Hire the best Certified Cloud Security professionals

Check out Certified Cloud Security professionals with the skills you need for your next job.
  • $200 hourly
    Solution-oriented, CISSP and CISM certified, information security leader, leveraging 20 years of high-level information security compliance experience. Fifteen years experience as Chief Information Security Officer in a healthcare / financial services company. Security Frameworks: ISO 27001 • SOC2 • HITRUST • NIST CSF • CMMC Regulations: GDPR • HIPAA • PCI DSS • NIST 800-171 Education: Drexel University - Bachelor of Science in Computer Science Delaware County Community College - Computer Science, Associate in Science Certifications: CISM - Certified Information security manager CISSP - Certified Information systems security Professional CMMC-RP - Cybersecurity Maturity Model Certification Registered Practioner
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Cloud Security Alliance
    Certified Information Systems Security Professional
    IT Compliance Audit
    ISO 27001
    HIPAA
    SOC 2 Report
    Information Security Audit
    Information Security
    Cybersecurity Management
  • $85 hourly
    I am a Certified Information Security Auditor (CISA) . I am an expert leading SOC 1/SOC 2 engagements and it's variations (Type I/Type II), ISO27001, HIPAA and HiTrust. I have extensive experience leading compliance design and implementations in preparation for audit engagements including both evidence gathering and report reviews. I have worked both in the internal audit and external audit sectors for one of the largest public accounting firms in the US. I work with businesses of varying sizes from start-up to Cloud 100. I am passionate about "right sizing" business process to narrow down the focus areas to drive efficient implementation of controls on an ongoing business. If you have any technology compliance needs or require answers to general compliance questions or guidance feel free to reach out to me.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Business Continuity Plan
    Information Security Audit
    Security Infrastructure
    Regulatory Compliance
    Information Security Governance
    Policy Writing
    Compliance
    GDPR Compliance Review
    SaaS
    SOC 1 Report
    HIPAA
    Compliance Consultation
    IT Compliance Audit
    Risk Assessment
    Sarbanes-Oxley Act
  • $65 hourly
    Mr. Lunsford has over twenty years of management and leadership experience in the military and private sector of IT operations, including certification in Network Management, Cybersecurity, Encryption, and Information Assurance. Mr. Lunsford holds certifications and certificates from the ARMY, CCNA, CompTIA, and EC-Council. Mr. Lunsford specializes in Cyber Security, Governance Compliance, Network and Device Configuration Management, and Risk management. As an industry-certified professional. Mr. Lunsford provides services as a consultant or an assessor based on the organization's request to meet their required compliance Framework. This can include but is not limited to: • NIST 53 Federal Systems • FedRAMP, StateRAMP, TXRAMP Federal and/or State Systems • NIST 171 Non-Federal Systems for Contractor Agencies • CMMC 2.0 L1, L2, & L3 Non-Federal Systems for Contractor Agencies • ISO 27000, 27001, 27002 • SOX • SOC 2 • PII, PHI • PCI-DSS Mr. Lunsford’s project specialty includes: • Controlled Unclassified Information (CUI) • Federal Contract Information (FCI) • System Security Plan (SSP) • Plan of Action and Milestones (POA&M) • SCOPE Boundary Design • Network and Topology Flow Diagrams • Risk Management Plan and Assessment • Incident Response Plan and Processes • Change and Configuration Management Plan and Processes • GAP Analysis and Remediation • Security Policies, Procedures, Processes, Plans, Matrixes, Inventories, and more. Mr. Lunsford’s capabilities include: • Ability to trace and develop data and system life cycle methodologies. • Lead organizations through compliance projects from beginning to end. • Provide educational services to staff and other members in support of organizations. • Coordinate tasks through project management tools and mechanisms. • Provide consulting services. • Provide assessments based on the organization’s readiness. • Develop and assist organizations that struggle with policy development. • Provide organizations with a roadmap to compliance that includes documents, checklists, details, and questions to prepare the organization for certification. Mr. Lunsford’s solutions include: • Compliance documentation • Evidence collection and attestations • System Testing Metrics • Hardware and Software • End Point Management and Mobile Device Management • Training and Education • Encryption • Storage, Backup, and Archiving • Risk and Incident Management
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Certified Information Systems Security Professional
    Security Infrastructure
    Risk Assessment
    Security Policies & Procedures Documentation
    SOC 2 Report
    NIST SP 800-53
    IT Compliance Audit
    Incident Response Plan
    ISO 27001
    FedRAMP
    Information Security Consultation
    Cybersecurity Management
  • $30 hourly
    I have executed some 44 projects in upwork in information security, governance, IT service management, SIEM, and others and earned customer accolades. I continue to nurture my skills that will benefit my customers. I am all for value creation in IT because every penny spent must return value and do the business and IT a secure and safer workplace. Govind has spent 25 years in the IT and he is - ISO 27001 Lead Implementer from PECB Canada - ITIL Expert V3 , ITIL4 FL, ITIL4 MPT Certified - Certified ISO 27001 Lead Auditor, ISO 22301 Lead Auditor, ISO 20000 Lead Auditor - COBIT5 certified in the IT Governance - PMP, PRINCE2, - CSQA, - ISO 20000 Implementer - DevOps Master Currently pursuing education in CISSP and Data Privacy Skills :- Over last decades he has extensively worked and provided solutions in below areas. He brings multiple skills. - Implementing GRC - HIPAA, SOX, PCI/DSS, HITRUST 9.3, FedRamp, SOC2 (T1/T2) - Implementing Unified Controls for Security (UCF) - Implementing Information Security framework using ISO 27001/SOC2/ISO 22301 - Cybersecurity incident response management using NIST, SANS, ISO 27035, COBIT - Risk Assessment, IT Auditing - Jira Implementation both Project and ServiceDesk - Gap Analysis of IT Asset management, Compliance, COBIT Processes - Implementing Best Practices using ITIL/COBIT5 Processes - Implementing BPM Solutions using Appian, Bonitasoft, AgilePoint - Implementing Monitoring framework for IT Devices using Zabbix - Performance and Capacity solutions - Workflow automation - IT Service management using ServiceNow as a architecture - Implementing DevOps End to end for CI, CT, CD - Gap Analysis for CMDB and road map for improvements - A well groomed developer in scripting and development in various technologies - Attlasian Jira admin activities - Robotic Process Automation using UIPath, BluePrism, AutomationAnywhere Education : He is a post graduate in the Statistics with a specialty in Operations research and SQC. He then did Post graduate diploma in the Reliability. He has worked in niche technologies and fortune 500 clients since 2 decades across the globe. Extras :- He is editor of a book called "How to reduce cost of software testing" published by CRC Press and has spoken in conferences and written articles. Passion for Excellence:- He is passionate on creating value in the information technology space and is doing research in various areas such as IT Asset management, IT Cost management, Performance and scalability management. He is eager to help clients in below skills a.Implementing IT Governance, Risk and Compliance using COBIT5 framework b.Implementing ITIL best practices c.Implementing Test Automation using Selenium and other tools d.Implementing DevOps solutions in cloud and non cloud e.Implementing Security solutions using ISO 27001 and COBIT5 framework f.Implementing Business Process Automation using Bonitasoft, Agilepoint NX, Appian, BPM Online and others g.Implementing SIEM using Zabbix and other tools h.Implementing ServiceNow ITSM Tool as an architect i.Implementing a monitoring framework using Zabbix for capacity management j.Compliance like HIPPA, PCI DSS j.IT Audits Availability : I am available for assignments immediately on request. Major clients Worked : British Telecom, MetLife, Liberty Life, Euromax, Covad, UHI and many more. Visas : I had H1 Visa US, WP for UK, Netherlands, South Africa. Currently have B1 visa for US and can travel if there is a need Will be glad to associate to create value in IT
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Project Risk Management
    Unified Threat Management
    ISO/IEC 20000
    Business Continuity Plan
    Risk Assessment
    HITRUST Common Security Framework
    PCI
    SOC 2 Report
    Governance, Risk Management & Compliance
    ITIL
    Information Security
    ISO 27001
    HIPAA
    Compliance
    COBIT
  • $205 hourly
    Risk management specialist, vCISO - 20 years of experience with business IT consulting, regulatory compliance, and acting as a virtual CISO for multiple companies. Commonly assist with vendor risk questionnaires and cybersecurity strategy for organizations of all sizes. Risk management done correctly helps a business grow and save money. Managing losses properly means that the organization makes more money, retains more clients, and while others in similar companies disregard the importance of information privacy, businesses that make cybersecurity a cornerstone of modern business will grow. I want to show you how proactive cybersecurity management is as critical to a business as sales. Expert services: ✅Vendor questionnaires from clients ✅Compliance with PCI, HIPAA, GDPR, SOC2, ISO27001 ✅SSDLC ✅Internal Audits ✅Cloud Security Architecture ✅Policy Creation ✅Security Testing
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    AI Consulting
    Artificial Intelligence
    Enterprise Risk Management
    Information Security Threat Mitigation
    Secure SDLC
    Data Breach Mitigation
    Incident Management
    Data Privacy
    Disaster Recovery
    Incident Response Plan
    Regulatory Compliance
    Business Continuity Plan
    Risk Assessment
    HIPAA
    Disaster Recovery Plan
  • $220 hourly
    Former private sector and government executive with leadership, consulting, advising, strategic and business development at the forefront of my professional skills. Compliance expertise in: FISMA, NIST CSF, NIST SPs 800 Series, HIPAA, FedRAMP, PCI DSS, Sarbanes Oxley, GLBA, GDPR, ISO 27001. CISSP with more than 20 years in cybersecurity and IT. Cybersecurity professor and skilled trainer in risk management and compliance, with expertise in developing professionals into the cyber managers and leaders they want to become. I teach fundamentals and advanced coursework in risk assessments, security testing, business continuity, secure application development, and securing emerging technologies. Business expertise in grant and proposal writing, as well as policy and procedure development. Technical writing to include strategic plans, white papers, briefing papers, and presentations. I have been writing, convincing, persuading, and communicating effectively through writing my entire career. I am also effective in providing business capture and business development support.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Nonprofit Organization
    Certified Information Systems Security Professional
    Data Protection
    Policy Writing
    Information Security Audit
    Compliance
    Tech & IT
    Risk Analysis
    Business Continuity Plan
    Business Consulting
    Enterprise Risk Management
    Risk Assessment
    Project Risk Management
    Technical Writing
    Technical Documentation
  • $125 hourly
    Hello! I help funded startups, midsize, and fortune 500 companies in the healthcare, technology, and government contracting industries. I do this by implementing cybersecurity frameworks that address compliance and protect data, thereby enhancing your marketability and trustworthiness. My expertise includes 20 years of experience, knowledge from real world experience, and industry certifications (i.e. CISSP, CISM, ISO 27001.) My clients have included healthcare EHR, telemedicine, mobile, medical device, and behavioral health organizations. Other clients have been within the fintech, retail, and non-profit industries. These dynamic ecosystems have equipped me with the ability to provide tailored solutions for your unique needs. Compliance Expertise: HIPAA: I am a healthcare information security and privacy practitioner. I have successfully guided several healthcare organizations in effectively handling sensitive patient data. Notably, I orchestrated a full-scale HIPAA compliance overhaul for a 500+ employee healthcare Non-Profit, mitigating potential risks and ensuring continuous adherence to standards. SOC 2: I have been instrumental in developing and executing successful SOC 2 compliance strategies for SaaS, technology, and healthcare companies. My comprehensive understanding of the Trust Service Criteria has allowed SaaS providers obtain favorable SOC 2 Type II reports. ISO 27001: Specializing in risk management, I led the ISO 27001 certification process for multiple organizations. My systematic approach to implementing the ISMS framework has ensured ongoing conformity to this international standard, reducing information security risks and promoting a security-aware organizational culture. CMMC: With a thorough grasp of the Cybersecurity Maturity Model Certification (CMMC), I have assisted defense contractors in preparation to maintain their contracts by helping them achieve and maintain the required CMMC levels. I spearheaded a project to bring a mid-sized defense contractor up to CMMC Level 2, a significant undertaking that involved both technical and policy modifications. PCI-DSS: I conducted PCI assessments and collaborated with IT Teams for technology companies and payment gateway service providers to ensure a PCI Compliance environment. Additional services included writing policies, conducting risk assessments, managed penetration tests, collect AOCs from vendors, and filled out SAQ forms annually. Certifications: CISSP, CISM, ISO 27001 LEAD IMPLEMENTER, GCIA, ECSA, CEHv7 My Services: - vCISO Management - Policies & Procedures Development - Privacy Management - Compliance Implementation - Security Assessments - Risk Assessments - Third-party Security Questionnaires - SSP Development - Cybersecurity Strategy Testimonials: Imagined Cloud | CEO: "Larry exceeded our expectations with their comprehensive SOC 2 services. They not only helped us navigate complex compliance requirements but also provided valuable insights that improved our overall security posture. Highly recommended!" Johnson & Johnson | MedTech Product Security Manager: "Larry was instrumental in guiding our medical device company through our HIPAA assessments with his digital health expertise, significantly easing our compliance process. I highly recommend him for his cybersecurity expertise in the medical device sector." Keywords: cybersecurity expert, compliance, HIPAA, NIST, SOC 2, ISO 27001, CMMC, ISO 27001, policies and procedures , vCISO, risk assessment, compliance software, security assessments, healthcare
