Hire the best Information Security Analysts in Delhi, IN
Check out Information Security Analysts in Delhi, IN with the skills you need for your next job.
- $15 hourly
- 5.0/5
- (136 jobs)
Web Penetration Testing(OWASP Top 10 methodology) | Network Penetration testing | OWASP API Security | Mobile Vulnerability Assessment(iOS and Android) | Source Code Reviews(.Net, Java, PHP) | Vulnerability Assessment and Penetration Testing | SIEM team (Cloud(AWS and Azure) Security, File Integrity Monitoring and Event Monitoring, Endpoint Security and Encryption, Data Loss Prevention, Network Access Control, Threat Monitoring (Email Traffic and Malware Analysis), Privileged Access and Identity Management) Have 7+ years of experience in both black box and white box testing penetration testing. Perform VAPT (Vulnerability Assessment and Penetration Testing) services for web applications, networks, mobile; source code reviews; malware analysis; server hardening; and security analysis etc. Conduct penetration testing in a systematic approach. Follow the standard methodology of the industry like OWASP Testing Guide v4(OTGv4); SANS top 25; NIST SP 800-115; PCI DSS to perform penetration testing so that client can concentrate on their professions without worrying about security threats. Web Application Testing: Do web application penetration testing with the latest methodology like OWASP Top-10, SANS Top-25. Perform both manual and automated penetration testing for vulnerabilities like Injection flaws(such as SQL, NoSQL, OS, and LDAP injection etc),Broken Authentication, Sensitive Data Exposure,XML External Entities (XXE), Broken Access Control,Security Misconfiguration, Cross-site scripting(XSS), Insecure Deserialization, Using Components with Known Vulnerabilities,Insufficient Logging & Monitoring. Also, perform source code reviews for many technologies like Java, NET, PHP etc. Approach for Manual Web-Application Penetration Testing: Conduct manual testing with following controls: * Configuration and Deployment Management Testing * Identity Management Testing * Authentication Testing * Authorization Testing * Session Management Testing * Input Validation Testing * Testing for Error Handling * Testing for weak Cryptography * Business Logic Testing * Client Side Testing Tools that use for Automated Web Penetration Testing: Acunetix, Burp-Suite, Netsparker, Nexpose, Nikto, IBM AppScan, HP fortify, W3af etc. Network penetration testing: Provide both external and internal network Penetration Testing so that your Network Infrastructure is secured from the real world attacks. Do both manual and automated network penetration testing. Approach for Manual Network Penetration Testing: Manually check for IDS/IPS, Server, Networks switch, Network Router, VPN, Firewalls, Anti-virus, Password etc. Tools that use for automated network penetration testing: OpenVas, Wireshark, Nessus, Metasploit, Armitage, Scapy etc. Mobile Application Penetration Testing: Perform mobile applications application penetration testing with the latest OWASP methodology(MSTG). Performed both manual and automated penetration testing for vulnerabilities like Weak Server Side Controls, Insecure Data Storage, Insufficient Transport Layer Protection, Unintended Data Leakage, Poor Authorization and Authentication, Broken Cryptography, Client Side Injection, Security Decisions Via Untrusted Inputs, Improper Session Handling, Lack of Binary Protections. Tools: Burp-Suite, HP fortify, Dex2Jar, Apktool, framework-res.apk, iNalyzer. Source Code Reviews: Perform source code reviews for both front and back-end languages. Perform source code reviews standard methodology like OWASP top 10. Do manual and automated source code reviews for various web based security vulnerabilities like SQL injection, Cross site scripting (XSS), CSRF, RFI,LFI, Authentication bypass etc. Tools: CheckMarx, IBM Appscan source for analysis, Microfocus HP Fortify. Security Analysis and Server Hardening: Regularly check and maintain your systems, servers to ensure that they comply with the standards. Do hardening application checks the item automatically on a daily basis and monitors all critical networks and server components. We support various frameworks like CIS benchmarking for Desktops & Web Browsers, Mobile Devices, Network Devices, Servers – Operating Systems, Virtualization Platforms & Cloud etc. Social Engineering: Have experience in social engineering vectors: Vishing, Phishing, Smishing, Impersonation. Used the following social engineering cycle to conduct social engineering: Gather Information: Here Information gathered from company websites, social media and other publications. Plan Attack: Next step is outline how intends to execute the attack Acquire Tools: After planning, next include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics is used in attacks such as password guessing. Tools: SET(Kali-Linux); GetGoPhishInformation Security
