Hire the best Information Security Analysts in Kenya
Check out Information Security Analysts in Kenya with the skills you need for your next job.
- $100 hourly
- 4.7/5
- (147 jobs)
DO NOT contact me with requests to hack social media accounts, recover accounts, or engage in any illegal activities. This includes, but is not limited to, unauthorized network intrusions, financial fraud, identity theft, data breaches, or any form of hacking motivated by personal reasons, such as revenge/grudges, romantic relationships, and snooping on someone’s private details. I operate STRICTLY within LEGAL and ETHICAL boundaries and do not condone or participate in any UNLAWFUL or UNETHICAL behavior. Red Team Activities I engage in red teaming exercises under two distinct categories, ensuring all activities comply with legal and ethical standards: 1. Company or Home Penetration Tests These services are designed to identify vulnerabilities and strengthen the security of organizations or individuals. Common examples include: Simulated phishing attacks to test employee awareness or individual response to social engineering. Social engineering simulations, such as impersonation, attempts to access restricted areas or home networks. Network penetration testing to identify weak points in business or home systems. Web application security assessments to uncover exploitable flaws in personal or corporate applications. Requirements: Clients must provide WRITTEN AUTHORIZATION, including a clearly defined scope of engagement, confirming that the organization or homeowner sanctions the activities. 2. Criminal Investigations I also engage in verified investigations involving criminal activities. Examples include: Location tracking of missing persons or stolen devices (where legally sanctioned). Digital forensic analysis to identify and trace cybercriminal activities. Offensive actions, such as testing systems to retrieve data under explicit jurisdictional approval. Requirements: LEGAL DOCUMENTATION proving the case has been REPORTED to LAW ENFORCEMENT. WRITTEN APPROVAL authorizing offensive actions under the JURISDICTION OF THE LAW. Encrypted Communication for Privacy In rare and exceptional cases involving VERIFIED SPECIAL CRIMINAL INVESTIGATIONS, where the client requires ENCRYPTED communication to ensure their PRIVACY, I may reserve the right to communicate securely outside the platform ONLY after the contract is assigned on Upwork. My Expertise are; ✅ Dark Web Cyber Threat Intelligence, Fraud Investigation, Criminal Profiling, Company OSINT Investigations ✅ Malware Reverse Engineering and Disassembly ✅ WordPress Malware Removal & Hacked Website Recovery ✅ Digital Forensics (Data Recovery and Analysis, Mobile Device Forensics (iPhone & Android), Network Forensics, Email Header Analysis) ✅ Network Security: Firewall (pfsense,), IDS/IPS (Snort and Suricata), OpenVPN Access Server, SIEM (Wazuh), Web Proxy (Squid) ✅ Cyber Security Articles: Technical Writing, Blog Writing, Article Writing, Research Reports, Scientific Reports, ebooks, and Blogs (Fluent in American or British English) ✅ Pcap File Analysis (Wireshark, Network Miner, Wireedit, Scapy, ParserCap) ✅ Phishing Simulation, Red Team Operations, Exploit Development I currently hold the following certifications: ➡ Certified Ethical Hacking ➡ Certified Penetration Tester and Bug Bounty Hunter ➡ Autopsy Digital Forensics ➡ Cyber Triage Digital Forensics Incidence ResponseInformation Security
SnortWiresharkEthical HackingNetwork AnalysisPfSenseKali LinuxWebsite SecurityDigital ForensicsComputer NetworkNetwork SecurityIntrusion Detection SystemInformation TechnologyIntrusion Prevention SystemTechnical Writing - $38 hourly
- 4.7/5
- (56 jobs)
“The best tech writer I’ve ever hired. I’ve hired about 10 altogether. He’s the best of all.” -Paul Madsen, CTemplar. I am a compulsive tech writer with an exemplary command of the English language and diligent research skills. My specialties include: ‣ Cybersecurity – Online privacy and Internet security. ‣ Virtual Private Network (VPN) related content. ‣ Streaming – Cord-cutting, streaming services, and devices such as Fire TV Stick. ‣ Smartphones and related accessories. ‣ Information Technology and Computer content. ‣ How-To Articles. ‣ Cryptocurrency and NFTs. ‣ Trending and emerging topics. My professionalism will ensure that your content is: ‣ Accurate. ‣ Meets your requirements. ‣ Connects with the intended audience. ‣ Plagiarism-free. ‣ Delivered on time. If you’re looking for someone to work with, you just found one.Information Security
ProofreadingVPNContent WritingCopywritingSearch Engine OptimizationArticle WritingBusiness WritingBlog WritingTech & IT - $60 hourly
- 5.0/5
- (74 jobs)
I am a DevSecOps Practitioner, Application Security Analyst, and Cybersecurity Specialist. I have significant and well-diversified experience in multiple Cybersecurity domains, including: 1. Cloud Infrastructure: I help secure Cloud Infrastructure such as GCP AWS and Azure. 2.Penetration Testing and Vulnerability Assessment: I specialize in finding vulnerabilities in Web Applications, Mobile Applications, Networks, and Smart Contracts. 3. Bug Bounty Hunting: I find bugs for various companies on HackerOne - @l3s7r0z. I am constantly improving myself and getting better each day in the Cyber Security field. Lester Obbayi - @l3s7r0zInformation Security
DocumentationMobile App TestingWeb Application FirewallTechnical DocumentationBlack Box TestingInternet SecuritySoftware TestingWeb App Penetration TestingReport WritingEthical HackingArticle WritingNetwork SecurityPenetration TestingVulnerability Assessment - $20 hourly
- 4.0/5
- (5 jobs)
I am an Experienced Information Technology Administrator with a demonstrated history of working in the Automobile and Transportation tracking Industry and currently in the Renewables and Environment industry. Skilled in Computer Hardware Troubleshooting, Microsoft 365 Administration, Azure Administration, Asset Management, ERP Support (NAV and SAP), IT Project Management, Network Administration, SQL, and Vendor & Contract Management. Junior in Java developing language with a hunger to perfect it and Python as a coding language too. Diverse Information Technology professional with a CCNA focused in Networking from Strathmore University.Information Security
Computing & NetworkingInventory ManagementComputer NetworkSystem SecurityDatabaseCloud ComputingDatabase Management SystemIT InfrastructureCompany PolicyTechnical Project ManagementOffice 365Microsoft Active DirectoryMicrosoft Azure - $55 hourly
- 4.9/5
- (7 jobs)
I am an IBM Middleware Consultant with over 20 years field experience in technical support, project management, and management of enterprise ICT infrastructure Solutions, products and services. I have specific technical Skills, and experience in the following areas. System Hardware infrastructure: Deployments of Mid-range to High-end IBM, HP and Oracle server & Storage Expert level experience in IBM Power Systems, Power 5 to Power 10 Systems, IBM Z Systems and IBM Storage systems. Experts experience in Dell/EMC Servers and storage, Oracle Sun Solaris Systems. Expert Experience in IBM AIX & i OS, LINUX OS, Sun Solaris and Microsoft Server OS 2012 & 2016. IBM Middleware Software solutions: Pre-sales support and implementations of IBM Middleware & Security management Solutions ,Collaboration and workplace solutions, Content and Document management, Expert in the following Products IBM WebSphere, IBM MQ, IBM Integration Bus, IBM App Connect, IBM Data Power, IBM Cloud Pak for Integration, IBM QRADAR, IBM GUARDIUM,IBM ACCESS Manager, IBM Netcool, IBM Control Desk, IBM Network Manager and IBM Configuration ManagerInformation Security
Maximo Asset ManagementProject ManagementITILLinuxCognosAIXGoogle Cloud PlatformMicrosoft AzureIBM CloudDevOpsAmazon Web ServicesIBM WebSphereIBM MQJavaScript - $40 hourly
- 5.0/5
- (73 jobs)
I am a technical writer with a background in cybersecurity and software engineering. I provide content that positively impacts client search visibility and sales. My content increases organic traffic, user engagement, and revenue for enterprise businesses including Kiteworks, Cloudflare Inc., Education Ecosystem, DQLabs.ai, Lepide, Unilever, and more. My content targets CISOs, CIOs, CTOs, cybersecurity practitioners, software engineers, and other technical people. I have the ability to engage executives with the buying power to purchase your products. I have helped many cybersecurity companies, software engineers, B2B businesses, SaaS developers, API developers, and other technical organizations improve their search engine rank and generate revenue. Client analytics show that my content drives traffic and customers to client products, and they see an increase in revenue directly from my content. Most recently, using Quattr, an SEO platform that uses AI and large language models, I have managed to double the web traffic, impressions, and engagement for Kiteworks in a record 6 months. I can work with your SEO research or work with my own. I have a SEMRush account to perform keyword research and generate ideas for your site. I keep my workflow flexible for my customers so that they can focus on marketing their products and let me handle the content. I write content mainly in the form of: - Industry blog posts - Whitepapers - Technical documentation, mainly for API endpoints and SaaS - Copywriting - Website content - eBooks I cover topics around: - Cybersecurity - Network engineering, network security - Information security, infrastructure security - Email security - Software engineering, application development - NIST Cybersecurity Framework - Regulatory compliance including CMMC, ISO 27000, GDPR, HIPAA, and PCI DSS.Information Security
White Paper WritingCMMCGDPRData ProtectionInternet SecurityTechnical WritingBlog WritingNIST Cybersecurity FrameworkArticle WritingData PrivacyCloud Security FrameworkRegulatory Compliance - $38 hourly
- 5.0/5
- (24 jobs)
I am a software developer with a passion for developing intelligent, cloud-first applications. I also have experience building end to end IoT solutions. On top of that, I am a certified cloud administrator. I can work as a full-stack developer. I am comfortable using Python, JavaScript, and C#. Technologies I can work with and have experience in include: - NodeJS, React, MongoDB, Postgres, SQL Server, .net Core, HTML, CSS, ElasticSearch, AWS, Azure, Heroku, Docker, and Django.Information Security
Azure IoT HuBAWS IoT CoreTelecommunications EngineeringInternet of ThingsDjangoWritingASP.NETAmazon Web ServicesMicrosoft AzureCloud Computing - $30 hourly
- 5.0/5
- (11 jobs)
I'm an experienced and skilled technical support engineer. I'm good at: - troubleshooting and managing Windows & Linux environments i.e workstations, servers. - troubleshooting email configuration, email security using secure email gateways, SMTP filters, proxies, ISPconfig. - setting up VPNs, deploying security software and hardware. - handling customer problems on phone, email and chat-based communication. - troubleshooting and problem solving using ticketing systems. - handling escalations. - excellent communication skills both written and spoken. - AWS cloud administration - EC2, S3, ELB, IAM, - Core network routing, switching & security on routers, switches, access points, load balancers, proxies and firewalls. (Cisco, Juniper, Fortinet, SonicWall, Ubiquiti, Sophos, pfSense, etc.). - Creation of web and network proxy servers. - SIEM installations i.e. Zabbix, ELK, FortiSIEM, AlienVault, Splunk. - Endpoint security tools i.e. MalwareBytes, FireEye, Symantec, Trend Micro, Cybereason, etc. - Managing domains and DNS records.Information Security
Network EngineeringDNSNetwork MonitoringSystem AdministrationInformation Security AwarenessNetwork DesignNetwork SecurityWindows AdministrationAWS CloudFrontAmazon Web ServicesWindows ServerLinux System AdministrationMicrosoft WindowsTechnical Support - $15 hourly
- 5.0/5
- (25 jobs)
I am an expert in white paper writing, technical, research, and content writing. I have been doing this for more than you can imagine. I am a BSc degree holder in computer science, a Bachelor's degree holder in commerce, and a diploma in project management additionally I hold certification in CCNA—Master's degree in strategic management. I have over 5 years of experience in providing technical writing, research writing, article writing, content writing, and SEO technical article writing. Below are some services that I offer in technical writing, Cyber security and Computer network Finance Analysis Project management (WBS, scheduling, Gantt charts, charter, scope, project cost estimation) Software requirements specification (SRS) and system design specification (SDS) Proposal writing Database management and design(ERD design, Normalization, database schema ) Digital forensic Software Engineering (UML diagrams: Use Case, Class diagram, flowcharts, Sequence diagram) Software documentation Computer programming(Python, Java and Php ) Cloud Computing Internet of Things (IoT) Machine Learning and Artificial Intelligent Business analysis and BPMN design Vulnerability risk assessments and Data breach writing Digital Laws and Regulations SWOT Analysis And Many more ......... I believe in creating excellent services for my clients by understanding the instructions, thus providing well-versed results. As a technical writer, I remain committed to delivering quality technical work, free from plagiarism, with proper grammar and intensive research. My key purpose in the freelance industry is to relentlessly and passionately deliver high-quality work. My core values are always Commitment, reliability, time- conscious, honesty And Many more ......... I am always open to invitations from clients who have confidence in my skill set and share the same interest in perfection and good working relations. Please click "Hire me" and I will never disappoint you, thank you. So why wait? Contact me today and let's secure high-quality output within your deadline!Information Security
Software DocumentationReport WritingCybersecurity ManagementAcademic WritingCopywritingArticle WritingResearch PapersComputer ScienceContent WritingUnified Modeling LanguageProposal WritingEditing & ProofreadingSEO WritingTechnical Writing - $20 hourly
- 5.0/5
- (3 jobs)
Looking for a Penetration Tester? You are at the right place. Elisha is a passionate penetration tester and ethical hacker with expertise in conducting External & Internal Network, Wireless Web and Mobile Application Penetration Testing. Holding industry-recognized certifications (OSCP, OSWP, PNPT, CEH), you can be rest assured that I have the required technical skills and knowledge to complete a quality assessment.Information Security
Security AnalysisNetwork SecuritySocial Engineering AssessmentOWASPReport WritingInformation Security ConsultationWireless SecurityWhite Box TestingBlack Box TestingVulnerability AssessmentWeb App Penetration TestingEthical HackingNetwork Penetration TestingPenetration Testing - $35 hourly
- 4.5/5
- (3 jobs)
Offering unmatched/pro level PENETRATION TESTING and BLOCKCHAIN Innovation/Security. Specializing in Web, Mobile, Network, Cloud Security, Smart Contract Development, and Blockchain Security. Detecting and fixing vulnerabilities through top-tier Penetration Testing. Proficient in Rust, Solidity, SQL, Gophers, Bash, Python, Java, PHP, C++, C, JavaScript, CSS, HTML(5). Familiar with frameworks like Hyperledger Fabric, Ethereum (Truffle, HardHat), Node js (Express js), Django, Ruby on Rails, ASP NET, React js, Angular js. Securing Databases and Servers comprehensively. Hit my DM & Experience Top Tier Services :)Information Security
Smart ContractPenetration TestingDeFiNFTApplication SecurityBlockchain DevelopmentSmart Contract DevelopmentDatabase SecurityCloud SecurityWebsite SecurityNetwork Penetration TestingBlockchain SecurityWeb App Penetration TestingEthical Hacking - $500 hourly
- 0.0/5
- (0 jobs)
About David is a Cyber security Enthusiast with a demonstrated history of working in the computer and network security industry. He has good understanding of many security tools; FortiSIEM, Splunk, Security Onion, Portnox, Fortigate and Sophos firewalls, Azure Cloud, Nessus, Burpsuite , Nmap scripting , Kali Linux,Msfconsole among other advanced tools for pentesting. He has performed technical assessments to both Tier 11 and Tier 111 banks, Legal institutions, Saccos, Hotels, Manufacturing, Insurance sectors among others institutions. David has experience in delivering cyber security solutions,risk assessment,trainings not only in Kenya but also in East Africa Region. David is a critical thicker with ability to carry out high-analytical skills and solve complex problems making him outstanding. Hobbies *During his free time David practices ethical hacking on tryhackme for fun. *CTF player *Threat hunterInformation Security
Computer NetworkKali LinuxNetwork SecuritySystem SecurityNessusFirewall - $110 hourly
- 0.0/5
- (1 job)
PROFESSIONAL SUMMARY ? I have a background in information technology ,information security, computer forensics and incident response, information systems, accounting software, Customer relationship models, enterprise resource planning (ERP s), information systems (IS) audit and risk management. ? My experience also cuts across IT governance and policy implementations based on industry standards and good practice. ? My experience cuts across systems audit , IT maintenance and support, cybersecurity and customer relations, data analytics, big data, cloud security and artificial intelligence. ? I have performed systems audit on systems varying from POS systems, financial systems, CRM system and transaction processing systems. ? I have developed reports and management letters to advise management on possible changes to improve and better information technology in their organizations. ?Information Security
