Hire the best Security Consultants

Check out Security Consultants with the skills you need for your next job.

Clients rate Security Consultants
Rating is 4.7 out of 5.
4.7/5
based on 463 client reviews
Luciana O.
$135/hr
  • Trophy Icon Security Consulting
  • Cybersecurity Management
  • Security Engineering
  • Information Security
  • Email Security
  • Information Security Audit
  • Internet Security
  • Security Management
  • Security Infrastructure
  • Security Policies & Procedures Documentation
  • Cloud Security
  • PCI
  • Information Security Awareness
  • Network Monitoring
  • System Monitoring
  • Security Analysis

I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startup, micro, small, and mid-sized companies create secure operating environments to increase business opportunities. My priority is to develop cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their critical information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold...

Dan L.
$125/hr
  • Trophy Icon Security Consulting
  • Splunk
  • Linux System Administration
  • Microsoft Windows Powershell
  • Security Engineering
  • Cybersecurity Management
  • Python

Built and manage a Splunk Architect Enterprise involving over 10000 endpoints. Built and Manage Linux Systems for multiple customers Creating uses cases for security analyst and operations using splunk knowledge objects and views per splunk best practices Creating efficient correlated search queries for both splunk enterprise alerts and Splunk Enterprise Security. Assisted customer on multiple occasions troubleshooting miscellaneous Splunk issues within their environment

Ramsey B.
$125/hr
  • Trophy Icon Security Consulting
  • Microsoft Active Directory
  • VMware Administration
  • Server Virtualization
  • Computing & Networking
  • Infrastructure Management
  • Information Security
  • Systems Engineering
  • Amazon Web Services
  • Cloud Engineering Consultation
  • DNS
  • Network Security
  • Computer Network
  • Network Design
  • Microsoft Azure
  • Security Engineering

ESXi/vSphere, AWS architecture and implementation, DevSec(Ops), SDN, Windows/Linux systems administration, root-cause analysis on infrastructure including networks, enterprise endpoint product test and eval, test case builds. Throughout my 13 years I've seen and touched almost everything. Very efficient and thorough.

Florjan L.
$25/hr
  • Trophy Icon Security Consulting
  • Security Infrastructure
  • Manual Testing
  • Security Assessment & Testing
  • Penetration Testing
  • Application Security
  • Ethical Hacking
  • Open Web Application Security Project
  • Windows Server
  • Vulnerability Assessment
  • NIST SP 800-53
  • Kali Linux
  • Network Security
  • Internet Security
  • Web Application Security
  • Security Engineering

Certifications that I hold: CEH ( Certified Ethical Hacker) 740 MCSA ( Installation, Storage and Compute with Windows Server 2016) To whom it may concern, In the last years I did more than 300 Penetration Tests and Security Assessments. Most of them on Web and Mobile ( Android and iOS ) applications with Finance Background implemented with various technologies and frameworks, server security testing and hardening. Sample reports can be provided who is interested. ___________________________________________________________ Professional Load and Stress Testing if you are interested for your application...

Daniel B.
$165/hr
  • Trophy Icon Security Consulting
  • Information Security
  • Cybersecurity Management
  • Network Security
  • Certified Information Systems Security Professional
  • Cybersecurity Management
  • Information Security Awareness
  • Cloud Security
  • Security Information & Event Management
  • Security Policies & Procedures Documentation
  • Security Engineering
  • Governance, Risk Management & Compliance
  • Amazon Web Services
  • Vulnerability Assessment
  • Gap Analysis

I am an accomplished and experienced Cyber Security Engineer, CISO, and consultant with over 20 years experience in government, commercial, non-profit and private organizations. I'm a Certified Information Systems Security Professional (CISSP) and CMMC Registered Practitioner. My education includes a Master's degree in Information Assurance and Security specializing in Digital Forensics, a Bachelor's Degree in Information Technology, and daily, hands-on work governing, securing and administering complex information technology environments. My current efforts include cybersecurity compliance implementations for regulated industries and...

Shamik B.
$125/hr
  • Trophy Icon Security Consulting
  • Information Security Audit
  • Web Application Security
  • Cloud Security Framework
  • Compliance Consultation
  • Security Infrastructure
  • Security Policies & Procedures Documentation
  • Security Engineering
  • ISO 27001
  • Certified Information Systems Security Professional
  • Penetration Testing
  • Email Security
  • PCI
  • Vulnerability Assessment
  • Information Security

Having worked for many Fortune 100 companies, I now run a boutique cybersecurity consultancy called Careful Security. We serve businesses of all sizes, We providing a 360-degree cybersecurity solution by #Securing Website #Protecting Data #Pass an audit/vendor questionnaire/cyber-insurance questionnaire #SIEM Solution for security monitoring and alerting Past Accomplishments # Designed and Implemented security controls for Warner Bros. iconic shows and movies such as Harry Potter, The Game of Thrones, Curb your enthusiasm. ## Secured video games for EA Sports - FIFA, The Sims, and Madden. ### Secured financial...

Md Azizur R.
$71/hr
  • Trophy Icon Security Consulting
  • Database Security
  • Vulnerability Assessment
  • Cybersecurity Management
  • Application Security
  • Penetration Testing
  • Security Testing
  • Security Policies & Procedures Documentation
  • Network Security
  • Source Code Scanning
  • Information Security
  • Secure SDLC
  • Security Analysis
  • Security Engineering
  • Cloud Security
  • ISO 27001

InfoSec Consultant | GRC Consultant | Security Engineer | Security Expert | Penetration Tester | Cyber Security Specialist | Software Security Engineer| CEH | ECSA | LPT (MASTER) | ISO 27001 LI (BSI) | Microsoft Azure Security Technologies (AZ-500)| AWS Certified Security – Specialty | Certified Information Security Manager (CISM) | Certified Information Security Auditor (CISA) Seasoned security professional with 14+ years of demonstrated experience both building and breaking applications, networks and clouds seeking a challenging engagement. Core technical competencies include application security architecture, web application and thick...

Samson A.
$120/hr
  • Trophy Icon Security Consulting
  • Security Engineering
  • Information Security Governance
  • Cloud Computing
  • Network Security
  • Information Security
  • Security Operation Center
  • Security Analysis

passionate security enthusiast interested in assisting a team increase their security posture by providing guidance and consultation on building and improving security operation capabilities, reducing overall attack surface with proper vulnerability management, and security engineering/architectural improvements.

Matthew G.
$70/hr
  • Trophy Icon Security Consulting
  • Microsoft Office
  • Firewall
  • Cisco Router
  • Java
  • Scripting
  • Wireless Network Implementation
  • Wireless Security
  • Network Security
  • Linux System Administration
  • Network Administration

Dedicated Cyber Security expert with a vast IT background. Has an in-depth understanding of IT infrastructure, cyber security, and network integration. Goal-driven hard-worker with demonstrated success in IT field. Skills- Software: Microsoft Office, Open Office, McAfee, Norton, Remedy Ticketing Service Security: Sourcefire, OPSWAT, InQuest, FireEye, IDS/IPS, Stealthwatch, Fidelis, Firewall configuration and maintenance, VPN configuration and maintenance Networking: Wireshark/TCP Packet Analysis, DNS servers, mail servers, network infrastructure install and maintenance Virtualization/Container Based Computing: Citrix, VMware, Docker...

Anthony T.
$150/hr
  • Trophy Icon Security Consulting
  • Penetration Testing
  • HIPAA
  • Risk Assessment
  • Network Security
  • Information Security
  • Project Risk Management
  • Digital Forensics
  • Web Application Security
  • Security Engineering
  • Certified Information Systems Security Professional

You want to hire a reliable, experienced, professional, and educated individual to handle Cyber Security, Penetration Testing, HIPAA Consulting or HIPAA Compliance, and general IT Security planning for your business. If that’s what you are looking for, then I am your guy! As an experienced Cyber Security Consultant and Expert Penetration Tester and Certified Ethical Hacker, I have the knowledge and experience to help you discover just how attackers can get into your network. I also offer high quality website design services. I am a Cybersecurity professional with over 10 years of experience in the field working in various positions for...

David A.
$135/hr
  • Trophy Icon Security Consulting
  • Project Management
  • Auth0
  • OKTA
  • PHP
  • Security Engineering
  • Linux System Administration
  • Security Assertion Markup Language
  • LDAP
  • Single Sign-On
  • Security Analysis
  • Microsoft Azure
  • Compliance
  • User Identity Management
  • FedRAMP
  • Microsoft Active Directory

SAML and SSO integration expert with over fifteen years of experience. I have experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, ADFS, Azure, Okta, Cognito, OneLogin, Auth0, JumpCloud, Salesforce, Spring Security SAML, Ping, ComponentSpace, FIM, SiteMinder, SAP, OAM, Keycloak, ForgeRock, SailPoint, etc.). I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, Ruby, Go, etc.) or framework (Node.js, Meteor, Angular, Django, CodeIgniter, Concrete5, Yii, Symfony, Laravel, WordPress, Grails, Spring, Spring Boot, Cordova, etc.). I have a strong track record of...

Simon P.
$139/hr
  • Trophy Icon Security Consulting
  • LDAP
  • Solaris Administration
  • Linux System Administration
  • Internet Security
  • Information Architecture
  • Apache Tomcat
  • Network Security
  • Security Engineering
  • Open Web Application Security Project
  • User Identity Management
  • F5
  • API

SSO - 15 years experience TIM/TAM/OAM/OIM/Siteminder and Identity Manager/Novell Access and Identity Manager/Jsso , ADFS , ShibbolethOpenam , OpenIBM , OpenDJ / Ping Access / Ping Federate Lots and lots of integration ADFS / SAML / OAuth / OpenID / Radius / Ldap REST/JSON/Cookies/BA/Cert/OAuth/Radius/Free Radius/header inject/Forms/SAML DEVOPS - Done about 10 projects in the last 4-5 years Prov - Terraform / Foreman / Kickstart / MASS CI - Jenkins/Bamboo CD - Ansible / Saltstack / Puppet / Chef Container - Docker / Swarm / Kubernetes Cloud - Aws / Azure / GCP / OpenStack Compile - Ant / Maven Monitoring -...

Redouane N.
$25/hr
  • Trophy Icon Security Consulting
  • Python
  • Assembly Language
  • Lua
  • C
  • Cryptography
  • Ruby
  • Security Engineering
  • Computer Assembly
  • X86 Assembly Language
  • C#

I am Redouane, a computer science and engineering student, cybersecurity enthusiast, CTF player, check out my blog below for more informations about me. Scripting (Ruby, Python, Lua, Bash), including web scraping and task automation. Low-level programming (x86/x64/ARM/MIPS Assembly, C) Reverse-Engineering / Binary Exploitation / Cryptography. Linux system administration. Open-source contributor (contributed to Metasploit-Framework, Bettercap, Aircrack-ng, Shodanz, Sherlock and other popular projects)

Eric L.
$50/hr
  • Trophy Icon Security Consulting
  • Incident Response Plan
  • ISO 27001
  • Risk Assessment
  • Information Security Consultation
  • FedRAMP
  • Security Infrastructure
  • Cybersecurity Management
  • Security Policies & Procedures Documentation
  • IT Compliance Audit
  • NIST SP 800-53
  • SOC 2 Report
  • Certified Information Systems Security Professional

Overview: Over twenty years of management and leadership experience in military and civilian operations. Training and education in Cyber Security, Information Technology, Network Management, and Information Assurance. Specialty: Cyber Security Training and Education. Government Compliance, CMMC, NIST 171, NIST 53, FedRAMP, SOC, and ISO 27000. NIST 171 Project Specialty includes: • Controlled Unclassified Information (CUI) • System Security Plan (SSP) • Plan of Action and Milestone (POA&M) • SCOPE Boundary Design • Risk Assessment • GAP Analysis • Security Policies and Procedures (SPP) Capabilities: Able to follow life cycle...

Michael B.
$150/hr
  • Trophy Icon Security Consulting
  • Microsoft Lync Server
  • Windows PowerShell
  • Microsoft Active Directory
  • Microsoft SCCM
  • DHCP
  • DNS
  • Microsoft Exchange Server
  • Microsoft Office 365
  • Azure

I have years of experience focusing on the messaging collaboration side of technologies including various versions of Microsoft Exchange and Microsoft Lync Server. I have worked as a lead engineer for major financial companies. I have over 8+ years of Powershell scripting experience. My vision is to provide my clients with enterprise knowledge and experience, give them the guidance for the right answer, and implement the best solution to ensure their day to day operations continue to run smooth. Recent Projects: 1. Create a secure, robust, and highly available Remote Desktop Services (RDS) solution in Azure leveraging Multi-Factor...

Jordan S.
$85/hr
  • Trophy Icon Security Consulting
  • Artificial Intelligence
  • Machine Learning
  • Data Science
  • Data Analysis
  • TensorFlow
  • PyTorch
  • Big Data
  • Python
  • JavaScript
  • Security Engineering

I'm a Senior Data Scientist who has worked on a range of AI, Machine Learning, and Cybersecurity projects including deep learning, forecasting, recurrent and convolutional neural networks, financial prediction tools, natural language processing models and much more. In addition, I also have full-stack development experience working with customers worldwide. I'm knowledgeable in technologies such as Python, Tensorflow, Pytorch, Scikit-Learn, Keras, JavaScript, ReactJS, NodeJS, Pandas Numpy, SQL, and much more. I have helped build AI projects in a range of sectors, web applications for startups, implemented DS models for e-commerce leading to...

Vicente M.
$30/hr
  • Trophy Icon Security Consulting
  • Python
  • Linux System Administration
  • MySQL
  • Web Development
  • AT&T Cybersecurity
  • Splunk
  • Bash Programming
  • Data Scraping
  • Writing
  • Elasticsearch
  • Docker
  • History
  • Technical Writing
  • Incident Response Plan
  • Scripting

Cybersecurity Professional focused on making sure your data and information are secure by properly identifying, mitigating and fixing vulnerabilities as well as setting up monitoring platforms for monitoring, additionally I have worked with Python and other scripting languages for data collection, manipulation and visualization. I have experience as a ghostwriter and an editing of texts, I currently hold the position of editor and proofreader for an e-magazine that has been running three years strong delivering books every six months.

Ricardo U.
$70/hr
  • Trophy Icon Security Consulting
  • JavaScript
  • C
  • C++
  • Python
  • Information Security Audit
  • Computer Network
  • Linux
  • Reverse Engineering
  • Security Engineering
  • Security Analysis

I am a C, C++ Developer with strong concepts of operating systems. I have been working for 4 years in the field at prestigious companies. My worked combined security concepts and software engineering. I will help you conturing your idea and create the final product. I can also help with automate scripts, homework or various programming tasks. Passionate about operating systems and security. My passion for security motivated me to learn and experiment various fields. I did play lots of CTFs and managed to get top results at such competitions. I can help you with pentesting, code review, binary exploiting, reverse engineering, forensics and...

Serhii V.
$55/hr
  • Trophy Icon Security Consulting
  • Web Hosting
  • Linux System Administration
  • Proxmox VE
  • Data Recovery
  • Debian
  • Ubuntu
  • CentOS
  • DNS
  • Cloudflare
  • Website Security
  • Web Server
  • Virtual Private Server
  • Scripting
  • Disaster Recovery
  • Malware

Servers administration, DevOps, webhosting, migration, troubleshooting, malware cleanup, data recovering, security hardening, blocking and prevention of hackers intrusion, monitoring, automation, shell scripting, supporting, writing documentation. 150+ jobs, 2000+ hours, 3+ years on UpWork, 100% freelancer I offer reasonable services in areas: Web hosting: • websites migration and web hosting setup; • deploy and customize various CMS (WordPress, Drupal etc); • websites corrections and troubleshooting; • control panels like Plesk, cPanel/WHM, HestiaCP; • DNS configuration, Cloudflare automation; • DigitalOcean, Linode, Hetzner, Vultr...

Caleb M.
$140/hr
  • Trophy Icon Security Consulting
  • Security Testing
  • Security Infrastructure
  • Bash
  • Atlassian JIRA
  • Terraform
  • Ansible
  • Python
  • Amazon Web Services
  • Software Testing
  • Kubernetes
  • Docker
  • Cloud Architecture
  • Cloud Management
  • Security Engineering
  • Business with 100-999 Employees

Information Security professional with a Masters in Cyber Security focused on emerging threats in a highly contested and persistent threat environment. I leverage excellent attention to detail in conducting analysis and apply adept writing skills to capture and accurately record my work.

Hoang Nhan L.
$25/hr
  • Trophy Icon Security Consulting
  • Penetration Testing
  • Security Testing
  • Vulnerability Assessment
  • Information Security
  • Web App Penetration Testing
  • Open Web Application Security Project
  • Website Security
  • Network Penetration Testing
  • Black Box Testing
  • White Box Testing
  • Software Testing
  • System Security
  • Security Analysis
  • Website Security

✅ As a CREST/Offensive Security (OSCP) Certified Penetration Tester and Cyber Security Consultant, I have deep knowledge of Security Assessment Methodology to identify vulnerabilities in Network, Cloud, Web, and Mobile Applications. ✅ I have conducted Penetration Test, Vulnerability Assessment and delivered professional reports to companies in the world complying with: ► CREST standards ► Offensive Security (OSCP) standards ► OWASP Top 10 Vulnerability ► OWASP API Security Top 10 Vulnerability ► OWASP Mobile Security Top 10 Vulnerability ► Application Security Verification Standard 4.0 (ASVS 4.0) ► CWE Top 25 Most Dangerous Software Errors...

Taylor H.
$230/hr
  • Trophy Icon Security Consulting
  • Cybersecurity Management
  • IT Compliance Audit
  • Business Consulting
  • Security Analysis
  • Cloud Security Framework
  • Email Security
  • Information Security Governance
  • GDPR
  • Data Privacy
  • Data Protection

I am the founder of Eden Data, a cybersecurity advisory firm built to help startups and disruptive organizations build better security! My team is built of professionals with a background at Deloitte, Morgan Stanley, Department of Defense, and more. Our vision is to disrupt the professional services space by offering customers a subscription-based virtual CISO service without the crazy price tag. Leader, Visionary, and Business Enabler with a passion for Cyber Security and a desire to enable clients to achieve their vision. I am an energetic, results-oriented leader who strives to be a relationship builder and a disrupter that bridges the...

Mariusz F.
$99/hr
  • Trophy Icon Security Consulting
  • Microsoft Azure
  • Azure App Service
  • Amazon ECS
  • AWS Lambda
  • Alexa Skill Kit
  • Windows Server
  • Linux System Administration
  • Microsoft Azure SQL Database
  • Microsoft Office 365
  • Microsoft Exchange Server
  • Disaster Recovery
  • Database Administration

I am a professional freelancer with THIRD PARTY LIABILITY INSURANCE for over two and a half million dollars, so you are in safe hands. I am Microsoft Certified Trainer, Office 365, GCP, AWS, and Azure Expert. Honored as Microsoft Most Valuable Professional in Azure area. I cover architecting, security, administrating, and migration of all three major clouds – Azure, AWS, and GCP. Apart from the main area of Cloud expert in the field of infrastructure servers Windows Server 2003-2016, Microsoft Active Directory, Hyper-V Private Cloud, IIS, System Center, SQL. Private Cloud, System Center, Hyper-V, Open Stack Expert, and all Microsoft...

