Hire the best Cybersecurity Enterprise developers

Check out Cybersecurity Enterprise developers with the skills you need for your next job.
Clients rate Cybersecurity Enterprise developers
Rating is 4.8 out of 5.
4.8/5
based on 1,046 client reviews
  • US$60 hourly
    Transforming Information Security into a Competitive Advantage! I have the ability to translate complex compliance requirements into clear and concise language that resonates with the business. I'm a certified senior professional specializing in implementing and managing diverse security frameworks, including ISO 27000 family, SOC 2, PCI, GDPR, HIPAA, FedRAMP and CMMC. With a proven track record of guiding businesses to successful certification, I can help you achieve compliance while mitigating risks. Don't wait until it's too late! Contact me now and avoid drowning in compliance requirements. I'm well-versed in compliance platforms like Thoropass, Drata, StrikeGraph, and TrustCloud. Explore how I can assist you and inquire about my 10% referral discount.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    CMMC
    Risk Management
    Microsoft SQL Server
    Security Framework
    NIST Cybersecurity Framework
    HIPAA
    GDPR
    NIST SP 800-53
    Data Privacy
    Information Security Audit
    Compliance
    Governance, Risk Management & Compliance
    ISO 27001
    SOC 2 Report
    Information Security
  • US$99 hourly
    Let me help you unlock business opportunities and growth (💲millions) and sell to the likes of Disney, Pfizer, Uber, Siemens, Google, PWC, and so on. In the B2B space, you need Security, Privacy, and Compliance to sell to Enterprises! You focus on the business, and I'll take care of security, privacy, and compliance. Sleep well overnight because you know you are in good hands with the 🥇 Upwork virtual CISO, Security, Privacy, and Compliance consultant (1M+ earnings, 20+ years of enterprise experience)! CEO selling to Morgan Stanley: 🥂"The certification is enabling us to strike a deal with a Fortune 100 client." CEO selling to Philips: 🍾 "We have achieved the ISO 27001:2022 certification in record time." CEO selling to Pepsi:🎉 "Attila supported the growth of our business into Fortune 100 accounts." COO selling to Fannie Mae:👏 "We achieved a successful SOC 2 Type II attestation with no exception." 💭Securing your business, passing security assessments by clients or prospects, and achieving a security certification 𝙨𝙝𝙤𝙪𝙡𝙙 𝙣𝙤𝙩 𝙗𝙚 𝙖 𝙘𝙪𝙢𝙗𝙚𝙧𝙨𝙤𝙢𝙚 𝙖𝙣𝙙 𝙥𝙖𝙞𝙣𝙛𝙪𝙡 𝙚𝙭𝙚𝙧𝙘𝙞𝙨𝙚. 👌 All you need to do is ping me on Upwork, bring your problem, and after a 15-minute scoping call, I will provide you with a detailed Scope of Work. Specialized in business-to-business clients, providing 💸money-back guaranteed💸 ISO 27001, SOC 2, GDPR, HIPAA, PCI-DSS, CMMC, and FedRAMP projects and affordable virtual CISO (vCISO) services. ----> If you don’t get certified, all my fees will be refunded! <---- We are a good match if you are: 😢Busy developing your product or business and don’t have time and resources to be consumed by compliance efforts and endless meetings, halting your production for months 🤔Already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, Tugboat Logic, SecureFrame, Strike Graph, Audit Board, Trust Cloud, and so on) but 𝙙𝙤𝙣’𝙩 𝙠𝙣𝙤𝙬 𝙩𝙝𝙚 𝙣𝙚𝙭𝙩 𝙨𝙩𝙚𝙥 𝙤𝙧 𝙙𝙤𝙣’𝙩 𝙝𝙖𝙫𝙚 𝙩𝙞𝙢𝙚. 😢You quickly need quick security or privacy awareness training, cloud security posture assessment (AWS, GCP, Azure), endpoint security (MS 365 - Intune, Jumpcloud, Google Workspace), or penetration testing? 💪Want to decrease your sale cycle by being compliant and having all the answers for the security and privacy questionnaires? 💪Facing challenges with the security and privacy implications of AI products? 💪Want continuous access to a certified, creditable security, compliance, and privacy professional to manage your security framework? -> Continous virtual CISO (vCISO / fractional CISO) service with affordable weekly payments! 😟Need world-class, battle-proof security and privacy policies and you need it quickly? The kind of ones that have passed audits by KMPG, Deloitte, E&Y, Pepsi, Uber, Verizon, Philips, Facebook, and many others. 💪You want problems to be solved by the BEST Working with me, you will: ● Stop struggling with compliance requirements, security questionnaires, or useless document templates. ● Make the first steps on the journey to selling Enterprises ● Receive turnkey, Enterprise-grade security operation framework ensuring long-term effectiveness ● Work with an experienced senior team (architects, pen testers, endpoint engineers, developers, auditors, consultants) that regularly helps clients score Enterprise accounts. My stats are: ✅Saved tens of thousands $$$$$ for clients, advising them on the right security tools, solutions, and approach ✅#1 in Information Security and IT compliance categories (1M+ earned) ✅Supporting all time zones ✅Long-term engagements ✅Professional certifications (CISA, CISSP, ISO 27001 IA) About the Security Consultants team: QUALITY over QUANTITY is our ethos. Excellent quality, on time, always. We only take on projects when we can deliver outstanding results. The team consists of (only) senior experts in AWS, Azure, GCP DevOps, SecOps, Penetration testing, Google Workspace, MS 365 Intune, AppSec, auditing, and compliance. Professional Integrity: We are strongly committed to moral and ethical principles and values, such as honesty, honor, responsibility, trustworthiness, and objectivity. What we look for in a new client: ● Open-minded, relaxed attitude ● Values integrity & long-term relationships ● Willing to accept advice and guidance (security is a complex niche) Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, SIG Lite, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Process Unity Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS) CSAT, IRAP, PIPEDA, ISO 42001
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Information Security Consultation
    GDPR
    Security Management
    Insurance & Risk Management
    ISO 27001
    SOC 2
    AI Security
    HIPAA
    SOC 2 Report
    Cloud Security
    Information Security Audit
    Certified Information Systems Security Professional
    Information Security
    Cybersecurity Management
    Security Policies & Procedures Documentation
  • US$65 hourly
    Hello, I have hands on experience in the following: - Writing governance, risk management policies - Technical writing and documentation - ISO 27001 preparation, implementation, maintenance - Risk management; assessment, mitigation. - Standing up or maintaining your GRC program - Incident management; detection, handling. - SIEM / Microsoft Sentinel (Baselining, monitoring, alerts, rule analytics, playbooks) - Cloud Forensics and incident response - AWS, Microsoft Azure & O365 - Incident awareness and preparedness - Build executive tabletop cyber exercises - Build educational material - Expert PowerPoint slide decks. - Communicate complex subjects in easy visual slides for your C-Suite
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Cybersecurity Management
    Risk Analysis
    Strategy
    Network Engineering
    Prompt Engineering
    NIST SP 800-53
    NIST Cybersecurity Framework
    Digital Forensics
    Incident Management
    Incident Response Readiness Assessment
    Enterprise Risk Management
    Certified Information Security Manager
    ISO 27001
    Risk Management
    Problem Solving
  • US$130 hourly
    Sam Wertheim, a highly accomplished Cyber Security expert and Doctorate specializing in security governance and business technologies, is the esteemed founder and CEO of Wertheim Company, headquartered in the vibrant city of New York. Over the course of the past 15 years, I have consistently delivered exceptional Cyber Security solutions across diverse industries, including businesses, Banking, Government, the Department of Defense, FinTech, Blockchain, and Real Estate. At Wertheim Company, we pride ourselves on being a world-class developer of cutting-edge solutions, applications, and digital architectures. Our core focus lies in crafting bespoke, tailor-made solutions that precisely meet the unique requirements of our esteemed clients. We excel in driving digital transformations that revolutionize entire industries, propelling our clients to new heights of success. My expertise encompasses an extensive range of services, which include: -Conducting meticulous Vulnerability Assessment and Penetration Testing (VAPT) -Ensuring robust Risk and Compliance Management -Designing and implementing advanced Security Architectures -Enabling efficient Incident Response and Disaster Recovery -Establishing state-of-the-art Security Operations Centers (SOC) and deploying comprehensive -Security Information and Event Management (SIEM) services -Implementing effective Identity and Access Management (IAM) solutions -Safeguarding data through cutting-edge Data Protection and Encryption services -Assisting with Cloud Security and seamless migration to cloud platforms -Delivering powerful Threat Intelligence and Monitoring capabilities -Enhancing Cybersecurity awareness through tailored Training and Education programs I will thoroughly assess your systems, processes, and data by partnering with you to identify potential vulnerabilities and threats. Utilizing this valuable insight, I will develop a comprehensive risk management plan that meticulously addresses each identified risk, ensuring peace of mind and adopting a proactive approach to safeguarding your business. With our top-tier risk assessment services, you can confidently face any security challenge that may arise, fortifying your business and securing a prosperous future. Let Wertheim Company be your trusted partner in safeguarding your business and ensuring its ongoing security. Together, we can build an impregnable fortress that shields your invaluable assets and bolsters your resilience in the face of an ever-evolving threat landscape. Reach out to us today and take the first step towards a secure and prosperous future.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Security Management
    NIST SP 800-53
    Rust
    Cybersecurity Tool
    Compliance
    Project Management
    Python
    NIST Cybersecurity Framework
    Cybersecurity Monitoring
    Cloud Engineering
    Cyber Threat Intelligence
    Business
    Cybersecurity Management
  • US$100 hourly
    I am Chartered IT Professional, Google Cybersecurity Career Certificate Graduate, OWASP Core Security Belt Certified, OWASP API Security Certified, Certified Information Systems Security Auditor, Certified ISO 27001 Lead Implementer, Certified ISO 27001 Lead Auditor, Certified Identity Governance Expert, Certified Identity and Access Manager, Certified GRC Professional, Certified GRC Auditor, Integrated Data Privacy Professional, Certified Scrum Master, BCG Certified Strategy Consultant, Six Sigma Black Belt Professional, GDPR Certified Data Protection Officer, Certified HIPAA Officer & results driven management consultant with 15 years experience in compliance, data protection, SOC 2, ISO 27001, HDS, C5 and NIS2 Controls Implementation, innovation, design thinking, ideating solutions, process improvement, pricing strategy, data analytics, business process outsource, project management, market research, financial analysis, investment banking, cybersecurity and diagnosing a range of problems, from small businesses to multi-million dollar corporations. I have done past projects with HouseCall MD, Varian Medical Systems, DNX VC, Syntervision, FourthRev and Loggi. Previously I have worked as Engagement Manager at KPMG and Senior Auditor at Grant Thornton, where I took part in several consulting assignments in healthcare and life sciences, logistics, TMT, services, consumer and transportation sectors. I also have vast experience of managing projects from start to inception including projects funded by ADB, UNESCO and WHO. I have also completed more than 15 market research studies in different verticals for determining the market size and overall analysis of target markets. I also have experience of working as Head of Product Design where I led the development teams to identify customer pain-points, develop user needs and solve customer problems by creating products with built-in security features. I also worked on developing customer personas & identifying and recruiting sponsor users for A/B testing of product features and arranging Cognitive walkthroughs for establishing the usability of products. I also applied knowledge of Scrum Framework with sprint planning and delegation of tasks on product development projects for various public and private sector organizations. I managed 10 projects of more than $1 Million in total budget. Other than above, I also have hands on experience with various compliance frameworks including GDPR, HIPAA, PCI DSS, ISO 27001, HITRUST, CCPA and NCSF (NIST Cybersecurity Framework). Key Achievements: ✅ Successfully led 8 companies through the SOC 2 Type 2 attestation process, meeting stringent requirements and passing all audits in the first attempt. This achievement significantly enhanced their reputation for data privacy and security. ✅ Guided 4 clients through the rigorous process of achieving ISO 27001 and NIS2 Directive Certificate, ensuring that all security controls and management processes were robust, auditable, and internationally recognized. ✅ Guided 2 clients through HDS and C5 certifications, ensuring that their security posture was aligned with the requirements of both compliance frameworks. ✅ Reduced the costs of IT infrastructure maintenance by 5% for 3 consulted clients ✅ Analyzed business conditions, market/industry trends, competitive influences and demographic factors to identify opportunities of business growth for 5 consulted clients ✅ Created advanced analytics for both internal and marketing use using Tableau, SQL and other BI tools for 4 consulted clients ✅ Managed $400 million donor funded projects as PMO and Project Lead ✅ Performed business process re-engineering for 3 consulted clients ✅ Consulted as lead revenue data analyst on a team responsible for collecting $60M receivables ✅ Repeatedly delivered cost reductions through the implementation of Lean principles, improved scheduling via resource loads and volume analysis ✅ Evaluated and increased operational effectiveness of organizations through the implementation of Continuous Improvement methods and Training/Coaching programs ✅ Identified opportunities within the client organization for improving productivity and operational efficiencies by installing a system by which the client can measure and realize improvement ✅ Analyzed existing processes and applied methodologies to eliminate wasted resources and time for 3 consulted clients
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Ransomware Mitigation
    Insurance & Risk Management
    User Authentication
    System Security
    Linux System Administration
    Vulnerability Assessment
    Risk Analysis
    Intrusion Detection
    NIST Cybersecurity Framework
    Information Security
    Network Security
    ISO 27001
    Amazon Web Services
    SOC 2 Report
    Python
  • US$60 hourly
    SSO expert having Identity and Access Management expertise of 16+ years in SAML / OpenId Connect / Oauth 2.0 / JWT / FIDO2/ Webauthn / 2FA etc. I have experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, Okta, OneLogin, Auth0, Spring Security SAML, Keycloak, ForgeRock, IBM Security Access Manager etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, Ruby, Go, etc.) or framework (Node.js, Meteor, Angular, Django, CodeIgniter, Concrete5, Yii, Symfony, Laravel, WordPress etc.). I have a strong track record of helping clients succeed with: -Adding SAML authentication to custom applications -Troubleshooting SAML Identity Provider and Service Provider errors -Deploying SAML Identity Providers (IdPs) and Service Providers (SPs) -Finding the right architecture for layering SSO technologies (AD, LDAP, OAuth, OpenID Connect, CAS, Kerberos, JWT, multi-factor, etc.) -Providing training, documentation and third-party support -Deployment and architectures of LDAP solutions (OpenDJ, OpenLDAP, IBM Security Directory Server etc). Architectures with high availablity and custom schema. LDAP proxy / bridge solutions deployment. -Architectures and solution Implementation of Identity and Access governance solutions (Sailpoint IIQ , IBM Security Identity Manager, IBM Security directory integrator ). -Role based access control implementation in Identity management solutions. -Risk based access control implementation with Access Management solutions. Devops and cloud security - - Dockerize applications and platforms. - Deployment of applications on AWS EKS platform. - Deployment of applications on GCP GKE platform. Complex Integrations - - Rest API development and security with Oauth / JWT tokens. - API gateway integrations of API. SSO and Identity Access Management Integration Expert | Technical Project Manager
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Solution Architecture Consultation
    OKTA
    Vulnerability Assessment
    Application Security
    Single Sign-On
    API Integration
    OAuth
    Cybersecurity Management
    Security Analysis
    Information Security Consultation
    Auth0
    LDAP
    User Identity Management
    Amazon Cognito
  • US$50 hourly
