Hire the best Cybersecurity Enterprise developers
Check out Cybersecurity Enterprise developers with the skills you need for your next job.
- $20 hourly
- 5.0/5
- (647 jobs)
Need help to recover your HACKED & DISABLED social media accounts in the least possible time? You are at right place if you have lost access to your personal or business social media account (s). Lost credentials or your account got hacked. Your account was disabled by a mistake. You want to remove old accounts or remove your content from search engines or social media. Or if have any other Instagram and Facebook related issue. You might have tried available support options and scrolled through forums but could not find help because: I have been providing virtual assistance with the related issues for a long time and enjoying my successful journey. I have proudly offered my clients to pay only after the successful results and resolved hundreds of cases. You will find the support and solution for almost every kind of issue related to the Instagram and Facebook and other social media platforms with full compliance to ethics and respective platform's terms and service. I would love to answer your queries for free of cost and will suggest a way forward that would help you to accomplish your goals. Please send me a message with issue details and screenshots (if feasible). Invite me for the interview if your: Facebook account is disabled. Instagram account is disabled. Facebook account is restricted. Instagram account is restricted. Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Or if you are seeking help for: Recover hacked Instagram account Facebook recovery Instagram restoration Facebook restoration Instagram security Facebook security Instagram verification Facebook verification Instagram & Facebook Integration Instagram & Facebook Marketing Recovery of account in case of lost credentials Recovery from underlying technical issues, bugs and glitches Snapchat issues LinkedIn issues TikTok issues Social media content removal Facebook Instagram Integration Facebook and Instagram verification problem Facebook content removal Instagram content removal Instagram fake followers removal Instagram fake accounts removal Facebook fake accounts removal ''DON'T FORGET TO READ THE REVIEWS ON MY PROFILE'' Disclaimer: Write me about the issues related to your ''own'' social media account (s) or only if you are an authorized representative. Avoid making requests that are not compliant with Upwork and Instagram's terms of service. You will get ethical virtual assistance to get your problem resolved through this channel. Thank you for your precious attention. Looking forward to your invites. Anxiously waiting for assisting you better. :)Cybersecurity Enterprise DevelopersSocial Media MarketingSocial Media Account SetupInstagram APIInternet SecurityTechnical SupportInformation SecurityNetwork SecurityVulnerability AssessmentEthical HackingTroubleshootingData RecoveryCybersecurity ManagementSocial Media ManagementInstagramFacebook - $78 hourly
- 4.9/5
- (8 jobs)
Hello, I have hands on experience in the following: - Writing governance, risk management policies - Technical writing and documentation - ISO 27001, NIST, CSF compliance; preparation, implementation, maintenance - Risk management; assessment, mitigation. - Standing up or maintaining your GRC program - Incident management; detection, handling. - SIEM / Microsoft Sentinel (Baselining, monitoring, alerts, rule analytics, playbooks) - Cloud Forensics and incident response - AWS, Microsoft Azure & O365 - Incident awareness and preparedness - Building executive tabletop cyber exercises - Building educational material - Expert PowerPoint slide decks. - Communicate complex subjects in easy visual slides for your C-Suite - CIS Version 8.1 Controls Assessment Book a consultation through Upwork or Cyberandcoffee.comCybersecurity Enterprise DevelopersCybersecurity ManagementRisk AnalysisStrategyNetwork EngineeringPrompt EngineeringNIST SP 800-53NIST Cybersecurity FrameworkDigital ForensicsIncident ManagementIncident Response Readiness AssessmentEnterprise Risk ManagementCertified Information Security ManagerISO 27001Risk ManagementProblem Solving - $165 hourly
- 5.0/5
- (29 jobs)
I am an accomplished and experienced Cyber Security Engineer, CISO, and consultant with over 20 years experience in government, commercial, non-profit and private organizations. I'm a Certified Information Systems Security Professional (CISSP) and CMMC Registered Practitioner. My education includes a Master's degree in Information Assurance and Security specializing in Digital Forensics, a Bachelor's Degree in Information Technology, and daily, hands-on work governing, securing and administering complex information technology environments. My current efforts include cybersecurity compliance implementations for regulated industries and government contractors including the NIST Cybersecurity Framework, Risk Management Framework, NIST SP 800-171, and Cybersecurity Maturity Model Certification (CMMC). For those not bound to other regulatory guidelines, I assist with implementation of the Center for Internet Security (CIS) Critical Security Controls and the CIS Risk Assessment Method. I assist with expert advice, gap assessments, requirements and implementation reviews. I help develop and refine cybersecurity documentation including System Security Plans, POA&Ms, and Policies and procedures. I will share national background check results for qualified opportunities.Cybersecurity Enterprise DevelopersGap AnalysisVulnerability AssessmentCybersecurity MonitoringAmazon Web ServicesGovernance, Risk Management & ComplianceSecurity EngineeringCloud SecuritySecurity Policies & Procedures DocumentationInformation Security AwarenessCybersecurity ManagementNetwork SecurityCertified Information Systems Security ProfessionalInformation Security - $75 hourly
- 5.0/5
- (2 jobs)
