Hire the best Information Security Audit Freelancers in Canada
Check out Information Security Audit Freelancers in Canada with the skills you need for your next job.
- $250 hourly
- 0.0/5
- (0 jobs)
Mr. Le Roux is a highly regarded global expert on cybersecurity. He has worked with Wall-Street firms, Fortune 100 companies and A-list Silicon Valley startups, across North America and Europe as a strategic advisor and consultant. His ability to get to the heart of business risk, coupled with his 12+ years of experience in cybersecurity has shaped him into a seasoned authority with unmatched insight into this complex industry. To add to his background, Mr. Le Roux has earned multiple credentials from the Department of Homeland Security, and industry certifications such as CISSP, CCSP, and ISO 27001 Lead Auditor. Mr. Le Roux also has ample experience dealing with C-level challenges of large-scale organizations with domestic and international operations. Because of this, he is frequently invited to contribute to major Canadian news outlets and to speak at events in the UK, Canada, France, and Mexico on consulting and the tech industry. Currently, he is focusing on his consulting work around the globe, leveraging his knowledge of applied cryptography in the fields of cloud security (with a focus on SaaS/PaaS environments) and privacy protection. Mr. Le Roux is also helping companies get certified against international standards through accredited schemes such as ISO 27001, ISO 27701. Get in contact with Mr. Le Roux for any inquiries about his consulting services and let his exceptional experience help propel things to the next level.Information Security Audit
Information Security AwarenessInternet SecurityCloud Security FrameworkWebsite SecurityCertified Information Systems Security ProfessionalInformation Security GovernanceInformation SecuritySecurity EngineeringInformation Architecture - $125 hourly
- 0.0/5
- (0 jobs)
SUMMARY : IT professional with 14 years of experience. Effective leader and active participant in managing various aspects of full life cycle project including requirements gathering, scope, milestones, risk management, requirements analysis and GAP analysis. Experience in working with product owners, project managers, stakeholders and subject matter experts (SMEs).Information Security Audit
Information SecurityInformation Security ConsultationSecurity Policies & Procedures DocumentationComputer EngineeringTech & ITTechnical Project ManagementAgile Project ManagementUser Identity ManagementAdobe AcrobatCyberARKDirectoryCybersecurity ManagementSystem SecurityFirewall - $80 hourly
- 0.0/5
- (0 jobs)
At Transform180 Inc., we specialize in guiding organizations through the critical steps of cybersecurity and compliance—without unnecessary complexity or vendor bias. We focus on Canadian small and medium-sized businesses (SMBs), particularly in financial services and credit unions, where frameworks like CIS Controls v8, ISO 27001, SOC 2, DGCM, and NIST CSF can drive real strategic value. WHAT WE OFFER Guided Compliance Assessments & Remediation • Identify where you stand with CIS Controls v8, ISO 27001, SOC 2, DGCM, or NIST CSF. • Develop a practical roadmap for closing the gaps, then execute those plans collaboratively. • Fixed-price engagements for initial assessments and a clear path to remediation. Virtual CISO (vCISO) – Collaborative Security Leadership • Work side-by-side with your in-house IT or MSP to strengthen cybersecurity posture. • Non-managerial, advisory role focused on implementing best-fit policies, procedures, and risk controls. • Flexible, retainer-based services to provide continuous guidance as your needs evolve. Virtual CIO (vCIO) – Strategic IT & Cybersecurity Management • Oversee and manage existing IT staff and/or MSP resources, blending daily operational oversight with strategic planning. • Align technology decisions with overarching business goals—ideal for organizations seeking a balanced forward-thinking approach. • Retainer-based or project-based, customized to match your operational and leadership requirements. WHY TRANSFORM180 INC.? • Proven Expertise in Financial Services: We’re active in the credit union space and have in-depth familiarity with DGCM requirements—plus broader regulated markets. We know how critical cybersecurity and compliance can be to both reputation and bottom line. • Experience Across Key Frameworks: CIS Controls v8, ISO 27001, SOC 2, DGCM, NIST CSF—our team has hands-on experience guiding Canadian SMBs safely through implementations that truly stick. • Collaborative, Vendor-Neutral Approach: Our role is to be your trusted advisor, working seamlessly with your current MSP or IT staff, not replacing them. We never use one-size-fits-all templates; we tailor solutions around your culture, constraints, and aspirations. • Practical, Step-by-Step Engagements: We focus on knowledge transfer and minimal disruption to your daily operations. You’ll always know the “why” behind each step so you can keep progressing with confidence. • Track Record of Results: From helping a financial institution implement CIS Controls to guiding a telephony provider toward SOC 2, our team’s guided processes have led to measurable improvements and stronger risk postures. HOW WE WORK • Hybrid Pricing Model: We provide fixed-price packages for initial assessments and a monthly or retainer model for ongoing engagements (vCISO or vCIO). This creates certainty at the outset and flexibility in the long run. • Scalable Team Structure: Transform180 Inc. is structured as a firm. We maintain a core in-house group and partner with seasoned consultants when elasticity is necessary, ensuring consistent quality and response. • Emphasis on Canadian Markets, Open to Others: Although we primarily serve Manitoba, Alberta, and Saskatchewan businesses, we remain open to collaborating with organizations in other regions where our expertise in regulated industries is valued. • Straightforward Communication: We keep technical jargon to a minimum. Our priority is clear, actionable input for decision-makers. You’ll know what’s happening, why it matters, and how it helps secure your bottom line. LET’S TALK If you’re seeking a practical, step-by-step approach to: • Upgrade your cybersecurity posture, • Navigate critical compliance requirements, or • Enhance IT strategy while reducing overall risk… Transform180 Inc. can help. Let’s explore how our guided assessments, remediation services, vCISO collaboration, or vCIO leadership can smooth your path to compliance and growth. Contact us here on Upwork to discuss your needs and see how we can move your organization forward, securely and confidently.Information Security Audit
