups: I'm committed to helping innovative startups succeed, with a special focus on supporting impactful startups in Africa and around the world. - Collaborative Approach: I ensure client needs are met through effective collaboration. - Commitment to Deadlines: I'm dedicated to meeting deadlines and deliverables. - Simplifying Complexity: I'm able to simplify complex concepts for easy comprehension. - Attention to Detail: Meticulous attention to detail and accuracy. Success Stories: - Tony Elumelu Foundation Grant: I worked with a startup on their grant proposal, leading to pre-approval for the prestigious Tony Elumelu Foundation grant. - African Impact Initiative Grant: I assisted a startup in securing pre-incubation approval for the African Impact Initiative grant, which supports impactful startups in Africa. - VC Funding with Goodwell: I contributed to the initial application process for venture capital funding, resulting in the startup client being contacted by Goodwell for follow-up. Work Approach: - Understanding client objectives through detailed project analysis - Thorough online research and information gathering, where applicable - Drafting of initial content for client review - Revisions based on client feedback Client Testimonials: - "Easy to work with" - "Paid attention to details" - "Completed the job on time" - "Impressed by the quality of work" Let’s Work Together: If you're a tech startup looking to secure funding and need a skilled grant writer to help you achieve your goals, I’d love to hear from you. I offer flat-rate services to ensure transparency and predictability in pricing. Let's work together to turn your vision into reality! My working hours align with GMT+2 (currently based in Kigali, Rwanda, though originally from Ontario, Canada).
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Business Writing
    User Guide Writing
    NIST Cybersecurity Framework
    Quiz Writing
    Policy Writing
    Story Writing
    Grant Writing Consultation
    Report Writing
    Speech Writing
    Article Writing
    Grant Writing
    Blog Writing
    RFP Writing
    Content Writing
    Technical Writing
  • US$110 hourly
    I am a UK based TOGAF 9 Certified Solution Architect with 19+ years of experience in Technical Content Writing on IT Infrastructure, Cloud, DevOps, Cybersecurity (including DevSecOps & AppSec), Enterprise Service Management (ITSM), and ITIL. Following are some of my domains of expertise - - Cloud (Public/Private/Hybrid) - DevOps - AWS - MS Azure - Google Cloud - Kubernetes - Docker - ITIL and ITSM - ServiceNow - Cybersecurity I also hold a Masters Degree in Computer Application & Mathematics, as a result, I possess the right level of knowledge to write articles on both Legacy and Emerging Technologies. I am also a ServiceNow Certified Administrator and Implementor (ITSM London). My articles are focused towards its reader-base, and are extremely engaging and informative. Every written line has real information rather than fluff/fillers. By the end of every line/paragraph, the reader will be urged to continue reading. If you are looking for copied, spun or AI-written content to help you with a cost-optimized solution - SORRY, I AM NOT THE RIGHT GUY!
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Cybersecurity Management
    DevOps
    Blog Writing
    SaaS
    Proofreading
    Technical Writing
    Cloud Computing
    White Paper Writing
  • US$36 hourly
    As an expert in guiding companies to the Cloud with comprehensive DevOps solutions, I rank in the top 1% of Upwork talent. With over 8 years of experience as a Cloud DevOps Engineer and nearly 12 years in IT, I bring extensive expertise in cloud infrastructure, automation, security, and the development of highly scalable, cost-effective, and highly available systems. I specialize in DevSecOps, leading teams through research and innovation to build secure, scalable solutions. Key Expertise: Infrastructure as Code (IaC): • Terraform • CloudFormation • Ansible • Packer Containerization & Orchestrations: • Docker • Kubernetes • AWS ECS (EC2 & Fargate) • AWS EKS • Docker Hub • AWS ECR Servers: • Amazon Linux • Ubuntu • CentOS • Redhat • Windows Servers DevOps: • Docker • Kubernetes • Terraform • Jenkins • CodePipeline • CodeBuild • Github • Bitbucket • Git • TFS and many more... Amazon Web Services: • EC2 • ECS • EKS • VPC • S3 • CloudFront • ALB • RDS • Elastic Beanstalk • Lambda and many more.... System & Network: • Amazon Linux/CentOS/Ubuntu/Redhat • Windows Servers • Active Directory • OpenVPN, IPSec • Workspaces • TCP/IP and many more... Web & Databases: • Apache, Nginx, IIS, Apache Tomcat • DynamoDB • DocumentDB • Aurora RDS (MySQL, SQL Server, PostgreSQL, MariaDB) • MongoDB (Atlas & Hosted) • Redshift Compliance & Governance • WAF • AWS Well Architectured Tool • CloudTrail • Config • Systems Manager • Control Tower • AWS Compute Optimizer Analytics Tools: • ElasticSearch • Athena • Kinesis • QuickSight • Logstash • New Relic • Kibana Scripting and Automation • Bash • Python
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Cloud Engineering
    Solution Architecture
    Automated Monitoring
    Terraform
    Infrastructure as Code
    CI/CD
