Hire the best Certified Systems Security Practitioners

Check out Certified Systems Security Practitioners with the skills you need for your next job.
Clients rate Certified Systems Security Practitioners
Rating is 4.7 out of 5.
4.7/5
based on 295 client reviews
  • $85 hourly
    Security engineer and technical editor/writer specializing in cybersecurity architecture, operations, compliance/audit readiness, vulnerability scanning/pen testing, and technical documentation. Experience drafting security policies/procedures, and conducting cybersecurity framework mapping/pre-audit prep for NIST, PCI DSS, SOC2, HIPAA, HITRUST, GDPR, ISO 27001, and privacy and security frameworks. Proven track record of technical team and project management.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    HIPAA
    Technical Documentation
    NIST SP 800-53
    ISO 27001
    Technical Writing
    IT Compliance Audit
    SOC 2 Report
    Internet Security
    Security Infrastructure
    Application Security
    Information Security
    Penetration Testing
    Cybersecurity Management
    System Security
  • $45 hourly
    With my 6 years of professional experience designing software and embedded system firmware, I can get your project completed with top-level techniques quickly. I will provide professional-level outputs and get you the most for your money. My experience in new product integration will help me guide you through your project from concept to full production. I also have several years of experience in firmware and software testing and solutions. Countless hours in the embedded system and video streaming to characterize issues and develop solutions that were constrained by device firmware, back-end, and desktop software. I am an expert with, computer-aided design and analysis software, including but not limited to STM32 CubeMX IAR Workbench Keil uVision Segger Studio FreeRTOS AWS IoT Core/AWS Lambda
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Qt Framework
    API
    C#
    Windows App Development
    .NET Core
    Desktop Application
    .NET Framework
    Firmware Programming
    C++
    Python
    STM32
    Embedded Linux
    Raspberry Pi
    Arduino
    Embedded C
  • $25 hourly
    ✅ As a CREST/Offensive Security (OSCP) Certified Penetration Tester and Cyber Security Consultant, I have deep knowledge of Security Assessment Methodology to identify vulnerabilities in Network, API, Web, and Mobile Applications. ✅ I have conducted Penetration Test, Vulnerability Assessment and delivered professional reports to companies in the world complying with: ► CREST standards ► Offensive Security (OSCP) standards ► OWASP Top 10 Vulnerability ► OWASP API Security Top 10 Vulnerability ► OWASP Mobile Security Top 10 Vulnerability ► Application Security Verification Standard 4.0 (ASVS 4.0) ► CWE Top 25 Most Dangerous Software Errors ► ISO 27001 Penetration Testing ► Payment Card Industry Data Security Standard (PCI DSS) ► General Data Protection Regulation (GDPR) ► Common Vulnerability Scoring System (CVSS) ► Open Source Security Testing Methodology Manual (OSSTMM) ✅ I have some cybersecurity certifications including: ► CREST Registered Penetration Tester (CRT) ► CREST Practitioner Security Analyst (CPSA) ► Offensive Security Certified Professional (OSCP) ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ► Executive Summary ► Assessment Methodology ► Type of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings. Each finding listed within the report will contain CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ► Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, Zaproxy, Gobuster, etc.) ✅ Please contact me if you have any question. ✅ Thank you and have a good day!
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Security Analysis
    Software Testing
    White Box Testing
    Web App Penetration Testing
    OWASP
    Black Box Testing
    Network Penetration Testing
    Information Security
    Website Security
    System Security
    Penetration Testing
    Security Testing
    Vulnerability Assessment
  • $100 hourly
    - Expert Vetted 🌟 - 100% Job Success Score 🏅 - 15+ years of professional experience 👩🏼‍💻 - 28 Jobs done ✅ on Upwork - 6700 hours worked 🕝 on Upwork - 🏅Experience working with startups, global corporations, and small and large organizations from various industries. I am Chartered IT Professional, Google Cybersecurity Career Certificate Graduate, EC Council Certified Chief Information Security Officer, Certified Information Systems Security Auditor, Certified ISO 27001 Lead Implementer, Certified ISO 27001 Lead Auditor, OWASP Core Security Belt Certified, OWASP API Security Certified, Certified Identity Governance Expert, Certified Identity and Access Manager, Certified GRC Professional, Certified GRC Auditor, Integrated Data Privacy Professional, Certified Scrum Master, BCG Certified Strategy Consultant, Six Sigma Black Belt Professional, GDPR Certified Data Protection Officer, Certified HIPAA Officer & results driven management consultant with 15 years experience in compliance, data protection, SOC 2, ISO 27001, HDS, C5 and NIS2 Controls Implementation, innovation, design thinking, ideating solutions, process improvement, pricing strategy, data analytics, business process outsource, project management, market research, financial analysis, investment banking, cybersecurity and diagnosing a range of problems, from small businesses to multi-million dollar corporations. I have done past projects with HouseCall MD, Varian Medical Systems, DNX VC, Syntervision, FourthRev and Loggi. Previously I have worked as Engagement Manager at KPMG and Senior Auditor at Grant Thornton, where I took part in several consulting assignments in healthcare and life sciences, logistics, TMT, services, consumer and transportation sectors. I also have vast experience of managing projects from start to inception including projects funded by ADB, UNESCO and WHO. I have also completed more than 15 market research studies in different verticals for determining the market size and overall analysis of target markets. I also have experience of working as Head of Product Design where I led the development teams to identify customer pain-points, develop user needs and solve customer problems by creating products with built-in security features. I also worked on developing customer personas & identifying and recruiting sponsor users for A/B testing of product features and arranging Cognitive walkthroughs for establishing the usability of products. I also applied knowledge of Scrum Framework with sprint planning and delegation of tasks on product development projects for various public and private sector organizations. I managed 10 projects of more than $1 Million in total budget. Other than above, I also have hands on experience with various compliance frameworks including GDPR, HIPAA, PCI DSS, ISO 27001, HITRUST, CCPA and NCSF (NIST Cybersecurity Framework). Key Achievements: ✅ Successfully led 8 companies through the SOC 2 Type 2 attestation process, meeting stringent requirements and passing all audits in the first attempt. This achievement significantly enhanced their reputation for data privacy and security. ✅ Guided 4 clients through the rigorous process of achieving ISO 27001 and NIS2 Directive Certificate, ensuring that all security controls and management processes were robust, auditable, and internationally recognized. ✅ Guided 2 clients through HDS and C5 certifications, ensuring that their security posture was aligned with the requirements of both compliance frameworks. ✅ Reduced the costs of IT infrastructure maintenance by 5% for 3 consulted clients ✅ Analyzed business conditions, market/industry trends, competitive influences and demographic factors to identify opportunities of business growth for 5 consulted clients ✅ Created advanced analytics for both internal and marketing use using Tableau, SQL and other BI tools for 4 consulted clients ✅ Managed $400 million donor funded projects as PMO and Project Lead ✅ Performed business process re-engineering for 3 consulted clients ✅ Consulted as lead revenue data analyst on a team responsible for collecting $60M receivables ✅ Repeatedly delivered cost reductions through the implementation of Lean principles, improved scheduling via resource loads and volume analysis ✅ Evaluated and increased operational effectiveness of organizations through the implementation of Continuous Improvement methods and Training/Coaching programs ✅ Identified opportunities within the client organization for improving productivity and operational efficiencies by installing a system by which the client can measure and realize improvement ✅ Analyzed existing processes and applied methodologies to eliminate wasted resources and time for 3 consulted clients
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Internal Auditing
    Data Protection
    Vulnerability Assessment
    AI Security
    Governance, Risk Management & Compliance
    Ransomware Mitigation
    Insurance & Risk Management
    User Authentication
    Linux System Administration
    Information Security
    Network Security
    ISO 27001
    Amazon Web Services
    SOC 2 Report
    Python
  • $70 hourly
    Top Rated Penetration Tester & Cybersecurity Expert With over 8 years of hands-on experience in ethical hacking, penetration testing, and vulnerability assessments, I have conducted numerous security audits for clients ranging from startups to large enterprises. My work helps organizations strengthen their security posture by identifying vulnerabilities and providing actionable remediation advice. What I Offer: ✅ Comprehensive Penetration Testing Tailored manual testing of websites, applications, servers, and network infrastructures. I use a combination of enterprise-grade tools (e.g., BurpSuite Pro, Nessus) and custom scripts to ensure thorough coverage. ✅ Detailed Reports & Proof-of-Concepts My reports provide step-by-step explanations of vulnerabilities, including screenshots, requests, and CVSS risk scores, so you can clearly understand the security risks and their impact on your business. ✅ Expert Remediation Guidance I offer advice on how to fix discovered issues, helping you mitigate risks effectively while ensuring compliance with standards like PCI-DSS, GDPR, and HIPAA. ✅ Asset Discovery & OSINT Reconnaissance I help map your digital footprint and identify exposed assets. This includes subdomain enumeration, service discovery, and collecting sensitive data from breached sources across the web. ✅ Free Retests After remediation, I provide a complimentary retest to ensure vulnerabilities have been correctly resolved. Certifications: ✅ OSCP (Offensive Security Certified Professional) ✅ CEH (Certified Ethical Hacker) If you're looking for an experienced professional to safeguard your business, I'm here to help.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Cloud Security
    Security Assessment & Testing
    Internet Security
    Web App Penetration Testing
    Security Analysis
    Security Infrastructure
    Information Security Audit
    Web Application Security
    Information Security
    Vulnerability Assessment
    Security Testing
    Database Security
    System Security
    Application Security
    Network Security
    Penetration Testing
  • $39 hourly
    I am OSCP and CRTO Certified with 8 years of professional experience in different pentesting and red teaming trade crafts. Challenges make me work more efficiently. What is a better challenge than doing penetration testing in which knowledge and experience are the main factors to successfully finding a way inside Targets? - Manual testing approaches with real-impact vulnerabilities - Exposure to multinational companies and Swiss banks - Industry-renowned certifications (OSCP - CRTO - eWPTXv2 - CMSE - CPTE - CEI - CCNA) - "Find my way in" mentality therefore 80% of projects end up in successful breaches Key Skills for Pentesting Jobs ---------------------------------- Web Applications Pentesting Network Pentesting REST API/SOAP Pentesting Mobile Applications Pentesting Desktop Applications Pentesting Source Code Reviews Active Directory Assessment Key Skills for Offensive Jobs --------------------------------- Email Phishing (Maldoc or stats based) Social Engineering Assume Breach Scenarios MITRE ATT&CK framework Simulations Tactics, Techniques, and Procedures Testing against patched Infra Malware Development
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Black Box Testing
    Information Security
    Vulnerability Assessment
    System Security
    Application Security
    Network Security
    Information Security Consultation
    Cloud Security
    Penetration Testing
    Web App Penetration Testing
    Network Penetration Testing
    Web Application Security
    Ethical Hacking
    Security Testing
    Mobile App Testing
  • $35 hourly
    ⭐️⭐️⭐️⭐️⭐️ ”Ahmed was delivering on time and was proactive. He raised concerns and suggested improvements along the way. We will work with him in the future. Strong recommendation (Linux and cloud systems engineer)” ⭐️⭐️⭐️⭐️⭐️ “Irsal helped me out very quickly and professionally. His communication was fantastic, and he knows his stuff. I won't hesitate to hire him again in the future (Linux)” ⭐️⭐️⭐️⭐️⭐️ “Ahmed's leadership in migrating Jira from on-prem to the cloud was marked by his comprehensive knowledge of the platform. He ensured a smooth transition and provided our team with in-depth training on the Atlassian stack. His expertise extends to all aspects of Jira administration, including project configurations, workflows, custom fields, and plugins like ScriptRunner and EazyBI. As a systems and cloud engineer, he also has a deep understanding of Jira's underlying infrastructure, including servers and databases. He recommended some security measures in Jira and our infrastructure as well. He was proactive and timely communicative. If you want to hire someone who needs their Atlassian stack setup like Jira, Confluence, and BitBucket and who can take care of your systems, let Ahmed take care of it. Overall, it was a nice experience working with him, and will definitely work in the future (Jira)” 🏆 Top rated plus with 6850+ hours of achievements ✅ 😊 8+ happy customers and still going on 👨‍💻 Professional solutions engineer with experience in Systems Engineering, Atlassian Administration, Zapier integration, and Security consultation I’m an experienced solutions engineer who helps my clients succeed by translating business needs into technical solutions. With 7+ years of experience, I have worked on several projects, from implementing data analysis tools to rolling out ITIL practices. Here are a few highlights of projects I have completed. 📊 Implementation of Qlik Sense Server/Enterprise for significant clients such as PEPSI Pakistan and, Colgate-Palmolive Pakistan, ADNoc UAE, delivering end-to-end solutions that enhance data analytics. 💻 Development of a Virtual Desktop POC using Azure Virtual Desktop, facilitating a smooth transition to modern workspace solutions. 🔄 Standardization of workflows for 40+ engineering teams in Jira, improving project management across diverse initiatives. ⚙️ Operationalization of Adaxes and scrum process automation, streamlining team collaboration. 🤖 Automation of incident management processes through Zapier integrations, enhancing efficiency across teams. 🛠️ Service management portal setup using ITIL practices for various departments, promoting effective service delivery in Jira Service Management. 🔒 Vulnerability policy definition and implementation using tools like Qualys, ManageEngine Endpoint Central (ManageEngine Desktop Central), and Jamf. ☁️ AWS cost management and IAM configuration, optimizing cloud resource utilization. 🐧 Linux administration across various distributions (Ubuntu, Redhat, CentOS, Fedora), ensuring robust server performance 🔐 Google Workspace management for secure user access, including 1Password rollout for enhanced security. 🌐Jira migration from OnPrem to Cloud Apart from the rollout of these projects, I have several skills in cybersecurity, DevOps practices, documentation, knowledge base, Ansible playbooks, SailPoint administration, and Zscaler administration. VPN infrastructure, EndPoint security, Citrix Administration, Active Directory, Microsoft EntraID (aka Azure directory) administration, solutions architect, Databases (PostgreSQL, MySQL), Azure applications, and Okta administrator. I am dedicated to ensuring you achieve your goals and would love to discuss how I can support your projects. Let’s connect and explore how we can work together to create impactful solutions for your business!