Dynamic Cybersecurity and AI Consultant that specializes in transforming digital security landscapes through cutting-edge solutions. With a proven track record of identifying risks and architecting intelligent, robust defenses, I work with clients to enhance their security posture and protect critical assets. My expertise lies in leveraging advanced AI technologies to detect, mitigate, and respond to cyber threats proactively. I am passionate about redefining cybersecurity standards by integrating AI-driven insights and innovation solutions to stay ahead of emerging threats. Core Competencies: - AI-Driven Cybersecurity: Expertise in using AI to enhance threat detection, incident response, and risk management. - Solution Architecture: Proficient in designing and implementing intelligent security solutions tailored to organizational needs. - Strategic Planning: Experienced in developing comprehensive security strategies and roadmaps. - Program Leadership: Lead and manage comprehensive security programs, implementing cutting-edge cybersecurity solutions and performing detailed security assessments to ensure robust protection. - Continuous Improvement: Committed to the ongoing refinement of security measures through AI advancements. Active Certifications: - Certified Information Systems Security Professional (CISSP), ISC2 - Project Management Professional (PMP), PMI Let's collaborate!Cybersecurity Enterprise DevelopersIT Career CoachingPCI DSSInformation Security GovernanceInformation Security AuditInformation Security AwarenessInformation SecurityNIST Cybersecurity FrameworkIT ConsultationIT Compliance AuditVulnerability AssessmentMicrosoft ProjectZero Trust ArchitectureProject ManagementGovernance, Risk Management & ComplianceCybersecurity Management - $150 hourly
- 5.0/5
- (167 jobs)
I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startups and micro, small, and mid-sized companies create secure operating environments to increase business opportunities. I am also part of Upwork's Expert-Vetted Talent program. My priority is to create cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold a bachelor's degree in Telecommunications Engineering from the Airforce University in Argentina, a master's degree in Information Security Engineering from the SANS Technology Institute, and many cybersecurity certifications, including CISSP (Certified Information Systems Security Professional) and GSE (GIAC Security Expert).Cybersecurity Enterprise DevelopersWordPress Malware RemovalMalware RemovalCMMCRisk AssessmentCloud SecurityInternet SecurityInformation Security AuditInformation Security AwarenessSecurity EngineeringSecurity AnalysisEmail SecurityPenetration TestingInformation SecuritySecurity Policies & Procedures DocumentationCybersecurity Management - $80 hourly
- 5.0/5
- (61 jobs)
Aussie 15+ Years Professional GNU/Linux Sysadmin, Expert. Published Security Researcher, Penetration Testing. ISO 27001:2022 Expert. Very active on GitHub, Twitter, HackerOne & BugCrowd. PRO: Shell, Python, JS, PHP, C, C++, x86, arm, mips, xtensa/esp32. 1,000s of teams use my projects, in their projects. You can send me product hardware as part of firmware/hardware projects. High level communicator; My native language is English. I love complex, novel tasks, that require problem-solving. My day work involves conducting static code analysis, binary analysis, web application security research, and presenting at conferences. I am able to work extremely fast. What might take someone 4 hours, takes me 15 minutes. In my spare time, I ride motorcycles, and break hardware open and report vulnerabilities to major manufacturers, usually for money (bug bounty). Maintaining multiple massive Open Source Projects on GitHub: Trending software, 30,000+ GitHub Stars, 500,000 Downloads, 1,000+ forks - 3,000+ Comment Karma on reddit. I publish code, exploits, and research which are assigned Common Vulnerabilities and Exposures (CVEs). Used by Enterprise & Governments all around the world to validate their security posture. I graduated from the University of Melbourne. Very experienced in all of RHEL/CentOS/Fedora, Ubuntu/Debian, Arch/Majaro, Raspberry Pi/Odroid/Armbian, FreeRTOS/nuttX, CI/CD, Automation, DevOps, Git, Docker, etc. I have over a decade of experience specifically in writing & securing Web Applications, providing advisory & consulting Cyber Security services, hardware reverse engineering (as a service), code decompiling/deobfuscation, intrusion detection, and knowledgable about techniques used by threat actors, e.g. malvertising, ad cloaking. Extremely good at sophisticated automation, reversing cloaked ads, proofs of concept and creating code that can perform human tasks. - MaxMind, DB-IP GeoIP, DNS/Bind9 Servers, residential proxies, OpenVPN, WireGuard, VestaCP, CPanel, Git, Docker, DevOps: CI/CD pipelines, VPN Kill-Switches, automated proxy switching, Selenium, Puppeteer, Chromedriver & Geckodriver - Distil, Akamai, PerimeterX, Cloudflare, Captchas (protection & solving). - nginx, apache, httpd, iptables, ufw, fail2ban - Penetration testing: thousands of (ethical) hackers around the world follow my work - ISO 27001, ISO 21434 pre-auditing, and reporting. - Bullet-proof offshore hosting & domains and investigations - Google Cloud, Microsoft Azure, AWS, Digital Ocean, Vultr, OVH, Rackspace, Heroku - Twilio, TwiML, SIP, SMS, GSM, Asterisk, VoIP, FreePBX, iSymphony, Phone Systems & Virtualized Call Centers, Call Recording - Google Cloud, Microsoft Azure, AWS, Digital Ocean, Vultr, OVH, Rackspace, Heroku - Jailbreaking, Android, iPhones, mobile forensics & data retrieval - iOS App inspection, CI/CD pipeline (fastlane, automated build & automated release) - Azure, AWS, Office365. - High knowledge on Pop-Up Ads, Pop-Unders, Honey-Pots, PPV, Tracking, Voluum, TDS, Keitaro, BossTDS, Ads - Captive Portals: OpenWRT, Splash Pages, nodogsplash, coova chilli, wifidog, etc. - Website takedowns, search engine removal, DMCA and "Right to Be Forgotten" requests. I love working on new challenging projects and surprising my clients with unique & creative solutions. Always thinking outside the box and my experience in research, development, and solutions reflect this. Proudly a top-rated freelancer on Upwork (100% Success) for this reason. As a professional in telecommunications, I am very good at communicating with people about technical solutions because my day-to-day job previously was Cloud-Based Contract Sales for Telstra, which is the biggest telecom company in Australia; Technical Solutions and B2B sales in Data, Voice & Fiber. I'm a Linux expert and can write amazing code, applications, and scripts, in many different languages. My favourite languages are C, C++, Python and shell (BASH/POSIX). I am also very good at PHP, JavaScript and other interpretted languages. I am a master of Docker. Can create all types of interfaces, ncurses, GUI's, GTK, QT. I can create SAAS-grade internal-use scrapers & browser automation: cURL, Selenium (chromedriver/geckodriver), auto-scaling, auto-deploy. I've written the backend for various high-traffic and high-value services. Great at solving problems - being able to see solutions that are outside the box and use creative techniques to manipulate data or market analysis through big-data scraping. Hope to work with you and your business.Cybersecurity Enterprise DevelopersData ScrapingScriptingInformation SecurityMalware RemovalPenetration TestingSecurity TestingWooCommerceBashEthical HackingLinuxSystem AdministrationBot DevelopmentAutomationCybersecurity Management - $150 hourly
