Hire the best CyberARK professionals
Check out CyberARK professionals with the skills you need for your next job.
- $60 hourly
- 4.8/5
- (155 jobs)
SSO expert having Identity and Access Management expertise of 16+ years in SAML / OpenId Connect / Oauth 2.0 / JWT / FIDO2/ Webauthn / 2FA etc. I have experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, Okta, OneLogin, Auth0, Spring Security SAML, Keycloak, ForgeRock, IBM Security Access Manager etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, Ruby, Go, etc.) or framework (Node.js, Meteor, Angular, Django, CodeIgniter, Concrete5, Yii, Symfony, Laravel, WordPress etc.). I have a strong track record of helping clients succeed with: -Adding SAML authentication to custom applications -Troubleshooting SAML Identity Provider and Service Provider errors -Deploying SAML Identity Providers (IdPs) and Service Providers (SPs) -Finding the right architecture for layering SSO technologies (AD, LDAP, OAuth, OpenID Connect, CAS, Kerberos, JWT, multi-factor, etc.) -Providing training, documentation and third-party support -Deployment and architectures of LDAP solutions (OpenDJ, OpenLDAP, IBM Security Directory Server etc). Architectures with high availablity and custom schema. LDAP proxy / bridge solutions deployment. -Architectures and solution Implementation of Identity and Access governance solutions (Sailpoint IIQ , IBM Security Identity Manager, IBM Security directory integrator ). -Role based access control implementation in Identity management solutions. -Risk based access control implementation with Access Management solutions. Devops and cloud security - - Dockerize applications and platforms. - Deployment of applications on AWS EKS platform. - Deployment of applications on GCP GKE platform. Complex Integrations - - Rest API development and security with Oauth / JWT tokens. - API gateway integrations of API. SSO and Identity Access Management Integration Expert | Technical Project ManagerCyberARKSolution Architecture ConsultationOKTAVulnerability AssessmentApplication SecuritySingle Sign-OnAPI IntegrationOAuthCybersecurity ManagementSecurity AnalysisInformation Security ConsultationAuth0LDAPUser Identity ManagementAmazon Cognito - $85 hourly
- 4.9/5
- (11 jobs)
I truly enjoy building software. Over the past 15 years, I've had the privilege of building many challenging and interesting software solutions. I have worked within large software organizations but also in small teams. In recent years I've often worked independently, either helping organizations kickstart new projects or building entire systems myself. Some of the things I've built: - Web application back-ends (Node.js, Python, .Net). - Responsive, accessible and progressive web front-ends (React, TypeScript, JavaScript, CSS, HTML). - Secure and scalable identity solutions (OAuth, OpenId Connect, SAML, Auth0, Ping Identity). - Interactive data visualization systems (SVG). - Programs that integrate cool hardware such as infrared sensors, solar panels, touchscreens, wireless GPS units, NFC card readers and more. - Deployment architectures that autoscale in the cloud (AWS, Docker, GitHub). I believe that: - Quality depends on concise and structured communication. - The best way to learn is to produce working software (iterative development). - Staying focused only on what's most important is paramount to success.CyberARKTypeScriptSVGOAuth.NET CoreWeb ApplicationNode.jsReactDockerAuth0Relational DatabaseNoSQL DatabaseCSSAmazon Web ServicesPythonJavaScript - $70 hourly
- 5.0/5
- (29 jobs)
Experienced Entrepreneur with a demonstrated history of working in the software industry since 25+ years. Skilled in C++, Win32, MFC, Visual Studio, C#, WPF, .Net, WSL, Linux utilities/services, AWS, Docker, Blockchain, MQTT, Node.js, React.js, Next.js, Node.js, C#, Requirements Analysis, PHP, Python, C++, and Agile Methodologies. I carry huge experience in NLP, vision software, OCR/OCV, openCV, CAD/CAM, Smart Meter, DLMS/COSEM, Smart Meter Control Software, GuruX, Smart Meter Calibration, Automation, Telemetry. No matter what you are after, a proof of concept, maybe an MVP, architecture or a full fledged app, I'd be eager to help you realize your idea and accomplish your goals.CyberARKImage ProcessingComputer VisionOAuthGoogle Apps ScriptAuth0Machine LearningDesktop ApplicationOpenCVReactNode.jsReact Native.NET FrameworkPythonJavaC++ - $30 hourly
- 5.0/5
- (2 jobs)
Hello, my name is Priyanka. I have 14+ years of experience with web-based application development. I have worked on various technologies and have a passion to learn newer technologies. I work hard and focus on providing great customer service and quality work. I make sure to meet my clients requirement and deliver it on time. Also, I believe dedication and open communication is key to good development.CyberARKC++React NativeNode.jsSpring BootMongoDBPostgreSQLPHPMachine LearningPythonReactDjangoJava - $80 hourly
- 5.0/5
- (23 jobs)
Hello! I'm Dhiraj Kadam, a seasoned developer with over a decade of experience in creating robust, scalable, and cutting-edge solutions. My expertise spans across cloud computing, full-stack development, blockchain technology, and artificial intelligence, making me a versatile professional ready to tackle complex challenges. Core Skills: Cloud Computing: Proficient in AWS and DigitalOcean, I can architect, deploy, and manage scalable cloud infrastructures, ensuring optimal performance and security. Frontend Development: Mastering React.js, I create intuitive and responsive user interfaces that provide seamless experiences across devices. Backend Development: With Node.js and Python as my go-to tools, I build powerful and efficient server-side applications, ensuring smooth data flow and robust backend operations. Blockchain Development: Experienced in Solidity, I design and deploy secure smart contracts, dApps, and blockchain solutions, with a deep understanding of DeFi protocols and NFT standards. AI & Machine Learning: Passionate about AI, I develop intelligent systems that leverage machine learning algorithms to solve real-world problems, from predictive analytics to natural language processing. Whether you need a cloud infrastructure setup, a dynamic web application, or a blockchain-based solution, I am here to bring your vision to life. My commitment to best practices and continuous learning ensures that I stay at the forefront of technology, delivering results that exceed expectations. Let's collaborate and create something extraordinary!CyberARKAPI DevelopmentSolidityAmazon Web ServicesAPI IntegrationServerless ComputingPython ScriptAWS LambdaMongoDBMySQLCI/CDNestJSNode.jsReactDatabase Design - $40 hourly
- 4.1/5
- (7 jobs)
Dharmendra has more than 12 years of experience in Identity and Access management domain. He has experience in all stages of an IAM project from proposal submission to design and implement a project. Implemented IAM solutions like Sailpoint IdentityIQ(IIQ), IdentityNow(IDN), NetIQ, RSA, Entra ID and Okta SailPoint experience - He is a SailPoint Certified professional. He has worked on integration of Identity governance tools with PAM solutions like Cyberark and HashiCorp, Ticketing tools like ServiceNow. He specializes in architect, design and development of complex solution on SailPoint IIQ. He has played the roles of project manager, business analyst, architect and developer depending on the project that he works on. He has worked on 6.4 to 8.2 version of SailPoint IIQ. He also has experience on utilities provided by SailPoint IIQ like accelerator pack, SSF, deployment accelerator NetIQ experience - Built workflows and created customized connector for database and AD endpoints Built a solution to manage access to lower environment end points by creating custom form, workflows and connector configuration SailPoint IdentityNow - Setting up IDN tenant Password manager Application onboarding - Workday, AD, JDBC, Webservice (REST + SOAP) Non Employee Onboarding Modules Custom Transforms and Rules Entra ID - Integration of IGA systems with Azure AD Enabling SSO and MFA for cloud applications Configuring federated authentication B2B user integration with Entra Okta - Integrating Okta with AD and Azure AD Integrating applications with Okta to enable SSO MFA configuration and enforcement Certifications - SailPoint IIQ Engineering Certification SCRUM master(CSM)CyberARKDatabaseJavaJ2EESailPoint Technologies IdentityIQMicrosoft Active Directory - $50 hourly
- 5.0/5
- (23 jobs)
SAML and SSO integration expert, Worked on Single Sign-on Integration tool, Identity and Access Management, and SIEM Tool ,having experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, ADFS, Azure, Okta, Cognito, OneLogin, Auth0, JumpCloud, SalesForce, Spring Security SAML, Ping, ComponentSpace, FIM, SiteMinder, SAP, OAM, Keycloak, ForgeRock, etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, etc.).CyberARKGoogle Workspace AdministrationUser Identity ManagementWindows AdministrationMicrosoft AzureOKTAOAuthMicrosoft Active DirectoryInformation SecurityLDAPAuth0Security Assertion Markup LanguageSingle Sign-OnActive Directory Federation Services - $20 hourly
- 5.0/5
- (26 jobs)
💯 100% Job Success Score 💪 10+ years of experience 😄 25+ happy clients I am a professional web & mobile application developer. I have been working in this profession for more than 10 years. I have been working in HTML5, CSS3, Javascript, ReactJs, React Native, OpenAI, ChatGPT, Assistant GPT, Redux, FCM, FabricatorJs, Firebase, PHP, Wordpress, Magento, CI, YII, Restful API, NodeJS, ExpressJs, PostgreSQL, MySQL, MongoDB, Jira, Git, BitBucket, GitLab, GitHub, CommitCode and many more... I have specialisation in ReactJs and ReactNative. I can provide following services . Web Application Development . Mobile(iOS and Android) Applications Development . Single page application . Creative(Sketch, PSD, Figma, PDF) to HTML conversion. Payment Gateway Integration. SSO/OAuth2.0 integration. Landing Page . Static & Dynamic websites . Magento Ecommerce (Front-end development) . Restful Api's . Email Templates . Chatbot (Freshchat) I’m looking for new projects and working to build long-term relationships with clients. Please feel free to contact me.CyberARKUser Profile CreationFirebaseMobile App DevelopmentReact NativeOpenAI APIAPI DevelopmentNode.jsMongoDBWordPressBootstrapReduxReactJavaScriptCSS 3HTML5 - $45 hourly
- 5.0/5
- (6 jobs)
I have implemented Security and IT solutions to several clients in the Philippines. Solutions like Splunk (core, ITSI, ES, Phantom), CyberArk PAS, ForcePoint web security, Fortify SCA, etcCyberARKSplunkNetwork AdministrationBash ProgrammingDatabaseLinuxWeb DevelopmentWeb Proxy - $50 hourly
- 5.0/5
- (81 jobs)
EXPERTISE: 1. All Email Migration (Any Platform to Any Platform) ✅️ 2. Active Directory Administration / Azure Active Directory Migration ✅️ 3. DNS Record Issues ✅️ 4. Email Deliveribility Issues ✅️ 5. Enterprise Endpoint Security ✅️ 6. Microsoft Intune ✅️ 7. Tenant to Tenant Migration ✅️ 8. Web Hosting Migration (AWS/Cloudflare/GoDaddy) ✅️ 9. Web Hosting Troubleshooting ✅️CyberARKMicrosoft IntuneMicrosoft Azure AdministrationMicrosoft Endpoint ManagerEmail Platform Account SetupEmail DeliverabilityEmail SupportGoDaddyMigrationGoogle WorkspaceEnd User Technical SupportTechnical SupportComputerData MigrationComputing & NetworkingBackup - $30 hourly
- 4.7/5
- (30 jobs)
Dynamic and enthusiastic Information Security Analyst with CISSP certification and five years of experience safeguarding organizations against cyber threats. Proficient in implementing robust security measures to protect computer systems, networks, and data. Skilled at analyzing security risks and developing effective solutions. Deep knowledge of industry best practices and regulatory requirements. Collaborative team player with a proven track record of working across departments to achieve security goals and mitigate risks. I have managed SOC ensuring the vigilant monitoring 27/7.I have real time experience of CTF and I have done multiple rooms in TryHackMe. I have done security and risk assessments, TPRA, SLA, OLA and RFPs for multiple projects. My Core Job Responsibilities are the following: • Manage Incident response with all required tools and defined roles • Administration of SIEM solution and other SOC tools • Perform threat management, threat modelling, identify threat vectors and develop use cases for security monitoring • Mentor and guide SOC team and perform knowledge transfer to other teams as required • Integration of standard and non-standard logs in SIEM • Evaluate existing SIEM rules, filters, events, and use cases and adapt to meet the business requirements • Build and manage playbooks in order to document how to respond, set severity, and how to escalate specific threat types • Creation of reports, dashboards, metrics for SOC operations and presentation to Head ISD and ITD • Co-ordination with stakeholders, build and maintain positive working relationships with them • Coordinate, work with and liaise with business stakeholders, technical resources, and third-party vendors • Provide oversight of analysis activities and direct the activities of the team to ensure the effective resolution • Contribute to the development of Attack Analysis SOPs to ensure that they stay current and effective. • Correlate network activity across networks to identify trends of unauthorized use • Review alerts and data from sensors and documents formal, technical incident reports • Research emerging threats and vulnerabilities to aid in the identification of network incidents • Deliver assessments to senior leadership and recommend course of action to be undertaken. • Manage and improve information security documentation as required. • Help analyze findings in investigative matters, and develop fact-based reports of events over period My Core Skills are: - Security Defender - Security Auditing - Drafting Security Policy - NIST Policies - GDPR and PCI-DSS Compliance - SOC Manuals - Playbooks - Use Cases in SIEM - Tools User manuals - Cyber Laws - Digital Forensics - GRC Tools: -Qradar -Splunk -Kaspersky -TrendMicro -Microsoft Defender - Tripwire - Qualys Please contact me for quality services in cyber security. Thanks Regards Muhammad Arsalan Qadir-CISSP -CyberARKInformation Security AwarenessCyber Threat IntelligenceCybersecurity MonitoringPCI DSSGovernance, Risk Management & ComplianceCloud SecurityComputer NetworkSecurity Operation CenterNIST Cybersecurity FrameworkSplunkSystem SecurityDigital ForensicsIncident Response PlanPenetration TestingInformation Security - $75 hourly
- 5.0/5
- (1 job)
I am a Microsoft certified systems administrator with over two decades of experience, specializing in offering both technical and customer support to a diverse range of businesses, from small enterprises to large corporations. I possess extensive expertise in a wide array of IT domains, including proficiency in: ✅ Operating Systems: Mac, Linux, and Windows XP,7,8,10,11 ✅ Server Management: Windows Servers, Domain Controllers, DNS, DHCP, DFS, Active Directory, ADFS, CA Servers, WSUS, SCCM, WDS ✅ Cloud Solutions: Office 365, OKTA, AWS, Azure ✅ Virtualization: VMware, vCenter, Hyper-V, Oracle Virtual box, VMware Workstation & Fusion, Parallels ✅ Data Resilience: Backup, Disaster Recovery, and Business Continuity ✅ IT Tools: Ticketing systems (Zendesk, ServiceNow, Jira) Asset management and monitoring systems ✅ Infrastructure: Server room and data center design and implementation, systems maintenance and administration, and IT strategic planning ✅ Communication: Technical writing and creating FAQs ✅ Cybersecurity: Assessment, monitoring and hardening, (Antivirus, DLP and etc. Furthermore, I possess a profound understanding and hands-on experience in: ✅ Networking: Both WAN and LAN ✅ Network Equipment: Cisco and Meraki switches, routers, and firewalls ✅ Wireless Technology: Wireless Access Points ✅ Security Appliances: Palo Alto Networks, FortiGate, SonicWall ✅ VPN Systems ✅ Wireshark and monitoring systems My primary focus typically involves managing high-level IT tasks and projects, encompassing activities like consulting, designing, installation, and troubleshooting onsite and remotely. Nevertheless, I am more than willing to assume responsibility for your everyday IT requirements, which may include updates, patching, maintenance, installation, and troubleshooting across Mac, Windows, in-house, datacenter, and cloud systems. I am a customer service-oriented individual with a warm and friendly personality. I am dedicated to not only saving your time and money but also committed to providing top-quality service to all my customers. So, I make every effort to meet your requirements and ensure your satisfaction. I go above and beyond to fulfill your needs, guarantee your contentment, and bring a smile to your face. Thanks, IssacCyberARKWindows XPWindows 10 AdministrationWindows ServerNetwork ArchitectureNetwork Access ControlOKTAOffice 365Server & Virtualization SoftwareLinuxPenetration TestingCybersecurity ManagementCybersecurity MonitoringVMware AdministrationSystem Administration - $30 hourly
- 5.0/5
- (14 jobs)
✔Top Rated✔5 years of industry expertise ✔100% Job Success Score ✔Reporting with mitigation ✔100s of pentest experience ✔Developer collaboration ✔Equipped with industry leading tools ✔Software Development Background What I Can Do For You: ---------------------------- → Deep vulnerability assessment and penetration testing. → Generate high-quality visual reports with graphical stats on your security status. → Easy-to-follow remediation recommendations for vulnerabilities. → Secure your application from breaches, prioritizing Critical and High issues. → Identify attack chains before or after a security breach. → Manual plus automated approach to hunt down every vulnerability that exists. → Reporting with Real-life attack scenarios with impact and CVSS scoring. → Test for the latest CVEs relevant to your technology stack. → Secure code review to identify and fix security loopholes. → Full Black Box, Grey Box, and White Box Penetration tests. → Provide PCI-DSS, GDPR, SOC 2, ISO 27001, NIST, HIPAA compliant pentest reports. → Collaborate with your developers to help them implement fixes. → Free re-test after fixes to ensure no bypasses. Vulnerabilities My Test Covers: ------------------------------------- My manual testing checks(200+) draw from OWASP, PTES, OSSTMM, and 5 years of hands-on penetration testing and vulnerability assessment experience. It covers: → Injection flaws (SQLi, XXE, XSS, RCE, CSRF, etc.) → Sensitive information leaks → Broken authentication and session management → SSRF vulnerabilities → File upload vulnerabilities → Security misconfigurations → Broken access control → Insecure deserialization → API vulnerabilities (BOLA, key exposure, injections, SSRF) → Insecure communications → Race conditions → Client-side vulnerabilities → Business logic flaws → Security bypass (WAF evasion,403 Bypass, etc.) Tools I Use Most: --------------------- OS: Kali Linux Toolkit: Nuclei, Nmap, Nessus, bloodhound, OWASP Amass, PowerSploit, Nikto, gobuster, FFUF, sqlmap, Mimikatz, commix, SharpHound, Metasploit, subfinder, subdomainer, xsser, HTTPX, GAU, httprobe, eyewitness, dalfox, wafw00f, socat, wpscan, Nikto and custom wordlists for dictionary brute forcing and fuzzing. Sometimes I write my scripts with Bash, and Python according to my needs. About me: ------------- With 10 years of combined experience, including involvement in hacktivist groups, I bring 5 years of White Hat Hacker expertise as a fintech penetration test lead and founding member of a Security Operation Center (SOC). My background spans Bug Bounty Hall Of Fames, Laravel-PHP development, and proficiency in offensive and defensive security strategies, complemented by participating in Capture The Flag (CTF) competitions. I have worked with organizations like- HSBC Bank, Metlife, Old Mutual, Bangladesh Bank projects, Bangladesh Govt., SSLCOMMERZ, etc. What My Clients are saying: 1. "Awesome experience. It was a pleasure working with Iftekharul." ⭐⭐⭐⭐⭐ - Saurabh 2. "As a Penetration Tester he truly stood out"⭐⭐⭐⭐⭐ - Komol Given my extensive experience in penetration testing and application security, I can surely add significant value to your organization by identifying and mitigating vulnerabilities and enhancing your overall security posture. I look forward to the opportunity to work with you! Shoot me a message today to be secured. Take a look at some of my work below 👇CyberARKWeb Application SecurityApplication SecuritySecurity Assessment & TestingWeb App Penetration TestingBlack Box TestingNetwork Penetration TestingWebsite SecuritySecurity TestingKali LinuxNetwork SecurityVulnerability AssessmentInformation SecuritySecurity AnalysisPenetration TestingEthical Hacking - $40 hourly
- 4.8/5
- (7 jobs)
Hi Everyone, As success is best when it’s shared, let's work together and achieve our goals. Since last 8 years, I have been working on Cyber Security and DevSecOps projects along with penetration testing (applications, IoT, and cloud), system administration, and beyond. Let's have a look to what I can offer you: ✅ Web application security ✅ API security ✅ Network infrastructure security ✅ Cloud infrastructure security ✅ Information security auditing Compliance is a cornerstone of my practice, and I'm well-versed to maintain the standards for: ✔ OWASP top 10 Vulnerabilities ✔ HIPAA ✔ ISO 27001 ✔ NIST ✔ SOC2 ✔ GDPR ✔ CISSP Conduction of both automated and manual Vulnerability Assessment and Penetration Testing (VA&PT) and much more including: ✅ Web applications/websites ✅ Server configurations ✅ Cloud infrastructure I specialize in network and cloud security measures, such as: ✅ DDoS prevention ✅ Web firewall configuration ✅ Network firewall configuration ✅ Amazon Web Services (AWS) 🌐 ✅ Cloudflare integration ✅ Linux server management (Redhat, CentOS, etc.) ✅ Proxy server configuration Additionally, I offer: ✅ Source code vulnerability checks utilizing tools like Snyk, Sonarqube Enterprise, Synopsys Coverity/Seeker ✅ CMS security/recovery expertise (WordPress, Magento, Joomla) ✅ Hacked system recovery services ✅ Digital forensic/log analysis for various platforms (Android, iOS, Windows, Linux, macOS) 🕵️♂️ ✅ IoT security/penetration testing ✅ Ransomware removal from systems ✅ Cybersecurity training sessions 🎓 ✅ Malware/virus removal from systems ✅ Mobile Device Management (MDM) solutions 📱 ✅ SIEM integration ✅ IT consultancy services 💼 ✅ Information security audits #Cybersecurity specialist, #Penetration testing, #System administration, #Web application security, #Cloud security, #Compliance, #Vulnerability Assessment, #DevSecOps, #Network security, #DDoS prevention, #AWS, #HIPAA, #ISO 27001, #NIST, #SOC2, #GDPR, #CISSP, #Source code vulnerability, #CMS security, #Digital forensic, #IoT security, #Ransomware removal, #Malware removal, #SIEM integration, #IT consultancy, I#nformation security audit.CyberARKInformation SecurityProblem SolvingDevOpsAmazonArchitectureAmazon S3Amazon EC2Architectural DesignPrivate CloudSolution ArchitectureCloud Computing - $20 hourly
- 4.5/5
- (9 jobs)
To be a part of an organization, which identifies my strength and abilities, give an extension to my skills and take pleasure in the same, as a Network Engineer, Wireless engineer, Network Security Engineer, Cisco Meraki Engineer and SD-WAN Engineer. A qualified and experienced professional with around 10 years of experience in the IT industry. Full Networking, wireless, security, and SD-WAN versatile and adaptable professional with over ten years of experience in the private sector at a technical level, working expertise in Routers, Switches, Cisco Nexus Switch, Cisco Meraki devices, Cisco Wireless, Cisco Prime, Cisco WAAS, Aruba Wireless, Aruba ClearPass (CPPM), Aruba Central, Aruba Gateway, Paloalto Firewall, Panorama, PaloAlto Prisma SD-WAN, Fortinet, FortiGate, FortiSwitch, FortiAP, FortiExtender, FortiManager, FortiAnalyzer, FortiCloud, F5 BIG IP, Silver peak ( SD-WAN ), Net Cloud, Credle Point, VMware Cloud, OpsRamp, lucid, MS Visio and ServiceNow, etc. along with multiple networks related project. The conscientious, motivated, trustworthy, loyal, and flexible person with a positive attitude and willingness to learn is quick at picking up. Confident communicator and comfortable taking on new challenges to maintaining high-quality professional standards; adaptive to change and capable of working independently and as part of a team. ♥ ROUTING IP Addressing & Subnetting, RIP, OSPF, EIGRP, eBGP, iBGP, VRF, Static Routing, Dynamic Routing, QoS, RIPv2, RIB, Cisco Router, and Cisco Meraki Appliance, Cisco WAAS. ♥ SWITCHING VLANs, Port SECURITY, Trunk (802.1q), EtherChannel, VTP, STP, MST, RSTP, PVST, Inter VLAN Routing, CEF, HSRP, VRRP, GLBP, POE, SPAN, MAC Table, StackWise, VSS, VPC, VSLP, Flex-Link, Cat switches, Nexus Switches and Cisco Meraki Switches Upgrading IOS Basic& Advanced Switching Troubleshoot. ♥ ♥ SERVICES - DHCP, DNS, MTU, ICMP, NTP, SNMP, SYSLOG, NETFLOW, VTY, SSH/TELNET, CDP, LLDP, WAN, ACL, NAT, PAT, IP SLA, OBJECT TRACKING, TCP/IP, TCP, UDP, ARP, GARP. ♥ ♥ SECURITY - Policy-based VPN and Route-based VPN, AAA, ACLs, Cisco ASA, FortiGate, Palo alto firewall, Sophos firewall, Sophos, Panorama, Aruba CPPM, Aruba Gateway, Cisco Meraki Firewall L2 and L3 Security, NAT, SD-WAN, IP Source Tracking, OpenVPN, pfsense firewall, Sophos firewall. ♥ WIRELESS Cisco Wireless LAN Controller (WLC), Cisco Prime, Cisco DNA, Cisco Meraki, Aruba Central, Aruba WLC, Aruba CPPM, WLAN, Cisco AP, Cisco Meraki AP, Aruba AP, Mist AP. • ♥ ♥ SYSTEM Windows, UBUNTU, Kali Linux, Windows Server, ESXI, VSWITCH, vCentre client. ♥ Windows Technologies Windows Installation, Troubleshooting, File System, User, and Group Management, Device Management, Disk Management, Backup and Restore, Software Administration, DNS, DHCP, DHCP Relay Agent, FTP, WDS, IIS Management, Remote Assistance, Net meeting, Telnet Services, VPN, File Server, User Profile, Print Server, Disk Quota, Group Policies. ♥ Network Tools ServiceNow, OpsRamp, Remedy, JIRA, ScienceLogic, SolarWinds. Professional Qualification CCIE Enterprise Infrastructure Cisco Meraki Solutions Specialist (ECMS) Managing Campus Networks with Aruba Central Cisco Meraki Network Associate (CMNA) Aruba Mobility Fundamentals Palo Alto Networks Certified Network Security Engineer (PCNSE) NSE 1/2/3 Network Security Associate z1COmMC6ZH Silver Peak Technical Sales Professional 78d81eb3-a79f-4701-a738-32e5c3df762e Silver Peak Sales eXpert-SDWAN 8079242e-54bf-4054-8c58-76e1d1473123 Silver Peak SDWAN Professional 2adf077d-7f05-423e-aa5e-66aa0ac1f03d ICSI | CNSS Certified Network Security Specialist 17463837 Cisco Certified Network Associate (CCNA) CSCO13096440 MTCNA - MikroTik Certified Network Associate MTCRE - MikroTik Certified Routing Engineer MTCWE - MikroTik Certified Wireless Engineer MTCTCE - MikroTik Certified Traffic Control Engineer MTCUME - MikroTik Certified User Management Engineer MTCINE - MikroTik Certified Inter-Networking Engineer MTCSE - MikroTik Certified Security Engineer MTCSWE - MikroTik Certified Switching Engineer MTCEWE - MikroTik Certified Enterprise Wireless Engineer Sophos Firewall pfsence Firewall openVPN Zabbix Solution ZabbixCyberARKSonicWallComputing & NetworkingEngineering & ArchitectureCisco RouterCiscoF5, Inc.Palo Alto FirewallsCisco Certified Network AssociateComputer NetworkFortinetNetwork SecurityNetwork AdministrationArubaNetwork EngineeringCisco Meraki - $30 hourly
- 5.0/5
- (1 job)
Hey i Am A Expert Of Cyber security. Now We all Based On Technology and Every Time we Use Technology.its Help Us And Save Our Time . But Sometimes it's Be Harmful for us. Someone hacks Our Technical instrument and Harm To Us. That's Why we need Cyber Security for Our protection. I will Help You in this Condition. I will Manage Your website system and all And Safe Your System From Hackers Thank YouCyberARKCybersecurity MonitoringCyber Threat IntelligenceCybersecurity ManagementSystem Security - $10 hourly
- 5.0/5
- (4 jobs)
As an experienced Cyber Security Analyst, I specialize in safeguarding the confidentiality, integrity, and availability of digital assets. With a profound grasp of industry-recognized cyber security standards and best practices, my expertise extends to cyber threat intelligence, forensic analysis, and deep web exploration. By leveraging tools such as Tor, Maltego, and Shodan, I identify and mitigate hidden cyber threats, crucial for fortifying your cyber security defenses and guiding your decision-making process. 🔍🛡️ As a proficient Ethical Hacker, I employ state-of-the-art methodologies and tools 💻🔒, including Kali Linux, Nessus, Metasploit, and Wireshark, to conduct comprehensive security evaluations. My approach to ISO 27001 Penetration Testing and assessments against the OWASP Top 10 Vulnerabilities ensures thorough identification of security weaknesses and the formulation of effective remediation strategies. With expertise in data forensics using EnCase and FTK, I offer insights that empower you to make strategic, data-informed decisions. 📊 I empower clients to strengthen their digital environments against cyber threats through the implementation of advanced security measures, including Firewalls, Intrusion Detection/Prevention Systems (IDS/IPS), and robust encryption protocols. My knowledge of CASA Tier 2 standards enhances the resilience of cyber security solutions. 🔒 Offering Specialized Services In: Comprehensive Incident Response Planning and Cyber Security Risk Analysis aligned with the OWASP Top 10 framework. Advanced Threat Modelling utilizing tools such as Microsoft Threat Modeling Tool and OWASP Threat Dragon, With comprehensive DREAD & STRIDE Analysis. Detailed Cyber Security Audits, leveraging industry-leading tools like Qualys and SolarWinds 🔒 Penetration Testing and Vulnerability Discovery, employing Burp Suite and OWASP ZAP for in-depth analysis 🔍🔒 Advanced Cyber Defense Mechanism Deployment, meeting CASA Tier 2 and ISO 27001 standards 🛡️ Strategic Cyber Security Enhancement Recommendations, tailored to the latest industry trends and standards 📋 Collaborating with me guarantees prompt responses, transparent communication, and a commitment to a 24-hour turnaround time. ⏱️ Let's elevate your cyber security together. Reach out to discuss how I can customize my services to meet your specific needs. 🤝 Thank you for considering my profile. 🙏CyberARKApplication SecurityWeb App Penetration TestingNetwork Penetration TestingWebsite SecurityCloud SecurityNIST Cybersecurity FrameworkInternet SecurityCybersecurity MonitoringSecurity Assessment & TestingDigital ForensicsPenetration TestingCybersecurity ManagementVulnerability AssessmentNetwork SecurityInformation Security - $25 hourly
