Hire the best Information Security Analysts in Pennsylvania
Check out Information Security Analysts in Pennsylvania with the skills you need for your next job.
- $50 hourly
- 5.0/5
- (47 jobs)
🎓 The Pennsylvania State University Bachelor of Science, Information Sciences and Technology Hi there! I’m Michael, a seasoned technology professional with over a decade of experience in the industry. Having honed my skills through real-world challenges, I bring a wealth of knowledge to the table. Whether it’s troubleshooting existing solutions, project management, system architecture, or ongoing maintenance, I thrive on solving complex problems. ⭐ Here are some examples of software I am familiar with ⭐ ✅ Apache | Nginx | LiteSpeed | MySQL | PhpMyAdmin | CWP | WHM | cPanel ✅ Apple Business Manager | JAMF ✅ Google Workspace | Microsoft 365 ✅ Home Assistant ✅ Linux | macOS | iOS | Windows XP-11 | Windows Server 2008-2025 | TrueNAS ✅ NGINX Proxy Manager ✅ PfSense | Ubiquiti | Brocade | Smoothwall | Aerohive | OpenVPN ✅ UniFi Protect, ViMonitor Security Systems ✅ WordPress ✅ XCP-NG | Xen Orchestra ⭐ Why you should choose me over other freelancers ⭐ ✅ I am a proud alumnus of Penn State, where I cultivated a passion for innovation and collaboration. My journey has led me to work on diverse projects, from cutting-edge startups to established enterprises. ✅ Client Reviews: My reviews speak for themselves. I work hard for every client to ensure they are always satisfied with the results. ✅ Responsive: I am always quick to respond, even on weekends! ✅ Communication: Clear, concise, and client-focused. ✅ Flexible: I can work flexible hours or even assist with emergency ✅ Over-delivering: this is core to my work as a freelancer. My focus is on giving more than what I expect to receive. 🏅 Reviews and feedback from clients 🏅 The client reviews below (also in my work history section) show the quality of work and value that you can expect. ⭐⭐⭐⭐⭐"Micheal is an extremely knowledgeable professional. His attention to detail, responsiveness and clarity of communications are at the highest level. He is a master of suggesting a solution when one does not seem to be there. Truly one of the best." ⭐⭐⭐⭐⭐ "Michael was excellent, super quick and efficient. He also recommended things that I was unaware of and am very appreciative of. I will definitely be hiring him again in the future. Thanks again." ⭐⭐⭐⭐⭐ "Very patient and helpful. Everything about the backend of GSuite and Domains is baffling to me. Michael did a very thorough migration, review, editing and updating of my entire account. He was prompt and asked questions instead of assuming details (HUGE+ to me). I will be happy to recommend him to anyone and will seek him out for future projects in this field." Let’s connect and discuss how I can contribute to your next project! 🚀Information SecuritycPanelUbiquitiPfSenseGoogle WorkspaceWordPressCitrix HypervisorLinux System AdministrationCloud ComputingGoogle Cloud PlatformWindows Server - $75 hourly
- 4.9/5
- (207 jobs)
☑️ Upwork Expert-Vetted 🌟 | 100% Job Success Rate ✅ | 10,000+ hours 💻 across 200+ projects 🚀 Currently collaborating with Microsoft’s dev and engineering teams 🛠️ as a freelance Technical Lead on Copilot, Intune, and Defender for Endpoint. I get early access to features 📅 and bug fixes 🐛, working 3-4 cycles ahead of public release. This insider view flows directly into my client projects. With 16+ years in the industry 📈 and $4M+ in projects delivered 🌐, I’m focused on solutions that are secure 🔒, compliant 📜, and effective. My hands-on role with Microsoft keeps me at the forefront, ready to deliver enterprise-grade results. 📞 Let’s set up a free 30-minute consultation 💬 to discuss📅 You could hire someone else for a lower rate who takes 5x as long to do the job right. You could also hire me, sit back relax and let an expert implement your solution exactly as needed. Think of me as your cloud solutions Advil. I reliably relieve headaches instead of causing them. 🗣️❝𝙍𝙞𝙙𝙞𝙘𝙪𝙡𝙤𝙪𝙨𝙡𝙮 𝙚𝙛𝙛𝙞𝙘𝙞𝙚𝙣𝙩 𝙞𝙨 𝙩𝙝𝙚 𝙥𝙝𝙧𝙖𝙨𝙚 𝙩𝙝𝙖𝙩 𝙘𝙤𝙢𝙚𝙨 𝙩𝙤 𝙢𝙞𝙣𝙙 𝙬𝙝𝙚𝙣 𝙄 𝙩𝙝𝙞𝙣𝙠 𝙖𝙗𝙤𝙪𝙩 𝙉𝙖𝙣𝙙𝙮. 𝙄 𝙝𝙖𝙙 𝙩𝙝𝙚 𝙥𝙡𝙚𝙖𝙨𝙪𝙧𝙚 𝙤𝙛 𝙬𝙤𝙧𝙠𝙞𝙣𝙜 𝙬𝙞𝙩𝙝 𝙝𝙞𝙢 𝙛𝙤𝙧 𝙩𝙬𝙤 𝙮𝙚𝙖𝙧𝙨, 𝙘𝙤𝙡𝙡𝙖𝙗𝙤𝙧𝙖𝙩𝙞𝙣𝙜 𝙤𝙣 𝙨𝙚𝙫𝙚𝙧𝙖𝙡 𝙥𝙧𝙤𝙟𝙚𝙘𝙩𝙨. 𝙄 𝙬𝙖𝙨 𝙥𝙖𝙧𝙩𝙞𝙘𝙪𝙡𝙖𝙧𝙡𝙮 𝙞𝙢𝙥𝙧𝙚𝙨𝙨𝙚𝙙 𝙗𝙮 𝙉𝙖𝙣𝙙𝙮’𝙨 𝙖𝙗𝙞𝙡𝙞𝙩𝙮 𝙩𝙤 𝙝𝙖𝙣𝙙𝙡𝙚 𝙚𝙫𝙚𝙣 𝙩𝙝𝙚 𝙩𝙤𝙪𝙜𝙝𝙚𝙨𝙩 𝙨𝙞𝙩𝙪𝙖𝙩𝙞𝙤𝙣 𝙚𝙛𝙛𝙤𝙧𝙩𝙡𝙚𝙨𝙨𝙡𝙮. 𝙏𝙝𝙖𝙩 𝙨𝙠𝙞𝙡𝙡 𝙤𝙛𝙩𝙚𝙣 𝙩𝙖𝙠𝙚𝙨 𝙮𝙚𝙖𝙧𝙨 𝙩𝙤 𝙙𝙚𝙫𝙚𝙡𝙤𝙥 𝙖𝙢𝙤𝙣𝙜 𝙖𝙣𝙮 𝙥𝙧𝙤𝙛𝙚𝙨𝙨𝙞𝙤𝙣𝙖𝙡𝙨, 𝙗𝙪𝙩 𝙞𝙩 𝙨𝙚𝙚𝙢𝙚𝙙 𝙩𝙤 𝙘𝙤𝙢𝙚 𝙥𝙚𝙧𝙛𝙚𝙘𝙩𝙡𝙮 𝙣𝙖𝙩𝙪𝙧𝙖𝙡𝙡𝙮 𝙩𝙤 𝙝𝙞𝙢. 𝙉𝙤 𝙢𝙖𝙩𝙩𝙚𝙧 𝙝𝙤𝙬 𝙩𝙚𝙣𝙨𝙚 𝙖 𝙢𝙚𝙚𝙩𝙞𝙣𝙜, 𝙉𝙖𝙣𝙙𝙮 𝙢𝙖𝙙𝙚 𝙨𝙪𝙧𝙚 𝙞𝙩 𝙚𝙣𝙙𝙚𝙙 𝙬𝙞𝙩𝙝 𝙖 𝙨𝙢𝙞𝙡𝙚. 𝘼𝙨 𝙖 𝙩𝙚𝙖𝙢 𝙢𝙚𝙢𝙗𝙚𝙧 𝙤𝙧 𝙖 𝙡𝙚𝙖𝙙𝙚𝙧, 𝙉𝙖𝙣𝙙𝙮 𝙚𝙖𝙧𝙣𝙨 𝙢𝙮 𝙝𝙞𝙜𝙝𝙚𝙨𝙩 𝙧𝙚𝙘𝙤𝙢𝙢𝙚𝙣𝙙𝙖𝙩𝙞𝙤𝙣.❞ — 𝙅𝙖𝙞𝙧𝙤 𝙎𝙚𝙦𝙪𝙚𝙞𝙧𝙖 - 𝙈𝙚𝙙𝙞𝙖𝙩𝙤𝙧 & 𝙄𝙣𝙩𝙚𝙧𝙣𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝘾𝙞𝙫𝙞𝙡 𝙇𝙖𝙬 𝘼𝙩𝙩𝙤𝙧𝙣𝙚𝙮 - 𝙅𝙖𝙞𝙧𝙤 𝙎𝙚𝙦𝙪𝙚𝙞𝙧𝙖 & 𝘼𝙨𝙨𝙤𝙘𝙞𝙖𝙩𝙚𝙨 🌟Career highlights of mine include: 🔶 Defense Cybersecurity: Worked with Dell and the Department of Defense on key cybersecurity programs for Fortune 500 companies. 🔶 Australian Gov Project: Leading a complex security initiative for a defense contractor, ensuring top-tier protection and compliance. 🔶 Microsoft Collaboration: Enhancing AI integration within Intune and Defender products with Microsoft’s product teams. 🔶 High-Security Contracts: Implementing remote work solutions with Microsoft AVD, ensuring data protection and compliance. 💼Here’s a highlight of the solutions, skills and services I commonly help my clients with: 🔒 Cloud Security & Zero Trust: Secure cloud architectures with a focus on zero trust, including On-prem to Cloud and Azure migrations. 📊 Azure Sentinel: Design and management of Azure Sentinel, including KQL for security analytics. ✅ Compliance & Audits: Conducting NIST, CIS audits, and ensuring compliance with ISO-27001, SOC2, GDPR, HIPAA, and more. 🔐 Identity Management: Implementing strategies like Active Directory Health Checks, Azure AD B2C Custom Policy, and GoDaddy 365 Defederation. 🌐 Global Security Projects: Managing security projects and regulatory compliance, including VMware to Azure migrations. 📉 Risk & Audits: IT security assessments, including GPO Clean-up and adherence to industry standards. ✉️ Email Security: Managing secure email migrations, including Google-to-Microsoft and O365 security with Mimecast. 🕵️ Investigations: Enhancing security posture through investigations like Phishing, Malware, and OWASP compliance. 💼 Retainer Services: Ongoing consultation and support for Security Advisor, Architect, and SOC Analyst roles. 🔧Here’s a highlight of the platforms I have extensive experience working with: 🖥️ Microsoft Azure, Azure Sentinel and Office 365 (O365) 🛡️ Microsoft Defender (Cloud Apps (MCAS), Identity, Endpoints, Azure) 📱 Microsoft Intune 📧 Microsoft Exchange 🗂️ Microsoft DLP 💼 Microsoft AVD 💻 Microsoft W365 Thanks for learning about me! If you’re interested in working together, please invite me to your job on Upwork to book a 🆓 free consultation call with me. Talk soon! 😊 Nandy Bo 🗣️❝ 𝙄𝙩 𝙝𝙖𝙨 𝙗𝙚𝙚𝙣 𝙖 𝙥𝙡𝙚𝙖𝙨𝙪𝙧𝙚 𝙩𝙤 𝙬𝙤𝙧𝙠 𝙬𝙞𝙩𝙝 𝙉𝙖𝙣𝙙𝙮 𝙙𝙪𝙧𝙞𝙣𝙜 𝙩𝙝𝙚 𝙩𝙧𝙖𝙣𝙨𝙞𝙩𝙞𝙤𝙣 𝙤𝙛 𝘾𝙖𝙡𝙡𝙘𝙤𝙢. 𝙉𝙖𝙣𝙙𝙮 𝙞𝙨 𝙫𝙚𝙧𝙮 𝙜𝙚𝙣𝙪𝙞𝙣𝙚, 𝙝𝙤𝙣𝙚𝙨𝙩 𝙖𝙣𝙙 𝙝𝙚𝙡𝙥𝙛𝙪𝙡 𝙞𝙣 𝙣𝙖𝙩𝙪𝙧𝙚. 𝙃𝙚 𝙖𝙡𝙨𝙤 𝙝𝙖𝙨 𝙖 𝙫𝙚𝙧𝙮 𝙞𝙣-𝙙𝙚𝙥𝙩𝙝 𝙠𝙣𝙤𝙬𝙡𝙚𝙙𝙜𝙚 𝙤𝙛 𝙄𝙏 𝙬𝙝𝙞𝙡𝙚 𝙢𝙖𝙞𝙣𝙩𝙖𝙞𝙣𝙞𝙣𝙜 𝙖 𝙫𝙚𝙧𝙮 𝙗𝙧𝙤𝙖𝙙 𝙥𝙧𝙤𝙗𝙡𝙚𝙢-𝙨𝙤𝙡𝙫𝙞𝙣𝙜 𝙤𝙪𝙩𝙡𝙤𝙤𝙠. 𝙏𝙝𝙚𝙨𝙚 𝙛𝙚𝙖𝙩𝙪𝙧𝙚𝙨 𝙢𝙖𝙠𝙚 𝙝𝙞𝙢 𝙣𝙤𝙩 𝙤𝙣𝙡𝙮 𝙖 𝙥𝙡𝙚𝙖𝙨𝙪𝙧𝙚 𝙩𝙤 𝙬𝙤𝙧𝙠 𝙬𝙞𝙩𝙝 𝙗𝙪𝙩 𝙖𝙡𝙨𝙤 𝙫𝙚𝙧𝙮 𝙞𝙣𝙨𝙥𝙞𝙧𝙖𝙩𝙞𝙤𝙣𝙖𝙡. ❞ — 𝙅𝙤𝙧𝙙𝙤𝙣 𝘽𝙞𝙡𝙡 - 𝙈𝙖𝙣𝙖𝙜𝙞𝙣𝙜 𝘿𝙞𝙧𝙚𝙘𝙩𝙤𝙧 - 𝘾𝙖𝙡𝙡𝙘𝙤𝙢 𝙄𝙣𝙩𝙚𝙧𝙣𝙖𝙩𝙞𝙤𝙣𝙖𝙡Information SecuritySpam FilterMicrosoft Exchange OnlineEmail SecurityOffice 365Microsoft AzureCloud Engineering ConsultationRisk AssessmentSecurity AnalysisMobile Device ManagementMicrosoft Endpoint ManagerCloud SecurityCloud ImplementationSolution Architecture Consultation - $50 hourly
- 0.0/5
- (0 jobs)
Motivated and experienced IT (Information Technology) professional with a minimum of 12 years of experience in different aspect in the technology world and also in the medical field, is looking for his new challenge in your organization ● Microsoft desktop operating systems ● Structured cabling ● Network standards and protocols ● Microsoft network operating system 1&2 ● Linux operating system ● Network technology and service integration ● Database development ● Linux System Administrator ● Uses of Spiceworks ticketing system ● Trained users on their computers, software programs installed to their computers, and other computer equipment’s ● Reimaging computers ● Install software and update user’s computers ● Installing and configuring devices ● Troubleshooting computers related issues ● Remoting users, providing in person helpdesk as well as remotely and other the phone ● Data backup ● Troubleshooting, and resolving hardware, software, other network and system problems ● replacing defective components ● Plan, configure and implement network security with latest information systems security knowledge and regulations ● Configure monitor and maintain email application and virus protection software ● Monitor performance of computer systems and networks ● Group Policies object (GPO) ● Active directory policy (ADP) ● Install printer software on