Hire the best Firewall Developers in Tennessee
Check out Firewall Developers in Tennessee with the skills you need for your next job.
- $83 hourly
- 0.0/5
- (2 jobs)
Over the last 30 years, I have acquired extensive knowledge of system administration, network design/implementation, and Microsoft cloud offerings. Expert knowledge in network analysis, implementation, optimization, troubleshooting, and documentation. Microsoft certifications from Windows NT 4.0 through Azure Administrator (AZ-104) along with many years of hands-on technical knowledge encompassing a wide range of network hardware and software. Microsoft Windows Server (NT 4.0 - Server 2022) Windows workstations (Windows 3.1 - Windows 11) Exchange Server (4.0 - 2016) SQL Server (7.0 - 2022) Active Directory (Server 2000 - Server 2022) Cloud Microsoft Office 365 Microsoft Azure Microsoft Intune Microsoft Defender Linux RedHat Fedora CentOS Network DNS DHCP Switches Routers FirewallsFirewallWindows NTWindows 11 AdministrationWindows 10 AdministrationCisco MerakiUbiquitiScriptingNetwork PlanningMicrosoft Hyper-V ServerWindows ServerOffice 365Microsoft Active DirectoryMicrosoft Windows PowerShellMicrosoft IISMicrosoft Azure - $50 hourly
- 5.0/5
- (14 jobs)
Hello, my name is James Burris. I have been in the computer industry since the days of Windows NT 3.5. I am familiar with all versions of Windows server and client. I am also well versed in Mac OS. I use both Windows and Mac OS daily. I have configured and supported networks from 5 PCs and users to networks spanning the US with over 3500 users and PCs and hundreds of servers. I use and support Sophos Intercept X and Sentinel One on a daily basis. I setup, manage and support Microsoft 365 environments for tenants of all sizes including Azure AD and Intune. I also manage and support Azure VM environments. I support spam and phishing in Microsoft 365 using Defender using policies and Exchange transport rules. I manage and support SonicWall, Sophos, Meraki, and Juniper security appliances. My last project included setting up Intune to deploy new laptops to a corporation in a hardware refresh making deployment hands free by shipping hardware directly to the users and letting Intune register the PC and deploy the apps for the business. I manage Azure Conditional access, only allowing company PCs connect to Microsoft 365 applications.FirewallJuniperInternet Protocol SecurityMicrosoft Endpoint ManagerMicrosoft AzureMicrosoft Hyper-V ServerOffice 365Windows AdministrationSophos Sophos UTMMac OS X AdministrationTechnical SupportMicrosoft ServerMicrosoft Active DirectoryVPN - $155 hourly
- 5.0/5
- (3 jobs)
With over 16 years of experience in Information Technology and Security, I have established myself as an insightful and results-driven leader. My career has been marked by a string of notable successes in directing a wide range of corporate initiatives, especially in planning, analyzing, and implementing advanced Information Security and Technology solutions that align with key business objectives. My expertise lies in a deep understanding of the complexities of Information Security. I am adept at not only identifying challenges but also in presenting practical and feasible solutions at various organizational levels. My areas of proficiency include security governance, operational security, regulatory compliance, and enterprise risk management, coupled with a strong focus on business process improvement and executive leadership. One of my key strengths is project and program leadership. I excel at coordinating and directing all phases of project-based efforts while effectively managing, motivating, and guiding teams toward achieving their goals. I have championed several large projects that have significantly elevated the capabilities of Information Security teams. I pride myself on being a strong, results-oriented Information Technology manager who seamlessly blends deep technical knowledge with exceptional interpersonal skills. This unique blend allows me to effectively navigate complex technical challenges and align them with organizational needs. My core competencies encompass: *Strategic Planning and Analysis in IT and Security Implementation of Advanced Security Solutions *Mastery in Information Security Complexities *Leadership in Security Governance and Operational Security *Ensuring Regulatory Compliance and Risk Management *Enhancing Business Process Improvement *Executive Leadership and Team Management *Project and Program Leadership *Effective Communication and Interpersonal Skills Throughout my career, I have been committed to excellence and continuous professional growth. My approach to leadership has not only driven successful outcomes but also fostered an environment of innovation and excellence within my teams.FirewallBudget ManagementTraining & DevelopmentSystem MonitoringThreat DetectionIncident ManagementHITRUST Common Security FrameworkNIST SP 800-53Disaster RecoveryPolicy DevelopmentHIPAAApplication SecurityVulnerability AssessmentSystem SecurityCybersecurity Management - $150 hourly
- 0.0/5
- (1 job)
-Certified Information Systems Security Professional (CISSP) -Certified Ethical Hacker (CEH) -Certified Penetration Tester (CPT) -Qualified Security Assessor (QSA) -Payment Card Industry Professional (PCIP) -ISO 27001 Lead Implementor (CIS LI) Executive leader and champion of information security with a successful track record of spearheading the development, implementation, and monitoring of security strategies to achieve long-term goals and objectives. Develop, track, assess, and communicate key performance measures across IT & Security. Identify, evaluate, and report on information security risks in a manner that meets compliance and regulatory requirements, and aligns with and supports the risk posture of the enterprise. Oversee general day-to-day operations of the security services and IT operations. Define strategies to handle security incidents and coordinate investigative activities. Proficiently explain complex systems and technical topics to others who may have minimal technical knowledge.FirewallNIST Cybersecurity FrameworkInformation Technology OperationsWeb App Penetration TestingCertified Information Systems Security ProfessionalHIPAADisaster RecoveryEthical HackingPCI DSSTech & ITHITRUST Common Security FrameworkIntrusion Detection SystemDigital ForensicsIncident Response PlanInformation SecurityDatabase SecurityVulnerability Assessment - $35 hourly
- 0.0/5
- (0 jobs)
Professional Summary: Dynamic and results-driven IT professional with a passion for cybersecurity and a track record of success in creating secure and efficient IT infrastructures. Skilled in network security, hardware troubleshooting, and systems administration. Certified by Vanderbilt University CyberSecurity Bootcamp. Committed to staying current with the latest trends and tools in the InfoSec community.FirewallGovernance, Risk Management & ComplianceNetwork Access ControlNetwork AdministrationSecurity Policies & Procedures DocumentationSecurity AnalysisThreat DetectionComputing & NetworkingComputer NetworkInformation SecurityComplianceDatabase ManagementDatabase - $60 hourly
- 5.0/5
- (2 jobs)
I have spent the majority of my adult career trying to figure out where I fit in the tech world. I have become very comfortable within the telecom/networking field but feel I can do more. Designing and implementing wisp tower sites and relays to customer is a entertaining and challenging task at times. I want to do more, so I’m here to help those who can use my skill set.FirewallMicrosoft AzureOffice 365Hardware TroubleshootingSoftware MaintenanceTroubleshootingSystem AdministrationWireless Network ImplementationWireless CommunicationUbiquitiNetwork AdministrationMicrosoft Windows Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.