    With a rich background spanning over 5+ years in designing and executing robust cybersecurity solutions, I am a Cybersecurity Specialist Consultant dedicated to safeguarding digital landscapes. My journey has taken me from the foundational steps of security analysis to spearheading roles as a Co-Founder and CTO, alongside pivotal positions in cybersecurity engineering and ethical hacking across global landscapes from Jakarta to Dallas, and Sydney to the Netherlands. My expertise lies in a deep understanding of cyber threats and vulnerabilities, backed by a Bachelor's degree in Cybersecurity from Deakin University and certified mastery in Blockchain Security, Advanced Penetration Testing, and Fuzzing and Crash Analysis. I've successfully led comprehensive security initiatives, including developing XDR and SIEM solutions, managing multi-layered security systems, and pioneering full-scale cybersecurity startups. My approach is rooted in innovation and efficiency, aiming to protect organizational assets against ever-evolving cyber threats with customized security strategies. At the heart of my service is a commitment to operational excellence and a proactive stance on cybersecurity, ensuring I'm always ready to counteract cyber threats swiftly. Through Encripti, my cybersecurity startup, and various contractor roles, I've honed my skills in vulnerability assessments, red/blue team engagements, and crafting defensive architectures against complex cyber attacks. My portfolio is a testament to my ability to communicate complex security concepts effectively and to collaborate towards enhancing cybersecurity resilience in dynamic environments. In seeking new opportunities on Upwork, I aim to bring my wealth of experience and a proactive approach to cybersecurity to organizations looking to fortify their defenses. Whether through strategic consulting, hands-on penetration testing, or crafting comprehensive security frameworks, my goal is to deliver unparalleled value and security assurance to my clients.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Blockchain Security
    API Testing
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Risk Analysis
    Virus Removal
    Web Application Security
    Data Analytics
    Smart Contract
    Malware Removal
    Security Testing
    Vulnerability Assessment
    Application Security
    Cybersecurity Management
    Penetration Testing
    Digital Forensics
  • US$125 hourly
    Hello! I help funded startups, midsize, and fortune 500 companies in the healthcare, technology, and government contracting industries. I do this by implementing cybersecurity frameworks that address compliance and protect data, thereby enhancing your marketability and trustworthiness. My expertise includes 20 years of experience, knowledge from real world experience, and industry certifications (i.e. CISSP, CISM, ISO 27001.) My clients have included healthcare EHR, telemedicine, mobile, medical device, and behavioral health organizations. Other clients have been within the fintech, retail, and non-profit industries. These dynamic ecosystems have equipped me with the ability to provide tailored solutions for your unique needs. Compliance Expertise: HIPAA: I am a healthcare information security and privacy practitioner. I have successfully guided several healthcare organizations in effectively handling sensitive patient data. Notably, I orchestrated a full-scale HIPAA compliance overhaul for a 500+ employee healthcare Non-Profit, mitigating potential risks and ensuring continuous adherence to standards. SOC 2: I have been instrumental in developing and executing successful SOC 2 compliance strategies for SaaS, technology, and healthcare companies. My comprehensive understanding of the Trust Service Criteria has allowed SaaS providers obtain favorable SOC 2 Type II reports. ISO 27001: Specializing in risk management, I led the ISO 27001 certification process for multiple organizations. My systematic approach to implementing the ISMS framework has ensured ongoing conformity to this international standard, reducing information security risks and promoting a security-aware organizational culture. CMMC: With a thorough grasp of the Cybersecurity Maturity Model Certification (CMMC), I have assisted defense contractors in preparation to maintain their contracts by helping them achieve and maintain the required CMMC levels. I spearheaded a project to bring a mid-sized defense contractor up to CMMC Level 2, a significant undertaking that involved both technical and policy modifications. PCI-DSS: I conducted PCI assessments and collaborated with IT Teams for technology companies and payment gateway service providers to ensure a PCI Compliance environment. Additional services included writing policies, conducting risk assessments, managed penetration tests, collect AOCs from vendors, and filled out SAQ forms annually. Certifications: CISSP, CISM, ISO 27001 LEAD IMPLEMENTER, GCIA, ECSA, CEHv7 My Services: - vCISO Management - Policies & Procedures Development - Privacy Management - Compliance Implementation - Security Assessments - Risk Assessments - Third-party Security Questionnaires - SSP Development - Cybersecurity Strategy Testimonials: Imagined Cloud | CEO: "Larry exceeded our expectations with their comprehensive SOC 2 services. They not only helped us navigate complex compliance requirements but also provided valuable insights that improved our overall security posture. Highly recommended!" Johnson & Johnson | MedTech Product Security Manager: "Larry was instrumental in guiding our medical device company through our HIPAA assessments with his digital health expertise, significantly easing our compliance process. I highly recommend him for his cybersecurity expertise in the medical device sector." Keywords: cybersecurity expert, compliance, HIPAA, NIST, SOC 2, ISO 27001, CMMC, ISO 27001, policies and procedures , vCISO, risk assessment, compliance software, security assessments, healthcare
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Medical Device
    NIST Cybersecurity Framework
    Cybersecurity Management
    Health & Fitness
    Healthcare Software
    Compliance
    Healthcare
    Telemedicine
    Healthcare IT
    SOC 2
    ISO 27001
    Governance, Risk Management & Compliance
    HIPAA
    IT Compliance Audit
    Security Policies & Procedures Documentation
  • US$150 hourly
    I have successfully completed 490+ jobs on Upwork with a 100% success rating. I mostly work with B2B tech companies. My current and past clients include HP, Seagate, BMC, Atos, Adobe, Wix, Tanium, Illumio, AB Tasty, TapClicks, Grytics, IBA Group, Traction, and more. I focus on translating complex, technical topics into clear, clean, and easy-to-digest stories. I produce a wide range of messaging and thought leadership for my clients, including: • Messaging development and brand positioning • Product/solution messaging frameworks and brochures • Website copywriting (end-to-end) • Case studies • eBooks and whitepapers • Articles and blogs • Email and LinkedIn marketing campaigns My clients have said: ——“Craig is a real talent, he doesn't just write, he does business development, asks useful questions and makes you think through your business strategy. He re-wrote our entire website, shaping our ideas and inspiring us to market new service packages. Craig is our go-to top gun from now on. Great work, couldn't be happier.” ——“You will not find a better writer, researcher and planner for whatever work you have in mind. This freelancer can do it all. If you need it done, hire him.” ——“Was great to work with. He always responded quickly and kept us regularly updated. All work was completed quickly to an excellent standard. Would not hesitate to recommend and would definitely rehire if we had another content writing project come along. Thanks!” ——"I recommend Craig to anyone who wants to move their content quality to the next level” If you feel we might be a good fit for each other, reach out, and we’ll chat about your project or ongoing needs. -Craig
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    B2B Marketing
    Brand Strategy
    Writing
    SEO Writing
    Content Writing
    Ghostwriting
    Article Writing
    White Paper Writing
    Case Studies
    Website Copywriting
    Content Strategy
    Content Marketing Strategy
    Copywriting
    Technical Writing
    Technical Case Study
  • US$165 hourly
    Sr. Architect and Engineer specializing in Cybersecurity, Networks, Cloud, and IT Systems with proven international business experience and management skills. UPWORK experience: 9000+ work hours, 100% Job Success, Top Rated Plus, Expert-Vetted With 15+ years of professional experience, I provide a complete set of services from proven advanced technical solutions and methodologies to business development, team-building, and management. I have successfully delivered complex projects across heterogeneous environments such as Telco/ISP providers, SMB, and Large International Enterprises in USA, Europe & Globally. Main offered services include: • Cybersecurity Architect • Network Architect • System Architect • Cloud Architect • Digital transformation • Solution design and implementation • IT strategy development • Information Security Manager • vCTO | vCIO | vCISO • Executive Consultant Highly experienced SME in the following technology fields: Information Security & Cyber Security • Develop & enhance Cybersecurity management frameworks. • Develop, implement & monitor strategic, comprehensive enterprise information security & IT risk management programs. • Develop, and maintain cybersecurity policies, standards, baselines, guidelines, and procedures. Network/IT/System Security • Firewall, UTM, NGFW & NG-IPS protection: Fortigate, FortiManager, FortiAnalyzer, Cisco (ASA FirePower), Barracuda, pfSense, Checkpoint, PaloAlto, SonicWall, WatchGuard • Email Security: Cisco, Barracuda, Mimecast, Microsoft • Web Security: Cisco, Barracuda, Fortinet, McAfee, Zscaler • Proxy and Reverse Proxy: Squid, Nginx, Dante • IPSec VPN & SDWAN: Cisco DMVPN, HPE ADVPN, Fortigate ADVPN • SSL VPN: Fortigate, Cisco, PaloAlto, Barracuda, SonicWall, OpenVPN, pfSense, Swan, OpenConnect • Network Access Control (802.1X, Radius, Tacacs+…), BYOD and MDM : Aruba ClearPass, Cisco ISE, PacketFence, NPS, Genians, Intune... • IAM SSO SAML2 Oauth: OKTA, Keycloack, Auth0 • DLP & CASB Bitglass, Forcepoint • EDR McAfee, Sophos, SentinelOne... • SIEM and SOC solutions - Wazuh, Fortinet, Splunk... IT Cloud/Systems/Virtualization/Backup/DR • Hybrid Cloud, Multi Cloud Architecture • Cloud Infrastructure Security, Networking, Storage, VPC (AWS, Azure, OVH, OpenStack...) • Virtualization planning, implementation, tuning (VMware, Proxmox, KVM, Hyper-V) • Hyperconverged HCI solutions ESXi & vSAN, Proxmox & CEPH • Linux Systems deployment, administration and development (Debian Ubuntu OpenSuSE CentOS RedHat) including performance optimization, hardening, scripting, HA, backup & restore • Windows Server architecture & administration (Hyper-V AD GPO DNS DHCP PKI File Server ...) • SAN (FC/FCoE), ISCSi, NAS(File) • VDI and Virtual App (Microsoft, VMware, Citrix) • Load Balancer/Application Delivery: HAproxy, Nginx, Barracuda, F5 • ElasticSearch & OpenSearch design & implementation • Critical HA Database clusters: PostgreSQL & MySQL • HA, Backup & Disaster Recovery planning & deployment (Veeam, VMware, Proxmox, Linux, AWS, Azure, Windows...etc) Network technologies • Switches: Cisco, HPE, Comware, Aruba OS, Arista, Alcatel, Juniper, Dell • Routers: Cisco, HPE, Comware, Alcatel, Juniper, Mikrotik • WiFi Mobility: Aruba OS & Central, Cisco, Meraki, Ubiquity, Mikrotik • MPLS L2/L3 VPN, MP-BGP, VPLS, SDWAN • BGP, OSPF, IS-IS, EIGRP routing protocols • FRR, VyOS, Bird • VLAN, QinQ, VXLAN, EVPN L2 scalable overlay networks • ACL, PBR, NAT, QoS, NAS; large-scale DHCP/DNS • IGMP L2 and PIM L3 multicast • Secure WiFi planning: controller managed & cloud-managed • NMS, EMS, FCPAS and OSS/BSS systems - LibreNMS, Zabbix, Nagios, Cacti Some of the most notable certifications I hold are: • CISSP - ISC2 • HPE Master Accredited Solution Expert - Network Solutions • HPE Accredited Solutions Expert - Network Architect • SUSE Cert. Linux Admin.: SLES In addition to technical skills, I deliver proven business operations experience for: • Business development planning and acquiring the correct technology • Project Management • Team building and management • RFP preparation Proposal preparation (technical/commercial) • Pre-sales & Sales Management • Business development, planning, and acquiring the correct technology • Project Management • Team building and management • RFP preparation Proposal preparation (technical/commercial) • Pre-sales & Sales Management • Business partnership establishment and management with leading companies such as HPE, Aruba, Fortinet, Cisco, IBM, Dell, Microsoft… and many more I am an avid learner, enabling me to swiftly adapt to new business environments and new project needs. Excellent communication and interpersonal skills combined with my long experience in team-leading & management enable me to collaborate strongly and work in global project teams with multiple members (in both leading or supporting roles).
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Certified Information Systems Security Professional
    Firewall
    High Availability and Disaster Recovery
    NIST Cybersecurity Framework
    Network Design
    Network Architecture
    Solution Architecture
    Cloud Architecture
    Cloud Security
    Business Development
    System Administration
    Cybersecurity Management
    Information Security
    VPN
    Network Security
  • US$50 hourly
    HI!! I am Virtual CISO, Cyber Security, Cyber defense, Ethical Hacker, expert I am prompt engineer working to create and maintain AI-generated content in Spanish. I love finding creative and innovative ways to ensure the perfect prompts are provided for our users I am a computer security scientist with an intensive hacking background. I do have a Msc in computer engineering I am working for severals Internationals Enterprises where I do intensive researches in Penetration Testing, Vulnerability managements, Technological Risk, Security Architecture and Forensic I am Professional with over 20 years experience in the area of information and communications technology, including 15 years of experience in networks and security infrastructure Analytical skills to solve problems, ability to work with new technologies, adaptable to any situation, pro-activity and motivation to individual and team achievements Self-management capacity of the learning process to successfully assume the continued improvement of my functions My passion is to help SMBs gain a fighting chance in an increasingly hostile information security threat environment by providing part-time vCISO services. Whether PCI , GDPR, NIST, ISO27000 and any other Security Standards gap analysis, information security risk assessments, audit remediation, strategic planning, interim CISO services, or anything else information security related, I offer you my vCISO Services, Information security ISO27001 consultancy and Policies Documentations With the following responsibilities and functions; Recommend modifications to application development, database design, networking, or infrastructure architecture with the goal of complying with internal information security policies and standards. Monitoring emerging products, technologies or best practices that will improve security for the organization and its stakeholders. Perform security audits, identify security gaps, and develop and implement risk mitigation solutions. Design and develops the organizations overall information security architecture to protect its information assets. Perform work and recomedations in relation to network, data, application and or cloud security and liaises with other areas of IT in the dissemination of this information to counter threats and internal and external vulnerabilities. Perform advanced research and identifying information security products, services, and trends, testing security configurations, and developing configuration architectures. Stong experience in Information security and Network Security: • Design Network security architecture • Design Cloud Security architecture ( AWS and Azure) • IT Vulnerability Assessment • API Security Evaluation • Cloud Security Assessment • Active Directory Security • Network and Web Application/Mobile Penetration Testing • Threat Hunting, • Red Team Program Development/Red Team Attack Simulations • Open Source Intelligence (OSINT) Gathering • IT Risk Management • Incidents Response management • Technical Writing; Information Security Policies,: ISO2700, NIST, HISPAA, PCI • Working experience of supporting Cyber Security tools such as, McAfee SIEM, Ms-SENTINEL, CISCO IPS, Citrix NetScaler, TrendMicro endpoint. Checkpoint Firewall, Bluecoat, AWS WAF, AWS Shield and AWS Firewall Manager, antivirus, CYNET security endpoint • Kali Linux Toolkit, Qualys, Nessus • MS-365 security, Defender for Cloud Strong experiece in IT Support and admin • Technical Supports Windows Server • Active Directory management • Technical Supports Azure Cloud • Technical Supports Intunes • Technical Supports Windows 10 and 11 • Technical SupportsMS- 365 • Technical writing IT Procedures,
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Mobile App Testing
    Amazon EC2
    Blockchain
    ISO 27001
    Cloud Security
    Vulnerability Assessment
    Office 365
    Information Security
    Microsoft Azure
    Cybersecurity Management
    Penetration Testing
    Nessus
    WordPress
    Ethical Hacking
    Network Security
  • US$50 hourly
    I am dual-skilled in the application of cybersecurity and Azure AI solutions and have been a Wine Advocate and enthusiast for over twenty years. I have completed the implementation of cyber-security architecture design patterns and frameworks for many custom Azure, AWS, and GCP platform-based solutions. My specialist areas include Auditing, Compliance, Development, Governance, Infrastructure, Planning, Platforms, Risk, SIEM/SOAR, and Threat Intelligence needs. In the last 2 years, I have been working on AI/ML (Artificial Intelligence/Machine Learning) projects, integrating Azure AI services into other Microsoft Services, such as Microsoft Defender, Microsoft 365 and web services. I have experience working with Artificial Intelligence workloads and considerations, providing fundamental principles of machine learning on Azure and applying features of computer vision workloads, Natural Language Processing (NLP) workloads, and generative AI workloads on Azure. Since the beginning of the COVID pandemic in 2019, I have become qualified for the WSET (Wine Spirit and Education Trust) Wine Awards, studying up to level 3. I have gained strong knowledge of the principal grape varieties of the world, the regions in which they are grown, and the styles of wine they produce. I have built a combination of high-end tasting, exploring the factors that impact specific styles and quality and learning how to describe these wines with confidence. I can build tasting 'maps' describing various wine types, using the Wine Spirit Education Trust (WSET) Systematic Approach to Tasting Wine (SAT); these 'maps' cover descriptions for appearance, nose, palate and quality. Across principal grape varieties, understand and gain applied knowledge across environmental factors, grape-growing, winemaking and maturation options influence the style and quality of wines. I have strong technical wine knowledge and the capability to write copy for wine products. I create meaningful content that engages customers and drives business across various platforms, such as blogs, social media, and websites.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Information Security
    Content Writing
    Unified Threat Management
    Creative Writing
    Security Operation Center
    Security Management
    Cybersecurity Management
    Blog Writing
    Editing & Proofreading
    Cloud Security
    Copywriting
    Certified Information Security Manager
    Website Content
    Blog Content
    Security Analysis
  • US$35 hourly
    ⭐⭐⭐⭐⭐ "It doesn't get better than Ezinne. The quality of what she delivers is outstanding...You won't be disappointed." Hello! I'm a dedicated grant writer focused on helping tech startups secure the funding they need to thrive. With a background in technical and proposal writing, I specialize in crafting compelling grant applications for startups in any field, worldwide, hourly or at a flat rate. What I Offer: - Funding Research: I conduct thorough research to help identify and analyze potential funding opportunities that align with your startup's objectives. - Grant Writing: Expertise in writing successful grant and funding proposals tailored to your specific needs and goals. - Technical Writing: Proficient in creating clear and concise technical documents including pitch decks that effectively communicate complex information. - Proposal Writing: Skilled in developing persuasive proposals that highlight the unique strengths and potential of your startup. Why Choose Me: - Proven Track Record: I'm experienced in securing funding for tech startups, with a deep understanding of what funders are looking for. - Global Reach: While based in East Africa, I offer my services to tech startups around the world. - Passion for Startups: I'm committed to helping innovative startups succeed, with a special focus on supporting impactful startups in Africa and around the world. - Collaborative Approach: I ensure client needs are met through effective collaboration. - Commitment to Deadlines: I'm dedicated to meeting deadlines and deliverables. - Simplifying Complexity: I'm able to simplify complex concepts for easy comprehension. - Attention to Detail: Meticulous attention to detail and accuracy. Success Stories: - Tony Elumelu Foundation Grant: I worked with a startup on their grant proposal, leading to pre-approval for the prestigious Tony Elumelu Foundation grant. - African Impact Initiative Grant: I assisted a startup in securing pre-incubation approval for the African Impact Initiative grant, which supports impactful startups in Africa. - VC Funding with Goodwell: I contributed to the initial application process for venture capital funding, resulting in the startup client being contacted by Goodwell for follow-up. Work Approach: - Understanding client objectives through detailed project analysis - Thorough online research and information gathering, where applicable - Drafting of initial content for client review - Revisions based on client feedback Client Testimonials: - "Easy to work with" - "Paid attention to details" - "Completed the job on time" - "Impressed by the quality of work" Let’s Work Together: If you're a tech startup looking to secure funding and need a skilled grant writer to help you achieve your goals, I’d love to hear from you. I offer flat-rate services to ensure transparency and predictability in pricing. Let's work together to turn your vision into reality! My working hours align with GMT+2 (currently based in Kigali, Rwanda, though originally from Ontario, Canada).
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Business Writing
    User Guide Writing
    NIST Cybersecurity Framework
    Quiz Writing
    Policy Writing
    Story Writing
    Grant Writing Consultation
    Report Writing
    Speech Writing
    Article Writing
    Grant Writing
    Blog Writing
    RFP Writing
    Content Writing
    Technical Writing
  • US$40 hourly
    ✅ 𝗧𝗼𝗽 𝗥𝗮𝘁𝗲𝗱 ✅ 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗲𝗱 𝗗𝗲𝘃𝗢𝗽𝘀 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿 ✅ 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗲𝗱 𝗘𝘁𝗵𝗶𝗰𝗮𝗹 𝗛𝗮𝗰𝗸𝗲𝗿 (𝗖𝗘𝗛) As a 𝗧𝗼𝗽-𝗥𝗮𝘁𝗲𝗱 𝗜𝗧 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 with 6+ years of experience, I specialize in transforming digital landscapes through my expertise in DevOps engineering and cybersecurity. 📜 𝗘𝘅𝗽𝗲𝗿𝗶𝗲𝗻𝗰𝗲 & 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀: 🏅 AWS Certified DevOps Engineer Professional 🏅 AWS Certified Developer Associate 🏅 Certified Ethical Hacker (CEH) 🏅 HashiCorp Certified: Terraform Associate (003) 🏅 Certified in Cybersecurity (ISC2-CC) 🔧 𝗖𝗼𝗿𝗲 𝗗𝗲𝘃𝗢𝗽𝘀 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀 : -------------------------------------------------------------------------------------------------------- ● 𝗖𝗜/𝗖𝗗 𝗣𝗶𝗽𝗲𝗹𝗶𝗻𝗲𝘀: Expertise in AWS CodePipeline, Jenkins, GitLab CI; enabling continuous innovation and automated workflows. ● 𝗞𝘂𝗯𝗲𝗿𝗻𝗲𝘁𝗲𝘀 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁: Masterful management for high-availability applications. ● 𝗜𝗻𝗳𝗿𝗮𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲 𝗮𝘀 𝗖𝗼𝗱𝗲 (𝗜𝗮𝗖): Proficiency in Terraform and AWS CloudFormation, ensuring consistent and reliable environment setups. ● 𝗣𝗲𝗻𝗲𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝗧𝗲𝘀𝘁𝗶𝗻𝗴 𝗦𝗲𝗿𝘃𝗶𝗰𝗲:Comprehensive assessments on your mobile and web applications to identify vulnerabilities and enhance security measures. ● 𝗠𝗼𝗻𝗶𝘁𝗼𝗿𝗶𝗻𝗴 & 𝗟𝗼𝗴𝗴𝗶𝗻𝗴: Proactive performance insights with ELK and Prometheus. ● 𝗠𝗶𝗰𝗿𝗼𝘀𝗲𝗿𝘃𝗶𝗰𝗲𝘀/𝗦𝗲𝗿𝘃𝗲𝗿𝗹𝗲𝘀𝘀 𝗔𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲𝘀: Efficiency with AWS Lambda, enhancing agility and cost-effectiveness. ● 𝗔𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗼𝗻 𝗦𝗰𝗿𝗶𝗽𝘁𝘀: Precision-crafted scripts to streamline operations. ● 𝗖𝗼𝗻𝗳𝗶𝗴𝘂𝗿𝗮𝘁𝗶𝗼𝗻 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁: Seamless control with Ansible over distributed systems. ------------------------------------------------------------------------------------------------------------ 🔒 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝘀 𝗮 𝗣𝗿𝗶𝗼𝗿𝗶𝘁𝘆: ● Implementing top-tier security practices from ethical hacking insights to vulnerability assessments, ensuring resilient infrastructure. 🤝 𝗖𝗹𝗶𝗲𝗻𝘁 𝗖𝗼𝗹𝗹𝗮𝗯𝗼𝗿𝗮𝘁𝗶𝗼𝗻: Through clear communication, collaboration, and a keen focus on your unique challenges and goals, we'll forge an optimized digital ecosystem. Your success is my commitment. 🌟 𝗪𝗵𝘆 𝗖𝗵𝗼𝗼𝘀𝗲 𝗠𝗲 𝗢𝘃𝗲𝗿 𝗢𝘁𝗵𝗲𝗿 𝗙𝗿𝗲𝗲𝗹𝗮𝗻𝗰𝗲𝗿𝘀? ------------------------------------------------------------------------------------------------------------ ◈ Client Reviews: Dedicated to providing value and earning trust. ◈ Over-Delivering: I take pride in exceeding expectations and leaving clients impressed. ◈ Responsiveness: Always available and communicative. ◈ Resilience: Problem-solving focus with the resilience to overcome challenges. ◈ Kindness: Treating everyone with respect, empathy, and a genuine desire to improve situations. ------------------------------------------------------------------------------------------------------------ 𝗦𝗼𝘂𝗻𝗱𝘀 𝗹𝗶𝗸𝗲 𝗮 𝗴𝗼𝗼𝗱 𝗳𝗶𝘁? 𝗛𝗲𝗿𝗲'𝘀 𝘄𝗵𝗮𝘁 𝘁𝗼 𝗱𝗼 𝗻𝗲𝘅𝘁: 1. 📺 Watch my videos on my Upwork profile and in my work examples. 2. 🟢 Click the green “Send Message” ✉️ button in the top right-hand corner. 3. 💬 Write a personalized note highlighting why you think we’re a good fit. 🌟 𝗦𝗮𝘁𝗶𝘀𝗳𝗮𝗰𝘁𝗶𝗼𝗻 𝗚𝘂𝗮𝗿𝗮𝗻𝘁𝗲𝗲𝗱: If you're not 100% satisfied with my quality work, I offer a 𝗺𝗼𝗻𝗲𝘆-𝗯𝗮𝗰𝗸 𝗴𝘂𝗮𝗿𝗮𝗻𝘁𝗲𝗲 —no questions asked. 🚫 𝗘𝘁𝗵𝗶𝗰𝘀 & 𝗜𝗻𝘁𝗲𝗴𝗿𝗶𝘁𝘆: 𝗜 𝘄𝗶𝗹𝗹 𝗻𝗼𝘁: ------------------------------------------------------------------------------------------------------------ ◈ Hack, crack, or access unauthorized systems or accounts. ◈ Fill out security questionnaires or assist with certifications. ◈ Create falsified penetration testing or assessment reports. I believe in using my skills to protect rather than harm others, ensuring everyone’s right to privacy and security. ------------------------------------------------------------------------------------------------------------ Feel free to connect with me to discuss your security needs or DevOps challenges. Let's build a secure, scalable, and efficient future together!
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Kubernetes
    Python
    CI/CD
    Infrastructure as Code
    Product Development
    Amazon Web Services
    Cloud Computing
    DevOps Engineering
    Solution Architecture
    DevOps
    Ethical Hacking
    Penetration Testing
    Network Security
    Information Security
    Vulnerability Assessment
  • US$50 hourly
    Hello! I am a highly skilled full-stack developer with a unique background as a medical doctor, showcasing my dedication to lifelong learning. Since the inception of Upwork, I have garnered exceptional reviews and built a strong reputation for delivering high-quality work to my clients. I am particularly well-suited to working with startups, and small-to-midsize companies with a growth mindset that utilizes agile development methodologies. My experience spans a wide range of technologies, with a focus on WordPress Model-View-Controller (MVC) architecture, WordPress plugins, Laravel, API integration, and Vue. js-powered applications. I pride myself on my ability to adapt to the unique needs of each project, consistently delivering solutions that are both innovative and efficient. As a developer, I bring to the table a strong understanding of the latest web technologies and best practices. My expertise in both front-end and back-end development allows me to create seamless user experiences while maintaining clean and efficient code. Why work with me? Unique background as a medical doctor, demonstrating dedication to continued learning. Proven track record of success on Upwork with great reviews Specialized expertise in WordPress MVC, WordPress plugins, Laravel, API integration, and Vue.js Experience with agile development methodologies, perfect for startups and growth-focused companies Commitment to clear communication, professionalism, and meeting deadlines. I am eager to take on new challenges and bring my experience and passion for development to your next project. Let's discuss how I can help you achieve your goals and bring your ideas to life.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Web Design
    HTML5
    API Integration
    WordPress
    CSS
    Front-End Development
    WordPress Plugin
    RESTful API
    Stripe
    Google APIs
    MySQL
    PHP
    Plugin Development
    Vue.js
    JavaScript
  • US$20 hourly
    Need help to recover your HACKED & DISABLED social media accounts in the least possible time? You are at right place if you have lost access to your personal or business social media account (s). Lost credentials or your account got hacked. Your account was disabled by a mistake. You want to remove old accounts or remove your content from search engines or social media. Or if have any other Instagram and Facebook related issue. You might have tried available support options and scrolled through forums but could not find help because: I have been providing virtual assistance with the related issues for a long time and enjoying my successful journey. I have proudly offered my clients to pay only after the successful results and resolved dozens of cases. You will find the support and solution for almost every kind of issue related to the Instagram and Facebook and other social media platforms with full compliance to ethics and respective platform's terms and service. I would love to answer your queries for free of cost and will suggest a way forward that would help you to accomplish your goals. Please send me a message with issue details and screenshots (if feasible). Invite me for the interview if your: Facebook account is disabled. Instagram account is disabled. Facebook account is restricted. Instagram account is restricted. Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Or if you are seeking help for: Recover hacked Instagram account Facebook recovery Instagram restoration Facebook restoration Instagram security Facebook security Instagram verification Facebook verification Instagram & Facebook Integration Instagram & Facebook Marketing Recovery of account in case of lost credentials Recovery from underlying technical issues, bugs and glitches Snapchat issues LinkedIn issues TikTok issues Social media content removal Facebook Instagram Integration Facebook and Instagram verification problem Facebook content removal Instagram content removal Instagram fake followers removal Instagram fake accounts removal Facebook fake accounts removal ''DON'T FORGET TO READ THE REVIEWS ON MY PROFILE'' Disclaimer: Write me about the issues related to your ''own'' social media account (s) or only if you are an authorized representative. Avoid making requests that are not compliant with Upwork and Instagram's terms of service. You will get ethical virtual assistance to get your problem resolved through this channel. Thank you for your precious attention. Looking forward to your invites. Anxiously waiting for assisting you better. :)
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Social Media Marketing
    Social Media Account Setup
    Instagram API
    Internet Security
    Technical Support
    Information Security
    Network Security
    Vulnerability Assessment
    Ethical Hacking
    Troubleshooting
    Data Recovery
    Cybersecurity Management
    Social Media Management
    Instagram
    Facebook
  • US$50 hourly
    I’m a Computer Science Graduate working as a Security Engineer. I am also a Certified Ethical Hacker and a Certified Professional Penetration Tester. I love everything that has to do with Cyber Security. I have nearly six years of experience working as a freelancer and have worked on different projects from different categories. My other development projects usually include Python Projects and Automation. I have been studying and learning on my own. I love working with people, especially if they have the same passion for what they do. 🎓 Computer Science Graduate 🔐 Security Engineer with 5+ years of Experience 🎖️ EC Council Certified Ethical Hacker (Practical) CEH 🎖️ eLearnSecurity Certified Professional Penetration Tester (eCPPTv2) 🎖️ Certified AppSec Practitioner 🎖️ eLearnSecurity Certified Malware Analysis Professional (eCMAP) 🎙️ TEDx Organizer (Technical Lead) 🎖️ Microsoft Hall of Fame 👨‍💻 Worked as a Security Engineer and Security Analyst in large Corporates 🎖️ Top 1% on Try Hack Me 🎖️ Freelancing Since 2013 You can count on me if you need the following: ✅ The analysis of the security posture of your Organization, Servers, Websites, Endpoints, etc. ✅ Malware Analysis and complete Incident Management for any incidents ✅ Need good reports for Senior Management and Technical teams like Developers, SysAdmins ✅ Solutions to website/server being hacked by an adversary/hacker ✅ Recommendations and best practices for a sustainable term ✅ Deep Penetration testing and vulnerability analysis of a Website/Server/App etc. ✅ Anything related to ethical Security ✅ Server issues troubleshooting ✅ Website Deployment / Hardening [PHP, Nodejs, Laravel, React, etc.] ✅ SSL issues troubleshooting Infosec Skills: 🌟 Penetration Testing 🌟 Vulnerability Assessment 🌟 Scripting through Python, Powershell, and Bash 🌟 Malware Analysis 🌟 Source code analysis for vulnerabilities 🌟 Experience with corporate tools and SIEMs 🌟 Linux, Windows, iOS, Android, and IoT Penetration testing and security analysis 🌟 Extensive reporting 🌟 DevSecOps skills Please DO NOT contact me if: ❌ You need to hack/retrieve social media accounts ❌ You need to seek revenge through hacking ❌ Illegal or unethical activities Please make sure you message me initially before initiating a contract. I understand that some of my clients do not have the expertise and have less knowledge in this field. So, I am ready to initially help you understand your queries for FREE and will be happy to proceed.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Security Management
    Python
    Internet Security
    Risk Assessment
    Ethical Hacking
    WordPress
    WordPress Malware Removal
    Vulnerability Assessment
    Security Testing
    Metasploit
    Database Security
    Encryption
    Network Security
    Penetration Testing
    Firewall
  • US$25 hourly
    "Truly amazing developer. Very smart, organized, and knowledgeable. A true pleasure to work with him. I highly recommend him. A+++++" Hi, Sergey here. I am a highly skilled developer from Ukraine. When you hire me, my main goal is to make your project run successfully. I specialize in web development, Python\Bash\Powershell\NSIS scripting, and desktop development. I have a long track record of projects for web: - development of e-commerce websites, building custom blogs, landing pages, fixing custom scripts and much more; - customizing existing web solutions (securing poorly written scripts, extending the functionality of existing scripts, mobile-friendly and adaptive web design, CSS/JS bug fixes); - implementing plugins and themes for Wordpress. I am an expert in development for Windows OS: - Powershell scripting - installers of any complexity; - Windows services; - parsers/scrapers; - shell extensions; - browser add-ons; - network utilities etc I provide websites security services : - investigation of compromised websites - web scripts audits - weblogs analysis - fixing bugs in existing scripts - measures to prevent intrusions in future I specialize in Python development: - websites parsing and crawling; - automation of OS tasks (bulk image and file processing, various automation); - computer vision projects. There are 4 rules I follow in my work: 1) I have used to do work of high quality and my reputation is the most important to me; 2) I try to avoid conflicts with my clients; 3) If I bid on a project, be sure I'll be able to do it within a specified time frame or faster; 4) I don't bid on projects if I doubt or not confident If you feel I am the exact guy you are looking for, please send me a note about your project and your goals. If it seems like a good fit, then we can discuss it.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Malware Detection
    Malware Removal
    WordPress Malware Removal
    WordPress SEO Plugin
    .NET Framework
    Scripts & Utilities
    C#
    WordPress
    Google Apps Script
    Python
    Microsoft Windows PowerShell
    Scripting
    API Integration
  • US$40 hourly
    I'm an OSCP (Offensive Security Certified Professional), OSWE (Offensive Security Web Expert), CREST CRT, and CEH (Certified Ethical Hacker) certified penetration tester. I can conduct vulnerability assessments and penetration testing for your web applications, mobile applications, and cloud infrastructures. I can also audit the code of your PHP / Python / JS (NodeJS) applications and fix code-level vulnerabilities. My day to day work includes: -- Research on bleeding edge technologies -- PHP/Python/JavaScript development -- Code auditing -- Database management -- APIs development & integration -- AWS services (EC2, SES, SNS, SQS, Route53, S3, Lambda, API gateway) -- Penetration testing -- Data scraping -- and a lot more
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Network Security
    Security Testing
    Network Penetration Testing
    PHP
    JavaScript
    Laravel
    Penetration Testing
    Information Security
    Cloud Security
    Web App Penetration Testing
    Web Application Security
    Website Security
    Information Security Audit
    Linux System Administration
    Amazon Web Services
  • US$20 hourly
    Enterprise level Linux system engineer and Cloud architect with 8+ years of experience in:- -- LAMP/LEMP(Nginx) administration and server security hardening (Ubuntu, Debian, Centos,RHEL,HAProxy, Ruby deployment, DevOps, Python/Django deployment DevOps,Nagios, fail2ban, CloudFlare..) -- Amazon web services - AWS (EC2, VPC, RDS, S3, Route53, Cloudfront, Elastic Load Balancer, AutoScaleing, etc..) -- DDoS mitigation and prevention -- Nginx rewrites -- Google pagespeed -- Linux troubleshooting -- VPS providers: Linode, Rackspace, Amazon(AWS), MediaTemple, HostGator, Cloudflare, MaxCDN, CloudFront, NameCheap, GoDaddy, DigitalOcean, EC2, Bluehost -- Parallels Plesk -- Odoo/OpenERP installation -- VPS administration -- AWS EC2 administration -- VMware vSphere --NewRelic -- fail2ban -- openswan -- HAProxy -- keepalived, vrrp -- elasticsearch -- Nagios monitoring -- Elastic Load Balancer -- LINUX deployment and migration -- Rackspace Cloud Services -- Ruby on Rails app deployment -- Python - Djengo app deployment -- CPANEL, PLESK, WEBMIN, SHELL/SSH administration -- proftpd, pure-ftpd, pure ftp -- DNS, BIND, PowerDNS -- SSL certificates -- Site migration -- Network troubleshooting -- CSF firewall -- VPN -- Cisco, Mikrotik, Juniper Networks, Extreme Networks.. -- Linux PENTAHO deployment -- Squid, AiCache, AiScaler. Experience with various providers such as:- -AMAZON WEB SERVICES (AWS, EC2..) -RACKSPACE -HOSTGATOR -GoDaddy -MediaTemple -Cloudflare -NameCheap -LINODE -QuickWeb -HAProxy -heroku -etc.. -WHMCS RESELLER setup and migration on project or permanent basis. Including DNS, EMAIL, WORDPRESS migration -CPANEL, PLESK, WEBMIN, H-sphere, SHELL administration -SSL certificates
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    cPanel
    Plesk
    WordPress
    Google Workspace Administration
    Email Security
    DevOps
    Email Support
    Linux System Administration
    Amazon EC2
    AWS Lambda
    GoDaddy
    AWS Server Migration
    Amazon Web Services
    Jenkins
    Microsoft Azure
  • US$30 hourly
    With a degree in Computer Engineering and a passion for writing, my experience spans across writing whitepapers, blogs, research reports, content for websites, thesis for academic submissions, sales pitch, business proposals and more. I am highly organized and schedule my time to get things accomplished accordingly. I am detail-oriented and an excellent researcher. I can be entrusted with big projects as I prefer to complete my work before deadlines giving you ample time to review my work and provide feedback. I take pride in my work
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Amazon Web Services
    Artificial Intelligence
    Blockchain
    Network Security
    Web App Penetration Testing
    Network Penetration Testing
    Vulnerability Assessment
    Robotics
    Editing & Proofreading
    Website Copywriting
    ISO 27001
    Cloud Security
    Information Security
    Disaster Recovery
    Policy Writing
    Technical Writing
    PCI
    Project Risk Management
  • US$90 hourly
    I am a self-motived technically skilled cyber security professional who is well versed in various security controls and has driven major security focused solutions through testing and enterprise implementation. Accomplished information security specialist with a passion for aligning security architecture plans and business processes and goals with security standards. I have established experience in developing, deploying, maintaining, supporting, and testing various security frameworks and security controls across the technology stacks. Technology-savvy self-starter who is adept at moving into new environments. I possess first-rate communications, strategic, and collaboration skills to lead and work in agreement with diverse groups and departments effectively.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Palo Alto Firewalls
    Microsoft Intune
    Microsoft Azure Administration
    CrowdStrike
    Splunk
    Microsoft Azure
    Information Security
  • US$100 hourly
    I'm working as an Account manager at the Apriorit company. My main responsibility is to manage existent projects and to seek new opportunities for our company. The key areas of development where we have a strong experience are File System Driver (Windows, Linux, MacOS), Embedded Linux development, IoT, Network Driver Development, Device Driver Development, Kernel development, C and C++ Programming (C++ development, C/C++), DLL injection, Virtualization solutions (all main types of Hypervisor), CyberSecurity, Cybersecurity solutions and Penetration Testing both Inside and Outside, API Hook, Embedded Solutions, Data Acquisition, Mobile Data Management (MDM). So, if you need high qualified Kernel Developer - we can help you! So main targets of solutions are focused on low-level development - management and development of file system filter driver, USB management driver, network adapter drivers, having strong experience for these we can do a project in time and limited budget. If we are talking about Virtualization - they are major complex solutions related to Remote access, Single sign-on software and solutions development, or Data Protection solution. Have advanced skills of working and understanding for main hypervisors, such as Hyper-V, Xen, ESXi, KVM. We can discuss more suitable architecture idea for a customer and scheme of work, and even propose a solution based on our own SDK, which can speed up the process of development. In addition, we are highly experienced in Image Processing and Computer Vision, CUDA and speed-up calculations of NVIDIA Video Card processing, GPU programming, OpenCV, OpenGL, Photo and Video Object recognition. We are working with Deep Learning modeling (TF, CoreML, Caffee, etc.) and computer Science/Machine learning. We have used Python3 (Anaconda, Spyder), Tensorflow, Numpy, Scipy, Keras, Theano, Scikit-learn. And we have an experienced Reverse Engineering Team, which can help you to dissect and analyse any system's objects and discover undocumented items. I'm open to different price and project working schemes, please feel free to contact me.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Desktop Application
    Rust
    Microsoft Windows
    Solution Architecture
    Golang
    Embedded System
    Driver Development
    Kernel
    Embedded Linux
    Cybersecurity Management
    TCP/IP
    macOS
    Network Security
    Embedded Application
    C++
  • US$40 hourly
    As a seasoned Senior Security Analyst, I bring forth seven years of dedicated expertise in fortifying the Cybersecurity landscape for enterprises, corporations, and medium-sized businesses. My proficiencies encompass an extensive range, including: -Orchestrating the full spectrum of incident response life cycles and post-incident activities. -Mentoring and guiding junior colleagues in mastering the intricacies of incident response cycle. -Crafting robust Information Security policies and procedures tailored to organizational needs. -Authoring comprehensive security guidelines to empower security personnel with actionable directives. -Conducting thorough training sessions for employees, covering the breadth of Cybersecurity awareness. -Configuring SIEM alarm rules and formulating clear incident response playbooks. - A hands-on experience with SOAR platforms, fostering a seamless operational environment. My forte lies in delivering quick security alarm analysis across various domains and tools, including: Web security and email security solutions, security awareness platforms, Microsoft and Amazon security stack, brand and digital landscape protection, EDR and HIPS, as well as an array of SIEMs such as LogRhythm, Qradar, Sentinel, XDR, Rapid7, Amazon. With a commitment to robust security measures and a track record of elevating defenses across multifaceted environments, I am committed to contribute expertise that safeguards and fortifies your organization against evolving threats.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Security Operation Center
    GDPR Compliance Review
    Information Security
    GDPR
    ISO 27001
    Information Security Consultation
    Vulnerability Assessment
  • US$85 hourly
    I am a professional Cyber Security Consultant specialising in Governance, Risk and Compliance with over 4 years experience in the industry. I have worked with a number of clients across a variety of sectors to help improve their Cyber Maturity and achieve compliance to various standards. Whilst I specialise in the GRC space, my particular area of focus is delivering informations security systems that deliver value whilst achieving the required level of compliance needed for a business. I take an individual approach to our customers to ensure that all measures are fit for purpose This includes sectors such as; - Third Sector - Medical Technology and SaMD - Financial Services - IT My key areas of expertise include; - ISO27001 (Operation, implementation and Auditing) - NIST Cyber Security Framework (Implement Framework using desired Security Controls) - Internal Audits (Identifying areas of improvement) - Creating Technical Diagrams/Documentation (Demonstrating Compliance) - OneTrust (Data Mapping, Assessment Configuration, Vendor Risk Management) - Writing Security White-papers and Creating Trust Portals Here are a few key projects I have worked on recently; - Implement NIST CSF using ISO27001 Controls - Operating an Information Security Management System with Zero Non-Conformities - Creating evidences to demonstrate compliance with EU Data Protection Regulations - Writing sets of Policies and Procedures and working with Senior Leadership to deploy - Using OneTrust Tool to create Assessments to conduct System/Supplier Evaluations I am available for work relating to any of the above, please don't hesitate to drop me a message if you have any questions
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Security Policies & Procedures Documentation
    Security Analysis
    Cybersecurity Management
    Information Technology Operations
  • US$10 hourly
    Working at Cyber Reconnaissance and Combat lab of well reputed organization of Pakistan navy namely Bahria University. My expertise drop-down beyond just Penetration testing of exploit development, networking, web-apps and the after math of exploited environment such as digital forensics and malware analysis.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    Content Creation
    Content Writing
    Web Application Security
    VMware vSphere
    Website Security
    Network Penetration Testing
    Linux
    Ethical Hacking
    Cybersecurity Management
    Security Testing
    Penetration Testing
    System Security
    Vulnerability Assessment
  • US$40 hourly
    I am a technical writer with a background in cybersecurity and software engineering. I provide content that positively impacts client search visibility and sales. My content increases organic traffic, user engagement, and revenue for enterprise businesses including Kiteworks, Cloudflare Inc., Education Ecosystem, DQLabs.ai, Lepide, Unilever, and more. My content targets CISOs, CIOs, CTOs, cybersecurity practitioners, software engineers, and other technical people. I have the ability to engage executives with the buying power to purchase your products. I have helped many cybersecurity companies, software engineers, B2B businesses, SaaS developers, API developers, and other technical organizations improve their search engine rank and generate revenue. Client analytics show that my content drives traffic and customers to client products, and they see an increase in revenue directly from my content. Most recently, using Quattr, an SEO platform that uses AI and large language models, I have managed to double the web traffic, impressions, and engagement for Kiteworks in a record 6 months. I can work with your SEO research or work with my own. I have a SEMRush account to perform keyword research and generate ideas for your site. I keep my workflow flexible for my customers so that they can focus on marketing their products and let me handle the content. I write content mainly in the form of: - Industry blog posts - Whitepapers - Technical documentation, mainly for API endpoints and SaaS - Copywriting - Website content - eBooks I cover topics around: - Cybersecurity - Network engineering, network security - Information security, infrastructure security - Email security - Software engineering, application development - NIST Cybersecurity Framework - Regulatory compliance including CMMC, ISO 27000, GDPR, HIPAA, and PCI DSS.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Enterprise Developers
    White Paper Writing
    CMMC
    GDPR
    Data Protection
    Internet Security
    Technical Writing
    Blog Writing
    NIST Cybersecurity Framework
    Article Writing
    Data Privacy
    Cloud Security Framework
    Regulatory Compliance
    Information Security
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Cybersecurity Enterprise Developer on Upwork?

You can hire a Cybersecurity Enterprise Developer on Upwork in four simple steps:

  • Create a job post tailored to your Cybersecurity Enterprise Developer project scope. We’ll walk you through the process step by step.
  • Browse top Cybersecurity Enterprise Developer talent on Upwork and invite them to your project.
  • Once the proposals start coming in, create a shortlist of top Cybersecurity Enterprise Developer profiles and start to interview.
  • Hire the right Cybersecurity Enterprise Developer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Cybersecurity Enterprise Developer?

Rates charged by Cybersecurity Enterprise Developers on Upwork can vary with a number of factors including experience, location and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Cybersecurity Enterprise Developer on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Cybersecurity Enterprise Developers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Cybersecurity Enterprise Developer team you need to succeed.

Can I hire a Cybersecurity Enterprise Developer within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Cybersecurity Enterprise Developer proposals within 24 hours of posting a job description.

Schedule a call