various computer as needed ● Worked on HP Printers enterprise level, Xerox printers, Dell printers, Lexmark printers, Kodak printers, brother printer and more others ● Providing technical support to system users ● Analyze equipment performance to determine the need for repair ● Maintain computer parts inventory for emergency repair ● Recommend changes to improve computer systems and network configuration functionality ● Determine hardware and software needed to be changed ● Train users on their computer systems ● Maintain network function logs, as well as maintenance and repair records ● WAN technology and applications ● Networking application services/security ● Hardware replacement and upgrades ● VMWare product ● Security camera installation ● Anti-Virus, Malware, Trojan &Spyware security ● Software upgrades ● Install and troubleshooting software issues ● Windows (XP, 7, 8, 8.1 and 10) knowledge ● ● Microsoft Office (2010, 2007 ,2016, 365) ● Microsoft window server 2008, 2010, 2012 ● Microsoft Exchange (MS Exchange) ● Computer engineering experience Languages English, French, FonInformation SecurityComputer ScienceHTML5Computer Hardware InstallationInternet SecurityComputer NetworkComputer EngineeringSecurity AnalysisComputer MaintenanceNetwork Security - $150 hourly
- 3.8/5
- (4 jobs)
As an independent cloud architect, I can help your business: * Plan your cloud strategy * Design and build secure, scalable cloud infrastructure * Find and fix security vulnerabilities * Reduce cloud spending I do this by addressing high value and high risk priorities first, planning and delivering concrete milestones on time, and supporting you going forward. I'm a dirty-hands technical guy but I'm also a veteran business founder, so I understand that your business runs on more than technology. Security intersects everything I do, from business continuity to change management, identity management, disaster recovery, monitoring and more. Most of my clients are smaller or medium businesses, so I see many environments in transition. Often companies slide into consuming cloud resources in a not-so strategic way, starting with a small project, then another, etc., and it can get out of hand with spending too much and security issues. Amazon/Azure/Google encourage this sort of “spending creep” - it serves the cloud providers very well, but a lot of businesses are overdue for a re-think of their cloud environments. Usually, I first take a high-level view of where you stand, whether you are planning to transition services to a cloud platform or already in it, and identify low-hanging fruit to save money, bolt down security, and automate everyday tasks. My initial consultation is FREE, and I can deliver valuable insight in just a few hours. Then I plan a longer-term roadmap to accommodate your business’ growth, in which the underlying cloud infrastructure will not slow down or break down over time. Container orchestration with Kubernetes or ECS is a particular focus of my work. A lot of companies have a proliferation of ad hoc servers and could benefit from consolidating with containers, but lack the skills in-house. I can help you modernize with containers, scale up and save money. With me, there’s never a salesperson trying to up-sell services, and I don’t delegate your work to a junior engineer. I work with you personally and take personal responsibility for everything I do today and in the future. I also document and check-in everything I do, so you can always share it with your team or other service providers. I tend to get involved for a few weeks to a few months to realize concrete deliverables, then stay involved on an as-needed basis for support. Cost-wise, I can guarantee that my services will be less expensive than a big consultancy with a fancy website, and also less expensive than a full-time in-house cloud architect. Geographically, I live in Philadelphia and work from my own office. I time-track everything I do, push all my work to your Git repository, and usually am available on a video call within an hour or two. With decades of experience in engineering teams, critical data-centers, start-ups and consulting, you can count on me to provide straightforward, pragmatic advice, solve high-priority problems promptly and deliver quality. Top references from current satisfied customers are available. Hands-on with Kubernetes, Docker, Python, Terraform/CloudFormation, Git, Linux, security, security