Hire the best Network Security Engineers in the United Kingdom

Check out Network Security Engineers in the United Kingdom with the skills you need for your next job.
  • $95 hourly
    I am a Cyber Security and Information Technology expert with 20 years experience ranging from small start-ups to multi-billion euro businesses. I hold a CISSP, the gold standard of Information Security Qualifications and I am a certified PCI Professional (PCIP) I specialise in Strategy, Governance, Risk and Compliance - this makes me ideal for projects such as: Helping you achieve Cyber Essentials or IASME Governance status PCI-DSS & ISO 27001 compliance programs and audits Being your Cyber Security / Info Sec manager or CISO on a part-time basis Selecting and managing IT and Cyber Security suppliers on your behalf Writing, reviewing and updating your IT and Cyber Security policies Security Awareness Training I am an award winning public speaker and trainer and my Cyber Security Awareness Training is very popular delivered in person or from my online studio to clients around the world.
    Featured Skill Network Security
    GDPR
    Security Infrastructure
    Information Security Awareness
    ISO 27001
    PCI DSS
    Information Security Audit
    Information Security Governance
    Certified Information Systems Security Professional
    PCI
    Information Security
    Security Policies & Procedures Documentation
    Incident Response Plan
    Vulnerability Assessment
    Security Assessment & Testing
  • $100 hourly
    Hello I am an experienced cyber security professional and owner of the UK based boutique consultancy Periculo.co.uk who specialise in Digital health, medical devices, fintech, SaaS companies and more. Having drawn on my experience over a number of years, working with a huge variety of customers ranging from construction companies to banks, charities, medical devices, fintech and MOD contractors I became a freelancer to offer affordable expertise that benefits everyone. I strongly believe that every organisation needs to take security and compliance seriously however not all have the big budget that most consultancies demand for their work. Through my own internal processes I'm able to quickly deliver high quality, best in class security and compliance consultancy and testing. My organisation is accredited to the following; Cyber Essentials Cyber Essentials Plus IASME Gold GDPR readiness ISO27001 ISO9001 CREST Penetration Testing We are certified to these standards to provide assurance but also so I practice what I preach and know how to implement it in an efficient way. If you require an affordable security and compliance expert who always reaches a solution with the appropriate risk v reward balance then please get in touch. - Able to assess, audit and certify to GDPR ready, IASME Gold, Cyber Essentials and Cyber Essentials + - GDPR Advisory, DPO as a Service (as I have technical expertise I can often cover a lot more than your traditional DPO) - Providing project consultancy (From small changes to extensive, high risk programs) - Providing operational consultancy and escalation - Supplier and internal assessments - FDA submissions - EUMDR submissions - Penetration testing - Penetration testing for medical devices, inline with IEC60601-4-5 - SOUP management - Hazard analysis - CISO as a service - Digital health cyber security - Infrastructure Security and configuration, AWS, Azure - Security operations consultancy and build - Business and technical policy, standards author Cover all aspects of security including penetration testing, vulnerability scanning etc. ** I am currently available for hire**
    Featured Skill Network Security
    Cybersecurity Management
    ISO 27001
    Information Security Audit
    Penetration Testing
    Security Testing
    Technical Writing
    Vulnerability Assessment
    Data Protection
    PCI
    Information Security
    Cloud Computing
  • $20 hourly
    I am Shashank Kesarwani, I am an Application Security Engineer at Poppulo and have 3+ years of Experience in Security and Development. Below are the services which I can provide:- Services: 🔍 Risk Assessment: Uncover hidden threats before they strike! I deliver thorough evaluations that proactively identify risks and provide strategic solutions to keep your business secure. 🔐 Vulnerability Assessments: Stay ahead of cyber threats with detailed vulnerability scans. I’ll pinpoint weaknesses in your infrastructure and provide actionable steps to fortify your defenses. 🎯 Penetration Testing: Think your system is secure? Let me put it to the test. I conduct rigorous penetration testing to expose vulnerabilities before attackers can exploit them. 🧩 Code Review: Ensure your code is rock-solid. I offer meticulous code reviews to identify and eliminate security vulnerabilities, ensuring your software is both robust and secure. 💻 Script Writing: Automate and optimize your operations with custom scripts. I craft versatile scripts tailored to your needs, with proficiency in Python, Java, and Bash. 📜 Compliance Consulting: Navigating compliance standards can be tricky—I make it simple. Whether it’s ISO 27001, PCI DSS, or NIST, I’ll guide you through achieving and maintaining compliance with ease. 🚀 Cybersecurity Mentor: Ready to elevate your cybersecurity career? I provide personalized mentorship, offering guidance and support to help you thrive in this ever-evolving field. Why Choose Me: With a proven track record of significantly reducing security risks and boosting system defences, I am dedicated to providing high-quality cybersecurity services tailored to your unique needs. My strong analytical, communicative, and leadership skills ensure effective collaboration and successful project outcomes. Let’s work together to secure your digital assets and achieve your cybersecurity goals. Let's connect and discuss how I can help protect your organization from cyber threats!
    Featured Skill Network Security
    Application Security
    Cloud Security
    Reverse Engineering
    Web App Penetration Testing
    ISO 27001
    NIST Cybersecurity Framework
    Ethical Hacking
    Information Security
    Software Development
    Automated Testing
    Web Scraping
    RESTful API
    Python
    Java
  • $20 hourly
    I am qualified and experienced in IT networks and security. I have experince with setting up routers, switches and firewalls. I am also experienced with Linux, and Windows Administration and security.
    Featured Skill Network Security
    Security Analysis
    Wide Area Network
    Network Monitoring
    System Hardening
    Windows Server
    Linux System Administration
    Information Security
    Windows 10 Administration
    Security Testing
    Wireless Network Implementation
    Network Equipment
    System Administration
    Network Administration
  • $95 hourly
    ✅🌟CCSM Elite Certified (Checkpoint Certified Security Master Elite)🌟✅ 🌟Experienced Network Security Specialist with 15+ years history with CheckPoint, Cisco ASA, and Juniper SRX Firewalls🌟 ⚒Extensive work experience with Check Point VSX, MDS, Quantum Smart-1 Cloud, Check Point Infinity, CloudGuard Connect/Edge, Harmony EndPoint, CloudGuard SaaS (Now Harmony Email & Office), CloudGuard Connect/Edge (Now Harmony Connect and Quantum Edge) alongside working with Enterprise level clients⚒ ⚡Done numerous CheckPoint upgrades over the last ten years on different topologies, including standalone, distributed, cluster and virtual environments from R75.x to R81.x⚡ 🥇Cisco ASA firewall experience with valid CCNP Security (VPN) certification🥇 💡Juniper JNCIA Junos certified💡 🌟 WHY CHOOSE ME OVER OTHER FREELANCERS? 🌟 ⚡ Client-Focus: I focus on providing VALUE to all my clients. ⚡ Work Ethic: Going the “extra mile” is core to my work as a Freelancer. ⚡ Responsiveness: I am responsive and keep all lines of communication readily open with my Clients. ⚡ Kindness: One of the most important aspects of my life is to treat everyone with respect, be empathetic in all situations.
    Featured Skill Network Security
    Blockchain
    Smart Contract
    Cisco Certified Network Associate
    Python
    Full-Stack Development
    Network Administration
    Game Development
    Web Development
    Check Point
    App Development
    iOS Development
    Firewall
    Cisco ASA
  • $50 hourly
    Senior Infrastructure Engineer with 10+ years building and scaling resilient network infrastructure from bare-metal racks to hybrid clouds. I design and deploy high-performance systems that stay online, stay secure, and stay lean. Battle-tested across enterprise, data center, and cloud environments. Experienced in multivendor ecosystems, including Cisco, Arista, Palo Alto, Fortinet, VMware, OpenStack, and AWS, with a strong focus on uptime, smart automation, and eliminating unnecessary complexity. Currently leading global deployments of Equinix’s Network Edge platform. Automating with Python, YAML, and Git to deliver efficient, secure, and fit-for-purpose infrastructure at scale. 💻Tech Skills💻 ✅Programming: Python, APIs(RESTful, NETCONF, RESTCONF), XML, JSON, YAML, YANG, Ansible ✅OS: Windows Server(PowerShell, AD, Group Policy, Exchange), Linux(Bash, IPtables, Permissions, Nginx), macOS, Cisco IOS, Cisco NX-OS, Dell OS10, Arista EOS ✅Networking: WAN, LAN, WLAN(Meraki, UniFi), VLANs, VXLANs, IPv6, NAT, RIP, OSPF, BGP, VRF, ACLs, QoS, VPNs, DHCP, DNS, SAN, NFV ✅Security: Firewalls(Palo Alto, FortiGate, SonicWall), CASB(Netskope), SIEM(Rapid7), MDM(MaaS360), IAM(Okta, Centrify, CyberArk), Email(Mimecast) ✅Virtualization: VMware, Hyper-V, KVM, Proxmox ✅Cloud: OpenStack, AWS(EC2, VPC, S3, IAM, WorkSpaces), Azure(VMs, AD, Networking), Google Workspace, Office 365 ✅Tools: Git, Postman, ManageEngine, Dell OpenManage, Dell iDRAC, Cisco CIMC, Wireshark, Nmap, PRTG, Zabbix, Observium, Graylog, Veeam, Passbolt, NetBox, Itemit, Visio
    Featured Skill Network Security
    DevOps
    Linux System Administration
    DNS
    Automation
    Cisco Certified Network Professional
    Microsoft Azure
    Network Design
    Linux
    Windows Administration
    Software-Defined Networking
    Network Engineering
    Python
    Firewall
  • $100 hourly
    Network Engineer with a proven track record of delivering network solutions, IT Infrastructure, and telecom services. My area of expertise includes. . Certified: CCNP, AZ305, AZ104, AZ-700, CCNA, ITIL, MCSA, ZIA. . Cloud: Azure, AWS, and GCP. · Configuration of networks, servers, switches, and routers. . Zscaler: ZDX, ZPA & ZIA . Cisco R&S, Cisco ISE, Cisco ASA, Juniper, ESXI VMware, Hyper-V. . Wireless Tech: Meraki, Aruba, Aerohive, Ubiquiti. . CRM: Zendesk, Halo, Fresh Service and ServiceNow . NMS: SolarWinds, Opmantek, Mutiny, Datadog . Firewall: Checkpoint, Palo Alto, Cisco ASA, FortiGate . Windows Server, Linux, Exchange Servers, O365, Active Directory, SSL Certs, DNS, DHCP, SCCM.
    Featured Skill Network Security
    Amazon
    Cloud Migration
    Terraform
    Palo Alto Firewalls
    Firewall
    Automation
    Network Design
    Cisco Certified Network Associate
    Cisco Certified Network Professional
    Python
    Microsoft Active Directory
    Microsoft Azure
    Windows Server
    Linux
  • $60 hourly
    With over 20 years of professional academic and research experience, while working for various HEI globally, I am a PhD in Computer Sciences with a specialisation in Cyber Security. I am a qualified academician with a Postgraduate Certificate in Academic Practice. Currently, I am working as a Senior Lecturer (Cyber Security) in a renowned institution in the UK. I am associated with the Higher Education Academy (HEA) as a Full Fellow in the UK. I am a senior member of IEEE and an academic initiative member of IBM since 2016. I am also associated with various institutions as a Tutor and External Examiner for their undergraduate courses in Cybersecurity, Digital Forensics, Computer Sciences, and Multimedia Technology. I have more than 10 years of supervision and mentoring experience. I have successfully supervised PhD, M.Phil, M.Sc. and BSc students as their Director of Studies and/or Primary/Main supervisor. Most recently, one of my PhD students defended his PhD. Currently, I am supervising two PhD students and M.Sc. students in Cybersecurity. I have also mentored and supervised B.Sc. Honours and Final Year students for their graduation projects. I am an active researcher and have authored many articles in internationally renowned and top-tier, highly cited Journals and IEEE flagship international conferences. My research success includes; several top-tier (Q1-Q4) highly indexed articles, submission of three US-Patent in the USPTO office, attracting more than 05 international and national level of research grants and projects, attracting industrial leaders like IBM, Raytheon, Northrop Grumman, GMU and others for research collaborations and training. I am an Editor of five international peer-reviewed journals in the domain of Cybersecurity and Computer Science from UK/US/Canada and reviewer of more than 05 ISI/SCI-E indexed highly cited journals. I offer my services for academic writing, editing and reviewing in all the subjects of Computer Sciences and Information and Cybersecurity for undergraduate, and postgraduate PhD/M.Phil and M.Sc. students. This includes assistance in project report writing, undergraduate and postgraduate report/thesis/proposal writing, and academic research writing for conferences and journals. I also offer my services for supervision and mentoring for undergraduate (B.Sc., B.Eng etc.), and Postgraduate PhD, M.Phil, M.Sc. and M.Eng students.
    Featured Skill Network Security
    Editing & Proofreading
    Research Papers
    Proofreading
    Internet Security
    Formatting
    Cloud Security Framework
    Information Security
    Security Testing
    Academic Writing
    Computer Science
    Web Application Security
    Security Analysis
    Academic Research
  • $60 hourly
    I hold a Master's degree in Cyber Security from Manchester Metropolitan University, UK, and possess over three years of experience providing cyber security services to a wide range of businesses and individuals. My expertise lies in effectively combating cyber threats. Moreover, as an experienced SEO-optimized writer, I specialize in producing high-quality content focused on cyber security and IT. I excel in various writing styles related to these domains. Key Skills: 1. Proficient in conducting vulnerability assessments to identify system weaknesses. 2. Experienced in delivering comprehensive cyber security awareness and training programs. 3. Skilled in performing penetration testing to identify and rectify potential vulnerabilities. 4. Well-versed in implementing robust web and network security measures. 5. Sound knowledge of information system security principles and best practices. 6. Proficient in technical and academic writing pertaining to cyber security and IT. 7. Specialized in crafting engaging and informative blog content for businesses and SMBs. 8. Knowledgeable in digital forensics techniques for investigating and analyzing cyber incidents. 9. Proficient in generating detailed reports on security findings and recommendations. 1. Experienced in conducting compliance assessments and risk evaluations. Notable Academic Projects Completed: 1. Conducted a survey on network-based attacks in VANETs (Vehicular Ad Hoc Networks). 2. Performed a comprehensive survey on mitigating Mirai botnet attacks. 3. Executed penetration testing on vulnerable Linux systems. 4. Proposed effective mitigation strategies for GNSS spoofing attacks in autonomous vehicles. Connect with me for your next project.
    Featured Skill Network Security
    Cybersecurity Management
    Information Security
    Technical Writing
    SEO Writing
    US English Dialect
    Website Copywriting
    Security Analysis
    Penetration Testing
    Tech & IT
    Content Writing
    Blog Writing
    Article Writing
    Blog Content
  • $40 hourly
    As a Cyber security Consultant with experience in the industry, I am dedicated to ensuring the protection of clients' systems and data from potential cyber attacks. My expertise includes conducting security assessments, identifying vulnerabilities, and recommending remediation measures. I develop and implement security policies, standards, and procedures, providing guidance and recommendations to clients on security best practices. I possess a Bachelor's degree in Cyber Security and have a deep understanding of security protocols, cryptography, authentication, authorization, and security architecture. I am also familiar with security tools such as firewalls, intrusion detection systems, and vulnerability assessment tools, enabling me to effectively assess and manage cyber security risks. My strong analytical and problem-solving skills, combined with my ability to stay up-to-date with the latest security threats, trends, and technologies, enable me to provide the highest level of protection for my clients. I possess excellent communication and interpersonal skills, allowing me to effectively collaborate with clients and teams to achieve successful outcomes. If you are seeking a highly qualified Cybersecurity Consultant to help protect your valuable assets, please contact me to discuss how I can assist you in achieving your goals.
    Featured Skill Network Security
    ISO 27001
    Policy Writing
    Cyber Threat Intelligence
    NIST Cybersecurity Framework
    Security Infrastructure
    Cybersecurity Management
    System Security
    Information Security
  • $185 hourly
    ✅ Upwork Top 1% Expert Vetted ✅ 6500+ Hours ✅ 100% Success Score Hi, I'm Adam, an experienced CTO, team lead, and cybersecurity expert based in London, UK. With a proven track record of success, I've worked with hundreds of clients worldwide, guiding their projects from the idea stage through to completion, launch and growth. My experience, coupled with my deep technical expertise, allows me to be very hands on and practical when needed, and consistently deliver amazing results. If you’re dealing with missed deadlines, poor quality work or technical problems that your team are struggling to solve, I can help. I'm a Chartered Engineer (CEng) and a Chartered IT Professional (CITP), I and also hold a range of industry leading technical certifications including the CISSP, CISA, CISM, OSCP and OSCE. Clients commonly engage me to: - Hire and/or manage their technical team - Design and build technical solutions - Help solve complicated technical problems - Help scale a technical product to support and meet business growth - Assess or rescue failing projects - Explain and help mitigate business threats and risks (e.g. security, disaster recovery, backups and redundancy) - Provide an audit and unbiased technical opinion and "explain the options" I enjoy working with startups and fast moving projects, and solving complex challenges. My full profile including more testimonials, technical qualifications and a link to book a free strategy call is available at consultwithadam.com
    Featured Skill Network Security
    Information Security Consultation
    Product Roadmap
    LAMP Administration
    Information Security
    Android
    Internet Security
    Embedded System
    Laravel
    iOS
    Web Development
    PHP
    Penetration Testing
    Web Application
    Vulnerability Assessment
  • $92 hourly
    …the one who helps with all your tech needs and aims to know your business inside and out. With a creative mindset questions the unquestionable, thinks about the unthinkable, creates wonderful user experience. His passion for IT drives him to fulfil the targets more effectively with limitless dynamism. A seasoned technologist with diverse experience in information technology. Been leading development teams and designed large scale systems. Been a startup CTO. Well versed in a multitude of technologies, business process (re-)engineering.
    Featured Skill Network Security
    Requirement Analysis
    Process Architecture
    Product Development
    Business Process Reengineering
    User Experience Design
    Information Architecture
    Customer Relationship Management
  • $150 hourly
    ***Simplify Compliance and Reach Your Business Goals: Trust Compliance That Passes Audits*** Are you struggling to meet the rigorous standards of data protection, GDPR, ISO 27001, and SOC2 cybersecurity? Look no further than Compliance That Passes Audits Cyber Security|GDPR| Data Protection| DPIA ,ISO27001 Lead Auditor ***Do YOU Need The Following for meeting GDPR, Data Protection, Cyber Security Alignment? ________________________________________________________ "Excellent professional without whose he would not have got our ISO27001 certification. Highly recommended." "David's knowledge of the General Data Protection Regulation and Information Security is admirable, but what really stood out was his ability to implement GDPR - he understood what it meant to organisations in the real world, and what needed to be done as a result." "David's an incredibly knowledgeable person on his subject matter with the rare ability to communicate all technical parts of his role in layman's terms for the uninitiated, a true SME." ___________________________________________________________________________ Avoid the Following RISKS. ~~~Fines, Loss of Business, Enforcement Action, BreachLess Liability, Breach Losses~~~ #Breaches are now reportable (72 Hours) (59,000 reported in Europe so far) #Class Actions/Group Actions for GDPR (Happening now all over the world) #Incorrect Privacy Notices (Emma's Diaries and others) #Risk Of Data Breach is $7% UK Government Figures #3rd Party Contract Checks by Data Protection Authorities, Danish DPA #Privacy Notice Checks By Data Protection Authorities #Complaints by Consumers over 40,000 in the UK so far, ***Alignment with Data Protection will REQUIRE ....... • GDPR Awareness Article 39, Article 47 - Legal Requirement • Breach Notification Procedure process Article 33, Article 34 - Legal Requirement • Data Protection Impact Assessment DPIA Article 35 - Legal Requirement • Record Of Processing Article 30 - Legal Requirement • Data protection Maturity Assessment Article 5 + Security Audits/ISO27001/PC-DSS/GDPR Cyber Security and Data protection Risk Management Policy and Procedure review (Security Policy, Retention Policy, Data Protection Policy etc..) Expected by the GDPR and Data Protection Legislation. No Matter what your situation GDPR alignment and direction of GDPR can be always improved, Because I have done this many times for all types of businesses and size of business. If YOU were to do only one thing I would suggest a FIXED Price Data Protection/GDPR maturity audit which highlights any gaps in your businesses Data protection program and planning and enables the risks to be managed. There are another 4 very visible Requirements mandated by the GDPR to be met. If Your customers and auditors are asking for audits, documents, Gap analysis, and evidence of managing Cyber Security Security. These processes and Documents will drive your business FORWARD. ++++++ Make Sure your organization can DEMONSTRATE the principle of Accountability (Article 5) , This Accountability principle is the one that appears in Data Protection Authorities enforcement notices as well as customer checks and audits. ++++++ ***The Solution Let us work together to put these concepts into reality and systematize in often complex environments typically involving multi-departments to avoid or control an unnecessary event and using lessons learned to reduce the effect of FUTURE events. Your business can use these systems, policies, and procedures that will work in every vertical. Professional certifications: ISO27001 Lead Auditor, Chief Security Officer C|CISO, CITP, FBCS and authored over 3 GDPR e-learning courses.
    Featured Skill Network Security
    ISO 27001
    Compliance
    Risk Assessment
    Data Privacy
    Policy Writing
    Data Protection
    Information Security Audit
    Project Risk Management
    GDPR
    Information Security Awareness
    Information Security
  • $140 hourly
    ✅ I might well be the most adaptable all-round IT resource you've ever worked with. With nearly two decades of experience in IT, there's never been a problem I couldn't find a solution for. Whether it's an industry leading toolset, or an obscure line-of-business application, I find a way forward for your business. ✅ Hand-picked Upwork Expert Vetted (Top 1%) Earner with over $300k earned on the platform with a 5-Star Rating ⭐⭐⭐⭐⭐ 🧑‍💼Who Do I Help?👩‍💼 ➡️ Are you a start-up looking for some expert help on getting your tech up to scratch? I can help you worry less about your business's IT, so you can focus on doing what you do best. No matter what stage of start-up you are, I can offer an adaptable solution to meet and maximize your business's needs, whilst being mindful about scalability and cost control for you as your business grows. ➡️ Are you an existing SMB looking to supplement your existing IT support/project capabilities? Do you have issues finding experienced subject matter experts that can assist with high level L3/L4 support incidents related to IT infrastructure or software? I've remotely handled all kinds of emergencies as well as executed projects requiring the coordination of hundreds of people across a business. As a result, your team's experience grows during the engagement, and you are left with a solution that fits your requirements with a predictable budget and on-time with clear communication throughout. ➡️ Are you a small business in need of help with getting the most from Microsoft 365? So many businesses sign up for an account and leave their environments 'half used' when they could get so much more out of their subscription. Security, Compliance, Automation, Best Practice adoption, etc. - there's a ton that Microsoft's industry leading suite can offer as it evolves, so make sure you're getting the best bang for your buck. ➡️ Do you have concerns over the security of your Microsoft 365 environment? Cybersecurity threats are real, and they're here to stay. I can help your business become and remain vigilant, ensuring that you adopt security best practices, and maximize the abilities of the Microsoft eco-system to secure your data and your company's reputation. ➡️ Do you run a critical website or web application that you're having problems with? A number of my clients make their money from their presence on the web. If that's you, then make sure you're managing and maintaining your environment to ensure that it's secure, cost-effective, and well architected. This could be anything from a basic Wordpress website, through to a custom eCommerce solution that may not be maintained or deployed properly. If you rely on a website or web application for your livelihood, I can help you ensure that it's resilient, cost-effective and that best practices are followed for keeping it secure 🧠 My Core Expertise 🧠 ⚡️ Microsoft Windows Server ⚡️ Microsoft 365 ⚡️ Microsoft Intune ⚡️ Microsoft Azure Certified Administrator Associate ⚡️ IT Compliance & Governance ⚡️ AWS Certified Solutions Architect ⚡️ IT Project Management/Delivery ⚡️ Linux Support - Ubuntu, Apache ⚡️ Networking (DNS, DHCP, Routing, VPNs, Firewall & Security, VLANs) ⚡️ VMWare ESXi & Hyper-V ⚡️ Email Deliverability (DNS, SPF, DKIM, DMARC) ⚡️ Powershell/Automation ⚡️ Modern Workplace Adoption ⚡️ Web Hosting/SSL/DNS/Wordpress 🤔 Who am I? Originally from Canada, now living in Scotland, I am a Microsoft and AWS Certified Senior IT Resource & Project Manager with a focus on providing great service across the globe. My superpower is my ability to listen, learn, adapt and provide solutions to my clients' varied requirements. I embrace change and welcome opportunities for problem solving. It feeds my soul! I am a reliable and trustworthy IT pro with a wide array of experience across sectors and technologies (Education, Legal, Hospitality, Finance, etc.). My work tends to revolve around high-level problem solving and troubleshooting for all sorts of on-premise (Microsoft, VMWare, Linux) and cloud (Azure, Microsoft 365 and AWS) infrastructure. In addition to managing Windows and Linux servers, I have completed dozens of server migrations and troubleshooting all sorts of deep-rooted issues that go otherwise unresolved. In my 15 years with one of Scotland’s leading IT Managed Service Providers, I was the final point of escalation for technical issues, and as such I was privy to a wide array of interesting and frustrating issues that our clients faced. As such, I've developed and honed an ability to find creative and effective solutions for technologies I'd never previously encountered. I never submit for work that I can't deliver 100% on, and would welcome a conversation with you if you're looking to get some help with your IT setup. Thanks for your time!
    Featured Skill Network Security
    Amazon Web Services
    Microsoft Exchange Server
    Amazon EC2
    Office 365
    Microsoft Windows
    Windows Server
    VMware ESX Server
    Microsoft Server
    Microsoft Azure
    Microsoft IIS
    Technical Support
    System Administration
    Business with 100-999 Employees
    Business with 10-99 Employees
  • $30 hourly
    A technical professional with a background in DevOps/Site Reliabiltiy Engineering and security, with a strong focus on creating engaging content which also increases clients visibilty and overall SEO. Translating complex technical jargon into appealing articles is something that I take great pride in. I worked with multiple companies over the past 4 years from cybersecurity vendors to SaaS developers to create how to guides, product pages, FAQs and blog posts. Please see some of this feedback below: SD WAN, SASE Security and Cloud content creation – “Connor has produced some excellent content for us, we intend to continue leveraging his capabilities in the future.“ - CEO/Founder Network Consultancy Services that I offer: - SEO optimised blog posts - User guides (How to, SaaS, FAQs) - Case studies and Whitepapers. - Technical documentation, mainly for API endpoints and SaaS - Proofreading and document editing SEO is something that I am very knowledgeable about. I like to identify your audience by doing keyword research and suggesting ideas that'll benefit yourself. Before I submit an article to the client I run it through an SEO article checker (Yoast and Semrush) to ensure the highest quality and optimization.
    Featured Skill Network Security
    Network Planning
    Cisco Certified Network Associate
    Solution Architecture
    LAN Administration
    Cisco Router
    SNMP
    Network Administration
    Cisco Meraki
    Juniper
    VoIP
    Network Monitoring
    Network Design
    Network Engineering
    Network Equipment
  • $20 hourly
    Cybersecurity Specialist with more than 2 years experience in SOC services, incident response, and threat intelligence. My expertise spans across various SIEM platforms, including Microsoft Sentinel and LogRhythm, as well as EDR solutions like CrowdStrike and Microsoft Defender for Endpoint and Cloud. I also have a keen interest in website security and development, whether it is advising on how to improve security or performing a penetration test. I have experience with SOC, Incident Response, SOAR, EDR, XDR, DLP, Threat Intelligence, Vulnerability Assessment and Cloudsecurity. Utilising Microsoft Sentinel, LogRyhthm, SentinelOne, Defender for Endpoint. I have experience in investigating phishing emails, conducting phishing campaigns using GoPhish, and performing OSINT (Open-source intelligence) on domains and individuals, utilising different OSINT tools and techniques. Utilizing sandbox environments to analyze and investigate suspicious attachments and URLs. I also hold certifications in 3 Microsoft Certification which are active: - Microsoft Certified: Azure Security Engineer Associate - Microsoft Certified: Security Operations Analyst Associate - Microsoft 365 Certified: Security Administrator Associate Currently learning automation and setting up SIEM services for clients who want to monitor their infrastructure using Sentinel.
    Featured Skill Network Security
    Office 365
    Microsoft Azure
    Cisco Certified Network Associate
    ISO 27001
    Python
    Penetration Testing
    Security Analysis
    Data Protection
    Information Security Audit
    Linux
    Computer Network
    Wireshark
    Technical Writing
    Information Technology
  • $45 hourly
    I am a highly skilled Cybersecurity Consultant, DevOps Manager, and SOC Engineer/Analyst with deep expertise in Microsoft Sentinel and the XDR suite. I specialize in building Sentinel from scratch, deploying data connectors, designing custom analytic rules, and integrating Sentinel with XDR solutions to enhance threat detection and response. With hands-on experience in SOC operations, threat hunting, automation, and incident response, I help businesses optimize security workflows, reduce false positives, and improve overall cybersecurity posture. Whether you need Sentinel deployment, rule tuning, automation with Logic Apps, KQL queries, or integration with third-party security tools, I can provide expert guidance and implementation. ✅ Microsoft Sentinel deployment & optimization ✅ XDR suite integrations (Defender, MDE, MDI, MDO, MCAS, etc.) ✅ Custom analytics, hunting queries, and automation ✅ Threat intelligence & security incident management ✅ SOC process enhancement & DevOps for security Let’s work together to fortify your security infrastructure and maximize the value of Microsoft Sentinel & XDR! 🚀
    Featured Skill Network Security
    English to Polish Translation
    VoIP Administration
    Operating Systems Development
    Desktop Application
    Security Operation Center
    Security Infrastructure
    SOC 2
    SOC 1
    SOC 3
    Security Engineering
    Security Analysis
    Employee Training
    Information Technology
    Risk Assessment
    IT Asset Management
    Microsoft Office
    Microsoft Azure
    Office 365
  • $100 hourly
    🔒 Experienced Cybersecurity Professional Specialising in Penetration Testing and Security Assessments In the realm of cybersecurity, In the last conducting many comprehensive Penetration Tests and Security Assessments across diverse domains. My expertise spans a wide spectrum, encompassing Web applications, Mobile applications (iOS & Android), internal Infrastructure, external Infrastructure, Wifi, Internal threat & red teaming. With a robust portfolio covering industries such as Finance, Commodities, Health, and Education. My proficiency extends to working with a myriad of technologies and frameworks, including but not limited to ASP, PHP, Serverless Architecture, Docker environments, Zero-Trust networks & Perimeter Networks, ensuring thorough assessments regardless of the underlying architecture. All work in done in line with CREST and all penetration testing & report will comply with CREST. For deliverables, professional reports are created, that will outline every vulnerability found, proofs-of-concept/evidence, and remediations on how to fix the discovered vulnerabilities/weakness. All reports, as mentioned above, are CREST compliant. 🛡️ Service Offerings: Penetration Testing Security Assessments Vulnerability Identification Threat Modeling Red Teaming 🔍 Please Note: While I specialise in professional cybersecurity services, I am not able to locate your girlfriend, recover your lost FACEBOOK, GMAIL, YAHOO etc. account or find your lost phone. Please do not invite me to such jobs.
    Featured Skill Network Security
    Information Security
    Penetration Testing
    Cloud Computing
    Technical Project Management
    Cloud Security
    System Security
    Engineering & Architecture
    Oracle Database
    Microsoft Office
    Network Engineering
    IaaS
    Microsoft Azure
  • $80 hourly
    I am representing SuperMax Technologies Limited, a UK-based highly accredited managed IT service provider. We are in the market for the last 10 years working with some very high-profile clients e.g. Cisco Systems, Juniper Networks, Tullow Oil, and O2. We are specialized in Networking, Cloud, Security, and Network Automation. We also have a big network of professionals and provide resources to work on complex projects in a smart way. I am the CTO of SuperMax Technologies. About me: I am a dynamic and experienced Senior Network Automation Engineer, possessing over 15 years of UK-based experience in the Financial Sector, Vendor, Telecoms, Service provider, and Oil & Gas space. I have been involved in designing, implementing, and support of various networking and security solutions. I boast excellent technical, analytical, and problems solving skills., KEY SKILLS * I am highly motivated and enthusiastic about my work. * I always look forward to developing my skills through training and on job learning. * I have the ability to work on my own and also feel comfortable working well within a team. * I have the ability to manage my own time and I can prioritize my workload. * I can handle the pressure and am able to perform well under any circumstances.
    Featured Skill Network Security
    Check Point
    Cloud Architecture
    Amazon Virtual Private Cloud
    Cisco
    Docker
    Containerization
    Juniper
    Network Engineering
    Cloud Computing
    Kubernetes
    Palo Alto Firewalls
    Cisco ACI
    Ansible
    Linux
  • $40 hourly
    Detail-orientated and thorough individual with strong problem solving and critical thinking skills. Committed to creating secure network architecture and developing solutions to limit access to protected data and programmes. Monitors computer virus reports and regularly updates virus protection systems. Enthusiastic Cyber technician eager to contribute to team success through hard work, attention to detail and excellent organisational skills. Motivated to learn, grow and excel in Cyber security industry.
    Featured Skill Network Security
    Virus Removal
    PHP Script
    Computer Network
    System Security
    Microsoft Excel
    MySQL Programming
    Computing & Networking
    Custom PHP
    CSS
    MySQL
    HTML5
    PHP
    JavaScript
    HTML
  • $20 hourly
    Hello, I'm a professional Cyber Security Consultant with over 5 years of extensive experience dedicated to fortifying organizations against the ever-evolving landscape of cyber threats. My specialization lies in safeguarding payment systems, boasting an in-depth comprehension of compliance standards such as PCI-DSS, SSS, MPoC, NIST, CIS Benchmark, GDPR, and HIPAA. I excel in conducting meticulous Vulnerability Assessments and Penetration Testing, Application Security, Secure Code Reviews, and Network Security Audits, all geared towards identifying and neutralizing potential vulnerabilities. My arsenal includes the implementation of robust security controls like firewalls, intrusion detection and prevention systems, and cutting-edge endpoint protection solutions. Moreover, I'm adept at crafting and enforcing security policies and procedures aligned with industry standards like NIST, ISO 27001, PCI-DSS, SSS, and MPoC, ensuring adherence to the highest security protocols. Staying ahead of the curve, I'm deeply committed to staying abreast of the latest security trends and technologies, ensuring that my clients benefit from the most advanced defense mechanisms available. I pride myself on being not just an experienced analyst but also a collaborative team player with exceptional communication skills. Whether interacting with technical or non-technical stakeholders, I ensure a seamless flow of information and understanding, fostering a comprehensive approach to security. 📌 Types of Services Offered Include But Are Not Limited To: Application Security: • Web Application • Mobile Application • Thick & Thin Client Application Offensive Security & Defensive Security: • Vulnerability Assessment & Penetration Testing • Ethical Hacking • Red & Blue Team Operations Cloud Services: • Cloud Security Assessments • Cloud Compliance Audits Security Compliance and Auditing: • Compliance and Auditing • Security Policy Compliance Reviews • Information Security Assessments Network Security Services: • Network Security Implementation • External & Internal Network Penetration Testing • Wireless Network Security • Network Performance Monitoring • Packet Analysis Consulting, Strategy, & GRC: • Cybersecurity Consulting & Strategy • Security Policy Development and Implementation • Governance, Risk, and Compliance (GRC) Frameworks • Managed Security Services Risk Assessment and Management: • Security Risk Assessment & Analysis • Risk Mitigation Strategies Digital Forensics • Mobile Device Forensics • Network Forensics • Forensic Imaging • Malware Forensics Training Services: • Security Awareness Training • Penetration Testing Training • Employee Cybersecurity Training Programs Cyber Investigations and Intelligence: • Digital Forensics • Cyber and Fraud Investigations • Cyber Intelligence Gathering • Social Media Forensics Cyber Operations: • Security Operation Center (SOC) Management • Information Operations (Info Ops) • Cyber Threat Hunting and Intelligence • Real-time Security Monitoring 💪🏻 Proficiency in Tools Burp Suite, Nessus, Metasploit, Frida & Objection, MobSF, Drozer, Nikto, Acunetix, Qualys, Wfuzz 📚 Frameworks and Guidelines OWASP Top 10, PCI (DSS, MPoC, SSS, SAQ A) NIST, ISO 27001:2022, GDPR, HIPPA 🕵🏼‍♀️Why Choose Me: 🌟 Top Rated 🏆 100% Job Success Rate 👑 100% Client Satisfaction 💎 💡 Certified , ⚡ trusted and ✨experienced 🚀 Fast Delivery 📊 Accurate Results 🤝🏻Let's connect and strategize together If you're prepared to strengthen your organization's cybersecurity measures and achieve peace of mind, let's get in touch. I'm available to explore strategic approaches to safeguarding your digital assets and mitigating cyber threats. Contact me today to embark on the path toward heightened cybersecurity.
    Featured Skill Network Security
    ISO 27001
    NIST Cybersecurity Framework
    Secure SDLC
    Information Security
    Penetration Testing
    Application Security
    Security Testing
    Vulnerability Assessment
    Cybersecurity Management
    Incident Response Plan
  • $65 hourly
    Hi there! I'm a highly skilled security consultant with 8 years of experience in the field. I specialize in Risk Management, Security Assessment, and Consultancy. Based in the UK, I have extensive knowledge of the UK market and understand the specific security requirements of businesses in this region. My expertise is backed by a strong educational background and industry-recognized certifications. I hold the prestigious CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), SANS GDSA (GIAC Defensible Security Architect Certification) , CRISC (Certified in Risk and Information Systems Control), as well as Comptia Security+ and Network+ certifications. These certifications demonstrate my commitment to staying up-to-date with the latest security practices and technologies. As a native Arabic speaker, I have the advantage of offering my services in both English and Arabic, catering to a wider range of clients and providing a seamless communication experience. Throughout my career, I have successfully assisted numerous organizations in identifying and mitigating security risks, ensuring the protection of sensitive data and systems. I excel in conducting comprehensive security assessments, identifying vulnerabilities, and implementing robust security controls. I am passionate about helping businesses enhance their security posture, mitigate risks, and achieve compliance with industry standards and regulations. My consultancy services are tailored to meet the unique needs of each client, providing practical and effective security solutions. If you're looking for an experienced IT security professional who can deliver exceptional results, please don't hesitate to reach out. I'm ready to collaborate with you and safeguard your organization's digital assets and reputation. Let's connect and discuss how I can contribute to your security objectives.
    Featured Skill Network Security
    Security Infrastructure
    Network Engineering
    Computing & Networking
    IT Infrastructure
    NIST Cybersecurity Framework
    Certified Information Systems Security Professional
    Information Technology
    Certified Information Security Manager
    Microsoft Azure
    Cloud Security
    System Security
    Cybersecurity Management
    Security Assessment & Testing
    Information Security
  • $35 hourly
    I'm a Network and System specialist with more than nine years of experience in the field of Information Technology. I have worked with big companies, worldwide organizations, and also startup companies in many fields of Information technology. • Whether you are trying to configure and install a new network infrastructure, monitor or maintain an existing one or need technical support in any ICT-related incidents I can help. • Whether you are trying to manage your domain controller and active directory On-Prem or migrating to the cloud and want to create your tenant and manage your Azure AD I can help. • I can help with Network administration, system administration, and cloud Azure administration and I can also provide IT support. Am Enthusiastic, highly organized, and able to work in a team or alone, motivated by a challenge, and looking to expand my skills. I speak Arabic and English, and I can provide my services in both languages.
    Featured Skill Network Security
    Cloud Computing
    Helpdesk
    Network Administration
    IT Infrastructure
    IT Management
    Information Management
    Information & Communications Technology
    Translation
    Cisco Certified Network Associate
    Microsoft Exchange Online
    Microsoft Office
    Network Engineering
    IT Support
    Microsoft Azure
  • $7 hourly
    Welcome to my profile! With over 12 years of dedicated experience in web development, I specialize in Microsoft .NET development and SQL Server. My expertise extends to designing, creating, and optimizing MS SQL databases, indexes, queries, and stored procedures. I’ve worked with both .NET Framework (up to 4.8) and .NET (up to version 8). Here are some of the technologies I’m proficient in: ASP.NET MVC, ASP.NET Core, and API development RESTful services Regular expressions (Regex) Entity Framework 6 (EF6) and EF Core Message queues (MQ) Telerik controls Automated testing with Selenium and Appium Razor for server-side rendering HTML5, CSS3, JavaScript, jQuery, and Bootstrap I’m passionate about delivering high-quality solutions and collaborating with clients to achieve their online goals. Let’s work together to create exceptional software!
    Featured Skill Network Security
    Version Control
    Ecommerce Website Development
    Mobile App Development
    Server
    VoIP PBX
    Socket Programming
    Microsoft SQL Server Administration
    Regex Writing
    C#
    RESTful API
    Entity Framework
    ASP.NET
    Full-Stack Development
  • $34 hourly
    I am a Penetration tester and cybersecurity consultant, i am passionate about cyber security, i regularly take part in hacking competitions, CTF's, Challenges online in my spare time. I offer cyber security consultancy services such as but not limited to web application vulnerability testing/penetration testing, infrastructure penetration testing (internal /external), API penetration testing, Osint services. Start to finish Service provided by one consultant continued communication throughout the assessment. When performing an assessment i would generally use tools such as the following dependent on the assessment this list is not all inclusive as we ave proprietary methods with our testing: Nmap Shodan WhatWeb Nuclei Burpsuite Professional Nessus Pro Mxtoolbox Owasp ZAP Google Dorking PostMan Metasploit Rubeus Mimikatz crackmapexec Bloodhound
    Featured Skill Network Security
    Penetration Testing
    API Testing
    Web Application Security
    Web App Penetration Testing
    System Security
    Cybersecurity Management
  • $45 hourly
    SUMMARY Network engineer with CCIE#55390, FCSS and AZ-700 certification, having 10+ years of experience in network design, implementation and consulting for network solutions. Expensive hand-on experience with Cisco, Juniper, Fortinet, multi-vendor routers, switch, firewall and wifi equiments. Certification: Cisco Certified Internetwork Expert – Enterprise Infrastructure Fortinet NSE 7 Network Security Architect Microsoft Certified Azure Network Engineer Associate Cisco Certified Specialist – Network Security VPN Implementation Hand-on experience on configuring data network with followings: Routing & Switching: Cisco Nexus (3000, 9000), Cisco Catalyst (9200L), ASR, ISR, Huawei NE40, CX600, AR100, E200E, Juniper MX (480, 960, 104), EX (4200, 4200), SRX (1500, 300, 210), Nokia SR 7750-C4, OS6900, Raisecom Rax701, Overture Ethernet Demarcation Devices, ZTE OLT C300, FortiGate (60F, 200F, VM, 231E, 3950B), Meraki (MX 67, MR 42), Palo Alto VM. Firewalls & VPN: Cisco ASA (5525 with Firepower, 5506), Cisco FMC, FortiGate (60F, 200F, 3950B, VM), Palo Alto VM, SSL VPN, IPsec VPN, DMVPN, ADVPN with BGP overlay, AnyConnect VPN with Azure AD MFA, FortiToken MFA, Forti Manager, Forti Analyzer, Active/Standby Firewall Clustering. MPLS & VPN Technologies: MPLS, L2/L3 VPN, MP-BGP, LDP, RSVP-TE, VPLS, MVPN, SD-WAN, BGP, VRF, QinQ, L2 Pseudowires, IPsec Site-to-Site VPN. Data Center & LAN: VLAN switching, Virtual Chassis, Spanning Tree Protocol (STP), Shortest Path Bridging MAC (SPBM), LACP, VRRP, HSRP, QoS, L2/L3 switching. Wi-Fi & Wireless: Wi-Fi 2.4G and 5Ghz Steering, DPSK, Ruckus SmartZone (v3, v5, v6) with APs, Meraki MR 42, FortiAP (231E). Network Management & Monitoring: SNMP, Syslog, NTP, DHCP, Ethernet OAM (Y.1731), SolarWinds, PRTG, Nagios, Cacti, Wireshark, SNMPc, Ixia and Spirent Testers.
    Featured Skill Network Security
    Cisco Router
    Network Access Control
    Juniper
    Cisco Certified Network Professional
    Cisco Certified Internetwork Expert
    FortiGate Firewall
    Virtual LAN
    Cisco
    Fortinet
    Network Administration
    Network Design
    Network Equipment
    VPN
    Firewall
  • $45 hourly
    I’m a highly skilled embedded engineer with extensive experience in a demanding startup environment, where innovation and speed are key. I have a track record of delivering quality large-scale projects independently. - I’m proficient in C/C++ and Python. - I have a lot of experience in kernel development & debugging. - I specialise in low-level, networking and reverse engineering projects. - I excel in both engineering and research. Ready for new challenges and and to make some cash. Let's connect!
    Featured Skill Network Security
    Build Automation
    Research & Development
    Network Engineering
    Scripts & Utilities
    Graphics Programming
    Embedded Linux
    Embedded C
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.