Hire the best Information Security Analysts in Oregon

Check out Information Security Analysts in Oregon with the skills you need for your next job.
  • $25 hourly
    I hope to become one of the many leaders in the field of cybersecurity and stand at the forefront of the innovation to come. My ability to overcome struggles and unforeseeable circumstances is reason enough for me to be a stalwart example of what is possible with any opportunity.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Search Engine
    Database
    Design Validation
    Microsoft Windows
    Zendesk
    Data Entry
    Microsoft Office
    Email Support
    Online Chat Support
    Image Recognition
    Customer Support
    SaaS
  • $65 hourly
    I am an experienced information security consultant and systems administrator and offer premium services. I have more than 6 years of experience in systems administrations including: - writing ansible roles and ansible playbooks - setting up mail servers - setting up cloud infrastructure e.g. AWS and GCP - writing scripts in python and bash - setting up and running docker applications Additionally, I have more than 4 years in information security including: - securing linux servers - installing and maintaining SIEM e.g. Wazuh - securing web servers
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Bash Programming
    Compliance
    Docker Compose
    Email Software
    Cybersecurity Tool
    Docker
    Linux System Administration
    Computer Science
    Ansible
    CompTIA
    Bash
    Linux
    Nessus
    System Security
    Python
  • $100 hourly
    With over two decades in the IT industry, I bring extensive expertise in cybersecurity, network administration, and system optimization. I hold a Bachelor’s degree in Cybersecurity and am currently pursuing a Master’s, which ensures I stay updated on the latest industry advancements and best practices. My technical skills cover a wide range of tools and platforms, including Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), Security Information and Event Management (SIEM) solutions like Wazuh, and virtual environments such as VMware and Proxmox. I am also well-versed in managing and securing Google Workspace and Microsoft 365, enabling secure and streamlined collaboration in cloud-based environments. n my recent roles, I have deployed comprehensive security protocols, including VPN and DHCP configurations, advanced threat detection, and robust firewall management, to safeguard network infrastructure. As a network and system administrator, I bring strong experience in conducting penetration tests and vulnerability assessments, as well as managing Windows and Linux servers and configuring DNS and Active Directory. My proactive approach also includes end-user training to foster a security-conscious culture within the organization. I am excited to bring my technical expertise and proactive approach to support your project goals. With my background in strategic cybersecurity management and hands-on troubleshooting, I am well-prepared to deliver secure, efficient solutions tailored to your needs. I look forward to the opportunity to collaborate on this project and contribute to the resilience and security of your IT environment. Thank you for considering my proposal.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Network Administration
    Cybersecurity Monitoring
    Firewall
    Penetration Testing
    Cybersecurity Management
    Compliance
    System Administration
    Network Engineering
    Computing & Networking
    Computer Network
  • $50 hourly
    Senior IT professional with over 20 years' experience working in Enterprise level environments. High level understanding of complex systems. High security standards with the goal of protecting the integrity of corporate and personal data.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Computing & Networking
    Computer Network
    Government Reporting Compliance
    Compliance
    Database Management
    Microsoft Azure
    Microsoft Outlook
    Microsoft Teams
    Microsoft Exchange Online
    Microsoft Exchange Server
    Microsoft Active Directory
    Microsoft Server
  • $30 hourly
    Experienced IT Technician with 3+ years in the IT industry. Having experience with Cisco networking and UNIX/WIN CLI, IT Infrastructure and Standards. Windows OS (Server and Desktop). Basic CySA Knowledge and Drive for the Cybersecurity Field. Experience in Telecommunications, Electrical Engineering basics.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Database
    Network Engineering
    Computing & Networking
    Computer Network
    Compliance
  • $100 hourly
    Network and Security Engineer and Architect for Enterprise and SMB markets. I’ve seen many trends come and go. I’ve worked on many different manufacturer solutions. From basic administration to network management, from point solutions to international hybridized architecture.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Architecture
    Problem Solving
    Architectural Design
    Computing & Networking
    Network Engineering
    Computer Network
  • $999 hourly
    Making this so I can the site. I am not looking for work. Do not reach out to me. Trying to find a specific post.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Computer Network
    Graph
    Compliance
  • $50 hourly
    Hello I'm MARTINEZ A security specialist and a penetration tester I can test the below vulnerability and give you a report about your current situation and I can recover your hacked social media account. You can contact me for a free consultation, website and server health checkup, and explore if we'd be a good fit to work together. **I am a cryptocurrency analyst and also help people to move in the right direction to make a lot of money** WHAT ARE YOU SEEKING?? We are greater than others in hacking professionalism. Lets help you with your hacking needs. in the following areas such as *Tracking and tracing of stolen bitcoin wallet *Tracking and tracing of my stolen car *Recovery of stolen bitcoin *Recover of any stolen cryptocurrency *Recover any products system *Recovery of any hacked email *Erasing of criminal records, * Changing of high school or university grades, * Hacking of websites and portals, * Hacking of CCTV cameras, * Hacking of Facebook *Hacking of YouTube *Hacking of any email account *Hacking and recovery WhatsApp accounts *Hacking of any kind of social media’s * Tracing the signals of hackers bugging you, * Hacking of Iphones of various brands, *Addition and removal of information on a data base
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Information Analysis
    Data Analysis
    Ethical Hacking
    Virus Removal
    Recovery Testing
    Data Science
    Data Recovery
    Analytical Presentation
    Penetration Testing
  • $35 hourly
    A decade of advanced technical support experience with Apple, and a passion for green energy and improving our planet 1 day at a time.
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Directory
    Computer
    Online Chat Support
    MacBook
    Microsoft Exchange Server
    Computing & Networking
    Microsoft Active Directory
    Computer Network
    Troubleshooting
  • $40 hourly
    I am an ambitious, self-starting cyber threat intelligence analyst with 6+ years identifying, analyzing, and reporting advanced persistent threats (APT) and malicious cyber actors (MCA) techniques, tactics, and procedures (TTP). * Led a team of 10+ analysts on a campaign against an APT, culminating in 15 indictments by the DOJ, several accounts sanctioned, and a massive slowdown of cyber attacks from the threat group * Authored 20+ reports, mapping TTPs to the MITRE ATT&CK framework for the intelligence community * Designed training materials, cheat sheets, and led in-person classes to onboard new analysts resulting in a 75% decrease in training time (12 to 3 months) * Built Generative AI applications and machine learning algorithms in Python to greatly increase the speed of triaging events - Ask me to analyze your businesses security posture - Implement GenAI into your workflows - Create documentation or training - Vulnerability analysis, pen-testing, general cybersecurity consulting
    vsuc_fltilesrefresh_TrophyIcon Information Security
    Network Engineering
    Database Management
    Computing & Networking
    Computer Network
    Penetration Testing
    Risk Analysis
    Threat Detection
    Cybersecurity Monitoring
    Cyber Threat Intelligence
    Security Analysis
    Python
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses