Hire the best Cybersecurity Engineers

Check out Cybersecurity Engineers with the skills you need for your next job.
Clients rate Cybersecurity Engineers
Rating is 4.8 out of 5.
4.8/5
based on 1,046 client reviews
  • $99 hourly
    Let me help you unlock business opportunities and growth (💲millions) and sell to the likes of Disney, Pfizer, Uber, Siemens, Google, PWC, and so on. In the B2B space, you need Security, Privacy, and Compliance to sell to Enterprises! You focus on the business, and I'll take care of security, privacy, and compliance. Sleep well overnight because you know you are in good hands with the 🥇 Upwork virtual CISO, Security, Privacy, and Compliance consultant (1M+ earnings, 20+ years of enterprise experience)! CEO selling to Morgan Stanley: 🥂"The certification is enabling us to strike a deal with a Fortune 100 client." CEO selling to Philips: 🍾 "We have achieved the ISO 27001:2022 certification in record time." CEO selling to Pepsi:🎉 "Attila supported the growth of our business into Fortune 100 accounts." COO selling to Fannie Mae:👏 "We achieved a successful SOC 2 Type II attestation with no exception." 💭Securing your business, passing security assessments by clients or prospects, and achieving a security certification 𝙨𝙝𝙤𝙪𝙡𝙙 𝙣𝙤𝙩 𝙗𝙚 𝙖 𝙘𝙪𝙢𝙗𝙚𝙧𝙨𝙤𝙢𝙚 𝙖𝙣𝙙 𝙥𝙖𝙞𝙣𝙛𝙪𝙡 𝙚𝙭𝙚𝙧𝙘𝙞𝙨𝙚. 👌 All you need to do is ping me on Upwork, bring your problem, and after a 15-minute scoping call, I will provide you with a detailed Scope of Work. Specialized in business-to-business clients, providing 💸money-back guaranteed💸 ISO 27001, SOC 2, GDPR, HIPAA, PCI-DSS, CMMC, and FedRAMP projects and affordable virtual CISO (vCISO) services. ----> If you don’t get certified, all my fees will be refunded! <---- We are a good match if you are: 😢Busy developing your product or business and don’t have time and resources to be consumed by compliance efforts and endless meetings, halting your production for months 🤔Already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, Tugboat Logic, SecureFrame, Strike Graph, Audit Board, Trust Cloud, and so on) but 𝙙𝙤𝙣’𝙩 𝙠𝙣𝙤𝙬 𝙩𝙝𝙚 𝙣𝙚𝙭𝙩 𝙨𝙩𝙚𝙥 𝙤𝙧 𝙙𝙤𝙣’𝙩 𝙝𝙖𝙫𝙚 𝙩𝙞𝙢𝙚. 😢You quickly need quick security or privacy awareness training, cloud security posture assessment (AWS, GCP, Azure), endpoint security (MS 365 - Intune, Jumpcloud, Google Workspace), or penetration testing? 💪Want to decrease your sale cycle by being compliant and having all the answers for the security and privacy questionnaires? 💪Facing challenges with the security and privacy implications of AI products? 💪Want continuous access to a certified, creditable security, compliance, and privacy professional to manage your security framework? -> Continous virtual CISO (vCISO / fractional CISO) service with affordable weekly payments! 😟Need world-class, battle-proof security and privacy policies and you need it quickly? The kind of ones that have passed audits by KMPG, Deloitte, E&Y, Pepsi, Uber, Verizon, Philips, Facebook, and many others. 💪You want problems to be solved by the BEST Working with me, you will: ● Stop struggling with compliance requirements, security questionnaires, or useless document templates. ● Make the first steps on the journey to selling Enterprises ● Receive turnkey, Enterprise-grade security operation framework ensuring long-term effectiveness ● Work with an experienced senior team (architects, pen testers, endpoint engineers, developers, auditors, consultants) that regularly helps clients score Enterprise accounts. My stats are: ✅Saved tens of thousands $$$$$ for clients, advising them on the right security tools, solutions, and approach ✅#1 in Information Security and IT compliance categories (1M+ earned) ✅Supporting all time zones ✅Long-term engagements ✅Professional certifications (CISA, CISSP, ISO 27001 IA) About the Security Consultants team: QUALITY over QUANTITY is our ethos. Excellent quality, on time, always. We only take on projects when we can deliver outstanding results. The team consists of (only) senior experts in AWS, Azure, GCP DevOps, SecOps, Penetration testing, Google Workspace, MS 365 Intune, AppSec, auditing, and compliance. Professional Integrity: We are strongly committed to moral and ethical principles and values, such as honesty, honor, responsibility, trustworthiness, and objectivity. What we look for in a new client: ● Open-minded, relaxed attitude ● Values integrity & long-term relationships ● Willing to accept advice and guidance (security is a complex niche) Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, SIG Lite, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Process Unity Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS) CSAT, IRAP, PIPEDA, ISO 42001
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Information Security Consultation
    GDPR
    Security Management
    Insurance & Risk Management
    ISO 27001
    SOC 2
    AI Security
    HIPAA
    SOC 2 Report
    Cloud Security
    Information Security Audit
    Certified Information Systems Security Professional
    Information Security
    Cybersecurity Management
    Security Policies & Procedures Documentation
  • $130 hourly
    Sam Wertheim, a highly accomplished Cyber Security expert and Doctorate specializing in security governance and business technologies, is the esteemed founder and CEO of Wertheim Company, headquartered in the vibrant city of New York. Over the course of the past 15 years, I have consistently delivered exceptional Cyber Security solutions across diverse industries, including businesses, Banking, Government, the Department of Defense, FinTech, Blockchain, and Real Estate. At Wertheim Company, we pride ourselves on being a world-class developer of cutting-edge solutions, applications, and digital architectures. Our core focus lies in crafting bespoke, tailor-made solutions that precisely meet the unique requirements of our esteemed clients. We excel in driving digital transformations that revolutionize entire industries, propelling our clients to new heights of success. My expertise encompasses an extensive range of services, which include: -Conducting meticulous Vulnerability Assessment and Penetration Testing (VAPT) -Ensuring robust Risk and Compliance Management -Designing and implementing advanced Security Architectures -Enabling efficient Incident Response and Disaster Recovery -Establishing state-of-the-art Security Operations Centers (SOC) and deploying comprehensive -Security Information and Event Management (SIEM) services -Implementing effective Identity and Access Management (IAM) solutions -Safeguarding data through cutting-edge Data Protection and Encryption services -Assisting with Cloud Security and seamless migration to cloud platforms -Delivering powerful Threat Intelligence and Monitoring capabilities -Enhancing Cybersecurity awareness through tailored Training and Education programs I will thoroughly assess your systems, processes, and data by partnering with you to identify potential vulnerabilities and threats. Utilizing this valuable insight, I will develop a comprehensive risk management plan that meticulously addresses each identified risk, ensuring peace of mind and adopting a proactive approach to safeguarding your business. With our top-tier risk assessment services, you can confidently face any security challenge that may arise, fortifying your business and securing a prosperous future. Let Wertheim Company be your trusted partner in safeguarding your business and ensuring its ongoing security. Together, we can build an impregnable fortress that shields your invaluable assets and bolsters your resilience in the face of an ever-evolving threat landscape. Reach out to us today and take the first step towards a secure and prosperous future.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Security Management
    NIST SP 800-53
    Rust
    Cybersecurity Tool
    Compliance
    Project Management
    Python
    NIST Cybersecurity Framework
    Cybersecurity Monitoring
    Cloud Engineering
    Cyber Threat Intelligence
    Business
    Cybersecurity Management
  • $100 hourly
    I am Chartered IT Professional, Google Cybersecurity Career Certificate Graduate, OWASP Core Security Belt Certified, OWASP API Security Certified, Certified Information Systems Security Auditor, Certified ISO 27001 Lead Implementer, Certified ISO 27001 Lead Auditor, Certified Identity Governance Expert, Certified Identity and Access Manager, Certified GRC Professional, Certified GRC Auditor, Integrated Data Privacy Professional, Certified Scrum Master, BCG Certified Strategy Consultant, Six Sigma Black Belt Professional, GDPR Certified Data Protection Officer, Certified HIPAA Officer & results driven management consultant with 15 years experience in compliance, data protection, SOC 2, ISO 27001, HDS, C5 and NIS2 Controls Implementation, innovation, design thinking, ideating solutions, process improvement, pricing strategy, data analytics, business process outsource, project management, market research, financial analysis, investment banking, cybersecurity and diagnosing a range of problems, from small businesses to multi-million dollar corporations. I have done past projects with HouseCall MD, Varian Medical Systems, DNX VC, Syntervision, FourthRev and Loggi. Previously I have worked as Engagement Manager at KPMG and Senior Auditor at Grant Thornton, where I took part in several consulting assignments in healthcare and life sciences, logistics, TMT, services, consumer and transportation sectors. I also have vast experience of managing projects from start to inception including projects funded by ADB, UNESCO and WHO. I have also completed more than 15 market research studies in different verticals for determining the market size and overall analysis of target markets. I also have experience of working as Head of Product Design where I led the development teams to identify customer pain-points, develop user needs and solve customer problems by creating products with built-in security features. I also worked on developing customer personas & identifying and recruiting sponsor users for A/B testing of product features and arranging Cognitive walkthroughs for establishing the usability of products. I also applied knowledge of Scrum Framework with sprint planning and delegation of tasks on product development projects for various public and private sector organizations. I managed 10 projects of more than $1 Million in total budget. Other than above, I also have hands on experience with various compliance frameworks including GDPR, HIPAA, PCI DSS, ISO 27001, HITRUST, CCPA and NCSF (NIST Cybersecurity Framework). Key Achievements: ✅ Successfully led 8 companies through the SOC 2 Type 2 attestation process, meeting stringent requirements and passing all audits in the first attempt. This achievement significantly enhanced their reputation for data privacy and security. ✅ Guided 4 clients through the rigorous process of achieving ISO 27001 and NIS2 Directive Certificate, ensuring that all security controls and management processes were robust, auditable, and internationally recognized. ✅ Guided 2 clients through HDS and C5 certifications, ensuring that their security posture was aligned with the requirements of both compliance frameworks. ✅ Reduced the costs of IT infrastructure maintenance by 5% for 3 consulted clients ✅ Analyzed business conditions, market/industry trends, competitive influences and demographic factors to identify opportunities of business growth for 5 consulted clients ✅ Created advanced analytics for both internal and marketing use using Tableau, SQL and other BI tools for 4 consulted clients ✅ Managed $400 million donor funded projects as PMO and Project Lead ✅ Performed business process re-engineering for 3 consulted clients ✅ Consulted as lead revenue data analyst on a team responsible for collecting $60M receivables ✅ Repeatedly delivered cost reductions through the implementation of Lean principles, improved scheduling via resource loads and volume analysis ✅ Evaluated and increased operational effectiveness of organizations through the implementation of Continuous Improvement methods and Training/Coaching programs ✅ Identified opportunities within the client organization for improving productivity and operational efficiencies by installing a system by which the client can measure and realize improvement ✅ Analyzed existing processes and applied methodologies to eliminate wasted resources and time for 3 consulted clients
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Ransomware Mitigation
    Insurance & Risk Management
    User Authentication
    System Security
    Linux System Administration
    Vulnerability Assessment
    Risk Analysis
    Intrusion Detection
    NIST Cybersecurity Framework
    Information Security
    Network Security
    ISO 27001
    Amazon Web Services
    SOC 2 Report
    Python
  • $150 hourly
    I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startups and micro, small, and mid-sized companies create secure operating environments to increase business opportunities. I am also part of Upwork's Expert-Vetted Talent program. My priority is to create cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold a bachelor's degree in Telecommunications Engineering from the Airforce University in Argentina, a master's degree in Information Security Engineering from the SANS Technology Institute, and many cybersecurity certifications, including CISSP (Certified Information Systems Security Professional) and GSE (GIAC Security Expert).
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    WordPress Malware Removal
    Malware Removal
    CMMC
    Risk Assessment
    Cloud Security
    Internet Security
    Information Security Audit
    Information Security Awareness
    Security Engineering
    Security Analysis
    Email Security
    Penetration Testing
    Information Security
    Security Policies & Procedures Documentation
    Cybersecurity Management
  • $60 hourly
    SSO expert having Identity and Access Management expertise of 16+ years in SAML / OpenId Connect / Oauth 2.0 / JWT / FIDO2/ Webauthn / 2FA etc. I have experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, Okta, OneLogin, Auth0, Spring Security SAML, Keycloak, ForgeRock, IBM Security Access Manager etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, Ruby, Go, etc.) or framework (Node.js, Meteor, Angular, Django, CodeIgniter, Concrete5, Yii, Symfony, Laravel, WordPress etc.). I have a strong track record of helping clients succeed with: -Adding SAML authentication to custom applications -Troubleshooting SAML Identity Provider and Service Provider errors -Deploying SAML Identity Providers (IdPs) and Service Providers (SPs) -Finding the right architecture for layering SSO technologies (AD, LDAP, OAuth, OpenID Connect, CAS, Kerberos, JWT, multi-factor, etc.) -Providing training, documentation and third-party support -Deployment and architectures of LDAP solutions (OpenDJ, OpenLDAP, IBM Security Directory Server etc). Architectures with high availablity and custom schema. LDAP proxy / bridge solutions deployment. -Architectures and solution Implementation of Identity and Access governance solutions (Sailpoint IIQ , IBM Security Identity Manager, IBM Security directory integrator ). -Role based access control implementation in Identity management solutions. -Risk based access control implementation with Access Management solutions. Devops and cloud security - - Dockerize applications and platforms. - Deployment of applications on AWS EKS platform. - Deployment of applications on GCP GKE platform. Complex Integrations - - Rest API development and security with Oauth / JWT tokens. - API gateway integrations of API. SSO and Identity Access Management Integration Expert | Technical Project Manager
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Solution Architecture Consultation
    OKTA
    Vulnerability Assessment
    Application Security
    Single Sign-On
    API Integration
    OAuth
    Cybersecurity Management
    Security Analysis
    Information Security Consultation
    Auth0
    LDAP
    User Identity Management
    Amazon Cognito
  • $50 hourly
    With a rich background spanning over 5+ years in designing and executing robust cybersecurity solutions, I am a Cybersecurity Specialist Consultant dedicated to safeguarding digital landscapes. My journey has taken me from the foundational steps of security analysis to spearheading roles as a Co-Founder and CTO, alongside pivotal positions in cybersecurity engineering and ethical hacking across global landscapes from Jakarta to Dallas, and Sydney to the Netherlands. My expertise lies in a deep understanding of cyber threats and vulnerabilities, backed by a Bachelor's degree in Cybersecurity from Deakin University and certified mastery in Blockchain Security, Advanced Penetration Testing, and Fuzzing and Crash Analysis. I've successfully led comprehensive security initiatives, including developing XDR and SIEM solutions, managing multi-layered security systems, and pioneering full-scale cybersecurity startups. My approach is rooted in innovation and efficiency, aiming to protect organizational assets against ever-evolving cyber threats with customized security strategies. At the heart of my service is a commitment to operational excellence and a proactive stance on cybersecurity, ensuring I'm always ready to counteract cyber threats swiftly. Through Encripti, my cybersecurity startup, and various contractor roles, I've honed my skills in vulnerability assessments, red/blue team engagements, and crafting defensive architectures against complex cyber attacks. My portfolio is a testament to my ability to communicate complex security concepts effectively and to collaborate towards enhancing cybersecurity resilience in dynamic environments. In seeking new opportunities on Upwork, I aim to bring my wealth of experience and a proactive approach to cybersecurity to organizations looking to fortify their defenses. Whether through strategic consulting, hands-on penetration testing, or crafting comprehensive security frameworks, my goal is to deliver unparalleled value and security assurance to my clients.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Blockchain Security
    API Testing
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Risk Analysis
    Virus Removal
    Web Application Security
    Data Analytics
    Smart Contract
    Malware Removal
    Security Testing
    Vulnerability Assessment
    Application Security
    Cybersecurity Management
    Penetration Testing
    Digital Forensics
  • $125 hourly
    Hello! I help funded startups, midsize, and fortune 500 companies in the healthcare, technology, and government contracting industries. I do this by implementing cybersecurity frameworks that address compliance and protect data, thereby enhancing your marketability and trustworthiness. My expertise includes 20 years of experience, knowledge from real world experience, and industry certifications (i.e. CISSP, CISM, ISO 27001.) My clients have included healthcare EHR, telemedicine, mobile, medical device, and behavioral health organizations. Other clients have been within the fintech, retail, and non-profit industries. These dynamic ecosystems have equipped me with the ability to provide tailored solutions for your unique needs. Compliance Expertise: HIPAA: I am a healthcare information security and privacy practitioner. I have successfully guided several healthcare organizations in effectively handling sensitive patient data. Notably, I orchestrated a full-scale HIPAA compliance overhaul for a 500+ employee healthcare Non-Profit, mitigating potential risks and ensuring continuous adherence to standards. SOC 2: I have been instrumental in developing and executing successful SOC 2 compliance strategies for SaaS, technology, and healthcare companies. My comprehensive understanding of the Trust Service Criteria has allowed SaaS providers obtain favorable SOC 2 Type II reports. ISO 27001: Specializing in risk management, I led the ISO 27001 certification process for multiple organizations. My systematic approach to implementing the ISMS framework has ensured ongoing conformity to this international standard, reducing information security risks and promoting a security-aware organizational culture. CMMC: With a thorough grasp of the Cybersecurity Maturity Model Certification (CMMC), I have assisted defense contractors in preparation to maintain their contracts by helping them achieve and maintain the required CMMC levels. I spearheaded a project to bring a mid-sized defense contractor up to CMMC Level 2, a significant undertaking that involved both technical and policy modifications. PCI-DSS: I conducted PCI assessments and collaborated with IT Teams for technology companies and payment gateway service providers to ensure a PCI Compliance environment. Additional services included writing policies, conducting risk assessments, managed penetration tests, collect AOCs from vendors, and filled out SAQ forms annually. Certifications: CISSP, CISM, ISO 27001 LEAD IMPLEMENTER, GCIA, ECSA, CEHv7 My Services: - vCISO Management - Policies & Procedures Development - Privacy Management - Compliance Implementation - Security Assessments - Risk Assessments - Third-party Security Questionnaires - SSP Development - Cybersecurity Strategy Testimonials: Imagined Cloud | CEO: "Larry exceeded our expectations with their comprehensive SOC 2 services. They not only helped us navigate complex compliance requirements but also provided valuable insights that improved our overall security posture. Highly recommended!" Johnson & Johnson | MedTech Product Security Manager: "Larry was instrumental in guiding our medical device company through our HIPAA assessments with his digital health expertise, significantly easing our compliance process. I highly recommend him for his cybersecurity expertise in the medical device sector." Keywords: cybersecurity expert, compliance, HIPAA, NIST, SOC 2, ISO 27001, CMMC, ISO 27001, policies and procedures , vCISO, risk assessment, compliance software, security assessments, healthcare
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Medical Device
    NIST Cybersecurity Framework
    Cybersecurity Management
    Health & Fitness
    Healthcare Software
    Compliance
    Healthcare
    Telemedicine
    Healthcare IT
    SOC 2
    ISO 27001
    Governance, Risk Management & Compliance
    HIPAA
    IT Compliance Audit
    Security Policies & Procedures Documentation
  • $80 hourly
    Experienced Information Security Engineer/Technical Content Writer within the financial sector. Strong certified information security professional with a bachelor's degree focused on information assurance applied technology. I understand "How to" implement and write on cyber security from a technical perspective.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Content Writing
    Content Editing
    Content Creation
    Copywriting
    Web Application Security
    Information Security Awareness
    Technical Writing
    Security Engineering
    Blog Writing
    Article Writing
    Security Analysis
    Splunk
    Information Security
    Cybersecurity Management
  • $100 hourly
    I'm working as an Account manager at the Apriorit company. My main responsibility is to manage existent projects and to seek new opportunities for our company. The key areas of development where we have a strong experience are File System Driver (Windows, Linux, MacOS), Embedded Linux development, IoT, Network Driver Development, Device Driver Development, Kernel development, C and C++ Programming (C++ development, C/C++), DLL injection, Virtualization solutions (all main types of Hypervisor), CyberSecurity, Cybersecurity solutions and Penetration Testing both Inside and Outside, API Hook, Embedded Solutions, Data Acquisition, Mobile Data Management (MDM). So, if you need high qualified Kernel Developer - we can help you! So main targets of solutions are focused on low-level development - management and development of file system filter driver, USB management driver, network adapter drivers, having strong experience for these we can do a project in time and limited budget. If we are talking about Virtualization - they are major complex solutions related to Remote access, Single sign-on software and solutions development, or Data Protection solution. Have advanced skills of working and understanding for main hypervisors, such as Hyper-V, Xen, ESXi, KVM. We can discuss more suitable architecture idea for a customer and scheme of work, and even propose a solution based on our own SDK, which can speed up the process of development. In addition, we are highly experienced in Image Processing and Computer Vision, CUDA and speed-up calculations of NVIDIA Video Card processing, GPU programming, OpenCV, OpenGL, Photo and Video Object recognition. We are working with Deep Learning modeling (TF, CoreML, Caffee, etc.) and computer Science/Machine learning. We have used Python3 (Anaconda, Spyder), Tensorflow, Numpy, Scipy, Keras, Theano, Scikit-learn. And we have an experienced Reverse Engineering Team, which can help you to dissect and analyse any system's objects and discover undocumented items. I'm open to different price and project working schemes, please feel free to contact me.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Desktop Application
    Rust
    Microsoft Windows
    Solution Architecture
    Golang
    Embedded System
    Driver Development
    Kernel
    Embedded Linux
    Cybersecurity Management
    TCP/IP
    macOS
    Network Security
    Embedded Application
    C++
  • $200 hourly
    An Expert Vetted writer with a background in cybersecurity and engineering, I provide content that positively impacts client search visibility and sales. My content increases organic traffic, user engagement and revenue for enterprise businesses including Microsoft, Adobe, Rackspace, CloudLinux, SolarWinds and IBM. I "speak" to CIOs, CTOs, CISOs, software engineers, and other technical people using my experience in the field, and I have the ability to engage executives with the buying power to purchase your products. I've helped numerous cybersecurity companies, software engineers, B2B businesses, SaaS developers, API developers, and other technical organizations improve their search engine rank and generate revenue. Client analytics show that my content drives traffic and customers to client products, and they see an increase in revenue directly from my content. I can work with your SEO research or work with my own. I have a SEMRush account to perform keyword research and generate ideas for your site. I keep my workflow flexible for my customers so that they can focus on marketing their products and let me handle the content. A few target industries where I've helped clients the most: - Cybersecurity. I explain to developers how to write code that isn't vulnerable to common exploits or generate search engine traffic by reporting on the latest zero-day. - API providers. I write code and content to explain to developers how your API can help them. - SaaS. My content explains to buyers how your SaaS application improves productivity, saves them money, and helps your customers build better products. - B2B. I explain how your products help businesses using technical blog content written for your average customer. I write content for: - Industry blog posts - Whitepapers - Technical documentation, mainly for API endpoints and SaaS - Copywriting and website content Topics I cover: - SaaS - Cybersecurity - Network engineering, network security - Information security, infrastructure security - Email security - Software engineering, software development, programming - NIST framework - Compliance including HIPAA and PCI Languages I work with: - .NET (C# and VB.NET) - Python - node.js - SQL - JavaScript - PHP - PowerShell
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Information Technology
    Website Security
    Email Security
    Search Engine Optimization
    Technical Writing
    Information Security
    SaaS
    Network Security
    Technical Documentation
    Cloud Security
    Marketing
    Content Management
    Copywriting
    Technical Editing
    Content Writing
  • $165 hourly
    Sr. Architect and Engineer specializing in Cybersecurity, Networks, Cloud, and IT Systems with proven international business experience and management skills. UPWORK experience: 9000+ work hours, 100% Job Success, Top Rated Plus, Expert-Vetted With 15+ years of professional experience, I provide a complete set of services from proven advanced technical solutions and methodologies to business development, team-building, and management. I have successfully delivered complex projects across heterogeneous environments such as Telco/ISP providers, SMB, and Large International Enterprises in USA, Europe & Globally. Main offered services include: • Cybersecurity Architect • Network Architect • System Architect • Cloud Architect • Digital transformation • Solution design and implementation • IT strategy development • Information Security Manager • vCTO | vCIO | vCISO • Executive Consultant Highly experienced SME in the following technology fields: Information Security & Cyber Security • Develop & enhance Cybersecurity management frameworks. • Develop, implement & monitor strategic, comprehensive enterprise information security & IT risk management programs. • Develop, and maintain cybersecurity policies, standards, baselines, guidelines, and procedures. Network/IT/System Security • Firewall, UTM, NGFW & NG-IPS protection: Fortigate, FortiManager, FortiAnalyzer, Cisco (ASA FirePower), Barracuda, pfSense, Checkpoint, PaloAlto, SonicWall, WatchGuard • Email Security: Cisco, Barracuda, Mimecast, Microsoft • Web Security: Cisco, Barracuda, Fortinet, McAfee, Zscaler • Proxy and Reverse Proxy: Squid, Nginx, Dante • IPSec VPN & SDWAN: Cisco DMVPN, HPE ADVPN, Fortigate ADVPN • SSL VPN: Fortigate, Cisco, PaloAlto, Barracuda, SonicWall, OpenVPN, pfSense, Swan, OpenConnect • Network Access Control (802.1X, Radius, Tacacs+…), BYOD and MDM : Aruba ClearPass, Cisco ISE, PacketFence, NPS, Genians, Intune... • IAM SSO SAML2 Oauth: OKTA, Keycloack, Auth0 • DLP & CASB Bitglass, Forcepoint • EDR McAfee, Sophos, SentinelOne... • SIEM and SOC solutions - Wazuh, Fortinet, Splunk... IT Cloud/Systems/Virtualization/Backup/DR • Hybrid Cloud, Multi Cloud Architecture • Cloud Infrastructure Security, Networking, Storage, VPC (AWS, Azure, OVH, OpenStack...) • Virtualization planning, implementation, tuning (VMware, Proxmox, KVM, Hyper-V) • Hyperconverged HCI solutions ESXi & vSAN, Proxmox & CEPH • Linux Systems deployment, administration and development (Debian Ubuntu OpenSuSE CentOS RedHat) including performance optimization, hardening, scripting, HA, backup & restore • Windows Server architecture & administration (Hyper-V AD GPO DNS DHCP PKI File Server ...) • SAN (FC/FCoE), ISCSi, NAS(File) • VDI and Virtual App (Microsoft, VMware, Citrix) • Load Balancer/Application Delivery: HAproxy, Nginx, Barracuda, F5 • ElasticSearch & OpenSearch design & implementation • Critical HA Database clusters: PostgreSQL & MySQL • HA, Backup & Disaster Recovery planning & deployment (Veeam, VMware, Proxmox, Linux, AWS, Azure, Windows...etc) Network technologies • Switches: Cisco, HPE, Comware, Aruba OS, Arista, Alcatel, Juniper, Dell • Routers: Cisco, HPE, Comware, Alcatel, Juniper, Mikrotik • WiFi Mobility: Aruba OS & Central, Cisco, Meraki, Ubiquity, Mikrotik • MPLS L2/L3 VPN, MP-BGP, VPLS, SDWAN • BGP, OSPF, IS-IS, EIGRP routing protocols • FRR, VyOS, Bird • VLAN, QinQ, VXLAN, EVPN L2 scalable overlay networks • ACL, PBR, NAT, QoS, NAS; large-scale DHCP/DNS • IGMP L2 and PIM L3 multicast • Secure WiFi planning: controller managed & cloud-managed • NMS, EMS, FCPAS and OSS/BSS systems - LibreNMS, Zabbix, Nagios, Cacti Some of the most notable certifications I hold are: • CISSP - ISC2 • HPE Master Accredited Solution Expert - Network Solutions • HPE Accredited Solutions Expert - Network Architect • SUSE Cert. Linux Admin.: SLES In addition to technical skills, I deliver proven business operations experience for: • Business development planning and acquiring the correct technology • Project Management • Team building and management • RFP preparation Proposal preparation (technical/commercial) • Pre-sales & Sales Management • Business development, planning, and acquiring the correct technology • Project Management • Team building and management • RFP preparation Proposal preparation (technical/commercial) • Pre-sales & Sales Management • Business partnership establishment and management with leading companies such as HPE, Aruba, Fortinet, Cisco, IBM, Dell, Microsoft… and many more I am an avid learner, enabling me to swiftly adapt to new business environments and new project needs. Excellent communication and interpersonal skills combined with my long experience in team-leading & management enable me to collaborate strongly and work in global project teams with multiple members (in both leading or supporting roles).
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Certified Information Systems Security Professional
    Firewall
    High Availability and Disaster Recovery
    NIST Cybersecurity Framework
    Network Design
    Network Architecture
    Solution Architecture
    Cloud Architecture
    Cloud Security
    Business Development
    System Administration
    Cybersecurity Management
    Information Security
    VPN
    Network Security
  • $50 hourly
    HI!! I am Virtual CISO, Cyber Security, Cyber defense, Ethical Hacker, expert I am prompt engineer working to create and maintain AI-generated content in Spanish. I love finding creative and innovative ways to ensure the perfect prompts are provided for our users I am a computer security scientist with an intensive hacking background. I do have a Msc in computer engineering I am working for severals Internationals Enterprises where I do intensive researches in Penetration Testing, Vulnerability managements, Technological Risk, Security Architecture and Forensic I am Professional with over 20 years experience in the area of information and communications technology, including 15 years of experience in networks and security infrastructure Analytical skills to solve problems, ability to work with new technologies, adaptable to any situation, pro-activity and motivation to individual and team achievements Self-management capacity of the learning process to successfully assume the continued improvement of my functions My passion is to help SMBs gain a fighting chance in an increasingly hostile information security threat environment by providing part-time vCISO services. Whether PCI , GDPR, NIST, ISO27000 and any other Security Standards gap analysis, information security risk assessments, audit remediation, strategic planning, interim CISO services, or anything else information security related, I offer you my vCISO Services, Information security ISO27001 consultancy and Policies Documentations With the following responsibilities and functions; Recommend modifications to application development, database design, networking, or infrastructure architecture with the goal of complying with internal information security policies and standards. Monitoring emerging products, technologies or best practices that will improve security for the organization and its stakeholders. Perform security audits, identify security gaps, and develop and implement risk mitigation solutions. Design and develops the organizations overall information security architecture to protect its information assets. Perform work and recomedations in relation to network, data, application and or cloud security and liaises with other areas of IT in the dissemination of this information to counter threats and internal and external vulnerabilities. Perform advanced research and identifying information security products, services, and trends, testing security configurations, and developing configuration architectures. Stong experience in Information security and Network Security: • Design Network security architecture • Design Cloud Security architecture ( AWS and Azure) • IT Vulnerability Assessment • API Security Evaluation • Cloud Security Assessment • Active Directory Security • Network and Web Application/Mobile Penetration Testing • Threat Hunting, • Red Team Program Development/Red Team Attack Simulations • Open Source Intelligence (OSINT) Gathering • IT Risk Management • Incidents Response management • Technical Writing; Information Security Policies,: ISO2700, NIST, HISPAA, PCI • Working experience of supporting Cyber Security tools such as, McAfee SIEM, Ms-SENTINEL, CISCO IPS, Citrix NetScaler, TrendMicro endpoint. Checkpoint Firewall, Bluecoat, AWS WAF, AWS Shield and AWS Firewall Manager, antivirus, CYNET security endpoint • Kali Linux Toolkit, Qualys, Nessus • MS-365 security, Defender for Cloud Strong experiece in IT Support and admin • Technical Supports Windows Server • Active Directory management • Technical Supports Azure Cloud • Technical Supports Intunes • Technical Supports Windows 10 and 11 • Technical SupportsMS- 365 • Technical writing IT Procedures,
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Mobile App Testing
    Amazon EC2
    Blockchain
    ISO 27001
    Cloud Security
    Vulnerability Assessment
    Office 365
    Information Security
    Microsoft Azure
    Cybersecurity Management
    Penetration Testing
    Nessus
    WordPress
    Ethical Hacking
    Network Security
  • $50 hourly
    I am dual-skilled in the application of cybersecurity and Azure AI solutions and have been a Wine Advocate and enthusiast for over twenty years. I have completed the implementation of cyber-security architecture design patterns and frameworks for many custom Azure, AWS, and GCP platform-based solutions. My specialist areas include Auditing, Compliance, Development, Governance, Infrastructure, Planning, Platforms, Risk, SIEM/SOAR, and Threat Intelligence needs. In the last 2 years, I have been working on AI/ML (Artificial Intelligence/Machine Learning) projects, integrating Azure AI services into other Microsoft Services, such as Microsoft Defender, Microsoft 365 and web services. I have experience working with Artificial Intelligence workloads and considerations, providing fundamental principles of machine learning on Azure and applying features of computer vision workloads, Natural Language Processing (NLP) workloads, and generative AI workloads on Azure. Since the beginning of the COVID pandemic in 2019, I have become qualified for the WSET (Wine Spirit and Education Trust) Wine Awards, studying up to level 3. I have gained strong knowledge of the principal grape varieties of the world, the regions in which they are grown, and the styles of wine they produce. I have built a combination of high-end tasting, exploring the factors that impact specific styles and quality and learning how to describe these wines with confidence. I can build tasting 'maps' describing various wine types, using the Wine Spirit Education Trust (WSET) Systematic Approach to Tasting Wine (SAT); these 'maps' cover descriptions for appearance, nose, palate and quality. Across principal grape varieties, understand and gain applied knowledge across environmental factors, grape-growing, winemaking and maturation options influence the style and quality of wines. I have strong technical wine knowledge and the capability to write copy for wine products. I create meaningful content that engages customers and drives business across various platforms, such as blogs, social media, and websites.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Information Security
    Content Writing
    Unified Threat Management
    Creative Writing
    Security Operation Center
    Security Management
    Cybersecurity Management
    Blog Writing
    Editing & Proofreading
    Cloud Security
    Copywriting
    Certified Information Security Manager
    Website Content
    Blog Content
    Security Analysis
  • $35 hourly
    ⭐⭐⭐⭐⭐ "It doesn't get better than Ezinne. The quality of what she delivers is outstanding...You won't be disappointed." Hello! I'm a dedicated grant writer focused on helping tech startups secure the funding they need to thrive. With a background in technical and proposal writing, I specialize in crafting compelling grant applications for startups in any field, worldwide, hourly or at a flat rate. What I Offer: - Funding Research: I conduct thorough research to help identify and analyze potential funding opportunities that align with your startup's objectives. - Grant Writing: Expertise in writing successful grant and funding proposals tailored to your specific needs and goals. - Technical Writing: Proficient in creating clear and concise technical documents including pitch decks that effectively communicate complex information. - Proposal Writing: Skilled in developing persuasive proposals that highlight the unique strengths and potential of your startup. Why Choose Me: - Proven Track Record: I'm experienced in securing funding for tech startups, with a deep understanding of what funders are looking for. - Global Reach: While based in East Africa, I offer my services to tech startups around the world. - Passion for Startups: I'm committed to helping innovative startups succeed, with a special focus on supporting impactful startups in Africa and around the world. - Collaborative Approach: I ensure client needs are met through effective collaboration. - Commitment to Deadlines: I'm dedicated to meeting deadlines and deliverables. - Simplifying Complexity: I'm able to simplify complex concepts for easy comprehension. - Attention to Detail: Meticulous attention to detail and accuracy. Success Stories: - Tony Elumelu Foundation Grant: I worked with a startup on their grant proposal, leading to pre-approval for the prestigious Tony Elumelu Foundation grant. - African Impact Initiative Grant: I assisted a startup in securing pre-incubation approval for the African Impact Initiative grant, which supports impactful startups in Africa. - VC Funding with Goodwell: I contributed to the initial application process for venture capital funding, resulting in the startup client being contacted by Goodwell for follow-up. Work Approach: - Understanding client objectives through detailed project analysis - Thorough online research and information gathering, where applicable - Drafting of initial content for client review - Revisions based on client feedback Client Testimonials: - "Easy to work with" - "Paid attention to details" - "Completed the job on time" - "Impressed by the quality of work" Let’s Work Together: If you're a tech startup looking to secure funding and need a skilled grant writer to help you achieve your goals, I’d love to hear from you. I offer flat-rate services to ensure transparency and predictability in pricing. Let's work together to turn your vision into reality! My working hours align with GMT+2 (currently based in Kigali, Rwanda, though originally from Ontario, Canada).
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Business Writing
    User Guide Writing
    NIST Cybersecurity Framework
    Quiz Writing
    Policy Writing
    Story Writing
    Grant Writing Consultation
    Report Writing
    Speech Writing
    Article Writing
    Grant Writing
    Blog Writing
    RFP Writing
    Content Writing
    Technical Writing
  • $125 hourly
    Information Security, Governance, Risk, and Compliance (GRC) professional. • HITRUST CCSFP, CISSP, PCI ISA, ITIL • 15+ years in Information Security (Governance, Risk, and Compliance) • 15+ years in highly regulated environments (PCI, HIPAA, FISMA) • 15+ years implementing/managing ISO 27001, NIST 800-53, NIST-CSF, PCI-DSS • 10+ years of policy and procedure development and management • 10+ years of process optimization, streamlining • 15+ years in IT (design, development, implementation, and management) • Bachelor of Business Administration - Finance
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Company Policy
    Risk Assessment
    HITRUST Common Security Framework
    Governance, Risk Management & Compliance
    Certified Information Systems Security Professional
    HIPAA
    Information Security Audit
    PCI
    ServiceNow
    NIST SP 800-53
  • $20 hourly
    Need help to recover your HACKED & DISABLED social media accounts in the least possible time? You are at right place if you have lost access to your personal or business social media account (s). Lost credentials or your account got hacked. Your account was disabled by a mistake. You want to remove old accounts or remove your content from search engines or social media. Or if have any other Instagram and Facebook related issue. You might have tried available support options and scrolled through forums but could not find help because: I have been providing virtual assistance with the related issues for a long time and enjoying my successful journey. I have proudly offered my clients to pay only after the successful results and resolved dozens of cases. You will find the support and solution for almost every kind of issue related to the Instagram and Facebook and other social media platforms with full compliance to ethics and respective platform's terms and service. I would love to answer your queries for free of cost and will suggest a way forward that would help you to accomplish your goals. Please send me a message with issue details and screenshots (if feasible). Invite me for the interview if your: Facebook account is disabled. Instagram account is disabled. Facebook account is restricted. Instagram account is restricted. Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Or if you are seeking help for: Recover hacked Instagram account Facebook recovery Instagram restoration Facebook restoration Instagram security Facebook security Instagram verification Facebook verification Instagram & Facebook Integration Instagram & Facebook Marketing Recovery of account in case of lost credentials Recovery from underlying technical issues, bugs and glitches Snapchat issues LinkedIn issues TikTok issues Social media content removal Facebook Instagram Integration Facebook and Instagram verification problem Facebook content removal Instagram content removal Instagram fake followers removal Instagram fake accounts removal Facebook fake accounts removal ''DON'T FORGET TO READ THE REVIEWS ON MY PROFILE'' Disclaimer: Write me about the issues related to your ''own'' social media account (s) or only if you are an authorized representative. Avoid making requests that are not compliant with Upwork and Instagram's terms of service. You will get ethical virtual assistance to get your problem resolved through this channel. Thank you for your precious attention. Looking forward to your invites. Anxiously waiting for assisting you better. :)
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Social Media Marketing
    Social Media Account Setup
    Instagram API
    Internet Security
    Technical Support
    Information Security
    Network Security
    Vulnerability Assessment
    Ethical Hacking
    Troubleshooting
    Data Recovery
    Cybersecurity Management
    Social Media Management
    Instagram
    Facebook
  • $30 hourly
    I am a crypto scam recovery expert with over 8 years of experience in the field. I am specialized in cyber crime investigation, cyber defense, penetration testing, and vulnerability assessment, Crypto scam recovery, Blackmailer Identification, Hack Investigation and Digital Forensic. I have began my career as a cyber crime investigator, where I worked on complex cases involving computer fraud, hacking, and identity theft. I was able to use my technical skills and attention to detail to uncover evidence and bring perpetrators to justice and quickly became known for my ability to navigate the digital landscape and track down the source of cyber attacks. After years of experience in cyber crime investigation, I was also responsible for conducting penetration testing to identify and address vulnerabilities in networks and systems, as well as conducting vulnerability assessments to identify potential weaknesses. I have a deep understanding of the latest security technologies and methods, and is always seeking new ways to stay ahead of the ever-evolving threat landscape. #Bitcoin recovery services #Crypto Wallet Recovery #Investigate Cryptocurrency Scams #Wallet Transaction Analysis #Stolen Funds Tracing And Recovery #Crypto Investment Farms Investigation #Crypto Asset Security & Protection
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Cryptocurrency Trading
    Web App Penetration Testing
    Crypto Wallet
    Cryptocurrency
    Data Recovery
    Ethical Hacking
    Social Engineering Assessment
    Crypto Exchange Platform
    Tech & IT
    Vulnerability Assessment
    System Security
    Digital Forensics
    Malware Removal
  • $250 hourly
    As a Top Rated vCISO with a 100% job success rate, rest assured that I execute at a high level of expertise, integrity, and professionalism. I am the President & Founder of Aspire Cyber, a full-service consulting firm that rapidly delivers privacy and cybersecurity compliance solutions to help small and medium-sized businesses satisfy their legal, regulatory, and contractual requirements. Aspire Cyber was founded on the core belief that every business should have access to world-class cybersecurity talent, regardless of budget or security needs. I have over 20 years ​of experience managing information security projects and implementing strategic cybersecurity controls for the United States Army, Bank of America, and numerous Fortune 100 companies. We offer entirely “Done For You” solutions that help your business rapidly achieve compliance while we manage everything. Don’t waste 6-18 months trying to figure this out yourself. Regulatory and industry cybersecurity frameworks have hundreds of different controls you must comply with and require knowledge of IT, Cybersecurity, HR, Legal, and more. Aspire Cyber is a leading provider of comprehensive cybersecurity compliance solutions. Our team of experts has a proven track record of implementing NIST SP 800-171 practices to help defense contractors achieve Cybersecurity Maturity Model Certification (CMMC). We make it easy for your business to prove it's a safe choice for handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Schedule a free call with me to learn how our team of dedicated cybersecurity experts can help save you months of time and, in many cases, five or even six figures in excessive spending trying to become compliant without expert guidance. ★High Profile Clients ✔ I worked for the United States Army, Lockheed Martin, Bank of America, Hewlett-Packard Enterprise, and many others. Aspire Cyber specializes in the following areas: ★ Risk Assessment and Auditing - We have conducted over 200 Information Security, Business Continuity, and Cloud assessments. -Compliance (NIST, PCI, HIPAA, ISO 27001, GDPR, CCPA, COPPA, FedRAMP) - Cybersecurity Advisor -Cloud Secure Design -Data Privacy Officer (DPO) -Cloud Security -Policy Writing -Penetration Testing -Application Security -Incident Response -Vulnerability Management -Third-Party Risk Management -Security Awareness Training ★ I hold the following degrees and certifications: ✅ Certified CMMC Assessor (CCA) ✅ Certified CMMC Professional (CCP) ✅ CMMC Provisional Instructor ✅ Certified Information Systems Security Professional (CISSP) ✅ Certified Cloud Security Professional (CCSP) ✅ Certified Information Security Manager (CISM) ✅ Certified Risk and Information Systems Control (CRISC) ✅ CMMC Registered Practitioner ✅ CompTIA Security+ ✅ CompTIA A+ ✅ Master of Business Administration (MBA) ✅ Graduate Certificate Cybersecurity Technology WHY CHOOSE ASPIRE CYBER? -Professionalism: We treat all clients respectfully and adhere to the highest ethical standards. -Fast: We always aim to deliver your project ahead of schedule. -Expertise: We have vast experience across various cybersecurity and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. 🙋🏼‍♂️Our team is eager to partner with your organization to deliver cybersecurity compliance solutions rapidly. Contact Aspire Cyber today to learn how we can fulfill your cybersecurity needs.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Cloud Security Framework
    NIST SP 800-53
    Policy Writing
    Information Security Governance
    FedRAMP
    Information Security Awareness
    Risk Assessment
    NIST Cybersecurity Framework
    Business Continuity Plan
    Information Security Audit
    Information Security
    Incident Response Plan
    Security Testing
    Vulnerability Assessment
  • $75 hourly
    ✅ Top Rated Plus Expert ✅ 3000+ Hours ✅ Professional Penetration Tester Cybersecurity researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform. For deliverables, professional reports are created, that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors. Core competency is performing black and gray box testing on live web applications/networks or lab environments. Familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of the work is confidential sample vulnerability report can be provided. Service Description 1)Web Application Penetration Testing based on OWASP TOP 10 2)Network Penetration Testing 3)Security Hardening Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python framework
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Web Application Security
    JavaScript
    Reverse Engineering
    Black Box Testing
    Ethical Hacking
    Web App Penetration Testing
    Network Penetration Testing
    Internet Security
    Security Testing
    Network Security
    Penetration Testing
    Vulnerability Assessment
  • $10 hourly
    **I only bid on that project which I can deliver with complete satisfaction.** If your Instagram got HACKED or Locked and your Email or Number was Changed and Facing 2FA you are in the right place. *For Hacked Instagram or Facebook Accounts Recovery I Take Fix Price Which I Discuss before starting the project* I can provide solutions with the followings: ✅ Social media accounts set up and integration ✅ Social Media Management ✅ Social Media Optimization ✅ Social Media Error Fixing ✅ Hacked Instagram Recovery ✅ Assistance with your Instagram or Facebook removal ✅ Assistance with hacked Instagram account ✅ Assitance with stolen Facebook account ✅ Facebook business page recovery ✅ unauthorized ads payment on ads manager recovery ✅ Accounting ✅ Social media account recovery ✅ 2FA solution ✅ Google My Business ✅ Virtual Assitance ✅ All kinds of Social accounts Retrieve and All sorts of Error Fixing and name a few & I will let you know my experience. I am always eager to learn new skills. Also, please invite me for an interview if your's: Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Virtual assistance if your Instagram got disabled or restricted Facebook Business Suite hacked or compromised Facebook ads account recovery. Or if you are looking assistance for help: Recover hacked Instagram account Facebook Recovery Instagram restoration Social media Verification Facebook Business Suite verification Instagram & Facebook Integration Recovery of account in case of lost credentials Recovery from technical issues, bugs, and glitches Virtual Assitance Removal of old lost Instagram or Facebook profiles. assistance in Google My Business profile retrieval. Email accounts assistance. I Provide virtual assistance in all that and the result depends on them. Feel free to discuss the project before starting a contract. In response to your expectations: 1. I have expertise in the area required by you. 2. I can start the project immediately and complete your milestone as per your timeline. I believe communication is key to any successful project, and I'd like to start things off on the right foot, but I suggest we schedule a call to discuss the project further. This will enable us to make sure that we communicate well and are completely comfortable with the scope of the project. Please let me know the time that works best for you and I will make sure that I make myself available. Thank you for your time and consideration.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Internet Security
    Data Recovery
    Instagram Reels
    Facebook
    WordPress Malware Removal
    Malware Removal
    Facebook Page
    Ethical Hacking
    Social Media Management
    Social Media Marketing
    Digital Marketing
    Instagram
    Information Security
    Technical Support
    Accounting
  • $40 hourly
    ✅ 𝗧𝗼𝗽 𝗥𝗮𝘁𝗲𝗱 ✅ 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗲𝗱 𝗗𝗲𝘃𝗢𝗽𝘀 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿 ✅ 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗲𝗱 𝗘𝘁𝗵𝗶𝗰𝗮𝗹 𝗛𝗮𝗰𝗸𝗲𝗿 (𝗖𝗘𝗛) As a 𝗧𝗼𝗽-𝗥𝗮𝘁𝗲𝗱 𝗜𝗧 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 with 6+ years of experience, I specialize in transforming digital landscapes through my expertise in DevOps engineering and cybersecurity. 📜 𝗘𝘅𝗽𝗲𝗿𝗶𝗲𝗻𝗰𝗲 & 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀: 🏅 AWS Certified DevOps Engineer Professional 🏅 AWS Certified Developer Associate 🏅 Certified Ethical Hacker (CEH) 🏅 HashiCorp Certified: Terraform Associate (003) 🏅 Certified in Cybersecurity (ISC2-CC) 🔧 𝗖𝗼𝗿𝗲 𝗗𝗲𝘃𝗢𝗽𝘀 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀 : -------------------------------------------------------------------------------------------------------- ● 𝗖𝗜/𝗖𝗗 𝗣𝗶𝗽𝗲𝗹𝗶𝗻𝗲𝘀: Expertise in AWS CodePipeline, Jenkins, GitLab CI; enabling continuous innovation and automated workflows. ● 𝗞𝘂𝗯𝗲𝗿𝗻𝗲𝘁𝗲𝘀 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁: Masterful management for high-availability applications. ● 𝗜𝗻𝗳𝗿𝗮𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲 𝗮𝘀 𝗖𝗼𝗱𝗲 (𝗜𝗮𝗖): Proficiency in Terraform and AWS CloudFormation, ensuring consistent and reliable environment setups. ● 𝗣𝗲𝗻𝗲𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝗧𝗲𝘀𝘁𝗶𝗻𝗴 𝗦𝗲𝗿𝘃𝗶𝗰𝗲:Comprehensive assessments on your mobile and web applications to identify vulnerabilities and enhance security measures. ● 𝗠𝗼𝗻𝗶𝘁𝗼𝗿𝗶𝗻𝗴 & 𝗟𝗼𝗴𝗴𝗶𝗻𝗴: Proactive performance insights with ELK and Prometheus. ● 𝗠𝗶𝗰𝗿𝗼𝘀𝗲𝗿𝘃𝗶𝗰𝗲𝘀/𝗦𝗲𝗿𝘃𝗲𝗿𝗹𝗲𝘀𝘀 𝗔𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲𝘀: Efficiency with AWS Lambda, enhancing agility and cost-effectiveness. ● 𝗔𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗼𝗻 𝗦𝗰𝗿𝗶𝗽𝘁𝘀: Precision-crafted scripts to streamline operations. ● 𝗖𝗼𝗻𝗳𝗶𝗴𝘂𝗿𝗮𝘁𝗶𝗼𝗻 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁: Seamless control with Ansible over distributed systems. ------------------------------------------------------------------------------------------------------------ 🔒 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝘀 𝗮 𝗣𝗿𝗶𝗼𝗿𝗶𝘁𝘆: ● Implementing top-tier security practices from ethical hacking insights to vulnerability assessments, ensuring resilient infrastructure. 🤝 𝗖𝗹𝗶𝗲𝗻𝘁 𝗖𝗼𝗹𝗹𝗮𝗯𝗼𝗿𝗮𝘁𝗶𝗼𝗻: Through clear communication, collaboration, and a keen focus on your unique challenges and goals, we'll forge an optimized digital ecosystem. Your success is my commitment. 🌟 𝗪𝗵𝘆 𝗖𝗵𝗼𝗼𝘀𝗲 𝗠𝗲 𝗢𝘃𝗲𝗿 𝗢𝘁𝗵𝗲𝗿 𝗙𝗿𝗲𝗲𝗹𝗮𝗻𝗰𝗲𝗿𝘀? ------------------------------------------------------------------------------------------------------------ ◈ Client Reviews: Dedicated to providing value and earning trust. ◈ Over-Delivering: I take pride in exceeding expectations and leaving clients impressed. ◈ Responsiveness: Always available and communicative. ◈ Resilience: Problem-solving focus with the resilience to overcome challenges. ◈ Kindness: Treating everyone with respect, empathy, and a genuine desire to improve situations. ------------------------------------------------------------------------------------------------------------ 𝗦𝗼𝘂𝗻𝗱𝘀 𝗹𝗶𝗸𝗲 𝗮 𝗴𝗼𝗼𝗱 𝗳𝗶𝘁? 𝗛𝗲𝗿𝗲'𝘀 𝘄𝗵𝗮𝘁 𝘁𝗼 𝗱𝗼 𝗻𝗲𝘅𝘁: 1. 📺 Watch my videos on my Upwork profile and in my work examples. 2. 🟢 Click the green “Send Message” ✉️ button in the top right-hand corner. 3. 💬 Write a personalized note highlighting why you think we’re a good fit. 🌟 𝗦𝗮𝘁𝗶𝘀𝗳𝗮𝗰𝘁𝗶𝗼𝗻 𝗚𝘂𝗮𝗿𝗮𝗻𝘁𝗲𝗲𝗱: If you're not 100% satisfied with my quality work, I offer a 𝗺𝗼𝗻𝗲𝘆-𝗯𝗮𝗰𝗸 𝗴𝘂𝗮𝗿𝗮𝗻𝘁𝗲𝗲 —no questions asked. 🚫 𝗘𝘁𝗵𝗶𝗰𝘀 & 𝗜𝗻𝘁𝗲𝗴𝗿𝗶𝘁𝘆: 𝗜 𝘄𝗶𝗹𝗹 𝗻𝗼𝘁: ------------------------------------------------------------------------------------------------------------ ◈ Hack, crack, or access unauthorized systems or accounts. ◈ Fill out security questionnaires or assist with certifications. ◈ Create falsified penetration testing or assessment reports. I believe in using my skills to protect rather than harm others, ensuring everyone’s right to privacy and security. ------------------------------------------------------------------------------------------------------------ Feel free to connect with me to discuss your security needs or DevOps challenges. Let's build a secure, scalable, and efficient future together!
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Kubernetes
    Python
    CI/CD
    Infrastructure as Code
    Product Development
    Amazon Web Services
    Cloud Computing
    DevOps Engineering
    Solution Architecture
    DevOps
    Ethical Hacking
    Penetration Testing
    Network Security
    Information Security
    Vulnerability Assessment
  • $50 hourly
    🚀 Unlock Seamless Compliance & Propel Your Growth with Expert Guidance! 🚀 Are you seeking a seasoned Compliance Professional to guide you as you embark on a journey through the complex world of global AML/CFT and crypto compliance? I’m Timothy, your dedicated ally and partner, weaving through the intricate compliance mazes with a passion for safeguarding and catalyzing your business growth. 🔍 Why Partner with Timothy? 🔍 6+ Years of Tailored Compliance Mastery across FinTech, Financial Services, and Crypto/Web3. Global Compliance Maestro: Navigating through GDPR, AML, KYC, and crypto regulations across various jurisdictions. Proven Impact: ✅Successfully reduced risk exposure and compliance errors by up to 50% for businesses in the FinTech and Crypto sectors. ✅Successfully led the EMI and 5MLD licensing project for a UK Crypto Fintech, by creating the required compliance program, policies, and procedures documentation. ✅Successfully built and scaled a robust Risk and Compliance function from scratch for 3 startups. 🗣️ Client Testimonial 🗣️ "Timothy showcased exceptional expertise in compliance management throughout our collaboration. His in-depth knowledge of regulatory requirements and industry standards was evident from day one. He demonstrated a strong ability to dissect complex regulations and translate them into actionable strategies for our project. His expertise proved invaluable in navigating the intricacies of our compliance challenges. Timothy consistently delivered high-quality work, ensuring that all compliance aspects of our project were meticulously addressed. His attention to detail and commitment to excellence were evident in every deliverable." - Joshua O. | Product Manager "I had the pleasure of working with Timothy for several years. Timothy has a wealth of knowledge as a Chief Compliance Officer, a Crypto Investigator, and a Risk Manager. Timothy is a team player and very professional. He led the team in collaboration efforts with engineers and product developers in incorporating transaction monitoring platforms to conduct crypto KYC/KYB and investigations. Timothy is a natural leader. He is a strategic thinker and very analytical. I am very confident that any team would be lucky to have Timothy as part of their team. If my division had the resources, I would hire Tim today!!!!!" - Lourdes M. 🛠 Expertise That Speaks: 🛠 AML/KYC/Transaction Monitoring Frameworks GDPR & Data Privacy Compliance Blockchain Forensics & Investigations Policy & Procedures Writing Risk Assessments & Management Internal Audit & Designing Compliance Programs 🚀 Your Journey to Bulletproof Compliance: 🚀 Consultation: A complimentary deep dive into your needs. Proposal: A transparent roadmap, detailing timelines and costs. Execution: Regular, insightful updates ensuring absolute transparency. Delivery: Precision-driven work, with scope for revisions. Support: Continued post-project assistance. 🔐 Confidentiality at Its Best: Your business details and regulatory concerns are handled with the utmost confidentiality and integrity. 🌐 Navigating Global & Crypto Compliance? 🌐 Navigate through diverse jurisdictions and regulatory landscapes with confidence as my meticulously crafted strategies, from AML/CFT Compliance to the latest in crypto regulations, are designed to keep your business always a step ahead. 🤝 Forge Strategic Partnerships 🤝 Fortify your compliance strategy by tapping into my network, connecting you with Trust Providers, Bank Partners, AML/KYC Tools, and more. 🔄 Always Ahead in Compliance 🔄 Your compliance strategy will always stay ahead of the curve, especially in the rapidly evolving crypto/web3 sector, thanks to my ongoing learning and active engagement in industry seminars and workshops. Ready to Fortify Your Compliance Strategy and Propel Your Business Growth? 🚀 Let’s elevate your business to global standards, ensuring it’s not just compliant but also primed for seamless, risk-mitigated growth. Connect with me now by clicking on the green button at the top right of your screen, and let’s get started on safeguarding your business against compliance pitfalls and unlocking new horizons of growth!
