Hire the best Information Security Analysts in Philadelphia, PA
Check out Information Security Analysts in Philadelphia, PA with the skills you need for your next job.
- $150 hourly
- 3.8/5
- (4 jobs)
As an independent cloud architect, I can help your business: * Plan your cloud strategy * Design and build secure, scalable cloud infrastructure * Find and fix security vulnerabilities * Reduce cloud spending I do this by addressing high value and high risk priorities first, planning and delivering concrete milestones on time, and supporting you going forward. I'm a dirty-hands technical guy but I'm also a veteran business founder, so I understand that your business runs on more than technology. Security intersects everything I do, from business continuity to change management, identity management, disaster recovery, monitoring and more. Most of my clients are smaller or medium businesses, so I see many environments in transition. Often companies slide into consuming cloud resources in a not-so strategic way, starting with a small project, then another, etc., and it can get out of hand with spending too much and security issues. Amazon/Azure/Google encourage this sort of “spending creep” - it serves the cloud providers very well, but a lot of businesses are overdue for a re-think of their cloud environments. Usually, I first take a high-level view of where you stand, whether you are planning to transition services to a cloud platform or already in it, and identify low-hanging fruit to save money, bolt down security, and automate everyday tasks. My initial consultation is FREE, and I can deliver valuable insight in just a few hours. Then I plan a longer-term roadmap to accommodate your business’ growth, in which the underlying cloud infrastructure will not slow down or break down over time. Container orchestration with Kubernetes or ECS is a particular focus of my work. A lot of companies have a proliferation of ad hoc servers and could benefit from consolidating with containers, but lack the skills in-house. I can help you modernize with containers, scale up and save money. With me, there’s never a salesperson trying to up-sell services, and I don’t delegate your work to a junior engineer. I work with you personally and take personal responsibility for everything I do today and in the future. I also document and check-in everything I do, so you can always share it with your team or other service providers. I tend to get involved for a few weeks to a few months to realize concrete deliverables, then stay involved on an as-needed basis for support. Cost-wise, I can guarantee that my services will be less expensive than a big consultancy with a fancy website, and also less expensive than a full-time in-house cloud architect. Geographically, I live in Philadelphia and work from my own office. I time-track everything I do, push all my work to your Git repository, and usually am available on a video call within an hour or two. With decades of experience in engineering teams, critical data-centers, start-ups and consulting, you can count on me to provide straightforward, pragmatic advice, solve high-priority problems promptly and deliver quality. Top references from current satisfied customers are available. Hands-on with Kubernetes, Docker, Python, Terraform/CloudFormation, Git, Linux, security, security and more security. Recent projects: - HIPAA compliant health care app on AWS ECS - Kubernetes architecture and implementation for a "smart laboratory" SaaS application - Security assessment for a government contractor - Serverless architecture for an IoT application - API integration with a major energy provider - Kubernetes migration for a machine learning application - AWS autoscaling infrastructure for a hotel management platform - Technical design for clinical trials data for an international pharma company - AWS cost analysis and 50% cost reduction for an energy trading platformInformation SecurityInfrastructure as CodeLinuxTerraformDevOpsAmazon Web ServicesAWS CloudFormationKubernetesContainerizationJavaScriptDockerCloud ArchitectureNetwork SecurityAmazon ECSPython - $80 hourly
- 0.0/5
- (0 jobs)
Software Developer Data Engineering Network Engineer Cyber Security Experience with Cloud and On Prem Infrastructures.Information SecuritySoftwareGPUCloud ArchitectureInfrastructure ManagementETLDatabase ManagementArchitectureDatabaseArchitectural DesignDevOpsProblem Solving - $60 hourly
- 0.0/5
- (1 job)
Specialties: Performance analysis, performance tuning, performance testing, security, disaster recovery IBM Websphere Commerce, IBM Sterling solutions, Sterling OMS, Sterling SI, Unix, Linux, Solaris, AIX, Java, Oracle, MS SQL, MySQL, DB2, Websphere, WebLogic, JBoss, Yantra, GIS.Information SecurityApplication Performance Monitoring SoftwareEcommerce Performance OptimizationOracle Performance TuningPerformance OptimizationPerformance TestingComputing & NetworkingDatabase ManagementDatabase - $35 hourly
- 0.0/5
- (0 jobs)
Professional Summary Cybersecurity professional with over 10 years of expertise in compliance auditing, GRC, and Security Operations. Proven track record of aligning audit and cybersecurity practices with compliance frameworks such as ITGC, ISO 27001, SOC 2, and PCI DSS to mitigate risks, optimize operations, and enhance organizational resilience. Adept at performing audits, managing security incidents, and designing proactive strategies for system integrity. Key achievements include achieving 98% compliance in regulatory audits, reducing audit and incident response times by 28%, and driving a 45% improvement in SOX compliance. Core Competencies • Security Operations: Incident Response, Threat Intelligence, SIEM Management, Vulnerability Assessments, Intrusion Detection & Prevention Systems (IDS/IPS), Endpoint Protection & Network Security. • Governance, Risk, and Compliance (GRC): Regulatory Compliance (GDPR, ISO 27001, SOC 2, HIPAA), Policy Development, SOX Compliance • Identity & Access Management (IAM): Role-Based Access Control (RBAC), Privilege Management, MFA Implementation • Data Management: Financial Reporting Automation, Advanced Forecasting Models, Data Accuracy Assurance • Cross-Functional Collaboration: Training Delivery, Process Optimization, Stakeholder Communication • Identity & Access Management (IAM): User Access Controls & Privilege Management, Multi-Factor Authentication (MFA) & Single Sign-On (SSO), Role-Based Access Control (RBAC) • Problem Solving & Critical Thinking: Security Incident Analysis & Troubleshooting, Root Cause Analysis & Forensics • Technical Aptitude & Adaptability: Understanding of Security Tools, Protocols, and Practices, Ability to Quickly Learn New Systems & Threats • Technical Tools and Proficiency: OneTrust, Qualys, MetricStream, RSA Archer, Power BI, SAP, Nmap, Sophos, Power BI, Nessus, FortiSIEM, • Microsoft 365 toolsInformation SecurityServiceNowNIST Cybersecurity FrameworkSOC 2PCI DSSISO 27001AI SecurityAI ComplianceDatabase ManagementDatabaseGovernment Reporting ComplianceCompliance - $40 hourly
- 0.0/5
- (0 jobs)
SUMMARY Cybersecurity Specialist and Incident Response Expert with over 5 years of experience in cyber forensics, threat detection, and vulnerability management, backed by extensive military leadership. Skilled in using forensic tools like Volatility, Kansa, and EnCase, and directing high-stakes cyber operations to safeguard critical assets. Holds active Secret security clearance with certifications including GCIH, GSEC, and CEH. Proven track record of creating and executing incident response strategies aligned with regulatory standards to bolster organizational resilience.Information SecurityNIST Cybersecurity FrameworkCyber Threat IntelligenceGovernment Reporting ComplianceComplianceWritingSecurity AnalysisIncident Response Plan - $30 hourly
- 2.5/5
- (13 jobs)
• IT Support Levels 1/2/3 • System Administration • Network Administration • DevOps Engineering • Cybersecurity Consulting (VAPT/SIEM) • Wed Design & SEO • Full Life Cycle Project Management • Cloud Solution Deployment & Integration • IT System Administration • SAP System Administrator • IT Infrastructure Optimization • ERP System Development / Implementation • IT Strategic Planning & Execution • Enterprise Solution Development • IT Process Redesign / Change Management • Technical & Functional Training • IT Budget & Capital Expenditure Planning • Network Administration • Enterprise Administrator • Infrastructure Management • Database ManagementInformation SecurityNetwork Access ControlUbiquitiIT ManagementInfrastructure ManagementSecurity AnalysisBackup AdministrationTechnical SupportUser Identity ManagementNetwork AdministrationSystem AdministrationSEO Writing - $30 hourly
- 5.0/5
- (1 job)
PROFILE I am an information security professional seeking roles in security architecture and risk management. I enjoy solving information security challenges by understanding business requirements and recommending solutions to meet the intended objectives in a secure and compliant way. In previous roles I have performed and managed security and risk assessments in the healthcare industry in both internal and client facing roles. I have experience designing and implementing security assurance programs in a GRC solution. I work most effectively in small teams with opportunities to think critically about system architecture and business requirements and communicate effectively to "translate" needs between technology, business, and management partners. I have extensive experience with NIST, ISO, HIPAA, & FFIEC guidance.Information SecurityRisk AssessmentHIPAAISO 27001NIST Cybersecurity FrameworkNIST SP 800-53Security Assessment & Testing - $21 hourly
- 0.0/5
- (0 jobs)
As a versatile professional with a strong foundation in privacy consulting, IT systems administration, and customer service, I bring reliability, a consistent work ethic, and excellent time management to every role I take on. I started my career in diverse industries, including a brief experience at Dollar General, which taught me the importance of adaptability and quick learning. Alongside this, my work as a library assistant sharpened my organizational skills, attention to detail, and ability to manage information efficiently. Exploring gig work provided firsthand insights into flexible problem-solving and resourcefulness in meeting daily challenges. Today, I leverage these experiences in the fields of privacy consulting and IT, where I specialize in ensuring secure, efficient systems and helping organizations align with data protection standards. My hands-on background in system administration has made me skilled at troubleshooting, implementing solutions, and maintaining reliable infrastructures. Whether working independently or as part of a team, I pride myself on being dependable, organized, and committed to delivering results. I’m passionate about using my skills to make systems and processes run more smoothly and securely while continually learning and growing in every role. Let’s connect to collaborate, solve problems, and drive success.Information SecurityDatabase ManagementComputing & NetworkingComplianceGovernment Reporting ComplianceDatabaseNetwork EngineeringGraphComputer Network - $45 hourly
- 0.0/5
- (0 jobs)
Cybersecurity Strategist with expertise in secure applications, enterprise security, and compliance management. Skilled in aligning frameworks with regulations, implementing IAM solutions, and automating compliance. Proficient in mitigating risks through security controls, incident response, and cloud strategies.Information SecurityPolicy DevelopmentAudition PreparationPCI DSSMulti-Factor AuthenticationCIS Control AssessmentHITRUST Common Security FrameworkNIST SP 800-53NIST Cybersecurity FrameworkISO 27001SOC 2Risk AssessmentVendor ManagementGovernment Reporting ComplianceCompliance Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Information Security Analyst near Philadelphia, PA on Upwork?
You can hire a Information Security Analyst near Philadelphia, PA on Upwork in four simple steps:
- Create a job post tailored to your Information Security Analyst project scope. We’ll walk you through the process step by step.
- Browse top Information Security Analyst talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Information Security Analyst profiles and interview.
- Hire the right Information Security Analyst for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Information Security Analyst?
Rates charged by Information Security Analysts on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Information Security Analyst near Philadelphia, PA on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Information Security Analysts and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Information Security Analyst team you need to succeed.
Can I hire a Information Security Analyst near Philadelphia, PA within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Information Security Analyst proposals within 24 hours of posting a job description.