Hire the best Cybersecurity Experts

Check out Cybersecurity Experts with the skills you need for your next job.
Clients rate Cybersecurity Experts
Rating is 4.8 out of 5.
4.8/5
based on 1,046 client reviews
  • US$60 hourly
    Transforming Information Security into a Competitive Advantage! I have the ability to translate complex compliance requirements into clear and concise language that resonates with the business. I'm a certified senior professional specializing in implementing and managing diverse security frameworks, including ISO 27000 family, SOC 2, PCI, GDPR, HIPAA, FedRAMP and CMMC. With a proven track record of guiding businesses to successful certification, I can help you achieve compliance while mitigating risks. Don't wait until it's too late! Contact me now and avoid drowning in compliance requirements. I'm well-versed in compliance platforms like Thoropass, Drata, StrikeGraph, and TrustCloud. Explore how I can assist you and inquire about my 10% referral discount.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    CMMC
    Risk Management
    Microsoft SQL Server
    Security Framework
    NIST Cybersecurity Framework
    HIPAA
    GDPR
    NIST SP 800-53
    Data Privacy
    Information Security Audit
    Compliance
    Governance, Risk Management & Compliance
    ISO 27001
    SOC 2 Report
    Information Security
  • US$145 hourly
    Let me help you unlock business opportunities and growth (💲millions) and sell to the likes of Disney, Pfizer, Uber, Siemens, Google, PWC, and so on. In the B2B space, you need Security, Privacy, and Compliance to sell to Enterprises! You focus on the business, and I'll take care of security, privacy, and compliance. Sleep well overnight because you know you are in good hands with the 🥇 Upwork virtual CISO, Security, Privacy, and Compliance consultant (1M+ earnings, 20+ years of enterprise experience)! CEO selling to Morgan Stanley: 🥂"The certification is enabling us to strike a deal with a Fortune 100 client." CEO selling to Philips: 🍾 "We have achieved the ISO 27001:2022 certification in record time." CEO selling to Pepsi:🎉 "Attila supported the growth of our business into Fortune 100 accounts." COO selling to Fannie Mae:👏 "We achieved a successful SOC 2 Type II attestation with no exception." 💭Securing your business, passing security assessments by clients or prospects, and achieving a security certification 𝙨𝙝𝙤𝙪𝙡𝙙 𝙣𝙤𝙩 𝙗𝙚 𝙖 𝙘𝙪𝙢𝙗𝙚𝙧𝙨𝙤𝙢𝙚 𝙖𝙣𝙙 𝙥𝙖𝙞𝙣𝙛𝙪𝙡 𝙚𝙭𝙚𝙧𝙘𝙞𝙨𝙚. 👌 All you need to do is ping me on Upwork, bring your problem, and after a 15-minute scoping call, I will provide you with a detailed Scope of Work. Specialized in business-to-business clients, providing 💸money-back guaranteed💸 ISO 27001, SOC 2, GDPR, HIPAA, PCI-DSS, CMMC, and FedRAMP projects and affordable virtual CISO (vCISO) services. ----> If you don’t get certified, all my fees will be refunded! <---- We are a good match if you are: 😢Busy developing your product or business and don’t have time and resources to be consumed by compliance efforts and endless meetings, halting your production for months 🤔Already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, Tugboat Logic, SecureFrame, Strike Graph, Audit Board, Trust Cloud, and so on) but 𝙙𝙤𝙣’𝙩 𝙠𝙣𝙤𝙬 𝙩𝙝𝙚 𝙣𝙚𝙭𝙩 𝙨𝙩𝙚𝙥 𝙤𝙧 𝙙𝙤𝙣’𝙩 𝙝𝙖𝙫𝙚 𝙩𝙞𝙢𝙚. 😢You quickly need quick security or privacy awareness training, cloud security posture assessment (AWS, GCP, Azure), endpoint security (MS 365 - Intune, Jumpcloud, Google Workspace), or penetration testing? 💪Want to decrease your sale cycle by being compliant and having all the answers for the security and privacy questionnaires? 💪Facing challenges with the security and privacy implications of AI products? 💪Want continuous access to a certified, creditable security, compliance, and privacy professional to manage your security framework? -> Continous virtual CISO (vCISO / fractional CISO) service with affordable weekly payments! 😟Need world-class, battle-proof security and privacy policies and you need it quickly? The kind of ones that have passed audits by KMPG, Deloitte, E&Y, Pepsi, Uber, Verizon, Philips, Facebook, and many others. 💪You want problems to be solved by the BEST Working with me, you will: ● Stop struggling with compliance requirements, security questionnaires, or useless document templates. ● Make the first steps on the journey to selling Enterprises ● Receive turnkey, Enterprise-grade security operation framework ensuring long-term effectiveness ● Work with an experienced senior team (architects, pen testers, endpoint engineers, developers, auditors, consultants) that regularly helps clients score Enterprise accounts. My stats are: ✅Saved tens of thousands $$$$$ for clients, advising them on the right security tools, solutions, and approach ✅#1 in Information Security and IT compliance categories (1M+ earned) ✅Supporting all time zones ✅Long-term engagements ✅Professional certifications (CISA, CISSP, ISO 27001 IA) About the Security Consultants team: QUALITY over QUANTITY is our ethos. Excellent quality, on time, always. We only take on projects when we can deliver outstanding results. The team consists of (only) senior experts in AWS, Azure, GCP DevOps, SecOps, Penetration testing, Google Workspace, MS 365 Intune, AppSec, auditing, and compliance. Professional Integrity: We are strongly committed to moral and ethical principles and values, such as honesty, honor, responsibility, trustworthiness, and objectivity. What we look for in a new client: ● Open-minded, relaxed attitude ● Values integrity & long-term relationships ● Willing to accept advice and guidance (security is a complex niche) Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, SIG Lite, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Process Unity Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS) CSAT, IRAP, PIPEDA, ISO 42001
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Information Security Consultation
    GDPR
    Security Management
    Insurance & Risk Management
    ISO 27001
    SOC 2
    AI Security
    HIPAA
    SOC 2 Report
    Cloud Security
    Information Security Audit
    Certified Information Systems Security Professional
    Information Security
    Cybersecurity Management
    Security Policies & Procedures Documentation
  • US$85 hourly
    Security engineer and technical editor/writer specializing in cybersecurity architecture, operations, compliance/audit readiness, vulnerability scanning/pen testing, and technical documentation. Experience drafting security policies/procedures, and conducting cybersecurity framework mapping/pre-audit prep for NIST, PCI DSS, SOC2, HIPAA, HITRUST, GDPR, ISO 27001, and privacy and security frameworks. Proven track record of technical team and project management.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    HIPAA
    Technical Documentation
    NIST SP 800-53
    ISO 27001
    Technical Writing
    IT Compliance Audit
    SOC 2 Report
    Internet Security
    Security Infrastructure
    Application Security
    Information Security
    Penetration Testing
    Cybersecurity Management
    System Security
  • US$150 hourly
    I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startups and micro, small, and mid-sized companies create secure operating environments to increase business opportunities. I am also part of Upwork's Expert-Vetted Talent program. My priority is to create cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold a bachelor's degree in Telecommunications Engineering from the Airforce University in Argentina, a master's degree in Information Security Engineering from the SANS Technology Institute, and many cybersecurity certifications, including CISSP (Certified Information Systems Security Professional) and GSE (GIAC Security Expert).