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    PCI
    Project Risk Management
    IT Compliance Audit
    Compliance Testing
    Enterprise Risk Management
    Regulatory Compliance
    Cybersecurity Management
    Governance, Risk Management & Compliance
    Risk Analysis
    GDPR
    Policy Writing
    Compliance
    Risk Assessment
    Anti-Money Laundering
  • $100 hourly
    I am a dedicated professional with decades of comprehensive experience in Cyber Investigations, Cyber Intelligence, Cyber Operations, Cybersecurity, and Information Security. I am well-versed in creating robust security structures, implementing security strategies, and mitigating potential cyber threats, and I specialize in the detection, investigation, and mitigation of cyber threats, while providing strategic insights to enhance organizational cyber defense capabilities. I have a Bachelor's degree in Psychology and Cognitive Science, and am completing work toward Master's degrees in Cybersecurity and Information Technology, with specializations in Enterprise Networks and Cloud Computing. I have also earned various industry certifications such as Certified Ethical Hacker Master (CEH-Master), System Security Certified Practitioner (SSCP), Certified Cyber Intelligence Professional (CCIP), Certified Penetration Tester (CPT), and Certified Forensic Analyst (CFA). Types of Services Offered Include But Are Not Limited To: Consulting, Strategy, & GRC: • Cybersecurity Consulting • Cybersecurity Strategy Development • Security Policy Development and Implementation • Governance, Risk, and Compliance (GRC) Frameworks • Managed Security Services Risk Assessment and Management: • Security Risk Assessment • Risk Mitigation Strategies • Cyber Risk Analysis • Vulnerability Assessments • Incident Mitigation and Remediation Digital Forensics Incident Response: • Security Incident Investigation • Litigation Support • Regulatory Compliance Audits • Integrated Threat Intelligence Digital Forensics • Data Recovery and Analysis • Electronic Discovery (eDiscovery) • Mobile Device Forensics • Network Forensics • Forensic Imaging • Malware Forensics Incident Response • Incident Management and Coordination • Threat Hunting • Emergency Response • Root Cause Analysis • Post-Incident Reporting and Documentation Training Services: • Security Awareness Training • Workshops and Webinars • Cybersecurity Certification Preparation • Employee Cybersecurity Training Programs • Simulated Phishing and Other Training Exercises Offensive Security & Defense Security: • Penetration Testing • Ethical Hacking • Red Team Operations • Blue Team Defensive Strategies • Purple Team Exercises Cloud Services: • Cloud Security Architecture • Cloud Security Assessments • Cloud Data Protection • Cloud Compliance Audits • Managed Cloud Services Network and Architecture Services: • Network Design and Architecture • Network Security Implementation • Wireless Network Security • Network Performance Monitoring • Enterprise Network Management Cyber Investigations and Intelligence: • Cyber Investigations • Cyber Intelligence Gathering • Digital Forensics • Network Forensics • Fraud Investigation • Insider Threat Investigation • Social Media Forensics Cyber Operations: • Cyber Threat Hunting • Cyber Threat Intelligence • Information Operations (Info Ops) • Real-time Security Monitoring • Security Operation Center (SOC) Management Security Compliance and Auditing: • Compliance Auditing • Security Auditing • Security Policy Compliance Reviews • Regulatory Compliance Monitoring • Information Security Assessments Virtual CISO Services • Cybersecurity Program Leadership • Security Strategy and Planning • Policy Development and Management • Security Risk Management • Compliance Oversight • Incident Response Planning • Security Awareness and Training • Vendor Risk Management • Security Budget Management • Board Communication
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Cyber Threat Intelligence
    Ethical Hacking
    Microsoft Azure
    Solution Architecture
    Cloud Architecture
    IT Infrastructure
    Network Engineering
    Cloud Security
    Web App Penetration Testing
    Security Infrastructure
    Network Penetration Testing
    Network Security
    Penetration Testing
    Information Security
    Vulnerability Assessment
  • $40 hourly
    As a seasoned Senior Security Analyst, I bring forth seven years of dedicated expertise in fortifying the Cybersecurity landscape for enterprises, corporations, and medium-sized businesses. My proficiencies encompass an extensive range, including: -Orchestrating the full spectrum of incident response life cycles and post-incident activities. -Mentoring and guiding junior colleagues in mastering the intricacies of incident response cycle. -Crafting robust Information Security policies and procedures tailored to organizational needs. -Authoring comprehensive security guidelines to empower security personnel with actionable directives. -Conducting thorough training sessions for employees, covering the breadth of Cybersecurity awareness. -Configuring SIEM alarm rules and formulating clear incident response playbooks. - A hands-on experience with SOAR platforms, fostering a seamless operational environment. My forte lies in delivering quick security alarm analysis across various domains and tools, including: Web security and email security solutions, security awareness platforms, Microsoft and Amazon security stack, brand and digital landscape protection, EDR and HIPS, as well as an array of SIEMs such as LogRhythm, Qradar, Sentinel, XDR, Rapid7, Amazon. With a commitment to robust security measures and a track record of elevating defenses across multifaceted environments, I am committed to contribute expertise that safeguards and fortifies your organization against evolving threats.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Security Operation Center
    GDPR Compliance Review
    Information Security
    GDPR
    ISO 27001
    Information Security Consultation
    Vulnerability Assessment
  • $85 hourly
    I am a professional Cyber Security Consultant specialising in Governance, Risk and Compliance with over 4 years experience in the industry. I have worked with a number of clients across a variety of sectors to help improve their Cyber Maturity and achieve compliance to various standards. Whilst I specialise in the GRC space, my particular area of focus is delivering informations security systems that deliver value whilst achieving the required level of compliance needed for a business. I take an individual approach to our customers to ensure that all measures are fit for purpose This includes sectors such as; - Third Sector - Medical Technology and SaMD - Financial Services - IT My key areas of expertise include; - ISO27001 (Operation, implementation and Auditing) - NIST Cyber Security Framework (Implement Framework using desired Security Controls) - Internal Audits (Identifying areas of improvement) - Creating Technical Diagrams/Documentation (Demonstrating Compliance) - OneTrust (Data Mapping, Assessment Configuration, Vendor Risk Management) - Writing Security White-papers and Creating Trust Portals Here are a few key projects I have worked on recently; - Implement NIST CSF using ISO27001 Controls - Operating an Information Security Management System with Zero Non-Conformities - Creating evidences to demonstrate compliance with EU Data Protection Regulations - Writing sets of Policies and Procedures and working with Senior Leadership to deploy - Using OneTrust Tool to create Assessments to conduct System/Supplier Evaluations I am available for work relating to any of the above, please don't hesitate to drop me a message if you have any questions
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Security Policies & Procedures Documentation
    Security Analysis
    Cybersecurity Management
    Information Technology Operations
  • $15 hourly
    Hi, All Employers and clients! Let's scale up your business to the next level! I have been associated with the digital industry for the last 10+ years, My core expertise is website development and design. WordPress website development covers the main course of my skills. However, I am also proficient in working on other CMS like Shopify, Squarespace, Webflow, Weebly, Wix, GoHighLevel, ClickFunnel, and other landing page development. Additionally, you can count on my communication skills and my timely deliverables. All these essences made me a top-rated freelancer on this portal for the last five years. Let's have an in-depth look at my profile and decide whether to move forward with me or not! Here's a quick overview of my overall skills/expertise: • Web Development, E-commerce, SEO, Email Marketing, Web Design & Fix • WordPress, Elementor, Divi, WordPress Themes, WP Plugins, ACF, Custom Development • Landing Page Development, Conversion Pages Development, Clickfunnel, GoHighLevel, Squarespace, Shopify, and Webflow. • Strategic Planning, Processes, Execution Plan, Blueprints, CRMs, Sales Funnels • Project Management, Social Media Management, Human Resources, Lead Generation • Content Development, Sales Copy, Email Scripts, Video Ads, Webinar, Streaming You can hire me right away to scale up your business in no time!
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Android
    PSD to HTML
    WordPress
    HTML5
    Sophos Sophos UTM
    PHP
    Shopify
    Cybersecurity Management
    Landing Page
    Wireless Security
    HTML
    Information Security
    PSD to WordPress
    Front-End Development
    CSS
  • $125 hourly
    I can assist you with your project and I welcome the opportunity to discuss the scope of work. I am an independent contractor and will oversee and manage all projects directly. I am the former Chief Information Officer and Managing Director for Technology for over four years for one of the largest financial advisor recruiter firms in the United States. I was the systems, telecommunications, and network administrator for six offices nationwide and managed over 100 users on the multiple software platforms. I am currently an administrator and developer for Salesforce and HubSpot and manage a wide variety of software suites including Microsoft 365 and Google Workspace. My clients range from small/mid-size businesses to Fortune 100 companies. As a Salesforce and HubSpot administrator, I have over twelve years of experience performing duties, which include, user management, data import and migration (Accounts, Contacts, Opportunities, Leads, etc.), de-duplication of records, high-priority software updates, automated workflows, process building, custom objects, reporting, training, and support for user related issues. Databases administered each contained over 500,000 contacts, 50,000 accounts and 9000 opportunities. My skills and experience include the following: • Language Proficiency: Spanish (Fluent & Bilingual) • In-depth knowledge of IT systems, networks, and infrastructure. • Understanding of cybersecurity principles and best practices. • Ability to assess and evaluate IT controls and processes. • Experience in risk assessment and management. • Knowledge of relevant regulations and compliance standards (e.g., SOX, HIPAA, GDPR). • Proficiency in data analysis tools and techniques. • Ability to analyze large datasets to identify trends and anomalies. • Critical thinking and problem-solving skills to address complex IT issues. • Troubleshooting skills to identify and resolve IT audit issues. • Effective written and verbal communication. • Ability to communicate technical information to non-technical stakeholders. • Presentation skills for reporting findings and recommendations. • Ability to work collaboratively with cross-functional teams. • Highest integrity and the ability to maintain confidentiality. • Ability to adjust strategies based on emerging trends and risks. Please don’t hesitate to inquire about any assistance with any technology platform. Details about my background can be discussed when we connect. I have diverse background and can assist you in almost all cases. I look forward to the opportunity to work with you.
    vsuc_fltilesrefresh_TrophyIcon Cybersecurity Engineers
    Salesforce
    Information Security
    Cybersecurity Monitoring
    Data Recovery
    Data Privacy
    Cybersecurity Management
    Wireless Security
    Digital Forensics
    System Administration
    Network Administration
    CRM Software
    Computer Skills
    Computer Network
    CRM Automation
    IT Management
    Network Security
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Cybersecurity Engineer on Upwork?

You can hire a Cybersecurity Engineer on Upwork in four simple steps:

  • Create a job post tailored to your Cybersecurity Engineer project scope. We’ll walk you through the process step by step.
  • Browse top Cybersecurity Engineer talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Cybersecurity Engineer profiles and interview.
  • Hire the right Cybersecurity Engineer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Cybersecurity Engineer?

Rates charged by Cybersecurity Engineers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Cybersecurity Engineer on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Cybersecurity Engineers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Cybersecurity Engineer team you need to succeed.

Can I hire a Cybersecurity Engineer within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Cybersecurity Engineer proposals within 24 hours of posting a job description.

Schedule a call