Hire the best Information Security Analysts in Azerbaijan
Check out Information Security Analysts in Azerbaijan with the skills you need for your next job.
- $30 hourly
- 5.0/5
- (4 jobs)
Experienced IT Specialist with Expertise in Infrastructure Management, Cybersecurity, and Cloud Solutions I am an IT professional with extensive experience in managing and optimizing IT infrastructures for diverse industries, including hospitality, resorts, and IT support companies. My goal is to provide tailored solutions that improve efficiency, enhance security, and ensure seamless operations. What I Do Best: • IT Infrastructure Management: Proven expertise in managing the IT operations of 6 hotels, a winter resort center, and an amusement park, ensuring all systems run smoothly and securely. • Cloud Solutions: Skilled in cloud migration and management (AWS, Azure), helping businesses modernize their IT environments for scalability and cost-efficiency. • Cybersecurity Implementation: Designing and managing robust cybersecurity frameworks to protect businesses from threats and ensure data integrity. • Network & Server Administration: Proficient in managing network resources, configuring servers, and implementing VPN and firewall solutions. • Helpdesk & Technical Support: Experienced in setting up and managing helpdesk systems to streamline IT support and improve response times. With a focus on delivering reliable and secure IT solutions, I’m dedicated to helping businesses achieve their technological goals efficiently and effectively. Let’s work together to bring your IT projects to life!Information SecurityEmail SecurityEmailAntivirus & Security Software3CXFortiGate FirewallVirtualizationIT ManagementCloud ArchitectureData BackupServer AdministrationCybersecurity ManagementProblem SolvingNetwork EngineeringComputing & Networking - $35 hourly
- 5.0/5
- (6 jobs)
According to a security report, it has been revealed that around 70% of websites on the internet are susceptible to malicious attacks. Even renowned organizations such as Facebook and Yahoo allocate significant budgets every year to compensate security researchers who discover and report security vulnerabilities in their web applications. DON'T BE THE ORGANIZATION THAT BECOMES AN EASY TARGET FOR HACKERS. Even experienced programmers can inadvertently introduce vulnerabilities into their code, leaving websites exposed to malicious agents. Let's work together to safeguard your web application. I specialize in conducting penetration testing to identify potential vulnerabilities, including ----------------------------------------------------------------------------------------------------------- 1.SQL Injection: This vulnerability occurs when user-supplied data is not properly validated or sanitized, allowing attackers to inject malicious SQL code. It can lead to unauthorized access, data manipulation, or data leakage from the database. 2.Remote File Inclusion (RFI) and Local File Inclusion (LFI): RFI is a vulnerability that allows an attacker to include external files or code from a remote server. LFI, on the other hand, involves including local files from the target system. Both vulnerabilities can lead to unauthorized access, remote code execution, or sensitive information exposure. 3.Remote Code Execution (RCE): This vulnerability allows attackers to execute arbitrary code on the target system. It typically occurs when input validation or output sanitization is inadequate, enabling malicious code execution with the privileges of the web application. 4.Cross-Site Request Forgery (CSRF): CSRF involves tricking a user's browser into making unauthorized requests on their behalf. Attackers can exploit this vulnerability to perform actions on behalf of the victim, such as changing settings, making financial transactions, or performing malicious activities. 5.Logic Errors: Logic errors occur when there are flaws in the design or implementation of the application's logic. These vulnerabilities can lead to unauthorized access, data leakage, or abuse of system resources. 6.OWASP Top 10 vulnerabilities: The OWASP Top 10 is a list of the most critical web application security risks. It includes vulnerabilities such as SQL injection, XSS (Cross-Site Scripting), CSRF, insecure direct object references, and others. These vulnerabilities are commonly exploited by attackers and should be addressed to secure web applications. 7.Other Common Security Vulnerabilities: There are numerous other security vulnerabilities that can affect web applications. These may include authentication and authorization weaknesses, insecure file uploads, inadequate data validation, session management vulnerabilities, and more. Furthermore, I offer network scanning services to detect any insecure services operating on your server. By collaborating with me, we can ensure the security of your web application and minimize the risk of falling victim to cyberattacks. Let's proactively address security concerns and fortify your web presence.Information SecurityEthical HackingSOC 2 ReportCloud SecurityBug BountyWeb App Penetration TestingCybersecurity ManagementNetwork SecurityPenetration TestingMalware Removal - $5 hourly
