Hire the best Certified Microsoft 365 Security Administrators

Check out Certified Microsoft 365 Security Administrators with the skills you need for your next job.
Clients rate Certified Microsoft 365 Security Administrators
Rating is 4.7 out of 5.
4.7/5
based on 295 client reviews
  • $85 hourly
    Security engineer and technical editor/writer specializing in cybersecurity architecture, operations, compliance/audit readiness, vulnerability scanning/pen testing, and technical documentation. Experience drafting security policies/procedures, and conducting cybersecurity framework mapping/pre-audit prep for NIST, PCI DSS, SOC2, HIPAA, HITRUST, GDPR, ISO 27001, and privacy and security frameworks. Proven track record of technical team and project management.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    HIPAA
    Technical Documentation
    NIST SP 800-53
    ISO 27001
    Technical Writing
    IT Compliance Audit
    SOC 2 Report
    Internet Security
    Security Infrastructure
    Application Security
    Information Security
    Penetration Testing
    Cybersecurity Management
    System Security
  • $25 hourly
    ✅ As a CREST/Offensive Security (OSCP) Certified Penetration Tester and Cyber Security Consultant, I have deep knowledge of Security Assessment Methodology to identify vulnerabilities in Network, API, Web, and Mobile Applications. ✅ I have conducted Penetration Test, Vulnerability Assessment and delivered professional reports to companies in the world complying with: ► CREST standards ► Offensive Security (OSCP) standards ► OWASP Top 10 Vulnerability ► OWASP API Security Top 10 Vulnerability ► OWASP Mobile Security Top 10 Vulnerability ► Application Security Verification Standard 4.0 (ASVS 4.0) ► CWE Top 25 Most Dangerous Software Errors ► ISO 27001 Penetration Testing ► Payment Card Industry Data Security Standard (PCI DSS) ► General Data Protection Regulation (GDPR) ► Common Vulnerability Scoring System (CVSS) ► Open Source Security Testing Methodology Manual (OSSTMM) ✅ I have some cybersecurity certifications including: ► CREST Registered Penetration Tester (CRT) ► CREST Practitioner Security Analyst (CPSA) ► Offensive Security Certified Professional (OSCP) ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ► Executive Summary ► Assessment Methodology ► Type of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings. Each finding listed within the report will contain CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ► Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, Zaproxy, Gobuster, etc.) ✅ Please contact me if you have any question. ✅ Thank you and have a good day!
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Security Analysis
    Software Testing
    White Box Testing
    Web App Penetration Testing
    OWASP
    Black Box Testing
    Network Penetration Testing
    Information Security
    Website Security
    System Security
    Penetration Testing
    Security Testing
    Vulnerability Assessment
  • $30 hourly
    Thanks for reaching out 🚀 This is Mahmudul, I've been doing WordPress Development, Theme Development and WordPress Security works for the past 12 years. My few achievements are- ✅ Top 3% Upwork Freelance WordPress Security Expert ✅ Private Member of Upwork Talent Cloud ✅ 100+ Successfully completed big projects with 5-star ratings. In the past 12 years, I've worked with hundreds of clients in Upwork and gathered some specific skill sets in WordPress Development and WordPress Security. I can create WordPress themes from scratch, using page builders like Elementor, Divi, Beaver Builder, Guternberg etc. I can also recover your hacked website, remove malware, unblock from Google blacklist, secure your server, secure your website from future attacks, etc. my main services are- ✅ WordPress Theme Development ✅ Elementor, Divi, Beaver Builder, Gutenberg Theme builder ✅ WordPress Malware Removal ✅ WordPress Performance Optimization I'm a fun guy to work with! I'm super reliable and responsible, I deliver the work on time.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Linux System Administration
    WordPress Malware Removal
    WordPress Theme
    Page Speed Optimization
    Virus Removal
    Website Optimization
    Internet Security
    Network Penetration Testing
    Technical Support
    Website Security
    cPanel
    Linux
    WordPress e-Commerce
    Bug Fix
    System Security
  • $70 hourly
    Greetings! 🛡️ Welcome to the forefront of Cybersecurity, where your digital safety is my utmost priority. With over 9 years of dedicated experience in IT Security, I'm not just an expert; I'm your strategic partner in fortifying your digital presence. As a Certified Ethical Hacker (CEHv9) and an OSCP Certified Tester, I bring a blend of expertise, passion, and precision to every challenge. Why Choose Me? 🔍 My expertise lies in conducting meticulous Security Assessments and Penetration Tests, designed to unearth vulnerabilities and bolster the defenses of your IT infrastructure. My mission? To elevate your organization's security posture and engineer robust solutions that safeguard your digital assets against the ever-evolving cyber threats. Specialized Services Tailored to Your Needs: ✅ Web Application Penetration Testing: Probing and fortifying web applications to withstand cyber assaults. ✅ Network Penetration Testing: Securing your network's nooks and crannies against intrusion. ✅ Mobile Application Penetration Testing: Shielding your mobile apps from the prying eyes of cyber adversaries. ✅ Security Audits: Comprehensive examinations to ensure your security measures are up to snuff. ✅ Vulnerability Assessments: Identifying chinks in your digital armor, paving the way for fortification. ✅ Dynamic Code Analyses: Scrutinizing the veins of your code for vulnerabilities. ✅ Infrastructure Penetration Test: A deep dive into your infrastructure to secure it from potential threats. 🚀 If you're on the hunt for a Cyber Security Vanguard who's passionate about crafting impenetrable digital domains, look no further. Hit the green "Invite" or "Hire Now" button to catapult your security to the next level. I'm eager to embark on this journey with you and transform your cyber defense mechanisms. Let's connect and explore how we can turn your IT environment into a bastion of security.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Cloud Security
    Internet Security
    Web App Penetration Testing
    Security Analysis
    Security Infrastructure
    Information Security Audit
    Web Application Security
    Information Security
    Vulnerability Assessment
    Security Testing
    Database Security
    System Security
    Application Security
    Network Security
    Penetration Testing
  • $53 hourly
    ⭐Top-rated DevOps & Cloud Architect with about 80 completed projects on Upwork. I lead a team of highly motivated DevOps experts who are ready to provide advice and assistance with various issues and technologies. Just book a consultation, send us a request and we will choose who will best cover your inquiry. What you will get with me and my team? ✅Price & Value balance. With us, you get top-quality DevOps assistance at a reasonable price. We are sensitive to customer’s needs and use a proactive mindset and efficient workflow to exceed your expectations. ✅Long-term support. We tend to build reliable long-term relationship with our customers, supporting them throughout their product lifecycle. ✅Relevant expertise. Our team members use all modern DevOps tools & technologies to cover various challenges. We have AWS/GCP certified experts in team and internal DevOps training program which helps to grow strong talents in-house. ✅Business-oriented approach. We work with startups and businesses of different scale every day and know how to enable the efficient use of resources and save up to 80% in your infrastructure costs, how to improve deployment time from weeks to minutes, and how to make your setup secure. ===== Technologies that I adopt and I’m an expert at: - AWS, GCP, Azure - Docker - Kubernetes - Terraform - Ansible - Jenkins, CircleCI, GitHub/BitBucket pipelines - Prometheus - Grafana - Datadog etc. My area of expertise includes: DevOPS • CI/CD • Infrastructure as Code • Container Orchestration • Configuration Management SysOPS • Remote Infrastructure Management Services • Monitoring • Application Management • Infrastructure Upgrades/Migration CloudOPS • Cloud Administration (AWS, GCP, Azure, Digital Ocean) • Cloud Monitoring & Maintenance • Cloud Cost Optimization • Architecture Consulting • Cloud migration DbOPS • Remote Database Administration Services • Performance Optimization • Orchestrated Migration across platforms/ databases Industries I have experience with: - Fintech - Healthcare - Security - Marketing - Blockchain - Delivery, etc. ===== Case studies of the customers I have worked with: 🔸Safe and Cost-Effective Infrastructure to Bring One-Click Deployment For a Cyber-Security Provider: Deployment time decreased from 8 hours to 10 minutes (48x faster deployment). Fewer resources (time/costs/employee-hours) are now required as code deployment has moved from a tedious, manual process to a codified, automated mechanism. 🔸Backend Infrastructure Design & Development for all-in-one connectivity platform for restaurants & stores: Product provisioning time shortened from 1,5 weeks to 1 hour. Company can drive much more value to their customers now, due to being able to provision the product 200-300 times a month, instead of 5-6 monthly deployments. System redesign and automation allowed to save 30-35% of the budget and free the internal resources for more important tasks. Feel free to contact me or book a consultation, I’d love to discuss your project and help you reach business goals.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Blockchain
    Web3
    Security Infrastructure
    DevOps
    Cloud Architecture
    Terraform
    Ansible
    Docker
    Infrastructure as Code
    Jenkins
    Kubernetes
    Azure DevOps
    DevOps Engineering
    Google Cloud Platform
    Amazon Web Services
  • $20 hourly
    I'm an experienced system administrator dealing with databases, networks configuration, and troubleshooting, Windows & Linux desktop and server support. During my experience, I accomplished projects successfully with major organizations. Primarily, I provide remote support to the end user facing the problem and always come up with an innovative approach and deal it efficiently. I believe in providing quality as I'm just passionate about IT rather than seeing it with a profession.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Network Design
    Cloud Architecture
    Red Hat Enterprise Linux
    Computer Network
    System Security
    ITIL
    Cybersecurity Management
    System Configuration
    Atlassian Confluence
    Linux System Administration
    Process Engineering
    System Administration
    Business with 1-9 Employees
    Linux
    Microsoft Azure
    Windows Server
  • $66 hourly
    As a dedicated Computer Engineering student, I've invested years in mastering ethical hacking, web app penetration testing, and conducting OSINT investigations, starting my journey in 2018. Through practical application and thorough testing of these skills, I've evolved into a versatile professional, excelling as a hacker, proficient web app penetration tester, adept vulnerability assessment specialist, and detail-oriented OSINT investigator. My track record speaks for itself, boasting a pristine reputation and a flawless 100% success rate across all Jobs FAQ Q: Am I certified 🤔? A: yes,I am certified web app Penetration tester with eWPTv2 from INE Q: What tools do i use in Penetration testing? A: That depends on the job, so sometimes i use manual scans and exploits and sometimes i use tools like (Nmap, BurpSuite, Metasploit, Nessus, SQLmap, OpenVAS, WPScan, Nikto, TestSSL)
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Linux System Administration
    Internet Security
    Website Security
    Web App Penetration Testing
    Aircrack-ng
    Article Writing
    Black Box Testing
    Cybersecurity Monitoring
    Ethical Hacking
    Web Testing
    Digital Forensics
    Cybersecurity Management
    System Security
    Vulnerability Assessment
    Penetration Testing
  • $165 hourly
    I am an accomplished and experienced Cyber Security Engineer, CISO, and consultant with over 20 years experience in government, commercial, non-profit and private organizations. I'm a Certified Information Systems Security Professional (CISSP) and CMMC Registered Practitioner. My education includes a Master's degree in Information Assurance and Security specializing in Digital Forensics, a Bachelor's Degree in Information Technology, and daily, hands-on work governing, securing and administering complex information technology environments. My current efforts include cybersecurity compliance implementations for regulated industries and government contractors including the NIST Cybersecurity Framework, Risk Management Framework, NIST SP 800-171, and Cybersecurity Maturity Model Certification (CMMC). For those not bound to other regulatory guidelines, I assist with implementation of the Center for Internet Security (CIS) Critical Security Controls and the CIS Risk Assessment Method. I assist with expert advice, gap assessments, requirements and implementation reviews. I help develop and refine cybersecurity documentation including System Security Plans, POA&Ms, and Policies and procedures. I will share national background check results for qualified opportunities.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Gap Analysis
    Vulnerability Assessment
    Cybersecurity Monitoring
    Amazon Web Services
    Governance, Risk Management & Compliance
    Security Engineering
    Cloud Security
    Security Policies & Procedures Documentation
    Information Security Awareness
    Cybersecurity Management
    Network Security
    Certified Information Systems Security Professional
    Information Security
  • $30 hourly
    I'm a Penetration Tester and Cyber Security Specialist who is a professional in evaluating the security posture of Web-Applications (Websites) and ensuring the security of personal clients' online identities, accounts, devices, and networks, I've possessed my current knowledge through 3+ years of self-study and research plus 2+ years of work in the industry, protecting clients on a personal level and running vulnerability assessments against business websites, always leaving positive impression and impact, I hold a great record of being able to expertly provide the following services: - Perform comprehensive security checkups on Emails and Phone numbers and pinpoint security holes which often lead victims to be hacked with zero interaction nor awareness from them. - Assist in Account Recovery (Ex. Instagram, Facebook) - Educate thoroughly on the findings and remediations for a vulnerable target, equipping clients with enough information to trust themselves as they continue to utilize the technologies as normal with no fear of being targetted by hackers. - Investigate and educate on online frauds/scams, especially crypto ones, why and how they work, and how to distinguish between legit and not legit easily. - Clean up networks and devices from viruses/malware and ensure optimal patching for security. - Report fraud websites that impersonate legit businesses for a takedown. IMPORTANT: When it comes to cybersecurity-related services, there is a number of scammers not to be underestimated, whether within or outside of Upwork, therefore stay vigilant and keep in mind the following, 1. If you were scammed online via crypto, there's no one out there with the right to give a guarantee that they will be able to recover it for you despite how well furnished the so-called hacker's portfolio appears to be, the chance remains very slim and you should only pursue this kind of service for the sake of leaving no stone unturned knowing the high probability of failure, and you should only select a freelancer with a reputable profile and reviews to back up their activity because scammer accounts are usually fresh with no reviews and no verified ID, feel free to consult me to evaluate that. 2. Same applies to the request of hacking an account, there are complicated caveats that explain why it DOES NOT work the way you think it does but to keep it short, if you want someone's account hacked, aside from it being illegal and unethical and isn't the type of "service" I provide, the chance for it to work is about 1% to begin with, again, I'm available for consultation, account recovery is a different subject with a higher probability for success as long as it's your own account that was lost/hacked.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Malware Removal
    Information Security
    Vulnerability Assessment
    System Security
    Network Security
    Information Security Consultation
    Website Security
    Penetration Testing
    Network Penetration Testing
    Internet Security
    Ethical Hacking
    Security Testing
    Security Assessment & Testing
  • $20 hourly
    Introducing a cybersecurity expert with 4 years of experience as a 𝐩𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐭𝐞𝐬𝐭𝐞𝐫 and 𝐜𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬 𝐢𝐧 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 𝐚𝐧𝐝 𝐀𝐖𝐒 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲. An expert in safeguarding digital domains, turning vulnerabilities into strengths. Your digital realm's ultimate support is here. I will ensure your digital fortress stands unyielding.🔒🌐 𝙈𝙮 𝙊𝙛𝙛𝙚𝙧𝙞𝙣𝙜𝙨: 1. Comprehensive vulnerability assessment 2. Thorough penetration testing 3. Identification of security weaknesses 4. Risk analysis and prioritized recommendations 5. Exploitation simulation to assess real-world impact 6. Client-specific testing based on unique needs 7. Compliance with industry standards (e.g., OWASP) 8. Detailed, actionable report with mitigation steps 9. Ongoing support for security enhancements 10. Confidential and professional engagement 𝙒𝙝𝙮 𝙈𝙚?? 1. 𝗘𝘅𝘁𝗲𝗻𝘀𝗶𝘃𝗲 𝗘𝘅𝗽𝗲𝗿𝘁𝗶𝘀𝗲: Years of specialized experience in penetration testing. 2. 𝗣𝗿𝗼𝘃𝗲𝗻 𝗧𝗿𝗮𝗰𝗸 𝗥𝗲𝗰𝗼𝗿𝗱: Demonstrated success in identifying critical vulnerabilities. 3. 𝗧𝗮𝗶𝗹𝗼𝗿𝗲𝗱 𝗔𝗽𝗽𝗿𝗼𝗮𝗰𝗵: Customized testing to match your unique security requirements. 4. 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲 𝗔𝘀𝘀𝘂𝗿𝗮𝗻𝗰𝗲: Adherence to industry standards and best practices. 5. 𝗖𝗼𝗺𝗽𝗿𝗲𝗵𝗲𝗻𝘀𝗶𝘃𝗲 𝗥𝗲𝗽𝗼𝗿𝘁𝘀: Detailed findings and actionable recommendations. 6. 𝗖𝗼𝗹𝗹𝗮𝗯𝗼𝗿𝗮𝘁𝗶𝘃𝗲 𝗣𝗮𝗿𝘁𝗻𝗲𝗿𝘀𝗵𝗶𝗽: Engaging in open communication and client involvement. 7. 𝗧𝗶𝗺𝗲𝗹𝘆 𝗗𝗲𝗹𝗶𝘃𝗲𝗿𝘆: Efficient testing and prompt delivery of results. 8.𝗧𝗶𝗺𝗲𝗹𝘆 𝗗𝗲𝗹𝗶𝘃𝗲𝗿𝘆: Highest standards in data privacy and protection. 𝘾𝙚𝙧𝙩𝙞𝙛𝙞𝙘𝙖𝙩𝙞𝙤𝙣𝙨: 1. Certified Ethical Hacker (𝗖𝗘𝗛) By EC-Council 2. AWS Certified 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗦𝗽𝗲𝗰𝗶𝗮𝗹𝘁𝘆 By AWS 3. Certified 𝗔𝗣𝗜 𝗣𝗲𝗻𝗲𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝗧𝗲𝘀𝘁𝗲𝗿 By APISec University 4. Network Defense Essentials (𝗡𝗗𝗘) By EC-Council 5. Digital Forensics Essentials (𝗗𝗙𝗘) By EC-Council 6. Ethical Hacking Essentials (𝗘𝗛𝗘) By EC-Council 7. Network Security Expert 1 (𝗡𝗦𝗘-𝟭) By Fortinet 8. Network Security Expert 2 (𝗡𝗦𝗘-𝟮) By Fortinet 9. Network Security Expert 3 (𝗡𝗦𝗘-𝟯) By Fortinet 𝙄𝙣𝙙𝙚𝙥𝙚𝙣𝙙𝙚𝙣𝙩 𝙀𝙭𝙥𝙚𝙧𝙩𝙞𝙨𝙚 𝙔𝙤𝙪 𝘾𝙖𝙣 𝙏𝙧𝙪𝙨𝙩 I 𝐓𝐫𝐲𝐇𝐚𝐜𝐤𝐌𝐞 𝐓𝐨𝐩 𝟏 % I 𝗖𝘆𝗯𝗲𝗿𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿𝘀 𝗚𝗹𝗼𝗯𝗮𝗹 𝗥𝗮𝗻𝗸 𝟭𝟲
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    AWS CloudTrail
    Security Operation Center
    Cloud Security
    WordPress Security
    Web Application Security
    Network Penetration Testing
    White Box Testing
    Black Box Testing
    Metasploit
    System Security
    Vulnerability Assessment
    Network Security
    Application Security
    Penetration Testing
    Information Security
  • $60 hourly
    🚀 DevOps & Sys Admin Expert with 6 Years of Experience 🚀 🔹 65+ Total Jobs Completed 🔹 700+ Total Hours Worked 🔹 100% Job Success 🔹 Top Rated Are you seeking a seasoned DevOps and Sys Admin professional to streamline your development processes and fortify your infrastructure? Look no further! With a robust background in both DevOps methodologies and system administration, I bring a wealth of expertise to the table, ensuring seamless operations and optimal performance for your projects. 🔧 DevOps/Cloud Skills: Google Cloud, AWS, OVH Traefik, Docker/Podman, Kubernetes, Docker Swarm Cloudflare, Grafana & Prometheus, Harbor Jenkins, Groovy, Amazon ECR, Terraform, Ansible Git, Github Actions, Gitlab CI/Pipelines SonarQube, Nexus, Selenium, Hashicorp Vagrant Keycloak, Vault, Maven, Gradle, Npm, Node Containerization of Dev & Prod environments 🛠️ System Administration Proficiency: Nix/Linux, RHEL Nginx, Apache, Tomcat, Jboss PostgreSQL, Mysql, Mongodb Pacemaker Clusters, Corosync, LVM, VDO, Stratis Bash & Python Scripting Kannel, Jira, Alfresco, Munin, Zabbix Postfix, fail2ban 🔒 Network/Infrastructure Expertise: OPENVPN, IPSEC & L2L SDN, TCP/IP, SSL SMPP and SMS, SMTP, DNS, DHCP, NTP, FTP, SSH, T.38 pfSense, Cisco ASA, VMware With a proven track record of delivering high-quality solutions and optimizing IT operations for clients across various industries, I am committed to exceeding your expectations and driving your projects towards success. Let's collaborate and elevate your business to new heights!
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Computing & Networking
    Database Optimization
    MySQL Programming
    Containerization
    Docker Compose
    Linux System Administration
    Red Hat Enterprise Linux
    Application Server
    Database Administration
    System Security
    Web Server
    Google Cloud Platform
  • $50 hourly
    I have 15 years of programming experience. As a freelancer, I have very wide experience, I created desktop (C++, C#, Python, Linux, Windows), mobile (Android, Java, C++) and web (PHP, Python, ASP.NET) applications. I list here some of my jobs. C++: * Factory equipment monitoring system (Ubuntu Linux, custom server over TCP/IP, web interface in PHP). C#: * ASP.NET website for house rentals. * ASP.NET website for remote control of robotic device via WebSockets connection. * Vegetable oil plant automation desktop program (C# + WinCC). Human emulation: * Spam bots: I can not write specific list of such software for legal reasons. * Automatic checkout on eBay and similar websites. * PayPal automatic payments. * Data scraping, including air tickets, goods in online store, Reverse engineering: I can not write specific list of reversed software for legal reasons. * Java bytecode reverse engineering, including Android. * .NET bytecode reverse engineering. * Machine code for 32 bit and 64 bit x86 and ARM CPUs. Assembler: * High performance cryptographic library for x86_64 CPUs. PHP: * 20+ websites without CMS, with my own CMS, and with open source Drupal, WordPress and Joomla CMS. * Backends for Android applications. Android: * Socks5 proxy application that allows to share mobile VPN with non-mobile clients via SOCKS protocol. * A lot of WebView based "visit card" applications. * Dating related applications, including erotic puzzles.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    C++
    Java
    C#
    HTML
    Node.js
    VB.NET
    ASP.NET
    Python
    PHP
    JavaScript
    MySQL Programming
    .NET Framework
    Linux
    Android
    Microsoft Windows
  • $100 hourly
    Ex-Big 4 senior consultant with 10+ years of experience in assisting clients in cybersecurity, IT compliance, AI security management and security risk assessment projects. ❗You have lost contracts because you were not certified? ❗Your clients pressure you to provide them with an information security certification (PCI-DSS, SOC 2, ISO 27001, HIPAA, FedRAMP, CMMC, ISO 42001) ? ❗You don't know what to answer to the security assessment questionnaire you recently received from your biggest client & it's taking too much time ? ❗You don't have time and resources to be consumed by compliance efforts and endless meetings? ❗You are struggling to understand the certification process, the related cost, and the timelines? ❗You just purchased a compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, OneTrust/Tugboat, SecureFrame, Strike Graph, Audit Board, TrustCloud) but don't know the next step or don't have time for it? Services provided: 📝 Policies & Procedure writing & review 📝 Security gap analysis (based on frameworks on your choice, ISO 27001, NIST, SOC 2, etc.) 📝 IT and Compliance Audits 📝 Performing Risk Assessments, risk treatments, and establishing actions plans & roadmaps. 📝 Evaluation of the existing IT security state of maturity against established standards & regulatory requirements. 📝 Organization-wide security strategy 📝 Support in Governance, Risk & Compliance (GRC) projects 📝 Cloud security governance, management and strategy 📝 Security Operations 📝 DPO service: I can provide you with assistance with regards to GDPR/CCPA compliance, policy writing/reviewing, GDPR gap assessment analysis, and accompanying you in your GDPR compliance journey and Data Privacy requirements. 📝 CISO service: I can provide you with assistance and support in defining your security strategy, putting in place action plans and following up implementation over the long run. 💥WHY ME AND NOT ANOTHER FREELANCER?💥 ✅ Big 4 consultant expertise. End-to-end managed security services. ✅ All work is completed by myself, with constant communication with you and taking into account your every remark & need. ✅ Excellent Client Reviews: I focus on providing you with VALUE and earning your TRUST. ✅ Over-Delivering: I focus on GIVING you more than what I expect to RECEIVE. I am happy when my client's expectations are exceeded. ✅ Responsiveness: All lines of communications are open, and I can be reached very easily. ✅ Kindness & Ethics: As security and compliance professional, we hold ourselves to high ethical values, treating everyone with respect, understanding and genuinely IMPROVING my client's situation. Let's get in touch. (The hourly rate shown is indicative only, as I adapt depending on the project and client's budget) Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Compliance management tools: Drata, Vanta, Onetrust Compliance Automatization - Tugboat Logic, Sprinto, SecureFrame, Thoropass (HeyLaika), Trust Cloud, Strike Graph, Audit Board, ISMS.online, Instant27001.com Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS), IRAP, ISO 42001
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Certified Information Systems Security Professional
    Information Security Audit
    Cloud Security
    Governance, Risk & Compliance Software
    Security Management
    Data Privacy
    SOC 2 Report
    GDPR
    IT Compliance Audit
    Risk Assessment
    ISO 27001
    Information Security
    Security Policies & Procedures Documentation
    Vulnerability Assessment
    Information Security Consultation
  • $30 hourly
    I am a crypto scam recovery expert with over 8 years of experience in the field. I am specialized in cyber crime investigation, cyber defense, penetration testing, and vulnerability assessment, Crypto scam recovery, Blackmailer Identification, Hack Investigation and Digital Forensic. I have began my career as a cyber crime investigator, where I worked on complex cases involving computer fraud, hacking, and identity theft. I was able to use my technical skills and attention to detail to uncover evidence and bring perpetrators to justice and quickly became known for my ability to navigate the digital landscape and track down the source of cyber attacks. After years of experience in cyber crime investigation, I was also responsible for conducting penetration testing to identify and address vulnerabilities in networks and systems, as well as conducting vulnerability assessments to identify potential weaknesses. I have a deep understanding of the latest security technologies and methods, and is always seeking new ways to stay ahead of the ever-evolving threat landscape. #Bitcoin recovery services #Crypto Wallet Recovery #Investigate Cryptocurrency Scams #Wallet Transaction Analysis #Stolen Funds Tracing And Recovery #Crypto Investment Farms Investigation #Crypto Asset Security & Protection
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Cryptocurrency Trading
    Web App Penetration Testing
    Crypto Wallet
    Cryptocurrency
    Data Recovery
    Ethical Hacking
    Social Engineering Assessment
    Crypto Exchange Platform
    Tech & IT
    Vulnerability Assessment
    System Security
    Digital Forensics
    Malware Removal
  • $35 hourly
    I am ISO27001 certified cyber security expert with over 10 years of experience in desktop application development and cyber security. I love taking up challenges that may seem impossible to many, for all types of systems. My main expertise is bypassing defence (antiviruses/firewalls/EDR), removing false positive detections on virustotal, Malware development, web application hacking, penetration testing, API hacking, breaking application security, decompiling, reversing, scam/hacking/blackmail incident research, malware research, Desktop Application Development in C/C++/C# .NET/Python System Security Audits / Malware Cleaning/ System Hardening / System Forensics, bypassing AVs, evasion, injection through latest techniques Technical report writing / Technical Consultation and Analysis (Related to Cyber security)
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Virus Removal
    Writing
    Penetration Testing
    Security Assessment & Testing
    Security Analysis
    Desktop Application
    Article Writing
    Information Security
    System Security
    Security Testing
    Encryption
    Application Security
    Ethical Hacking
    Windows App Development
    C#
    C++
  • $40 hourly
    I have more than 10 years of practical working experience in cyber security sector. I am crypto scam investigator and recovery specialist. I am expert on blackmailer and scammer Investigation. I can help you for blackmailer and scammer issues. My expertise areas: 1. Crypto Scam Investigator & Recovery Expert, I am a crypto scam investigator & recovery expert. I have done 80+ cases already. I understand the importance of recovering funds for clients and bringing scammers to justice. I am professional & worked with clients from USA, Canada, UK, Australia, and more locations. I will handle your case with the utmost professionalism and dedication. Normally Scammers manipulate clients to invest in scam sites. After that, they shows the fake growing amount. Then clients invest a huge amount for a handsome profit. But when the client want to withdraw the amount then the scammer tells the client to pay for taxes & services, etc. If the client even pay taxes they will never allow for withdrawal requests. These are the very common tricks that scammers apply nowadays. Here is an outline of how I will assist you in recovering your clients' funds and catching the criminal: a) I will track all the transactions and find the final holding wallet addresses b) I will lnvestigate Scammers Information & verify them c) I will check the scammer website for vulnerabilities d) I will provide a report that include every single step details for the law enforcement Hire me to get this service immediately 2. SOC Setup for monitoring your target devices. My project offers a comprehensive Security Operations Center (SOC) setup service that integrates Elastic Search, Wazuh, and Filebeat to provide an all-encompassing solution for monitoring and securing your IT infrastructure. This service is designed to help organizations of all sizes protect their digital assets, ensure compliance with industry standards, and respond swiftly to security incidents. #Elastic Search Installation: #Wazuh Installation: #Filebeat Installation: #Manager Installation on Client Machine: #Dashboard and Reporting Setup: #Testing and Validation: #Training and Handover: Providing training sessions to your team on how to use and manage the SOC setup. Key Benefits: Enhanced Security Posture: Gain comprehensive visibility into your network, identify threats in real-time, and respond swiftly to security incidents. Why Choose My Service? With 5 years of experience in cybersecurity and SOC implementations, I bring a wealth of knowledge and skills to ensure your project is successful. My background includes working with various organizations to enhance their security measures and protect their digital assets. Hire Me Now! 3. Cyber Crime Investigator: I investigate and prevents criminal activities in the digital world. I analyze digital evidence and work with law enforcement to protect individuals and organizations from online threats. Hire me to get this service immediately Hire me to get this service immediately 4. Digital Forensics Service: I specialize in digital forensics and cyber investigation services to uncover the truth behind cyber incidents. With 10 years of experience, I offer: a) Digital Forensics: Expert analysis of digital devices to retrieve critical evidence. b) Incident Response: Swift response to contain breaches and identify attack vectors. c) Network & System Analysis: Identification of unauthorized access and vulnerabilities. d) Malware Analysis: In-depth examination to determine malware nature and impact. e) Expert Witness Testimony: Qualified to provide clear technical support in legal proceedings Hire me to get this service immediate 5. Vulnerability Assessment & Penetration Testing (VA/PT) Service: With nearly 10 years of experience in vulnerability assessment & penetration testing, I aim to provide the highest level of security for clients' websites and applications. Through testing and a comprehensive report, I identify vulnerabilities and offer actionable recommendations for improvement. Please provide project details for an accurate estimate. Hire me to get this service immediately 6. Hack Investigation & Hack Removal Service: I offer comprehensive Hack Investigation & Removal services a) Thoroughly investigate the hack, identify its source and impact. b) Swiftly remove malicious code and unauthorized access. c) Recover compromised data and fortify security measures. d) Continuous monitoring and support for ongoing protection. Hire me to get this service immediately 7. Crypto transaction tracking service: I have done 50+ crypto scam cases already. I can tracking your scammed crypto money that you have send to the scammer unfortunately. I will track all the transactions & will find the final folding wallet addresses where your money is currently stored. By that information you can claim to retrieve your money back. 8. Ethical Hacking Service: I will do it to protect you from cyber criminals legally and ethically.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Cryptocurrency
    Growth Hacking
    iPhone
    Network Security
    Information & Communications Technology
    Penetration Testing
    Information Security
    Information Analysis
    MySQL
    Vulnerability Assessment
    Cybersecurity Management
    Digital Forensics
    System Security
    Cryptography
    Ethical Hacking
  • $45 hourly
    I'm a software developer / server administrator / MSP / and cybersecurity consultant from Canada with excellent communication skills and attention to client needs. I can develop new solutions, and update, migrate or secure existing applications and systems. I entered the IT industry in 1995 and hold a high standard, guarantee my work, and can provide continuing support and hosting. I look forward to meeting new clients. I especially am happy to discuss your project details with you before hiring to help us together gain insight in to your needs and expectations. My services include: - Custom development & hosting (including WordPress) - Technical and research writing for IT subjects - Marketing content writing for IT subjects - Updating and modifying existing apps / services - Migrating apps / services - Server maintenance, security, and automation scripting - Lead generation for business - Data-services such as scraping, statistical analysis, data-conversion, data-extraction, etc. - Developing educational content such as videos, lesson-plans, etc. I look forward to a discussion about your needs!
