Hire the best Firewall Developers in Saudi Arabia
Check out Firewall Developers in Saudi Arabia with the skills you need for your next job.
- $40 hourly
- 5.0/5
- (164 jobs)
I am excited to offer 16+ years of solid experience in Physical & Virtual Server & Networking Platforms, System Administration, Network Administration,Managing Telecommunications Networks and Technical Strategy. Below are a few of my strong assets for your business: - Microsoft(Active Directory, DNS,DHCP, RDS,SQL Server(DB Admin),SharePoint, - Hyper-V, Exchange(All Versions &O365)Azure) - VMWare (ESXi, VCenter) - Citrix (XenApp, XenCenter) - Antivirus(Symantec(SEP),Mcafee(EPO),Kaspersky) - Linux (Ubuntu, CentOS,Debian) - Cloud(MS Azure,AMAZON AWS ,Google GCP,OVH and Digital Ocean) - Storage(Synology,QNAP,FreeNAS,WD,Dell and HP) - VOIP ( Avaya,3CX,Yeastar,XCally,GrandStream & FreePBX) - Firewalls (Fortinet, Sonicwall, Sophos, ASA,WatchGuard&PFSense) - Routers (Cisco, Ubiquiti) - Servers (HP Proliant Servers) & (Dell/EMC Servers) I am happily available anytime using secure remote support or walk you through the steps via Upwork chat .I am looking to show each client my worth to build a long relationship.Firewall
Storage Area NetworkCloud ComputingActive Directory Federation ServicesVoIP AdministrationMicrosoft Hyper-V ServerMicrosoft Active DirectoryCisco RouterFreePBXMicrosoft Exchange ServerOffice 365Windows ServerMicrosoft AzureMicrosoft Exchange OnlineFortinet - $150 hourly
- 0.0/5
- (0 jobs)
I am an experienced Netowrk Security Engineer with 7+ years of experience in network and network security projects. I have worked with with both green field and migration projects. I have hand on experience in Fortinet/Palo Alto / Infoblox /F5 / Juniper / Netscreen products.Firewall
Cisco RouterInfoblox IPAMFortiGate FirewallPalo Alto FirewallsFortinetJuniperJNCIA-JunosCisco Certified Network AssociateNetwork SecurityVPNInternet Protocol Security - $25 hourly
- 5.0/5
- (4 jobs)
SOC Analyst (4+ years): [+] Experienced SOC Analyst with 4+ years of experience. [+] Skilled in monitoring, detecting, and responding to security incidents. [+] Proficient in security tools such as SIEM, IDS/IPS, firewalls, and endpoint security tools. [+] Knowledgeable in network security, protocols, and vulnerabilities. [+] Capable of analyzing and interpreting security events and incidents. [+] Experienced in Incident Response (IR) and Computer Security Incident Response (CSIRT) processes. [+] Proficient in rules creation and rules optimization to improve threat detection capabilities. [+] Experienced in working with Crowdstrike Falcon EDR, Symantec Endpoint Protection, Fortinet Firewall, and Pfsense for endpoint protection and network security. [+] Skilled in infrastructure management, including fine-tuning and optimization. [+] Proficient in visualization and dashboard creation to provide clear and concise security metrics to stakeholders. [+] Experienced in Jira ticketing and TheHive case management for incident tracking and resolution. [+] Familiarity with Shuffler SOAR Playbooks and Tines SOAR Playbooks for security orchestration and automation. [+] Familiarity with Active Directory and its integration with security tools. [+] Experienced in working with Wazuh for threat detection and response. Elastic Stack Expert (3+ years): [+] Proficient in Elasticsearch, Logstash, Kibana, SIEM, Beats, Wazuh, Elastalert, and other Elastic Stack products. [+] Experienced with Elasticsearch since its version 7 and has implemented large-scale implementations dealing with billions of documents and TBs of data. [+] Skilled in organizing, cleaning, visualizing, and securing data on a large scale using Elasticsearch. [+] Expert in setting up fully functional, large-scale SIEM using Elastic Stack (ELK) and has implemented log ingestion, thread hunting, alerting, reporting, etc. for SIEM. [+] Proficient with Beats, Wazuh, ElastAlert, and XPack for securing Elastic Stack. [+] Offers services for implementing, upgrading, maintaining, optimizing, or providing proof of concept around ELK. API/Integration Developer (2+ years): [+]Developed and deployed custom Python-based integrations and Logstash ETL pipelines, facilitating seamless data ingestion into Elasticsearch for a diverse range of customer applications. This resulted in improved data availability and real-time monitoring capabilities, enhancing overall system reliability. [+] Collaborated with customers to design and implement data ingestion solutions tailored to their specific requirements, demonstrating a deep understanding of Python scripting, Logstash, and Elasticsearch data modeling. These efforts contributed to optimizing application performance and enabling data-driven decision-making. Linux Administration (4+ years): [+] Proficient in Linux Administration with 4+ years of experience. [+] Skilled in managing Linux servers, troubleshooting, and system optimization. [+] Experienced in network configuration, security, and performance tuning. [+] Knowledgeable in Shell Scripting, Bash Scripting, and Linux Command Line Interface (CLI). [+] Proficient in Virtualization, Docker, Kubernetes, and Ansible. [+] Capable of handling multiple tasks and projects simultaneously.Firewall
Cybersecurity ManagementPCI DSSWeb Application SecurityLogstashISO 27001SOC 2Application Performance Monitoring SoftwareElasticsearchGoogle Cloud PlatformLinuxKibanaMicrosoft AzureArtificial IntelligenceAmazon Web ServicesCybersecurity MonitoringCloud SecurityDockerPython - $10 hourly
- 5.0/5
- (2 jobs)
With more than a decade of experience in Information Security, Risk Management, and Vulnerability Management, I possess the expertise necessary to ensure the safety, confidentiality, and compliance of data, systems, networks, and products, guarding against cyber threats and hazards. My key strengths encompass a wide range of areas, including Information Security Operational Management, Risk Management, Penetration Testing, Information Security Architecture and Design, Incident Management, Information System Audit, ISMS Audit and Compliance, Legal and Regulatory Compliance, as well as Business Continuity and Disaster Recovery Planning. Additionally, I have acquired multiple certifications in Information Security, such as ISO 27001 Lead Auditor, ITIL Foundation, and Certified Ethical Hacker, among others. Driven by a profound passion for the field, I am dedicated to leveraging my Information Security expertise to empower businesses in delivering innovative and secure solutions to their clients across diverse industries and geographical regions.Firewall
Malware RemovalInformation SecuritySystem SecuritySOC 2GDPRInternet SecurityNetwork SecurityISO 27001Penetration TestingPCI DSSNIST Cybersecurity FrameworkVulnerability AssessmentInternal AuditingNIST SP 800-53 - $25 hourly
- 5.0/5
- (3 jobs)
🏆 Overview An IT professional with 16+ years of experience, specializing in Microsoft .NET technologies, Azure cloud solutions, and database management. My blend of skills, backed by PMP certification, ensures high-quality, goal-oriented project outcomes. ⭐ My Offerings ✅.NET and Azure Proficiency: Expert in developing scalable applications using ASP.NET, C#, .NET Core, and Azure cloud services. ✅Comprehensive Database Skills: Versatile in SQL databases, with a strong focus on Azure for cloud-based solutions. ✅Data Security & Optimization: Adept at ensuring data integrity, compliance, and performance enhancements. ✅Constant Communication: Commitment to keeping stakeholders informed 24/7. ✅Project Management Excellence: PMP-certified, aligning project execution with strategic objectives. ⭐ Why Me? 🌟 Client Focused: Prioritizing your needs for optimal satisfaction. 🚀Proven Success: A track record of effective solutions and positive client feedback. 📞Open Communication: Guaranteeing transparency and engagement throughout the project lifecycle. 📌Strategic Management: Leveraging PMP skills for timely, budget-conscious project delivery.Firewall
Amazon Web ServicesWeb DevelopmentMail Server ImplementationVirtual Private ServerTransact-SQLASP.NET MVCAPI DevelopmentProject ManagementDatabase Design - $20 hourly
- 4.6/5
- (4 jobs)
I am a network security engineer with broad knowledge of network security technologies to provide a powerful combination of analysis, implementation and support. I have more than five years of experience in Network operations, deployment, maintenance, troubleshooting and monitoring.Firewall
F5, Inc.Cisco ACICisco Firepower Threat DefenseFortiGate FirewallCisco IOSNetwork AdministrationCisco WLCCryptographyNetwork DesignCisco RouterCisco MerakiComputer NetworkNetwork MonitoringCisco ASANetwork SecurityCisco ISE - $10 hourly
- 0.0/5
- (0 jobs)
I have always been passionate about technology and its potential to make a difference in people's lives. From my early days of tinkering with computers to my current role as Head of IT at the SAFCSP Apple Developer Academy, I have developed a deep understanding of the importance of effective communication and collaboration in the successful implementation of IT projects. My expertise in security architecture design and implementation, cloud computing security, threat and vulnerability management, and web gateway and proxy appliances has enabled me to align security plans, controls, processes, policies, and procedures with security standards and operational goals. I have also demonstrated skill in developing and testing security architectures of cloud-based systems and managing complex projects while motivating and mentoring team members. My strong communication and interpersonal skills, technical acumen, systems analysis, and project management abilities have enabledFirewall
Computer NetworkCloud SecurityCloud ComputingData CenterComputing & NetworkingNetwork EngineeringServerTech & ITInformation Technology - $25 hourly
- 0.0/5
- (0 jobs)
Overall 9+ years of experience in VMware, Network, FortiGate, QSR Industry (Fast-food, Casual Dining) under Olayan Food Division. Conversant with POS applications and Integration phases with End-to-End solutions. NCR All Module: -Aloha Quick Service, Table Service, Aloha CFC, SDM Agent, SDM Manager, SDM Supervisor. -Coordinate with online aggregator if for integration with NCR Application. -Customizing menu and publishing to delivery channels. -Adding/removing Aloha Items for online aggregators. -Adding restaurants for home delivery for all aggregators. -Supporting 160+ Restaurants (Burger King, Buffalo Wind Wings, Taxes Chicken in all over KSA) -Done Rollout of Aloha V6 to Aloha V19 in all Burger King restaurants. Middleware integration: -Complete End to End Experience on NCR POS Applications with Middleware (Deliverect, MENU). -Integration pos with middleware to delivery channels (Jahaz, Hunger Station, Chef, Mrsool, ToYou,Cari,Noon Food,Careem,Cari). -Synchronizing Menu from NCR to Middleware. -Customizing menu and publishing to delivery channels (Jahaz, Hunger Station, Chef, Mrsool ,ToYou,Cari,Noon Food, Careem,Cari). Security Architect: -FortiGate Firewalls installation, configuration, and backup/ Restoration. -Configuring SSL tunnel for User to connect data center securely. -Troubleshooting of network related issues, reach ability issues, routing issues etc -Implement and maintain network security policy, standards, and procedures. -Monitoring all Suspicious activities. VMware: -Design implementation, installation, management. -Performed Virtual Machines backup, snapshots, cloning, P2V and V2V conversion. System Administrator & Network Security : -Installation of windows Servers 2012,2016,2019. -DNS/DHCP/FTP server and Active Directory installation and managing. -Group and User creation, Group policy creation and managing.Firewall
ManageEngine ServiceDesk PlusAvayaVMware AdministrationNetwork EngineeringServerNetwork SecurityWindows Server - $25 hourly
- 0.0/5
- (0 jobs)
Professional IT Operations and Project Management with 11 Years of Experience Services Offered by Zain: 1. Microsoft Intune Setup and Management: Complete MS365 Cloud Entra ID device control and policy implementation. I provide step-by-step device enrollment guidance and a comprehensive knowledge-based document. 2. Microsoft Exchange Policies and Rules: Enhance your email security with custom policies and rules. 3. Firewall Configurations: Expert configuration of Fortigate and Sophos firewalls to secure your network. 4. CPanel Hosting Management: Comprehensive hosting services, including cPanel setup, domain management, and WordPress-ready website creation. 5. Hosting and DNS Settings: Professional setup and management of hosting and DNS settings on GoDaddy and Namecheap platforms. 6. MS365 Package Consultation: Tailored recommendations on MS365 packages for businesses of all sizes, from startups to multinational corporations. 7. Infrastructure Project Consultation: Guidance on deploying firewalls, network sizing, and network management. 8. 3CX Calling System Deployment: Cloud-based 3CX Calling System setup and deployment.Firewall
Email SecurityMicrosoft IntuneAzure DevOpsFortiGate FirewallWordPressVirtual Private ServerCloud ComputingDockerWebsiteWordPress PluginWordPress ThemeOffice 365Server VirtualizationAmazon Web Services - $15 hourly
- 0.0/5
- (0 jobs)
Welcome to my Upwork profile! I am Sohail Rashid, a seasoned IT Security Consultant with extensive experience in Identity & Access Management (IAM), Identity Governance (IGA), and ISO 27001 & 27701 compliance. With a robust technical background and a Bachelor’s degree in Computer Engineering from the National University of Sciences and Technology (NUST), I specialize in enhancing organizational security through strategic implementations and cutting-edge solutions. Currently serving as an IT Security and Access Control Architect at Solutions by STC, I manage a comprehensive security operation center and data center equipped with diverse security products. My expertise includes Network Security, Enterprise VPN solutions, Symantec Web Gateway, and advanced security solutions such as F5 WAF/ASM and SailPoint IdentityIQ. Whether you need a skilled architect to design secure networks or an expert to lead your IAM and IGA projects, I offer tailored solutions that align with your business objectives and IT strategies. My work is driven by a commitment to operational excellence and the strategic use of technology to mitigate risks and ensure robust security frameworks. Let's connect and discuss how I can bring security, efficiency, and innovation to your projects.Firewall
Security EngineeringCybersecurity ToolRisk AssessmentCisco Certified Network AssociateSymantec Security SoftwareCybersecurity MonitoringPalo Alto FirewallsNetwork SecurityInformation TechnologyUser Identity ManagementExpertSenior AdultCybersecurity ManagementSystem Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.