Hire the best Information Security Analysts

Check out Information Security Analysts with the skills you need for your next job.

Clients rate Information Security Analysts
Rating is 4.7 out of 5.
4.7/5
based on 1,807 client reviews
Howard Eldon P.
$150/hr
  • Trophy Icon Information Security
  • Reverse Engineering
  • Cryptography
  • Malware
  • Blockchain
  • Cryptocurrency

I am a cybersecurity professional with a Master's Degree in Cyber Operations and two years of work experience in cybersecurity research and development at a world-class R&D laboratory. In that job, I gained experience in network traffic analysis, malware analysis, and cryptography. For over two years, I have worked as a freelancer, providing consulting, content development, and course creation in cybersecurity and blockchain security. I specialize in development of technical content (blogs, whitepapers, case studies, and courseware) in the field of cybersecurity. I currently hold the Certified Ethical Hacker and Certified Blockchain...

Strahinja S.
$50/hr
  • Trophy Icon Information Security
  • Vulnerability Assessment
  • GDPR
  • ISO 27001
  • Security Operation Center
  • Information Security Analyst
  • Information Security Consultation

ECSA - Certified Security Analyst LRPA - Certified LogRhythm Platform Administrator I am a Senior Cybersecurity Analyst with 6 years of professional experience in the Cybersecurity field providing services to corporations and medium-sized businesses that are leaders in their respective industries. Have become proficient in: -Vulnerability assessment and analysis -Full incident response life cycle and incident report writing. -Training Junior colleagues in Cybersecurity Incident Analysis -Writing framework documentation (policies and procedures) -Conducting security audits of certain IT systems and report writing -Writing security...

Nikola M.
$60/hr
  • Trophy Icon Information Security
  • Vulnerability Assessment
  • Risk Analysis
  • Network Security
  • Black Box Testing
  • Investigative Reporter
  • Web App Penetration Testing
  • Network Penetration Testing
  • Penetration Testing
  • Gray Box Testing
  • Ethical Hacking
  • Metasploit
  • Digital Forensics
  • Kali Linux
  • Website Security

With over 10 years of experience in IT I’ve worked on projects ranging from system and network administration, education, planning, consulting, analysis, assessment and testing to investigative and forensic work. I bring high standards, tried and tested methodology with industry standard tools and techniques to deliver you professional results. I also have excellent communication skills while being fluent in 3 languages. I will always keep you up to date with the progress made, or if I have any questions, to ensure your awareness of how the assignment is moving along. I believe collaboration is key for a project to run smoothly towards a...

saqlain s.
$25/hr
  • Trophy Icon Information Security
  • Legal Research
  • Legal Assistance
  • Intellectual Property Law
  • Copyright
  • Data Entry
  • Microsoft Excel
  • Typing
  • Microsoft Word
  • Intellectual Property Protection
  • Internet Security

I protect your content from getting stolen over the web and if someone is using your content without your permission, I report and take down the pirated content under DMCA. I provide services to online content creators such as writers, bloggers, photographers, and the companies who own intellectual content of any type, or copyright products. My motto is to end content piracy. Here is my Plan of action: 1) I start by searching for all the websites which are stealing and using your content, through all the web search engines (Google, Bing, Yahoo, AOL, Yandex, etc.) using multiple effective keywords. 2) I de-index (remove) those websites...

Samson A.
$120/hr
  • Trophy Icon Information Security
  • Security Engineering
  • Information Security Governance
  • Cloud Computing
  • Network Security
  • Security Operation Center
  • Security Analysis

passionate security enthusiast interested in assisting a team increase their security posture by providing guidance and consultation on building and improving security operation capabilities, reducing overall attack surface with proper vulnerability management, and security engineering/architectural improvements.

Stephen P.
$80/hr
  • Trophy Icon Information Security
  • Contract Law
  • Legal
  • Contract Drafting
  • Regulatory Compliance
  • Risk Assessment
  • Compliance
  • Data Privacy
  • Information Management
  • Legal Writing
  • Compliance Consultation
  • Security Infrastructure
  • Security Analysis
  • Data Protection
  • GDPR
  • International Law

A seasoned IT and Compliance Professional with 20+ years experience in IT Operational Systems, Information Security Governanceand Compliance. I have been working as an ISO Consultant and Auditor for 8 years and manage projects for preparation of ISO 27k1 compliance, Data Governance & Compliance or supporting organisations in creating better Security Policies or Information Management Awareness. Strengths: I am good at adapting to situations in any circumstance, and I remain calm under pressure to ensure we don't lose focus on the end game. I am a great team player, both onsite and remote, and look to support the team, not stand out against...

