Hire the best Information Security Analysts

Check out Information Security Analysts with the skills you need for your next job.
Clients rate Information Security Analysts
Rating is 4.7 out of 5.
4.7/5
based on 1,807 client reviews
  • $55 hourly
    IT Professional with over 30 years experience. 15+ years experience in web development. 8+ Years experience in PCI-DSS Consultation, including level 1 companies, working with QSA's to swiftly obtain compliance. For the past five years, I have been providing GDPR consultation to many small to medium-sized companies. Three years experience with ISO 27001 helping clients get and maintain ISO 27001 accredited certification. I spent 20 years working in various IT roles, mainly support, engineering, and web development, within one of the largest companies in the world. I was awarded Charted IT Professional status from the British Computer Society in July 2008. Since then, I have run my own company with a small team producing web-based platforms and services and offering freelance compliance consultation to small businesses. I have also worked as a CTO on several start-up projects managing their entire IT infrastructure and gaining valuable PCI compliance experience, essential to all e-commerce projects. Due to my experience and varied IT roles, I have a good knowledge of web design, programming, databases, security, SEO, troubleshooting, technical writing & more. I am a highly organised and reliable individual, utilising existing knowledge and experiences to find practical solutions to even the most complex project.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Compliance Consultation
    Data Privacy
    Vulnerability Assessment
    PCI DSS
    Data Protection
    Website Security
    PCI
    Compliance
    ISO 27001
    Risk Assessment
    Information Security Audit
    GDPR
    Web Content Accessibility Guidelines
    Security Analysis
  • $150 hourly
    I am a cybersecurity professional with a Master's Degree in Cyber Operations and two years of work experience in cybersecurity research and development at a world-class R&D laboratory. In that job, I gained experience in network traffic analysis, malware analysis, and cryptography. For over two years, I have worked as a freelancer, providing consulting, content development, and course creation in cybersecurity and blockchain security. I specialize in development of technical content (blogs, whitepapers, case studies, and courseware) in the field of cybersecurity. I currently hold the Certified Ethical Hacker and Certified Blockchain Security Professional certifications.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Reverse Engineering
    Cryptocurrency
    Blockchain
    Cryptography
  • $20 hourly
    Need help to recover your HACKED & DISABLED social media accounts in the least possible time? You are at right place if you have lost access to your personal or business social media account (s). Lost credentials or your account got hacked. Your account was disabled by a mistake. You want to remove old accounts or remove your content from search engines or social media. Or if have any other Instagram and Facebook related issue. You might have tried available support options and scrolled through forums but could not find help because: I have been providing virtual assistance with the related issues for a long time and enjoying my successful journey. I have proudly offered my clients to pay only after the successful results and resolved dozens of cases. You will find the support and solution for almost every kind of issue related to the Instagram and Facebook and other social media platforms with full compliance to ethics and respective platform's terms and service. I would love to answer your queries for free of cost and will suggest a way forward that would help you to accomplish your goals. Please send me a message with issue details and screenshots (if feasible). Invite me for the interview if your: Facebook account is disabled. Instagram account is disabled. Facebook account is restricted. Instagram account is restricted. Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Or if you are seeking help for: Recover hacked Instagram account Facebook recovery Instagram restoration Facebook restoration Instagram security Facebook security Instagram verification Facebook verification Instagram & Facebook Integration Instagram & Facebook Marketing Recovery of account in case of lost credentials Recovery from underlying technical issues, bugs and glitches Snapchat issues LinkedIn issues TikTok issues Social media content removal Facebook Instagram Integration Facebook and Instagram verification problem Facebook content removal Instagram content removal Instagram fake followers removal Instagram fake accounts removal Facebook fake accounts removal ''DON'T FORGET TO READ THE REVIEWS ON MY PROFILE'' Disclaimer: Write me about the issues related to your ''own'' social media account (s) or only if you are an authorized representative. Avoid making requests that are not compliant with Upwork and Instagram's terms of service. You will get ethical virtual assistance to get your problem resolved through this channel. Thank you for your precious attention. Looking forward to your invites. Anxiously waiting for assisting you better. :)
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Social Media Marketing
    Social Media Account Setup
    Instagram API
    Internet Security
    Technical Support
    Network Security
    Vulnerability Assessment
    Ethical Hacking
    Troubleshooting
    Data Recovery
    Cybersecurity Management
    Social Media Management
    Instagram
    Facebook
  • $45 hourly
    Are you currently facing challenges in safeguarding your business against cyber threats? Are there specific areas where you've experienced difficulties in mitigating security vulnerabilities? I'm here to understand your unique concerns. In the realm of cutting-edge technology, what aspects of AI, advanced automation, or information security solutions are you currently exploring or considering to scale your business? How do you envision these technologies strengthening your operations? As someone passionate about fortifying businesses, I'm curious to learn more about your goals and aspirations. What initiatives are you currently undertaking to drive growth, and how do you perceive the role of technology in achieving those goals? I am dedicated to helping businesses navigate the digital landscape securely. What are your key priorities when it comes to information security, and how can we tailor our expertise to address your specific needs? Let's embark on a conversation about your business journey. What challenges do you anticipate in the ever-evolving digital world, and how can we work together to position your business at the forefront of innovation?
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Appium
    Selenium
    Computer Vision
    Natural Language Processing
    Reverse Engineering
    Penetration Testing
    Artificial Intelligence
    Machine Learning
    Web Scraping
    C#
    Python
  • $240 hourly
    I have provided HIPAA consulting services for the last 20 years and over that time served over 1,000 clients. Client experience includes work with covered entities including hospitals, physicians, other health providers, insurers, union health plans and county government agencies. Experience with business associates include software vendors, IT managed services providers, cloud computing vendors, mobile app developers, medical billing services, value-added resellers, third-party administrators and pharmaceutical marketing companies. Services include virtual Privacy/Security Officer, policy and procedure development, policy gap analysis, computer security risk analysis, technical vulnerability analysis, vendor audits, HIPAA training, business associate contracting and other HIPAA related services. Other related experience includes use of security frameworks including ISO 27001/27002, NIST and HITRUST as well as the PCI DSS. I have worked with other government regulations including 42 CFR Part 2, GxP, FERPA, IDEA, DEA Regulations for E-prescribing of controlled substances and state laws relating to medical privacy and data breach in over 20 states.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Company Policy
    Security Analysis
    PCI
    Information Security Governance
    Project Risk Management
    Vulnerability Assessment
    Data Privacy
    ISO 27001
    HIPAA
    Risk Assessment
    GDPR
  • $135 hourly
    Unlock business opportunities worth millions of $$$$$$$ by working with a professional virtual CISO, Security, and Compliance consulting for start and scale-ups! 💪Score clients like Pepsi, Google, Uber, Microsoft, Pfizer, Ikea, Bank of America, Philips, Rolex, and many others! Specialized in business-to-business, providing money-back guaranteed ISO 27001, SOC 2, GDPR, HIPAA, PCI-DSS, CMMC, and FedRAMP projects and affordable virtual CISO (vCISO) services. Work with the top (1M+ earnings) Security, Compliance, and Certification consultant on Upwork. Securing your business, passing security assessments by clients or prospects, and achieving a security certification (SOC 2 report, ISO 27001, PCI-DSS, HIPAA, GDPR, CMMC or FedRAMP) 𝙨𝙝𝙤𝙪𝙡𝙙 𝙣𝙤𝙩 𝙗𝙚 𝙖 𝙘𝙪𝙢𝙗𝙚𝙧𝙨𝙤𝙢𝙚 𝙖𝙣𝙙 𝙥𝙖𝙞𝙣𝙛𝙪𝙡 𝙚𝙭𝙚𝙧𝙘𝙞𝙨𝙚. 👌 😢Are you busy developing your product or business and don’t have time and resources to be consumed by compliance efforts and endless meetings, halting your production for months? 😢You quickly need quick security or privacy awareness training, cloud security posture assessment, endpoint security (MS 365 - Intune, Jumpcloud, Google Workspace), or penetration testing? 💪Want to decrease your sale cycle by being compliant and having all the answers for the security and privacy questionnaires? 😢Missing ISO 27001, SOC 2, PCI-DSS? Can you count the lost $ because you didn't know the correct answers for those hardcore security questionnaires? 💪Need PCI-DSS ASV (approved scanning vendor) scans to support your PCI compliance? Got your back! 💪Facing the challenges of the security and privacy implications of AI products? 💪Want continuous access to a certified, creditable security, compliance, and privacy professional to manage your security framework? -> Continous virtual CISO (vCISO / fractional CISO) service with affordable weekly payments! 💪💸Do you want to ensure that your security project will be successful? --> ISO 27001/SOC 2/PCI-DSS/FedRAMP Certification projects are delivered with a MONEY BACK GUARANTEE! If you don’t get certified, all my fees will be refunded! 😟Need world-class, battle-proof security and privacy policies? Maybe you need it quickly? The kind of ones that have passed audits by KMPG, Microsoft, PWC, Deloitte, E&Y, Pepsi, Rolex, Uber, Verizon, Philips, Facebook, and many others? 🤔Already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, OneTrust Compliance Automatization/Tugboat Logic, SecureFrame, Strike Graph, Audit Board, Trust Cloud, and so on) but don’t know the next step or don’t have time for it? 😱Do you want to ensure your remote work team works securely? 📣If you answered yes to any of the above, you can easily solve it! Click on the green invite button at the top right corner to invite or message me. 📣📣 🚫No hacking service! Don't ask to hack, crack, or gain access to any accounts, systems, social media, etc. Please note that all invitations for this will be declined. 🚫I only serve businesses, no service for private individuals!🚫 Working with me, you will: ★ Get the burden of security and compliance management taken off your shoulders so you can focus on building your company ★ Get an end-to-end, professionally managed service ★ Get a consultant aiming for long-term support and providing advice and services to enable you to achieve growth-phase plans and targets by establishing a solid security and governance framework to win Enterprise clients. ★ Have access to a pool of hand-picked security professionals for SecOps, DevOps, Cloud security, penetration testing, application security, and endpoint security. --- My stats are: ✅Saved tens of thousands $$$$$ for clients, advising them on the right security tools, solutions, and approach ✅Enabled businesses to generate increases in ARR 💵 by getting them compliant and secure ✅#1 in Information Security and IT compliance categories (1M+ earned) ✅Supporting all time zones ✅Long-term engagements ✅Professional certifications (CISA, CISSP, ISO 27001 IA) Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, CAIQ, VAS, HECVAT, OneTrust, Compliance management tools: Drata, Vanta, Onetrust Compliance Automatization - Tugboat Logic, Sprinto, SecureFrame, Thoropass (HeyLaika), Trust Cloud, Strike Graph, Audit Board, ISMS.online, Instant27001.com Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS), IRAP. Projects not for me: ✖Asking to fill security questionnaires, providing the appropriate answers but not implementing controls ✖Asking to create falsified audit or assessment reports
    vsuc_fltilesrefresh_TrophyIcon Information Security
    SOC 2
    HIPAA
    SOC 2 Report
    Risk Management
    Information Security Governance
    Cloud Security
    Information Security Audit
    Certified Information Systems Security Professional
    Governance, Risk Management & Compliance
    ISO 27001
    Information Security Consultation
    IT Compliance Audit
    Cybersecurity Management
    Security Policies & Procedures Documentation
  • $90 hourly
    Security engineer and technical editor/writer specializing in cybersecurity architecture, operations, compliance/audit readiness, vulnerability scanning/pen testing, and technical documentation. Experience drafting security policies/procedures, and conducting cybersecurity framework mapping/pre-audit prep for NIST, PCI DSS, SOC2, HIPAA, HITRUST, GDPR, ISO 27001, and privacy and security frameworks. Proven track record of technical team and project management.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    HIPAA
    Technical Documentation
    NIST SP 800-53
    ISO 27001
    Technical Writing
    IT Compliance Audit
    SOC 2 Report
    Internet Security
    Security Infrastructure
    Application Security
    Penetration Testing
    Cybersecurity Management
    System Security
  • $15 hourly
    I have a strong background in ISO 27001, 22301 and SOC2 documentation (mandatory policies, risk assessment and treatment registry, etc.) implementation and certification. Achievements ISO 27001 Lead Auditor Managed Readiness up to Certification for ISO 27001: 2013 ISO 9001:2015 ISO 22301:2019 ISO 17100:2015 SOC 2 CREST Other achievements: • Implemented a Document Management System • Established ACE Hour • Increase turnaround time by implementation of Automation Projects: Buying Requisition Canvassing Request Request for Payment Online Facilities Request
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Security Analysis
    Atlassian Confluence
    ISO 27001
    SOC 2 Report
    Document Control
    ISO 9001
    Documentation
    Internal Auditing
    Business Process Management
    Technical Writing
  • $100 hourly
    passionate security enthusiast interested in assisting a team increase their security posture by providing guidance and consultation on building and improving security operation capabilities, reducing overall attack surface with proper vulnerability management, and security engineering/architectural improvements.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Security Operation Center
    Security Engineering
    Cloud Engineering Consultation
    Cloud Computing
    Cloud Security
    Security Analysis
    Google Cloud Platform Administration
    Information Security Governance
    Network Security
    Configuration Management
  • $20 hourly
    I protect your content from getting stolen over the web and if someone is using your content without your permission, I report and take down the pirated content under DMCA. I provide services to online content creators such as writers, bloggers, photographers, and the companies who own intellectual content of any type, or copyright products. My motto is to end content piracy. Here is my Plan of action: 1) I start by searching for all the websites which are stealing and using your content, through all the web search engines (Google, Bing, Yahoo, AOL, Yandex, etc.) using multiple effective keywords. 2) I de-index (remove) those websites from the search engines. It will help to stop your audience go on the infringing website in the first place and this process also helps if the infringing website is not willing to remove the content directly. 3) Send DMCA takedown notices to the website owners and their hosting providers. 4) Reporting infringing content on social media platforms and video sharing websites like Facebook, Instagram, Pinterest, Reddit, YouTube, Twitter, Dailymotion, VK, OK, Youku, Archive.org, 4shared, Vimeo, Google-drive, and many more. 5) Keeping a complete follow-up of the work done. 6) Provide you with weekly reports regarding the work and progress. Why choose me? I leave no stones unturned in protecting your content. Moreover, I am committed to providing customer satisfaction. I make sure that my client is up to date about the work progress and is able to get a complete follow-up regularly. I put all my efforts in a task that I have assigned. Let me assist you with my quality service. Thank you.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Intellectual Property Protection
    Legal
    Trademark
    Internet Security
    Copyright
    Legal Assistance
    Trademark Law
    Copyright Law
    Copyright Search
    Intellectual Property Law
    Legal Research
  • $30 hourly
    With a degree in Computer Engineering and a passion for writing, my experience spans across writing whitepapers, blogs, research reports, content for websites, thesis for academic submissions, sales pitch, business proposals and more. I am highly organized and schedule my time to get things accomplished accordingly. I am detail-oriented and an excellent researcher. I can be entrusted with big projects as I prefer to complete my work before deadlines giving you ample time to review my work and provide feedback. I take pride in my work
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Amazon Web Services
    Robotics
    Editing & Proofreading
    Artificial Intelligence
    Blockchain
    Website Copywriting
    ISO 27001
    Cloud Security
    Disaster Recovery
    Network Security
    Policy Writing
    Technical Writing
    PCI
    Project Risk Management
  • $40 hourly
    An individual following the rule of “Ten Thousand Hours” working in cyber security domain for both perspectives defensive and offensive. Always curious to find “What, Why, How, Which” lead me dig more into the depth of technology. The more I dig, the more I find to learn and implement along with more possibility to find and mitigate security loopholes. Following the pathway “Understand, Learn, Implement and Improve”. High Level Insights to my Core Expertise and Skills: o Blue Teaming o Purple Teaming o Red Teaming o IT / Cyber Security Audit o End Point Security o Network Security o Risk Assessment o Threat Modeling o Vulnerability Management o Pen Testing o Patch Management o Cyber Security Audit & Compliance & Policy (ISO, NIST, PCI DSS) o Security Bench-marking (CIS) Let's connect for free consultation.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Splunk
    Security Operation Center
    Incident Management
    Threat Detection
