Hire the best Vulnerability Assessment Specialists in Australia
Check out Vulnerability Assessment Specialists in Australia with the skills you need for your next job.
- $50 hourly
- 5.0/5
- (45 jobs)
With a rich background spanning over 5+ years in designing and executing robust cybersecurity solutions, I am a Cybersecurity Specialist Consultant dedicated to safeguarding digital landscapes. My journey has taken me from the foundational steps of security analysis to spearheading roles as a Co-Founder and CTO, alongside pivotal positions in cybersecurity engineering and ethical hacking across global landscapes from Jakarta to Dallas, and Sydney to the Netherlands. My expertise lies in a deep understanding of cyber threats and vulnerabilities, backed by a Bachelor's degree in Cybersecurity from Deakin University and certified mastery in Blockchain Security, Advanced Penetration Testing, and Fuzzing and Crash Analysis. I've successfully led comprehensive security initiatives, including developing XDR and SIEM solutions, managing multi-layered security systems, and pioneering full-scale cybersecurity startups. My approach is rooted in innovation and efficiency, aiming to protect organizational assets against ever-evolving cyber threats with customized security strategies. At the heart of my service is a commitment to operational excellence and a proactive stance on cybersecurity, ensuring I'm always ready to counteract cyber threats swiftly. Through Encripti, my cybersecurity startup, and various contractor roles, I've honed my skills in vulnerability assessments, red/blue team engagements, and crafting defensive architectures against complex cyber attacks. My portfolio is a testament to my ability to communicate complex security concepts effectively and to collaborate towards enhancing cybersecurity resilience in dynamic environments. In seeking new opportunities on Upwork, I aim to bring my wealth of experience and a proactive approach to cybersecurity to organizations looking to fortify their defenses. Whether through strategic consulting, hands-on penetration testing, or crafting comprehensive security frameworks, my goal is to deliver unparalleled value and security assurance to my clients.Vulnerability Assessment
Blockchain SecurityAPI TestingCyber Threat IntelligenceCybersecurity MonitoringRisk AnalysisVirus RemovalWeb Application SecurityData AnalyticsSmart ContractMalware RemovalSecurity TestingApplication SecurityCybersecurity ManagementPenetration TestingDigital Forensics - $50 hourly
- 4.9/5
- (20 jobs)
Following is a summary of my skills: • ISO27001 compliance and gap analysis • IT Security Policies and Frameworks • PCI DSS Assessment level 1 & 2 for merchants and Service provider • Penetration testing • SIEM and Forensics analysis • NIST 800-53 • Risk Assessment and Treatment • Application security vulnerabilities, testing techniques, and the OWASP framework • GDPR • Vulnerability Scanning Experience: • Advise Network and system team to securely build/change Azure and AWS cloud infrastructure for existing and potential clients. • Engage with Client to understand their infrastructure requirements to build and integrate AWS API’s and services. • Maintain and improve ISMS framework that includes SOA, Risk assessment and treatment plan, Risk register and ISM forum to convey the risk to management for their review and support. • Maintain security certifications, including ISO 27001, IRAP and PCI dss. • Conducts Gap assessment as per ISM, PSPF, ISO27001, PCI, NIST and GDPR. • Monitor and assure compliance with information security and privacy regulations, including APRA CPS 234, Privacy Act and GDPR • Manage internal and external audits and remediation • Deliver training programs for security and privacy awareness • Conduct/review security risk assessments of assets and projects • Manage supply chain security • Support Sales and commercials team in responding to security questionnaires • Provides application security services including secure coding techniques and reviews, education & awareness, process and tools, security testing support and guidance for internal software development projects • Reviews information security policies, incident response plans, change management, vulnerability management, patch management policies, etc., as they apply to various facets of the infrastructure in scope. • Performs internal penetration tests, network vulnerability assessments to provide a comprehensive view of the client’s network weaknesses that are exposed to threats. Following are the certifications I have: CISSP CCSP (Cloud security) CEHVulnerability Assessment
Employee TrainingData ProtectionPCICertified Information Systems Security ProfessionalHIPAAOWASPGDPRAT&T CybersecurityNessus - $25 hourly
- 4.6/5
- (8 jobs)
I am a Cyber Security professional. I have been working over below Products & Services: SIEM (Splunk, AlienVault, LogRhythm) Cloud Services (Cloud Computing, Cloud Security) Firewall's (Sophos, Sonicwall, Palo Alto, Imperva WAF, AWS WAF, Sucuri WAF) Vulnerability Assessment (Nessus, Tenable, Acunetix and many other tools) Services I provide in SIEM Splunk & AlienVault USM: Splunk Architecture Planning and Deployments Configuration of SIEM Tool including data sources onboarding Building up Dashboards and Usecases according to the requirement or as per security prospective. Services I provide for Cloud Services: Building up Cloud Architecture Cloud Computing Cloud Networking Cloud Security Services I provide for Firewall: Building Network Architecture Firewall Configurations Firewall Hardening I possess good management and organization skills. Ability to handle multiple tasks. Having analytic and problem-solving skills. Worked upon Industries like Health care Banking Sector's Fintech's Retail We Can able to provide the best service for your organization as a professional cybersecurity. We will provide a POC Session as well. We are serving from many years and we have many clients with whom we are working and providing security services to them. >>>>>>>>>> Client satisfaction is my first priority <<<<<<<<<<Vulnerability Assessment
ElasticsearchNetwork SecurityCybersecurity ManagementPalo Alto FirewallsWeb Application FirewallWordPressUbuntuAntivirus & Security SoftwareNetwork AdministrationAmazon Web ServicesLinux System AdministrationWordPress ThemeSplunkCentOS - $15 hourly
- 5.0/5
- (13 jobs)
Chirag has spent almost 15 years in cybersecurity and worked in 10 different countries with talented cyber engineers. So, he knows the difference between a virus and a worm. Early in his career, he provided network security for Fortune 500 clients before advancing to cybersecurity, where he then spent his time learning and securing multiple clouds. His journey led him to Australia, where he worked with the government before starting his company and consulting for South Australia Health Department and a major bank. He won several prestigious awards and earned around 26 technical certifications. Currently, he is working with a team of people much smarter than him at Cybernara. You can find him geeking out on LinkedIn at Chirag’s LinkedIn. Also, don’t forget to say hi.Vulnerability Assessment
Penetration TestingInformation SecuritySplunkSecurity Operation CenterCybersecurity MonitoringCybersecurity ToolCyber Threat IntelligenceNIST Cybersecurity FrameworkSecurity Patch InstallationSecurity AnalysisCloud SecurityNetwork SecurityRisk AssessmentCybersecurity Management - $150 hourly
- 0.0/5
- (0 jobs)
I’m an IT risk assessment and cybersecurity specialist with over two decades of experience in IT management. Whether you're looking to enhance your security posture, streamline IT processes, or align IT strategy with business goals, I’m here to help. • Expertise in IT risk assessment, cybersecurity, and IT management. • Proven track record as a project manager, technical advisor, and coach for diverse global teams. • Skilled in aligning action with strategy for maximum impact. My approach is rooted in empathy and curiosity. I enjoy solving problems, removing obstacles, and creating more time for people to focus on what matters most—spending time in nature and with loved ones. Let’s connect and see how I can help you solve your cybersecurity and IT management challenges.Vulnerability Assessment
Cloud ManagementSecurity Assessment & TestingNIST Cybersecurity FrameworkIT ManagementIT ConsultationPenetration TestingCybersecurity MonitoringCybersecurity ManagementArchitectural DesignComputing & NetworkingGovernment Reporting ComplianceComputer NetworkNetwork EngineeringInformation Security - $60 hourly
- 0.0/5
- (0 jobs)
SUMMARY * More than 5.8 years of experience in Linux, Windows and Storage Administration with deep experience in SAN and NAS technology. * Hands on experience on Windows Server administration and Microsoft Active Directory. * Extensive experience on managing the servers on Vmware Vcenter, strong understanding of virtualisation technologies, Infrastructure system software. * Technically sophisticated professional with strong experience in administration and Management of Linux servers. * Hands on experience in AIX servers and Veritas cluster * Working on Incident and Request management to resolve the system issues by reaching out to the respective stakeholders. * Rich experience in handling multi-platform environments, which includes installation,configuration of servers, and providing technical support * Hands-on experience in Shell scripting.Vulnerability Assessment
Network EngineeringSystem AdministrationWindows 7 AdministrationLinux System Administration - $50 hourly
- 0.0/5
- (3 jobs)
Cybersecurity Consultant | CISSP, CRISC, CCSP | GRC | Vulnerability Management | Awareness Training I’m a Melbourne-based Cybersecurity Specialist with over 7 years of experience across vulnerability management, security awareness, penetration testing coordination, and GRC frameworks like ISO 27001, NIST, and Essential Eight. My services are designed for small to mid-sized companies that need security uplift and compliance support without hiring a full-time team. ✅ Security Awareness Programs ✅ Vulnerability Management Advisory ✅ GRC Documentation & Risk Registers ✅ Penetration Test Coordination ✅ Support with SOC2, ISO 27001, E8 compliance Let’s talk if you need a reliable, certified partner to offload your cybersecurity tasks and simplify your audits.Vulnerability Assessment
Cloud SecurityPhishing DetectionInformation Security AwarenessInformation Security AuditSecurity Policies & Procedures DocumentationRisk ManagementNIST Cybersecurity FrameworkISO 27001Government Reporting ComplianceInformation Security - $115 hourly
- 0.0/5
- (0 jobs)
Experienced Enterprise Security Architect with 10+ years securing cloud, hybrid, and enterprise environments across finance, government, and Fortune 500 clients. I specialize in Cloud Security, IAM/PAM, Security Operations (SecOps), and compliance with NIST, ISO 27001, and APRA CPS 234. I’ve led enterprise security programs at Toyota and delivered audit-ready IAM and SOC solutions at EY and NAB. My stack includes Azure Security, Microsoft Sentinel, CyberArk, SailPoint, CrowdStrike, and Cortex XDR—plus CISSP and SABSA certifications. Whether you’re building secure cloud infrastructure, uplifting your SOC, or hardening your compliance posture, I bring architecture that protects, performs, and scales. Let’s make your security operations bulletproof.Vulnerability Assessment
Cloud SecurityCertified Information Systems Security ProfessionalSailPoint PlatformGovernance, Risk & Compliance SoftwareSecurity Patch InstallationSecurity Operation CenterThreat DetectionCyberARKCyber Threat IntelligenceNIST Cybersecurity FrameworkCybersecurity ManagementUser Identity ManagementArchitectural DesignInformation Security - $50 hourly
- 0.0/5
- (0 jobs)
Professional Summary Experienced cybersecurity professional with over 17 years of expertise in Industrial Control Systems (ICS) and Operational Technology (OT) security. Adept at safeguarding critical infrastructure in the energy, oil & gas, cold logistics, and utilities sectors. I specialize in OT cybersecurity assessments, regulations, the development of master plans, and the integration of OT security information into event management (SIEM) systems. Proven track record in strengthening security operations for complex critical infrastructure environments, with a deep understanding of OT security best practices, risk management, and compliance standards. Extensive experience in OT firewall management, vulnerability assessments, and incident response to ensure the resilience of mission-critical systems against cyber threats. Strong leadership and strategic planning skills, with a focus on aligning cybersecurity initiatives with business objectives and regulatory requirements.Vulnerability Assessment
Security AnalysisSecurity InfrastructureSecurity EngineeringFirewallSystem AdministrationNetwork EngineeringComputer NetworkComputing & NetworkingGovernment Reporting ComplianceInformation Security - $70 hourly
- 4.9/5
- (8 jobs)
✅ Professional Penetration Tester ✅ 10+ years software engineering experience Security researcher acknowledged by hackerone and other bug bounty platforms for disclosing a number of vulnerabilities in various global companies. I produce professional reports as part of my deliverables, meticulously outlining every identified vulnerability, providing proofs-of-concept, and suggesting solutions to remedy found vulnerabilities. My reports consistently surpass the requirements set by compliance auditors. My primary expertise revolves around conducting black and gray box testing for live web applications and networks, whether in real-world scenarios or controlled lab environments. I possess an in-depth understanding of common attack vectors and effective mitigation techniques. I also excel in discovering undisclosed exploits, often referred to as "0days," within web and desktop applications. Although a substantial portion of my work remains confidential, I am happy to share a sample vulnerability report upon request. My service offerings encompass: Web Application Penetration Testing, aligned with OWASP TOP 10 guidelines. Network Penetration Testing. Security Hardening (Accounting for threat model and adhering to industry approved benchmarks) Code Review I utilize a variety of pentesting tools, including BurpSuite Professional, OpenVAS, Nmap, Metasploit, Responder, Mimikatz, and the Impacket Python framework.Vulnerability Assessment
Web Application SecurityPythonJavaScriptReverse EngineeringBlack Box TestingEthical HackingNetwork Penetration TestingWeb App Penetration TestingInternet SecuritySecurity TestingNetwork SecurityPenetration TestingDigital Forensics - $125 hourly
- 0.0/5
- (0 jobs)
Areas of Expertise ISO 27001 2013 (Information Security Management System) Implementation and Audit ISO 27002 Code of Practice for ISMS Information Security Risk Management (ISO 27005) Enterprise Security Architecture Network Security Threat & Vulnerability Management Business Continuity Planning & Disaster Recovery (ISO 22301 BCMS) COBIT Implementation & Assessment ISO 31000 Enterprise Risk Management Security Governance, Risk & Compliance Security Incident and Event Management Cloud Security (AWS & Azure) Web Application Security (OWASP Top 10) Supplier Risk Management Cyber Security Awareness Training Mobile Device Security API Security (OWASP Top 10)Vulnerability Assessment
Network Penetration TestingCloud SecurityInformation Security GovernanceProject Risk ManagementISO 27001Penetration TestingEncryption - $25 hourly
- 0.0/5
- (1 job)
Worried about hackers breaking into your site or leaking client data? I help startups, SaaS companies, and eCommerce sites find security flaws before attackers do — using Nessus, Burp Suite, and OWASP methods. You’ll get a fast, no-jargon security audit report with clear fixes.Vulnerability Assessment
Cybersecurity ManagementWebsite AuditRisk AssessmentOWASPPenetration TestingEthical HackingCybersecurity MonitoringNIST Cybersecurity FrameworkInformation SecurityComplianceKali LinuxNessusWebsite Security - $50 hourly
- 0.0/5
- (0 jobs)
I'm a Cybersecurity and Risk Management professional with over 10 years of industry experience, recently graduating with a Master’s in Cybersecurity from Monash University (Ranked #37 globally). My expertise lies in Governance, Risk, and Compliance (GRC), with a strong command over ISO standards including ISO 27001, ISO 22301, and ISO 31000. I help businesses strengthen their security posture, prepare for ISO certification, and implement practical, audit-ready Information Security Management Systems (ISMS). Whether it's performing risk assessments, drafting policies, or guiding organizations through compliance journeys, I bring both strategic insight and hands-on execution. Key strengths: ✅ ISO 27001 Lead Auditor | GRC Implementation | ISMS Development ✅ Cybersecurity Audits, Risk Assessments, Policy Frameworks ✅ Real-world understanding of security threats and compliance challenges ✅ Passionate mentor, translating complex concepts into actionable steps I also enjoy working with students and early professionals, offering mentorship and project support to bridge the gap between academics and real-world expectations. If you're looking for someone reliable, detail-oriented, and easy to work with, let’s connect. I'm here to make cybersecurity simple, practical, and effective for your business.Vulnerability Assessment
