Hire the best Malware Analysts in Nevada
Check out Malware Analysts in Nevada with the skills you need for your next job.
- $150 hourly
- 5.0/5
- (2 jobs)
Cloud Security and Compliance Architect Versatile Cloud Security Architect with 13 years of experience with a robust background in Information Technology (IT). As well as over 6 years managing multi-cloud environments. I have an extensive background with the understanding of compiling and securing systems that have to adhere to HIPAA, SOC 2, Federal Requirements to include RMF, FedRAMP, and FDA Part 11. My expertise in Amazon Web Services (AWS), secure, compliant architecture, and systems engineering to include AWS GovCloud. However, I do have an advanced knowledge of other clouds like Google Cloud Platform (GCP), Azure, Oracle Cloud Infrastructure (OCI), dealing with hybrid solutions and migrations. Skilled in mentoring teams and driving innovative security solutions, ensuring seamless cloud migration and robust compliance adherence. Team oriented with the ability to speak to multiple audiences and communicate effectively. Areas of Expertise Amazon Web Services (AWS) Platform Innovation Architecture (Managed security Service Provider Platform-MSSP) Security/Compliance/Networking Architecture/Automation Engineer Cloud Service Provider Compliance & Shared Service Model FedRAMP RMF (NIST) CMMC HIPAA SOC-2 Secure MigrationMalwareInformation SecurityInformation Security AuditSecurity Assessment & TestingSecure SDLCCloud ArchitectureCloud ImplementationCloud Engineering ConsultationBusiness ConsultingFedRAMPCloud Security FrameworkAmazon Web ServicesCloud Security - $150 hourly
- 5.0/5
- (1 job)
Hello, I have been a technology professional for over 20 years including 16 years of information security and assurance. Over the years I have led key cyber security initiatives within the commercial, government and civilian sectors as well as multiple global commercial clients (small business to Fortune 100 clients). My specialty is in security engineering and regulatory compliance, SOC operations, policies, procedures and have also worked in, managed and set up blue and red teams to help improve security operations by reviewing internal processes, logs, SIEM configurations, hardware settings and reviews and everything more required to stay ahead of threats and/or respond as quickly to suspicious activities. I am a hands on engineer with small business and Fortune 100 security environments, commercial and open source tools. I am an experienced hands on and management IT security, risk and compliance professional and interested in working with you on your project. I am your security and virtual CISO to make sure you get the management, security strategy and remediation in place to be secure and compliant. I am based in the US, have extensive experience (20 years in IT Security consulting - engineering and assessments/compliance/standards) and hold all relevant IT security certifications from CISSP, CGEIT, HIPAA, CISO, PCIP, PCI_QSA and many more. I also have my own IT Cyber Security Consulting Company since 2002, providing onsite and remote services to our clients. I believe in delivering quality work to my clients, communicating and making sure business operations and security are aligned and security and compliance posture is achievable based on your industry, business model, skills, existing tools and know-how. People, process and technology. I do not believe spending money on technology will solve a problem. 80% is done with people and processes (and configuration changes). Past projects: - Penetration Testing, vulnerability management and security processes for global sporting event - Set up and management of Global Security Operations Center for one of largest Managed IT Service Providers (100K+ staff) - PCI DSS for over 100 Tier 1 and 2 Merchants - Over 50 FedRamp/FISMA audits for government agencies and defense contractors (including pre assessments for CMMC) - 13 HIPAA audits for large hospitals and small walk in clinics - Incident Response and Forensic Analysis for over 80 large and global breaches (most were publicly announced) - Establishment of security policies, procedures, standards and Disaster Recovery/Business Continuity for over 300 clients (including large Casinos and Hotels in Las Vegas and Caribbean and global Banks) - Led a 9 months Security & Risk Get Well Program for McGraw Hill Financial which included regulatory compliance, cyber security, vulnerability management and training. - Designed and implemented security operations centers, incident response teams, delivered security consulting and regulatory compliance/ISO audits (in the Americas, Europe, Middle East and Asia). I served in the US NAVY and attended TUI and Trident University where I obtained her MBA and MSc. in Information Technology and Management. I completed my PhD (ABD) in Cyber Warfare and National Security. Over the years I earned numerous qualifications, including Certified Information Systems Security Professional (CISSP), Project Management Professional (PMP), Certified Confidentiality Officer/Counter Espionage (COO), Certified Chief Information Security Officer (CCISO), and NSA IAM/IEM (InfoSec Assessment and Evaluation Methodology). I recently obtained CMMC Provisional Assessor status. Looking forward hearing from you and feel free to check out my profile on LinkedIn. Dasha Deckwerth Industry Experience • Government, Military and National Security • Utilities and Critical Infrastructure • Financial (Banking and Credit Card processing) • Gaming & Hospitality • Transportation • Consulting • Telecommunication/ISP • Oil and GasMalwareSecurity AnalysisCertified Information Systems Security ProfessionalInternet SecurityPCIInformation Security AuditHIPAASecurity Operation CenterSecurity InfrastructureInformation Security - $120 hourly
- 0.0/5
- (0 jobs)
Senior solutions-oriented, Cyber Security/Risk Specialist with deep experience delivering multiple concurrent projects to develop and implement information technology that exceed all client expectations. High expertise in directing risk management initiatives while establishing, implementing and enhancing key information security objectives. Support business proposals and new business initiatives with the proven ability to design and regulate critical security programs with in-depth operational supervision of incidents and emergency disaster recovery. Known for cross-functionally collaborating with diverse teams and communicating with stakeholders at all levels of a corporation. Detail-oriented self-starter with excellent oral and written communication, analytical, organizational and time management skills. Proven expertise in Technical Management and Systems Engineering roles in all aspects of the systems development lifecycle for multiple enterprise computing, communications, systems integration and complex ICS environments. Extensive academic qualifications include a Master of Science in Information Science Security and Assurance from Western Governors University and a Master of Business Administration in Technical Management from the University of Phoenix. Holds multiple industry recognized industry certifications. Leveraged strong network and deep industry experience to build relationships with key clients, currently supporting multiple Law Enforcement facilities, Maritime terminals, and other large commercial clients. Known for his expertise in multiple domains of INFOSEC including Cyber, Risk Management Framework (RMF), Certification and Accreditation, DIACAP, DoD 8500, DISA STIGS, Common Criteria, Vulnerability Assessment, and Technical Risk Reduction. Successfully developed, implemented, and sustained distributed high-performance computing environments using commercial off the shelf and disruptive technologies supporting many different customer requirements, including modeling and simulation, real-time analytics, and transport of sensitive high-value data. Conduct and evaluate Cyber assessments, stress testing, and work with multiple partners to develop solutions that meet Department of Defense (DoD) 8500/Risk Management Framework (RMF) standards. Work with clients to engineer and implement solutions for infrastructure design, implementation, and sustainment of distributed control and data acquisition networks supporting IP Video, VOIP, access control, instrumentation and SCADA. Leverage strong network and deep industry experience to build relationships with key clients, currently supporting multiple Law Enforcement facilities, Maritime terminals, and other commercial clients. Develop and execute complex Cyber Penetration Testing events utilizing Kali Linux, Metasploit, and Software Defined Radio on traditional IT and complex OT (operational technology) networks, embedded systems, and control systems. Utilize multiple methodologies including Penetration Testing Execution Standard (PTES), Open Source Security Testing Methodology Manual (OSSTMM), OWASP, FedRAMP, and NIST 800. Plan and conduct Technical Security and Countermeasure (TSCM) sweeps of highly sensitive areas using Research Electronics International Oscor Green Spectrum Analyzer, Non-Linear Junction Detector, Broadband detectors, Software Defined Radio (SDR), and other equipment to identify illicit eavesdropping signals, analyze radio frequency (RF) emissions, and investigate misuse of the RF spectrum. Certified Information Systems Security Professional (CISSP) Certified Information Systems Security Architecture Professional (CISSP-ISSAP) Certified Cyber Forensics Professional (CCFP) Computer Hacking Forensic Investigator (CHFI) Certified Ethical Hacker (CEH) Computer Hacking Forensic Investigator (CHFI) Microsoft Certified Systems Engineer (MCSE) Cisco Certified Network Associate (CCNA) Cisco Certified Network Associate – Wireless (CCNA-Wireless) Cisco Certified Design Associate (CCDA) Research Electronics Incorporated – Technical Security and Countermeasures Ham Radio – FCC Extra Class License United States Navy Certification Authority – Fully Qualified Navy Validator I0683MalwareEmbedded SystemCertified Information Systems Security ProfessionalSecurity Operation CenterTroubleshootingDisaster RecoverySecurity EngineeringSecurity AnalysisInformation Security AuditInformation SecurityKali Linux - $60 hourly
- 0.0/5
- (0 jobs)
I am a detail-oriented and results-driven professional specializing in Governance, Risk, and Compliance and Third Party Risk Management. I have extensive SOC 1, SOC 2, PCI DSS, and SOX compliance experience. In addition, I have an accounting and financial analysis background along with financial software implementation experience. Seeking to leverage my broad skillset to help mitigate risk to drive impactful initiatives that protect organizational assets and support business objectives.MalwareInformation SecurityImplementationInternal AuditingDocumentationGovernance, Risk & Compliance SoftwareSarbanes-Oxley ActVendor ManagementRisk AssessmentEnterprise Risk ManagementPCI DSSSOC 1SOC 2Compliance - $100 hourly
- 0.0/5
- (0 jobs)
Overview: I am a seasoned IT Infrastructure and Cybersecurity Consultant with over a decade of experience helping organizations optimize their systems, secure their data, and improve operational efficiency. My expertise spans a variety of critical IT areas, including Active Directory, Exchange, VMware, and cloud infrastructure solutions, enabling me to provide comprehensive support for complex IT environments. Throughout my career, I’ve worked with companies of all sizes—from Fortune 500 corporations to family-owned businesses. My core strengths include systems analysis, infrastructure management, cybersecurity, and IT strategy development. I’m especially skilled at: Active Directory & Exchange Management: Design, deployment, and optimization of secure, scalable directory and email systems. Virtualization & Cloud Solutions: Proven experience with VMware, Hyper-V, and cloud platforms, Cybersecurity & Compliance: Identifying vulnerabilities, implementing security protocols, and ensuring regulatory compliance, with a focus on PCI, disaster recovery, and cybersecurity best practices. Systems Optimization: Analyzing and refining IT systems for optimal uptime, functionality, and user satisfaction. My clients appreciate my hands-on approach, clear communication, and commitment to delivering exceptional results. Whether you need ongoing infrastructure support, a one-time assessment, or a custom IT solution, I’m here to ensure your systems run smoothly and securely. Let's connect to discuss how I can support your IT goals and create a reliable, secure infrastructure tailored to your needs.MalwareProblem SolvingArchitectureArchitectural DesignInformation SecurityComputer NetworkComputing & NetworkingCompliance - $60 hourly
- 0.0/5
- (0 jobs)
I'm an IT Security Engineer specializing in CyberArk and privileged access management. With over 10 years of experience in MSP, gaming, and cybersecurity, I help organizations strengthen their security posture and protect their critical assets. I'm a CISSP-certified professional with a strong understanding of network security, incident response, and system administration. I'm passionate about solving complex technical challenges and delivering exceptional customer service.MalwareCyberARKIT SupportNetwork EngineeringInformation SecuritySystem AdministrationComputing & NetworkingComputer Network - $50 hourly
- 0.0/5
- (0 jobs)
I am an experienced IT professional with a deep passion for cybersecurity, IT systems engineering, and application management. Over the past decade, I’ve built a diverse career across industries including healthcare, hospitality, finance, and technology, earning a reputation for solving complex challenges, implementing innovative solutions, and driving organizational success through technology. Early Foundations and Academic Journey My journey began with a strong academic foundation. I earned my Associate of Arts degree from Broward College, along with certifications as an Accounting Technology Specialist and Business Specialist. I went on to complete a Bachelor of Science in Sociology at the University of Central Florida, where I was recognized on the Dean’s List for multiple semesters. Currently, I’m pursuing a Bachelor of Science in Cybersecurity and Information Assurance at Western Governors University, with an expected graduation in December 2026. This ongoing education reflects my commitment to lifelong learning and staying at the forefront of technological advancements. Professional Milestones Throughout my career, I’ve embraced opportunities to grow and take on challenging roles that required both technical expertise and creative problem-solving. Desktop Security Specialist, Children’s Heart Center In this role, I developed and enforced desktop security policies, managed endpoint protection tools, and responded to security incidents. By implementing encryption tools and troubleshooting system vulnerabilities, I helped enhance the organization’s IT infrastructure while ensuring compliance with industry standards. IT Specialist, Four Seasons At Four Seasons, I gained hands-on experience with IT systems and network maintenance while collaborating with seasoned professionals on various IT projects. I developed expertise in troubleshooting, optimizing system performance, and enhancing user experience, which solidified my ability to work effectively in dynamic, high-stakes environments. IT Specialist Helper, Instructional ABA Therapy Here, I combined my IT and accounting skills to streamline data collection processes, improve tracking efficiency, and integrate advanced software tools. This role allowed me to contribute to both operational and financial workflows, demonstrating my versatility in applying technology to different business functions. IT & Logistics Specialist, Alex Dominguez & Associates Inc. In this position, I managed inventory systems, coordinated procurement for group homes, and optimized supply chain operations to support individuals with autism and other mental disorders. This experience broadened my understanding of IT systems in unique and meaningful contexts. Expertise in Cybersecurity and IT Cybersecurity has always been a focal point of my career. I’ve gained hands-on experience with firewall configuration, malware attack simulations, and incident response planning. My technical toolkit includes expertise in Active Directory, Lansweeper, Greenway Intergy IT management, and advanced networking tools. I’m proficient in operating systems such as Microsoft OS, macOS, and Kali Linux, and I have experience working with cloud platforms like AWS and Azure. I’ve also earned certifications that underscore my dedication to this field, including: ISC2 Certified in Cybersecurity Fortinet Fundamentals, Associate, and Technician in Cybersecurity Leadership and Mentorship Throughout my career, I’ve embraced opportunities to lead and mentor others. From training new employees on POS systems at McDonald’s to planning large-scale events as part of JROTC in high school, I’ve consistently demonstrated the ability to guide teams toward achieving shared goals. I thrive in collaborative environments where I can help others grow while driving organizational success. Vision and Passion I’m passionate about the intersection of technology and human experience. Whether I’m designing secure systems, streamlining IT processes, or mentoring future tech leaders, I aim to make a meaningful impact in everything I do. My career reflects a dedication to continuous learning, innovation, and the pursuit of excellence in technology. Personal and Professional Aspirations Looking ahead, I’m excited to continue leveraging my expertise in cybersecurity and IT systems to develop scalable, secure, and innovative solutions for global enterprises. I’m drawn to opportunities that challenge me to push boundaries, foster collaboration, and contribute to the broader technological landscape.MalwareIT ManagementArtificial IntelligenceMicrosoft Active DirectoryFortinetFortiGate FirewallCybersecurity ToolCybersecurity ManagementGovernment Reporting ComplianceDatabaseDatabase ManagementInformation SecurityComplianceNetwork EngineeringComputing & NetworkingComputer Network - $22 hourly
- 0.0/5
- (0 jobs)
I am seeking a career opportunity within a stable corporation where I can utilize my exceptional business, administrative and customer service skills. Authorized to work in the US for any employerMalwareMicrosoft SharePointMicrosoft OfficeComputerInformation SecurityMicrosoft Active Directory - $30 hourly
- 0.0/5
- (1 job)
OBJECTIVE Recent M.A. Computer Science graduate seeking a challenging role to apply acquired knowledge and practical experience in theoretical foundations of information processing. Highly-motivated and results-driven, able to work and learn as part of a dedicated team. PROFILE SUMMARY A dynamic and highly skilled Master of Science with a major in Cybersecurity with exceptional teaching and leadership expertise. Demonstrated track record includes spearheading district-wide IT Security and FERPA training initiatives, equipping staff with crucial knowledge to safeguard sensitive data and ensure compliance. Proficiency extends to providing essential training on CAASPP administration procedures to diverse stakeholders, including IT personnel, district staff, principals, and teachers, resulting in optimized standardized testing processes. Proficiency across various domains and a steadfast commitment to advancing cybersecurity practices and governance principles remain evident.MalwareInformation SecurityGovernment Reporting ComplianceCompliance - $22 hourly
- 0.0/5
- (0 jobs)
I am transitioning my career into the fascinating industry of technology. I am seeking a role that allows me to utilize my skills in acute attention to detail and building trustworthy relationships. I am leveraging my knowledge in dynamic project management to invest in a company where I can grow within the culture, act as a mentor, and be a valued role model. Relevant Achievements * Created asset management process leading to an increased visibility of in-service and out-of-service assets. * Managed software procurement in a cross-functional team, resulting in a 20% decreased cost of licenses. * Implemented a risk contingency plan for data protection and improved the process of end-of-life disposal.MalwareCustomer SupportRisk ManagementLearning TheoryInformation SecurityComplianceData Analytics & Visualization SoftwareCross Functional Team LeadershipChange ManagementCommunicationsRelationship BuildingProject ManagementAgile CRMIT Project ManagementNetwork Access Control Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.