Hire the best Policy Writers in Dallas, TX

Check out Policy Writers in Dallas, TX with the skills you need for your next job.
  • $113 hourly
    Hey there, Thanks for taking a look at my profile! I'm a man of many talents--as a lawyer, I represent clients in negotiating and closing acquisitions, dispositions, leases, and lending transactions. As a writer, I have served in chief editorial roles for naturally recognized publications, and I have also had my writing published. As a mentor, I have worked closely with prospective college students and law students as a tutor in SAT/LSAT preparation and essay writing. Providing quality work means a lot to me, and I endeavor to make each project a meaningful one for you as a client and myself as a lifelong learner. I look forward to working with you! Best, Yemi
    vsuc_fltilesrefresh_TrophyIcon Policy Writing
    Real Estate Law
    Real Estate
    Notarization
    Legal
    Finance & Law
    Editing & Proofreading
    Legal Consulting
  • $200 hourly
    As a Top Rated vCISO with a 100% job success rate, rest assured that I execute at a high level of expertise, integrity, and professionalism. I am the President & Founder of Aspire Cyber, a full-service consulting firm that rapidly delivers privacy and cybersecurity compliance solutions to help small and medium-sized businesses satisfy their legal, regulatory, and contractual requirements. Aspire Cyber was founded on the core belief that every business should have access to world-class cybersecurity talent, regardless of budget or security needs. I have over 20 years ​of experience managing information security projects and implementing strategic cybersecurity controls for the United States Army, Bank of America, and numerous Fortune 100 companies. We offer entirely “Done For You” solutions that help your business rapidly achieve compliance while we manage everything. Don’t waste 6-18 months trying to figure this out yourself. Regulatory and industry cybersecurity frameworks have hundreds of different controls you must comply with and require knowledge of IT, Cybersecurity, HR, Legal, and more. Aspire Cyber is a leading provider of comprehensive cybersecurity compliance solutions. Our team of experts has a proven track record of implementing NIST SP 800-171 practices to help defense contractors achieve Cybersecurity Maturity Model Certification (CMMC). We make it easy for your business to prove it's a safe choice for handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Schedule a free call with me to learn how our team of dedicated cybersecurity experts can help save you months of time and, in many cases, five or even six figures in excessive spending trying to become compliant without expert guidance. ★High Profile Clients ✔ I worked for the United States Army, Lockheed Martin, Bank of America, Hewlett-Packard Enterprise, and many others. Aspire Cyber specializes in the following areas: ★ Risk Assessment and Auditing - We have conducted over 200 Information Security, Business Continuity, and Cloud assessments. -Compliance (NIST, PCI, HIPAA, ISO 27001, GDPR, CCPA, COPPA, FedRAMP) - Cybersecurity Advisor -Cloud Secure Design -Data Privacy Officer (DPO) -Cloud Security -Policy Writing -Penetration Testing -Application Security -Incident Response -Vulnerability Management -Third-Party Risk Management -Security Awareness Training ★ I hold the following degrees and certifications: ✅ Certified CMMC Assessor (CCA) ✅ Certified CMMC Professional (CCP) ✅ CMMC Provisional Instructor ✅ Certified Information Systems Security Professional (CISSP) ✅ Certified Cloud Security Professional (CCSP) ✅ Certified Information Security Manager (CISM) ✅ Certified Risk and Information Systems Control (CRISC) ✅ CMMC Registered Practitioner ✅ CompTIA Security+ ✅ CompTIA A+ ✅ Master of Business Administration (MBA) ✅ Graduate Certificate Cybersecurity Technology WHY CHOOSE ASPIRE CYBER? -Professionalism: We treat all clients respectfully and adhere to the highest ethical standards. -Fast: We always aim to deliver your project ahead of schedule. -Expertise: We have vast experience across various cybersecurity and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. 🙋🏼‍♂️Our team is eager to partner with your organization to deliver cybersecurity compliance solutions rapidly. Contact Aspire Cyber today to learn how we can fulfill your cybersecurity needs.
