Hire the best Information Security Audit Freelancers in Texas

Check out Information Security Audit Freelancers in Texas with the skills you need for your next job.
  • $250 hourly
    As a Top Rated vCISO with a 100% job success rate, rest assured that I execute at a high level of expertise, integrity, and professionalism. I am the President & Founder of Aspire Cyber, a full-service consulting firm that rapidly delivers privacy and cybersecurity compliance solutions to help small and medium-sized businesses satisfy their legal, regulatory, and contractual requirements. Aspire Cyber was founded on the core belief that every business should have access to world-class cybersecurity talent, regardless of budget or security needs. I have over 20 years ​of experience managing information security projects and implementing strategic cybersecurity controls for the United States Army, Bank of America, and numerous Fortune 100 companies. We offer entirely “Done For You” solutions that help your business rapidly achieve compliance while we manage everything. Don’t waste 6-18 months trying to figure this out yourself. Regulatory and industry cybersecurity frameworks have hundreds of different controls you must comply with and require knowledge of IT, Cybersecurity, HR, Legal, and more. Aspire Cyber is a leading provider of comprehensive cybersecurity compliance solutions. Our team of experts has a proven track record of implementing NIST SP 800-171 practices to help defense contractors achieve Cybersecurity Maturity Model Certification (CMMC). We make it easy for your business to prove it's a safe choice for handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Schedule a free call with me to learn how our team of dedicated cybersecurity experts can help save you months of time and, in many cases, five or even six figures in excessive spending trying to become compliant without expert guidance. ★High Profile Clients ✔ I worked for the United States Army, Lockheed Martin, Bank of America, Hewlett-Packard Enterprise, and many others. Aspire Cyber specializes in the following areas: ★ Risk Assessment and Auditing - We have conducted over 200 Information Security, Business Continuity, and Cloud assessments. -Compliance (NIST, PCI, HIPAA, ISO 27001, GDPR, CCPA, COPPA, FedRAMP) - Cybersecurity Advisor -Cloud Secure Design -Data Privacy Officer (DPO) -Cloud Security -Policy Writing -Penetration Testing -Application Security -Incident Response -Vulnerability Management -Third-Party Risk Management -Security Awareness Training ★ I hold the following degrees and certifications: ✅ Certified CMMC Assessor (CCA) ✅ Certified CMMC Professional (CCP) ✅ CMMC Provisional Instructor ✅ Certified Information Systems Security Professional (CISSP) ✅ Certified Cloud Security Professional (CCSP) ✅ Certified Information Security Manager (CISM) ✅ Certified Risk and Information Systems Control (CRISC) ✅ CMMC Registered Practitioner ✅ CompTIA Security+ ✅ CompTIA A+ ✅ Master of Business Administration (MBA) ✅ Graduate Certificate Cybersecurity Technology WHY CHOOSE ASPIRE CYBER? -Professionalism: We treat all clients respectfully and adhere to the highest ethical standards. -Fast: We always aim to deliver your project ahead of schedule. -Expertise: We have vast experience across various cybersecurity and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. 🙋🏼‍♂️Our team is eager to partner with your organization to deliver cybersecurity compliance solutions rapidly. Contact Aspire Cyber today to learn how we can fulfill your cybersecurity needs.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Cloud Security Framework
    NIST SP 800-53
    Policy Writing
    Information Security Governance
    FedRAMP
    Information Security Awareness
    Risk Assessment
    NIST Cybersecurity Framework
    Business Continuity Plan
    Information Security
    Incident Response Plan
    Security Testing
    Vulnerability Assessment
  • $150 hourly
    I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startups and micro, small, and mid-sized companies create secure operating environments to increase business opportunities. I am also part of Upwork's Expert-Vetted Talent program. My priority is to create cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold a bachelor's degree in Telecommunications Engineering from the Airforce University in Argentina, a master's degree in Information Security Engineering from the SANS Technology Institute, and many cybersecurity certifications, including CISSP (Certified Information Systems Security Professional) and GSE (GIAC Security Expert).