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Medical Device
    NIST Cybersecurity Framework
    Cybersecurity Management
    Health & Fitness
    Healthcare Software
    Compliance
    Healthcare
    Telemedicine
    Healthcare IT
    SOC 2
    ISO 27001
    Governance, Risk Management & Compliance
    HIPAA
    IT Compliance Audit
    Security Policies & Procedures Documentation
  • $50 hourly
    ✅ Top Rated Plus Pentester ✅ 5+ Years Pentesting ✅ 70+ 5-star Reviews ✅Supporting All Time Zones ✅ Unlimited Revisions ✅ Top 1% Talent Are you looking for a professional ethical hacker to conduct a security audit or penetration test for your company? Look no further! With years of experience and a deep understanding of modern technology stacks and their vulnerabilities, I am well-equipped to provide high-quality penetration testing services to a wide range of clients. 🎯 Why Hire Me for Your Digital Security Needs? 🔒 Extensive Experience I have conducted and led hundreds of security audits, penetration tests, and red team engagements for a variety of companies, giving me a wealth of hands-on experience in the field. 🔍 Comprehensive Cybersecurity Services My services include comprehensive penetration testing, detailed reporting, expert remediation advice, asset discovery and mapping, follow-up checkups, OSINT reconnaissance, consultations and briefings, and post-engagement debriefings. 🔑 Customized Security Solutions I provide personalized, tailored services to each of my clients, taking the time to understand their unique needs and requirements. 🛡️ Professionalism and Expertise I am an ethical hacker and have a deep understanding of modern technology stacks and their vulnerabilities. I use professional software and tools, as well as personal scripts and techniques, to ensure the accuracy and thoroughness of my work. 📞 Clear communication I am available for meetings and calls to discuss the scope of work, the focus of the engagement, and any other questions or concerns you may have. I also provide post-engagement debriefings to ensure that you understand the results of the engagement and any potential security risks. Ready to secure your business? Let's fortify your cybersecurity defenses together. Contact me today to schedule a consultation and discover how my services can safeguard your business from evolving cyber threats. Looking forward to working with you🙂
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Network Security
    Web App Penetration Testing
    Security Infrastructure
    Penetration Testing
    Web Testing
    Website Security
    Application Security
    Network Penetration Testing
    Information Security
    Ethical Hacking
    Security Testing
    Security Assessment & Testing
    Security Analysis
    Database Security
    Web Application Security
  • $40 hourly
    I am a proud Brooklynite, avid reader, writing enthusiast, and digital marketing specialist. I have successfully deployed over 500 pages of content as a ghostwriter for businesses of all sizes; ranging from fashion and apparel, to the digital marketing and IT industry. My ability to work with various tech startups has given me an edge over other content writers and has enabled me to strategically create and curate content that best fits the needs of my clients. My forte is to develop content that boosts businesses' online presence, with a special focus on SEO and analytics. Looking to revamp your website or improve your ranking on search engines? Contact me to get your articles, blogs, eBooks, and web copy-writing needs catered to; without having to worry about missing any deadlines. Highlights of My Career: • Produced over 500 different articles and blogs for websites across diverse industries. • Developed content that complemented SEO strategies of several businesses and generated high ROI. • Performed research and presented highly engaging content, rich in information pertaining to the industry. • Employed my years of experience as a freelance editor and proofreader and produced error-free copies. • Worked with several ICOs and cryptocurrency startups by producing white papers, press releases, and blogs geared towards spreading awareness regarding their latest innovation. With years of experience in the digital sphere, including my time as Brand Manager at Evolved Athletics Sportswear, and District Field Specialist at Microsoft, I understand that for people to truly value your business and perceive it as a brand, your content needs to do much more than just inform, it needs to talk, engage, and convert.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    WordPress e-Commerce
    Website Redesign
    PHP
    Article Writing
    Blog Writing
    Content Marketing
    Ecommerce Store Setup
    WordPress Website
    Website Copywriting
    Shopify Plus
    SEO Writing
    Email Copywriting
    Creative Writing
  • $75 hourly
    🏆 EXPERT-VETTED Over 16 years of experience in IT, working in several areas, such as Governance, Project Management, Engineering, IT Operations, and Business/Commercial. Advanced knowledge and involvement in IT Service Management and IT Governance, including Implementation, Management, Consulting, and Audit. Acting in huge national and international companies, with complex projects and dynamic environments. More Skills: ✔️Cobit ✔️ITIL Expert ✔️IT Governance ✔️ISO9001, ISO 20000, ISO 27001 ✔️Lean Six Sigma ✔️SOX ✔️ISAE 3402 ✔️User Experience ✔️Scrum, Agile, Design Thinking ✔️Project Management, PMI, PMP Please take a look at my Portfolio for more details and results.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    ServiceNow
    ISO/IEC 20000
    Project Management
    QA Testing
    Business Process Modeling
    ISO 9001
    Microsoft Power BI
    Process Improvement
    IT Service Management
    Management Consulting
    ITIL
    IT Management
    Business IT Alignment
  • $999 hourly
    Computer Science Engineer/Ethical Hacker/Cyber Security Expert who has been providing security for corporate and individuals. ✌Cyber Security/Ethical Hacking - Securing mobile & Pc, running tests for vulnerabilities & server-side security (13+ experience) ✌Web development - JavaScript , Php (12+ experience) ✌CMS - Joomla, WordPress, Drupal (10+ experience) I usually develop cross-platform and Android apps and build dynamic websites. I can develop the product very quickly and with high accuracy. I believe in customer satisfaction. U say it I develop it any language any software you need and if you want to secure your self from attacks I am always available. My work is fast and secure. *Price will vary on the complexity of the project Happy new year 2024 !!!
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Information Security
    Security Engineering
    Ripple
    Bitcoin
    Internet Security
    Android App Development
    XML
    Ethical Hacking
    Cryptocurrency
    Digital Marketing
    PHP
    JavaScript
  • $44 hourly
    Dear Hiring Manager, Thank you for the opportunity to submit my proposal. I have 20+ years' experience in the IT field. My roles have included Data Protection Officer, vCISO, Information Security Management and Desktop Support, through to Server Support and Administration, IT Training and IT Security Compliance Audit assistance. I also have 15 years' experience in Linux Admin and DR (Disaster Recovery) Solutions, including Backup Recover). Certifications: Information Security Manager (Assoc. CISO): EC-Council University Certified Cybersecurity Analyst: IBM Certified System Administrator: Microsoft (MCITP), I have been approved to write the CCISO exam with EC-Council, which is planned for Feb 2024. My specialist area is in Information Security, specifically awareness and making sure my clients are successfull on first audit for their SOC2 or ISO27001 audit. I have also had the opportunity to share my knowledge and experience as a presenter at workshops and conferences. Strengths: Report writing that specializes in Policy, Procedure & Process advice. I also write about and offer advisory services to clients which include Data Protection and Audit Readiness. Assisting with Audit readiness for SOC2 and ISO27001 on various platforms, liaison between company and Auditor through the whole process of certification. Skills and Experience: International data protection officer services vCISO services, including data and privacy policy creation and advice Information security awareness speaker Information security research, data analytics and visual reporting Desktop and server support on both Linux and Windows Systems administration: Google Workplace, MIcrosoft 365, Windows, Apple Mac and Linux Linux Distributions: SME Server: Specialist (firewall/fileserver) Centos: System setup and administration Entangled: System setup and administration OpenLab: System setup and administration, including lab rollouts PCLinuxOS: Desktop setups and support and testing Ubuntu: Desktop and server support I sincerely look forward to hearing from you on being an enabler in your business. Susi du Preez
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    GDPR
    English
    Linux System Administration
    California Consumer Privacy Act
    Information Security Governance
    CrowdStrike
    Information Security Awareness
    Google Workspace Administration
    Startup Consulting
    Atlassian Confluence
    Information Security
    Vulnerability Assessment
  • $145 hourly
    Vastly experience IT expert and top ranked AWS consultant on Upwork that specializes in AWS consulting and migrating business environments, applications and data centers to the AWS cloud. Certified AWS Solutions Architect and AWS Certified Security - Specialty and specialist at creating secure, highly available and cost efficient environments in the AWS cloud that meet all modern compliance standards such as HIPAA, PCI and SOC2. AWS instructor and SME for Simplilearn, an online IT training and certification site and instructor for A Cloud Guru, world leader in cloud computing training. Over 15 years experience of in-house IT consulting for large investment banks in London, Sydney & New York. Contact me if you need highly recommended AWS certified consulting services to evaluate your needs, make the move to the cloud, and vastly improve your technology environment. Specialties: - All things AWS - Cloud migrations - Cloud architecture - Cloud cost optimization - Compliance: HIPAA/SOC2 - IaaS/PaaS/SaaS - Disaster Recovery - Storage solutions - Databases
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Application Security
    Security Infrastructure
    AWS Server Migration
    Amazon EC2
    Microsoft SQL Server Administration
    MySQL
    AWS Lambda
    Amazon Web Services
    Amazon RDS
    Amazon S3
    IT Management
    Database Administration
    Vulnerability Assessment
  • $55 hourly
    IT Professional with over 30 years experience. 15+ years experience in web development. 8+ Years experience in PCI-DSS Consultation, including level 1 companies, working with QSA's to swiftly obtain compliance. For the past five years, I have been providing GDPR consultation to many small to medium-sized companies. Three years experience with ISO 27001 helping clients get and maintain ISO 27001 accredited certification. I spent 20 years working in various IT roles, mainly support, engineering, and web development, within one of the largest companies in the world. I was awarded Charted IT Professional status from the British Computer Society in July 2008. Since then, I have run my own company with a small team producing web-based platforms and services and offering freelance compliance consultation to small businesses. I have also worked as a CTO on several start-up projects managing their entire IT infrastructure and gaining valuable PCI compliance experience, essential to all e-commerce projects. Due to my experience and varied IT roles, I have a good knowledge of web design, programming, databases, security, SEO, troubleshooting, technical writing & more. I am a highly organised and reliable individual, utilising existing knowledge and experiences to find practical solutions to even the most complex project.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Compliance Consultation
    Data Privacy
    Vulnerability Assessment
    Information Security
    PCI DSS
    Data Protection
    Website Security
    PCI
    Compliance
    ISO 27001
    Risk Assessment
    Information Security Audit
    GDPR
    Web Content Accessibility Guidelines
    Security Analysis
  • $30 hourly
    With a degree in Computer Engineering and a passion for writing, my experience spans across writing whitepapers, blogs, research reports, content for websites, thesis for academic submissions, sales pitch, business proposals and more. I am highly organized and schedule my time to get things accomplished accordingly. I am detail-oriented and an excellent researcher. I can be entrusted with big projects as I prefer to complete my work before deadlines giving you ample time to review my work and provide feedback. I take pride in my work
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Amazon Web Services
    Artificial Intelligence
    Blockchain
    Network Security
    Web App Penetration Testing
    Network Penetration Testing
    Vulnerability Assessment
    Robotics
    Editing & Proofreading
    Website Copywriting
    ISO 27001
    Cloud Security
    Information Security
    Disaster Recovery
    Policy Writing
    Technical Writing
    PCI
    Project Risk Management
  • $15 hourly
    Web Penetration Testing(OWASP Top 10 methodology) | Network Penetration testing | OWASP API Security | Mobile Vulnerability Assessment(iOS and Android) | Source Code Reviews(.Net, Java, PHP) | Vulnerability Assessment and Penetration Testing | SIEM team (Cloud(AWS and Azure) Security, File Integrity Monitoring and Event Monitoring, Endpoint Security and Encryption, Data Loss Prevention, Network Access Control, Threat Monitoring (Email Traffic and Malware Analysis), Privileged Access and Identity Management) Have 7+ years of experience in both black box and white box testing penetration testing. Perform VAPT (Vulnerability Assessment and Penetration Testing) services for web applications, networks, mobile; source code reviews; malware analysis; server hardening; and security analysis etc. Conduct penetration testing in a systematic approach. Follow the standard methodology of the industry like OWASP Testing Guide v4(OTGv4); SANS top 25; NIST SP 800-115; PCI DSS to perform penetration testing so that client can concentrate on their professions without worrying about security threats. Web Application Testing: Do web application penetration testing with the latest methodology like OWASP Top-10, SANS Top-25. Perform both manual and automated penetration testing for vulnerabilities like Injection flaws(such as SQL, NoSQL, OS, and LDAP injection etc),Broken Authentication, Sensitive Data Exposure,XML External Entities (XXE), Broken Access Control,Security Misconfiguration, Cross-site scripting(XSS), Insecure Deserialization, Using Components with Known Vulnerabilities,Insufficient Logging & Monitoring. Also, perform source code reviews for many technologies like Java, NET, PHP etc. Approach for Manual Web-Application Penetration Testing: Conduct manual testing with following controls: * Configuration and Deployment Management Testing * Identity Management Testing * Authentication Testing * Authorization Testing * Session Management Testing * Input Validation Testing * Testing for Error Handling * Testing for weak Cryptography * Business Logic Testing * Client Side Testing Tools that use for Automated Web Penetration Testing: Acunetix, Burp-Suite, Netsparker, Nexpose, Nikto, IBM AppScan, HP fortify, W3af etc. Network penetration testing: Provide both external and internal network Penetration Testing so that your Network Infrastructure is secured from the real world attacks. Do both manual and automated network penetration testing. Approach for Manual Network Penetration Testing: Manually check for IDS/IPS, Server, Networks switch, Network Router, VPN, Firewalls, Anti-virus, Password etc. Tools that use for automated network penetration testing: OpenVas, Wireshark, Nessus, Metasploit, Armitage, Scapy etc. Mobile Application Penetration Testing: Perform mobile applications application penetration testing with the latest OWASP methodology(MSTG). Performed both manual and automated penetration testing for vulnerabilities like Weak Server Side Controls, Insecure Data Storage, Insufficient Transport Layer Protection, Unintended Data Leakage, Poor Authorization and Authentication, Broken Cryptography, Client Side Injection, Security Decisions Via Untrusted Inputs, Improper Session Handling, Lack of Binary Protections. Tools: Burp-Suite, HP fortify, Dex2Jar, Apktool, framework-res.apk, iNalyzer. Source Code Reviews: Perform source code reviews for both front and back-end languages. Perform source code reviews standard methodology like OWASP top 10. Do manual and automated source code reviews for various web based security vulnerabilities like SQL injection, Cross site scripting (XSS), CSRF, RFI,LFI, Authentication bypass etc. Tools: CheckMarx, IBM Appscan source for analysis, Microfocus HP Fortify. Security Analysis and Server Hardening: Regularly check and maintain your systems, servers to ensure that they comply with the standards. Do hardening application checks the item automatically on a daily basis and monitors all critical networks and server components. We support various frameworks like CIS benchmarking for Desktops & Web Browsers, Mobile Devices, Network Devices, Servers – Operating Systems, Virtualization Platforms & Cloud etc. Social Engineering: Have experience in social engineering vectors: Vishing, Phishing, Smishing, Impersonation. Used the following social engineering cycle to conduct social engineering: Gather Information: Here Information gathered from company websites, social media and other publications. Plan Attack: Next step is outline how intends to execute the attack Acquire Tools: After planning, next include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics is used in attacks such as password guessing. Tools: SET(Kali-Linux); GetGoPhish
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Web Testing
    Information Security Audit
    Web Application Security
    Website Security
    Network Penetration Testing
    Software QA
    Security Analysis
    Internet Security
    Information Security
    Penetration Testing
    Vulnerability Assessment
    Network Security
  • $140 hourly
    Over 16 years of experience with designing, implementing and assisting organisations adopt Microsoft 365 Security solutions that provide modern device management, identity & access management and data governance & compliance capabilities. Confident in the broader Microsoft 365 E5 stack and have had the privileged of delivering E5 training on behalf of Microsoft, to Microsoft partners. - Design & Implementation services - Security Audits: Basic & Advanced - Advisory Services - 3rd line support Certifications: • MS-100 – Microsoft 365 Identity and Services • MS-101 – Microsoft 365 Mobility and Security • MS-500 – Microsoft 365 Security Administration • SC-400 – Administering Information Protection and Compliance • SC-900 – Microsoft Security, Compliance, and Identity Fundamentals • 70-346 – Managing Office 365 Identities and Requirements • 70-331 – Certification in Core Solutions of Microsoft SharePoint Server 2013 • 70-332 – Certification in Advanced Solutions of Microsoft SharePoint Server 2013 • 70-667 – Microsoft Certified Technology Specialist (MCTS): SharePoint 2010, Configuration Solution Design and consultation relating to: -Microsoft Copilot -Azure Active Directory Premium – Conditional Access, MFA, Password Reset, SSO etc -Windows 365 / Cloud PC -Microsoft Endpoint Manager / Intune -Defender for Endpoints -Defender for Office 365 -Defender for Identity -Defender for Cloud Apps / Cloud App Security -Microsoft Entra -Windows Security SharePoint Online - Document management -Fileshare/SharePoint migrations -OneDrive for Business -Microsoft Teams + Voice -Exchange Online Security and Compliance Centre -Data Loss Prevention -Sensitivity Labels/Data Classification -Retention and Litigation Hold -Records Management -Assist with GDPR and ISO27001 Compliance and related requirements Projects will be done at fixed scope and cost to help us both manage expectations. Where applicable and agreed, hourly rates can be used. Always open for discussion. Where required, Advisory services and deployments over screen-sharing will be charged at a different rate instead of the above project hourly rate.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Microsoft Exchange Online
    Multi-Factor Authentication
    Microsoft Endpoint Manager
    Microsoft Intune
    Cloud Security
    Cloud Security Framework
    Windows 10 Administration
    Microsoft SCCM
    Microsoft SharePoint Administration
    Solution Architecture
    Information Security
    Microsoft Azure
    Office 365
  • $40 hourly