- 5.0/5
- (282 jobs)
I am a cybersecurity professional with a Master's Degree in Cyber Operations and two years of work experience in cybersecurity research and development at a world-class R&D laboratory. In that job, I gained experience in network traffic analysis, malware analysis, and cryptography. For the past seven years, I have worked as a freelancer, providing content development, course creation, and consulting in cybersecurity and blockchain security. I specialize in development of technical content (blogs, whitepapers, case studies, and courseware) in the field of cybersecurity. I currently hold the Certified Ethical Hacker and Certified Blockchain Security Professional certifications.Cybersecurity Enterprise DevelopersReverse EngineeringCryptocurrencyBlockchainCryptographyInformation Security - $30 hourly
- 5.0/5
- (7 jobs)
CISM-certified Cyber Security Consultant with 9 years of experience implementing and managing comprehensive security solutions. Expertise in endpoint protection, SIEM solution, cloud security and penetration testing. I have a strong ability to assess, mitigate, and respond to complex security threats. I am experienced in leading security projects, creating tailored policies, and providing expert guidance to organizations of all sizes. Experienced in working with global teams across time zones, cultures, and languages AREAS OF EXPERTISE * Vulnerability Assessment and Penetration Testing (VAPT) * Endpoint Protection * Threat hunting * SOC Architecture and Implementation * Threat Detection and Incident Response * Azure and Microsoft 365 SecurityCybersecurity Enterprise DevelopersIncident ManagementMicrosoft Endpoint ManagerCloud SecurityCloud Security FrameworkInformation SecurityIncident Response PlanPenetration TestingVulnerability AssessmentSystem Security - $40 hourly
- 4.2/5
- (113 jobs)
Hi there, I'm Ehtisham Sabir, an experienced Python developer with a strong background in web development, both on the backend and frontend. I also possess significant expertise in the blockchain space, including Binance Smart Chain, Cardano, Tron, and Cosmos. My core competencies lie in data analysis, data structures, web scraping, crawling, and Async programming. As a full-time freelancer, I pride myself on delivering quick results, often within a few hours, depending on the project's complexity. Recently, I've been actively involved in projects utilizing chatgpt and openAI, developing systems with the Django framework, specifically NET BOX. I have created numerous Cardano stake pools and built software solutions to extract data from diverse websites, such as social networks, e-commerce platforms, and business listings. My expertise extends to RDMS and NoSQL database systems like PostgreSQL/MySQL and MongoDB, and I am well-versed in Linux and cloud platforms like AWS, DigitalOcean, and Google Cloud. Additionally, I have a wealth of experience building web services with Flask, Django, and FastAPI, covering areas such as image recognition, PDF data extraction, voice recognition, face recognition, machine learning, artificial intelligence, neural networking, deep learning, comments scraping, Reddit scraping, data sets, data frames, data visualization, corpus, dictionary, CSV, pandas, data frame, Twilio app, Twilio API, Telegram bot, Discord bot, chatbot, Python Bot, Reddit Bot, WordPress, Telegram bot, product scraper, and PLEX on Linux. I have expertise in multiple operating systems, including Ubuntu, Linux, Kali Linux, CentOS, macOS, Windows, RED Hat, Fedora, and Mint. Throughout my career, I have successfully completed various NFTs & Crypto related projects using React, Python, and RUST. Whether it's improving existing code or building python programs from scratch, I am confident in my ability to meet your requirements. Feel free to contact me to discuss your project needs! Best regards, Ehtisham SabirCybersecurity Enterprise DevelopersWeb CrawlingWeb ScrapingBitcoinDjangoAPI DevelopmentTwitter/XCardanoSelenium WebDriverBlockchainPHPUbuntuData ScrapingAWS LambdaFlaskPython - $150 hourly
- 4.7/5
- (123 jobs)
I have over 20+ years 🏅 of experience in Cloud, System, Network, and Security Administration. My primary focus is on first understanding business objectives and then providing technical solutions. Communication and customer satisfaction are my top priority with every project. 👈👈👈 You are contracting someone who is an expert in multiple areas. Many projects start with an idea of what the problem is, only to find out it is something else. You won't have to go find another expert in that area to get the job done. 🏆🏆🏆 🌟 I have worked with clients of all sizes and all industries 🌟 ✔ MSPs ✔ Government ✔ Insurance ✔ Education ✔ Dallas Cowboys Football Stadium 🌟 Here are my core competencies 🌟 ✔ Server Administration: Windows and Linux ✔ Virtualization: VMware, Hyper-V, and Proxmox ✔ Network Administration: Switches, Routers, Load Balancers, and Wireless ✔ Cloud Administration: AWS, Azure, Vultr, OVHCloud, and Hetzner ✔ Cloud Productivity: Google Workspace and Microsoft 365 ✔ Firewall Administration: FortiNet/FortiGate, Cisco, Juniper, pfSense, Ubiquiti, Sonicwall, etc. ✔ Security Administration: Firewalls, Site-to-Site VPN, Remote Access VPN, Multifactor Authentication, and Endpoint ProtectionCybersecurity Enterprise DevelopersWindows AdministrationData MigrationVMware AdministrationDNSOffice 365Backup & MigrationCloud SecurityGoogle Workspace AdministrationEmail SecurityAcronisFirewallCloud MigrationNetwork AdministrationSSLVPN - $18 hourly
- 5.0/5
- (11 jobs)
I worked with top financial institutions as risk management analyst. My roles include recovering financial losses due to fraud and fraud investigation. I also have experience doing customer service and email support jobs for savings account and internet banking. My other skills are music production and arrangement. I have been producing tracks for 7 years. I have skills in FL studio.Cybersecurity Enterprise DevelopersEmail CommunicationRisk AnalysisCustomer ExperienceProject Risk ManagementFraud MitigationFraud DetectionRisk AssessmentCybersecurity ManagementCustomer Service - $165 hourly
- 5.0/5
- (49 jobs)