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Website Migration
    Linux System Administration
    Policy Analysis
    PHP
    Python
    System Security
    Vulnerability Assessment
    Data Science
    WordPress
    Web App Penetration Testing
    Website Security
    Data Scraping
    Cybersecurity Tool
    Content Writing
  • $15 hourly
    I write re-usable and easily modifiable code to build products. I strive to learn how the entire system works where my previous experience of Network, Cloud and Security gives a huge boost towards this insight. Tech stack I use for full stack development: ✅ TypeScript / JavaScript ✅ React.js ✅ Next.js ✅ Node.js ✅ Express.js ✅ MongoDB ✅ Apollo GraphQL ✅ REST Domains in which I have previous experience and certification are: ✅ Networks (Exposure: Configuring Huawei Devices) ✅ Security (Exposure: Penetration Testing of Networks and Web Apps) ✅ Cloud (Exposure: Microsoft Azure) Notable Achievements: ✅ Represented Pakistan in Huawei Middle East Competition (3rd Position) ✅ Represented Pakistan in Huawei Global Competition (3rd Position) ✅ Microsoft Certified Trainer (Since 2020) ✅ Highest CGPA in Bachelors ✅ Highest CGPA in Masters ✅ First Position in Final Year Project Competition | Bachelors (2019) ✅ Best Paper Award in IEEE HONET | Masters (2021) ✅ Hult Prize Winner Ambassador Experience: ✅ Huawei (2019-2020) ✅ Microsoft (2020-2022) Regards, Shameel Uddin
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Full-Stack Development
    MongoDB
    ExpressJS
    GraphQL
    Redux
    React Native
    JavaScript
    Next.js
    HTML5
    Apollo.io
    Security Testing
    React
    Website Security
    MySQL
    Node.js
  • $100 hourly
    I am a dedicated professional with decades of comprehensive experience in Cyber Investigations, Cyber Intelligence, Cyber Operations, Cybersecurity, and Information Security. I am well-versed in creating robust security structures, implementing security strategies, and mitigating potential cyber threats, and I specialize in the detection, investigation, and mitigation of cyber threats, while providing strategic insights to enhance organizational cyber defense capabilities. I have a Bachelor's degree in Psychology and Cognitive Science, and am completing work toward Master's degrees in Cybersecurity and Information Technology, with specializations in Enterprise Networks and Cloud Computing. I have also earned various industry certifications such as Certified Ethical Hacker Master (CEH-Master), System Security Certified Practitioner (SSCP), Certified Cyber Intelligence Professional (CCIP), Certified Penetration Tester (CPT), and Certified Forensic Analyst (CFA). Types of Services Offered Include But Are Not Limited To: Consulting, Strategy, & GRC: • Cybersecurity Consulting • Cybersecurity Strategy Development • Security Policy Development and Implementation • Governance, Risk, and Compliance (GRC) Frameworks • Managed Security Services Risk Assessment and Management: • Security Risk Assessment • Risk Mitigation Strategies • Cyber Risk Analysis • Vulnerability Assessments • Incident Mitigation and Remediation Digital Forensics Incident Response: • Security Incident Investigation • Litigation Support • Regulatory Compliance Audits • Integrated Threat Intelligence Digital Forensics • Data Recovery and Analysis • Electronic Discovery (eDiscovery) • Mobile Device Forensics • Network Forensics • Forensic Imaging • Malware Forensics Incident Response • Incident Management and Coordination • Threat Hunting • Emergency Response • Root Cause Analysis • Post-Incident Reporting and Documentation Training Services: • Security Awareness Training • Workshops and Webinars • Cybersecurity Certification Preparation • Employee Cybersecurity Training Programs • Simulated Phishing and Other Training Exercises Offensive Security & Defense Security: • Penetration Testing • Ethical Hacking • Red Team Operations • Blue Team Defensive Strategies • Purple Team Exercises Cloud Services: • Cloud Security Architecture • Cloud Security Assessments • Cloud Data Protection • Cloud Compliance Audits • Managed Cloud Services Network and Architecture Services: • Network Design and Architecture • Network Security Implementation • Wireless Network Security • Network Performance Monitoring • Enterprise Network Management Cyber Investigations and Intelligence: • Cyber Investigations • Cyber Intelligence Gathering • Digital Forensics • Network Forensics • Fraud Investigation • Insider Threat Investigation • Social Media Forensics Cyber Operations: • Cyber Threat Hunting • Cyber Threat Intelligence • Information Operations (Info Ops) • Real-time Security Monitoring • Security Operation Center (SOC) Management Security Compliance and Auditing: • Compliance Auditing • Security Auditing • Security Policy Compliance Reviews • Regulatory Compliance Monitoring • Information Security Assessments Virtual CISO Services • Cybersecurity Program Leadership • Security Strategy and Planning • Policy Development and Management • Security Risk Management • Compliance Oversight • Incident Response Planning • Security Awareness and Training • Vendor Risk Management • Security Budget Management • Board Communication
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Cyber Threat Intelligence
    Ethical Hacking
    Microsoft Azure
    Solution Architecture
    Cloud Architecture
    IT Infrastructure
    Network Engineering
    Cloud Security
    Web App Penetration Testing
    Security Infrastructure
    Network Penetration Testing
    Network Security
    Penetration Testing
    Information Security
    Vulnerability Assessment
  • $100 hourly
    ⭐⭐⭐⭐⭐ "Jabran was quick to respond, knowledgeable, and always available throughout the project within minutes! I plan to continue working with Jabran for future projects to help our business grow!" ⭐⭐⭐⭐⭐ "Jabran gave me a thorough security audit / vulnerability assessment for my law firm. He was extremely knowledgeable, professional, and helpful. I feel much safer with my business thanks to his great advice on cybersecurity. I can recommend Jabran with the highest confidence. Thank you Jabran!" ⭐⭐⭐⭐⭐ "Great Job Jabran, we hope to outsource your services soon for our monthly software and security protection." ⭐⭐⭐⭐⭐ "Enjoyed working with Jabran. Jabran is very knowledgeable about cybersecurity and data privacy. Our 3 hour project was time and money well-spent for my business. Great resource for small businesses. Will hire again." ⭐⭐⭐⭐⭐ "Jabran is skilled, friendly, and great to work with. I hired him for my business's security needs." Hello and nice to meet you! ✅I am Jabran, an expert Cyber Security and IT professional with experience in managing small business IT and cyber security needs. Managing cyber security programs, crafting policies and standards, managing computers/mobile devices, and ensuring your business has an efficient and secure IT program, tailored to your needs! 🎓I have a Bachelors degree and Masters degree in Information Technology with a concentration in cyber security. 