Hire the best Information Security Analysts in the United Kingdom
Check out Information Security Analysts in the United Kingdom with the skills you need for your next job.
- $50 hourly
- 5.0/5
- (20 jobs)
I am dual-skilled in the application of cybersecurity and Azure AI solutions and have been a Wine Advocate and enthusiast for over twenty years. I have completed the implementation of cyber-security architecture design patterns and frameworks for many custom Azure, AWS, and GCP platform-based solutions. My specialist areas include Auditing, Compliance, Development, Governance, Infrastructure, Planning, Platforms, Risk, SIEM/SOAR, and Threat Intelligence needs. In the last 2 years, I have been working on AI/ML (Artificial Intelligence/Machine Learning) projects, integrating Azure AI services into other Microsoft Services, such as Microsoft Defender, Microsoft 365 and web services. I have experience working with Artificial Intelligence workloads and considerations, providing fundamental principles of machine learning on Azure and applying features of computer vision workloads, Natural Language Processing (NLP) workloads, and generative AI workloads on Azure. Since the beginning of the COVID pandemic in 2019, I have become qualified for the WSET (Wine Spirit and Education Trust) Wine Awards, studying up to level 3. I have gained strong knowledge of the principal grape varieties of the world, the regions in which they are grown, and the styles of wine they produce. I have built a combination of high-end tasting, exploring the factors that impact specific styles and quality and learning how to describe these wines with confidence. I can build tasting 'maps' describing various wine types, using the Wine Spirit Education Trust (WSET) Systematic Approach to Tasting Wine (SAT); these 'maps' cover descriptions for appearance, nose, palate and quality. Across principal grape varieties, understand and gain applied knowledge across environmental factors, grape-growing, winemaking and maturation options influence the style and quality of wines. I have strong technical wine knowledge and the capability to write copy for wine products. I create meaningful content that engages customers and drives business across various platforms, such as blogs, social media, and websites.Information Security
Content WritingUnified Threat ManagementCreative WritingSecurity Operation CenterSecurity ManagementCybersecurity ManagementBlog WritingEditing & ProofreadingCloud SecurityCopywritingCertified Information Security ManagerWebsite ContentBlog ContentSecurity Analysis - $100 hourly
- 5.0/5
- (9 jobs)
Top Rated and Expert Vetted for Cloud, VCISO, Security, AI, FinOps and Blockchain projects! Contact me to discuss your goals and scope of your project/s regarding any of the following aspects: ISO 27001, PCI DSS, GDPR, HIPAA, SOC, SOC1, SOC2, Cyber Essentials compliance/certification and NCA Cybersecurity Controls (CCC) . AI infusion to systems, compliant with regulation. Cloud cost optimisation FinOps strategy, mentoring and delivery. Cloud migration strategy, implementation and delivery on AWS, Azure and GCP, design and alignment with Enterprise Architecture MLOps, AI Analytics, LLM AI design, development and delivery. Blockchain infrastructure and smart contracts auditing for Hyperledger, Ethereum etc. SecOps and SOC building and management. Application Security SAST / DAST. Networking security and architecture. Pentest for external and internal infrastructure, black / grey / white box Feel free to invite me for a brief chat to discuss the scope of your project and try to find a strategic solution, either short-term or long-term.Information Security
Information ArchitectureData EngineeringCloud ArchitectureCloud EngineeringCloud ComputingProject ManagementDigital TransformationData AnalyticsCloud SecurityStrategic PlanningRisk AssessmentRisk ManagementBlockchain Architecture - $90 hourly
- 5.0/5
- (2 jobs)
A highly accomplished and well-established individual with over 12 years of rich professional cross-industry experience. Experienced in managing and implementing a diverse range of technologies within fast-paced ecosystems, empowering organisations to utilise cutting-edge IT solutions, coordinating and delivering complex migrations, reducing operational costs, delivering organisation-wide objectives, optimising customer-facing IT and digital experiences and exceeding expectations set by senior leaders. A results-focused individual who enjoys working with people from all backgrounds and looks forward to new challenges.Information Security
Cloud Security FrameworkUser Identity ManagementNetwork EngineeringCloud ServicesDisaster RecoverySingle Sign-OnISO 27001Email DeliverabilityInfrastructure ManagementAmazon Web ServicesMicrosoft AzureVirtualizationSystem AdministrationDNS - $59 hourly
- 5.0/5
- (13 jobs)
Welcome to UEMSecure, a boutique consultancy focused on delivering HIPAA-compliant solutions for small and medium-sized healthcare businesses using Microsoft 365 Business Premium and Intune. I bring years of experience, including time at industry leaders like Accenture, Avanade and Microsoft, to help your organization achieve a fully HIPAA-compliant workplace. With Microsoft 365 Business Premium, I provide a secure, cloud-based platform that safeguards sensitive healthcare data, while managing your devices through Intune to ensure policy enforcement and data protection across all endpoints. As an added value, your organization will be managed through Microsoft 365 Lighthouse. This tool ensures centralized, consistent security management across all your devices, proactively monitoring for potential risks and enforcing HIPAA-compliant policies. You can trust that your systems remain secure and compliant, allowing you to focus on delivering healthcare services without the burden of managing complex IT tasks. I make the process of working with me simple and hassle-free, requiring minimal input from your side. I am self-managed, following agile and lean startup methodologies. Here’s how it works: I create a backlog of tasks, propose tailored solutions, and let you choose the option that best suits your business needs. Your feedback and insights are invaluable, helping me deliver solutions that align perfectly with your objectives. I provide dedicated support during EST working hours, ensuring your organization always has the assistance it needs to maintain compliance and security. With UEMSecure, you gain access to an expert who ensures your business is aligned with HIPAA regulations using trusted Microsoft solutions. Let me be your partner in building a secure and compliant digital workplace.Information Security
Solution ArchitectureCloud ArchitectureAutopilotCloud SecurityMicrosoft WindowsMicrosoft AzureMobile Device ManagementWindows AdministrationMicrosoft HoloLensApplication SecurityCybersecurity ManagementInformation Security Consultation - $100 hourly
- 5.0/5
- (15 jobs)
Hello I am an experienced cyber security professional and owner of the UK based boutique consultancy Periculo.co.uk who specialise in Digital health, medical devices, fintech, SaaS companies and more. Having drawn on my experience over a number of years, working with a huge variety of customers ranging from construction companies to banks, charities, medical devices, fintech and MOD contractors I became a freelancer to offer affordable expertise that benefits everyone. I strongly believe that every organisation needs to take security and compliance seriously however not all have the big budget that most consultancies demand for their work. Through my own internal processes I'm able to quickly deliver high quality, best in class security and compliance consultancy and testing. My organisation is accredited to the following; Cyber Essentials Cyber Essentials Plus IASME Gold GDPR readiness ISO27001 ISO9001 CREST Penetration Testing We are certified to these standards to provide assurance but also so I practice what I preach and know how to implement it in an efficient way. If you require an affordable security and compliance expert who always reaches a solution with the appropriate risk v reward balance then please get in touch. - Able to assess, audit and certify to GDPR ready, IASME Gold, Cyber Essentials and Cyber Essentials + - GDPR Advisory, DPO as a Service (as I have technical expertise I can often cover a lot more than your traditional DPO) - Providing project consultancy (From small changes to extensive, high risk programs) - Providing operational consultancy and escalation - Supplier and internal assessments - FDA submissions - EUMDR submissions - Penetration testing - Penetration testing for medical devices, inline with IEC60601-4-5 - SOUP management - Hazard analysis - CISO as a service - Digital health cyber security - Infrastructure Security and configuration, AWS, Azure - Security operations consultancy and build - Business and technical policy, standards author Cover all aspects of security including penetration testing, vulnerability scanning etc. ** I am currently available for hire**Information Security
Cybersecurity ManagementISO 27001Information Security AuditPenetration TestingSecurity TestingTechnical WritingVulnerability AssessmentData ProtectionPCINetwork SecurityCloud Computing - $25 hourly
- 5.0/5
- (28 jobs)
🎯 Upwork Top Rated | ⭐ 5 Stars Feedback | ✅ 2000+ Projects Worldwide | ⏰ 10,000+ Working Hours Worldwide Zakir Ullah Mahsood is a MERN Stack, Full Stack WordPress Developer with a Master's degree in Cyber Security. He is a meticulous and diligent professional with a deep understanding of networking, software development, database administration, Linux system administration, social engineering, and other component competencies that provide the core of a good security professional. In addition to his security expertise, Zakir has hands-on experience in architecting, designing, and developing highly scalable and maintainable end-to-end website applications. He excels at applying design principles and clean code practices in any language or framework, with an understanding of continuous integration and test automation disciplines. Zakir's area of expertise in Web Development includes: | Server Migration | Speed Optimization | Website Designing | Backend Development | | Troubleshooting and Bug Fixes | Security Testing for Websites | Git Version Control | | Search Engine Optimization (SEO) | APIs Development | Zakir's goal in performing security assessment work is to provide more insight than what a simple vulnerability scan can. He can go deeper, stringing vulnerabilities together across multiple domains and developing custom proof-of-concept exploits to add impact to known vulnerabilities. Zakir has the ability to perform web application security assessments and ensure high-level protection of websites from malware and hackers. He possesses extensive knowledge in WordPress, complete MERN Stack technologies, SEO, Cyber Security, and is proficient in a variety of programming languages, including HTML, CSS, and JavaScript. Lastly, Zakir is a great communicator and is comfortable providing professionally written reports as well as presenting to various levels of audiences, including upper management. If you are looking for a highly skilled and experienced Web Developer and Cyber Security Professional, then Zakir Ullah Mahsood is the perfect candidate for you. Thanks!Information Security
Node.jsReactReact NativeExpressJSTypeScriptEcommerce WebsiteMalware RemovalWordPressVulnerability AssessmentWordPress DevelopmentCSSMongoDBSQLSearch Engine Optimization - $45 hourly
- 5.0/5
- (62 jobs)
Hi, my name is Martin and I've been a principal penetration tester since 2011. Over the years, I've worked on a range of projects across Europe, East Asia, the Middle East, and the UK, serving clients from start-ups to global high street names. My focus is on providing a wide range of penetration testing services, including infrastructure, web and mobile applications, APIs, and cloud security assessments. One of the things that sets me apart from other penetration testers is my approach to the work. I've spent years mastering my craft, staying up-to-date with the latest technologies and techniques, and honing my skills. When I take on a project, I bring all of this knowledge and experience to bear, quickly identifying and exploiting vulnerabilities to provide my clients with the information they need to improve their security posture. In addition to my technical expertise, I'm also an excellent communicator. I understand that many of my clients are not technical experts themselves, so I'm always happy to explain complex technical concepts in simple, easy-to-understand language. I work closely with my clients to understand their needs and provide tailored solutions that meet their specific requirements. When it comes to deliverables, I take great pride in producing detailed reports and other materials that provide clear, concise information about the results of my testing. I know that my clients rely on this information to make important decisions about their security, so I always ensure that my reports are accurate, thorough, and actionable. Overall, I'm proud of the work I do as a principal penetration tester, and I'm committed to helping my clients stay safe and secure in an increasingly complex digital landscape. If you need infrastructure testing, web and mobile application testing, or cloud security assessments, please don't hesitate to get in touch – I'd be happy to discuss how I can help. Experience and expertise within the following disciplines: • Web Application Penetration Testing • Mobile Applications Penetration Testing • API Penetration Testing (REST, SOAP, GraphQL) • Thick Client Application Penetration Testing • External Infrastructure Penetration Testing • Internal Infrastructure Penetration Testing • Server Build Reviews • Workstation Build Reviews • Mobile Device and MDM Testing • Network Device Security Reviews • IoT Security • Embedded Hardware • Simulated Phishing • Wireless Assessments • Red Team Assessments • AWS Configuration Reviews • Azure Configuration Reviews • Office365 Configuration ReviewsInformation Security
Web App Penetration TestingWebsite SecurityEthical HackingCertified Information Systems Security ProfessionalWordPressSecurity Assessment & TestingCloud SecuritySecurity TestingVulnerability AssessmentWeb Application SecuritySecurity AnalysisPenetration TestingSecurity InfrastructureCybersecurity Management - $20 hourly
- 5.0/5
- (9 jobs)
I am Shashank Kesarwani, I am an Application Security Engineer at Poppulo and have 3+ years of Experience in Security and Development. Below are the services which I can provide:- Services: 🔍 Risk Assessment: Uncover hidden threats before they strike! I deliver thorough evaluations that proactively identify risks and provide strategic solutions to keep your business secure. 🔐 Vulnerability Assessments: Stay ahead of cyber threats with detailed vulnerability scans. I’ll pinpoint weaknesses in your infrastructure and provide actionable steps to fortify your defenses. 🎯 Penetration Testing: Think your system is secure? Let me put it to the test. I conduct rigorous penetration testing to expose vulnerabilities before attackers can exploit them. 🧩 Code Review: Ensure your code is rock-solid. I offer meticulous code reviews to identify and eliminate security vulnerabilities, ensuring your software is both robust and secure. 💻 Script Writing: Automate and optimize your operations with custom scripts. I craft versatile scripts tailored to your needs, with proficiency in Python, Java, and Bash. 📜 Compliance Consulting: Navigating compliance standards can be tricky—I make it simple. Whether it’s ISO 27001, PCI DSS, or NIST, I’ll guide you through achieving and maintaining compliance with ease. 🚀 Cybersecurity Mentor: Ready to elevate your cybersecurity career? I provide personalized mentorship, offering guidance and support to help you thrive in this ever-evolving field. Why Choose Me: With a proven track record of significantly reducing security risks and boosting system defences, I am dedicated to providing high-quality cybersecurity services tailored to your unique needs. My strong analytical, communicative, and leadership skills ensure effective collaboration and successful project outcomes. Let’s work together to secure your digital assets and achieve your cybersecurity goals. Let's connect and discuss how I can help protect your organization from cyber threats!Information Security
Network SecurityApplication SecurityCloud SecurityReverse EngineeringWeb App Penetration TestingISO 27001NIST Cybersecurity FrameworkEthical HackingSoftware DevelopmentAutomated TestingWeb ScrapingRESTful APIPythonJava - $20 hourly
- 4.1/5
- (21 jobs)
Working full-time as a freelancer with Upwork providing Tier I - Tier III End-user Technical Support on Office 365, Exchange Online/Server, Azure, Windows Servers, and Active Directory Federation Service (ADFS). With over 4 years in managing both on-premise, cloud, and hybrid environments, I am familiar with programming languages used in automation, scripting, and rapid deployments of solutions/Infrasturce as a code.Information Security
IT ConsultationSOC 2 ReportCloud SecurityISO 27001Vulnerability AssessmentTechnical SupportPenetration TestingInternet SecurityCybersecurity ManagementOffice 365Microsoft Windows PowerShellTech & ITSystem AdministrationWindows Server - $20 hourly
- 5.0/5
- (2 jobs)
I am qualified and experienced in IT networks and security. I have experince with setting up routers, switches and firewalls. I am also experienced with Linux, and Windows Administration and security.Information Security
Security AnalysisWide Area NetworkNetwork SecurityNetwork MonitoringSystem HardeningWindows ServerLinux System AdministrationWindows 10 AdministrationSecurity TestingWireless Network ImplementationNetwork EquipmentSystem AdministrationNetwork Administration - $70 hourly
- 5.0/5
- (27 jobs)
Linux Configuration, security, diagnostics and troubleshooting, optimization of Redhat / Centos and Ubuntu servers DevSecOps Ansible, Docker, Kubernetes, Bash scripting, Openscap, OWASP ZAP, SonarQube, Terraform, Jenkins, Git, GitHub Action Cloud specialization GCP, Azure High Performance Computing Slurm, Ceph Storage, NFS, Lustre Official certifications --- Red hat o RHCSA o RHCE o Red hat Certified Specialist in Ansible Automation (Expired) o Red hat Certified Specialist in Containers and Kubernetes (Expired) o Red hat Certified Specialist in Linux Diagnostics and Troubleshooting o Red Hat Certified Specialist in Containers --- Linux Foundation o Certified Kubernetes Administrator o Certified Kubernetes Security Specialist o Certified Prometheus Associate --- Cloud o Google Cloud Certified Associate Cloud Engineer (Expired) o Google Cloud Certified Professional Cloud Architect o Google Cloud Certified Professional Cloud Security Engineer o Google Cloud Certified Professional Machine Learning Engineer o AWS Certified Cloud Practitioner (Expired) o Microsoft Certified: Azure Administrator Associate --- Automation o Certified Jenkins Engineer 2020 o HashiCorp Certified Terraform Associate (003)Information Security
MySQLBashLinuxKubernetesDockerTerraformGoogle Cloud PlatformJenkinsAnsible - $60 hourly
- 4.8/5
- (27 jobs)
With over 20 years of professional academic and research experience, while working for various HEI globally, I am a PhD in Computer Sciences with a specialisation in Cyber Security. I am a qualified academician with a Postgraduate Certificate in Academic Practice. Currently, I am working as a Senior Lecturer (Cyber Security) in a renowned institution in the UK. I am associated with the Higher Education Academy (HEA) as a Full Fellow in the UK. I am a senior member of IEEE and an academic initiative member of IBM since 2016. I am also associated with various institutions as a Tutor and External Examiner for their undergraduate courses in Cybersecurity, Digital Forensics, Computer Sciences, and Multimedia Technology. I have more than 10 years of supervision and mentoring experience. I have successfully supervised PhD, M.Phil, M.Sc. and BSc students as their Director of Studies and/or Primary/Main supervisor. Most recently, one of my PhD students defended his PhD. Currently, I am supervising two PhD students and M.Sc. students in Cybersecurity. I have also mentored and supervised B.Sc. Honours and Final Year students for their graduation projects. I am an active researcher and have authored many articles in internationally renowned and top-tier, highly cited Journals and IEEE flagship international conferences. My research success includes; several top-tier (Q1-Q4) highly indexed articles, submission of three US-Patent in the USPTO office, attracting more than 05 international and national level of research grants and projects, attracting industrial leaders like IBM, Raytheon, Northrop Grumman, GMU and others for research collaborations and training. I am an Editor of five international peer-reviewed journals in the domain of Cybersecurity and Computer Science from UK/US/Canada and reviewer of more than 05 ISI/SCI-E indexed highly cited journals. I offer my services for academic writing, editing and reviewing in all the subjects of Computer Sciences and Information and Cybersecurity for undergraduate, and postgraduate PhD/M.Phil and M.Sc. students. This includes assistance in project report writing, undergraduate and postgraduate report/thesis/proposal writing, and academic research writing for conferences and journals. I also offer my services for supervision and mentoring for undergraduate (B.Sc., B.Eng etc.), and Postgraduate PhD, M.Phil, M.Sc. and M.Eng students.Information Security
Editing & ProofreadingResearch PapersProofreadingInternet SecurityFormattingCloud Security FrameworkSecurity TestingAcademic WritingNetwork SecurityComputer ScienceWeb Application SecuritySecurity AnalysisAcademic Research - $95 hourly
- 5.0/5
- (11 jobs)
I am a Cyber Security and Information Technology expert with 20 years experience ranging from small start-ups to multi-billion euro businesses. I hold a CISSP, the gold standard of Information Security Qualifications and I am a certified PCI Professional (PCIP) I specialise in Strategy, Governance, Risk and Compliance - this makes me ideal for projects such as: Helping you achieve Cyber Essentials or IASME Governance status PCI-DSS & ISO 27001 compliance programs and audits Being your Cyber Security / Info Sec manager or CISO on a part-time basis Selecting and managing IT and Cyber Security suppliers on your behalf Writing, reviewing and updating your IT and Cyber Security policies Security Awareness Training I am an award winning public speaker and trainer and my Cyber Security Awareness Training is very popular delivered in person or from my online studio to clients around the world.Information Security
GDPRSecurity InfrastructureInformation Security AwarenessISO 27001PCI DSSInformation Security AuditInformation Security GovernanceCertified Information Systems Security ProfessionalPCISecurity Policies & Procedures DocumentationIncident Response PlanVulnerability AssessmentSecurity Assessment & TestingNetwork Security - $90 hourly
- 5.0/5
- (2 jobs)
Security Engineer with an Msc. in Cyber Security, and a Bsc. in Computer Science. CCSK and DecSecOps Professional certified. Specialist areas include: Writing security policies for Infrastructure as Code (IaC). Security testing including vulnerability scanning and penetration testing. DevSecOps. Product Security - Hazard Assessment, Validation & Verification of security controls.Information Security
Application SecurityVulnerability AssessmentCI/CDInformation Security AwarenessSQLEncryptionKali Linux - $60 hourly
- 5.0/5
- (26 jobs)
I hold a Master's degree in Cyber Security from Manchester Metropolitan University, UK, and possess over three years of experience providing cyber security services to a wide range of businesses and individuals. My expertise lies in effectively combating cyber threats. Moreover, as an experienced SEO-optimized writer, I specialize in producing high-quality content focused on cyber security and IT. I excel in various writing styles related to these domains. Key Skills: 1. Proficient in conducting vulnerability assessments to identify system weaknesses. 2. Experienced in delivering comprehensive cyber security awareness and training programs. 3. Skilled in performing penetration testing to identify and rectify potential vulnerabilities. 4. Well-versed in implementing robust web and network security measures. 5. Sound knowledge of information system security principles and best practices. 6. Proficient in technical and academic writing pertaining to cyber security and IT. 7. Specialized in crafting engaging and informative blog content for businesses and SMBs. 8. Knowledgeable in digital forensics techniques for investigating and analyzing cyber incidents. 9. Proficient in generating detailed reports on security findings and recommendations. 1. Experienced in conducting compliance assessments and risk evaluations. Notable Academic Projects Completed: 1. Conducted a survey on network-based attacks in VANETs (Vehicular Ad Hoc Networks). 2. Performed a comprehensive survey on mitigating Mirai botnet attacks. 3. Executed penetration testing on vulnerable Linux systems. 4. Proposed effective mitigation strategies for GNSS spoofing attacks in autonomous vehicles. Connect with me for your next project.Information Security
Cybersecurity ManagementTechnical WritingSEO WritingUS English DialectWebsite CopywritingSecurity AnalysisPenetration TestingTech & ITContent WritingBlog WritingArticle WritingNetwork SecurityBlog Content - $75 hourly
- 5.0/5
- (3 jobs)
Certified PECB ISO 27001 Lead Implementor CompTIA Security + Senior Consultant specialising in both technical security and governance, risk, and compliance. With experience in Security operations, Security policies and procedures, Risk management, GDPR and DPA 2018, Network vulnerability scanning, Penetration testing, ISO 27001 and ISMS implementation and management. Projects and Experience: -Implemented ISO 27001 with a client, helping them pass first time with positive feedback and zero non-conformities. -GDPR uplift and security review of application and services to ensure the client was GDPR compliant, DPA 2018 compliant and operating with the best security practices. -Cyber Assured ISMS implementation, building an ISMS for a client with the end goal of passing Cyber Assured and meeting requirements from supplier and customer. -Security awareness training delivered to clients, providing relevant, understandable and concise cyber security information and helping them develop good security hygiene. -Disaster recovery and Business continuity, implementing robust disaster recovery plans and practices, and performing simulations and tabletop exercises for clients and customers. Education and Certifications: -BSc(Hons) First Class in Applied Cyber Security -CompTIA Security + Skills and Knowledge: -Security testing (Penetration testing, Vulnerability scanning, OSINT) -Certification consultancy (Cyber Essentials, Cyber Essentials Plus, Cyber Assured, ISO27001, SOC, PCI) -Security management and maintenance (Cyber Essentials, Cyber Essentials Plus, Cyber Assured, ISO27001, SOC, PCI) -Certification audits (Cyber Essentials, Cyber Essentials Plus, Cyber Assured) -Security / Systems Architecture (Design, Consultancy, and Implementation) -Security operations (SIEM, Incidents, Monitoring) -Secure Development Lifecycle (DevSecOps, Code review, Consultancy) -Security Business infrastructure management (Microsoft Business premium, Google Workspace)Information Security
Information Security AuditISO 27001PythonGDPRInformation Security AwarenessApplication SecuritySystem SecurityInformation Security Consultation - $35 hourly
- 5.0/5
- (2 jobs)
🔒🌐 Cybersecurity Dynamo | 🛡️💻 Proven track record in Monitoring, Analysis & Configuring SIEM/EDR. 👨💻 If you have thoughts about the following, we might be a wonderful fit: ● "There are millions of freelancers online but I want the BEST" ● "Our company needs the best defense and advised with the best solutions!" ● "I want to know how can I improve my organization's security" ● "I'm NOT a cybersecurity expert, and I don't have time to mess around with security!" ● "We got a security breach - I don't want that EVER again" ● "I need a full cybersecurity package that I KNOW 100% will protect our company’s assets RIGHT" ● "I am looking for a SOC Analyst/security engineer/cloud security expert all in one" Working with me, you will: ★ STOP worrying about the cyber attacks and Phishing attempts in your infrastructure. ★ Put your best foot forward in the business world, and focus on what matters ★ NOT have to pay any ransom to some hacker out there trying to take every penny out of your business ★ Anticipate upcoming security challenge and pre-handle them ★ Get a detailed briefing on all the security findings and recommendations to remediate them ... and even SAVE MONEY by taking proactive approach in cybersecurity in your business. I've conducted multiple SIEM and EDR configurations, have tuned rules and reduced alert fatigue for SOC Analyst. Having worked as a L2 Threat detection and response Analyst with large organizations, I know what it takes to secure an organization data/assets and what to look out for. 🥳 My Achievements: ● I have identified many potential threats in big companies through my monitoring and analysis. ● I have deployed and configured several SIEM tools like Sentinel and have created use cases according to clients requirements. ● I have helped companies LOWER ITS COSTS by managing log ingestion on various subscriptions. ● I have many industry-proven certifications under my belt including (but not limited to) Microsoft Certified Security Operations Analyst Associate (SC-200), CEH (Certified Ethical Hacker), NSE 5 FortiSIEM & EDR, ISC2 CC, Splunk Fundamentals , Microsoft AZ-900, SIREN SentinelOne IR Engineer, etc. 🔍 What I look for in a new client: ● Open mind, relaxed attitude ● Values integrity & relationships ● Focused on improving, let their actions speak louder than words ● Knows our minimum scope, and wants the BEST 💪 My Expertise: SOC Operations, SIEM Deployment and Configuration, Microsoft Defender, Microsoft Azure, Microsoft Sentinel, EDR, Cybersecurity Consultancy, Monitoring, Triage, Analysis. Sound like a fit? Next steps: 🟢 Press ‘Send Message’ button in the top right-hand corner 💬 Write me a personalized note including why you think we’re a good fit to work togetherInformation Security
Phishing DetectionKusto Query LanguageNIST Cybersecurity FrameworkISO 27001Microsoft Endpoint ManagerFirewallRisk ManagementSplunkThreat DetectionIntrusion Detection SystemCloud ComputingIntrusion Prevention SystemMicrosoft AzureSystem Security - $150 hourly
- 4.8/5
- (18 jobs)
✅CISSP certified Cybersecurity Consultant - Ex VMware Academy Instructor & Microsoft Certified Trainer with over 20+ years of hands-on experience and expertise within the IT industry. I have worked with many well-known companies, including: ✅JSM Group ✅Ambassador Theatre Group ✅Calor Gas GB ✅SAGA PLC ✅Kingston University | City, University of London ✅Goldsmiths College, University of London ✅Aspen Healthcare ✅Hyde Housing ✅Cabot Financial Extensive experience with authoring technical documents aimed at all levels of understanding, including: 1️⃣ Proposal / RFC writing 2️⃣ Designs (HLD/LLD) including client facing workshops 3️⃣ Statements of Work (SoW) 4️⃣ Case Studies 5️⃣ Reference Architecture Documents 6️⃣ Standard Operating Procedures (SOP) ✅From a consultative perspective, I am an expert in all things cybersecurity and cloud, and I specialise in helping organisations achieve complex business and IT transformation, such as cloud and datacentre migrations & NIST posture assessments and remediations. Key Projects that I have delivered include: ✅Several migrations from on-premises (Hyper-V/VMware)to Azure. ✅Multiple Datacentre Migration based on Microsoft Hyper-V and VMware ESXi ✅NIST, PCI DSS, ISO 27001, ISO 27002:2022, CyberEssentials+ posture assessments and remediations ✅Migrations from on-premises Microsoft Exchange to Office 365 ✅Migrations from on-premises file services to Microsoft OneDrive/SharePoint I am highly certified across the cybersecurity & cloud infrastructure stack, including: ✅TOGAF® 9 (TOGAF) – Currently studying ✅ Certified Information Systems Security Professional (CISSP) ✅ VMware Cloud Provider Specialist ✅ AZ-103 – Certified Azure Administrator (MCA) ✅ AZ-900 Azure Fundamentals (MCF) ✅ Microsoft Certified Trainer (MCT) ✅ VMWare certified professional (VCP) ✅ MCITP: Virtualisation Administrator (MCITP) ✅ MCITP: Enterprise Administrator (MCITP) ✅ Cisco Certified Network Associate (CCNA) ✅ Microsoft Certified Systems Engineer (MCSE) ✅ MCITP: Server Administrator (MCITP) ✅ ITIL v3 Foundation (ITIL) ✅ PRINCE2 2009 Foundation (PRINCE2) ✅ CompTIA Security+ (Sec+) ✅ CompTIA Network+ (Net+) ✅ CompTIA A+ (A+) ✅ Citrix Certified Administrator (CCA) ✅ Certified SonicWALL Security Administrator (CSSA) ✅ HP ASE - Advanced Server Administrator V8 (ASE) ✅ HP ASE - Server Solutions Integrator V8.1 (ASE) 🌟Testimonials🌟 "I had the pleasure to work with James on an infrastructure project at the time, bringing Hyper V into the business amongst other technologies and processes. James was a breath of fresh air to work with; he is super reliable and confident when approaching difficult decisions and brought with him a vast knowledge of IT and different Technologies. James has a great approach and style to his work, and I was able to learn a lot from him and have fun in the process. I would happily recommend him, and I wish him all the success in future IT Adventures." 🎗️Head of Infrastructure, Aspen Healthcare🎗️ "James was a breath of fresh air compared to some of our previous managers. He had a straight-talking, no-nonsense approach to his work. He was very knowledgeable across a wide range of technologies, unlike some other managers who just manage, he was very hands-on - He spent time drilling into our systems to see how they were configured, offering up advice and improvements when needed." 🎗️Infrastructure Specialist, University of East London🎗️ "Jamie was a great mentor to me when I was making my way into the infrastructure team. His knowledge of networking and VMware were excellent, and he helped me transition into my new role. He was always able to take time out of his busy schedule to explain and share his knowledge and skills with anyone who was ready to learn. He was a great manager to work for. 🎗️Collaboration Manager, Goldsmiths College, University of London🎗️ "James is a very diligent and capable architect finding the right technology fit for customer's requirements. I've enjoyed working with Jamie over the last year; best luck for the future, buddy and hopefully, we can work together again in the future." 🎗️Enterprise Architect, Calor Gas GB🎗️ "I have worked for and alongside Jamie on a number of projects and initiatives in the last year; his quick thinking and decisive leadership have been vital in orchestrating a number of positive changes within the business. Jamie has a wealth of technical and strategic knowledge and is always willing to impart his wisdom to other members of the department. He’s an ambitious leader whose positive attitude and commitment allow him to tackle any challenge head-on." 🎗️Cloud Architect, European Electronique🎗️ "Jamie is great to work for; he is organised, very structured in how he works, and most importantly, an enjoyable person to be around." 🎗️Project Manager, Computacenter🎗️Information Security
Technical WritingContent WritingNIST Cybersecurity FrameworkCloud ArchitectureCloud ComputingBusiness TransformationDigital TransformationCloud MigrationMicrosoft AzureCybersecurity ManagementVMWareOffice 365IT InfrastructureIT Consultation - $40 hourly
- 4.6/5
- (2 jobs)
As a Cyber security Consultant with experience in the industry, I am dedicated to ensuring the protection of clients' systems and data from potential cyber attacks. My expertise includes conducting security assessments, identifying vulnerabilities, and recommending remediation measures. I develop and implement security policies, standards, and procedures, providing guidance and recommendations to clients on security best practices. I possess a Bachelor's degree in Cyber Security and have a deep understanding of security protocols, cryptography, authentication, authorization, and security architecture. I am also familiar with security tools such as firewalls, intrusion detection systems, and vulnerability assessment tools, enabling me to effectively assess and manage cyber security risks. My strong analytical and problem-solving skills, combined with my ability to stay up-to-date with the latest security threats, trends, and technologies, enable me to provide the highest level of protection for my clients. I possess excellent communication and interpersonal skills, allowing me to effectively collaborate with clients and teams to achieve successful outcomes. If you are seeking a highly qualified Cybersecurity Consultant to help protect your valuable assets, please contact me to discuss how I can assist you in achieving your goals.Information Security
ISO 27001Policy WritingCyber Threat IntelligenceNIST Cybersecurity FrameworkSecurity InfrastructureCybersecurity ManagementSystem SecurityNetwork Security - $50 hourly
- 5.0/5
- (5 jobs)
✅ Award-winning cyber-security expert and writer/course creator on Information Security topics with over 20 years of experience in the field. I have helped companies secure their cloud security environments and written for industry cybersecurity publications such as ISACA Journal, CIO Magazine, and numerous others. I have also published a book on Artificial Intelligence Governance and Cyber-Security which has a 4.8/5 rating on Amazon. Additionally, I have over 11K students enrolled in my Udemy Courses some of which are the highest rated in their categories! If you are looking for the below then reach out : ✅ Blog posts focusing on Cyber-security / Cloud Security / Artificial Intelligence ✅ Whitepapers on cybersecurity topics ✅ Cybersecurity Ebooks ✅ Social media posts on Cyber-security to grow your following ✅ E-learning course creation e.g. Udemy course on Cyber security or AI governance Additionally, I also help with the below : ✅ PCI DSS consultations ✅ Cybersecurity career coaching 💥 Why choose me over other freelancers 💥 ★ I go above and beyond when it comes to delivering value to my customers. You get my 100% attention from day 1 ★ My two-decade experience in cyber-security and 15-year experience as a writer gives me the ability to deliver on both fronts when it comes to writing or creating cybersecurity content Below is a 🏆 testimonial 🏆 from one of my customers "I was Taimur's editor at CIO Middle East, and found him to be a consummate professional, both as a writer and an IT practitioner. As a technology practitioner, Taimur was well aware of the major challenges confronting IT leaders in the region, and was able to come up with story ideas that were germane for our audience. The depth of his knowledge was evident in the pieces he produced. Taimur is also a meticulous writer, turning in polished pieces on deadline. He is able to write clearly and concisely about complex topics. Just as important, he has an easy-going manner and is a pleasure to work with! I highly recommend Taimur to anyone who is seeking a writer who has in-depth experience as an IT leader"Information Security
CopywritingContent WritingGhostwritingBlog WritingBook WritingArticle WritingEbook WritingWritingAmazon Web ServicesCloud SecurityCloud Security FrameworkArtificial IntelligenceCloud Computing - $35 hourly
- 5.0/5
- (1 job)
I'm a Legal instructor /Lawyer / Arbitrator/ Consultant/ Translator, who have been working in the Legal field for over 22 years, mainly in the Middle East region, Northern Africa, and the Uk Received my PhD in international law in 2009. I can provide many services such as: * Legal training and workshops for many countries (Arabic/English) * Legal research * Arbitration and Dispute resolution (Including Sharia law) * Legal consultations on various legal fields (in some jurisdictions only) * Translation ( Arabic - English ) I'm sure, I am able to carry out those services from all aspects to the fullest.Information Security
Training & DevelopmentWritingTrademarkData ProtectionContract DraftingLegal ConsultingTranslation - $96 hourly
- 5.0/5
- (2 jobs)
My name is Emmanuel Onditi and I am a highly experienced Consultant specializing in providing comprehensive advice and support to businesses across various industries. With a deep understanding of business operations and a keen eye for opportunities, I offer strategic guidance to help individuals and companies optimize their performance, drive growth, and achieve their goals. 1.) IT Support: I offer technical IT support services to help businesses effectively leverage technology for improved efficiency and productivity. I possess extensive knowledge of IT systems, software applications, and infrastructure management. Whether you need assistance with hardware and software selection, network setup, data management, or IT project management, I can provide reliable guidance and support to ensure your IT environment aligns with your business objectives no matter what stage of business you’re in. 2.) Cyber Security Services: Protecting your business from cyber threats is crucial in today's digital landscape. With my expertise & connections in cyber security, I can offer comprehensive support to safeguard your organization's sensitive data and information systems. I can conduct thorough risk assessments, develop robust security strategies, implement effective security measures, and provide employee training on best practices. Whether you require assistance with network security, data privacy compliance, incident response planning, or security audits, I can help you establish a strong cyber security framework to mitigate risks and protect your business assets. With a client-centric approach, I strive to understand your unique business needs and deliver tailored solutions that drive tangible results. With my experience in business and in IT, I can empower your business to thrive in today's competitive landscape while ensuring the integrity and security of your operations.Information Security
Risk ManagementISO 27001Cybersecurity ManagementNetwork AdministrationWindows 11 AdministrationInformation TechnologySystem SecurityDesktop SupportmacOS - $100 hourly
- 5.0/5
- (4 jobs)
Stephanie Itimi is a PhD researcher in the Information Security Group at Royal Holloway. She has a BA in Economics from Coventry University and an MSc in Global Economic Governance and Policy from SOAS, University of London. She has played a significant role in the development and manufacturing of high-profile initiatives in Slovakia, Morocco, the United Kingdom and several West and East African nations through her diverse policy and consultative experience with the UK Home Office, BBC Africa, Essex County Council, UN Women and the European Commission, promoting freedom of information, digital literacy and gender equality. Her research interests are centred on security practises targeted at domestic workers in Lagos, Nigeria via the perspective of care and surveillance.Information Security
SOC 2SOC 1ISO 27001Management SkillsProject ManagementArtificial Intelligence - $80 hourly
- 5.0/5
- (25 jobs)
Facing IT challenges and in need of swift, effective solutions? With over 10 years of experience, I specialize in scoping, costing, project planning, and implementing tailored IT services that minimize downtime and maximize the value of your technology investments. 》》》WHY CHOOSE ME《《《 As an IT professional with expertise in cloud migrations, infrastructure automation, endpoint management, and solution architecture, I help businesses of all sizes streamline operations, enhance security, and boost efficiency through Azure and Microsoft 365 solutions. Whether you're aiming to: ✅ Leverage advanced Microsoft 365 E5 services, including data labelling, Advanced Threat Protection (ATP), Cloud App Security, and compliance solutions to protect and govern your data effectively. ✅ Implement data labelling and classification to safeguard sensitive information and meet compliance requirements. ✅ Simplify tenant-to-tenant migrations in Microsoft 365, ensuring a smooth transition with minimal disruption. ✅ Deploy Azure Virtual Desktop (AVD) for seamless and secure remote work capabilities. ✅ Enhance security and manage endpoints with Intune and SCCM, including device enrolment, policy configuration, application deployment, and integration with third-party platforms like Apple Business Manager and Google Workspace. ✅ Automate and scale your infrastructure using Infrastructure as Code (IaC) tools like Bicep, Terraform, and Azure DevOps. ✅ Strengthen your security posture with Azure features such as Multi-Factor Authentication (MFA), Conditional Access (CA), Data Loss Prevention (DLP), Privileged Identity Management (PIM), and Entra ID integration with third-party services. I deliver solutions that drive measurable improvements in productivity and security, ensuring your cloud infrastructure is protected and compliant. 》》》EXPERTISE HIGHLIGHTS《《《 ✅ Microsoft 365 E5 Expertise: Unlock the full potential of M365 E5 with advanced security, compliance, and collaboration tools, including data labelling, Information Protection, and Threat Intelligence. ✅ Cloud Migrations: Efficiently migrate your infrastructure with seamless tenant-to-tenant and site-to-tenant transitions in M365 and Azure. ✅ Azure Infrastructure Automation: Automate cloud infrastructure with Bicep, Azure DevOps, and GitHub, reducing manual processes and increasing scalability. ✅ Intune, SCCM & Device Management: Securely manage your remote or hybrid workforce with industry best practices in device management using Intune and SCCM. ✅ System Audits & Reporting: Identify opportunities to optimize performance and security through comprehensive audits and actionable insights. ✅ Security Enhancement: Implement robust security measures to protect against threats and ensure compliance. ✅ Solution Architecture: Design tailored IT solutions using High-Level and Low-Level Design (HLD/LLD) methodologies, ensuring alignment with business needs. ✅ Project Delivery: Deliver successful projects on time and within budget, ensuring clarity at every stage through continuous communication. 