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    WordPress Malware Removal
    Malware Removal
    CMMC
    Risk Assessment
    Cloud Security
    Internet Security
    Information Security Awareness
    Security Engineering
    Security Analysis
    Email Security
    Penetration Testing
    Information Security
    Security Policies & Procedures Documentation
    Cybersecurity Management
  • $132 hourly
    Accomplished professional with over 12 years comprehensive expertise in cyber security and network assurance. Demonstrated the ability to effectively handle demanding and complex assignments, consistently achieving positive results. High level of technical cyber security assurance and system administration as well as policy knowledge to include administrative skills combined with strong interpersonal communication skills to effectively deal with personnel, information and resources. I pride myself in my abilities to perform and maintain compliance for various systems by ensuring system/network availability, reliability, integrity, confidentiality and Information Assurance (IA) contingency plans according to the Risk Management Framework, Defense Information Systems Agency (DISA) and Department of Defense Information Assurance Certification and Accreditation Process (DICAP). My day-to-day operations consist of, but not limited to: Continuously monitoring various systems to ensure proper IA controls; Set Security Technical Implementation Guides (STIGS) according to governing regulations, policies, directives and agency standards. Disseminate information and ensure computer security practices are maintained at the appropriate level of protection and adhered to all functional areas and business support systems; and regularly perform security system audits using programs which identify system vulnerabilities including: Gold disk scan, Assured Compliance Assessment Solutions (ACAS), Security Content Automation Protocols (SCAP), and Security Requirements Guides (SRG). My technical skills are as followed but not limited to: MKTrust scans, Wireshark Testing, Retina Network Security Scanner, DISA Gold Disk Scans, Network & System Security, Risk Management, Vulnerability Assessments, Authentication & Access Control, Regulatory Compliance, NIST 27001/31000 , NIST 800-53 Risk Management Frame Work (RMF) and Department of Defense regulations, Nessus, Fortify, ACAS, SCAP XACTA IA Manager tool, Digital Certificates, Anti-Virus Tools (Norton, Symantec) Windows XP, Windows 2007, Windows Server 2003/2012 R2, Active Directory, LAN/WANs networking, VPNs, and Firewalls. Oracle 11 R2, TOAD, SQL Developer, Record management Virtual Environments (i.e. Hyper-V , VMWare, etc), eMass.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Information Security Governance
    Information Management
    Information Security
    Project Risk Management
    Vulnerability Assessment
    IT Compliance Audit
    Information Security Awareness
    Cybersecurity Management
    Windows Server
  • $90 hourly
    Information security professional with 15+ years of IT experiences in large corporate environments. An extensive record of project leadership on the design and implementation of organizational security policies, protocols, and technical solutions to protect networks, data, and infrastructure. Champion of preventive practices, keen ability to recognize emerging threats, and recommend scalable, cost-effective solutions to address immediate gaps and avert downstream risks. Skilled at helping stakeholders at all organizational levels understand the business imperatives for a sound security framework.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Technical Documentation
    Systems Engineering
    Information Security Awareness
    Certified Information Systems Security Professional
    Security Engineering
    Email Security
    Information Security Governance
    Security Operation Center
    Information Security
  • $125 hourly
    We are a team of highly skilled IT Governance, Risk, and Compliance (GRC) professionals with over 10 years of experience working across various industries, including healthcare, financial services, transportation, and manufacturing. Our expertise lies in IT audit, VCISO, cloud security architecture, policy development and review, business continuity planning (BCP), business impact analysis (BIA), disaster recovery planning (DRP), risk management, ISO 27001, NIST 800-53, and cloud platforms such as AWS, Azure, and GCP. At Cyfendry Consulting, we are dedicated to helping organizations identify and mitigate risks, improve their security posture, and comply with industry standards and regulations. Our passion lies in assisting businesses to transform and adapt to the ever-changing world of technology and cybersecurity. Education & Certifications Our team members hold various degrees and certifications, including: Bachelor's and Master's Degrees in Cybersecurity Management and Policy Executive Education in Cloud and DevOps - Digital Transformation Certified Information Systems Auditor (CISA) Certified Information Systems Security Professional (CISSP) Certified Data Privacy Solutions Engineer (CDPSE) Certified Information Security Manager (CISM) AWS Certified Solutions Architect Working with Cyfendry Consulting, you will: ★ Experience peace of mind as we take on the responsibility of security and compliance