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    WordPress Malware Removal
    Malware Removal
    CMMC
    Risk Assessment
    Cloud Security
    Internet Security
    Information Security Audit
    Information Security Awareness
    Security Engineering
    Security Analysis
    Email Security
    Penetration Testing
    Information Security
    Security Policies & Procedures Documentation
    Cybersecurity Management
  • US$150 hourly
    I have successfully completed 490+ jobs on Upwork with a 100% success rating. I mostly work with B2B tech companies. My current and past clients include HP, Seagate, BMC, Atos, Adobe, Wix, Tanium, Illumio, AB Tasty, TapClicks, Grytics, IBA Group, Traction, and more. I focus on translating complex, technical topics into clear, clean, and easy-to-digest stories. I produce a wide range of messaging and thought leadership for my clients, including: • Messaging development and brand positioning • Product/solution messaging frameworks and brochures • Website copywriting (end-to-end) • Case studies • eBooks and whitepapers • Articles and blogs • Email and LinkedIn marketing campaigns My clients have said: ——“Craig is a real talent, he doesn't just write, he does business development, asks useful questions and makes you think through your business strategy. He re-wrote our entire website, shaping our ideas and inspiring us to market new service packages. Craig is our go-to top gun from now on. Great work, couldn't be happier.” ——“You will not find a better writer, researcher and planner for whatever work you have in mind. This freelancer can do it all. If you need it done, hire him.” ——“Was great to work with. He always responded quickly and kept us regularly updated. All work was completed quickly to an excellent standard. Would not hesitate to recommend and would definitely rehire if we had another content writing project come along. Thanks!” ——"I recommend Craig to anyone who wants to move their content quality to the next level” If you feel we might be a good fit for each other, reach out, and we’ll chat about your project or ongoing needs. -Craig
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    B2B Marketing
    Brand Strategy
    Writing
    SEO Writing
    Content Writing
    Ghostwriting
    Article Writing
    White Paper Writing
    Case Studies
    Website Copywriting
    Content Strategy
    Content Marketing Strategy
    Copywriting
    Technical Writing
    Technical Case Study
  • US$100 hourly
    I am Chartered IT Professional, Google Cybersecurity Career Certificate Graduate, OWASP Core Security Belt Certified, OWASP API Security Certified, Certified Information Systems Security Auditor, Certified ISO 27001 Lead Implementer, Certified ISO 27001 Lead Auditor, Certified Identity Governance Expert, Certified Identity and Access Manager, Certified GRC Professional, Certified GRC Auditor, Integrated Data Privacy Professional, Certified Scrum Master, BCG Certified Strategy Consultant, Six Sigma Black Belt Professional, GDPR Certified Data Protection Officer, Certified HIPAA Officer & results driven management consultant with 15 years experience in compliance, data protection, SOC 2, ISO 27001, HDS, C5 and NIS2 Controls Implementation, innovation, design thinking, ideating solutions, process improvement, pricing strategy, data analytics, business process outsource, project management, market research, financial analysis, investment banking, cybersecurity and diagnosing a range of problems, from small businesses to multi-million dollar corporations. I have done past projects with HouseCall MD, Varian Medical Systems, DNX VC, Syntervision, FourthRev and Loggi. Previously I have worked as Engagement Manager at KPMG and Senior Auditor at Grant Thornton, where I took part in several consulting assignments in healthcare and life sciences, logistics, TMT, services, consumer and transportation sectors. I also have vast experience of managing projects from start to inception including projects funded by ADB, UNESCO and WHO. I have also completed more than 15 market research studies in different verticals for determining the market size and overall analysis of target markets. I also have experience of working as Head of Product Design where I led the development teams to identify customer pain-points, develop user needs and solve customer problems by creating products with built-in security features. I also worked on developing customer personas & identifying and recruiting sponsor users for A/B testing of product features and arranging Cognitive walkthroughs for establishing the usability of products. I also applied knowledge of Scrum Framework with sprint planning and delegation of tasks on product development projects for various public and private sector organizations. I managed 10 projects of more than $1 Million in total budget. Other than above, I also have hands on experience with various compliance frameworks including GDPR, HIPAA, PCI DSS, ISO 27001, HITRUST, CCPA and NCSF (NIST Cybersecurity Framework). Key Achievements: ✅ Successfully led 8 companies through the SOC 2 Type 2 attestation process, meeting stringent requirements and passing all audits in the first attempt. This achievement significantly enhanced their reputation for data privacy and security. ✅ Guided 4 clients through the rigorous process of achieving ISO 27001 and NIS2 Directive Certificate, ensuring that all security controls and management processes were robust, auditable, and internationally recognized. ✅ Guided 2 clients through HDS and C5 certifications, ensuring that their security posture was aligned with the requirements of both compliance frameworks. ✅ Reduced the costs of IT infrastructure maintenance by 5% for 3 consulted clients ✅ Analyzed business conditions, market/industry trends, competitive influences and demographic factors to identify opportunities of business growth for 5 consulted clients ✅ Created advanced analytics for both internal and marketing use using Tableau, SQL and other BI tools for 4 consulted clients ✅ Managed $400 million donor funded projects as PMO and Project Lead ✅ Performed business process re-engineering for 3 consulted clients ✅ Consulted as lead revenue data analyst on a team responsible for collecting $60M receivables ✅ Repeatedly delivered cost reductions through the implementation of Lean principles, improved scheduling via resource loads and volume analysis ✅ Evaluated and increased operational effectiveness of organizations through the implementation of Continuous Improvement methods and Training/Coaching programs ✅ Identified opportunities within the client organization for improving productivity and operational efficiencies by installing a system by which the client can measure and realize improvement ✅ Analyzed existing processes and applied methodologies to eliminate wasted resources and time for 3 consulted clients
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Ransomware Mitigation
    Insurance & Risk Management
    User Authentication
    System Security
    Linux System Administration
    Vulnerability Assessment
    Risk Analysis
    Intrusion Detection
    NIST Cybersecurity Framework
    Information Security
    Network Security
    ISO 27001
    Amazon Web Services
    SOC 2 Report
    Python
  • US$30 hourly
    With a degree in Computer Engineering and a passion for writing, my experience spans across writing whitepapers, blogs, research reports, content for websites, thesis for academic submissions, sales pitch, business proposals and more. I am highly organized and schedule my time to get things accomplished accordingly. I am detail-oriented and an excellent researcher. I can be entrusted with big projects as I prefer to complete my work before deadlines giving you ample time to review my work and provide feedback. I take pride in my work
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Amazon Web Services
    Artificial Intelligence
    Blockchain
    Network Security
    Web App Penetration Testing
    Network Penetration Testing
    Vulnerability Assessment
    Robotics
    Editing & Proofreading
