Hire the best Network Security Engineers in Arkansas

Check out Network Security Engineers in Arkansas with the skills you need for your next job.
  • $80 hourly
    Skills/Experience/Interests - ConnectWise Manage and Automate administration - Designing network device monitoring solutions using existing third party solutions - LabTech scripting for mass software deployment and device configuration changes - Windows system administration of small/medium/large enterprise networks - Routinely wrote LabTech/Automate scripts to deploy software to hundreds of machines where group policy objects were not practical - Thoroughly documented managed services provider processes allowing them to improve the efficiency in their on-boarding of new employees and clients alike - Windows server migrations/upgrades with minimal down time due to proper planning and execution of project - Office 365 migrations, implementations, and administration - Designed, sold, and implemented VMware high availability solutions - Security control implementation in support of HIPAA privacy rules - SonicWall firewall implementation and configuration - VLAN implementation
    Featured Skill Network Security
    Network Engineering
    Network Monitoring
    Technical Documentation
    Software Configuration Management
    ConnectWise Automate
    Windows Administration
    Network Design
    Managed Services
    Windows Server
  • $100 hourly
    I am a dedicated professional with decades of comprehensive experience in Cyber Investigations, Cyber Intelligence, Cyber Operations, Cybersecurity, and Information Security. I am well-versed in creating robust security structures, implementing security strategies, and mitigating potential cyber threats, and I specialize in the detection, investigation, and mitigation of cyber threats, while providing strategic insights to enhance organizational cyber defense capabilities. I have a Bachelor's degree in Psychology and Cognitive Science, and am completing work toward Master's degrees in Cybersecurity and Information Technology, with specializations in Enterprise Networks and Cloud Computing. I have also earned various industry certifications such as Certified Ethical Hacker Master (CEH-Master), System Security Certified Practitioner (SSCP), Certified Cyber Intelligence Professional (CCIP), Certified Penetration Tester (CPT), and Certified Forensic Analyst (CFA). Types of Services Offered Include But Are Not Limited To: Consulting, Strategy, & GRC: • Cybersecurity Consulting • Cybersecurity Strategy Development • Security Policy Development and Implementation • Governance, Risk, and Compliance (GRC) Frameworks • Managed Security Services Risk Assessment and Management: • Security Risk Assessment • Risk Mitigation Strategies • Cyber Risk Analysis • Vulnerability Assessments • Incident Mitigation and Remediation Digital Forensics Incident Response: • Security Incident Investigation • Litigation Support • Regulatory Compliance Audits • Integrated Threat Intelligence Digital Forensics • Data Recovery and Analysis • Electronic Discovery (eDiscovery) • Mobile Device Forensics • Network Forensics • Forensic Imaging • Malware Forensics Incident Response • Incident Management and Coordination • Threat Hunting • Emergency Response • Root Cause Analysis • Post-Incident Reporting and Documentation Training Services: • Security Awareness Training • Workshops and Webinars • Cybersecurity Certification Preparation • Employee Cybersecurity Training Programs • Simulated Phishing and Other Training Exercises Offensive Security & Defense Security: • Penetration Testing • Ethical Hacking • Red Team Operations • Blue Team Defensive Strategies • Purple Team Exercises Cloud Services: • Cloud Security Architecture • Cloud Security Assessments • Cloud Data Protection • Cloud Compliance Audits • Managed Cloud Services Network and Architecture Services: • Network Design and Architecture • Network Security Implementation • Wireless Network Security • Network Performance Monitoring • Enterprise Network Management Cyber Investigations and Intelligence: • Cyber Investigations • Cyber Intelligence Gathering • Digital Forensics • Network Forensics • Fraud Investigation • Insider Threat Investigation • Social Media Forensics Cyber Operations: • Cyber Threat Hunting • Cyber Threat Intelligence • Information Operations (Info Ops) • Real-time Security Monitoring • Security Operation Center (SOC) Management Security Compliance and Auditing: • Compliance Auditing • Security Auditing • Security Policy Compliance Reviews • Regulatory Compliance Monitoring • Information Security Assessments Virtual CISO Services • Cybersecurity Program Leadership • Security Strategy and Planning • Policy Development and Management • Security Risk Management • Compliance Oversight • Incident Response Planning • Security Awareness and Training • Vendor Risk Management • Security Budget Management • Board Communication
    Featured Skill Network Security
    Cyber Threat Intelligence
    Ethical Hacking
    Microsoft Azure
    Solution Architecture
    Cloud Architecture
    IT Infrastructure
    Network Engineering
    Cloud Security
    Web App Penetration Testing
    Security Infrastructure
    Network Penetration Testing
    Penetration Testing
    Information Security
    Vulnerability Assessment
  • $150 hourly
    I have over 18 years of practical cybersecurity experience spanning Fortune 500 retail and financial services companies, as well as experience working for a cybersecurity vendor. My career has included a well-balanced mixture of technical and leadership positions across most major pillars of cybersecurity. As an incident response leader at multiple Fortune 500 companies, I regularly authored research papers, reports, and presentations for both technical and non-technical readers. While working for cybersecurity vendors, I have also authored cybersecurity training content and a variety of product marketing collateral.
    Featured Skill Network Security
    Cybersecurity Monitoring
    Security Management
    Email Security
    Security Operation Center
    Security Infrastructure
    Security Analysis
    Security Engineering
    Ransomware Mitigation
    Cloud Security
    Incident Management
    Cybersecurity Management
    Digital Forensics
    Incident Response Plan
  • $35 hourly
    Hey, I’m Kyra — a future CompTIA Security+ certified cybersecurity analyst with hands-on experience in network security, vulnerability assessments, and IT support. Currently pursuing my Associate’s Degree in Cybersecurity and actively preparing for my Security+ certification, I specialize in: ✅ Network Security Audits ✅ Vulnerability Scanning & Reporting ✅ Firewall Configuration ✅ Cybersecurity Policy Writing ✅ Technical Documentation I also offer custom cybersecurity consultations to help businesses secure their infrastructure and prevent potential threats. Whether you’re looking to harden your network, identify vulnerabilities, or improve your overall security posture, I’m here to help. Let’s secure your digital world. 🔐
    Featured Skill Network Security
    Technical Documentation
    NIST Cybersecurity Framework
    System Configuration
    Firewall
    Vulnerability Assessment
  • $45 hourly
    PROFILE Highly trained technical consultant with exceptional customer service abilities. Seeking a long-term opportunity with an established company. 3 years' experience in IT, forward-thinker, great and quick learner with a passion of learning new traits to add to my repository of knowledge. I am a hard worker, great with customers, and very organized. I will do whatever it takes to complete the task at hand.
    Featured Skill Network Security
    Internet Security
    Software
    Printer
    AWS Application
    CompTIA
    macOS
    Windows Server
    Microsoft Azure
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses