Hire the best Information Security Analysts in the United States
Check out Information Security Analysts in the United States with the skills you need for your next job.
- $300 hourly
- 5.0/5
- (6 jobs)
A physician with an education and work history in computer engineering. I consult MedTech startups with strategy, use cases, product direction and execution. I bring technical perspective to these strategies while helping companies achieve a high level of utility and product value from their development efforts. I help build valuable software and hardware products in the complex legal and operating environment of healthcare. My consulting typically falls into three categories: Leadership: I join leadership teams at different times in a company’s growth cycle to strengthen (or shore up) a company's strategy. My medical, technical, and patient experiences bring insight to strategy sessions that ultimately create products that help solve healthcare problems. Technical: My technical career started after finishing electrical and computer engineering at Carnegie Mellon. In four years I became a Design Engineer II at AMD (Advanced Micro Devices). Today, I practice modern software development philosophies where I help companies transform the healthcare industry with technology. I work heavily in and around EHRs, medical data, and the interoperability challenges of the industry. I work at the strategy level as well as lead projects and teams during critical intervals. Clinical: After Tufts Medical School, I became knowledgeable in the Cures Act and its subsequent Interoperability Proposal as a basis for understanding the operating environment. I successfully led athenahealth through the 2015 Meaningful Use Certification. I continually translate medical processes into digital environments so companies build products that users need. I have an extensive medical patient background. With an undiagnosed illness (now well-controlled), I witnessed first-hand the complexities, waste and absurdities of our medical system. That experience provides me with perspective about the opportunity technology will play in the future of healthcare. My engagements and fees vary based on a project’s length and involvement. I joined Upwork in 2021 to gain exposure to more medical technology solutions that inspire me.Information SecuritySoftware DesignEpic Systems Medical SoftwareData IngestionData ModelingTechnical WritingMedical Billing & CodingQuickBaseProduct ManagementElectronic Medical RecordBusiness StrategyTelemedicineIT ConsultationBusiness Analysis - $60 hourly
- 5.0/5
- (15 jobs)
Thank you for taking the time to look at my profile. I am an experienced Systems Administrator and Solution Architect. I have a strong background in cybersecurity completing my graduate work on the specifics of anonymization relating to cyber attacks. I have a constant desire to learn and continue to do so in multiple disciplines. I have diverse interests and I feel that positions me well for success in almost all scenarios. My career is driven by a pursuit of knowledge across various disciplines, creating a diverse skill set that is adaptable. Whether working with Microsoft 365 (including GCC High), Intune, Azure, Google Workspace, Jamf, or other communication and automation tools, I bring a wide variety of experience to each project. I pride myself on being easy to work with and a good communicator. I am a firm believer in empowering others to use technology to further their causes. Key Expertise: - Cybersecurity Measures and Protocols - Systems Architecture and Administration - Proficient with Microsoft 365, Google Workspace, and Shopify - Expertise in Automation and Systems Integration I am eager to bring my skills to new and ongoing projects. Let's connect and discover how I can help you succeed.Information SecurityOKTACloud ArchitectureVirtual Desktop InfrastructureCloud ImplementationGoogle WorkspaceData MigrationInformation ArchitectureMicrosoft AzureAsset ManagementInformation Security Awareness - $134 hourly
- 5.0/5
- (26 jobs)
As a dedicated father, husband, and business owner, I am a technology leader with over 20 years of experience in driving innovation and business growth. My passion lies in leveraging my curiosity, technical expertise, and business acumen to solve technology challenges for businesses. Known as the "MacGyver of Tech," I thrive on problem-solving and innovation, bringing a unique blend of engineering, disruptive technology design, and data science to every project. I have significant experience working with companies and teams of all sizes, consistently leading IT initiatives that enhance operational excellence and cost-effectiveness. As an expert in Artificial Intelligence with extensive experience in ChatGPT, I specialize in helping companies organize, formalize, fundraise, and execute rapid growth strategies. My ability to bridge the gap between technology and business enables me to foster innovation and deliver tangible results. I am always eager to connect with like-minded professionals and explore opportunities to collaborate on transformative projects. My personal specialties include: AI, email deliverability (MX, SPF, DKIM, DMARC, TXT), mobile app development (iOS, Android), technology consulting, CRM (Hubspot, Salesforce) builds, business analysis, operations, email marketing, lead generation, and product development launches.Information SecurityArtificial IntelligenceEmail DeliverabilityIT ConsultationComputer NetworkMicrosoft Hyper-V ServerVMWareAPICRM SoftwareCompany PolicyLeadership SkillsWindows ServerMicrosoft AzurePHP - $205 hourly
- 5.0/5
- (16 jobs)
Experienced IT Professional: Delivering High-Quality Solutions from the U.S. Innovative IT expert with a diverse skill set spanning technical implementation, resource management, and project oversight. Committed to delivering cutting-edge technological solutions for clients across the United States. Key Technical Skills: - Network Analysis and Visibility - Resource Management - Staff Recruitment and Retention - Administrative Oversight - [Add 2-3 more specific technical skills here] Notable Achievements: - Designed and implemented a Network Analysis and Visibility platform, resulting in [X%] improved network efficiency and [Y%] reduction in downtime for clients. - Successfully managed and grew a team of [number] IT professionals, achieving [Z%] increase in project delivery speed. Professional Background: - U.S. Navy Veteran: Served as an Avionics Technician, honing problem-solving skills and attention to detail. - Education: Supplemented self-directed learning with courses at College of DuPage, Lansing Community College, and Northern Virginia Community College. Why Choose Me: - Committed to delivering all work from within the United States, ensuring seamless communication and alignment with U.S. business practices. - Proven track record of translating complex technical concepts into practical, client-focused solutions. - Dedicated to continuous learning, staying ahead of emerging technologies to provide cutting-edge solutions. - Strong emphasis on clear communication and meeting project deadlines.Information SecuritySolution ArchitectureAWS CloudFormationAmazon S3Security AnalysisAmazon EC2AWS LambdaComputer NetworkServerless ComputingNetwork Penetration TestingComplianceAmazon Web ServicesNetwork SecurityPython - $80 hourly