✅ Upwork Top 1% Expert Vetted ✅ 6500+ Hours ✅ 100% Success Score Hi, I'm Adam, an experienced CTO, team lead, and cybersecurity expert based in London, UK. With a proven track record of success, I've worked with hundreds of clients worldwide, guiding their projects from the idea stage through to completion, launch and growth. My experience, coupled with my deep technical expertise, allows me to be very hands on and practical when needed, and consistently deliver amazing results. If you’re dealing with missed deadlines, poor quality work or technical problems that your team are struggling to solve, I can help. I'm a Chartered Engineer (CEng) and a Chartered IT Professional (CITP), I and also hold a range of industry leading technical certifications including the CISSP, CISA, CISM, OSCP and OSCE. Clients commonly engage me to: - Hire and/or manage their technical team - Design and build technical solutions - Help solve complicated technical problems - Help scale a technical product to support and meet business growth - Assess or rescue failing projects - Explain and help mitigate business threats and risks (e.g. security, disaster recovery, backups and redundancy) - Provide an audit and unbiased technical opinion and "explain the options" I enjoy working with startups and fast moving projects, and solving complex challenges. My full profile including more testimonials, technical qualifications and a link to book a free strategy call is available at consultwithadam.comCybersecurity Enterprise DevelopersInformation Security ConsultationNetwork SecurityProduct RoadmapLAMP AdministrationInformation SecurityAndroidInternet SecurityEmbedded SystemLaraveliOSWeb DevelopmentPHPPenetration TestingWeb ApplicationVulnerability Assessment - $55 hourly
- 4.9/5
- (45 jobs)
I’ve helped companies get ISO 27001/SOC-2/PCI-DSS/FedRAMP/CMMC certifications and compliance against standards such as NIST and HIPAA. I offer 𝗠𝗢𝗡𝗘𝗬-𝗕𝗔𝗖𝗞 𝗚𝗨𝗔𝗥𝗔𝗡𝗧𝗘𝗘 to my clients against ISO 27001, SOC 2 and PCI-DSS compliance! Are your clients requesting security certifications or compliance against HIPAA, ISO 27001, SOC 2, PCI-DSS, or FedRAMP etc.? Do you want a cost effective solution for achieving and maintaining compliance? Do you want help is filling out the security assessment questionnaires and want someone to respond in a way that you are able to win the deal? Do you want surety/ confirmation that your certification project will be a success and you won't loose money over consultation? If you have already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, OneTrust Compliance Automatization/Tugboat Logic, SecureFrame, and so on) but don’t have the time and energy to achieve and maintain compliance, Do you want to know and enhance your company's current security posture? MY PROFILE I have over 9 years of experience and have worked within IT GRC (Governance, Risk, Compliance), internal controls and review assurance roles within financial, telecom, fintech and banking industry. The combination of Information technology, accounting & auditing has molded me into an individual who can perform IS Audits (General Controls, Application Controls, Specialized Audits, IT policy & SOPs), IT risk reviews (Risk Assessments, BCP & DR, Risk Mitigation & Control Design), Functional Reviews & QA (Quality Assurance) Services, IT security consultancy (IS Policy & Implementation under different frameworks i.e. 27001, NIST, COBIT 5, PCI, HiTrust, HIPAA, GDPR, SOC 2, SOX) and pre-implementation & post-implementation project reviews, BRD creation by following industry best practices. I can secure your cloud environment with expertise in AWS and Azure by following security hardening best practices. MY CREDENTIALS - CISSP (Certified Information Systems Security Professional) - USA - CISA (Certified in Information System Audit) - USA - CRISC (Certified in Risk & Information Systems Control) - USA - CGEIT (Certified in Governance of Enterprise IT) - USA - SQL Fundamentals (Oracle) - CEH Certified (Certified Ethical Hacker) - Cyber security Fundamentals Certification - Kaspersky - Google Analytics - NSE 5 (Network Security Analyst) Tags: Information Security Analyst Chief Information Security Officer ( CISO ) Information Security Manager SOC Analyst SOC (Security Operations Center) Tools: SIEM, CrowdStrike Falcon, Fortinet, FortiAnalyzer, FortiGate, FortiSIEM, Stellar Cyber, Cylance, Splunk, AWS CloudWatch, Microsoft Defender (Azure), AWS CloudTower, GCPCybersecurity Enterprise DevelopersInformation Security ConsultationInformation SecurityCybersecurity ManagementSecurity Policies & Procedures DocumentationPCICloud Security FrameworkNIST SP 800-53SOC 2HIPAAInformation Security AuditIT General Controls TestingSecurity Operation CenterISO 27001SOC 2 Report - $36 hourly
- 4.9/5
- (43 jobs)
As an expert in guiding companies to the Cloud with comprehensive DevOps solutions, I rank in the top 1% of Upwork talent. With over 8 years of experience as a Cloud DevOps Engineer and nearly 12 years in IT, I bring extensive expertise in cloud infrastructure, automation, security, and the development of highly scalable, cost-effective, and highly available systems. I specialize in DevSecOps, leading teams through research and innovation to build secure, scalable solutions. Key Expertise: Infrastructure as Code (IaC): • Terraform • CloudFormation • Ansible • Packer Containerization & Orchestrations: • Docker • Kubernetes • AWS ECS (EC2 & Fargate) • AWS EKS • Docker Hub • AWS ECR Servers: • Amazon Linux • Ubuntu • CentOS • Redhat • Windows Servers DevOps: • Docker • Kubernetes • Terraform • Jenkins • CodePipeline • CodeBuild • Github • Bitbucket • Git • TFS and many more... Amazon Web Services: • EC2 • ECS • EKS • VPC • S3 • CloudFront • ALB • RDS • Elastic Beanstalk • Lambda and many more.... System & Network: • Amazon Linux/CentOS/Ubuntu/Redhat • Windows Servers • Active Directory • OpenVPN, IPSec • Workspaces • TCP/IP and many more... Web & Databases: • Apache, Nginx, IIS, Apache Tomcat • DynamoDB • DocumentDB • Aurora RDS (MySQL, SQL Server, PostgreSQL, MariaDB) • MongoDB (Atlas & Hosted) • Redshift Compliance & Governance • WAF • AWS Well Architectured Tool • CloudTrail • Config • Systems Manager • Control Tower • AWS Compute Optimizer Analytics Tools: • ElasticSearch • Athena • Kinesis • QuickSight • Logstash • New Relic • Kibana Scripting and Automation • Bash • PythonCybersecurity Enterprise DevelopersCloud EngineeringSolution ArchitectureAutomated MonitoringTerraformInfrastructure as CodeCI/CDCloud ComputingAWS ApplicationCloud SecurityCloud ManagementDevOpsAmazon Web ServicesCloud ArchitectureNetwork SecurityCybersecurity Management - $25 hourly
- 4.7/5
- (12 jobs)
