Hire the best Information Security Analysts in Arkansas
Check out Information Security Analysts in Arkansas with the skills you need for your next job.
- $86 hourly
- 5.0/5
- (1 job)
Hi, I'm a skilled cyber security engineer with a passion for protecting information and assets. I'm continuously developing my skills and techniques to remain effective in the growing and rapidly change cyber security landscape. Experience and Skills include, but not limited to: • Nearly a decade of IT security operations, system design and architecture, network administration, and defensive/offensive cyber operations. • Tool Experience: Splunk, QRadar, FortiEDR, FortiWeb, Mimecast, DUO, Cisco ASA, Microsoft 365 Defender, Tenable, Rapid7, Palo Alto Panorama • Operational Experience: cyber threat defense, web/network penetration testing, email security, network intrusion and detection response, traffic analysis, firewall configuration, threat mitigation and detection; Windows/Linux OS. Certifications: • Security+ • Splunk Core User •. Blue Team Expert o Active DoD Top Secret/SCI I've received various awards and recognitions for my detailed work throughout my career. I love what I do and it shows in my work; something I take extreme pride in. How can I help you defend what's most important to you?Information Security
Cybersecurity ManagementRisk ManagementPenetration TestingComputer ScienceEthical HackingNIST Cybersecurity FrameworkFirewallNetwork Penetration TestingProject ManagementCloud SecurityMicrosoft WindowsLinuxNetwork Monitoring - $100 hourly
- 4.4/5
- (36 jobs)
I am a dedicated professional with decades of comprehensive experience in Cyber Investigations, Cyber Intelligence, Cyber Operations, Cybersecurity, and Information Security. I am well-versed in creating robust security structures, implementing security strategies, and mitigating potential cyber threats, and I specialize in the detection, investigation, and mitigation of cyber threats, while providing strategic insights to enhance organizational cyber defense capabilities. I have a Bachelor's degree in Psychology and Cognitive Science, and am completing work toward Master's degrees in Cybersecurity and Information Technology, with specializations in Enterprise Networks and Cloud Computing. I have also earned various industry certifications such as Certified Ethical Hacker Master (CEH-Master), System Security Certified Practitioner (SSCP), Certified Cyber Intelligence Professional (CCIP), Certified Penetration Tester (CPT), and Certified Forensic Analyst (CFA). Types of Services Offered Include But Are Not Limited To: Consulting, Strategy, & GRC: • Cybersecurity Consulting • Cybersecurity Strategy Development • Security Policy Development and Implementation • Governance, Risk, and Compliance (GRC) Frameworks • Managed Security Services Risk Assessment and Management: • Security Risk Assessment • Risk Mitigation Strategies • Cyber Risk Analysis • Vulnerability Assessments • Incident Mitigation and Remediation Digital Forensics Incident Response: • Security Incident Investigation • Litigation Support • Regulatory Compliance Audits • Integrated Threat Intelligence Digital Forensics • Data Recovery and Analysis • Electronic Discovery (eDiscovery) • Mobile Device Forensics • Network Forensics • Forensic Imaging • Malware Forensics Incident Response • Incident Management and Coordination • Threat Hunting • Emergency Response • Root Cause Analysis • Post-Incident Reporting and Documentation Training Services: • Security Awareness Training • Workshops and Webinars • Cybersecurity Certification Preparation • Employee Cybersecurity Training Programs • Simulated Phishing and Other Training Exercises Offensive Security & Defense Security: • Penetration Testing • Ethical Hacking • Red Team Operations • Blue Team Defensive Strategies • Purple Team Exercises Cloud Services: • Cloud Security Architecture • Cloud Security Assessments • Cloud Data Protection • Cloud Compliance Audits • Managed Cloud Services Network and Architecture Services: • Network Design and Architecture • Network Security Implementation • Wireless Network Security • Network Performance Monitoring • Enterprise Network Management Cyber Investigations and Intelligence: • Cyber Investigations • Cyber Intelligence Gathering • Digital Forensics • Network Forensics • Fraud Investigation • Insider Threat Investigation • Social Media Forensics Cyber Operations: • Cyber Threat Hunting • Cyber Threat Intelligence • Information Operations (Info Ops) • Real-time Security Monitoring • Security Operation Center (SOC) Management Security Compliance and Auditing: • Compliance Auditing • Security Auditing • Security Policy Compliance Reviews • Regulatory Compliance Monitoring • Information Security Assessments Virtual CISO Services • Cybersecurity Program Leadership • Security Strategy and Planning • Policy Development and Management • Security Risk Management • Compliance Oversight • Incident Response Planning • Security Awareness and Training • Vendor Risk Management • Security Budget Management • Board CommunicationInformation Security
Cyber Threat IntelligenceEthical HackingMicrosoft AzureSolution ArchitectureCloud ArchitectureIT InfrastructureNetwork EngineeringCloud SecurityWeb App Penetration TestingSecurity InfrastructureNetwork Penetration TestingNetwork SecurityPenetration TestingVulnerability Assessment - $37 hourly
- 0.0/5
- (2 jobs)
Virtual Assistant with 8 years experience in remote support, more than 10 years in Office Administration. With a dedicated work computer as well as a spare, wired/wifi internet, and a backup hotspot -I will stay connected. Multiple screens and experience in presentation and project management support an organized and thorough, detail-oriented office. Printer/scanner/copier just in case. Currently my dedicated workspace and open schedule allows availability with little notice.Information Security
Records ManagementCalendar ManagementEmail ManagementExpense ReportingInvoiceQuickBooks OnlineProject ManagementDocument TranslationDocument ReviewResearch & StrategyMicrosoft ExcelReceptionist SkillsVirtual AssistanceAdministrative Support - $30 hourly
- 0.0/5
- (0 jobs)
Cybersecurity Archichet, with hands-on experience in vulnerability assessment, risk management, and data analysis using Go Buster, Python, SQL, ServiceNow, Tableau, and Power Bl, seeks to leverage skills in any challenging cybersecurity roleInformation Security
ServiceNowCI/CDMicrosoft AzureMicrosoft Power BITableauMicrosoft PowerPointMicrosoft ExcelData AnalyticsSQLPythonVulnerability AssessmentRisk Management - $29 hourly
- 0.0/5
- (0 jobs)
I am a Network Engineer offering help with anything IT. Anything ranging from changing a forgotten email to setting up firewalls or networks, I will be there to help you. -Trouble Shooting is my specialty. -Over 8 year experience in IT, 4 being Network Specific. -Certificates include -Fortinet Certified Cybersecurity Associate -Fortinet Certified Cybersecurity Fundamentals -Cisco CCNA -Comptia Sec+ -Comptia Net+ -Comptia A+ -Comptia CIOS - Has an Associates Degree in supporting enterprise environments. -Hardworking and highly motivated, capable of working alone or with a team. -Holds a deep understanding of the setup, management and maintenance of Enterprise Networks and end user support.Information Security
Network EngineeringComputing & NetworkingComputer NetworkTroubleshootingProblem Solving - $100 hourly
- 0.0/5
- (0 jobs)
### Freelance IT Security & Infrastructure Consultant As a freelance IT security and infrastructure consultant, I bring a security-first approach while ensuring efficiency, reliability, and adaptability in solutions that meet evolving business needs. With extensive experience in enterprise security, infrastructure automation, vulnerability management, and incident response, I help organizations enhance their IT posture, streamline processes, and fortify systems against emerging threats. Our industry is fast-paced and dynamic, requiring an open-minded yet fundamental approach to problem-solving. I take pride in designing scalable, secure, and compliant IT solutions that integrate seamlessly into existing infrastructures while addressing key business challenges. My expertise spans network security, penetration testing, IT automation, and enterprise system management, allowing me to provide strategic IT guidance and hands-on technical implementation to businesses of all sizes. 🔹 Core Services & Expertise Cybersecurity & Incident Response - Security Hardening & Compliance: Implementing DoD STIGs, SANS Top 20 guidelines, and industry best practices to fortify infrastructure. - Threat & Vulnerability Management: Conducting security assessments, penetration testing, and risk mitigation strategies to secure networks and endpoints. - Incident Handling & Response: Investigating, responding to, and mitigating security threats using SIEM analysis, SOC monitoring, and forensic tools. - SOC Consulting: Assisting businesses with incident triage, security event management, and process optimization to improve detection and response times. - Patch & Vulnerability Management: Evaluating and testing Microsoft and third-party patches, ensuring compliance and system security. Infrastructure, System Automation & IT Operations - SCCM & Active Directory Management: Extensive experience in Windows OS patching, SCCM deployments, GPO configurations, and Windows 10/11 administration. - PowerShell & Infrastructure Automation: Developing custom PowerShell scripts to automate infrastructure tasks, streamline system administration, and ensure compliance with security policies. - Microsoft System Center Suite: Expertise in SCOM (monitoring), SCORCH (workflow automation), and SCCM (patching and configuration management). - Virtualization & Cloud Services: Hands-on experience with VMware hypervisors, Citrix XenMobile for MDM, and Microsoft cloud solutions. IT Project Leadership & Consulting - Technical Oversight for IT Projects: Providing design, proof-of-concept, and implementation services for major IT rollouts. - Enterprise Security Architecture: Researching, evaluating, and integrating new technology solutions while optimizing vendor agreements (Microsoft, VMware, Citrix). - Help Desk & IT Team Collaboration: Working alongside Help Desk and IT teams to troubleshoot escalations, firewall configurations, and network integrations. 🔹 Freelance Consulting: How I Can Help Your Business I offer flexible, tailored consulting services for businesses looking to strengthen security, optimize IT operations, and implement scalable automation solutions. Whether your company needs a security assessment, incident response strategy, Active Directory restructuring, or an automated patch management solution, I bring real-world expertise and hands-on implementation to help you achieve IT excellence. 💼 Services Offered: ✔ Security Assessments & Compliance Audits (STIG, NIST, SANS, CIS) ✔ Penetration Testing & Vulnerability Management ✔ Active Directory Hardening & GPO Implementation ✔ PowerShell Automation for IT Operations ✔ SOC & SIEM Consulting for Incident Response ✔ Microsoft System Center (SCOM, SCORCH, SCCM) Optimization ✔ IT Infrastructure Design & Troubleshooting 🔹 Certifications in Progress To continuously refine my expertise and expand my offerings, I am actively pursuing the following industry-recognized certifications: ✅ CompTIA Security+ (Cybersecurity fundamentals & best practices) ✅ Pentest+ (Penetration testing & vulnerability exploitation) ✅ GCIH: GIAC Certified Incident Handler (Incident detection, response, and threat mitigation) These certifications will further enhance my ability to deliver top-tier security solutions and cutting-edge risk management strategies to businesses. 🔹 Let’s Work Together! If your business needs a security-focused IT consultant with expertise in infrastructure, automation, and cybersecurity, I am here to help. Whether it’s a one-time project, ongoing support, or an urgent security incident, I offer flexible freelance services to ensure your IT systems are secure, efficient, and future-ready. 📩 Contact me to discuss how I can support your IT security and infrastructure needs.Information Security
BeyondTrustAutomationUser Identity ManagementSystem AdministrationComputing & NetworkingComputer NetworkGovernment Reporting ComplianceCompliance - $17 hourly
- 0.0/5
- (0 jobs)
I specialize in IT support, network security, and remote tech solutions. I have hands-on experience troubleshooting security vulnerabilities, setting up Salesforce environments, and providing technical support for businesses. Whether it's securing networks, assisting with Salesforce workflows, or resolving IT issues, I can provide expert help with quick turnaround times!Information Security
Computing & NetworkingComputer Network Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.