- 5.0/5
- (271 jobs)
I’m a certified Google Workspace administrator with more than 10 years of Google Workspace experience. I have planned, deployed and migrated small, medium and large size companies from many different business sectors such as: Health Care, Finance and Insurance, Food Services, Higher Education, Technology, Software Development, Manufacturing, Marketing Agencies, Venture Capital and many others. I have successfully migrated over 500 companies to Google Workspace from many different sources, including but not limited to: Office 365, Hosted Exchange, on premise Exchange, Google Workspace, POP servers, IMAP servers (Gmail, Yahoo, AOL and others), Lotus Domino, SharePoint, Box and Dropbox. I will not only plan, coordinate and execute your data migration, but I will also take care of the project management aspect, I will help you to: assess, plan, coordinate, communicate and execute your full transition to Google Workspace. If you have an existing Google Workspace account, I can help you as well, I have experience in the following areas. -Backup solutions -Archiving solutions -Cybersecurity audits -Encryption -Google Drive migrations -Complex email rules -Ransomware prevention - Protecting your company’s data with security options like 2-step verification and single-sign-on -Third party apps integration (Zoom, Slack, Zoho CRM) -DNS (MX, SPF, DKIM and DMARC) Let’s schedule a meeting so you can learn more about my services.Information SecurityEmail CommunicationBackup & MigrationCloud SecurityGoogleCloud ComputingDomain MigrationComputer SkillsSingle Sign-OnData MigrationCustomer ServiceGoogle Cloud PlatformMicrosoft WindowsSystem AdministrationDNS - $35 hourly
- 5.0/5
- (4 jobs)
My name is Jalen Morgan and I am currently a Cyber Officer in the US Army. Armed with expertise in numerous programming languages such as C/C++, Scala, Java, Python, Javascript, HTML/CSS and even bash scripting, Network Security and Incident Response, I have a broad range of skills. My academic background includes a B.S. in Computer Science and proven contributions to the OpenWPM project. As a collaborative team player, I adapt seamlessly to dynamic challenges and showcase a track record of achieving tangible results.Information SecuritySystem AdministrationReduxNode.jsReactJavaScriptBashDigital ForensicsC++CJavaMachine LearningScalaPythonComputer Science - $75 hourly
- 5.0/5
- (7 jobs)
Hi! I am 𝗨𝗦-𝗯𝗮𝘀𝗲𝗱 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 𝗮𝗻𝗱 𝗖𝘆𝗯𝗲𝗿 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗽𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 with over 13 years of experience. I specialize in crafting robust security strategies and managing global projects to safeguard critical data and systems. 𝗖𝗼𝗿𝗲 𝗘𝘅𝗽𝗲𝗿𝘁𝗶𝘀𝗲 𝗶𝘀: ✅ Cybersecurity Strategy and Implementation ✅ Governance, Risk, and Compliance (GRC) Management ✅ Identity and Access Management (IAM) ✅ Application and Data Security ✅ Threat and Vulnerability Management 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗛𝗶𝗴𝗵𝗹𝗶𝗴𝗵𝘁𝘀: ✅ Successfully managed global projects involving Application and Data Security, Email Phishing, Vendor Risk Assessment, SIEM, PCI-DSS, Data Loss Prevention, SOX, Mobile Security, Cloud Virtualization, and Security Awareness. ✅ Worked with esteemed organizations such as Equifax, Johnson, Abbott, Royal Bank, Ericsson, Huawei, and NCR. ✅ Proficient in Agile and SCRUM methodologies, with hands-on experience in the Software - Development Life Cycle (SDLC) from Requirement Analysis to Post Production Support. ✅ Skilled in Risk, Budget, Schedule, Change, and Quality Management. 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀: 🏆 CISSP - Certified Information Systems Security Professional, 2018 🏆 CSM – Certified Scrum Master, 2018 🏆 CISM – Certified Information Security Manager, 2018 🏆 CGEIT – Certified in Governance of Enterprise IT – 2018 🏆 CISA – Certified in Information Security Audit – 2018 🏆 CRISC – Certified in Risk and Information Systems Control – 2018 🏆 PMP - Project Management Professional, 2009 🏆 ITIL - Information Technology Infrastructure Library, 2010 --- Keywords: Cybersecurity, Information Security, Network Security, Application Security, Data Security, Cloud Security, Mobile Security, Identity and Access Management (IAM), Threat and Vulnerability Management, Risk Management, Governance, Risk, and Compliance (GRC), Security Operations Center (SOC), Security Information and Event Management (SIEM), Data Loss Prevention (DLP), Incident Response, Penetration Testing, Ethical Hacking, Security Awareness Training, Cyber Threat Intelligence, Malware Analysis, Phishing Prevention, Endpoint Security, Compliance Audits, PCI-DSS, SOX Compliance, GDPR Compliance, HIPAA Compliance, ISO 27001, NIST Cybersecurity Framework, Security Policies and Procedures, Firewall Management, Intrusion Detection and Prevention Systems (IDPS), Cryptography, Secure Software Development, DevSecOps, Cyber Risk Assessment, Vendor Risk Management, Cybersecurity Consulting, Cybersecurity Strategy, Security Architecture, Cyber Forensics, Cyber Incident Management, Cybersecurity Frameworks, Cybersecurity Maturity Model, Zero Trust Security, Multi-Factor Authentication (MFA), Security Testing, Vulnerability Scanning, Security Compliance, Business Continuity Planning, Disaster Recovery Planning, Security Audit, Security Metrics and Reporting, Security Governance, Security Standards, Access Control, Cyber HygieneInformation SecurityCybersecurity MonitoringVulnerability AssessmentSecurity Assessment & TestingComplianceThreat DetectionPenetration TestingRisk ManagementInternet SecurityEmail SecurityCloud SecuritySystem SecurityNetwork SecurityApplication SecurityCybersecurity Management - $60 hourly
- 5.0/5
- (11 jobs)
I am a dedicated and experienced data scientist with a profound ability to transform raw data into actionable insights through compelling visualizations and data storytelling. My expertise lies in developing interactive dashboards and creating visual narratives that drive informed decision-making. With a strong foundation in tools such as Excel, Power BI, and Python, I am adept at analyzing complex datasets and presenting them in a manner that is both understandable and impactful. My academic journey includes a Bachelor of Science in Cyber Security from Western Governors University, completed in 2021, and I am currently pursuing a Master's degree in Applied Data Science from the University of Michigan, with an expected graduation in 2026. This academic background has provided me with a robust understanding of both cybersecurity and data science, allowing me to approach data analysis with a unique perspective that integrates security considerations. Throughout my career, I have successfully completed several projects that showcase my ability to deliver high-quality data science solutions. I have developed multiple interactive dashboards that have been instrumental in business intelligence and decision-making processes. My data visualization projects have uncovered critical insights and trends within large datasets, enabling stakeholders to make data-driven decisions with confidence. My storytelling approach to data ensures that complex findings are communicated effectively to both technical and non-technical audiences. In addition to my practical experience, I hold numerous certifications that validate my expertise and commitment to continuous learning. I am a GIAC Python Coder (GPYC), proficient in data structures, regex writing, and API development. My credentials also include the Global Industrial Cyber Security Professional (GICSP) certification, which highlights my skills in information security, change management, configuration management, system security, and network security. As a GIAC Certified Intrusion Analyst (GCIA), I possess specialized knowledge in intrusion prevention systems, IPv6, research protocols, and analytical presentation. My role on the GIAC Advisory Board further demonstrates my leadership and expertise in system security, data protection, network security, and information security. I am also a certified GIAC Machine Learning Engineer (GMLE), with skills in scripting, neural networks, genetic algorithms, statistical infographics, and anomaly detection. Additionally, I hold the Google Data Analytics Professional Certificate, which has equipped me with advanced skills in data cleaning, data analytics, mathematical optimization, SQL, and data visualization. My credentials extend to the realm of project management and cybersecurity, with certifications such as the CompTIA Project+ and CompTIA Network+ ce. These certifications underscore my capabilities in project management, network engineering, and IT procurement, among other areas. My comprehensive skill set is further enhanced by the CompTIA Secure Infrastructure Specialist and CompTIA A+ ce certifications, which attest to my proficiency in troubleshooting, cloud computing, technical support, and system security. As a dedicated professional, I am committed to leveraging my extensive experience and certifications to deliver exceptional data science and cybersecurity solutions. I am passionate about helping organizations harness the power of their data to achieve their goals. Let's connect and discuss how I can contribute to your data-driven success.Information SecurityAnomaly DetectionNeural NetworkScriptingMachine LearningData VisualizationPower QueryData CleaningCyber Threat IntelligenceData AnalyticsData ScienceMicrosoft Power BIPythonSQLMicrosoft Excel - $35 hourly
- 4.8/5
- (108 jobs)
I am a passionate PhD aspirant in Software and Network Security Engineering, possessing an experience of 6.5+ years in this field. I bring extensive expertise in Computer Science and Cybersecurity, specializing in a range of projects such as security hardening, ethical hacking, incident response, network security programming, cryptography, information security audits, computer forensics, and penetration testing (Kali Linux). My track record includes successfully managing diverse IT tasks, from programming (C, C++, Java, Python, PHP, JavaScript, SQL, .Net, Ruby) to IoT, operating systems, data structures, cloud computing, web and mobile development, data mining, artificial intelligence, and machine learning. Not only that but I also ace at Academic Writing, Technical Report Writing, Research proposal, Reviewing, Editing and Providing Assistance/Tutoring in all subject areas of Computer Sciences, ML and Cybersecurity. I also hold experience in mentoring and supervising Undergraduate and Postgraduate students. Should you require my services in any of the aforementioned areas, (or other tasks too) please message me before placing an order and I shall assist you to the best of my ability. Keywords:- Technical Writing, Systematic review & Meta-analysis, Article Review, Research Report, Thesis/Dissertation assistance, Statement of Purpose, Literature Reviews, Academic Writing, Annotated Bibliography.Information SecurityAcademic WritingPenetration TestingEthical HackingAcademic ResearchPythonTechnical DocumentationInformation TechnologyResearch PapersComputing & NetworkingData ScienceMachine LearningArtificial IntelligenceWeb DevelopmentNetwork Penetration TestingInternet of Things SoftwareComputer NetworkComputer Science - $50 hourly
- 5.0/5
- (3 jobs)
Experienced & certified Sr Cloud Architect and engineer with over 14 years of expertise in on-prem and public cloud Infrastructure. Certified in Azure and AWS technology, with focus on building highly secure, resilient, and cost-effective solutions. Process oriented individual capable of working in high stress situation and managing critical projects. Deployed, migrated and managed over 500+ virtual machines, storages, and network systems worldwide including four Azure regions and AWS. Migrated 5+ full sites, 100+TB Data, 100+DB, 100+VMs to Azure using Migrate, Vnet, VM, storage account, site recovery, Azure SQL, Monitor, Defender, Policy, key vault, app services, functions, app services, Application Gateway, VPN, Firewall and many more services into five different regions. Deep understanding of Iaas, SaaS, PaaS, DRaaS and designed cost effective yet highly secure and high performance cloud solutions. Strong knowledge of ARM templates and automation using Powershell & Terraform and Azure CLI scripting. Designed Azure & private cloud architecture across 5 regions and 5 data centers focusing on high availability, security, budget, redundancy, DR/BCP and compliance. Deployed hybrid Microsoft 365 and its core Office Products, Exchange, SharePoint & Teams as well implemented data loss prevention policy, data lifecycle & data classification under Purview. Implemented Azure AD, AD Connect, identity governance, identity security, conditional access, identity protection, access review, MFA, PIM, license and enterprise apps. Created and managed DNS, Domain, Active Directory (Azure and On-Prem), Group Policy Objects, DHCP, Groups, SSL certificate, load balancer and exchange server 2019. Configured on-prem & Azure firewall, web application firewall, load balancer for web applications. Planned and executed organization’s disaster recovery plan to failover core client systems to cloud and remote datacenter for business continuity using Azure site recovery and Zerto. Oversaw deployment of mobile device management program to control and protect organizations data over cellphones, laptops. Configured compliance policy, configuration policy along with conditional access polices and mobile application management policy. Enforced and supervise organizations advanced threat protection systems, data loss prevention solutions using Microsoft 365 defender for endpoint & Defender for cloud for Azure services. Configured SCCM with many global distribution points for security patch, application and OS deployment and defender patch using ADR for 2000+ systems. Primary architect for deploying, maintaining enterprise class security, network and systems for enterprise application and solutions to Azure and AWS. PROFESSIONAL CERTIFICATES Microsoft Certified: Azure Solutions Architect Expert Microsoft Certified: Azure Security Engineer Associate Microsoft Certified: Azure Administrator Associate AWS Certified Solutions Architect Associate AWS Certified SysOps Administrator – Associate Microsoft Certified: Identity and Access Administrator Associate Microsoft Certified: Azure FundamentalsInformation SecurityMicrosoft Endpoint ManagerMicrosoft AzureOffice 365Microsoft Active DirectoryAmazon Web ServicesSystem AdministrationMicrosoft SCCMISO 27001Microsoft Hyper-V ServerWindows AdministrationIT InfrastructureCloud ComputingCloud ArchitectureFirewall - $150 hourly
- 5.0/5
- (12 jobs)
📣 Unlock Enterprise Sales with Expert Compliance and Security 📣 Struggling to meet compliance requirements like ISO 27001, SOC 2, or FedRAMP? Losing clients and revenue due to security gaps? Overwhelmed by the complexity of securing AI products? Your Solution: A Virtual CISO (vCISO) Service that has been an actual CISO at a Silicon Valley Startup and has successfully taken each and every client through audit on the first attempt Why Choose Me? 🔒 Experienced: I have over 25 years of experience in Cybersecurity and compliance including multiple SOC2 Type 1 and Type 2. CMMC, NIST 800-171, ISO 27001, FedRAMP, PCI-DSS, HIPAA projects delivered. 🔒 Expertise in AI Security: Specialize in securing AI-focused SaaS solutions for enterprise clients (Responsible AI). 🔒 Cost-Efficient: Save thousands by choosing the right security tools and strategies. 🔒 US Based with Global Support: Available across all time zones for long-term engagements. 🔒 Certified Professional: CISSP, CCSP. 🔒 US Veteran 📣 Client Testimonials 📣 “Huge impact” We are an early stage startup that was lucky to get Debra to come in as vCISO. She is running our SOC2 program and helps us navigate the space. She is responsive, experienced, and easy to work with, I highly recommend using TrustedCISO services. - CTO, Uniform.dev "Debra played a critical in RedSeal’s SOC 2 audit, third party risk management, and security programs. She authored many of the security policies, interviewed prospective auditors, and worked with the rest of the organization to prepare them for the SOC 2 audit. Debra ran the initial risk assessment and crafted associated controls that best aligned with RedSeal's goals. She successfully interfaced with the auditors to obtain SOC 2 Type 1 and Type 2 within the planned timelines and budget." - CTO, RedSeal 💪 Tools and Frameworks Security Questionnaire Tools: CyberGRX, OneTrust Compliance Management: Drata, Vanta, SecureFrame Frameworks: SOC 2, ISO 27001, FedRAMP, NIST 800-53, HIPAA, CMMC, StateRAMP, PCI-DSS Not a Fit For ❌ Hacking or unauthorized access requests ❌ Filling out security questionnaires without implementing controls ❌ Creating falsified audit reports Contact Me Click the green invite button to get started. Let's secure your business and accelerate your enterprise sales.Information SecurityPolicy WritingCompany PolicyDisaster RecoverySOC 2CMMCCloud ComputingCloud Security FrameworkInformation Security AwarenessGovernance, Risk Management & ComplianceCloud SecurityInformation TechnologyISO 27001Public Speaking - $150 hourly
- 4.9/5
- (9 jobs)
Cybersecurity Expert Helping Companies Establish Robust Security Postures. Cybersecurity leader with over 25 years of experience securing critical systems and data for global corporations. Helped clients improve security compliance scores by 95% and reduce incidents by 75%. Passionate about making cybersecurity understandable and developing resilient security strategies Security audits and risk assessments ($150/hr) I evaluate your infrastructure, policies, and procedures to identify vulnerabilities and provide a risk-rated report with remediation recommendations. Compliance consulting for regulations like HIPAA, PCI DSS, etc. ($200/hr) I ensure your security controls, processes, and governance meet industry compliance standards through gap assessments, audits, and ongoing advisory. Incident response and forensic analysis ($250/hr) I contain breaches, investigate compromised systems, preserve evidence, and provide reporting to understand impact and prevent future incidents. Cloud security reviews and best practices ($175/hr) I assess your cloud architecture, configurations, and controls to identify risks, optimize security posture, and apply cloud-native protections. Security awareness training ($150/hr) I develop engaging training customized to your organization to educate staff on cybersecurity best practices and threats through interactive modules. Virtual CISO services ($300/hr) I act as your outsourced CISO to provide ongoing strategy, leadership, and expertise to build a resilient cybersecurity program. Cybersecurity program development ($250/hr) I partner with you to build a cybersecurity program from the ground up, including policies, controls, technologies, training, and governance. Let me know if you need any clarification or have additional questions! I look forward to working with you and your team! Thank you! Sam SawalhiInformation SecurityCybersecurity MonitoringNIST Cybersecurity FrameworkCyber Threat IntelligenceSecurity InfrastructureSecurity ManagementSecurity FrameworkCompliance ConsultationGovernance, Risk & Compliance SoftwareExpertComplianceGovernment Reporting ComplianceInformation Security ConsultationCybersecurity ManagementSecurity Assessment & Testing - $125 hourly
- 5.0/5
- (48 jobs)
I'm an IT and Cybersecurity leader with 25 years experience doing everything from linux system administration, to network design and implementation, database administration, cloud management, security evaluation, incident response, and more.Information SecuritySSLSSL CertificateNetwork EngineeringNetwork SecurityDNSUbuntuVPNDatabaseLinuxPythonAmazon Web ServicesInformation TechnologyCybersecurity ManagementSystem Security - $45 hourly
- 5.0/5
- (7 jobs)
With over 10 years in cybersecurity and 7+ years specializing in penetration testing, I’ve led and executed hundreds of assessments across diverse environments—web applications, internal/external networks, red/purple teams, cloud infrastructures, social engineering, mobile platforms, and even physical security. I’ve had the privilege of consulting for some of the biggest Fortune 500 companies, including PayPal, Berkshire Hathaway, TikTok, Meta, Tesla, Saudi Aramco, and more, delivering actionable insights to strengthen their security postures. Additionally, I spent over 9 months working alongside leading financial and social media companies, optimizing and expanding network infrastructures with 100,000+ devices, ensuring streamlined and secure operations at scale. Whether you're a small business or an enterprise, I bring proven expertise to identify vulnerabilities, mitigate risks, and secure what matters most. Let’s build a stronger, more resilient security framework together! 🔢 My stats are: ✅ Saved tens of thousands of dollars for Forbes 500 clients by identifying critical vulnerabilities ✅ Professional certifications (OSCP, GCPN,Security+) ✅ Top 10 in HackTheBox Team Global Rank ✅ Won 2022 DEF CON 30 CTF Competition ✅ Supporting all time zones ✅ Long-term engagements 🔢Core Competencies: 1. Network Penetration Testing 2. Web Application Penetration Testing 3. Social Engineering (Phishing, Vishing) 4. Cloud (Azure/AWS ) Penetration Testing 5. Security Training 6. Defensive Solution Configurations/Reviews (Security Engineering) 7. Malware Analysis 8. Cyber Risk Analysis 9. API Penetration Testing 10. Mobile Penetration Testing 11. External Network Penetration Testing 12. Vulnerability Assessment Testing ✅I love finding vulnerabilities. Whether those vulnerabilities exist in your firewall configuration, your employee training, or under your security fence, I will identify, triage, and alert you of threats before an attacker turns them into the next front page news story. 🔢Working with me, you will: ✅ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ✅ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ✅ Complete manual testing for your application and immediate notification if any high-impact issues are found. ✅ Unlimited retesting for the fixed issues and unlimited revisions ✅ Able to find critical bug classes that are often missed by automated pentests. 🔢NOTE: If you want to see my past reports I have done with previous clients know that reports contains sensitive information, NDA is signed for most of them especially from Gov & Forbes 500 clients. Disclosing information like that is breach of client privacy. However, I can share sample report with sensitive information hidden. Skills: Penetration Testing: Extensive experience conducting penetration tests, red team exercises, and purple team engagements across various platforms, including but not limited to, web applications, APIs, wireless, physical, network infrastructure, cloud environments (AWS & Azure), and other devices. Security Tools: Proficient in utilizing a wide range of security tools such as Burp Suite, Metasploit, C2 frameworks, Mythic, Sliver, bloodhound, etc. for penetration tests and red team operations. Defensive and Monitoring Technologies: Familiarity with defensive and monitoring technologies, including Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), Web Application Firewalls (WAF), and Security Information and Event Management (SIEM) solutions. Programming and Scripting: Proficient in scripting languages such as Python and Bash. Skilled in modifying and executing exploits and proof-of-concepts (POCs) to evade defensive countermeasures and emulate threat actor tactics, techniques, and procedures (TTPs). Cybersecurity Compliance: Familiar with security compliance requirements and industry standards, including MITRE ATT&CK, Cyber Kill Chain, HIPAA, NIST Cybersecurity Framework, and OWASP. Communication and Collaboration: Excellent communication and reporting skills to effectively communicate technical issues to both technical and non-technical stakeholders. Proven ability to work independently and collaboratively in a team environment.Information SecurityOWASPRed Team AssessmentNIST Cybersecurity FrameworkSecurity TestingCloud SecurityWeb App Penetration TestingNetwork Penetration TestingPenetration TestingCompliance - $85 hourly
- 4.9/5
- (43 jobs)
Security engineer and technical editor/writer specializing in cybersecurity architecture, operations, compliance/audit readiness, vulnerability scanning/pen testing, and technical documentation. Experience drafting security policies/procedures, and conducting cybersecurity framework mapping/pre-audit prep for NIST, PCI DSS, SOC2, HIPAA, HITRUST, GDPR, ISO 27001, and privacy and security frameworks. Proven track record of technical team and project management.Information SecurityHIPAATechnical DocumentationNIST SP 800-53ISO 27001Technical WritingIT Compliance AuditSOC 2 ReportInternet SecuritySecurity InfrastructureApplication SecurityPenetration TestingCybersecurity ManagementSystem Security - $100 hourly
- 4.8/5
- (25 jobs)
Nick Oles is a cybersecurity expert with over 15 years of operational experience in military, industry, and academic environments. He has worked on incident response and threat-hunting teams and consulted with Fortune 150 organizations, small businesses, and US Department of Defense entities. Nick has served his country for over a decade in the cyber and special operations communities, earning multiple military accolades, completing worldwide deployments, and serving in joint special operations environments. He has advised award-winning academic centers on cyber-program development and management, as well as created and taught academic and certification courses on a variety of cybersecurity topics. I am a published author from a major technical publishing company. Specialties Include: Intrusion Analysis Technical Writing Security Consulting Threat Hunting Blogging Cyber Threat Intelligence Incident Response Cybersecurity Instruction Investigations Avoiding Evil, Having Fun, Doing Things Well My current certifications include SANS GSLC, GPEN, GCIA, GOSI, GCIH, GCTI, CEH, Network+. I am also working on completing a course to become a Certified Virtual CISO (CvCISO) certification with SecurityStudio.Information SecurityTechnical WritingContent EditingContent CreationContent WritingEmail Security - $85 hourly
