Hire the best Internet Security developers
Check out Internet Security developers with the skills you need for your next job.
- $95 hourly
- 4.9/5
- (360 jobs)
𝗬𝗼𝘂 𝗳𝗼𝗰𝘂𝘀 𝗼𝗻 𝘆𝗼𝘂𝗿 𝗕𝗨𝗦𝗜𝗡𝗘𝗦𝗦, and leave security, privacy, and compliance to me! As the founder of 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆-𝗰𝗼𝗻𝘀𝘂𝗹𝘁𝗮𝗻𝘁.𝗰𝗼𝗺 I know that in the B2B space, you need Security, Privacy, and Compliance to sell to Enterprises! Let me help you unlock business opportunities and growth (💲millions) and sell to the likes of Disney, Pfizer, Uber, Siemens, Google, PWC, and so on. Sleep well overnight because you know you are in good hands with the 🥇 Upwork virtual CISO, Security, Privacy, and Compliance consultant (1M+ earnings, 20+ years of enterprise experience)! CEO selling to Morgan Stanley: 🥂"The certification is enabling us to strike a deal with a Fortune 100 client." CEO selling to Philips: 🍾 "We have achieved the ISO 27001:2022 certification in record time." CEO selling to Pepsi:🎉 "Attila supported the growth of our business into Fortune 100 accounts." COO selling to Fannie Mae:👏 "We achieved a successful SOC 2 Type II attestation with no exception." 💭Securing your business, passing security assessments by clients or prospects, and achieving a security certification 𝙨𝙝𝙤𝙪𝙡𝙙 𝙣𝙤𝙩 𝙗𝙚 𝙖 𝙘𝙪𝙢𝙗𝙚𝙧𝙨𝙤𝙢𝙚 𝙖𝙣𝙙 𝙥𝙖𝙞𝙣𝙛𝙪𝙡 𝙚𝙭𝙚𝙧𝙘𝙞𝙨𝙚. 👌 All you need to do is ping me on Upwork, bring your problem, and after a 15-minute scoping call, I will provide you with a detailed Scope of Work, including pricing! Specialized in business-to-business clients, providing 💸money-back guaranteed💸 ISO 27001, SOC 2, GDPR, HIPAA, PCI-DSS, CMMC, and FedRAMP projects and affordable virtual CISO (vCISO) services. ----> If you don’t get certified, all my fees will be refunded! <---- 𝙒𝙚 𝙖𝙧𝙚 𝙖 𝙜𝙤𝙤𝙙 𝙢𝙖𝙩𝙘𝙝 𝙞𝙛 𝙮𝙤𝙪 𝙖𝙧𝙚: 🤔 Want to understand the 𝙖𝙘𝙩𝙪𝙖𝙡 𝙘𝙤𝙨𝙩 for implementation and maintenance of the security controls? 😢Busy developing your product or business and don’t have time and resources to be consumed by compliance efforts and endless meetings, halting your production for months. 🤔Already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, Tugboat Logic, SecureFrame, Strike Graph, Audit Board, Trust Cloud, and so on) but 𝙙𝙤𝙣’𝙩 𝙠𝙣𝙤𝙬 𝙩𝙝𝙚 𝙣𝙚𝙭𝙩 𝙨𝙩𝙚𝙥 𝙤𝙧 𝙙𝙤𝙣’𝙩 𝙝𝙖𝙫𝙚 𝙩𝙞𝙢𝙚. 😢You quickly need quick security or privacy awareness training, cloud security posture assessment (AWS, GCP, Azure), endpoint security (MS 365 - Intune, Jumpcloud, Google Workspace), or penetration testing? 💪Facing challenges with the security and privacy implications of AI products? 💪Want continuous access to a certified, creditable security, compliance, and privacy professional to manage your security framework? -> Continous virtual CISO (vCISO / fractional CISO) service with affordable weekly payments! 😟Need world-class, battle-proof security and privacy policies and you need it quickly? These are the ones that have passed audits by KMPG, Deloitte, E&Y, Pepsi, Uber, Verizon, Philips, Facebook, and many others. Working with me, you will: ● Stop struggling with compliance requirements, security questionnaires, or useless document templates. ● Make the first steps on the journey to selling Enterprises ● Receive turnkey, Enterprise-grade security operation framework ensuring long-term effectiveness ● Work with an experienced senior team (architects, pen testers, endpoint engineers, developers, auditors, consultants) that regularly helps clients score Enterprise accounts. My stats are: ✅Saved tens of thousands $$$$$ for clients, advising them on the right security tools, solutions, and approach ✅#1 in Information Security and IT compliance categories (1M+ earned) ✅Supporting all time zones ✅Long-term engagements ✅Professional certifications (CISA, CISSP, ISO 27001 IA) About the Security Consultants team: QUALITY over QUANTITY is our ethos. Excellent quality, on time, always. We only take on projects when we can deliver outstanding results. The team consists of (only) senior experts in AWS, Azure, GCP DevOps, SecOps, Penetration testing, Google Workspace, MS 365 Intune, AppSec, auditing, and compliance. Professional Integrity: We are strongly committed to moral and ethical principles and values, such as honesty, honor, responsibility, trustworthiness, and objectivity. What we look for in a new client: ● Open-minded, relaxed attitude ● Values integrity & long-term relationships ● Willing to accept advice and guidance (security is a complex niche) Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, SIG Lite, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Process Unity Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS) CSAT, IRAP, PIPEDA, ISO 42001Internet Security DevelopersRisk AssessmentPenetration TestingIT Compliance AuditGovernance, Risk & Compliance SoftwareNIST Cybersecurity FrameworkInformation Security ConsultationGDPRISO 27001SOC 2AI SecuritySOC 2 ReportInformation Security AuditCertified Information Systems Security ProfessionalInformation SecurityCybersecurity Management - $40 hourly
- 4.1/5
- (19 jobs)
Cyber-attacks and data breaches are becoming a significant concern for all businesses in recent years. Therefore, information security is a critical component of every company’s success. It is imperative to protect data by designing, teaching, and implementing cyberattack prevention and mitigation strategies. A comprehensive Information and Cybersecurity framework is essential for health, manufacturing, financial, agric tech, and services-providing institutions. I'm passionate about helping discover and know invisible vulnerabilities in information security which might have grown and more visible over time, affecting your firm’s progress. As an experienced Information and Cybersecurity Analyst, I possess a proven track record of implementing and maintaining robust security measures to protect organizations' sensitive data and infrastructure and creating comprehensive online courses in information technology. With expertise in analyzing security risks, penetration testing, vulnerability assessment, and designing effective countermeasures, I am well-equipped to ensure the security and integrity of critical information assets with strong comprehensive research ethics. Throughout my career, I have been responsible for overseeing security operations, performing penetration testing, performing security audits and assessments, implementing security controls to mitigate risks, and implementing a zero-trust policy. My experience also includes conducting incident response investigations, managing security incidents, and developing disaster recovery plans. In addition, I possess strong technical skills in various security technologies, Technical Editing, Technical Documentation, Web Application Security, Network Monitoring, Security Analysis, Internet Security, and Application Security simulation, such as firewalls, intrusion detection systems, intrusion prevention, endpoint solutions, and antivirus software. I am also proficient in risk management methodologies, pen-testing, compliance standards, and regulatory frameworks, including PCI DSS, ISO, and GDPR. The ISO 27001 protocol defines the legitimate and functional institutional foundation for the information security sector and is thus crucial access point in business information security management the ISO 27001 protocol defines a legitimate and functional institutional foundation for the information security sector and is thus a key access point in business information security management. As an individual who is passionate about cybersecurity, I am always eager to keep myself updated with the latest threats and trends in the industry. I possess excellent analytical and problem-solving skills, concise research work, technical writing, strong attention to detail, and effective communication skills to collaborate with cross-functional teams and stakeholders. If you are looking for an Information and Cybersecurity Analyst who can provide comprehensive security solutions to safeguard your organization's valuable assets, and comprehensive research work. I would be delighted to explore opportunities to contribute my skills and experience to your team. Whether you're developing content for the C-Suite (CEOs, COOs, CIOs, CTOs, etc.), board members and external stakeholders, dev teams, clients, or a general audience - I know how to switch up styles to suit My secret? I'm a hard-core researcher, versatile, creative, and zero-trust policy-oriented. My goal is to contribute to your success story by solving the most basic of your business's network security, cybersecurity, documentation, complaint, auditing, policy drafting, IT security, and penetration testing needs. As far as qualifications go, I have over 7 years of experience, certified in Network Security, ISO 27001, CCNA, CEH, CISSP, and Network+. My specialties include: Information Security Security Analysis Internet Security Application Security Ethical Hacking Network Security Vulnerability Assessment Encryption Decryption VPN Web Application Java Penetration Testing Security Analysis Network Monitoring PCI Email Security Zero trust policy Data Protection Consultant Security Auditing Security Policy Development Data Privacy Compliance Security Frameworks (ISO 27001, NIST) Identity and Access Management (IAM) Security Awareness Training Security Engineering Information Security Awareness Security Management Information Security Audit System Monitoring Cybersecurity Management Security Policies & Procedures Documentation Web Application Security Information Security Audit Compliance Consultation ISO 27001 Information Security Governance Content Writing Technical Editing Content Management Technical Documentation You can find out how to get started by sending a message to me and I am available to add value and give maximum ROI.Internet Security DevelopersPolicy WritingInformation Security AuditBusiness IT AlignmentCompliance ConsultationPenetration TestingMicrosoft WindowsPythonBash ProgrammingLinux PAMResearch DocumentationWeb DevelopmentCybersecurity ManagementEthical HackingCertified Information Security Manager - $75 hourly
- 5.0/5
- (33 jobs)
I am the CEO & Founder of InfoSec4TC and Securium Solutions, specializing in Information/Cyber Security Consulting, Technology, and Cyber Risk Management Services. With extensive experience in assisting startups, micro, small, medium-sized, and large companies, I focus on implementing information/cyber security standards and creating secure operating environments to enhance business opportunities. My expertise is centered on delivering cost-effective, business-focused, and risk-driven information/cyber security solutions. Before founding InfoSec4TC, I accumulated a wealth of experience in various information/cyber security roles, from operations to strategy and architecture across diverse industries. I hold a Ph.D. in Computer Science from Alexandria University in Egypt, complemented by a suite of professional information/cyber security certifications including CISSP, CEH, CHFI, MCSE, CCNP, and I am a certified instructor (MCT, CEI, CCSI) with PMP certification. I offer a targeted portfolio of services, with a deep specialization in: - Standards and Compliance: Expertise in NIST, ISO 27001:2022, GDPR, NESA, ISR v3, PCI DSS, HIPAA, and regional standards in KSA such as NCA ECC, SAMA, and SDAIA. - CISO as a Service: Providing strategic leadership in information/cyber security for organizations looking to mature their information/cyber security posture. - Information/Cyber Security E-Learning and Mentoring: Comprehensive training programs tailored to organizational needs. - Gap Assessments and Audits: Evaluating technical and business processes to identify vulnerabilities and compliance gaps. - Risk Management Solutions: From identity management and risk assessments to cyber insurance readiness. - Penetration Testing and Social Engineering: Proactively testing defenses and employee awareness to fortify security. Additional Services: Cyber Resilience and Disaster Recovery Planning Cloud/IoT/Application Security Assessment. I am also proud to offer information/cyber security resources in French, enhancing our support for Francophone clients across the globe.Internet Security DevelopersPCI DSSInformation Security AuditGDPREthical HackingISO 27001Information Security AwarenessCertified Information Security ManagerSecurity Operation CenterArticle WritingInformation Security ConsultationSecurity Policies & Procedures DocumentationNetwork SecurityVulnerability AssessmentPenetration Testing - $150 hourly
- 5.0/5
- (172 jobs)
I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startups and micro, small, and mid-sized companies create secure operating environments to increase business opportunities. I am also part of Upwork's Expert-Vetted Talent program. My priority is to create cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold a bachelor's degree in Telecommunications Engineering from the Airforce University in Argentina, a master's degree in Information Security Engineering from the SANS Technology Institute, and many cybersecurity certifications, including CISSP (Certified Information Systems Security Professional) and GSE (GIAC Security Expert).Internet Security DevelopersWordPress Malware RemovalMalware RemovalCMMCRisk AssessmentCloud SecurityInternet SecurityInformation Security AuditInformation Security AwarenessSecurity EngineeringSecurity AnalysisEmail SecurityPenetration TestingInformation SecuritySecurity Policies & Procedures DocumentationCybersecurity Management - $80 hourly
- 4.8/5
- (115 jobs)