    Website Copywriting
    ISO 27001
    Cloud Security
    Information Security
    Disaster Recovery
    Policy Writing
    Technical Writing
    PCI
    Project Risk Management
  • US$100 hourly
    I'm working as an Account manager at the Apriorit company. My main responsibility is to manage existent projects and to seek new opportunities for our company. The key areas of development where we have a strong experience are File System Driver (Windows, Linux, MacOS), Embedded Linux development, IoT, Network Driver Development, Device Driver Development, Kernel development, C and C++ Programming (C++ development, C/C++), DLL injection, Virtualization solutions (all main types of Hypervisor), CyberSecurity, Cybersecurity solutions and Penetration Testing both Inside and Outside, API Hook, Embedded Solutions, Data Acquisition, Mobile Data Management (MDM). So, if you need high qualified Kernel Developer - we can help you! So main targets of solutions are focused on low-level development - management and development of file system filter driver, USB management driver, network adapter drivers, having strong experience for these we can do a project in time and limited budget. If we are talking about Virtualization - they are major complex solutions related to Remote access, Single sign-on software and solutions development, or Data Protection solution. Have advanced skills of working and understanding for main hypervisors, such as Hyper-V, Xen, ESXi, KVM. We can discuss more suitable architecture idea for a customer and scheme of work, and even propose a solution based on our own SDK, which can speed up the process of development. In addition, we are highly experienced in Image Processing and Computer Vision, CUDA and speed-up calculations of NVIDIA Video Card processing, GPU programming, OpenCV, OpenGL, Photo and Video Object recognition. We are working with Deep Learning modeling (TF, CoreML, Caffee, etc.) and computer Science/Machine learning. We have used Python3 (Anaconda, Spyder), Tensorflow, Numpy, Scipy, Keras, Theano, Scikit-learn. And we have an experienced Reverse Engineering Team, which can help you to dissect and analyse any system's objects and discover undocumented items. I'm open to different price and project working schemes, please feel free to contact me.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Desktop Application
    Rust
    Microsoft Windows
    Solution Architecture
    Golang
    Embedded System
    Driver Development
    Kernel
    Embedded Linux
    Cybersecurity Management
    TCP/IP
    macOS
    Network Security
    Embedded Application
    C++
  • US$40 hourly
    As a seasoned Senior Security Analyst, I bring forth seven years of dedicated expertise in fortifying the Cybersecurity landscape for enterprises, corporations, and medium-sized businesses. My proficiencies encompass an extensive range, including: -Orchestrating the full spectrum of incident response life cycles and post-incident activities. -Mentoring and guiding junior colleagues in mastering the intricacies of incident response cycle. -Crafting robust Information Security policies and procedures tailored to organizational needs. -Authoring comprehensive security guidelines to empower security personnel with actionable directives. -Conducting thorough training sessions for employees, covering the breadth of Cybersecurity awareness. -Configuring SIEM alarm rules and formulating clear incident response playbooks. - A hands-on experience with SOAR platforms, fostering a seamless operational environment. My forte lies in delivering quick security alarm analysis across various domains and tools, including: Web security and email security solutions, security awareness platforms, Microsoft and Amazon security stack, brand and digital landscape protection, EDR and HIPS, as well as an array of SIEMs such as LogRhythm, Qradar, Sentinel, XDR, Rapid7, Amazon. With a commitment to robust security measures and a track record of elevating defenses across multifaceted environments, I am committed to contribute expertise that safeguards and fortifies your organization against evolving threats.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Security Operation Center
    GDPR Compliance Review
    Information Security
    GDPR
    ISO 27001
    Information Security Consultation
    Vulnerability Assessment
  • US$85 hourly
    I am a professional Cyber Security Consultant specialising in Governance, Risk and Compliance with over 4 years experience in the industry. I have worked with a number of clients across a variety of sectors to help improve their Cyber Maturity and achieve compliance to various standards. Whilst I specialise in the GRC space, my particular area of focus is delivering informations security systems that deliver value whilst achieving the required level of compliance needed for a business. I take an individual approach to our customers to ensure that all measures are fit for purpose This includes sectors such as; - Third Sector - Medical Technology and SaMD - Financial Services - IT My key areas of expertise include; - ISO27001 (Operation, implementation and Auditing) - NIST Cyber Security Framework (Implement Framework using desired Security Controls) - Internal Audits (Identifying areas of improvement) - Creating Technical Diagrams/Documentation (Demonstrating Compliance) - OneTrust (Data Mapping, Assessment Configuration, Vendor Risk Management) - Writing Security White-papers and Creating Trust Portals Here are a few key projects I have worked on recently; - Implement NIST CSF using ISO27001 Controls - Operating an Information Security Management System with Zero Non-Conformities - Creating evidences to demonstrate compliance with EU Data Protection Regulations - Writing sets of Policies and Procedures and working with Senior Leadership to deploy - Using OneTrust Tool to create Assessments to conduct System/Supplier Evaluations I am available for work relating to any of the above, please don't hesitate to drop me a message if you have any questions
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Security Policies & Procedures Documentation
    Security Analysis
    Cybersecurity Management
    Information Technology Operations
  • US$10 hourly
    Working at Cyber Reconnaissance and Combat lab of well reputed organization of Pakistan navy namely Bahria University. My expertise drop-down beyond just Penetration testing of exploit development, networking, web-apps and the after math of exploited environment such as digital forensics and malware analysis.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Content Creation
    Content Writing
    Web Application Security
    VMware vSphere
    Website Security
    Network Penetration Testing
    Linux
    Ethical Hacking
    Cybersecurity Management
    Security Testing
    Penetration Testing
    System Security
    Vulnerability Assessment
  • US$56 hourly
    Hi, my name is Samantha! Nice to meet you. I am currently working as a cybersecurity compliance analyst in the energy and public utilities sector looking to diversify my information security portfolio here on Upwork. I specialize in risk and privacy assessment, regulatory and security controls gap analysis, program standardization and process improvement. I have proficiency in the following software platforms for both security and data privacy: OneTrust, Archer, ProcessUnity, Apptega, ServiceNow, Hubspot CRM. You can expect a dedicated and detail-oriented service in the above areas that are listed. I have a desire to learn and grow therefore continuing education is very important to me so my expertise stays ever-expanding. I would be happy to go into more detail about what I can bring to your project or role posted once we connect. Thank you and look forward to meeting you! CompTIA Security+ ISC2 Certified in Cybersecurity (CC) OneTrust Expert Certified x10 Google IT Support Professional Certificate Google Project Management Professional Certificate If interested in learning more about me, please visit my LinkedIn profile or send me a message to chat. Thank you!
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Security Policies & Procedures Documentation
    Security Framework
    Business Process Management
    Business Analysis
    Research & Strategy
    Gap Analysis
    ISO 27001
    GDPR Compliance Review
    Data Privacy
    NIST SP 800-53
    IT Project Management
    Risk Assessment
    Governance, Risk Management & Compliance
    NIST Cybersecurity Framework
  • US$25 hourly
    "Truly amazing developer. Very smart, organized, and knowledgeable. A true pleasure to work with him. I highly recommend him. A+++++" Hi, Sergey here. I am a highly skilled developer from Ukraine. When you hire me, my main goal is to make your project run successfully. I specialize in web development, Python\Bash\Powershell\NSIS scripting, and desktop development. I have a long track record of projects for web: - development of e-commerce websites, building custom blogs, landing pages, fixing custom scripts and much more; - customizing existing web solutions (securing poorly written scripts, extending the functionality of existing scripts, mobile-friendly and adaptive web design, CSS/JS bug fixes); - implementing plugins and themes for Wordpress. I am an expert in development for Windows OS: - Powershell scripting - installers of any complexity; - Windows services; - parsers/scrapers; - shell extensions; - browser add-ons; - network utilities etc I provide websites security services : - investigation of compromised websites - web scripts audits - weblogs analysis - fixing bugs in existing scripts - measures to prevent intrusions in future I specialize in Python development: - websites parsing and crawling; - automation of OS tasks (bulk image and file processing, various automation); - computer vision projects. There are 4 rules I follow in my work: 1) I have used to do work of high quality and my reputation is the most important to me; 2) I try to avoid conflicts with my clients; 3) If I bid on a project, be sure I'll be able to do it within a specified time frame or faster; 4) I don't bid on projects if I doubt or not confident If you feel I am the exact guy you are looking for, please send me a note about your project and your goals. If it seems like a good fit, then we can discuss it.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Malware Detection
    Malware Removal
    WordPress Malware Removal
    WordPress SEO Plugin
    .NET Framework
    Scripts & Utilities
    C#
    WordPress
    Google Apps Script
    Python
    Microsoft Windows PowerShell
    Scripting
    API Integration
  • US$65 hourly
    Mr. Lunsford has over twenty years of management and leadership experience in the military and private sector of IT operations, including certification in Network Management, Cybersecurity, Encryption, and Information Assurance. Mr. Lunsford holds certifications and certificates from the ARMY, CCNA, CompTIA, and EC-Council. Mr. Lunsford specializes in Cyber Security, Governance Compliance, Network and Device Configuration Management, and Risk management. As an industry-certified professional. Mr. Lunsford provides services as a consultant or an assessor based on the organization's request to meet their required compliance Framework. This can include but is not limited to: • NIST 53 Federal Systems • FedRAMP, StateRAMP, TXRAMP Federal and/or State Systems • NIST 171 Non-Federal Systems for Contractor Agencies • CMMC 2.0 L1, L2, & L3 Non-Federal Systems for Contractor Agencies • ISO 27000, 27001, 27002 • SOX • SOC 2 • PII, PHI • PCI-DSS Mr. Lunsford’s project specialty includes: • Controlled Unclassified Information (CUI) • Federal Contract Information (FCI) • System Security Plan (SSP) • Plan of Action and Milestones (POA&M) • SCOPE Boundary Design • Network and Topology Flow Diagrams • Risk Management Plan and Assessment • Incident Response Plan and Processes • Change and Configuration Management Plan and Processes • GAP Analysis and Remediation • Security Policies, Procedures, Processes, Plans, Matrixes, Inventories, and more. Mr. Lunsford’s capabilities include: • Ability to trace and develop data and system life cycle methodologies. • Lead organizations through compliance projects from beginning to end. • Provide educational services to staff and other members in support of organizations. • Coordinate tasks through project management tools and mechanisms. • Provide consulting services. • Provide assessments based on the organization’s readiness. • Develop and assist organizations that struggle with policy development. • Provide organizations with a roadmap to compliance that includes documents, checklists, details, and questions to prepare the organization for certification. Mr. Lunsford’s solutions include: • Compliance documentation • Evidence collection and attestations • System Testing Metrics • Hardware and Software • End Point Management and Mobile Device Management • Training and Education • Encryption • Storage, Backup, and Archiving • Risk and Incident Management
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Certified Information Systems Security Professional
    Security Infrastructure
    Risk Assessment
    Security Policies & Procedures Documentation
    SOC 2 Report
    NIST SP 800-53
    IT Compliance Audit
    Incident Response Plan
    ISO 27001
    FedRAMP
    Information Security Consultation
    Cybersecurity Management
  • US$60 hourly
    SSO expert having Identity and Access Management expertise of 16+ years in SAML / OpenId Connect / Oauth 2.0 / JWT / FIDO2/ Webauthn / 2FA etc. I have experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, Okta, OneLogin, Auth0, Spring Security SAML, Keycloak, ForgeRock, IBM Security Access Manager etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, Ruby, Go, etc.) or framework (Node.js, Meteor, Angular, Django, CodeIgniter, Concrete5, Yii, Symfony, Laravel, WordPress etc.). I have a strong track record of helping clients succeed with: -Adding SAML authentication to custom applications -Troubleshooting SAML Identity Provider and Service Provider errors -Deploying SAML Identity Providers (IdPs) and Service Providers (SPs) -Finding the right architecture for layering SSO technologies (AD, LDAP, OAuth, OpenID Connect, CAS, Kerberos, JWT, multi-factor, etc.) -Providing training, documentation and third-party support -Deployment and architectures of LDAP solutions (OpenDJ, OpenLDAP, IBM Security Directory Server etc). Architectures with high availablity and custom schema. LDAP proxy / bridge solutions deployment. -Architectures and solution Implementation of Identity and Access governance solutions (Sailpoint IIQ , IBM Security Identity Manager, IBM Security directory integrator ). -Role based access control implementation in Identity management solutions. -Risk based access control implementation with Access Management solutions. Devops and cloud security - - Dockerize applications and platforms. - Deployment of applications on AWS EKS platform. - Deployment of applications on GCP GKE platform. Complex Integrations - - Rest API development and security with Oauth / JWT tokens. - API gateway integrations of API. SSO and Identity Access Management Integration Expert | Technical Project Manager
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Solution Architecture Consultation
    OKTA
    Vulnerability Assessment
    Application Security
    Single Sign-On
    API Integration
    OAuth
    Cybersecurity Management
    Security Analysis
    Information Security Consultation
    Auth0
    LDAP
    User Identity Management
    Amazon Cognito
