Hire the best Network Security Engineers in Pennsylvania
Check out Network Security Engineers in Pennsylvania with the skills you need for your next job.
- $40 hourly
- 5.0/5
- (2 jobs)
I am here to deliver quality services to my clients to satisfy their security needs. I believe client appreciation is more than dollars, so please don't hesitate to contact me. Details: I am an experienced Consultant, having an experience of over More than 7 years on Manual as well as automated penetration testing. I am OSCP, CEH Certified, which are internationally recognized certification. Methodology/Standard that we follow: 1. OWASP 2. PCI DSS 3. NIST 4. Cert-In Area of Expertise: . Web, Thick-Client and Mobile application vulnerability assessment and penetration testing. . Vulnerability Assessment and Penetration testing for IT Networks. . Understanding of Application Security Guidelines/requirements from OWASP TOP 10 models. . Have successfully completed Web Application Penetration Testing for 40+ Cert-in projects. . Have successfully completed Web Application Penetration Testing for 100+ PCI-DSS Projects. . PCI ASV scan. . Mobile Application Security Testing. . Sound Knowledge in Bash, JavaScript. . Programming languages: HTML, CSS, C, C++, JavaScript. Identified and exploited multiple High/Critical severity Vulnerabilities like: . SQL Injection . Remote Code Execution . Insecure Direct Object Reference . Cross-Site Scripting. . Parameter Tampering . Cross-Site Request Forgery . Bypassing File Upload Restrictions . Account take over . Multiple Privilege Escalation . Business Logic Flaw etc. ThanksNetwork Security
Industrial Internet of ThingsSecurity AnalysisWeb Application SecurityMetasploitApplication SecurityPenetration TestingVulnerability Assessment - $75 hourly
- 4.9/5
- (11 jobs)
Experienced Technical Support / IT Manager with a demonstrated history of working in the computer software industry. Skilled in Customer Support, Network Troubleshooting, Software Troubleshooting, Technical Support, and Technical Documentation. Strong information technology professional with a Bachelor of Science - BS focused in Computer Science from Seton Hill University.Network Security
Data RecoveryServerWindows AdministrationNetwork AdministrationDomain MigrationNetwork EngineeringTechnical DocumentationMicrosoft ServerComputer NetworkComputer ScienceVirus RemovalTroubleshootingMicrosoft Active DirectorySystem Administration - $249 hourly
- 5.0/5
- (1 job)
I've had a long career working on hundreds of network environments and I'm looking to apply that expertise in new ways to help the networking industry. I've achieved numerous technical certifications, at least 70 over 3 decades, from roughly a dozen vendors and current certs include Cisco CCIE Lifetime Emeritus #11846 R/S. My specialties are problem-solving, innovative thinking, solving best practice architecture puzzles and assessing networks based on experience.Network Security
Information TechnologyInformation Technology StrategyProfessional ExperienceIT InfrastructureComputing & NetworkingComputer NetworkNetwork AnalysisNetwork MonitoringNetwork PlanningNetwork MapperNetwork EngineeringNetwork DesignNetwork ArchitectureCisco Certified Internetwork Expert - $75 hourly
- 4.9/5
- (9 jobs)
F5 engineer employed by a large corporation who can help your business with the following F5 products: F5 LTM F5 GTM (DNS) F5 ASM F5 Big IQ F5 EM Viprion hardware and vcmp implementations WAF expert with F5 ASM and AWS. Load balancing, firewall and management. WAF policies auditing, implementation of F5 ASM and design.Network Security
F5, Inc.Network DesignLoad BalancingNetwork AnalysisSecurity AnalysisFirewall - $150 hourly
- 3.8/5
- (4 jobs)
As an independent cloud architect, I can help your business: * Plan your cloud strategy * Design and build secure, scalable cloud infrastructure * Find and fix security vulnerabilities * Reduce cloud spending I do this by addressing high value and high risk priorities first, planning and delivering concrete milestones on time, and supporting you going forward. I'm a dirty-hands technical guy but I'm also a veteran business founder, so I understand that your business runs on more than technology. Security intersects everything I do, from business continuity to change management, identity management, disaster recovery, monitoring and more. Most of my clients are smaller or medium businesses, so I see many environments in transition. Often companies slide into consuming cloud resources in a not-so