Hire the best Certified Information Systems Security Professional (CISSP)

Check out Certified Information Systems Security Professional (CISSP) with the skills you need for your next job.

Clients rate Certified Information Systems Security Professional (CISSP)
Rating is 4.7 out of 5.
4.7/5
based on 310 client reviews
Tyler W.
$225/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Certified Information Systems Security Professional
  • Information Security
  • Penetration Testing
  • Vulnerability Assessment
  • Network Security
  • Internet Security
  • HIPAA
  • Policy Writing
  • Security Analysis
  • Application Security
  • Incident Response Plan
  • GDPR
  • Defense Federal Acquisition Regulation Supplement
  • Security Assessment & Testing
  • Encryption

🌟 Upwork TOP RATED Expert Cybersecurity Consultant with 100% Job success rate 🌟 ✅ Penetration Testing: Standard, Web application, mobile applications. ✅ Compliance: CMMC, DFARS, NIST 800-53, NIST 800-171, PCI, HIPAA, GDPR, ISO, SOC, SOX, GLBA, FedRAMP, CCPA, and more. ✅ Incident Response: Ransomware recovery, hacking response, forensic investigations. ✅ vCISO: Virtual Chief Information Security Officer. ✅ Vulnerability Management: Vulnerability Scanning Hello, It is great to meet you (virtually)! My name is Tyler. I have over 15 years of cyber-security experience in multiple verticals. I have worked with fortune 500 brands, government,...

Emanuel P.
$30/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Certified Information Systems Security Professional
  • Penetration Testing
  • Vulnerability Assessment
  • Website Security
  • Web Application Security
  • Information Security
  • Open Web Application Security Project
  • Security Testing
  • Information Security Audit
  • Network Security

Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP​ 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is...

Thomas R.
$60/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Penetration Testing
  • Internet Security
  • Information Security
  • Network Security
  • Certified Information Systems Security Professional
  • Security Analysis
  • Application Programming
  • Java
  • Wireless Security
  • Internet Security

In the last years I did more than 100 Penetration-Tests and Security Assessments. Most of them on Web and Mobile applications with Finance Background implemented with various technologies and frameworks. (J2EE, ASP, PHP). Based on my daily work I am experienced with all common attack vectors and mitigation techniques. Since 2009 I am CISSP (Certified Information Systems Security Professional) and since 2017 I am CEH (Certified Ethical Hacker) certified. Please check also my UPWORK work history and client feedbacks. I am offering professional Black and Grey-box Penetration tests for Web and Mobile Applications. Sorry, I am not able to...

Mariusz Z.
$75/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Penetration Testing
  • Vulnerability Assessment
  • Cybersecurity Management
  • Security Assessment & Testing
  • Information Security
  • Security Infrastructure
  • Web App Penetration Testing
  • Certified Information Systems Security Professional
  • Web Application Security
  • Cloud Security
  • Cloud Security Framework
  • Compliance Consultation
  • IT Compliance Audit
  • ISO 27001
  • Network Penetration Testing

Since 2014 I work professionally as a Pen Tester/Security Researcher. Between 2008-2013, prior switching full time to info sec, I've worked as a Programmer (C/C++, PHP, Java, node.js) and DevOps (AWS-based environments). Currently I work under my own brand (Z-Labs) delivering Penetration Testing / Adversary Simulation Exercises services to clients around the globe. I pride myself for: 1. Offering high quality penetration testing services conducted in safe and controlled manner by certified Security Expert (Since 2014 I'm CISSP, since 2016 I'm OSCP and since 2017 I hold SANS GXPN certification). 2. Putting emphasis on advanced manual...

Eric L.
$50/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Incident Response Plan
  • ISO 27001
  • Risk Assessment
  • Information Security Consultation
  • FedRAMP
  • Security Infrastructure
  • Cybersecurity Management
  • Security Policies & Procedures Documentation
  • IT Compliance Audit
  • NIST SP 800-53
  • SOC 2 Report
  • Certified Information Systems Security Professional

Overview: Over twenty years of management and leadership experience in military and civilian operations. Training and education in Cyber Security, Information Technology, Network Management, and Information Assurance. Specialty: Cyber Security Training and Education. Government Compliance, CMMC, NIST 171, NIST 53, FedRAMP, SOC, and ISO 27000. NIST 171 Project Specialty includes: • Controlled Unclassified Information (CUI) • System Security Plan (SSP) • Plan of Action and Milestone (POA&M) • SCOPE Boundary Design • Risk Assessment • GAP Analysis • Security Policies and Procedures (SPP) Capabilities: Able to follow life cycle...

Muhammad Azam K.
$17/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Project Management
  • Helpdesk
  • Agile Software Development
  • ITIL
  • Business Continuity Plan
  • Information Security
  • GDPR
  • Compliance Consultation
  • IT Management
  • SOC 2 Report
  • ISO 27001
  • ISO/IEC 20000

 A seasoned professional with over 18 years of experience in IT Strategic Planning, Budgeting, Project Management, Infrastructure Management, System Administration, Networking, and Team Management.  Demonstrated skills as Lead Auditor for ISO 27001:2005 ISMS for any medium to large scale organization.  Acknowledged for integrity, high professional standards, “big-picture” vision, & sensitivity to deliver projects within time & cost parameters.  Proven skills as Lead Auditor for ISO 22301:2012 Business Continuity Management Systems for any medium to large scale organization.  Conversant with setting up and maintaining entire WAN/ LAN,...

Strahinja S.
$50/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Vulnerability Assessment
  • GDPR
  • ISO 27001
  • Security Operation Center
  • Information Security
  • Information Security Analyst
  • Information Security Consultation

ECSA - Certified Security Analyst LRPA - Certified LogRhythm Platform Administrator I am a Senior Cybersecurity Analyst with 6 years of professional experience in the Cybersecurity field providing services to corporations and medium-sized businesses that are leaders in their respective industries. Have become proficient in: -Vulnerability assessment and analysis -Full incident response life cycle and incident report writing. -Training Junior colleagues in Cybersecurity Incident Analysis -Writing framework documentation (policies and procedures) -Conducting security audits of certain IT systems and report writing -Writing security...

Govind K.
$30/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • ITIL
  • ISO 27001
  • COBIT
  • Governance, Risk Management & Compliance
  • Compliance
  • HIPAA
  • Information Security
  • PCI
  • SOC 2 Report
  • HITRUST Common Security Framework
  • Risk Assessment
  • ISO/IEC 20000
  • Business Continuity Plan
  • Project Risk Management
  • Unified Threat Management

I have executed some 44 projects in upwork in information security, governance, IT service management, SIEM, and others and earned customer accolades. I continue to nurture my skills that will benefit my customers. I am all for value creation in IT because every penny spent must return value and do the business and IT a secure and safer workplace. Govind has spent 25 years in the IT and he is - ISO 27001 Lead Implementer from PECB Canada - ITIL Expert V3 , ITIL4 FL, ITIL4 MPT Certified - Certified ISO 27001 Lead Auditor, ISO 22301 Lead Auditor, ISO 20000 Lead Auditor - COBIT5 certified in the IT Governance - PMP, PRINCE2,...

Bhakti V.
$30/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Information Security
  • Project Risk Management
  • PCI
  • Disaster Recovery
  • Technical Writing
  • Policy Writing
  • Network Security
  • Cloud Security
  • ISO 27001
  • Editing & Proofreading
  • Website Copywriting
  • Blockchain
  • Artificial Intelligence
  • Amazon Web Services
  • Robotics

With a degree in Computer Engineering and a passion for writing, my experience spans across writing whitepapers, blogs, research reports, content for websites, thesis for academic submissions, sales pitch, business proposals and more. I am highly organized and schedule my time to get things accomplished accordingly. I am detail-oriented and an excellent researcher. I can be entrusted with big projects as I prefer to complete my work before deadlines giving you ample time to review my work and provide feedback. I take pride in my work

Salah B.
$30/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Penetration Testing
  • Web Application Security
  • Network Security
  • Website Security
  • Database Security
  • System Security
  • Application Security
  • Information Security
  • Security Engineering
  • Security Testing
  • Security Assessment & Testing

CyberSecurity Analyst, Penetration Tester, and Information security researcher, I conduct penetration tests and vulnerability assessment tasks in web applications, API, Mobile applications and infrastructures. My area of expertise is mostly web applications and API security. I like to find the most severe bugs and focus on critical and high-impact vulnerabilities. I can also provide guidelines for secure coding and/or vulnerability patching.

Milica L.
$130/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Information Security
  • IT Compliance Audit
  • AWS Application
  • Federal Information Security Management Act of 2002
  • ISO 27001
  • Cloud Computing
  • Cloud Security Framework
  • Security Infrastructure
  • Security Analysis
  • Vulnerability Assessment
  • Application Security
  • FedRAMP

Experience Cybersecurity and Compliance professional helping small size businesses build secure environments. With a proven record of developing best practice security programs and innovative solutions while realizing increased efficiency and cost savings. I have helped many companies build out their Information Security Programs, achieve compliance with standards like FedRAMP, FISMA, NIST 800-171, CIS Top 20, SOC 2. Additionally, I provide consulting services for compliance initiatives, IT security designs and architecture for business adopting new technologies. AWS Solutions Architect Associate Certified Information Systems Security...

Jean-Christophe P.
$65/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Secure SDLC
  • Security Management
  • Security Policies & Procedures Documentation
  • ISO 27001
  • Project Risk Management
  • Open Web Application Security Project
  • Cybersecurity Management
  • Business Continuity Plan
  • Disaster Recovery Plan
  • Cybersecurity Management

Seasoned and CISSP certified Cyber Security Consultant, with 10 years of experience in the field (30 years in IT as a whole): - Governance, Risk, Compliance. - IT Security Consulting: Application Security & Secure SDLC, ISO 27001, NIST, EBIOS, ANSSI, OWASP. - Technical and organizational audits. - Penetration testing. - SOC and security teams management. During my career, I worked for various companies, small/medium/large. One of my strengths is to be able to adapt to the context, domain/sector and challenges I have to face. I have a pragmatic approach, ever eager to learn, often while doing, and share my knowledge. Some of my...

Ernest P.
$165/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Cybersecurity Management
  • HIPAA
  • Information Security
  • Information Security Awareness
  • Project Risk Management
  • Risk Assessment
  • Security Policies & Procedures Documentation
  • Information Security Governance
  • Disaster Recovery Plan
  • Information Security Audit
  • Management Consulting
  • GDPR
  • Business Consulting
  • PCI
  • Governance
  • Business Continuity Plan

Risk management specialist, vCISO - 20 years of experience with business IT consulting, regulatory compliance, and acting as a virtual CISO for multiple companies. Commonly assist with vendor risk questionnaires and cybersecurity strategy for organizations of all sizes. Risk management done correctly helps a business grow and save money. Managing losses properly means that the organization makes more money, retains more clients, and while others in similar companies disregard the importance of information privacy, businesses that make cybersecurity a cornerstone of modern business will grow. I want to show you how proactive cybersecurity...

Kenice M.
$175/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Project Risk Management
  • Enterprise Risk Management
  • Business Consulting
  • Business Continuity Plan
  • Risk Assessment
  • Risk Analysis
  • Technical Documentation
  • Tech & IT
  • Technical Writing
  • Compliance
  • Information Security Audit
  • Policy Writing
  • Data Protection
  • Certified Information Systems Security Professional
  • Nonprofit Organization

Former private sector and government executive with leadership, consulting, advising, strategic and business development at the forefront of my professional skills. Compliance expertise in: FISMA, NIST CSF, NIST SPs 800 Series, HIPAA, FedRAMP, PCI DSS, Sarbanes Oxley, GLBA, GDPR, ISO 27001. CISSP with more than 20 years in cybersecurity and IT. Cybersecurity professor and skilled trainer in risk management and compliance, with expertise in developing professionals into the cyber managers and leaders they want to become. I teach fundamentals and advanced coursework in risk assessments, security testing, business continuity, secure...

Matthew G.
$70/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Microsoft Office
  • Firewall
  • Cisco Router
  • Java
  • Scripting
  • Wireless Network Implementation
  • Wireless Security
  • Network Security
  • Linux System Administration
  • Network Administration

Dedicated Cyber Security expert with a vast IT background. Has an in-depth understanding of IT infrastructure, cyber security, and network integration. Goal-driven hard-worker with demonstrated success in IT field. Skills- Software: Microsoft Office, Open Office, McAfee, Norton, Remedy Ticketing Service Security: Sourcefire, OPSWAT, InQuest, FireEye, IDS/IPS, Stealthwatch, Fidelis, Firewall configuration and maintenance, VPN configuration and maintenance Networking: Wireshark/TCP Packet Analysis, DNS servers, mail servers, network infrastructure install and maintenance Virtualization/Container Based Computing: Citrix, VMware, Docker...

Darrell O.
$97/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • IT Compliance Audit
  • Disaster Recovery Plan
  • IT Management
  • Risk Assessment
  • Disaster Recovery
  • Information Security
  • Certified Information Systems Security Professional
  • Incident Response Plan
  • Security Policies & Procedures Documentation
  • Information Security Consultation
  • NIST SP 800-53
  • Cybersecurity Management

Darrell O. has many years of experience working in all areas of Information Technology. He is now specializing in the following areas: • IT and cybersecurity assessments • IT Risk Management • Disaster recovery plan evaluation, assessments, and tabletop testing exercises • IT Security Policy compliance • IT Security and Cyber security program development • IT User security education Darrell is energetic, customer-focused, and pays attention to detail. He enjoys a challenge and is always learning new things, meaning he stays on top of technological changes. If you want value for your money, consider him for areas in which he...

Jonathan T.
$95/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Certified Information Systems Security Professional
  • Network Engineering
  • Systems Engineering
  • VMware vSphere
  • Microsoft Windows Powershell
  • Microsoft Exchange Server
  • Storage Area Network
  • Fortinet Technologies
  • Policy Development
  • Compliance
  • Network Planning
  • Network Monitoring
  • Network Security
  • Network Administration
  • Network Security Management

Information Security and Infrastructure professional with over 15 years of experience. I have passion and talent for aligning architecture, plans, controls, processes, policies and procedures with organizational goals and security standards. Examples of previous projects and samples of documentation can be provided upon request. Certifications: - CISSP - C|EH Strengths: - Attention to detail - Planning - Knowledge in multiple areas of IT Skills: - Cybersecurity - Compliance (SOC 2, PCI, NIST/FISMA) - Microsoft products including Windows Server (2000 - 2019) Exchange Server (2010 - 2019) Active Directory (ADDS, DNS, Group Policy, etc.)...

Syed Qamber R.
$30/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Open Web Application Security Project
  • Vulnerability Assessment
  • Data Protection
  • AT&T Cybersecurity
  • Employee Training
  • GDPR
  • PCI
  • Certified Information Systems Security Professional
  • HIPAA
  • Nessus

Following is a summary of my skills: • ISO27001 compliance and gap analysis • IT Security Policies and Frameworks • PCI DSS Assessment level 1 & 2 for merchants and Service provider • Penetration testing • SIEM and Forensics analysis • NIST 800-53 • Risk Assessment and Treatment • Application security vulnerabilities, testing techniques, and the OWASP framework • GDPR • Vulnerability Scanning Experience: • Advise Network and system team to securely build/change Azure and AWS cloud infrastructure for existing and potential clients. • Engage with Client to understand their infrastructure requirements to build and integrate AWS API’s...

Usman A.
$35/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Penetration Testing
  • Web App Penetration Testing
  • Network Penetration Testing
  • Ethical Hacking
  • Mobile App Testing
  • System Security
  • Vulnerability Assessment
  • Information Security Consultation
  • Web Application Security
  • Application Security
  • Cloud Security
  • Network Security
  • Information Security
  • Black Box Testing
  • Security Testing

OSCP Certified with 5+ years of professional experience in different trade crafts of pentesting and red teaming. Challenges make me work more efficiently and what is a better challenge than doing penetration testing in which knowledge and experience is the main factor to successfully finding a way inside Targets. - Manual testing approaches with real impact vulnerabilities - Exposure to multinational companies and Swiss banks - Industry renowned certifications (OSCP - CEH - CPTE - CEI - CCNA) - "Find my way in" mentality therefore 80% of projects end up in successful breaches Key Skills for Pentesting Jobs...

Mihai B.
$60/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Python
  • Penetration Testing
  • API
  • Reverse Engineering
  • C++
  • Cryptography
  • Vulnerability Assessment
  • Cybersecurity Management
  • Cloud Security
  • Digital Forensics

My name is Mihai Barloiu, I am a passionate cybersecurity specialist living in New York, in charge of the business operations of the cybersecurity company Cyber Dacians from Romania. I hold a Master's degree in Security, am OSCP certified and my top skills are Manual Penetration Testing and Vulnerability Assessment. Together with my colleagues from Cyber Dacians, we bring professionalism, confidence and punctuality in offering high-level information security services. Cyber Dacians is an innovative cybersecurity company focused on provided advanced offensive services related to digital protection, testing, and vulnerability assessment. The...

Oleksandr M.
$25/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Penetration Testing
  • Ethical Hacking
  • Network Security
  • Digital Forensics
  • Information Security Audit
  • Windows Server
  • Linux System Administration
  • Website Security
  • Network Engineering
  • Microsoft Windows Powershell
  • Bash Programming

My name is Alexander. I am a cybersecurity specialist. I am engaged in the assessment of the security of IT resources of organizations. I am proficient in penetration testing and digital forensics. I am also well versed in network security and the configuration of various services. I have over 8 years of experience in this field. Certifications: Certified Ethical Hacker Offensive Security Certified Professional CCNA CyberOPS CompTIA Security+ CCNA Routing And Switching

Georges K.
$38/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Information Security Consultation
  • Penetration Testing
  • Security Information & Event Management
  • Vulnerability Assessment
  • Information Security Audit
  • Information Security Awareness
  • Information Security
  • Security Analysis
  • ISO 27001
  • Compliance
  • Security Policies & Procedures Documentation
  • Cloud Security
  • System Security
  • Application Security
  • Network Security

Georges Kirillos is a loving father with over 8 years of experience in cybersecurity, and over 12 years of experience in paramedic as technical mission leader. He has started his security career when he was 16 years old as script kitty. At age 23 he has won 10000 USD as first place prize in an innovative competition organized by the higher center for research at his university, He has finished his Master engineering degree in network and information security at 24 years of age with a high GPA. Georges is holding multiple certificates in cybersecurity and medical fields. In his over 8 years of experience in cybersecurity, Georges was...

Vicente M.
$30/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Python
  • Linux System Administration
  • MySQL
  • Web Development
  • AT&T Cybersecurity
  • Splunk
  • Bash Programming
  • Data Scraping
  • Writing
  • Elasticsearch
  • Docker
  • History
  • Technical Writing
  • Incident Response Plan
  • Scripting

Cybersecurity Professional focused on making sure your data and information are secure by properly identifying, mitigating and fixing vulnerabilities as well as setting up monitoring platforms for monitoring, additionally I have worked with Python and other scripting languages for data collection, manipulation and visualization. I have experience as a ghostwriter and an editing of texts, I currently hold the position of editor and proofreader for an e-magazine that has been running three years strong delivering books every six months.

Lloyd S.
$100/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Internal Control
  • Fraud Analysis
  • Internal Auditing
  • Gap Analysis
  • Compliance
  • Sarbanes-Oxley Act
  • IT Compliance Audit
  • Policies & Procedures
  • Business Consulting
  • Information Security Consultation
  • Project Risk Management
  • Regulatory Compliance

Working in many different industries and various departments has allowed me to bring a unique approach to projects and consider many items that others would not think about! Serving clients in the USA (several states), Canada, Brazil, England, and Switzerland by performing value-adding functions such as: • Identifying areas of risk (and potential fraud) and opportunities to improve business processes • Finding cost savings and increasing efficiencies • Creating and enhancing internal controls within policies & procedures to safeguard assets, data, and integrity of processes • Disaster Recovery and Business Continuity plans • Gap analysis...

Muhammad Aamir M.
$50/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Cybersecurity Management
  • Information Security Audit
  • ISO 27001
  • IT Compliance Audit
  • PCI DSS
  • Vulnerability Assessment
  • HIPAA
  • Security Policies & Procedures Documentation
  • Website Security
  • Regulatory Compliance
  • Information Security Consultation
  • Policy Writing
  • Cybersecurity Management
  • SOC 2 Report
  • NIST SP 800-53

An experienced Information Security Specialist with 20 years of experience: Cyber Security Framework (SANS, NIST, CIS, ISO, GDPR, SWIFT CSP & CSCF) Implementer, PCI DSS QSA, SOC 2, ISO 27001 Lead Auditor, ISO 27001 Lead Implementer, Certified Data Privacy Solutions Engineer (CDPSE), IT Audit compliance consultant

Sean C.
$75/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Google Maps API
  • Azure IoT HuB
  • Industrial Internet of Things
  • Microsoft Azure
  • Microsoft Azure SQL Database
  • C#
  • .NET Framework
  • Microsoft Visual Studio
  • Microsoft Visio
  • Tableau
  • Internet of Things Solutions Design
  • JavaScript
  • SQL
  • Microsoft Power BI
  • API Integration

Influencer for business profitability in Digital Transformation and Cybersecurity Strategy. Achieved feedback success developing and integrating new technology solutions and products as an innovative hands-on leader. Experienced in building and implementing business systems with a focus on the customer. SME in logistics, debit, credit, ATM, e-commerce, Google maps and Cybersecurity using Azure, AWS, SQL, IoT, Tableau, Maps, Salesforce, C#, .NET, SaaS, GPS, and Indoor Positioning Systems (IPS). Strong in SQL, NIST based Cybersecurity standards and compliance.

Daniel R.
$100/hr
  • Trophy Icon Certified Information Systems Security Professional (CISSP)
  • Application Security
  • ISO 27001
  • Information Security
  • Core Java
  • Certified Information Systems Security Professional
  • Single Sign-On
  • Python
  • Google Suite
  • Google Suite Administrator

I have served in lead SecOps and DevOps architecture and engineering positions for global companies in the technology, finance, healthcare, and education. For the past several years, my primary focus has been within the identity and access management suite. Moreover, I am an experienced Cybersecurity professional helping large organizations build upon their secure environments. This involved reviewing the information security program, achieve compliance and security standards, and aligning the IT strategies to business objectives byways of building an IT architecture and adopting new technologies I have worked for companies innovating in...

$NaN/hr

How it works

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses

How to Hire Top Certified Information Systems Security Professional (CISSP)

What is a CISSP?

A CISSP is an independent information security specialist who is certified by the International Information System Security Certification Consortium (ISC)². A CISSP offers a minimum of five years of direct, full-time security work experience in at least two of the (ISC)² information security domains and can be found via Upwork.

How do you hire a CISSP?

You can source CISSP talent on Upwork by following these three steps:

  • Write a project description. You’ll want to determine your scope of work and the skills and requirements you are looking for in a CISSP.
  • Post it on Upwork. Once you’ve written a project description, post it to Upwork. Simply follow the prompts to help you input the information you collected to scope out your project.
  • Shortlist and interview a CISSP. Once the proposals start coming in, create a shortlist of the professionals you want to interview. 

Of these three steps, your project description is where you will determine your scope of work and the specific type of CISSP you need to complete your project.

How much does it cost to hire a CISSP?

Rates can vary due to many factors, including expertise and experience, location, and market conditions.

  • An experienced CISSP may command higher fees but also work faster, have more-specialized areas of expertise, and deliver higher-quality work.
  • A contractor who is still in the process of building a client base may price their CISSP services more competitively. 

Which one is right for you will depend on the specifics of your project. 

How do you write a CISSP job post?

Your job post is your chance to describe your project scope, budget, and talent needs. Although you don’t need a full job description as you would when hiring an employee, aim to provide enough detail for a contractor to know if they’re the right fit for the project.

Job post title

Create a simple title that describes exactly what you’re looking for. The idea is to target the keywords that your ideal candidate is likely to type into a job search bar to find your project. Here are some sample CISSP job post titles:

  • Senior security administrator needed for FinTech company
  • Certified security specialist wanted to oversee company’s risk management efforts
  • Network security specialist needed to lead our security architecture program

Project description

An effective CISSP job post should include: 

  • Scope of work: From software development to overseeing risk management, list all the deliverables you’ll need. 
  • Project length: Your job post should indicate whether this is a smaller or larger project. 
  • Background: If you prefer experience with certain industries, certifications, or environments, mention this here. 
  • Budget: Set a budget and note your preference for hourly rates vs. fixed-price contracts.

CISSP job responsibilities

Here are some examples of CISSP job responsibilities:

  • Develop and manage company’s security operations
  • Establish security governance and risk management for Fortune 1000 company
  • Oversee company’s business continuity and disaster recovery planning

CISSP job requirements and qualifications

Be sure to include any requirements and qualifications you’re looking for in CISSP. Here are some examples:

  • Bachelor’s degree in IT or IS
  • Minimum three years overseeing corporate risk management program
  • Understanding of all required certifications for department security staff
View less
Schedule a Call