  • US$125 hourly
    Hello! I help funded startups, midsize, and fortune 500 companies in the healthcare, technology, and government contracting industries. I do this by implementing cybersecurity frameworks that address compliance and protect data, thereby enhancing your marketability and trustworthiness. My expertise includes 20 years of experience, knowledge from real world experience, and industry certifications (i.e. CISSP, CISM, ISO 27001.) My clients have included healthcare EHR, telemedicine, mobile, medical device, and behavioral health organizations. Other clients have been within the fintech, retail, and non-profit industries. These dynamic ecosystems have equipped me with the ability to provide tailored solutions for your unique needs. Compliance Expertise: HIPAA: I am a healthcare information security and privacy practitioner. I have successfully guided several healthcare organizations in effectively handling sensitive patient data. Notably, I orchestrated a full-scale HIPAA compliance overhaul for a 500+ employee healthcare Non-Profit, mitigating potential risks and ensuring continuous adherence to standards. SOC 2: I have been instrumental in developing and executing successful SOC 2 compliance strategies for SaaS, technology, and healthcare companies. My comprehensive understanding of the Trust Service Criteria has allowed SaaS providers obtain favorable SOC 2 Type II reports. ISO 27001: Specializing in risk management, I led the ISO 27001 certification process for multiple organizations. My systematic approach to implementing the ISMS framework has ensured ongoing conformity to this international standard, reducing information security risks and promoting a security-aware organizational culture. CMMC: With a thorough grasp of the Cybersecurity Maturity Model Certification (CMMC), I have assisted defense contractors in preparation to maintain their contracts by helping them achieve and maintain the required CMMC levels. I spearheaded a project to bring a mid-sized defense contractor up to CMMC Level 2, a significant undertaking that involved both technical and policy modifications. PCI-DSS: I conducted PCI assessments and collaborated with IT Teams for technology companies and payment gateway service providers to ensure a PCI Compliance environment. Additional services included writing policies, conducting risk assessments, managed penetration tests, collect AOCs from vendors, and filled out SAQ forms annually. Certifications: CISSP, CISM, ISO 27001 LEAD IMPLEMENTER, GCIA, ECSA, CEHv7 My Services: - vCISO Management - Policies & Procedures Development - Privacy Management - Compliance Implementation - Security Assessments - Risk Assessments - Third-party Security Questionnaires - SSP Development - Cybersecurity Strategy Testimonials: Imagined Cloud | CEO: "Larry exceeded our expectations with their comprehensive SOC 2 services. They not only helped us navigate complex compliance requirements but also provided valuable insights that improved our overall security posture. Highly recommended!" Johnson & Johnson | MedTech Product Security Manager: "Larry was instrumental in guiding our medical device company through our HIPAA assessments with his digital health expertise, significantly easing our compliance process. I highly recommend him for his cybersecurity expertise in the medical device sector." Keywords: cybersecurity expert, compliance, HIPAA, NIST, SOC 2, ISO 27001, CMMC, ISO 27001, policies and procedures , vCISO, risk assessment, compliance software, security assessments, healthcare
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Medical Device
    NIST Cybersecurity Framework
    Cybersecurity Management
    Health & Fitness
    Healthcare Software
    Compliance
    Healthcare
    Telemedicine
    Healthcare IT
    SOC 2
    ISO 27001
    Governance, Risk Management & Compliance
    HIPAA
    IT Compliance Audit
    Security Policies & Procedures Documentation
  • US$30 hourly
    I'm Ajmira Sharmin, a dedicated Cyber Investigator, Penetration Tester, and Data Detective. With extensive experience in cybersecurity, my role is to secure your digital landscapes against potential threats, vulnerabilities, and solving digital mysteries. My Expertise: 🌐 Vulnerability Assessment 🔒 Penetration Testing 🛡 Network Security 🌐 Website & Server Security 🔍 Digital Forensics 🌐 Dark Web Threat Intelligence 🕵️‍♂️ Digital Investigations 🔐 Incident Response 🦠 Malware Analysis 💾 Data Recovery and Preservation Why Choose Me? 🔐 Proficiency 🔍 Swift Turnaround 📈 Actionable Insights 💡 Clear Communication 🕑 24/7/365 Days Availability Your digital safety is my top concern. Let's work together to protect your online world. Just click "Contact" to start the path to a safer digital future. Regards, Ajmira Sharmin
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    OWASP
    Cloud Security
    Black Box Testing
    Security Analysis
    Internet Security
    Security Assessment & Testing
    Security Testing
    Digital Forensics
    Network Security
    Information Security Consultation
    Vulnerability Assessment
    Cybersecurity Management
    System Security
    Penetration Testing
  • US$40 hourly
    I'm an OSCP (Offensive Security Certified Professional), OSWE (Offensive Security Web Expert), CREST CRT, and CEH (Certified Ethical Hacker) certified penetration tester. I can conduct vulnerability assessments and penetration testing for your web applications, mobile applications, and cloud infrastructures. I can also audit the code of your PHP / Python / JS (NodeJS) applications and fix code-level vulnerabilities. My day to day work includes: -- Research on bleeding edge technologies -- PHP/Python/JavaScript development -- Code auditing -- Database management -- APIs development & integration -- AWS services (EC2, SES, SNS, SQS, Route53, S3, Lambda, API gateway) -- Penetration testing -- Data scraping -- and a lot more
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Network Security
    Security Testing
    Network Penetration Testing
    PHP
    JavaScript
    Laravel
    Penetration Testing
    Information Security
    Cloud Security
    Web App Penetration Testing
    Web Application Security
    Website Security
    Information Security Audit
    Linux System Administration
    Amazon Web Services
  • US$30 hourly
    Full Stack WordPress Developer | Malware Removal | Web Security | Cleaning up and Securing Hacked Websites | 10+ Years of Experience With over a decade of experience, I am a seasoned Full stack WordPress developer specializing in creating secure and user-friendly websites. My expertise lies in removing malware, enhancing web security, and developing custom plugins tailored to your needs. My portfolio includes PSD to WordPress conversions, eCommerce website design using WooCommerce/WordPress, and premium theme customization. I excel in responsive theme development, ensuring your website looks stunning on all devices. Additionally, I am well-versed in optimizing website speed, providing fast loading times for an exceptional user experience. I can also assist with database migrations and troubleshoot any issues that arise during the process. As a security-focused professional, I prioritize safeguarding your WordPress website from potential threats. I employ the latest security techniques to keep your site safe and secure. 