and more security. Recent projects: - HIPAA compliant health care app on AWS ECS - Kubernetes architecture and implementation for a "smart laboratory" SaaS application - Security assessment for a government contractor - Serverless architecture for an IoT application - API integration with a major energy provider - Kubernetes migration for a machine learning application - AWS autoscaling infrastructure for a hotel management platform - Technical design for clinical trials data for an international pharma company - AWS cost analysis and 50% cost reduction for an energy trading platformInformation SecurityInfrastructure as CodeLinuxTerraformDevOpsAmazon Web ServicesAWS CloudFormationKubernetesContainerizationJavaScriptDockerCloud ArchitectureNetwork SecurityAmazon ECSPython - $60 hourly
- 5.0/5
- (1 job)
Graduated from Long Island University w/ B.S. in Integrated Information Systems. There I studied C++/ C/ Visual Basic, SQL and Databases/ Networking and Operating Systems, etc to become a Systems Analyst Coder. In recent years in addition to obtaining small clients solo, I ventured into Cyber Security via my membership w/ IEEE and there also being in the Security and Privacy group. Hands on experience came from setting up routers networks for clients home and business systems, offering tech support for others, and "breaking systems" from my own setup of computers, tablets and smartphones to train. Therefore hands-on I use my many tools via Kali Linux, and add on to the arsenal tools which may not be included as Wireshark, BurpSuite Professional, Exiftool and more. Being member to HackerOne and Intigriti gives me also the knowledgebase and hands-on as well with Bug Bounty programs and CTF challenges. Through IEEE, I have completed several Cyber Security courses and obtained certificates of completion for each. I also frequent activities with other professionals via discord online as well as self study for possible venturing towards CEH and CISSP certifications. I have a small business on the side which I also offer certain services geared towards the consumer needed assistance in technology and Cyber Security specifically.Information SecurityFiber OpticsWireless CommunicationNetwork Penetration TestingWeb TestingVulnerability AssessmentInternet SecurityMobile App TestingWeb App Penetration TestingNetwork SecurityCybersecurity MonitoringSecurity AnalysisCyber Threat IntelligencePenetration TestingEthical Hacking - $40 hourly
- 0.0/5
- (0 jobs)
I am an experienced content director, editor, and copywriter across a range of industries including health care, business management, and corporate communications. In each role of my career, I have adapted seamlessly into a subject matter expert for the purposes of content direction. Additionally, I am very adept at maintaining a busy schedule of managing copywriting/editing tasks with varying degrees of prioritization and deadlines, and am very communicative and organized with project managers, junior editors, and other stakeholders to ensure deadlines and expectations are met.Information SecurityContent ManagementContent EditingSitecoreMicrosoft OfficeContent MarketingEmail CopywritingSocial Media AdvertisingHTMLHubSpotContent CreationGoogle AnalyticsAdobe Creative SuiteWebsite CopywritingContent Writing - $70 hourly
- 0.0/5
- (0 jobs)
Summary: 15+ years of Information Security infrastructure Design and Implementation 10+ years of Microsoft Active Directory, Exchange Servers administration 10+ years of Project Management 7+ years of Programming and Automation 7+ years of Network Infrastructure and Storage management 7+ years Management and Leadership experience 4+ years Higher Education TeachingInformation SecurityInformation TechnologyMicrosoft Active DirectoryFirewall - $65 hourly
- 0.0/5
- (2 jobs)
I am passionate about the intersection of Information Security and Education. I believe that Security Awareness is more than just regular phishing simulations, and it requires appropriate adult learning theory and educational strategy. Another part of educating and securing people is supporting the transformation of business processes and policy to incorporate security best practices while balancing business needs. Human risk is a unique aspect of Information Security that cannot be solutioned away with technology. I am an Information Security Professional with over 7 years of experience, specializing in developing and implementing comprehensive security training programs and establishing best practices and policy of data protection and cybersecurity. With a strong foundation in security awareness, security operations, and cybersecurity project leadership, I have significantly enhanced the organization's security posture and human risk management, and fostered a culture of continuous learning and improvement.Information SecurityCourse CreationNIST Cybersecurity FrameworkProcedure DevelopmentPolicy WritingTechnical WritingLearning Management SystemIT Project ManagementRisk ManagementEmployee TrainingInformation Security AwarenessCompliancePCIEducational TechnologyContent Creation - $35 hourly
- 0.0/5
- (0 jobs)
As an Information Security Program Manager with 2 years of experience, I specialize in overseeing complex security projects from inception to completion, ensuring alignment with both client needs and organizational goals. I have a strong background in managing cross-functional teams and working closely with stakeholders to translate technical security requirements into actionable strategies. My role involves constant communication with clients to understand their security challenges and ensure their expectations are met or exceeded. I also leverage dashboards and data-driven insights to monitor project performance, identify risks, and make timely adjustments to maintain the integrity and progress of initiatives. Through my proactive leadership, I strive to foster secure environments that enhance trust and protect critical information. I am passionate about delivering results that not only meet compliance standards but also elevate the security posture of the organizations I work with.Information SecurityCloud ManagementData Protection - $100 hourly
- 0.0/5
- (0 jobs)
Cyber Security Specialist with 5 years of experience in cyber security, information security, and IT operations. Mastered the acts of implementing information security infrastructures and balancing security initiatives to external risk and business operations.Information Security - $30 hourly
- 5.0/5
- (1 job)
I am specialised in the area of Cybersecurity but I know how to manage systems, develop websites, and proficient on innovating and bringing new ideas to make projects work better and efficientlyInformation SecurityTeam ManagementComputerProblem Solving - $65 hourly
- 0.0/5
- (0 jobs)
Apple / Mac specialist with experience supporting cloud and onsite environments. Administrator of Google Workspace and Microsoft O365 / Azure for multiple MSPs. Extensive experience with Audio, Video, Creative Suites, and Storage hardware for creative workflows. Years of supporting Win, Mac, iOS, Android, mixed environments teams. Experience with Builder / Maker tech 3D Printing, CNC, and wide format printers.Information SecurityComputer NetworkComputing & Networking - $80 hourly
- 0.0/5
- (0 jobs)
Software Developer Data Engineering Network Engineer Cyber Security Experience with Cloud and On Prem Infrastructures.Information SecuritySoftwareGPUCloud ArchitectureInfrastructure ManagementETLDatabase ManagementArchitectureDatabaseArchitectural DesignDevOpsProblem Solving - $125 hourly
- 0.0/5
- (0 jobs)
Over 30 years of IT experience, complemented by a strong foundation in Electronic and Electrical Engineering. Possessing a comprehensive understanding of Digital Technology/IT across domains, including electronics, hardware, networking, operating systems, application platforms, databases, coding, testing, IaC, ITIL, Containers, DevOps, AWS, Azure, "security in depth" and system performance optimization, road maps, vendor management, product management. Data migration security. Data recovery from windows systems.Information SecurityData MigrationApplication IntegrationMergers & AcquisitionsDisaster RecoveryProblem SolvingArchitectureComputing & Networking - $278 hourly
- 0.0/5
- (0 jobs)
I’m a developer experienced in building websites for small and medium-sized businesses. Whether you’re trying to win work, list your services, or create a new online store, I can help. Knows HTML and CSS3, PHP, jQuery, Wordpress, and SEO Full project management from start to finish Regular communication is important to me, so let’s keep in touch.Information SecurityCrowdStrikeFedRAMPComplianceGovernment Reporting Compliance - $75 hourly
- 0.0/5
- (0 jobs)
Cybersecurity & Data Analysis Professional I specialize in cybersecurity with a focus on data integrity and risk mitigation, leveraging my expertise to safeguard sensitive information and support informed decision-making. My skills are rooted in my background in data entry and analysis, ensuring accuracy and consistency across large data sets. Key strengths include: • Cybersecurity Expertise: With a professional cybersecurity certificate from Google and hands-on experience, I excel in identifying vulnerabilities, managing access controls, and implementing secure protocols. My approach is proactive, prioritizing risk assessment and timely interventions to protect organizational assets. • Data Entry Precision: I have a keen eye for detail and ensure data accuracy in all my projects. Skilled in organizing, managing, and verifying information, I maintain high data integrity standards, essential for any analysis and reporting. • Efficient Communication & Collaboration: Known for my effective communication, I work well with cross-functional teams, translating complex data insights into actionable recommendations. My commitment to timely and clear communication fosters a collaborative environment. • Ownership & Time Management: I thrive in fast-paced environments and take full ownership of my tasks, consistently meeting deadlines and exceeding expectations in both cybersecurity initiatives and data entry projects.Information SecurityDevOpsProblem SolvingDatabaseDatabase ManagementCompliance - $30 hourly
- 2.5/5
- (13 jobs)
• IT Support Levels 1/2/3 • System Administration • Network Administration • DevOps Engineering • Cybersecurity Consulting (VAPT/SIEM) • Wed Design & SEO • Full Life Cycle Project Management • Cloud Solution Deployment & Integration • IT System Administration • SAP System Administrator • IT Infrastructure Optimization • ERP System Development / Implementation • IT Strategic Planning & Execution • Enterprise Solution Development • IT Process Redesign / Change Management • Technical & Functional Training • IT Budget & Capital Expenditure Planning • Network Administration • Enterprise Administrator • Infrastructure Management • Database ManagementInformation SecurityNetwork Access ControlUbiquitiIT ManagementInfrastructure ManagementSecurity AnalysisBackup AdministrationTechnical SupportUser Identity ManagementNetwork AdministrationSystem AdministrationSEO Writing - $30 hourly
- 5.0/5
- (1 job)
PROFILE I am an information security professional seeking roles in security architecture and risk management. I enjoy solving information security challenges by understanding business requirements and recommending solutions to meet the intended objectives in a secure and compliant way. In previous roles I have performed and managed security and risk assessments in the healthcare industry in both internal and client facing roles. I have experience designing and implementing security assurance programs in a GRC solution. I work most effectively in small teams with opportunities to think critically about system architecture and business requirements and communicate effectively to "translate" needs between technology, business, and management partners. I have extensive experience with NIST, ISO, HIPAA, & FFIEC guidance.Information SecurityRisk AssessmentHIPAAISO 27001NIST Cybersecurity FrameworkNIST SP 800-53Security Assessment & Testing - $55 hourly
- 0.0/5
- (0 jobs)
* Experienced, effective and successful in IT network operations management * Ability to work independently managing multiple teams ensuring organizational goals are met * Capable of accommodating continuous change in a sophisticated, dynamic environment * Exceptional skill in providing liaison to locations with disparate needs and expectations * Outstanding communication talent with clients, staff, peers and managementInformation SecurityFinanceIT ManagementTroubleshootingCybersecurity ManagementInformation TechnologySaaSLeadership SkillsComputing & NetworkingNetwork Administration - $175 hourly
- 0.0/5
- (0 jobs)
Tim is a Senior Security Advisor with 20+ years of IT and 11 years of senior leadership experience in cyber security, organization and cloud transformation, and IT security operations having protected over 48,000 employees, 45 million customer accounts, and more than 760 locations in the US and Europe for Fortune 500 financial services and technology enterprises. AT A GLANCE * Trusted advisor to CEO's, Boards of Directors, and stakeholders. * Scheme committee member - EC-Council CEH Practical Program * Led global incident response, compliance, and application security engagements within sensitive environments; government, healthcare, banking, and aerospace. * Led Int. Shipping Corporation's compliance testing, a 69b year international organization, executing physical assessments at 100 US and 70 international locations and yearlong testing to maintain PCI-DSS compliance. * Certified CEH Master and former Adjunct Professor for Ethical Hacking * Security Cleared Infosec ExecInformation SecurityHIPAAHITRUST Common Security FrameworkInformation Security AwarenessInformation Security AuditData PrivacyCloud Security FrameworkCompliance ConsultationSOC 2PCI DSSRisk AssessmentCertified Information Security ManagerIncident Response PlanDigital ForensicsVulnerability Assessment - $10 hourly
- 0.0/5
- (0 jobs)
As a certified cybersecurity expert with a focus on strategic and adaptable solutions, I specialize in helping small to medium-sized businesses enhance their digital security posture from anywhere in the world. Here’s what I bring to your organization: • Remote Vulnerability Assessments: Utilize top industry tools to perform thorough web vulnerability scans, ensuring your digital assets are secure against external threats. • Policy and Compliance Reviews: In-depth examination of your security policies and compliance with standards such as GDPR and PCI DSS, providing actionable recommendations to fortify your security measures. • Data Security Consultations: Offer detailed assessments and consultations focusing on data protection strategies, helping you safeguard critical information against breaches. • Phishing Defense Strategies: Develop and implement phishing simulation tests to evaluate and enhance your team’s threat awareness and response capabilities. • Continuous Advisory Services: Provide ongoing support and strategic advisories to keep your business ahead in the rapidly evolving cybersecurity landscape. Let’s work together to ensure your business is secure, compliant, and prepared for any digital challenge.Information SecurityTech & ITProblem SolvingCybersecurity MonitoringTechnical DocumentationWeb Application SecuritySSLRisk ManagementNetwork AnalysisSystem SecurityIncident Response PlanPenetration TestingVulnerability AssessmentCybersecurity Management - $150 hourly
- 0.0/5
- (0 jobs)
GENERAL CAREER SUMMARY - US Air Force Veteran, Commissioned Officer (2004-07). Comm systems engineer. Previously cleared up to TS/SCI. - Proven ability to operate autonomously or as part of a team. I learn on my feet, can teach, and I don't shy away from challenges. - 18 years total experience (+ BS degree in computer engineering) as a network engineer/architect with experience in all stages of the project lifecycle including design, planning, execution, and operations/maintenance (O&M). - Most recently working in both the enterprise and datacenter arena focusing on both Juniper and Cisco conventional datacenters as well as Cisco Application Centric Infrastructure (Cisco ACI) and Cisco SDWAN builds and migrations. - Very strong enterprise routing/switching background in a mixed vendor environment, though primarily both Cisco and Juniper. - Significant operating system and scripting experience including most recently Python and Bash, but also Perl and PowerShell.Information SecurityCisco Certified Internetwork ExpertFortinetPalo Alto FirewallsJuniperCisco ACICiscoComputing & NetworkingNetwork EngineeringComputer NetworkCompliance - $20 hourly
- 0.0/5
- (0 jobs)
-• Software & Hardware Troubleshooting • Active Directory and Group Policy Editor • Command Line Network Utility • Security Application Installations • Problem Solving and Critical Thinking • Virtual Machines • Proficient in Microsoft Office Suite • Disassemble broken devices such as laptops or phones • MySQLInformation SecurityHardware TroubleshootingMicrosoft Active DirectoryVirtual MachineMicrosoft Office - $22 hourly
- 0.0/5
- (0 jobs)
I'm a versatile writer with a passion for bridging the gap between technical expertise and creative expression. With a background in cybersecurity and technology I specialize in crafting clear, engaging content that demystifies complex concepts for diverse audiences. By combining a keen understanding of technology with a flair for storytelling, I aim to provide clients with compelling narratives that not only inform but also resonate. Always eager to take on new challenges, I am dedicated to delivering high-quality work tailored to meet client needs.Information SecurityLinuxJavaVulnerability AssessmentCybersecurity MonitoringCyber Threat IntelligenceResume WritingEditing & ProofreadingTechnical WritingCreative Writing - $100 hourly
- 0.0/5
- (0 jobs)
Dynamic Senior System Engineer | 13+ Years Pioneering Global Solutions Innovative Cloud Architect with over 13 years of proven excellence, orchestrating the seamless execution of intricate technical projects for global industry leaders. Renowned for optimizing cloud-based landscapes, spearheading the design and development of cuttingedge Client Platform solutions, and crafting elegantly efficient system architectures. Acknowledged as a visionary leader and entrepreneur, I have steered cross-functional teams and engaged stakeholders with expertise. My communication prowess and adept conflict resolution skills ensure harmonious collaboration, even in the most intricate projects. A trailblazer in automation, I leverage infrastructure-as-code methodologies to streamline deployment and management processes. My commitment to perpetual learning keeps me at the forefront of emerging technologies and industry trends, empowering me to drive innovation and deliver unparalleled technologicalInformation SecurityGraphComplianceGovernment Reporting ComplianceNetwork EngineeringComputing & NetworkingComputer NetworkProblem SolvingDevOpsArchitectural DesignArchitecture - $10 hourly
- 0.0/5
- (0 jobs)
I’m a student eager to gain practical experience in cybersecurity and programming, with a strong interest in mathematics and a desire to learn full stack development. • I have a solid foundation in Python and am passionate about expanding my skills • I’m actively seeking freelance opportunities in startups or mentorship from someone who can guide me effectively, and I’m willing to work without a salary to gain valuable experience I truly want to learn and grow in this field, and I would be incredibly grateful for any opportunity to contribute and assist you. If you’re looking for a dedicated and motivated individual, please let’s connect! Your guidance could make a significant difference in my journey.Information SecurityComplianceProblem SolvingNetwork EngineeringComputing & NetworkingComputer Network - $100 hourly
- 0.0/5
- (0 jobs)
Joseph is a seasoned Information Security Architect with a strong background in Microsoft Cloud Security Architecture, Security Operations, Competitive Analysis, Digital Forensics, and Threat Intelligence. With extensive experience from roles at Red Canary, McAfee, Dell, and Rapid7, Joseph excels in designing, developing, and delivering security solutions that integrate Microsoft-based security tools with advanced MDR services. His expertise includes conducting incident response, performing penetration tests, and facilitating SOC maturity programs. Joseph holds numerous certifications, including CISSP, OSCP, and multiple Microsoft security credentials, making him a highly qualified consultant capable of addressing complex security challenges and enhancing organizational security postures. Certifications and Training Certified Information Systems Security Specialist (CISSP) Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) Offensive Security Wireless Professional (OSWP) GIAC Certified Forensic Analyst Microsoft Certified: Security Operations Analyst Associate Microsoft Certified: Azure Security Engineer Associate Microsoft Certified: Identity and Access Administrator Associate Microsoft Certified: Security Administrator Associate Technologies SIEM Platforms (Sentinel, Splunk, etc.) XDR Platforms (Microsoft, CrowdStrike, Carbon Black, Palo Alto) SOAR Platforms (Cortex XSOAR, Splunk Phantom, Demisto, IBM Resilient) Azure and AWS Cloud Security (Entra ID, Policy, KeyVault, IAM, GuardDuty, WAF, CloudTrail, Inspector) Forensics Tools (Axiom, Volatility, EnCase, TSK, etc.) Pentesting Tools (Metasploit, Burp Suite, BeEF, Hashcat, SET, Empire, Cobalt Strike, etc.) Threat Intelligence (ThreatConnect, Recorded Future, Anomali, Mandiant TI)Information SecuritySecurity Assessment & TestingSecurity TestingSecurity EngineeringCybersecurity ManagementCybersecurity MonitoringCloud SecuritySecurity AnalysisSecurity Operation CenterMicrosoft IntuneMicrosoft 365 CopilotMicrosoft Azure AdministrationNetwork EngineeringSystem Administration Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.