Browse Network Security job posts for project examples or post your job on Upwork for free!

Network Security Job Cost Overview

Typical total cost of Upwork Network Security projects based on completed and fixed-price jobs.

Upwork Network Security Jobs Completed Quarterly

On average, 107 Network Security projects are completed every quarter on Upwork.

107

Time to Complete Upwork Network Security Jobs

Time needed to complete a Network Security project on Upwork.

Average Network Security Freelancer Feedback Score

Network Security Upwork freelancers typically receive a client rating of 4.74.

4.74
Last updated: September 1, 2015
Clear all filters
  1. Taras Voytovych

    Taras Voytovych Agency Contractor

    Software Engineers & Consultants

    Ukraine - Portfolio: 3

    At Teamvoy we are proud of our great people that deliver best productivity and everyone has a proven track record in a tackling difficult core development projects. Our lead engineers have 10+ years of rich technical experience working with the clients towards successful product launches. With our development centre in Lviv, Ukraine we can offer a top outsourcing destination which is close in time, distance and culture. www.teamvoy.com

    Associated with: Teamvoy

    $30.00 /hr
    0 hours
    0.00
  2. Nishant Chougule

    Nishant Chougule

    Expert Penetration Tester for web applications

    United Kingdom - Tests: 1

    Experience: 1. Penetration testing on a Client’s Website and on Fedora 14 Operating System. • Performed Risk assessment, control design on operating system, database, and the web server and control implementation (Hardening of OS, Database and Web server). • Capture the Flag Situation on the client’s website provided by the university by performing a full website Penetration testing. 2. Penetration testing on Metasploitable Linux virtual machine by using Backtrack5 r3. • Performing Penetration Testing on the target and a detailed report on the PT of functions such as : o Host enumeration, Service enumeration and fingerprinting, vulnerability scanning, vulnerability exploitation, and privilege escalation. 3. Implementing Information Security Management System (ISMS) on the Client provided by the university. • Developing an ISMS Scope, ISMS Policy, implementing Risk Assessment (RA) Methodology, RA report, Risk Treatment Plan, and Security Awareness Training program. 4. Performing Web application vulnerabilities on Webgoat (vulnerable) environment. 5. Performing System security vulnerabilities on vulnerable system provided by the University. 6. Solving Cryptography and PKI challenge provided by the University.

    $7.78 /hr
    0 hours
    0.00
  3. Steven Stovall

    Steven Stovall

    DevOps, Cloud (AWS/Google), Security. Development: Rails/Python/PHP

    United States - Tests: 2

    I enjoy solving challenging problems and utilizing technology to creatively design efficient, cost-effective solutions to meet business needs. Current Certifications: CISSP, CCNP, Net+/Sec+, MCP Cloud (AWS/Rackspace), Linux, Windows, VMware HA/vMotion/vCenter Open Source Software: Apache, nginx, Redis, elasticsearch, Zabbix, Logstash Information Security Auditing, Configuration, Policy Networking: Visio Diagrams, IPSEC/SSL VPNs, OSPF/EIGRP/BGP, Adaptive Security Appliances (ASAs), Wireless Controllers, F5 LTM, WiFi (RF Design) Information Security: Visio Diagrams (architecture), PCI DSS compliance, Splunk (syslog) Vulnerability Audit and Penetration Testing: Metasploit, Nexpose, Nessus, Vulnerability Reporting, Patch Management Development: Ruby/Rails, Git, Python, PHP, Perl, PowerShell, Bash, .NET

    $67.00 /hr
    55 hours
    5.00
  4. Muhammad Imran Afzal

    Muhammad Imran Afzal

    C/C++ Developer,Device Driver,Kernel modules and Bash scripting Expert

    Pakistan - Tests: 4 - Portfolio: 1

    I have 6 years of experience in Linux development and administration. Device Drivers, Kernel Porting, Kernel Modules, Development in networking protocols, gcc/g++ and Python are my expertise. I have strong knowledge in Linux internals including kernel specifics and system calls. I have work experience with mips64 based Cavium's OCTEON multicore netwrok processors. I have worked on network protocol offloading in this. I have the ability TO DO.

    $22.22 /hr
    13 hours
    5.00
  5. Roney B.

    Roney B. Agency Contractor

    Solution Architect for mobile, web based and SAP applications

    India - Tests: 5 - Portfolio: 2

    I am a Solution Architect with entrepreneurial skills. My skill sets are around niche technology areas and I particularly expertise in solving complex solutions (technology and business) and solve bottlenecks for business. I have worked with SAP for almost 10 years and have lanscaped, designed and perfected heterogenous systems and Enterprise Application Integration. Identity Management, HANA is one more area where I excel. Allow me to serve your technology needs and boost your business. My expertise in relevance to the current technology suites run around various Java Script Frameworks, web applications, REST API, OAuth, Rails, Java/J2EE, CakePHP, etc.