    Hi All, I've gained immense experience in cloud architecture and security solutions specially in Microsoft's Azure. I've designed and deployed security solutions such as but not limited to virtual network gateways, VPN, application gateways as reverse proxies, private endpoints to deny public access, service endpoints, managed identities, Web Application Firewalls (WAF), firewalls, policies, network security groups (NSG), application security groups (ASG), Azure Active Directory (AAD), conditional access policies, MFA, MDM/MAM, log analytics, Azure monitor, securing virtual networks, storage accounts, key vaults, databases (postgresql, cosmos), VM, VMSS, static website apps. In addition, I have extensive hands-on experience working with AKS and the implementation of WAF and its End-to-End encryption feature. An example of the first things to be done on any cloud is to always deny public access for dbs, key vaults, storage accounts, and every resource that contains critical and secret data. This is a MUST. Hence, the way to access those resources would be through VPN. In conclusion, security of the cloud is not some service to be deployed, but it is a measure that requires understanding and, sometimes, re-designing the whole network and orchestrating automation whenever possible. That's what experience is about. Looking forward to hearing from you. Open to work remotely.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    SonarQube
    Docker
    Ansible
    Terraform
    Microsoft Azure
    Docker Compose
    Cloud Engineering
    Cloud Services
    Cloud Security Framework
    Azure DevOps
    Cloud Security
    Cloud Security Alliance
    Kubernetes
    Cloud Engineering Consultation
    Azure DevOps Server
  • $50 hourly
    Since 2015 I work professionally as a Pen Tester/Security Researcher providing cyber security services like penetration testing, network security, Web application security using global standards like OWASP, SANS 24. I am Certified CEH and OSCP. Providing Cyber Security Services: 1. Web Application Penetration Testing 2. Network Penetration Testing 3. Cloud Security Assessments 4. C/C++ source code audits and vulnerability research 5 Mobile Application Penetration Testing 6 Source Code Review 7 Threat Modeling Offered Solutions: 5. Continuous, Expert-assisted Vulnerability Assessment or re-validation of Vulnerabilities Pride of Quality Work: 1. Offering high quality penetration testing services and Delivery of Service. 2. Focus on advanced cyber security business solutions like manual attack techniques and on adherence to industry-wide standards and methodologies: OWASP TOP 10, OWASP ASVS, OSSTMM and SANS 24 during the testing. 3. Delivering actionable and professionally written reports with mitigation of reported vulnerabilities.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Mobile App Testing
    API Testing
    IT Compliance Audit
    Information Security
    Network Security
    Penetration Testing
    Vulnerability Assessment
  • $25 hourly
    Highly motivated and experienced professional, with experience in supervisory positions, seeking opportunities in career fields complimentary to my experience and expertise in project management, IT, customer service support and/or customer training and mentorship. Exceptional understanding of IT concepts, cyber security and/or project management. Expert knowledge of office automation software and hardware tools, to include the MS Office Suite.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Risk Assessment
    Gap Analysis
    Security Policies & Procedures Documentation
    IT Compliance Audit
    Content Writing
    Disaster Recovery Plan
    NIST SP 800-53
    Governance, Risk & Compliance Software
    Cybersecurity Management
    Resume Writing
    Company Policy
    Data Privacy
    Certified Information Systems Security Professional
    Information Security
    ISO 27001
    Tech & IT
  • $75 hourly
    🥇 Earned UpWork's "expert-vetted badge" - top 1% on platform. 🥇 Career recruiter working across Fortune 500 and Startups. Over 5K+ resumes written and 100K+ reviewed. Collaborated with hiring managers from industry giants like Apple, Amazon, Google, and Tesla. I possess a deep understanding of what it takes for a top candidate to truly shine. Recruitment has transformed dramatically, and now recruiters take just 10 SECONDS to decide whether a resume goes on to the next round. Does yours stand out? You’re in good hands—95% of my clients land interviews within 60 days of receiving their tailored resume. From recent graduates to Fortune 500 professionals, I’ve helped a wide range of clients realize their career ambitions. In my MBA thesis, I explored the transformative intersection of technology and talent acquisition, honing in on the optimization of Applicant Tracking Systems (ATS). My expert understanding of ATS systems allows me to craft resumes that maximize visibility and impact, ensuring you stand out. As a recognized thought leader in the recruitment industry, I have been featured on MarketWatch, Yahoo Finance, and the Digital Journal. I'm also an active LinkedIn member with over 30,000 connections, posting daily content to help job seekers worldwide. Additionally, I want to emphasize that I handle all work personally. With a commitment to quality and integrity, I never outsource my clients' projects—a practice that unfortunately, has become a trend. =================================================================== 🔥 Why Choose Me? 🔥 ✅ Personalized Attention: Unlike services that farm out work, every aspect of your project is handled personally by me. No co-workers, no outsourcing—just a dedicated professional ensuring the utmost quality and attention to detail. ✅ Customized Solutions: I understand that every career journey is unique. That's why I don't believe in one-size-fits-all solutions. When you choose me, you're choosing a tailored approach. Your resume will reflect your distinct skills, experiences, and aspirations. ✅ Up-to-Date Industry Insights: In the fast-paced world of recruitment, staying current is essential. I invest time in staying updated with the latest industry trends, including changes in applicant tracking systems and recruitment strategies. This ensures that your resume is always ahead of the curve. ✅ Career Guidance: Beyond crafting resumes, I offer comprehensive career guidance. Whether you're seeking a career change, aiming for a promotion, or transitioning to a new industry, I'm here to provide insights, strategies, and support to help you succeed. ✅ Client-Centered: Your satisfaction is my top priority. I take the time to understand your goals, preferences, and unique selling points. Your input is invaluable, and I work collaboratively to ensure the final product exceeds your expectations. =================================================================== 🌟 Ready to Transform Your Career? 🌟 Simply click on the 'Contact' or 'Hire Now' button on my Upwork profile. Send me your most recent resume or LinkedIn profile, and let's begin this transformative journey together. Here's how our collaboration unfolds: 1) Initial Review: Clients entrust me with their current resume for a comprehensive review. 2) Detailed Feedback: I provide detailed feedback, identifying areas of improvement and highlighting strengths to optimize your professional image. 3) Quotation and Initiation: Upon understanding your needs, I provide a tailored quote and initiate our partnership. 4) Template Selection: Together, we select the perfect template that aligns with your industry and personal style. 5) Draft Creation: With meticulous attention to detail, I craft a compelling draft that encapsulates your unique skills and experiences. 6) Revision Period: Your satisfaction is paramount. We collaborate through a revision period, ensuring the final product exceeds expectations. =================================================================== Finance & Accounting | Human Resources | Retail & E-Commerce | Hospitality & Tourism | Manufacturing | Telecommunications | Real Estate | Legal Services | Nonprofit & Social Services | Media & Entertainment | Energy & ies | Construction and Architecture | Agriculture and Farming | Creative Arts & Design | Biotechnology | Environmental Services | Customer Service | Event Planning | Fashion & Beauty | Government & Public Administration | Science Resume Writing | Resume Design | Graduate Resume | Executive Resume | Professional Resume | Entry-Level Resume | Transitional Resume | Tech Resume | Military Resume | Government Resume | Medical Resume | Creative Resume | Cetified Resume Writer | CPRW | Job Search Strategy | Resume Formatting | Modern Resume | CV | LinkedIn Profile Writing | LinkedIn Marketing | Personal Branding | Career Coaching | Employer Branding | Interview Preparation | ATS Friendly