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Automated Workflow
    IT Service Management
    System Administration
    Project Workflows
    Scrum
    Helpdesk
    Agile Project Management
    Atlassian Confluence
    Cloud Engineering
    Vulnerability Assessment
    Jira
    System Security
    ITIL
    Cybersecurity Management
    Linux System Administration
  • $40 hourly
    I am ISO27001 certified cyber security expert with over 10 years of experience in desktop application development and cyber security. I love taking up challenges that may seem impossible to many, for all types of systems. My main expertise is bypassing defence (antiviruses/firewalls/EDR), removing false positive detections on virustotal, Malware development, web application hacking, penetration testing, API hacking, breaking application security, decompiling, reversing, scam/hacking/blackmail incident research, malware research, Desktop Application Development in C/C++/C# .NET/Python System Security Audits / Malware Cleaning/ System Hardening / System Forensics, bypassing AVs, evasion, injection through latest techniques Technical report writing / Technical Consultation and Analysis (Related to Cyber security)
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Virus Removal
    Writing
    Penetration Testing
    Security Assessment & Testing
    Security Analysis
    Desktop Application
    Article Writing
    Information Security
    System Security
    Security Testing
    Encryption
    Application Security
    Ethical Hacking
    Windows App Development
    C#
    C++
  • $30 hourly
    🔢 As a seasoned Penetration Tester, I have a proven track record of conducting and leading successful security audits, web application penetration tests, and red team engagements for a diverse range of clients. My experience ranges from working with multinational corporations with large-scale infrastructures to smaller companies seeking enhanced security measures for competitive advantage. As a security engineer, my day-to-day responsibilities revolve around leveraging my expertise in penetration testing, cyber security, and vulnerability assessment to identify and mitigate potential vulnerabilities. Through these experiences, I have comprehensively understood the prevailing technology stacks employed worldwide, allowing me to discern their security weaknesses with precision. 🚫No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined. Working with me, you will: ★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ★ Complete manual testing for your application and immediate notification if any high-impact issues are found. ★ Unlimited retesting for the fixed issues and unlimited revisions ★ Able to find critical bug classes that are often missed by automated pentests. 🔢 My stats are: ✅ Top-rated in information security and IT compliance categories ✅ Saved tens of thousands of dollars for clients by identifying critical vulnerabilities ✅ Ranked in the Top 50 at multiple bug bounty programs ✅ Supporting all time zones ✅ Long-term engagements ✅ Professional certifications (OSCP, CREST CPSA, OSEP, OSWP) Sound like a fit? 🟢 Press '...' button and then ‘Send Message’ button in the top right-hand corner Penetration Testing and Vulnerability Assessment Tools: Manual Testing: Burpsuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), Metasploit Framework, SQLmap, OWASP ZAP Automated Testing: Acunetix, Nessus, Netsparker, etc. Penetration testing service: 1. Penetration Testing Engagement: thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing. Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus. 2. Professional Report and Statistics: A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact. 3. Remediation Advice and Guidance: Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities. 4. Asset Discovery: Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery. 5. Free Retest: Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended. 6. OSINT Reconnaissance: Gather all valuable data about the company on the internet, including any breached email addresses and related passwords. 7. Briefing and debriefing: Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required. Calls or meetings are available after the penetration test is completed to discuss the engagement results, the main issues and concerns regarding the company's security, and any further clarification regarding any vulnerability and the associated impact or risk. ✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes: ► Executive Summary ► Assessment Methodology ► Types of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings: Each finding in the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections. ► Retest for issues (The vulnerabilities will be retested after they're fixed; multiple retests can be done to ensure the issues are remediated.) My Expertise: ★ Web Application Security Testing ★ API security testing ★ Penetration Testing ★ Internal Active Directory and External Network Pentest ★ Vulnerability Assessment. ★ Thick Client Pentest (Windows Desktop App Testing) ★ OSINT Assessement
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Risk Assessment
    OWASP
    Network Penetration Testing
    Black Box Testing
    Web Application Security
    Website Security
    Web App Penetration Testing
    Application Security
    System Security
    Vulnerability Assessment
    Security Testing
    Security Assessment & Testing
    Network Security
    Penetration Testing
    Information Security
  • $30 hourly
    I am a crypto scam recovery expert with over 8 years of experience in the field. I am specialized in cyber crime investigation, cyber defense, penetration testing, and vulnerability assessment, Crypto scam recovery, Blackmailer Identification, Hack Investigation and Digital Forensic. I have began my career as a cyber crime investigator, where I worked on complex cases involving computer fraud, hacking, and identity theft. I was able to use my technical skills and attention to detail to uncover evidence and bring perpetrators to justice and quickly became known for my ability to navigate the digital landscape and track down the source of cyber attacks. After years of experience in cyber crime investigation, I was also responsible for conducting penetration testing to identify and address vulnerabilities in networks and systems, as well as conducting vulnerability assessments to identify potential weaknesses. I have a deep understanding of the latest security technologies and methods, and is always seeking new ways to stay ahead of the ever-evolving threat landscape. #Bitcoin recovery services #Crypto Wallet Recovery #Investigate Cryptocurrency Scams #Wallet Transaction Analysis #Stolen Funds Tracing And Recovery #Crypto Investment Farms Investigation #Crypto Asset Security & Protection
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Cryptocurrency Trading
    Web App Penetration Testing
    Crypto Wallet
    Cryptocurrency
    Data Recovery
    Ethical Hacking
    Social Engineering Assessment
    Crypto Exchange Platform
    Tech & IT
    Vulnerability Assessment