Data AnalyticsCOBITCloud SecurityDatabaseAgile Software DevelopmentSystem SecurityCybersecurity Management - $18 hourly
- 4.7/5
- (2 jobs)
"I'm a developer experienced in coding software for small and medium-sized businesses, with a strong emphasis on cybersecurity. Whether you're aiming to win work, list your services, or establish a new online store, I can offer comprehensive solutions that prioritize the security of your data and systems. Proficient in Golang, Python, C, C++, jQuery, and JavaScript, I develop robust applications while implementing best practices in cybersecurity. From encryption protocols to secure authentication mechanisms, I ensure that your software is fortified against potential threats. Moreover, I provide full project management support from inception to completion, ensuring that security measures are seamlessly integrated at every stage. Regular communication is vital throughout the process, and I am committed to keeping you informed and involved every step of the way. Let's work together to create software solutions that not only meet your business needs but also safeguard your valuable assets from cyber threats."Information Security
Ethical HackingNetwork Penetration TestingWeb App Penetration TestingGolangCertified Associate in Python ProgrammingJavaScriptJavaC++C - $50 hourly
- 0.0/5
- (0 jobs)
Experienced network and communication support specialist skilled at operating on various platforms with excellent written and oral communication skills. Seeking a position with a company that wil leverage my analytical, communication, organizational, and problem-solving abilities to drive success. My interests include information Security, Cybersecurity, Networking, Cloud Computing, and the Internet of Things (IoT).Information Security
Virtual AssistanceSystem AdministrationNetwork EngineeringGovernment Reporting ComplianceComputer Network - $35 hourly
- 0.0/5
- (0 jobs)
Hi, I’m an IT Specialist with 3 years of experience in system administration, cybersecurity, and network management. I’m skilled at optimizing IT systems, securing data, and resolving technical issues efficiently. Let’s connect to tackle your IT challenges and enhance your technology infrastructure.Information Security
ComplianceComputer Network - $53 hourly
- 0.0/5
- (0 jobs)
A motivated, committed and open-minded Web Development graduate, looking to secure a rewarding career in the Software Development sector and further develop my problem-solving skills and knowledge in a practical and fast-paced environment. My career goal is to assume a role which allows me to improve my technical and interpersonal skills.Information Security
Microsoft AccessMicrosoft Azure AdministrationMicrosoft 365 CopilotWeb DevelopmentDatabaseDatabase Management - $200 hourly
- 0.0/5
- (0 jobs)
Iam a skilled and results-driven IT in providing innovative technology solutions to businesses of all sizes. My expertise includes web development, software engineering and IT support. With a deep understanding of programming languages like Python, JavaScript, and Html, I am committed to solving complex technical challenges while keeping the end-user experience in mind. I am passionate about collaborating with clients to bring their visions to life and consistently exceed expectations. I am dedicated to delivering high-quality services with a focus on reliability, performance, and security. Let's work together to make a success!Information Security
Computing & NetworkingCompliance - $45 hourly
- 0.0/5
- (0 jobs)
Experienced Security Operations Center (SOC) Analyst skilled in incident analysis, incident response, and threat hunting. Proficient in network security with a strong background in penetration testing and digital forensics. Passionate about cyber security and its integral role in my daily work. Demonstrated success in leading vulnerability assessments and penetration tests (VAPTs) both independently and as part of a team. Thrive in web-based and Active Directory challenges in Capture The Flag (CTF) competitions. Security Analyst Trainer.Information Security
Cybersecurity ManagementCybersecurity MonitoringIncident ManagementDigital ForensicsSOC 2Penetration TestingDatabaseDatabase ManagementNetwork EngineeringComputing & NetworkingComplianceComputer NetworkGovernment Reporting ComplianceCyber Threat Intelligence - $41 hourly
- 0.0/5
- (0 jobs)
Professional Summary A highly skilled IT professional with over 10 years of experience in regional IT leadership, project management, data security, IT systems analysis, and database management. Proven track record in providing top-notch IT support to over 1200 users across 10 Countries (Kenya, Nigeria, Lesotho, Zimbabwe, Mozambique, Uganda, Cameroon, Cote d'Ivoire, DCR Congo & Eswatini). Expertise in infrastructure and network management, team leadership, end-user support, and SharePoint management. Possess strong technical skills in AI, cybersecurity, data analytics, and comprehensive IT support, with certifications in AI, ITIL, cybersecurity, CCNA and I'm a certified coach for high performance.Information Security
Customer OnboardingProject ManagementSophos Sophos UTMOKTAZendeskMicrosoft Active DirectoryZoho DeskMicrosoft SharePointMicrosoft SharePoint AdministrationNetwork EngineeringComputing & NetworkingComputer Network - $556 hourly
- 0.0/5
- (0 jobs)
I am a wed developer whose passionate with experience to build responsive and user-friendly websites. Skilled in JavaScript and am dedicated to solve problems with efficient codeInformation Security
Database ManagementComplianceDatabase - $100 hourly
- 0.0/5
- (0 jobs)
I am a motivated and adaptable Cybersecurity Professional and Network Engineer with a degree in Computer Technology. As a Cisco Certified Network Associate (CCNA), I have a strong technical foundation in networking and security, complemented by certifications from TryHackMe's SOC Analyst program. My expertise extends to ethical hacking, threat analysis, and incident response, reinforced by badges from IBM and Cisco. With excellent communication skills and a passion for continuous learning, I thrive in collaborative environments and quickly adapt to new challenges, ensuring I deliver impactful solutions in every project I undertake.Information Security
ComplianceComputing & NetworkingNetwork EngineeringComputer Network - $65 hourly
- 0.0/5
- (0 jobs)
Dedicated data analyst with a passion for turning raw data into actionable insights. Specialize in analyzing complex datasets to help businesses uncover trends and patterns for informed decision-making. Strong background in statistical analysis, data visualization, and database management. Excel at creating clear and concise reports that highlight key findings. Proficient in tools such as Excel, SQL, Python, and Tableau for efficient data processing and interpretation. Committed to continuous learning and staying updated with the latest industry trends. Aim to leverage data to drive strategic initiatives and contribute to the success of my organization.Information Security
ComplianceGraphComputer NetworkDatabaseComputing & NetworkingDatabase Management - $45 hourly
- 0.0/5
- (0 jobs)
I'm a Networking and Cybersecurity Specialist with over 5 years of experience in securing and optimizing network infrastructures for small and medium-sized businesses. Whether you need to protect sensitive data, enhance network performance, or implement robust security protocols, I can help. Skills: Network configuration and management (TCP/IP, DHCP, DNS), cybersecurity measures implementation, risk assessment, and mitigation strategies. Services: Comprehensive security assessments, network performance optimization, and continuous monitoring to prevent security incidents. Regular communication is important to me, so let's keep in touch.Information Security
Computer NetworkNetwork EngineeringComputing & Networking - $75 hourly
- 0.0/5
- (0 jobs)
I’m a developer experienced in building websites for small and medium-sized businesses. Whether you’re trying to win work, list your services, or create a new online store, I can help. Knows HTML and CSS3, PHP, jQuery, Wordpress, and SEO Full project management from start to finish Regular communication is important to me, so let’s keep in touch.Information Security
GraphGovernment Reporting ComplianceComplianceComputer NetworkNetwork EngineeringDatabase ManagementDatabaseComputing & Networking - $100 hourly
- 0.0/5
- (0 jobs)
>Software designer and developer >Programming > Database management system >Agricultural engineeringInformation Security
Government Reporting ComplianceComplianceDatabase ManagementDatabase - $60 hourly
- 0.0/5
- (0 jobs)
I'm a computer technician who can perform the the task related to computer perfectly and with excellence...Information Security
DatabaseDatabase ManagementComputer NetworkComputing & Networking Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.