Hire the best Network Security Engineers

Check out Network Security Engineers with the skills you need for your next job.
Clients rate Network Security Engineers
Rating is 4.8 out of 5.
4.8/5
based on 3,225 client reviews
  • US$180 hourly
    Telecommunication and Systems engineer with a focus on Cloud, Networking and Linux, experience in Infrastructure management and deployment. Deployed Private Cloud infrastructure, Datacenter Network Design for Multi-tenancy, fault-tolerant design, NIC Bonding and VRRP for High Availability. Stack: *Full virtual networking with vSwitches and vRouters *VLAN, VxLAN, GRE and Overlay tunnels *IPv6 *MP-BGP, EVPN *Firewalling *VPN/OpenVPN/IPSec/WireGuard/Site to Site and Client-Server * VPP/DPDK for 100G VPN and routing *Advanced Linux management: IPTables, Kernel modules, Virtualization, Networking. *Traffic engineering *Advanced StrongSwan IPSec tunnels, XFRM *Cloudstack with Open vSwitch *OpenNebula with Open vSwitch *OpenDaylight SDN controller with OpenvSwitch *Advanced Proxy setup with Squid/Nginx *Virtuozzo and OpenVZ *KVM and Libvirtd *RADIUS and FreeRADIUS *Pacemaker/Corosync/Keepalived HA cluster *MTLS design and implementation with NGINX *IoT gateway implementation with Raspberry Pi and 4G modems *DevOps experience with Chef and Ansible *Bash and Python scripting
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Internet of Things
    Apache CloudStack
    Linux System Administration
    OpenVPN
    Computer Network
    Private Cloud
    Kernel-based Virtual Machine
    System Administration
    Firewall
    Ubuntu
    Linux
    Internet Protocol Security
    Network Engineering
    VPN
  • US$59 hourly
    Am a CCIE#26611 with extensive experience in Routing & Switching, Security, Datacenter, Virtualization, Programmability & Automation. Am delivering unique & absolutely different service for the below technologies: * SDN Datacenter: Cisco ACI, VMware NSX, Nutanix Flow, Arista. * SDN Storage: Cisco HyperFlex, Nutanix HCI, VMware VSAN. * SDN Access: Cisco DNA, LISP Implementation, Cisco Spaces, Cisco ISE, PacketFence. * SDN WAN: Cisco SDWAN, VMware VeloCloud, SilverPeak, PaloAlto SDWAN, FortiGate SDWAN, Meraki. * Programmability & Automation Controllers: Python & API tools to automate business intent & workflows within networks, Ansible, Chef, NSO, Terraform, OpenShift. * Monitoring Applications: Zabbix, SolarWinds, Home Made Custom Tools, Nmap, Packet Tracer (Wireshark). * Routing & Switching and Wireless Technologies: Cisco, Mikrotik, Juniper, FS, Arista. * Security: Cisco, PaloAlto, Meraki, FortiNet, Ubiquiti, VMware MDM. * Datacenter, Cloud Computing, Cloud Native, Virtualization & HCI Solutions. * Public Cloud: Design, Setup & Administer Tenants on AWS, Azure. * Micro-segmentation & Containerized Applications: Docker, Kubernetes. * Private 5G Networks: Azure Private 5G Core. * API Gateways & Swagger Documentation. * Python Scripting for DevOps, SecOps, NetOps & IaC. * Technical Writing & Documentation. Please refer to my LinkedIn account aossama. Certifications: * CCIE Enterprise CCIE#26611. * Cisco CCNP DevNet. * Cisco CCNP Enterprise. * Cisco CCNP Datacenter. * Cisco ACI Certified Specialist.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Server & Virtualization Software
    Fortinet
    MikroTik
    Cisco Meraki
    Palo Alto Firewalls
    Network Design
    Network Monitoring
    Network Engineering
    Python
    Information Technology
    Cisco Certified Internetwork Expert
    Cisco ACI
    Software-Defined Networking
    Cisco
  • US$39 hourly
    I have 30-years experience in network projects including design, implementation, system administration and in software development. For the first 5 years of my career I worked on software development: coding and especially testing. For the last 25 years I'm working on implementation and maintenance of University of Nis WAN. Last 20 years I'm deeply involved in AMRES (Academic Network of Serbia) project. Don't fix it if it ain't broken, don't break it if you can't fix it! SKILLS SUMMARY - Any system administration tasks - Operating Systems: any *nix (Linux, FreeBSD, SGI IRIX, SCO, Solaris, OSX), Windows 3.1/9x/Me/XP/Vista/W7/W8/W10, WinServer NT/2K/2003/2008/2012/2016 - LAN & WAN: Ethernet, Fast Ethernet, Gigabit Ethernet, FDDI and Wireless LANs. T1/T3, SDH/SONET, Frame Relay, WDM, ISDN, ADSL, SHDSL, Cable Modems, Cellular, X.25. - Network Protocols: TCP/IP, IPv6, UDP, OSI, CDP, IP Multicast, IPSec, VoIP, Routing, VLANs, Bridging, Trunking, VPN, SNA, DLS - Network Services & servers: SMTP/POP3/IMAP, FTP/SFTP, Telnet/SSH, HTTP/HTTPS, DNS, DHCP, NNTP, NTP, LDAP, SNMP, NETBIOS, Apache, Nginx, MySQL, Plesk, cPanel, Zimbra, VMware, CentOS, Ubuntu, Debian - Network Equipment: various types of modems, firewalls, switches and routers. - Dedicated, VPS and cloud environment servers (Amazon AWS, Google Cloud, MS Azure, Digital Ocean, Linode). - Programming Languages: Unix Shell scripting, BASH, C, Pascal, MS Visual Basic, PHP, HTML, (a bit of Python).
    vsuc_fltilesrefresh_TrophyIcon Network Security
    CentOS
    Ubuntu
    System Administration
    Apache Administration
    SSL
    Let's Encrypt
    Linux System Administration
    Firewall
    Red Hat Administration
    Internet Security
    Cloudflare
    Zimbra Administration
    Unix System Administration
    Network Administration
  • US$75 hourly
    My approach involves a meticulous understanding of project requirements, coupled with a hands-on approach to problem-solving. I am committed to delivering comprehensive solutions that span from the endpoint to the perimeter, ensuring the integrity and security of your IT infrastructure. Key Areas of Expertise: - Cybersecurity: Specialized in Fortinet products - Fortigate, Forticlient, FortiEMS, Fortianalyzer, FortiManager, Fortiswitch, FortiAP - with a keen focus on innovative solutions. I'm also Fortinet NSE4 certified and an official Advocate Fortinet Partner. - Virtualization: Proficient in installation, configuration, and troubleshooting of virtualization solutions using VMware and Hyper-V. - Cloud Solutions/Architect: Well-versed in Microsoft 365 and Azure cloud solutions. - Networking: Extensive experience in building and implementing end-to-end projects for small/medium LAN/WAN environments using a variety of vendors and technologies like Cisco, Aruba, and Fortinet. Why Choose Me? - Diverse Skill Set: As a "jack of all trades," I bring a wealth of experience across various IT domains. - Cybersecurity Focus: My dedication to Cybersecurity and Fortinet projects ensures cutting-edge solutions. - Commitment: I am incredibly responsive, responsible, and available for any IT infrastructure/operation project, ready to contribute my expertise to drive your success.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    DNS
    Microsoft Active Directory
    VMware vSphere
    Virtual LAN
    Network Administration
    LAN Implementation
    Fortinet
    Cisco UCS
  • US$90 hourly
    Experienced technology leader and cyber security expert. Experience building security programs from the ground up for large organizations, conducting security audits, technical policy writing, and gap analysis. I am efficient, driven, and highly capable in all areas of cybersecurity. I hold both a Masters degree (MBA) as well as a Bachelor of Science in Business, IT Management. Additionally, I have received certifications which include: CISSP, CISA, CISM, GSLC, CCNA, CCNA-S, and certifications from Microsoft and CompTIA.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Firewall
    Technical Writing
    IT Consultation
    System Configuration
    Troubleshooting
    System Administration
    Information Security
    Security Engineering
    System Security
    IT Management
    IT Compliance Audit
    Network Engineering
  • US$25 hourly
    ✅ Cisco Certified Professional ✅ 5 Star Ratings & Reviews ✅ Top Rated by UpWork Expert Network and Security Engineer with 8+ Years of hands-on Experience on Diverse set of Technologies including Routing & Switching, Security, Data Center and Wireless Infrastructure. PROFESSIONAL CERTIFICATIONS: Several globally recognized certifications including: ▪ Cisco Certified Internetwork Expert – Security Core ▪ Cisco Certified Network Associate – Routing & Switching ▪ Juniper Networks Certified Internetwork Associate – Junos ▪ Juniper Networks Certified Internetwork Associate – Cloud ▪ Huawei Certified Network Associate – Routing & Switching ▪ Huawei Certified Network Professional – Routing & Switching ▪ Palo Alto Networks Accredited Configuration Engineer ▪ Fortinet Network Security Expert 1 ▪ Fortinet Network Security Expert 2 ▪ Microsoft Certified Azure Fundamentals ▪ Microsoft Certified Azure Administrator ▪ Microsoft Certified Trainer ▪ Paessler Certified Monitoring Expert SKILLS: ▪ Routers | Cisco ISR 4000/ ASR 1000 Series, HPE MSR 4000, Mikrotik RouterBoard ▪ Switches | Cisco Catalyst 9000/ Nexus 3K, 9K Series, Aruba 6300/ 6400, Huawei S6720 ▪ Firewalls | Cisco FTD 1000/ 2100, FortiGate 400E/ 600E/ 1000D, Palo Alto 800/ 3200, Juniper SRX, Sophos XGS Series ▪ Security | Cisco ISE, AMP, WSA, SecureX ▪ Servers | Dell PowerEdge, HP ProLiant, Cisco UCS Series ▪ Wireless | Cisco WLC, Ubiquiti UniFi, Aruba Mobility Controller ▪ NMS | SolarWinds, OpManager, PRTG, Nagios ▪ CyberSecurity | BeyondTrust PAM, OneLogin IAM, KnowBe4 KMSAT, InDefend DLP, SealPath IRM, Titus Data Classification PROJECT PORTFOLIO: Have played Key role in Design, Configuration and Deployment of following projects: ▪ Mindbridge - Network & DC Deployment Project for 4000 Agents (Cisco ISE, FTD 2110, ASR 1001-X, HyperFlex Edge 220 M5-SX, C9500, C9200, SG350, WLC 3504, AIR AP1852, Cisco AMP4E) ▪ PSCA - VxRail HCI Deployment Project (Dell EMC VxRail P570 Hybrid Cluster of 12 Nodes with VMware 6.7 and vSAN) ▪ Umniah Mobile Company, Jordan - MPLS Network Orchestration (Cisco NSO 4.7, UCS C240, RHEL 7.6, Yang, XML, Python) ▪ Agriculture Department - Primary and DR DC Design Project (A10 SLB, Huawei USG 6620 Firewall, S6720 Switches) ▪ BATA - Application Virtualization Solution (Cisco WSA, VMware ESXi 6.5, vCenter 6.5, Dell PowerEdge R740 Servers) ▪ Wateen Telecom - Network Redundancy Solution using Ether-Ring (Cisco ISE, EAPS, O-Ring DES 3042P, BDCOM S2210) ▪ PACKAGES GROUP - DC Design Project (Cisco ASA 5516-X HA, SANGOMA VoIP CM, Cisco Nexus 9K Switches) ▪ MCDONALDS - FreeWiFi Project (Cisco WLC Controller & WLAN APs, BDCOM S2210 Switches) ▪ NESTLE - WiFi Network Design and Deployment Project (Cisco 2960X Switches, Cisco Aironet APs, Linksys APs) ▪ APNA BANK - L3MPLS Aggregation Design Project (Huawei AR1220 Router, Fortigate 200E Firewall, Huawei NIP 6330) ▪ TRG - DMPLS TE Design Project (PALO ALTO PA 850 Firewall, QoS, BW Optimization) ▪ SIEMENS - L3MPLS & Internet Integration Project (Cisco ISR 4331, Cisco ASA 5512X, CISCO 2960X Switches) ▪ BANK OF PUNJAB - DC Migration Project (Cisco FTD 2130, SSL VPN, AnyConnect VPN, Mikrotik RB2011, EoIP VPN) ▪ SERVICE SALES - DR DC Design Project (Juniper SSG 140 Firewall, Mikrotik RB2011, Cisco 3850 Switches) ▪ HABIB BANK LIMITED - L3MPLS Hub & Spoke DVTI VPN Project (Juniper SRX 210 & SRX 300, Cisco 3945 WORK EXPERIENCE: ▪ Work with clients to gather requirements, provide guidance and deliver Network Configuration and Troubleshooting support by utilizing deep understanding of Network Design, Network Security, Routing and Switching Protocols, Network Automation, Virtualization and Cloud Services ▪ Good Operational Experience to Analyze, Isolate and Resolve Issues with Multi-Vendor Equipment including Cisco, Juniper, Huawei, Fortinet, Palo Alto, Mikrotik etc. Routers, Switches, Firewalls & Load Balancers. ▪ Design, Configuration & Troubleshooting Assistance with protocols like OSPF, BGP, STP/RSTP, PBR, MPLS VPNs, GRE and IPSec VPNs, Client VPNs, SSL VPNs, NG Firewalls, NMS & Wireshark etc. ▪ Helping Client by Offering Proof of Concept Labs to Ensure the Proposed Solutions Qualify the Desired Outcomes ▪ Maintain Complete Documentation for Delivered Services like HLD, LLD & ATP ▪ Design and Deploy dynamically scalable, highly available, fault-tolerant and reliable Data Center Network Infrastructure ▪ Expertise in multiple flavors of Linux like RHEL, CentOS, Ubuntu etc. used in Projects including Cisco NSO & OpenStack ▪ Worked on Automation and Data Modelling Tools like Cisco NSO and Yang for Automating MPLS L2, L3 VPN Services ▪ Using Scripting Tools like Python and Bash for Central Configuration Management of Network Devices ▪ Automation of Segment Routing Tunnels using Ansible and Yaml in testbed environment. ▪ Presales of Application Centric Solutions including SDN, SD-WAN, HCI, Endpoint Security & App Monitoring Tools ▪ Network Solution BOQ Verification and Documentation of ongoing Projects.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Nagios Core
    ManageEngine ServiceDesk Plus
    PRTG
    Linux System Administration
    Network Monitoring
    Cisco Certified Network Professional
    Cisco Certified Internetwork Expert
    Cisco UCS
    Network Administration
    Network Design
    Cloud Security
    Cisco Router
    Microsoft Azure
    Cisco ISE
  • US$40 hourly
    A self-motivated, quick learner and capable Technology Consultant with a solid technical and managerial background and a proven record in consultation, planning, preparation, implementation, management & maintenance of various result-oriented IT solutions. With extensive knowledge and strong analytical skills complemented by excellent interpersonal skills and a commitment to customer satisfaction and experience in planning, preparation and designing customized solutions to address specific customer requirements, improve overall productivity, and dramatically increase efficiency. I have about 15+ years of planning, preparation, deployment, support and consultant experience on Microsoft infrastructure solutions including but not limited to Active Directory, ADCS, ADFS, ADRMS, Exchange, SfB, System Center, Private Cloud, Public Cloud, Virtualization, Azure, O365 & security solution.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Microsoft Hyper-V Server
    Fortinet
    Information Security Audit
    Cloud Implementation
    ISO 27001
    Cloud Security
    Private Cloud
    Microsoft SCCM
    Microsoft SCVMM
    Microsoft Active Directory
    Microsoft Exchange Server
    Windows Server
    Microsoft Azure
  • US$50 hourly
    I am an Elastic Stack (ELK) Certified Engineer. I am an expert for Elasticsearch, Logstash, Kibana, SIEM, Beats, Wazuh, Elastalert and other elastic stack products. I have been working with Elasticsearch since its version 1.5. I have implemented large-scale implementations dealing with billions of documents and TBs of data. I have implemented various use cases with Elasticsearch for organizing, cleaning, visualizing and securing data at a large scale. I am also an expert in Solr, Sphinx Search, and Manticore search. I have 10+ years of experience implementing, scaling, fine-tuning large scale full-text search using Solr, Sphinx/Manticore search. Have implemented several large-scale searches with Elasticsearch, Sphinx, Manticore and Solr for eCommerce, forums, portals, internal custom search and more. I am an expert in setting up fully functional, large-scale SIEM using Elastic Stack (ELK). Have implemented log ingestion, thread hunting, alerting, reporting etc. for SIEM. I am an expert of beats, wazuh, elastalert and many more. I am also an expert with XPack for securing Elastic Stack. If you need to implement, upgrade, maintain, optimize, need proof of concept around ELK, I can help. If you are having any sort of issues with Sphinx / Manticore, Elasticsearch or Solr, you should contact me.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Grok Framework
    Grafana
    Kibana
    Logstash
    Firewall
    Elasticsearch
    Magento
    Apache Lucene
    PHP
    Full-Text Search
    Sphinx
    Apache Solr
    MySQL
  • US$66 hourly
    Certified Network Administrator/ Enterprise Ubiquiti Network Expert Certified Systems Engineering Expert Certified Systems Administration, Certified IT Support Specialist/Cyber Security Consultant Certified Network Security Expert (Home / Business), VAPT Certified System Security Expert. Certified HelpDesk Support Specialist Microsoft Azure Certified, Microsoft365/Azure EntraID Network Security Certified Network Security and deployment Consultant Domotz Expert/ Synology consultant Fortigate Certified Sonicwall Expert, Unifi/Ubiquiti Expert Hands on Experience on: Microsoft Exchange Online Windows 10 Administration Server Administration Experr Windows 11 Administration Remote IT Management/ VPN management Windows Server Administration Expert Domain Migration Microsoft Outlook Network Equipment consultation Server Virtualization Microsoft Windows Powershell Microsoft Active Directory Office 365 DNS DHCP Cisco, Fortinet, Fortigate, Pfsense Expert, Unifi/Ubiquiti Expert Administrator UDM pro, USG Expert UDM vpn Expert unifi specialist., MDM solution Specialist(jamfpro, Sophos mdm,) Azure, AWS, Google Work Space, Contabo, Rackspace Unifi, Ubiquiti Expert, SonicWall Expert(VPN troubleshooting) Threat Hunting, IPS ,IDS, WEB SECURITY, QUALYS, SENTINALONE. SOPHOS Network Administration, System Administration, Office365, Intune, MDM, Windows users Administration. Domotz admin, NAS, VLan Expert Windows servers 2016-2022 Failover Clustering , Hyper-V management, RDS, Synology DSM, Virtual Hosting. QNAP , QSAN ,NAS,SAN Active Directory Expert, VPN, Switches ,Routers Zendesk trainer, EDR, XDR, Connectwise Admin, CWRMM, Sentinal one Azure Sentinal. Fortinet, Cisco, Network monitoring Expert, Veeam Backup Specialist(Cloudberry, SPX) HIPPA complaince certified, PCI DSS accessor, PCI DSS complaince Expert. Having Certs (NSE1, NSE2, NSE3) ,CCNA, CCNP(training) Crowd Strike Deployment, TrendMicro deployment. Cloud Network/ System Administrator and Network/System Security consultant NSE 1 NSE 2 ICSI CNSS certified having vast and versatile experience in Network Administration with vast working in cloud technologies, QNAPS, VIRTUAL PRIVATE SERVERS , ACTIVE DIRECTORY. SECURING THE WEBSERVERS , SECURITY OF ON PREM NETWORK. Have worked on the antivirus deployments Crowd strike TrendMicro, Webroot, managing incidents and alerts on them. also have hands on Cisco network designs firewall configurations. Server and system administration grip on Windows Server (2012 2016 2019 2022) remote task management and remote assistant to the clients as well worked with the organization and provided them with tech skills network and system administration support as well as offered soft skills, my primary skillset is Network Design Network security OWASP mitigation System Hardening System Security Network Optimization Server administration Server Migrations Network troubleshooting Firewall Configurations Backup policies / configurations Desktop support. Cloud management Failover clustering Deployment and Management (Windows Server 2019, 2016, 2022). System security Solutions and Deployment. System Hardening. I will be optimizing the networks and will be providing industry solutions to clients including deployment of Antiviruses like crowd strike as well as trend micro I will be looking forward for more technical work here to pursue as a network and security consultant and technical support freelancer. I am sure I will provide quality work to the clients as per their requirements, and for me, client satisfaction is much important than the earned amount. I have worked with the US dental offices and MSP, so I want to invest my time here to reap good results. and serve the people here with my good technical skills about home networks and office networks . Hands on experience on Cisco Switches(CCNA CCNP LEVEL) and SonicWALL's + Fortigate firewalls, QNAP , QSAN, SYNOLOGY, Buffalo NAS, During My freelancing career i have worked on multiple projects like Network Designs solution deployment across the organization and on top of it have hands on Experience of vendor Management and have know how towards the TrendMicro and Crowd Strike. Setting up IT office were the main procedures during my Job Tenures and also Veeam backup deployment across the organization. EDR, MDR AWS AZURE Specialist. Experience in QNAPS, Synology, Virtualization Expert, Hyper V. Hands on Experience for providing Remote IT Support to multiple clients. Managjng Networks servers plus Security configurations.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Ubiquiti
    Information Security
    Network Administration
    Backup Administration
    Intrusion Prevention System
    Backup & Migration
    Cisco Certified Network Associate
    System Security
    Network Engineering
    Microsoft Azure
    Microsoft Active Directory
    Office 365
    System Administration
  • US$50 hourly
    Over 25 years of progressive experience in computer networks field. Comprehensive network technology knowledge in designing, implementation, administration and support. In-depth knowledge of deploying IP protocols and troubleshooting. Experienced in layer 2 switching and 3 routing, security and wireless. Extensive experience in Planning, Implementation, Configuring, Testing and Troubleshooting of networking systems. Competent in handling escalating problems. 7+ years as a Cisco Networking Academy Manager and Instructor. In-depth knowledge of major server OSes. Exceptional analytical abilities. Confident, polite and patient.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    PfSense
    Proxmox VE
    Wireless Network Implementation
    VPN
    Wireless Security
    Ubuntu
    Cisco Certified Design Associate
    OpenVPN
    Server Virtualization
    Linux System Administration
    Cisco IOS
    Network Design
    Cisco Certified Network Associate
  • US$100 hourly
    Strongly motivated network security expert with extensive experience of designing, implemeneting, troubleshooting and documenting complex security architectrures in multiple projects having global scale at companies such as Cisco, Capgemini. Eager to share knowledge and discuss IT and networking technologies with others. Keen on broadening knowledge about network and cloud security. Experienced with vedors/devices: ● Routing: Cisco ASR, Cisco ISR, MikroTik, Cisco Nexus ● Switching: Cisco Nexus, Cisco Catalyst, Juniper, FortiSwitch ● Security: FortiGate, FortiManager, FortiAnalyzer, FortiAuthenticator, Palo Alto, Checkpoint, Cisco ASA, Cisco FTD, pfSense, Sophos ● LB: AVI ● Cloud networking: AWS, OCI Certifications: NSE4 RHCSA RHCE CCNA Cloudflare Accredited Configuration Engineer Cloudflare Accredited Solutions Architect
    vsuc_fltilesrefresh_TrophyIcon Network Security
    FortiGate Firewall
    Cloudflare
    Check Point
    Fortinet
    Palo Alto Firewalls
    Network Architecture
    Cloud Security
  • US$75 hourly
    🥇UPWORK EXPERT-VETTED🥇 I’m a Network and Security Engineer/Architect with 17+ years of experience and an Expert Vetted Freelancer on Upwork with 13,000+ hours. I specialize in high-quality solutions for complex networking and cloud infrastructure challenges. ✨𝗦𝗸𝗶𝗹𝗹𝘀 & 𝗘𝘅𝗽𝗲𝗿𝗶𝗲𝗻𝗰𝗲: 🏆Advanced Networking Solutions: ✅Vendors: Cisco, Juniper, Mikrotik, Arista, Dell, Brocade, Palo Alto, Mellanox, Sonicwall, Fiberstore, Sophos, Zyxel/Zywall, Quagga/Vyos, Fortinet/Fortigate, PFSense/OPNSense, Untangle, Unifi/Edgerouter/Edgeswitch/USG/Controller, Motorola/Cambium/PTP/PMP/Medusa, Aruba, Netonix, Cumulus, PRTG, Hyper-V, ESXI, ZTE, Huawei, DSLAM, OLT/ONT ✅Routing Protocols: RIP, EIGRP, OSPF, BGP, MPLS VPNs ✅Switching Protocols: RSTP, MST, VTP, Private VLANs, HSRP, VRRP ✅VPN Technologies: L2TP, PPTP, S2S IPSec, GRE, OPENVPN, Wireguard ✅Networking Standards: TCP/IP IPv4, IPv6 Planning and Implementation ✅Emerging Technologies: SD-WAN, ZeroTier 🏆Proficient in Linux systems: ✅Distributions: Ubuntu, Debian, CentOS, Fedora ✅Applications: Fastnetmon, GOBGP, Cacti, Librenms, Phpipam, Netbox 🏆Cloud Infrastructure Management: ✅AWS: Client/S2S VPN, VPC, EC2, SG, S3, RT ✅Azure: S2S/C2S VPN, VM, VNET, LB, SG, RT ✅Vultr: Compute, VPC, DC, Peering, RT 𝗘𝗱𝘂𝗰𝗮𝘁𝗶𝗼𝗻: 🎓Master of Sciences in Computers Engineering 🎓Industry-Recognized Certifications: 🌟Cisco: CCDA, CCDP, CCNA, CCNA-Sec, CCNP-R&S, CCNP-ENT, ENARSI, ENCORE, ENSLD, SWSA 🌟Juniper: JNCIA 𝗔𝘃𝗮𝗶𝗹𝗮𝗯𝗶𝗹𝗶𝘁𝘆: ⏰ Every day, Monday to Sunday 02:00- 16:00 EST
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Network Design
    Cisco
    Microsoft Azure
    Amazon Web Services
    Multiprotocol BGP
    Sophos Sophos UTM
    PfSense
    Mikrotik RouterBOARD
    Security Engineering
    Network Engineering
    Ubiquiti
    VPN
    Network Equipment
    Firewall
  • US$35 hourly
    ☘ TOP RATED ☘ 100% Job Success I have been in the industry for more than 9+ years as a System Linux Administrator as well as DevOps. My expertise includes Web Hosting/VPS/Server, Automation Jenkins/Ansible/Terraform, Docker, Linux, Bash Shell/Python scripting. Top Projects: ☘ Jitsi deployment with Ansible and Terraform (panthermediasystem.com) ☘ Build, deploy, and manage websites Java scripts, PHP, WordPress, and Ruby on rails on OVH Cloud with Jenkins and Docker-compose (Adrian.work) ☘ Dockerizing and Deploying .Net Framework and .Net core APIs, AWS ECS, ECR, Jenkins, Github (AdLabs Technology Inc) I am available most of the time in a day to discuss and help the employers even after completing the project. So you can contact me anytime to get my assistance. Thank you, Dat T.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Google Cloud Platform