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    CV/Resume Translation
    LinkedIn
    LinkedIn Recruiting
    Resume
    Resume Design
    LinkedIn Profile Creation
    Resume Writing
    LinkedIn Development
    Resume Development
    Interview Preparation
    Career Coaching
    Cover Letter Writing
  • $45 hourly
    Cybersecurity Professional focused on making sure your data and information are secure by properly identifying, mitigating and fixing vulnerabilities as well as setting up monitoring platforms for monitoring, additionally I have worked with Python and other scripting languages for data collection, manipulation and visualization. I have experience as a ghostwriter and an editing of texts, I currently hold the position of editor and proofreader for an e-magazine that has been running three years strong delivering books every six months.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Scripting
    Technical Writing
    Incident Response Plan
    Elasticsearch
    History
    Docker
    Linux System Administration
    Web Development
    AT&T Cybersecurity
    Bash Programming
    Splunk
    Writing
    Data Scraping
    Python
    MySQL
  • $30 hourly
    As a front-end developer with over 8 years of experience, I specialize in building responsive and user-friendly websites and applications. I have a strong understanding of front-end languages such as HTML, CSS, and JavaScript, as well as experience working with popular frameworks and libraries. For the last 5 years, I am working as a Veeva CLM developer I specialize in creating and implementing closed-loop marketing solutions for life sciences companies. My expertise in Veeva’s CLM functionality allows me to develop solutions that enable commercial and medical reps to engage with HCPs and key opinion leaders using compelling visual content hosted in Veeva Vault. My Services are as below: Veeva CLM Presentation Veeva Approved Email Email template design and html (fixed and responsive layout) Static Banner design Html Banner ad WordPress templating and site development PSD to html conversion (fixed and responsive layout) Let’s work together to create effective solutions for your business.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Twitter/X Bootstrap
    Web Design
    Adobe After Effects
    Adobe Photoshop
    Adobe Premiere Pro
    Salesforce CRM
    WordPress
    HTML5
    CSS 3
    Pharmaceutical Industry
  • $25 hourly
    Simplifying Compliance for ISO 27001, ISO 9001, SOC 2, PCI DSS, HIPAA, GDPR & more ! 😰Confused by compliance requirements? I can translate regulations into actionable steps for your organization 😰Need to win client trust? Let's achieve ISO 27001 or SOC 2 certification to show your commitment to security 😰Facing issues to fill out security questionnaire? Contact me now to get it submitted in quick time with all the relevant policies and procedures **Services 🎖️Policies and Procedures 🎖️Compliance Implementation 🎖️Risk Management 🎖️Gap Analysis / Readiness Assessment 🎖️Internal Audit 🎖️Penetration Testing 🎖️Certification **Standards 📌ISO 27001 📌ISO 9001 📌SOC 2 Type 1 & 2 📌PCI DSS 📌HIPAA 📌GDPR 📌ISO 42001 📢Are you looking to achieve ISO 27001, SOC 2 compliance certification in 6 Weeks? Check out project in the profile 📢Are you facing issues with automated GRC tools, Vanta, Drata, Thoropass, AuditBoard, Secureframe, Scrut, Sprinto, Tugboat Logic, TrustCloud? I am very well versed with all of the tools and get your progress running in quick time 📢Are you looking to get Drata and Vanta subscription in discounted rates? As an MSSP we offer flexible payment terms 📢Are you looking to get your SOC 2 Type 1 & 2 report attested? We have CPA in our team who can help you **Why Choose Me? Here’s What Client say about me! 🤩Founder of Druxia USA “Ali helped us get SOC2 Type 2 certified through Vanta. They are absolutely worth the money to save you on so much time” 🤩Founder of Tilt Legal AUS ”Ali has been fantastic in getting us set up for ISO27001. He is knowledgeable, professional and incredibly responsive. Thanks again Ali for getting us across the line through Drata” 🤩Founder of K-Link Singapore ”Ali was responsive, helpful, and most importantly successful in helping us get our ISO27001 certification” 🤩Founder of Little Taller USA “Lifesaver in getting SOC2 through“ ⭐When it comes to managing operations, information security, quality, safety, compliance, certifications, audits, and the soundness of technical procedures and operations, you need a qualified engineer with extensive experience in industry certifications and standards. ⭐With my extensive experience in managing operations and implementing strategies, I am confident that I can lead your company towards greater profitability and growth. ⭐If you want a detail-oriented, committed, and knowledgeable subject matter expert who cares about getting the job done right, reach out to me * ✅Holder of professional certifications ✅More than 10 years of on-the-job experience ✅Well-versed in global laws and regulations ✅No timezone restrictions ✅5 ⭐ revews on G2 🚀 GRC Tools Partnership as MSP; Drata, Vanta, Secureframe, Thoropass, Tugboat Logic, Slite, Hyperproof, Sprinto, AuditBoard
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    SOC 2 Report
    HIPAA
    IT Compliance Audit
    Workplace Safety & Health
    Management Consulting
    ISO 27001
    Procedure Development
    Medical Device
    ISO 9001
    ISO 14001
    Technical Writing
    Regulatory Compliance
    Quality Audit
    SOC 2
    Information Security
  • $30 hourly
    With over 11 years of comprehensive experience in academia and the cybersecurity industry, I have dedicated myself to both advancing the field through research and empowering the next generation of professionals. My journey began with a Bachelor's degree in Computer Engineering, followed by a Master's in Information Security, and currently pursuing a Ph.D. in the same field. During my academic tenure, I've had the privilege of not only teaching but also actively contributing to the development of the curriculum, ensuring it remains at the forefront of industry trends and standards. Beyond the confines of the classroom, I've earned national recognition by clinching the prestigious "PakCrypt" championship in Cryptography, showcasing my practical expertise and innovative approach to cybersecurity challenges. My commitment to excellence extends beyond academia. With a portfolio spanning 75+ successful projects on Upwork, I've had the opportunity to collaborate with clients worldwide, delivering tailored solutions across various domains of cybersecurity. From designing cryptographic protocols to conducting penetration testing and crafting comprehensive organizational security documents, I thrive on translating complex concepts into tangible results. 