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Ethical Hacking
    Risk Assessment
    Cloud Security
    Cybersecurity Management
    Security Assessment & Testing
    Penetration Testing
    Vulnerability Assessment
    Network Security
  • $50 hourly
    Transforming Information Security into a Competitive Advantage! I have the ability to translate complex compliance requirements into clear and concise language that resonates with the business. I'm a certified senior professional specializing in implementing and managing diverse security frameworks, including ISO 27000 family, SOC 2, PCI, GDPR, HIPAA, FedRAMP and CMMC. With a proven track record of guiding businesses to successful certification, I can help you achieve compliance while mitigating risks. Don't wait until it's too late! Contact me now and avoid drowning in compliance requirements. I'm well-versed in compliance platforms like Thoropass, Drata, StrikeGraph, and TrustCloud. Explore how I can assist you and inquire about my 10% referral discount.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    CMMC
    Risk Management
    Microsoft SQL Server
    Security Framework
    NIST Cybersecurity Framework
    HIPAA
    GDPR
    NIST SP 800-53
    Data Privacy
    Information Security Audit
    Compliance
    Governance, Risk Management & Compliance
    ISO 27001
    SOC 2 Report
  • $100 hourly
    🌟 Upwork TOP RATED Expert Cybersecurity Analyst ✅ Dark Web Cyber Threat Intelligence ✅ Reverse Engineering, Malware Analyst ✅ WordPress Malware Removal & Hacked Website Recovery ✅ Digital Forensic investigations (Access Data FTK Imager, Autopsy, OSF Forensics, Autopsy, Winhex Editor, and more). ✅ Vulnerability Management: OSINT Investigation, Passive and Active Scanning ✅ Network Security: Firewall (Sophos, pfsense, Fortigate, and Palo Alto), IDS/IPS (Snort and Suricata), OpenVPN (Site-to-Site) ✅ Cyber Security Articles: Technical Writing, Blog Writing, Article Writing, Research Reports, Scientific Reports, ebooks, and Blogs (Fluent in American or British English) Hello, My name is Stephen, a Cyber Security Analyst specializing in Network and Information Security 🌟 I have provided expert cybersecurity and compliance consulting for startups to fortune 50 enterprises! 🌟 I currently hold the following educational degrees and certifications: ✅ Bachelor's Degree in Mathematics and Computer Science ✅ Certified Ethical Hacking ✅ Certified Penetration Tester and Bug Bounty Hunter ✅ Autopsy Digital Forensics My vision is to create Cyber Security awareness and provide security solutions to companies.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Snort
    Wireshark
    Ethical Hacking
    Network Analysis
    PfSense
    Kali Linux
    Website Security
    Digital Forensics
    Computer Network
    Network Security
    Intrusion Detection System
    Information Technology
    Intrusion Prevention System
    Technical Writing
  • $60 hourly
    As a Certified Information Privacy Professional (CIPP/US), I provide privacy law advice and specialized privacy notices and related documents for business, website, mobile app, and SaaS owners. This helps my clients comply with the U.S. and global privacy laws and regulations. SUBJECTS OF SPECIALIZATION • Draft globally compliant privacy notices for website, mobile app, and SaaS owners. • California Consumer Privacy Act (CCPA), (CPRA), and other U.S. state privacy laws. • General Data Protection Regulation (GDPR), Canadian, and other global privacy laws. • Data Subject Access Requests (DSARs). • International transfer of data and standard contractual clauses. • Data controller processor regulations and data processing agreements. • Risk management, ISO 2700, and NIST Cybersecurity Framework • Blockchain technology, cryptocurrency, and artificial intelligence (AI). • Assessing vendors and processors. • Privacy impact assessments, data mapping, and record of processing activities. • COPPA and global children and student privacy laws. • HIPAA and HITECH compliance and data protection policies. • Comprehensive data management from the beginning of the cycle to the end. • Internet advertising laws and regulations. My services also include drafting documents and providing guidance including, but not limited to the following: • Privacy notices to comply with the CCPA, US, GDPR, and global privacy laws • Data processing agreements between controllers, processors, and subprocessors • Standard contractual clauses • Data privacy impact assessments • Data protection policies • Data subject access requests (DSARs) response letters • Children's privacy notices to comply with COPPA and global privacy laws • Privacy law training • NIST and cybersecurity frameworks • Internet terms and conditions --- It's the little things in documents most people do not see that protect or hurt their business.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Legal Writing
    Compliance
    Data Privacy
    HIPAA
    Business Development
    Policy Writing
    Privacy Law
    GDPR
  • $111 hourly
    I specialize in Cybersecurity, threat mitigation (hacking cleanup and repair) and system administration on a enterprise scale, as well as full stack development. Complete, integrated and reliable solutions to the most challenging and unique business IT needs, no matter the complexity or difficulty. Fluent in PHP, HTML, JavaScript, Node, and several other programming languages. Experienced Network architect Cybersecurity preventative monitoring and protection, threat detection, and response Cloud Infrastructure management, consulting, and deployment Web & Database migration, management and repair I am your complete IT solutions provider, with over 5+ years of experience!
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Security Assessment & Testing
    System Administration
    Vulnerability Assessment
    Security Engineering
    Cloud Security
    Malware Removal
    Cloud Management
    Cloud Architecture
    Security Infrastructure
    IT Consultation
    System Hardening
    DevOps
    PHP
    WordPress
  • $10 hourly
    **I only bid on that project which I can deliver with complete satisfaction.** If your Instagram or Facebook is Hacked or Locked and your email or number is changed and facing 2FA you are in the right place. *For Hacked Account Recovery I Take Fix Price Which I Discuss before Start Project* I can provide solutions with the following: ✅ Social media accounts set up and integration ✅ Social Media Management ✅ Social Media Optimization ✅ Social Media Error Fixing ✅Hacked Instagram Recovery ✅ Assistance with hacked Instagram account ✅ Assitance with stolen Facebook account ✅ Facebook business page recovery ✅ unauthorized ads payment on ads manager recovery ✅ Accounting ✅ Social media account recovery ✅ 2FA solution ✅ Google My Business ✅ Virtual Assitance ✅ All kinds of Social accounts Retrieve and All sorts of Error Fixing and name a few & I will let you know my experience. I am always eager to learn new skill. In response to your expectations: 1. I have expertise in the area required by you. 2. I can start the project immediately and complete your milestone as per your timeline. I believe communication is key to any successful project, and I'd like to start things off on the right foot, but I suggest we schedule a call to discuss the project further. This will enable us to make sure that we communicate well and are completely comfortable with the scope of the project. Please let me know the time that works best for you and I will make sure that I make myself available. Thank you for your time and consideration.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Facebook
    WordPress Malware Removal
    Malware Removal
    Facebook Page
    Ethical Hacking
    Social Media Management
    Social Media Marketing
    Digital Marketing
    Instagram Plugin
    Instagram
    Technical Support
    Accounting
  • $35 hourly
    Expert technical writer with 10+ years of experience writing technical manuals, charters and SOPs for professionals. If you're ready to prepare and finalize purpose-driven documents for your business, contact me. I can help you create clear and concise standard operating procedures (SOPs), user manuals, Youtube scripts, SEO blog posts and training modules. I also have experience with conducting research and requirements gathering, content writing and creative writing. Over the past 10 years, I have worked with businesses in various industries, including IT, software and healthcare. Services: Technical writing, content writing and creative writing including the following: - Standard Operating Procedures (SOPs) - User manuals - Training modules - Youtube scripts on technical topics - SEO blog posts related to healthcare, IT and cybersecurity - Templates - Speeches - Powerpoint presentations - ChatGPT prompts and content - Technical specifications - Research for lead generation - Streamlining and automation of spreadsheets Skills: - Technical writing and editing - Creative writing - Excellent technical comprehension - Knowledge of style guides and document formatting - Experience with version control systems - Proficient in Microsoft Office, PowerPoint, Excel, Google Suite, ChatGPT and Canva - Excel data visualization including formulas and simple macros Work Process: 1) Review the client's work description to understand their objective 2) Research and gather information online 3) Create an outline and get approval from the client 4) Write a first draft and submit it for review 5) Revise the content based on client feedback 6) Submit the final draft for approval Why Choose Me: I work collaboratively with clients to ensure that their specific needs and requirements are met I am committed to meeting deadlines and delivering high-quality documentation that meets or exceeds client expectations I can convey complex information in a clear and concise manner I have a keen eye for detail, ensuring that all documentation is accurate and error-free I have 10+ years of experience in technical writing, a Masters and CAPM (Certified Associate in Project Management) What My Clients are Saying: "Easy to work with" "Paid attention to details" "Completed the job on time" "I really like the quality of the work" "Spot on" Let's discuss your project and how I can help you achieve your documentation goals. My time zone is GMT+2 (While my home base is Ontario, Canada, I'm currently working from Kigali, Rwanda).
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Instructional Design
    Cybersecurity Management
    NIST Cybersecurity Framework
    Digital Project Management
    Formatting
    Content Writing
    Project Requirements
    Project Planning
    Product Requirements Document
    Microsoft Excel
    Lead Generation
    Technical Writing
    User Manual
    Microsoft Word
  • $48 hourly
    Please, do not send me offer to hack social media accounts or to recover them, its not something that i am doing. Qualifications: From May 2022, I am OSWE ( Offensive Security Web Expert) From July 2020. I am officially OSCP ( Offensive Security Certified Proffesional ). I am Certified Network Security Specialist (CNSS) by International CyberSecurity Institute ( ICSI ). Completed Cisco introduction to Cybersecurity. Completed AttackIQ foundation of purple teaming. Completed Api Security Architect from API Academy. I work is fast and accurate, I am always available online (e-mail, Upwork or anything that suits you) and I'll do my best to keep my clients updated during (and even after) our collaboration. I can reveal all known and unknown vulnerabilities within your website/web application. I am able to find 0day vulnerabilities and i can help you fix them with best and most efficient practice. I prefer manual testing because no tool is smarter than a man. Tools can show false positives and cannot go as deep as humans, that is why manual testing is a must. Also I am a leader of CTF team called Imperium.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Penetration Testing
    Web Application Security
    Information Security Consultation
    Cybersecurity Management
    Security Assessment & Testing
    Database Security
    Application Security
    OWASP
    Security Analysis
    Internet Security
    Network Penetration Testing
    Source Code Scanning
    Web App Penetration Testing
    Vulnerability Assessment
    Network Security
  • $150 hourly
    PKI Security products and solutions related Cryptography, PKCS#11, HSM, Smart Card, Multi-factor Authentication, OTP Authentication, Bio-metric authentication, Application Security, Encryption, Digital Signature, CSP, Credential Provider, solution conforming to NIST FIPS-140 level 2/3 certification, PIV, CAC, Entrust, Id-entrust, CMS solutions, MS Identity life cycle Manager, Minidriver, SSL and VPN integration, Various Identity access control and management solutions, Worked on solutions targeted for Desktop (Windows, Linux, Mac), Embedded Software, IOT Device solutions, Android Native Development, Cloud solutions, - Languages*:: C, C++, Java, QT, C# ,Python,Javascript, TypeScript - Operating System:: Windows, Android,vxWorks, Linux, Embedded Linux - Tools:: GCC, GDB,LLVM, LLD, Android Studio, Shell scripting, Eclipse, Visual Studio - Standards/ API:: PKCS # 11, #12 , MS CAPI, Credential Provider, TokenD, KeyChain APIs, ISO - 7816, Bluetooth / Bluetooth LE APIs, FIPS-140 level 2 & 3, KMIP specification, FIDO specifications, PCSC lite, - OpenSource:: OpenSSL, OpenSSH, - Web Technologies:: NodeJS, Protobuffer, DJanfo, Angular, HTML, CSS - HSM: IBM CloudHSM, AWS-CloudHSM, AWS-KMS, SafeNet CloudHSM, DPoD, SoftHSM, - Blockchain: Bitcoin and Ethereum signing with CloudHSM, BIP32 Signing, secp256k1 signing, Ethereum Signer with CloudHSM.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    OAuth
    Windows API Development
    Blockchain, NFT & Cryptocurrency
    C++
    Java
    JavaScript
    Reverse Engineering
    NFC
    C
    Android
    Python
    Cryptography
    Application Security
    Encryption
    Linux
    Elliptic Curve Cryptography
  • $125 hourly
    Hi, I'm Brad, also known as the InboxGenius. I am a highly skilled professional who is known for delivering exceptional results. Throughout my career, I have successfully collaborated with over 130+ clients on the Upwork platform, maintaining an impeccable track record with a flawless 100% job success score. My expertise lies in resolving complex email deliverability challenges, executing seamless email migrations, addressing corporate email deliverability issues, monitoring and actioning DMARC reports, and providing fully managed cold email campaigns without any involvement required on your part. I cordially invite you to schedule a consultation call, where we can further acquaint ourselves and discuss how InboxGenius can help you.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Migration
    Network Security
    Technical Support
    Google Workspace
    Email
    Network Administration
    Email Support
    Email Deliverability
    WordPress
    SMTP
    Cloud Migration
    Security Engineering
    IT Management
    Windows Server
    Office 365
  • $150 hourly
    I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startups and micro, small, and mid-sized companies create secure operating environments to increase business opportunities. I am also part of Upwork's Expert-Vetted Talent program. My priority is to create cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold a bachelor's degree in Telecommunications Engineering from the Airforce University in Argentina, a master's degree in Information Security Engineering from the SANS Technology Institute, and many cybersecurity certifications, including CISSP (Certified Information Systems Security Professional) and GSE (GIAC Security Expert).
    vsuc_fltilesrefresh_TrophyIcon Information Security
    WordPress Malware Removal
    Malware Removal
    CMMC
    Risk Assessment
    Cloud Security
    Internet Security
    Information Security Audit
    Information Security Awareness
    Security Engineering
    Security Analysis
    Email Security
    Penetration Testing
    Security Policies & Procedures Documentation
    Cybersecurity Management
  • $95 hourly
    I am a Cyber Security and Information Technology expert with 20 years experience ranging from small start-ups to multi-billion euro businesses. I hold a CISSP, the gold standard of Information Security Qualifications. I specialise in Strategy, Governance, Risk and Compliance - this makes me ideal for projects such as: Helping you achieve Cyber Essentials or IASME Governance status PCI-DSS & ISO 27001 compliance programs and audits Being your Cyber Security / Info Sec manager or CISO on a part-time basis Selecting and managing IT and Cyber Security suppliers on your behalf Writing, reviewing and updating your IT and Cyber Security policies Security Awareness Training I am an award winning public speaker and trainer and my Cyber Security Awareness Training is very popular delivered in person or from my online studio to clients around the world.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    GDPR
    Security Infrastructure
    Information Security Awareness
    ISO 27001
    PCI DSS
    Information Security Audit
    Information Security Governance
    Certified Information Systems Security Professional
    PCI
    Security Policies & Procedures Documentation
    Incident Response Plan
    Vulnerability Assessment
    Security Assessment & Testing
    Network Security
  • $30 hourly
    I'm a Penetration Tester and Cyber Security Specialist who is a professional in evaluating the security posture of Web-Applications (Websites) and ensuring the security of personal clients' online identities, accounts, devices, and networks, I've possessed my current knowledge through 3+ years of self-study and research plus 2+ years of work in the industry, protecting clients on a personal level and running vulnerability assessments against business websites, always leaving positive impression and impact, I hold a great record of being able to expertly provide the following services: - Perform comprehensive security checkups on Emails and Phone numbers and pinpoint security holes which often lead victims to be hacked with zero interaction nor awareness from them. - Assist in Account Recovery (Ex. Instagram, Facebook) - Educate thoroughly on the findings and remediations for a vulnerable target, equipping clients with enough information to trust themselves as they continue to utilize the technologies as normal with no fear of being targetted by hackers. - Investigate and educate on online frauds/scams, especially crypto ones, why and how they work, and how to distinguish between legit and not legit easily. - Clean up networks and devices from viruses/malware and ensure optimal patching for security. - Report fraud websites that impersonate legit businesses for a takedown. IMPORTANT: When it comes to cybersecurity-related services, there is a number of scammers not to be underestimated, whether within or outside of Upwork, therefore stay vigilant and keep in mind the following, 1. If you were scammed online via crypto, there's no one out there with the right to give a guarantee that they will be able to recover it for you despite how well furnished the so-called hacker's portfolio appears to be, the chance remains very slim and you should only pursue this kind of service for the sake of leaving no stone unturned knowing the high probability of failure, and you should only select a freelancer with a reputable profile and reviews to back up their activity because scammer accounts are usually fresh with no reviews and no verified ID, feel free to consult me to evaluate that. 2. Same applies to the request of hacking an account, there are complicated caveats that explain why it DOES NOT work the way you think it does but to keep it short, if you want someone's account hacked, aside from it being illegal and unethical and isn't the type of "service" I provide, the chance for it to work is about 1% to begin with, again, I'm available for consultation, account recovery is a different subject with a higher probability for success as long as it's your own account that was lost/hacked.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Malware Removal
    Vulnerability Assessment
    System Security
    Network Security
    Information Security Consultation
    Website Security
    Penetration Testing
    Network Penetration Testing
    Internet Security
    Ethical Hacking
    Security Testing
    Security Assessment & Testing
  • $275 hourly
    🌟 TOP RATED PLUS Cybersecurity Consultant with 100% Job success rate 🌟 ✅ Penetration Testing: Standard, Web application, mobile applications. ✅ Compliance: CMMC, DFARS, NIST 800-53, NIST 800-171, PCI, HIPAA, GDPR, ISO, SOC, SOX, GLBA, FedRAMP, CCPA, and more. ✅ Incident Response: Ransomware recovery, hacking response, forensic investigations. ✅ vCISO: Virtual Chief Information Security Officer ✅ Vulnerability Management: Vulnerability Scanning Hello, It is great to meet you (virtually)! My name is Tyler. I have over 15 years of cyber-security experience in multiple verticals. I have worked with fortune 500 brands, government, military, and intelligence agencies. 🌟 I have provided expert cybersecurity and compliance consulting for startups to hundreds of businesses! 🌟 My core expertise resides in: compliance and governance (PCI, HIPAA, SOC 2, NYSDFS, CMMC, DFARS, ISO, NIST, GDPR, and more), ethical hacking, incident response, penetration testing, secure design and architecture, and public speaking. I am an excellent writer and also possess business savvy. Pairing technical expertise with exemplary writing skills is my forte. I am also fluent in Brazilian Portuguese. I currently hold the following educational degrees and certifications: ✅ Master of Business Administration (MBA) ✅ Bachelor of Science in Cyber-Security ✅ Certified Information Systems Security Professional (CISSP) ✅ GIAC Certified Incident Handler (GCIH) ✅ GIAC Security Essentials Certification (GSEC) ✅ Microsoft Certified Systems Expert (MCSE) ✅ Microsoft Certified Systems Administrator (MCSA) ✅ Microsoft Certified IT Professional (MCITP) ✅ CompTIA Security+ ✅ CompTIA A+ ✅ CIW Web Design Associate WHY CHOOSE ME OVER OTHER FREELANCERS? -Professionalism: I treat all clients with respect and honor their trust in my services. -Expertise: I have expertise across many cybersecurity, information technology, and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. -Dedication: When i take on a task or project, you deserve my undivided attention and focus! -Versatility: I can easily pivot from many different tasks. Whether your project is a standard penetration test or a Chief Information Security Officer engagement, I have the ability, knowledge, experience, and credentials to adjust based on your requirements. -I have led over 150 incident response cases. -I have brought over 75 organizations to full compliance for DFARS, NIST, PCI, HIPAA, GDPR, and more. -I have conducted over 200 penetration tests. ✅ I will ensure that you get the results that you deserve. My clients trust me to complete their tasks and I ALWAYS deliver! Whether you are seeking a long term partner or a short term project, I am ready to deliver the high quality results that you deserve.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Certified Information Systems Security Professional
    HIPAA
    Defense Federal Acquisition Regulation Supplement
    Policy Writing
    GDPR
    Internet Security
    Security Analysis
    Encryption
    Security Assessment & Testing
    Application Security
    Incident Response Plan
    Vulnerability Assessment
    Network Security
    Penetration Testing
  • $40 hourly
    As a seasoned Senior Security Analyst, I bring forth seven years of dedicated expertise in fortifying the Cybersecurity landscape for enterprises, corporations, and medium-sized businesses. My proficiencies encompass an extensive range, including: -Orchestrating the full spectrum of incident response life cycles and post-incident activities. -Mentoring and guiding junior colleagues in mastering the intricacies of incident response cycle. -Crafting robust Information Security policies and procedures tailored to organizational needs. -Authoring comprehensive security guidelines to empower security personnel with actionable directives. -Conducting thorough training sessions for employees, covering the breadth of Cybersecurity awareness. -Configuring SIEM alarm rules and formulating clear incident response playbooks. - A hands-on experience with SOAR platforms, fostering a seamless operational environment. My forte lies in delivering quick security alarm analysis across various domains and tools, including: Web security and email security solutions, security awareness platforms, Microsoft and Amazon security stack, brand and digital landscape protection, EDR and HIPS, as well as an array of SIEMs such as LogRhythm, Qradar, Sentinel, XDR, Rapid7, Amazon. With a commitment to robust security measures and a track record of elevating defenses across multifaceted environments, I am committed to contribute expertise that safeguards and fortifies your organization against evolving threats.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Security Operation Center
    GDPR Compliance Review
    GDPR
    ISO 27001
    Information Security Consultation
    Vulnerability Assessment
  • $30 hourly
    Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP​ 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is our key differentiator. Please check my Upwork work history and client feedbacks. I look forward to hearing from you!
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Website Security
    OWASP
    Web Application Security
    Information Security Audit
    Certified Information Systems Security Professional
    Vulnerability Assessment
    Security Testing
    Network Security
    Penetration Testing
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

Information Security Analysts Hiring FAQs

What is an information security analyst?

With the scale and complexity of networked environments growing every year, the need for seasoned information security analysts has become more prevalent. Upwork provides access to information security talent adept at overseeing and managing risk in the areas of network security, cyber security, and endpoint security.

How do you hire an information security analyst?

You can source information security analysts on Upwork by following these three steps:

  • Write a project description. You’ll want to determine your scope of work and the skills and requirements you are looking for in an information security analyst.
  • Post it on Upwork. Once you’ve written a project description, post it to Upwork. Simply follow the prompts to help you input the information you collected to scope out your project.
  • Shortlist and interview information security analysts. Once the proposals start coming in, create a shortlist of the professionals you want to interview. 

Of these three steps, your project description is where you will determine your scope of work and the specific type of information security analyst you need to complete your project.  

How much does it cost to hire an information security analyst?

Rates can vary due to many factors, including expertise and experience, location, and market conditions.

  • An experienced information security analyst may command higher fees but also work faster, have more-specialized areas of expertise, and deliver higher-quality work.
  • A contractor who is still in the process of building a client base may price their information security analyst services more competitively. 

Which one is right for you will depend on the specifics of your project. 

How do you write an information security analyst job post?

Your job post is your chance to describe your project scope, budget, and talent needs. Although you don’t need a full job description as you would when hiring an employee, aim to provide enough detail for a contractor to know if they’re the right fit for the project.

Job post title

Create a simple title that describes exactly what you’re looking for. The idea is to target the keywords that your ideal candidate is likely to type into a job search bar to find your project. Here are some sample information security analyst job post titles:

  • Need marketing manager with experience in information data security
  • Cyber security analyst needed to oversee corporate governance project
  • Database analyst with security experience needed for financial institution

Project description

An effective information security analyst job post should include: 

  • Scope of work: From developing security policies to implementing network security strategies, list all the deliverables you’ll need. 
  • Project length: Your job post should indicate whether this is a smaller or larger project. 
  • Background: If you prefer experience with certain industries, software, or environments, mention this here. 
  • Budget: Set a budget and note your preference for hourly rates vs. fixed-price contracts.

Information security analyst job responsibilities

Here are some examples of information security analyst job responsibilities:

  • Help manage the enterprise information security infrastructure for a software development company
  • Support vulnerability review, management, and remediation efforts
  • Create the incident response plan and implement the business continuity plan 

Information security analyst job requirements and qualifications

Be sure to include any requirements and qualifications you’re looking for in an Information security analyst. Here are some examples:

  • Bachelor’s degree in IS or related field 
  • Minimum 5 years experience in vulnerability scanning and remediation
  • Excellent knowledge of Microsoft Windows and virtualization technologies
View less
Schedule a call