Hire the best Information Security Analysts

Check out Information Security Analysts with the skills you need for your next job.

Clients rate Information Security Analysts
Rating is 4.7 out of 5.
4.7/5
based on 1,807 client reviews
Howard Eldon P.
$150/hr
  • Trophy Icon Information Security
  • Reverse Engineering
  • Cryptography
  • Malware
  • Blockchain
  • Cryptocurrency

I am a cybersecurity professional with a Master's Degree in Cyber Operations and two years of work experience in cybersecurity research and development at a world-class R&D laboratory. In that job, I gained experience in network traffic analysis, malware analysis, and cryptography. For over two years, I have worked as a freelancer, providing consulting, content development, and course creation in cybersecurity and blockchain security. I specialize in development of technical content (blogs, whitepapers, case studies, and courseware) in the field of cybersecurity. I currently hold the Certified Ethical Hacker and Certified Blockchain...

Strahinja S.
$50/hr
  • Trophy Icon Information Security
  • Vulnerability Assessment
  • GDPR
  • ISO 27001
  • Security Operation Center
  • Information Security Analyst
  • Information Security Consultation
  • GDPR Compliance Review

ECSA - Certified Security Analyst LRPA - Certified LogRhythm Platform Administrator I am a Senior Cybersecurity Analyst with 6 years of professional experience in the Cybersecurity field providing services to corporations and medium-sized businesses that are leaders in their respective industries. Have become proficient in: -Vulnerability assessment and analysis -Full incident response life cycle and incident report writing. -Training Junior colleagues in Cybersecurity Incident Analysis -Writing framework documentation (policies and procedures) -Conducting security audits of certain IT systems and report writing -Writing security...

Stephen K.
$30/hr
  • Trophy Icon Information Security
  • HTML5
  • CSS
  • PHP
  • MySQL
  • jQuery
  • Joomla
  • WordPress

Passionate and versatile IT professional with over 5 years of experience in Information security, web development, system administration, and Azure Cloud. Website development Skills: - WordPress website Development and Design. - WordPress plugin/theme development. - Joomla CMS development and support - PHP, HTML/CSS, Java, JavaScript, MySQL, AngularJS, VUE.JS, Node.JS - Website SEO / and Speed Optimization Information Security: - Virus/Malware Removal - Network Security | Firewall - WordPress, Joomla Security and hardening - SSL Certificates System Administration - CPANEL - FTP, DNS - IT Consultation - CDN Setup - Various Hosting...

Nikola M.
$60/hr
  • Trophy Icon Information Security
  • Vulnerability Assessment
  • Risk Analysis
  • Network Security
  • Black Box Testing
  • Investigative Reporter
  • Web App Penetration Testing
  • Network Penetration Testing
  • Penetration Testing
  • Gray Box Testing
  • Ethical Hacking
  • Metasploit
  • Digital Forensics
  • Kali Linux
  • Website Security

With over 10 years of experience in IT I’ve worked on projects ranging from system and network administration, education, planning, consulting, analysis, assessment and testing to investigative and forensic work. I bring high standards, tried and tested methodology with industry standard tools and techniques to deliver you professional results. I also have excellent communication skills while being fluent in 3 languages. I will always keep you up to date with the progress made, or if I have any questions, to ensure your awareness of how the assignment is moving along. I believe collaboration is key for a project to run smoothly towards a...

Mariusz Z.
$75/hr
  • Trophy Icon Information Security
  • Penetration Testing
  • Vulnerability Assessment
  • Cybersecurity Management
  • Security Assessment & Testing
  • Security Infrastructure
  • Web App Penetration Testing
  • Certified Information Systems Security Professional
  • Web Application Security
  • Cloud Security
  • Cloud Security Framework
  • Compliance Consultation
  • IT Compliance Audit
  • ISO 27001
  • Network Penetration Testing

Since 2014 I work professionally as a Pen Tester/Security Researcher. Between 2008-2013, prior switching full time to info sec, I've worked as a Programmer (C/C++, PHP, Java, node.js) and DevOps (AWS-based environments). Currently I work under my own brand (Z-Labs) delivering Penetration Testing / Adversary Simulation Exercises services to clients around the globe. I pride myself for: 1. Offering high quality penetration testing services conducted in safe and controlled manner by certified Security Expert (Since 2014 I'm CISSP, since 2016 I'm OSCP and since 2017 I hold SANS GXPN certification). 2. Putting emphasis on advanced manual...

