Hire the best Information Security Analysts in South Carolina
Check out Information Security Analysts in South Carolina with the skills you need for your next job.
- $60 hourly
- 5.0/5
- (11 jobs)
I am a dedicated and experienced data scientist with a profound ability to transform raw data into actionable insights through compelling visualizations and data storytelling. My expertise lies in developing interactive dashboards and creating visual narratives that drive informed decision-making. With a strong foundation in tools such as Excel, Power BI, and Python, I am adept at analyzing complex datasets and presenting them in a manner that is both understandable and impactful. My academic journey includes a Bachelor of Science in Cyber Security from Western Governors University, completed in 2021, and I am currently pursuing a Master's degree in Applied Data Science from the University of Michigan, with an expected graduation in 2026. This academic background has provided me with a robust understanding of both cybersecurity and data science, allowing me to approach data analysis with a unique perspective that integrates security considerations. Throughout my career, I have successfully completed several projects that showcase my ability to deliver high-quality data science solutions. I have developed multiple interactive dashboards that have been instrumental in business intelligence and decision-making processes. My data visualization projects have uncovered critical insights and trends within large datasets, enabling stakeholders to make data-driven decisions with confidence. My storytelling approach to data ensures that complex findings are communicated effectively to both technical and non-technical audiences. In addition to my practical experience, I hold numerous certifications that validate my expertise and commitment to continuous learning. I am a GIAC Python Coder (GPYC), proficient in data structures, regex writing, and API development. My credentials also include the Global Industrial Cyber Security Professional (GICSP) certification, which highlights my skills in information security, change management, configuration management, system security, and network security. As a GIAC Certified Intrusion Analyst (GCIA), I possess specialized knowledge in intrusion prevention systems, IPv6, research protocols, and analytical presentation. My role on the GIAC Advisory Board further demonstrates my leadership and expertise in system security, data protection, network security, and information security. I am also a certified GIAC Machine Learning Engineer (GMLE), with skills in scripting, neural networks, genetic algorithms, statistical infographics, and anomaly detection. Additionally, I hold the Google Data Analytics Professional Certificate, which has equipped me with advanced skills in data cleaning, data analytics, mathematical optimization, SQL, and data visualization. My credentials extend to the realm of project management and cybersecurity, with certifications such as the CompTIA Project+ and CompTIA Network+ ce. These certifications underscore my capabilities in project management, network engineering, and IT procurement, among other areas. My comprehensive skill set is further enhanced by the CompTIA Secure Infrastructure Specialist and CompTIA A+ ce certifications, which attest to my proficiency in troubleshooting, cloud computing, technical support, and system security. As a dedicated professional, I am committed to leveraging my extensive experience and certifications to deliver exceptional data science and cybersecurity solutions. I am passionate about helping organizations harness the power of their data to achieve their goals. Let's connect and discuss how I can contribute to your data-driven success.Information SecurityAnomaly DetectionNeural NetworkScriptingMachine LearningData VisualizationPower QueryData CleaningCyber Threat IntelligenceData AnalyticsData ScienceMicrosoft Power BIPythonSQLMicrosoft Excel - $165 hourly
- 5.0/5
- (29 jobs)
I am an accomplished and experienced Cyber Security Engineer, CISO, and consultant with over 20 years experience in government, commercial, non-profit and private organizations. I'm a Certified Information Systems Security Professional (CISSP) and CMMC Registered Practitioner. My education includes a Master's degree in Information Assurance and Security specializing in Digital Forensics, a Bachelor's Degree in Information Technology, and daily, hands-on work governing, securing and administering complex information technology environments. My current efforts include cybersecurity compliance implementations for regulated industries and government contractors including the NIST Cybersecurity Framework, Risk Management Framework, NIST SP 800-171, and Cybersecurity Maturity Model Certification (CMMC). For those not bound to other regulatory guidelines, I assist with implementation of the Center for Internet Security (CIS) Critical Security Controls and the CIS Risk Assessment Method. I assist with expert advice, gap assessments, requirements and implementation reviews. I help develop and refine cybersecurity documentation including System Security Plans, POA&Ms, and Policies and procedures. I will share national background check results for qualified opportunities.Information SecurityGap AnalysisVulnerability AssessmentCybersecurity MonitoringAmazon Web ServicesGovernance, Risk Management & ComplianceSecurity EngineeringCloud SecuritySecurity Policies & Procedures DocumentationInformation Security AwarenessCybersecurity ManagementNetwork SecurityCertified Information Systems Security Professional - $120 hourly
- 5.0/5
- (1 job)
PROFILE Ms. Sweet is a passionate cybersecurity and AI professional with over eight years of experience in programmatic mission support, research and analysis, vulnerability management, and policy governance. Her background extends across public and private markets including the Department of Defense, Department of Homeland Security, and National Institutes of Health. With an emphasis on securing homeland and national security critical infrastructure, Ms. Sweet offers technical experience with cyber readiness, strategic engagement, and governance of complex organizations. Working at the intersection of Cyber and Artificial Intelligence, she is knowledgeable of the tools and methodologies for implementing defensive cybersecurity and vulnerability management. In addition, Ms. Sweet is an active member of the Cybersecurity and Infrastructure Security Agency's (CISA) Information Communications Technology Supply Chain Risk Management Task Force.Information SecurityCloud ComputingDefense & MilitaryTechnical Project ManagementCommunicationsArtificial IntelligenceRisk ManagementPresentation DesignCybersecurity MonitoringVendor ManagementSystem AdministrationNIST Cybersecurity FrameworkSystem SecurityCybersecurity Management - $100 hourly
- 5.0/5
- (1 job)
Provide best practice guidance and implementation strategies for PCI DSS Compliance. Provide best practice guidance for risk assessments. Design and implement Fortinet solutions for clients. Design and implement cloud security end point solutions. Provide migration support from legacy hardware to new hardware deployment. Provided support for Fortinet for 8 years and have 20 years of IT experience. Network + Security +Information SecurityNetwork DesignSecurity ManagementCisco RouterCybersecurity ManagementCisco MerakiNetwork SecurityNetwork PlanningFirewall - $55 hourly
- 0.0/5
- (1 job)
Summary Currently I have accomplished over 6 years of information technology support as a Cyber Defense Analyst with experience and expertise in network security and incident handling (CJCSM 6510). I've acquired exceptional abilities in Active directory, Group Policy Objects and various Analyst tools (SIEM). Also knowledgeable of DoD frameworks and RMF procedures as well as, Federal Compliance/security baseline standards (NIST, FIPS, FISMA, HIPPA).Information SecurityComputing & NetworkingDefense & MilitaryMalware RemovalAnalytical PresentationMicrosoft Active DirectoryWide Area NetworkVirus RemovalDocumentationTech & ITSystem AdministrationNetwork SecurityIntrusion Detection SystemIntrusion Prevention System - $80 hourly
- 0.0/5
- (0 jobs)
* DSAR Management • SOC 2 and Internal Audit • Policy Management • OneTrust • Security Assessment Management • Privacy Impact Assessments (PIAs) • Knowledge of Privacy and Email Marketing legislation: CAN SPAM, CASL, GDPR, CCPA/CPRA • Customer Agreement (DPA) and Contract Drafting • Vendor Risk Management • Regulatory Research • AI Privacy ComplianceInformation SecurityCalifornia Consumer Privacy ActPrivacy Impact AssessmentEmail DeliverabilityEU-US Privacy ShieldGDPRSOC 2IT Compliance AuditVendor ManagementPolicy DevelopmentGDPR Compliance ReviewData Privacy - $40 hourly
- 0.0/5
- (0 jobs)
My History How Compliance fits in What I do now: Working with GRC tools. Risk assessments, Creating security awareness training. PCI compliance ,NIST,TPRM, SOC 2 If you want to contact me , you can email me at - drequanwilson.grcanalyst@gmail.comInformation SecurityGovernment Reporting ComplianceCompliance - $120 hourly
- 5.0/5
- (1 job)
Versatile security and business development leader with 10+ years of expertise in optimizing enterprise cybersecurity programs and leading IT vision, strategy, and large-scale project initiatives. Excels at transforming enterprise applications, infrastructure, service management, data engineering, and analytical systems. Manage change effectively, influence business buy-in, and align technology initiatives with organization's strategic objectives. Track record of quickly maturing security posture, turning around troubled operations, and orchestrating large-scale programs. Manage budgets up to $32M. Experienced in several security, privacy and compliance frameworks to include NIST, SOC2, PCI, FedRAMP, CCPA, GLBA, NYC DFS 500, IRS Pub1075, SSA TSSR, and ISO.Information SecuritySecurity Assessment & TestingCyber Threat IntelligenceDigital TransformationFinanceStrategyStrategic PlanningTechnology Management Solutions SIMSGovernance, Risk & Compliance SoftwareEnterprise Risk ManagementData AnalyticsSecurity Operation CenterCybersecurity ManagementCost ManagementProgram Management - $30 hourly
- 0.0/5
- (0 jobs)
I am a Cyber Security Engineer that has background in Penetration Tests and software development. I am experienced in Linux and offensive security tools. I also develop software in C, Java, Python and Rust. I am also experienced in HTML and CSS. Furthermore, I have background in policy development in respect to cybersecurity governance, risk, and compliance.Information SecurityNetwork EngineeringRed Team AssessmentPenetration TestingSQLCSSHTMLCLinuxJavaComputing & NetworkingComputer NetworkGovernment Reporting ComplianceCompliance - $17 hourly
- 0.0/5
- (0 jobs)
I have extensive experience in medical coding, and a strong academic in cybersecurity . As a certified Registered Health Information Technician (RHIT), I have years of experience in medical coding, health data analysis, and ensuring compliance with healthcare regulations such as HIPAA. Coupled with a degree in cybersecurity, I am skilled in identifying and mitigating security risks, performing malware analysis, and safeguarding sensitive health data from cyber threats.Information SecurityComputing & NetworkingComputer NetworkCompliance - $20 hourly
- 0.0/5
- (0 jobs)
Veteran with 6 years of experience within the United States Marine Corps, 3 of which were spent in an Instructor role at Recruit Training Depot Parris Island. Has held a Secret security clearance. Currently enrolled in an Information Technology / Computer Science program focusing on cyber security. Expected graduation December 2026.Information SecurityBitbucketGitHubPythonMicrosoft Azure SQL DatabaseSQLTransact-SQLJavaDatabase - $70 hourly
- 0.0/5
- (0 jobs)
Experienced System Engineer and IT Professional with a proven track record of success spanning over 14 years in the dynamic field of Information Technology. Specializing in Active Directory management, robust system infrastructure, and customer-centric support, I bring a wealth of technical expertise and leadership skills to the table. Key Highlights: Active Directory Mastery: Proficient in designing, implementing, and managing complex Active Directory environments, ensuring optimal security and user management. Technical Proficiency: Skilled in a wide range of IT domains, including network administration, system troubleshooting, software deployment, and database management. Customer-Centric Approach: Committed to delivering exceptional customer service, I prioritize understanding and addressing the unique needs of end-users to ensure seamless operations and user satisfaction. Problem-Solving Expertise: Known for my analytical mindset andInformation SecurityCRM SoftwareAdministrative SupportITILIT SourcingIT Service ManagementIT Project ManagementIT ManagementIT ConsultationDatabase ManagementDatabaseCompliance - $30 hourly
- 0.0/5
- (0 jobs)
I’m a developer experienced in building websites for small and medium-sized businesses. Whether you’re trying to win work, list your services, or create a new online store, I can help. Knows HTML, Wordpress, and SEO Full project management from start to finish Regular communication is important to me, so let’s keep in touch.Information SecurityArchitectureArchitectural DesignGraphDevOpsProblem SolvingNetwork EngineeringComputing & NetworkingGovernment Reporting ComplianceComputer NetworkCompliance - $50 hourly
- 0.0/5
- (0 jobs)
I'm an experienced IT professional, with three years of bringing resolution to a variety of technical problems. I have experience working with executives at small, medium and large companies leveraging IT to further the business. I'm familiar with: -Microsoft Windows computer/server OS -Microsoft 365, Intune, SharePoint, Teams, Exchange, OneDrive -Azure and AWS cloud infrastructure -Network setup and troubleshootingInformation SecurityMicrosoft IntuneMicrosoft AzureMicrosoft Active DirectoryServer AdministrationRemote Management SoftwareMicrosoft Windows PowerShellComplianceComputer NetworkNetwork EngineeringProblem SolvingGraphComputing & Networking - $3 hourly
- 0.0/5
- (0 jobs)
Efficient worker with attention to detail, seeking to begin a career in the Cyber/Information Technology | Cloud Security | Cybersecurity industry to continue building on and utilizing experience in customer service, leadership, and knowledge gained through Professional Cybersecurity Certificate Program at North Carolina State University and currently working on getting my master ine the information technologyInformation SecurityMicrosoft Azure SQL DatabaseAWS CloudFormationComputing & NetworkingComplianceDatabase Management - $15 hourly
- 0.0/5
- (0 jobs)
Objective Highly motivated and enthusiastic entry-level job seeker with passion for learning and contributing to dynamic. Work environment. Seeking to kick-start my career and gain valuable in understanding the rules and setting. Eager to apply my work ethics, adaptability, and dedication to learn and grow within the company comitted to Contributing my skills and being a valuable team member to support the company's goals and success. And Striving to excel as a production worker by consistently optimizing processes, maximizing effiency, and delivering top-tier quality, contributing to the overall growth and success of the company. Ability Summary Proven production worker with a track record of meeting and exceeding production goals while maintaining strict quality standards. Proficient in operating machinery and management, performing quality checks, and collaborating effectively with cross-functional teams to ensure seamless production processes.Information Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.