    System Security
    Digital Forensics
    Malware Removal
  • $42 hourly
    ✔️Penetration Testing ✔️Vulnerability Assessment services and 5 ⭐Rating with Repetitve Clients I am a Certified CyberSecurity Professional with 5+ years of experience in Pentest of External/Internal Network Infrastructure, Web applications, and Mobile (Android & IOS) applications. I also hold Industry's renowned Certifications, aimed for Experienced Penetration testers like OSCP & CREST Certification. ============== Am I the Best Fit for your Job? ============ If you are a small or medium-sized business that operates online and handles sensitive data, I can provide you with expert Penetration Testing and Vulnerability Assessments to ensure the security of your systems and networks. My services can help you Comply with regulations and industry standards like PCI-DSS, IOS 27001, GDPR, and HIPAA, giving you peace of mind and protecting your reputation. ============== Why Me? ============ My Unique Pentest Methodology includes: ✅Focused and Comprehensive Manual Penetration Testing based on OWASP Top 10 and PTES. ✅A Detailed and Easy-to-Understand Pentest Report about the Findings, along with their Impact and Remediation Methods. ✅ Automated Testing via Paid Professional Tools (Only if you Authorize me). ✅ Conducting Pentest in a Safe and Controlled Environment. ✅ Free Re-Testing to confirm Fix applied correctly ============== Certifications I Owned ============ • CREST CRT - CREST Registered Penetration Tester A practical assessment exam where the candidate is expected to find known vulnerabilities across common network, application and other technologies. Many regulatory bodies in United Kingdom(UK) and Australia require the use of CREST certified provider for penetration testing. • OSCP - Offensive Security Certified Professional OSCP is a well-respected certification and a lengthy 24 hour exam for those that aspire to become senior-level penetration testers. It trains not only the skills, but also the mindset required to be a successful penetration tester • CEH - Certified Ethical Hacker The CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    WordPress Security
    Virus Removal
    GDPR Compliance Review
    WordPress Malware Removal
    PCI DSS
    ISO 27001
    Website Security
    Web Application Security
    OWASP
    Web App Penetration Testing
    Network Penetration Testing
    Network Security
    Nessus
    Penetration Testing
  • $60 hourly
    🚀 DevOps & Sys Admin Expert with over 6 years of experience 🚀 🔹 65+ Total Jobs Completed 🔹 1600+ Total Hours Worked 🔹 100% Job Success 🔹 Top Rated Are you seeking a seasoned DevOps and Sys Admin professional to streamline your development processes and fortify your infrastructure? Look no further! With a robust background in both DevOps methodologies and system administration, I bring a wealth of expertise to the table, ensuring seamless operations and optimal performance for your projects. 🔧 DevOps/Cloud Skills: Google Cloud, AWS, OVH Traefik, Docker/Podman, Kubernetes, Docker Swarm Cloudflare, Grafana & Prometheus, Harbor Jenkins, Groovy, Amazon ECR, Terraform, Ansible Git, Github Actions, Gitlab CI/Pipelines SonarQube, Nexus, Selenium, Hashicorp Vagrant Keycloak, Vault, Maven, Gradle, Npm, Node Containerization of Dev & Prod environments 🛠️ System Administration Proficiency: Nix/Linux, RHEL Nginx, Apache, Tomcat, Jboss PostgreSQL, Mysql, Mongodb Pacemaker Clusters, Corosync, LVM, VDO, Stratis Bash & Python Scripting Kannel, Jira, Alfresco, Munin, Zabbix Postfix, fail2ban 🔒 Network/Infrastructure Expertise: OPENVPN, IPSEC & L2L SDN, TCP/IP, SSL SMPP and SMS, SMTP, DNS, DHCP, NTP, FTP, SSH, T.38 pfSense, Cisco ASA, VMware With a proven track record of delivering high-quality solutions and optimizing IT operations for clients across various industries, I am committed to exceeding your expectations and driving your projects towards success. Let's collaborate and elevate your business to new heights!
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Computing & Networking
    Database Optimization
    MySQL Programming
    Containerization
    Docker Compose
    Linux System Administration
    Red Hat Enterprise Linux
    Application Server
    Database Administration
    System Security
    Web Server
    Google Cloud Platform
  • $95 hourly
    I am a Cyber Security and Information Technology expert with 20 years experience ranging from small start-ups to multi-billion euro businesses. I hold a CISSP, the gold standard of Information Security Qualifications and I am a certified PCI Professional (PCIP) I specialise in Strategy, Governance, Risk and Compliance - this makes me ideal for projects such as: Helping you achieve Cyber Essentials or IASME Governance status PCI-DSS & ISO 27001 compliance programs and audits Being your Cyber Security / Info Sec manager or CISO on a part-time basis Selecting and managing IT and Cyber Security suppliers on your behalf Writing, reviewing and updating your IT and Cyber Security policies Security Awareness Training I am an award winning public speaker and trainer and my Cyber Security Awareness Training is very popular delivered in person or from my online studio to clients around the world.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    GDPR
    Security Infrastructure
    Information Security Awareness
    ISO 27001
    PCI DSS
    Information Security Audit
    Information Security Governance
    Certified Information Systems Security Professional
    PCI
    Information Security
    Security Policies & Procedures Documentation
    Incident Response Plan
    Vulnerability Assessment
    Security Assessment & Testing
    Network Security
  • $66 hourly
    As a dedicated Computer Engineering student, I've invested years in mastering ethical hacking, web app penetration testing, and conducting OSINT investigations, starting my journey in 2018. Through practical application and thorough testing of these skills, I've evolved into a versatile professional, excelling as a hacker, proficient web app penetration tester, adept vulnerability assessment specialist, and detail-oriented OSINT investigator. My track record speaks for itself, boasting a pristine reputation and a flawless 100% success rate across all Jobs FAQ Q: Am I certified 🤔? A: yes,I am certified web app Penetration tester with eWPTv2 from INE Q: What tools do i use in Penetration testing? A: That depends on the job, so sometimes i use manual scans and exploits and sometimes i use tools like (Nmap, BurpSuite, Metasploit, Nessus, SQLmap, OpenVAS, WPScan, Nikto, TestSSL)
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Linux System Administration
    Internet Security
    Website Security
    Web App Penetration Testing
    Aircrack-ng
    Article Writing
    Black Box Testing
    Cybersecurity Monitoring
    Ethical Hacking
    Web Testing
    Digital Forensics
    Cybersecurity Management
    System Security
    Vulnerability Assessment
    Penetration Testing
  • $40 hourly
