Hire the best Certified Information Systems Security Professional (CISSP) in the United States
Check out Certified Information Systems Security Professional (CISSP) in the United States with the skills you need for your next job.
- $120 hourly
- 5.0/5
- (41 jobs)
I help organizations of all sizes build, mature, and manage their cloud security and compliance programs. With over 15 years of experience in cybersecurity, I’ve led security initiatives for Fortune 100 companies like Warner Bros., EA Sports, Pfizer, State Farm Insurance, and Goldman Sachs. Today, I work with fast-growing SaaS companies, healthcare organizations, and mid-sized businesses to help secure their cloud environments and achieve compliance goals. My expertise includes: Cloud security architecture and hardening across AWS, Azure, and GCP SOC 2, ISO 27001, HIPAA, and GDPR compliance readiness Cloud risk assessments, gap analysis, and remediation planning Penetration testing and vulnerability management Security program development as a virtual CISO (vCISO) SIEM deployment, configuration, and log monitoring (Splunk, ELK, and cloud-native tools) Security policy and procedure development Incident response planning and tabletop exercises DevSecOps integration and CI/CD pipeline security Certifications include CISSP, CISA, GPEN, GMON, GCCC, CEH, AWS Certified Solutions Architect, CHFI, CWSP, ITIL Foundation, and PMP. I focus on delivering practical, business-aligned security outcomes that reduce risk, meet audit requirements, and build trust with your customers and stakeholders. If you’re looking for help with cloud security, regulatory compliance, or security program leadership, let’s connect. Keywords: cloud security, AWS security, Azure security, GCP security, SOC 2 compliance, ISO 27001 consultant, virtual CISO, vCISO, cybersecurity risk assessment, NIST CSF, CIS Controls, penetration testing, vulnerability management, SIEM deployment, Splunk consultant, ELK Stack security, cloud compliance, HIPAA security, GDPR compliance, cloud incident response, DevSecOps, secure CI/CD, security policies and procedures, cloud security audit, remote security consultant, cloud penetration tester, security roadmap, cloud vulnerability assessment.Certified Information Systems Security Professional (CISSP)
Cloud SecurityNetwork SecurityCybersecurity MonitoringSOC 2HIPAAPCICertified Information Systems Security ProfessionalISO 27001Security InfrastructureCompliance ConsultationWeb Application SecurityInformation Security AuditVulnerability AssessmentPenetration TestingSecurity Policies & Procedures Documentation - $40 hourly
- 4.7/5
- (13 jobs)
Highly motivated and experienced professional, with experience in supervisory positions, seeking opportunities in career fields complimentary to my experience and expertise in project management, IT, customer service support and/or customer training and mentorship. Exceptional understanding of IT concepts, cyber security and/or project management. Expert knowledge of office automation software and hardware tools, to include the MS Office Suite.Certified Information Systems Security Professional (CISSP)
Risk AssessmentGap AnalysisSecurity Policies & Procedures DocumentationIT Compliance AuditContent WritingDisaster Recovery PlanNIST SP 800-53Governance, Risk & Compliance SoftwareCybersecurity ManagementResume WritingCompany PolicyData PrivacyCertified Information Systems Security ProfessionalInformation SecurityISO 27001Tech & IT - $150 hourly
- 5.0/5
- (12 jobs)
I focus on providing cybersecurity compliance, cyber risk assessment, and cybersecurity consulting services to small businesses specializing on the implementation of and compliance with CMMC, DFARS 252.204-7012, and NIST 800-171 requirements. I have worked with NIST 800-171 since 2019 providing guidance to small businesses on meeting the requirements of NIST-171. This includes System Security Plan (SSP) development, Plan of Actions and Milestones (POA&M) creation, Policy and Procedure Development, and technical control implementation. There is more to CMMC compliance than buying a set of pre-made policy and procedure templates. As recent government legal action shows, the Department of Defense is pursuing legal action against companies not meeting CMMC and DFARS requirements after claiming to meet the requirements to win DoD contracts. Let me help your organization meet compliance and more importantly - stay compliant! I provide recommendations to small business owners that are cost-effective to meet cybersecurity compliance requirements and lessen cybersecurity risk. Specialties: cyber risk assessments, security gap analysis, policy and procedure development, system security plan (SSP) development, Plan of Action and Milestones (POA&M) creation Frameworks: CMMC, NIST 800-171, NIST Cybersecurity Framework Education: Doctorate - Cybersecurity (in-progress), Masters – Administration, Masters – Computer Science, Bachelors – IT Management Certifications: Certified CMMC Assessor (CCA), Certified CMMC Professional (CCP), CISSP, PMP, CRISC, CCSP, HCISPP, AWS Cloud PractitionerCertified Information Systems Security Professional (CISSP)
Policy AnalysisSecurity AnalysisInformation Security GovernanceInformation Security AuditCertified Information Systems Security ProfessionalCybersecurity ManagementInformation SecurityInformation Security ConsultationNIST SP 800-53CMMC - $60 hourly
- 4.9/5
- (3 jobs)
Director – Security Operations and Engineering Evaluated current gaps and prepared an identity and access management vision that will eliminate 2.5 million dollars of waste each year o Converted manual provisioning process to Service Now reducing amount of manager input by 22% and increasing SLA from 90% to 97% o Implemented birthright provisioning as first part of auto-provisioning project eliminating 28% of access requests o Successfully piloted tap-n-go solutions to reduce login times for providers Implemented IT asset vision moving from 35% of total active IP assets in Service Now to 94% Implemented UEBA solution in cooperation with corporate privacy/compliance to eliminate manual manager reviews of employee access to electronic health record Responsible for managing 37 security professionals through 4 managers/leads Responsible for 7+ million dollar budget operational budget Responsible for obtaining funding, and implementing multiple multi-million dollar capital projects Manage teams responsible for enterprise security tools/initiates o Identity Administration o Security and Access operations o Security Engineering o Medical Device Security o IT Asset ManagementCertified Information Systems Security Professional (CISSP)
Cybersecurity ManagementInformation Security ConsultationC#Microsoft Access ProgrammingMicrosoft AccessCertified Information Systems Security ProfessionalSQL ProgrammingVisual Basic - $200 hourly
- 5.0/5
- (25 jobs)
Im Christine and I’m cyber security professional and graduate professor with 10 years of technology/cyber experience and a PhD in security engineering. My areas of expertise include: Risk Assessment and Auditing Small business cybersecurity programs Technical writing Cyber awareness and training Email security and phishing campaigns InfoSec policy writing Vulnerability management Security metrics and reporting Security Strategy and program development CISO as a Service And More! I am also an internationally published author with superior research, technical writing, proofreading and editing skills. I have written over 200 blogs and articles, white papers, case studies, and more to help clients educate potential customers, generate new leads, and more.Certified Information Systems Security Professional (CISSP)
Vulnerability AssessmentCybersecurity ManagementInformation SecuritySecurity AnalysisInformation Security GovernanceSecurity EngineeringInformation Security AuditInformation Security AwarenessCertified Information Systems Security Professional - $105 hourly
- 5.0/5
- (3 jobs)
Information security professional in information technology and consulting environments. Proven success solving customer security problems, and implementing software and security solutions. CORE COMPETENCIES AND SKILLS CISSP ▪ Vendor Risk Management ▪ Vulnerability Management ▪ Incident Investigation and Response ▪ Security Controls and Audits ▪ Voice Biometrics ▪ PMP ▪ Risk Management ▪ Technical Writing ▪ Systems Administration Software Skills: a variety of security tools, including Palo Alto Networks, Qualys, Veracode, Proofpoint, Ironclad, RiskRecon, and Powershell. Also experienced with AWS, Oracle, Microsoft, SQL applications, Linux.Certified Information Systems Security Professional (CISSP)
Project Management ProfessionalVendor ManagementCertified Information Systems Security ProfessionalVulnerability Assessment - $85 hourly
- 5.0/5
- (12 jobs)
My extensive knowledge regarding information and cyber security will be put to work for you. After creating many courses for customers such as the AICPA, HP, ISC2, SNHU, Lexis-Nexis, Geo-Tab and others I will put those skills to work for you. Projects from one page in length to a full course or book is my focus. Security is my strength. I have been teaching authorized CISSP and CISM content for the last 17 years. Creating content that is clear and understandable for any audience is critical. My proven skills will take your content needs and fulfill your writing or course needs. This does not just include creation of new content but of course editing as well. Over the last 25 years I have spent most of my time in the classroom with working professionals all over the world, from Australia to Singapore to South Africa. My experience with many cultures will also be of service to you in a manner that allows content to make sense to anyone. My goal is to make sure you are satisfied with your project and that it is delivered on time and on budget. Collaboration is always welcome to ensure your goals are being met. Take a look at the rest of my qualifications and some samples of my writing as well.Certified Information Systems Security Professional (CISSP)
General TranscriptionTechnical EditingContent EditingCertified Information Systems Security ProfessionalInformation SecurityCloud Security FrameworkSecurity AnalysisTechnical WritingEditing & Proofreading - $80 hourly
- 5.0/5
- (3 jobs)
Hello, I am Alex Brown. I am a Certified Information System Security Professional (CISSP) and Offensive Security Certified Professional (OSCP) with 13 years of industry experience and a masters degree in Cybersecurity. The majority of my career I have spent working with NIST 800-37 Risk Management Framework (RMF), performing security assessments, architecting security solutions, and applying security remediations. I have worked through all 6 stages of the RMF process from system categorization to system maintenance. I have developed cyber documentation to support security controls, developed polices and procedures to enforce system security practices and document system configuration. In addition, I have implemented technical security controls such as Windows and Linux patches, Windows and Linux OS configuration settings, and network device firmware and configuration settings. I have extensive experience in vulnerability assessment, security analysis, and applying security controls. I am extremely familiar with industry scanning tools such as Nessus and DISA Security Technical Implementation Guides (STIGs). I have worked with other security tools including Kali Linux and Metasploit. I have worked with application firewalls including Windows Firewall, iptables, and Symantec Enterprise Protection. I have extensive experience analyzing results from security scans, assessing risk, and applying measures to mitigate or remediate the security issue. I have developed Vulnerability Assessment Reports identifying the open vulnerabilities impacting the organizations system. I have developed Risk Assessment Reports where open vulnerabilities are assessed for overall risk by looking at likelihood of a vulnerability being exploited and the impact it would have on the organization. I have maintained Plan of Actions and Milestones (POA&M) where ongoing non-compliant security controls are tracked and assigned completion expectations and criteria. In addition to my technical knowledge and experience in the cyber field, I have also performed project management activities on cyber efforts. I have managed control accounts, maintained schedules, managed sub-contractors, and worked directly with customer clients on cyber deliverables. I have a strong background in understanding expectations to meet customer demands with strict schedule and cost demands.Certified Information Systems Security Professional (CISSP)
NessusPenetration TestingMicrosoft Windows PowerShellWindows 10 AdministrationCertified Information Systems Security ProfessionalSecurity AnalysisInformation Security AuditCybersecurity ManagementRed Hat Enterprise LinuxVulnerability AssessmentBash Programming - $50 hourly
- 5.0/5
- (19 jobs)
Mr. Lunsford has over twenty years of management and leadership experience in the military and private sector of IT operations, including certification in Network Management, Cybersecurity, Encryption, and Information Assurance. Mr. Lunsford holds certifications and certificates from the ARMY, ISC2, CompTIA, CISCO, and EC-Council. Mr. Lunsford specializes in Cyber Security, Governance Compliance, Network and Device Configuration Management, and Risk management. As an industry-certified professional. Mr. Lunsford provides services as a consultant or an assessor based on the organization's request to meet their required compliance Framework. This can include but is not limited to: • NIST 53 Federal Systems • FedRAMP, StateRAMP, TXRAMP Federal and/or State Systems • NIST 171 Non-Federal Systems for Contractor Agencies • CMMC L1, L2, & L3 Non-Federal Systems for Contractor Agencies • ISO 27000, 27001, 27002 • SOX • SOC 2 Type 2 • PII, PHI, & Privacy • PCI-DSS Mr. Lunsford’s project specialty includes: • Controlled Unclassified Information (CUI) • Federal Contract Information (FCI) • System Security Plan (SSP) • Plan of Action and Milestones (POA&M) • SCOPE Boundary Designs • Network and Topology Flow Diagrams • Risk Management Plans and Assessments • Incident Response Plans and Processes • Change and Configuration Management Plans and Processes • GAP Analysis and Remediations • Security Policies, Procedures, Processes, Plans, Matrixes, Inventories, and more. Mr. Lunsford’s capabilities include: • Develop or define the data, system, or software life cycle. • Manage compliance projects from beginning to end. • Educate and train personnel on PMP, HR, IT Admin, and cyber security. • Provide consulting services. • Provide GAP Assessments. • Develop and assist organizations that struggle with policy development. • Provide organizations with a roadmap to compliance that includes documents, checklists, matrixes, and other items requested. Mr. Lunsford’s solutions include: • Compliance documentation • Evidence collection and attestations • System Testing Metrics • Hardware and Software • End Point Management and Mobile Device Management • Training and Education • Encryption • Storage, Backup, and Archiving • Risk and Incident Management Please contact me with any questions. Thank you.Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security ProfessionalSecurity InfrastructureRisk AssessmentSecurity Policies & Procedures DocumentationSOC 2 ReportNIST SP 800-53IT Compliance AuditIncident Response PlanISO 27001FedRAMPInformation Security ConsultationCybersecurity Management - $125 hourly
- 5.0/5
- (8 jobs)
Information Security, Governance, Risk, and Compliance (GRC) professional. • HITRUST CCSFP, CISSP, PCI ISA, ITIL • 15+ years in Information Security (Governance, Risk, and Compliance) • 15+ years in highly regulated environments (PCI, HIPAA, FISMA) • 15+ years implementing/managing ISO 27001, NIST 800-53, NIST-CSF, PCI-DSS • 10+ years of policy and procedure development and management • 10+ years of process optimization, streamlining • 15+ years in IT (design, development, implementation, and management) • Bachelor of Business Administration - FinanceCertified Information Systems Security Professional (CISSP)
Company PolicyRisk AssessmentHITRUST Common Security FrameworkGovernance, Risk Management & ComplianceCertified Information Systems Security ProfessionalHIPAAInformation Security AuditPCIServiceNowNIST SP 800-53 - $220 hourly
- 5.0/5
- (29 jobs)
Former private sector and government executive with leadership, consulting, advising, strategic and business development at the forefront of my professional skills. Compliance expertise in: FISMA, NIST CSF, NIST SPs 800 Series, HIPAA, FedRAMP, PCI DSS, Sarbanes Oxley, GLBA, GDPR, ISO 27001. CISSP with more than 20 years in cybersecurity and IT. Cybersecurity professor and skilled trainer in risk management and compliance, with expertise in developing professionals into the cyber managers and leaders they want to become. I teach fundamentals and advanced coursework in risk assessments, security testing, business continuity, secure application development, and securing emerging technologies. Business expertise in grant and proposal writing, as well as policy and procedure development. Technical writing to include strategic plans, white papers, briefing papers, and presentations. I have been writing, convincing, persuading, and communicating effectively through writing my entire career. I am also effective in providing business capture and business development support.Certified Information Systems Security Professional (CISSP)
Nonprofit OrganizationCertified Information Systems Security ProfessionalData ProtectionPolicy WritingInformation Security AuditComplianceTech & ITRisk AnalysisBusiness Continuity PlanBusiness ConsultingEnterprise Risk ManagementRisk AssessmentProject Risk ManagementTechnical WritingTechnical Documentation - $100 hourly
- 4.8/5
- (2 jobs)
With an insight into technology and its unique challenges, my wide berthed set of skills makes me a highly prized asset to any company. By selecting me, you are assured to receive the highest caliber professional, with an eye always geared towards balancing the needs of Business and those of Security and Stability. Well versed in networking and network security, as well as MS and Linux technologies.Certified Information Systems Security Professional (CISSP)
Chief ArchitectFinancial AuditGDPRLinuxGovernance, Risk Management & ComplianceNetwork EngineeringCertified Information Systems Security ProfessionalLeadership SkillsHITRUST Common Security FrameworkCheck PointAmazon Web ServicesInformation SecurityPenetration TestingFirewall - $200 hourly
- 5.0/5
- (10 jobs)
Senior cybersecurity professional and veteran with a top-secret SCI eligible security clearance and over 20 years of proven experience. Possesses a comprehensive background in information security, information systems, the Risk Management Framework (RMF), and security assessments derived from the US Air Force, as a DoD civilian and working as a DoD contractor.Certified Information Systems Security Professional (CISSP)
Training PresentationFederal Information Security Management Act of 2002Risk ManagementITILCertified Information Systems Security ProfessionalNIST Cybersecurity FrameworkNIST SP 800-53Information SecurityCybersecurity Management - $150 hourly
- 5.0/5
- (2 jobs)
Seasoned revenue and data-driven marketer with over two decades of marketing and hands-on tech/security experience that scale businesses from self-service PLG product-led growth to C-level enterprise deals. I am happy to provide a wide range of services, from go-to-market strategies to Forbes articles, whitepapers, webinars, competitive analyses, sales enablement/training, product training, and etc. Cybersecurity/Fraud Go To Market Advisor providing insight for: **1. Market Taxonomy: Threat Intelligence, Fraud, Kubernetes Security, Database Security, File Share / Transfer Security, Privileged Access Management, SD-WAN, NGFW, Zero Trust Network Access, XDR, microsegmentation markets Current trends and market shifts Rapidly evolving industries/use cases & growth opportunities Market segmentation **2. Business needs & solutions: Key customer pain points and needs Current offerings for services or solutions Gap in solutions offered Vertical specific needs **3. Competitive landscape: Key provider's (incumbent and emerging) positioning in the market Offerings by leading players who are "making waves" Best practices go-to-market strategies & how they are evolving Challenges in the market for competitors & how they are evolvingCertified Information Systems Security Professional (CISSP)
Freelance MarketingCybersecurity ManagementCertified Information Systems Security ProfessionalGo-to-Market StrategyProduct Marketing - $125 hourly
- 5.0/5
- (1 job)
Experienced technology professional passionate about AI, product/software engineering, cybersecurity and general business consulting. I've spent the last year focusing on AI related projects including multiple private LLM RAG implementations using tools like ollama, langchain, langgraph, pytorch, n8n, verba, weviate, chroma, openwebui, and more. I have more than 30 years of experience working in fast-paced technology environments from massive scale enterprises to 10 person startups. I've seen and done a lot and I enjoy using my experience to help clients solve problems, build quality solutions and crush their goals. I have led a variety of engineering departments covering back-end, front-end, qa, devops/sre, product and program management, information technology and support teams. My most recent roles were CTO and VP of Engineering for defense tech startups. I have experience working with US Govt agencies, the DoD, and the IC. I've participated in many federal proposal writing and capture efforts as the tech lead. I've been a software developer/architect for over 25 years covering a wealth of technologies, 14 programming languages and project experience from small utility programs to $8B/yr e-commerce websites.Certified Information Systems Security Professional (CISSP)
ChatGPT APIAI ConsultingHugging FaceArtificial IntelligencePythonLangChainLLaMARetrieval Augmented GenerationSoftware ArchitectureIT ConsultationSoftware Architecture & DesignTechnical Project ManagementCertified Information Systems Security Professional - $110 hourly
- 5.0/5
- (0 jobs)
I am a seasoned cybersecurity professional with experience in network security, endpoint security, security architecture, DevSecOps, incident response and analysis, and application security. I have a very solid background in information technology. I am passionate about cybersecurity, without it, privacy does not exist for digital citizens. I am a veteran of the US Army, I served on active duty for ten years and deployed to both Afghanistan and Iraq.Certified Information Systems Security Professional (CISSP)
Security Operation CenterCertified Information Systems Security ProfessionalCybersecurity ToolOS SecuritySecurity Policies & Procedures DocumentationWeb Application SecurityWeb Application FirewallNetwork Access ControlSecurity InfrastructureCybersecurity MonitoringCybersecurity ManagementCloud SecuritySecurity EngineeringSecurity Analysis - $120 hourly
- 5.0/5
- (13 jobs)
I am currently a HIPAA Compliance Officer and I simultaneously teach IT classes part-time for a community college. I was a program adviser for a GRC bootcamp, and now support organizations through their SOC 2 and ISO 27001 compliance. I spent 8 years as a Systems Administrator for a student health facility that saw university students, faculty, and staff. I've used server operating systems from Windows 2003 through 2016, and supported mostly Windows workstations. I previously worked remotely part-time for a startup, so I'm familiar with daily check-ins. I've also worked in Help Desk positions, so I'm aware of how to handle and prioritize support tickets. I have two Bachelors degrees (one in Management Information Systems and the other in Cybersecurity & Information Assurance) and an MBA in IT Management. I am an avid problem solver and a fast learner. I'm familiar with HIPAA, have the CompTIA triad, along with my ITIL and CISSP certifications, and hold the Salesforce Administrator certification.Certified Information Systems Security Professional (CISSP)
Electronic Medical RecordWindows 10 AdministrationTeamViewerGroup PolicyMicrosoft Active DirectoryGoogle SheetsCertified Information Systems Security ProfessionalGoogle DocsMicrosoft OfficeHIPAA - $165 hourly
- 5.0/5
- (37 jobs)
Highly accomplished IT & Information Security Professional with 15+ years of experience in Cybersecurity, Network, Cloud, and IT Systems. Proven expertise in developing and executing strategic security initiatives, architecting enterprise-grade solutions, and leading cross-functional teams. UPWORK experience: 10,000+ work hours, 100% Job Success, Top Rated Plus, Expert-Vetted. I have successfully delivered complex projects across heterogeneous environments such as Telco/ISP providers, SMB, and Large International Enterprises in USA, Europe & Globally. Main offered services include: • Cybersecurity Architect • Information Security Manager • Network Architect • System Architect • Cloud Architect • Digital transformation • Solution design and implementation • IT strategy development • vCTO | vCISO • Executive Consultant Highly experienced SME in the following technology fields: Information Security & Cyber Security • Develop & enhance Cybersecurity management frameworks. • Develop, implement & monitor strategic, comprehensive enterprise information security & IT risk management programs. • Develop and maintain cybersecurity programs, strategies, policies, standards, baselines, guidelines, and procedures. Network/IT/System Security • Firewall, UTM, NGFW & NG-IPS: PaloAlto, Fortigate, FortiManager, FortiAnalyzer, Cisco (ASA FirePower), Barracuda, pfSense, Checkpoint, SonicWall, WatchGuard • Email Security: Cisco, Barracuda, Mimecast, Microsoft • Web Security: Cisco, Barracuda, Fortinet, McAfee, Zscaler • Proxy and Reverse Proxy: Squid, Nginx, Dante • IPSec VPN & SDWAN: Cisco DMVPN, HPE ADVPN, Fortigate ADVPN • SSL VPN: Fortigate, Cisco, PaloAlto, Barracuda, SonicWall, OpenVPN, pfSense, Swan, OpenConnect • Network Access Control (802.1X, Radius, Tacacs+…), BYOD and MDM : Aruba ClearPass, Cisco ISE, PacketFence, NPS, Genians, Intune... • SASE, SSE and ZTNA Expert with Prisma Access, Cloudflare and all leading multi-vendor solutions • IAM SSO SAML2 Oauth: OKTA, Keycloack, Auth0 • DLP & CASB Bitglass, Forcepoint • EDR McAfee, Sophos, SentinelOne... • SIEM and SOC solutions - Wazuh, Fortinet, Splunk... IT Cloud/Systems/Virtualization/Backup/DR • Hybrid Cloud, Multi Cloud Architecture • Cloud Infrastructure Security, Networking, Storage, VPC (AWS, Azure, OVH, OpenStack...) • Virtualization planning, implementation, tuning (VMware, Proxmox, KVM, Hyper-V) • Hyperconverged HCI solutions ESXi & vSAN, Proxmox & CEPH • Linux Systems deployment, administration and development (Debian Ubuntu OpenSuSE CentOS RedHat) including performance optimization, hardening, scripting, HA, backup & restore • Windows Server architecture & administration (Hyper-V, AD, GPO, DNS, DHCP, PKI, File Server) • SAN (FC/FCoE), ISCSi, NAS(File) • VDI and Virtual App (Microsoft, VMware, Citrix) • Load Balancer/Application Delivery: HAproxy, Nginx, Barracuda, F5 • ElasticSearch & OpenSearch design & implementation • Critical HA Database clusters: PostgreSQL & MySQL • HA, Backup & Disaster Recovery planning & deployment (Veeam, VMware, Proxmox, Linux, AWS, Azure, Windows...etc) Network technologies • Switches: Cisco, HPE, Comware, Aruba OS, Arista, Alcatel, Juniper, Dell • Routers: Cisco, HPE, Comware, Alcatel, Juniper, Mikrotik • WiFi Mobility: Aruba OS & Central, Cisco, Meraki, Ubiquity, Mikrotik • MPLS L2/L3 VPN, MP-BGP, VPLS, SDWAN • BGP, OSPF, IS-IS, EIGRP routing protocols • FRR, VyOS, Bird • VLAN, QinQ, VXLAN, EVPN L2 scalable overlay networks • ACL, PBR, NAT, QoS, NAS; large-scale DHCP/DNS • IGMP L2 and PIM L3 multicast • Secure WiFi planning: controller managed & cloud-managed • NMS, EMS, FCPAS and OSS/BSS systems - LibreNMS, Zabbix, Nagios, Cacti Some of the most notable certifications I hold are: • CISSP - ISC2 • HPE Master Accredited Solution Expert - Network Solutions • HPE Accredited Solutions Expert - Network Architect • SUSE Cert. Linux Admin.: SLES In addition to technical skills, I deliver proven business operations experience for: • Project Management • Team building and management • RFP preparation Proposal preparation (technical/commercial) • Pre-sales & Sales Management • Business development, planning, and acquiring the correct technology • Project Management • Team building and management • RFP preparation Proposal preparation (technical/commercial) • Pre-sales & Sales Management • Business partnership enablement and management with leading companies such as HPE, Aruba, Fortinet, Cisco, IBM, Dell, Microsoft… and many more I am an avid learner, enabling me to swiftly adapt to new business environments and new project needs. Excellent communication and interpersonal skills combined with my long experience in team-leading & management enable me to collaborate strongly and work in global project teams with multiple members (in both leading and supporting roles).Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security ProfessionalFirewallHigh Availability and Disaster RecoveryNIST Cybersecurity FrameworkNetwork DesignNetwork ArchitectureSolution ArchitectureCloud ArchitectureCloud SecurityBusiness DevelopmentSystem AdministrationCybersecurity ManagementInformation SecurityVPNNetwork Security - $275 hourly
- 5.0/5
- (17 jobs)
*2023 Tampa Business Woman of the Year* *2023 Tampa Small Business of the Year CEO* *Global 2022 Cybersecurity Woman Entrepreneur of the Year* As a Top Rated Upwork Professional with a 100% success rate on multiple projects and CEO of an award winning business, rest assured that I execute at a high level of experience and professionalism. I have 20+ years of certified experience in Information Security and Assurance, Information Technology (IT), Project Management, Training, and Leadership. Master of Science Degree in Information Security and Assurance (MSISA), a Bachelor of Science Degree in Business / IT Management, and multiple active industry certifications. Prior active duty military (Navy veteran) with extensive experience as Chief Executive Officer (CEO) and Chief Security Officer (CSO) for a Government contractor and in the private sector. I have successfully led and executed dozens of security audits and accreditation efforts all leading to Authorizations to Operate (ATOs) and ISO 27001 preparation that led to zero non-conformities. My area of expertise includes but is not limited to: Cybersecurity Maturity Model Certification (CMMC), DFARS (NIST 800-171), NIST Cybersecurity Framework (CSF), NIST Risk Management Framework (RMF), Independent Verification & Validation (IV&V), ISMS, ISO 27001, Corporate Security Policies & Procedures, Security Awareness, Acceptable Use Policies (AUPs), Remote Access / VPN, Third Party Access and Compliance, System Security Plans (SSPs), Security Test Plans (STPs), Security Control Traceability Matrices (SCTMs), and Plans of Action & Milestones (POA&M). My team, Paragon Cyber Solutions, has in-depth experience with security assessments / audits, penetration testing, ethical hacking, secure code review and development, and workforce enhancement (training and certifications). We are an authorized CMMC C3PAO with the following designations / certifications: 8(a), EDWOSB, DM/DWBE, MBE, veteran, minority owned small business. Contact me for any of your information security needs.Certified Information Systems Security Professional (CISSP)
Procedure DevelopmentGDPRISO 27001Information Security GovernanceCertified Information Systems Security ProfessionalInformation Security AuditCloud Security FrameworkInformation Security AwarenessInternet SecurityCertified Information Security ManagerSecurity Assessment & TestingInformation SecurityNetwork Security - $160 hourly
- 4.9/5
- (21 jobs)
As a fifteen year cybersecurity professional and security researcher, I have a broad and deep understanding of the end-to-end security processes and technologies. With my experience in the academic and business worlds I have provided information security expertise to a variety of companies operating globally. I hold several security certifications including: ► Offensive Security Certified Professional (OSCP) ► GIAC Penetration Tester (GPEN) ► Certified Information Systems Security Professional (CISSP) In addition to my hands-on work in security research, penetration testing, and reverse engineering, I hold a Doctoral degree in Computer Science. I regularly write and speak on security topics including data security, network security, penetration testing, and digital forensics.Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security ProfessionalWritingTechnical WritingInformation SecurityNetwork Security - $165 hourly
- 5.0/5
- (29 jobs)
I am an accomplished and experienced Cyber Security Engineer, CISO, and consultant with over 20 years experience in government, commercial, non-profit and private organizations. I'm a Certified Information Systems Security Professional (CISSP) and CMMC Registered Practitioner. My education includes a Master's degree in Information Assurance and Security specializing in Digital Forensics, a Bachelor's Degree in Information Technology, and daily, hands-on work governing, securing and administering complex information technology environments. My current efforts include cybersecurity compliance implementations for regulated industries and government contractors including the NIST Cybersecurity Framework, Risk Management Framework, NIST SP 800-171, and Cybersecurity Maturity Model Certification (CMMC). For those not bound to other regulatory guidelines, I assist with implementation of the Center for Internet Security (CIS) Critical Security Controls and the CIS Risk Assessment Method. I assist with expert advice, gap assessments, requirements and implementation reviews. I help develop and refine cybersecurity documentation including System Security Plans, POA&Ms, and Policies and procedures. I will share national background check results for qualified opportunities.Certified Information Systems Security Professional (CISSP)
Gap AnalysisVulnerability AssessmentCybersecurity MonitoringAmazon Web ServicesGovernance, Risk Management & ComplianceSecurity EngineeringCloud SecuritySecurity Policies & Procedures DocumentationInformation Security AwarenessCybersecurity ManagementNetwork SecurityCertified Information Systems Security ProfessionalInformation Security - $200 hourly
- 5.0/5
- (42 jobs)
🌟 TOP RATED PLUS Cybersecurity Consultant with 100% Job success rate 🌟 ✅ Penetration Testing: Standard, Web application, mobile applications. ✅ Compliance: CMMC, DFARS, NIST 800-53, NIST 800-171, PCI, HIPAA, GDPR, ISO, SOC, SOX, GLBA, FedRAMP, CCPA, and more. ✅ Incident Response: Ransomware recovery, hacking response, forensic investigations. ✅ vCISO: Virtual Chief Information Security Officer ✅ Vulnerability Management: Vulnerability Scanning Hello, It is great to meet you (virtually)! My name is Tyler. I have over 15 years of cyber-security experience in multiple verticals. I have worked with fortune 500 brands, government, military, and intelligence agencies. 🌟 I have provided expert cybersecurity and compliance consulting for startups to hundreds of businesses! 🌟 My core expertise resides in: compliance and governance (PCI, HIPAA, SOC 2, NYSDFS, CMMC, DFARS, ISO, NIST, GDPR, and more), ethical hacking, incident response, penetration testing, secure design and architecture, and public speaking. I am an excellent writer and also possess business savvy. Pairing technical expertise with exemplary writing skills is my forte. I am also fluent in Brazilian Portuguese. I currently hold the following educational degrees and certifications: ✅ Master of Business Administration (MBA) ✅ Bachelor of Science in Cyber-Security ✅ Certified Information Systems Security Professional (CISSP) ✅ GIAC Certified Incident Handler (GCIH) ✅ GIAC Security Essentials Certification (GSEC) ✅ Microsoft Certified Systems Expert (MCSE) ✅ Microsoft Certified Systems Administrator (MCSA) ✅ Microsoft Certified IT Professional (MCITP) ✅ CompTIA Security+ ✅ CompTIA A+ ✅ CIW Web Design Associate WHY CHOOSE ME OVER OTHER FREELANCERS? -Professionalism: I treat all clients with respect and honor their trust in my services. -Expertise: I have expertise across many cybersecurity, information technology, and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. -Dedication: When i take on a task or project, you deserve my undivided attention and focus! -Versatility: I can easily pivot from many different tasks. Whether your project is a standard penetration test or a Chief Information Security Officer engagement, I have the ability, knowledge, experience, and credentials to adjust based on your requirements. -I have led over 150 incident response cases. -I have brought over 75 organizations to full compliance for DFARS, NIST, PCI, HIPAA, GDPR, and more. -I have conducted over 200 penetration tests. ✅ I will ensure that you get the results that you deserve. My clients trust me to complete their tasks and I ALWAYS deliver! Whether you are seeking a long term partner or a short term project, I am ready to deliver the high quality results that you deserve.Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security ProfessionalHIPAADefense Federal Acquisition Regulation SupplementPolicy WritingGDPRInternet SecuritySecurity AnalysisInformation SecurityEncryptionSecurity Assessment & TestingApplication SecurityIncident Response PlanVulnerability AssessmentNetwork SecurityPenetration Testing - $150 hourly
- 5.0/5
- (1 job)
Hello, I have been a technology professional for over 20 years including 16 years of information security and assurance. Over the years I have led key cyber security initiatives within the commercial, government and civilian sectors as well as multiple global commercial clients (small business to Fortune 100 clients). My specialty is in security engineering and regulatory compliance, SOC operations, policies, procedures and have also worked in, managed and set up blue and red teams to help improve security operations by reviewing internal processes, logs, SIEM configurations, hardware settings and reviews and everything more required to stay ahead of threats and/or respond as quickly to suspicious activities. I am a hands on engineer with small business and Fortune 100 security environments, commercial and open source tools. I am an experienced hands on and management IT security, risk and compliance professional and interested in working with you on your project. I am your security and virtual CISO to make sure you get the management, security strategy and remediation in place to be secure and compliant. I am based in the US, have extensive experience (20 years in IT Security consulting - engineering and assessments/compliance/standards) and hold all relevant IT security certifications from CISSP, CGEIT, HIPAA, CISO, PCIP, PCI_QSA and many more. I also have my own IT Cyber Security Consulting Company since 2002, providing onsite and remote services to our clients. I believe in delivering quality work to my clients, communicating and making sure business operations and security are aligned and security and compliance posture is achievable based on your industry, business model, skills, existing tools and know-how. People, process and technology. I do not believe spending money on technology will solve a problem. 80% is done with people and processes (and configuration changes). Past projects: - Penetration Testing, vulnerability management and security processes for global sporting event - Set up and management of Global Security Operations Center for one of largest Managed IT Service Providers (100K+ staff) - PCI DSS for over 100 Tier 1 and 2 Merchants - Over 50 FedRamp/FISMA audits for government agencies and defense contractors (including pre assessments for CMMC) - 13 HIPAA audits for large hospitals and small walk in clinics - Incident Response and Forensic Analysis for over 80 large and global breaches (most were publicly announced) - Establishment of security policies, procedures, standards and Disaster Recovery/Business Continuity for over 300 clients (including large Casinos and Hotels in Las Vegas and Caribbean and global Banks) - Led a 9 months Security & Risk Get Well Program for McGraw Hill Financial which included regulatory compliance, cyber security, vulnerability management and training. - Designed and implemented security operations centers, incident response teams, delivered security consulting and regulatory compliance/ISO audits (in the Americas, Europe, Middle East and Asia). I served in the US NAVY and attended TUI and Trident University where I obtained her MBA and MSc. in Information Technology and Management. I completed my PhD (ABD) in Cyber Warfare and National Security. Over the years I earned numerous qualifications, including Certified Information Systems Security Professional (CISSP), Project Management Professional (PMP), Certified Confidentiality Officer/Counter Espionage (COO), Certified Chief Information Security Officer (CCISO), and NSA IAM/IEM (InfoSec Assessment and Evaluation Methodology). I recently obtained CMMC Provisional Assessor status. Looking forward hearing from you and feel free to check out my profile on LinkedIn. Dasha Deckwerth Industry Experience • Government, Military and National Security • Utilities and Critical Infrastructure • Financial (Banking and Credit Card processing) • Gaming & Hospitality • Transportation • Consulting • Telecommunication/ISP • Oil and GasCertified Information Systems Security Professional (CISSP)
Security AnalysisCertified Information Systems Security ProfessionalInternet SecurityPCIInformation Security AuditHIPAASecurity Operation CenterSecurity InfrastructureInformation Security - $50 hourly
- 4.7/5
- (13 jobs)
I am based in the Eastern US(EST), native English speaker and have over 15 plus years of experience working in Cyber Security, Information Security, Firewalls, and Networking. I have supported clients in the Financial, Telecom, and global businesses. Excellent skills in Design, implementation, deployment, and troubleshooting of security and networking issues. I can assist in your Cloud migration. I have also done work as a Cybersecurity instructor. Certification includes Zscaler(ZIA/ZPA), AWS Solutions Architect Professional, Azure Networking, CCSP, CISSP. - Expert-level knowledge of Zscaler, Palo Alto and Checkpoint Firewalls. - Zscaler expert with experience on both ZIA, ZPA, ZDX, Zero Trust and cloud migrations. - Azure Cloud migrations (Networking, routing, Virtual WANs, peering, NSGs, Azure firewalls, route tables, LB, etc.) - Palo Alto- VPN tunnels, Global Protect Portal, HIP check, URL filtering, User ID, AD auth, all phases of PA firewall setup and config. - Cisco ASA -VPN tunnels, SSL portals. - FortiGate firewalls and VPN setup. - VPNs and remote office setup. - DMZ design, building firewall rules, analyzing logs, and migration. - Expert level hands-on experiences on Zscaler, Secure Web Gateway(SWG) Cloud Proxy, ZIA and ZPA, Connectors, App policies, profiles - Proxy servers, Websense, and URL filtering products. -AWS - VPC, EC2, S3, DNS, VM firewalls Palo Alto, Checkpoint setup. -Azure firewall migration and config. I have done many projects involving Cisco ASA to Palo Alto conversion, SSL portal, VPNs, AWS VPC, Azure firewall migration, etc. WHY HIRE ME: ------------------ I can assist you in firewall and Cloud migration, troubleshooting, design any Security and firewall issues. Management system setup such as Palo Alto Panorama, Checkpoint Smart Dashboard, NGFW and application layer firewalls, Zscaler. I am an organized professional and will follow up on clients' issues promptly. I like to assist and take on new challenges and will quickly learn and adapt to any new technologies. I can give you a free initial assessment of your project. -Send me an invitation for your project, and we can discuss it!Certified Information Systems Security Professional (CISSP)
Microsoft AzureCisco RouterCheck PointAmazon Web ServicesCertified Information Systems Security ProfessionalPalo Alto FirewallsVPNFirewallCisco ASANetwork Security - $75 hourly
- 0.0/5
- (0 jobs)
I am a hands-on Cyber Risk Specialist and IT Security Engineer with a background in computer science, regulatory compliance, software development, operations, decision-making, probability, and risk. I have held both technical and leadership roles across several industries (banking, advisory, academia, e-commerce) and would like to advise or work on a budding cyber risk project or related initiative to champion, drive, build and maintain a state-of-the-art information security and risk program. I attended a top engineering university and majored in CS and Telecommunications. My 1st job was as a security researcher (antivirus and vulnerability exploits). I have hands-on programming and IT operations experience with hundreds of open-source and commercial cyber security tools: SIEMs, IDS, Firewalls, Proxies, Packet Capturers, and Disassemblers for kernel-level malware code debugging. I understand how schools teach cyber and how companies govern it (and spend $$$$)... I have lectured at Pace University and I advise professionally on risk management, how to adopt regulatory and international security and privacy frameworks (NIST 800-53, ISO 27001, COBIT 5.0, CCPA, OWASP, CIS Top 20), and how to design, architect, document, build, implement, manage, maintain, migrate and decommission IT cyber security controls in a modern organization facing unknown threats, attacks, risks and impacts. There are many antifragile risk engineering discussions and decisions that individuals and organizations should foster and make in order to ensure the protection of customer and restricted company data in next-generation IT platforms. My current research is in Non-Repudiation, Identity vs. Data Security, and Models of Culpability for Complex Artificial Intelligence Systems. I have a sense of humor, can speak Spanish, and write incredibly well.Certified Information Systems Security Professional (CISSP)
Artificial IntelligenceSecurity EngineeringCertified Information Systems Security ProfessionalEthical HackingInternet SecurityInformation SecurityCybersecurity ManagementApplication SecurityVulnerability Assessment - $90 hourly
- 0.0/5
- (0 jobs)
🔐 OVERVIEW Need a cybersecurity expert who can secure your cloud, slash compliance timelines, and automate controls across AWS, Azure, GCP, and OCI? I’m Olamide Williams, a U.S.-based Cloud Security Architect & vCISO with 15+ years of experience helping healthcare, federal, fintech, and SaaS organizations build compliance-ready, Zero Trust-aligned, and AI-secure cloud environments. 👨🏾💼 vCISO SERVICES As a virtual Chief Information Security Officer, I provide executive-level guidance, security program leadership, and continuous governance support: 🧭 Executive Cybersecurity Leadership • 🛡 Developed enterprise cloud security strategies for NIH, U.S. Census, and Optum Health • 📊 Designed security metrics dashboards, aligning KPIs to board-level reporting • 🤝 Acted as liaison to 3PAOs, regulators, and agency AOs during audits and authorizations 🧱 Governance, Risk & Compliance (GRC) Oversight • 🧾 Authored 40+ SSPs, POA&Ms, and CRC mappings across FedRAMP/NIST/ISO projects • 🔄 Led risk assessments and ISCM reviews with automated Power BI dashboards • 📁 Delivered 3PAO-ready packages and audit responses reducing findings by 35% 🔐 Security Program Development & Automation • 🔧 Built GRC automation pipelines with Power Automate, Terraform, and JIRA • 🧬 Embedded compliance checks into CI/CD pipelines, cutting risk by 70% • 📈 Reduced ATO and audit prep timelines by 25% through proactive program design 🚀 SPECIALIZED MICRO-NICHE SERVICES 🔒 ① FedRAMP & NIST Compliance Automation • 📄 Delivered 40+ SSPs & POA&Ms for NIH, Google, KPMG, and SaaS vendors • ⏱ Reduced ATO timelines by 25% via automated evidence packaging • 🛠 Built Terraform-driven CI/CD pipelines to enforce 70+ NIST 800-53 Rev 5 controls 🧱 ② Zero Trust Architecture Across Clouds • 🌐 Designed ZTNA across AWS, Azure, GCP, and OCI using Entra ID, Palo Alto, and F5 • 🔐 Deployed microsegmentation reducing lateral movement risk by 80% • 🧩 Integrated M365, Entra ID, and Prisma Access for 100% policy coverage 🛰 ③ Multi-Cloud CSPM & CNAPP Tuning • 🛡 Hardened 200+ workloads in AKS, EKS, and GKE using Prisma, Defender, and AWS Config • 📉 Achieved 72% reduction in PaaS misconfigs across 3 clouds • 📊 Integrated CNAPP dashboards with Power BI for exec-level visibility 🔐 ④ Federated IAM & Key Management • 🧾 Designed identity federation across Azure AD, AWS IAM, and GCP IAM • 🗝 Hardened Azure Key Vault, AWS KMS, GCP KMS with BYOK + rotation policies • 🚪 Reduced identity attack surface by 60% across 10,000+ accounts 📡 ⑤ SIEM & SOAR Automation Across Platforms • 🧠 Integrated Sentinel, Splunk, and Chronicle across 3 clouds & 5 orgs • ⚡ Cut MTTD/MTTR from 8 to 2 hours using playbooks + automation • 🎯 Created 300+ KQL/SPL rules mapped to MITRE ATT&CK 🔧 ⑥ DevSecOps for Cloud-Native & SaaS Apps • 🧪 Built secure CI/CD pipelines in Azure DevOps & GitHub with IaC scanning • 🛡 Automated SAST/DAST using Veracode, SonarQube, OWASP checks • 🧬 Enforced policy-as-code—cutting vulnerabilities by 70% 💰 ⑦ Multi-Cloud Risk & Cost Optimization • 📈 Designed Power BI dashboards showing cost-to-risk across services • 💸 Uncovered $500K+ in annual overspend from unused/misconfigured assets • 🤖 Implemented automated cleanup tied to compliance drift triggers 📈 SELECT PROJECTS & METRICS 🏥 California DHCS via KPMG • Hardened AWS infra for PHM data exchange; remediated 200+ HIPAA/NIST findings • Embedded security-by-design into 5 agile modules, reducing release risk by 40% 🏢 Optum Health (UHG) • Secured 150+ Azure VNETs with Palo Alto NGFWs and auto policy enforcement • Cut IR time by 60% and container CVEs by 67% in AKS 🌐 Google Sovereign Cloud • Onboarded 100+ ISV partners with container hardening + NIST/FedRAMP validation • Integrated Chronicle + Splunk to detect 50+ MITRE TTPs 🧬 NIH (USGov Cloud) • Operationalized FedRAMP Rev 5 controls across Azure and VMware; delivered 40+ CRC mappings • Improved audit readiness by 35% and reduced ATO prep by 25% 🛠 TOOLS & TECHNOLOGIES ☁️ Cloud: AWS, Azure, GCP, OCI 🔐 IAM: Entra ID, Okta, Ping, SailPoint, AWS IAM, GCP IAM 🛡 Security Tools: Sentinel, Prisma, Wiz, Defender, Splunk, XSOAR, Chronicle 📜 IaC: Terraform, Bicep, CloudFormation, GitHub Actions, Azure DevOps 🧾 Compliance: NIST 800-53 Rev 5, FedRAMP, ISO 27001, HIPAA, PCI-DSS 💻 Languages: PowerShell, Python, Bash, KQL, SPL 💬 LET’S WORK TOGETHER Whether you're seeking a vCISO for long-term guidance, a FedRAMP-savvy architect, or a compliance automation lead, I deliver enterprise-ready solutions with measurable results. 📨 Send me a message and let’s secure your stack.Certified Information Systems Security Professional (CISSP)
Web Application SecurityCertified Information Systems Security ProfessionalInformation Security GovernanceInfrastructure ManagementSecurity Operation CenterSecurity InfrastructureInfrastructure as CodeCloud SecurityDevOpsNetwork Security - $120 hourly
- 0.0/5
- (0 jobs)
Senior solutions-oriented, Cyber Security/Risk Specialist with deep experience delivering multiple concurrent projects to develop and implement information technology that exceed all client expectations. High expertise in directing risk management initiatives while establishing, implementing and enhancing key information security objectives. Support business proposals and new business initiatives with the proven ability to design and regulate critical security programs with in-depth operational supervision of incidents and emergency disaster recovery. Known for cross-functionally collaborating with diverse teams and communicating with stakeholders at all levels of a corporation. Detail-oriented self-starter with excellent oral and written communication, analytical, organizational and time management skills. Proven expertise in Technical Management and Systems Engineering roles in all aspects of the systems development lifecycle for multiple enterprise computing, communications, systems integration and complex ICS environments. Extensive academic qualifications include a Master of Science in Information Science Security and Assurance from Western Governors University and a Master of Business Administration in Technical Management from the University of Phoenix. Holds multiple industry recognized industry certifications. Leveraged strong network and deep industry experience to build relationships with key clients, currently supporting multiple Law Enforcement facilities, Maritime terminals, and other large commercial clients. Known for his expertise in multiple domains of INFOSEC including Cyber, Risk Management Framework (RMF), Certification and Accreditation, DIACAP, DoD 8500, DISA STIGS, Common Criteria, Vulnerability Assessment, and Technical Risk Reduction. Successfully developed, implemented, and sustained distributed high-performance computing environments using commercial off the shelf and disruptive technologies supporting many different customer requirements, including modeling and simulation, real-time analytics, and transport of sensitive high-value data. Conduct and evaluate Cyber assessments, stress testing, and work with multiple partners to develop solutions that meet Department of Defense (DoD) 8500/Risk Management Framework (RMF) standards. Work with clients to engineer and implement solutions for infrastructure design, implementation, and sustainment of distributed control and data acquisition networks supporting IP Video, VOIP, access control, instrumentation and SCADA. Leverage strong network and deep industry experience to build relationships with key clients, currently supporting multiple Law Enforcement facilities, Maritime terminals, and other commercial clients. Develop and execute complex Cyber Penetration Testing events utilizing Kali Linux, Metasploit, and Software Defined Radio on traditional IT and complex OT (operational technology) networks, embedded systems, and control systems. Utilize multiple methodologies including Penetration Testing Execution Standard (PTES), Open Source Security Testing Methodology Manual (OSSTMM), OWASP, FedRAMP, and NIST 800. Plan and conduct Technical Security and Countermeasure (TSCM) sweeps of highly sensitive areas using Research Electronics International Oscor Green Spectrum Analyzer, Non-Linear Junction Detector, Broadband detectors, Software Defined Radio (SDR), and other equipment to identify illicit eavesdropping signals, analyze radio frequency (RF) emissions, and investigate misuse of the RF spectrum. Certified Information Systems Security Professional (CISSP) Certified Information Systems Security Architecture Professional (CISSP-ISSAP) Certified Cyber Forensics Professional (CCFP) Computer Hacking Forensic Investigator (CHFI) Certified Ethical Hacker (CEH) Computer Hacking Forensic Investigator (CHFI) Microsoft Certified Systems Engineer (MCSE) Cisco Certified Network Associate (CCNA) Cisco Certified Network Associate – Wireless (CCNA-Wireless) Cisco Certified Design Associate (CCDA) Research Electronics Incorporated – Technical Security and Countermeasures Ham Radio – FCC Extra Class License United States Navy Certification Authority – Fully Qualified Navy Validator I0683Certified Information Systems Security Professional (CISSP)
Embedded SystemCertified Information Systems Security ProfessionalSecurity Operation CenterTroubleshootingDisaster RecoverySecurity EngineeringSecurity AnalysisInformation Security AuditInformation SecurityKali Linux Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.