💡 Highlights of my expertise: Malware Removal 🔒 Web Security 🔐 PSD to WordPress 🖥️ eCommerce Website Design and Development using WordPress/WooCommerce 🛍️ Premium WordPress Theme Customization 🎨 WordPress Custom Theme Development 🎯 WordPress Website Speed Optimization ⚡️ Responsive WordPress Theme Development 🌐 WordPress Multisite Development 🔗 Plugin Development and Customization 📦 I can also fix a wide range of issues, including: 🐞 Parse Error/Syntax Error 🐛 White Screen of Death (WSoD) ⚪ Internal Server Error 💥 404 Error 🔗 Payment Gateway Issue 💳 Error Establishing a Database Connection 🗃️ SSL Error 🔒 Mixed Content Error 🔄 Js Conflicts 🔄 Ajax Errors 🔄 JSON Errors 🔄 CSS Bugs 🎨 Unable to Edit Content 🖋️ Plugin Conflicts 🔄 Website Keeps Loading Issue ⏳ Connection Timed Out Error ⏰ Unable to Upload Images 📷 Unable to Access the Admin Area 🔐 WordPress Is Stuck in Maintenance Mode 🔧 Missed Scheduled Post Error ❌ WordPress Failed to Auto-Update ⚙️ E_ERROR: A Fatal Error ❗ E_WARNING: Run-time Warning ⚠️ E_PARSE: Parse Error 🔄 E_NOTICE: Run-time Notice ℹ️ E_CORE_ERROR: Fatal Errors ❗ E_CORE_WARNING: Warnings ⚠️ E_COMPILE_ERROR: Fatal Compile-time Error 🔄 E_USER_ERROR: User-Generated Error ❗ E_USER_WARNING: User-Generated Warning ⚠️ E_USER_NOTICE: User-Generated Notice ℹ️ E_STRICT: Run-time Notices ℹ️ E_RECOVERABLE_ERROR: Catchable Fatal Error ❗ E_DEPRECATED: Run-time Notices 🔄 Thank you for considering my extensive experience and expertise in WordPress development, malware removal, and web security. I look forward to helping you create a secure and successful WordPress website.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    WordPress Bug Fix
    WordPress Theme
    WordPress Malware Removal
    Bug Fix
    WordPress Security
    WordPress Customization
    WordPress Development
    Website Optimization
    WordPress
    PHP
    AJAX
    HTML
    JavaScript
    WordPress Plugin
  • US$90 hourly
    I am a self-motived technically skilled cyber security professional who is well versed in various security controls and has driven major security focused solutions through testing and enterprise implementation. Accomplished information security specialist with a passion for aligning security architecture plans and business processes and goals with security standards. I have established experience in developing, deploying, maintaining, supporting, and testing various security frameworks and security controls across the technology stacks. Technology-savvy self-starter who is adept at moving into new environments. I possess first-rate communications, strategic, and collaboration skills to lead and work in agreement with diverse groups and departments effectively.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Palo Alto Firewalls
    Microsoft Intune
    Microsoft Azure Administration
    CrowdStrike
    Splunk
    Microsoft Azure
    Information Security
  • US$165 hourly
    Sr. Architect and Engineer specializing in Cybersecurity, Networks, Cloud, and IT Systems with proven international business experience and management skills. UPWORK experience: 9000+ work hours, 100% Job Success, Top Rated Plus, Expert-Vetted With 15+ years of professional experience, I provide a complete set of services from proven advanced technical solutions and methodologies to business development, team-building, and management. I have successfully delivered complex projects across heterogeneous environments such as Telco/ISP providers, SMB, and Large International Enterprises in USA, Europe & Globally. Main offered services include: • Cybersecurity Architect • Network Architect • System Architect • Cloud Architect • Digital transformation • Solution design and implementation • IT strategy development • Information Security Manager • vCTO | vCIO | vCISO • Executive Consultant Highly experienced SME in the following technology fields: Information Security & Cyber Security • Develop & enhance Cybersecurity management frameworks. • Develop, implement & monitor strategic, comprehensive enterprise information security & IT risk management programs. • Develop, and maintain cybersecurity policies, standards, baselines, guidelines, and procedures. Network/IT/System Security • Firewall, UTM, NGFW & NG-IPS protection: Fortigate, FortiManager, FortiAnalyzer, Cisco (ASA FirePower), Barracuda, pfSense, Checkpoint, PaloAlto, SonicWall, WatchGuard • Email Security: Cisco, Barracuda, Mimecast, Microsoft • Web Security: Cisco, Barracuda, Fortinet, McAfee, Zscaler • Proxy and Reverse Proxy: Squid, Nginx, Dante • IPSec VPN & SDWAN: Cisco DMVPN, HPE ADVPN, Fortigate ADVPN • SSL VPN: Fortigate, Cisco, PaloAlto, Barracuda, SonicWall, OpenVPN, pfSense, Swan, OpenConnect • Network Access Control (802.1X, Radius, Tacacs+…), BYOD and MDM : Aruba ClearPass, Cisco ISE, PacketFence, NPS, Genians, Intune... • IAM SSO SAML2 Oauth: OKTA, Keycloack, Auth0 • DLP & CASB Bitglass, Forcepoint • EDR McAfee, Sophos, SentinelOne... • SIEM and SOC solutions - Wazuh, Fortinet, Splunk... IT Cloud/Systems/Virtualization/Backup/DR • Hybrid Cloud, Multi Cloud Architecture • Cloud Infrastructure Security, Networking, Storage, VPC (AWS, Azure, OVH, OpenStack...) • Virtualization planning, implementation, tuning (VMware, Proxmox, KVM, Hyper-V) • Hyperconverged HCI solutions ESXi & vSAN, Proxmox & CEPH • Linux Systems deployment, administration and development (Debian Ubuntu OpenSuSE CentOS RedHat) including performance optimization, hardening, scripting, HA, backup & restore • Windows Server architecture & administration (Hyper-V AD GPO DNS DHCP PKI File Server ...) • SAN (FC/FCoE), ISCSi, NAS(File) • VDI and Virtual App (Microsoft, VMware, Citrix) • Load Balancer/Application Delivery: HAproxy, Nginx, Barracuda, F5 • ElasticSearch & OpenSearch design & implementation • Critical HA Database clusters: PostgreSQL & MySQL • HA, Backup & Disaster Recovery planning & deployment (Veeam, VMware, Proxmox, Linux, AWS, Azure, Windows...etc) Network technologies • Switches: Cisco, HPE, Comware, Aruba OS, Arista, Alcatel, Juniper, Dell • Routers: Cisco, HPE, Comware, Alcatel, Juniper, Mikrotik • WiFi Mobility: Aruba OS & Central, Cisco, Meraki, Ubiquity, Mikrotik • MPLS L2/L3 VPN, MP-BGP, VPLS, SDWAN • BGP, OSPF, IS-IS, EIGRP routing protocols • FRR, VyOS, Bird • VLAN, QinQ, VXLAN, EVPN L2 scalable overlay networks • ACL, PBR, NAT, QoS, NAS; large-scale DHCP/DNS • IGMP L2 and PIM L3 multicast • Secure WiFi planning: controller managed & cloud-managed • NMS, EMS, FCPAS and OSS/BSS systems - LibreNMS, Zabbix, Nagios, Cacti Some of the most notable certifications I hold are: • CISSP - ISC2 • HPE Master Accredited Solution Expert - Network Solutions • HPE Accredited Solutions Expert - Network Architect • SUSE Cert. Linux Admin.: SLES In addition to technical skills, I deliver proven business operations experience for: • Business development planning and acquiring the correct technology • Project Management • Team building and management • RFP preparation Proposal preparation (technical/commercial) • Pre-sales & Sales Management • Business development, planning, and acquiring the correct technology • Project Management • Team building and management • RFP preparation Proposal preparation (technical/commercial) • Pre-sales & Sales Management • Business partnership establishment and management with leading companies such as HPE, Aruba, Fortinet, Cisco, IBM, Dell, Microsoft… and many more I am an avid learner, enabling me to swiftly adapt to new business environments and new project needs. Excellent communication and interpersonal skills combined with my long experience in team-leading & management enable me to collaborate strongly and work in global project teams with multiple members (in both leading or supporting roles).