    "Erdem is an AMAZING freelancer that I will be working with in the future. His communication and professionalism is exactly what we were looking for. If you are looking for great talent, you found it with Erdem!" ⭐️⭐️⭐️⭐️⭐️ "Erdem was always available for us and helped us very well in a critical situation (website down). We highly recommend this freelancer, and we will work with him again without any doubt." ⭐️⭐️⭐️⭐️⭐️ Working with Erdem has been a great experience. He is very professional with communication. All things we assigned were done with ease and before our deadlines. Thanks again!" ⭐️⭐️⭐️⭐️⭐️ "Erdem is an amazing freelancer and will be working with him in the future on several different projects. He is helpful and wants to make sure the projects are completed perfectly. I have worked with tons of freelancers over the years and Erdem is one of the best." ⭐️⭐️⭐️⭐️⭐️ System administrator that brings both technical side and business side of things together. Having five years of experience in System Administration and business management brings forward the person to add value to your startup or business. It does not matter if you have a complete plan on your desk or just an idea on your mind, contact me and let’s eliminate all question marks. A short list of things I worked on before: ✅Setting up Dedicated and Cloud servers for clients and agencies. ✅Installing, configuring, and managing control panels (Cpanel, Plesk, Cyberpanel). ✅Virtualization of Dedicated server with Proxmox VE using different RAID configurations. ✅Installing and configuring BigBlueButton and Scalelite. ✅Configuration tweaks for existing servers of clients to achieve better performance and lower TTFB. ✅Configure local and remote backups. ✅Server migration between different operating systems or control panels. ✅Fixing webserver (apache, nginx, litespeed) related issues. ✅Mailserver configuration and setup. ✅DNS configuration and setup. ✅Total server management for agencies. I have worked with most of the server provider companies, including Hetzner, OVH, DigitalOcean, AWS, Linode, Google Cloud, Microsoft Azure, Contabo, and Vultr. "Erdem rescued my website from a dire situation. Traffic, revenue, and usability have been greatly improved in a matter of hours. Erdem did a great job of communicating what he was doing and why. The work was completed the day the contract started, and everything was delivered as promised. I would recommend working with Erdem over any user claiming to be an SEO or WordPress "expert"." ⭐️⭐️⭐️⭐️⭐️ "Excellent WordPress migration work carried out in record time. Efficient and serious. I highly recommend him." ⭐️⭐️⭐️⭐️⭐️ "It is rare to find good talent that you will work with in the future.....but Erdem is someone I will be coming back to, over and over. He is personable and very proficient in his duties. Having him on call when I need him will make my life easier going forward!." ⭐️⭐️⭐️⭐️⭐️ Five yearsof experience in WordPress Development and Project Management. Created or worked on more than a hundred projects. If you just started a Project, don’t know where to start with or what would be your total cost around mid to long term, I am the person you need on your side. I would love to share my experience and skillset with you. Contact me, and let’s start eliminating those question marks! A shortlist of things I worked on before: ✅Custom plugin development ✅Creating a website from scratch ✅Project Management ✅Speed optimizations on both server level and website level ✅Security enhancements ✅Cleaning Malware and fixing infected websites ✅Guidance on server budget ✅Website migration ✅CDN and Caching configuration My strengths: ✅Quick detection of a problem and coming up with a swift solution. ✅Communicating transparently in every situation possible to avoid a business relationship without trust. ✅Leadership and taking responsibility whenever it is necessary. ✅Flexible schedule and work hours depending on team and Project. ✅Ability to learn quickly and enjoying learning new things. ✅Fluent English I would love to work with people that can describe their requirements deductively, possess positive communication skills and an understanding of work ethics.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Moodle
    Learning Management System
    cPanel
    Website Optimization
    Cloud Management
    Website Migration
    WordPress
    WordPress Malware Removal
    Migration
    Proxmox VE
    Server
    System Security
    System Administration
    Linux
    Security Management
  • $30 hourly
    Introducing a cybersecurity expert with 5 years of experience as a 𝐩𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐭𝐞𝐬𝐭𝐞𝐫 and 𝐜𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬 𝐢𝐧 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 𝐚𝐧𝐝 𝐀𝐖𝐒 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲. An expert in safeguarding digital domains, turning vulnerabilities into strengths. Your digital realm's ultimate support is here. I will ensure your digital fortress stands unyielding.🔒🌐 𝙈𝙮 𝙊𝙛𝙛𝙚𝙧𝙞𝙣𝙜𝙨: 1. Comprehensive vulnerability assessment 2. Thorough penetration testing 3. Identification of security weaknesses 4. Risk analysis and prioritized recommendations 5. Exploitation simulation to assess real-world impact 6. Client-specific testing based on unique needs 7. Compliance with industry standards (e.g., OWASP) 8. Detailed, actionable report with mitigation steps 9. Ongoing support for security enhancements 10. Confidential and professional engagement 𝙒𝙝𝙮 𝙈𝙚?? 1. 𝗘𝘅𝘁𝗲𝗻𝘀𝗶𝘃𝗲 𝗘𝘅𝗽𝗲𝗿𝘁𝗶𝘀𝗲: Years of specialized experience in penetration testing. 2. 𝗣𝗿𝗼𝘃𝗲𝗻 𝗧𝗿𝗮𝗰𝗸 𝗥𝗲𝗰𝗼𝗿𝗱: Demonstrated success in identifying critical vulnerabilities. 3. 𝗧𝗮𝗶𝗹𝗼𝗿𝗲𝗱 𝗔𝗽𝗽𝗿𝗼𝗮𝗰𝗵: Customized testing to match your unique security requirements. 4. 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲 𝗔𝘀𝘀𝘂𝗿𝗮𝗻𝗰𝗲: Adherence to industry standards and best practices. 5. 𝗖𝗼𝗺𝗽𝗿𝗲𝗵𝗲𝗻𝘀𝗶𝘃𝗲 𝗥𝗲𝗽𝗼𝗿𝘁𝘀: Detailed findings and actionable recommendations. 6. 𝗖𝗼𝗹𝗹𝗮𝗯𝗼𝗿𝗮𝘁𝗶𝘃𝗲 𝗣𝗮𝗿𝘁𝗻𝗲𝗿𝘀𝗵𝗶𝗽: Engaging in open communication and client involvement. 7. 𝗧𝗶𝗺𝗲𝗹𝘆 𝗗𝗲𝗹𝗶𝘃𝗲𝗿𝘆: Efficient testing and prompt delivery of results. 8.𝗧𝗶𝗺𝗲𝗹𝘆 𝗗𝗲𝗹𝗶𝘃𝗲𝗿𝘆: Highest standards in data privacy and protection. 𝘾𝙚𝙧𝙩𝙞𝙛𝙞𝙘𝙖𝙩𝙞𝙤𝙣𝙨: 1. Certified Ethical Hacker (𝗖𝗘𝗛) By EC-Council 2. AWS Certified 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗦𝗽𝗲𝗰𝗶𝗮𝗹𝘁𝘆 By AWS 3. Certified 𝗔𝗣𝗜 𝗣𝗲𝗻𝗲𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝗧𝗲𝘀𝘁𝗲𝗿 By APISec University 4. Network Defense Essentials (𝗡𝗗𝗘) By EC-Council 5. Digital Forensics Essentials (𝗗𝗙𝗘) By EC-Council 6. Ethical Hacking Essentials (𝗘𝗛𝗘) By EC-Council 7. Network Security Expert 1 (𝗡𝗦𝗘-𝟭) By Fortinet 8. Network Security Expert 2 (𝗡𝗦𝗘-𝟮) By Fortinet 9. Network Security Expert 3 (𝗡𝗦𝗘-𝟯) By Fortinet 𝙄𝙣𝙙𝙚𝙥𝙚𝙣𝙙𝙚𝙣𝙩 𝙀𝙭𝙥𝙚𝙧𝙩𝙞𝙨𝙚 𝙔𝙤𝙪 𝘾𝙖𝙣 𝙏𝙧𝙪𝙨𝙩 I 𝐓𝐫𝐲𝐇𝐚𝐜𝐤𝐌𝐞 𝐓𝐨𝐩 𝟏 % I 𝗖𝘆𝗯𝗲𝗿𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿𝘀 𝗚𝗹𝗼𝗯𝗮𝗹 𝗥𝗮𝗻𝗸 𝟭𝟲
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Cybersecurity Monitoring
    Security Assessment & Testing
    Information Security Consultation
    Security Operation Center
    Cloud Security
    WordPress Security
    Web Application Security
    Network Penetration Testing
    White Box Testing
    Black Box Testing