Dalton H.
$75/hr
  • Trophy Icon Information Security
  • Technical Writing
  • Content Writing
  • Technology
  • Technical SEO
  • Technical Documentation
  • Research Papers
  • Search Engine Optimization
  • VMWare
  • Microsoft Azure

Hi, my name is Dalton and I'm here to help write your technical content! Before we get to my background, take a look at what some previous clients have said: "Dalton has been an absolute pleasure to work with. The communication, timeliness, and hard work really show in his writing. I highly recommend hiring Dalton with any writing needs!" - Robert Minns, Digital Marketing Specialist, OmTech "Dalton has been fantastic to work with. He is always on time, responsive, and open to feedback. He does an excellent job at coming up with ideas, researching a topic, and writing technical content." - Casey Donahue, Founder & CEO, Optiwatt Hi, my...

Andre S.
$30/hr
  • Trophy Icon Information Security
  • Kali Linux
  • Security Testing
  • System Security
  • Malware Removal
  • Website Security
  • Python
  • cPanel
  • Network Penetration Testing
  • Linux
  • Web App Penetration Testing
  • WordPress
  • Web Host Manager
  • Email Security
  • MySQL
  • Malware Website

9 years of experience with Linux servers in the hosting environment, with emphasis on web security, identification and malware removal(site cleanup) , investigation of how the hacking occurred, identify failures in web systems, pentest in web systems and solve other problems related to the hosting environment. Wordpress security expert, site cleanup and hardening. Performing a pentest in all kind of web applications and networks to find vulnerabilties that may put you application in risk.

saqlain s.
$20/hr
  • Trophy Icon Information Security
  • Intellectual Property Law
  • Copyright Search
  • Copyright Law
  • Trademark Law
  • Legal Assistance
  • Copyright
  • Internet Security
  • Trademark
  • Legal Research
  • Legal
  • Intellectual Property Protection

I protect your content from getting stolen over the web and if someone is using your content without your permission, I report and take down the pirated content under DMCA. I provide services to online content creators such as writers, bloggers, photographers, and the companies who own intellectual content of any type, or copyright products. My motto is to end content piracy. Here is my Plan of action: 1) I start by searching for all the websites which are stealing and using your content, through all the web search engines (Google, Bing, Yahoo, AOL, Yandex, etc.) using multiple effective keywords. 2) I de-index (remove) those websites...

Apurv M.
$30/hr
  • Trophy Icon Information Security
  • Azure App Service
  • Kubernetes
  • Cloud Computing
  • Microsoft SQL Server
  • GitHub
  • Azure
  • Docker
  • DevOps
  • Internet Security
  • Azure IoT HuB
  • Terraform
  • Ansible
  • Machine Learning
  • Cloud Security
  • Cloud Architecture

Cloud Solution Expert with five years of experience designing and developing enterprise-level solutions using the latest technologies, including Azure, AWS, GCP, Terraform, Ansible, DevOps, Machine Learning, AI, C#, ASP.NET MVC, Angular, SQL Server, Power BI, and Oracle. I have designed and executed multiple cloud and colo migrations. I have also worked on Azure search and Azure ML. I have extensive knowledge of cloud security and have performed comprehensive assessments and implementation of cloud environments. I have implemented Palo Alto's next-generation firewalls for the azure environment in enterprise solutions. I have worked on...

Robert B.
$125/hr
  • Trophy Icon Information Security
  • Microsoft Azure
  • Microsoft Office 365 Administration
  • IT Compliance Audit
  • Information Technology Strategy
  • Cybersecurity Management
  • Project Risk Management
  • IT Management
  • Project Management
  • Training
  • Business Process Reengineering

I believe in integrated approaches, thus why I focus entirely on Microsoft cloud and cybersecurity technologies to provide integrated security across different environments (on-prem, Azure and other clouds e.g. AWS etc.), and to maximize IT operations efficiency and business users productivity. I have couple Microsoft skill based certifications: Microsoft Cybersecurity Architect, Microsoft 365 Security Admin, Azure Security Engineer; ISACA certifications CISA, CISM and AHIMA CHPS certification – which also means that I know audit, privacy requirements and I understand value of compliance. I love cloud technology and cybersecurity, but I...

Mansoor A.
$30/hr
  • Trophy Icon Information Security
  • Web Application Security
  • Database Security
  • Security Analysis
  • Security Assessment & Testing
  • Security Testing
  • Ethical Hacking
  • Network Penetration Testing
  • Application Security
  • Website Security
  • Web Testing
  • Penetration Testing
  • Security Infrastructure
  • Web App Penetration Testing
  • Network Security

Are you looking for a professional ethical hacker to conduct a security audit or penetration test for your company? Look no further! With years of experience and a deep understanding of modern technology stacks and their vulnerabilities, I am well-equipped to provide high-quality penetration testing services to a wide range of clients. 🎯 Here are just a few reasons why you should hire me for your penetration testing needs: ✅ Extensive experience ✅ I have conducted and led hundreds of security audits, penetration tests, and red team engagements for a variety of companies, giving me a wealth of hands-on experience in the field. ✅...

Stephen P.
$80/hr
  • Trophy Icon Information Security
  • Contract Law
  • Legal
  • Contract Drafting
  • Regulatory Compliance
  • Risk Assessment
  • Compliance
  • Data Privacy
  • Information Management
  • Legal Writing
  • Compliance Consultation
  • Security Infrastructure
  • Security Analysis
  • Data Protection
  • GDPR
  • International Law

A seasoned IT and Compliance Professional with 20+ years experience in IT Operational Systems, Information Security Governanceand Compliance. I have been working as an ISO Consultant and Auditor for 8 years and manage projects for preparation of ISO 27k1 compliance, Data Governance & Compliance or supporting organisations in creating better Security Policies or Information Management Awareness. Strengths: I am good at adapting to situations in any circumstance, and I remain calm under pressure to ensure we don't lose focus on the end game. I am a great team player, both onsite and remote, and look to support the team, not stand out against...

Bhakti V.
$30/hr
  • Trophy Icon Information Security
  • Project Risk Management
  • PCI
  • Disaster Recovery
  • Technical Writing
  • Policy Writing
  • Network Security
  • Cloud Security
  • ISO 27001
  • Editing & Proofreading
  • Website Copywriting
  • Blockchain
  • Artificial Intelligence
  • Amazon Web Services
  • Robotics

With a degree in Computer Engineering and a passion for writing, my experience spans across writing whitepapers, blogs, research reports, content for websites, thesis for academic submissions, sales pitch, business proposals and more. I am highly organized and schedule my time to get things accomplished accordingly. I am detail-oriented and an excellent researcher. I can be entrusted with big projects as I prefer to complete my work before deadlines giving you ample time to review my work and provide feedback. I take pride in my work

Mohammad Z.
$70/hr
  • Trophy Icon Information Security
  • Network Security
  • Network Engineering
  • Microsoft Office
  • Active Directory
  • Cisco ISE
  • Cisco Prime
  • Cisco Certified Network Associate
  • Cisco Certified Design Associate
  • Amazon ECS
  • Microsoft SharePoint Administration
  • Microsoft Sharepoint
  • VPN
  • Technical Support
  • Incident Management

I am a highly skilled and certified IT expert with industry certifications and years of experience with AWS, Cisco Networking, Microsoft and Sharepoint Online. I have worked on numerous project both small and large scale and have proven success in these projects. I am looking to expand my portfolio and help your business succeed! Major Projects: SharePoint environment (DKT Solutions LLC): - Migrated company from Google Workspace to MSOffice 365 and utilized Power Automate to create workflows for task automation - Spearheaded SharePoint Online sites and utilized Office 365 tools to help transition to a remote work environment for users...

Anushka S.
$30/hr
  • Trophy Icon Information Security
  • System Administration
  • Project Management Professional
  • IT Management
  • Information Technology Operations
  • Technical Writing
  • Academic Writing
  • Project Management
  • Network Security
  • Security Assessment & Testing
  • Security Policies & Procedures Documentation
  • Cybersecurity Management
  • Splunk
  • Information Security Audit

Currently based in east coast USA, I am a seasoned IT professional with over 15 years of experience in multiple domains in IT such as Information Security and auditing, IT Project Management, IT Infrastructure Management, IT Operations, Business Analysis, Business Continuity and DR planning etc. Last worked as the Head of IT for five years in the Sri Lankan business of AIA Group, which is the largest insurance company in the world. I am now working as a freelance Consultant and accolade with the status 'TOP RATED' in Upwork. My skills are supported by industry leading professional and academic qualifications:- - Master of Science in...

Sagar K.
$40/hr
  • Trophy Icon Information Security
  • Security Testing
  • Security Analysis
  • Information Security Awareness
  • Kali Linux
  • Computer Network
  • Browser Automation
  • MySQL
  • Python
  • Core Java
  • Wireless Security
  • Web Testing
  • Linux
  • Penetration Testing
  • Wireshark
  • Ethical Hacking

A CyberSecurity Enthusiast, having great passion in learning new things related to cyber world. Interested in learning the inner workings of the applications. I've experience in Automating Browsers. I've done several Browser Automation Projects with Upwork Clients. I have experience of computer networking upto CCNA level especially in designing networks, routing and switching and securing them. I do penetration testing in my free time. I'm good at Java and Python programming and integrating them with oracle and MySQL. I've more than 2 years of experience working in cybersecurity field. I'll deliver projects on time.

Usman A.
$35/hr
  • Trophy Icon Information Security
  • Penetration Testing
  • Web App Penetration Testing
  • Network Penetration Testing
  • Ethical Hacking
  • Mobile App Testing
  • System Security
  • Vulnerability Assessment
  • Information Security Consultation
  • Web Application Security
  • Application Security
  • Cloud Security
  • Network Security
  • Black Box Testing
  • Security Testing

OSCP Certified with 5+ years of professional experience in different trade crafts of pentesting and red teaming. Challenges make me work more efficiently and what is a better challenge than doing penetration testing in which knowledge and experience is the main factor to successfully finding a way inside Targets. - Manual testing approaches with real impact vulnerabilities - Exposure to multinational companies and Swiss banks - Industry renowned certifications (OSCP - CEH - CPTE - CEI - CCNA) - "Find my way in" mentality therefore 80% of projects end up in successful breaches Key Skills for Pentesting Jobs...

Maria V.
$65/hr
  • Trophy Icon Information Security
  • Python
  • JavaScript
  • Security Engineering
  • Security Analysis
  • Linux
  • Security Testing
  • Information Security Consultation
  • Cryptography
  • Scripting
  • Email Security
  • Content Writing
  • Node.js
  • NodeJS Framework

I hack web and desktop applications and develop patches while leading a team of security engineers to coordinate our technical strategy

Mohammad Hussam A.
$80/hr
  • Trophy Icon Information Security
  • Linux
  • Web Application Security
  • Open Web Application Security Project
  • Docker
  • Network Security
  • Network Penetration Testing
  • Web App Penetration Testing
  • Nessus
  • Vulnerability Assessment
  • Security Testing
  • Kali Linux
  • Ethical Hacking
  • Penetration Testing
  • Metasploit
  • Digital Forensics

✅ Penetration Tester and Cyber security consultant acknowledged by leading companies in the tech field for reporting several high, and critical vulnerabilities in their systems and websites. After I go through multiple pentestinig techniques manually and automatically, at the end of the engagement, professional reports are provided, that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Let's get in touch and get your website and system secured 🛡️ 🏆 Cyber security consultation 🏆 Cyber security training 🏆 Network Penetration Testing 🏆 Active Directory Penetration...

Arvind N.
$30/hr
  • Trophy Icon Information Security
  • Penetration Testing
  • Network Penetration Testing
  • Web App Penetration Testing
  • Vulnerability Assessment
  • Internet Security
  • Security Analysis
  • Network Security
  • Python
  • Ethical Hacking
  • Azure
  • Security Operation Center
  • Cloud Security
  • Website Security
  • Application Security

I am a CEH professional certified by the EC council. I have more than eight years of experience in the Security domain. I have experience in information security, Penetration Testing, and Vulnerability assessment. I help organizations identify and meet their security goals through security assessments like: - Penetration Testing - Vulnerability Assessment - Policies and Procedures Assessment - Security Compliance Services - Risk Assessment - Social Engineering I can reveal all known and unknown vulnerabilities within your website/web application. I can find 0-day vulnerabilities, and I can help you fix them with the best and most...

Alex H.
$150/hr
  • Trophy Icon Information Security
  • Vulnerability Assessment
  • Cloud Security Framework
  • Security Policies & Procedures Documentation
  • Cloud Security
  • Incident Response Plan
  • Security Engineering
  • Security Analysis
  • Office 365
  • Microsoft Azure
  • Application Security
  • Security Infrastructure
  • Amazon Web Services
  • Compliance Consultation
  • SaaS

I have over 15 years of Information Security experience both in startups as well as Fortune 500 enterprises. I can help you find and implement solutions to your organization's security and compliance challenges. Services Offered: Cloud Security Engineering - Azure, AWS, GCP, Aliyun, Digital Ocean Cyber Security - Incident Response, Monitoring, Detection, Containment, Threat Hunting Security Engineering - Network Security, Endpoint Protection, Firewalls, DevSecOps Security Testing - Network Pentest, Application Pentest, Vulnerability Assessment IT Governance - Policies, Standards, and Procedures Documentation Authoring and Editing IT Risk -...

Taras Y.
$25/hr
  • Trophy Icon Information Security
  • WebHost Manager (WHM)
  • Copyright
  • SEO Audit
  • WordPress
  • cPanel
  • Page Speed Optimization
  • SSL
  • Technical Support
  • WordPress Malware Removal
  • WordPress Multisite

Higher pedagogical & philological education (MA degree). Full-time employment in North American webhosting/sites/servers industry since the times of graduating from university, on the positions of level 1 & 2 customer support agent in industry-leading hosting companies and in abuse department of one of the best datacenters in the USA, as junior & senior specialist & supervisor. Top skills: 1) WordPress-powered sites: years of experience with all administrative operations and processes that one might come across during the usage of various variations of WordPress (including but not limited to proper security and performance or turning...

Kalpna G.
$150/hr
  • Trophy Icon Information Security
  • Elliptic Curve Cryptography
  • Linux
  • Encryption
  • Application Security
  • Cryptography
  • Python
  • Android
  • C
  • NFC
  • Reverse Engineering
  • JavaScript
  • Java
  • C++
  • Blockchain, NFT & Cryptocurrency
  • Windows API Development
  • OAuth

PKI Security products and solutions related Cryptography, PKCS#11, HSM, Smart Card, Multi-factor Authentication, OTP Authentication, Bio-metric authentication, Application Security, Encryption, Digital Signature, CSP, Credential Provider, solution conforming to NIST FIPS-140 level 2/3 certification, PIV, CAC, Entrust, Id-entrust, CMS solutions, MS Identity life cycle Manager, Minidriver, SSL and VPN integration, Various Identity access control and management solutions, Worked on solutions targeted for Desktop (Windows, Linux, Mac), Embedded Software, IOT Device solutions, Android Native Development, Cloud solutions, - Languages*:: C,...

Alfonso V.
$50/hr
  • Trophy Icon Information Security
  • Amazon EC2
  • NGINX
  • Linux System Administration
  • Docker
  • DevOps
  • Penetration Testing
  • Ansible
  • Amazon Web Services
  • cPanel
  • WordPress

A self-motivated System and Network security administrator with more than 10 years in the management and analysis of Linux/Unix enterprise Servers (80 - 100 servers). With deep and advanced knowledge of highly scalable servers, SaaS Multi tenant architectures, DevOps and Continuous Integration, Micro Services ( Docker ), Kubernetes, Google Cloud Platform consultancy, Migrations, CI and CD, DevSecOps, and Ethical hacking. Lately Building " Ruby / Python / Nodejs / Laravel / Java " hosting environments highly available and scalable in AWS ECS / Docker / Google Cloud - Kubernetes / Azure. New Certification: "AWS Certified Solutions...

Shubham P.
$30/hr
  • Trophy Icon Information Security
  • Ethical Hacking
  • Web Application Security
  • Mobile App Testing
  • Penetration Testing
  • Reverse Engineering
  • Android App Development
  • Software Debugging
  • API
  • Internet Security
  • Java
  • Network Security
  • Website Security
  • Encryption
  • Android

An ethical Hacker having over 3 years experience across multiple roles in Information Security Domain and well versed with the Security Technologies, worked in many challenging environments, handled roles such as cybersecurity analyst, Security Engineer. Worked on Vulnerability Assessment & Penetration Testing, Mobile pen testing, web application pen testing, anti-phishing for clients. Also a content writer on hackingarticles.in CEH v10 Certified With a stronghold in: metasploit, NMAP, NetCat, hydra, SET and much more tools Bug Bounty Hunter With a stronghold in: Burp Suite/ Burp Suite exploitation, shell uploading, payload processing Web...

Daniel R.
$100/hr
  • Trophy Icon Information Security
  • Application Security
  • ISO 27001
  • Core Java
  • Certified Information Systems Security Professional
  • Single Sign-On
  • Python
  • Google Suite
  • Google Suite Administrator

I have served in lead SecOps and DevOps architecture and engineering positions for global companies in the technology, finance, healthcare, and education. For the past several years, my primary focus has been within the identity and access management suite. Moreover, I am an experienced Cybersecurity professional helping large organizations build upon their secure environments. This involved reviewing the information security program, achieve compliance and security standards, and aligning the IT strategies to business objectives byways of building an IT architecture and adopting new technologies I have worked for companies innovating in...

Umang B.
$15/hr
  • Trophy Icon Information Security
  • Active Directory Federation Services
  • Single Sign-On
  • Security Assertion Markup Language
  • Auth0
  • LDAP
  • Microsoft Active Directory
  • OAuth
  • OKTA
  • Microsoft Azure

SAML and SSO integration expert, Worked on Single Sign-on Integration tool, Identity and Access Management, and SIEM Tool ,having experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, ADFS, Azure, Okta, Cognito, OneLogin, Auth0, JumpCloud, SalesForce, Spring Security SAML, Ping, ComponentSpace, FIM, SiteMinder, SAP, OAM, Keycloak, ForgeRock, etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, etc.).

$NaN/hr

How it works

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses

Information Security Analysts Hiring FAQs

What is an information security analyst?

With the scale and complexity of networked environments growing every year, the need for seasoned information security analysts has become more prevalent. Upwork provides access to information security talent adept at overseeing and managing risk in the areas of network security, cyber security, and endpoint security.

How do you hire an information security analyst?

You can source information security analysts on Upwork by following these three steps:

  • Write a project description. You’ll want to determine your scope of work and the skills and requirements you are looking for in an information security analyst.
  • Post it on Upwork. Once you’ve written a project description, post it to Upwork. Simply follow the prompts to help you input the information you collected to scope out your project.
  • Shortlist and interview information security analysts. Once the proposals start coming in, create a shortlist of the professionals you want to interview. 

Of these three steps, your project description is where you will determine your scope of work and the specific type of information security analyst you need to complete your project.  

How much does it cost to hire an information security analyst?

Rates can vary due to many factors, including expertise and experience, location, and market conditions.

  • An experienced information security analyst may command higher fees but also work faster, have more-specialized areas of expertise, and deliver higher-quality work.
  • A contractor who is still in the process of building a client base may price their information security analyst services more competitively. 

Which one is right for you will depend on the specifics of your project. 

How do you write an information security analyst job post?

Your job post is your chance to describe your project scope, budget, and talent needs. Although you don’t need a full job description as you would when hiring an employee, aim to provide enough detail for a contractor to know if they’re the right fit for the project.

Job post title

Create a simple title that describes exactly what you’re looking for. The idea is to target the keywords that your ideal candidate is likely to type into a job search bar to find your project. Here are some sample information security analyst job post titles:

  • Need marketing manager with experience in information data security
  • Cyber security analyst needed to oversee corporate governance project
  • Database analyst with security experience needed for financial institution

Project description

An effective information security analyst job post should include: 

  • Scope of work: From developing security policies to implementing network security strategies, list all the deliverables you’ll need. 
  • Project length: Your job post should indicate whether this is a smaller or larger project. 
  • Background: If you prefer experience with certain industries, software, or environments, mention this here. 
  • Budget: Set a budget and note your preference for hourly rates vs. fixed-price contracts.

Information security analyst job responsibilities

Here are some examples of information security analyst job responsibilities:

  • Help manage the enterprise information security infrastructure for a software development company
  • Support vulnerability review, management, and remediation efforts
  • Create the incident response plan and implement the business continuity plan 

Information security analyst job requirements and qualifications

Be sure to include any requirements and qualifications you’re looking for in an Information security analyst. Here are some examples:

  • Bachelor’s degree in IS or related field 
  • Minimum 5 years experience in vulnerability scanning and remediation
  • Excellent knowledge of Microsoft Windows and virtualization technologies
View less
Schedule a Call