Hire the best Information Security Analysts Find top Information Security Analysts on Upwork — the leading freelancing website for short-term, recurring, and full-time Information Security contract work.
Information Security Network Administration Database Design Data Mining Data Backup IT Management Graphic Design Computer Networking Article Writing
I am an imaginative writer who studied Shakespearean literature and majored in English. I have written for 10 years. I have been published on various websites and books and magazines as well as helped with Texas legislation for Missing and Exploited children. I have a strong faith that keeps me always looking for the good in this life. Why focus on the bad when the good is a layer deeper.
Information Security Agile Software Development Management Consulting Smartsheet Project Planning ISO 27001 IT Audit and Compliance HIPAA GDPR Compliance
Executive level technology professional with over 25 years of broad-based experience in managing and delivering high quality software, technology and security driven solutions. Current focus is on information security and risk management, responsible for developing the policies, procedures and processes in achieving ISO 27001 and HITRUST certification for a global Digital Health strategy company. I have a proven track record in leading successful large scale software development projects, building and working with local and distributed development teams. I have built and managed software and IT teams of over 50 resources, with...
Information Security Copywriting Technical Writing Technical Editing Google AdWords Press Release Writing Business Writing Marketing Communications Marketing Strategy Marketing Cloud Marketing
I am a professional copywriter, marketing consultant, and cyber security evangelist. Although my primary niche is cyber security, I have worked with clients throughout the tech industry, including cloud computing, SaaS, digital transformation, robotics, HPC equipment, and artificial intelligence. I have also worked with clients in numerous industries outside of IT, including finance, education, luxury lifestyle, and entertainment. I have ghostwritten dozens of articles on highly technical subjects for c-level executives at IT companies. My work has appeared in major web publications, including IT Pro Portal, Dark Reading, The Next Web,...
Information Security Security Analysis Policy Analysis Information Security Audit
Cybersecurity Consulting for Small Business I focus on providing cybersecurity risk assessment services to small businesses and health care organizations. Assessments are provided from a technical and management perspective focusing on cyber risk and/or HIPAA Security Rule compliance. Specialties: cyber risk assessments, security gap analysis, policy and procedure development, system security plan (SSP) development Frameworks: ISO 27001/27002, FISMA, NIST 800 series, NIST CSF, HIPAA Security Rule, CIS Top 20 Critical Security Controls Additional services (offered by Ervalex LLC, ervalex.com): vulnerability management, IT patch...
Information Security Network Security Penetration Testing Security Analysis Internet Security Digital Forensics Ethical Hacking Web Application Security
Specialties: Penetration Testing, Network Security, System Security, Web Application Security, & Web Development. Certifications: CISSP, GCIH, GPEN, eCPPT, CEH, ACE, and Security+ • Extensive knowledge of penetration testing, offensive security, digital forensics, incident response, and malware analysis. • Former adjunct professor at UCLA, teaching offensive security tools & techniques • Experience with PCI, HIPAA, ISO 27001 compliance standards • Developed web applications with OWASP best practices. • Designed and taught a secure code training courses covering the OWASP Top 10. • Ability to explain information security to...
Information Security Teaching Mathematics Database Programming Proposal Writing Program Management Quantitative Analysis Information Management Qualitative Research Lesson Plan Writing Grant Writing
Monica Trifas, Ph.D. received her B.S. and M.S. in Computer Science from University of Bucharest in 1996 and 1999 respectively. Dr. Trifas earned her Ph.D. in Computer Science from Louisiana State University in 2005. Dr. Trifas joined JSU in Fall 2005. Her research interests include information security and assurance, data mining, human-computer interaction, data visualization, and artificial intelligence. Her research projects are funded by the National Science Foundation and Department of Defense. Dr. Trifas also serves as Associate Director of the Center for Information Security and Assurance at Jacksonville State University (JSU).
For 5 years, I've been honored to help over 20,000 people in Healthcare keep their private information safe from computer crime and hackers. I am the senior technical resource for my department and assist with continually keeping our information security tools and appliances on the bleeding edge of detection of hacking and computer crime. I specialize in helping businesses prevent, detect, and respond to cyber attacks. If your business has assets worth protecting, an internet connection, maybe a disgruntled employee or two, your computer systems will eventually get attacked. I do this by helping you understand attackers' strategies and...
Information Security Microsoft PowerPoint Content Writing Management Consulting Brand Consulting
The majority of my career has been in startup and emerging growth companies. I have had the opportunity to wear many hats, but my strengths lean towards marketing and business development.
Some of my strengths are in marketing/go to market strategy, project management, product development, and web (WordPress) and presentation design.
Working with Technology-based companies (IT services, Consulting, Cloud and Software solutions). has allowed me to get my hands dirty with our project and support teams. It also provided me the opportunity to architect solutions with CMO's, CIO's, and CTO's of leading Fortune 500 organizations.
• Personable, passionate software architect who uses a user-centered approach to fulfill your idea and vision, whether it's creating a product from scratch or adding specialized functionality to an existing product.
• 7 years of experience in R&D, able to leverage emerging technologies to push ahead of the competition.
• Agile, full-stack developer with experience across many domains: Creative, Consumer / Enterprise Web, and Aerospace / Healthcare / AI Research.
• Enterprise web development.
• Mobile platform development.
• Relational & distributed databases for data mining and analytics.
Information Security Network Security Linux System Administration OpenBSD Debian OS Ubuntu Red Hat Administration Bash Bash Shell Scripting System Automation
Excellent understanding of OpenBSD, GNU/Linux, UNIX. Utilizing over 20 years of experience supporting a wide variety of operating systems and services in an enterprise environment. Additional Notes: I am from Oklahoma, but I am currently in Europe. My current timezone is GMT+1. Please take this into consideration. Additional Skills Summary: UNIX & UNIXLike Operating Systems ● GNU/Linux Systems Administration & Security (more than 17 years) ● OpenBSD Systems Administration & Security (more than 15 years) ● FreeBSD Systems Administration & Security (more than 8 years) ●...
Information Security Network Security Penetration Testing Security Analysis Internet Security Security Infrastructure Security Engineering Wireless Security
Information security professional with expertise in penetration testing, policy, forensics, intrusion detection, and monitoring. Previous experience includes software and web development, networking, databases, and system administration. Possess CISSP and OSCP certifications.
Information Security Product Management Project Management Data Modeling Technical Analysis Business Continuity Planning Web Programming Predictive Analytics Financial Analysis Financial Management
- Expert Software Architecture and Development (C#, .Net, Java) - Expert Database Development and Data Warehousing (MS Sql, Oracle, MySql) - Expert Technical Product Management and Development (High-tech, Complex Offerings, B2B, B2C) - Expert in Finance (Public/Private) Budgets, Cash Flow, Quarterly and Annual Reporting, Pro-forma
Information Security Security Analysis Internet Security Security Engineering Internet Research Copywriting Technical Writing Cyber Risk Management Web Application Security
Experienced Information Security Engineer/Technical Content Writer within the financial sector. Strong certified information security professional with a bachelor's degree focused on information assurance applied technology. I understand "How to" implement and write on cyber security from a technical perspective,
Customer Privacy professional with over 15 years of privacy and information security experience with Fortune 500 companies. Successfully developed and implemented several privacy and security programs, including policy governance, incident response, forensics, vulnerability management, security engineering and security awareness programs. Currently completing the development of a customer privacy program for a large energy company. If you're looking for help in the development of a privacy or information security program, from business case development to drafting policy and standards to implementation strategy and business...
Information Security System Administration Active Directory Desktop Support Data Protection Data Backup Microsoft Office
I am currently in progress of completing my bachelor degree in Computer Science and have always been enthusiastic about gaining more experience in the technology industry, specifically in the technical support division. I am currently CompTIA A+ Certified and have also spent my time building and troubleshooting computers for over 7 years and have a proficient knowledge of multiple operating systems which include Windows Server editions 2003, 2008 & 2012, Windows XP, 7, & 8, Mac OSX, and multiple Linux distros, as well as Microsoft Office.
US based software/hardware/web administration, and minor design. All customers are provided a direct line to me. I specialize in high availability operations, which can offer 100% uptime with the right kind of love. - General system troubleshooting and configuration in Windows, Linux and OS X systems - Active Directory administration and user account management - Common virtualization platforms (ESXi, Xen, VirtualBox, etc) - Version control systems (SVN, Git, etc) - Backup monitoring and process management (both client and server) - System monitoring (Nagios, Cacti, etc) - Log monitoring (syslog, ELK stack, etc) - Strong understanding...
Information Security Network Security Linux System Administration Wireless Security Hardware Troubleshooting Microsoft Windows Server Windows 7 Administration Windows 8 Administration Windows XP Administration
I have a very diverse skill set on both Windows and Linux platforms. My areas of expertise are in the MS Windows and Linux environments. I have been a PC Technician and System Administrator for over 15 years and have been working toward my security certifications.
Information Security Network Security Security Analysis Security Infrastructure Security Engineering Python Splunk Windows PowerShell Enterprise Architecture
Certified CISSP and CISM Security Professional with a demonstrated history of working in the financial , real estate, title insurance, asset management, and homebuilding industry. Skilled in several aspects within the Cyber Security Operations, Engineering, and Management arenas. Focus area includes enterprise-grade multi-tenant security architecture, engineering, and design. Proficient in Windows PowerShell, writing Regular Expressions, and Python. Certifications include: CISSP, CISM, Splunk Architect, Proofpoint Enterprise Protection & Privacy Engineer, Palo Alto ACE, and Nexpose Certified Admin. Responsibilities have included per job...
Information Security Security Engineering Virtualization Microsoft SCCM Microsoft Server McAfee ePolicy Orchestrator Symantec Security Software Microsoft Active Directory DHCP McAfee VirusScan
Exceptionally self-motivated professional with over 14 years of experience in the field of Information Technology administration, system security, and engineering * 14 years of Microsoft Windows server and workstation systems * 6 years of system security * 2 years of enterprise security team management Excellent security and infrastructure engineer, primarily using Microsoft and the infrastructure to support. Specific Microsoft focuses include Active Directory, Group Policy, WSUS and MBAM. Endpoint security is my primary security focus. Skilled with Symantec (SEP/DCS) and McAfee (ePO, ENS, VSE). Deep experience in all size...
Information Security Linux System Administration SQL DevOps Amazon Web Services Ansible Microsoft Windows Server Jenkins AWS Server Migration
I have served in lead SecOps and DevOps architecture and engineering positions for global companies in the technology, finance, and defense industries. For the past four years my primary focus has been on migrating, automating, and securing public and internal applications from on-premise environments to the AWS cloud. My expertise covers a variety of technologies including Windows Server, Linux (Amazon Linux, CentOS, RedHat, Ubuntu), MS SQL, MySQL, Aurora, EC2, S3, Amazon RDS / DMS, any many others. Example Technology Experience Operating Systems: MacOS, Amazon Linux 1 & 2, RedHat (RHEL), CentOS, Ubuntu, Windows 7/8/10, Windows Server...
Information Security Network Security Technical Writing Writing
I am a seasoned security professional with a depth of experience in both the academic and business worlds. In my present and previous roles, I have provided information security expertise to a variety of companies operating globally. I have taught undergraduate and graduate security courses since 2005 and conduct research in the area of data protection. I have written several books and publications covering topics including data security, network security, penetration testing, and digital forensics.
Information Security Network Security Internet Security CISM ISO 27001 Information Security Audit Cloud Security Framework
Are you seeking an Information Security Expert with real world hands on experience, graduate level education, and active industry certifications? Do you need help improving your security posture whether you need a security assessment to identify your vulnerabilities or help preparing for a corporate compliance audit? If so, then look no further! My name is Courtney, and I am an industry expert with over 20 years of certified experience in Information Security and Assurance, Information Technology (IT), Project Management, Training, and Leadership. Prior active duty military (Navy veteran) with extensive experience working as a...
Information Security Computer Networking Enterprise Software SaaS CRM Cloud Computing Business Planning PitchBooks Mobile App Strategy
Roger has over 30 years in the technology industry as - among other things - a senior marketing and product management executive, strategy consultant and venture capitalist. Most of his work since the early 1990s has been with early-stage companies that are seeking or have successfully raised venture capital, angel and/or debt financing. During this time Roger has developed multiple successful business plans, investor pitches and M&A pitches, both for the companies he has worked for and for portfolio companies during his 12-year tenure with early-stage VC Castile Ventures. At Castile Ventures, Roger served as portfolio development...
Information Security Data Extraction Quantitative Analysis SQL Database Administration Microsoft Excel Information Management Requirements Analysis System Analysis
An Analyst with 4+ years of business analysis experience in IT and healthcare industry. I bring valuable experience in utilizing information technology for efficient data management. Practical expertise includes project report management and utilizing data-driven collaborative tools for large & complex data-sets. Possess an in-depth understanding of health information management due to my degree in Biomedical Informatics. I thrive within dynamic,fast-paced teams and have customer-oriented focus in my work. Proficiency included time management and great attention to detail. Key skills • Strong Analytical and data manipulative skills...
Information Security Reverse Engineering Cryptography Malware Blockchain Cryptocurrency
I am a cybersecurity professional with a strong background in malware analysis/reverse engineering, cryptography, blockchain, and network analysis. I have a Master's Degree in Cyber Operations and two years work experience in the cybersecurity department at a world-class research and development laboratory. My research there focused on malware analysis (and tool development for such), cryptographic security and efficiency analysis, and network analytics. Since then, I have spent two years as a freelance cyber and blockchain security consultant, writer, and course developer. I currently hold the Certified Ethical Hacker and Certified...
Information Security Penetration Testing Linux System Administration Security Engineering Network Administration Intrusion Detection System Technology Consulting Digital Forensics Information Security Audit Windows Server
I have 15+ years of experience in Information Technology. I am very passionate and absolutely love what I do. I always put in my best effort and am extremely confident in my abilities. My most recent experience includes managing an enterprise level information security team in a very project oriented environment. I’m able to lead by example. I have skill sets that covers both the blue and red sides of security. I began my career working in data centers and on an application security team. I was able to gain a great deal of network administration experience in these roles. I then pivoted into security and worked my way up to...
Information Security Python Application Security ISO 27001 Core Java Single Sign-On Google Suite Google Suite Administrator
I have served in lead SecOps and DevOps architecture and engineering positions for global companies in the technology, finance, healthcare, and education. For the past several years, my primary focus has been within the identity and access management suite. Moreover, I am an experienced Cybersecurity professional helping large organizations build upon their secure environments. This involved reviewing the information security program, achieve compliance and security standards, and aligning the IT strategies to business objectives byways of building an IT architecture and adopting new technologies I have worked for companies innovating...