Hire the best Information Security Analysts in Argentina
Check out Information Security Analysts in Argentina with the skills you need for your next job.
- $40 hourly
- 5.0/5
- (53 jobs)
👋 Hello! My mission is to create a meaningful impact in the lives of those around me every day in a world where information is more important than ever. I am a highly driven individual who makes every moment count—whether it's achieving a goal, maintaining a healthy lifestyle, pushing boundaries, or embarking on a new adventure. ✔ With 10+ years of experience in programming and security stuff ✔ Bachelor in Computer Sciences & Master in Security Information ✔ Communication and responsiveness are key attributes that I take very seriously. ✔ I prioritize understanding your unique needs and desires to deliver personalized solutions. 📝 My skills are: 📌 Linux server Administration 📌 Windows server Administration 📌 DB administration - SQL (Oracle, MySQL, PostgreSQL and MSSQL) 📌 C#/C++/C developing 📌 python 📌 bash scripts 📌 Powershell 📌 penetration testing (web & mobile) 📌 regular expressions 📌 debugging skills 📌 x86, x86-64, ARM, ARM64 assembly 📌 scraping skills 📌 Windows M365 📌 Calculus, algebra and statistics. 📌 linear programming, linear optimization 📌 Security Compliance (ISO 27001, PCI DSS, GDPR, SWIFT) Managing and maintenance projects - Git and SVN. Courses I've taken: 📌 Ethical Hacking 📌 OSCP Certified 📌 AWAE Certified 📌 Microsoft Certified: Security, Compliance, and Identity Fundamentals 📌 Microsoft Certified: Azure AI Fundamentals 📌 Course 20483: Programming in C# 📌 Developing Windows Applications with Microsoft Visual Studio 2010 (10262) 📌 Developing Data Access Solutions with Microsoft Visual Studio 2010 (10265) 📜 My Process of Work: 📐 Understand: The first part of my design process is to understand your need & what you want. 📐 Ideate: The next part is to ideate it in which I give you multiple ideas related to the problem. 📐 Design: In this part, I design the product according to your needs. 📐 Deliver: Finally, I package everything and send it to you. On time and within budget. 💼 WORKING WITH ME MEANS: ✔ Have a person who cares about outcomes. ✔ Don't squander your time on micromanagement. ✔ You can rely on me always. 🕗 Working Hours: 8 AM - 5 PM (GMT-3) Monday – Friday (Sometimes on weekend) Do you have any questions? Please do not hesitate to contact me! I'll get right to work on your project.Information Security
Penetration TestingVulnerability AssessmentAutomationInformation Security AuditAPI IntegrationScriptingEthical HackingLinux System AdministrationNetwork SecurityWindows AdministrationData ScrapingC#C++Python - $35 hourly
- 5.0/5
- (24 jobs)
With IT as my biggest passion, and Engineering background. I believe the best is to work in what we love.Information Security
Code ReviewVulnerability AssessmentCryptocurrencyNetwork SecurityWeb App Penetration TestingLinuxTechnical WritingCryptographyReverse EngineeringOnline ResearchTutoringBashPython - $38 hourly
- 5.0/5
- (7 jobs)
Experienced information security specialist with a demostrated history of working in the telecommunications and services industries. Skilled in Information Technology, Computer Security, Incident Detection and response, Computer Forensics, Project Planning and Team Leadership.Information Security
AWS ElementalProject ManagementCyber Threat IntelligenceMicrosoft Active DirectoryJAMFIncident Response PlanKali LinuxDigital Forensics - $56 hourly
- 4.8/5
- (3 jobs)
I'm an IT System Architect with 10+ years of experience in Oracle JDE ERP (also known as CNC), +10 in Unix-based administration, +5 in Database administration and +10 in Automation (Job Scheduling). I've worked as a Team Leader and Team Builder with less experienced system administrators that were working on and off shore. Not long ago, I led several Service Support Transitions for a big healthcare industry company as well as providing technical guidance for several IT Projects. Not soon after that, I improved myself as System Architect and as a Jr. Project Manager, while managing both Hardware Provisioning and Software Implementations, in the oil & gas and consumer products industries, jumping back and forth from consultant to freelancer. As of now, I've ventured into Information Security and Cloud Computing with high hopes and expectations, becoming a DevSecOps Engineer within six months; which allowed me to lead the initiative in Argentina as Cloud Engineer in ExxonMobil. I'm known for my problem solving skills and being a self-taught person, by proposing new solutions and process improvements. My greatest motivation is to work and travel, learn new cultures, new people and acquire new knowledge while taking new challenges.Information Security
Amazon Web ServicesMicrosoft AzureAIXOracle JD Edwards EnterpriseOneCloud SecurityOracle Database AdministrationUnix System AdministrationOpenShiftRed Hat Enterprise LinuxCloud ArchitectureCloud EngineeringAzure DevOpsLinux System AdministrationHP-UX - $50 hourly
- 5.0/5
- (2 jobs)
As a Linux specialist I have more than 25 years of experience in infrastructure, virtualization, programming, automation, networking and information security.Information Security
TranslationCloud ArchitectureHigh Availability and Disaster RecoveryVirtualizationLinux System AdministrationSystems DevelopmentIntranet ArchitectureDevOps EngineeringDockerKernel-based Virtual MachineLinuxTroubleshootingNetwork Security - $45 hourly
- 5.0/5
- (71 jobs)
Software Architect , Developer and IT Trainer with over 16 years experience in the software industry, specialized in integration solutions, SOA and BPM process automation. I have worked for companies in the industries of banking, telecommunications and media all over Latin America, occupying different roles such as Architect, Technical Lead, Designer and Developer. Specialties Software Architecture, SOA, Enterprise Service Bus, Business Process Management, System Integrations, JEE, Websphere, UML, RUP, JBoss Programming Languages : Java, JSP, Ajax, OOAD, Javascript, SQL, HTMLInformation Security
RESTful APIIBM WebSphereJSONWSO2Web Application SecurityIBM MQMicroserviceIBM DataPowerSOAPPenetration TestingRESTful ArchitectureJavaAmazon Web ServicesWeb Service - $60 hourly
- 4.8/5
- (76 jobs)
I am good at: - solving complex, cross-functional issues that may involve many different technologies in reasonable time. - delivering expert knowledge about technologies and products to fulfill clients' needs for a specific business purpose. Technology-wise this sounds as: Expert knowledge of Windows-based networks and other products and technologies by Microsoft (Windows Server, Active Directory, Exchange, Teams, Azure, Office 365, Intune, Defender) with 20+ years of experience in the area including systems administration. Good knowledge of virtualization (VMware ESX, Microsoft Hyper-V) and cloud solutions (Azure, AWS EC2). Strong knowledge of TCP/IP networking technologies. Expert knowledge of various Identity Management solutions (Microsoft ILM/FIM/MIM (also DirSync and GALSync)+MIMWAL, Oracle Identity Manager, NetIQ (Novell) Identity Manager) and RBAC with 15 years of experience in the area.Information Security
User Identity ManagementData RecoveryOracle Identity ManagementVMware ESX ServerNetWareMicrosoft AzureOffice 365Microsoft Exchange Server - $30 hourly
- 5.0/5
- (2 jobs)
TECHNICAL SKILLS: -DATA ENGINEERING • Python • Agile, Extreme Programming (XP) & Clean Code • SQL (DDL, DML) • DBT -CLOUD • AWS: Batch, Step Functions, Glue, Athena, Boto3, Lambda, S3, EC2, IAM, KMS, SQS • GCP (Dataflow, Dataproc, BigTable) • Devops: Bash. Docker + ECS. CI/CD - Github actions. Terraform, Serverless Framework -REPORTING / BI • Qlik Sense (scripting + dashboard development). • Tableau SOFT SKILLS: • Analytical and quality-oriented. If I solve a problem with a correct output, but the process appears to be somewhat fragile, I am interested in understanding the details, researching best practices, and tuning the particular solution. In the long term, 5-stars systems pay off the extra effort. • Communicative. I like to produce objects (code, graphs, documentation) as self-explanatory as possible. I try to deliver both code and documentation in a frequent, incremental fashion, and use metaphors if they can help make things clear. • Lifelong learner. I love IT and software, it is a profession but also a hobby for me. Therefore I enjoy learning new skills and keeping up to date with ever-changing technologies.Information Security
AWS FargateDevOpsAmazon Web ServicesAWS LambdaServerless StackAWS CloudFormationDockerPython - $30 hourly
- 5.0/5
- (142 jobs)
Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is our key differentiator. Please check my Upwork work history and client feedbacks. I look forward to hearing from you!Information Security
Website SecurityOWASPWeb Application SecurityInformation Security AuditCertified Information Systems Security ProfessionalVulnerability AssessmentSecurity TestingNetwork SecurityPenetration Testing - $25 hourly
- 5.0/5
- (3 jobs)
Good morning, I am an Odoo implementer, with experience in different types of Odoo projects in all their stages, I have experience from the assembly of the servers in the cloud, their security, use of nginx, SSL security certificates, Redirection, configurations of the servers and security. I have experience in different countries implementing Odoo (Colombia, Argentina, USA, Chile, Spain, Argentina), in all projects I worked as project manager and functional analyst, doing the implementation, training and taking requirements. I have a technical and functional profile, in the technical area I parameterize development in python, I administer Bd Psql and in the functional I suggest and guide clients in their needs, trying to adapt the client and the ERP Odoo to the needs of each case. I have a work methodology based on Odoo methodologies, with respect to the new functions because odoo is sufficiently complete both enterprise and community versions, the methodology that I use for new functions is to use those available in the OCA (Odoo repository in github) if I can't find an answer, I go to the markplace Odoo Apps, there I have free or paid solutions, if necessary, I don't get a function that adapts development particularly for the client. This, the great advantage is the stability of the system. Always bear in mind that odoo is a very large framework that if its flow is modified, stability can be impaired. a client hires a solution and it must be stable and scalable. I have experience: - Implementing ERP software projects - Implementing and parameterizing Odoo (9 - 11 - 12 - 13 - 14) - Installation odoo on servers in the cloud or Odoo SH (enterprise) - functional analysis of Odoo ERP projects - Functional Training - Help desk - Linux server management (Debian / Ubuntu) - Nginx, SSL, DNS, firewall - computer security audits - Grafana, docker, kubernetes. - Experience in AWS, Google cloud, Azure, Digital Ocean. all technologies so that the implementation projects reach their destination in the established times.Information Security
OdooLinuxNGINXEcommerceInterprise Suite ERPDatabase ManagementPythonAmazon Web ServicesScrumIT Project Management - $60 hourly
- 0.0/5
- (0 jobs)
I'm a passionate cybersecurity professional with over 10 years of experience making the digital world a safer place. As a Certified Ethical Hacker (CEH) and Security Application Engineer, I specialize in finding and fixing vulnerabilities. My expertise lies in: • Penetration Testing: Conducting assessments of applications, networks, and mobile systems to uncover security weaknesses and provide remediation strategies. • Vulnerability Assessments: Employing a methodical approach to identify and analyze security risks, enabling organizations to proactively address potential threats. • Application Security: Collaborating with development teams to ensure secure coding practices and integrate security throughout the software development lifecycle. • Security Consulting: Providing expert guidance and support to organizations on a wide range of security initiatives, including framework development, systems hardening, and security architecture review. I'm also founder of the Bug Bounty Girls Club, a community dedicated to empowering women in cybersecurity.Information Security
Ethical HackingCloud SecurityNetwork SecurityBug ReportsBug BountyCybersecurity MonitoringNIST Cybersecurity FrameworkVulnerability AssessmentBetter Mobile Security BetterComplianceWeb Application SecurityPenetration Testing - $35 hourly
- 0.0/5
- (0 jobs)
"I am a Systems Engineer with experience in DevOps, IP telephony, and networking. I specialize in automation with Ansible and Terraform, server configuration in AWS/Azure/GCP, and VoIP system optimization with Asterisk and FreePBX. I can help you improve the efficiency and security of your infrastructureInformation Security
Network EngineeringGraphComputing & NetworkingDevOpsProblem Solving - $50 hourly
- 0.0/5
- (0 jobs)
✅ MSc. engineer with 10+ years of experience working with teams on software engineering, machine learning, computer vision, dev-ops, internet of things, embedded systems, and electronics. ----------------------------------------------------------------------- ➤ Projects delivered to production ✓ Executive trips app, prediction of trip cost and time. ✓Computer Vision Pipelines in Kubernetes. ✓ Object-Detection: Car tracking for red light enforcement and speed enforcement. ✓ ALPR: LPRNet in TensorFlow to convert licence plate images to text. ✓ Object-tracker. ✓ Traffic light detector: Traffic light color, light-off, on image. ✓ Natural Language: Predict categories from title, predict most probable buys and categories from search history. ✓ Pose estimation model pipeline. ✓ Deepstream pipeline configuration for different applications. ----------------------------------------------------------------------- ✅ Natural Language Processing ✅ Machine Learning ✅ Deep Learning ✅ Computer Vision ✅ Visualization ----------------------------------------------------------------------- ➤STACK ✓ Python; Jupyter; Numpy; OpenCV, TensorRT ✓ Matplotlib; Seaborn; SciPy; Pandas; SQL ✓ PyTorch; TensorFlow; Keras; SciKit-Learn. ✓ Triton Server; CUDA; Nvidia DeepStream. ✓ Docker, Kubernetes. ✓ CUDA; Deepstream 5.1. ✓ Amazon AWS, Google GCP, cloud infrastructure, Terraform ✓ Kafka; Grafana ✓ Django; Flask; Nginx. ✓ MySQL. ✓ HTML; CSS; JavaScript. ✓ Linux; Bash. ✓ C; C++; Make; Golang ✓ Raspberry Pi, ✓ Gitlab, DevOps, CI/CD. ----------------------------------------------------------------------- ✅ I want to work with companies in roles related to Data Science, Machine Learning, Computer Vision, C++, as a developer or as a technical lead. I want to deliver great value on real-world projects. I’m very self motivated and I believe both my technical and social acumen make me a great engineer for a team.Information Security
LED PhysicsSensorDigital ElectronicsMicrocontroller ProgrammingComputer Hardware DesignAltium DesignerCircuit DesignAnalog ElectronicsPCB DesignFirmware ProgrammingDigital Signal ProcessingMicrocontroller DesignRed Team AssessmentTime Series AnalysisPythonC++Data ScienceCI/CDKubernetesComputer VisionMachine LearningElectronicsInternet of ThingsAmazon Web ServicesGoogle Cloud PlatformDevOps - $50 hourly
- 0.0/5
- (0 jobs)
With over 10 years of experience in Information Security and Ethical Hacking I’ve worked on projects ranging from system Security and network Security, information security, Penetration testing, consulting, security analysis, assessment and testing to investigative and vulnerability Assessment, I bring high standards, tried and tested methodology with industry standard tools and techniques to deliver you professional results. I'm available for invitation to invite I also have excellent communication skills while being fluent in 3 languages. I will always keep you up to date with the progress made, or if I have any questions, to ensure your awareness of how the assignment is moving along. I believe collaboration is key for a project to run smoothly towards a successful and mutually satisfying conclusion. I have extensive hands on experience with the following systems, tools and technologies/techniques: Penetration testing: - Web Applications (E-commerce, WordPress, and more) - Databases and Data Recovery (MySQL, MSSQL, Oracle, PostgreSQL, LAMP/MEAN stacks and other) - Networks and network devices - Operating Systems - LDAP, Active Directory, Kerberos - Wireless - Kali Linux, Nmap, Nessus, BurpSuite, SQLMap, Metasploit, Maltego I am extremely motivated, adaptable, willing to learn and work independently as well as in teams. I have an agile mind and, due to my inquisitive nature, a knack for research. Being a very diligent and earnest person when it comes to work, I believe that I can handle, or improve, any system or infrastructure that has been entrusted to me.Information Security
Security Assessment & TestingNetwork Penetration TestingInformation Security ConsultationSystem SecurityInternet SecurityGrowth HackingHackerRankData RecoveryVulnerability AssessmentNetwork SecurityPenetration TestingEthical Hacking - $50 hourly
- 0.0/5
- (0 jobs)
Hi! My name is Martin a passionate Ethical Hacker who can protect your systems/networks from web attacks by implementing security policies at different layers or by detecting the security flaws with over 5 years of experience in Penetration Testing, System, Network, Web, and Mobile Security. I have participated in multiple bug bounty programs both Private and Public and helped to disclose a couple of security exploits. I'm continuously and proactively improving my professional skill set by participating in various national and international training, seminars, conferences, and by acquiring and maintaining specialized professional Cyber Security certifications Some of the Tools/Skills I have a great experience with: - Cloud: AWS, Azure, GCP, Digital Ocean, OVH. - Deployments: Kubernetes. - Operating Systems: Linux (CentOS, Fedora, Ubuntu, Debian) and Windows Servers (2008R2 - 2012 - 2016). - Firewalls/Proxies: pfSense, Nginx, Cisco, Juniper. - VPN: OpenVPN, StrongSwan, OpenSwan, IPSec, SoftEtherVPN.Information Security
Technical SupportAccountingWordPress Malware RemovalFacebook PageInstagram PluginFacebookInstagramGrowth HackingSocial Media ManagementSocial Media MarketingEthical HackingNetwork Penetration TestingMalware RemovalPenetration Testing - $30 hourly
- 0.0/5
- (0 jobs)
Welcome to my Upwork profile! I am an experienced Cybersecurity Engineer with a strong background in ethical hacking, penetration testing, and more. I specialize in securing digital assets and ensuring the utmost protection for clients' sensitive data. With a passion for staying ahead of emerging threats, I offer top-notch services that exceed expectations. Whether you need assistance with vulnerability assessments, network security, or creating robust defenses, I am here to provide comprehensive solutions tailored to your specific needs.Information Security
Security TestingSecurity AnalysisDigital ForensicsNetwork Penetration TestingVulnerability AssessmentNetwork SecurityPenetration TestingData RecoveryGrowth HackingHackerRankEthical Hacking - $75 hourly
- 3.6/5
- (1 job)
My goal here has been to grow as the best Full Stack, DevOps, MLOps developer and also an artist with a very good command of Python, JS, PHP (among others) and since I started to innovate and create new products here I have been more than satisfied to participate and work with the best clients that can be found. My Core Skills: Critical thinking Spirit and collaborative work Motivation to learn Positive responsibility Up-to-date knowledge of valid development and work standards Good maturative vibe Coordinated work and organized resolution of highly (or extremely) complex problems Active listening Continuous development of work talent Concentration Development of any type of application and program from scratch Maturative creativity and innovation Balanced resolution of work times, income and free time Integration and adaptability of functions, tasks and resolution structures High self-esteem Very calm Mutually agreed solutions Maturative emotional intelligence Self-confidence My strengths: Optimism Empathizer Analyst Philomatic Excellence Success stories make me a recommendable professional Great constant support Enormous patience Dedication Great experience in Artificial Intelligence Proactivity Attention Predisposition Studious, curious and also knowledgeable about what I develop and implement Impeccable programming and development style Complete Freelance Work Courses: How to maintain a balance between personal and work life Time management for freelancers Advanced software development Advanced AI applications Basics of user experience design (UX) I like to get involved in innovative projects from diverse areas without losing my own creativity to work on multiple projects with respect, commitment, patience and responsibility, while I can go from the most logical to the most abstract always to define new goals and concrete paths on a day-to-day basis.Information Security
Scientific ComputationUX & UI DesignWeb DevelopmentAPIDeep LearningMLOpsNetwork EngineeringArchitectural DesignProblem SolvingDevOpsComputing & Networking - $15 hourly
- 0.0/5
- (0 jobs)
IA M S E C U R I T Y A N A L Y S T I am a proactive person, organized and responsible, with good interpersonal relationships. I have been working for access management in the last 8 years, experience with the scrum methodology, IT IAM security analyst working with Privileged Access, Service now service Management, Microsoft Cloud azure administration, Google cloud admin, cloud native accounts, Active directory, applications accounts, PingID, AUTH0 , lotus notes, forefront identity manager, RSA entrust token identity guard administration, Scripts with PowerShell, SailPoint Identity, Citrix workspace, Service desk level 2 checking troubleshooting with customers to help from beginning to the end.Information Security
Microsoft Windows PowerShellITILMicrosoft Active DirectoryMicrosoft Azure AdministrationService Cloud AdministrationIT SupportComputer NetworkComputing & Networking - $10 hourly
- 0.0/5
- (0 jobs)
PERFIL Poseo un sólido interés en expandir mis conocimientos en informática y tecnología. Busco oportunidades para aplicar mis habilidades en desarrollo de software, análisis de datos o ciberseguridad en un entorno dinámico y colaborativo. Comprometido con la mejora continua y la innovación, deseo contribuir al crecimiento de la empresa mediante el uso efectivo de la tecnología y la resolución de problemas.Information Security
Front-End Development - $17 hourly
- 0.0/5
- (0 jobs)
Hello! My name is Patricio, I'm 30 years old computer technician. I currently have more than 10 years of experience in the industry. My main strengths are: Networking. Scripting/Programming in various languages such as C#, Java, Powershell. Technical support. Direct dealings with clients. SLA compliance. I am looking for a remote role where I can help the business using my current knowledge and grow professionally. ---------------------------------------------------- Hola! Mi nombre es Patricio, tengo 30 años y soy técnico en computación. Actualmente tengo mas de 10 años de experiencia en la industria en difirentes roles. Mis principales fortalezas son: Networking. Scripting/Programación en varios lenguajes como C#, Java, Powershell. Soporte técnico. Trato directo con clientes. Cumplimiento de SLAs. Estoy en búsqueda de un puesto remoto donde poder desempeñar mis conocimientos actuales y expandirme profesionalmente.Information Security
JavaC#Infoblox IPAMF5, Inc.CiscoApp DevelopmentAPI DevelopmentLinuxWindows 11 AdministrationWindows 10 AdministrationTechnical SupportNetwork EngineeringComputing & NetworkingComputer Network - $23 hourly
- 0.0/5
- (0 jobs)
Mi objetivo es ser parte de una empresa de prestigio que me permita desarrollarme profesionalmente. Como queda expresado en mi experiencia laboral he ido evolucionando y no me siento incómodo al enfrentar nuevos desafíos. Me gusta mucho relacionarme con otras personas y nunca dejar de aprender.Information Security
Computer NetworkComputing & Networking - $11 hourly
- 0.0/5
- (0 jobs)
I am a proactive Systems graduate, results-oriented, with skills in innovation, problem-solving, and a strong interest in challenges and learning. Over the past few years, I have developed self-taught skills to learn the latest technologies applied in the industry today. As a Web Technology enthusiast, I am passionate about continuously learning and staying updated on new market trends. My focus is on participating in software technology work, projects, or collaborations. -Knows Microsoft Office, self-taught in web technology knowledge, data analysis, object-oriented programming, basic proficiency in Python, Java, PHP, HTML, and Java.Information Security
ArchitectureDatabase ManagementDatabaseDevOpsProblem Solving - $20 hourly
- 0.0/5
- (0 jobs)
Coordinate and direct requirements for the management of ABM of Users in corporate applications and resources. Provide training on functions and/or new needs that will arise from corporate growth and development. Guarantee the issuance of service statistics. Monitor and evaluate the performance of the work team in charge. Propose corrective and preventive measures to improve compliance with standards and the effectiveness of service management.Information Security
Government Reporting ComplianceCompliance - $40 hourly
- 0.0/5
- (0 jobs)
I offer Pentesting services, ethical hacking and survey of vulnerabilities in websites and computer infrastructure. Development of internal security policies and procedures: Services -Recovery of cryptocurrencies (Site scam) -Social networks recovery (Facebook / Instagram / WhatsApp) -Phone security (Android / Iphone) -Online Reputation -Blackmail -Owasp TOP 10 -ISSAFF -OSTMMInformation Security
Internet SecurityWhatsAppEmailHackerRankFacebookiOSiPhoneEthical HackingWeb App Penetration TestingGrowth HackingNetwork Penetration TestingCybersecurity ManagementVulnerability AssessmentPenetration Testing - $3 hourly
- 0.0/5
- (0 jobs)
Soy un profesional apasionado de la tecnología, especializado en seguridad de redes, soporte técnico y sistemas operativos. Con habilidades destacadas en liderazgo, utilizo herramientas como Fortinet y Cortafuegos para garantizar la seguridad de las redes y resolver eficientemente incidencias. Mi experiencia abarca desde la administración de servidores Windows y Linux hasta el desarrollo con PHP y JavaScript. Con una sólida comprensión de MySQL y Microsoft SQL Server, junto con mi capacidad analítica, me destaco en la implementación de soluciones tecnológicas integrales y la optimización de infraestructuras. Soy hábil en el manejo de tecnologías como Veeam, Directorio Activo y VPNs con Ubiquiti Networks. Mi enfoque va más allá de las habilidades técnicas, incluyendo el liderazgo efectivo y la capacidad para analizar y mejorar procesos de negocio.Information Security
Database ManagementDatabase - $200 hourly
- 0.0/5
- (0 jobs)
Objetivo Lograr entrar al mercado laboral mediante buen desempeño y responsabilidad obteniendo conocimientos y desarrollando habilidades necesarias para cumplir con las expectativas en el ámbito que se precise.Information Security
AgaviBrewmaxxAbaqusComplianceGovernment Reporting ComplianceAutodesk RevitDatabaseDatabase Management - $20 hourly
- 0.0/5
- (0 jobs)
Enthusiastic cybersecurity student . I am seeking a position that will enable me to expand my skills and learn from experienced professionals in the field. I consider myself responsible and adaptable to any situation.Information Security
WritingSmart Speaker Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.