🔹 Skills: ✔ Cryptography ✔ Information Security ✔ Network Security ✔ Information Security Governance & Compliance ✔ Risk Management ✔ Computer Networks ✔ Cisco Packet Tracer ✔ Windows and Linux Servers Configuration and Administration ✔ Bash Scripting ✔ Python Programming 🔹 Experience: My journey in academia has equipped me with a deep understanding of theoretical concepts and their real-world applications. As a faculty member in the computer science and cybersecurity department, I've had the privilege of mentoring and guiding hundreds of undergraduate and graduate students. From introductory courses to advanced seminars, I've curated engaging learning experiences that foster critical thinking and practical problem-solving skills. In addition to teaching, I've taken on leadership roles, serving on academic committees and spearheading initiatives aimed at enhancing the quality of education in cybersecurity. Whether it's designing coursework, conducting research, or organizing workshops and seminars, I am committed to staying at the forefront of industry developments and sharing my knowledge with the wider community. My transition to freelancing on Upwork has been equally rewarding. Over the years, I've collaborated with clients from diverse backgrounds, including startups, enterprises, and government agencies. Each project has been an opportunity to apply my expertise in innovative ways, whether it's architecting secure network infrastructures, developing custom cryptographic solutions, or delivering bespoke training sessions on information security best practices. 🔹 Work Style: I believe in transparent communication and meticulous project management. By breaking down projects into smaller tasks and seeking client feedback at each stage, I ensure timely delivery and client satisfaction. 🔹 Goals: My short-term goal is to expand my client base globally while providing exceptional services. In the long term, I aim to establish freelancing as a full-time career, nurturing long-term relationships with clients. Ready to collaborate on your next project or training session? Let's connect and create something exceptional together!
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Cryptography
    Microsoft PowerPoint
    Machine Learning
    Risk Analysis
    Network Penetration Testing
    Security Analysis
    Cisco Certified Network Associate
    Algorithm Development
    Linux System Administration
    Java
    Microsoft Office
    Python
    Computer Network
    IT Management
    Digital Forensics
    Network Security
    Penetration Testing
    Technical Writing
  • $30 hourly
    🔒 Expert Penetration Tester Ready to Secure Your Business As a seasoned penetration tester, I offer unparalleled expertise in safeguarding your company's digital assets against potential threats. With a proven track record of success, I am dedicated to fortifying your systems and infrastructure through meticulous testing and analysis. What You Get: 🛡️ Comprehensive Security Assessment: Utilizing cutting-edge techniques, I conduct thorough assessments of your network, applications, and systems to identify vulnerabilities. 🔍 In-Depth Analysis: Through detailed reconnaissance and analysis, I uncover potential entry points and weak spots in your security posture, ensuring a comprehensive evaluation of your digital landscape. 📊 Professional Reporting: You'll receive detailed reports outlining discovered vulnerabilities, along with actionable recommendations for mitigation, enabling you to prioritize and address security concerns effectively. Why Choose Me: 💼 Industry Experience: With years of experience in penetration testing across various industries, including finance, healthcare, and technology, I bring a wealth of knowledge and expertise to the table. 🔬 Continuous Learning: I stay abreast of the latest trends and developments in cybersecurity, ensuring that my methodologies remain cutting-edge and effective against evolving threats. 🤝 Collaborative Approach: I believe in fostering transparent communication and collaboration with clients, working closely with your team to tailor solutions that align with your unique security needs and objectives. Let's Secure Your Future: Ready to take your company's security to the next level? Partner with me to fortify your defenses and safeguard your business against cyber threats. Together, we'll ensure that your digital assets remain protected, allowing you to focus on what matters most—your success.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Ethical Hacking
    Computer Network
    Web Application Security
    Linux System Administration
    Web App Penetration Testing
    Cybersecurity Management
    Malware Removal
    Security Assessment & Testing
    Information Security Consultation
    Kali Linux
    Vulnerability Assessment
    WordPress
    Information Security
    Penetration Testing
  • $20 hourly
    I'm passionate Cyber security consultant.I am graduated with Distinction a Master of Science program in Cyber Security and Information Assurance with Specialization in Ethical Hacking and Penetration Testing. As the top of my class, a highly distinguished and awarded Cyber Security Professional.Kali Linux, ISO 27001 , Python, SOC implementation , Penetration Testing are my strong areas.I have more than 5 years of working experience I worked as a highly motivated Penetration Tester who often exceeds expectations and holds many awards.I can help you in writing, research and help about IT, Cyber security & information security. I am Certified ISO27001 Lead implementor and worked for many clients as a consultant. Python, Java , C++, Matlab programming Moreover, i can help you with different IT,Cyber Security project with programming as well.
    vsuc_fltilesrefresh_TrophyIcon Certified Cloud Security Professionals
    Network Administration
    Windows Administration
    Technical Documentation
    Web Development
    SOC 2 Report
    Article Writing
    ISO 27001
    Python
    Ethical Hacking
    Technical Writing
    Network Security
    Information Security
    Penetration Testing
    Digital Forensics
    Vulnerability Assessment
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Certified Cloud Security Professional on Upwork?

You can hire a Certified Cloud Security Professional on Upwork in four simple steps:

  • Create a job post tailored to your Certified Cloud Security Professional project scope. We’ll walk you through the process step by step.
  • Browse top Certified Cloud Security Professional talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Certified Cloud Security Professional profiles and interview.
  • Hire the right Certified Cloud Security Professional for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Certified Cloud Security Professional?

Rates charged by Certified Cloud Security Professionals on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Certified Cloud Security Professional on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Certified Cloud Security Professionals and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Certified Cloud Security Professional team you need to succeed.

Can I hire a Certified Cloud Security Professional within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Certified Cloud Security Professional proposals within 24 hours of posting a job description.

Schedule a call