Highly motivated and experienced professional, with experience in supervisory positions, seeking opportunities in career fields complimentary to my experience and expertise in project management, IT, customer service support and/or customer training and mentorship. Exceptional understanding of IT concepts, cyber security and/or project management. Expert knowledge of office automation software and hardware tools, to include the MS Office Suite.Cybersecurity Enterprise DevelopersRisk AssessmentGap AnalysisSecurity Policies & Procedures DocumentationIT Compliance AuditContent WritingDisaster Recovery PlanNIST SP 800-53Governance, Risk & Compliance SoftwareCybersecurity ManagementResume WritingCompany PolicyData PrivacyCertified Information Systems Security ProfessionalInformation SecurityISO 27001Tech & IT - $75 hourly
- 4.9/5
- (192 jobs)
As a dedicated Microsoft 365 Solution Architect, I specialize in optimizing and securing digital workplaces using M365 and Azure technologies. With an extensive background in migrating emails and files to Microsoft 365, I ensure seamless transitions to SharePoint Online and Teams, enhancing collaboration and productivity. Certifications: Microsoft 365 Certified: Identity and Services (MS-100) Mobility and Security (MS-101) Security Administration (MS-500) Managing Microsoft Teams (MS-700) Expertise in Microsoft 365 Services: Security & Compliance Microsoft Teams & Exchange Online Advanced Threat Protection (ATP) SharePoint Online & OneDrive for Business Power Automate & Microsoft Forms I am also a Certified Mimecast Technician, emphasizing my commitment to robust email security solutions. My experience spans multiple successful migrations to Microsoft 365, demonstrating my ability to leverage M365's full potential to meet diverse organizational needs.Cybersecurity Enterprise DevelopersMicrosoft TeamsInformation Security ConsultationDomain MigrationMicrosoft Power AutomateEmail DeliverabilityEmail SecurityData MigrationOffice 365Microsoft Exchange ServerEmail CommunicationMicrosoft Windows PowerShell - $30 hourly
- 4.8/5
- (182 jobs)
🏆 TOP RATED Freelancer | ⚡ 12+ Years of Experience. As an AWS Cloud Engineer and Linux System Administrator with expertise in WordPress development, administration, and malware removal, I empower businesses to create secure, scalable online environments using top cloud providers like AWS, Google Cloud Platform (GCP), and Microsoft Azure. My skill set spans comprehensive cloud management, efficient system administration, and advanced WordPress security, ensuring that your digital assets are protected, high-performing, and tailored to your business needs. With experience across major cloud platforms and a focus on WordPress security and optimization, I bring both reliability and innovation to each project. In my work with AWS, GCP, and Azure, I manage robust cloud infrastructures designed for cost efficiency, high availability, and airtight security. From configuring EC2 instances and S3 storage on AWS to leveraging Google Compute Engine and Azure Virtual Machines, I create cloud architectures that scale with your business. My approach integrates seamlessly with your applications, ensuring data protection, scalability, and optimal cost control across multi-cloud environments. As a Linux System Administrator with expertise in Ubuntu, CentOS, and Debian, I excel in server management, security hardening, and performance tuning. Whether setting up firewalls, managing access controls, or troubleshooting advanced server issues, I work to maximize uptime and stability. My experience with NGINX, Apache, and database management enables me to secure and optimize Linux servers that power mission-critical applications, providing a robust foundation for your online presence. My WordPress expertise covers development, administration, and malware removal. I handle everything from custom theme and plugin development to managing site administration and implementing security measures. Leveraging tools like Wordfence, Sucuri, and SSL protocols, I ensure your WordPress sites are secure, updated, and optimized for performance. With proactive security practices and thorough audits, I keep your site resilient against threats, allowing you to focus on growth without worrying about vulnerabilities.Cybersecurity Enterprise DevelopersRed HatDockerApplication SecurityTroubleshootingSystem SecurityDevOpsMalware RemovalLinux System AdministrationWordPressVirus RemovalNetwork EngineeringCloud Security FrameworkCloud ComputingSystem AdministrationAmazon Web Services - $30 hourly
- 4.6/5
- (91 jobs)
I have executed some 44 projects in upwork in information security, governance, IT service management, SIEM, and others and earned customer accolades. I continue to nurture my skills that will benefit my customers. I am all for value creation in IT because every penny spent must return value and do the business and IT a secure and safer workplace. Govind has spent 25 years in the IT and he is - ISO 27001 Lead Implementer from PECB Canada - ITIL Expert V3 , ITIL4 FL, ITIL4 MPT Certified - Certified ISO 27001 Lead Auditor, ISO 22301 Lead Auditor, ISO 20000 Lead Auditor - COBIT5 certified in the IT Governance - PMP, PRINCE2, - CSQA, - ISO 20000 Implementer - DevOps Master Currently pursuing education in CISSP and Data Privacy Skills :- Over last decades he has extensively worked and provided solutions in below areas. He brings multiple skills. - Implementing GRC - HIPAA, SOX, PCI/DSS, HITRUST 9.3, FedRamp, SOC2 (T1/T2) - Implementing Unified Controls for Security (UCF) - Implementing Information Security framework using ISO 27001/SOC2/ISO 22301 - Cybersecurity incident response management using NIST, SANS, ISO 27035, COBIT - Risk Assessment, IT Auditing - Jira Implementation both Project and ServiceDesk - Gap Analysis of IT Asset management, Compliance, COBIT Processes - Implementing Best Practices using ITIL/COBIT5 Processes - Implementing BPM Solutions using Appian, Bonitasoft, AgilePoint - Implementing Monitoring framework for IT Devices using Zabbix - Performance and Capacity solutions - Workflow automation - IT Service management using ServiceNow as a architecture - Implementing DevOps End to end for CI, CT, CD - Gap Analysis for CMDB and road map for improvements - A well groomed developer in scripting and development in various technologies - Attlasian Jira admin activities - Robotic Process Automation using UIPath, BluePrism, AutomationAnywhere Education : He is a post graduate in the Statistics with a specialty in Operations research and SQC. He then did Post graduate diploma in the Reliability. He has worked in niche technologies and fortune 500 clients since 2 decades across the globe. Extras :- He is editor of a book called "How to reduce cost of software testing" published by CRC Press and has spoken in conferences and written articles. Passion for Excellence:- He is passionate on creating value in the information technology space and is doing research in various areas such as IT Asset management, IT Cost management, Performance and scalability management. He is eager to help clients in below skills a.Implementing IT Governance, Risk and Compliance using COBIT5 framework b.Implementing ITIL best practices c.Implementing Test Automation using Selenium and other tools d.Implementing DevOps solutions in cloud and non cloud e.Implementing Security solutions using ISO 27001 and COBIT5 framework f.Implementing Business Process Automation using Bonitasoft, Agilepoint NX, Appian, BPM Online and others g.Implementing SIEM using Zabbix and other tools h.Implementing ServiceNow ITSM Tool as an architect i.Implementing a monitoring framework using Zabbix for capacity management j.Compliance like HIPPA, PCI DSS j.IT Audits Availability : I am available for assignments immediately on request. Major clients Worked : British Telecom, MetLife, Liberty Life, Euromax, Covad, UHI and many more. Visas : I had H1 Visa US, WP for UK, Netherlands, South Africa. Currently have B1 visa for US and can travel if there is a need Will be glad to associate to create value in ITCybersecurity Enterprise DevelopersProject Risk ManagementUnified Threat ManagementISO/IEC 20000Business Continuity PlanRisk AssessmentHITRUST Common Security FrameworkPCISOC 2 ReportGovernance, Risk Management & ComplianceITILInformation SecurityISO 27001HIPAAComplianceCOBIT - $70 hourly
- 5.0/5
- (5 jobs)
My technology background has allowed me to quickly understand and grasp many tech concepts, focuses, and applications. This background showed me how to merge web design, cybersecurity, education, graphic and visual designs, together with business strategy and other technology to help give your business the best overall technology plan. Either in pieces or all together, no matter your project I can help you navigate and figure out the best technology, build it for you, and make sure it looks good at the same time!Cybersecurity Enterprise DevelopersComplianceCloud ComputingIT Compliance AuditSystem ConfigurationPCI DSSBrandingNetwork SecurityCloud SecurityInformation SecurityTech & ITOffice DesignCloud Security FrameworkCompliance ConsultationPresentationsBrand ConsultingGraphic DesignHTML - $30 hourly
- 5.0/5
- (92 jobs)
I'm a Penetration Tester and Cyber Security Specialist who is a professional in evaluating the security posture of Web-Applications (Websites) and ensuring the security of personal clients' online identities, accounts, devices, and networks, I've possessed my current knowledge through 3+ years of self-study and research plus 2+ years of work in the industry, protecting clients on a personal level and running vulnerability assessments against business websites, always leaving positive impression and impact, I hold a great record of being able to expertly provide the following services: - Perform comprehensive security checkups on Emails and Phone numbers and pinpoint security holes which often lead victims to be hacked with zero interaction nor awareness from them. - Assist in Account Recovery (Ex. Instagram, Facebook) - Educate thoroughly on the findings and remediations for a vulnerable target, equipping clients with enough information to trust themselves as they continue to utilize the technologies as normal with no fear of being targetted by hackers. - Investigate and educate on online frauds/scams, especially crypto ones, why and how they work, and how to distinguish between legit and not legit easily. - Clean up networks and devices from viruses/malware and ensure optimal patching for security. - Report fraud websites that impersonate legit businesses for a takedown. IMPORTANT: When it comes to cybersecurity-related services, there is a number of scammers not to be underestimated, whether within or outside of Upwork, therefore stay vigilant and keep in mind the following, 1. If you were scammed online via crypto, there's no one out there with the right to give a guarantee that they will be able to recover it for you despite how well furnished the so-called hacker's portfolio appears to be, the chance remains very slim and you should only pursue this kind of service for the sake of leaving no stone unturned knowing the high probability of failure, and you should only select a freelancer with a reputable profile and reviews to back up their activity because scammer accounts are usually fresh with no reviews and no verified ID, feel free to consult me to evaluate that. 2. Same applies to the request of hacking an account, there are complicated caveats that explain why it DOES NOT work the way you think it does but to keep it short, if you want someone's account hacked, aside from it being illegal and unethical and isn't the type of "service" I provide, the chance for it to work is about 1% to begin with, again, I'm available for consultation, account recovery is a different subject with a higher probability for success as long as it's your own account that was lost/hacked.Cybersecurity Enterprise DevelopersMalware RemovalInformation SecurityVulnerability AssessmentSystem SecurityNetwork SecurityInformation Security ConsultationWebsite SecurityPenetration TestingNetwork Penetration TestingInternet SecurityEthical HackingSecurity TestingSecurity Assessment & Testing - $120 hourly
- 5.0/5
- (12 jobs)
I’m Sarah and I am a cyber security professional who specialises in writing Information Security policies. I have worked for both regional and global companies to develop the required suite of policies to uplift their cyber security posture and help their teams understand the part they play everyday in keeping information safe. I have expertise in developing policy frameworks and Information Security policy writing (inc. policies for Information Security, acceptable use of IT, vulnerability management, third party risk management, passwords, acceptable use of email, incident response etc). I have experience of working with industry standards and frameworks such as ISO 27001, NIST and CIS controls. I am passionate about helping businesses to improve their cyber security posture through developing the required set of policies to provide secure guidelines for you and your organisation to follow. Whether you are starting off with setting up a foundational baseline, creating new policies or uplifting existing policies - get in touch and let me know how I can help.Cybersecurity Enterprise DevelopersISO 27001Policy WritingInformation SecurityCybersecurity ManagementSecurity Policies & Procedures Documentation - $25 hourly
- 4.5/5
- (3 jobs)
✅ Certified Ethical hacker!✅ Penetration tester!✅ Top Rated! ✅ It's Me Fazle Rabbi Khan, I am a Certified Ethical Hacker(CEH-v12) and Professional Penetration tester an expert in Web, API, Android, and iOS Application Penetration testing. I will provide you cybersecurity plan to protect all your websites, computers, Mobile phone, and online accounts. Protect your online business by testing the Security/ Penetration testing of your website to discover all the security vulnerabilities before cybercriminals exploit them! I will conduct a complete Penetration testing & security review of your web, Android & iOS application. ****HERE’S WHAT I SPECIALIZE IN**** -Server Security Misconfiguration -Broken Authentication and Session Management -Sensitive Data Exposure -Insecure OS/Firmware -Broken Cryptography -Automotive Security Misconfiguration -Sensitive Data Exposure -Cross-Site Scripting (XSS) -Broken Access Control (BAC) -Cross-Site Request Forgery (CSRF) -Application-Level Denial-of-Service (DoS) -Insecure OS/Firmware -Server-Side Injection -Client-Side Injection -Sensitive Data Exposure -Malware Detected -Location Tracking -Networking -Network security control -Cloud security -Mobile device management -SIEM management -Intrusion detection -Penetration testing -Digital forensics -Coding -WordPress Website Maintenance -WordPress Website Security Optimization & Firewall Configuration -WordPress Website Malware Audit & Removal -WordPress Website Speed Optimization. You also need someone who has the technical and non-technical skills required to protect your company. So if you are ready to secure your network, conduct a Penetration test, build a cybersecurity plan, or do anything else cybersecurity related, please do not hesitate to reach out to me! Thanks for reading this far and I am looking forward to working with you. . THANK YOU!Cybersecurity Enterprise DevelopersSecurity AnalysisWeb DevelopmentOffice AdministrationSecurity EngineeringWebsite SecurityEthical HackingNetwork Penetration TestingKali LinuxInformation SecurityNetwork SecuritySecurity Assessment & TestingPenetration TestingSecurity TestingVulnerability Assessment - $100 hourly
- 5.0/5
- (26 jobs)
I'm a cloud infrastructure engineer, security researcher, and an occasional developer. I have experience building and maintaining enterprise grade SECaaS and IaaS solutions for some of the county's top ISPs, and I consistently publish vulnerability disclosures for some Fortune x companies. Note ::: Rate varies depending on the subject matter. For security-specific issues, check the Information Security tab. For Workspace Admin. issues, visit the Tech Support tab.Cybersecurity Enterprise DevelopersDigitalOceanCloud SecurityWeb DevelopmentIaaSAutomationKubernetesCloud ArchitectureGoogle Workspace AdministrationCloud Engineering - $25 hourly
- 4.6/5
- (44 jobs)
I am Cyber Security Engineer and DevSecOps, have more than 5 years of experience. I can do Penetration testing (Applications), IoT penetration testing and cloud penetration testing, system admin. All of my support / I can help you with the following: ✅ Web application security ✅ API security ✅ Network Infra security ✅ Cloud Infra security ✅ Information security auditing Compliance ✅ OWASP top 10 Vulnerabilities findings ✅ HIPPA ✅ ISO 27001 etc. compliance Automated / Manual Vulnerability Assessment and Penetration Testing. (VA&PT) ✅ Security Best Practice - Web apps / Website - Server configuration - Cloud Infrastructure ✅ Network and Cloud Security * Prevent DDoS * Configure web firewall * Configure network firewall * Amazone Web Services (AWS) * Cloudflare integration. * Linux server issue (Redhat, CentOS etc.) * Proxy server configuration ✅ Source code vulnerability check. - Snyk - Sonarqube enterprise - Synopsys Coverity / Seeker. ✅ CMS security/recovery expert. - Wordpress - Magento - Joomla - Wordpress malware remove - Wordpress virus removal ✅ Recover hacked system ✅ Secure any Website/ web application ✅ Digital Forensic / Log analysis ✅ Forensic Android/IOS/Windows/Linux/MAC OS. ✅ Forensic Web server and Web application. ✅ IoT Security / Penetration Testing. ✅ Ransomware remove from the system. ✅ Conduct cyber security training. ✅ Remove any malware / Virus from your system. ✅ Mobile Device Management (MDM). ✅ SIEM Integration. ✅ IT Consultancy. ✅ Information Security Audit. Any task related to cyber security, system engineering & Cloud infrastructure.Cybersecurity Enterprise DevelopersInformation Security ConsultationInformation Security AwarenessSecurity AnalysisInformation Security AuditWebsite SecurityEthical HackingWeb App Penetration TestingCloud SecurityMetasploitCybersecurity ManagementSecurity Assessment & TestingPenetration TestingInformation SecurityApplication SecurityVulnerability Assessment - $40 hourly
- 4.1/5
- (17 jobs)
Cyber-attacks and data breaches are becoming a significant concern for all businesses in recent years. Therefore, information security is a critical component of every company’s success. It is imperative to protect data by designing, teaching, and implementing cyberattack prevention and mitigation strategies. A comprehensive Information and Cybersecurity framework is essential for health, manufacturing, financial, agric tech, and services-providing institutions. I'm passionate about helping discover and know invisible vulnerabilities in information security which might have grown and more visible over time, affecting your firm’s progress. As an experienced Information and Cybersecurity Analyst, I possess a proven track record of implementing and maintaining robust security measures to protect organizations' sensitive data and infrastructure and creating comprehensive online courses in information technology. With expertise in analyzing security risks, penetration testing, vulnerability assessment, and designing effective countermeasures, I am well-equipped to ensure the security and integrity of critical information assets with strong comprehensive research ethics. Throughout my career, I have been responsible for overseeing security operations, performing penetration testing, performing security audits and assessments, implementing security controls to mitigate risks, and implementing a zero-trust policy. My experience also includes conducting incident response investigations, managing security incidents, and developing disaster recovery plans. In addition, I possess strong technical skills in various security technologies, Technical Editing, Technical Documentation, Web Application Security, Network Monitoring, Security Analysis, Internet Security, and Application Security simulation, such as firewalls, intrusion detection systems, intrusion prevention, endpoint solutions, and antivirus software. I am also proficient in risk management methodologies, pen-testing, compliance standards, and regulatory