Hire the best Information Security Analysts in Ohio
Check out Information Security Analysts in Ohio with the skills you need for your next job.
- $60 hourly
- 5.0/5
- (19 jobs)
Thank you for taking the time to look at my profile. I am an experienced Systems Administrator and Solution Architect. I have a strong background in cybersecurity completing my graduate work on the specifics of anonymization relating to cyber attacks. I have a constant desire to learn and continue to do so in multiple disciplines. I have diverse interests and I feel that positions me well for success in almost all scenarios. My career is driven by a pursuit of knowledge across various disciplines, creating a diverse skill set that is adaptable. Whether working with Microsoft 365 (including GCC High), Intune, Azure, Google Workspace, Jamf, or other communication and automation tools, I bring a wide variety of experience to each project. I pride myself on being easy to work with and a good communicator. I am a firm believer in empowering others to use technology to further their causes. Key Expertise: - Cybersecurity Measures and Protocols - Systems Architecture and Administration - Proficient with Microsoft 365, Google Workspace, and Shopify - Expertise in Automation and Systems Integration I am eager to bring my skills to new and ongoing projects. Let's connect and discover how I can help you succeed.Information Security
OKTACloud ArchitectureVirtual Desktop InfrastructureCloud ImplementationGoogle WorkspaceData MigrationInformation ArchitectureMicrosoft AzureAsset ManagementInformation Security Awareness - $150 hourly
- 5.0/5
- (38 jobs)
I specialize in Cybersecurity, threat mitigation (hacking cleanup and repair) and system administration on a enterprise scale, as well as full stack development. Complete, integrated and reliable solutions to the most challenging and unique business IT needs, no matter the complexity or difficulty. Fluent in PHP, HTML, JavaScript, Node, and several other programming languages. Experienced Network architect Cybersecurity preventative monitoring and protection, threat detection, and response Cloud Infrastructure management, consulting, and deployment Web & Database migration, management and repair I am your complete IT solutions provider, with over 5+ years of experience!Information Security
Security Assessment & TestingSystem AdministrationVulnerability AssessmentSecurity EngineeringCloud SecurityMalware RemovalCloud ManagementCloud ArchitectureSecurity InfrastructureIT ConsultationSystem HardeningDevOpsPHPWordPress - $325 hourly
- 5.0/5
- (1 job)
Driving innovative solutions for challenging IT & Compliance initiatives that support organizational objectives and prioritize productivity, cost-efficiency, and security. I am a highly accomplished strategic leader of IT, Security, and Compliance, driving business revenue and exceeding goals while solving critical challenges. I am a driven leader with a background of identifying emerging problems and executing strategies that powerfully drive revenue while building meaningful relationships. As a seasoned and savvy leader of critical client relationships and key projects, I bridge the gap between technology and business as a career advocate of intelligent change. I have deep leadership, communication, security, compliance, M&A, operational, and growth experience, with keen skills and instincts in a highly competitive field. As a collaborative, people-focused leader developing team members' highest potential, I have a demonstrated history ofInformation Security
Business ConsultingISO 27001SOC 2Information Security ConsultationAI ConsultingAI ComplianceGovernment Reporting ComplianceCompliance - $250 hourly
- 5.0/5
- (37 jobs)
I have provided HIPAA consulting services for the last 20 years and over that time served over 1,000 clients. Client experience includes work with covered entities including hospitals, physicians, other health providers, insurers, union health plans and county government agencies. Experience with business associates include software vendors, IT managed services providers, cloud computing vendors, mobile app developers, medical billing services, value-added resellers, third-party administrators and pharmaceutical marketing companies. Services include virtual Privacy/Security Officer, policy and procedure development, policy gap analysis, computer security risk analysis, technical vulnerability analysis, vendor audits, HIPAA training, business associate contracting and other HIPAA related services. Other related experience includes use of security frameworks including ISO 27001/27002, NIST and HITRUST as well as the PCI DSS. I have worked with other government regulations including 42 CFR Part 2, GxP, FERPA, IDEA, DEA Regulations for E-prescribing of controlled substances and state laws relating to medical privacy and data breach in over 20 states.Information Security
Company PolicySecurity AnalysisPCIInformation Security GovernanceProject Risk ManagementVulnerability AssessmentData PrivacyISO 27001HIPAARisk AssessmentGDPR - $150 hourly
- 5.0/5
- (289 jobs)
I am a cybersecurity professional with a Master's Degree in Cyber Operations and two years of work experience in cybersecurity research and development at a world-class R&D laboratory. In that job, I gained experience in network traffic analysis, malware analysis, and cryptography. For the past seven years, I have worked as a freelancer, providing content development, course creation, and consulting in cybersecurity and blockchain security. I specialize in development of technical content (blogs, whitepapers, case studies, and courseware) in the field of cybersecurity. I currently hold the Certified Ethical Hacker and Certified Blockchain Security Professional certifications.Information Security
Reverse EngineeringCryptocurrencyBlockchainCryptography - $30 hourly
- 5.0/5
- (9 jobs)
Hello! My name is Joseph. With a mix of tech know-how, a knack for comprehensive administrative & customer support, and detailed experience in cybersecurity, I believe I can bring a unique perspective to your team. Being a self-starter, I thrive in fast-paced environments and can swiftly learn new processes. I am well-versed in agile setups and take pride in my in-depth project management skills. Motivated and hardworking, I ensure my work is detailed and thorough. Please see my experience below for a detailed breakdown of my past experience, but to recap, in my recent position at Pattern Inc. as an IT Support Specialist (Tier 2) I managed all technical help requests for the factory and all 50+ employees, ensuring production stayed on schedule and proactively maintained an efficient work environment. At Digital Factory as a Network Analyst, I excelled in analyzing cyber threats and implementing effective solutions, showcasing my ability to navigate complex technical landscapes. My time as a IT Support Specialist at Everise equipped me with the skills to manage technical support for a variety of clients through Salesforce while delivering top-notch customer service. Additionally, my role as a Help Desk Support at Best Buy emphasized collaborative team environments and providing technical assistance. As a freelance Virtual Administrative Assistant, I've been the go-to person for project management, IT support, and even social media management. In addition to my administrative prowess, I have delved into the realm of cybersecurity through formal education, acquiring a well-rounded skill set. This unique combination of skills makes me an ideal fit for projects with multifaceted responsibilities. My ability to tailor my expertise to meet the specific needs of each client ensures that I can adeptly navigate and contribute to a wide range of projects. Furthermore, my background in IT support has honed my skills in client communication and support. I am exceptionally skilled in fostering positive client relations, drawing on my experience to address concerns and provide solutions effectively. This expertise positions me to seamlessly contribute to projects that require a strong client-focused approach, complementing my versatile skill set.Information Security
Cybersecurity ManagementNetwork EngineeringTech & ITComputing & NetworkingTechnical Project ManagementPythonSystem SecurityCSSMicrosoft WindowsKali LinuxProblem SolvingPenetration TestingLinux System AdministrationNetwork Security - $75 hourly
- 0.0/5
- (1 job)
Steven is a well versed and seasoned Security Engineer holding over 5 years of experience in leading Information Security companies. Steven has held the following roles within Information Security teams: -Security Analyst -Security Engineer / Architect -Security Consultant Steven has played a major role in planning and leading the implementation of SIEM and EDR detection and response capabilities at companies as large as IBM. Steven has demonstrated the ability to quickly pivot into new fields of practice including most recently DevSecOps and SRE work to support the secure development of CI/CD pipelines, Docker and Kubernetes architecture and secure image factories. Steven currently works as a Security Engineer focusing on DevSecOps and Detection and Response capabilities in a lead role. Happy to help companies achieve goals from Security Architecture planning to SOC2 and GRC consulting!Information Security
DockerCloud Security FrameworkComputing & NetworkingComputer NetworkCloud ComputingLinuxCloud SecurityTrainingNetwork SecurityIncident Response PlanNessus - $90 hourly
- 0.0/5
- (1 job)
As a cybersecurity expert with a decade of software development experience, I specialize in designing robust security solutions that adhere to CISA frameworks and other compliance regulations. My expertise spans a wide range of areas including network security, risk assessments, compliance frameworks, SIEM/XDR/MDR setup and operations, vulnerability assessment, penetration testing, incident response planning, forensic investigation, access control, cloud security, and application security. I have partnerships to provide a full range of security tools including SentinelOne, Oracle, Blumira, Wazuh, Cloudflare, Zscaler, Auvik, Crowdstrike, DNSFilter, Proofpoint, Acronis, and many more. Holding certifications in PenTest+ and CySA+, my skills extend to penetration testing and cybersecurity analysis, tailored to both SMBs and enterprise-scale operations. I implement security solutions that align with cybersecurity compliance frameworks, enhancing data protection and system integrity across business scales. My background in security solution architecture enables me to construct detailed security frameworks that integrate seamlessly into existing business processes, thus fortifying defenses against current and emerging cyber threats. I also hold a Master’s degree in Cybersecurity and Information Assurance, which equips me with the latest insights into risk management and cybersecurity strategies. With hands-on experience in XDR/MDR services, I provide managed detection and response capabilities to ensure vigilant monitoring and rapid response to security incidents. My commitment to continuous professional development in the rapidly evolving field of cybersecurity positions me to offer state-of-the-art solutions that protect critical digital assets and support organizational goals with precision and integrity.Information Security
Security FrameworkCloud Security FrameworkGovernance, Risk & Compliance SoftwareRisk AssessmentOracle CloudNIST Cybersecurity FrameworkSecurity TestingDatabase SecurityCybersecurity MonitoringCybersecurity ManagementSecurity EngineeringCloud SecuritySecurity Assessment & TestingDevOps Engineering - $40 hourly
- 0.0/5
- (0 jobs)
I’m an IT Specialist that’s well rounded in Networking and Coding. I can adapt to any IT related field. If there’s a task at hand I won’t stop until I’ve completed that task and exceeded expectations. EXPERIENCE Routing Protocols (OSPF, BGP, etc.) Network Devices (Cisco, Juniper, etc.) Network Security (Firewalls, VPNs, etc.) Network Troubleshooting Methodologies Network Monitoring Tools (Wireshark, PRTG, etc.) Cloud Network Technologies (AWS, Azure, etc.) (Optional) Highly motivated and results-oriented IT professional with 2 years of experience in network design, implementation, and maintenance. Proven ability to troubleshoot complex network issues, optimize performance, and ensure network security. Skilled in various network technologies and possesses a strong understanding of networking principles. Eager to contribute expertise to a fast-paced environment and play a key role in maintaining a reliable and efficient network infrastructure.Information Security
OracleCiscoWindows ServerSoftware DevelopmentSoftware SpecificationsDesktop & Laptop SupportDatabase ManagementNetwork EngineeringComputing & NetworkingComputer Network - $25 hourly
- 5.0/5
- (1 job)
Hello! My name is Orest Sobiecki, and I am a passionate Cyber Security student at the University of Cincinnati, where I am dedicated to mastering the art and science of protecting digital assets. With a perfect GPA of 4.0 and a consistent presence on the Dean's List, I strive for excellence in my academic pursuits while developing practical skills that I can apply in the real world. Qualifications: Education: Pursuing a Bachelor of Science in Cyber Security at the University of Cincinnati. GPA: 4.0 | Dean's List. Certifications: Certified Ethical Hacker with hands-on experience in vulnerability assessment and penetration testing. Work Experience: Digital Forensics Specialist: Worked for a digital forensics company, where I conducted in-depth investigations into cyber incidents, collaborated with law enforcement, and contributed to the resolution of security breaches. Cyber Security Expert: Applied security measures to protect sensitive information and reduce vulnerabilities, while providing training on best practices in cybersecurity. Expertise: Ethical Hacking: Skilled in identifying potential security threats and vulnerabilities within systems to prevent unauthorized access. Digital Forensics: Experienced in analyzing digital evidence and providing expert insights in legal contexts. Incident Response: Proficient in planning and executing effective response strategies for a variety of cybersecurity incidents. I am passionate about leveraging my skills and knowledge to help organizations strengthen their security posture and protect against evolving cyber threats. I continuously seek opportunities to grow in the field, stay updated on the latest technologies, and contribute to meaningful projects that make a difference. Thank you for taking the time to get to know me! I look forward to connecting and collaborating with like-minded professionals in the cyber security community.Information Security
Digital ForensicsEthical Hacking - $75 hourly
- 0.0/5
- (0 jobs)
Hi, I’m Tessa your friendly neighborhood tech nerd. I specialize in turning “Have you tried turning it off and on again?” into actual solutions. Whether it’s building sleek websites, migrating to the cloud without the storm, or explaining tech jargon in plain English, I’m here to make your tech woes disappear (or at least less painful). With my proficiency in various programming languages and frameworks, I can tackle complex projects with ease. My expertise extends to: AI/Machine Learning Website Development ( Front-end and Back-end Development) Application Development Intranet/ERP Software Cloud Services Network Design Phone Systems Managed Security Penetration TestingInformation Security
Cybersecurity ManagementCloud ApplicationWebsiteCAD SoftwareGovernment Reporting ComplianceComplianceDevOpsNetwork EngineeringComputing & NetworkingComputer Network - $50 hourly
- 0.0/5
- (0 jobs)
I bring over 15 years of dynamic leadership experience to her role as Field Service Manager at TechServe Solutions. Known for her exceptional ability to bridge the gap between technical operations and customer satisfaction, Sarah leads a team of 25 field service technicians across the Western region. With a background in mechanical engineering and a master's degree in operations management, I have transformed TechServe's field operations through innovative deployment strategies and predictive maintenance protocols. Under her leadership, first-time fix rates have improved by 35%, and customer satisfaction scores have consistently exceeded 92%. My expertise spans multiple industries, including manufacturing, telecommunications, and medical device servicing. She has successfully managed complex service portfolios valued at over $50 million annually while maintaining an impressive 99.8% service level agreement compliance rate. Her strategic approach to workforce management has resulted in a 40% reduction in response times and significant improvements in team efficiency. As a certified Project Management Professional (PMP) and Six Sigma Black Belt, I combine technical acumen with strong business insight. I have pioneered several initiatives, including a mobile-first digital documentation system and an AI-powered dispatch optimization program, which have become industry benchmarks for service excellence. I am particularly passionate about developing the next generation of field service professionals. I have established a comprehensive mentorship program and regularly conduct workshops on emerging technologies and best practices in field service management. Her commitment to professional development has resulted in an 85% internal promotion rate within my team. Beyond my operational responsibilities, I am an active Field Service Professionals Association member and frequently speak at industry conferences on topics such as digital transformation in field services, remote assistance technologies, and building high-performance service teams. She has been recognized with multiple awards, including the Field Service Innovation Award (2024) and the Leadership Excellence in Technical Services Award. My management philosophy centers on three core principles: empowering technicians through technology, maintaining unwavering customer focus, and fostering continuous improvement. When not leading her team, she volunteers with local STEM education initiatives and mentors aspiring women in technical fields. Under my continued leadership, NCR/Aloha Solutions is poised to expand its service capabilities and embrace emerging technologies while maintaining its reputation for exceptional service delivery and technical excellence.Information Security
System AdministrationNetwork EngineeringGraphComputing & NetworkingComputer NetworkGovernment Reporting ComplianceCompliance - $150 hourly
- 0.0/5
- (0 jobs)
As a Manager of Cloud Solutions at Pax8, I led a team of cloud engineers who provided end-to-end solutions for customers using Azure Infrastructure as a Service (IaaS). I collaborated with sales, marketing, and technical teams to design, implement, and support cloud solutions that met the customers' needs and expectations. I also contributed to the development and improvement of Pax8's cloud offerings, processes, and best practices. With over ten years of experience in cloud engineering, and over 25 years experience in Information Technology, I have developed strong skills in Azure IaaS, networking technology, and cloud infrastructure. I am passionate about delivering innovative and reliable cloud solutions that enable customers to achieve their business goals and transform their IT operations. I am always eager to learn new technologies and trends in the cloud domain, and to share my knowledge and expertise with others. I value teamwork, customer satisfaction, and continuous improvement as the core competencies of my career.Information Security
Microsoft Windows PowerShellSonicWallOffice 365Google Workspace AdministrationVMware ESX ServerMicrosoft Hyper-V ServerMicrosoft Active DirectoryCloud ArchitectureCloud MigrationMicrosoft Azure AdministrationComputer NetworkComputing & NetworkingNetwork EngineeringSystem Administration - $95 hourly
- 0.0/5
- (0 jobs)
I specialize in Cloud, Network, and Security solutions, with a focus on protecting your data and automating routine operations. I excel at delivering cost savings through optimized resource management and leveraging the right technologies. My expertise includes managed services for applications, desktops, and servers. I can help you stay focused on your core goals and skills, because I can ensure efficient, secure, and streamlined IT operations.Information Security
AutomationAPI IntegrationApplication Lifecycle ManagementApplication IntegrationVulnerability AssessmentSecurity EngineeringGovernment Reporting ComplianceComplianceNetwork EngineeringComputing & NetworkingComputer NetworkProblem SolvingDevOpsArchitecture - $90 hourly
- 0.0/5
- (0 jobs)
Data is Your Most Valuable Asset. Are You Actually Protecting It? I specialize in Microsoft Purview Security & Compliance, helping organizations protect sensitive data, reduce insider risk, and stay ahead of evolving compliance mandates. Whether it’s securing Microsoft 365 Copilot from exposing confidential data, tuning DLP policies to prevent accidental leaks, or building a scalable insider risk program, I make sure your security strategy works in the real world—not just on paper. What I Do Best: -Data Loss Prevention (DLP): Prevent sensitive data from walking out the door—intentionally or not. -Insider Risk Management: Identify risky behavior before it becomes a security breach. -Microsoft Purview Strategy: Align compliance, governance, and security into one seamless framework. -AI & Data Protection: Ensure Microsoft 365 Copilot and AI tools don’t introduce new security gaps. How I Help: I work with CISOs, security teams, and IT leaders to build Microsoft security strategies that are practical, scalable, and actually enforceable. If you’re still using out-of-the-box DLP policies and hoping for the best—let’s talk. If you’re responsible for securing sensitive data but keep running into gaps, false positives, or security policies that users find “annoying”—I can help.Information Security
Compliance - $200 hourly
- 0.0/5
- (0 jobs)
I am a cybersecurity solutions expert with 10 years of experience designing, managing, and implementing security strategies for businesses of all sizes—from solo entrepreneurs to enterprise-scale operations. I specialize in tailoring solutions to meet each client’s unique needs while ensuring compliance with industry best practices and the latest security standards. My expertise includes: - Endpoint & network monitoring - Zero-trust architecture - Compliance, auditing & reporting - Regulatory compliance & audit preparation - Application Security Review I also collaborate with Managed Service Providers (MSPs) to deliver premium, white-glove cybersecurity services to their clients. Don’t settle for off-the-shelf security solutions. As an expert CISO, I’ll help you navigate the complexities of cybersecurity and implement the right solution for your business. Let’s build a security strategy that truly fits your needs. Beyond Security Today's cloud environment and cloud service offering is often complex and confusing. Let me provide guidance on any potential cloud service that you maybe evaluating.Information Security
Architectural DesignArchitectureComputer NetworkGovernment Reporting ComplianceNetwork EngineeringProblem SolvingDevOpsComputing & NetworkingCompliance - $75 hourly
- 0.0/5
- (0 jobs)
Summary Highly experienced IT leader with over 15 years of experience spanning project management, program management, and executive leadership roles such as Director of IT and CIO. Skilled in agile, iterative, kanban, and scrum methodologies, with a proven track record of driving technological innovation, leading large-scale projects, and aligning IT strategies with business objectives. Adept at stakeholder engagement, risk management, and fostering crossfunctional collaboration to achieve organizational goals. Experience * Strategic Planning and Execution * Stakeholder Engagement and Communication * Risk Management and Mitigation * Financial Oversight and Budgeting * Data Analysis and Decision Making * MS Office Suite (Project, Word, Excel, PowerPoint, Visio, Outlook, SharePoint)Information Security
ComplianceProblem Solving - $65 hourly
- 0.0/5
- (0 jobs)
As a cyber and information security expert with multiple decades of experience, I am excited to put my knowledge and skills to work for you. My specialties include crafting thoroughly researched communications, offering detailed analysis of emerging risks or technologies, and advising on compliance initiatives and requirements.Information Security
Risk ManagementRisk AssessmentInformation Security Threat MitigationInformation Technology StrategyInformation Security AuditInformation Security GovernanceCMMCPCI DSSHIPAANIST Cybersecurity FrameworkCybersecurity MonitoringCybersecurity ManagementCyber Threat IntelligenceCompliance - $80 hourly
- 0.0/5
- (0 jobs)
I'm a IT manager with over 25 years experience both managing and implementing IT projects. These include software design, networking infrastructure, remote access, website deployment and Internet security projects. I have a strong background in helping businesses manage and implement their IT goals and requirements.Information Security
Microsoft Dynamics GPVPNDesktop & Laptop SupportCitrixWeb Application FirewallFirewallServer AdministrationServer & Virtualization SoftwareOpenVPNRemote IT ManagementNetwork EngineeringComputer NetworkSystem AdministrationComputing & Networking - $66 hourly
- 0.0/5
- (0 jobs)
I am a Network and Systems Engineer experienced in Designing and Configuring Networks for Home offices to Medium sized companies. Whether you need a Network refresh or want to integrate High Tech implementations, I can help. • Network and Systems Engineering • Equipment consulting, configuring and instillation. • Systems Consulting from Cloud to On-prem • Project managementInformation Security
System AdministrationNetwork EngineeringComputing & NetworkingComputer Network - $60 hourly
- 0.0/5
- (0 jobs)
> O365 Administration / Management > MS Exchange Management / Support > Network Management > Mobile Device Management > Server / Workstation Administration > Active Directory + Federation > Group Policy Management > PowerShell Automation / Scripting > HIPAA Compliance > Fileshare / SharePoint ManagementInformation Security
Microsoft Exchange OnlineMicrosoft Exchange ServerCisco MerakiSonicWallMicrosoft Windows PowerShellAutomationGroup PolicyServer VirtualizationServer AdministrationOffice 365Microsoft Active DirectoryActive Directory Federation ServicesSystem AdministrationNetwork Engineering - $55 hourly
- 0.0/5
- (0 jobs)
Cybersecurity enthusiast and guru, professionally trained and with extensive knowledge and understanding in identity-based protection and designs, access controls and conditional controls, and applying these concepts to firewall access rules and network security design concepts. I have exhaustive, in-depth experience also with security configurations for endpoints including Windows, MacOS, iOS, and Android using Apple Business Manager and or Microsoft Intune or Meraki MDMs, as well as Microsoft native domain toolings such as Group Policy, RADIUS, and much more. Certifications include: — CompTIA Network+ — CompTIA Security+ — CompTIA CySA+ — CompTIA CSAP (Bundled)Information Security
FirewallNetwork SecurityNetwork AnalysisNetwork AdministrationCloud SecuritySecurity EngineeringSecurity AnalysisThreat DetectionCyber Threat IntelligenceCybersecurity ManagementSystem AdministrationNetwork EngineeringComputing & Networking - $56 hourly
- 0.0/5
- (0 jobs)
Seasoned professional working with data and risk management. Intermediate to advanced skills in SQL, MS Access, MS Excel, IdentityIQ, MS PowerPoint, information access management, information security, compliance. Strong ability to clean and manipulate data, driving conclusions which may not otherwise be seen. Experience in project management, requirements analysis/writing, writing test plans, and user acceptance testing. Most familiar with agile methodologies. Strong leadership skills and the ability to mentor and train. Proficient in writing technical documentation, executive reports, and multi-level presentations.Information Security
Project ManagementMicrosoft AccessSQL ProgrammingTechnical DocumentationComplianceMicrosoft Access ProgrammingData CleaningData AnalysisMicrosoft Excel - $50 hourly
- 0.0/5
- (0 jobs)
We excel in Market Research and Analysis, global data collection, and global market research. With expertise in CATI Market Research, we add a personal touch to data collection. Our Market Research Surveys provide valuable insights into consumer behaviour and market dynamics. Backed by Top Survey Programming Software and Market Data Analysis, we’re dedicated to delivering market research excellence. Discover our solutions, including Conjoint Analysis, MaxDiff Analysis, data validation, and more.Information Security
jQueryXMLConfirmitSQLDashboardJavaScriptPythonOnline Market ResearchAnalytics DashboardQualtricsSurvey Data AnalysisSurvey SoftwareSurvey DesignData Analytics - $25 hourly
- 0.0/5
- (0 jobs)
PERSONAL STATEMENT: Experienced student looking to utilize skills in the Cyber Security field. Excellent with electronic documentation, teamwork, analytical thinking, and troubleshooting.Information Security
Computing & Networking - $35 hourly
- 0.0/5
- (0 jobs)
An experienced IT professional specializing in cloud-based and hybrid environments, I focus on optimizing endpoint management, automating system updates, and streamlining device provisioning. Leveraging tools such as Microsoft Intune, JAMF, and Autopilot, I develop comprehensive strategies for compliance, patching, security, and enterprise licensing. My background includes designing custom solutions, managing server and virtual infrastructures, and collaborating across teams to enhance overall efficiency. I am committed to continuous improvement and pride myself on mentoring colleagues, fostering innovation, and delivering impactful technology solutions that align with organizational goals.Information Security
Computer NetworkComplianceSystem Administration - $28 hourly
- 0.0/5
- (0 jobs)
Hi, I’m Tyler Davis, a passionate cybersecurity and GRC specialist with a strong foundation in risk analysis, governance, and compliance. I’m currently pursuing my bachelor’s degree in cybersecurity and computer science at Ashland University, where I’ve honed my technical expertise in information security, system analysis, and machine learning. I thrive at the intersection of data analysis and security operations, with a proven ability to translate complex technical challenges into actionable solutions. My recent projects highlight my hands-on experience, including building a phishing detection model using machine learning that achieved a 91.28% accuracy rate and conducting research on ballot-marking device (BMD) vulnerabilities, where I proposed cryptographic solutions to improve system security.Information Security
Data PrivacyIncident Response PlanCybersecurity MonitoringNetwork MonitoringVulnerability AssessmentWindows 11 AdministrationLinuxMachine LearningData AnalysisGovernance, Risk Management & Compliance Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.