📜 In addition to my degrees, I hold the CISSP, CompTIA A+, Network+, Security+ certifications. My work experience consists of being a Systems Administrator, Cyber Security Engineer, and currently as a Security Risk Assessor. Projects that were successfully rolled out and completed: Information Security Governance and Cybersecurity Management: -Create policies/standards/procedures/guidelines from scratch using NIST SP 800-53, ISO 27001, CIS v8 -Assisted Organization in becoming ISO 27001 certified, PCI DSS compliant -Successful testing of controls, implementation and remediation of controls, and communicate with auditors -Conducting high priority risk assessments, using ISO 30001 and NIST 800-37 best practices -Work and communicate with stakeholders on creation of new policies/standards -Document computer security and emergency measures policies, procedures, and tests -Perform third party risk assessments, provide a SOC 2 report and questionnaires Technical Writing/Business Writing - Governance, Risk, and Compliance (GRC) - drafting and creating Security Policies & Procedures, standards. Working with standards/frameworks - ISO 27001, NIST Cybersecurity Framework, NIST 800-53, HITRUST, HIPPA, etc Created policies such as Incident Response Plan, AI Security, Disaster Recovery, Information Security, Access Management, Network Security, Data Protection, etc. Preparing for IT compliance audit of various information security frameworks Enterprise Risk Management: Conducting risk assessments, communicating with stakeholders, analyzing risk, calculating residual risk after implementing security controls. Conducting qualitative risk assessments. Doing an Information Security Audit of ISO 27001, SOC 2, PCI DSS, and other frameworks and also doing information security consultations based off those frameworks IT consultation on which systems to setup, recommendation of tools, best practices, ways to implement information security, network security, internet security, Working with Microsoft Azure AD, Office 365 Admin, Teams Admin, Global Administrator, securing configuration policies, etc. Deploying and managing PCs physically and in the Cloud. Deploying EDR solutions, managing PCs and IT infrastructure, providing remote support, minimizing downtime to small and medium sized businesses. -Deploy Microsoft Defender for Endpoint to 300+ machines -Transition from an old VoIP solution to Microsoft Teams solution -Create Microsoft Flow and tie into Active Directory for new on-boarding of user/termination of user -Security Incident and Response Planning and Remediation (recover from a security incident) -Deploy SentinelOne to over 1000 endpoints -Deploy SIEMS to 15+ organizations -Setup Domain Controller -Setup FTPS server -Setup IIS Server -Implement Microsoft 2FA for organization -Migrate from on premise AD to Azure AD sign in -Create EC2 environments within AWS for developers -Setup successful recurring Security Awareness Training Programs using KnowBe4, and Cofense -Microsoft Office 365 Administration of Exchange Online, Teams, Security and Compliance, Azure (Configuring security policies)
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    ISO 27001
    NIST SP 800-53
    CIS Control Assessment
    Microsoft Active Directory
    Virtualization
    Troubleshooting
    Security Management
    Technical Support
    System Administration
    IT Support
    Microsoft Endpoint Manager
    Microsoft Azure
    Office 365
    Security Policies & Procedures Documentation
    Business with 10-99 Employees
  • $50 hourly
    I am an Elastic Stack (ELK) Certified Engineer. I am an expert for Elasticsearch, Logstash, Kibana, SIEM, Beats, Wazuh, Elastalert and other elastic stack products. I have been working with Elasticsearch since its version 1.5. I have implemented large-scale implementations dealing with billions of documents and TBs of data. I have implemented various use cases with Elasticsearch for organizing, cleaning, visualizing and securing data at a large scale. I am also an expert in Solr, Sphinx Search, and Manticore search. I have 10+ years of experience implementing, scaling, fine-tuning large scale full-text search using Solr, Sphinx/Manticore search. Have implemented several large-scale searches with Elasticsearch, Sphinx, Manticore and Solr for eCommerce, forums, portals, internal custom search and more. I am an expert in setting up fully functional, large-scale SIEM using Elastic Stack (ELK). Have implemented log ingestion, thread hunting, alerting, reporting etc. for SIEM. I am an expert of beats, wazuh, elastalert and many more. I am also an expert with XPack for securing Elastic Stack. If you need to implement, upgrade, maintain, optimize, need proof of concept around ELK, I can help. If you are having any sort of issues with Sphinx / Manticore, Elasticsearch or Solr, you should contact me.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Grok Framework
    Network Security
    Grafana
    Kibana
    Logstash
    Firewall
    Elasticsearch
    Magento
    Apache Lucene
    PHP
    Full-Text Search
    Sphinx
    Apache Solr
    MySQL
  • $200 hourly
    An Expert Vetted writer with a background in cybersecurity and engineering, I provide content that positively impacts client search visibility and sales. My content increases organic traffic, user engagement and revenue for enterprise businesses including Microsoft, Adobe, Rackspace, CloudLinux, SolarWinds and IBM. I "speak" to CIOs, CTOs, CISOs, software engineers, and other technical people using my experience in the field, and I have the ability to engage executives with the buying power to purchase your products. I've helped numerous cybersecurity companies, software engineers, B2B businesses, SaaS developers, API developers, and other technical organizations improve their search engine rank and generate revenue. Client analytics show that my content drives traffic and customers to client products, and they see an increase in revenue directly from my content. I can work with your SEO research or work with my own. I have a SEMRush account to perform keyword research and generate ideas for your site. I keep my workflow flexible for my customers so that they can focus on marketing their products and let me handle the content. A few target industries where I've helped clients the most: - Cybersecurity. I explain to developers how to write code that isn't vulnerable to common exploits or generate search engine traffic by reporting on the latest zero-day. - API providers. I write code and content to explain to developers how your API can help them. - SaaS. My content explains to buyers how your SaaS application improves productivity, saves them money, and helps your customers build better products. - B2B. I explain how your products help businesses using technical blog content written for your average customer. I write content for: - Industry blog posts - Whitepapers - Technical documentation, mainly for API endpoints and SaaS - Copywriting and website content Topics I cover: - SaaS - Cybersecurity - Network engineering, network security - Information security, infrastructure security - Email security - Software engineering, software development, programming - NIST framework - Compliance including HIPAA and PCI Languages I work with: - .NET (C# and VB.NET) - Python - node.js - SQL - JavaScript - PHP - PowerShell
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Information Technology
    Website Security
    Email Security
    Search Engine Optimization
    Technical Writing
    Information Security
    SaaS
    Network Security
    Technical Documentation
    Cloud Security
    Marketing
    Content Management
    Copywriting
    Technical Editing
    Content Writing
  • $40 hourly
    Hi, Welcome! Myself Shumail Abbasi. I am a creative, innovative, and multitasking engineer. I have strong experience in the software industry and in that experience I used different kinds of tools and technologies which I discussed below As an Elasticsearch Engineer -- I also have worked on the ELK stack and did multiple tasks: - Rule Writing on Windows events for alerting. - Configuration of Elastalert and sending Emails. - Using opensource repos like Preaco, Enhanced the capability and scalability of elastalert - Worked on Kibana plugin for elastalert - I have worked on kibana dashboards for custom visualizations - Using kibana plugins, i have also created customized dashboards that are not available in kibana - Created a custom UI for elastalert - Worked with winlogbeat to collect windows logs - Metric beat for collecting system information - Auditbeat for system file integrity check - Filebeat to send custom data from any operating system - Logstash to process the sent data and apply filters on it - Connection of Elasticsearch with python - Bulk data insertion and simple CRUD operations using python - CRUD operations using JavaScript - Custom query building using react for data filtering from Elasticsearch - Setting up Endpoint Security As