    Cloud Computing
    AWS Application
    Cloud Security
    Cloud Management
    DevOps
    Amazon Web Services
    Cloud Architecture
    Network Security
    Cybersecurity Management
  • US$35 hourly
    🥇 TOP RATED PLUS Freelancer | 💪 10+ Years Experience as Compliance Expert Guy | 1500+ Hours on Upwork | As a seasoned leader in Cyber Security Management Systems, I specialize in orchestrating comprehensive security frameworks aligned with industry standards such as SOC2, NIST Cyber Security Framework, ISO 27001, GDPR, and HIPAA. My repertoire encompasses a spectrum of services designed to fortify your organisation's digital resilience: * Are you Worried about navigating security assessments and certifications? Let's make compliance effortless and rewarding. * Facing compliance hurdles? Let me manage you compliance related burdens so you can focus on your business. * With a keen eye for detail, I develop IT Security Policies & Procedures, Guidelines and Manuals ensuring regulatory compliance and mitigating potential risks for ISO 27001, SOC2, CMMC, GDPR, HIPAA, PCI-DSS and NIST standards. * I provide consultancy and expertise in different standards includes ISO 27001, SOC2, CMMC, Fedramp, GDPR, HIPAA, PCI-DSS and NIST standards projects alongside affordable virtual CISO (vCISO) services and more. * You need expert guidance in cloud security or endpoint security including MDM, MAM? Rely onme for quick, reliable and constand assistance. * Need help in deployment of SIEM solutions like Qradar, Splunk, Exabeam, I streamline logs integration and parsing for enhanced threat detection? Rely onme for quick, reliable and constand assistance. * Automation Tools Expertise: JIRA, Vanta, Drata, TrustCloud, Scrut Automation. * Send 'Invitation' to connect and discuss your requirements with me. Let's ensure your business stays compliant and secure.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Certified Information Security Manager
    Gap Analysis
    NIST Cybersecurity Framework
    CMMC
    SOC 2 Report
    Cloud Security
    HIPAA
    Governance, Risk Management & Compliance
    NIST SP 800-53
    ISO 27001
    GDPR
    Risk Assessment
    Penetration Testing
    Cybersecurity Management
    Information Security Consultation
  • US$25 hourly
    Highly motivated and experienced professional, with experience in supervisory positions, seeking opportunities in career fields complimentary to my experience and expertise in project management, IT, customer service support and/or customer training and mentorship. Exceptional understanding of IT concepts, cyber security and/or project management. Expert knowledge of office automation software and hardware tools, to include the MS Office Suite.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Risk Assessment
    Gap Analysis
    Security Policies & Procedures Documentation
    IT Compliance Audit
    Content Writing
    Disaster Recovery Plan
    NIST SP 800-53
    Governance, Risk & Compliance Software
    Cybersecurity Management
    Resume Writing
    Company Policy
    Data Privacy
    Certified Information Systems Security Professional
    Information Security
    ISO 27001
    Tech & IT
  • US$150 hourly
    Motivated team player Over 8 years of IT experience. Skilled in AWS systems and management. LAMP Stack Development. Extensive knowledge of security best practices, HIPAA, NIST, CMMC
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    NIST Cybersecurity Framework
    LAMP Stack
    Information Security Consultation
    HIPAA
    Cloud Architecture
    Cloud Migration
    WordPress
    WordPress Multisite
    Cloud Implementation
    JavaScript
    Cybersecurity Management
    AWS Server Migration
    AWS Systems Manager
    NIST SP 800-53
    Microsoft Azure
  • US$150 hourly
    Please don't contact me regarding hacked accounts. There is nothing I can do and it's illegal to try and hack them back. Sorry! For over 10 years my greatest passion has been cyber security. For the first 6 years I worked for NCC Group, the largest cyber security consultancy in the world and gained a wide range of skills and experience working for high street banks, global corporations and UK government ministries. I've now moved on and have started my own business, my greatest passion is helping small and medium sized businesses fix their security problems. I eat, drink and sleep cyber security. I have experience testing a wide range of technologies, including but not limited to web applications, internal networks, external networks, mobile applications, network devices and Wi-Fi. Having a broad range of experience allows me to rapidly place in context of the asset I'm testing within the clients environment. My focus is on helping web and mobile developers, network administrators and business owners ensure their products adhere, not just to best practice but to the highest security standards. By using a combination of manual and automated testing I am able to produce results in a timely and cost effective manner. I assist with remediation by providing advice on which areas of vulnerability to focus on first and how best to implement fixes. I have a track record of understanding highly technical security issues and being able to convey them to both a technical and management audience. I'm always happy to discuss client requirements and work with them to identify the best methods to achieve their objectives. As part of the process, I offer a pre and post engagement call to ensure we are a perfect match and that I have achieved your goals.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    PCI
