Hire the best Information Security Analysts in Oregon
Check out Information Security Analysts in Oregon with the skills you need for your next job.
- $25 hourly
- 5.0/5
- (7 jobs)
I hope to become one of the many leaders in the field of cybersecurity and stand at the forefront of the innovation to come. My ability to overcome struggles and unforeseeable circumstances is reason enough for me to be a stalwart example of what is possible with any opportunity.Information SecuritySearch EngineDatabaseDesign ValidationMicrosoft WindowsZendeskData EntryMicrosoft OfficeEmail SupportOnline Chat SupportImage RecognitionCustomer SupportSaaS - $65 hourly
- 5.0/5
- (6 jobs)
I am an experienced information security consultant and systems administrator and offer premium services. I have more than 6 years of experience in systems administrations including: - writing ansible roles and ansible playbooks - setting up mail servers - setting up cloud infrastructure e.g. AWS and GCP - writing scripts in python and bash - setting up and running docker applications Additionally, I have more than 4 years in information security including: - securing linux servers - installing and maintaining SIEM e.g. Wazuh - securing web serversInformation SecurityBash ProgrammingComplianceDocker ComposeEmail SoftwareCybersecurity ToolDockerLinux System AdministrationComputer ScienceAnsibleCompTIABashLinuxNessusSystem SecurityPython - $100 hourly
- 0.0/5
- (0 jobs)
With over two decades in the IT industry, I bring extensive expertise in cybersecurity, network administration, and system optimization. I hold a Bachelor’s degree in Cybersecurity and am currently pursuing a Master’s, which ensures I stay updated on the latest industry advancements and best practices. My technical skills cover a wide range of tools and platforms, including Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), Security Information and Event Management (SIEM) solutions like Wazuh, and virtual environments such as VMware and Proxmox. I am also well-versed in managing and securing Google Workspace and Microsoft 365, enabling secure and streamlined collaboration in cloud-based environments. n my recent roles, I have deployed comprehensive security protocols, including VPN and DHCP configurations, advanced threat detection, and robust firewall management, to safeguard network infrastructure. As a network and system administrator, I bring strong experience in conducting penetration tests and vulnerability assessments, as well as managing Windows and Linux servers and configuring DNS and Active Directory. My proactive approach also includes end-user training to foster a security-conscious culture within the organization. I am excited to bring my technical expertise and proactive approach to support your project goals. With my background in strategic cybersecurity management and hands-on troubleshooting, I am well-prepared to deliver secure, efficient solutions tailored to your needs. I look forward to the opportunity to collaborate on this project and contribute to the resilience and security of your IT environment. Thank you for considering my proposal.Information SecurityNetwork AdministrationCybersecurity MonitoringFirewallPenetration TestingCybersecurity ManagementComplianceSystem AdministrationNetwork EngineeringComputing & NetworkingComputer Network - $50 hourly
- 0.0/5
- (0 jobs)
Senior IT professional with over 20 years' experience working in Enterprise level environments. High level understanding of complex systems. High security standards with the goal of protecting the integrity of corporate and personal data.Information SecurityComputing & NetworkingComputer NetworkGovernment Reporting ComplianceComplianceDatabase ManagementMicrosoft AzureMicrosoft OutlookMicrosoft TeamsMicrosoft Exchange OnlineMicrosoft Exchange ServerMicrosoft Active DirectoryMicrosoft Server - $30 hourly
- 0.0/5
- (0 jobs)
Experienced IT Technician with 3+ years in the IT industry. Having experience with Cisco networking and UNIX/WIN CLI, IT Infrastructure and Standards. Windows OS (Server and Desktop). Basic CySA Knowledge and Drive for the Cybersecurity Field. Experience in Telecommunications, Electrical Engineering basics.Information SecurityDatabaseNetwork EngineeringComputing & NetworkingComputer NetworkCompliance - $100 hourly
- 0.0/5
- (0 jobs)
Network and Security Engineer and Architect for Enterprise and SMB markets. I’ve seen many trends come and go. I’ve worked on many different manufacturer solutions. From basic administration to network management, from point solutions to international hybridized architecture.Information SecurityArchitectureProblem SolvingArchitectural DesignComputing & NetworkingNetwork EngineeringComputer Network - $999 hourly
- 0.0/5
- (0 jobs)
Making this so I can the site. I am not looking for work. Do not reach out to me. Trying to find a specific post.Information SecurityComputer NetworkGraphCompliance - $50 hourly
- 0.0/5
- (0 jobs)
Hello I'm MARTINEZ A security specialist and a penetration tester I can test the below vulnerability and give you a report about your current situation and I can recover your hacked social media account. You can contact me for a free consultation, website and server health checkup, and explore if we'd be a good fit to work together. **I am a cryptocurrency analyst and also help people to move in the right direction to make a lot of money** WHAT ARE YOU SEEKING?? We are greater than others in hacking professionalism. Lets help you with your hacking needs. in the following areas such as *Tracking and tracing of stolen bitcoin wallet *Tracking and tracing of my stolen car *Recovery of stolen bitcoin *Recover of any stolen cryptocurrency *Recover any products system *Recovery of any hacked email *Erasing of criminal records, * Changing of high school or university grades, * Hacking of websites and portals, * Hacking of CCTV cameras, * Hacking of Facebook *Hacking of YouTube *Hacking of any email account *Hacking and recovery WhatsApp accounts *Hacking of any kind of social media’s * Tracing the signals of hackers bugging you, * Hacking of Iphones of various brands, *Addition and removal of information on a data baseInformation SecurityInformation AnalysisData AnalysisEthical HackingVirus RemovalRecovery TestingData ScienceData RecoveryAnalytical PresentationPenetration Testing - $35 hourly
- 0.0/5
- (0 jobs)
A decade of advanced technical support experience with Apple, and a passion for green energy and improving our planet 1 day at a time.Information SecurityDirectoryComputerOnline Chat SupportMacBookMicrosoft Exchange ServerComputing & NetworkingMicrosoft Active DirectoryComputer NetworkTroubleshooting - $40 hourly
- 0.0/5
- (1 job)
I am an ambitious, self-starting cyber threat intelligence analyst with 6+ years identifying, analyzing, and reporting advanced persistent threats (APT) and malicious cyber actors (MCA) techniques, tactics, and procedures (TTP). * Led a team of 10+ analysts on a campaign against an APT, culminating in 15 indictments by the DOJ, several accounts sanctioned, and a massive slowdown of cyber attacks from the threat group * Authored 20+ reports, mapping TTPs to the MITRE ATT&CK framework for the intelligence community * Designed training materials, cheat sheets, and led in-person classes to onboard new analysts resulting in a 75% decrease in training time (12 to 3 months) * Built Generative AI applications and machine learning algorithms in Python to greatly increase the speed of triaging events - Ask me to analyze your businesses security posture - Implement GenAI into your workflows - Create documentation or training - Vulnerability analysis, pen-testing, general cybersecurity consultingInformation SecurityNetwork EngineeringDatabase ManagementComputing & NetworkingComputer NetworkPenetration TestingRisk AnalysisThreat DetectionCybersecurity MonitoringCyber Threat IntelligenceSecurity AnalysisPython Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.