    Associated with: Vertmac Technologies LLP Agency

    $70.00 /hr
    1,651 hours
    5.00
  6. Giorgi Javakhidze

    Giorgi Javakhidze

    MCITP | Vmware | Windows - Linux Systems Administrator

    Georgia - Tests: 6

    In the last 3 years, I have administered many IT networks, managing over 1000+ users. My core competency lies in complete managing of windows - linux based networks, including Active Directory, Exchange, MS-SQL, virtual clouds, based on VMware / Hyper-V and EVA Storage Area Network. I have deep experience in the following software solutions: Basic server services ( DNS, DHCP, WSUS, Vpn, etc. ) Windows 2003/2008 Server Windows 2003/2008 Active Directory Lync Server, Exchange Server, SharePoint Server. Monitoring: SCOM, Nagios Web Server: IIS, Apache Mail Servers : MDaemon, Postfix. Database: MSSQL, MySQL. Proxy / firewall solutions ( Squid, TMG, ISA ) VMware vShere and vCloud: ESXi, vCenter, vCloud Director, vShield

    $15.00 /hr
    183 hours
    5.00
  7. Mariusz Z.

    Mariusz Z.

    Penetration Tester, Linux/UNIX Security Admin,Intrusion Analyst, CISSP

    Poland - Tests: 9 - Portfolio: 1

    I'm Linux Security Administrator & Web Application Penetration Tester with 8 years of experience in the IT field. I'm CISSP (ID# 478556) and OWASP member. My expertise ranges from designing, building secure & robust systems to analysis of subtle software security flaws. I can help you with: - thoroughly security testing your web application (black-box and/or white-box tests) and helping in mitigating detected vulnerabilities - analyzing and assessing vulnerabilities in your application's underlying IT infrastructure - security hardening Linux/UNIX servers/clusters - recommending solutions and best practices on how to design and maintain secure AWS infrastructures - responding to security incident in Linux/UNIX environment, helping in recovery process (rootkit detection, malware removal, etc.)

    $19.00 /hr
    123 hours
    4.79
  8. Jay Upadhyay

    Jay Upadhyay

    Jay Upadhyay

    United Arab Emirates - Tests: 9 - Portfolio: 7

    Windows Server 2003/2008/2012, MS Exchange server 2003/2007/2010/2013, MS Lync Server 2010/2013, SCCM 2007/2012, SCOM 2007/2012, SCVMM, SCSM 2010/2012, Hyper-V, PKI, ADFS, Virtualization, Private Cloud, Office 365/DirSync/SSO, Windows Clustering/NLB.

    $27.78 /hr
    173 hours
    4.71
  9. Christopher Jinks

    Christopher Jinks

    Advanced 1st & 2nd Line systems analyst

    United Kingdom - Tests: 2

    I can provide 1st and 2nd line systems support to an outstanding standard with impeccable customer service. These include, but are not limited to; -Software -Hardware -Networking -Operating systems -Virtualisation -Thin Client -Microsoft Office packages -Password retrieval -Scripting

    $8.33 /hr
    8 hours
    5.00
  10. Jon Dajci

    Jon Dajci

    Network Engineer / Support Analyst

    United Kingdom - Tests: 2

    • Record, categorise, monitor and resolve service requests and incidents in the Service desk management software. • Provide first (to second) line support to users with fixes and work around as necessary for all ICT services. • Liaise with users and both internal and external support groups to keep users informed of the status of the incidents which they have logged and to expedite their resolution – escalating as necessary to meet service level targets. • Monitor the status of service requests within the ICT service management system and support the ICT team in meeting it Service level commitments by alerting team members and/or the IT manager when SLC’s are threatened. • Provide operations/support cover for the Network Administrator as required. Fulfil routine service requests such as new account creation. • Produce cyclical reports on service desk and incident management KPI’s and Customer service satisfaction. • Maintain user & customer awareness of ICT service availability and initiatives through communication channels such as the company intranet, users workshops etc. • Provide administrative support and development input for the change management process. • Develop and maintain suitable documentation in support of the ICT service desk and change management process and the operational procedures and resources which underpin it. • Provide field support for desktop software & hardware and first line network support. • Place orders for new ICT equipment & services. • Provide administrative support to the IT manager and the ICT team through the management and preparation of documentation relating to Purchase order, Invoices, Underlying service contracts etc. • Undertake project work as necessary in support of ICT projects or service initiatives.

    $50.00 /hr
    0 hours
    0.00