    Information Security Awareness
    Electron
    Configuration Management
    Ethical Hacking
    Cybersecurity Management
    Penetration Testing
    Encryption
    Firewall
    Network Monitoring
    Network Penetration Testing
    Computer Network
    Website Security
    Mobile App Testing
  • US$125 hourly
    ✅ My methodology for all of my work begins with understanding your business, first and foremost ✅ Ten years experience working in Cyber Security ✅ Certified as a Cyber Security Incident Handler (GCIH) and a Security Auditor (GCCC) ✅ Qualified at BSc level in Computer Security and Forensics ✅ Experience as a Non-Executive Director - I understand the business context as well as the technical and security aspects ✅ Experience in a variety of positions within security: - Technical (SOC analyst) - Risk (Information security officer) - Strategy (cybersecurity strategy specialist) - CISO (chief information security officer) ✅ I am not the type of consultant for a tick-in-the-box approach. If you genuinely want to achieve a better Cyber Security understanding and hygiene, my work quality will be a good fit. Description: A pragmatic, down-to-earth CyberSecurity professional who translates technical jargon into understandable business terms. I have worked in technical roles, risk management and strategy roles in both large enterprises and smaller organisations, giving me a balanced mix of experience when it comes to projects and job duties. I'm currently working as a part-time CISO for a cyber security organisation as well as a part-time freelance consultant. The vast majority of my experience is in the financial services sector, the most heavily regulated and mature industry for cybersecurity. However, I've also worked in retail in addition to a consultancy services role, working directly with customers in identifying breaches and recommending how they can improve their security posture. With cyber security, a business can't focus on improving everything, so it is important to focus on those few areas which give the greatest return on investment. My speciality is explaining cyber related businesses risk in a simple way, and advising on solutions in a rational, quantified manner to maximise ROI, both in effort and cost. I offer practical and pragmatic consultancy with: - vCISO (virtual chief information security officer) - Security training, coaching and awareness - Cyber risk assessments / security health checks - Strategy, framework and policy development - Cyber-essentials certification - ISO27001 gap assessments and implementation - NIS2 gap assessments and implementation - Security improvement plan creation and implementation
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Technical Documentation
    Information Security Audit
    Information Security Awareness
    Security Operation Center
    Information Security Governance
    Risk Assessment
    Cybersecurity Management
    Security Policies & Procedures Documentation
  • US$40 hourly
    I'm an OSCP (Offensive Security Certified Professional), OSWE (Offensive Security Web Expert), CREST CRT, and CEH (Certified Ethical Hacker) certified penetration tester. I can conduct vulnerability assessments and penetration testing for your web applications, mobile applications, and cloud infrastructures. I can also audit the code of your PHP / Python / JS (NodeJS) applications and fix code-level vulnerabilities. My day to day work includes: -- Research on bleeding edge technologies -- PHP/Python/JavaScript development -- Code auditing -- Database management -- APIs development & integration -- AWS services (EC2, SES, SNS, SQS, Route53, S3, Lambda, API gateway) -- Penetration testing -- Data scraping -- and a lot more
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Network Security
    Security Testing
    Network Penetration Testing
    PHP
    JavaScript
    Laravel
    Penetration Testing
    Information Security
    Cloud Security
    Web App Penetration Testing
    Web Application Security
    Website Security
    Information Security Audit
    Linux System Administration
    Amazon Web Services
  • US$30 hourly
    Greetings! I am Muhammad Taha, a seasoned Cyber Security Consultant with over 7 years of industry experience. I hold a Master's degree in Information Security and currently serve as a Senior Cyber Security Consultant in a Canadian firm, specializing in GRC consultancy services. My expertise spans ISO27001, NIS2, DORA, GDPR, SOC2, NIST CSF, NIST 800-171 compliance, penetration testing, and vulnerability assessments. Services I Offer: 1- ISO 27001 - Information Security Management System Consultancy and Implementation. 2- Information Security Internal Audits - Based on SOC2, ISO 27001, PCI-DSS, etc. 3- Cyber Security Policies and Procedures - Creation and review based on ISO27001, NIST 800-171, SOC2, PCI-DSS, and GDPR. 4- Cyber Security Risk Assessments and Audits: Assessments based on CIS benchmarks. 5- Penetration Testing and Vulnerability Assessments: Web applications, Android applications, APIs, network security, and cloud security. 6- GDPR Data Protection Impact Assessment. 7- GRC Consultancy Services: Consultancy on GRC frameworks such as ISO27001, SOC2, NIS2, DORA, HIPAA, HITRUST, NIST 800-171. -------------------MY JOURNEY--------------------------- As a Consultant, I have done various projects for clients in the field of Penetration Testing, CMMC, PCI-DSS, ISO 27001 and SOC2 compliance. I have also worked as a consultant for a World Bank-funded project to create a Cybersecurity program for the organization based on ISO 27001. Throughout my educational career, I have received merit scholarships during my Master's program. -------------------CERTIFICATIONS AND ACHIEVEMENTS--------------------------- I hold the following certifications and achievements: -ISO27001 Lead Auditor. - Certified Ethical Hacker (CEHv9 Hall of Fame Finalist 2021). - Qualys Certified Specialist. - IBM Cyber Security Analyst (Professional Certificate by IBM). - GDPR Data Protection Officer Skills, University of Derby. - Burp Suite Mastery (Web Application Security Testing Tool). - Fortinet Network Security Expert, NSE 1. - Fortinet Network Security Expert, NSE 2. - Certified Network Security Specialist. - AWS Security Fundamentals. - Cybersecurity Threat Landscape. - Information Security Incident Handling, Charles Sturt University, Australia. - Hacking Countermeasures, Charles Sturt University, Australia. - CISM Prep. - CISA (Working experience) - Knowledge of CISSP (Working experience) I look forward to collaboration. Kind regards! Cyber Security Consultant, Muhammad Taha.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Web Application Firewall
    Policy Writing
    Fortinet
    ISO 27017
    SOC 2 Report
    Microsoft Azure
    Certified Information Systems Security Professional
    Information Security Audit
    ISO 27001
    Information Security
    Vulnerability Assessment
    Cybersecurity Management
    Network Security
    Penetration Testing
    Digital Forensics
  • US$20 hourly
    Need help to recover your HACKED & DISABLED social media accounts in the least possible time? You are at right place if you have lost access to your personal or business social media account (s). Lost credentials or your account got hacked. Your account was disabled by a mistake. You want to remove old accounts or remove your content from search engines or social media. Or if have any other Instagram and Facebook related issue. You might have tried available support options and scrolled through forums but could not find help because: I have been providing virtual assistance with the related issues for a long time and enjoying my successful journey. I have proudly offered my clients to pay only after the successful results and resolved dozens of cases. You will find the support and solution for almost every kind of issue related to the Instagram and Facebook and other social media platforms with full compliance to ethics and respective platform's terms and service. I would love to answer your queries for free of cost and will suggest a way forward that would help you to accomplish your goals. Please send me a message with issue details and screenshots (if feasible). Invite me for the interview if your: Facebook account is disabled. Instagram account is disabled. Facebook account is restricted. Instagram account is restricted. Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Or if you are seeking help for: Recover hacked Instagram account Facebook recovery Instagram restoration Facebook restoration Instagram security Facebook security Instagram verification Facebook verification Instagram & Facebook Integration Instagram & Facebook Marketing Recovery of account in case of lost credentials Recovery from underlying technical issues, bugs and glitches Snapchat issues LinkedIn issues TikTok issues Social media content removal Facebook Instagram Integration Facebook and Instagram verification problem Facebook content removal Instagram content removal Instagram fake followers removal Instagram fake accounts removal Facebook fake accounts removal ''DON'T FORGET TO READ THE REVIEWS ON MY PROFILE'' Disclaimer: Write me about the issues related to your ''own'' social media account (s) or only if you are an authorized representative. Avoid making requests that are not compliant with Upwork and Instagram's terms of service. You will get ethical virtual assistance to get your problem resolved through this channel. Thank you for your precious attention. Looking forward to your invites. Anxiously waiting for assisting you better. :)
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Social Media Marketing
    Social Media Account Setup
    Instagram API
    Internet Security
    Technical Support
    Information Security
    Network Security
    Vulnerability Assessment
    Ethical Hacking
    Troubleshooting
    Data Recovery
    Cybersecurity Management
    Social Media Management
    Instagram
    Facebook
  • US$55 hourly
    I’ve helped companies get ISO 27001/SOC-2/PCI-DSS/FedRAMP/CMMC certifications and compliance against standards such as NIST and HIPAA. I offer 𝗠𝗢𝗡𝗘𝗬-𝗕𝗔𝗖𝗞 𝗚𝗨𝗔𝗥𝗔𝗡𝗧𝗘𝗘 to my clients against ISO 27001, SOC 2 and PCI-DSS compliance! Are your clients requesting security certifications or compliance against HIPAA, ISO 27001, SOC 2, PCI-DSS, or FedRAMP etc.? Do you want a cost effective solution for achieving and maintaining compliance? Do you want help is filling out the security assessment questionnaires and want someone to respond in a way that you are able to win the deal? Do you want surety/ confirmation that your certification project will be a success and you won't loose money over consultation? If you have already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, OneTrust Compliance Automatization/Tugboat Logic, SecureFrame, and so on) but don’t have the time and energy to achieve and maintain compliance, Do you want to know and enhance your company's current security posture? MY PROFILE I have over 9 years of experience and have worked within IT GRC (Governance, Risk, Compliance), internal controls and review assurance roles within financial, telecom, fintech and banking industry. The combination of Information technology, accounting & auditing has molded me into an individual who can perform IS Audits (General Controls, Application Controls, Specialized Audits, IT policy & SOPs), IT risk reviews (Risk Assessments, BCP & DR, Risk Mitigation & Control Design), Functional Reviews & QA (Quality Assurance) Services, IT security consultancy (IS Policy & Implementation under different frameworks i.e. 27001, NIST, COBIT 5, PCI, HiTrust, HIPAA, GDPR, SOC 2, SOX) and pre-implementation & post-implementation project reviews, BRD creation by following industry best practices. I can secure your cloud environment with expertise in AWS and Azure by following security hardening best practices. MY CREDENTIALS - CISSP (Certified Information Systems Security Professional) - USA - CISA (Certified in Information System Audit) - USA - CRISC (Certified in Risk & Information Systems Control) - USA - CGEIT (Certified in Governance of Enterprise IT) - USA - SQL Fundamentals (Oracle) - CEH Certified (Certified Ethical Hacker) - Cyber security Fundamentals Certification - Kaspersky - Google Analytics - NSE 5 (Network Security Analyst) Tags: Information Security Analyst Chief Information Security Officer ( CISO ) Information Security Manager SOC Analyst SOC (Security Operations Center) Tools: SIEM, CrowdStrike Falcon, Fortinet, FortiAnalyzer, FortiGate, FortiSIEM, Stellar Cyber, Cylance, Splunk, AWS CloudWatch, Microsoft Defender (Azure), AWS CloudTower, GCP
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Information Security Consultation
    Information Security
    Cybersecurity Management
    Security Policies & Procedures Documentation
    PCI
    Cloud Security Framework
    NIST SP 800-53
    SOC 2
    HIPAA
    Information Security Audit
    IT General Controls Testing
    Security Operation Center
    ISO 27001
    SOC 2 Report
  • US$125 hourly
    Information Security, Governance, Risk, and Compliance (GRC) professional. • HITRUST CCSFP, CISSP, PCI ISA, ITIL • 15+ years in Information Security (Governance, Risk, and Compliance) • 15+ years in highly regulated environments (PCI, HIPAA, FISMA) • 15+ years implementing/managing ISO 27001, NIST 800-53, NIST-CSF, PCI-DSS • 10+ years of policy and procedure development and management • 10+ years of process optimization, streamlining • 15+ years in IT (design, development, implementation, and management) • Bachelor of Business Administration - Finance
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Developers
    Company Policy
    Risk Assessment
    HITRUST Common Security Framework
    Governance, Risk Management & Compliance
    Certified Information Systems Security Professional
    HIPAA
    Information Security Audit
    PCI
    ServiceNow
    NIST SP 800-53
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Cybersecurity Developer on Upwork?

You can hire a Cybersecurity Developer on Upwork in four simple steps:

  • Create a job post tailored to your Cybersecurity Developer project scope. We’ll walk you through the process step by step.
  • Browse top Cybersecurity Developer talent on Upwork and invite them to your project.
  • Once the proposals start coming in, create a shortlist of top Cybersecurity Developer profiles and start to interview.
  • Hire the right Cybersecurity Developer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Cybersecurity Developer?

Rates charged by Cybersecurity Developers on Upwork can vary with a number of factors including experience, location and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Cybersecurity Developer on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Cybersecurity Developers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Cybersecurity Developer team you need to succeed.

Can I hire a Cybersecurity Developer within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Cybersecurity Developer proposals within 24 hours of posting a job description.

Cybersecurity developer Hiring resources

Learn about cost factors Hire talent
Schedule a call