a Professional Pen Tester and Information Security Analyst - In the last years, I did multiple Penetration Tests and Security Assessments. Most of them are on Web applications implemented with various technologies and frameworks, server security testing and hardening. - Strong experience in Malware Removal, Vulnerability Assessment, Website Security, Bug Fixer, Metasploit, NMAP, Risk Analysis, Spoofing Detection Tools, MAC Spoofing Tools, Wireshark, ARP Poisoning Tools, Information Security Management Policies, ISO Standards 27001 Organization Policies, CEH Attacks techniques, Cryptography Algorithms, RSA, DES etc and much more. I did work with that type of organization that cares about quality work. If you’re looking for a Server Administrator or a Cyber Security expert who approaches your business with the same level of commitment and expertise as you approach yours, then let’s set up a time to chat. As a Web Developer - Have experience in different kinds of programming languages like Python, Java, C#, and C++. - Have a piece of solid knowledge about Platform Independence. - Also used different kinds of frameworks like Django, and .NET Core. - For front end in web designing, I used Bootstrap and especially MDB. As an Android Developer -- Have done multiple successful projects for clients which include following: - Air e-Nexus Application - Air Sports Week Application - VPN Application - Tutor Android Application - Time table Scheduling Application - Fitness Application using Mobile Sensors - Truth Table Learning Application My goal will always be to meet your needs and deadline. The competency of my work lies in working from start to end so as to bring your ideas to life. I treasure quality and delight in punctuality. I am flexible with my working hours and am happy to work closely with any existing freelancers you work with. I look forward to hearing from you.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    SOC 2
    Elasticsearch
    ISO 27001
    Linux System Administration
    Python
    DevOps
    Android
    ELK Stack
    Android App Development
    Django
    RESTful API
    Vulnerability Assessment
    Information Security
    System Security
    Penetration Testing
  • $150 hourly
    Experienced Chief Security Officer, CTO, and client-facing business-oriented cybersecurity professional. Experience building cybersecurity and cyber intelligence products, services, and departments from end to end - from idea to delivery, operations. Expertise, Experience, and Services: -Cybersecurity Posture Enhancement Programs -Penetration Testing and Risk Assessments -Regulatory Compliance and Audit Preparation, Including Policy/Procedure Documents -Virtual CISO Services -Training and Awareness -Incident Response Key Deliverables and Outcomes: -Secure systems and peace of mind via evidence-based penetration tests and risk assessments -Compliance with the needed security, financial, legal, health, and regional regulatory requirements
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Strategy
    Compliance Consultation
    ISO 27001
    Information Security Audit
    HIPAA
    SOC 2
    Compliance
    Security Management
    Content Creation
    Article Writing
    Product Architecture
    Cybersecurity Management
    Security Assessment & Testing
    Penetration Testing
    Information Security
  • $111 hourly
    I specialize in Cybersecurity, threat mitigation (hacking cleanup and repair) and system administration on a enterprise scale, as well as full stack development. Complete, integrated and reliable solutions to the most challenging and unique business IT needs, no matter the complexity or difficulty. Fluent in PHP, HTML, JavaScript, Node, and several other programming languages. Experienced Network architect Cybersecurity preventative monitoring and protection, threat detection, and response Cloud Infrastructure management, consulting, and deployment Web & Database migration, management and repair I am your complete IT solutions provider, with over 5+ years of experience!
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Security Assessment & Testing
    System Administration
    Vulnerability Assessment
    Security Engineering
    Cloud Security
    Malware Removal
    Cloud Management
    Cloud Architecture
    Security Infrastructure
    IT Consultation
    Information Security
    System Hardening
    DevOps
    PHP
    WordPress
  • $35 hourly
    As a top-tier freelance professional, I am committed to delivering first-class work, adhering to timelines, and maintaining budgets. Recognizing the importance of transparent communication and teamwork throughout a project's lifecycle, I consistently aim to keep communication lines open with clients. Whether your need is for algorithm design or the implementation of a cybersecurity solution, I am confident in my capabilities and experience to provide results tailored to your unique needs.
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Automation
    Circuit Design
    Reverse Engineering
    Scripting
    Encryption
    Mathematical Optimization
    Data Scraping
    Cryptography
    Mathematics
    JavaScript
    Information Security
    Data Analysis
    Algorithm Development
    Python
    Machine Learning
    MATLAB
  • $150 hourly
    I'm Shofiur Rahman Certified Ethical Hacker and PenTester. With 10+ years of experience in Providing Cyber Security related services. I provide a variety of security services including white/gray/black hat penetration testing, network, and host auditing, Policies, and Business Impact Analysis. My core competency lies in performing black and gray box testing, on the live web applications/networks or in lab environments. I am familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of my work is confidential I can share a vulnerability assessment sample. I have experience in vulnerability assessment for PCI & HIPAA Compliance. Service Description Main Skills: Penetration Testing, Web Application Security. Social Engineering, Red team assessment, Ethical Hacking & Countermeasures, Vulnerability Assessment, Malware Analysis, and Server Security Hardening. Pentesting tools: BurpSuite Professional, sqlmap, nmap, Metasploit, OpenVAS, Mimikatz
    vsuc_fltilesrefresh_TrophyIcon Certified Microsoft 365 Security Administrators
    Ethical Hacking
    PCI
    Security Infrastructure
    Web App Penetration Testing
    Network Penetration Testing
    Internet Security
    Security Analysis
    Network Administration
    Website Security
    Vulnerability Assessment
    Information Security Consultation
    System Security
    Security Testing
    Penetration Testing
    Source Code Scanning
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Certified Microsoft 365 Security Administrator on Upwork?

You can hire a Certified Microsoft 365 Security Administrator on Upwork in four simple steps:

  • Create a job post tailored to your Certified Microsoft 365 Security Administrator project scope. We’ll walk you through the process step by step.
  • Browse top Certified Microsoft 365 Security Administrator talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Certified Microsoft 365 Security Administrator profiles and interview.
  • Hire the right Certified Microsoft 365 Security Administrator for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Certified Microsoft 365 Security Administrator?

Rates charged by Certified Microsoft 365 Security Administrators on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Certified Microsoft 365 Security Administrator on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Certified Microsoft 365 Security Administrators and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Certified Microsoft 365 Security Administrator team you need to succeed.

Can I hire a Certified Microsoft 365 Security Administrator within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Certified Microsoft 365 Security Administrator proposals within 24 hours of posting a job description.

Schedule a call