Ricardo Q.
$15/hr
  • Trophy Icon Security Consulting
  • System Security
  • Translation
  • Security Analysis
  • Security Engineering
  • Project Management
  • Agile Project Management
  • Asana
  • Milestone XProtect VMS
  • Electronics
  • Solar Energy
  • Technical Translation
  • English to Spanish Translation

A specialist on electronic security systems, Access Control, CCTV, VMS, intrusion, Coordination of technical, administrative & technician staff. Project Management, Design, Consultant, Technician, Engineer. Certifications: - Lenel Access Controls Systems - Genetec Omnicast - Hikvision HCSP - SQL Basics. - CCTV ALAS levels 1&2. - DSC alarms systems - ASANA Together

Petar A.
$75/hr
  • Trophy Icon Security Consulting
  • Penetration Testing
  • Internet Security
  • Web App Penetration Testing
  • Vulnerability Assessment
  • Malware
  • Network Security
  • Network Penetration Testing
  • Ethical Hacking
  • Security Testing
  • Black Box Testing
  • Reverse Engineering
  • JavaScript
  • Web Application Security

✅ Top Rated Expert ✅ 3000+ Hours ✅ Professional Penetration Tester Security researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform. For deliverables, professional reports are created,that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors. Core competency is performing black and gray box testing on live web applications/networks or lab...

Strahinja S.
$50/hr
  • Trophy Icon Security Consulting
  • Vulnerability Assessment
  • GDPR
  • ISO 27001
  • Security Operation Center
  • Information Security
  • Information Security Analyst
  • Information Security Consultation

ECSA - Certified Security Analyst LRPA - Certified LogRhythm Platform Administrator I am a Senior Cybersecurity Analyst with 6 years of professional experience in the Cybersecurity field providing services to corporations and medium-sized businesses that are leaders in their respective industries. Have become proficient in: -Vulnerability assessment and analysis -Full incident response life cycle and incident report writing. -Training Junior colleagues in Cybersecurity Incident Analysis -Writing framework documentation (policies and procedures) -Conducting security audits of certain IT systems and report writing -Writing security...

Howard Eldon P.
$150/hr
  • Trophy Icon Security Consulting
  • Reverse Engineering
  • Cryptography
  • Malware
  • Blockchain
  • Cryptocurrency
  • Information Security

I am a cybersecurity professional with a Master's Degree in Cyber Operations and two years of work experience in cybersecurity research and development at a world-class R&D laboratory. In that job, I gained experience in network traffic analysis, malware analysis, and cryptography. For over two years, I have worked as a freelancer, providing consulting, content development, and course creation in cybersecurity and blockchain security. I specialize in development of technical content (blogs, whitepapers, case studies, and courseware) in the field of cybersecurity. I currently hold the Certified Ethical Hacker and Certified Blockchain...

$NaN/hr

How it works

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses

How do I hire a Security Consultant on Upwork?

You can hire a Security Consultant on Upwork in four simple steps:

  • Create a job post tailored to your Security Consultant project scope. We’ll walk you through the process step by step.
  • Browse top Security Consultant talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Security Consultant profiles and interview.
  • Hire the right Security Consultant for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Security Consultant?

Rates charged by Security Consultants on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Security Consultant on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Security Consultants and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Security Consultant team you need to succeed.

Can I hire a Security Consultant within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Security Consultant proposals within 24 hours of posting a job description.

Schedule a Call