Browse PCI Compliance job posts for project examples or post your job on Upwork for free!

PCI Compliance Job Cost Overview

Typical total cost of Upwork PCI Compliance projects based on completed and fixed-price jobs.

Upwork PCI Compliance Jobs Completed Quarterly

On average, 1 PCI Compliance projects are completed every quarter on Upwork.

1

Time to Complete Upwork PCI Compliance Jobs

Time needed to complete a PCI Compliance project on Upwork.

Average PCI Compliance Freelancer Feedback Score

PCI Compliance Upwork freelancers typically receive a client rating of 3.76.

3.76
Last updated: September 1, 2015

Popular PCI Compliance Searches

Clear all filters
  1. Daniel Stahlnecker

    Daniel Stahlnecker

    IT Security Consultant

    United States

    Experienced with IT industry’s best practices in the security program, project, and risk management areas including NIST Special Publications, Federal Information Processing Standards, Federal Information Security Management Act, NISPOM, DITSCAP, and International Standards for Organization 27001, HIPAA, Disaster Recovery, Business Continuity, GLB, Visa CISP SEC Rules, PCI-DSS, NASD Rules, and NYSE Rules. Including extensive experience in a variety or project management methodologies (PMP BoK, Prince2, Scrum, Agile, Waterfall, etc.) Outstanding leadership and team building skills resulting in effective working relationships and top performance among staff. Extensive project management experience in turning security concepts and ideas into delivered solutions. An excellent communicator between technical and business units who can translate complex information into easily understood terms.

    $33.33 /hr
    3 hours
    0.00
  2. Francesco Ongaro

    Francesco Ongaro

    Senior Security researcher

    Italy - Tests: 6 - Portfolio: 1

    Francesco Ongaro is an Italian security expert and Hacker, living in Verona (the city of Romeo and Giulietta), specialized in Network and Web Application Penetration Tests. He performed several hundred of technical activities over the years for many of the most important and exposed costumers in the private, public infrastructure, finance, banking, insurance and media fields. His research and advisories are published on USH (www.ush.it) and he founded an independent Tiger Team under the ISGroup (www.isgroup.it) umbrella. Senior Security Researcher at ISGroup (http://www.isgroup.it/), IT Security Outsourcing company. CEO at USH (http://www.ush.it/), IT Security research team. IT/ICT Security - Vulnerability Assessment (VA) - Network Penetration Testing (NPT) - Social engineering - Web Application Penetration Testing (WAPT) - Ethical Hacking - Security engineering - White box Architecture, Application, Database and Code Review - IT Security Standards and Best practices Audit - IT Security Policy and Documentation Audit - Reverse Engineering - ISO 20000 / PCI DSS / NIST / COBIT - Information Risk Management - Disaster Recovery (DRP/BCP) - IT Audit & Compliance Management - Secure development - Project management

    $55.56 /hr
    1 hours
    0.00
  3. Steve Springett

    Steve Springett

    Application Security Professional

    United States

    Steve educates teams on the strategy and specifics of developing secure applications. He's a subject matter expert on secure software architecture, design, engineering, and risk analysis. His expertise includes static and dynamic analysis, secure design review, secure code review, requirements analysis, and negative functional testing. He is an open source advocate and is active in the OWASP community supporting several open source projects including OWASP Dependency-Check and Dependency-Track.

    $150.00 /hr
    0 hours
    0.00
  4. Arthur Duarte

    Arthur Duarte Agency Contractor

    Infrastructure and Security IT Manager

    Brazil - Tests: 1

    Experience in management of Support and Infrastructure IT Teams. 7 years experienced in Unix systems with a Sun Solaris Certified Associate certification. 4 years experienced in cloud system administration with a AWS Professional Certified 1 (administration) and 2 (security) certifications. Experience in system audits, security and PenTest compliance to the PCI-DSS certification. 7 years experienced in user support at internal, external and global levels being 3 of these years operating as manager. Experience to project network structured cabling and network segregation. 7 years experienced in automation routines using Web tools and programming languages. Fluent English with a University of Michigan Certification of Competency in English certification. Easy of communication and teamwork in both operational and manager levels.

    Associated with: DUOSHIRO

    $22.22 /hr
    0 hours
    0.00
  5. Marco Mignone

    Marco Mignone

    Network and Security Engineer

    United Kingdom

    I am a network and security engineer with above 10 years experience working in Large Enterprises environments. I have expertise in Layer 2 and Layer 3 Network design and implementation, Firewalls deployment and migrations, Network Access Control and consultancy skill for Industry and Government regulation compliance.

    $33.33 /hr
    0 hours
    0.00
  6. Mike Bailey

    PCI Compliance Consultant

    United States

    I'm an Information Security professional with 8 yrs of PCI compliance experience working with payment processors, application developers and merchants. I've worked with most major QSA firms during assessments as well as Merchants attempting to validate their compliance.

    $144.44 /hr
    0 hours
    0.00
  7. Manahil A.

    Manahil A.

    Information Security Consultant/Writer/Blogger

    Pakistan

    Hi everyone. I am an exceptional writer who is new to freelancing. I have experience writing search engine friendly product descriptions, unbiased product reviews, informative blog posts and book reviews. I also have extensive experience producing academic and research papers, and writing and editing large technical documents and management plans. I have bachelors in Computer System Engineering and work as part time information security consultant. Been in corporate sector for more than 5years as an internal auditor, risk and gap analyser and ISO-27001 compliance consultant. Due to my technical degree, I have done vulnerability analysis/Penetration Testing of infrastructure for multiple corporate firms. Been a part of literary public society for four years, I love writing. You will not be disappointed with my work. Thanks.

    $11.11 /hr
    0 hours
    0.00
  8. DhanTara Tech

    DhanTara Tech

    Information Security Professional

    India - Tests: 2

    Having 3.5+ years of experience in field of information security review, Application controls testing, IT Governance & Compliance, IT General Controls Audit, Internal Audit, IT SOX, IT Risk Assessment. Hands on experience on SAP, Oracle, Data Privacy Audit, SOX 404 assurance, ITGC, PCI DSS and ISO27001 standard review.

    $30.00 /hr
    0 hours
    0.00
  9. Rupali Dash

    Rupali Dash

    Associate security consultant

    India - Portfolio: 1

    I am a working as a security analyst in the application security as well as web security domain which includes manual and automated code review,web application vulnerability assesment(dynamic scan)penetration testing,malware analysis, advanced penetration testing. *Design and integration and support of different security solutions for various customers and installation of security frameworks for client organization. *perform exploit,vulnerability and penetration assesment that identify current and future internal and external security vulnerability. *Defines baseline security confugiration for operating system across multiple platforms. Review security logs of various devices to perform analytics and forensic methodology. *Quality assuarance to review the PCI compliance reports as per the PCI-SSC norms. *Information security consultant for compliance solutions on PCI-DSS ,PA-DSS,HIPAA,DPA,RBI PASS audit,SOX,ISO27001,and cobit. *Network vulnerability assesment (using Qualysguard ) And network audit. *Implimentation and operation knowledge of various security solutions like Arcsigh , SIEM ,Cisco IDS ,IBM -ISS ,websense ,Ftk forensics ,symatec DLP , fire eye MacAfee antivirous,Qualysguard. *Reverse engineering,static and dynamic analysis,memory analysis &offering mitigation suggestion for the reported malware. Security skills----- TOOLS:: metaspolite framework,qualysquard ,IBM APPscan,checkmarx,fortify 360,beSTROM ,IDA pro, NET Reflector,Ollydbg ,IDA- PRO ,ZAP ,Burp ,cenzic Hailstor ,web scarab ,Nexpose ,aircrack-ngsuit ,sysinternals ,HP weblnspect,acunetixwvs ,Nessus ,Rational clear Quest application security- mobile application security,flash security,fuzz testing,Basic exploit development (stack,Heap,SEH) Web service testing.

    $10.00 /hr
    0 hours
    0.00
  10. Dritan Gucaj

    Dritan Gucaj

    Windows/Linux System Administrator & Penetration Tester

    Albania

    Over 10 year of IT experience administering on daily basis complex Linux, Unix ,Windows, Vmware, Citrix environments. The last 3 years have been focused mainly on security in the financial field (PCI-DSS) acquiring skills in vulnerability scanning, Penetration Testing, Log Management, Information Security Policy Writing, Key Management, 3D Secure, EMV and Thales Payshield Hardware Security Modules (HSM) Bachelor of Science in Computer Information Systems 2005 Master of Information Systems Management 2012.

    $20.00 /hr
    0 hours
    0.00