Business Continuity PlanningComplianceInformation SecurityISO 27001 - $20 hourly
- 0.0/5
- (0 jobs)
🌟𝐀𝐩𝐩𝐫𝐞𝐜𝐢𝐚𝐭𝐞𝐝!!🌟 👏STEX.com is grateful for your significant contribution to the information security of the project and we recommend you as an IT security professional. Please continue your useful work and do not tire of making the Internet better! - 𝐎𝐥𝐚𝐟 𝐇𝐚𝐧𝐬𝐞𝐧 - 𝐁𝐮𝐬𝐢𝐧𝐞𝐬𝐬 𝐃𝐞𝐯𝐞𝐥𝐨𝐩𝐦𝐞𝐧𝐭 𝐌𝐚𝐧𝐚𝐠𝐞𝐫 𝐨𝐧 𝐒𝐓𝐄𝐗.𝐜𝐨𝐦 ❌No organization wants its name in the next headline which is why organizations are continuously assessing enterprise exposure to threats and vulnerabilities. From comprehensive penetration testing and cloud security assessments to advanced social engineering, I am dedicated to protecting your business from evolving cyber threats. 📈What you need is a Cybersecurity Consultant and an Expert Penetration Tester who can make sure your digital assets are an unattractive target for malicious hackers. 🎯I am Syed Jan Muhammad Zaidi, an expert Penetration Tester and a Cybersecurity Consultant by Profession. As a highly skilled Penetration Tester with over four years of industry experience, I possess a unique combination of technical expertise and creativity. I am also recognized as a successful Bug Bounty Hunter and known for reporting bugs to some top-notch companies including Stex.com, GlobalSign, Sbb and more. 𝐌𝐲 𝐞𝐱𝐩𝐞𝐫𝐭𝐢𝐬𝐞 𝐢𝐧𝐜𝐥𝐮𝐝𝐞𝐬, 𝐛𝐮𝐭 𝐧𝐨𝐭 𝐥𝐢𝐦𝐢𝐭𝐞𝐝 𝐭𝐨: ✅Penetration Testing (Web, Mobile, APIs, Network etc) ✅Cloud Security Assessment (AWS,Azure,GCP) ✅Secure Code Audit ✅Social Engineering ✅Vulnerability Assessment ✅Darkweb Monitoring ✅Security Awareness Training 𝐇𝐞𝐫𝐞'𝐬 𝐦𝐲 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬 𝐚𝐧𝐝 𝐂𝐨𝐮𝐫𝐬𝐞𝐬: ✅Certified Ethical Hacker (Practical) ✅Certified Red Team Professional ✅InsightVM Certified Administrator ✅API Penetration Tester ✅Certified AppSec Practitioner ✅Penetration Testing, Incidence Response and Forensics 𝐒𝐭𝐚𝐧𝐝𝐚𝐫𝐝𝐬 𝐚𝐧𝐝 𝐅𝐫𝐚𝐦𝐞𝐰𝐨𝐫𝐤𝐬: ✅Penetration Testing Execution Standard (PTES) ✅Open Web Application Security Project Framework (OWASP) ✅Common Weakness Enumeration (CWE) ✅Common Vulnerabilities and Exposure (CVE) ✅National Institute of Standards Technology (NIST SP 800-115) ✅General Data Protection Regulation (GDPR) ✅Common Vulnerability Scoring System (CVSS) ✅MITRE ATT&CK® ✅Cloud Security Alliance (CSA) ✅Payment Card Industry Data Security Standard (PCI-DSS) ✅Health Insurance Portability and Accountability Act (HIPAA) 💪I have reported critical vulnerabilities to some of the top-notch companies in the industry including Stex, GlobalSign, Sbb and more. I have also identified 𝐂𝐕𝐄-𝟐𝟎𝟐𝟒-𝟑𝟏𝟐𝟏, a critical vulnerability that necessitates a thorough assessment and prompt remediation to mitigate potential security risks. I am confident my experience and expertise in the world of Security make me a valuable asset to any organization seeking to secure their networks and systems against potential cyber threats. 🙌𝐒𝐞𝐧𝐝 𝐦𝐞 𝐚𝐧 𝐨𝐟𝐟𝐞𝐫; 𝐥𝐞𝐭’𝐬 𝐝𝐢𝐬𝐜𝐮𝐬𝐬 𝐲𝐨𝐮𝐫 𝐫𝐞𝐪𝐮𝐢𝐫𝐞𝐦𝐞𝐧𝐭𝐬Vulnerability Assessment
HIPAANIST Cybersecurity FrameworkInformation Security AwarenessSocial Engineering AssessmentSecurity Assessment & TestingSecure SDLCComplianceNetwork SecurityApplication SecurityCloud SecurityPenetration TestingInformation Security - $100 hourly
- 0.0/5
- (0 jobs)
Security Clearances: AGSVA NV1 As a seasoned and highly skilled expert in Information Security and Technology, I bring over 20 years of comprehensive experience in Security Strategy, Compliance, Risk Management, Governance, Security Architecture, Data Privacy, Security Standards ad Frameworks, and Cloud Security. My proficiency also extends to Security Program Management, Auditing, Enterprise Security Architecture, Security Solutions Design, and Information Security Consulting & Advisory Services across multiple domains. With a wealth of experience and expertise in protecting organizations from evolving cyber threats, I have a proven track record in developing robust security strategies, implementing advanced technologies, and mitigating risks. I ensure the confidentiality, integrity, and availability of critical data, safeguarding organizations against potential breaches and vulnerabilities. My extensive background includes leading complex security projects, conducting comprehensive risk assessments, and providing strategic guidance on security governance and compliance. I specialise in areas such as data security, network security, cloud security, application security, security architecture, DevSecOps, and vulnerability management. Certified in industry-leading credentials like CISSP, CCSP, CISM, CISA, CRISP, AWS-SAA, and Open FAIR, I stay at the forefront of the rapidly changing cybersecurity landscape. Committed to continuous learning, I provide innovative solutions and services addressing organisations' unique challenges. My passion for cybersecurity extends beyond technical proficiency. I also excel in collaborating with cross-functional teams, engaging stakeholders at all levels, and effectively communicating complex security concepts to both technical and non-technical audiences. This allows me to drive a culture of security awareness and enable organisations to proactively defend against threats. If you are seeking a results-oriented cybersecurity professional with a proven ability to safeguard sensitive information and fortify digital infrastructures, let's connect. Together, we can enhance your organisation's security posture and ensure its resilience in an ever-evolving threat landscape. Expertise: • GRC Consulting/Advisory • Security Architecture Review • Security Strategy & Roadmap • Compliance and Risk Assessments • Maturity and Gap Assessments • Penetration Testing and Vulnerability Scans • Cloud Security and Architecture Assessments (AWS, Azure, GCP, IBM Cloud) • Security Standards and Frameworks (ISO27001, NIST CSF, ISM/PSPF, APRA CPS 234, GDPR) • Agile Project Management Recent Engagements: • Complex security architecture reviews at a leading AU Telco provider • Security Strategy/Roadmap for a law enforcement agency in NZ • Security architecture assessment for an ACCC Open Banking compliance project at a leading Bank • Completion of ISO27001 compliance assessments for multiple clients in different industry sectors including healthcare • Security maturity assessment based on NIST CSF for a client in the Mining sector. • Delivery of multiple ISM/PSPF compliance assessments for IRAP accreditation, including SRMP, SOA, SSP, SOD, SOPs, and IRP • Performed multiple penetration tests on web applications and networks for clients spanning various industry sectors. Recognition and Awards: • Global Excellence Award, 2022: Going above and beyond made the greatest wins to the most important clients and against the toughest competitors • Global Solution Excellence Award, 2019: Demonstrating the practice 'Put the Client First' • Managers' Choice award, 2017: Demonstrating the key Practice: Think, Prepare, Rehearse, and 'Can Do' attitude. • Manager's Choice Award 2016: Demonstrating the key Practice: Unite to Get it Done Now • Recognition Award - APAC Region, 2010: Leading and successfully completing a security and IT infrastructure upgrade project. • Recognition Award - APAC region, 2007: Exceptional achievements which demonstrate unique, extraordinary, exceptional efforts and behaviors that benefit Chevron • Top Performer Award, 2002: Top performing management team member of the organization by VP Asia Pacific region for the outstanding IT and Security projects initiated for the betterment of the company • Employee of the Year, 1998: Outstanding IT Service Delivery, Customer Care and Technical Skills that benefited the clients and the employer.Vulnerability Assessment
NIST Cybersecurity FrameworkInformation Security ConsultationGovernance, Risk & Compliance SoftwareWeb App Penetration TestingPenetration TestingInformation Security AuditSecurity AnalysisSecurity FrameworkComplianceCybersecurity ManagementSystem SecurityCloud SecurityISO 27001Risk Assessment - $100 hourly
- 0.0/5
- (0 jobs)
I am the Founder of Archer & Round, a trusted Cybersecurity and Managed Security Service Provider (MSSP), where we deliver industry-leading solutions to protect businesses from evolving cyber threats. With over 30 years of experience, my passion is centered around empowering organizations with strategic cybersecurity, including SIEM, SOC-as-a-Service, and cloud security solutions. In my recently published book, Cyber Warfare 2024: A Comprehensive Guide, I explore the complexities of modern cyber threats and provide actionable insights for businesses to secure their digital assets. I regularly speak and write about cybersecurity trends, cyber warfare, and the future of MSSP.Vulnerability Assessment
