Hire the best Information Security Audit Freelancers in the United Kingdom

Check out Information Security Audit Freelancers in the United Kingdom with the skills you need for your next job.
  • $95 hourly
    I am a Cyber Security and Information Technology expert with 20 years experience ranging from small start-ups to multi-billion euro businesses. I hold a CISSP, the gold standard of Information Security Qualifications and I am a certified PCI Professional (PCIP) I specialise in Strategy, Governance, Risk and Compliance - this makes me ideal for projects such as: Helping you achieve Cyber Essentials or IASME Governance status PCI-DSS & ISO 27001 compliance programs and audits Being your Cyber Security / Info Sec manager or CISO on a part-time basis Selecting and managing IT and Cyber Security suppliers on your behalf Writing, reviewing and updating your IT and Cyber Security policies Security Awareness Training I am an award winning public speaker and trainer and my Cyber Security Awareness Training is very popular delivered in person or from my online studio to clients around the world.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    GDPR
    Security Infrastructure
    Information Security Awareness
    ISO 27001
    PCI DSS
    Information Security Governance
    Certified Information Systems Security Professional
    PCI
    Information Security
    Security Policies & Procedures Documentation
    Incident Response Plan
    Vulnerability Assessment
    Security Assessment & Testing
    Network Security
  • $100 hourly
    Hello I am an experienced cyber security professional and owner of the UK based boutique consultancy Periculo.co.uk who specialise in Digital health, medical devices, fintech, SaaS companies and more. Having drawn on my experience over a number of years, working with a huge variety of customers ranging from construction companies to banks, charities, medical devices, fintech and MOD contractors I became a freelancer to offer affordable expertise that benefits everyone. I strongly believe that every organisation needs to take security and compliance seriously however not all have the big budget that most consultancies demand for their work. Through my own internal processes I'm able to quickly deliver high quality, best in class security and compliance consultancy and testing. My organisation is accredited to the following; Cyber Essentials Cyber Essentials Plus IASME Gold GDPR readiness ISO27001 ISO9001 CREST Penetration Testing We are certified to these standards to provide assurance but also so I practice what I preach and know how to implement it in an efficient way. If you require an affordable security and compliance expert who always reaches a solution with the appropriate risk v reward balance then please get in touch. - Able to assess, audit and certify to GDPR ready, IASME Gold, Cyber Essentials and Cyber Essentials + - GDPR Advisory, DPO as a Service (as I have technical expertise I can often cover a lot more than your traditional DPO) - Providing project consultancy (From small changes to extensive, high risk programs) - Providing operational consultancy and escalation - Supplier and internal assessments - FDA submissions - EUMDR submissions - Penetration testing - Penetration testing for medical devices, inline with IEC60601-4-5 - SOUP management - Hazard analysis - CISO as a service - Digital health cyber security - Infrastructure Security and configuration, AWS, Azure - Security operations consultancy and build - Business and technical policy, standards author Cover all aspects of security including penetration testing, vulnerability scanning etc. ** I am currently available for hire**
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Cybersecurity Management
    ISO 27001
    Penetration Testing
    Security Testing
    Technical Writing
    Vulnerability Assessment
    Data Protection
    PCI
    Network Security
    Information Security
    Cloud Computing
  • $20 hourly
    Cybersecurity Specialist with more than 2 years experience in SOC services, incident response, and threat intelligence. My expertise spans across various SIEM platforms, including Microsoft Sentinel and LogRhythm, as well as EDR solutions like CrowdStrike and Microsoft Defender for Endpoint and Cloud. I also have a keen interest in website security and development, whether it is advising on how to improve security or performing a penetration test. I have experience with SOC, Incident Response, SOAR, EDR, XDR, DLP, Threat Intelligence, Vulnerability Assessment and Cloudsecurity. Utilising Microsoft Sentinel, LogRyhthm, SentinelOne, Defender for Endpoint. I have experience in investigating phishing emails, conducting phishing campaigns using GoPhish, and performing OSINT (Open-source intelligence) on domains and individuals, utilising different OSINT tools and techniques. Utilizing sandbox environments to analyze and investigate suspicious attachments and URLs. I also hold certifications in 3 Microsoft Certification which are active: - Microsoft Certified: Azure Security Engineer Associate - Microsoft Certified: Security Operations Analyst Associate - Microsoft 365 Certified: Security Administrator Associate Currently learning automation and setting up SIEM services for clients who want to monitor their infrastructure using Sentinel.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Office 365