Bhakti V.
$30/hr
  • Trophy Icon Information Security
  • Project Risk Management
  • PCI
  • Disaster Recovery
  • Technical Writing
  • Policy Writing
  • Network Security
  • Cloud Security
  • ISO 27001
  • Editing & Proofreading
  • Website Copywriting
  • Blockchain
  • Artificial Intelligence
  • Amazon Web Services
  • Robotics

With a degree in Computer Engineering and a passion for writing, my experience spans across writing whitepapers, blogs, research reports, content for websites, thesis for academic submissions, sales pitch, business proposals and more. I am highly organized and schedule my time to get things accomplished accordingly. I am detail-oriented and an excellent researcher. I can be entrusted with big projects as I prefer to complete my work before deadlines giving you ample time to review my work and provide feedback. I take pride in my work

Anushka S.
$30/hr
  • Trophy Icon Information Security
  • System Administration
  • Project Management Professional
  • IT Management
  • Information Technology Operations
  • Technical Writing
  • Academic Writing
  • Project Management
  • Network Security
  • Security Assessment & Testing
  • Security Policies & Procedures Documentation
  • Cybersecurity Management
  • Splunk
  • Information Security Audit

Currently based in east coast USA, I am a seasoned IT professional with over 15 years of experience in multiple domains in IT such as Information Security and auditing, IT Project Management, IT Infrastructure Management, IT Operations, Business Analysis, Business Continuity and DR planning etc. Last worked as the Head of IT for five years in the Sri Lankan business of AIA Group, which is the largest insurance company in the world. I am now working as a freelance Consultant and accolade with the status 'TOP RATED' in Upwork. My skills are supported by industry leading professional and academic qualifications:- - Master of Science in...

Dalton H.
$75/hr
  • Trophy Icon Information Security
  • Technical Writing
  • Content Writing
  • Technology
  • Technical SEO
  • Technical Documentation
  • Research Papers
  • Search Engine Optimization
  • VMWare
  • Microsoft Azure

Hi, my name is Dalton and I'm here to help write your technical content! Before we get to my background, take a look at what some previous clients have said: "Dalton has been an absolute pleasure to work with. The communication, timeliness, and hard work really show in his writing. I highly recommend hiring Dalton with any writing needs!" - Robert Minns, Digital Marketing Specialist, OmTech "Dalton has been fantastic to work with. He is always on time, responsive, and open to feedback. He does an excellent job at coming up with ideas, researching a topic, and writing technical content." - Casey Donahue, Founder & CEO, Optiwatt Before...

Gareth S.
$95/hr
  • Trophy Icon Information Security
  • Amazon Web Services
  • Linux System Administration
  • Vulnerability Assessment
  • Cloud Computing
  • Microsoft Azure
  • Google Cloud Platform
  • Load Balancing
  • Amazon ECS
  • Solution Architecture Consultation
  • SQL
  • NoSQL Database
  • Amazon S3
  • Private Cloud
  • Cloud Security

⭐️⭐️ I AM A TOP RATED PLUS FREELANCER on Upwork ⭐️⭐️ I have extensive experience as a Senior Cloud & Solutions Architect with expertise in Security & Infrastructure in both the Public and Private cloud as well as traditional networking, with over 20+ years in the IT & Telecoms industry, demonstrating a consistent track record in delivering successful global projects and have led the design and delivery of complex cloud-based infrastructure servicing millions of users. I have worked with many well-established international companies and fortune 500 companies in my career. ✅ Mozilla (Firefox) ✅ Druva ✅ Walmart ✅ Vodafone ✅ Deloitte ✅...

Shahzad Rana Y.
$25/hr
  • Trophy Icon Information Security
  • Network Security
  • VMware Administration
  • Network Administration
  • Linux System Administration
  • Penetration Testing
  • Disaster Recovery
  • Technical Writing
  • Internet Security
  • Data Protection
  • SaaS
  • Compliance Consultation
  • Data Privacy
  • GDPR
  • ISO 27001

I am certified and experienced IT professional. Over the past 15 years, I have accumulated a vast range of experience which entails me to tackle most IT situations. My core area is assessment of internal control environment for information systems and critical IT processes; evaluating system of internal control and risk management; pre & post implementation reviews; security reviews of operating system, database and applications/ERP(s). I have specialized in information and cybersecurity management and compliance, IT security risk, IT audit and policy writing with 15 years of experience (CISA, CDPSE and CISSP certifications), and proven...

Larry S.
$88/hr
  • Trophy Icon Information Security
  • Network Security
  • Security Infrastructure
  • Cloud Security Framework
  • ISO 27001
  • IT Asset Management
  • Network Monitoring
  • Incident Response Plan
  • Cybersecurity Management
  • Cybersecurity Management

Qualified Information Systems Professional with over 20 years of technical experience. Currently provide services as an Information Security Consultant and a Senior Systems Administrator. I hold a Master of Science Degree in Cyber Security and relevant industry certifications. Most recently assisting companies with audit readiness to include: SOC2, ISO 27001, GDPR, NIST-CSF and related efforts to ensure compliance readiness when an audit is on the horizon.

Girlie O.
$10/hr
  • Trophy Icon Information Security
  • Customer Support
  • Technical Support
  • Email Technical Support
  • Employee Training
  • Live Chat Operator
  • Phone Support
  • Instructional Design
  • Curriculum Development
  • Curriculum Mapping
  • Training Presentation
  • Fraud Mitigation
  • Zendesk
  • Email Support

I am a customer-service focused Technical Support Specialist with 10 years of career experience in help desk, voice, and chat. I am highly adept in systems analysis, diagnostics, troubleshooting, and conflict resolution. I started as a technical support representative for a service, sales, and technical repair US-based client wherein I assisted users with their internet connectivity, cable TV, phone service issues, and home security service. Because of the skills I have acquired throughout the years, I was able to join my previous company's training department. I onboarded new hire associates with product troubleshooting specific to...

Mariusz Z.
$70/hr
  • Trophy Icon Information Security
  • Penetration Testing
  • Vulnerability Assessment
  • Cybersecurity Management
  • Security Assessment & Testing
  • Security Infrastructure
  • Web App Penetration Testing
  • Certified Information Systems Security Professional
  • Web Application Security
  • Cloud Security
  • Cloud Security Framework
  • Compliance Consultation
  • IT Compliance Audit
  • ISO 27001
  • Network Penetration Testing

Since 2014 I work professionally as a Pen Tester/Security Researcher. Between 2008-2013, prior switching full time to info sec, I've worked as a Programmer (C/C++, PHP, Java, node.js) and DevOps (AWS-based environments). Currently I work under my own brand (Z-Labs) delivering Penetration Testing / Adversary Simulation Exercises services to clients around the globe. I pride myself for: 1. Offering high quality penetration testing services conducted in safe and controlled manner by certified Security Expert (Since 2014 I'm CISSP, since 2016 I'm OSCP and since 2017 I hold SANS GXPN certification). 2. Putting emphasis on advanced manual...

Ahmed I.
$30/hr
  • Trophy Icon Information Security
  • Cybersecurity Management
  • ISO 27001
  • Linux
  • Python Script
  • Network Security
  • IT Management
  • IT Compliance Audit
  • Lead Generation
  • Company Policy

Hi there, I am Ahmed and I have experience in information security , information technology , lead generation and cyber security I have knowledge in implementation of ISO 27001 in different departments and I provide consultation in Network Security , Cyber Security , Risk management , Cyber Threat Intelligence , Information Technology website managing and development and in defensive techniques

Taylor H.
$230/hr
  • Trophy Icon Information Security
  • Cybersecurity Management
  • IT Compliance Audit
  • Business Consulting
  • Security Analysis
  • Cloud Security Framework
  • Email Security
  • Information Security Governance
  • GDPR
  • Data Privacy
  • Data Protection

I am the founder of Eden Data, a cybersecurity advisory firm built to help startups and disruptive organizations build better security! My team is built of professionals with a background at Deloitte, Morgan Stanley, Department of Defense, and more. Our vision is to disrupt the professional services space by offering customers a subscription-based virtual CISO service without the crazy price tag. Leader, Visionary, and Business Enabler with a passion for Cyber Security and a desire to enable clients to achieve their vision. I am an energetic, results-oriented leader who strives to be a relationship builder and a disrupter that bridges the...

Marc W.
$135/hr
  • Trophy Icon Information Security
  • Amazon Web Services
  • Microsoft SQL Server Administration
  • MySQL
  • IT Management
  • Amazon EC2
  • Amazon S3
  • Amazon Relational Database Service
  • AWS Lambda
  • Database Administration
  • AWS Server Migration
  • Security Infrastructure
  • Vulnerability Assessment
  • Application Security

Vastly experience IT expert and top ranked AWS consultant on Upwork that specializes in AWS consulting and migrating business environments, applications and data centers to the AWS cloud. Certified AWS Solutions Architect and AWS Certified Security - Specialty and specialist at creating secure, highly available and cost efficient environments in the AWS cloud that meet all modern compliance standards such as HIPAA, PCI and SOC2. AWS instructor and SME for Simplilearn, an online IT training and certification site and instructor for A Cloud Guru, world leader in cloud computing training. Over 15 years experience of in-house IT consulting...

Rajat S.
$18/hr
  • Trophy Icon Information Security
  • Website Development
  • Website Security
  • Web/graphic Design
  • Malware Removal
  • Oracle PLSQL
  • Website Optimization
  • Website Migration
  • Ecommerce Website
  • SEO-Based Website
  • Web Application Security
  • Oracle PLSQL

I am a Web Developer and Security analyst, Specialist creating, designing and developing a search engine friendly website with built-in security (against malware/virus) to grow your online business. Since 2017, I have developed a number of websites using PHP, Laravel , jQuery, HTML5, Ajax, Photoshop, JavaScript, using CMS like Joomla, Magento, WordPress, Drupal etc. Expert in : ✅ Web Security ✅ Wordpress/Shopify/Wix/Joomla/Drupal/Moodle ✅ PHP/Laravel/Bootstrap/Jquery ✅ Malware Remove/Security Setup

Harrison M.
$100/hr
  • Trophy Icon Information Security
  • Data Protection
  • Network Security
  • Cloud Computing
  • PCI
  • Microsoft Office 365
  • Technical Writing
  • Security Testing
  • Cybersecurity Management
  • Penetration Testing
  • Vulnerability Assessment
  • Information Security Audit
  • ISO 27001

Hello I am an experienced cyber security professional and owner of the UK based boutique consultancy Periculo.co.uk Having drawn on my experience over a number of years, working with a huge variety of customers ranging from construction companies to banks, charities and MOD contractors I became a freelancer to offer affordable expertise that benefits everyone. I strongly believe that every organisation needs to take security and compliance seriously however not all have the big budget that most consultancys demand for their work. Through my own internal processes I'm able to quickly deliver high quality, best in class security and...

Iulian F.
$50/hr
  • Trophy Icon Information Security
  • Vulnerability Assessment
  • Penetration Testing
  • Web App Penetration Testing
  • Network Penetration Testing
  • Application Security
  • Network Security
  • Security Assessment & Testing
  • Information Security Consultation
  • Security Testing
  • Open Web Application Security Project
  • Information Security Audit
  • Linux
  • Web Application Security
  • Ethical Hacking

I'm a cyber security consultant that is conducting and leading security audits, penetration testing engagements, and red team engagements to a variety of companies, ranging from enterprise-level companies to small start-ups. Daily activities include, but are not limited to: penetration testing, red teaming, briefing, debriefing, other meetings. Previously I did infrastructure management at an enterprise-level company where I was administrating three (3) active directory forests and did host-based incident response. Certificates owned: [+] CCNA Routing and Switching 1 [+] Cisco Cyber Operations Introduction [+] Cisco Cyber Operations...

Wilson B.
$325/hr
  • Trophy Icon Information Security
  • Security Infrastructure
  • Security Analysis
  • Security Engineering
  • Policy Analysis
  • Policy Development
  • Cybersecurity Management
  • Risk Assessment
  • Project Risk Management

Wilson Bautista is a retired military officer whose expertise is in the domains of InfoSec leadership, policy, architecture, compliance, and risk. He holds multiple InfoSec (CISSP, CISM, CISA, CRISC, and CEH) and IT (TOGAF, CSM, CSPO and CGEIT) certifications and is a ISO 27001 Senior Implementer. He holds a Master of Business Administration degree from University of South Florida as well as a Masters Degree in Information Systems from Boston University. He is an INTP on the Myers-Brigg Type Indicator test with a Driver-Driver personality. As a practitioner of Agile and SecDevOps, he develops innovative, integrated, enterprise-scale cyber...

Mariusz F.
$99/hr
  • Trophy Icon Information Security
  • Microsoft Azure
  • Azure App Service
  • Amazon ECS
  • AWS Lambda
  • Alexa Skill Kit
  • Windows Server
  • Linux System Administration
  • Microsoft Azure SQL Database
  • Microsoft Office 365
  • Microsoft Exchange Server
  • Disaster Recovery
  • Database Administration

I am a professional freelancer with THIRD PARTY LIABILITY INSURANCE for over two and a half million dollars, so you are in safe hands. I am Microsoft Certified Trainer, Office 365, GCP, AWS, and Azure Expert. Honored as Microsoft Most Valuable Professional in Azure area. I cover architecting, security, administrating, and migration of all three major clouds – Azure, AWS, and GCP. Apart from the main area of Cloud expert in the field of infrastructure servers Windows Server 2003-2016, Microsoft Active Directory, Hyper-V Private Cloud, IIS, System Center, SQL. Private Cloud, System Center, Hyper-V, Open Stack Expert, and all Microsoft...

Joseph L.
$30/hr
  • Trophy Icon Information Security
  • Linux System Administration
  • Python
  • Data Scraping
  • Data Science
  • PHP
  • WordPress
  • Website Security
  • Content Writing
  • Policy Analysis
  • Information Security Analyst
  • Web App Penetration Testing
  • Vulnerability Assessment
  • Website Migration
  • System Security

I'm a software developer / server administrator / MSP / and cybersecurity consultant from Canada with excellent communication skills and attention to client needs. I can develop new solutions, and update, migrate or secure existing applications and systems. I entered the IT industry in 1995 and hold a high standard, guarantee my work, and can provide continuing support and hosting. I look forward to meeting new clients. I especially am happy to discuss your project details with you before hiring to help us together gain insight in to your needs and expectations. My services include: - Custom development & hosting (including...

Hadley J.
$60/hr
  • Trophy Icon Information Security
  • Business Writing
  • Technical Writing
  • English
  • French

My clients look for results. Power Pages Pro (that's me!) gets them what they need, when they need it. With a writing career in a variety of business sectors, I write for sales, marketing and technical briefs. Services include web content, sales texts, blog articles, ebooks, white papers, manuals, and training courses written in the subjects chosen by my clients. Additionally, I also write and translate in both english and french (expert/bilingual).

Fakhar I.
$35/hr
  • Trophy Icon Information Security
  • Article Writing
  • SEO Writing
  • Cybersecurity Management
  • VPN
  • Security Management
  • Cyber Threat Intelligence
  • Blog Writing
  • IT
  • Academic Writing
  • Information Security Awareness
  • Technical Writing
  • Research Papers
  • AT&T Cybersecurity
  • Information Security Threats
  • Creative Writing
  • Cybersecurity Monitoring
  • Cybersecurity Tool
  • Artificial Intelligence

I'm a Professional Cybersecurity Writer with a higher education degree in Masters of Science in Information Technology (MSc-IT). I also studied Journalism, Law, and World Politics (International Relations) during my Central Superior Services (CSS) examination, one of the toughest competitive examinations in Pakistan. I have a specialty in the following subjects: ★ To write articles with regard to various Information Security Certifications that include Computer Forensics, CASP, Security+, CISM, CCFE, and Certified Information Systems Security Professional (CISSP). ★ To perform an academic writing. ★ To write about Cybersecurity / Cyber...

Mark F.
$145/hr
  • Trophy Icon Information Security
  • Network Security
  • Security Assessment & Testing
  • Vulnerability Assessment
  • Security Policies & Procedures Documentation
  • Incident Response Plan
  • Information Security Awareness
  • Information Security Governance
  • ISO 27001
  • Information Security Audit
  • Security Infrastructure
  • GDPR
  • Certified Information Systems Security Professional
  • PCI DSS

I am a Cyber Security and Information Technology expert with 20 years experience ranging from small start-ups to multi-billion euro businesses. I hold a CISSP, the gold standard of Information Security Qualifications. I specialise in Strategy, Governance, Risk and Compliance - this makes me ideal for projects such as: Helping you achieve Cyber Essentials or IASME Governance status PCI-DSS & ISO 27001 compliance programs and audits Being your Cyber Security / Info Sec manager or CISO on a part-time basis Selecting and managing IT and Cyber Security suppliers on your behalf Writing, reviewing and updating your IT and Cyber Security policies...

Ozair M.
$20/hr
  • Trophy Icon Information Security
  • Technical Writing
  • Blog Content
  • SEO Writing
  • Website Content
  • Content Writing
  • B2B Marketing
  • Information Security Consultation
  • Blockchain
  • Information Security Analyst
  • Cybersecurity Monitoring
  • Security Policies & Procedures Documentation
  • Article Writing
  • Ghostwriting
  • Cybersecurity Management
  • Tech & IT

As a 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 & 𝙏𝙚𝙘𝙝𝙣𝙤𝙡𝙤𝙜𝙮 𝙘𝙤𝙣𝙩𝙚𝙣𝙩 𝙬𝙧𝙞𝙩𝙚𝙧, I help B2B/B2C SaaS Cybersecurity & Technology companies generate leads and increase domain authority through high-quality technical marketing copywriting, informative blog posts, Social media posts, and custom content strategy. Here is a 𝐭𝐞𝐬𝐭𝐢𝐦𝐨𝐧𝐢𝐚𝐥 of my ex-project manager at CoolTechZone: "𝘎𝘳𝘦𝘢𝘵 𝘸𝘰𝘳𝘬. 𝘛𝘩𝘦 𝘲𝘶𝘢𝘭𝘪𝘵𝘺 𝘰𝘧 𝘵𝘩𝘦 𝘸𝘳𝘪𝘵𝘪𝘯𝘨 𝘸𝘢𝘴 𝘦𝘹𝘤𝘦𝘭𝘭𝘦𝘯𝘵 𝘢𝘯𝘥 𝘸𝘢𝘴 𝘢𝘯 𝘢𝘴𝘴𝘦𝘵 𝘵𝘰 𝘰𝘶𝘳 𝘣𝘭𝘰𝘨. 𝘞𝘰𝘶𝘭𝘥 𝘣𝘦 𝘨𝘭𝘢𝘥 𝘵𝘰 𝘸𝘰𝘳𝘬 𝘸𝘪𝘵𝘩 𝘺𝘰𝘶 𝘢𝘨𝘢𝘪𝘯 𝘪𝘯 𝘵𝘩𝘦 𝘧𝘶𝘵𝘶𝘳𝘦, 𝘢𝘯𝘥...

$NaN/hr

How it works

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses

Information Security Analysts Hiring FAQs

What is an information security analyst?

With the scale and complexity of networked environments growing every year, the need for seasoned information security analysts has become more prevalent. Upwork provides access to information security talent adept at overseeing and managing risk in the areas of network security, cyber security, and endpoint security.

How do you hire an information security analyst?

You can source information security analysts on Upwork by following these three steps:

  • Write a project description. You’ll want to determine your scope of work and the skills and requirements you are looking for in an information security analyst.
  • Post it on Upwork. Once you’ve written a project description, post it to Upwork. Simply follow the prompts to help you input the information you collected to scope out your project.
  • Shortlist and interview information security analysts. Once the proposals start coming in, create a shortlist of the professionals you want to interview. 

Of these three steps, your project description is where you will determine your scope of work and the specific type of information security analyst you need to complete your project.  

How much does it cost to hire an information security analyst?

Rates can vary due to many factors, including expertise and experience, location, and market conditions.

  • An experienced information security analyst may command higher fees but also work faster, have more-specialized areas of expertise, and deliver higher-quality work.
  • A contractor who is still in the process of building a client base may price their information security analyst services more competitively. 

Which one is right for you will depend on the specifics of your project. 

How do you write an information security analyst job post?

Your job post is your chance to describe your project scope, budget, and talent needs. Although you don’t need a full job description as you would when hiring an employee, aim to provide enough detail for a contractor to know if they’re the right fit for the project.

Job post title

Create a simple title that describes exactly what you’re looking for. The idea is to target the keywords that your ideal candidate is likely to type into a job search bar to find your project. Here are some sample information security analyst job post titles:

  • Need marketing manager with experience in information data security
  • Cyber security analyst needed to oversee corporate governance project
  • Database analyst with security experience needed for financial institution

Project description

An effective information security analyst job post should include: 

  • Scope of work: From developing security policies to implementing network security strategies, list all the deliverables you’ll need. 
  • Project length: Your job post should indicate whether this is a smaller or larger project. 
  • Background: If you prefer experience with certain industries, software, or environments, mention this here. 
  • Budget: Set a budget and note your preference for hourly rates vs. fixed-price contracts.

Information security analyst job responsibilities

Here are some examples of information security analyst job responsibilities:

  • Help manage the enterprise information security infrastructure for a software development company
  • Support vulnerability review, management, and remediation efforts
  • Create the incident response plan and implement the business continuity plan 

Information security analyst job requirements and qualifications

Be sure to include any requirements and qualifications you’re looking for in an Information security analyst. Here are some examples:

  • Bachelor’s degree in IS or related field 
  • Minimum 5 years experience in vulnerability scanning and remediation
  • Excellent knowledge of Microsoft Windows and virtualization technologies
View less
Schedule a Call