Hire the best Network Security Engineers in Pennsylvania

Check out Network Security Engineers in Pennsylvania with the skills you need for your next job.
  • $40 hourly
    I am here to deliver quality services to my clients to satisfy their security needs. I believe client appreciation is more than dollars, so please don't hesitate to contact me. Details: I am an experienced Consultant, having an experience of over More than 7 years on Manual as well as automated penetration testing. I am OSCP, CEH Certified, which are internationally recognized certification. Methodology/Standard that we follow: 1. OWASP 2. PCI DSS 3. NIST 4. Cert-In Area of Expertise: . Web, Thick-Client and Mobile application vulnerability assessment and penetration testing. . Vulnerability Assessment and Penetration testing for IT Networks. . Understanding of Application Security Guidelines/requirements from OWASP TOP 10 models. . Have successfully completed Web Application Penetration Testing for 40+ Cert-in projects. . Have successfully completed Web Application Penetration Testing for 100+ PCI-DSS Projects. . PCI ASV scan. . Mobile Application Security Testing. . Sound Knowledge in Bash, JavaScript. . Programming languages: HTML, CSS, C, C++, JavaScript. Identified and exploited multiple High/Critical severity Vulnerabilities like: . SQL Injection . Remote Code Execution . Insecure Direct Object Reference . Cross-Site Scripting. . Parameter Tampering . Cross-Site Request Forgery . Bypassing File Upload Restrictions . Account take over . Multiple Privilege Escalation . Business Logic Flaw etc. Thanks
    Featured Skill Network Security
    Industrial Internet of Things
    Security Analysis
    Web Application Security
    Metasploit
    Application Security
    Penetration Testing
    Vulnerability Assessment
  • $75 hourly
    Experienced Technical Support / IT Manager with a demonstrated history of working in the computer software industry. Skilled in Customer Support, Network Troubleshooting, Software Troubleshooting, Technical Support, and Technical Documentation. Strong information technology professional with a Bachelor of Science - BS focused in Computer Science from Seton Hill University.
    Featured Skill Network Security
    Data Recovery
    Server
    Windows Administration
    Network Administration
    Domain Migration
    Network Engineering
    Technical Documentation
    Microsoft Server
    Computer Network
    Computer Science
    Virus Removal
    Troubleshooting
    Microsoft Active Directory
    System Administration
  • $249 hourly
    I've had a long career working on hundreds of network environments and I'm looking to apply that expertise in new ways to help the networking industry. I've achieved numerous technical certifications, at least 70 over 3 decades, from roughly a dozen vendors and current certs include Cisco CCIE Lifetime Emeritus #11846 R/S. My specialties are problem-solving, innovative thinking, solving best practice architecture puzzles and assessing networks based on experience.
    Featured Skill Network Security
    Information Technology
    Information Technology Strategy
    Professional Experience
    IT Infrastructure
    Computing & Networking
    Computer Network
    Network Analysis
    Network Monitoring
    Network Planning
    Network Mapper
    Network Engineering
    Network Design
    Network Architecture
    Cisco Certified Internetwork Expert
  • $75 hourly
    F5 engineer employed by a large corporation who can help your business with the following F5 products: F5 LTM F5 GTM (DNS) F5 ASM F5 Big IQ F5 EM Viprion hardware and vcmp implementations WAF expert with F5 ASM and AWS. Load balancing, firewall and management. WAF policies auditing, implementation of F5 ASM and design.
    Featured Skill Network Security
    F5, Inc.
    Network Design
    Load Balancing
    Network Analysis
    Security Analysis
    Firewall
  • $150 hourly
    As an independent cloud architect, I can help your business: * Plan your cloud strategy * Design and build secure, scalable cloud infrastructure * Find and fix security vulnerabilities * Reduce cloud spending I do this by addressing high value and high risk priorities first, planning and delivering concrete milestones on time, and supporting you going forward. I'm a dirty-hands technical guy but I'm also a veteran business founder, so I understand that your business runs on more than technology. Security intersects everything I do, from business continuity to change management, identity management, disaster recovery, monitoring and more. Most of my clients are smaller or medium businesses, so I see many environments in transition. Often companies slide into consuming cloud resources in a not-so strategic way, starting with a small project, then another, etc., and it can get out of hand with spending too much and security issues. Amazon/Azure/Google encourage this sort of “spending creep” - it serves the cloud providers very well, but a lot of businesses are overdue for a re-think of their cloud environments. Usually, I first take a high-level view of where you stand, whether you are planning to transition services to a cloud platform or already in it, and identify low-hanging fruit to save money, bolt down security, and automate everyday tasks. My initial consultation is FREE, and I can deliver valuable insight in just a few hours. Then I plan a longer-term roadmap to accommodate your business’ growth, in which the underlying cloud infrastructure will not slow down or break down over time. Container orchestration with Kubernetes or ECS is a particular focus of my work. A lot of companies have a proliferation of ad hoc servers and could benefit from consolidating with containers, but lack the skills in-house. I can help you modernize with containers, scale up and save money. With me, there’s never a salesperson trying to up-sell services, and I don’t delegate your work to a junior engineer. I work with you personally and take personal responsibility for everything I do today and in the future. I also document and check-in everything I do, so you can always share it with your team or other service providers. I tend to get involved for a few weeks to a few months to realize concrete deliverables, then stay involved on an as-needed basis for support. Cost-wise, I can guarantee that my services will be less expensive than a big consultancy with a fancy website, and also less expensive than a full-time in-house cloud architect. Geographically, I live in Philadelphia and work from my own office. I time-track everything I do, push all my work to your Git repository, and usually am available on a video call within an hour or two. With decades of experience in engineering teams, critical data-centers, start-ups and consulting, you can count on me to provide straightforward, pragmatic advice, solve high-priority problems promptly and deliver quality. Top references from current satisfied customers are available. Hands-on with Kubernetes, Docker, Python, Terraform/CloudFormation, Git, Linux, security, security and more security. Recent projects: - HIPAA compliant health care app on AWS ECS - Kubernetes architecture and implementation for a "smart laboratory" SaaS application - Security assessment for a government contractor - Serverless architecture for an IoT application - API integration with a major energy provider - Kubernetes migration for a machine learning application - AWS autoscaling infrastructure for a hotel management platform - Technical design for clinical trials data for an international pharma company - AWS cost analysis and 50% cost reduction for an energy trading platform
    Featured Skill Network Security
    Infrastructure as Code
    Linux
    Terraform
    DevOps
    Amazon Web Services
    AWS CloudFormation
    Kubernetes
    Containerization
    JavaScript
    Docker
    Cloud Architecture
    Information Security
    Amazon ECS
    Python
  • $20 hourly
    Certified Information Systems Auditor (CISA) specializing in IT audits, cybersecurity, and data analysis. What I deliver: • Risk-based audits aligned with SOX, COBIT, and NIST frameworks. • Vulnerability assessments and compliance with ISO 27001/OWASP Top 10. • Data-driven insights using Python, Alteryx, ACL , Arbutus and Caseware IDEA. • Secure access control and GDPR/PCI-DSS compliance. Clear communication, on-time delivery, and actionable results. Let’s secure your systems and streamline your processes!
    Featured Skill Network Security
    Report Writing
    Presentation Slide
    Documentation
    Database Management
    Automated Monitoring
    Internal Auditing
    Cloud Security
    Risk Management
    IT Compliance Audit
    IT General Controls Testing
    Data Analysis Consultation
    Cybersecurity Management
    Information Security Audit
  • $20 hourly
    Motivated Cybersecurity student at Western Governors University with hands-on experience in network security simulations and a strong foundation in IT fundamentals. ISC2 Cybersecurity certified, CompTIA Network+ certified, and eager to apply skills in vulnerability assessment, intrusion detection, and security monitoring in an internship or entry-level role.
    Featured Skill Network Security
    IT Infrastructure
    Software Development
    Troubleshooting
    Virtualization
    DHCP
    DNS
    Network Engineering
    Threat Detection
    System Security
    Flutter
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses