Hire the best Information Security Audit Freelancers in India
Check out Information Security Audit Freelancers in India with the skills you need for your next job.
- $12 hourly
- 4.9/5
- (32 jobs)
Hi, I am Amit Singh and having 10+ years of significant and well-diversified experience in Cybersecurity domains, including ⭐Web Application penetration testing (SaaS, Cloud etc.)⭐Network Penetration testing(Servers, Active Directory, IoT etc.)⭐Web API pen-testing ⭐Mobile penetration testing (android & iOS)⭐Web 3.0 DApps & Smart Contract pen-testing (Blockchain technology)⭐ Source Code Review etc. 🏆Top Rated Profile on Upwork ✅I have performed penetration tests & vulnerability assessments and delivered professional reports to companies all over the world in accordance with: ☑️ Offensive Security (OSCP) standards ☑️ OWASP Top 10 Vulnerability ☑️ OWASP API Security Top 10 Vulnerability ☑️ OWASP Mobile Security Top 10 Vulnerability ☑️ Application Security Verification Standard 4.0 (ASVS 4.0) ☑️ CWE Top 25 Most Dangerous Software Errors ☑️ ISO 27001 Penetration Testing ☑️ Payment Card Industry Data Security Standard (PCI DSS) ☑️ General Data Protection Regulation (GDPR) ☑️ Common Vulnerability Scoring System (CVSS) ☑️ Open Source Security Testing Methodology Manual (OSSTMM) ✅ Cybersecurity Certifications:- ☑️ Certified eLearnSecurity Web application penetration tester (eWPT) ☑️ Certified API Security Professional( CASP) ☑️Certified Ethical hacker(CEH) ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ☑️ Executive Summary ☑️ Assessment Methodology ☑️ Type of Tests ☑️Risk Level Classifications ☑️ Result Summary ☑️ Table of Findings ☑️ Detailed Findings. Each finds listed within the report will contain a CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ✅ Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, checkmax and Zaproxy etc. Note-For more info lets connect over the chat section. ThanksInformation Security Audit
Ethical HackingSecurity Assessment & TestingWeb App Penetration TestingCode ReviewOWASPAPI TestingWebsite SecurityInternet SecurityNetwork Penetration TestingWeb Application SecurityPenetration TestingVulnerability AssessmentNetwork SecuritySecurity Testing - $30 hourly
- 5.0/5
- (23 jobs)
Hello, I'm Aaryan, a freelance penetration tester dedicated to providing top-notch cybersecurity services. With a passion for digital security and a keen eye for vulnerabilities, I offer comprehensive assessments to protect organizations from potential cyber threats. As a seasoned professional in the field, I have 4 years of experience conducting penetration tests for a diverse range of clients. My expertise lies in analyzing networks, applications, and systems to identify weaknesses, simulate attacks, and deliver actionable recommendations for enhanced security. I pride myself on staying up-to-date with the latest industry trends and utilizing cutting-edge tools and methodologies to deliver effective results. From network mapping and reconnaissance to vulnerability scanning and exploit identification, I employ a systematic approach to ensure no stone is left unturned in your digital defense. My approach is collaborative, transparent, and client-centric. I prioritize clear communication, actively involving clients throughout the testing process, and providing comprehensive reports that are accessible and easy to understand. I believe in empowering organizations to make informed decisions about their security posture. With a strong focus on confidentiality and adherence to ethical standards, I provide a trusted and reliable service. Whether you are a small business, a startup, or an enterprise, I am equipped to assist you in bolstering your security measures and safeguarding your valuable assets. Let's work together to ensure your digital infrastructure remains secure. Contact me to discuss your specific requirements and explore how I can help strengthen your cybersecurity defenses. Stay ahead of cyber threats with a freelance penetration tester committed to your digital security. Connect with me today. Aaryan SaharanInformation Security Audit
Regression TestingTest AutomationPerformance TestingLoad TestingCloud TestingCloud SecurityAWS ApplicationSecurity Assessment & TestingMobile App TestingWebsite SecurityEthical HackingWeb ApplicationVulnerability AssessmentPenetration Testing - $25 hourly
- 5.0/5
- (4 jobs)
A highly skilled and detail-oriented Accounting Outsourcing Professional with expertise in managing financial operations for businesses across various industries. Adept at streamlining accounting processes, ensuring compliance with international financial reporting standards, and leveraging technology to enhance efficiency. Strong analytical and problem-solving skills, with a commitment to delivering accurate financial reports and insights that support strategic decision-making. Key Skills Accounting & Bookkeeping – Proficient in handling accounts payable/receivable, reconciliations, and financial statements. Financial Reporting – Expertise in preparing financial reports in compliance with GAAP, IFRS, and other regulatory requirements. Taxation & Compliance – Knowledge of corporate tax laws, VAT/GST regulations, and payroll tax compliance. Cloud Accounting Software – Experience with QuickBooks, Xero, SAP, NetSuite, and other accounting platforms. Payroll Processing – Managing payroll functions, including calculations, tax deductions, and benefits administration. Process Automation – Implementing automated solutions to improve efficiency in financial reporting and data management. Budgeting & Forecasting – Assisting clients with financial planning, cost control, and cash flow management. Audit Support – Coordinating with auditors and ensuring proper documentation for internal and external audits. Client Relationship Management – Strong communication and collaboration skills to serve clients effectively.Information Security Audit
Strategic AuditTax LawSales TaxTax Planning & AdvisoryBookkeepingInternal AuditingFinancial AuditTax AccountingAccountingMicrosoft Excel - $15 hourly
- 5.0/5
- (136 jobs)
Web Penetration Testing(OWASP Top 10 methodology) | Network Penetration testing | OWASP API Security | Mobile Vulnerability Assessment(iOS and Android) | Source Code Reviews(.Net, Java, PHP) | Vulnerability Assessment and Penetration Testing | SIEM team (Cloud(AWS and Azure) Security, File Integrity Monitoring and Event Monitoring, Endpoint Security and Encryption, Data Loss Prevention, Network Access Control, Threat Monitoring (Email Traffic and Malware Analysis), Privileged Access and Identity Management) Have 7+ years of experience in both black box and white box testing penetration testing. Perform VAPT (Vulnerability Assessment and Penetration Testing) services for web applications, networks, mobile; source code reviews; malware analysis; server hardening; and security analysis etc. Conduct penetration testing in a systematic approach. Follow the standard methodology of the industry like OWASP Testing Guide v4(OTGv4); SANS top 25; NIST SP 800-115; PCI DSS to perform penetration testing so that client can concentrate on their professions without worrying about security threats. Web Application Testing: Do web application penetration testing with the latest methodology like OWASP Top-10, SANS Top-25. Perform both manual and automated penetration testing for vulnerabilities like Injection flaws(such as SQL, NoSQL, OS, and LDAP injection etc),Broken Authentication, Sensitive Data Exposure,XML External Entities (XXE), Broken Access Control,Security Misconfiguration, Cross-site scripting(XSS), Insecure Deserialization, Using Components with Known Vulnerabilities,Insufficient Logging & Monitoring. Also, perform source code reviews for many technologies like Java, NET, PHP etc. Approach for Manual Web-Application Penetration Testing: Conduct manual testing with following controls: * Configuration and Deployment Management Testing * Identity Management Testing * Authentication Testing * Authorization Testing * Session Management Testing * Input Validation Testing * Testing for Error Handling * Testing for weak Cryptography * Business Logic Testing * Client Side Testing Tools that use for Automated Web Penetration Testing: Acunetix, Burp-Suite, Netsparker, Nexpose, Nikto, IBM AppScan, HP fortify, W3af etc. Network penetration testing: Provide both external and internal network Penetration Testing so that your Network Infrastructure is secured from the real world attacks. Do both manual and automated network penetration testing. Approach for Manual Network Penetration Testing: Manually check for IDS/IPS, Server, Networks switch, Network Router, VPN, Firewalls, Anti-virus, Password etc. Tools that use for automated network penetration testing: OpenVas, Wireshark, Nessus, Metasploit, Armitage, Scapy etc. Mobile Application Penetration Testing: Perform mobile applications application penetration testing with the latest OWASP methodology(MSTG). Performed both manual and automated penetration testing for vulnerabilities like Weak Server Side Controls, Insecure Data Storage, Insufficient Transport Layer Protection, Unintended Data Leakage, Poor Authorization and Authentication, Broken Cryptography, Client Side Injection, Security Decisions Via Untrusted Inputs, Improper Session Handling, Lack of Binary Protections. Tools: Burp-Suite, HP fortify, Dex2Jar, Apktool, framework-res.apk, iNalyzer. Source Code Reviews: Perform source code reviews for both front and back-end languages. Perform source code reviews standard methodology like OWASP top 10. Do manual and automated source code reviews for various web based security vulnerabilities like SQL injection, Cross site scripting (XSS), CSRF, RFI,LFI, Authentication bypass etc. Tools: CheckMarx, IBM Appscan source for analysis, Microfocus HP Fortify. Security Analysis and Server Hardening: Regularly check and maintain your systems, servers to ensure that they comply with the standards. Do hardening application checks the item automatically on a daily basis and monitors all critical networks and server components. We support various frameworks like CIS benchmarking for Desktops & Web Browsers, Mobile Devices, Network Devices, Servers – Operating Systems, Virtualization Platforms & Cloud etc. Social Engineering: Have experience in social engineering vectors: Vishing, Phishing, Smishing, Impersonation. Used the following social engineering cycle to conduct social engineering: Gather Information: Here Information gathered from company websites, social media and other publications. Plan Attack: Next step is outline how intends to execute the attack Acquire Tools: After planning, next include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics is used in attacks such as password guessing. Tools: SET(Kali-Linux); GetGoPhishInformation Security Audit
Web TestingWeb Application SecurityWebsite SecurityNetwork Penetration TestingSoftware QASecurity AnalysisInternet SecurityInformation SecurityPenetration TestingVulnerability AssessmentNetwork Security - $50 hourly
- 5.0/5
- (7 jobs)
An experienced cyber-security specialist & quality assurance & regulatory professional with a proven track record in governance, risk & compliance. I bring a wealth of hands-on experience in Information Security audits, Risk Management, Risk Assessment, Vendor Risk Assessment, Information Security Policy and procedures formulation, compliance with various security standards for several global clients and also performed cyber-security compliance assessments using NIST 800-53, NIST CSF based controls and supports remediation and mitigation activities. I also have experience in managing Quality Management System (single-handedly), drafting Standard Operating Procedures (SOP), managing Corrective & Preventive Action (CAPA) & Non-conformances/deviations, Training & Development, Document Management, KPI Management, Audit (Internal/External) Management in adherence to MDSAP, EU MDR 2017/745 & ISO 13485:2016 with deep understanding of these laws and standards. I have a deep understanding of various laws such as HIPAA. GDPR, Data Protection Act, MDSAP, EU MDR 2017/745 and standards such as ISO 27001:2013, PCI-DSS, SOC2, ISO 13485:2016 etc.Information Security Audit
Financial AuditPCICybersecurity ManagementGDPRIT Compliance AuditPCI DSSData PrivacyRisk AssessmentISO 27001 - $50 hourly
- 5.0/5
- (2 jobs)
"I really appreciate what you did for Katana by helping us to fortify our product security! Thank You, Usama" - Priit Kaasik (Co-founder & CTO at Katana Manufacturing ERP) I help you make your applications secure by identifying security flaws in your applications, APIs, and codebases. Recently, I helped Sketchdeck discover over 35+ high-severity loopholes affecting 100K+ users in their applications by doing penetration testing, secure code review, and API security testing. "I highly recommend Usama for any application security needs. He has been a valuable asset to our team at Sketchdeck, discovering critical security issues through manual testing and in-depth analysis. He has a lot of expertise in white-hat-hacking, is extremely creative and driven to help secure our web application. I recommend Usama to anyone looking to bolster their security measures." - Joe Teibel (Head of product & engineering @Sketchdeck) "We increased the reported severity from High to Critical. This is because it allows the takeover of another account, given only that account's email address. We were impressed with this report, Usama. You found a critical vulnerability, one that nobody else had found. Nice job." - Clio, (A leading lawyer's platform)Information Security Audit
Network Penetration TestingWeb App Penetration TestingNetwork SecurityJavaScriptNode.jsWebsite SecurityInformation SecurityApplication SecuritySecure SDLCWeb Application SecurityEthical HackingSecurity TestingVulnerability Assessment - $45 hourly
- 5.0/5
- (63 jobs)
✅ Top Rated Plus Expert ✅ 1000+ Hours ✅ Professional Penetration Tester Senior Penetration Tester with more than 6+ years of rich industry experience in Web, Mobile, API, and Network Penetration Testing. I have successfully completed 500+ Web application Pentests, 200+ Mobile Application Penetration Tests, 300+ API Penetration Tests, 100+ External Network Penetration Tests and 30+ Internal Penetration Tests. I am also a Security researcher acknowledged by Yahoo (among other notable companies like SolarEdge, Imgur, Artsy, etc.) for disclosing a number of vulnerabilities via the HackerOne bug bounty platform. My core competency is Blackbox, Greybox Testing on Web, API, Mobile, and Network applications. I am familiar with all attacks and mitigations and am well-versed in OWASP, NIST, and PTES Frameworks. My Pentesting reports include clear documentation of the vulnerabilities found along with the remediations to make sure the client is 100% satisfied. I am also certified in AWS, and Azure and have a very keen knowledge of Cloud Security and cloud administration. ✅ I have conducted Penetration Tests, Vulnerability Assessments and delivered professional reports to companies around the world complying with the following: ►OWASP Web Security Top 10 Vulnerability ►OWASP API Security Top 10 Vulnerability ►OWASP Mobile Security Top 10 Vulnerability ►External Network Penetration Testing ►Internal Network Penetration Testing ►Payment Card Industry Data Security Standard (PCI DSS) ►System and Organization Controls 2 (SOC2) ►General Data Protection Regulation (GDPR) ►Common Vulnerability Scoring System (CVSS) ►Open Source Security Testing Methodology Manual (OSSTMM) My Certs include: ►CompTIA Pentest+ (Expired) ►AWS Solutions Architect (Expired) ►Azure Administrator (Expired) Tools: Burp Suite, Nikto, Nmap, Zap, Metasploit, Nessus, W3af, Ffuf, Dirb, etc... I am available 24/7. If you are interested in cooperation, drop me a line :)Information Security Audit
Web Application SecurityNetwork Penetration TestingWeb App Penetration TestingCloud SecurityMobile App TestingInformation SecurityMetasploitVulnerability AssessmentNetwork SecurityPenetration Testing - $60 hourly
- 5.0/5
- (3 jobs)
Risk Advisory and compliance expert (CISA certified) with more than 13 years of demonstrated history of working in the Financial Services, Telecom, Technology and Healthcare space, across Big4 consultancies. Strong program and project management professional skilled in IT Compliance programs /audits and assessments (SOX/ SOC1&2, HIPAA, PCI DSS, CSA STAR, NY DFS, ITGC), Data Privacy and Security /System Implementation reviews/Vendor due diligence. I specialise in setting up IT Compliances for organisations , which involves, performing internal IT assessments, noting findings, planning for actions on remediations, framing policies and procedures. I also specialise in performing SOC2, ITGC and SOX assessments and audits.Information Security Audit
Information Security ConsultationPolicy WritingInformation SecurityTraining PresentationIT Compliance AuditInternal AuditingRisk AssessmentData PrivacySOC 1 ReportGovernance, Risk Management & ComplianceIT General Controls TestingInformation Security GovernanceSOC 2 ReportSarbanes-Oxley Act - $33 hourly
- 5.0/5
- (17 jobs)
✅Get ISO 27001 (ISMS) or SOC2 compliance program ready in 6 weeks! 👋 Hi there, I'm a Cybersecurity Specialist with a Strong Track Record in Cybersecurity, Privacy and AI Governance, Risk & Compliance I’m a seasoned cybersecurity professional with extensive experience helping organizations meet global security, privacy and AI standards, including 1. ISO 27001, ISO 42001 2. SOC 2 3. NIST CSF 4. PCI DSS 5. HIPAA 6. GDPR. Whether you're preparing for a formal audit or simply want to elevate your security posture, I bring a structured yet practical approach tailored to your business environment. I also have deep technical expertise in implementing and managing Microsoft Security solutions, including: 1. Microsoft 365 Defender 2. Microsoft Intune (Endpoint Manager) 3. Defender for Endpoint 4. Defender for Cloud As a certified Microsoft trainer, I regularly deliver targeted security training programs for technical teams and end-users. Topics I cover include: 1. Information Security Awareness 2. Network Security & Phishing Simulations 3. Microsoft Security Tools & Best Practices 🔐 Core Focus Areas: 1. Security, Privacy and AI Compliance Readiness & Gap Analysis 2. Policy Development & Risk Assessments 3. Microsoft Security Solution Design & Troubleshooting 4. User Training & Awareness Campaigns 🎓 Certifications: 1. Certified Information Security Manager (CISM) 2. Certified in Risk and Information Systems Control (CRISC) 3. ISO 27001: Lead Auditor 4. Microsoft 365 Security Administrator Associate 5. Microsoft Certified Trainer (MCT) If you’re looking for a cybersecurity, privacy or AI consultant who understands both technical controls and real-world compliance demands, let’s connect. I’d be happy to support your next project.Information Security Audit
Data PrivacyPCI DSSGDPRCertified Information Security ManagerData ProtectionCloud Security FrameworkMicrosoft Endpoint ManagerInformation Security GovernanceSOC 2Microsoft AzureCloud SecurityNIST Cybersecurity FrameworkISO 27001Cybersecurity Management - $40 hourly
- 4.9/5
- (3 jobs)
Experienced Information Security Consultant with 12+ years experience. Holding key certifications from Cisco, ISACA, ISC2, etc., in addition the strong academic background demonstrating a versatile skill set. I am experienced in Information Security Audits, Risk Management, Risk Assessment, Vendor Risk Assessment, Information Security Policy and procedures formulation, compliance with various security standards. I have assisted several global clients and startups in cyber-security compliance assessments using NIST 800-53, NIST CSF, SOC 2, ISO 27001, GDPR etc. based controls and supported remediation activities. I have a deep understanding of security frameworks and regulations such as HIPAA. GDPR, Data Protection Act and standards such as ISO 27001:2013, PCI-DSS etc. I specialise in delivering precise and timely large and small-scale cybersecurity programs. A strategic thinker committed to staying ahead of evolving threats, blending a robust educational background with technical expertise for effective information security governance. I am actively engaged in professional communities, showcasing dedication to ongoing learning and collaboration. Open to new opportunities, seeking to leverage experience and skills and looking for building long term professional relationships.Information Security Audit
Policy DevelopmentBusiness Continuity PlanGDPRDisaster RecoveryData ProtectionCompliancePolicy WritingISO 27001Risk AssessmentData PrivacyCloud SecurityPCI DSSApplication SecurityInformation Security - $25 hourly
- 4.8/5
- (14 jobs)
Technical Solution Architect with passion for Cloud, DevOps and Security. 15 years of experience in multiple projects which include Cloud, System Administration, Automation, DevOps and Security. Technical Skillset: Amazon Cloud System Architect – Designed Secure Network & System Solution using many dimensions of AWS Cloud like EC2, VPC, ELB, RDS, Route 53, Cloud Formation, Cloud Front, SES, Elastic Cache, Work Space Devops – Ansible, Chef, Dockers, Containers, ECS, CloudFormation, Terraform, CircleCI, OpsWorks, Beanstalk, Jenkins, Pipelines, Nexus, Rundeck, CodeDeploy, Vagrant, Packer Virtualization - VMWare, Citrix Xen, HyperV Linux System Administration - DNS, Apache, MySQL, Samba, LDAP, NFS, DHCP, Squid, IPtables Windows System Administration - DNS, Active Directory, Exchange Server, MS SQL Server. Storage Technologies like SAN, NAS from different vendors Dell, Netapp and some open source technologies ZFS, OpenIndiana, Nexenta Enterprise Mail solutions MS Exchange, Postfix, Zimbra VOIP systems. IP-PBX Asterisk configuration. VoIP Routing, Trunks, Inbound-Outbound Routes, Extensions etc Monitoring – Nagios, OpenNMS, Zabbix, Site24x7, Pageduty, Prometheus Scripting – Python, PHP, Shell Scripting, PowerShell and JSON IT Audits – PCI DSS, HIPPA, SOC2(SSAE16), GLBA, CISInformation Security Audit
Deployment AutomationTerraformBash ProgrammingVirtualizationCloud Security FrameworkLinux System AdministrationDevOpsVoIP AdministrationAWS CloudFormationIT Compliance AuditEnterprise ArchitectureAmazon Web Services - $9 hourly
- 5.0/5
- (4 jobs)
INDIAN CPA | 9+ YEARS OF EXPERIENCE Hi, I am Deepak Gupta, A Chartered Accountant, and a Company Secretary by profession, having other certifications like Diploma in System Audit etc. I also have certificates in QuickBooks and Xero bookkeeping software. I have 9 years of experience in Multinational companies like Deloitte, Go Connects, and Accenture. After working in corporates for 9 years, I have acquired skills to handle bulk data along with data analysis. Being a professional in MNCs’ for 9years has made me very cooperative and ambitious to handle a new challenge with enthusiasm every single time. My experience of 9 years in financial Accounting has taught me: - Onboarding new clients and getting accounting systems set up - Interacting with clients on regular basis and conducting monthly calls to review financial results, building a co- operative relationship and understanding their requirements & queries - Maintaining monthly, quarterly and yearly Bookkeeping for corporate(s) based up in USA - Performing month-end and year-end close activities, from balance sheet and account reconciliations to financial statement preparation - Preparing monthly journal entries, accruals and allocations - Assisting in preparation of financial package in order to finalize reporting within the proper time frame for review - Responsible for handling and training a team of 7+ professionals - Experience with a wide variety of industries such as Construction, Property Rental, Farming, IT and Technical Services & Investment and Real Estate Brokerage - Worked on software’s such as QuickBooks (Online & Desktop), Xero, Microsoft Netsuite, Bill.com, Melio, Hubdoc, Acumatica, Lightspeed, Stripe and MS-Office and willing to work on multiple other accounting software as per client requirements - Maintaining Account Receivables & Payable - Converting from One Software to Another Getting Acknowledged with clients for the timely completion of the deliverables has given me immense confidence to handle any task most effectively and efficiently. I am also an expert in handling assignments related to "Start-Up" for which I can provide consultancy for all matters to New Entrepreneurs like Virtual CFO etc.Information Security Audit
Artificial IntelligenceInformation Security GovernanceInformation SecurityAccountingBookkeepingTax ReturnFinancial ProjectionAccounting Principles & PracticesFinancial Analysis - $25 hourly
- 5.0/5
- (21 jobs)
I am a Security enthusiast who is keen on learning and exploring the area of Cybersecurity. I am involved with VA/PT of web and mobile application projects and security research work. I have a total of 5+ years of work experience in Information Security. I worked on off-site testing of web applications, and mobile application VAPT and have conducted manual testing of applications and network testing for various domestic and international clients. I have good experience with penetration testing methodology and approach and have majorly worked on projects for domestic and international clients with a good track record of finding critical issues in applications and networks, which has eventually helped clients in patching issues and securing their IT assets. Profile Summary : --------------------- # Conducted web application penetration testing of business applications with a Business logic-focused testing approach. # Has good knowledge of IT infrastructure and configurations. # Can map out the network, and discover ports and services running on different exposed networks and security devices. # Conducted vulnerability assessment of mobile application penetration testing on Android and iOS platforms. # Performing social engineering attacks using Kali Linux. # Acquainted with various approaches to Gray & Black box security testing. # Deep knowledge about MySQL, Oracle, Microsoft office 2007 ~ 2020, Outlook, VM ware, Virtual Box. # Highly proficient in identifying OWASP Top 10 vulnerabilities in RedHat, WINDOWS XP/7/8/10, LINUX, Kali Linux, etc. # Methodologies worked on: Scrum, Agile, Waterfall, OWASP Rules. Professional Skill : -------------------- # Highly skilled individual with key interests in Audit, network security, and application-level penetration testing. # Well-versed in conducting application security audit both manually and through tools such as Burp Suite Professional, Metasploit Framework, Nessus, and Hands-on with tools like Burp Suite Pro, Kali Linux, Postman, etc. # Deep Knowledge of various Operating Systems like Windows XP, Vista,7,8,10; Mac OS; LINUX including Ubuntu and Kali. # Knowledge of OWASP Top 10 vulnerabilities and beyond and how to effectively mitigate them. We are a team of 3 members who have 2 years, 3+ years, and 6+ years of experience person with the same domain.Information Security Audit
Information Security ConsultationVulnerability AssessmentNetwork Penetration TestingWeb App Penetration TestingNessusPenetration TestingWebsite SecurityWeb Application SecurityCode ReviewAPI TestingWeb TestingNetwork Security - $25 hourly
- 4.7/5
- (13 jobs)
# Developed multiple Google API based solutions. # Collaborated with cross-functional teams to integrate G-Suite service with other systems and # applications. Configured and managing integration with 3rd party tools and services such as JIRA, OKTA, Salesforce etc. Creating and maintaining technical documentation, including system designs, configuration guides, operational procedures and incident reports. # Implemented Intune and Microsoft Defender for Endpoint in collaboration with Microsoft Partner. # Implemented PIM, PAM and Just in time access. # Security and Compliance: Implementing and enforcing security policies, ensuring data protection, access controls, and compliance with relevant regulations (such as GDPR or HIPAA). Conducting regular security assessments and vulnerability scans. # Documentation and Documentation: Created and maintained technical documentation, including system designs, configuration guides, operational procedures, and incident reports. Ensuring accurate and up-to-date documentation for effective knowledge sharing. # Work on internal escalations and coordinate with different business units.Information Security Audit
Mobile Device ManagementMicrosoft TeamsData AnalyticsOKTAServer AdministrationMicrosoft Power AutomateRemote Management SoftwareTechnical SupportMicrosoft Power BIGoogle Workspace AdministrationUser Identity ManagementVirtual Desktop InfrastructureSingle Sign-OnSystems EngineeringPythonMicrosoft Windows PowerShellMicrosoft Active DirectoryOffice 365Microsoft Azure - $15 hourly
- 5.0/5
- (20 jobs)
A Certified Information Systems Security Professional with 20+ years of experience, expertise in Information Security Management System (ISMS). I can help you with Information Security Governance, Risk and Compliance (GRC), ISO27001 certification (end-to-end), HITRUST/ HIPAA, SOC2, CMMC compliance and certifications, risk management, incident management, internal audit, awareness programs, BCP/DR, and Policy documentation. My Professional Qualification Includes CISSP, ISO27001:2013 LA, ISO22301, ISO31000:2009, CCSE, CCSA, CCNA, Qualys VA certifications, and Educational Qualification include Bachelor of Engineering degree in Electrical and Electronics Engineering.Information Security Audit
Policy WritingInformation Security GovernanceSOC 2 ReportSecurity FrameworkISO 27001Cloud Security FrameworkData PrivacyInformation Security AwarenessCyber Threat IntelligenceRisk AnalysisCybersecurity ManagementInformation SecuritySecurity Policies & Procedures DocumentationFirewall - $30 hourly
- 4.8/5
- (4 jobs)
I can offer a mix of experience & passion for work. Looking for a right opportunity to build a career which allows me to utilize and enhance my personal & professional skills in multifarious areas and to strive for betterment and expertise to help the growth of the organization and in turn grow with the organization. • I have worked in various Industry Verticals with 18+ Years of Professional experience in which 12+ Years experience in Global IT Infrastructure Management, Global Help desk, Customer Service , Office 365, Azure, Project Management . I have done most of it, including updating Firewalls. I would love to help anyone who approaches for a solution .Information Security Audit
AWS Systems ManagerInformation Security GovernanceInformation Security ConsultationInformation Security Threat MitigationCybersecurity MonitoringCybersecurity ManagementMicrosoft Azure AdministrationServerITILCitrixVMware AdministrationMicrosoft Active DirectoryMicrosoft Exchange Server - $34 hourly
- 0.0/5
- (2 jobs)
I am a Security Researcher with significant knowledge in IT security, Web Application Security, Mobile Application Security, Vulnerability Scanning. Currently working as Independent security researcher @bugcrowd and @inspectiv and VDP, RDP programs I am acknowledged and listed in "Hackers Hall Of Fame" For Finding several Security Flaws in Oneplus, Lenovo, Pinterest, Dell, Binance, Deutsche Telekom, Netflix, Dream11, GoPro, Under Armour, Nykaa, Indeed, OLX, SoundCloud, Tripadvisor, SAP Concur,Skyscanner and several of other Top Fortune Companies.Information Security Audit
Web Application SecuritySecurity EngineeringVulnerability Assessment - $30 hourly
- 5.0/5
- (7 jobs)
Hi, I am an (ISC)² certified security professional and cybersecurity consultant with 7+ years of experience in application vulnerability assessment and penetration testing, security auditing, Vulnerability management, and Incident Response. 🌟I currently work for a Fortune 50 company and day-to-day activities include Penetration Testing, Vulnerability Management,Threat Modeling, False-positive analysis, and automating security scans with DevSecOps. Handles different security tools in the product security lifecycle including SAST, DAST, SCA, Container Scan, IAC Scan, Secret scanning etc. 🙋🏼♂️I have good expertise with various security testing tools ranging from open source to enterprise-level tools including Burpsuite Pro, Invicti, Checkmarx, Tenable,Polaris etc. Certifications I possess • (ISC)² Certified in Cybersecurity • Ethical Hacking Certifications • Certified Security analyst • Splunk Certified power user ✅ Contact me for manual/automated vulnerability assessment and penetration testing (VAPT) of your web or mobile application. ✅ I can provide you with a detailed report of all the vulnerabilities in your app with risk rating and mitigation techniques for the same. ✅ The report will be in compliance with OWASP top 10 vulnerabilities, SANS top 25 software errors, and other industry-wide standards. ✅ A re-testing will be provided once the report is submitted and the client fixes the vulnerabilities to confirm all vulnerabilities are patched and ensure security.Information Security Audit
OWASPWebsite SecurityCode ReviewAPI TestingNetwork Penetration TestingWeb Application SecurityWeb App Penetration TestingCloud SecurityInformation Security ConsultationApplication SecurityPenetration TestingInformation SecurityVulnerability AssessmentSecurity Testing - $67 hourly
- 0.0/5
- (0 jobs)
ISO 27001 Lead Auditor Certified ISO 27001 Lead Implementer Certified Internal Audits(ISO 27001, ISO 27017, ISO 27018) Implemented Third Party Risk Management Programme Managed ~1200 vendor audits Led Third Party Risk Assessments end to end Helped an organization reach SOC 2 attestation readiness Helped an organization reach ISO 27001 certification readiness GDPR Implementation Led SOC 2 audit to successful completion Managed Risk TrackerInformation Security Audit
Risk AssessmentNIST Cybersecurity FrameworkIT Compliance AuditNIST SP 800-53ISO 27001ISO 27018ISO 27017Risk ManagementComplianceSOC 2Vendor ManagementCybersecurity ManagementInformation SecurityInformation Security Consultation - $60 hourly
- 5.0/5
- (1 job)
Let's break the notion, Let's build Projects that are not just amazing, but Secure as well! Traditionally, due to a lack of qualified Cybersecurity Professionals, web/mobile applications are built without security in mind and eventually they become easy targets for malicious hackers, Very often causing critical reputational and financial losses to the owners. With experience in developing projects using a wide range of technologies like UI-UX, Angular JS, PHP, and many more, and, Having consulted Tech Giants like Google, Twitter, Netflix, Uber, Pinterest, OpenSea, Yelp, Glassdoor, Kayak, etc. regarding their web/app security, I can deliver projects that are amazing as well as secure. I am sure together we can bring beautiful, safe projects to life.Information Security Audit
Cloud SecurityWordPress SecurityInternet SecurityWeb Application SecurityWebsite SecuritySecurity AnalysisWeb Application AuditOWASPApplication SecurityInformation Security ConsultationPenetration TestingVulnerability AssessmentSecurity TestingInformation Security - $30 hourly
- 4.9/5
- (1 job)
I have 10+ years of experience in information security with professional skills in PCI, risk assessment, compliance audit and management, third party risk analysis, risk management, GRC. I can provide the required and necessary security consultation your organization needs. I am also PCIP certified by PCI SSC. I provide consultation for various regulations like FFIEC, GDPR.Information Security Audit
ISO 27001SOC 2 ReportSOC 2IT Compliance AuditPCI DSSRisk AssessmentComplianceRisk Analysis - $70 hourly
- 3.7/5
- (3 jobs)
Business Continuity Manager I have strong business development professional skilled in; Business Continuity planning, ISO22301, Business Resilience, Crisis Management, Disaster Recovery, Training and Exercising, Leadership, Disaster Response and Risk Management, information security, cybersecurity, vulnerability assessment ISO 27001 ISO 22301 TrainingInformation Security Audit
Internal AuditingEmail SupportOnline Chat SupportProject Management ProfessionalMicrosoft Excel PowerPivotPowerPoint PresentationArtificial IntelligenceInformation SecurityCybersecurity ManagementISO 27001Crisis ManagementCrisis Communications PlanBusiness Continuity PlanDisaster Recovery - $40 hourly
- 0.0/5
- (0 jobs)
Greetings! I'm Supriya a dedicated Information Security and Governance, Risk, and Compliance (GRC) professional with 3 years of experience safeguarding digital assets and ensuring regulatory compliance for diverse organizations.Information Security Audit
Information Security - $120 hourly
- 0.0/5
- (0 jobs)
Alangh Infosec is a dynamic cybersecurity consultancy renowned for its expertise and excellence in safeguarding businesses against digital threats. With a team comprising seasoned professionals holding prestigious certifications such as CISSP, CISM, CISA, OSCP, Security+, and CASP+, we bring unparalleled knowledge and proficiency to the table. Our comprehensive cybersecurity consulting experience spans various domains, including application security testing, threat intelligence, security operations, network operations, and vulnerability management. We pride ourselves on delivering tailored solutions that address the unique security challenges faced by each client. At Alangh Infosec, we are dedicated to staying at the forefront of cybersecurity trends and technologies, ensuring that our clients receive the most advanced and effective protection available. Our commitment to excellence and our passion for cybersecurity drive us to continually evolve and innovate, empowering businesses to thrive in today's digital landscape.Information Security Audit
Source Code ScanningApplication SecurityNIST Cybersecurity FrameworkFedRAMPSecurity Operation CenterCloud SecurityPenetration TestingVulnerability AssessmentGDPRSOC 2HIPAAPCI DSSISO 27001Information Security Consultation - $20 hourly
- 4.7/5
- (7 jobs)
𝐀𝐛𝐨𝐮𝐭 𝐌𝐞: 👋 I’m Meetkumar, an 𝗜𝗧 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 with over 𝟭𝟬 𝘆𝗲𝗮𝗿𝘀 𝗼𝗳 𝗲𝘅𝗽𝗲𝗿𝗶𝗲𝗻𝗰𝗲 in 𝗜𝗧 𝘀𝘂𝗽𝗽𝗼𝗿𝘁, 𝗧𝗲𝗰𝗵𝗻𝗶𝗰𝗮𝗹 𝘀𝘂𝗽𝗽𝗼𝗿𝘁, 𝗖𝗹𝗼𝘂𝗱 𝘀𝘂𝗽𝗽𝗼𝗿𝘁, 𝗦𝘆𝘀𝘁𝗲𝗺 𝗮𝗱𝗺𝗶𝗻𝗶𝘀𝘁𝗿𝗮𝘁𝗶𝗼𝗻 including Windows and Linux environments. I have a strong background in IT compliance, particularly in adhering to 𝗜𝗦𝗢/𝗜𝗘𝗖 𝟮𝟳𝟬𝟬𝟭 𝘀𝘁𝗮𝗻𝗱𝗮𝗿𝗱𝘀, which ensures 𝗱𝗮𝘁𝗮 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝗻𝗱 𝗶𝗻𝘁𝗲𝗴𝗿𝗶𝘁𝘆 in all projects I undertake. 🔒 My expertise includes seamless 𝗘𝗺𝗮𝗶𝗹 𝗺𝗶𝗴𝗿𝗮𝘁𝗶𝗼𝗻𝘀 𝘁𝗼 𝗢𝗳𝗳𝗶𝗰𝗲 𝟯𝟲𝟱 𝗮𝗻𝗱 𝗚𝗼𝗼𝗴𝗹𝗲 𝗪𝗼𝗿𝗸𝘀𝗽𝗮𝗰𝗲, as well as smooth website migrations that ensure 𝘇𝗲𝗿𝗼 𝗱𝗮𝘁𝗮 𝗹𝗼𝘀𝘀. I am committed to providing proactive support, anticipating issues before they arise, and optimizing IT infrastructure to enhance business efficiency. 🛡️𝗖𝗼𝗺𝗽𝗿𝗲𝗵𝗲𝗻𝘀𝗶𝘃𝗲 𝗜𝗧 𝗦𝘂𝗽𝗽𝗼𝗿𝘁: I provide expert troubleshooting for hardware and software issues across various platforms. My goal is to minimize downtime and ensure seamless operation, allowing you to focus on your core business activities. Whether it's diagnosing network problems, resolving application errors, or addressing user concerns, I'm here to help. 📧𝗘𝗺𝗮𝗶𝗹 𝗠𝗶𝗴𝗿𝗮𝘁𝗶𝗼𝗻 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀: I specialize in migrating emails to Office 365 and Google Workspace. This includes planning the migration strategy, executing the transfer, and ensuring that users have a smooth transition with minimal disruption. I also offer training sessions to help users adapt to the new platforms, ensuring they can utilize all available features effectively. 🌐𝗪𝗲𝗯𝘀𝗶𝘁𝗲 𝗠𝗶𝗴𝗿𝗮𝘁𝗶𝗼𝗻: I have extensive experience in website migration, ensuring that your site is transferred smoothly without any data loss or downtime. I handle everything from database migration to DNS updates, guaranteeing that your online presence remains intact throughout the process. 💻𝗗𝗲𝘀𝗸𝘁𝗼𝗽 𝗦𝘂𝗽𝗽𝗼𝗿𝘁: My desktop support services include configuring and maintaining desktop environments, from installing operating systems to troubleshooting software issues. I focus on providing a user-friendly experience, ensuring that all devices are running optimally and securely. ☁️𝗖𝗹𝗼𝘂𝗱 𝗦𝘂𝗽𝗽𝗼𝗿𝘁: I am proficient in managing cloud platforms such as OCI, AWS, and Azure. My services include cloud migrations, optimization for performance and cost, and ongoing management of cloud resources. I help businesses leverage the full potential of cloud technology for scalability and flexibility. 🖥️𝗦𝘆𝘀𝘁𝗲𝗺 𝗔𝗱𝗺𝗶𝗻𝗶𝘀𝘁𝗿𝗮𝘁𝗶𝗼𝗻: With extensive experience in system administration, I manage servers, configure Active Directory, and implement security policies to safeguard organizational data. My proactive approach ensures that your IT infrastructure is robust, secure, and compliant with industry standards. 🔗 𝗡𝗲𝘁𝘄𝗼𝗿𝗸𝗶𝗻𝗴 𝗦𝗼𝗹𝘂𝘁𝗶𝗼𝗻𝘀: I excel in troubleshooting network connectivity issues and implementing secure configurations. My networking expertise includes configuring firewalls, managing VPNs, and optimizing network performance to support your business needs. 𝗔𝗽𝗽𝗿𝗼𝗮𝗰𝗵: I believe in a proactive and strategic approach to IT support. By anticipating potential issues and addressing them before they escalate, I help businesses save time and resources. My commitment to clear communication means that you’ll always be informed and supported, no matter the situation. 🤝𝗟𝗼𝗻𝗴-𝗧𝗲𝗿𝗺 𝗖𝗼𝗺𝗺𝗶𝘁𝗺𝗲𝗻𝘁: I am passionate about building long-lasting relationships with my clients. I’m eager to engage in long-term projects where I can adapt to your evolving IT needs, providing consistent support and contributing to your ongoing success. 🗓️𝗖𝗼𝗻𝘀𝘂𝗹𝘁𝗮𝘁𝗶𝗼𝗻 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀: I offer specialized IT consultation sessions for $15 per 30-minute Zoom meeting, focusing on: 𝗜𝗧 𝗜𝗻𝗳𝗿𝗮𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲 𝗔𝘀𝘀𝗲𝘀𝘀𝗺𝗲𝗻𝘁: Evaluating your current IT setup and providing recommendations for improvement. 𝗖𝗹𝗼𝘂𝗱 𝗠𝗶𝗴𝗿𝗮𝘁𝗶𝗼𝗻 𝗦𝘁𝗿𝗮𝘁𝗲𝗴𝗶𝗲𝘀: Tailoring cloud solutions to fit your business requirements, ensuring a smooth transition. 𝗧𝗲𝗰𝗵𝗻𝗶𝗰𝗮𝗹 𝗧𝗿𝗼𝘂𝗯𝗹𝗲𝘀𝗵𝗼𝗼𝘁𝗶𝗻𝗴: Offering expert guidance on resolving complex technical issues effectively. ⭐𝗖𝗹𝗶𝗲𝗻𝘁 𝗙𝗲𝗲𝗱𝗯𝗮𝗰𝗸: I consistently receive 5-star ratings from clients who value my dedication, expertise, and the positive impact I have on their projects. My goal is to build trust and deliver results that exceed your expectations. 𝗟𝗲𝘁’𝘀 𝗖𝗼𝗻𝗻𝗲𝗰𝘁: If you’re seeking a reliable IT professional to enhance your IT systems, streamline processes, and help you achieve your business goals, I’d love to chat! Let’s discuss how I can support your success and provide the solutions you need.Information Security Audit
IT Project ManagementIT RecruitingIT ConsultationInternal AuditingWebsite AuditMicrosoft Azure AdministrationDigitalOceanDesktop SupportSystem AdministrationIT SupportMigrationProject ManagementTechnical SupportTroubleshooting - $15 hourly
- 5.0/5
- (1 job)
Certified CCSFP & Risk Advisory Consultant with over 5+ years of hands-on experience in providing strategic guidance and tactical implementation of cybersecurity frameworks for a diverse clientele including NBFCs, Nationalized Banks, Fin-techs, and Stock Brokers. Proficient in navigating regulatory requirements such as ISO, PCI DSS, SOC Type 1 and 2, HIPAA, RBI, UIDAI, NPCI, and IRDAI to ensure compliance and mitigate risks. Skilled in conducting Third-Party Risk Management (TPRM) audits, having audited over 200+ vendors with a keen focus on enhancing security posturesInformation Security Audit
Cyber Threat IntelligenceCybersecurity ManagementPolicy WritingISO 27017ISO 27018Ethical HackingVulnerability AssessmentSecurity Policies & Procedures DocumentationSOC 2PCI DSSISO 27001Information Security ConsultationRisk Management - $70 hourly
- 0.0/5
- (0 jobs)
I am a sales head at a Cyber security Company providing Security/Compliance frameworks: ISO 27001, ISO 27701, ISO 9001, PCI DSS, PCI Secure SLC, PCI Secure Software, PCI 3DS, PCI PIN, PCIP2PE, SOC 1, SOC 2, SOC 3, SWIFT CSCF, CSA STAR, HIPAA, GDPR, DPDP, VAPT, Cloud Security review, Red Teaming, WASA, SAST, SAMA, NESA, UAE PDPL, Saudi PDPL, Qatar DPL. We are a team of 125+Certified cybersecurity experts committed to protecting your digital world. We bring unparalleled expertise to safeguard your organization from evolving threats. Having successfully served 450+ global entities, our reach spans 42+ countries, ensuring we understand and can address the unique security needs of organizations around the globe. With more than 21,000 assessments conducted, we pride ourselves on delivering actionable insights and tailored solutions to keep your data and assets secure. Trust us to be your dedicated partner in cybersecurity, offering a proven track record of excellence and a relentless commitment to your protection. You focus on business and we will take care of Security, Privacy and Compliance. Why People Choose Us : • 7+ lead Auditors with a minimum of 10+ years of experience holding esteemed credentials. • 300+ man years of collective experience in cybersecurity. • Serving over 450 clients across industries and regions. • Presence in 42+ countries. • Over 21,000+ assessments conducted. • Tailored Solutions for Your Business: • We have built long-lasting relationships with clients who trust us to safeguard their digital infrastructure. Let's get in touch to discuss how we can work together to find the best solution for you. (The hourly rate listed is only an estimate, as we tailor price based on the specific needs of the project.)Information Security Audit
Certified Information Systems Security ProfessionalGDPRPCIHIPAAPenetration TestingISO 9001Red Team AssessmentPCI DSSCybersecurity ManagementInformation SecurityISO 27001SOC 3SOC 2SOC 1 Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.