My extensive experience in Cloud,Database and CyberSecurity over the past years include the following: 1). CISSP; Information security, Cybersecurity,Compliance 2) Information Security/Vulnerability Testing 3). Oracle Performance Tuning 4). Oracle Database technologies, SQL tuning,flashback, RMAN, RAC and others 5). Database System Security Scans and Vulnerability testing 6). Oracle Certified Professional 10g and 11g, 12c 7). Oracle Certified Database Security Implementation 8) AWS Solutions/Administration/EC2/S3/Cloud 9). HiTRust Aware/PCI DSS Aware 10). Microsoft Certified: Azure Fundamentals Please let me know if you have any questions.Internet Security DevelopersPCIData ProtectionOracle Database AdministrationLinux System AdministrationSecurity Operation CenterSecurity EngineeringOracle DatabaseInformation Security GovernanceCertified Information Security ManagerPCI DSSSecurity InfrastructureDatabase AdministrationNetwork Penetration TestingOracle Performance TuningInformation Security - $250 hourly
- 5.0/5
- (33 jobs)
As a Top Rated vCISO with a 100% job success rate, rest assured that I execute at a high level of expertise, integrity, and professionalism. I am the President & Founder of Aspire Cyber, a full-service consulting firm that rapidly delivers privacy and cybersecurity compliance solutions to help small and medium-sized businesses satisfy their legal, regulatory, and contractual requirements. Aspire Cyber was founded on the core belief that every business should have access to world-class cybersecurity talent, regardless of budget or security needs. I have over 20 years of experience managing information security projects and implementing strategic cybersecurity controls for the United States Army, Bank of America, and numerous Fortune 100 companies. We offer entirely “Done For You” solutions that help your business rapidly achieve compliance while we manage everything. Don’t waste 6-18 months trying to figure this out yourself. Regulatory and industry cybersecurity frameworks have hundreds of different controls you must comply with and require knowledge of IT, Cybersecurity, HR, Legal, and more. Aspire Cyber is a leading provider of comprehensive cybersecurity compliance solutions. Our team of experts has a proven track record of implementing NIST SP 800-171 practices to help defense contractors achieve Cybersecurity Maturity Model Certification (CMMC). We make it easy for your business to prove it's a safe choice for handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Schedule a free call with me to learn how our team of dedicated cybersecurity experts can help save you months of time and, in many cases, five or even six figures in excessive spending trying to become compliant without expert guidance. ★High Profile Clients ✔ I worked for the United States Army, Lockheed Martin, Bank of America, Hewlett-Packard Enterprise, and many others. Aspire Cyber specializes in the following areas: ★ Risk Assessment and Auditing - We have conducted over 200 Information Security, Business Continuity, and Cloud assessments. -Compliance (NIST, PCI, HIPAA, ISO 27001, GDPR, CCPA, COPPA, FedRAMP) - Cybersecurity Advisor -Cloud Secure Design -Data Privacy Officer (DPO) -Cloud Security -Policy Writing -Penetration Testing -Application Security -Incident Response -Vulnerability Management -Third-Party Risk Management -Security Awareness Training ★ I hold the following degrees and certifications: ✅ Certified CMMC Assessor (CCA) ✅ Certified CMMC Professional (CCP) ✅ CMMC Provisional Instructor ✅ Certified Information Systems Security Professional (CISSP) ✅ Certified Cloud Security Professional (CCSP) ✅ Certified Information Security Manager (CISM) ✅ Certified Risk and Information Systems Control (CRISC) ✅ CMMC Registered Practitioner ✅ CompTIA Security+ ✅ CompTIA A+ ✅ Master of Business Administration (MBA) ✅ Graduate Certificate Cybersecurity Technology WHY CHOOSE ASPIRE CYBER? -Professionalism: We treat all clients respectfully and adhere to the highest ethical standards. -Fast: We always aim to deliver your project ahead of schedule. -Expertise: We have vast experience across various cybersecurity and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. 🙋🏼♂️Our team is eager to partner with your organization to deliver cybersecurity compliance solutions rapidly. Contact Aspire Cyber today to learn how we can fulfill your cybersecurity needs.Internet Security DevelopersCloud Security FrameworkNIST SP 800-53Policy WritingInformation Security GovernanceFedRAMPInformation Security AwarenessRisk AssessmentNIST Cybersecurity FrameworkBusiness Continuity PlanInformation Security AuditInformation SecurityIncident Response PlanSecurity TestingVulnerability Assessment - $30 hourly
- 4.6/5
- (91 jobs)
I have executed some 44 projects in upwork in information security, governance, IT service management, SIEM, and others and earned customer accolades. I continue to nurture my skills that will benefit my customers. I am all for value creation in IT because every penny spent must return value and do the business and IT a secure and safer workplace. Govind has spent 25 years in the IT and he is - ISO 27001 Lead Implementer from PECB Canada - ITIL Expert V3 , ITIL4 FL, ITIL4 MPT Certified - Certified ISO 27001 Lead Auditor, ISO 22301 Lead Auditor, ISO 20000 Lead Auditor - COBIT5 certified in the IT Governance - PMP, PRINCE2, - CSQA, - ISO 20000 Implementer - DevOps Master Currently pursuing education in CISSP and Data Privacy Skills :- Over last decades he has extensively worked and provided solutions in below areas. He brings multiple skills. - Implementing GRC - HIPAA, SOX, PCI/DSS, HITRUST 9.3, FedRamp, SOC2 (T1/T2) - Implementing Unified Controls for Security (UCF) - Implementing Information Security framework using ISO 27001/SOC2/ISO 22301 - Cybersecurity incident response management using NIST, SANS, ISO 27035, COBIT - Risk Assessment, IT Auditing - Jira Implementation both Project and ServiceDesk - Gap Analysis of IT Asset management, Compliance, COBIT Processes - Implementing Best Practices using ITIL/COBIT5 Processes - Implementing BPM Solutions using Appian, Bonitasoft, AgilePoint - Implementing Monitoring framework for IT Devices using Zabbix - Performance and Capacity solutions - Workflow automation - IT Service management using ServiceNow as a architecture - Implementing DevOps End to end for CI, CT, CD - Gap Analysis for CMDB and road map for improvements - A well groomed developer in scripting and development in various technologies - Attlasian Jira admin activities - Robotic Process Automation using UIPath, BluePrism, AutomationAnywhere Education : He is a post graduate in the Statistics with a specialty in Operations research and SQC. He then did Post graduate diploma in the Reliability. He has worked in niche technologies and fortune 500 clients since 2 decades across the globe. Extras :- He is editor of a book called "How to reduce cost of software testing" published by CRC Press and has spoken in conferences and written articles. Passion for Excellence:- He is passionate on creating value in the information technology space and is doing research in various areas such as IT Asset management, IT Cost management, Performance and scalability management. He is eager to help clients in below skills a.Implementing IT Governance, Risk and Compliance using COBIT5 framework b.Implementing ITIL best practices c.Implementing Test Automation using Selenium and other tools d.Implementing DevOps solutions in cloud and non cloud e.Implementing Security solutions using ISO 27001 and COBIT5 framework f.Implementing Business Process Automation using Bonitasoft, Agilepoint NX, Appian, BPM Online and others g.Implementing SIEM using Zabbix and other tools h.Implementing ServiceNow ITSM Tool as an architect i.Implementing a monitoring framework using Zabbix for capacity management j.Compliance like HIPPA, PCI DSS j.IT Audits Availability : I am available for assignments immediately on request. Major clients Worked : British Telecom, MetLife, Liberty Life, Euromax, Covad, UHI and many more. Visas : I had H1 Visa US, WP for UK, Netherlands, South Africa. Currently have B1 visa for US and can travel if there is a need Will be glad to associate to create value in ITInternet Security DevelopersProject Risk ManagementUnified Threat ManagementISO/IEC 20000Business Continuity PlanRisk AssessmentHITRUST Common Security FrameworkPCISOC 2 ReportGovernance, Risk Management & ComplianceITILInformation SecurityISO 27001HIPAAComplianceCOBIT - $30 hourly
- 4.8/5
- (106 jobs)
Welcome to my profile! As an accredited ISO 9001 and ISO 27001 Lead Auditor, I bring a wealth of expertise in driving quality management and information security standards for businesses of all sizes. My passion lies in helping organizations streamline their processes, enhance operational efficiency, and secure their information assets. What I Offer: ⚡ Comprehensive Auditing: In-depth audits for ISO 9001 (Quality Management Systems) and ISO 27001 (Information Security Management Systems), ensuring compliance and identifying areas for improvement. ⚡ Customized Solutions: Tailored advice and strategies to meet your specific organizational needs, while aligning with international standards. ⚡ Continuous Improvement: Guidance on implementing best practices for ongoing quality and security enhancements. ⚡ Risk Management: Expert analysis and recommendations to mitigate risks, ensuring robust and resilient systems. ⚡ Training and Support: Providing staff training and support to understand and effectively implement ISO standards. Why Choose Me? ⚡ Proven Track Record: Years of experience successfully auditing and consulting various companies, leading to enhanced quality and security standards. ⚡ Client-Centric Approach: I prioritize understanding your unique challenges and goals to provide the most effective solutions. ⚡ Up-to-Date Knowledge: Constantly updating my skills and knowledge to stay at the forefront of ISO standards and auditing techniques. ⚡ Detail-Oriented: Meticulous attention to detail, ensuring no aspect of your systems is overlooked. ⚡ Effective Communication: Clear and concise communication to ensure you are informed and engaged throughout the auditing process. Whether you're looking to achieve initial ISO certification, maintain compliance, or improve your existing systems, I am here to guide you every step of the way. Let's work together to elevate your organization's quality and security standards to new heights! Contact Information: ✉️ Email: heeanaacharya@outlook.com 📱 Phone: +91 9718835704 🗓️ Calendar: calendly.com/heenasharma/isoconsultationInternet Security DevelopersHIPAASOC 3GDPRSOC 2 ReportISO 9000ISO 9001CMMCSOC 1Six SigmaISO/IEC 20000ISO 27017ISO 27018ISO 27001ISO 14001SOC 2 - $50 hourly
- 4.9/5
- (60 jobs)
Elastos Chimwanda is a highly accomplished cybersecurity and cloud security advisor, with a proven track record of delivering exceptional advisory services to clients across various sectors worldwide. With extensive experience in audit, cybersecurity, and cloud security, and multiple professional certifications, including CISSP, CISA, CIA, CCSP, and ISO/IEC 27001 Lead Auditor, he is highly regarded as a Subject Matter Expert (SME) in the cybersecurity field. Elastos collaborates with reputable institutions, such as the IIA, ISACA, ISC2, CSA, OWASP, and CIS, and actively contributes to the development and dissemination of cybersecurity knowledge and best practices thus further solidifying his credibility in the cybersecurity industry. His expertise in a wide range of cybersecurity frameworks, including NIST CSF, ISO/IEC 27001, SOC 2, PCI-DSS, CCM, FedRAMP, CMMC and Cyber Essentials Plus, makes him a valuable asset to organizations seeking to assess and strengthen their cybersecurity posture on-premises, in the cloud and/or in multi-cloud environments.Internet Security DevelopersWebsite AuditIT Compliance AuditSecurity EngineeringPenetration TestingSOC 2Vulnerability AssessmentInformation Security AuditISO 27001NIST Cybersecurity FrameworkInformation SecurityTechnical WritingPCI DSSCybersecurity ManagementInternal AuditingCloud Security - $45 hourly
- 4.9/5
- (94 jobs)
Cybersecurity Professional focused on making sure your data and information are secure by properly identifying, mitigating and fixing vulnerabilities as well as setting up monitoring platforms for monitoring, additionally I have worked with Python and other scripting languages for data collection, manipulation and visualization. I have experience as a ghostwriter and an editing of texts, I currently hold the position of editor and proofreader for an e-magazine that has been running three years strong delivering books every six months.Internet Security DevelopersScriptingTechnical WritingIncident Response PlanElasticsearchHistoryDockerLinux System AdministrationWeb DevelopmentAT&T CybersecurityBash ProgrammingSplunkWritingData ScrapingPythonMySQL - $25 hourly
- 4.7/5
- (13 jobs)
Highly motivated and experienced professional, with experience in supervisory positions, seeking opportunities in career fields complimentary to my experience and expertise in project management, IT, customer service support and/or customer training and mentorship. Exceptional understanding of IT concepts, cyber security and/or project management. Expert knowledge of office automation software and hardware tools, to include the MS Office Suite.Internet Security DevelopersRisk AssessmentGap AnalysisSecurity Policies & Procedures DocumentationIT Compliance AuditContent WritingDisaster Recovery PlanNIST SP 800-53Governance, Risk & Compliance SoftwareCybersecurity ManagementResume WritingCompany PolicyData PrivacyCertified Information Systems Security ProfessionalInformation SecurityISO 27001Tech & IT - $40 hourly
- 5.0/5
- (10 jobs)
🙋🏼♂️ I have helped companies eliminate their in-securities in Information Security. ⚡I offer practical consultancy with: ⚡ - Security Operations Center (SOC) - SOC Processes and SOC Manual - Implementation of CKC and Mitre Attack Framework-based Usecases - Security Incidents Management Lifecycle - Cloud Security Management - Cloud Security integrations on Azure - Regex writing and Automation - SIEM Engineer (Controls Integration and Configuration e.g SIEM, Firewalls, WAF) - SOAR Playbooks - SOC Gap Assessment based on SOC CMM - Security Analysis and Threat Hunting - Security Training, Coaching, and Awareness - Security Policy development - Basic Python Code Writing - SOC Team Shifts and Roster management Description: I, very humbly, propose myself to be a technically sophisticated, highly energetic, and motivated information security professional. I have worked in technical roles, security operation centers, and strategy roles with both national and international clients. I'm currently working as an Associate Manager Information Security Operations Center for a financial institute as well as a part-time freelance consultant. The vast majority of my experience is in the financial services sector, the most heavily regulated and mature industry for cybersecurity. Due to my previous freelancing experience, I excel in working directly with customers in identifying breaches and recommending how they can improve their security posture. With cyber security, a business can't focus on improving everything, so it is important to focus on those few areas which give the greatest return on investment. My specialty is simply explaining cyber-related businesses risk, and advising on solutions in a rational, quantified manner to maximize ROI, both in effort and cost. My Certifications : ⚡ IBM Security - Certified Information Security Analyst ⚡ 5+ Years of hands-on experience with national and international clients ⚡ Understanding your requirement and tailoring my methodology accordingly is my PRIORITY ⚡ ISACA CISM (Certified Information Security Manager) ⚡ CompTIA CySA+ Certified ⚡ EC-Council CEH Certified ⚡ Microsoft Azure: Fundamentals(AZ-900) Certified ⚡ CNSS | ICSI, UK CertifiedInternet Security DevelopersCloud Security FrameworkCloud SecurityMicrosoft AzureCyber Threat IntelligenceSecurity AnalysisCertified Information Systems Security ProfessionalISO 27001Project ManagementSecurity Operation CenterPenetration TestingInformation Security ConsultationNetwork SecuritySecurity Policies & Procedures DocumentationVulnerability AssessmentCybersecurity Management - $50 hourly
- 4.9/5
- (20 jobs)
Following is a summary of my skills: • ISO27001 compliance and gap analysis • IT Security Policies and Frameworks • PCI DSS Assessment level 1 & 2 for merchants and Service provider • Penetration testing • SIEM and Forensics analysis • NIST 800-53 • Risk Assessment and Treatment • Application security vulnerabilities, testing techniques, and the OWASP framework • GDPR • Vulnerability Scanning Experience: • Advise Network and system team to securely build/change Azure and AWS cloud infrastructure for existing and potential clients. • Engage with Client to understand their infrastructure requirements to build and integrate AWS API’s and services. • Maintain and improve ISMS framework that includes SOA, Risk assessment and treatment plan, Risk register and ISM forum to convey the risk to management for their review and support. • Maintain security certifications, including ISO 27001, IRAP and PCI dss. • Conducts Gap assessment as per ISM, PSPF, ISO27001, PCI, NIST and GDPR. • Monitor and assure compliance with information security and privacy regulations, including APRA CPS 234, Privacy Act and GDPR • Manage internal and external audits and remediation • Deliver training programs for security and privacy awareness • Conduct/review security risk assessments of assets and projects • Manage supply chain security • Support Sales and commercials team in responding to security questionnaires • Provides application security services including secure coding techniques and reviews, education & awareness, process and tools, security testing support and guidance for internal software development projects • Reviews information security policies, incident response plans, change management, vulnerability management, patch management policies, etc., as they apply to various facets of the infrastructure in scope. • Performs internal penetration tests, network vulnerability assessments to provide a comprehensive view of the client’s network weaknesses that are exposed to threats. Following are the certifications I have: CISSP CCSP (Cloud security) CEHInternet Security DevelopersEmployee TrainingData ProtectionPCICertified Information Systems Security ProfessionalHIPAAOWASPGDPRAT&T CybersecurityNessusVulnerability Assessment - $30 hourly
- 4.9/5
- (204 jobs)
Greetings, I specialize in creating visually appealing business plans and pitch decks that include in-depth financial forecasts. With more than a decade of experience and valuable insights gained from completing over 500 projects, I can assist you in turning your concept into thriving business. I will create detailed and persuasive business plan and pitch deck customized for your unique needs, offering strategic advice to you and your team, and helping secure the necessary funding from investors or financial institutions. Browse my project catalog for standardized services and select the ones that best fit your requirements. ➥ SERVICE CATEGORIES ----------------- Business Plans - I prepare customized business plans for start-ups as well as already established businesses, including content such as Executive Summary, Business Model, Marketing Strategy, Market Research, Competitive Landscape, and Financial Projections. Pitch Decks - I create investor-ready pitch decks incorporating infographics to ensure that the concept is easily understood at a glance. I personally create the content and design the deck in alignment with the brand's identity. Financial Projections and Modeling - I develop comprehensive financial models in Excel that encompass five-year forecasts, including the Income Statement, Cash Flow Statement, Balance Sheet, Ratio Analysis, Breakeven Analysis, and calculations for NPV and IRR. Furthermore, I specialize in creating Excel models tailored for businesses' internal use, allowing them to manipulate various assumptions and parameters. Market Research and Feasibility Reports - I also produce market research and feasibility reports for entrepreneurs looking to evaluate the viability of their ideas. ➥ EXPERIENCE ----------------- I have executed numerous projects in industries including, SaaS platforms, food startups, medical industry, leisure & travel industry, hotel booking platforms, solar or renewable projects, agricultural equipment & machinery selling, online dating apps, education sector, beauty & wellness, digital marketing, e-learning, e-commerce, airline, real estate, agriculture & hydroponic farming, IoT, home services apps, fitness apps, restaurants, RV parks, construction ecosystem apps, financial consultancy, and many more. ➥ WHAT MY CLIENTS SAY ABOUT ME: ----------------------------------------------- 🏆"She is a rockstar, very quick with her turn around. Kulzinder helped us from the beginning til the end with every aspect of the business plan and financial modelling. I am very grateful to her commitment and expertise.” - Olivera (Dating App Business Plan) 🏆"Kulzinder is a dedicated researcher and delivers exemplary research and analysis, alongside thorough and well-constructed deliverables. We look forward to working with her again.” - Taylor (Market Research and Competitive Analysis) 🏆"Kulzinder delivered an extremely well-written & detailed Business Plan. On-time, talented, professional. and a pleasure to work with” - Nezar Bakhsh (Investment Platform Business Plan) ➥ OVERALL EXPERIENCE: -------------------------------- ✔ Business Plans (including, SBA Loan, L1, E2, and UK Visa Plans) ✔ Pitch Decks (Investor Presentations) ✔ Financial Models ✔ Market Research Reports ✔ Competitive Research and Analysis in Excel (including their key information) ✔ Feasibility Reports ✔ Business Valuation ✔ Excel Modeling ✔ Financial Statements Preparation ➥ ABILITIES ---------------- Being experienced and energetic, I will be able to provide best outcomes in terms of final work delivery for each of my project. My excellent English writing skills, analytical ability, flexibility of schedule, availability to customized working hours, and commitment to meet deadlines are my core assets and I will be there to help you at all stages of business growth. Looking forward to connect with you. Thanks!Internet Security DevelopersBusiness Proposal WritingPitchbookBusiness PresentationBusiness PlanFeasibility StudyFinancial WritingMicrosoft Excel PowerPivotFinancial PlanningOnline Market ResearchBrochureFinancial ModelingFinancial PresentationMarket Research - $40 hourly
- 4.9/5
- (3 jobs)
Experienced Information Security Consultant with 12+ years experience. Holding key certifications from Cisco, ISACA, ISC2, etc., in addition the strong academic background demonstrating a versatile skill set. I am experienced in Information Security Audits, Risk Management, Risk Assessment, Vendor Risk Assessment, Information Security Policy and procedures formulation, compliance with various security standards. I have assisted several global clients and startups in cyber-security compliance assessments using NIST 800-53, NIST CSF, SOC 2, ISO 27001, GDPR etc. based controls and supported remediation activities. I have a deep understanding of security frameworks and regulations such as HIPAA. GDPR, Data Protection Act and standards such as ISO 27001:2013, PCI-DSS etc. I specialise in delivering precise and timely large and small-scale cybersecurity programs. A strategic thinker committed to staying ahead of evolving threats, blending a robust educational background with technical expertise for effective information security governance. I am actively engaged in professional communities, showcasing dedication to ongoing learning and collaboration. Open to new opportunities, seeking to leverage experience and skills and looking for building long term professional relationships.Internet Security DevelopersPolicy DevelopmentBusiness Continuity PlanGDPRDisaster RecoveryData ProtectionCompliancePolicy WritingISO 27001Risk AssessmentData PrivacyCloud SecurityInformation Security AuditPCI DSSApplication SecurityInformation Security - $80 hourly
- 5.0/5
- (67 jobs)
Transforming Information Security into a Competitive Advantage! I have the ability to translate complex compliance requirements into clear and concise language that resonates with the business. I'm a certified senior professional specializing in implementing and managing diverse security frameworks, including ISO 27000 family, SOC 2, PCI, GDPR, HIPAA, FedRAMP and CMMC. With a proven track record of guiding businesses to successful certification, I can help you achieve compliance while mitigating risks. Don't wait until it's too late! Contact me now and avoid drowning in compliance requirements. I'm well-versed in compliance platforms like Thoropass, Drata, StrikeGraph, and TrustCloud. Explore how I can assist you and inquire about my 10% referral discount.Internet Security DevelopersCMMCRisk ManagementMicrosoft SQL ServerSecurity FrameworkNIST Cybersecurity FrameworkHIPAAGDPRNIST SP 800-53Data PrivacyInformation Security AuditComplianceGovernance, Risk Management & ComplianceISO 27001SOC 2 ReportInformation Security - $15 hourly
- 5.0/5
- (8 jobs)
IT Security professional with more than 7 years of experience of developing and implementing security solutions along with Operational support in fast-paced environments with various national and international clients. I am skilled in various enterprise applications and network security solutions with proven history of delivering exceptional risk management support and delivering the best of my services. My skills include: - Identity and Access Management - Firewalls / IDS/ IPS - SIEM (QRadar, AlienVault , Wazuh) - Log correlation and aggregation (Splunk, ELK) - DevOps - System administration & Support - Network Security & Administration - Application Deployment & Support - TroubleshootingInternet Security DevelopersApplication SecuritySystem SecurityVICIDIALVulnerability AssessmentNetwork AnalysisApplication IntegrationSystem DeploymentVMware ESX ServerSecurity AnalysisSplunkInformation Security AuditVPNFirewallSystem AdministrationSystem Monitoring - $99 hourly
- 4.4/5
- (4 jobs)
Why Me ? My mission is my customer satisfaction. For that I, continuously provide innovative solutions to my clients in order to create maximum value for their business. I provide a complete range of affordable; 1) Information Security Solutions (ISO/IEC ISMS 27001 Auditor and Implementer Services, CISA) 2) ISO 9001, 14001, 45001 Certifications 3) ISO 22301, ISO 10002 Certifications 4) ISO 15189 & ISO 17025 5) ISO 13485 6) GDPR 7) Remote IT Support (Office 365, Windows, Trouble Shooting) that streamline Business Activities, offer greater efficiency, get you closer to your customers.Internet Security DevelopersISO 14001ISO 9001Data PrivacyISO 27001Office 365TroubleshootingInformation Security - $70 hourly
- 4.8/5
- (121 jobs)
"Excellent ethical hacker. Very prompt, knowledgeable, and comprehensive" "Working with Konstantin was a good experience. Well rounded security experience helped us with number of different issues." My business motto is "Nil Satis Nisi Optimum" ("Nothing but the best is good enough") - because I know you feel the same about your business! CompTIA Security+ and Pentest+ seasoned certified security expert. My main specialization is information security system design, audit, vulnerability assessment and solutions implementation. I have experience with cloud (AWS, GCP) and on-prem infrastructure security, Linux and Windows OS, Active directory infrastructure and many different tools and software for specific security needs. In my job, I follow the best practice, local laws and international standards such as ISO 27000 and NIST 800 families.Internet Security DevelopersNetwork Penetration TestingSecurity AnalysisSecurity InfrastructureInformation Security AuditInternet SecurityFinancial AuditSystem HardeningComplianceWeb Application SecurityIT Compliance AuditSecurity EngineeringSecurity Policies & Procedures DocumentationApplication SecurityInformation SecurityNetwork SecurityFirewall - $10 hourly
- 5.0/5
- (617 jobs)
Hi I am Website Designer by profession.I am professional Wix and Squarespace expert. I have more than 2 years of website designing & development experience. I am passionate and ambitious about my work. The best thing about me is that I have great communication and project managing skills with excellent customer support. I love my work and take each and every project in a professional way. Feel free to contact me. I will make sure you get better than what you are looking for. Thank you!!Internet Security DevelopersEcommerce Store SetupWixEcommerce WebsiteWebsite HeaderLanding Page DesignLanding Page OptimizationWebsite OptimizationWebsite RedesignSquarespace - $150 hourly
- 5.0/5
- (3 jobs)
🚀 Making your business secure and obtaining a security certification (SOC 2, ISO 27001, PCI-DSS, HIPAA, or FedRAMP) for your company, or responding to a security questionnaire, should be a smooth and effortless process, free from unnecessary burdens and frustrations. I understand the importance of streamlining and simplifying these processes to ensure efficiency and peace of mind for my clients. With my expertise in security certifications and compliance measures, I can help your business navigate through the complexities of obtaining and maintaining certifications such as SOC 2, ISO 27001, PCI-DSS, HIPAA, and FedRAMP. By applying a comprehensive approach, I will guide you through the entire process, making sure that every step is handled meticulously and effectively. Topics I cover: ✅ Cybersecurity ✅Compliance ✅Network Security ✅ Privacy Policies, Laws, and Frameworks (e.g. HIPAA, GDPR, CCPA) ✅NIST Frameworks ✅Information Security Standards and Frameworks (e.g. PCI-DSS, ISO 27002)Internet Security DevelopersSecurity ManagementSecurity Operation CenterSecurity FrameworkSecurity EngineeringSecurity AnalysisCybersecurity ToolCybersecurity MonitoringRisk AnalysisRisk AssessmentPolicy DevelopmentDefense & MilitaryComplianceCyber Threat IntelligenceRisk ManagementCybersecurity Management - $125 hourly
- 5.0/5
- (8 jobs)
Experienced technology leader and cyber security expert. Experience building security programs from the ground up for large organizations, conducting security audits, technical policy writing, and gap analysis. I am efficient, driven, and highly capable in all areas of cybersecurity. I hold both a Masters degree (MBA) as well as a Bachelor of Science in Business, IT Management. Additionally, I have received certifications which include: CISSP, CISA, CISM, GSLC, CCNA, CCNA-S, and certifications from Microsoft and CompTIA.Internet Security DevelopersFirewallTechnical WritingIT ConsultationSystem ConfigurationTroubleshootingSystem AdministrationInformation SecuritySecurity EngineeringSystem SecurityIT ManagementIT Compliance AuditNetwork EngineeringNetwork Security - $55 hourly
- 5.0/5
- (7 jobs)
👋 Hey,Are you looking to maximize the ROI on your IT investments without the risk? With over 10 years of experience in IT consulting, I’ve led 100+ successful projects across healthcare, finance, telecommunications, government, and higher education. As a trusted advisor in cloud infrastructure, cybersecurity, digital transformation, IT software and services implementation, and IT compliance, I help organizations globally achieve secure, scalable, and future-proof solutions that enhance productivity and protect valuable data. 🚀 Why Partner With Me? 🏆 Certified Expertise in IT Management: Backed by top industry certifications like CISSP, PMP, and ISO 27001, I deliver solutions aligned with best practices and regulatory standards. 🎯 Customized IT Strategies for High Impact: From cloud migration and network security to business continuity planning, I offer solutions tailored to your business goals, reducing risk and enhancing efficiency. 💰 Transparent, Cost-Effective IT Services: I design IT solutions that maximize ROI, giving you confidence in every investment. --- 🔹 My Consulting Services & Functions I deliver customized, high-impact solutions across key IT domains: 🔧 Managed Services Provider (MSP): Proactive IT support for seamless ops 🚀 IT Strategy & Transformation: Guiding organizations to redefine IT strategies that enhance efficiency and drive innovation. ☁️ Cloud Infrastructure & Migration: Expertise in deploying and managing multi-cloud environments (AWS, Azure, Google Cloud, IBM Cloud). 🔐 Cybersecurity & Risk Management: Conducting security assessments, policy development, and ensuring compliance (ISO 27001, HIPAA, GDPR). 🌐 Network Design & Optimization: Building reliable, secure, and scalable networks, including enterprise LAN, SD-WAN, and SD-DC. 💼 Senior Consultant for IT Software & Services Implementation: Providing end-to-end consulting for software deployments, systems integration, and optimizing IT services to drive efficiency. 🤖 Digital Transformation & Automation: Streamlining processes with automation, DevOps, and digital tools to cut costs and boost agility. 📜 Compliance & Regulatory Advisory: Ensuring adherence to standards like PCI DSS, NIST, and CMMC to protect data and minimize risk. 🎓 Project Management & Training: Leading projects (PMP, PRINCE2 certified) and empowering teams with hands-on training for IT systems. --- 🔹 My Approach to Consulting & Related Business My approach to consulting is focused on delivering sustainable, value-driven results: 🎯 Client-Centric Solutions: Tailoring solutions to your unique needs, with an emphasis on achieving practical, impactful outcomes. 📈 Outcome-Driven Methodologies: Leveraging frameworks like ITIL, Agile, and DevOps to ensure measurable, sustainable results with strong ROI. 🔒 Security & Compliance as Core Principles: Integrating cybersecurity and regulatory compliance into each solution to protect against today’s evolving threats. 🔄 Adaptable & Innovative Solutions: Embracing the latest industry best practices and technologies to continuously refine strategies. 🤝 Collaborative Partnerships: Valuing transparent communication and long-term client relationships to ensure ongoing success. --- 🔧 Technologies & Tools 🌐 Networking Solutions: Cisco, F5 Networks, Fortinet, Juniper, Arista Networks, Extreme Networks – design, implementation, and management 📶 Network Architecture: WLAN, Enterprise LAN, Data Center Design, SDN, SD-WAN, SD-DC, Network Virtualization ☁️ Cloud Platforms: AWS, Google Cloud Platform (GCP), Microsoft Azure, IBM Cloud, Oracle Cloud, Alibaba Cloud 🛠️ IT Solution Architecture: Solution Architect, Enterprise Architect, Security Architect, Cloud Architect, Network Architect, Data Architect, Application Architect, Systems Architect 📊 Project Management Methodologies: PMP, PRINCE2, Agile (ScrumMaster), Kanban, Lean IT, ITIL, SAFe 🔒 Cybersecurity & Compliance: CISSP, CEH, PCIDSS, ISO 27001, GDPR, NIST, SOC 2, CMMC, FedRAMP 🔧 DevOps & Automation: Jenkins, GitLab CI/CD, Docker, Kubernetes, Terraform, Ansible, SonarQube, Snyk, HashiCorp Vault, Puppet, Chef, OpenShift --- 🛡️Security Frameworks & Standards 🛡️ 📜 HIPAA – Health Information Portability and Accountability 🏛️ NIST – National Institute of Standards and Technology 💳 PCI DSS – Payment Card Industry Data Security Standard 🔒 ISO 27001 – Information Security Management 🛠️ COBIT – Control Objectives for Information and Related Technology 🎯 MITRE ATT&CK – Adversarial Tactics, Techniques, and Common Knowledge Framework 🌐 OWASP – Open Web Application Security Project 🎓 Education • Master’s & Bachelor’s in Computer Science 🏆 Client Satisfaction My goal is always to exceed client expectations, ensuring on-time delivery and budget compliance. I take pride in my high client satisfaction rate and value long-term partnerships. ⭐⭐⭐⭐⭐ Client Testimonials ⭐⭐⭐⭐⭐ Ready to optimize your IT strategy and achieve your digital goals? Let’s connect!Internet Security DevelopersManagement ConsultingGeneral Project ConsultingSoftware ConsultationBusiness ConsultingIT ManagementTechnical SupportIT SupportInformation Security ConsultationIT InfrastructureIT ConsultationSecurity AnalysisLinux System AdministrationInformation Security AuditNetwork AdministrationCloud Computing - $30 hourly
- 5.0/5
- (23 jobs)
🥇 TOP RATED PLUS Freelancer | 💪 7+ Years Experience as Compliance Expert Guy | 1500+ Hours on Upwork | As a seasoned leader in Cyber Security Management Systems, I specialize in orchestrating comprehensive security frameworks aligned with industry standards such as SOC2, NIST Cyber Security Framework, ISO 27001, GDPR, and HIPAA. My repertoire encompasses a spectrum of services designed to fortify your organisation's digital resilience: * Are you Worried about navigating security assessments and certifications? Let's make compliance effortless and rewarding. * Facing compliance hurdles? Let me manage you compliance related burdens so you can focus on your business. * With a keen eye for detail, I develop IT Security Policies & Procedures, Guidelines and Manuals ensuring regulatory compliance and mitigating potential risks for ISO 27001, SOC2, CMMC, GDPR, HIPAA, PCI-DSS and NIST standards. * I provide consultancy and expertise in different standards includes ISO 27001, SOC2, CMMC, Fedramp, GDPR, HIPAA, PCI-DSS and NIST standards projects alongside affordable virtual CISO (vCISO) services and more. * You need expert guidance in cloud security or endpoint security including MDM, MAM? Rely onme for quick, reliable and constand assistance. * Need help in deployment of SIEM solutions like Qradar, Splunk, Exabeam, I streamline logs integration and parsing for enhanced threat detection? Rely onme for quick, reliable and constand assistance. * Automation Tools Expertise: JIRA, Vanta, Drata, TrustCloud, Scrut Automation. * Send 'Invitation' to connect and discuss your requirements with me. Let's ensure your business stays compliant and secure.Internet Security DevelopersCertified Information Security ManagerGap AnalysisNIST Cybersecurity FrameworkCMMCSOC 2 ReportCloud SecurityHIPAAGovernance, Risk Management & ComplianceNIST SP 800-53ISO 27001GDPRRisk AssessmentPenetration TestingCybersecurity ManagementInformation Security Consultation - $56 hourly
- 4.7/5
- (9 jobs)
18 years of extensive experience in ISO 27001, 9001, 22301, 14001, 31000 focusing on quality management, information security, policy writing, project management, governance, risk, and compliance (GRC) in construction management, information technology, and with Big 4 company. Certified ISO 27001 Lead Auditor and ISO 22301 Lead Implementer. Completed seven (7) ISO 27001 Certification Project Completed one (1) ISO 9001 Certification Project Completed one (1) ISO 14001 Certification Project Completed two (2) ISO 27001 Re-certification Project Completed two (2) ISO 9001 Re-certification Project Completed two (2) ISO 140001 Re-certification Project Completed fourteen (14) ISO 27001 Internal Audit Completed eigtheen (18) ISO 9001 Internal Audi Completed eigtheen (18) ISO 14001 Internal Audit Areas of Expertise: ISO Certification Process Management Quality Management Systems Environmental Management Systems Occupational Health and Safety Management Systems Information Security Management System ISO Standards Lead Internal Auditing Technical Documentation Technical Writing Policy and Procedure Writing Risk Assessment Business Continuity Management Information Technology Infrastructure Library Electronic Document Management Systems Business Process and Continual Improvement Statistics and Metrics Development SharePoint AdministrationInternet Security DevelopersNIST SP 800-53Document ControlMicrosoft SharePoint AdministrationMarket ResearchISO 27001Policy WritingGovernance, Risk Management & ComplianceCompliance TrainingCompliance ConsultationISO 9001Internal AuditingRecords ManagementInformation Security ConsultationInformation SecurityVulnerability Assessment - $30 hourly
- 4.2/5
- (36 jobs)
"100% Work Satisfaction Guaranteed" | 👍Top Rated | ⭐ Senior Penetration Tester" 🔐Certified Ethical Hacker 💎Python Developer for Cyber Security | Information Security Analyst | GRC | SOC 2 Compliance ⭐ Available for Meetings and Sessions ⭐ With nearly 5 years of experience, numerous successful clients, and the industry's best minds, skills, and portfolios, I am providing services in the following domains: ✔️ 360° Cyber Security Services. ✔️ Full-Stack Saas-Based Software Engineering Solutions with a secure development life cycle. ✔️ Innovative Custom Engineering solutions.Internet Security DevelopersRuby on RailsCybersecurity ManagementAmazon Web ServicesAT&T CybersecurityRed HatCybersecurity ToolJavaScriptCyber Threat IntelligenceSecurity Assessment & TestingPythonVulnerability AssessmentEthical HackingPenetration TestingInformation Security Want to browse more freelancers?
Sign up
How it works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Internet Security Developer on Upwork?
You can hire a Internet Security Developer on Upwork in four simple steps:
- Create a job post tailored to your Internet Security Developer project scope. We’ll walk you through the process step by step.
- Browse top Internet Security Developer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Internet Security Developer profiles and interview.
- Hire the right Internet Security Developer for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Internet Security Developer?
Rates charged by Internet Security Developers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Internet Security Developer on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Internet Security Developers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Internet Security Developer team you need to succeed.
Can I hire a Internet Security Developer within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Internet Security Developer proposals within 24 hours of posting a job description.