- 5.0/5
- (1 job)
Appeared to be punctual worker. I have high productivity and have a large amount of knowledge in regarding the position held. Responsible for assigned tasks. I am a good PC user and able to quickly learn new information. I have organizational abilities and communication skills. Also showed initiative and made suggestions to improve the work of the department, participated in training and adaptation of new employees. I was on friendly terms with colleagues.Information SecuritySQLUiPathPythonDatabaseComputer NetworkMicrosoft OfficeGoogle Analytics - $100 hourly
- 0.0/5
- (0 jobs)
Eyvazov Shakir Being a hard-working and experienced person I am looking for position within Objective respectful and progressive company, which offers me the opportunity for continuous career growth . Military service Unusable Skills Active network eqiupment: Installation /Preventive maintenance of the network equipment: Cisco Unified Communications Manager Express, Cisco Wireless LAN Controller (WLC), Cisco Switches, Cisco Routers, HP Switches, HP Server ProLiant G6,7,8,9. Networking: Switching: STP, VTP, HSRP, PVLAN, UDLD, DHCP Snooping, EtherChannel, MPLS, IEEE 802.11 Wi-Fi protocols. Routing: IPV4/IPV6 Static Routing, RIP, EIGRP, OSFP, BGP, Access List, DHCP Relay. VPN: IPsec, GRE, GRE over IPsec.Information SecurityComputing & NetworkingDatabase ManagementDatabaseNetwork EngineeringComputer Network - $7 hourly
- 0.0/5
- (0 jobs)
Summary I am a computer engineering student with a strong interest in software development, artificial intelligence, and cybersecurity. Currently, I am deeply engaged in C programming, working on web development projects, and advancing my skills in artificial intelligence. I also aim to provide solutions and take active roles in projects on freelance platforms like Upwork.Information SecurityGovernment Reporting ComplianceSystem AdministrationNetwork EngineeringComplianceComputing & NetworkingGraphComputer Network - $27 hourly
- 0.0/5
- (0 jobs)
Summary As an enthusiastic cybersecurity professional with more than one year of hands-on experience, I am deeply committed to safeguarding the digital realm. My passion for cybersecurity spans both blue team (defensive) and red team (offensive) skills, where I have developed a well-rounded understanding of threat landscapes and mitigation strategies. Earning international certifications along the way, I have continually expanded my expertise, embracing the challenge of staying ahead in an ever-evolving field. I believe in the power of collaboration, connecting with diverse perspectives, and learning from every encounter. Whether it's refining defense mechanisms or crafting offensive strategies, the cybersecurity journey excites me every day. I'm eager to share knowledge, build connections, and continue growing while making meaningful contributions to the community. Let's work together to ensure the future of cybersecurity remains secure and innovative!Information SecurityNetwork EngineeringComputer NetworkComputing & Networking - $20 hourly
- 0.0/5
- (0 jobs)
I am Gafarov Tarlan Namig son, born in 1994 in Baku. I entered secondary school in 2000. After graduating from the 9th grade, I entered a computer operator college. I graduated from 11 years of school there and received a diploma, certificate, and attestation. I served in the military in 2012-2013. I have been working as an IT specialist since 2013.Information SecurityDatabase ManagementDatabaseGovernment Reporting ComplianceComplianceNetwork EngineeringGraphComputing & NetworkingComputer Network - $50 hourly
- 0.0/5
- (0 jobs)
PROFILE See section on personal profiles EDUCATION Applied Math (Bachelor´s) COMPANY (Department of Geophysics and Geology) PRESENT POSİTİON System Administrator, software developerInformation SecurityGovernment Reporting ComplianceComputing & NetworkingComplianceNetwork EngineeringDatabaseGraphComputer NetworkDatabase Management - $25 hourly
- 0.0/5
- (0 jobs)
I am a Computer Engineer with a strong interest in IT. I have experience working as a Helpdesk professional, where I excelled in resolving technical issues efficiently and ensuring customer satisfaction. I am skilled in providing effective solutions and collaborating within a team environment. Open to learning new technologies, I am highly motivated to continuously develop my skills and contribute to the success of any organization.Information SecurityData AnalyticsIT SupportDatabaseHelpdeskComputing & NetworkingComputer Network - $5 hourly
- 0.0/5
- (0 jobs)
I am a student who interested in Network , Pentesting and System Administration . I have gained CCNA (Cisco Certified Network Assosiates)Information SecuritySystem AdministrationComputing & NetworkingComputer Network - $20 hourly
- 0.0/5
- (0 jobs)
Skilled in Python, Java, SQLite, PostgreSQL, Unity, and design tools (Photoshop, Blender, After Effects).Information SecurityComputing & NetworkingNetwork EngineeringGraphComputer NetworkComplianceDatabase ManagementDatabase - $19 hourly
- 0.0/5
- (0 jobs)
PROJECTS AVCheck Alternative Avcheck is a service that analyzes files and URLs for viruses, worms, Trojans and other kinds of malicious content. Our goal is to make the internet a safer place through collaboration between members of the antivirus industry, researchers and end users of all kinds. - Completed Tasks: Scan the malware to AVS to get output file. Retrieve (via regex) the parts where the malicious files were found and create json file of it. Connect API code with the server code and the VM environment Update the code related to the file uploads to the AV server. (like let the AV server know how many files will be uploaded) Zip (and rar) files should be extracted and then scanned FortiSIEM - Monitor external data sources ) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise. - Perform cyber defense trend analysis and reportingInformation SecurityScriptingArchitectureNetwork Penetration TestingPythonSecurity ManagementPython ScriptBashArchitectural DesignInformation TechnologyBash ProgrammingPenetration TestingMetasploitSystem Security - $30 hourly
- 0.0/5
- (0 jobs)
................................................................................................................Information SecurityNetwork EngineeringComputing & NetworkingProblem SolvingArchitectural DesignArchitectureComputer NetworkDevOps - $20 hourly
- 0.0/5
- (0 jobs)
Summary As a Junior SOC Analyst with a solid academic background from Azerbaijan State Oil and Industry University, I am currently advancing my education with a Master's Degree in Information Systems. I possess practical experience in cybersecurity, having participated in an extensive training program at the Azerbaijan Cybersecurity Center. My areas of expertise include digital forensics, incident response, and security operations, enhanced by hands-on experience with tools like Wazuh, QRadar, and Wireshark. Professionally, I have worked as a helpdesk analyst at Business Insight, where I developed strong troubleshooting skills and an ability to manage and resolve customer issues efficiently, further honing my technical and communicational skills. This role underscored the importance of continual learning and adaptation, qualities that I actively cultivate by staying updated on the latest cybersecurity trends and technologies. I have strong experience in frontend development and have participated in many college projects.Information SecurityComputing & NetworkingNetwork EngineeringComputer NetworkComplianceDatabaseHelp Desk SoftwareFront-End Development - $20 hourly
- 0.0/5
- (0 jobs)
I am an expert in information security and programming. I can create basic and medium level web-sites for you. Knows HTML,CSS,C++ All I know is to improve myself and always PROGRESS.Information SecurityInformation Technology - $15 hourly
- 0.0/5
- (0 jobs)
I have a comprehensive background in IT infrastructure and system administration, delivering robust and efficient solutions tailored to organizational needs. At Rabalon, I successfully integrated Google Workspace with the company domain, establishing a secure email system and a centralized Google Drive environment for enhanced collaboration. I also implemented an on-premises IT infrastructure, creating a hybrid environment that seamlessly integrated with cloud services. This setup ensured scalability, security, and operational efficiency for the organization. Additionally, I automated patch management and system updates, significantly improving system reliability and reducing downtime. My expertise extends to managing IT projects for leading organizations. At AzInTelecom, I deployed and configured the ServiceDesk MSP system to streamline IT service management across a critical private network infrastructure. This involved designing tailored workflows, implementing request lifecycle management, and configuring Failover Service (FOS) for high availability. Similarly, for Azerbaijan Railways (ADY), I deployed Endpoint Central to centralize IT operations, enabling unified device management, automated updates, and improved compliance across all systems. In the financial sector, I implemented Endpoint Central at RabitaBank, enabling software deployment, file auditing, and remote security policy enforcement to maintain a secure IT environment. For Unibank, I integrated Patch Manager Plus to automate patch deployment, ensuring systems remained updated and secure. My work in these projects resulted in enhanced IT governance and operational efficiency. I also bring hands-on experience in Linux system administration for VPS hosting, managing server deployments, automating configurations, and optimizing system performance for international clients. I have extensive knowledge of web server management, including Apache and Nginx, as well as domain administration through cPanel and CentOS Web Panel. This includes DNS management, SSL certificate integration, and hybrid hosting solutions combining on-premises and cloud-based VPS infrastructures. With a deep understanding of cloud platforms such as Google Cloud and Microsoft Azure, I have implemented cloud-native solutions, optimized resources, and configured SAML for secure access. My skill set includes automation tools like Ansible, PowerShell, and Bash scripting, which I have utilized to streamline IT processes and improve operational efficiency. My goal is to leverage my expertise to deliver innovative and secure IT solutions that drive organizational success.Information SecurityIT Service ManagementNetwork EngineeringSystem Administration - $10 hourly
- 0.0/5
- (0 jobs)
Self-motivated GRC Analyst with strong expertise in governance, risk, and compliance frameworks like COBIT, ISO 27001, NIST CSF 2.0 and PCI DSS . Skilled in policy development, risk assessments, and audit processes to enhance organizational security posture. RHCSA-certified with a foundation in technical security, penetration testing, and regulatory compliance. Adept at bridging the gap between technical and business needs through effective communication and stakeholder collaboration.Information SecurityGovernment Reporting Compliance - $20 hourly
- 0.0/5
- (0 jobs)
Hi, I'm studying IT programming, I know python, I just want to work on myself, gain new experiences and save money to buy a bike.Information SecurityDatabase - $20 hourly
- 0.0/5
- (0 jobs)
Self-motivated Information Security student with a strong interest in freelancing. Skilled in [specific skills], and eager to gain hands-on experience in [specific field, e.g., cybersecurity, programming, etc.]. Dedicated to delivering quality results and learning new technologies.Skills • Programming: Python, C++, etc. • Cybersecurity fundamentals (if applicable) • Research and data analysis • Technical writing • Time management and problem-solvingInformation SecurityGovernment Reporting ComplianceCompliance - $10 hourly
- 0.0/5
- (0 jobs)
Hello! I'm Kenan, a dedicated and passionate developer with a keen interest in technology and programming. At just 18 years old, I have already gained valuable experience in various projects, particularly in Discord bot development and web development. What I Do Best: Discord Bot Development: I create interactive and user-friendly bots that enhance community engagement on Discord servers. My focus is on automating tasks and improving user experience. Web Development: I specialize in building visually appealing and functional websites using HTML, CSS, and JavaScript. I aim to deliver responsive designs that provide seamless navigation and performance. Skills: Programming languages: JavaScript, Python Web technologies: HTML, CSS Bot development for Discord Strong problem-solving abilities and attention to detail I am constantly seeking opportunities to expand my knowledge and skills in the tech industry. I am excited to collaborate with clients who value innovation and creativity. Feel free to reach out if you have any projects in mind or if you'd like to discuss how I can help bring your ideas to life!Information SecurityProblem SolvingDevOpsAutomationDiscord Bot DevelopmentWeb DevelopmentPythonComputer Network - $15 hourly
- 0.0/5
- (0 jobs)
Junior Oracle Database Administrator | Focused on Management and Security As a dedicated Junior Oracle Database Administrator, I specialize in the management and security of Oracle databases. My expertise lies in ensuring the smooth operation and maintenance of database environments, with a strong emphasis on data integrity, performance optimization, and security protocols. I am committed to keeping systems secure while ensuring they run efficiently, making sure that data is both accessible and protected. Key strengths include: Database Management: Proficient in maintaining and optimizing Oracle databases, ensuring high availability and reliability. Security Best Practices: Skilled in implementing security measures to safeguard sensitive data, including user access control, data encryption, and regular audits. Problem Solving: Adept at troubleshooting and resolving database issues promptly to minimize downtime and maintain business continuity. Continuous Learning: Enthusiastic about staying up-to-date with the latest Oracle technologies and industry best practices to continually improve my skills and knowledge.Information SecurityData ScienceData AnalysisComplianceGovernment Reporting ComplianceDatabase ManagementDatabase - $3 hourly
- 0.0/5
- (0 jobs)
Enthusiastic IT professional seeking to gain experience and enhance skills in network security, Cisco technologies, and technical support. Focused on learning and professional growth while delivering quality work. Ready to tackle challenges and grow with your project.Information SecurityComputing & NetworkingSystem AdministrationNetwork Engineering Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.