- 4.9/5
- (8 jobs)
Hello! I want to tell You a little about my professional career growth. I have more then 18 years of experience in the field of IT. The last six years I have been working in a large company importing alcohol from different countries. To begin with, I want to emphasize that in this large company there are two big data centres where located servers (10+5) PBX server based Asterisk FreePBX, MAIL server by Kerio Connect, CRM server, Windows server 2008 R2 with domain and Active Directory with cluster, virtual server based PHP Virtualbox on Ubuntu. Also in this two data centres are located routers (Cisco, D’Link), switches (Cisco, D’Link), NAS servers (Synology) and etc. One of these two server rooms I fully implemented. I carefully selected servers from manufacturers HP Proliant and Dell PowerEdge. Using my experience as a network and system engineer I selected the optimal network equipment for this business based Cisco and D’Link. I have configured all the network equipment too (creating routes and vlans, implementig IPsec tunnels and VPN servers). I have configured two firewalls based D’Link DFL 1660 to secure network by different polices and rules. For this moment I can confidently say that I manage all the two data centers with a lot of servers and network equipment with different services and OS. Also under my personal control there are about 200 PCs. I want to emphasize that one of my huge projects during my career is the organization, implementation, full installation and support is VoIP telephony based on Asterisk FreePBX in 2017. In this direction, I am not shy to say that I took the organization out of the generation of analog telephony in the era of SIP telephony. I consider it a great achievement to convert analog numbers to a digital while preserving the number. In conclusion, I want to tell my future clients that I am deeply pleased with my work, I love working and earning and developing.CyberARKCisco MerakiZabbixGrafanaFreePBXMicrosoft Active DirectoryWindows ServerVMware vSphereFirewallNetwork EngineeringProxmox VEAsteriskVPNTech & IT - $20 hourly
- 5.0/5
- (11 jobs)
A virtual talent and a cybersecurity expert ★ with over 8+ years of experience. I provide security expertise to protect institutional assets and to protect individuals' privacy against cyber threats. Throughout my career, I evaluated the security posture and risk for startups, schools, non-profit entities, financial institutes, universities, and businesses. I also bring ROI and defend your systems and apps against cyber threats while factoring in dependable and resilient security controls. Specialized in Information security holding international certifications. Domain expertise on Microsoft Windows & Linux platforms and successfully managed multiple projects involving Planning, Development, Deployment, Implementation. I have extensive subject matter expertise in Infrastructure Technologies, ICT Business Analysis, IT Security, IT Infrastructure Planning (Server & Network Management), IT Services Management (ITSM) and IT Security ★ Vulnerability Assessments ★ System & Network Penetration Testing ★ Web Application Penetration Testing ★ General Cybersecurity Business and Tech Questions ★ Technical Writing and Security Research ★ Cybersecurity Awareness and Training ★ Email Security and Phishing Campaigns ★ Infosec Policy Writing ★ Security Metrics and Reporting ★ Security Strategy and Program Development ★ Application Security ★ Reporting I am eager to work with you to provide reliable, consistent, and High-Level solutions to address security issues and protect institute assets. Please get in touch with me, so we can discuss how we can work together to meet your Business Needs FULLY!CyberARKWeb App Penetration TestingSystem AdministrationNetwork Penetration TestingWeb ServerWebsite SecurityInternet SecurityDNSVirus RemovalWeb Application SecurityInformation SecurityPenetration TestingSystem SecuritySecurity Assessment & TestingNetwork Security - $14 hourly
- 5.0/5
- (21 jobs)
Focusing to deliver expected result as per client's requirement and want to make better long term relationship to work on bigger projects or challenges with more expectation of outcome within the time frame. I am focused on work ethics as an University graduate and having Canadian work experience. Great time management skills exceeding your expectation can be expected. I believe in profound communication so that nothing can be missed to deliver great result. Client can expect: ✔️ Work Dedication ✔️ Guarantied Completion of Project Within Time ✔️ Result Satisfaction ✔️ Accurate and Error Free Deliverable ✔️ Genuine Work ✔️ ResponsibleCyberARKMarket ResearchAdministrative SupportOnline Market ResearchVirtual AssistanceEnglishLead GenerationMicrosoft ExcelTypingMicrosoft WordData EntryMicrosoft Office - $20 hourly
- 5.0/5
- (4 jobs)
With over 32 years of hands-on experience in Information Security, I have successfully completed Penetration Testing and Vulnerability Assessments for more than 455 websites. I currently manage the Network Security of over 87 websites, with a focus on securing financial web and mobile applications (Android and iOS). My mission is to protect your sensitive data through Vulnerability Assessments and Application Security measures. I guarantee fast resolution, 100% satisfaction, and comprehensive Cybersecurity Management for all my clients. Trust me to be your one-stop shop for bulletproof security solutions. ➡️ 𝐏𝐄𝐍𝐄𝐓𝐑𝐀𝐓𝐈𝐎𝐍 𝐓𝐄𝐒𝐓𝐈𝐍𝐆 / 𝐕𝐔𝐋𝐍𝐄𝐑𝐀𝐁𝐈𝐋𝐈𝐓𝐘 𝐀𝐒𝐒𝐄𝐒𝐒𝐌𝐄𝐍𝐓 ➡️ I specialize in identifying and addressing security weaknesses, including: - SQL Injection - XSS (Cross-Site Scripting) - CSRF (Cross-Site Request Forgery) - LFI (Local File Inclusion) & RFI (Remote File Inclusion) - File Upload Vulnerabilities - OAuth 2.0 Authentication Vulnerabilities - HTTP Host Header Attacks - Business Logic Vulnerabilities - XML External Entity (XXE) Injection - Clickjacking (UI Redressing) - Cross-Origin Resource Sharing (CORS) Issues - Server-Side Request Forgery (SSRF) - HTTP Request Smuggling - Information Disclosure Vulnerabilities - Vulnerability Scanning & Management - Encryption and Firewall Configurations - Professional Information Security Consultation ➡️ 𝐇𝐎𝐖 𝐈 𝐄𝐌𝐏𝐎𝐖𝐄𝐑 𝐘𝐎𝐔𝐑 𝐒𝐔𝐂𝐂𝐄𝐒𝐒 ➡️ - I employ industry-leading tools such as Acunetix, BurpSuite, Metasploit, and Nessus to conduct comprehensive Vulnerability Assessments. - My detailed reports provide proof of vulnerabilities, risk analysis, and clear remediation advice. - I offer free retests to ensure ongoing security compliance and peace of mind. - My services help you meet industry standards and ensure your applications remain secure. Secure your applications today with my expert Penetration Testing, Security Assessment & Testing, and remediation services to achieve compliance and peace of mind!CyberARKRisk AssessmentKali LinuxContent WritingSecurity Assessment & TestingInformation Security ConsultationSecurity AnalysisApplication SecurityFirewallEncryptionCybersecurity ManagementEthical HackingVulnerability AssessmentNetwork SecurityInformation SecurityPenetration Testing - $15 hourly
- 5.0/5
- (3 jobs)
With a focus on IT monitoring and service desk support, my role at Fujitsu has honed my expertise in threat detection and information systems management. The responsibility of maintaining network integrity through vigilant monitoring and effective communication with stakeholders has been a cornerstone of my daily operations. Collaborating closely with teams, we ensure the seamless operation of IT services, which is critical in today's interconnected world. My prior experience as a Search Engine Evaluator has complemented my skills, allowing me to assess content accuracy and user experience with a discerning eye. This unique combination of roles underscores my ability to evaluate information critically and contribute to the advancement of technology infrastructure. At Fujitsu, we are committed to excellence in service and the continuous improvement of our systems to support our clients' needs.CyberARKTelecommunicationsMultitaskingCustomer ServicePortugueseAdministrative SupportData ManagementCustomer SupportIncident ManagementEnglish to Portuguese TranslationTicketing SystemCybersecurity MonitoringNetwork MonitoringAccuracy VerificationData Entry Want to browse more freelancers?
Sign up
How it works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a CyberARK Freelancer on Upwork?
You can hire a CyberARK Freelancer on Upwork in four simple steps:
- Create a job post tailored to your CyberARK Freelancer project scope. We’ll walk you through the process step by step.
- Browse top CyberARK Freelancer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top CyberARK Freelancer profiles and interview.
- Hire the right CyberARK Freelancer for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a CyberARK Freelancer?
Rates charged by CyberARK Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a CyberARK Freelancer on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance CyberARK Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream CyberARK Freelancer team you need to succeed.
Can I hire a CyberARK Freelancer within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive CyberARK Freelancer proposals within 24 hours of posting a job description.