- 4.9/5
- (30 jobs)
I'm a full stack web developer with 14 years of experience under my belt (working as a web developer since 2008), mostly with WordPress (including WooCommerce and other popular plugins). I have proven WordPress skills and lots of experience on various WordPress-based projects, both front- and back-end. I also have a plenty of experience of team work, so I'm well familiar with team workflow and methodologies/tools used for that. My primary expertise: - Full stack web development for WordPress, including WooCommerce - Building custom themes and plugins - API integrations (including custom) - Strong troubleshooting skills - Performance (cache setup, Core Web Vitals optimization etc) - Security (malware removal, hack prevention) - Hosting and server setup and maintenance (Linux, SSH, DNS, Google Cloud, AWS, Digital Ocean) - Email deliverability troubleshooting (SPF, DKIM, DMARC setup, etc) Typical tasks I can help you with: - Building WP websites from scratch - Building custom themes or plugins - Customization and maintenance of existing websites/themes/plugins - Page speed optimization (improve website performance, load speed and Core Web Vitals) - Harden WordPress security and remove malware Don't hesitate to inquire about your project, I'm looking forward to hearing from you!Information SecurityWeb DevelopmentBootstrapPage Speed OptimizationMalware RemovalWordPress ConsultationWordPress Malware RemovalWordPress Bug FixWordPress SecurityWordPress DevelopmentWordPress MigrationWordPress PluginWooCommerceWordPress ThemeWordPress - $50 hourly
- 5.0/5
- (50 jobs)
🌟 Top Rated Freelancer 🌟 🎓 The Pennsylvania State University Bachelor of Science, Information Sciences and Technology Hi there! I’m Michael, a seasoned technology professional with over a decade of experience in the industry. Having honed my skills through real-world challenges, I bring a wealth of knowledge to the table. Whether it’s troubleshooting existing solutions, project management, system architecture, or ongoing maintenance, I thrive on solving complex problems. ⭐ Here are some examples of software I am familiar with ⭐ ✅ Apache | Nginx | LiteSpeed | MySQL | PhpMyAdmin | CWP | WHM | cPanel ✅ Apple Business Manager | JAMF ✅ Google Workspace | Microsoft 365 ✅ Home Assistant ✅ Linux | macOS | iOS | Windows XP-11 | Windows Server 2008-2025 | TrueNAS ✅ NGINX Proxy Manager ✅ PfSense | Ubiquiti | Brocade | Smoothwall | Aerohive | OpenVPN ✅ UniFi Protect, ViMonitor Security Systems ✅ WordPress ✅ XCP-NG | Xen Orchestra ⭐ Why you should choose me over other freelancers ⭐ ✅ I am a proud alumnus of Penn State, where I cultivated a passion for innovation and collaboration. My journey has led me to work on diverse projects, from cutting-edge startups to established enterprises. ✅ Client Reviews: My reviews speak for themselves. I work hard for every client to ensure they are always satisfied with the results. ✅ Responsive: I am always quick to respond, even on weekends! ✅ Communication: Clear, concise, and client-focused. ✅ Flexible: I can work flexible hours or even assist with emergency ✅ Over-delivering: this is core to my work as a freelancer. My focus is on giving more than what I expect to receive. 🏅 Reviews and feedback from clients 🏅 The client reviews below (also in my work history section) show the quality of work and value that you can expect. ⭐⭐⭐⭐⭐"Micheal is an extremely knowledgeable professional. His attention to detail, responsiveness and clarity of communications are at the highest level. He is a master of suggesting a solution when one does not seem to be there. Truly one of the best." ⭐⭐⭐⭐⭐ "Michael was excellent, super quick and efficient. He also recommended things that I was unaware of and am very appreciative of. I will definitely be hiring him again in the future. Thanks again." ⭐⭐⭐⭐⭐ "Very patient and helpful. Everything about the backend of GSuite and Domains is baffling to me. Michael did a very thorough migration, review, editing and updating of my entire account. He was prompt and asked questions instead of assuming details (HUGE+ to me). I will be happy to recommend him to anyone and will seek him out for future projects in this field." Let’s connect and discuss how I can contribute to your next project! 🚀Information SecuritycPanelUbiquitiPfSenseGoogle WorkspaceWordPressCitrix HypervisorLinux System AdministrationCloud ComputingGoogle Cloud PlatformWindows Server - $150 hourly
- 4.9/5
- (18 jobs)
As an experienced Azure and Microsoft 365 professional, I specialize in cloud security, compliance, and identity & access management. With expertise in technologies such as Exchange Online, Teams, Defender, Purview, and Entra Azure AD, I have developed a deep understanding of the latest cloud security and identity best practices. I am passionate about helping businesses leverage the power of the cloud to achieve their goals while ensuring the highest levels of security and identity protection. With over 10 years of experience in the industry, I have a proven track record of designing, implementing, and managing secure cloud environments, managing identity and access controls, and ensuring compliance with industry standards. I have a keen eye for identifying vulnerabilities and implementing measures to mitigate risks. My goal is to help clients optimize their cloud infrastructure while providing the highest levels of security and identity protection. If you are looking for a reliable and knowledgeable Azure and Microsoft 365 security and identity expert, let's collaborate to unlock the full potential of your cloud infrastructure.Information SecurityInformation Security ConsultationOffice 365Microsoft Azure AdministrationFirewallEmailDNSSecurity ManagementMicrosoft Exchange OnlineMicrosoft AzureCloud SecuritySecurity AnalysisInformation Security GovernanceMicrosoft Active DirectorySolution Architecture Consultation - $80 hourly
- 5.0/5
- (5 jobs)
Over 25+ years of real-world IT experience with heavy exposure to security, vulnerability & risk assessments, penetration testing, ERP systems and Microsoft SQL Server. Experienced with the following tools/processes: CrowdStrike, penetration testing, OSINT, Burpsuite, Greenbone vulnerability scanner, Kali Linux, Metasploit Framework, OWASP Zap, MITRE Attack Framework, GRC, BCP/DR, Google Cloud, ELK Stack, Python, C# Well-versed in security assessments based on NIST 800-53 security controls, vendor risk analysis & SOC 2 reviews, creating security awareness training & phishing campaigns, and policy/procedure writing. Specializing in: - Information Security - Project management - System administration - Database & system design - ERP systems (Financials, HR, and Budgeting)Information SecurityNIST Cybersecurity FrameworkWebsite SecurityInformation Security AuditInternet SecurityInformation Security AwarenessInformation Security GovernanceMicrosoft SQL Server AdministrationEnterprise Resource PlanningProject ManagementSystem SecurityCybersecurity Management - $75 hourly
- 5.0/5
- (164 jobs)
As a Certified Information Privacy Professional (CIPP/US), I provide privacy law advice and specialized privacy notices, terms and conditions, and related documents for business, website, mobile app, and SaaS owners. This helps my clients comply with U.S. and global privacy laws and regulations. SUBJECTS OF SPECIALIZATION • Draft globally compliant privacy notices for website, mobile app, and SaaS owners. • California Consumer Privacy Act (CCPA), (CPRA), and other U.S. state privacy laws. • General Data Protection Regulation (GDPR), Canadian, and other global privacy laws. • Data Subject Access Requests (DSARs). • International transfer of data and standard contractual clauses. • Data controller processor regulations and data processing agreements. • Risk management, ISO 2700, and NIST Cybersecurity Framework • Blockchain technology, cryptocurrency, and artificial intelligence (AI). • Assessing vendors and processors. • Privacy impact assessments, data mapping, and record of processing activities. • COPPA and global children and student privacy laws. • HIPAA and HITECH compliance and data protection policies. • Comprehensive data management from the beginning of the cycle to the end. • Internet advertising laws and regulations. My services also include drafting documents and providing guidance including, but not limited to the following: • Privacy notices to comply with the CCPA, US, GDPR, and global privacy laws • Data processing agreements between controllers, processors, and subprocessors • Standard contractual clauses • Data privacy impact assessments • Data protection policies • Data subject access requests (DSARs) response letters • Children's privacy notices to comply with COPPA and global privacy laws • Privacy law training • NIST and cybersecurity frameworks • Internet terms and conditions --- It's the little things in documents most people do not see that protect or hurt their business.Information SecurityLegal WritingComplianceData PrivacyHIPAABusiness DevelopmentPolicy WritingPrivacy LawGDPR - $250 hourly
- 5.0/5
- (33 jobs)
As a Top Rated vCISO with a 100% job success rate, rest assured that I execute at a high level of expertise, integrity, and professionalism. I am the President & Founder of Aspire Cyber, a full-service consulting firm that rapidly delivers privacy and cybersecurity compliance solutions to help small and medium-sized businesses satisfy their legal, regulatory, and contractual requirements. Aspire Cyber was founded on the core belief that every business should have access to world-class cybersecurity talent, regardless of budget or security needs. I have over 20 years of experience managing information security projects and implementing strategic cybersecurity controls for the United States Army, Bank of America, and numerous Fortune 100 companies. We offer entirely “Done For You” solutions that help your business rapidly achieve compliance while we manage everything. Don’t waste 6-18 months trying to figure this out yourself. Regulatory and industry cybersecurity frameworks have hundreds of different controls you must comply with and require knowledge of IT, Cybersecurity, HR, Legal, and more. Aspire Cyber is a leading provider of comprehensive cybersecurity compliance solutions. Our team of experts has a proven track record of implementing NIST SP 800-171 practices to help defense contractors achieve Cybersecurity Maturity Model Certification (CMMC). We make it easy for your business to prove it's a safe choice for handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Schedule a free call with me to learn how our team of dedicated cybersecurity experts can help save you months of time and, in many cases, five or even six figures in excessive spending trying to become compliant without expert guidance. ★High Profile Clients ✔ I worked for the United States Army, Lockheed Martin, Bank of America, Hewlett-Packard Enterprise, and many others. Aspire Cyber specializes in the following areas: ★ Risk Assessment and Auditing - We have conducted over 200 Information Security, Business Continuity, and Cloud assessments. -Compliance (NIST, PCI, HIPAA, ISO 27001, GDPR, CCPA, COPPA, FedRAMP) - Cybersecurity Advisor -Cloud Secure Design -Data Privacy Officer (DPO) -Cloud Security -Policy Writing -Penetration Testing -Application Security -Incident Response -Vulnerability Management -Third-Party Risk Management -Security Awareness Training ★ I hold the following degrees and certifications: ✅ Certified CMMC Assessor (CCA) ✅ Certified CMMC Professional (CCP) ✅ CMMC Provisional Instructor ✅ Certified Information Systems Security Professional (CISSP) ✅ Certified Cloud Security Professional (CCSP) ✅ Certified Information Security Manager (CISM) ✅ Certified Risk and Information Systems Control (CRISC) ✅ CMMC Registered Practitioner ✅ CompTIA Security+ ✅ CompTIA A+ ✅ Master of Business Administration (MBA) ✅ Graduate Certificate Cybersecurity Technology WHY CHOOSE ASPIRE CYBER? -Professionalism: We treat all clients respectfully and adhere to the highest ethical standards. -Fast: We always aim to deliver your project ahead of schedule. -Expertise: We have vast experience across various cybersecurity and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. 🙋🏼♂️Our team is eager to partner with your organization to deliver cybersecurity compliance solutions rapidly. Contact Aspire Cyber today to learn how we can fulfill your cybersecurity needs.Information SecurityCloud Security FrameworkNIST SP 800-53Policy WritingInformation Security GovernanceFedRAMPInformation Security AwarenessRisk AssessmentNIST Cybersecurity FrameworkBusiness Continuity PlanInformation Security AuditIncident Response PlanSecurity TestingVulnerability Assessment - $165 hourly
- 5.0/5
- (29 jobs)
I am an accomplished and experienced Cyber Security Engineer, CISO, and consultant with over 20 years experience in government, commercial, non-profit and private organizations. I'm a Certified Information Systems Security Professional (CISSP) and CMMC Registered Practitioner. My education includes a Master's degree in Information Assurance and Security specializing in Digital Forensics, a Bachelor's Degree in Information Technology, and daily, hands-on work governing, securing and administering complex information technology environments. My current efforts include cybersecurity compliance implementations for regulated industries and government contractors including the NIST Cybersecurity Framework, Risk Management Framework, NIST SP 800-171, and Cybersecurity Maturity Model Certification (CMMC). For those not bound to other regulatory guidelines, I assist with implementation of the Center for Internet Security (CIS) Critical Security Controls and the CIS Risk Assessment Method. I assist with expert advice, gap assessments, requirements and implementation reviews. I help develop and refine cybersecurity documentation including System Security Plans, POA&Ms, and Policies and procedures. I will share national background check results for qualified opportunities.Information SecurityGap AnalysisVulnerability AssessmentCybersecurity MonitoringAmazon Web ServicesGovernance, Risk Management & ComplianceSecurity EngineeringCloud SecuritySecurity Policies & Procedures DocumentationInformation Security AwarenessCybersecurity ManagementNetwork SecurityCertified Information Systems Security Professional - $50 hourly
- 5.0/5
- (6 jobs)
Effective writing ensures readers act on your message. My decade of experience will help you secure results. Freelancing for more than ten years with diverse interests has made me highly skilled at delivering content on time for a wide range of clients. I've written serious journalism for news outlets, including Salon and Vice, and ghostwritten hundreds upon hundreds of blog posts, including for some of the biggest names in information technology. I've also written for educational publishers, creating teacher guides and other instructional material. In marketing, I've written for law firms and musicians, among others. My experience means I can quickly distill complex subjects into lean prose that captures audience attention and converts it into your success. What sets me apart is my ability to produce quality work that's both thorough and reader friendly. It goes without saying that I take deadlines seriously and communicate promptly. Thanks for reading; please let me know how I can assist you.Information SecurityWritingContent WritingCreative WritingCopywritingEnglishJournalism WritingCopy EditingAcademic WritingGhostwritingContent MarketingEditing & Proofreading - $100 hourly
- 4.9/5
- (14 jobs)
Summary of Qualifications Senior executive and consultant with 25 years of experience and accomplishments in the areas of business development, project management, strategy, marketing, operations, and professional services. Skilled in most aspects of start-up ventures from planning to marketing. Services Development of Professional Services Capability – Definition and development of professional services function. Identification of professional service partners and forging of alliances. Relevant projects include: • Development of a plan for the growth of the professional services team of a leading provider of certificate authority technology. • Development of three highly profitable practices in the areas of ECommerce and Internet security for KPMG and Ernst & Young. Strategic Planning and Market Analysis – Assist companies in the development of strategic plans in the Internet and ECommerce space. Conduct in-depth analysis of specific markets focusing on market structure and size, potential positioning and competitors. Relevant projects include: • Development of a systems integrator channel strategy for a leading software developer. • Development of an Internet brand strategy for a catalog and gift company. • Development of an Internet strategy for a leading provider of directory services products. Business Plan Development – Assist entrepreneurs in the writing and development of business plans and supporting financial models. Relevant projects include: • Development of a business plan and financial model for a company focused on filtering internet content. • Development of a business plan for the internet arm of a transportation and trucking broker. • Development of a business plan for a Canadian search engine company. Investment Review and Business\Technical Due Diligence -- Assist investors in the evaluation of business plans and due diligence reviews. Relevant projects include: • Conducted market, business model and technical review of .Com logistics hub for a major Japanese logistics company considering a pre-IPO investment. • Reviewed the business model and technology architecture of the number three Internet Yellow Pages company for a Canadian merchant bank planning to purchase that company. Background • Assistant Professor of Business, Colorado Technical University • COO of NetReliance an internet security services firm. • Group leader for Ernst & Young regional ECommerce and Internet security practice. • Group leader for KPMG Westerns ECommerce practice. Co-founder KPMG Internet Security practice. • President and founder of Productivity Partners LAN\WAN and groupware consulting business.Information SecurityBusiness AnalysisSynchronous LearningInstructional DesignWorkshop FacilitationCurriculum DevelopmentStrategic PlanInformation Technology StrategyBusiness Plan - $35 hourly
- 4.4/5
- (18 jobs)
I'm Luke! I am a self-motivated professional that thrives on overcoming challenges and assisting others through collaborative efforts to engage stakeholders and enhance organizational growth. I specialize in start-ups and non-profits and have worked within the non-profit and governmental spaces for the past 5 years. I have a passion for working with people and increasing productivity, profit, and encouraging comfort through organizational changes and growth. My skills continue to grow and develop, below are a shortlist of general skills: - Cyber Security - Problem Solving - Customer Service - Agile - Six Sigma - Attention to Detail - M365 - Team Management - Cloud Technologies - Project Planning - developing knowledge of HTML, CSS, Javascript - Web Research Rate is negotiable dependent on business needs and expectations. Cheers! LukeInformation SecurityWixProject InsightProject PlanningCRM SoftwareSmartsheetGoogle WorkspaceProject ManagementAdobe InDesignSalesforce CRMAdobe AcrobatSix SigmaMicrosoft WordAgile Project ManagementMicrosoft Excel - $25 hourly
- 5.0/5
- (7 jobs)
I hope to become one of the many leaders in the field of cybersecurity and stand at the forefront of the innovation to come. My ability to overcome struggles and unforeseeable circumstances is reason enough for me to be a stalwart example of what is possible with any opportunity.Information SecuritySearch EngineDatabaseDesign ValidationMicrosoft WindowsZendeskData EntryMicrosoft OfficeEmail SupportOnline Chat SupportImage RecognitionCustomer SupportSaaS Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.