Hire the best Information Security Analysts in Australia
Check out Information Security Analysts in Australia with the skills you need for your next job.
- $120 hourly
- 5.0/5
- (12 jobs)
I’m Sarah and I am a cyber security professional who specialises in writing Information Security policies. I have worked for both regional and global companies to develop the required suite of policies to uplift their cyber security posture and help their teams understand the part they play everyday in keeping information safe. I have expertise in developing policy frameworks and Information Security policy writing (inc. policies for Information Security, acceptable use of IT, vulnerability management, third party risk management, passwords, acceptable use of email, incident response etc). I have experience of working with industry standards and frameworks such as ISO 27001, NIST and CIS controls. I am passionate about helping businesses to improve their cyber security posture through developing the required set of policies to provide secure guidelines for you and your organisation to follow. Whether you are starting off with setting up a foundational baseline, creating new policies or uplifting existing policies - get in touch and let me know how I can help.Information Security
ISO 27001Policy WritingCybersecurity ManagementSecurity Policies & Procedures Documentation - $35 hourly
- 5.0/5
- (0 jobs)
I am an individual with a strong interest in the field of Cyber Security and emerging technologies that could change the nation's security view. Also, I graduated from the Sri Lanka Institute of Technology (SLIIT) by winning the Award for the Best Performance in Bachelor of Science Honours Degree in Information Technology specializing in the field of Cyber Security of the Faculty of Computing. A hardworking and ambitious person with more than 2 years of working experience in the Cyber Security and Networking domains.Information Security
Cybersecurity ManagementSecurity Policies & Procedures DocumentationCrowdStrikeInformation Security Threat MitigationThreat DetectionSecurity EngineeringSecurity AnalysisSecurity Operation CenterSystem Security - $50 hourly
- 5.0/5
- (26 jobs)
Certified GIAC Security Operations Manager (GSOM) with expertise in managing security operations, threat hunting, and incident response. Skilled in Security Information and Event Management (SIEM), Detection Engineering, Security Orchestration, Automation, and Response (SOAR), and experienced in threat hunting and incident response.Information Security
Security Analysis - $80 hourly
- 5.0/5
- (61 jobs)
Aussie 15+ Years Professional GNU/Linux Sysadmin, Expert. Published Security Researcher, Penetration Testing. ISO 27001:2022 Expert. Very active on GitHub, Twitter, HackerOne & BugCrowd. PRO: Shell, Python, JS, PHP, C, C++, x86, arm, mips, xtensa/esp32. 1,000s of teams use my projects, in their projects. You can send me product hardware as part of firmware/hardware projects. High level communicator; My native language is English. I love complex, novel tasks, that require problem-solving. My day work involves conducting static code analysis, binary analysis, web application security research, and presenting at conferences. I am able to work extremely fast. What might take someone 4 hours, takes me 15 minutes. In my spare time, I ride motorcycles, and break hardware open and report vulnerabilities to major manufacturers, usually for money (bug bounty). Maintaining multiple massive Open Source Projects on GitHub: Trending software, 30,000+ GitHub Stars, 500,000 Downloads, 1,000+ forks - 3,000+ Comment Karma on reddit. I publish code, exploits, and research which are assigned Common Vulnerabilities and Exposures (CVEs). Used by Enterprise & Governments all around the world to validate their security posture. I graduated from the University of Melbourne. Very experienced in all of RHEL/CentOS/Fedora, Ubuntu/Debian, Arch/Majaro, Raspberry Pi/Odroid/Armbian, FreeRTOS/nuttX, CI/CD, Automation, DevOps, Git, Docker, etc. I have over a decade of experience specifically in writing & securing Web Applications, providing advisory & consulting Cyber Security services, hardware reverse engineering (as a service), code decompiling/deobfuscation, intrusion detection, and knowledgable about techniques used by threat actors, e.g. malvertising, ad cloaking. Extremely good at sophisticated automation, reversing cloaked ads, proofs of concept and creating code that can perform human tasks. - MaxMind, DB-IP GeoIP, DNS/Bind9 Servers, residential proxies, OpenVPN, WireGuard, VestaCP, CPanel, Git, Docker, DevOps: CI/CD pipelines, VPN Kill-Switches, automated proxy switching, Selenium, Puppeteer, Chromedriver & Geckodriver - Distil, Akamai, PerimeterX, Cloudflare, Captchas (protection & solving). - nginx, apache, httpd, iptables, ufw, fail2ban - Penetration testing: thousands of (ethical) hackers around the world follow my work - ISO 27001, ISO 21434 pre-auditing, and reporting. - Bullet-proof offshore hosting & domains and investigations - Google Cloud, Microsoft Azure, AWS, Digital Ocean, Vultr, OVH, Rackspace, Heroku - Twilio, TwiML, SIP, SMS, GSM, Asterisk, VoIP, FreePBX, iSymphony, Phone Systems & Virtualized Call Centers, Call Recording - Google Cloud, Microsoft Azure, AWS, Digital Ocean, Vultr, OVH, Rackspace, Heroku - Jailbreaking, Android, iPhones, mobile forensics & data retrieval - iOS App inspection, CI/CD pipeline (fastlane, automated build & automated release) - Azure, AWS, Office365. - High knowledge on Pop-Up Ads, Pop-Unders, Honey-Pots, PPV, Tracking, Voluum, TDS, Keitaro, BossTDS, Ads - Captive Portals: OpenWRT, Splash Pages, nodogsplash, coova chilli, wifidog, etc. - Website takedowns, search engine removal, DMCA and "Right to Be Forgotten" requests. I love working on new challenging projects and surprising my clients with unique & creative solutions. Always thinking outside the box and my experience in research, development, and solutions reflect this. Proudly a top-rated freelancer on Upwork (100% Success) for this reason. As a professional in telecommunications, I am very good at communicating with people about technical solutions because my day-to-day job previously was Cloud-Based Contract Sales for Telstra, which is the biggest telecom company in Australia; Technical Solutions and B2B sales in Data, Voice & Fiber. I'm a Linux expert and can write amazing code, applications, and scripts, in many different languages. My favourite languages are C, C++, Python and shell (BASH/POSIX). I am also very good at PHP, JavaScript and other interpretted languages. I am a master of Docker. Can create all types of interfaces, ncurses, GUI's, GTK, QT. I can create SAAS-grade internal-use scrapers & browser automation: cURL, Selenium (chromedriver/geckodriver), auto-scaling, auto-deploy. I've written the backend for various high-traffic and high-value services. Great at solving problems - being able to see solutions that are outside the box and use creative techniques to manipulate data or market analysis through big-data scraping. Hope to work with you and your business.Information Security
Data ScrapingScriptingMalware RemovalPenetration TestingSecurity TestingWooCommerceBashEthical HackingLinuxSystem AdministrationBot DevelopmentAutomationCybersecurity Management - $19 hourly
- 5.0/5
- (5 jobs)
Welcome to my Upwork profile, a seasoned cybersecurity professional specializing in penetration testing, WordPress malware removal, and enhancing digital security for businesses of all sizes. With over 7 years of experience in the cybersecurity field, I bring a wealth of expertise in identifying vulnerabilities, assessing risks, and fortifying digital infrastructures against evolving cyber threats. My passion lies in helping organization's safeguard their sensitive data and maintain the integrity of their online presence. Why Choose Me? 🔍 In particular, my proficiency extends to two key areas: 🌟 Penetration Testing (Pen Testing): ✅ Web Application Penetration testing ✅ Mobile app (Android & IOS) penetration testing ✅ API Penetration Testing ✅ Ethical Hacking ✅ Vulnerability Assessment & Management ✅ Malware threats analysis ✅ Digital forensics investigation ✅ Vulnerability Assessment and Penetration Testing (VAPT) ✅ Pentest of any kind of SQL Injection, XSS, OWASP Top 10, 4000 other vulnerabilities ✅ Troubleshooting Server and Network issues ✅Pentesting tools: BurpSuite Professional, Acunetix Premium, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python framework, SQLMap, OWASP Zap 🌟 WordPress Malware Removal: ✅ WordPress Malware/Virus Removal and Security ✅ Recover Hacked WordPress website and Malware Removal ✅ WordPress Website Secure Migration ✅ Fix redirecting Fishing or spamming URLs ✅ Remove WordPress malware, malicious codes, backdoors, Shells, Viruses, Trojans By collaborating with me, you can expect: ✅Thorough Assessments: I'll conduct meticulous evaluations of your digital assets to uncover vulnerabilities and security gaps. ✅Customized Solutions: Every organization is unique, and I'll tailor my recommendations to align with your specific requirements and objectives. ✅Timely Response Reach out, and let's delve into transforming your IT landscape into an impregnable stronghold of security.Information Security
Web App Penetration TestingSecurity AnalysisMetasploitVulnerability AssessmentEnglish to Urdu TranslationEnglish to Hindi TranslationWordPressSplunkPenetration TestingCybersecurity ManagementPython - $40 hourly
- 4.9/5
- (7 jobs)
6+ Years Working as a Data Specialist in multiple Org. Skills : Cloud Tech solution ( Azure, AWS , GCP) Reporting solutions: Power BI Dashboards, Paginated Report, Tableau, Excel , Visio Automation: Power Automate, Power Apps, Excel Data Processing: Python, Power Query, DAX, SQL, R Language, VBA Experience in Microsoft Azure and AWS cloud Experience in Data Analytics, Data Cleaning, Data Modelling and Viz . Well acquainted in writing User stories describing the techno-functional aspect of the requirements and capturing As-Is and To-Be functions. Ability to maintain cooperative relationships with peer teams/vendors and communicate with both Technical/Non-Technical stakeholders to provide support in solution delivery.Information Security
Manual TestingData AnalysisBusiness AnalysisDatabase TestingIntegration TestingAPI TestingMobile App TestingDesktop Application Testing - $10 hourly
- 5.0/5
- (1 job)
With over a year of experience as a security engineer at DXC Technology and a professional SOAR (Security Orchestration, Automation, and Response) engineer, I bring a wealth of enterprise expertise to the realm of automation. My primary focus has been on automating the triage process for security incidents, but my scope has expanded beyond this domain. I've collaborated with teams to develop threat intel platforms and create innovative automation solutions to enhance team engagement. Beyond the corporate realm, I've delved into personal automation projects, including transforming my home into a smart environment and leveraging financial tools to automate crypto trading for my portfolio. Proficient in Python and equipped with a readiness to learn any required tool or technology, I've honed my skills in platforms like Zapier, Power Automate, Swimlane, and Splunk SOAR. What sets me apart is my proactive approach to problem-solving and ideation. I don't just execute tasks; I actively engage in the ideation process, providing insights and suggestions to optimize workflows and save both time and money. I'm committed to delivering quality service, and client satisfaction is paramount. If you're not satisfied, I'll work off the clock to rectify any issues until you're fully content. My long-term goal is to transition into a consulting role, where I can not only build automation platforms but also manage them for clients. For now, I'm focused on delivering top-notch automation solutions that exceed expectations and drive tangible value for my clients. Let's collaborate to streamline your processes, save costs, and propel your business forward through the power of automation.Information Security
APIAI BotChatGPTMake.comZapierMicrosoft AzureSplunkCybersecurity MonitoringProfessional ToneSystem AutomationAutomation - $35 hourly
- 0.0/5
- (0 jobs)
Professional Summary Highly skilled Sr. Cyber security expert with over 10 years of experience in cybersecurity, API security, and advanced vulnerability management. Expertise in threat modeling, penetration testing, and implementing robust security strategies across diverse platforms. Adept at using tools like ZAP, Burp Suite, and Metasploit to identify and mitigate security risks. Proficient in collaborating with cross-functional teams to integrate security solutions throughout the SDLC lifecycleInformation Security
Recover Data Recovery SoftwareSnapchatWhatsAppInstagramFacebookGrowth HackingWiresharkHackerRankEthical HackingInternet SecurityNetwork SecurityNetwork Penetration TestingPenetration Testing - $200 hourly
- 0.0/5
- (0 jobs)
I have extensive consultation, stakeholder engagement and team leadership expertise and a strong business, enterprise, solution and security architecture background. I have a proven track record of exceeding all project targets promptly using TOGAF, ITIL and Digital Transformation Agency's (DTA) Digital Service Standard to design and deliver services. I have exceptional leadership abilities, with the knowledge to instruct teams to provide innovative solutions. In addition, I have a vast understanding of ICT service delivery, change and release management, and other processes to support the activities of a significant IT project. In addition to that, I can translate verbal requirements from face-toface client meetings into requirements documents, statements of work, and proposals. I can prioritise the needs of business areas and work closely with business owners to deliver their strategic priorities. I can complement it by building and maintaining professionalInformation Security
Enterprise ArchitectureCloud ArchitectureSecurity Assessment & TestingSecurity Policies & Procedures DocumentationInformation Security ConsultationSecurity FrameworkBusinessProblem SolvingArchitectureEnterprise SoftwareArchitectural DesignCybersecurity ManagementSystem Security - $15 hourly
- 5.0/5
- (12 jobs)
Chirag has spent almost 15 years in cybersecurity and worked in 10 different countries with talented cyber engineers. So, he knows the difference between a virus and a worm. Early in his career, he provided network security for Fortune 500 clients before advancing to cybersecurity, where he then spent his time learning and securing multiple clouds. His journey led him to Australia, where he worked with the government before starting his company and consulting for South Australia Health Department and a major bank. He won several prestigious awards and earned around 26 technical certifications. Currently, he is working with a team of people much smarter than him at Cybernara. You can find him geeking out on LinkedIn at Chirag’s LinkedIn. Also, don’t forget to say hi.Information Security
Penetration TestingSplunkSecurity Operation CenterCybersecurity MonitoringCybersecurity ToolCyber Threat IntelligenceNIST Cybersecurity FrameworkSecurity Patch InstallationSecurity AnalysisCloud SecurityNetwork SecurityRisk AssessmentVulnerability AssessmentCybersecurity Management - $45 hourly
- 0.0/5
- (0 jobs)
Experienced Training Manager with a demonstrated history of working in the hospitality industry. , Flexible Schedule, Stocking, Interpersonal Skills, and Sanitation. Strong operations professional with a Certificate III focused in Hospitality Administration/Management from Crown College Melbourne.Information Security
Leadership SkillsManagement SkillsTech & ITTechnical SupportPhone CommunicationCustomer Service - $60 hourly
- 0.0/5
- (0 jobs)
Highly motivated and experienced Senior Network Engineer with a proven track record of exceeding goals and objectives. Results oriented leader that works to foster a team atmosphere, as well as building successful partnerships to support and improve the bottom line. Ability to work under pressure in fast paced environments while still maintaining high performance levels. Demonstrated experience with managing projects, including all phases of the product lifecycle: requirements gathering, testing, deployment, troubleshooting and training/support. Adept at fostering effective relationships across functions resulting in successful communication and team productivity through individual and group efforts.Information Security
ComplianceProblem SolvingGovernment Reporting ComplianceComputing & NetworkingComputer NetworkArchitectural DesignArchitectureNetwork Engineering - $50 hourly
- 0.0/5
- (0 jobs)
Cyber security specialist who has practice the craft in many aspects of the field. I can do your network troubleshooting, vulnerability assessment for your apps, hunt malwares and viruses in your home computer, recover encrypted files.Information Security
Network AdministrationHelpdeskRansomware MitigationMalware DetectionDigital ForensicsOffice 365Computer NetworkComputing & Networking - $35 hourly
- 0.0/5
- (0 jobs)
I am a dedicated IT professional with international experience in technical support and cybersecurity. I specialize in diagnosing and resolving technical issues, delivering top-notch customer service, and ensuring secure, efficient operations. With a solid foundation in threat detection, risk assessment, and identity access management, I am eager to help businesses strengthen their cybersecurity posture. Additionally, as a native Portuguese speaker, I offer high-quality document translation services for English-Portuguese projects. What I bring to the table: • Strong analytical thinking and problem-solving skills. • A proactive, adaptable approach to tackling new challenges. • Commitment to providing reliable and professional service in every project. Let’s collaborate to meet your IT, cybersecurity, or translation needs efficiently and effectively!Information Security
User Identity ManagementInformation Security GovernanceSecurity Policies & Procedures Documentation - $70 hourly
- 0.0/5
- (0 jobs)
I'll cap it down to four word to describe me: Passionate. Technical. Sales. Driven. The drive that pushes me against the odds in my outdoor adventure expeditions is the same drive present in my professional life. As a pre-sales professional, I leveraged my expertise in SDLC , product development in lean start up environments to demonstrate value to the prospect and drive technical wins. With over six years in covering territories in APJ, and over 10 years in sales engineering; I have trained channel partners and aided clientele across various industry vertical to do just one thing: implement scalable, robust , secure and compliant software delivery and observability across their Devops ecosystem. I carry experience of implementation in: * SSL /RBAC/Oauth2 certification handling, * CI/CD on the cloud (AWS, Azure,GCP) * Devops/DevSecops configuration and implementation, * Compliance standards such as MISRA, AUTOSAR, Tuv SUD and DO-178b/c. * SAST Tools (primary product Klocwork) Currently working on (and self learning on!): IoT edge integration with self-contained models provided by olLama. Building AI application prototypes on Langchain/Haystack . Looking at scale implementations of learning rate of MLX vs Pytorch epoch passes. Always Looking for: Quality Data-sets, Quality People and Quality JobsInformation Security
Problem SolvingAPI IntegrationJavaScriptPythonC++CArchitectural DesignArchitectureDatabase ManagementComplianceDevOpsSecure SDLCPre-SalesSales Engineering - $180 hourly
- 0.0/5
- (0 jobs)
I can share with you my years of experience with Ansible system automation, systems design and thinking, and reassessing how to meet the underlying fundamental needs.Information Security
Linux System AdministrationSystem AdministrationSystem AutomationNetwork EngineeringComplianceArchitectureDevOpsProblem SolvingComputing & NetworkingElectronics3D PrintingComputer Network - $35 hourly
- 0.0/5
- (0 jobs)
Information Systems Graduate | Master of Commerce, Cybersecurity and Business Analytics Student SUMMARY Recent UNSW Information Systems graduate and current Master of Commerce student specialising in Cybersecurity and Business Analytics. Proficient in data analytics, using Python and SQL, with practical experience in cybersecurity principles. Developed software solutions and contributed to business analysis projects, showcasing a blend of technical aptitude and business acumen. Adept in collaborative teamwork, eager to leverage analytical and problem-solving skills in data-driven and IT security roles.Information Security
ComplianceComputing & NetworkingComputer Network - $45 hourly
- 0.0/5
- (0 jobs)
Professional Summary A dedicated senior software engineer with a robust background in security applications. Over 20 years of software and web development experience, including expertise in secure coding practices, application vulnerability management, and cloud security. Experienced in collaborating with development teams and pentesters to implement robust security solutions, with a track record of addressing OWASP vulnerabilities, ensuring data privacy, and maintaining compliance with Australian/EU and America regulatory standards.Information Security
C#AWS Server MigrationMagento 2MagentoPHPKnockout.jsReactVue.jsGolangDatabaseDevOpsArchitectureGovernment Reporting ComplianceCompliance - $80 hourly
- 0.0/5
- (0 jobs)
specialize in multiple technologies and tools with skilled expertise in NodeJS, Java, ColdFusion, Python, ReactJS, Angular, MERN Stack, SQL, MySQL, MongoDB, Postgres, Swift, Kotlin, React Native, Flutter, AWS, Azure, GCP and many moreInformation Security
ComplianceDatabase Management - $45 hourly
- 0.0/5
- (0 jobs)
A skilled cybersecurity professional with over 12 years of experience in consulting, engineering, and compliance management, certified in CISSP, CISM, CCSK, and ISO 27001 Auditor. Adept at designing and implementing secure architectures, I specialize in cloud security, AI governance, and GRC frameworks to safeguard digital ecosystems. Key Expertise: * Cloud Security: Securing AWS, Azure, and GCP environments with advanced IAM policies, encryption, and monitoring. * Governance, Risk, and Compliance (GRC): Aligning with ISO 27001, PCI DSS, GDPR, and NIST standards. * AI Governance: Implementing secure AI practices with a focus on privacy and ethical compliance. * ICS/OT Security: Protecting industrial control systems through tailored security solutions. * Privacy and Regulatory Compliance: Ensuring adherence to global data protection and privacy laws. * Remote Management: Leading globally distributed teams to deliver seamless security operations. * Auditing: Conducting audits to enhance cybersecurity resilience and regulatory adherence. Dedicated to leveraging my expertise to enable organizations to build resilient systems and achieve strategic goals.Information Security
PrivacyAI GovernanceCloud SecurityGovernance, Risk Management & ComplianceGovernance, Risk & Compliance SoftwareRisk AssessmentRisk ManagementCybersecurity ManagementComplianceProblem SolvingDevOpsArchitectureComputing & NetworkingNetwork Engineering - $75 hourly
- 0.0/5
- (0 jobs)
I am a **Certified AWS Security Specialist** and **AWS Solutions Architect** with deep expertise in designing, securing, and optimizing cloud environments. With hands-on experience across a broad range of AWS services, I help businesses build **scalable, resilient, and cost-efficient** cloud solutions. Whether you need **AWS architecture design, security hardening, automation, or cost optimization**, I can assist in ensuring your cloud infrastructure aligns with best practices while minimizing expenses. I specialize in **Amazon Connect call center solutions**, **AWS security audits**, **serverless architecture**, and **end-to-end cloud automation**. Beyond AWS, I am also a **full-stack web developer** with expertise in **custom website development, hosting, and performance optimization**. I provide **secure, high-performance web solutions** tailored to your business needs, from simple landing pages to complex web applications. My services include: - **AWS Architecture & Optimization** (EC2, Lambda, S3, RDS, VPC, etc.) - **AWS Security & Compliance** (IAM, WAF, Shield, security audits) - **Amazon Connect Call Center Solutions** - **Cost Optimization & Cloud Efficiency** - **Web Development & Hosting** (Custom sites, WordPress, performance tuning) I bring a problem-solving mindset, attention to detail, and a commitment to delivering **secure, scalable, and cost-effective** cloud and web solutions. Let’s discuss how I can help streamline your AWS infrastructure or build your next web project! 🚀Information Security
Security InfrastructureSecurity FrameworkISO 27001AmazonComplianceArchitectural DesignProblem SolvingArchitectureAWS CloudFrontAWS CloudFormationAmazon EC2 - $100 hourly
- 0.0/5
- (0 jobs)
I am a cybersecurity consultant and experienced as a senior Cyber Security leader (Chief Information Security Officer, Business Information Security Officer, Head of Cyber Security or Director of Cyber Security and Technology Risk) and IT Audit Manager utilizing previous Cyber Security, IT Audit, Risk Management, IT Project Management, System Administration & Helpdesk/Customer Service Skills. I am highly motivated, creative and results-focused executive with 20 years’ experience leading and managing teams in Federal Governments and Large Private Organization in areas such as protective and ICT security, OT Cybersecurity and compliance, risk management, corporate governance, internal/external audit, and other assurance disciplines—fraud control, business continuity and resilience, program and project governance, quality assurance. Leads by example to establish high-performing mutual-learning teams, with an agile, supportive and accountable culture that is innovative in achieving results. • Collaborative leader demonstrating a calm and composed temperament for working under pressure. Strategically focused on optimising resources for achieving the desired result, leveraging opportunities, managing business risks and working within known constraints. Accomplished in building shared purpose, adding value to an organisation as a mentor, coach, and fellow contributor. • Broad experience in delivering tactical and strategic outcomes for improved enterprise and organisational capability and efficiency. Sound communicator adept at tailoring critical messaging to meet the needs of the target audience, from the Board of Directors and C-Suite through to line managers and operational staff. • Strategic leadership - information security, risk management, audit and compliance, business continuity and IT disaster recovery • Business acumen - corporate governance, business planning, process reengineering, business transformation, stakeholder management, Board and executive reporting, communication, and team management • Framework design and implementation – IT Security (ISM, PSPF, NIST CSF, ISO 27001, CoBIT, ITIL etc.), risk management, legislative and corporate compliance, program and project management, fraud control, business continuity and resilience and event response • Security assessments and assurance - IRAP assessments, Cloud security, system accreditation and authority to operate and Secure By Design • Operations – OT compliance assessment using IEEE62443 and ISO27001 management systems. SOC oversight, security incident response, digital forensics, privileged access management and reporting, security trend analysis and reporting, GRC toolset, awareness training, protective security and classified material management, vendor management • Architecture and design – System, application and network security, defence in depth control design and RBAC • Broad experience – Private and government, small, medium, and large organisations, employee and as service provider/consultant, Defence, Aviation and Financial sectors, Executive and Board support. Employment History I have extensive experiences SOC monitoring using SIEM and other tools. I did over 10 years of Vulnerability Management and Pen Testing work. I worked as a head of GRC for a number of years. I also worked as a lead IT Auditor. I developed internally and externally completed set up cybersecurity policy and strategies aligned with ISO27001, NIST, ISM and other international standard.Information Security
Vulnerability AssessmentGovernment Reporting ComplianceCompliance - $35 hourly
- 0.0/5
- (0 jobs)
Results-driven Systems Engineer with over 7 years of experience in IT and technology services, specializing in system architecture, project management, and technical support. Proven ability to lead complex technical projects and mentor junior staff. Adept at communicating technical concepts to diverse audiences and fostering collaborative relationships with stakeholders.Information Security
System AdministrationNetwork EngineeringComputing & Networking - $40 hourly
- 0.0/5
- (0 jobs)
With over three years of experience in IT support, system administration, and cybersecurity, I help businesses maintain secure, efficient, and high-performing IT infrastructures. My expertise spans from troubleshooting complex technical issues to implementing advanced security measures that protect organizations from cyber threats. 🔹 Cybersecurity & Endpoint Protection – Skilled in Microsoft Defender, Cisco Secure Endpoint, SIEM tools (Microsoft Sentinel, Splunk), and vulnerability management. 🔹 IT Support & Network Administration – Proficient in Windows Server, Active Directory, Azure AD, Office 365, Intune, LAN/WAN, SD-WAN, VoIP, and VPN configurations. 🔹 Automation & Scripting – Experienced in PowerShell, Python, and Bash for automation and efficiency. 🔹 Cloud & Virtualization – Hands-on experience with Azure, Hyper-V, Citrix, and Microsoft Deployment Toolkit (MDT). 🔹 Incident Response & Troubleshooting – Adept at resolving technical issues, performing root cause analysis, and implementing security best practices. I have successfully led projects such as server upgrades, security software migrations, phishing awareness training, and cloud storage transitions. My goal is to provide top-tier IT solutions that enhance security, performance, and reliability. Looking for expert IT support or cybersecurity services? Let’s connect! 🚀Information Security
Computer NetworkNetwork EngineeringSystem AdministrationComputing & Networking - $33 hourly
- 0.0/5
- (0 jobs)
As an experienced IT professional with over 12 years in various technical roles, I bring a diverse skill set that spans IT administration, technical support, software development, and system analysis. I am passionate about leveraging my technical expertise to improve operational efficiency and drive business success. Key Strengths: Technical Expertise: Proficient in managing IT infrastructure, network systems, and end-user support, ensuring high uptime and reliability. Software Development & Analysis: Experienced in Python, MySQL, and Django, having contributed to software applications such as Smart Campus System and system analysis for various projects. Problem Solving: Skilled in troubleshooting and resolving complex IT issues with a focus on efficiency and minimal downtime. Collaboration & Communication: Adept at working within cross-functional teams to evaluate business needs and deliver IT solutions. Strong written and verbal communication skills for creating documentation and user manuals. Project Management: Successfully coordinated and delivered IT projects, including network installations, system upgrades, and telecommunication enhancements. I am always keen to stay updated on the latest industry trends and strive to continuously learn and grow. Whether working independently or as part of a team, I thrive on solving challenges and helping businesses achieve their goals through the effective use of technology.Information Security
Technical SupportTechnical WritingProblem SolvingCommunicationsComputer NetworkComputing & NetworkingSystem Administration - $60 hourly
- 0.0/5
- (0 jobs)
Based on your resume, here’s a refined short bio for freelance opportunities, emphasizing your ITIL expertise and IT Service Management skills: Freelance ITSM Consultant | ITIL Expert | Digital Transformation Leader I am a seasoned IT Service Management (ITSM) consultant and ITIL expert with over 26 years of experience in service design, IT governance, digital transformation, and cybersecurity across government, enterprise, and critical infrastructure sectors. With extensive expertise in ITIL frameworks, service integration and management (SIAM), and IT operations, I help organizations enhance service delivery, streamline processes, and align IT services with business goals. I hold multiple ITIL certifications, including ITIL 4 Managing Professional and ITIL 4 Strategist, and have extensive experience leading change management, service transition, vendor management, and risk governance in high-profile organizations. I have successfully optimized IT service desks, implemented ERP solutions (TechnologyOne), developed cybersecurity frameworks, and led large-scale digital transformation projects. Key Expertise & Certifications: ITIL 4 Managing Professional & ITIL 4 Strategist – Direct, Plan, and Improve ITSM Architecture, Service Integration & Management (SIAM) Incident, Problem, and Change Management Service Design, Transition, and Continuous Improvement Vendor & Risk Management | Governance & Compliance Cybersecurity Frameworks & Business Continuity Planning Project Management Professional (PMP) Certified I offer freelance ITSM consulting services, including ITIL framework implementation, service process improvement, digital transformation strategies, and IT governance advisory. Let’s collaborate!Information Security
Agile Project ManagementInformation & Communications TechnologyInformation Technology StrategyIT SourcingIT Service ManagementGovernment Reporting ComplianceCompliance - $55 hourly
- 0.0/5
- (0 jobs)
I am an experienced IT Support Specialist with a strong background in system administration, troubleshooting, and user support. With expertise in Microsoft 365, Active Directory, Google Workspace, and IT infrastructure management, I ensure seamless operations for businesses by managing accounts, permissions, networks, and devices. What I Do Best: ✔ IT Support & Troubleshooting – Diagnosing and resolving hardware, software, and network issues for smooth business operations. ✔ System & User Administration – Managing Active Directory, Office 365, and Google Workspace accounts, permissions, and security policies. ✔ Network & Asset Management – Handling LAN setup, system configurations, and asset audits for compliance and efficiency. ✔ Helpdesk & Remote Support – Providing first-line support via FreshDesk, phone, and email, ensuring quick issue resolution. ✔ Security & Compliance – Assisting with secure migrations, user access controls, and IT policy adherence. I am passionate about technology, problem-solving, and helping businesses optimize their IT systems. Let’s connect! 🚀Information Security
Computing & NetworkingDatabaseNetwork EngineeringGovernment Reporting ComplianceComplianceComputer NetworkDatabase Management Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.