Hire the best Information Security Analysts

Check out Information Security Analysts with the skills you need for your next job.

Clients rate Information Security Analysts
Rating is 4.7 out of 5.
4.7/5
based on 1,807 client reviews
Akar P.
$20/hr
  • Trophy Icon Information Security
  • Cisco ASA
  • Network Security
  • Network Design
  • Network Administration
  • Network Analysis
  • Network Monitoring
  • Cisco Certified Internetwork Expert
  • Cisco Certified Network Associate
  • Network Planning
  • Cisco Router
  • Cisco Certified Network Professional

I am CCIE security and have about 10+ years of experience in network security domain. I am also specialist in network automation using python. Previously I have worked with well-known data centres in India for their infrastructure set up. And I also have a very good experience with cloud set of private or hybrid cloud public cloud. My skill sets are: VPN Switching Routing Firewall Proxmox AWS GCP OCI Monitoring tools setup and etc. I have worked on: Cisco Fortinet Paloalto Checkpoint Vyos Hp and etc.

Howard Eldon P.
$150/hr
  • Trophy Icon Information Security
  • Reverse Engineering
  • Cryptography
  • Malware
  • Blockchain
  • Cryptocurrency

I am a cybersecurity professional with a Master's Degree in Cyber Operations and two years of work experience in cybersecurity research and development at a world-class R&D laboratory. In that job, I gained experience in network traffic analysis, malware analysis, and cryptography. For over two years, I have worked as a freelancer, providing consulting, content development, and course creation in cybersecurity and blockchain security. I specialize in development of technical content (blogs, whitepapers, case studies, and courseware) in the field of cybersecurity. I currently hold the Certified Ethical Hacker and Certified Blockchain...

SOURAV S.
$70/hr
  • Trophy Icon Information Security
  • Python
  • Django
  • Algorithms
  • Backend Rest API
  • Docker
  • JavaScript
  • Node.js
  • Security Operation Center
  • API
  • RESTful API

Hi! I am Sourav - A seasoned backend software engineer with demonstrated experience in building cybersecurity SaaS products; having a post-graduate degree in Mathematics and Computing from a Tier-1 institution - Indian Institute of Technology, Banaras Hindu University(IIT-BHU), Varanasi. Currently, I work with QueryAI, where I own the product side of developing new integrations of third party vendors with Query.AI and simultaneously building the backend infrastructure to support newer integrations everyday. Previously, I have worked for FireEye (NASDAQ: FEYE) and Siemplify(Now part of Google Cloud) as a software developer and python...

Abdul W.
$10/hr
  • Trophy Icon Information Security
  • Technical Support
  • Instagram
  • Instagram Plugin
  • Digital Marketing
  • Social Media Marketing
  • Accounting
  • Social Media Management
  • Instagram Marketing
  • Ethical Hacking
  • Facebook Page
  • Instagram App
  • Malware Removal
  • WordPress Malware Removal
  • Facebook

**I only bid on that project which I can deliver with complete satisfaction.** If your Instagram or facebook is hacked and your email and number changed and facing 2fa so you are in the right place. *For Hacked Account Recovery I Take Fix Price Which I Discuss before Start Project* I can provide solutions with the following: ✅ Social media accounts set up and integration ✅ Social Media Management ✅ Social Media Optimization ✅ Social Media Error Fixing ✅ Instagram Recovery ✅ Assistance with hacked Instagram account ✅ Assitance with stolen Facebook account ✅ Facebook business page recovery ✅ Accounting ✅ Social media account...

Jemel K.
$85/hr
  • Trophy Icon Information Security
  • IT Compliance Audit
  • Risk Assessment
  • Project Risk Management
  • Compliance
  • Cybersecurity Management
  • Financial Audit
  • Internal Auditing
  • Internal Control
  • Information Security Audit

Hi Welcome to my profile! Looking for a SOC 2 expert? Or a SOC 2 consultant? Do you have questions about Type 1 vs Type 2? We can provide the SOC 2 guidance you are looking for. I am the CEO and Founder of ComplianceGiant (compliancegiant.com). We are compliance firm made up of compliance experts and security engineers. We help companies navigate the rough terrain of information security compliance. Whether you're a startup or have thousands of employees, compliance affects you. Our technology and compliance experts make compliance easy by providing tools and helping customers execute a compliance strategy and roadmap. We found that...

Vijay S.
$90/hr
  • Trophy Icon Information Security
  • Microsoft SCCM
  • Windows Server
  • Microsoft Active Directory
  • Active Directory Federation Services
  • Group Policy
  • VMware ESX Server
  • VMware Administration
  • Microsoft Hyper V
  • Computer Network
  • Amazon EC2
  • AWS Application
  • Microsoft Windows
  • System Administration
  • Microsoft Azure

I have 10 years of experience with multiple platforms. Passionate, self-motivated, and determined when engineering or architecting new solutions. I am looking to help with implementing, configuring, monitoring, troubleshooting, deploying applications, or just supporting find solutions to fit the clients' needs. Expert Cloud Architect and Systems Engineer Skills -Cloud: Amazon Web Services (AWS) -VMware: ESXi, vCenter, vSAN, VRA, NSX, VROPS, SRM -Windows: Server 2008, 2012, 2016, 2019, SQL, SCCM, Hyper-V, AD, GPO Certifications -Microsoft Certified Professional -VMware VCP 5 -Security +

Strahinja S.
$50/hr
  • Trophy Icon Information Security
  • Vulnerability Assessment
  • GDPR
  • ISO 27001
  • Security Operation Center
  • Information Security Analyst
  • Information Security Consultation
  • GDPR Compliance Review

ECSA - Certified Security Analyst LRPA - Certified LogRhythm Platform Administrator I am a Senior Cybersecurity Analyst with 6 years of professional experience in the Cybersecurity field providing services to corporations and medium-sized businesses that are leaders in their respective industries. Have become proficient in: -Vulnerability assessment and analysis -Full incident response life cycle and incident report writing. -Training Junior colleagues in Cybersecurity Incident Analysis -Writing framework documentation (policies and procedures) -Conducting security audits of certain IT systems and report writing -Writing security...

saqlain s.
$20/hr
  • Trophy Icon Information Security
  • Intellectual Property Law
  • Copyright Search
  • Copyright Law
  • Trademark Law
  • Legal Assistance
  • Copyright
  • Internet Security
  • Trademark
  • Legal Research
  • Legal
  • Intellectual Property Protection

I protect your content from getting stolen over the web and if someone is using your content without your permission, I report and take down the pirated content under DMCA. I provide services to online content creators such as writers, bloggers, photographers, and the companies who own intellectual content of any type, or copyright products. My motto is to end content piracy. Here is my Plan of action: 1) I start by searching for all the websites which are stealing and using your content, through all the web search engines (Google, Bing, Yahoo, AOL, Yandex, etc.) using multiple effective keywords. 2) I de-index (remove) those websites...

Tuhin A.
$37/hr
  • Trophy Icon Information Security
  • Vulnerability Assessment
  • System Administration
  • Bug Fix
  • WordPress
  • Website Security
  • DNS
  • Virus Removal
  • WordPress Malware Removal
  • WordPress Development
  • Troubleshooting
  • Web Hosting
  • Malware Removal
  • Cloudflare
  • Email Deliverability

Are you searching for a dedicated Cyber Security professional, WordPress debugging expert, or Server Administrator to handle your business needs with the same level of commitment and expertise as you? Let's schedule a conversation to discuss how I can assist. My services go beyond simply updating and installing security plugins - I also conduct website audits and provide comprehensive reports of findings and a list of actions taken to secure the website. My objective is to ensure your website is clean, secure, up-to-date, and fully functional. With nine years of experience, I have successfully repaired hundreds of hacked and broken...

Nikola M.
$60/hr
  • Trophy Icon Information Security
  • Vulnerability Assessment
  • Risk Analysis
  • Network Security
  • Black Box Testing
  • Investigative Reporter
  • Web App Penetration Testing
  • Network Penetration Testing
  • Penetration Testing
  • Gray Box Testing
  • Ethical Hacking
  • Metasploit
  • Digital Forensics
  • Kali Linux
  • Website Security

With over 10 years of experience in IT I’ve worked on projects ranging from system and network administration, education, planning, consulting, analysis, assessment and testing to investigative and forensic work. I bring high standards, tried and tested methodology with industry standard tools and techniques to deliver you professional results. I also have excellent communication skills while being fluent in 3 languages. I will always keep you up to date with the progress made, or if I have any questions, to ensure your awareness of how the assignment is moving along. I believe collaboration is key for a project to run smoothly towards a...

Mahesh T.
$30/hr
  • Trophy Icon Information Security
  • Cloudflare
  • Kali Linux
  • Microsoft Azure
  • Metasploit
  • Security Testing
  • Vulnerability Assessment
  • Application Security
  • Security Analysis
  • Penetration Testing
  • Amazon Web Services
  • Web App Penetration Testing
  • Security Assessment & Testing
  • Security Infrastructure
  • Information Security Consultation

Consolidating my past involvement in Ethical Hacking, Incident Response, IT Security Governance, and Project Management with solid relational and correspondence capacities, I am sure that I can give work that will surpass your desires. Security Analyst with 10+ years' experience in Endpoint security, Application Security, Change Management, Exception Handling and VAPT. Experience in system and network administration, managing server infrastructures and data center operations. Expert-level knowledge of Amazon EC2, S3, Simple DB, RDS, Elastic Load Balancing, SQS, and other services in the AWS cloud infrastructure such as IAAS, PAAS and SAAS....

Umang B.
$15/hr
  • Trophy Icon Information Security
  • Active Directory Federation Services
  • Single Sign-On
  • Security Assertion Markup Language
  • Auth0
  • LDAP
  • Microsoft Active Directory
  • OAuth
  • OKTA
  • Microsoft Azure

SAML and SSO integration expert, Worked on Single Sign-on Integration tool, Identity and Access Management, and SIEM Tool ,having experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, ADFS, Azure, Okta, Cognito, OneLogin, Auth0, JumpCloud, SalesForce, Spring Security SAML, Ping, ComponentSpace, FIM, SiteMinder, SAP, OAM, Keycloak, ForgeRock, etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, etc.).

Anna H.
$65/hr
  • Trophy Icon Information Security
  • Legal
  • Data Protection
  • English
  • Policy Development
  • Data Privacy
  • Security Analysis
  • Information Security Audit
  • GDPR
  • Regulatory Compliance
  • ISO 27001
  • Policy Writing
  • Company Policy
  • Security Policies & Procedures Documentation
  • Business with 100-999 Employees
  • Cybersecurity Management

As a Security Risk Manager with specialisms in Data, Cyber & Information Security I take a risk management approach to identify, address and minimize the risk a business may face in terms of technology failures, third-party failures, human risk, internal and external threats. I have the skills and experience to develop the policies, procedures, and staff training programs to support business growth. I see my role as being key to helping to protect businesses from a full spectrum of technical, technological, human, and natural risks both known and unknown which might threaten the business finances, operations, and/or reputation. Prevention...

Paul P.
$200/hr
  • Trophy Icon Information Security
  • Internet Security
  • Network Security
  • Security Analysis
  • Security Engineering
  • Security Infrastructure
  • Certified Information Systems Security Professional
  • Security Policies & Procedures Documentation
  • Data Privacy
  • Security Testing
  • Information Security Governance
  • Data Protection
  • Cybersecurity Management
  • PCI DSS
  • IT Compliance Audit

My mission is to help organizations implement security, privacy, and compliance in a way that helps them grow, expand and win new business. Trust is an essential part of expanding and winning new deals. Security, privacy, and compliance practices help you to win that trust from your prospects and customers. I can help you earn and maintain that trust. I focus on emerging organizations such as startups and small/medium businesses looking to mature with security and compliance in mind. My goal is to empower all organizations to employ security best practices - not just those with the biggest budgets. I want to be a strategic partner,...

Larry T.
$125/hr
  • Trophy Icon Information Security
  • SOC 2 Report
  • Risk Assessment
  • Regulatory Compliance
  • Security Policies & Procedures Documentation
  • IT Compliance Audit
  • PCI
  • Security Infrastructure
  • GDPR
  • Cybersecurity Management
  • HIPAA

Seasoned Cybersecurity Expert known for accelerating compliance programs, securing data, and developing security strategies for organizations across different industries! Successfully built HIPAA, SOC 2, ISO 27001, and DFARS\CMMC compliance programs using a systematic framework. CMMC Registered Practitioner listed in the CMMC-AB Marketplace. Conducts Security Gap Assessments against regulatory and cybersecurity requirements. Consults as a Virtual Chief Information Security Officer for Executives and IT Operations. Certifications: CISSP, CISM, ISO 27001 LEAD IMPLEMENTER, GCIA, ECSA, CEHv7, ITILv3

Mariusz Z.
$75/hr
  • Trophy Icon Information Security
  • Penetration Testing
  • Vulnerability Assessment
  • Cybersecurity Management
  • Security Assessment & Testing
  • Security Infrastructure
  • Web App Penetration Testing
  • Certified Information Systems Security Professional
  • Web Application Security
  • Cloud Security
  • Cloud Security Framework
  • Compliance Consultation
  • IT Compliance Audit
  • ISO 27001
  • Network Penetration Testing

Since 2014 I work professionally as a Pen Tester/Security Researcher. Between 2008-2013, prior switching full time to info sec, I've worked as a Programmer (C/C++, PHP, Java, node.js) and DevOps (AWS-based environments). Currently I work under my own brand (Z-Labs) delivering Penetration Testing / Adversary Simulation Exercises services to clients around the globe. I pride myself for: 1. Offering high quality penetration testing services conducted in safe and controlled manner by certified Security Expert (Since 2014 I'm CISSP, since 2016 I'm OSCP and since 2017 I hold SANS GXPN certification). 2. Putting emphasis on advanced manual...

Emanuel P.
$30/hr
  • Trophy Icon Information Security
  • Certified Information Systems Security Professional
  • Penetration Testing
  • Vulnerability Assessment
  • Website Security
  • Web Application Security
  • Open Web Application Security Project
  • Security Testing
  • Information Security Audit
  • Network Security

Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP​ 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is...

Arvin M.
$15/hr
  • Trophy Icon Information Security
  • Network Security
  • Email Security
  • Virus Removal
  • Network Analysis
  • Cisco Meraki
  • Vulnerability Assessment
  • Systems Engineering
  • Wireless Security
  • Wireless Network Implementation
  • Cybersecurity Management
  • Data Entry
  • Project Risk Management
  • Business Continuity Plan
  • Cloud Security

I am very accurate and fast in doing administrative task, willing to learn new skills if required. Highly efficient in web research and lead generation. You can contact me anytime if you will need my services. Thank you.

Luciana O.
$150/hr
  • Trophy Icon Information Security
  • Cybersecurity Management
  • Security Engineering
  • Email Security
  • Information Security Audit
  • Internet Security
  • Security Management
  • Security Infrastructure
  • Security Policies & Procedures Documentation
  • Cloud Security
  • PCI
  • Information Security Awareness
  • Network Monitoring
  • System Monitoring
  • Security Analysis

I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startup, micro, small, and mid-sized companies create secure operating environments to increase business opportunities. My priority is to develop cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their critical information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold...

John Carl V.
$60/hr
  • Trophy Icon Information Security
  • Copywriting
  • Technical Writing
  • Blog Writing
  • Virtualization
  • HTML
  • Java
  • Search Engine Optimization
  • TCP/IP
  • Network Security

Content crafted to convince. You may think your tech product or service is revolutionary, disruptive, or simply the best out there. But if your target audience doesn't know about it, what it does, how they can benefit from it, and why they need it now, those visitors won't be converted to leads, and those leads won't be converted to customers. That's why you need me on your team. Since 2008, I have written thousands of marketing collateral, including blog posts, white papers, web sales pages, case studies, ebooks, brochures, data sheets, PowerPoint presentations, articles, and sales letters with the purpose of engaging readers and...

Florjan L.
$30/hr
  • Trophy Icon Information Security
  • Security Infrastructure
  • Manual Testing
  • Security Assessment & Testing
  • Penetration Testing
  • Application Security
  • Ethical Hacking
  • Open Web Application Security Project
  • Windows Server
  • Vulnerability Assessment
  • NIST SP 800-53
  • Kali Linux
  • Network Security
  • Internet Security
  • Web Application Security
  • Security Engineering

Certifications that I hold: CEH ( Certified Ethical Hacker) 740 MCSA ( Installation, Storage and Compute with Windows Server 2016) To whom it may concern, In the last years I did more than 300 Penetration Tests and Security Assessments. Most of them on Web and Mobile ( Android and iOS ) applications with Finance Background implemented with various technologies and frameworks, server security testing and hardening. Sample reports can be provided who is interested. ___________________________________________________________ Professional Load and Stress Testing if you are interested for your application...

Avinash M.
$25/hr
  • Trophy Icon Information Security
  • Cisco CallManager
  • Cisco Router
  • Microsoft Active Directory
  • Cisco ASA
  • VoIP Administration
  • VPN
  • Asterisk
  • Fortinet
  • Cisco ASA
  • Sophos Sophos UTM
  • Juniper
  • Cisco UCS
  • Cisco WLC

BE in Electronics and Telecommunication with 17 years of experience in Contact Center, IP Telephony, security, LAN / WAN installation and administration. VoIP: Cisco (CUCM, CUC, IM&P, UCCX, UCCE, CUBE, Voice Gateways), Avaya (IP Office 500v2, ACCS), Asterisk, FreePBX, 3CX, Skype for Business Video: Cisco Telepresence MX200/300/SX20, Telepresence Server, Telepresence Conductor Server, Avaya Scopia XT, Polycom Data Center: Vmware vSphere 6.x, Cisco UCS, Microsoft Hyper V, Citrix Xenserver, Oracle Virtual Box Cloud: Amazon Web Services, Google Cloud platform Storage: NetApp, Western Digital Network: - Cisco Routers (3900/2900,4331)) & Switches...

Omri Z.
$100/hr
  • Trophy Icon Information Security
  • Digital Forensics
  • PCI
  • Security Analysis
  • Security Engineering
  • Splunk
  • Azure
  • AWS Application
  • F5, Inc.
  • Security Infrastructure
  • Security Testing

Expert in cyber security with extensive hands-on experience in information security with an ability to identify and explore new technologies and initiate projects to create disruptive strategic solutions in the areas of Information security and analytics. More than 10 years of information security and cyber security experience. A fast learner autodidact with great social skills and ability to think out of the box.

Dwayne T.
$150/hr
  • Trophy Icon Information Security
  • Web Design
  • Information Security Governance
  • IT Compliance Audit
  • Information Security Consultation
  • Network Security
  • Certified Information Systems Security Professional
  • Information Security Awareness
  • Regulatory Compliance
  • Compliance Consultation
  • Information Security Audit
  • Vulnerability Assessment
  • HIPAA
  • Network Analysis
  • Security Infrastructure
  • Data Protection

Specialist in IT implementation and system security management across numerous sectors, to include audit and compliance management with numerous frameworks to include FISMA, SOX, SOC, PCI DSS, HIPAA, HITECH, GDPR, IASME, CISv7, DIACAP, and NIST Risk Management Framework. Recognized expert at designing complex IT architectures, policy creation and enforcement, and developing dynamic and tailored security programs; balancing business operations with IT operations and cyber-security. Degrees: Master in Business Administration (concentration in IT Security), Bachelor of Science, IT Management Certifications: Certified Information System...

Jawad S.
$40/hr
  • Trophy Icon Information Security
  • Network Security
  • Cloud Security
  • Penetration Testing
  • WordPress
  • Malware Removal
  • Security Engineering
  • Firewall
  • Mobile App Testing
  • Website Security
  • Cybersecurity Management
  • Security Assessment & Testing
  • Malware
  • Security Analysis
  • Python
  • Network Penetration Testing
  • Vulnerability Assessment
  • Information Security Consultation

✅ Amongst the Top 1000 hackers worldwide Web Pentesting | Mobile App Pentesting | API Pentesting | Vulnerability Assessment | Python & Bash Automation I work with companies to make their digital assets secure and provide solutions to enhance their security parameters. I create cybersecurity content on hackingloops.com explaining the practicalities and how-tos of the vulnerability and exploitation Part-time bug bounty hunter at Bugcrowd & Intigriti. Feel free to contact me for your queries and security-related issues.

Rodrigo M.
$125/hr
  • Trophy Icon Information Security
  • Internet Security
  • Cloud Security Framework
  • DevOps
  • Amazon EC2
  • PCI
  • Network Penetration Testing
  • Web App Penetration Testing
  • Security Management
  • Security Infrastructure
  • VPN
  • Software Architecture & Design
  • Docker
  • Security Assessment & Testing
  • Security Policies & Procedures Documentation
  • Information Security Consultation

AWS Certified Solutions Architect Associate, with deep experience in AWS cloud architecture, operations. I am also and expert in PCI security compliance and vulnerability scanning and mitigation. 10+ years experience with DevOps, Windows/Linux software development. I am a skilled, effective communicator and work quickly and efficiently. I am a leader and am used to managing project teams of any size.

Thomas R.
$60/hr
  • Trophy Icon Information Security
  • Penetration Testing
  • Internet Security
  • Network Security
  • Certified Information Systems Security Professional
  • Security Analysis
  • Application Programming
  • Java
  • Wireless Security
  • Internet Security

In the last years I did more than 100 Penetration-Tests and Security Assessments. Most of them on Web and Mobile applications with Finance Background implemented with various technologies and frameworks. (J2EE, ASP, PHP). Based on my daily work I am experienced with all common attack vectors and mitigation techniques. Since 2009 I am CISSP (Certified Information Systems Security Professional) and since 2017 I am CEH (Certified Ethical Hacker) certified. Please check also my UPWORK work history and client feedbacks. I am offering professional Black and Grey-box Penetration tests for Web and Mobile Applications. Sorry, I am not able to...

$NaN/hr

How it works

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses

Information Security Analysts Hiring FAQs

What is an information security analyst?

With the scale and complexity of networked environments growing every year, the need for seasoned information security analysts has become more prevalent. Upwork provides access to information security talent adept at overseeing and managing risk in the areas of network security, cyber security, and endpoint security.

How do you hire an information security analyst?

You can source information security analysts on Upwork by following these three steps:

  • Write a project description. You’ll want to determine your scope of work and the skills and requirements you are looking for in an information security analyst.
  • Post it on Upwork. Once you’ve written a project description, post it to Upwork. Simply follow the prompts to help you input the information you collected to scope out your project.
  • Shortlist and interview information security analysts. Once the proposals start coming in, create a shortlist of the professionals you want to interview. 

Of these three steps, your project description is where you will determine your scope of work and the specific type of information security analyst you need to complete your project.  

How much does it cost to hire an information security analyst?

Rates can vary due to many factors, including expertise and experience, location, and market conditions.

  • An experienced information security analyst may command higher fees but also work faster, have more-specialized areas of expertise, and deliver higher-quality work.
  • A contractor who is still in the process of building a client base may price their information security analyst services more competitively. 

Which one is right for you will depend on the specifics of your project. 

How do you write an information security analyst job post?

Your job post is your chance to describe your project scope, budget, and talent needs. Although you don’t need a full job description as you would when hiring an employee, aim to provide enough detail for a contractor to know if they’re the right fit for the project.

Job post title

Create a simple title that describes exactly what you’re looking for. The idea is to target the keywords that your ideal candidate is likely to type into a job search bar to find your project. Here are some sample information security analyst job post titles:

  • Need marketing manager with experience in information data security
  • Cyber security analyst needed to oversee corporate governance project
  • Database analyst with security experience needed for financial institution

Project description

An effective information security analyst job post should include: 

  • Scope of work: From developing security policies to implementing network security strategies, list all the deliverables you’ll need. 
  • Project length: Your job post should indicate whether this is a smaller or larger project. 
  • Background: If you prefer experience with certain industries, software, or environments, mention this here. 
  • Budget: Set a budget and note your preference for hourly rates vs. fixed-price contracts.

Information security analyst job responsibilities

Here are some examples of information security analyst job responsibilities:

  • Help manage the enterprise information security infrastructure for a software development company
  • Support vulnerability review, management, and remediation efforts
  • Create the incident response plan and implement the business continuity plan 

Information security analyst job requirements and qualifications

Be sure to include any requirements and qualifications you’re looking for in an Information security analyst. Here are some examples:

  • Bachelor’s degree in IS or related field 
  • Minimum 5 years experience in vulnerability scanning and remediation
  • Excellent knowledge of Microsoft Windows and virtualization technologies
View less
Schedule a Call