    Microsoft Azure
    Cisco Certified Network Associate
    ISO 27001
    Python
    Penetration Testing
    Security Analysis
    Data Protection
    Linux
    Computer Network
    Wireshark
    Network Security
    Technical Writing
    Information Technology
  • $125 hourly
    ✅ My methodology for all of my work begins with understanding your business, first and foremost ✅ Ten years experience working in Cyber Security ✅ Certified as a Cyber Security Incident Handler (GCIH) and a Security Auditor (GCCC) ✅ Qualified at BSc level in Computer Security and Forensics ✅ Experience as a Non-Executive Director - I understand the business context as well as the technical and security aspects ✅ Experience in a variety of positions within security: - Technical (SOC analyst) - Risk (Information security officer) - Strategy (cybersecurity strategy specialist) - CISO (chief information security officer) ✅ I am not the type of consultant for a tick-in-the-box approach. If you genuinely want to achieve a better Cyber Security understanding and hygiene, my work quality will be a good fit. Description: A pragmatic, down-to-earth CyberSecurity professional who translates technical jargon into understandable business terms. I have worked in technical roles, risk management and strategy roles in both large enterprises and smaller organisations, giving me a balanced mix of experience when it comes to projects and job duties. I'm currently working as a part-time CISO for a cyber security organisation as well as a part-time freelance consultant. The vast majority of my experience is in the financial services sector, the most heavily regulated and mature industry for cybersecurity. However, I've also worked in retail in addition to a consultancy services role, working directly with customers in identifying breaches and recommending how they can improve their security posture. With cyber security, a business can't focus on improving everything, so it is important to focus on those few areas which give the greatest return on investment. My speciality is explaining cyber related businesses risk in a simple way, and advising on solutions in a rational, quantified manner to maximise ROI, both in effort and cost. I offer practical and pragmatic consultancy with: - vCISO (virtual chief information security officer) - Security training, coaching and awareness - Cyber risk assessments / security health checks - Strategy, framework and policy development - Cyber-essentials certification - ISO27001 gap assessments and implementation - NIS2 gap assessments and implementation - Security improvement plan creation and implementation
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Technical Documentation
    Information Security Awareness
    Security Operation Center
    Information Security Governance
    Risk Assessment
    Cybersecurity Management
    Security Policies & Procedures Documentation
  • $75 hourly
    Certified PECB ISO 27001 Lead Implementor CompTIA Security + Senior Consultant specialising in both technical security and governance, risk, and compliance. With experience in Security operations, Security policies and procedures, Risk management, GDPR and DPA 2018, Network vulnerability scanning, Penetration testing, ISO 27001 and ISMS implementation and management. Projects and Experience: -Implemented ISO 27001 with a client, helping them pass first time with positive feedback and zero non-conformities. -GDPR uplift and security review of application and services to ensure the client was GDPR compliant, DPA 2018 compliant and operating with the best security practices. -Cyber Assured ISMS implementation, building an ISMS for a client with the end goal of passing Cyber Assured and meeting requirements from supplier and customer. -Security awareness training delivered to clients, providing relevant, understandable and concise cyber security information and helping them develop good security hygiene. -Disaster recovery and Business continuity, implementing robust disaster recovery plans and practices, and performing simulations and tabletop exercises for clients and customers. Education and Certifications: -BSc(Hons) First Class in Applied Cyber Security -CompTIA Security + Skills and Knowledge: -Security testing (Penetration testing, Vulnerability scanning, OSINT) -Certification consultancy (Cyber Essentials, Cyber Essentials Plus, Cyber Assured, ISO27001, SOC, PCI) -Security management and maintenance (Cyber Essentials, Cyber Essentials Plus, Cyber Assured, ISO27001, SOC, PCI) -Certification audits (Cyber Essentials, Cyber Essentials Plus, Cyber Assured) -Security / Systems Architecture (Design, Consultancy, and Implementation) -Security operations (SIEM, Incidents, Monitoring) -Secure Development Lifecycle (DevSecOps, Code review, Consultancy) -Security Business infrastructure management (Microsoft Business premium, Google Workspace)
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    ISO 27001
    Python
    GDPR
    Information Security Awareness
    Information Security
    Application Security
    System Security
    Information Security Consultation
  • $55 hourly
    IT Professional with over 30 years experience. 15+ years experience in web development. 8+ Years experience in PCI-DSS Consultation, including level 1 companies, working with QSA's to swiftly obtain compliance. For the past five years, I have been providing GDPR consultation to many small to medium-sized companies. Three years experience with ISO 27001 helping clients get and maintain ISO 27001 accredited certification. I spent 20 years working in various IT roles, mainly support, engineering, and web development, within one of the largest companies in the world. I was awarded Charted IT Professional status from the British Computer Society in July 2008. Since then, I have run my own company with a small team producing web-based platforms and services and offering freelance compliance consultation to small businesses. I have also worked as a CTO on several start-up projects managing their entire IT infrastructure and gaining valuable PCI compliance experience, essential to all e-commerce projects. Due to my experience and varied IT roles, I have a good knowledge of web design, programming, databases, security, SEO, troubleshooting, technical writing & more. I am a highly organised and reliable individual, utilising existing knowledge and experiences to find practical solutions to even the most complex project.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Compliance Consultation
    Data Privacy
    Vulnerability Assessment
    Information Security
    PCI DSS
    Data Protection
    Website Security
    PCI
    Compliance
    ISO 27001
    Risk Assessment
    GDPR
    Web Content Accessibility Guidelines
    Security Analysis
  • $150 hourly
    ***Simplify Compliance and Reach Your Business Goals: Trust Compliance That Passes Audits*** Are you struggling to meet the rigorous standards of data protection, GDPR, ISO 27001, and SOC2 cybersecurity? Look no further than Compliance That Passes Audits Cyber Security|GDPR| Data Protection| DPIA ,ISO27001 Lead Auditor ***Do YOU Need The Following for meeting GDPR, Data Protection, Cyber Security Alignment? ________________________________________________________ "Excellent professional without whose he would not have got our ISO27001 certification. Highly recommended." "David's knowledge of the General Data Protection Regulation and Information Security is admirable, but what really stood out was his ability to implement GDPR - he understood what it meant to organisations in the real world, and what needed to be done as a result." "David's an incredibly knowledgeable person on his subject matter with the rare ability to communicate all technical parts of his role in layman's terms for the uninitiated, a true SME." ___________________________________________________________________________ Avoid the Following RISKS. ~~~Fines, Loss of Business, Enforcement Action, BreachLess Liability, Breach Losses~~~ #Breaches are now reportable (72 Hours) (59,000 reported in Europe so far) #Class Actions/Group Actions for GDPR (Happening now all over the world) #Incorrect Privacy Notices (Emma's Diaries and others) #Risk Of Data Breach is $7% UK Government Figures #3rd Party Contract Checks by Data Protection Authorities, Danish DPA #Privacy Notice Checks By Data Protection Authorities #Complaints by Consumers over 40,000 in the UK so far, ***Alignment with Data Protection will REQUIRE ....... • GDPR Awareness Article 39, Article 47 - Legal Requirement • Breach Notification Procedure process Article 33, Article 34 - Legal Requirement • Data Protection Impact Assessment DPIA Article 35 - Legal Requirement • Record Of Processing Article 30 - Legal Requirement • Data protection Maturity Assessment Article 5 + Security Audits/ISO27001/PC-DSS/GDPR Cyber Security and Data protection Risk Management Policy and Procedure review (Security Policy, Retention Policy, Data Protection Policy etc..) Expected by the GDPR and Data Protection Legislation. No Matter what your situation GDPR alignment and direction of GDPR can be always improved, Because I have done this many times for all types of businesses and size of business. If YOU were to do only one thing I would suggest a FIXED Price Data Protection/GDPR maturity audit which highlights any gaps in your businesses Data protection program and planning and enables the risks to be managed. There are another 4 very visible Requirements mandated by the GDPR to be met. If Your customers and auditors are asking for audits, documents, Gap analysis, and evidence of managing Cyber Security Security. These processes and Documents will drive your business FORWARD. ++++++ Make Sure your organization can DEMONSTRATE the principle of Accountability (Article 5) , This Accountability principle is the one that appears in Data Protection Authorities enforcement notices as well as customer checks and audits. ++++++ ***The Solution Let us work together to put these concepts into reality and systematize in often complex environments typically involving multi-departments to avoid or control an unnecessary event and using lessons learned to reduce the effect of FUTURE events. Your business can use these systems, policies, and procedures that will work in every vertical. Professional certifications: ISO27001 Lead Auditor, Chief Security Officer C|CISO, CITP, FBCS and authored over 3 GDPR e-learning courses.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    ISO 27001
    Compliance
    Risk Assessment
    Data Privacy
    Policy Writing
    Data Protection
    Project Risk Management
    GDPR
    Information Security Awareness
    Information Security
    Network Security
  • $60 hourly
    With over 7 years of cyber security professional experience in the banking industry, I have gained the skills, experiences, and knowledge to independently implement security control in all areas of an IT infrastructure and Assets. I have high integrity and can fit into an inclusive, diverse, and collaborative culture. I can help you deliver ISO 27001, SOC 2, and NIST CSF certification using automated tools like Drata, Tugboat, and ISMS to guide the implementation of your certification process. I am currently working on the FedRAMP authorization program by identifying gaps within the infrastructure and recommending ways to close the gaps.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Regulatory Compliance
    Technical Documentation
    Information Security Governance
    Disaster Recovery Plan
    SOC 2 Report
    FedRAMP
    NIST Cybersecurity Framework
    Policy Writing
    Governance, Risk Management & Compliance
    Cloud Security Framework
    ISO 27001
    Risk Assessment
    Information Security
  • $100 hourly
    Accomplished Information Security Professional with 23 years of experience specializing in Security, Compliance, and Audit. Demonstrated expertise in delivering innovative security-focused solutions and services to large and medium-sized organizations. Proven track record of developing and implementing effective Information Technology and Security strategies that enhance customer satisfaction. Recognized for driving transformative initiatives to optimize global information security service and support systems. Mobilizes top-tier talent to cultivate high-performing cultures that thrive in dynamic markets.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Information Security Consultation
    Policy Writing
    Government Reporting Compliance
    Management Skills
    Information Security
    Incident Management
    Cyber Threat Intelligence
    Governance, Risk Management & Compliance
    Information Security Awareness
    FortiGate Firewall
    Business Management
    Compliance
    SOC 2 Report
    ISO 27001
  • $150 hourly
    I am a seasoned cyber and digital risk governance & assurance executive with over 20 years’ experience helping senior technology and business leaders uncover their most critical risks and formulate high-impact mitigation strategies at a fraction of cost. Board level expert with in-depth knowledge of Information Systems and Technology risk management. Strong experience for 10+ years in collaborating with Board Members on Cyber Resilience Strategy and Digital Transformation Risks. Technology transformation advisor, pivot easily between big picture and tactical perspectives while leveraging Cloud capabilities, and avoiding architecture anti-patterns, complexity and unnecessary costs. Creative and resourceful professional, outside-the-box thinker, capable of generating many solutions to a problem. Cross-functional, team player, assertive, trustworthy and active listener who leverages emotional intelligence to foster stakeholder collaboration, cultivate consensus, and drive technical solution design and execution.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Policy Writing
    Data Science
    Application Security
    NIST Cybersecurity Framework
    CIS Control Assessment
    Project Management Professional
    Program Management
    Machine Learning Model
    Data Analysis
    Strategic Audit
    Cybersecurity Management
    Digital Transformation
    Enterprise Risk Management
  • $40 hourly
    Specialising in providing affordable tech solutions for small and medium-sized enterprises (SMEs). With a strong background in software development across various industries, our team is dedicated to delivering high-quality, tailored services that empower businesses to leverage technology effectively. We offer various services, including Mobile & Web Application Development, Custom Software Development, Cloud Solutions, Cyber Security, and UI/UX Design. Our mission is to help SMEs compete without the burden of typical overhead costs while ensuring transparency, trust, and value in every project. We're open to taking on clients at a discounted rate in exchange for detailed feedback and testimonials.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Full-Stack Development
    Product Development
    Desktop Application
    Data Visualization
    IT Infrastructure
    Database Management
    Business Process Outsourcing IT Services
    Data Protection
    DevOps
    Cloud Migration
    Cloud Computing
    Software Development
    Mobile App Development
    Web Development
  • $45 hourly
    I am an accomplished Information Security Professional with a proven track record in spearheading comprehensive cybersecurity strategies. With a portfolio of industry-recognized certifications, such as ISSP | CEH | CC | ISO27001 LA | SSCP | CNSS|MTA | MOS | SPFC I bring expertise in cyber risk management, vulnerability assessment, and incident response. My leadership roles at leading organizations have allowed me to shape network security architectures, drive compliance, and foster a culture of security awareness. I am skilled in threat intelligence, ethical hacking, and exploit development. My dedication to continuous improvement and innovative solutions underscores my commitment to safeguarding critical assets and ensuring regulatory compliance.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Governance, Risk Management & Compliance
    Governance, Risk & Compliance Software
    Security Operation Center
    Security Assessment & Testing
    Information Security Consultation
    Database Management
    Database
    Problem Solving
    DevOps
    Architecture
    Architectural Design
    Information Security
    Government Reporting Compliance
    Compliance
  • $85 hourly
    Experienced IT Infrastructure and Security Manager providing 20+ years of cybersecurity, data protection, and compliance expertise with a successful track record of implementing ISMS, ISO 27001 accreditation, and compliance with the TSA, Cyber Essentials, GDPR and other security standards. Ability to assess risks, develop policies, create security awareness programs, and lead cross-functional teams. Experienced in SOCaaS, VAPT, and cloud-based security solutions. Offering strong ability to optimise IT infrastructure and strategically drive security improvements throughout organisations.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    IT Infrastructure
    Security Infrastructure
    Infrastructure Management
    IT Management
    IT Consultation
    Remote IT Management
    Cybersecurity Monitoring
    Security Framework
    Security Assessment & Testing
    Cybersecurity Management
    Information Security
    Government Reporting Compliance
    Compliance
  • $85 hourly
    I am a cyber security consultant with an extensive background in Python development and foreign languages to complement my cyber security knowledge. I have worked extensively on the development and engineering of cyber security tools for both cyber security professionals and business users. I am skilled at horizon scanning and report writing, with a strong passion for the technical aspects of cyber security. Recently I have assisted an organisation in receiving their SOC 2 report. I have 8 years experience working with Python and various modules to construct a variety of applications and scripts. Other programming languages I have worked with include HTML, CSS, JavaScript, and C#. I remain passionate for language learning having previously studied French, Japanese, and Dutch language, as well as their history and culture.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Security Engineering
    Security Analysis
    Information Security Governance
    Information Security Threat Mitigation
    Cyber Threat Intelligence
    Python
    Governance, Risk Management & Compliance
    Information Security Consultation
    Information Security
    Cybersecurity Management
    Security Testing
    Security Policies & Procedures Documentation
  • $29 hourly
    I'm an experienced and certified blogger, copywriter, report writer and technical author with 25+ years experience specialising in information security and IT in the banking and energy sectors. I'm also a working motorsports journalist, SEO copywriter and award-winning motorsports photographer with over 20 years experience. in 2022 I was fortunate enough to be voted "Motorsports Photographer of the Year" in the Corporate Vision Awards. No job is too big or too small to consider; if you have documents that need a polished production, AI produced content needing 'humanising', copywriting, proof reading, conversation to different formats, photography, editing etc. I can help. Regular communication is important to me, so as a PRINCE2 certified project manager I will ensure any project we work on is effectively managed from start to finish.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Copywriting
    Photography
    Photographic
    Photo Editing Software
    Photo Resizing
    Photo Editing
    Journalism Writing
    Photojournalism
    Journalism
    Technical Project Management
    Information Security
    Technical Copywriting
    English
    Technical Documentation
  • $40 hourly
    With over 12 years of experience as a Certified Ethical Hacker, I bring a wealth of knowledge regarding security vulnerabilities and best practices, specializing in Penetration Testing and Python Development. My extensive expertise in cybersecurity is complemented by a proficiency in automation, utilizing tools such as Selenium, Puppeteer, and Playwright. Over the years, I have consistently delivered efficient solutions, playing a pivotal role in helping clients attain their cybersecurity objectives. 🎓 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬: ✅ CEH, eJPT, Isc2 CC, TCM Web Application Security, CPTE, eCPPT, OSCP (in progress) 🌐𝐒𝐩𝐞𝐜𝐢𝐚𝐥𝐢𝐳𝐚𝐭𝐢𝐨𝐧𝐬: • Web & Mobile App Testing • Owasp Top 10 • SANS 25 Software Errors/Tests • Risk Assessment • Disaster Recovery Plan • Cloud Security • Security Audit Report • Python Scripting • Selenium, Puppeteer, Playwright Automation • WordPress Security • Device Fingerprinting • Browser Fingerprinting • Standards and Compliances: ISO27001, ISR, NESA, NIST, PCI DSS, GDPR, HIPAA. 🚀𝐊𝐞𝐲 𝐇𝐢𝐠𝐡𝐥𝐢𝐠𝐡𝐭𝐬: • 𝐈𝐧𝐝𝐮𝐬𝐭𝐫𝐲 𝐑𝐞𝐜𝐨𝐠𝐧𝐢𝐭𝐢𝐨𝐧: Acknowledged by Microsoft, eBay, Fiverr, Yahoo, Avast, Eset, Amazon, Adobe, NASA and many more for meticulous cybersecurity solutions. • 𝐄𝐦𝐚𝐢𝐥 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: Expert in on-premise and cloud email security systems, ensuring inbox delivery. • 𝐏𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐓𝐞𝐬𝐭𝐢𝐧𝐠: Over a decade of experience in thorough penetration testing and vulnerability assessments. • 𝐃𝐞𝐯𝐢𝐜𝐞 & 𝐁𝐫𝐨𝐰𝐬𝐞𝐫 𝐅𝐢𝐧𝐠𝐞𝐫𝐩𝐫𝐢𝐧𝐭𝐢𝐧𝐠: Proficient in implementing advanced fingerprinting techniques for enhanced security. • 𝐀𝐧𝐭𝐢-𝐅𝐫𝐚𝐮𝐝 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭: Experienced in anti-fraud systems to safeguard against fraudulent transactions. • 𝐂𝐥𝐨𝐮𝐝 & 𝐇𝐨𝐬𝐭𝐢𝐧𝐠: Proficient in DNS, Cloudflare, and various hosting environments. • 𝐖𝐨𝐫𝐝𝐏𝐫𝐞𝐬𝐬 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: Specialized in fortifying WordPress platforms against cyber threats. • 𝐀𝐮𝐭𝐨𝐦𝐚𝐭𝐢𝐨𝐧 𝐌𝐚𝐬𝐭𝐞𝐫𝐲: Expertise in Selenium, Playwright, and Puppeteer automation. • 𝐖𝐇𝐌𝐂𝐒 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: In-depth experience in securing WHMCS systems. • 𝐒𝐞𝐫𝐯𝐞𝐫 𝐏𝐫𝐨𝐟𝐢𝐜𝐢𝐞𝐧𝐜𝐲: Skilled in CentOS server and Ubuntu administration 🏆 𝐇𝐚𝐥𝐥 𝐨𝐟 𝐅𝐚𝐦𝐞𝐬: • Secured $6000 Bounty from Fiverr for Critical Vulnerabilities. • Recognized in eBay Hall of Fame for safeguarding their community. • Awarded Bubble.is Security Bounty Winner for discovering critical flaws. • Acknowledged by ESET for reporting severe SSL End-Server Vulnerabilities. • Secured Amazon with responsible disclosure of a file path traversal vulnerability. • Triumphed with a $10000 bounty from Booking.com on HackerOne. • Recognized by Microsoft for critical security vulnerabilities in their services. 🌐 𝐏𝐚𝐬𝐬𝐢𝐨𝐧 𝐟𝐨𝐫 𝐚 𝐒𝐚𝐟𝐞 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐅𝐮𝐭𝐮𝐫𝐞: • Aiming to contribute extensively to the community through ethical hacking. • Committed to receiving recognition from private and public bounty programs. • Dedicated to protecting platforms like Adobe, Apple, Avast, Transloadit, Blackberry, Bitcasa, Yahoo, ING Bank, mailtrack, and more. • Striving to keep people safe from malware and cyber threats. 💼 𝐔𝐩𝐜𝐨𝐦𝐢𝐧𝐠 𝐆𝐨𝐚𝐥𝐬: • Empower others by sharing cybersecurity knowledge within the community. • Advocate for a safer digital world, focusing on #Cybersecurity and #SafeDigitalFuture. • Make a positive impact in penetration testing and cybersecurity with #EthicalHacker and #SecurityMatters. 📆 𝐀𝐯𝐚𝐢𝐥𝐚𝐛𝐢𝐥𝐢𝐭𝐲: 🌟 Open to new challenges and collaborations. Let's fortify your digital assets together! Reach out for a consultation and let's create a safer digital future. #CybersecurityExpert #EthicalHacker #UpworkPro #FraudProtection #DeviceFingerprinting #BrowserFingerprinting
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Website & CMS Bug Fix
    Android
    OWASP
    Cloud Security
    WordPress Security
    Risk Assessment
    Incident Response Readiness Assessment
    Vulnerability Assessment
    Security Policies & Procedures Documentation
    System Automation
    Automation
    Selenium
    Python
    Web Testing
  • $20 hourly
    SUMMARY Motivated and detail-oriented MSc Data Science student at the University of Sheffield, with a solid foundation in data analysis, management, and visualization. Certified in ISO 27001:2022, showcasing expertise in information security management and risk assessment. Proficient in Python, SQL, and data visualization tools, with hands-on experience applying advanced analytics to real-world problems. Skilled at collaborating within diverse teams and adapting to dynamic environments, I bring a proactive approach to delivering data-driven solutions. Enthusiastic about contributing to the company's innovative audit practices, combining technology and expertise to drive impactful results.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Machine Learning
    Information Management
    Information Security
    Data Cleaning
    Data Analytics
    Data Extraction
    Data Mining
  • $20 hourly
    A seasoned security professional with 9 years of expertise in Security, Risk Assessment, Compliance, and Governance, Risk, and Compliance (GRC). Proficient in: * Developing and implementing comprehensive security strategies. * Conducting in-depth risk assessments and mitigating potential threats. * Ensuring adherence to regulatory standards and industry best practices. * Delivering tailored security solutions for leading banks to meet stringent requirements. * Establishing robust security controls and fostering a culture of security awareness. * Dedicated to continuous learning, staying current with industry advancements, and holding certifications such as CISA, ISO27001, CEH, CNSS, and AZ500. Send 'Invitation' to connect and discuss your requirements with me. Let's ensure your business stays compliant and secure.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Risk Assessment
    Security Assessment & Testing
    Application Audit
    IT Compliance Audit
    Internal Auditing
    Cloud Security
    Information Security Governance
    Governance, Risk & Compliance Software
    Cybersecurity Management
    NIST Cybersecurity Framework
    PCI DSS
    ISO 27001
    Compliance
    Information Security
  • $150 hourly
    Cyber Security leader with over 12+ years' of experience in Network Engineering, Network Security, Information Security, GRC, Security Architecture, Cloud Security, and Cyber Security elements' (Routers, Switches, Firewalls, IPS/IDS, SIEM, Cloud Platforms etc.) configuration and and strategy implementation, Business Continuity and Disaster Recovery (BCDR), Cloud architecture patterns and controls guidance development. Highly motivated to complete tasks alone as well as thriving when working as part of a team. An ambitious and confident individual who applies an energetic attitude within the work environment. Strong senior stakeholder management & thought leadership skills. Keen interest in the field of Pentesting, Cloud Security and Cyber Security research.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    CI/CD
    CIS Control Assessment
    NIST SP 800-53
    NIST Cybersecurity Framework
    SOC 2
    ISO 27001
    Web Application Security
    Information Security Awareness
    Information Security Governance
    Cloud Computing
    Cloud Security
    Cloud Security Framework
    Vulnerability Assessment
    Information Security Consultation
  • $75 hourly
    I’m a seasoned security consultant dedicated to helping small and medium-sized businesses (SMBs) strengthen their security posture. With extensive experience in designing comprehensive security programs, ensuring compliance, and developing user-centric solutions, I am here to help your business stay secure and resilient. ❓Why Choose Me? I bring a proactive approach to security, building on a solid foundation of core fundamentals, transparency, and privacy. My strategic mindset ensures that your security measures are not only effective but also cost-optimized, providing the best value for your investment. By prioritizing user-centric solutions, I make sure that security enhances rather than hinders your business operations. My solutions are designed with scalability in mind, ensuring that your security infrastructure can grow alongside your business. I value transparency and privacy and view collaboration as a necessity for achieving the best results. With a focus on fostering a security-first culture and leveraging advanced technologies, I help transform your organisation from reactive to proactive in managing security threats. Clear communication and a balanced approach to prioritise enable me to deliver pragmatic solutions that align with your business goals. 💼 Expertise and Services: 🛠️ Tailored Security Programs: Custom security solutions aligned with your specific business needs. 🏢 Security-First Culture: Build and nurture a security-first culture through transparent practices and engaging workshops. 📜 Compliance and Automation: Simplify compliance with ISO 27001, SOC 2, PCI DSS, Cyber Essentials, and NIST, leveraging automation. 👥 User-Centric Solutions: Enhance user experience while maintaining robust security measures. 🚨 Incident Response: Strengthen incident response capabilities and forensic readiness. ☁️ Cloud Security: Implement advanced security measures for AWS and GCP infrastructures. 🔍 Threat Modelling: Proactively identify and mitigate threats through advanced threat modelling techniques. 🔒 Security and Privacy by Design: Integrate security and privacy at every stage of your IT projects. 🛡️ Zero Trust Framework: Ensure continuous verification of user and device trustworthiness, enhancing security. 💼 Virtual CISO and DPO Services: Provide strategic guidance as a virtual Chief Information Security Officer and Data Protection Officer. 🔧 Security Engineering: Implement state-of-the-art security engineering solutions to protect your infrastructure. 📊 Governance, Risk, and Compliance (GRC): Develop and manage GRC frameworks to align with regulatory needs and risk management principles. 🛠️ SDLC and CI/CD Security: Secure the Software Development Life Cycle and Continuous Integration/Continuous Deployment pipelines. ⚙️ DevSecOps: Integrate security into DevOps practices for a seamless and secure development environment. 🐞 Vulnerability Management: Continuously monitor, assess, and remediate vulnerabilities to maintain a robust security posture. ❌ What I Don't Do: I avoid these practices because they compromise the integrity and security of your business: 📝 Compliance Checkbox Exercises: I don't just fill out security questionnaires without implementing real controls. Effective security requires genuine, practical measures, not just paperwork. ❌ Falsified Reports: I won't create falsified audit or assessment reports. Transparency and honesty are critical to building a secure and trustworthy organisation. 💻 Hacking Services: I don't provide hacking services for unauthorised purposes. Ethical security practices are essential to maintain legal and moral standards. 📱 Social Media Account Recovery: I don't handle account recovery for social media platforms. My focus is on comprehensive, strategic security solutions that protect your entire business. 🔒 Zero-Knowledge Approach: I employ a zero-knowledge approach, ensuring that no one, including myself, has access to your data unless explicitly authorised. This method enhances privacy and security by minimising the risk of data exposure. For example, in encrypted communications, only the communicating parties can read the messages, while intermediaries cannot. This principle extends to secure data storage solutions, where even service providers cannot access your encrypted files. Let's partner to secure your business, enhance your strategy, and create user-centric solutions for a resilient future.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    System Security
    Governance, Risk Management & Compliance
    Information Security Governance
    Information Security Consultation
    Cloud Security
    Security Management
    Security Policies & Procedures Documentation
    Security Infrastructure
    Security Engineering
    Amazon Web Services
    Information Security Threat Mitigation
    Google Cloud Platform
    Cybersecurity Management
    Information Security
  • $30 hourly
    Certified GRC and Risk Management Professional with over 11 years of experience in IT audits, compliance, and security frameworks, including SOC 2, ISO 22301, and ISO 27001. Notable accomplishments include leading Service Organization Controls Attestation engagements, developing business continuity plans, and streamlining compliance processes to meet industry standards. If you’re looking for a results-driven compliance expert to safeguard your operations and ensure seamless audits, let’s connect!”
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Cyber Threat Intelligence
    Enterprise Risk Management
    NIST Cybersecurity Framework
    Communication Skills
    Governance, Risk Management & Compliance
    Internal Auditing
    Policy Writing
    NIST SP 800-53
    Critical Thinking Skills
    Leadership Skills
    IT General Controls Testing
    IT Compliance Audit
    ISO 27001
    Cloud Security Framework
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.