Cybersecurity ToolSecurity ManagementNetwork ArchitectureCyber Threat IntelligenceCybersecurity Management - $40 hourly
- 0.0/5
- (0 jobs)
Certified cybersecurity and cloud specialist with over six years of progressively responsible IT experience, I currently secure cloud infrastructure, endpoints, and networks for a national non-profit organization. - Technical Skills - Cloud & Infrastructure Security - Microsoft Azure administration and security best practices - Cloud infrastructure threat detection and vulnerability management - Endpoint & Network Protection - Endpoint security tools and configurations - Network security monitoring and incident response - Identity & Device Management - Microsoft 365 administration (Exchange, SharePoint, Teams) - Microsoft Intune configuration for Windows and macOS devices - Automation & Collaboration Tools - Power Platform (Power Automate workflows, Power Apps integrations) - Scripting for routine security tasks and audits - Compliance & Audit - Led PCI DSS compliance audit planning and execution - Managed COBIT-based internal IT audit processes - Certifications - CompTIA Security+ - CompTIA CySA+ (Cybersecurity Analyst) - Microsoft Certified: Azure Administrator Associate - Soft Skills -Clear and concise communicator, capable of translating technical concepts for diverse audiences -Cross-functional collaborator who balances security requirements with business needs -Proactive problem-solver with a passion for safeguarding systems while enabling innovationVulnerability Assessment
Information SecurityMicrosoft SharePoint AdministrationMicrosoft PowerAppsMicrosoft Power AutomateMicrosoft IntuneMicrosoft Azure AdministrationCybersecurity ManagementComputer NetworkComputing & NetworkingDatabase ManagementGovernment Reporting Compliance - $30 hourly
- 0.0/5
- (0 jobs)
Hey there, I am a certified ethical hacker with many years of dedication and dynamic experience and expertise in this field with many knowledge in all sorts of hacking, recovery, slamming, cloning, Detection of bots, tracking, malwares removal, Cryptocurrency, crypto money recovery and many more .. Kindly dm for a faster and success delivery without delay in process.Vulnerability Assessment
Blockchain PlatformCrypto AssetCybersecurity ManagementMalware RemovalPenetration TestingInternet SecurityNetwork DatabaseInformation SecurityFacebookInstagramData RecoveryEthical Hacking - $30 hourly
- 0.0/5
- (0 jobs)
I am a certified cybersecurity professional with more than 6 years of experience in this in accessing and providing solutions to our dear esteem clients for their request and also dome based on their preferences because client priority is what keeps me driving towards achieving the desired end. And always open to all kinds of hacking of all platforms accounts, Malware detection, Removal, Crypto Recovery, Penetration Testing, Ads restoration, Shadow Ban and other services strictly much available just a Dm away and we offer the best . ℹ️ℹ️ℹ️ℹ️ℹ️ℹ️ℹ️ℹ️ℹ️ℹ️ℹ️ ✔️Hotmail and Outlook Hacking ✔️Skype Account Hacking ✔️Telegram Account Hacking ✔️Twitter Account Hacking ✔️Track cellphone ✔️YouTube Account Hacking ✔️TIKTOK HACK ✔️Gmail Hacking ✔️Facebook Hacking ✔️WhatsApp Account/Spy ✔️Instagram Account Hacking ✔️Snapchat Account Hacking ✔️Game hacking ✔️Telegram chat Hacking ✔️Phone number Hacking/Cloning ✔️Phone Hacking/Android Hacking ✔️Website Database Hacking ✔️Computer/Laptop Hacking ✔️Cloud Bitcoin Mining ✔️SS7 attack launching ✔️Tinder account Hacking ✔️Carding and selling Carded tools ✔️Normal account Hacking like Apple account DROP A MESSAGE IF INTERESTED✉️Vulnerability Assessment
Website AuditMalware RemovalCybersecurity ManagementTroubleshootingPenetration TestingNetwork Access ControlNetwork DatabaseInformation SecurityInstagramFacebookCrypto AssetCrypto Wallet - $20 hourly
- 0.0/5
- (0 jobs)
“I’m a cybersecurity analyst/expert with vast experience in hacking and building websites for small and medium sized businesses. Whether you’re trying to win work, list your services or even create a whole online store – I can help!! I can also Scan company networks for system vulnerabilities, recovery of social media accounts, conduct cybersecurity audits, break encryption protocols on locked files, offer recommendations for improvements to cybersecurity, retrieval of information from your mobile device. I also have vast experience in HTML and CSS 3, PHP, jQuery, WordpPess, SEO. I’ll fully project manage your brief from start to finish Regular communication is really important to me, so let’s keep in touch!”Vulnerability Assessment
Blockchain, NFT & CryptocurrencySOC 2 ReportISO 27017Information RetrievalPythonCybersecurity ToolEthical HackingExpertPenetration TestingNetwork SecurityInformation SecurityKali LinuxCybersecurity ManagementSystem Security - $10 hourly
- 0.0/5
- (0 jobs)
"Experienced cyber security adept at navigating the complexities of cybersecurity with a wealth of hands-on expertise. Demonstrated proficiency in safeguarding digital assets through strategic analysis and innovative solutions."Vulnerability Assessment
GameTelegramRecovery TestingData RecoveryFacebookLinkedInDiscordCybersecurity ToolCryptocurrencyHackerRankEthical HackingCybersecurity ManagementAT&T Cybersecurity - $10 hourly
- 0.0/5
- (0 jobs)
Hello dear clients I'm Henderson a certified ethical hacker of more than 5 years well experience. I deal with ethical project like social media recovery, cryptocurrency or bank account recovery, Website recovery or bypassing and other projects deal with ethical hacking You're kindly free to message me and let me do a successful project for you I'm always available to solve any issue you have concerning ethical projectsVulnerability Assessment
Information RetrievalCryptocurrencyRecovery TestingData RecoveryLinkedInDiscordHackerRankEthical HackingCrypto Asset - $20 hourly
- 0.0/5
- (0 jobs)
📢 Get a Free Cyber Risk Assessment for Your Business 🎯 Customised Security Solutions Tailored to Your Needs 💼 Comprehensive Security Audits & Compliance Guidance ⏰ Proven Expertise with 1000+ Hours in Cybersecurity Consulting As the CEO and Founder of CyberSec Hub, I lead a consulting and managed services firm specializing in cybersecurity solutions for startups, small businesses, and mid-sized companies. My mission is to help businesses identify risks, implement effective security controls, and achieve compliance—all without unnecessary complexity or excessive costs. With extensive experience in cybersecurity across the healthcare, software, and financial industries, I have played a critical role in securing sensitive data, infrastructure, and business operations. My expertise includes implementing robust security frameworks, incident response strategies, threat mitigation, and risk management solutions tailored to industry-specific challenges. I hold multiple cybersecurity certifications, reflecting my commitment to staying ahead of emerging threats, compliance requirements, and best practices. I offer the following cybersecurity services: ✅ Risk Assessment & Security Audits – Identify vulnerabilities and assess security risks to safeguard your business. ✅ Compliance & Regulatory Consulting – Ensure compliance with industry standards (ISO 27001, NIST, PCI DSS, HIPAA, GDPR, Essential Eight). ✅ Cloud Security & Infrastructure Protection – Secure cloud applications and infrastructure against threats. ✅ Business Continuity & Disaster Recovery (BCP/DRP) – Develop and test plans to ensure business resilience. ✅ Incident Response & Threat Management – Prepare for and mitigate cyber threats with an effective response strategy. ✅ Security Awareness & Training – Educate employees on cybersecurity best practices and phishing prevention. ✅ Penetration Testing & Vulnerability Management – Identify weaknesses before attackers do. Why Choose Me? ✔️ Top Quality Results ✔️ Fast and Professional Service ✔️ On-Time Delivery I am dedicated to empowering businesses with tailored cybersecurity solutions that protect their assets, ensure compliance and foster customer trust. 📩 Let’s secure your business—message me to discuss how I can help! Kind regards, Fizza AnwarVulnerability Assessment
Security InfrastructureSecurity Assessment & TestingInformation Security GovernanceNetwork SecurityInformation Security ConsultationInformation SecurityIncident Response PlanInformation Security Audit Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.