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Certified Information Systems Security Professional
    Firewall
    High Availability and Disaster Recovery
    NIST Cybersecurity Framework
    Network Design
    Network Architecture
    Solution Architecture
    Cloud Architecture
    Cloud Security
    Business Development
    System Administration
    Cybersecurity Management
    Information Security
    VPN
    Network Security
  • US$150 hourly
    Please don't contact me regarding hacked accounts. There is nothing I can do and it's illegal to try and hack them back. Sorry! For over 10 years my greatest passion has been cyber security. For the first 6 years I worked for NCC Group, the largest cyber security consultancy in the world and gained a wide range of skills and experience working for high street banks, global corporations and UK government ministries. I've now moved on and have started my own business, my greatest passion is helping small and medium sized businesses fix their security problems. I eat, drink and sleep cyber security. I have experience testing a wide range of technologies, including but not limited to web applications, internal networks, external networks, mobile applications, network devices and Wi-Fi. Having a broad range of experience allows me to rapidly place in context of the asset I'm testing within the clients environment. My focus is on helping web and mobile developers, network administrators and business owners ensure their products adhere, not just to best practice but to the highest security standards. By using a combination of manual and automated testing I am able to produce results in a timely and cost effective manner. I assist with remediation by providing advice on which areas of vulnerability to focus on first and how best to implement fixes. I have a track record of understanding highly technical security issues and being able to convey them to both a technical and management audience. I'm always happy to discuss client requirements and work with them to identify the best methods to achieve their objectives. As part of the process, I offer a pre and post engagement call to ensure we are a perfect match and that I have achieved your goals.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    PCI
    Information Security Awareness
    Electron
    Configuration Management
    Ethical Hacking
    Cybersecurity Management
    Penetration Testing
    Encryption
    Firewall
    Network Monitoring
    Network Penetration Testing
    Computer Network
    Website Security
    Mobile App Testing
  • US$50 hourly
    HI!! I am Virtual CISO, Cyber Security, Cyber defense, Ethical Hacker, expert I am prompt engineer working to create and maintain AI-generated content in Spanish. I love finding creative and innovative ways to ensure the perfect prompts are provided for our users I am a computer security scientist with an intensive hacking background. I do have a Msc in computer engineering I am working for severals Internationals Enterprises where I do intensive researches in Penetration Testing, Vulnerability managements, Technological Risk, Security Architecture and Forensic I am Professional with over 20 years experience in the area of information and communications technology, including 15 years of experience in networks and security infrastructure Analytical skills to solve problems, ability to work with new technologies, adaptable to any situation, pro-activity and motivation to individual and team achievements Self-management capacity of the learning process to successfully assume the continued improvement of my functions My passion is to help SMBs gain a fighting chance in an increasingly hostile information security threat environment by providing part-time vCISO services. Whether PCI , GDPR, NIST, ISO27000 and any other Security Standards gap analysis, information security risk assessments, audit remediation, strategic planning, interim CISO services, or anything else information security related, I offer you my vCISO Services, Information security ISO27001 consultancy and Policies Documentations With the following responsibilities and functions; Recommend modifications to application development, database design, networking, or infrastructure architecture with the goal of complying with internal information security policies and standards. Monitoring emerging products, technologies or best practices that will improve security for the organization and its stakeholders. Perform security audits, identify security gaps, and develop and implement risk mitigation solutions. Design and develops the organizations overall information security architecture to protect its information assets. Perform work and recomedations in relation to network, data, application and or cloud security and liaises with other areas of IT in the dissemination of this information to counter threats and internal and external vulnerabilities. Perform advanced research and identifying information security products, services, and trends, testing security configurations, and developing configuration architectures. Stong experience in Information security and Network Security: • Design Network security architecture • Design Cloud Security architecture ( AWS and Azure) • IT Vulnerability Assessment • API Security Evaluation • Cloud Security Assessment • Active Directory Security • Network and Web Application/Mobile Penetration Testing • Threat Hunting, • Red Team Program Development/Red Team Attack Simulations • Open Source Intelligence (OSINT) Gathering • IT Risk Management • Incidents Response management • Technical Writing; Information Security Policies,: ISO2700, NIST, HISPAA, PCI • Working experience of supporting Cyber Security tools such as, McAfee SIEM, Ms-SENTINEL, CISCO IPS, Citrix NetScaler, TrendMicro endpoint. Checkpoint Firewall, Bluecoat, AWS WAF, AWS Shield and AWS Firewall Manager, antivirus, CYNET security endpoint • Kali Linux Toolkit, Qualys, Nessus • MS-365 security, Defender for Cloud Strong experiece in IT Support and admin • Technical Supports Windows Server • Active Directory management • Technical Supports Azure Cloud • Technical Supports Intunes • Technical Supports Windows 10 and 11 • Technical SupportsMS- 365 • Technical writing IT Procedures,
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Mobile App Testing
    Amazon EC2
    Blockchain
    ISO 27001
    Cloud Security
    Vulnerability Assessment
    Office 365
    Information Security
    Microsoft Azure
    Cybersecurity Management
    Penetration Testing
    Nessus
    WordPress
    Ethical Hacking
    Network Security
  • US$50 hourly
    I am dual-skilled in the application of cybersecurity and Azure AI solutions and have been a Wine Advocate and enthusiast for over twenty years. I have completed the implementation of cyber-security architecture design patterns and frameworks for many custom Azure, AWS, and GCP platform-based solutions. My specialist areas include Auditing, Compliance, Development, Governance, Infrastructure, Planning, Platforms, Risk, SIEM/SOAR, and Threat Intelligence needs. In the last 2 years, I have been working on AI/ML (Artificial Intelligence/Machine Learning) projects, integrating Azure AI services into other Microsoft Services, such as Microsoft Defender, Microsoft 365 and web services. I have experience working with Artificial Intelligence workloads and considerations, providing fundamental principles of machine learning on Azure and applying features of computer vision workloads, Natural Language Processing (NLP) workloads, and generative AI workloads on Azure. Since the beginning of the COVID pandemic in 2019, I have become qualified for the WSET (Wine Spirit and Education Trust) Wine Awards, studying up to level 3. I have gained strong knowledge of the principal grape varieties of the world, the regions in which they are grown, and the styles of wine they produce. I have built a combination of high-end tasting, exploring the factors that impact specific styles and quality and learning how to describe these wines with confidence. I can build tasting 'maps' describing various wine types, using the Wine Spirit Education Trust (WSET) Systematic Approach to Tasting Wine (SAT); these 'maps' cover descriptions for appearance, nose, palate and quality. Across principal grape varieties, understand and gain applied knowledge across environmental factors, grape-growing, winemaking and maturation options influence the style and quality of wines. I have strong technical wine knowledge and the capability to write copy for wine products. I create meaningful content that engages customers and drives business across various platforms, such as blogs, social media, and websites.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Information Security