    Vulnerability Assessment
    Network Security
    Application Security
    Penetration Testing
    Information Security
  • $13 hourly
    I'm a highly skilled and experienced Email Deliverability Specialist with expertise in DMARC, DKIM, SPF, and DNS management. If you're looking to optimize your email delivery rates and ensure maximum inbox placement, you've come to the right place. Here's a glimpse into my professional background: 💼 Email Deliverability Mastery: With a deep understanding of email authentication protocols and industry best practices, I specialize in helping businesses overcome email deliverability challenges. I can identify and resolve issues related to spam filters, blacklists, and bounce rates, ensuring your emails reach their intended recipients. 🔒 DMARC Implementation: Implementing Domain-based Message Authentication, Reporting, and Conformance (DMARC) is crucial for safeguarding your email reputation and preventing domain spoofing. I possess extensive experience in setting up and configuring DMARC policies, enabling you to protect your brand identity and enhance email security. 🔑 DKIM and SPF Setup: DKIM (DomainKeys Identified Mail) and SPF (Sender Policy Framework) are essential elements in email authentication. As an expert in these protocols, I can guide you through the process of generating DKIM signatures, setting up SPF records, and ensuring they are correctly configured in your DNS settings. This will boost your email deliverability and reduce the chances of your emails being flagged as spam. 🌐 DNS Management: A well-optimized Domain Name System (DNS) plays a crucial role in email deliverability. I have extensive experience in managing DNS settings for various email service providers and can help you configure the necessary DNS records, such as MX, TXT, and CNAME, to ensure smooth email delivery. 🚀 Results-Oriented Approach: My ultimate goal is to help you achieve optimal email deliverability rates and maximize the effectiveness of your email marketing campaigns. I stay updated with the latest industry trends and techniques to provide you with cutting-edge solutions tailored to your specific needs. If you're ready to improve your email deliverability, enhance your brand reputation, and ensure your messages reach the right audience, let's collaborate! Contact me today, and let's discuss how I can assist you in achieving your email deliverability goals. 📩 Please note that I am solely focused on email deliverability and related services. For other email marketing needs, kindly consider other experts specializing in those areas.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Email Security
    Email Campaign
    Email System
    Email Deliverability
    System Monitoring
    System Security
    Network Administration
    Office & Work Space
    System Administration
    Office 365
    Domain Migration
    Microsoft Excel
    Microsoft Endpoint Manager
    Google Workspace
    Email Support
  • $30 hourly
    👋 Hi there! I'm your go-to tech enthusiast 🚀 with a versatile skillset that bridges the gap between innovation and security. 👨‍💻 On the frontend, I wield the magic of ReactJS to craft captivating user experiences that engage and delight. 🎨 Backed by the powerful duo of Django and Flask, my backend expertise weaves the fabric of seamless functionality. 🌐 Python is my playground 🐍, where I craft scripts that bring efficiency to everyday tasks and supercharge processes. But wait, there's more! With Selenium, I've mastered the art of automation 🤖, utilizing sophisticated techniques to navigate around protections, gather data, and orchestrate tasks like a pro. 🤯 And here's where the plot thickens: my background in cyber security lends a unique layer to my skills. I'm not just coding; I'm coding securely. 🔐 Whether it's developing ironclad code or ingeniously bypassing protections, I've got your back. But that's not all! 🌟 I'm proud to share that I'm among the TOP 5% of Upwork's successful freelancers, all thanks to my coveted Top Rated Plus badge. 🏆 I don't just work; I architect experiences, fortify security, and bring ideas to life with a sprinkle of innovation. Let's collaborate and turn your projects into tech-powered masterpieces! 🌟🔒🔍
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Web Crawler
    Data Extraction
    Automation
    Linux
    Digital Forensics
    Vulnerability Assessment
    Reverse Engineering
    Ethical Hacking
    Penetration Testing
    DevOps
    Selenium
    Data Entry
    Data Scraping
    Python
  • $150 hourly
    I focus on providing cybersecurity compliance, cyber risk assessment, and cybersecurity consulting services to small businesses specializing on the implementation of and compliance with CMMC, DFARS 252.204-7012, and NIST 800-171 requirements. I have worked with NIST 800-171 since 2019 providing guidance to small businesses on meeting the requirements of NIST-171. This includes System Security Plan (SSP) development, Plan of Actions and Milestones (POA&M) creation, Policy and Procedure Development, and technical control implementation. There is more to CMMC compliance than buying a set of pre-made policy and procedure templates. As recent government legal action shows, the Department of Defense is pursuing legal action against companies not meeting CMMC and DFARS requirements after claiming to meet the requirements to win DoD contracts. Let me help your organization meet compliance and more importantly - stay compliant! I provide recommendations to small business owners that are cost-effective to meet cybersecurity compliance requirements and lessen cybersecurity risk. Specialties: cyber risk assessments, security gap analysis, policy and procedure development, system security plan (SSP) development, Plan of Action and Milestones (POA&M) creation Frameworks: CMMC, NIST 800-171, NIST Cybersecurity Framework Education: Doctorate - Cybersecurity (in-progress), Masters – Administration, Masters – Computer Science, Bachelors – IT Management Certifications: CMMC Certified Professional (CCP), CISSP, PMP, CRISC, CCSP, HCISPP, AWS Cloud Practitioner
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Policy Analysis
    Security Analysis
    Information Security Governance
    Information Security Audit
    Certified Information Systems Security Professional
    Cybersecurity Management
    Information Security
    Information Security Consultation
    NIST SP 800-53
    CMMC
  • $70 hourly
    passionate security enthusiast interested in assisting a team increase their security posture by providing guidance and consultation on building and improving security operation capabilities, reducing overall attack surface with proper vulnerability management, and security engineering/architectural improvements.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Security Operation Center
    Security Engineering
    Cloud Engineering Consultation
    Cloud Computing
    Cloud Security
    Security Analysis
    Google Cloud Platform Administration
    Information Security Governance
    Information Security
    Network Security
    Configuration Management