》》》MY VALUE ADD DURING OUR COLLABORTAION 《《《 ✅ Expert Guidance: With over 10 years of experience, I bring a wealth of knowledge in cloud migrations, infrastructure automation, endpoint management, and solution architecture. I understand the complexities and best practices needed to deliver effective IT solutions. ✅ Strategic Planning: Successful projects start with a solid strategy. I evaluate your current IT environment, business goals, and future objectives to create a customized roadmap that aligns with your needs. ✅ Data Integrity and Security: Your data is critical to your business. I prioritize its integrity and security throughout every process, ensuring all information is protected, accurately migrated, and compliant with industry regulations. ✅ Performance and Productivity Optimization: I implement strategies to enhance system performance and boost productivity, ensuring you get the maximum value from your technology investments. ✅ Transparent Communication: I believe in keeping you informed at every stage. Expect clear, regular updates and documentation, so you're always in the loop. I'm dedicated to leading projects and delivering high-quality results, on time and on budget. Let's discuss how I can help your business thrive—contact me today to get started. 📱📨🤝Information Security
Microsoft SCCMUser Technical TrainingTechnical DocumentationTechnical DesignTechnical Project ManagementSolution Architecture ConsultationMicrosoft OfficeOffice 365Microsoft 365 CopilotMicrosoft Endpoint ManagerMicrosoft Azure AdministrationMicrosoft AzureAzure DevOpsNetwork Engineering - $45 hourly
- 5.0/5
- (1 job)
SUMMARY Experience of over 20 years in the Information Technology space starting from DataCentres in the first ten years to AWS & Azure Cloud as a seasoned contractor providing automation, Digital Transformation, Migration, Optimization, Continuous integration and Information security for the last 9 years. I have worked in different capacities facilitating clients. Some of those are Platform Engineer, DevOps, DevSecOps, DevOps lead, DevOps Manager, Tech Lead, SME and Consultant in the industry. I pride myself on the technical breadth and depth capability reflecting on the committed passion I hold for the industry. QUALIFICATIONS Amazon Web Services AWS * AWS Solutions Architect Professional * AWS DevOps Engineer Professional * AWS Solutions Architect Associate * AWS SysOps Administrator Associate * AWS Cloud Practitioner Microsoft Azure * Azure Cyber Security Architect Expert * Azure 305 Solutions Architect Expert * Azure 400 DevOps Engineer Expert * Azure 500 Security Engineer Associate * Azure 104 Administrator Associate * Azure 204 Developer Associate * Azure 900 Data FundamentalsInformation Security
Infrastructure ManagementIT InfrastructureInfrastructure as CodeNetwork EngineeringDevOpsProblem SolvingComputing & NetworkingCloud ComputingCloud Architecture - $50 hourly
- 5.0/5
- (3 jobs)
I am an experienced IT Support Engineer with over 10 years of expertise in providing comprehensive technical support and solutions. ⚙🔧 💻With a strong focus on Windows systems, Email configuration (including Outlook and Exchange), DNS management, WordPress updates, and Service Desk technical support, I am dedicated to delivering exceptional service to clients across various industries. My skills include: ⌨ Windows Support: Installation, troubleshooting, maintenance, and optimisation of Windows operating systems. 🖱 Email Configuration: Configuration and troubleshooting of email clients, especially Outlook, including setup of IMAP, SMTP, and Exchange accounts. 🖲 DNS & Networking: Expertise in DNS configuration, DNS record management. 💽 WordPress Management: Regular updates and maintenance for WordPress websites. 🖨 Service Desk Support: Providing high-quality, remote technical support for end-users, resolving hardware/software issues, and offering proactive solutions to ensure minimal downtime. Problem-Solving: Quick at identifying problems and providing practical, efficient solutions with clear communication and minimal disruption. Why work with me: • 10+ years of experience: I've worked with a variety of clients, from small businesses to large enterprises, ensuring smooth IT operations. • Responsive and professional: I pride myself on my clear communication, reliability, and timely service. • Tailored Solutions: I understand that every business has unique needs, and I tailor my approach to suit your specific technical challenges. If you need an IT professional to handle your system setups, troubleshooting, or ongoing technical support, I’m here to help! Let’s get your IT systems running smoothly and efficiently. Feel free to reach out to discuss your project or any questions you may have!Information Security
System AdministrationComputer NetworkComputing & Networking - $93 hourly
- 5.0/5
- (1 job)
As the Managing Director of Vigilant Cyber Ltd., I lead a team of dedicated cybersecurity professionals committed to safeguarding businesses in an increasingly complex digital landscape. We understand that cybersecurity is not just about technology; it's about building trust and ensuring business continuity. That's why we've established ourselves as a premier provider of comprehensive cybersecurity solutions, leveraging strategic partnerships as a Kaseya Gold Partner, Sophos CSP and MSP, and Microsoft CSP. My journey into cybersecurity is deeply personal. In 2017, I was a victim of identity theft. This experience was a stark wake-up call, demonstrating the devastating impact of cybercrime and the critical need for robust digital defences. Rather than allowing this experience to define me, I chose to channel it into a driving force, pivoting my career towards cybersecurity.Information Security
Web App Penetration TestingNetwork Penetration TestingBusiness Continuity PlanningWordPressArchitectural DesignArchitectureNetwork EngineeringComputing & NetworkingComputer NetworkEthical HackingComplianceDevOpsPenetration TestingMicrosoft Azure Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.