    Content Writing
    Unified Threat Management
    Creative Writing
    Security Operation Center
    Security Management
    Cybersecurity Management
    Blog Writing
    Editing & Proofreading
    Cloud Security
    Copywriting
    Certified Information Security Manager
    Website Content
    Blog Content
    Security Analysis
  • US$35 hourly
    ⭐⭐⭐⭐⭐ "It doesn't get better than Ezinne. The quality of what she delivers is outstanding...You won't be disappointed." Hello! I'm a dedicated grant writer focused on helping tech startups secure the funding they need to thrive. With a background in technical and proposal writing, I specialize in crafting compelling grant applications for startups in any field, worldwide, hourly or at a flat rate. What I Offer: - Funding Research: I conduct thorough research to help identify and analyze potential funding opportunities that align with your startup's objectives. - Grant Writing: Expertise in writing successful grant and funding proposals tailored to your specific needs and goals. - Technical Writing: Proficient in creating clear and concise technical documents including pitch decks that effectively communicate complex information. - Proposal Writing: Skilled in developing persuasive proposals that highlight the unique strengths and potential of your startup. Why Choose Me: - Proven Track Record: I'm experienced in securing funding for tech startups, with a deep understanding of what funders are looking for. - Global Reach: While based in East Africa, I offer my services to tech startups around the world. - Passion for Startups: I'm committed to helping innovative startups succeed, with a special focus on supporting impactful startups in Africa and around the world. - Collaborative Approach: I ensure client needs are met through effective collaboration. - Commitment to Deadlines: I'm dedicated to meeting deadlines and deliverables. - Simplifying Complexity: I'm able to simplify complex concepts for easy comprehension. - Attention to Detail: Meticulous attention to detail and accuracy. Success Stories: - Tony Elumelu Foundation Grant: I worked with a startup on their grant proposal, leading to pre-approval for the prestigious Tony Elumelu Foundation grant. - African Impact Initiative Grant: I assisted a startup in securing pre-incubation approval for the African Impact Initiative grant, which supports impactful startups in Africa. - VC Funding with Goodwell: I contributed to the initial application process for venture capital funding, resulting in the startup client being contacted by Goodwell for follow-up. Work Approach: - Understanding client objectives through detailed project analysis - Thorough online research and information gathering, where applicable - Drafting of initial content for client review - Revisions based on client feedback Client Testimonials: - "Easy to work with" - "Paid attention to details" - "Completed the job on time" - "Impressed by the quality of work" Let’s Work Together: If you're a tech startup looking to secure funding and need a skilled grant writer to help you achieve your goals, I’d love to hear from you. I offer flat-rate services to ensure transparency and predictability in pricing. Let's work together to turn your vision into reality! My working hours align with GMT+2 (currently based in Kigali, Rwanda, though originally from Ontario, Canada).
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Business Writing
    User Guide Writing
    NIST Cybersecurity Framework
    Quiz Writing
    Policy Writing
    Story Writing
    Grant Writing Consultation
    Report Writing
    Speech Writing
    Article Writing
    Grant Writing
    Blog Writing
    RFP Writing
    Content Writing
    Technical Writing
  • US$125 hourly
    ##Upwork Expert-Vetted - Top 1% of Talent## AWS architecture and implementation, DevSec(Ops), SDN, Windows/Linux systems administration, ESXi/VMware builds/upgrades, root-cause analysis on infrastructure including networks, enterprise endpoint product test and eval, test case builds. Selective experience working through NIST/CMMC security controls and documentation. Throughout my 15 years I've seen and touched almost everything. Very efficient, communicative and thorough.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Governance, Risk Management & Compliance
    Cybersecurity Management
    Solution Architecture
    Cloud Engineering Consultation
    Systems Engineering
    Network Design
    Network Security
    Infrastructure Management
    Information Security
    VMware Administration
    Security Engineering
    Microsoft Azure
    Server Virtualization
    Amazon Web Services
    Microsoft Active Directory
  • US$110 hourly
    I am a UK based TOGAF 9 Certified Solution Architect with 19+ years of experience in Technical Content Writing on IT Infrastructure, Cloud, DevOps, Cybersecurity (including DevSecOps & AppSec), Enterprise Service Management (ITSM), and ITIL. Following are some of my domains of expertise - - Cloud (Public/Private/Hybrid) - DevOps - AWS - MS Azure - Google Cloud - Kubernetes - Docker - ITIL and ITSM - ServiceNow - Cybersecurity I also hold a Masters Degree in Computer Application & Mathematics, as a result, I possess the right level of knowledge to write articles on both Legacy and Emerging Technologies. I am also a ServiceNow Certified Administrator and Implementor (ITSM London). My articles are focused towards its reader-base, and are extremely engaging and informative. Every written line has real information rather than fluff/fillers. By the end of every line/paragraph, the reader will be urged to continue reading. If you are looking for copied, spun or AI-written content to help you with a cost-optimized solution - SORRY, I AM NOT THE RIGHT GUY!
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Experts
    Cybersecurity Management
    DevOps
    Blog Writing
    SaaS
    Proofreading
    Technical Writing
    Cloud Computing
    White Paper Writing
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Cybersecurity Expert on Upwork?

You can hire a Cybersecurity Expert on Upwork in four simple steps:

  • Create a job post tailored to your Cybersecurity Expert project scope. We’ll walk you through the process step by step.
  • Browse top Cybersecurity Expert talent on Upwork and invite them to your project.
  • Once the proposals start coming in, create a shortlist of top Cybersecurity Expert profiles and start to interview.
  • Hire the right Cybersecurity Expert for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Cybersecurity Expert?

Rates charged by Cybersecurity Experts on Upwork can vary with a number of factors including experience, location and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Cybersecurity Expert on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Cybersecurity Experts and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Cybersecurity Expert team you need to succeed.

Can I hire a Cybersecurity Expert within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Cybersecurity Expert proposals within 24 hours of posting a job description.

Cybersecurity Expert Hiring resources

Learn about cost factors Hire talent
Schedule a call