management, allowing you to concentrate on growing your business ★ Benefit from a cost-effective, streamlined approach with clear, actionable steps throughout the entire process ★ Save resources by leveraging our tried-and-true policies and procedures, which can be repurposed across multiple client projects ★ Receive comprehensive, end-to-end services, professionally managed to ensure success ★ Partner with a dedicated team that aims to provide long-term support, offering valuable advice and tailored services ★ Gain insight into various security and compliance requirements, empowering you to make informed decisions ★ Boost your credibility and confidently engage with enterprise-level clients, knowing that your security and compliance matters are expertly handled Additional Services In addition to our core expertise in IT GRC, IT audit, and cloud security, Cyfendry Consulting also offers: Policy Writing & Review: We create and review policies to ensure they align with industry standards and regulations, helping organizations maintain a robust and compliant policy framework. One Trust & ServiceNow Implementation: Our team assists with the configuration and implementation of One Trust and ServiceNow platforms, streamlining your organization's governance, risk, and compliance processes. Gap Analysis: We perform gap analyses to identify areas where your organization may not be fully compliant with regulatory standards, and provide recommendations for remediation and improvement. Commitment to Client Success At Cyfendry Consulting, we take pride in our dedication to client success. We believe in: Building lasting relationships with our clients, offering ongoing support and advice as their organizations grow and evolve Providing tailored solutions to meet the unique needs of each client, taking into account their industry, size, and specific challenges Continuously staying up-to-date with the latest industry trends, standards, and regulations to provide relevant and effective advice and solutions Emphasizing clear communication, transparency, and collaboration throughout the entire project lifecycle to ensure the best possible outcomes for our clients Professional Development & Industry Involvement Our team at Cyfendry Consulting is committed to ongoing professional development and staying active within the cybersecurity community. We participate in industry events, conferences, and training programs to maintain our expertise and expand our network of professionals. This engagement with the industry allows us to bring our clients the latest knowledge and best practices, helping them stay ahead of the curve in the ever-changing world of technology and cybersecurity. Please don't hesitate to reach out if you're looking for an experienced and dedicated team to help your organization with IT GRC, IT audit, or any other cybersecurity needs. At Cyfendry Consulting, we're here to support you in achieving your security and compliance goals.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Information Technology
    DevOps
    Risk Assessment
    PCI DSS
    Cloud Computing
    Governance, Risk Management & Compliance
    ISO 27001
    AWS Development
    NIST Cybersecurity Framework
    Security Framework
    Policy Writing
    Policy Development
    Information Security
  • $48 hourly
    As a dedicated computer science professional with over 4 years of experience in incident response, application security, vulnerability management, and threat intelligence, I possess a strong foundation in programming languages, data structures, algorithms, and software development methodologies. I earned my Bachelor's degree in Computer Science from The University of Texas at San Antonio, where I honed my skills in both software engineering and cybersecurity. I am proficient in deploying and managing firewalls, creating and maintaining security policies, and collaborating with IT teams to enhance network security. My programming and database management expertise enables me to effectively perform incident investigations, respond to security incidents, and analyze threat intelligence data to protect systems from evolving cyber threats. I thrive in collaborative environments, working alongside experts who share my passion for cybersecurity and software development. I am constantly driven to learn and grow, embracing challenges that push my skills forward. My career goal is to secure a role as a cybersecurity analyst, programmer, or secure software developer, where I can leverage my experience to contribute to the security and innovation of the organizations I serve.
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    Cloud Architecture
    Compliance
    Hardware Troubleshooting
    Troubleshooting
    VPN
    System Administration
    IT Consultation
    IT Compliance Audit
    Incident Response Plan
    Cloud Security
    Firewall
    Threat Detection
    Network Security
    Network Penetration Testing
  • $45 hourly
    NIST 800-53 Control Assessments ISO27001 FedRAMP GRC Assessments and Audits Data Privacy Specialist and GRC consultant IT audit OneTrust DATAGRAIL DSAR
    vsuc_fltilesrefresh_TrophyIcon Information Security Audit
    NIST SP 800-53
    Governance, Risk Management & Compliance
    Resume Writing
    Data Privacy
    Privacy
    Governance, Risk & Compliance Software
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses