Hire the best CISM specialists
Check out CISM specialists with the skills you need for your next job.
- $80 hourly
- 5.0/5
- (66 jobs)
Transforming Information Security into a Competitive Advantage! I have the ability to translate complex compliance requirements into clear and concise language that resonates with the business. I'm a certified senior professional specializing in implementing and managing diverse security frameworks, including ISO 27000 family, SOC 2, PCI, GDPR, HIPAA, FedRAMP and CMMC. With a proven track record of guiding businesses to successful certification, I can help you achieve compliance while mitigating risks. Don't wait until it's too late! Contact me now and avoid drowning in compliance requirements. I'm well-versed in compliance platforms like Thoropass, Drata, StrikeGraph, and TrustCloud. Explore how I can assist you and inquire about my 10% referral discount.CISM SpecialistsCMMCRisk ManagementMicrosoft SQL ServerSecurity FrameworkNIST Cybersecurity FrameworkHIPAAGDPRNIST SP 800-53Data PrivacyInformation Security AuditComplianceGovernance, Risk Management & ComplianceISO 27001SOC 2 ReportInformation Security - $150 hourly
- 5.0/5
- (282 jobs)
I am a cybersecurity professional with a Master's Degree in Cyber Operations and two years of work experience in cybersecurity research and development at a world-class R&D laboratory. In that job, I gained experience in network traffic analysis, malware analysis, and cryptography. For the past seven years, I have worked as a freelancer, providing content development, course creation, and consulting in cybersecurity and blockchain security. I specialize in development of technical content (blogs, whitepapers, case studies, and courseware) in the field of cybersecurity. I currently hold the Certified Ethical Hacker and Certified Blockchain Security Professional certifications.CISM SpecialistsReverse EngineeringCryptocurrencyBlockchainCryptographyInformation Security - $55 hourly
- 4.9/5
- (314 jobs)
IT Professional with over 30 years experience. 15+ years experience in web development. 8+ Years experience in PCI-DSS Consultation, including level 1 companies, working with QSA's to swiftly obtain compliance. For the past five years, I have been providing GDPR consultation to many small to medium-sized companies. Three years experience with ISO 27001 helping clients get and maintain ISO 27001 accredited certification. I spent 20 years working in various IT roles, mainly support, engineering, and web development, within one of the largest companies in the world. I was awarded Charted IT Professional status from the British Computer Society in July 2008. Since then, I have run my own company with a small team producing web-based platforms and services and offering freelance compliance consultation to small businesses. I have also worked as a CTO on several start-up projects managing their entire IT infrastructure and gaining valuable PCI compliance experience, essential to all e-commerce projects. Due to my experience and varied IT roles, I have a good knowledge of web design, programming, databases, security, SEO, troubleshooting, technical writing & more. I am a highly organised and reliable individual, utilising existing knowledge and experiences to find practical solutions to even the most complex project.CISM SpecialistsCompliance ConsultationData PrivacyVulnerability AssessmentInformation SecurityPCI DSSData ProtectionWebsite SecurityPCIComplianceISO 27001Risk AssessmentInformation Security AuditGDPRWeb Content Accessibility GuidelinesSecurity Analysis - $240 hourly
- 5.0/5
- (36 jobs)
I have provided HIPAA consulting services for the last 20 years and over that time served over 1,000 clients. Client experience includes work with covered entities including hospitals, physicians, other health providers, insurers, union health plans and county government agencies. Experience with business associates include software vendors, IT managed services providers, cloud computing vendors, mobile app developers, medical billing services, value-added resellers, third-party administrators and pharmaceutical marketing companies. Services include virtual Privacy/Security Officer, policy and procedure development, policy gap analysis, computer security risk analysis, technical vulnerability analysis, vendor audits, HIPAA training, business associate contracting and other HIPAA related services. Other related experience includes use of security frameworks including ISO 27001/27002, NIST and HITRUST as well as the PCI DSS. I have worked with other government regulations including 42 CFR Part 2, GxP, FERPA, IDEA, DEA Regulations for E-prescribing of controlled substances and state laws relating to medical privacy and data breach in over 20 states.CISM SpecialistsCompany PolicySecurity AnalysisPCIInformation Security GovernanceProject Risk ManagementInformation SecurityVulnerability AssessmentData PrivacyISO 27001HIPAARisk AssessmentGDPR - $150 hourly
- 5.0/5
- (34 jobs)
I specialize in Cybersecurity, threat mitigation (hacking cleanup and repair) and system administration on a enterprise scale, as well as full stack development. Complete, integrated and reliable solutions to the most challenging and unique business IT needs, no matter the complexity or difficulty. Fluent in PHP, HTML, JavaScript, Node, and several other programming languages. Experienced Network architect Cybersecurity preventative monitoring and protection, threat detection, and response Cloud Infrastructure management, consulting, and deployment Web & Database migration, management and repair I am your complete IT solutions provider, with over 5+ years of experience!CISM SpecialistsSecurity Assessment & TestingSystem AdministrationVulnerability AssessmentSecurity EngineeringCloud SecurityMalware RemovalCloud ManagementCloud ArchitectureSecurity InfrastructureIT ConsultationInformation SecuritySystem HardeningDevOpsPHPWordPress - $125 hourly
- 4.9/5
- (357 jobs)
Let me help you unlock business opportunities and growth (💲millions) and sell to the likes of Disney, Pfizer, Uber, Siemens, Google, PWC, and so on. In the B2B space, you need Security, Privacy, and Compliance to sell to Enterprises! You focus on the business, and I'll take care of security, privacy, and compliance. Sleep well overnight because you know you are in good hands with the 🥇 Upwork virtual CISO, Security, Privacy, and Compliance consultant (1M+ earnings, 20+ years of enterprise experience)! CEO selling to Morgan Stanley: 🥂"The certification is enabling us to strike a deal with a Fortune 100 client." CEO selling to Philips: 🍾 "We have achieved the ISO 27001:2022 certification in record time." CEO selling to Pepsi:🎉 "Attila supported the growth of our business into Fortune 100 accounts." COO selling to Fannie Mae:👏 "We achieved a successful SOC 2 Type II attestation with no exception." 💭Securing your business, passing security assessments by clients or prospects, and achieving a security certification 𝙨𝙝𝙤𝙪𝙡𝙙 𝙣𝙤𝙩 𝙗𝙚 𝙖 𝙘𝙪𝙢𝙗𝙚𝙧𝙨𝙤𝙢𝙚 𝙖𝙣𝙙 𝙥𝙖𝙞𝙣𝙛𝙪𝙡 𝙚𝙭𝙚𝙧𝙘𝙞𝙨𝙚. 👌 All you need to do is ping me on Upwork, bring your problem, and after a 15-minute scoping call, I will provide you with a detailed Scope of Work. Specialized in business-to-business clients, providing 💸money-back guaranteed💸 ISO 27001, SOC 2, GDPR, HIPAA, PCI-DSS, CMMC, and FedRAMP projects and affordable virtual CISO (vCISO) services. ----> If you don’t get certified, all my fees will be refunded! <---- We are a good match if you are: 😢Busy developing your product or business and don’t have time and resources to be consumed by compliance efforts and endless meetings, halting your production for months 🤔Already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, Tugboat Logic, SecureFrame, Strike Graph, Audit Board, Trust Cloud, and so on) but 𝙙𝙤𝙣’𝙩 𝙠𝙣𝙤𝙬 𝙩𝙝𝙚 𝙣𝙚𝙭𝙩 𝙨𝙩𝙚𝙥 𝙤𝙧 𝙙𝙤𝙣’𝙩 𝙝𝙖𝙫𝙚 𝙩𝙞𝙢𝙚. 😢You quickly need quick security or privacy awareness training, cloud security posture assessment (AWS, GCP, Azure), endpoint security (MS 365 - Intune, Jumpcloud, Google Workspace), or penetration testing? 💪Want to decrease your sale cycle by being compliant and having all the answers for the security and privacy questionnaires? 💪Facing challenges with the security and privacy implications of AI products? 💪Want continuous access to a certified, creditable security, compliance, and privacy professional to manage your security framework? -> Continous virtual CISO (vCISO / fractional CISO) service with affordable weekly payments! 😟Need world-class, battle-proof security and privacy policies and you need it quickly? The kind of ones that have passed audits by KMPG, Deloitte, E&Y, Pepsi, Uber, Verizon, Philips, Facebook, and many others. 💪You want problems to be solved by the BEST Working with me, you will: ● Stop struggling with compliance requirements, security questionnaires, or useless document templates. ● Make the first steps on the journey to selling Enterprises ● Receive turnkey, Enterprise-grade security operation framework ensuring long-term effectiveness ● Work with an experienced senior team (architects, pen testers, endpoint engineers, developers, auditors, consultants) that regularly helps clients score Enterprise accounts. My stats are: ✅Saved tens of thousands $$$$$ for clients, advising them on the right security tools, solutions, and approach ✅#1 in Information Security and IT compliance categories (1M+ earned) ✅Supporting all time zones ✅Long-term engagements ✅Professional certifications (CISA, CISSP, ISO 27001 IA) About the Security Consultants team: QUALITY over QUANTITY is our ethos. Excellent quality, on time, always. We only take on projects when we can deliver outstanding results. The team consists of (only) senior experts in AWS, Azure, GCP DevOps, SecOps, Penetration testing, Google Workspace, MS 365 Intune, AppSec, auditing, and compliance. Professional Integrity: We are strongly committed to moral and ethical principles and values, such as honesty, honor, responsibility, trustworthiness, and objectivity. What we look for in a new client: ● Open-minded, relaxed attitude ● Values integrity & long-term relationships ● Willing to accept advice and guidance (security is a complex niche) Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, SIG Lite, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Process Unity Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS) CSAT, IRAP, PIPEDA, ISO 42001CISM SpecialistsGovernance, Risk & Compliance SoftwareCloud Security FrameworkNIST Cybersecurity FrameworkInformation Security ConsultationGDPRInsurance & Risk ManagementISO 27001SOC 2AI SecuritySOC 2 ReportInformation Security AuditCertified Information Systems Security ProfessionalInformation SecurityCybersecurity ManagementSecurity Policies & Procedures Documentation - $75 hourly
- 5.0/5
- (164 jobs)
As a Certified Information Privacy Professional (CIPP/US), I provide privacy law advice and specialized privacy notices, terms and conditions, and related documents for business, website, mobile app, and SaaS owners. This helps my clients comply with U.S. and global privacy laws and regulations. SUBJECTS OF SPECIALIZATION • Draft globally compliant privacy notices for website, mobile app, and SaaS owners. • California Consumer Privacy Act (CCPA), (CPRA), and other U.S. state privacy laws. • General Data Protection Regulation (GDPR), Canadian, and other global privacy laws. • Data Subject Access Requests (DSARs). • International transfer of data and standard contractual clauses. • Data controller processor regulations and data processing agreements. • Risk management, ISO 2700, and NIST Cybersecurity Framework • Blockchain technology, cryptocurrency, and artificial intelligence (AI). • Assessing vendors and processors. • Privacy impact assessments, data mapping, and record of processing activities. • COPPA and global children and student privacy laws. • HIPAA and HITECH compliance and data protection policies. • Comprehensive data management from the beginning of the cycle to the end. • Internet advertising laws and regulations. My services also include drafting documents and providing guidance including, but not limited to the following: • Privacy notices to comply with the CCPA, US, GDPR, and global privacy laws • Data processing agreements between controllers, processors, and subprocessors • Standard contractual clauses • Data privacy impact assessments • Data protection policies • Data subject access requests (DSARs) response letters • Children's privacy notices to comply with COPPA and global privacy laws • Privacy law training • NIST and cybersecurity frameworks • Internet terms and conditions --- It's the little things in documents most people do not see that protect or hurt their business.CISM SpecialistsLegal WritingComplianceData PrivacyHIPAABusiness DevelopmentPolicy WritingPrivacy LawGDPRInformation Security - $20 hourly
- 4.8/5
- (7 jobs)
As an experienced SOC Analyst, I have a proven track record of keeping organizations safe from threats through my expertise in threat monitoring, detection, analysis, and response. I am also skilled in using a variety of security tools and technologies, and have a strong background in automating security processes to increase efficiency and accuracy. My ability to develop and implement automation scripts and playbooks has enabled me to better manage security events, reduce false positives, and increase overall SOC productivityCISM SpecialistsSOC 2ISO 27001Information SecurityCloud SecurityCyber Threat IntelligenceThreat DetectionInformation Security Threat MitigationCybersecurity MonitoringSystem DeploymentSecurity Operation CenterAutomationBash ProgrammingMicrosoft AzureIntrusion Detection SystemSecurity Testing - $80 hourly
- 5.0/5
- (20 jobs)
passionate security enthusiast interested in assisting a team increase their security posture by providing guidance and consultation on building and improving security operation capabilities, reducing overall attack surface with proper vulnerability management, and security engineering/architectural improvements.CISM SpecialistsSecurity Operation CenterSecurity EngineeringCloud Engineering ConsultationCloud ComputingCloud SecuritySecurity AnalysisGoogle Cloud Platform AdministrationInformation Security GovernanceInformation SecurityNetwork SecurityConfiguration Management - $15 hourly
- 5.0/5
- (3 jobs)
I have a strong background in ISO 27001, 22301 and SOC2 documentation (mandatory policies, risk assessment and treatment registry, etc.) implementation and certification. Achievements ISO 27001 Lead Auditor Managed Readiness up to Certification for ISO 27001: 2013 ISO 9001:2015 ISO 22301:2019 ISO 17100:2015 SOC 2 CREST Other achievements: • Implemented a Document Management System • Established ACE Hour • Increase turnaround time by implementation of Automation Projects: Buying Requisition Canvassing Request Request for Payment Online Facilities RequestCISM SpecialistsSecurity AnalysisInformation SecurityAtlassian ConfluenceISO 27001SOC 2 ReportDocument ControlISO 9001DocumentationInternal AuditingBusiness Process ManagementTechnical Writing - $30 hourly
- 4.8/5
- (361 jobs)
I’m a Computer Engineer by degree and a writer by passion, and I've tackled everything from whitepapers and blogs to academic theses and business proposals. If it needs to be written (especially on cybersecurity), I’m your go-to! I’m all about staying organized, diving deep into research, and hitting deadlines like they’re going out of style. Expect your projects done with time to spare—giving you plenty of room for feedback. I take real pride in delivering polished, top-quality work. Let’s get things done!CISM SpecialistsAmazon Web ServicesArtificial IntelligenceBlockchainNetwork SecurityWeb App Penetration TestingNetwork Penetration TestingVulnerability AssessmentRoboticsEditing & ProofreadingWebsite CopywritingISO 27001Cloud SecurityInformation SecurityDisaster RecoveryPolicy WritingTechnical WritingPCIProject Risk Management - $16 hourly
- 4.9/5
- (121 jobs)
Simplifying Compliance for ISO 27001, ISO 9001, SOC 2, PCI DSS, HIPAA, GDPR & more ! 😰Confused by compliance requirements? I can translate regulations into actionable steps for your organization 😰Need to win client trust? Let's achieve ISO 27001 or SOC 2 certification to show your commitment to security 😰Facing issues to fill out security questionnaire? Contact me now to get it submitted in quick time with all the relevant policies and procedures **Services 🎖️Policies and Procedures 🎖️Compliance Implementation 🎖️Risk Management 🎖️Gap Analysis / Readiness Assessment 🎖️Internal Audit 🎖️Penetration Testing 🎖️Certification **Standards 📌ISO 27001 📌ISO 9001 📌SOC 2 Type 1 & 2 📌PCI DSS 📌HIPAA 📌GDPR 📌ISO 42001 📢Are you looking to achieve ISO 27001, SOC 2 compliance certification in 6 Weeks? Check out project in the profile 📢Are you facing issues with automated GRC tools, Vanta, Drata, Thoropass, AuditBoard, Secureframe, Scrut, Sprinto, Tugboat Logic, TrustCloud? I am very well versed with all of the tools and get your progress running in quick time 📢Are you looking to get Drata and Vanta subscription in discounted rates? As an MSSP we offer flexible payment terms 📢Are you looking to get your SOC 2 Type 1 & 2 report attested? We have CPA in our team who can help you **Why Choose Me? Here’s What Client say about me! 🤩Founder of Druxia USA “Ali helped us get SOC2 Type 2 certified through Vanta. They are absolutely worth the money to save you on so much time” 🤩Founder of Tilt Legal AUS ”Ali has been fantastic in getting us set up for ISO27001. He is knowledgeable, professional and incredibly responsive. Thanks again Ali for getting us across the line through Drata” 🤩Founder of K-Link Singapore ”Ali was responsive, helpful, and most importantly successful in helping us get our ISO27001 certification” 🤩Founder of Little Taller USA “Lifesaver in getting SOC2 through“ ⭐When it comes to managing operations, information security, quality, safety, compliance, certifications, audits, and the soundness of technical procedures and operations, you need a qualified engineer with extensive experience in industry certifications and standards. ⭐With my extensive experience in managing operations and implementing strategies, I am confident that I can lead your company towards greater profitability and growth. ⭐If you want a detail-oriented, committed, and knowledgeable subject matter expert who cares about getting the job done right, reach out to me * ✅Holder of professional certifications ✅More than 10 years of on-the-job experience ✅Well-versed in global laws and regulations ✅No timezone restrictions ✅5 ⭐ revews on G2 🚀 GRC Tools Partnership as MSP; Drata, Vanta, Secureframe, Thoropass, Tugboat Logic, Slite, Hyperproof, Sprinto, AuditBoardCISM SpecialistsPCI DSSSOC 2 ReportHIPAAIT Compliance AuditWorkplace Safety & HealthManagement ConsultingISO 27001Procedure DevelopmentISO 9001ISO 14001Technical WritingRegulatory ComplianceQuality AuditSOC 2Information Security - $100 hourly
- 4.7/5
- (37 jobs)
I am a dedicated professional with decades of comprehensive experience in Cyber Investigations, Cyber Intelligence, Cyber Operations, Cybersecurity, and Information Security. I am well-versed in creating robust security structures, implementing security strategies, and mitigating potential cyber threats, and I specialize in the detection, investigation, and mitigation of cyber threats, while providing strategic insights to enhance organizational cyber defense capabilities. I have a Bachelor's degree in Psychology and Cognitive Science, and am completing work toward Master's degrees in Cybersecurity and Information Technology, with specializations in Enterprise Networks and Cloud Computing. I have also earned various industry certifications such as Certified Ethical Hacker Master (CEH-Master), System Security Certified Practitioner (SSCP), Certified Cyber Intelligence Professional (CCIP), Certified Penetration Tester (CPT), and Certified Forensic Analyst (CFA). Types of Services Offered Include But Are Not Limited To: Consulting, Strategy, & GRC: • Cybersecurity Consulting • Cybersecurity Strategy Development • Security Policy Development and Implementation • Governance, Risk, and Compliance (GRC) Frameworks • Managed Security Services Risk Assessment and Management: • Security Risk Assessment • Risk Mitigation Strategies • Cyber Risk Analysis • Vulnerability Assessments • Incident Mitigation and Remediation Digital Forensics Incident Response: • Security Incident Investigation • Litigation Support • Regulatory Compliance Audits • Integrated Threat Intelligence Digital Forensics • Data Recovery and Analysis • Electronic Discovery (eDiscovery) • Mobile Device Forensics • Network Forensics • Forensic Imaging • Malware Forensics Incident Response • Incident Management and Coordination • Threat Hunting • Emergency Response • Root Cause Analysis • Post-Incident Reporting and Documentation Training Services: • Security Awareness Training • Workshops and Webinars • Cybersecurity Certification Preparation • Employee Cybersecurity Training Programs • Simulated Phishing and Other Training Exercises Offensive Security & Defense Security: • Penetration Testing • Ethical Hacking • Red Team Operations • Blue Team Defensive Strategies • Purple Team Exercises Cloud Services: • Cloud Security Architecture • Cloud Security Assessments • Cloud Data Protection • Cloud Compliance Audits • Managed Cloud Services Network and Architecture Services: • Network Design and Architecture • Network Security Implementation • Wireless Network Security • Network Performance Monitoring • Enterprise Network Management Cyber Investigations and Intelligence: • Cyber Investigations • Cyber Intelligence Gathering • Digital Forensics • Network Forensics • Fraud Investigation • Insider Threat Investigation • Social Media Forensics Cyber Operations: • Cyber Threat Hunting • Cyber Threat Intelligence • Information Operations (Info Ops) • Real-time Security Monitoring • Security Operation Center (SOC) Management Security Compliance and Auditing: • Compliance Auditing • Security Auditing • Security Policy Compliance Reviews • Regulatory Compliance Monitoring • Information Security Assessments Virtual CISO Services • Cybersecurity Program Leadership • Security Strategy and Planning • Policy Development and Management • Security Risk Management • Compliance Oversight • Incident Response Planning • Security Awareness and Training • Vendor Risk Management • Security Budget Management • Board CommunicationCISM SpecialistsCyber Threat IntelligenceEthical HackingMicrosoft AzureSolution ArchitectureCloud ArchitectureIT InfrastructureNetwork EngineeringCloud SecurityWeb App Penetration TestingSecurity InfrastructureNetwork Penetration TestingNetwork SecurityPenetration TestingInformation SecurityVulnerability Assessment - $10 hourly
- 5.0/5
- (402 jobs)
**I only bid on that project which I can deliver with complete satisfaction.** If your Instagram got HACKED or Locked and your Email or Number was Changed and Facing 2FA you are in the right place. *For Hacked Instagram or Facebook Accounts Recovery I Take Fix Price Which I Discuss before starting the project* I can provide solutions with the followings: ✅ Social media accounts set up and integration ✅ Social Media Management ✅ Social Media Optimization ✅ Social Media Error Fixing ✅ Hacked Instagram Recovery ✅ Assistance with your Instagram or Facebook removal ✅ Assistance with hacked Instagram account ✅ Assitance with stolen Facebook account ✅ Facebook business page recovery ✅ unauthorized ads payment on ads manager recovery ✅ Accounting ✅ Social media account recovery ✅ 2FA solution ✅ Google My Business ✅ Virtual Assitance ✅ All kinds of Social accounts Retrieve and All sorts of Error Fixing and name a few & I will let you know my experience. I am always eager to learn new skills. Also, please invite me for an interview if your's: Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Virtual assistance if your Instagram got disabled or restricted Facebook Business Suite hacked or compromised Facebook ads account recovery. Or if you are looking assistance for help: Recover hacked Instagram account Facebook Recovery Instagram restoration Social media Verification Facebook Business Suite verification Instagram & Facebook Integration Recovery of account in case of lost credentials Recovery from technical issues, bugs, and glitches Virtual Assitance Removal of old lost Instagram or Facebook profiles. assistance in Google My Business profile retrieval. Email accounts assistance. I Provide virtual assistance in all that and the result depends on them. Feel free to discuss the project before starting a contract. In response to your expectations: 1. I have expertise in the area required by you. 2. I can start the project immediately and complete your milestone as per your timeline. I believe communication is key to any successful project, and I'd like to start things off on the right foot, but I suggest we schedule a call to discuss the project further. This will enable us to make sure that we communicate well and are completely comfortable with the scope of the project. Please let me know the time that works best for you and I will make sure that I make myself available. Thank you for your time and consideration.CISM SpecialistsInternet SecurityData RecoveryInstagram ReelsFacebookWordPress Malware RemovalMalware RemovalFacebook PageEthical HackingSocial Media ManagementSocial Media MarketingDigital MarketingInstagramInformation SecurityTechnical SupportAccounting - $60 hourly
- 4.7/5
- (205 jobs)
SATISFIED CLIENT REVIEWS; "Gray did an excellent job writing 50 complex articles in 4 weeks. His writing is original, error-free, and meets all my requirements to the finer details. I trust his work ethic and I'm looking forward to hiring him in future projects!" "Gray is an awesome blog writer! He does tons of research for each article, has a captivating writing style, and is able to produce a high output. Highly recommend him." "Gray is an excellent writer with a good work ethic. He delivered all articles ahead of schedule and I'm happy with the end product. I'll be working with Gray with additional projects, and I'm quite sure he will add tremendous value to the articles again. Highly recommended!" ________________________________________________________________________________________________________ With everyone taking their businesses online, content writing has become increasingly popular over the past few decades. As we know, the internet encompasses all sorts of written content, from fiction to creative nonfiction, from blog articles to product reviews. According to Internet Live Stats, Orbit Media Solutions, there are more than 1.7 million blog posts published per day. Unfortunately, only a relatively small percentage of these have resulted in desired outcomes. The best content not only attracts but also engages and motivates people. While almost everyone can write, only a few are skilled at communicating and influencing specific reactions with words. People with these skills deliver the goods. The fact that you are still reading this means that you are looking for this specific group of writers. I say you have found a viable solution if you have found me! My current focus is on tech, SEO, and marketing content, but I am open to writing about other niches if the deal is right! WHY YOU SHOULD STICK WITH ME? With over four years of experience as a content writer, I have written in almost every niche you can think of. I've worked with brands like (give examples) and more, collaborating with high-performing teams and breaking new ground! My secret? I'm a hard-core researcher, versatile, creative, and storyteller! In each paragraph I inject splashes of ecstasy, owning my piece, and holding my audience until the very last word. More importantly, I will make my readers take action. In order for your business to thrive, you need content that will engage your readers, motivate them to act, and make them return. My goal is to contribute to your success story by solving the most basic of your business's digital needs. As a freelancer, I am client-oriented. My focus is on you and what you need. As far as qualifications go, I have over 4 years of experience, and I can tell you all the other things that several other freelancers would tell you. If I can't provide quality to you, dear client, then what's the point? It’s all just gibberish. Professional gibberish, at that. If you want quality, you can identify it, and you are prepared to pay for it, let’s talk! Cheers.CISM SpecialistsHealth & FitnessContent WritingBlog WritingWebsite ContentGhostwritingEbookCopywritingArticle WritingAbout Us PageTechnical ReportCloud SecurityTechnical WritingInformation SecurityTech & ITSEO Writing - $150 hourly
- 5.0/5
- (167 jobs)
I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startups and micro, small, and mid-sized companies create secure operating environments to increase business opportunities. I am also part of Upwork's Expert-Vetted Talent program. My priority is to create cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold a bachelor's degree in Telecommunications Engineering from the Airforce University in Argentina, a master's degree in Information Security Engineering from the SANS Technology Institute, and many cybersecurity certifications, including CISSP (Certified Information Systems Security Professional) and GSE (GIAC Security Expert).CISM SpecialistsWordPress Malware RemovalMalware RemovalCMMCRisk AssessmentCloud SecurityInternet SecurityInformation Security AuditInformation Security AwarenessSecurity EngineeringSecurity AnalysisEmail SecurityPenetration TestingInformation SecuritySecurity Policies & Procedures DocumentationCybersecurity Management - $95 hourly
- 5.0/5
- (9 jobs)
I am a Cyber Security and Information Technology expert with 20 years experience ranging from small start-ups to multi-billion euro businesses. I hold a CISSP, the gold standard of Information Security Qualifications. I specialise in Strategy, Governance, Risk and Compliance - this makes me ideal for projects such as: Helping you achieve Cyber Essentials or IASME Governance status PCI-DSS & ISO 27001 compliance programs and audits Being your Cyber Security / Info Sec manager or CISO on a part-time basis Selecting and managing IT and Cyber Security suppliers on your behalf Writing, reviewing and updating your IT and Cyber Security policies Security Awareness Training I am an award winning public speaker and trainer and my Cyber Security Awareness Training is very popular delivered in person or from my online studio to clients around the world.CISM SpecialistsGDPRSecurity InfrastructureInformation Security AwarenessISO 27001PCI DSSInformation Security AuditInformation Security GovernanceCertified Information Systems Security ProfessionalPCIInformation SecuritySecurity Policies & Procedures DocumentationIncident Response PlanVulnerability AssessmentSecurity Assessment & TestingNetwork Security - $85 hourly
- 4.9/5
- (43 jobs)
Security engineer and technical editor/writer specializing in cybersecurity architecture, operations, compliance/audit readiness, vulnerability scanning/pen testing, and technical documentation. Experience drafting security policies/procedures, and conducting cybersecurity framework mapping/pre-audit prep for NIST, PCI DSS, SOC2, HIPAA, HITRUST, GDPR, ISO 27001, and privacy and security frameworks. Proven track record of technical team and project management.CISM SpecialistsHIPAATechnical DocumentationNIST SP 800-53ISO 27001Technical WritingIT Compliance AuditSOC 2 ReportInternet SecuritySecurity InfrastructureApplication SecurityInformation SecurityPenetration TestingCybersecurity ManagementSystem Security - $35 hourly
- 5.0/5
- (16 jobs)
⭐⭐⭐⭐⭐ "It doesn't get better than Ezinne. The quality of what she delivers is outstanding...You won't be disappointed." Hello! I'm a dedicated grant writer focused on helping tech startups secure the funding they need to thrive. With a background in technical and proposal writing, I specialize in crafting compelling grant applications for startups in any field, worldwide, hourly or at a flat rate. What I Offer: - Funding Research: I conduct thorough research to help identify and analyze potential funding opportunities that align with your startup's objectives. - Grant Writing: Expertise in writing successful grant and funding proposals tailored to your specific needs and goals. - Technical Writing: Proficient in creating clear and concise technical documents including pitch decks that effectively communicate complex information. - Proposal Writing: Skilled in developing persuasive proposals that highlight the unique strengths and potential of your startup. Why Choose Me: - Proven Track Record: I'm experienced in securing funding for tech startups, with a deep understanding of what funders are looking for. - Global Reach: While based in East Africa, I offer my services to tech startups around the world. - Passion for Startups: I'm committed to helping innovative startups succeed, with a special focus on supporting impactful startups in Africa and around the world. - Collaborative Approach: I ensure client needs are met through effective collaboration. - Commitment to Deadlines: I'm dedicated to meeting deadlines and deliverables. - Simplifying Complexity: I'm able to simplify complex concepts for easy comprehension. - Attention to Detail: Meticulous attention to detail and accuracy. Success Stories: - Tony Elumelu Foundation Grant: I worked with a startup on their grant proposal, leading to pre-approval for the prestigious Tony Elumelu Foundation grant. - African Impact Initiative Grant: I assisted a startup in securing pre-incubation approval for the African Impact Initiative grant, which supports impactful startups in Africa. - VC Funding with Goodwell: I contributed to the initial application process for venture capital funding, resulting in the startup client being contacted by Goodwell for follow-up. Work Approach: - Understanding client objectives through detailed project analysis - Thorough online research and information gathering, where applicable - Drafting of initial content for client review - Revisions based on client feedback Client Testimonials: - "Easy to work with" - "Paid attention to details" - "Completed the job on time" - "Impressed by the quality of work" Let’s Work Together: If you're a tech startup looking to secure funding and need a skilled grant writer to help you achieve your goals, I’d love to hear from you. I offer flat-rate services to ensure transparency and predictability in pricing. Let's work together to turn your vision into reality! My working hours align with GMT+2 (currently based in Kigali, Rwanda, though originally from Ontario, Canada).CISM SpecialistsBusiness WritingUser Guide WritingNIST Cybersecurity FrameworkQuiz WritingPolicy WritingStory WritingGrant Writing ConsultationReport WritingSpeech WritingArticle WritingGrant WritingBlog WritingRFP WritingContent WritingTechnical Writing - $30 hourly
- 5.0/5
- (92 jobs)
I'm a Penetration Tester and Cyber Security Specialist who is a professional in evaluating the security posture of Web-Applications (Websites) and ensuring the security of personal clients' online identities, accounts, devices, and networks, I've possessed my current knowledge through 3+ years of self-study and research plus 2+ years of work in the industry, protecting clients on a personal level and running vulnerability assessments against business websites, always leaving positive impression and impact, I hold a great record of being able to expertly provide the following services: - Perform comprehensive security checkups on Emails and Phone numbers and pinpoint security holes which often lead victims to be hacked with zero interaction nor awareness from them. - Assist in Account Recovery (Ex. Instagram, Facebook) - Educate thoroughly on the findings and remediations for a vulnerable target, equipping clients with enough information to trust themselves as they continue to utilize the technologies as normal with no fear of being targetted by hackers. - Investigate and educate on online frauds/scams, especially crypto ones, why and how they work, and how to distinguish between legit and not legit easily. - Clean up networks and devices from viruses/malware and ensure optimal patching for security. - Report fraud websites that impersonate legit businesses for a takedown. IMPORTANT: When it comes to cybersecurity-related services, there is a number of scammers not to be underestimated, whether within or outside of Upwork, therefore stay vigilant and keep in mind the following, 1. If you were scammed online via crypto, there's no one out there with the right to give a guarantee that they will be able to recover it for you despite how well furnished the so-called hacker's portfolio appears to be, the chance remains very slim and you should only pursue this kind of service for the sake of leaving no stone unturned knowing the high probability of failure, and you should only select a freelancer with a reputable profile and reviews to back up their activity because scammer accounts are usually fresh with no reviews and no verified ID, feel free to consult me to evaluate that. 2. Same applies to the request of hacking an account, there are complicated caveats that explain why it DOES NOT work the way you think it does but to keep it short, if you want someone's account hacked, aside from it being illegal and unethical and isn't the type of "service" I provide, the chance for it to work is about 1% to begin with, again, I'm available for consultation, account recovery is a different subject with a higher probability for success as long as it's your own account that was lost/hacked.CISM SpecialistsMalware RemovalInformation SecurityVulnerability AssessmentSystem SecurityNetwork SecurityInformation Security ConsultationWebsite SecurityPenetration TestingNetwork Penetration TestingInternet SecurityEthical HackingSecurity TestingSecurity Assessment & Testing - $60 hourly
- 5.0/5
- (58 jobs)
Hi, my name is Martin and I've been a principal penetration tester since 2011. Over the years, I've worked on a range of projects across Europe, East Asia, the Middle East, and the UK, serving clients from start-ups to global high street names. My focus is on providing a wide range of penetration testing services, including infrastructure, web and mobile applications, APIs, and cloud security assessments. One of the things that sets me apart from other penetration testers is my approach to the work. I've spent years mastering my craft, staying up-to-date with the latest technologies and techniques, and honing my skills. When I take on a project, I bring all of this knowledge and experience to bear, quickly identifying and exploiting vulnerabilities to provide my clients with the information they need to improve their security posture. In addition to my technical expertise, I'm also an excellent communicator. I understand that many of my clients are not technical experts themselves, so I'm always happy to explain complex technical concepts in simple, easy-to-understand language. I work closely with my clients to understand their needs and provide tailored solutions that meet their specific requirements. When it comes to deliverables, I take great pride in producing detailed reports and other materials that provide clear, concise information about the results of my testing. I know that my clients rely on this information to make important decisions about their security, so I always ensure that my reports are accurate, thorough, and actionable. Overall, I'm proud of the work I do as a principal penetration tester, and I'm committed to helping my clients stay safe and secure in an increasingly complex digital landscape. If you need infrastructure testing, web and mobile application testing, or cloud security assessments, please don't hesitate to get in touch – I'd be happy to discuss how I can help. Experience and expertise within the following disciplines: • Web Application Penetration Testing • Mobile Applications Penetration Testing • API Penetration Testing (REST, SOAP, GraphQL) • Thick Client Application Penetration Testing • External Infrastructure Penetration Testing • Internal Infrastructure Penetration Testing • Server Build Reviews • Workstation Build Reviews • Mobile Device and MDM Testing • Network Device Security Reviews • IoT Security • Embedded Hardware • Simulated Phishing • Wireless Assessments • Red Team Assessments • AWS Configuration Reviews • Azure Configuration Reviews • Office365 Configuration ReviewsCISM SpecialistsWeb App Penetration TestingWebsite SecurityEthical HackingCertified Information Systems Security ProfessionalWordPressSecurity Assessment & TestingCloud SecuritySecurity TestingVulnerability AssessmentWeb Application SecuritySecurity AnalysisPenetration TestingSecurity InfrastructureInformation SecurityCybersecurity Management - $125 hourly
- 5.0/5
- (152 jobs)
Hi, I'm Brad, also known as the InboxGenius. I am a highly skilled professional who is known for delivering exceptional results. Throughout my career, I have successfully collaborated with over 130+ clients on the Upwork platform, maintaining an impeccable track record with a flawless 100% job success score. My expertise lies in resolving complex email deliverability challenges, executing seamless email migrations, addressing corporate email deliverability issues, monitoring and actioning DMARC reports, and providing fully managed cold email campaigns without any involvement required on your part. I cordially invite you to schedule a consultation call, where we can further acquaint ourselves and discuss how InboxGenius can help you.CISM SpecialistsMigrationNetwork SecurityInformation SecurityTechnical SupportGoogle WorkspaceEmailNetwork AdministrationEmail SupportEmail DeliverabilityWordPressSMTPCloud MigrationSecurity EngineeringIT ManagementWindows ServerOffice 365 - $100 hourly
- 5.0/5
- (28 jobs)
I am Chartered IT Professional, Google Cybersecurity Career Certificate Graduate, EC Council Certified Chief Information Security Officer, Certified Information Systems Security Auditor, Certified ISO 27001 Lead Implementer, Certified ISO 27001 Lead Auditor, OWASP Core Security Belt Certified, OWASP API Security Certified, Certified Identity Governance Expert, Certified Identity and Access Manager, Certified GRC Professional, Certified GRC Auditor, Integrated Data Privacy Professional, Certified Scrum Master, BCG Certified Strategy Consultant, Six Sigma Black Belt Professional, GDPR Certified Data Protection Officer, Certified HIPAA Officer & results driven management consultant with 15 years experience in compliance, data protection, SOC 2, ISO 27001, HDS, C5 and NIS2 Controls Implementation, innovation, design thinking, ideating solutions, process improvement, pricing strategy, data analytics, business process outsource, project management, market research, financial analysis, investment banking, cybersecurity and diagnosing a range of problems, from small businesses to multi-million dollar corporations. I have done past projects with HouseCall MD, Varian Medical Systems, DNX VC, Syntervision, FourthRev and Loggi. Previously I have worked as Engagement Manager at KPMG and Senior Auditor at Grant Thornton, where I took part in several consulting assignments in healthcare and life sciences, logistics, TMT, services, consumer and transportation sectors. I also have vast experience of managing projects from start to inception including projects funded by ADB, UNESCO and WHO. I have also completed more than 15 market research studies in different verticals for determining the market size and overall analysis of target markets. I also have experience of working as Head of Product Design where I led the development teams to identify customer pain-points, develop user needs and solve customer problems by creating products with built-in security features. I also worked on developing customer personas & identifying and recruiting sponsor users for A/B testing of product features and arranging Cognitive walkthroughs for establishing the usability of products. I also applied knowledge of Scrum Framework with sprint planning and delegation of tasks on product development projects for various public and private sector organizations. I managed 10 projects of more than $1 Million in total budget. Other than above, I also have hands on experience with various compliance frameworks including GDPR, HIPAA, PCI DSS, ISO 27001, HITRUST, CCPA and NCSF (NIST Cybersecurity Framework). Key Achievements: ✅ Successfully led 8 companies through the SOC 2 Type 2 attestation process, meeting stringent requirements and passing all audits in the first attempt. This achievement significantly enhanced their reputation for data privacy and security. ✅ Guided 4 clients through the rigorous process of achieving ISO 27001 and NIS2 Directive Certificate, ensuring that all security controls and management processes were robust, auditable, and internationally recognized. ✅ Guided 2 clients through HDS and C5 certifications, ensuring that their security posture was aligned with the requirements of both compliance frameworks. ✅ Reduced the costs of IT infrastructure maintenance by 5% for 3 consulted clients ✅ Analyzed business conditions, market/industry trends, competitive influences and demographic factors to identify opportunities of business growth for 5 consulted clients ✅ Created advanced analytics for both internal and marketing use using Tableau, SQL and other BI tools for 4 consulted clients ✅ Managed $400 million donor funded projects as PMO and Project Lead ✅ Performed business process re-engineering for 3 consulted clients ✅ Consulted as lead revenue data analyst on a team responsible for collecting $60M receivables ✅ Repeatedly delivered cost reductions through the implementation of Lean principles, improved scheduling via resource loads and volume analysis ✅ Evaluated and increased operational effectiveness of organizations through the implementation of Continuous Improvement methods and Training/Coaching programs ✅ Identified opportunities within the client organization for improving productivity and operational efficiencies by installing a system by which the client can measure and realize improvement ✅ Analyzed existing processes and applied methodologies to eliminate wasted resources and time for 3 consulted clientsCISM SpecialistsSystem SecurityAI SecurityGovernance, Risk Management & ComplianceRansomware MitigationInsurance & Risk ManagementUser AuthenticationLinux System AdministrationVulnerability AssessmentIntrusion DetectionInformation SecurityNetwork SecurityISO 27001Amazon Web ServicesSOC 2 ReportPython - $60 hourly
- 4.9/5
- (126 jobs)
In the last years I did more than 100 Penetration-Tests and Security Assessments. Most of them on Web and Mobile applications with Finance Background implemented with various technologies and frameworks. (J2EE, ASP, PHP). Based on my daily work I am experienced with all common attack vectors and mitigation techniques. Since 2009 I am CISSP (Certified Information Systems Security Professional) and since 2017 I am CEH (Certified Ethical Hacker) certified. Please check also my UPWORK work history and client feedbacks. I am offering professional Black and Grey-box Penetration tests for Web and Mobile Applications. Sorry, I am not able to locate your girlfriend, recover your lost FACEBOOK, GMAIL, YAHOO etc. account or find your lost phone. Please do not invite me to such jobs. Before I start offensive tests, I may ask you for evidence that you are the site owner or to show me that you have admin access.CISM SpecialistsApp DevelopmentInternet SecurityCertified Information Systems Security ProfessionalSecurity AnalysisWireless SecurityJavaInformation SecurityNetwork SecurityPenetration Testing - $99 hourly
- 5.0/5
- (40 jobs)
I help organizations build and manage a strong cybersecurity program. I have established resilient cybersecurity in Fortune 100 companies —Warner Bros., EA Sports, Pfizer, State Farm Insurance, and Goldman Sachs and can do the same for your business.CISM SpecialistsCloud SecurityNetwork SecurityCybersecurity MonitoringSOC 2HIPAAPCICertified Information Systems Security ProfessionalISO 27001Security InfrastructureCompliance ConsultationWeb Application SecurityInformation Security AuditVulnerability AssessmentPenetration TestingSecurity Policies & Procedures Documentation - $60 hourly
- 5.0/5
- (24 jobs)
With over 20 years of experience in ISO 27001 audits and project and program management, I am a seasoned information security consultant and technical writer specializing in crafting comprehensive cybersecurity solutions. My expertise spans a broad spectrum of international information security standards and regulations, including ISO 27001, ISO 27701, ISO 22301, PCI DSS, GDPR, NIS2, NIST Cybersecurity Framework, FedRAMP, CCPA, HIPAA, and COBIT. This deep knowledge enables me to deliver tailored strategies and develop client-specific documentation that effectively mitigates risks and ensures compliance. I am committed to helping organizations strengthen their security posture through strategic guidance, technical writing, and project management support.CISM SpecialistsGDPRTechnical WritingHIPAASOC 2PCI DSSNIST SP 800-53NIST Cybersecurity FrameworkRisk AssessmentRisk ManagementGovernance, Risk Management & ComplianceISO 27001Policy WritingInformation Security AuditInformation SecurityCybersecurity Management - $70 hourly
- 5.0/5
- (61 jobs)
Top Rated Penetration Tester & Cybersecurity Expert With over 8 years of hands-on experience in ethical hacking, penetration testing, and vulnerability assessments, I have conducted numerous security audits for clients ranging from startups to large enterprises. My work helps organizations strengthen their security posture by identifying vulnerabilities and providing actionable remediation advice. What I Offer: ✅ Comprehensive Penetration Testing Tailored manual testing of websites, applications, servers, and network infrastructures. I use a combination of enterprise-grade tools (e.g., BurpSuite Pro, Nessus) and custom scripts to ensure thorough coverage. ✅ Detailed Reports & Proof-of-Concepts My reports provide step-by-step explanations of vulnerabilities, including screenshots, requests, and CVSS risk scores, so you can clearly understand the security risks and their impact on your business. ✅ Expert Remediation Guidance I offer advice on how to fix discovered issues, helping you mitigate risks effectively while ensuring compliance with standards like PCI-DSS, GDPR, and HIPAA. ✅ Asset Discovery & OSINT Reconnaissance I help map your digital footprint and identify exposed assets. This includes subdomain enumeration, service discovery, and collecting sensitive data from breached sources across the web. ✅ Free Retests After remediation, I provide a complimentary retest to ensure vulnerabilities have been correctly resolved. Certifications: ✅ OSCP (Offensive Security Certified Professional) ✅ CEH (Certified Ethical Hacker) If you're looking for an experienced professional to safeguard your business, I'm here to help.CISM SpecialistsCloud SecuritySecurity Assessment & TestingInternet SecurityWeb App Penetration TestingSecurity AnalysisSecurity InfrastructureInformation Security AuditWeb Application SecurityInformation SecurityVulnerability AssessmentSecurity TestingDatabase SecuritySystem SecurityApplication SecurityNetwork SecurityPenetration Testing Want to browse more freelancers?
Sign up
How it works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a CISM Specialist on Upwork?
You can hire a CISM Specialist on Upwork in four simple steps:
- Create a job post tailored to your CISM Specialist project scope. We’ll walk you through the process step by step.
- Browse top CISM Specialist talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top CISM Specialist profiles and interview.
- Hire the right CISM Specialist for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a CISM Specialist?
Rates charged by CISM Specialists on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a CISM Specialist on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance CISM Specialists and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream CISM Specialist team you need to succeed.
Can I hire a CISM Specialist within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive CISM Specialist proposals within 24 hours of posting a job description.