    Docker Compose
    CI/CD
    NGINX
    Linux System Administration
    Web Hosting
    Ansible
    Jenkins
    Terraform
    Web Proxy
  • US$35 hourly
    I'm a Security Specialist, with +15 yr of experience in the security field and +20 yr in system administration (Linux, AIX, BSD and Windows) on banking, education and R&D sectors. Feel free to get in touch if you need: * Security infrastructure administration or advice * Security Audit & Pentesting * Linux/Windows/AIX system administration or server troubleshooting and LAMP/LEMP stack deployments and fine tunning. I will be glad to collaborate on your project.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    AWS Systems Manager
    Windows Administration
    Wireless Security
    Security Engineering
    Security Infrastructure
    Linux System Administration
    Internet Security
    Security Analysis
    Information Security
  • US$35 hourly
    CCSE, ITILv3 , Fortinet NSE4 CCNP R&S,CCNP Security. In the last 12 years, I have been working on various network products and have gained comprehensive experience in Cisco, Fortinet, Sonicwall, Checkpoint, HP, F5, Radware technologies. I have been involved in the design, configuration, and troubleshooting of Network products. Firewalls: Cisco ASA 5500 Series Cisco ASA 5500-X Series Cisco Firepower 2100Series Cisco Firepower 4100Series Fortigate 400F Fortigate 200F Fortigate 100F Checkpoint 5800 Appliance Checkpoint 12400 Appliances Checkpoint 12600 Appliances Sonicwall TZ Series Sonicwall NSA Series Pfsense ZTNA FortiGate ZTNA Load Balancers: F5 BIG-IP Application Delivery Controllers Radware Application Delivery Controllers Array Application Delivery Controllers Fortinet Application Delivery Controllers. Routers: Cisco, Arista, HP Switches: Cisco Catalyst Cisco Nexus N5K & N9K HP Switches Wireless Controller & Access Points: Cisco WLC, Aruba WLC Unify WLC Meraki
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Cisco Router
    Firewall
    SonicWall
    Cisco Firepower Threat Defense
    FortiGate Firewall
    Zero Trust Architecture
    Web Proxy
    Cisco ASA
    Cisco Certified Network Professional
    Load Balancing
    Check Point
    Cisco Meraki
    VPN
  • US$40 hourly
    I'm an experienced network, cloud and system engineer. Networking : - Design, configurations, implementations, maintenance ; switches, routers, firewalls, monitoring systems, Cisco ISE, Wifi Controllers and APs, VoIP infrastructures - Vendors : Cisco, Checkpoint, Fortinet, PfSense, Mikrotik, Ubiquiti (Unifi),Watchguard, HP, DELL, - Projects : Edge and internal firewalls, DMVPN solutions, Core and DC infrastructures, Wifi Systems, Bank VoIP system (CUCM, IVR, CUBE, Call Center solution) etc - Certifications : Cisco (CCNP Security & Enterprise & VoIP), CCNA CyberOps, Checkpoint CCSA and CCSE Cloud : - Azure infrastructure using portal or automation via Terraform - Resource Group, VNETs, Azure AD, Storage Accounts, VMs, VMSS, private link, VPN site to site and point to site, Enterpise Apps integration, IAAS, PaaS, etc - Intune (MDM), Microsoft365 (Exchange Online, Teams,OneDrive) - SD WAN network solution on cloud (Aviatrix) - Certifications : Azure Administrator Az-104, ACE Associate (Aviatrix) Systems : - Windows Server (AD, file server,DHCP, DNS, GPOs, user and groups, persmissions etc) - Linux (Ubuntu & CentOS) - Veaam Backup solution, VMWare, Proxmomx, Hyper-V
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Fortinet
    PfSense
    Windows Server
    Cisco WLC
    Cisco ISE
    Cisco ASA
    Cisco Router
    Docker
    Check Point
    Network Design
    Linux System Administration
  • US$30 hourly
    Welcome to my Upwork profile! I am an experienced Cybersecurity Engineer with a strong background in ethical services, penetration testing, and more. I specialize in securing digital assets and ensuring the utmost protection for clients' sensitive data. With a passion for staying ahead of emerging threats, I offer top-notch services that exceed expectations. Whether you need assistance with vulnerability assessments, network security, or creating robust defenses, I am here to provide comprehensive solutions tailored to your specific needs. Skills and Specializations: Ethical Consultation: I possess advanced skills in performing comprehensive penetration tests to identify vulnerabilities and weaknesses in systems, networks, and applications. I am proficient in employing various tools and techniques, including reconnaissance, scanning, exploitation, and post-exploitation analysis. Penetration Testing: I have extensive experience in conducting penetration tests across different environments, including web applications, mobile applications, cloud platforms, and infrastructure. I am well-versed in industry-standard methodologies and frameworks, such as OWASP, NIST, and PCI DSS. Vulnerability Assessment: My expertise lies in assessing and analyzing systems for potential vulnerabilities, utilizing both automated and manual techniques. I am adept at generating detailed reports with prioritized recommendations for remediation, helping you address vulnerabilities effectively. Network Security: I am skilled in designing and implementing robust network security solutions. This includes configuring firewalls, intrusion detection/prevention systems, VPNs, and developing secure network architectures. I can also conduct network traffic analysis to identify and mitigate potential threats. Incident Response: With a focus on incident response management, I am well-equipped to handle and respond to cybersecurity incidents promptly and effectively. I can conduct forensic investigations, collect evidence, and develop incident response plans to minimize damage and facilitate recovery. Security Auditing and Compliance: I possess knowledge in conducting security audits to evaluate adherence to industry regulations and standards. I am proficient in assisting organizations with achieving compliance with various frameworks, including GDPR, HIPAA, ISO 27001, and others. Experience: I have a proven track record of delivering exceptional results for a diverse range of clients, including startups, small businesses, and enterprise-level organizations. My experience spans across multiple industries, including finance, healthcare, e-commerce, and technology. I take a customized approach to each project, tailoring my methodologies to meet specific requirements and objectives. Why Choose Me? Expertise and Professionalism: With years of experience in the field, I bring in-depth knowledge and industry best practices to every project. Results-Oriented Approach: I focus on delivering tangible results that enhance your cybersecurity posture and protect your valuable assets. Confidentiality and Integrity: Your sensitive information and privacy are of utmost importance to me. I adhere to strict confidentiality standards and maintain the highest level of integrity in all engagements. Effective Communication: I believe in clear and transparent communication throughout the project lifecycle, ensuring that you are kept informed and involved at every step. Let's work together to safeguard your digital infrastructure and fortify your defenses against cyber threats. Contact me today to discuss your cybersecurity needs and explore how I can help you achieve peace of mind in the face of evolving risks.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Internet Security
    Blockchain Security
    Vulnerability Assessment
    Kali Linux
    Blockchain, NFT & Cryptocurrency
    Ethical Hacking
    Information Security Audit
    Website Security
    Social Engineering Assessment
    Cloud Security
    Information Security Threat Mitigation
    Information Security
    Penetration Testing
    Microsoft Office
  • US$130 hourly
    I am a Network Engineer/Consultant with more than ten years of experience. My primary focus is Cisco Technologies. I am certified in Security, Wireless, Collaboration(Voice), Design, Data center.. I help businesses design, build and manage networks saving them time and money. I just get things done with lots of common sense, usability, and best practices. Cisco/Meraki firewalls (ASA/Firepower), Routers, Switches, Wireless... Cloud technologies AWS and Azure CCNA R&S, CCNA Security, CCNA Wireless, CCNA Collaboration, CCNP R&S
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Network Planning
    Business with 100-999 Employees
    Network Engineering
    Wireshark
    Network Design
    Cisco Certified Network Associate
    Cisco Meraki
    Network Monitoring
    Wireless Network Implementation
    Network Analysis
    Cisco Certified Network Professional
    Network Administration
    Cisco ASA
  • US$90 hourly
    Senior Network Engineer, over 10 years experience in IT networks. Telecom, routing, switching, wireless, VOIP, VPN, firewalls, cabling, LAN/WAN. video surveillance, Cisco, Meraki, Ubiquiti, Netgear, SonicWall, HP and more. Cisco Routers, ISR 1900,2900.3900, 4300,4400, Voice Gateways, VG224, VG310, VG320,VG350, VG450. Voice, CSU/DSU, PRI, SIP. PSTN, POTS, analog lines. Cisco Wireless LAN Controllers ( WLC ) 9800, 5760, 5520, 5508, 4402, 2504. Access Points indoor,outdoor, CAPWAP, LWAPP, autonomous, mobility express, mesh and repeaters. IP Phones VOIP IP Phones Telecom Firewall ASA Network Security AnyConnect Cisco Unified Communications Call Manager, CUCM Collaboration Cisco Unity Connection, CUC CME Cisco Unity Express, CUE Power over Ethernet , POE , Network cabling Cisco Catalyst switches, 2960X, 9200, 9300, 3650, 3850,3750, 4506, 4510, 4500X Meraki Switches ,firewalls, Access Points and Cameras.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Wireless Network Implementation
    VoIP Administration
    Cisco Certified Network Professional
    Network Video Recorder
    Virtual LAN
    Wireless Communication
    Network Administration
    Network Design
    Cisco Meraki
    Network Engineering
    Structured Cabling
    Cisco Certified Network Associate
    Firewall
    VPN
  • US$90 hourly
    I have worked across the field in security, focused on engineering, architecture and attack research with an emphasis on cloud security especially Azure AD and Microsoft 365. I have provided this expertise to Fortune 5 organizations and across multiple industries including retail, health care, and utilities. I can speak just as easily to the geeks and business leaders, often providing an interpretation layer between groups. * Built and sold Microsoft 365 analysis solution valued at $40M dollars. * Rebuilt end user 802.1x infrastructure with over 225k active users daily. * Identified post-compromise exploits which allows attackers to steal tokens from Microsoft Teams.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Software Architecture & Design
    Internet Security
    Vulnerability Assessment
    Network Design
    WordPress
    Security Analysis
    Security Engineering
    Security Infrastructure
    Automation
    User Authentication
  • US$50 hourly
    CCIE R&S Certified Network Engineer with 10 years of experience in Networking. - Enterprise data and voice networks; - Service Provider networks; Experience in IOS-XR platforms; - Wireless networks; - Network security with Cisco ASA; CCIE R&S Certified. Experience with following Cisco devices: - Cisco IOS XR: ASR9K, NCS5K - Cisco SOHO and branch office routers: Cisco 800, 1700, 1800, 1900, 2800, 3600, 3700, 3800 series - Cisco service provider routers: Cisco 7200, 7300, 7500, 7600, GSR 12000, ASR 1000, ASR 9000 platforms - Cisco Catalysts switches: 2950, 2960, 3550, 3560, 3750, 3800, 4500, 6500 - Cisco ME series switches: 3400, 6524 - Cisco PIX 515E Experienced in configuring: - Routing: IGP (EIGRP, RIP, OSPF), BGP, NAT, PAT, PBR, MPLS (MPLS-VPN, EoMPLS, VPLS) - Switching: VLANs, VTP, dot1q, q-in-q, Rapid PVST+, MSTP. - Network security: VPNs (IPSEC, IPSEC/GRE), ACLs, Layer 2 Security Features (port security, - DHCP snooping, dynamic ARP inspection, IP source guard) - High Availability: HSRP, VRRP, GLBP, Etherchannel, SSO, IP SLA. - WAN: PPP, PPPoE, PPP Multilink, HDLC. - QoS: Traffic policing and shaping, traffic prioritization. - Cisco PIX: NAT, Failover, Remote VPN, ACLs. I'm looking for new interesting projects related to implementing and designing Cisco IP Networks and IT consulting.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Cisco Certified Internetwork Expert
    Network Equipment
    Cisco Certified Network Associate
    Network Administration
    Virtual LAN
    Cisco WLC
    Cisco Router
    Cisco Certified Network Professional
    Network Design
    TCP/IP
    Cisco IOS
    VPN
    Cisco ASA
    Internet Protocol Security
  • US$25 hourly
    Overview: As a seasoned System Engineer with 7+ years of experience, I specialize in providing robust infrastructure solutions with expertise in Linux administration, DNS management, and Email Delivery. I am passionate about optimizing system performance, ensuring seamless operations, and implementing industry best practices. With a strong track record of delivering successful projects, I am dedicated to providing efficient and reliable solutions tailored to my clients' unique needs. Key Skills: ✅Linux System Administration: Ubuntu, CentOS, Debian | Server Setup, Configuration, and Optimization | Security Hardening | Performance Tuning | Shell Scripting ✅DNS Management: Zone Configuration | Record Management (A, CNAME, MX, etc.) | DNSSEC Implementation | BIND, PowerDNS, NSD ✅Email Delivery: Mail Server Setup (Postfix, Exim, Sendmail) | SMTP Configuration | SPF, DKIM, DMARC | Blacklist/Whitelist Management | Deliverability Optimization Services I Offer: System Administration: - Linux server setup, configuration, and maintenance. - System and network security hardening to safeguard against potential threats. - Performance optimization to enhance overall system efficiency. DNS Management: - DNS infrastructure setup, including domain registration, zone configuration, and record management. - Implementation of DNSSEC for enhanced security and validation. - Troubleshooting DNS-related issues and resolving them promptly. Email Delivery Solutions: - Mail server setup and configuration to ensure reliable email delivery. - Implementation of email protocols and best practices (SPF, DKIM, DMARC) to maximize deliverability and minimize spam. - Blacklist and whitelist management to maintain a clean reputation and avoid email delivery issues. Why Choose Me? - Extensive Experience: I have successfully completed 100+ projects, gaining in-depth knowledge and hands-on expertise. - Client Satisfaction: I maintain a stellar track record of positive feedback from satisfied clients who appreciate my professionalism, prompt communication, and ability to meet deadlines. - Solution-Oriented Approach: I analyze your requirements, devise tailored solutions, and implement best practices to address your specific needs. - Collaboration and Communication: I believe in transparent and effective communication, working closely with clients to ensure their vision is realized. ✅If you are looking for a reliable and skilled System Engineer who can optimize your infrastructure, streamline your DNS management, and enhance your email delivery capabilities, I am here to assist you. Let's discuss your project requirements and take your systems to new heights of efficiency and reliability.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    AWS Systems Manager
    Email Deliverability
    Web Hosting
    Network Administration
    cPanel
    Plesk
    Mail Server Implementation
    Bash Programming
    Linux System Administration
    DNSsec
    System Administration
    Google Cloud Platform
    Python
    DNS
  • US$12 hourly
    Hello there, I am a Security Engineer Specialized in Web application Security and penetration Testing. I have more than 3 years of Experience in Penetration Testing in Web application and Server. I have done more than 10 Penetration Testing and I also have written over 15 Cyber Security blogs. Certifications Practical Ethical Hacking (PEH) Blue Team Scholarship CCNA Skills 1. Penetration Testing 2. Web and Mobile Application Security Testing 3. API Security Testing 4. Static Code Analysis 5. Preparing Cyber Security Learning Module, Blog and Training 6. Mobile Application Security 7. IoT Security 8. Social Engineering Awareness 9. Endpoint Security 10. Threat Hunting 11. Secure Coding Practices 12. Wireless Network Security 13. Malware Reverse Engineering Programming Proficiency: 1. Python Scripting and Development 2. Bash Scripting 3. Java Development
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Python
    Penetration Testing
    MySQL
    Ethical Hacking
    Back-End Development
    SQL
    Vulnerability Assessment
    Web App Penetration Testing
    Digital Forensics
    Content Writing
    Encryption
  • US$25 hourly
    With 8 years of industry experience collaborating with clients on freelancing platforms, I have undertaken diverse projects spanning various technologies and platforms. My expertise encompasses: 💡 Cloud Platforms: Azure, AWS, GCP 💼 Collaboration Tools: Office365, SharePoint, PowerApps 🔒 Identity and Access Management: Active Directory 🖥️ Server Management: Windows Servers, Linux Servers 🚀 Microservices: Implementation and orchestration 🔒 Security Compliance: PCI Compliance 📦 Container Orchestration: Kubernetes 🔧 Automation and Deployment: Jenkins, Ansible, Puppet, Chef 🔍 Monitoring Tools: Nagios, Icinga2 🌐 Virtualization: HyperV, VMWare, Proxmox 📧 Mail Servers: Exchange 2013, Postfix with ASSP 🔐 Network and Firewall: Mikrotik, PFsense, SOPHOS 🖥️ Web Servers: Nginx, Apache, IIS 💻 Scripting Languages: PowerShell, Bash, Python Basic, YAML Throughout my career, I consistently deliver high-quality results within agreed-upon timeframes. I approach tasks with confidence, ensuring client satisfaction. My dedication lies in providing comprehensive solutions tailored to each project's unique requirements. By hiring me, you can trust that I will leverage my extensive experience and knowledge to efficiently and effectively execute your tasks. I am committed to open communication, close collaboration, and delivering results that meet or exceed your expectations.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Internet Security
    Network Access Control
    Network Administration
    Linux System Administration
    VMware Administration
    MikroTik
    Kubernetes
    Network Design
    Proxmox VE
    VMWare
    CentOS
    System Administration
    Linux
    Microsoft Windows
  • US$64 hourly
    My name is Stuart Gray. I am a 39 year old network security engineer. Cutting my teeth with IBM's X-Force Advanced Research and Development at 19, I have almost 20 years of experience, as a professional, in the industry. Around 10 or 11 years old, my grandfather introduced me to Microsoft's Visual Basic IDE (he's had an extremely successful career as a business consultant (finding creative solutions for complex business problems). I was immediately hooked. At 16 years old, I launched a small hosting company. A short while later, I was hired by Internet Security Systems (Creators of BlackICE Defender), to work in their X-Force Advanced Research and Development team. Two years later, they were acquired by IBM. where I continued to work for 6 more years as a software developer (supporting their Proventia IDS/IPS product line *Intrusion Detections/Prevention System*, Internet/Enterprise Scanner product line and Managed Security Services). I left the traditional office for the freedom of independent contracting because it compliments my strengths much more easily. As someone who was drafted into accelerated learning in Kindergarten, I've favored research-based, challenge-based and project-based learning models since 3rd grade. Being independent allows me to continue to grow my knowledge base on my own terms, which in turn keeps me motivated and engaged in self-improvement. I do also appreciate traditional education methods. In my older age, I'm quick to defer to peer-based, mentor-based and teacher-student-based learning methods any time I realize I've hit any kind of speed bump, be it struggling with a concept or simply being lost and wondering how to improve from my grip on the information. It's never been enough for me to know "what it does and how it does it." My thirst for knowledge always pushes me to learn "why it does it that way" and "can I make it better?" My current career objectives are to maintain and advance my knowledge of POSIX-compliant systems. To maintain and advance my knowledge of “cloud” and virtual environments, with a heavy focus on their security, management and automation. To maintain and advance my knowledge of POSIX systems integration with non-compliant environments (Microsoft, etc..). To maintain and advance my knowledge of network security and the network security climate, especially in relation to “real world” scenarios. Some of my strengths are: Managing virtual and cloud-based environments (VMWare, Oracle VirtualBox, KVM, libvirt, Azure, Amazon AWS, Digital Ocean, Linode, Google Cloud Platform), Linux Systems Administration, Unix Systems Administration, Solaris Systems Administration, Advanced knowledge of TCP/IP, Advanced knowledge of network security, Windows Systems Administration, OSX Systems Administration, Python scripting/programming, shell scripts (BASH, ZSH), Linux Kernel Optimization (rebuild from scratch), “Linux From Scratch”, FreeBSD, OpenBSD, HP/UX, AIX. Proprietary firewall environments (IBM Proventia, SonicWall, Fortinet, Palo Alto, Cisco), All Office Productivity Suites (MS Office, IBM Lotus Notes, etc..), Data Center Resource Optimization (airflow, power usage, climate control systems), Malware Prevention/Detection/Analysis/Removal (Strong focus on “malware behavioral characteristics,” detecting malware that’s never been seen before through behavioral techniques and heuristics), Search Engine Optimization strategies, web development, Server Migration, Disaster Prevention and Recovery, Encryption best practices, management and theories, Wake-on-LAN systems and management, this list is far from exhaustive, it really keeps going and going. The important part to note is that I am an engineer. I find solutions. I seek to understand and fix things, and my thirst is unquenchable. :)
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Containerization
    Red Team Assessment
    Kotlin
    Linux System Administration
    WordPress
    cPanel
    Ecommerce Website Development
    Virtualization
    Shopify
    DigitalOcean
    System Hardening
    Google Cloud Platform
    Bourne Shell
    Python
  • US$49 hourly
    Hello , My name is Ahmed Alzaeem . Cisco ISP Network Engineer ,Tier1 ISP NOC engineer , More than 10 years experience. Asterisk Pbx Developer VPN Expert , WIFI Networks Operator , Squid cache Proxy expert . Developer for Many residential Proxy service Providers . Consultant with significant design and implementation complex networks. Windows servers administrator , Linux systems administrator , Mikrotik routers boards and Security consultant.Most experienced with VPN/Proxies over IPV4 & IPV6 protocols . Internet optimisation and QOS expert. Always meets client demands and develops good long-term customer relationships. my skills are below : Cisco ASA firewalls IPS/IDS Cisco IOS VPN/Socks5 IPV6 Protocol Squid Cache proxy DVR & CCTV systems Tunnelling & Traffic encryption SNMP Monitoring & Netflow Technical Support OpenDns Filtering VOIP Asterisk , Freepbx & Elastix Wifi Planning Raspberry Pi Pfsense firewalls Quality of service Linux iptables Linux Bash scripting PHP/Mysql Windows server administration Mikrotik
    vsuc_fltilesrefresh_TrophyIcon Network Security
    Debian
    Security Operation Center
    Python
    OpenVPN
    Wireless Network Implementation
    Squid
    Cisco IOS
    Bash Programming
    Asterisk
    CentOS
    IPv6
    Internet Protocol Security
    VPN
    Cisco ASA
  • US$30 hourly
    Experienced IT system and network administrator who has been responsible for managing and maintaining the technology infrastructure of several organizations over the past decade. In my current role, my responsibility is to ensure the smooth operation and security of the company's servers, workstations, networking equipment, and cloud-based services. Certified in CCNA , CCNA security , CCNP , CCNP -scor, AZ-900 , AZ-104, AWS Certified Cloud Practitioner , ITIL Foundation V3 certified.
    vsuc_fltilesrefresh_TrophyIcon Network Security
    OKTA
    Cisco Meraki
    Incident Management
    Managed Services
    Sophos Sophos UTM
    VMware Administration
    Network Design
    Network Administration
    Linux
    Microsoft Active Directory
    Windows Server
    System Administration
    Microsoft Windows
    Microsoft Azure
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

Inside IT Security: How to Protect Your Network from Every Angle

Network security. Cyber security. Endpoint security. These different, often overlapping arms of IT security can get confusing. As hackers get smarter, it’s increasingly important to know what each does and how to implement them into your own network.

In the wake of the highly-connected Internet of Things (IoT) and the rise of the cloud, we’re facing increased vulnerabilities to our networks—networks that are less monolithic, legacy architectures and more distributed, microservice-based networks. With large-scale data breaches making headlines, whether you’re a small startup or an enterprise organization, security should be a top priority.

In this article, we’ll explore the different types of IT security and what technologies and methods are used to secure each so you can arm your network with the people and plans you need to have excellent lines of defense in place and keep attacks at bay.

The IT security chain

Why are there so many types of IT security? The more links in a network’s chain, the more opportunities for hackers to find their way in. Each component requires its own subsequent security measures—with many of them overlapping and working in tandem, much like the actual components of a network do.

It’s also important to note that with security, there’s no one-size-fits-all approach. Every network is different and requires skilled professionals to create tailored plans across all fronts: apps, databases, network devices, cloud servers, IT infrastructures, and the often weakest link in the security chain: users. These security plans are living, breathing things that need to be updated, upgraded, and patched on a constant basis, too.

Let’s start broad and work our way into narrower fields of security.

It all boils down to information: information security, IT security, and information assurance

Information security and information technology (IT) security sound similar, and are often used interchangeably, but they’re slightly different fields. When we’re talking about information security (or infosec), we’re actually referring to protecting our data—whether that’s physical or digital. IT security is a bit more specific in that it’s only referring to digital information security.

IT security pretty much covers all of the types of security within a network, from components like databases and cloud servers to applications and the users remotely accessing the network. They all fall under the IT security umbrella.

Within this is another term to know: information assurance. This means that any important data won’t be lost or stolen in the event of an attack or a disaster—whether that’s a tornado wiping out a server center or hackers breaking into a database. It’s commonly addressed with things like backups and offsite backup databases and rests on three main pillars: confidentiality, integrity, and availability (CIA). These philosophies carry over into every other aspect of security, whether it’s application security or wireless security.

IT security experts (also, system administrators and network admins, which we’ll talk about next) are one of the most important team members you can hire. They’re responsible for the safety and security of all of a company’s hardware, software, and assets, and regularly audit back-end systems to ensure they’re airtight. Through security analysis, they can identify potential security problems and create “protect, detect, and react” security plans.

Network security: the best defenses

Network security is anything you do to protect your network, both hardware and software. Network administrators (or system administrators) are responsible for making sure the usability, reliability, and integrity of your network remains intact. A hacker is capable of getting into a network and blocking your access, for example by holding a system hostage for a bitcoin ransom. You need an excellent defense in place to ensure you’re protected.

Detecting weaknesses in a network can be achieved through:

Security engineering: the practice of protecting against these threats by building networks to be safe, dependable, and secure against malicious attacks. Security engineers design systems from the ground up, protecting the right things in the right ways. If a software engineer’s goal is to ensure things do happen (click here, and this happens), a security engineer’s goal is to ensure things don’t happen by designing, implementing, and testing complete and secure systems.

As a part of security engineering, there are proactive measures to predict where vulnerabilities might lie and reinforce them before they’re hacked:

  • Vulnerability assessment: Engineers identify the worst case scenarios and set up proactive plans. With security analysis software, vulnerabilities in a computer, network, or communications infrastructure are identified and addressed.
  • Penetration testing: This entails deliberately probing a network or system for weaknesses.
  • Network intrusion detection systems (NIDS): This type of software monitors a system for suspicious or malicious activity.

Network admins are able to target threats (whether through suspicious activity or large queries to a database), then halt those attacks, whether they’re passive (port scanning) or active, like:

  • Zero-day attacks, also called zero-hour attacks—attacks on software vulnerabilities that often occur before the software vendor is aware of it and can offer a patch. Or, hackers will initiate attacks on the software vulnerability the day that it’s made public there’s an issue, before users can install patches (hence the name “zero day”)
  • Denial of service attacks
  • Data interception and theft
  • Identity theft
  • SQL injection

Other methods of protecting networks include:

  • IT Security frameworks: These act like blueprints for a company to set up processes and policies for managing security in an enterprise setting. Which a company uses can depend on the industry and compliance requirements. COBIT is popular among larger, publicly traded companies, ISO 27000 Series is a broad set of standards that can be applied to a number of industries, and NIST’s SP 800 Series is used in government industries, but can be applied elsewhere.
  • Password “salt and peppering”: Adding salt, or random data, to a password makes common passwords less common. A pepper is also a random value attached to the password, which is helpful in slowing hackers down.
  • Authorization, authentication, and two-factor authentication (sometimes sent via SMS, although this can prove vulnerable as well)
  • Virtual Private Networks (VPNs)
    • Application whitelisting, which prevents unauthorized apps from running on a computer
    • Firewalls: Block unauthorized access to a network or data interceptions
    • Honeypots: These are like decoy databases that attract hackers but don’t house any important information.
  • Anti-virus software
  • Encryption—decoding data, in transit or at rest, including end-to-end encryption often used in messaging apps and platforms that only allows encrypted messages to be read by sender and receiver

Within network security is also content security, which involves strategies to protect sensitive information on the network to avoid legal or confidentiality concerns, or to keep it from being stolen or reproduced illegally. Content security largely depends on what information your business deals in.

Endpoint security: securing the weakest link

It’s said that users are often the weakest link in the security chain, whether it’s because they’re not properly educated about phishing campaigns, mistakenly give credentials to unauthorized users, download malware (malicious software), or use weak passwords. That’s why endpoint security is so crucial—it protects you from the outside in.

Endpoint security technology is all about securing the data at the place where it both enters and leaves the network. It’s a device-level approach to network protection that requires any device remotely accessing a corporate network to be authorized, or it will be blocked from accessing the network. Whether it’s a smartphone, PC, a wireless point-of-sale, or a laptop, every device accessing the network is a potential entry point for an outside threat. Endpoint security sets policies to prevent attacks, and endpoint security software enforces these policies.

If you’ve ever accessed a network through a virtual private network (VPN), you’ve seen endpoint security in action. Malware is one of the core threats addressed by endpoint security, including remote access trojans (RATs), which can hack into a laptop and allow hackers to watch you through your webcam.

Internet security: guarding against cyber crimes

The internet itself is considered an unsecured network—a scary truth when we realize it’s essentially the backbone for how we give and receive information. That’s where internet security (or cyber security consulting) comes in, and it’s a term that can get pretty broad, as well. This branch of security is technically a part of computer security that deals specifically with the way information is sent and received in browsers. It’s also related to network security and how networks interact with web-based applications.

To protect us against unwittingly sharing our private information all over the web, there are different standards and protocols for how information is sent over the internet. There are ways to block intrusions with firewalls, anti-malware, and anti-spyware—anything designed to monitor incoming internet traffic for unwanted traffic or malware like spyware, adware, or Trojans. If these measures don’t stop hackers from getting through, encryption can make it harder for them to do much with your data by encoding it in a way that only authorized users can decrypt, whether that data is in transit between computers, browsers, and websites, or at rest on servers and databases.

To create secure communication channels, internet security pros can implement TCP/IP protocols (with cryptography measures woven in), and encryption protocols like a Secure Sockets Layer (SSL), or a Transport Layer Security (TLS).

Other things to have in an internet security arsenal include:

  • Forms of email security
  • SSL certificates
  • WebSockets
  • HTTPS (encrypted transfer protocols)
  • OAuth 2.0, a leading authorization security technology
  • Security tokens
  • Security software suites, anti-malware, and password managers
  • Frequently updating and installing security updates to software, e.g., Adobe Flash Player updates
  • Encryption, and end-to-end encryption

Cloud security: protecting data that’s here, there, and everywhere

Much of what we do over the web now is cloud-based. We have cloud-based servers, email, data storage, applications, and computing, which means all of the communication between onsite and the cloud needs to be secure, too. With all of this connectivity and the flowing of (sometimes sensitive) information comes new concerns with privacy and reliability—and the cloud can be notoriously vulnerable. This has given way to a new subdomain of security policies: cloud computing security.

Computer security, network security, and information security as a whole all need to be optimized for the cloud. For businesses that use public clouds, private clouds, or a hybrid cloud—information is getting exchanged between the two regularly and needs to be protected.

Building a cloud security framework involves creating a strategic framework for how all operations will happen in a cloud environment, managing access, protecting data, and more.

Application security: coding apps to be safe from the ground up

A lot of the internet security focus is on patching vulnerabilities in web browsers and operating systems, but don’t neglect application security—a majority of internet-based vulnerabilities come from applications. By coding applications to be more secure from the start, you’re adding a more granular layer of protection to your internet and network security efforts, and saving yourself a lot of time and money.

App security does rest on top of many of the types of security mentioned above, but it also stands on its own because it’s specifically concerned with eliminating gaps and vulnerabilities in software at the design, development, and deployment stages. Security testing (which should be conducted throughout the code’s lifecycle) digs through the app’s code for vulnerabilities, and can be automated during your software development cycle.

Choosing a language, framework, and platform with extra security fortifications built in is paramount, too. For example, Microsoft’s .NET framework has a lot of built-in security, and the Python Django-style Playdoh platform addresses application security risks. Rising in popularity is the Spring Security framework, a Java framework known for excellent built-in authentication and authorization measures, and the PHP framework Yii prioritizes security, as well.

Aside from framework choice, there are a few strategies to bolster application security, including:

  • Ensuring TLS
  • Authentication and authorization measures
  • Data encryption
  • Sandboxing applications
  • Secure API access
  • Session handling

Not sure where to start? Enlist the help of a network security freelancer today

By adopting a proactive security stance, educating your users, and taking advantage of the latest in authentication measures, you’ll be better able to prevent, detect, and strengthen your company against attacks. However, it’s important to remember that securing your network isn’t a one-time thing—it’s an ongoing process that needs to be constantly occurring and evolving along with your website and organization to ensure you’re protected in the face of the ever-changing landscape of security threats. Luckily, there are plenty of security experts with a variety of specialties on Upwork you can hire to help assess your network for vulnerabilities and create a custom security plan—browse network security freelancers today to get started. You can also utilize IT services on Upwork that matches you with proven IT talent.

View less
Schedule a call