  • $50 hourly
    With a rich background spanning over 5+ years in designing and executing robust cybersecurity solutions, I am a Cybersecurity Specialist Consultant dedicated to safeguarding digital landscapes. My journey has taken me from the foundational steps of security analysis to spearheading roles as a Co-Founder and CTO, alongside pivotal positions in cybersecurity engineering and ethical hacking across global landscapes from Jakarta to Dallas, and Sydney to the Netherlands. My expertise lies in a deep understanding of cyber threats and vulnerabilities, backed by a Bachelor's degree in Cybersecurity from Deakin University and certified mastery in Blockchain Security, Advanced Penetration Testing, and Fuzzing and Crash Analysis. I've successfully led comprehensive security initiatives, including developing XDR and SIEM solutions, managing multi-layered security systems, and pioneering full-scale cybersecurity startups. My approach is rooted in innovation and efficiency, aiming to protect organizational assets against ever-evolving cyber threats with customized security strategies. At the heart of my service is a commitment to operational excellence and a proactive stance on cybersecurity, ensuring I'm always ready to counteract cyber threats swiftly. Through Encripti, my cybersecurity startup, and various contractor roles, I've honed my skills in vulnerability assessments, red/blue team engagements, and crafting defensive architectures against complex cyber attacks. My portfolio is a testament to my ability to communicate complex security concepts effectively and to collaborate towards enhancing cybersecurity resilience in dynamic environments. In seeking new opportunities on Upwork, I aim to bring my wealth of experience and a proactive approach to cybersecurity to organizations looking to fortify their defenses. Whether through strategic consulting, hands-on penetration testing, or crafting comprehensive security frameworks, my goal is to deliver unparalleled value and security assurance to my clients.
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Blockchain Security
    API Testing
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Risk Analysis
    Virus Removal
    Web Application Security
    Data Analytics
    Smart Contract
    Malware Removal
    Security Testing
    Vulnerability Assessment
    Application Security
    Cybersecurity Management
    Penetration Testing
    Digital Forensics
  • $99 hourly
    I am a professional freelancer with THIRD PARTY LIABILITY INSURANCE for over two and a half million dollars, so you are in safe hands. I am Microsoft Certified Trainer, Office 365, GCP, AWS, and Azure Expert. Honored as Microsoft Most Valuable Professional in Azure area. I cover architecting, security, administrating, and migration of all three major clouds – Azure, AWS, and GCP. Apart from the main area of Cloud expert in the field of infrastructure servers Windows Server 2003-2016, Microsoft Active Directory, Hyper-V Private Cloud, IIS, System Center, SQL. Private Cloud, System Center, Hyper-V, Open Stack Expert, and all Microsoft products Expert. Linux Server administrator. I am the holder of certificates: • pSeries AIX UNIX Support • First Certificate in English • PRINCE2 Practitioner • Microsoft Certified: Azure Administrator Associate • Microsoft® Certified Solutions Expert: Cloud Platform and Infrastructure • Microsoft® Certified Solutions Associate: Cloud Platform • Microsoft® Certified Solutions Expert: Productivity • Microsoft® Certified Solutions Expert: Data Management and Analytics • Microsoft® Certified Solutions Associate: Windows Server 2016 • Microsoft® Certified Solutions Associate: Windows 10 • Microsoft Specialist: Configuring Windows Devices • Microsoft Specialist: Architecting Microsoft Azure Solutions • Microsoft Certified Solutions Developer: Azure Solutions Architect • Microsoft Specialist: Developing Microsoft Azure Solutions • Microsoft® Certified Solutions Expert: Data Platform • Microsoft Specialist: Implementing Microsoft Azure Infrastructure Solutions • Microsoft® Certified Solutions Associate: Office 365 • Microsoft® Certified Solutions Expert: Private Cloud • Microsoft® Certified Solutions Expert: Messaging • Microsoft® Certified Solutions Associate: SQL Server 2012/2014 • Microsoft® Certified Solutions Associate: Windows Server 2012 • Microsoft® Certified Solutions Expert: Server Infrastructure • Microsoft® Certified IT Professional: Enterprise Administrator on Windows Server 2008 • Microsoft® Certified Solutions Associate: Windows Server 2008 • Microsoft® Certified Technology Specialist: Windows Server 2008 Applications • Microsoft® Certified Technology Specialist: Windows Server 2008 Network • Microsoft® Certified Technology Specialist: Windows Server 2008 Active Directory • Microsoft® Certified Technology Specialist: Microsoft Exchange Server 2010
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Database Administration
    Disaster Recovery
    Amazon ECS
    Alexa Skills Kit
    Azure App Service
    Microsoft Azure SQL Database
    Linux System Administration
    AWS Lambda
    Windows Server
    Microsoft Exchange Server
    Microsoft Azure
  • $125 hourly
    UpWork Recognition: Expert-Vetted | Top-Rated Plus | 100% Job Success Score I provide affordable cyber security solutions to startups, small and medium-sized businesses, non-profits, and other organizations. I organizations that need improved security but don't have the budget to support an enterprise level. I work with these companies to create a security solution that is both affordable and effective. In today's world of ever-increasing cyber threats where small businesses are targeted more frequently, it is vital that these companies have IT Security systems in place. Statistics show that nearly half of small companies that suffer a cyber breach never recover. SPECIALITES: • Vulnerability Analysis • Penetration Testing • Compliance Assessment • Network Security Planning • Consultation • Managed Security Services • Risk Assessment & Management CMMC, HIPAA, SOC2, GDPR,
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Data Privacy
    Vendor Management
    Information Security
    Security Analysis
    Penetration Testing
    Risk Assessment
    Regulatory Compliance
    Cybersecurity Management
    Ethical Hacking
  • $999 hourly
    Computer Science Engineer/Ethical Hacker/Cyber Security Expert who has been providing security for corporate and individuals. ✌Cyber Security/Ethical Hacking - Securing mobile & Pc, running tests for vulnerabilities & server-side security (13+ experience) ✌Web development - JavaScript , Php (12+ experience) ✌CMS - Joomla, WordPress, Drupal (10+ experience) I usually develop cross-platform and Android apps and build dynamic websites. I can develop the product very quickly and with high accuracy. I believe in customer satisfaction. U say it I develop it any language any software you need and if you want to secure your self from attacks I am always available. My work is fast and secure. *Price will vary on the complexity of the project Happy new year 2024 !!!
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Information Security
    Security Engineering
    Ripple
    Bitcoin
    Internet Security
    Android App Development
    XML
    Ethical Hacking
    Cryptocurrency
    Digital Marketing
    PHP
    JavaScript
  • $33 hourly
    I am a ethical hacker and Cyber Security Expert, I am "Dedicated Security Expert" I have successfully handled malware & hack issues for hundred of websites in last few years, and also provide security for corporate and individuals. In my deliverables, I create Professional Penetration testing reports detailing each vulnerability I find, proofs-of-concept, and solutions to how you fix those vulnerabilities. Provide The Right Way To Prevent Vulnerabilities and Protect your web application, Network, and System from hackers. I am passionate about creating a safer world where businesses are protected from Cyber-criminals, and I have worked tirelessly to make that dream a reality. My Service Including ✅ Information Gathering. ✅ Remote File Inclusion Vulnerabilities. ✅ SQL Injection Vulnerabilities. ✅ File Upload Vulnerabilities. ✅ Pen-testing Android Applications. ✅ Pen-testing iOS Applications. ✅Network Penetration Testing. ✅Clean malware-hosting server. ✅protect your online accounts from hackers. ✅WordPress protection solution. ✅Social Engineering. ✅Malware Analysis- Dissecting Malicious Software ✅Location Tracking . ✅Vulnerability Analysis ✅SQL i Injection Web Attacks test. ✅Computer Forensics Investigation ✅Information Gathering ✅ Scanning ✅Test for XSS ✅ Test for SQL injections ✅ Test for CSRF ✅ Test for Insecure CORS ✅ Test for URL redirection ✅ Test for LFI & RFI ✅ Test for critical file uploading ✅Test for Command injection ✅ Test for directory Traversing ✅ Test for SSRF ✅Test for SSTI
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    MQL 4
    Accounting
    SQL Injection Mitigation
    Website Security
    WordPress Security
    WordPress Malware Removal
    Web App Penetration Testing
    Network Penetration Testing
    Ethical Hacking
    Information Security
    Malware Removal
    Network Security
    Penetration Testing
    System Security
    Cybersecurity Management
  • $145 hourly
    Vastly experience IT expert and top ranked AWS consultant on Upwork that specializes in AWS consulting and migrating business environments, applications and data centers to the AWS cloud. Certified AWS Solutions Architect and AWS Certified Security - Specialty and specialist at creating secure, highly available and cost efficient environments in the AWS cloud that meet all modern compliance standards such as HIPAA, PCI and SOC2. AWS instructor and SME for Simplilearn, an online IT training and certification site and instructor for A Cloud Guru, world leader in cloud computing training. Over 15 years experience of in-house IT consulting for large investment banks in London, Sydney & New York. Contact me if you need highly recommended AWS certified consulting services to evaluate your needs, make the move to the cloud, and vastly improve your technology environment. Specialties: - All things AWS - Cloud migrations - Cloud architecture - Cloud cost optimization - Compliance: HIPAA/SOC2 - IaaS/PaaS/SaaS - Disaster Recovery - Storage solutions - Databases
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Application Security
    Security Infrastructure
    AWS Server Migration
    Amazon EC2
    Microsoft SQL Server Administration
    MySQL
    AWS Lambda
    Amazon Web Services
    Amazon RDS
    Amazon S3
    IT Management
    Database Administration
    Vulnerability Assessment
  • $30 hourly
    I’m a Computer Engineer by degree and a writer by passion, and I've tackled everything from whitepapers and blogs to academic theses and business proposals. If it needs to be written (especially on cybersecurity), I’m your go-to! I’m all about staying organized, diving deep into research, and hitting deadlines like they’re going out of style. Expect your projects done with time to spare—giving you plenty of room for feedback. I take real pride in delivering polished, top-quality work. Let’s get things done!
    vsuc_fltilesrefresh_TrophyIcon Certified Systems Security Practitioners
    Amazon Web Services
    Artificial Intelligence
    Blockchain
    Network Security
    Web App Penetration Testing
    Network Penetration Testing
    Vulnerability Assessment
    Robotics
    Editing & Proofreading
    Website Copywriting
    ISO 27001
    Cloud Security
    Information Security
    Disaster Recovery
    Policy Writing
    Technical Writing
    PCI
    Project Risk Management
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Certified Systems Security Practitioner on Upwork?

You can hire a Certified Systems Security Practitioner on Upwork in four simple steps:

  • Create a job post tailored to your Certified Systems Security Practitioner project scope. We’ll walk you through the process step by step.
  • Browse top Certified Systems Security Practitioner talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Certified Systems Security Practitioner profiles and interview.
  • Hire the right Certified Systems Security Practitioner for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Certified Systems Security Practitioner?

Rates charged by Certified Systems Security Practitioners on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Certified Systems Security Practitioner on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Certified Systems Security Practitioners and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Certified Systems Security Practitioner team you need to succeed.

Can I hire a Certified Systems Security Practitioner within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Certified Systems Security Practitioner proposals within 24 hours of posting a job description.

Schedule a call