frameworks, including PCI DSS, ISO, and GDPR. The ISO 27001 protocol defines the legitimate and functional institutional foundation for the information security sector and is thus crucial access point in business information security management the ISO 27001 protocol defines a legitimate and functional institutional foundation for the information security sector and is thus a key access point in business information security management. As an individual who is passionate about cybersecurity, I am always eager to keep myself updated with the latest threats and trends in the industry. I possess excellent analytical and problem-solving skills, concise research work, technical writing, strong attention to detail, and effective communication skills to collaborate with cross-functional teams and stakeholders. If you are looking for an Information and Cybersecurity Analyst who can provide comprehensive security solutions to safeguard your organization's valuable assets, and comprehensive research work. I would be delighted to explore opportunities to contribute my skills and experience to your team. Whether you're developing content for the C-Suite (CEOs, COOs, CIOs, CTOs, etc.), board members and external stakeholders, dev teams, clients, or a general audience - I know how to switch up styles to suit My secret? I'm a hard-core researcher, versatile, creative, and zero-trust policy-oriented. My goal is to contribute to your success story by solving the most basic of your business's network security, cybersecurity, documentation, complaint, auditing, policy drafting, IT security, and penetration testing needs. As far as qualifications go, I have over 7 years of experience, certified in Network Security, ISO 27001, CCNA, CEH, CISSP, and Network+. My specialties include: Information Security Security Analysis Internet Security Application Security Ethical Hacking Network Security Vulnerability Assessment Encryption Decryption VPN Web Application Java Penetration Testing Security Analysis Network Monitoring PCI Email Security Zero trust policy Data Protection Consultant Security Auditing Security Policy Development Data Privacy Compliance Security Frameworks (ISO 27001, NIST) Identity and Access Management (IAM) Security Awareness Training Security Engineering Information Security Awareness Security Management Information Security Audit System Monitoring Cybersecurity Management Security Policies & Procedures Documentation Web Application Security Information Security Audit Compliance Consultation ISO 27001 Information Security Governance Content Writing Technical Editing Content Management Technical Documentation You can find out how to get started by sending a message to me and I am available to add value and give maximum ROI.Cybersecurity Enterprise DevelopersPolicy WritingInformation Security AuditBusiness IT AlignmentCompliance ConsultationPenetration TestingMicrosoft WindowsPythonBash ProgrammingLinux PAMResearch DocumentationWeb DevelopmentCybersecurity ManagementEthical HackingCertified Information Security Manager - $70 hourly
- 5.0/5
- (43 jobs)
Cybersecurity Expert working in the industry since 2008. Delivers security audits and security consulting services. Specializes in following areas: 1. Conducting Web applications and Web services penetration tests, 2. Auditing and designing Information Security Management Systems, 3 Conducting ISO 27001 gap assessments and internal audits, 4. Conducting Threat Modeling and proposing architectural mitigation strategies for cloud-based and on-premise IT infrastructures, 5. Conducts Adversary Simulations and Red Team Operations to verify prevention, detection and response capabilities of mature cybersecurity programs, 6. Conducting GDPR related data security and privacy consulting. Mariusz possesses following security industry certifications: 1. CISSP - Certified Information Systems Security Professional: since 2014 2. OSCP - Offensive Security Certified Professional: since 2016 3. GXPN - GIAC Exploit Researcher and Advanced Penetration Tester: since 2017 4. Certified ISO 27001 Lead Auditor: since 2024 During the years of working with clients worldwide Mariusz conducted over 100 security assessments, penetration tests and analysis projects.Cybersecurity Enterprise DevelopersCompliance ConsultationCertified Information Systems Security ProfessionalWeb Application SecurityCloud SecurityNetwork Penetration TestingWeb App Penetration TestingSecurity InfrastructureCloud Security FrameworkISO 27001IT Compliance AuditPenetration TestingInformation SecuritySecurity Assessment & TestingVulnerability AssessmentCybersecurity Management - $125 hourly
- 5.0/5
- (8 jobs)
Information Security, Governance, Risk, and Compliance (GRC) professional. • HITRUST CCSFP, CISSP, PCI ISA, ITIL • 15+ years in Information Security (Governance, Risk, and Compliance) • 15+ years in highly regulated environments (PCI, HIPAA, FISMA) • 15+ years implementing/managing ISO 27001, NIST 800-53, NIST-CSF, PCI-DSS • 10+ years of policy and procedure development and management • 10+ years of process optimization, streamlining • 15+ years in IT (design, development, implementation, and management) • Bachelor of Business Administration - FinanceCybersecurity Enterprise DevelopersCompany PolicyRisk AssessmentHITRUST Common Security FrameworkGovernance, Risk Management & ComplianceCertified Information Systems Security ProfessionalHIPAAInformation Security AuditPCIServiceNowNIST SP 800-53 Want to browse more freelancers?
Sign up
How it works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Cybersecurity Enterprise Developer on Upwork?
You can hire a Cybersecurity Enterprise Developer on Upwork in four simple steps:
- Create a job post tailored to your Cybersecurity Enterprise Developer project scope. We’ll walk you through the process step by step.
- Browse top Cybersecurity Enterprise Developer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Cybersecurity Enterprise Developer profiles and interview.
- Hire the right Cybersecurity Enterprise Developer for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Cybersecurity Enterprise Developer?
Rates charged by Cybersecurity Enterprise Developers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Cybersecurity Enterprise Developer on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Cybersecurity Enterprise Developers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Cybersecurity Enterprise Developer team you need to succeed.
Can I hire a Cybersecurity Enterprise Developer within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Cybersecurity Enterprise Developer proposals within 24 hours of posting a job description.