strategic way, starting with a small project, then another, etc., and it can get out of hand with spending too much and security issues. Amazon/Azure/Google encourage this sort of “spending creep” - it serves the cloud providers very well, but a lot of businesses are overdue for a re-think of their cloud environments. Usually, I first take a high-level view of where you stand, whether you are planning to transition services to a cloud platform or already in it, and identify low-hanging fruit to save money, bolt down security, and automate everyday tasks. My initial consultation is FREE, and I can deliver valuable insight in just a few hours. Then I plan a longer-term roadmap to accommodate your business’ growth, in which the underlying cloud infrastructure will not slow down or break down over time. Container orchestration with Kubernetes or ECS is a particular focus of my work. A lot of companies have a proliferation of ad hoc servers and could benefit from consolidating with containers, but lack the skills in-house. I can help you modernize with containers, scale up and save money. With me, there’s never a salesperson trying to up-sell services, and I don’t delegate your work to a junior engineer. I work with you personally and take personal responsibility for everything I do today and in the future. I also document and check-in everything I do, so you can always share it with your team or other service providers. I tend to get involved for a few weeks to a few months to realize concrete deliverables, then stay involved on an as-needed basis for support. Cost-wise, I can guarantee that my services will be less expensive than a big consultancy with a fancy website, and also less expensive than a full-time in-house cloud architect. Geographically, I live in Philadelphia and work from my own office. I time-track everything I do, push all my work to your Git repository, and usually am available on a video call within an hour or two. With decades of experience in engineering teams, critical data-centers, start-ups and consulting, you can count on me to provide straightforward, pragmatic advice, solve high-priority problems promptly and deliver quality. Top references from current satisfied customers are available. Hands-on with Kubernetes, Docker, Python, Terraform/CloudFormation, Git, Linux, security, security and more security. Recent projects: - HIPAA compliant health care app on AWS ECS - Kubernetes architecture and implementation for a "smart laboratory" SaaS application - Security assessment for a government contractor - Serverless architecture for an IoT application - API integration with a major energy provider - Kubernetes migration for a machine learning application - AWS autoscaling infrastructure for a hotel management platform - Technical design for clinical trials data for an international pharma company - AWS cost analysis and 50% cost reduction for an energy trading platformNetwork Security
Infrastructure as CodeLinuxTerraformDevOpsAmazon Web ServicesAWS CloudFormationKubernetesContainerizationJavaScriptDockerCloud ArchitectureInformation SecurityAmazon ECSPython - $20 hourly
- 0.0/5
- (0 jobs)
Certified Information Systems Auditor (CISA) specializing in IT audits, cybersecurity, and data analysis. What I deliver: • Risk-based audits aligned with SOX, COBIT, and NIST frameworks. • Vulnerability assessments and compliance with ISO 27001/OWASP Top 10. • Data-driven insights using Python, Alteryx, ACL , Arbutus and Caseware IDEA. • Secure access control and GDPR/PCI-DSS compliance. Clear communication, on-time delivery, and actionable results. Let’s secure your systems and streamline your processes!Network Security
Report WritingPresentation SlideDocumentationDatabase ManagementAutomated MonitoringInternal AuditingCloud SecurityRisk ManagementIT Compliance AuditIT General Controls TestingData Analysis ConsultationCybersecurity ManagementInformation Security Audit - $20 hourly
- 0.0/5
- (0 jobs)
Motivated Cybersecurity student at Western Governors University with hands-on experience in network security simulations and a strong foundation in IT fundamentals. ISC2 Cybersecurity certified, CompTIA Network+ certified, and eager to apply skills in vulnerability assessment, intrusion detection, and security monitoring in an internship or entry-level role.Network Security
IT InfrastructureSoftware DevelopmentTroubleshootingVirtualizationDHCPDNSNetwork EngineeringThreat DetectionSystem SecurityFlutter Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.