Web TestingInformation Security AuditWeb Application SecurityWebsite SecurityNetwork Penetration TestingSoftware QASecurity AnalysisInternet SecurityPenetration TestingVulnerability AssessmentNetwork Security - $50 hourly
- 5.0/5
- (4 jobs)
Thanks for visiting my Profile. My name is Deepansh Hooda & I'm a Security Professional. My skills are:- * Network Security * Internet Security * Web Security * Data Security * LINUX * UBUNTU I have 5+ years of rich experience in above mentioned skills. Client Satisfaction is my Top Priority. I guarantee you Excellent Quality Work.Information Security
Web App Penetration TestingPython ScriptBash ProgrammingcURLSQLNetwork Penetration TestingLinuxSQL ProgrammingPythonUnixComputing & NetworkingVulnerability AssessmentPenetration TestingSystem Security - $5 hourly
- 4.7/5
- (0 jobs)
I am a full stack web developer and certified cyber Security Expert. Familiar in using pen-testing and security testing Tools like Nessus, Nmap/Zenmap, Metasploit, OpenVas, OWASP ZAP, W3af, SQLMap, Wireshark, BurpSuite , acuneticx. Good knowledge in Vulnerability Management involving identifying, classifying, remediating, and mitigating vulnerabilities of Network, System and Applications, ensuring computer security and network security and with knowledge of various Vulnerability Testing Tools and Testing Methods. or I can help you in any problems . You can discuss me. I am 24x7 available for your help. Thank you.Information Security
JavaScriptEthical HackingSecurity AnalysisHTMLLinux System AdministrationCybersecurity ManagementNetwork Security - $60 hourly
- 0.0/5
- (4 jobs)
A passionate and self-motivated individual expertise in GDPR, ISO27K, HIPPA, PCI, SOC, VA/PT, Data Privacy, Security Awareness & Training, Security Consulting etc. Holds experience in Security management, analysis and audits. Excellent communications skills coupled with a strong subject matter knowledge. Looking for the right opportunity to grow and contribute to the organization as well.Information Security
Computer NetworkData ProtectionRisk AssessmentIT Compliance AuditSOC 2 ReportGDPRPCIDocumentationISO 27001Vendor Management SystemData PrivacyVendor ManagementHIPAACybersecurity Management - $8 hourly
- 5.0/5
- (3 jobs)
* Dynamic Application Security Testing (DAST) Pentesting: Appscan, Burpsuite * Static Application Security Testing (SAST): Checkmarx, Sonarqube * Software Composition Analysis (SCA) * DevSecOps: Integration of security into SDLC, secure CI/CD pipelines * Container Security: PrismaCloud, Docker, Kubernetes * Secure coding practices * Application Vulnerability management * Threat modeling * Strong analytical and problem-solving skills * Excellent communication and collaboration abilitiesInformation Security
Better Mobile Security BetterNetwork Penetration TestingWeb App Penetration TestingEthical HackingNetwork SecuritySource Code Scanning - $70 hourly
- 0.0/5
- (0 jobs)
I'm a cybersecurity analyst experienced in securing systems, high-level applications and data for small and large sized businesses with an expertise in AI security. Whether you're trying to secure your machine learning models or conduct a security risk assessment to help strengthen your defense against potential threats or even conduct an end-to end risk and control assessment adhering to NIST, ISO 27001 or COBIT 2019, I can help! 1. Utilizing AI and ML algorithms, I automate routine security tasks, streamline incident response workflows, and enhance overall operational efficiency. 2. From conducting in-depth threat assessments to monitoring emerging cyber threats, I provide actionable intelligence to fortify defenses and mitigate risks effectively. 3. Recognizing the human element as a critical aspect of cybersecurity, I develop training programs and awareness campaigns to educate employees and foster a culture of security awareness within organizations.Information Security
LLM Prompt EngineeringBotnet MitigationCyber Threat IntelligenceISO 27001CIS Control AssessmentNIST SP 800-53Risk ManagementSecurity Assessment & TestingPenetration TestingOWASPMachine Learning ModelArtificial IntelligenceGovernance, Risk Management & ComplianceMachine Learning - $70 hourly
- 3.7/5
- (3 jobs)
Business Continuity Manager I have strong business development professional skilled in; Business Continuity planning, ISO22301, Business Resilience, Crisis Management, Disaster Recovery, Training and Exercising, Leadership, Disaster Response and Risk Management, information security, cybersecurity, vulnerability assessment ISO 27001 ISO 22301 TrainingInformation Security
Internal AuditingEmail SupportOnline Chat SupportProject Management ProfessionalMicrosoft Excel PowerPivotPowerPoint PresentationArtificial IntelligenceInformation Security AuditCybersecurity ManagementISO 27001Crisis ManagementCrisis Communications PlanBusiness Continuity PlanDisaster Recovery - $35 hourly
- 0.0/5
- (0 jobs)
Tushar Senior Consultant (Identity and Access Management) SailPoint Certified IdentityNow (ISC) Engineer * 3+ Years of Experience in Identity and Access Management technology. * Trained various resources in IdentityNow. * SailPoint Certified IdentityNow Engineer. * Virtual Appliance Configuration. * Designing and implementation of JML (Joiner, Mover, Leaver) processes Workflows. * Have quality experience in designing and implementing Identity and Access solutions using SailPoint IdentityNow. * Delivered multiple projects using SailPoint IdentityNow implementation for Identity and Access Management. * Development of custom scripts to perform basic SailPoint tasks more efficiently. * Implemented and Designed onboarding of multiple connectors (Full Application Onboarding): o Active Directory o Workday o Workday Accounts o Web ServicesInformation Security
SailPoint Platform - $50 hourly
- 0.0/5
- (0 jobs)
OBJECTIVE Having 13+ Years of Experience in IT Operations, Service Deliveries & Management with deferent organizations serving in IT/Mar-Tech Automotive/Manufacturing/Logistics sectors. Seeking a challenging Leadership position with an organization that can effectively use my knowledge & skillsets, would provide me opportunity for learning and growth. Will give my best to provide the best possible solution in minimum possible time and will work for the growth and development of the Organization. TECHNICAL SKILLS * IT Operations & EUC Support. * DLP, Endpoint Security, MFA & Patch Management. * Project Management & IT Service Management. * Process & Workflow draft over SNOW & Remedy work with developers to implement update the catalogue. * IT Asset Management, Endpoint Management, MDM & Lifecycle of Assets. * IT Infra Planning, Budgeting, Purchase of IT Equipment's & Vendor Management.Information Security
Network EngineeringSystem AdministrationComputer NetworkGovernment Reporting ComplianceComplianceComputing & Networking - $50 hourly
- 0.0/5
- (0 jobs)
Solution Consultant with over 15+ years of experience in IT Infrastructure Solution Design, Migration, Support Operations, Identity Access management, IT Strategy and Pre-Sales (Datacenter & Cloud) with Global System Integrator, Infrastructure Hosting, Banking, Insurance, and finance sectorsInformation Security
ArchitectureProblem SolvingArchitectural DesignNetwork EngineeringComputing & NetworkingComputer Network - $50 hourly
- 0.0/5
- (0 jobs)
Looking for a secure and efficient payment gateway script to process online transactions? I provide a ready-to-deploy payment gateway solution designed for seamless integration, high security, and scalability. What You Get: ✅ Complete Payment Gateway System – Fully functional and ready for deployment. ✅ Multiple Payment Methods – Supports cards, UPI, wallets, and net banking. ✅ Secure Transactions – Encryption and fraud prevention measures included. ✅ Easy API Integration – Connect seamlessly with websites and mobile apps. ✅ Well-Documented Code – Clean and structured for easy customization. Why Choose This? ✔️ Saves time and development costs. ✔️ Scalable for future upgrades. ✔️ Fast setup and deployment. Take control of your payment processing with a robust payment gateway script! 🚀 Contact me for more details.Information Security
ComplianceCloud ComputingWeb DevelopmentFinancial SoftwarePayment GatewayDatabase Management - $40 hourly
- 0.0/5
- (0 jobs)
PROFESSIONAL SUMMARY Technical Support Engineer with over 7 years of experience in providing IT support to global educational institutions. Proficient in troubleshooting software, hardware, and network issues, with a strong focus on customer service and client satisfaction, I do contain 8 years of non-IT experience in different industries.Information Security
Network EngineeringComputing & NetworkingDatabase Management - $60 hourly
- 0.0/5
- (0 jobs)
CAREER OBJECTIVE: To join a professional team where constant learning and applying innovative skills are encouraged to achieve organisational objectives. SYNOPSIS: * Work on Java and good knowledge of Oops, collection, and multithreading. * Having worked on artificial intelligence and machine learning. * Knowledge of SQL and DBMS. * Ability to learn new concepts and to adapt to new environments PROJECT PROFILE: * Project: Face recognition for smart Home Skills Used: python, open cv library, Arduino UnoInformation Security
Problem SolvingDevOpsDatabaseDatabase Management - $67 hourly
- 0.0/5
- (0 jobs)
I have extensive training and experience in cyber security, information security, and ethical hacking. I lead a team of talented and passionate professionals who share my vision and mission. We also contribute to the cybersecurity community by participating in national quizzes and competitions, sharing our knowledge and skills with others. I hold a Master of Computer Applications degree in Cyber Security from JECRC University, where I gained in-depth knowledge and practical skills in the field.Information Security
Ethical HackingCompliance - $10 hourly
- 0.0/5
- (0 jobs)
As an IT Engineer, involves the design, implementation, management, and support of an organization’s IT infrastructure, ensuring that all technology systems, networks, and hardware work efficiently and securely.Information Security
Computer NetworkNetwork EngineeringComputing & Networking - $10 hourly
- 0.0/5
- (0 jobs)
PROFILE Dedicated Senior Security Cloud Engineer with 9 years of comprehensive experience at EY, specializing in AWS security services, Prisma, GuardDuty, and CloudTrail. Expertise in conducting detailed cloud assessments, implementing robust security controls, and managing crossfunctional teams to ensure high security standards and compliance. AWS Certified Security Specialist committed to driving continuous security improvements and safeguarding cloud environments.Information Security
Problem SolvingComplianceGovernment Reporting ComplianceArchitectureArchitectural Design - $15 hourly
- 0.0/5
- (0 jobs)
With over 12 years of expertise in IT Network and Security, I am a results-driven professional adept at managing and optimizing complex network environments. As a Cisco Certified Network Professional (CCNP), I excel in designing, implementing, and troubleshooting robust network infrastructures. Key Skills: * Network Design & Optimization * Cisco Routers, Switches, Firewalls * Load Balancers, SDN, PKI, DNS, TCP/IP * Hybrid Cloud, AWS, Google Cloud Platform (GCP) * Network Security & Cybersecurity * Network Protocols & Management Notable Achievements: # Led successful network design and implementation projects, enhancing efficiency and security. # Developed scalable, cost-effective solutions bridging on-premises and cloud environments. # Implemented cutting-edge security protocols, significantly reducing cybersecurity risks. My passion for emerging technologies and digital transformation drives my ability to deliver innovative solutions that support business growth.Information Security
VPNDNSInfoblox IPAMDocumentationProject ManagementIncident ManagementNetwork DesignAnsibleCisco Certified Network ProfessionalCisco Certified Network AssociateCisco ACINetwork EngineeringProblem SolvingComputer Network - $15 hourly
- 0.0/5
- (0 jobs)
Total Technical Experience: 11.7 Years Total Experience Technical as Lead/Infra Architect/Solution Architect: 10.5 Years PROFILE & OBJECTIVE I am a Senior IT infrastructure architect Manager in M365 Exchange Online, On-premise, Azure AD, SharePoint Online, One Drive, Teams, Intune, Co-Pilot, and Active Directory, and I am an educationist with a passion for learning new technologies & analytical thinking. I am adaptable to organizing and managing Individual contributor role-based tasks while managing the entire technical team, student relations, HR, Training, Events, Project management, and Placements. I want to work with an organization where I can continue learning and get maximum job satisfaction and optimum career growth.Information Security
Microsoft Endpoint ManagerMicrosoft Active DirectoryMicrosoft TeamsMicrosoft Azure AdministrationMicrosoft SharePoint AdministrationMicrosoft Exchange OnlineComplianceEmail SecurityChat & Messaging SoftwareOffice 365Microsoft 365 Copilot - $70 hourly
- 0.0/5
- (0 jobs)
I’m a developer experienced in building websites for small and medium-sized businesses. Whether you’re trying to win work, list your services, or create a new online store, I can help. Knows HTML and CSS3, PHP, jQuery, Wordpress, and SEO Full project management from start to finish Regular communication is important to me, so let’s keep in touch.Information Security
Computing & NetworkingDatabaseComputer NetworkComplianceDatabase Management - $10 hourly
- 0.0/5
- (0 jobs)
Technical Expertise: Certifications: CCNP (Routing & Switching) and Palo Alto Certified Network Security Engineer. Cisco Routers/Switches: Cisco Routers - 1841, 2611XM, 2621XM, 2911, 3600 series, 7200 series Cisco Catalyst Switches - 2950, 2960, 3560 & 3750 Firewalls: Palo Alto Networks 200, 500, 3000, 5000, 5200 & 7000 series firewalls. Cyberoam and Ubiquiti (UDM Pro) Network/Protocols: Routing Protocols: BGP, OSPF Switching: Spanning Tree, VTP, PAGP, LACP, Switch stacking. MPLS: Layer 3 and Layer 2 MPLS VPN, IP Sec VPN, VPLS. Services: NAT, PBR, IP SLA, Netflow Operating Systems: Windows Server 2008 R2/2012, Linux Tools: Paessler PRTG, Logic Monitor, SolarWinds, Wireshark, Nagios XI, MTR, iPerf and Salesforce.Information Security
Computing & NetworkingSystem AdministrationNetwork EngineeringComputer Network - $60 hourly
- 0.0/5
- (0 jobs)
I'm cybersecurity professional with 3+ years of experience. For any IT, Networking and cybersecurity related work, reach me, I can helpInformation Security
Computing & NetworkingCompliance - $20 hourly
- 0.0/5
- (0 jobs)
PROFESSIONAL SUMMARY 16 Years of progressive IT experience. Skills utilizing CCNA Routing and Switching, RIPv1 and 2, OSPF, EIGRP, VLAN, VTP, Windows Server 2008, 2012, 2016 and 2019 Active Directory DNS, DHCP, Hyper-V Domain Controllers, Printer Servers, IP-Addressing, Exchange server 2013, Office 365, Azure Administrator, Cloud Computing, Ms-clustering, windows patching, Upgrading Servers.Information Security
AWS GlueAWS CloudFrontMicrosoft Azure AdministrationGPODNSsecDNSDHCPActive Directory Federation ServicesMicrosoft Active DirectoryWindows ServerWindows 11 AdministrationSystem AdministrationComputing & NetworkingComputer Network - $5 hourly
- 0.0/5
- (0 jobs)
With a strong foundation in IT systems, network administration, and cybersecurity best practices, I help businesses secure, optimize, and maintain their digital infrastructure. Whether it's configuring servers, managing networks, or conducting security audits, I bring a detail-oriented, solutions-driven approach to every project. What I can help you with: -Network setup, monitoring & troubleshooting -Vsphere and ESXi server management. -Cybersecurity assessments & risk mitigation -Server installation, configuration & maintenance (Windows/Linux) -Firewall & VPN setup -Cloud infrastructure support (AWS, Azure, etc.) -System hardening & patch management -Ongoing IT support & maintenance -Penetration Testing I’m committed to clear communication, fast response times, and delivering reliable, secure solutions that meet your business needs. Let's work together to keep your systems running smoothly and securely.Information Security
Network ArchitectureNetwork Penetration TestingPenetration TestingSOC 1Server AdministrationVMware vSphereSystem AdministrationComputer Network - $30 hourly
- 0.0/5
- (0 jobs)
Synopsis Well-organized, result oriented professional with customary ability offering around 18 years of experience in: ~ Project Management ~ Vendor Management ~ Resource Management ~ Quality Management ~ Team Management ~ Client Relationship Management ~ SLA Management Excellence in project deployment and its planning, resource deployment, time over-runs and quality compliance to ensure satisfactory execution of projects. Proficient in defining the process, responsibilities, and Priorities for actual field jobs with Customer and Team. Abilities in enhancing operational efficiency by using leading edge technologies. An out-of-the-box thinker with a flair for identifying & adopting emerging trends & addressing industry requirements to achieve organizational objectives and profitability norms. Skilled in identifying improvement areas and implementing adequate measures to maximize productivity.Information Security
Government Reporting ComplianceComplianceSystem AdministrationNetwork EngineeringComputing & NetworkingComputer Network - $30 hourly
- 0.0/5
- (0 jobs)
Will do it later as currently I’m generating my profile to get some task done first that’s why putting it into loopInformation Security
Network EngineeringComputing & NetworkingComputer Network - $20 hourly
- 4.5/5
- (27 jobs)
We are a group of Senior Cyber Security Experts with over 4+ years of Hands-on Digital Forensics (Windows/ Linux/ Mac OS) and Cyber Security Specialist. We've created multiple cyber security related services and training delivered them to several clients. Also provide a large number of Investigations and Consulting Services to our clients such as: • Malicious Emails Investigations • Email Attachments Investigations (Malware Analysis) • Email Inboxing Handling (Inbox any mail to any inbox) • Computer System Forensics (Digital Forensics) • Memory Forensics (Hard Drive, Ram Evidence Recovery) • Offensive Engagements (Penetration Testing Services) • Creating Cyber Security Training If your issue is not listed here, please don't be disappointed. We'll probably be able to help out so feel free to reach out with a message at least once. -----------------------------------------ANTI PHISHING------------------------------------- What is being investigated in Email Investigation:- - Header Analysis - Identifying possible source of origin - Identifying Spoofed emails - Validate legitimacy by examining SPF, DKIM and DMARC Records - Link Analysis - Follow up investigation on any links the email contains or redirects to with a verdict on that site - Verdict on attachments (Malicious / Non-Malicious) With our Advanced Investigation you'll receive Detailed Report (Malicious Reasons, Links and Attachments Information, Malware Analysis Information) also provide our ANTI-PHISHING EXTENSION for your browser security. -----------------------------------------ANTI PHISHING------------------------------------- ----------------------------------------- FORENSICS ----------------------------------------- What is being investigated in Forensics (Windows/ Linux/ Mac OS):- - Computer System Forensics - Real-Time, on-line Evidence gathering - Off-line Computer Disk Forensic - Memory Forensics - Physical Memory Forensic (With Destroyed Data Recovery) - Critical Data pertaining to Threats exists solely in System Memory - Non-cacheable Injected Code fragments ----------------------------------------- FORENSICS ----------------------------------------- It's important for us to build long term relationships with clients, so we provide the best quality of work with the best price offers. We thought "A satisfied customer is the best business strategy". Looking forward to hearing from you! Thank You!Information Security
Information Security AwarenessInformation Security AuditInformation Security GovernanceAntivirus & Security SoftwareOffice 365Email SecurityEthical HackingOWASPMultiple Email Account ManagementSystem SecurityInformation Security ConsultationApplication SecurityDigital Forensics - $80 hourly
- 0.0/5
- (0 jobs)
IT PROFESSIONAL Seeking a position to utilize my skills and abilities in the Information Technology Industry that offers professional growth while being resourceful, innovative, and flexible to work with utmost sincerity & undertake challenges in the field of Information Security. Has Certification on CEHv12 and Comptia Security + Experience in Email Threat Hunting ,Vulnerability management , Patching, technical support.Information Security
Email SecurityPalo Alto FirewallsFortiGate FirewallSecurity Patch InstallationCybersecurity MonitoringCybersecurity Tool Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Information Security Analyst near Delhi, on Upwork?
You can hire a Information Security Analyst near Delhi, on Upwork in four simple steps:
- Create a job post tailored to your Information Security Analyst project scope. We’ll walk you through the process step by step.
- Browse top Information Security Analyst talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Information Security Analyst profiles and interview.
- Hire the right Information Security Analyst for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Information Security Analyst?
Rates charged by Information Security Analysts on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Information Security Analyst near Delhi, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Information Security Analysts and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Information Security Analyst team you need to succeed.
Can I hire a Information Security Analyst near Delhi, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Information Security Analyst proposals within 24 hours of posting a job description.