    vsuc_fltilesrefresh_TrophyIcon Policy Writing
    Cloud Security Framework
    NIST SP 800-53
    Information Security Governance
    FedRAMP
    Information Security Awareness
    Risk Assessment
    NIST Cybersecurity Framework
    Business Continuity Plan
    Information Security Audit
    Information Security
    Incident Response Plan
    Security Testing
    Vulnerability Assessment
  • $250 hourly
    PERSONAL STATEMENT: I am looking for exciting new opportunities at varying organizations with different people, process, and technology stacks. My goal is to partner with and serve you and your organization and its needs. Being a partner to me isn't just a noun - it's also a verb. I look forward to partnering with you and your organization so that we can all strive towards excellence together in meeting and exceeding your expectations, strategies, business objectives, and goals. ABOUT ME: I am a certified US-based cybersecurity, governance, risk, and compliance professional with 8+ years of experience in Information Technology, Cybersecurity, Risk Management, Compliance, and Internal Audit. I am currently the Director, IT Governance, Risk & Security Assurance, for a multi-billion dollar valued company with 9,000 employees all around the world. I offer a variety of services to organizations of all sizes. My goal is to help your organization securely navigate and operate in the digital age through professional consulting and strategic partnership that'll allow your organization to thrive; drive predictability, growth, and scalability; reduce risk to an acceptable level; meet and exceed business goals; demonstrate cybersecurity commitment to stakeholders; and improve outcomes to your organization, your customers, and the public. MY EXPERIENCE: I have multiple years of experience improving outcomes for my clients and their customers. For example, I have completed over 200+ SOC 2 and ISO 27001 reports throughout my career, created various GRC programs, implemented various security implementations, and corrected mail flow for more than 200+ domains containing 100+ million emails per month through implementing SPF, DKIM, and DMARC compliance and best practices. If you are looking for a certified individual with a blend of technical and managerial experience in this space; please feel free to reach out to discuss your next project and your needs. ★ Email Deliverability and Security Optimization Are your emails being bounced, not delivered, experiencing high suppression rate, low inbox placement, and sent to the spam/junk folder? When it comes to email deliverability, I have a deep understanding of the technical and strategic aspects of getting emails into the inbox, ensuring that they are not marked as spam or blocked by filters. My skills in email authentication, DNS, SPF, DKIM, and DMARC, and identifying and resolving deliverability issues, and optimizing email content have helped many clients achieve better deliverability rates and higher engagement with their audience. ✅ Email Deliverability and Security (Prevent Impersonation) ✅ DNS, EDV, SPF/DKIM Pass/Alignment, DMARC Compliance ✅ DMARC None, Quarantine, Reject (Protect Domain) ✅ DMARC Aggregate and Forensic Reports ✅ Email Header From / Mail From Code Changes ✅ DKIM Sender Authentication Configuration ✅ Domain Configuration with Email Platform Email and Productivity Suites: 💼 Microsoft 365 (Exchange Online/Outlook) 📊 Google Workspace (Gmail/G-Suite) Email Marketing and/or Automation: 🚀 Zoho 🤝 Mailshake 🎯 HubSpot 💠 Klaviyo 🔫 Mailgun 📩 SendGrid 🐵 MailChimp 🔍 Zendesk 📊 Postmark 🌧 Salesforce 🌐 Sendinblue (Brevo) 🔍 Zuora 💼 Mandrill 🔃 AmazonSES & More DNS / Web Hosting: ⛅ Cloudflare 🧰 WordPress 🌐 Bluehost 🌙 Google 💳 Namecheap 🔌 AWS Route53 🐐 GoDaddy 🧱 Squarespace 💼 Azure 🌧 Akamai & More ★ Compliance, Standards, and Frameworks - SOC 1 / 2 / 3 - ISO 27001 - EU GDPR - CCPA / CPRA - HIPAA / HITECH - HITRUST CSF - PCI DSS - NIST CSF / 800-171 - SOX 404 / ITGCs - General Security Compliance Consulting - Internal Audit Consulting ★ Information Security Governance and Cyber Management - vCISO / Fractional CISO / CISO-as-a-Service - Cybersecurity Strategy and Roadmap - Privacy Program - Risk Management Program - Governance, Risk, and Compliance Program - Identity and Access Management - Incident Response Planning - Business Continuity Planning - Policy and Document Development - Security Program Assessment - Application, Cloud, and Infrastructure Security - Security Architecture / SDLC - Vulnerability Management Program - Third-Party Risk Management Program - Security Awareness Training ★ Professional Certifications ✅ Certified Information Systems Security Professional (CISSP) - ISC2 ✅ Certified Information Security Manager (CISM) - ISACA ✅ Certified in Risk and Information Systems Control (CRISC) - ISACA ✅ Certified Information Systems Auditor (CISA) - ISACA ✅ Certified Internal Auditor (CIA) - IIA ✅ Certified Data Privacy Solutions Engineer (CDPSE) - ISACA ✅ Certified Information Privacy Manager (CIPM) - IAPP ✅ Certified Information Privacy Professional (CIPP-US) - IAPP ✅ ISO 27001 Lead Auditor - PECB ✅ ISO 20000 Lead Auditor - PECB ✅ Certificate in Cloud Security Knowledge (CCSK) - CSA ✅ Advanced SOC for Service Organizations Certificate - AICPA
    vsuc_fltilesrefresh_TrophyIcon Policy Writing
    Cloud Security Framework
    Information Technology
    Internal Auditing
    Cybersecurity Management
    Technology Management Solutions SIMS
    Cloud Security
    Risk Management
    Compliance
    Project Management
    Risk Assessment
  • $80 hourly
    Hello, I have been a Technical Writer and Editor for the past twenty years. I've written for a wide variety of organizations and enjoy many aspects of technical writing, particularly those areas that require strong critical thinking and problem-solving skills. Documentation I have produced ranges from small in-house user guides and policy/procedure manuals to training materials used to roll out national products. I am a stickler for detail but am otherwise pretty easygoing. I appreciate your time and consideration.
    vsuc_fltilesrefresh_TrophyIcon Policy Writing
    Microsoft Office
    LibreOffice
    Line Editing
    Technical Editing
    Developmental Editing
    Microsoft SharePoint Administration
    Proofreading
    Technical Writing
    Editing & Proofreading
    Technical Documentation
  • $200 hourly
    I'm Eric, a well-versed cybersecurity professional with over 13 years of experience dedicated to securing small and medium-sized businesses across various sectors. My background spans notable stints at defense contractors and AWS, where I specialized in areas like risk and compliance, security control assessments, and vulnerability management. 🌟 Why Choose Me? - Certified and Experienced: I'm well-equipped with industry certifications such as CISSP, CISM, CCSP, and AWS CCP. - Tailored Solutions: At Cyber Wise Guy, my consultancy, I craft personalized strategies that shield businesses from potential threats, helping foster growth and instill trust with clients. 🌟 Notable Milestones: - Founder of Cyber Wise Guy: Launched a consulting firm aimed at enhancing the cybersecurity posture of small and medium-sized businesses. - Defense Contractors & AWS Experience: Played pivotal roles in augmenting cybersecurity frameworks, showcasing a talent for elevating security infrastructures. 🌟 Services Offered: - Web App Vulnerability Assessment Secure your web applications with our focused scan, yielding actionable insights and strategies for enhancing security. - Penetration Testing Our comprehensive approach identifies security gaps and provides strategic recommendations for robust defense, ensuring compliance and safeguarding against cyber threats. - Managed Security Service Package Boost your cybersecurity infrastructure with this package, encompassing antivirus deployment, email protection, MDR, and system/application patching. Customizable add-ons available. - Network Vulnerability Assessment Strengthen your system's defenses with a detailed scan identifying vulnerabilities, coupled with strategies to enhance security. - Cybersecurity Risk Assessment Analyze and address potential vulnerabilities in your business's cybersecurity setup, offering strategies to bolster protection and adhere to industry standards. - Cybersecurity Policy/Procedure Creation Develop custom cybersecurity guidelines and policies, fostering a secure and consistent business operation. - Cybersecurity Compliance Advisory and Monitoring Navigate industry-specific cybersecurity regulations with expert guidance to safeguard sensitive data and avoid legal pitfalls. - vCISO Embark on a thorough cybersecurity overhaul with extensive policy reviews and security awareness training, promoting a secure business environment. 🌟 Availability and Contact Information: I am currently open to taking on both short-term and long-term projects to help secure your business's digital landscape. Given my extensive background in the cybersecurity field, I am well-equipped to provide solutions that are tailored to your specific needs. For further discussions or to kick-start a project, feel free to get in touch using the following contact details: 📧 Email: info@cyberwiseguy.com 💼 Website: cyberwiseguy.com
    vsuc_fltilesrefresh_TrophyIcon Policy Writing
    SOC 2
    Managed Services
    NIST SP 800-53
    NIST Cybersecurity Framework
    CIS Control Assessment
    HIPAA
    Procedure Development
    Governance, Risk Management & Compliance
    Computing & Networking
    Company Policy
    Vulnerability Assessment
    Cybersecurity Management
    Information Security
    System Security
  • $60 hourly
    Certified HR professional and military veteran, with leadership and consulting experience in various industries. Proven results for HR programs and processes related to recruiting, onboarding, training and development, leadership coaching, HR strategic planning, employee relations, employee engagement, compensation and benefits, performance management, and offboarding. I offer full service HR support, or will complete special projects - based on your needs!
    vsuc_fltilesrefresh_TrophyIcon Policy Writing
    Public Speaking
    Content Writing
    Research Documentation
    Employee Onboarding
    Risk Management
    Employee Engagement
    Leadership Coaching
    Human Resource Management
    HR & Business Services
    Training & Development
    HR & Recruiting Software
    Recruiting
    Employee Relations
  • $100 hourly
    I hold a Bachelor of Science degree in Marketing. Furthering my education, I have obtained my master’s in business along with a graduate certificate in Accounting. I actively engage in ongoing education and training opportunities to stay abreast of the latest trends, technologies, and best practices in the field of information security and compliance. I am actively in pursuit of obtaining additional certifications such as CISA (Certified Information Security Auditor) and CCSK (Certificate of Cloud Security Knowledge). In addition to my educational experience, I have 12 plus years working with compliance and auditing in various industries. I have eight years of direct experience with various information security frameworks such as SOC, HIPPA, and ISO. I am able to provide external consulting, third party auditing, and maintain internal compliance. Consulting Experience: Initial Assessment: Evaluating the organization's systems, processes, and controls to determine their readiness for SOC compliance. This may involve reviewing existing documentation, interviewing key personnel, and assessing current practices. Scope Definition: Work with the organization to define the scope of the SOC engagement, including identifying the services, systems, and processes that will be included in the assessment. Gap Analysis: Identify any gaps between the organization's current controls and the requirements of the chosen SOC report (e.g., SOC 1, SOC 2, SOC 3). This involves comparing existing controls against the relevant SOC criteria and determining what additional controls or enhancements are needed. Control Design and Implementation: Assist in designing and implementing controls to address identified gaps and meet SOC requirements. This may include developing new policies and procedures, configuring security measures, and deploying monitoring tools. Documentation and Evidence Gathering: Help the organization prepare the necessary documentation and evidence to support the SOC assessment. This includes creating control narratives, process flows, and other documentation to demonstrate control effectiveness. Audit Preparation: Support the organization in preparing for the SOC audit, including coordinating with auditors, scheduling testing activities, and ensuring all required documentation is in place. Testing and Validation: Assist with the testing of controls to ensure they are operating effectively. This may involve performing walkthroughs, conducting tests of operating effectiveness, and reviewing evidence of control performance. Remediation Assistance: Help address any deficiencies or issues identified during testing or audit procedures. This may involve providing recommendations for remediation, assisting with corrective action plans, and verifying the effectiveness of remediation efforts. Reporting and Communication: Collaborate with the organization to prepare the SOC report, which summarizes the results of the assessment and provides assurance to stakeholders. This may include drafting the report, reviewing findings with management, and facilitating communication with clients or other relevant parties. Continuous Monitoring and Maintenance: Establish processes for ongoing monitoring and maintenance of SOC compliance. This includes implementing mechanisms for monitoring controls, updating documentation as needed, and staying informed about changes in relevant standards and regulations.
    vsuc_fltilesrefresh_TrophyIcon Policy Writing
    Risk Analysis
    Risk Assessment
    Policy Development
    NIST Cybersecurity Framework
    HITRUST Common Security Framework
    IT Compliance Audit
    Internal Auditing
    IT Consultation
    Information Technology
    ISO 27001
    HIPAA
    SOC 2
    SOC 1
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Policy Writer near Dallas, TX on Upwork?

You can hire a Policy Writer near Dallas, TX on Upwork in four simple steps:

  • Create a job post tailored to your Policy Writer project scope. We’ll walk you through the process step by step.
  • Browse top Policy Writer talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Policy Writer profiles and interview.
  • Hire the right Policy Writer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Policy Writer?

Rates charged by Policy Writers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Policy Writer near Dallas, TX on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Policy Writers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Policy Writer team you need to succeed.

Can I hire a Policy Writer near Dallas, TX within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Policy Writer proposals within 24 hours of posting a job description.