Risk AssessmentNetwork SecurityComplianceInformation Security Threat MitigationDisaster Recovery TestingDisaster RecoveryIncident Response PlanPolicy DevelopmentInformation Security GovernanceInformation Security ConsultationInformation SecuritySOC 2CIS Control AssessmentCybersecurity Management - $25 hourly
- 5.0/5
- (16 jobs)
I conduct deep VAPT (Vulnerability Assessment and Penetration Testing) using a combination of both Kali Linux, and/or Parrot Security Linux. I do execute a combination of both Manual, and Automated methods. My manual methods are based on the current OWASP Top 10 and SANS Institute methodologies. After providing VAPT, a 2nd Free ReVAPT will be provided once the report and all vulnerabilities have been addressed, to confirm the security of client Web or network servers. At the clients request, an NDA will be signed.Information Security Audit
Web App Penetration TestingOWASPNetwork Penetration TestingManual TestingAutomated TestingBlack Box TestingTest ReportInformation SecurityPenetration TestingKali LinuxInformation Security ConsultationApplication Security - $30 hourly
- 4.3/5
- (4 jobs)
I am a certified public accountant and capable of making financial statements, doing audit works and financial analysis. I consider myself intermediate when it comes to MS Excel proficiency. I am hardworking and trustworthy. I worked as an IT auditor in a bank which gave me the capability to understand the risks associated with financial institutions. I have demonstrated experience in IT general and application controls testing.Information Security Audit
IT Compliance AuditCOBITFinancial AnalysisIT General Controls TestingApplication AuditBookkeepingFinancial Audit - $26 hourly
- 0.0/5
- (0 jobs)
As an experienced Service Desk Analyst with a strong background in Information Security, I specialize in delivering top-tier technical support while ensuring the confidentiality, integrity, and availability of sensitive data. I have a proven track record in troubleshooting, incident management, and providing timely solutions to both hardware and software issues in complex IT environments. My expertise spans across Microsoft 365, Azure Active Directory, SharePoint, and Cloud Services, coupled with a deep understanding of network security protocols and cybersecurity best practices.Information Security Audit
Phone CommunicationServerUser Identity ManagementNetwork SecuritySecurity Operation CenterTech & ITTechnical SupportCustomer Service - $20 hourly
- 0.0/5
- (0 jobs)
Experienced cybersecurity and quality assurance professional with five years of hands-on experience in academic projects, internships, and freelance engagements. Expertise in vulnerability scanning and assessment, threat analysis, and implementing robust security measures. Demonstrates strong teamwork, problem-solving, and time-management skills. Prepared to make meaningful contributions with commitment and drive. A results-oriented achiever with a proven ability to exceed targets and deliver impactful solutions in fast-paced environments. Combines strategic thinking with hands-on experience to enhance performance and security in various projects.Information Security Audit
Risk ManagementRisk AnalysisRisk AssessmentIncident Response PlanCybersecurity ToolGitHubNessusOpenVASReport WritingPenetration TestingVulnerability AssessmentComplianceInformation Security - $15 hourly
- 5.0/5
- (1 job)
"Hello World" I'm a cyber security specialist/ IT Analyst. I have acquired enormous skills during my 7 years with hands on experiences on windows , Azure and Microsoft 365. - implementing infrastructure solutions both in the cloud as well as participating in technical research and development to enable continuing innovation within Azure cloud platform. - Implement scalable, resilient, and secure solutions in the public cloud, especially in Azure. - Perform Incident Response and mitigation. - IT system Auditor - Network Infrastructure Support and management - network vulnerability scanning and implement corrective measures to prevent. - cybersecurity solution architect. Configure and manage IDSs and IPSs, firewalls, and honeypots to ensure they are effective and reinforced when necessary. - Search digital trash bins and other deep corners of a network to find any passwords or other sensitive information that could be used to attack an organization. - Identify and fix sniffing networks, cracked wireless encryption, hijacked web servers, and hijacked web application - Patching and update manegement. - Help handle issues related to online employee fraud and digitalinformation theft. Email: chick.emmanuel@zohomail.comInformation Security Audit
TCP/IPDNSMicrosoft Exchange OnlineMicrosoft IntuneMicrosoft Azure AdministrationOffice 365Google Workspace AdministrationGroup PolicyCybersecurity ManagementVulnerability AssessmentEthical HackingCybersecurity MonitoringNetwork AdministrationMicrosoft Active Directory - $50 hourly
- 0.0/5
- (0 jobs)
I'm an senior digital forensics and cybersecurity analyst working at the top five bank of Canada. I've almost 10 years of experience in the filedInformation Security Audit
Information Security AwarenessInformation Security ConsultationDigital ForensicsSecurity InfrastructureMicrosoft Endpoint ManagerMicrosoft Azure AdministrationSecurity Assessment & TestingComputer NetworkComputing & NetworkingNetwork EngineeringInformation SecurityCyber Threat IntelligenceCybersecurity Monitoring Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.