Hire the best Network Security Engineers in Tennessee
Check out Network Security Engineers in Tennessee with the skills you need for your next job.
- $100 hourly
- 5.0/5
- (1 job)
Dynamic and versatile cybersecurity professional with a robust skillset that spans Cloud Security, Vulnerabliity Analysis, Intrusion Detection, eCommerce, and Linux System Administration. Currently serving as the Founder and Chief of Operations at Smart Spaces. Leveraging more than a decade of experience in business and technology, my expertise includes Ethical Hacking, Linux, Data Analysis, and Penetration Testing. I am passionate about harnessing the power of technology to optimize operations and solve complex problems. I am open to partnerships and collaborative opportunities that align with my skill set.Network Security
Penetration TestingRisk AnalysisVulnerability AssessmentRetail Sales ManagementComputer NetworkComputing & NetworkingLinux System AdministrationVirtual MachineServerInternet of ThingsCybersecurity ManagementCybersecurity MonitoringLinuxPython - $90 hourly
- 4.5/5
- (21 jobs)
I have worked across the field in security, focused on engineering, architecture and attack research with an emphasis on cloud security especially Azure AD and Microsoft 365. I have provided this expertise to Fortune 5 organizations and across multiple industries including retail, health care, and utilities. I can speak just as easily to the geeks and business leaders, often providing an interpretation layer between groups. * Built and sold Microsoft 365 analysis solution valued at $40M dollars. * Rebuilt end user 802.1x infrastructure with over 225k active users daily. * Identified post-compromise exploits which allows attackers to steal tokens from Microsoft Teams.Network Security
Software Architecture & DesignInternet SecurityVulnerability AssessmentNetwork DesignWordPressSecurity AnalysisSecurity EngineeringSecurity InfrastructureAutomationUser Authentication - $50 hourly
- 5.0/5
- (1 job)
Helping small and medium sized businesses ensure technology is working for them and not the other way around. Specializing in Workflow Automation, Efficiency Consulting, Digital Marketing, and Cybersecurity.Network Security
Organic Traffic GrowthCybersecurity ManagementNetwork AdministrationIT ConsultationDigital MarketingAutomationInternet MarketingManaged ServicesIT ManagementSEO BacklinkingOff-Page SEOSEO AuditSEO Keyword Research - $60 hourly
- 5.0/5
- (47 jobs)
I have the following IT certifications: * AWS Solutions Architect Associate * AWS Certified Developer Associate * CompTIA Security+ * CompTIA Network+ * CompTIA Cloud Essentials+ * AWS Cloud Practitioner * LPI Linux Essentials Are you tired of working with so-called tech writers who don’t know tech? I bring 15 years of international experience as a network engineer to the table, plus 5 years solely as a technology writer. I worked onsite with telecommunications vendors and providers in the US, Germany, Austria, and the UK. Contact me if you’re looking for someone who can: Bring dry and tedious technical issues to life Credit sources while writing fresh, original content Develop and implement structured and logical writing Be frank and honest about strengths and weaknesses Meet deadlines and work to fulfil client expectations Thoroughly research unfamiliar topics before attempting to write about them Understand IT contracting issues, particularly in Europe As a technology writer on Upwork (and independently), I have covered these topics/projects and more: Network troubleshooting tools and methods Data center operations and security Web application security Cloud computing eBook Technology certification guides 5G Rollout History of Computing IT articles on a wide variety of topics If you are interested in effective writing for your technology project, please contact me as soon as possible.Network Security
Technical AnalysisArticle WritingIT ConsultationWeb Application SecurityWritingComputer NetworkTelecommunications EngineeringContent WritingTechnical Writing - $60 hourly
- 0.0/5
- (0 jobs)
I am a senior network engineer with 12 years of experience covering a wide array of routing/switching technologies as well as VoIP/wireless and security. A brief overview of skill sets and past duties include: • Implementing and troubleshooting dynamic and static routing. Extensive experience with BGP, OSPF, and EIRGP. • Deploying and maintaining VoIP systems and applications including Cisco Unified Communications Manager, Unity Connection, Contact Center Express, various voice gateways, and IVR applications. • Utilizes a wide range of network tools to include; Spectrum, Voyance, NetQos, Nagios, Orion, wireshark, airwave, airmagnet, FLUKE systems, SolarWinds, and much more. • Implemented network change management solutions consistent with industry best practices. • Creating network tools and network automation with python. Have written programs for SD-WAN deployments, VoIP phone deployments, switch security, and more. • Extensive experience with Meraki MS, MX, and MR devices. Also, have written scripts leveraging Meraki's API for inventory needs and bulk configuration needs.Network Security
Cisco Certified Network ProfessionalCisco RouterNetwork PlanningVoIP SoftwareCisco CallManagerVoIP AdministrationCisco Certified Network AssociateCisco ASANetwork Design - $18 hourly
- 0.0/5
- (0 jobs)
if i am assigned a job or take the responsibility of a job i will do my upmost best to complete it with efficiency and in a timely manner i take client and employer relations seriously in a courteous outgoing matter on both sides to get the best result for everyone myself included i look forward to doing business with you Awards Fundamentals of Network Security Certification August 2018 the fundamentals of network security such as active and passive attacks on networks, encryption, symmetric and asymmetric key systems, authentication using network security certification authorities, and access control using passwords and firewalls. and being more aware of the potential threats and how to combat these threats. Google Technical Support Fundamentals Certification November 2019 entry-level IT Support Specialist Certification: * understanding how the binary system works. * assemble a computer from scratch. * choose and install an operating system on a computer. * Understand what the Internet is, how it works, and the impact it has in the modern world. * learn how applications are created and how they work under the hood of a computer. * utilize common problem-solving methodologies and soft skills in an Information Technology setting.Network Security
SSHFTPMongoDBComputer MaintenanceMySQLNetwork EngineeringComputer NetworkMicrosoft WordDatabaseMicrosoft ExcelTech & ITDNSLinuxMicrosoft Windows - $25 hourly
- 0.0/5
- (1 job)
Detail-oriented, independent Network Security Analyst with a strong foundation in network security, system administration, and technical support. Certified in CompTIA Security+, Cisco CCNA, and Google Technical Support, with hands-on experience in securing both Windows and Linux server environments. Skilled in monitoring and protecting network infrastructures, deploying security measures, and performing system maintenance to ensure compliance with industry standards. Experienced in deploying automation tools, analyzing security incidents, and collaborating with IT teams to enhance operational security and efficiency. Committed to safeguarding IT infrastructure and continuously advancing skills through independent learning and the proactive pursuit of industry certifications. Demonstrates a strong capacity for mastering complex security concepts and staying ahead of emerging threats in the cybersecurity field. Eager to contribute to organizations dedicated to protecting critical assets and maintaining secure, resilient networks.Network Security
Incident Response PlanVulnerability AssessmentRisk ManagementRisk AnalysisInformation Security Threat MitigationUnified Threat ManagementCyber Threat IntelligenceThreat Detection - $50 hourly
- 0.0/5
- (0 jobs)
Cybersecurity & Risk Management Expert | Protecting Your Business from Cyber Threats Is your business at risk of cyberattacks, compliance violations, or data breaches? A single security breach can cost thousands—damaging your reputation, legal standing, and customer trust. I help businesses like yours stay protected, compliant, and resilient against cyber threats. How I Help You Stay Secure & Compliant: ✅ Eliminate Security Risks Before They Harm Your Business – I conduct in-depth risk & vulnerability assessments to identify weak points and provide tailored solutions. ✅ Ensure Regulatory Compliance & Avoid Legal Penalties – I help you meet NIST, ISO 27001, SOC 2, PCI-DSS, and other industry standards, so you stay ahead of regulations. ✅ Strengthen Your Cyber Defenses – I develop custom cybersecurity policies, incident response plans, and employee training to prevent attacks. ✅ Proactively Detect & Stop Cyber Threats – I monitor, analyze, and mitigate threats before they disrupt your operations. ✅ Perform Security Audits & Penetration Testing – I test your systems to find and fix vulnerabilities before hackers do. Why Businesses Choose Me: 🔹 Client-Focused, Solution-Driven Approach – I don’t just find problems; I provide clear, actionable solutions to protect your business. 🔹 Risk Prevention = Cost Savings – A proactive approach saves you from costly breaches, fines, and downtime. 🔹 Tailored Strategies, Not One-Size-Fits-All – Your security plan is designed specifically for your business, industry, and risk profile. 🔹 Peace of Mind & Business Continuity – With me, your systems are secure, compliant, and resilient—so you can focus on growth. Don’t wait for a cyberattack to test your defenses. Let’s secure your business today. 📩 Contact me now to discuss your security needs!Network Security
Cloud SecurityThreat DetectionSecurity Policies & Procedures DocumentationGovernance, Risk & Compliance SoftwareData ProtectionPenetration TestingSecurity AnalysisRisk ManagementNIST Cybersecurity FrameworkRisk AnalysisVulnerability AssessmentNetwork Penetration TestingNetwork AnalysisCybersecurity Monitoring - $50 hourly
- 0.0/5
- (0 jobs)
I'm a versatile developer specializing in automation, AI-powered workflows, and cybersecurity solutions. With hands-on expertise, I create efficient tools for automating repetitive tasks, enhancing software development, and building intelligent applications. My skill set includes: -Automation & AI Development: Creating custom chatbots, virtual assistants, and data analysis tools. -Software Development: Code generation, bug fixing, refactoring, and test automation to optimize performance. -Cybersecurity: Building penetration testing scripts, network monitoring tools, and security automation solutions. -API & Third-Party Integrations: Seamlessly connecting with RESTful APIs, Slack, Discord, GitHub, and more. Accomplishments: -Developed automated CI/CD pipelines for faster deployment cycles. -Built custom AI agents for data scraping and real-time analytics. -Created cybersecurity tools for vulnerability assessments and network monitoring. I’m committed to delivering efficient, scalable, and secure solutions tailored to your business needs. Let’s collaborate to bring your project to life!Network Security
Prompt EngineeringVersion ControlGoogle Cloud Platform AdministrationDevOps EngineeringEthical HackingAPI DevelopmentNatural Language GenerationMachine LearningCryptographyJavaScriptPython - $5 hourly
- 0.0/5
- (0 jobs)
Real Hacker with special skill set as Digital Forensics. Recent work in government DOS sectors to develop remote information gathering tools, patented and protected by HackBrand.net I am transparent, and based here in New York, but I travel a lot so I'm usually working remote or at a Satellite Location. info(at)hackbrand(dot)net Web Development Financial Recovery WhatsApp Hacking Email Hacking Penetration Testing SQL injections DOXing SE (Social Engineering) Creating Viruses (ooh scary) Seeking out Vulnerabilities Proactive Security Awareness info(at)hackbrand(dot)netNetwork Security
AJAXLinux System AdministrationOracle Application FrameworkSAP Crystal ReportsGrowth HackingCognosData RecoveryJavaScriptSQL Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.