Hire the best Firewall Developers in Tennessee

Check out Firewall Developers in Tennessee with the skills you need for your next job.
  • $83 hourly
    Over the last 30 years, I have acquired extensive knowledge of system administration, network design/implementation, and Microsoft cloud offerings. Expert knowledge in network analysis, implementation, optimization, troubleshooting, and documentation. Microsoft certifications from Windows NT 4.0 through Azure Administrator (AZ-104) along with many years of hands-on technical knowledge encompassing a wide range of network hardware and software. Microsoft Windows Server (NT 4.0 - Server 2022) Windows workstations (Windows 3.1 - Windows 11) Exchange Server (4.0 - 2016) SQL Server (7.0 - 2022) Active Directory (Server 2000 - Server 2022) Cloud Microsoft Office 365 Microsoft Azure Microsoft Intune Microsoft Defender Linux RedHat Fedora CentOS Network DNS DHCP Switches Routers Firewalls
    vsuc_fltilesrefresh_TrophyIcon Firewall
    Windows NT
    Windows 11 Administration
    Windows 10 Administration
    Cisco Meraki
    Ubiquiti
    Scripting
    Network Planning
    Microsoft Hyper-V Server
    Windows Server
    Office 365
    Microsoft Active Directory
    Microsoft Windows PowerShell
    Microsoft IIS
    Microsoft Azure
  • $50 hourly
    Hello, my name is James Burris. I have been in the computer industry since the days of Windows NT 3.5. I am familiar with all versions of Windows server and client. I am also well versed in Mac OS. I use both Windows and Mac OS daily. I have configured and supported networks from 5 PCs and users to networks spanning the US with over 3500 users and PCs and hundreds of servers. I use and support Sophos Intercept X and Sentinel One on a daily basis. I setup, manage and support Microsoft 365 environments for tenants of all sizes including Azure AD and Intune. I also manage and support Azure VM environments. I support spam and phishing in Microsoft 365 using Defender using policies and Exchange transport rules. I manage and support SonicWall, Sophos, Meraki, and Juniper security appliances. My last project included setting up Intune to deploy new laptops to a corporation in a hardware refresh making deployment hands free by shipping hardware directly to the users and letting Intune register the PC and deploy the apps for the business. I manage Azure Conditional access, only allowing company PCs connect to Microsoft 365 applications.
    vsuc_fltilesrefresh_TrophyIcon Firewall
    Juniper
    Internet Protocol Security
    Microsoft Endpoint Manager
    Microsoft Azure
    Microsoft Hyper-V Server
    Office 365
    Windows Administration
    Sophos Sophos UTM
    Mac OS X Administration
    Technical Support
    Microsoft Server
    Microsoft Active Directory
    VPN
  • $155 hourly
    With over 16 years of experience in Information Technology and Security, I have established myself as an insightful and results-driven leader. My career has been marked by a string of notable successes in directing a wide range of corporate initiatives, especially in planning, analyzing, and implementing advanced Information Security and Technology solutions that align with key business objectives. My expertise lies in a deep understanding of the complexities of Information Security. I am adept at not only identifying challenges but also in presenting practical and feasible solutions at various organizational levels. My areas of proficiency include security governance, operational security, regulatory compliance, and enterprise risk management, coupled with a strong focus on business process improvement and executive leadership. One of my key strengths is project and program leadership. I excel at coordinating and directing all phases of project-based efforts while effectively managing, motivating, and guiding teams toward achieving their goals. I have championed several large projects that have significantly elevated the capabilities of Information Security teams. I pride myself on being a strong, results-oriented Information Technology manager who seamlessly blends deep technical knowledge with exceptional interpersonal skills. This unique blend allows me to effectively navigate complex technical challenges and align them with organizational needs. My core competencies encompass: *Strategic Planning and Analysis in IT and Security Implementation of Advanced Security Solutions *Mastery in Information Security Complexities *Leadership in Security Governance and Operational Security *Ensuring Regulatory Compliance and Risk Management *Enhancing Business Process Improvement *Executive Leadership and Team Management *Project and Program Leadership *Effective Communication and Interpersonal Skills Throughout my career, I have been committed to excellence and continuous professional growth. My approach to leadership has not only driven successful outcomes but also fostered an environment of innovation and excellence within my teams.
    vsuc_fltilesrefresh_TrophyIcon Firewall
    Budget Management
    Training & Development
    System Monitoring
    Threat Detection
    Incident Management
    HITRUST Common Security Framework
    NIST SP 800-53
    Disaster Recovery
    Policy Development
    HIPAA
    Application Security
    Vulnerability Assessment
    System Security
    Cybersecurity Management
  • $150 hourly
    -Certified Information Systems Security Professional (CISSP) -Certified Ethical Hacker (CEH) -Certified Penetration Tester (CPT) -Qualified Security Assessor (QSA) -Payment Card Industry Professional (PCIP) -ISO 27001 Lead Implementor (CIS LI) Executive leader and champion of information security with a successful track record of spearheading the development, implementation, and monitoring of security strategies to achieve long-term goals and objectives. Develop, track, assess, and communicate key performance measures across IT & Security. Identify, evaluate, and report on information security risks in a manner that meets compliance and regulatory requirements, and aligns with and supports the risk posture of the enterprise. Oversee general day-to-day operations of the security services and IT operations. Define strategies to handle security incidents and coordinate investigative activities. Proficiently explain complex systems and technical topics to others who may have minimal technical knowledge.
    vsuc_fltilesrefresh_TrophyIcon Firewall
    NIST Cybersecurity Framework
    Information Technology Operations
    Web App Penetration Testing
    Certified Information Systems Security Professional
    HIPAA
    Disaster Recovery
    Ethical Hacking
    PCI DSS
    Tech & IT
    HITRUST Common Security Framework
    Intrusion Detection System
    Digital Forensics
    Incident Response Plan
    Information Security
    Database Security
    Vulnerability Assessment
  • $35 hourly
    Professional Summary: Dynamic and results-driven IT professional with a passion for cybersecurity and a track record of success in creating secure and efficient IT infrastructures. Skilled in network security, hardware troubleshooting, and systems administration. Certified by Vanderbilt University CyberSecurity Bootcamp. Committed to staying current with the latest trends and tools in the InfoSec community.
    vsuc_fltilesrefresh_TrophyIcon Firewall
    Governance, Risk Management & Compliance
    Network Access Control
    Network Administration
    Security Policies & Procedures Documentation
    Security Analysis
    Threat Detection
    Computing & Networking
    Computer Network
    Information Security
    Compliance
    Database Management
    Database
  • $60 hourly
    I have spent the majority of my adult career trying to figure out where I fit in the tech world. I have become very comfortable within the telecom/networking field but feel I can do more. Designing and implementing wisp tower sites and relays to customer is a entertaining and challenging task at times. I want to do more, so I’m here to help those who can use my skill set.
    vsuc_fltilesrefresh_TrophyIcon Firewall
    Microsoft Azure
    Office 365
    Hardware Troubleshooting
    Software Maintenance
    Troubleshooting
    System Administration
    Wireless Network Implementation
    Wireless Communication
    Ubiquiti
    Network Administration
    Microsoft Windows
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses