Browse IPsec job posts for project examples or post your job on Upwork for free!

IPsec Job Cost Overview

Typical total cost of Upwork IPsec projects based on completed and fixed-price jobs.

Upwork IPsec Jobs Completed Quarterly

On average, 3 IPsec projects are completed every quarter on Upwork.

3

Time to Complete Upwork IPsec Jobs

Time needed to complete a IPsec project on Upwork.

Average IPsec Freelancer Feedback Score

IPsec Upwork freelancers typically receive a client rating of 4.17.

4.17
Last updated: July 1, 2015
Clear all filters
  1. Sudan D.

    Sudan D.

    Network Engineer : Cisco : Juniper : Fortinet :

    Nepal - Last active: 19 hours ago - Tests: 6 - Portfolio: 4

    Despite the fact I am in young age I have years of experience with computers, networking and system. I am very tenacious and autodiact technical person for Cisco and Juniper Enterprise Network. I love to dig deep into specific technical challenges. 6+ years experience in Enterprise Netwrok. # Hands On Experience # Cisco: ASR 9K, ASR 1K, Nexus 7K, Nexus 5K, 4507R+E, 3900 Series, 2900 Series, 3850 Switches, 3650 Switches, 2960X Switches, ASA 5525X, ASA 5515X, ASA 5512X Juniper: MX40, MX5, SRX 550, SRX 240, SRX 220, SRX 210, SRX 100, EX 4300, EX 4200, EX 3300, EX 2200, MAG 4610, etc. More from Other Vendors # Some Highlights # @ Defining architecture and design for Enterprise customers. @ Lead engineer on some of the big enterprise networking projects. @ Training Internal Employee and customer. Main focus on Cisco and Juniper internetworks at Campus and Enterprise customers http://np.linkedin.com/in/sudandhakal

    $30.00 /hr
    136 hours
    5.00
  2. Leonel matías W.

    Leonel matías W.

    Network Security Consultant/ Linux Sysadmin Senior

    Argentina - Last active: 09/16/2014 - Tests: 2

    In LinkedIn, you can see a full profile: https://ar.linkedin.com/in/leonelwainer/en Some of the given services are: Information Security Audits An assessment is conducted to identify weaknesses on the IT infrastructure of your organisation. The attacks will be carried out in a controlled environment, using the same tools, techniques and methodologies that use a black-hat hacker to compromise the security of your organisation. Some of the technologies that we manage are: - Penetration Testing - Vulnerability Assessment (VRA) - Wireless Hacking - Audit / Assessment / Assurance Virtualised Environments - Audit / Assessment / Assurance SAN / NAS Managed Security Services (MSS) Managed Security On-Site (MSO) A specialised assigned resource will work at your facilities to operate and manage security systems, assisting the client in the verification, compliance and control of existing security policies in your organisation. Managed Security Monitoring (MSM) From our SOC (Security Operation Center) will monitor, remotely operate and manage your security systems that you already have installed on your network or in cases, if posible, remotely install them. Incident Prevention and Response Services Oriented on problem solving and data / connectivity / infrastructure recovery after an incident, used to address such complex and fast-growing attacks as data theft, network attacks, internal sabotage threats. A service 24 * 7. Service implementation: This service includes the design, planning and implementation of security solutions: - Firewalls - IDS / IPS - SSL VPNs - Strong Authentication Forensic Services. When you need to know that was exactly what happened, as it was and where it originated, we appear, using the latest forensic techniques we can determine all this information and more. Staff training service. Education and training of your employees, so that they are aware of how to respond and prevent threats from a digital flood of the global world.

    $38.89 /hr
    0 hours
    0.00
  3. Hoang Vu NGUYEN

    Hoang Vu NGUYEN Agency Contractor

    Network Expert (Cisco CCIE RS, Security)

    France - Last active: 19 hours ago - Tests: 5 - Portfolio: 1

    I am a network consultant/engineer with more than 15 years experiences and a Cisco CCIE in RS/Security, Fortinet Expert, Wireshark Expert for Network Audit. I'm working as independent network consultant/expert for some large Enterprise/ISP in France and Europe. During my years of experience as an network engineer I have developed deep active knowledge of following technologies: Routing and switching: Dynamic routing protocols (BGP, OSPF, EIGRP, RIP) L2 protocols (STP, RPVST+, MST, CDP, VTP, LLDP) WAN infrastructure (DMVPN, MPLS L2, MPLS L3, WAN optimalization) IPv6 Transition Cisco Nexus QoS Security: Firewalling (Cisco ASA, Cisco PIX, Sonicwall, Juniper SSG, Fortinet) VPN (Multi-vendor IPSec, L2L, Remote access, DMVPN) IPS ( Cisco IPS) Identity services (802.1x, TrustSec) OTN: CWDM DWDM (ADVA, Alcatel-Lucent) I'm looking for miscellaneous work in network design, implementation, and/or troubleshooting up to 30 hours/week. I am available on weekdays during US working hours and also on weekend. I offer services from planning, through implementation up to acceptance testing stages. I work only remotely (SSH/RDP/VPN/Team viewer). My goal is to solve issues at hand quickly, precisely and without any delays. For your contact, my Skype ID is VULEVY (Hoang Vu NGUYEN / FRANCE)

    Associated with: NETSOLUTION

    $49.99 /hr
    281 hours
    4.89
  4. Sergii Shevchenko

    Sergii Shevchenko

    Senior Unix System Administrator

    Ukraine - Last active: 1 month ago - Tests: 1

    Good knowledge of Unix (Centos/Freebsd/Debian) Setup and maintain: web(frontend/backend): nginx, apache, php, perl, python database: MySQL, memcached mail: exim network: IPSEC, carp, openvpn backup: bacula writing scripts: perl, bash monitoring: zabbix, cacti others: dns, dhcp, squid, samba, svn Over 5 years worked in development company. Maintained park over 100 servers

    $11.11 /hr
    46 hours
    0.00
  5. Stamatis Kekes

    Stamatis Kekes

    Senior system administrator and PHP - C - Perl developer

    Greece - Last active: 3 days ago - Tests: 11 - Portfolio: 2

    Very skilled Unix system administrator, with lot of experience in Linux ( Centos, Redhat, Fedora, Ubuntu, Debian, Gentoo, Slackware ), Solaris, xBSD ( FreeBSD, OpenBSD), vpn ( openswan - ipsec, openvpn, l2tp, pptp ), clustering ( LInux Virtual Server, Linux HA, vrrp, Solaris Cluster ), cloud computing, load balancing ( f5, haproxy ), VoIP ( asterisk ), databases ( MySQL, PostgreSQL), LDAP, web services ( Apache, Nginx, varnish ), security ( penetration testing, firewall policy design ), control panels ( CPanel, Plesk, Virtualmin, Ensim ), Virtualization ( VMWare Virtual infrastructure - VSphere, amazon EC2 ). As for Developing I am very experienced in C, PHP, Perl, javascript, ajax and many more to list.

    $16.67 /hr
    1,739 hours
    4.64
  6. Mladen A.

    Mladen A.

    Networking engineer

    Slovenia - Last active: 19 hours ago - Tests: 4

    10-year experience in following areas:TCP/IP, MPLS networking, Linux networking Certificates: Cisco Systems CCNA/CCNP, Telco Systems certified engineer, EdgeCore certified engineer Expertize in following products and technologies: Cisco IOS/XR based routers and switches, Juniper Junos MX-series, Telco Systems, EdgeCore switches, Mikrotik, Linux networking, Perl scripts

    $15.00 /hr
    14 hours
    0.00
  7. Francesco Ongaro

    Francesco Ongaro

    Senior Security researcher

    Italy - Last active: 4 months ago - Tests: 6 - Portfolio: 1

    Francesco Ongaro is an Italian security expert and Hacker, living in Verona (the city of Romeo and Giulietta), specialized in Network and Web Application Penetration Tests. He performed several hundred of technical activities over the years for many of the most important and exposed costumers in the private, public infrastructure, finance, banking, insurance and media fields. His research and advisories are published on USH (www.ush.it) and he founded an independent Tiger Team under the ISGroup (www.isgroup.it) umbrella. Senior Security Researcher at ISGroup (http://www.isgroup.it/), IT Security Outsourcing company. CEO at USH (http://www.ush.it/), IT Security research team. IT/ICT Security - Vulnerability Assessment (VA) - Network Penetration Testing (NPT) - Social engineering - Web Application Penetration Testing (WAPT) - Ethical Hacking - Security engineering - White box Architecture, Application, Database and Code Review - IT Security Standards and Best practices Audit - IT Security Policy and Documentation Audit - Reverse Engineering - ISO 20000 / PCI DSS / NIST / COBIT - Information Risk Management - Disaster Recovery (DRP/BCP) - IT Audit & Compliance Management - Secure development - Project management

    $55.56 /hr
    1 hours
    0.00
  8. Andrew Osipov

    Andrew Osipov

    information security expert/system administrator

    Thailand - Last active: 19 hours ago - Tests: 8

    Security-driven information security Architect/Professional with expertise in directing all aspects of highly technical multimillion dollar projects. With more than 7 years of expertise in a secure system implementation my skills oriented to accomplish tasks with the best security practices and rules. I am effective in defining breakthrough technology options based on organizational standards, security policy and strategic needs of the organization. 1. OS Administration: - Unix-like expert - RedHat/CentOS/Fedora; Debian/Ubuntu; Linux embedded etc. Linux security: fw, ids, integrity, encryption, SElinux etc; security hardening according best practices; software and tools, needed for enumeration, penetration testing and monitoring of corporate security regulations. Experienced in troubleshooting. - MS Windows expert - XP,7,8,Server 2003/2008/2012 - AD DS, AD CS, APP server, IIS, DNS, DHCP, Terminal Services, Print Services, File Services, Hyper-V. Windows security and performance. Experienced in troubleshooting. 2. Database administration: - Oracle 11g, MySQL, MS SQL. Good knowledge of SQL. 3. Cloud Infrastructure: - VMware Vsphere, ESX, ESXi; Rackspace, Amazon AWS expert. - Knowledge of servers hardware and desktops. 4. Information security software and hardware: - StoneGate FW/VPN, StoneGate IPS, StoneGate VPN/SSL. - Checkpoint FW/VPN, Checkpoint IDS/IPS. - Imperva WAF, Imperva DBS. - Websense WSG, Websense WES (Email Security). - Bluecoat SG+AV. - Symantec EP, Mcafee ePolicy, Kaspersky and others. - Cisco switches and routers (CCNA+p level). - Vyatta FW/VPN. - Splunk Enterprise, OSSEC, Nagios, MRTG, device lock and etc 5. Programming: - Python, Bash shell scripting, PHP. Windows batch scripting. Good knowledge of regular expressions. 6. PenTest ing (penetration testing, vulnerability assessment) and diagnosis. - knowledge and practical experience in vulnerability/misconfiguration assessments of network devices and server setups. Experienced with many audit and vulnerability scanners. Network and security troubleshooting. Manual assessments and code review. Static code analysis. - OWASP TOP 10 testing. Secure SDLC. 7. Standards: ISO/IEC 2700x, HIPAA, PCI DSS. CIS, SANS best practices. 8. Others: - MS Office (including MS Visio and MS Project). - Different CRMs, CMSs, helpdesk systems (Wordpress, Drupal, Jira, etc) Good knowledge in the areas: cloud security and system hardening; network and security design; data leakage and covert channels prevention; secure systems development life-cycle, business continuity; risk assessment; social engineering; ddos and malware disease mitigation; spam and AV protection. Extensive experience in project implementation. Experience in scheduling, setting goals and objectives in the shortest possible time. Record keeping. Tags, skills,technologies, services: linux, redhat, suse linux, debian, ubuntu, android, fedora, windows 8, windows 7, windows server 2003, windows server 2003 R2, windows server 2008, windows server 2008 R2, windows server 2012, windows server 2012 R2, active directory, group policy, terminal services, print services, certification authority, dns server, wins server, dhcp server, firewall, iptables, openvpn, strongswan, ipsec, ike, ikev1, ikev2, security association, network address translation, routing, cisco, cisco 2960, cisco 3750, crontab, aide, selinux, ossec, ids, ips, hids, intrusion detection system, intrusion prevention system, snort, nmap, vulnerability assessment, vulnerability scanning, penetration testing, pentesting, penetration test, owasp scanning, owasp assessment, secure SDLC, IIS, network file system, raid, hyper-v, mysql, postgre sql, VMware Vsphere, vmware esx, vshield, vmotion, rackspace, linode, godaddy, hetzner, burstnet, bluehost, leaseweb, aws, amazon web services, amazon ec2, amazon ebs, amazon rds, amazon vpc, amazon s3, amazon glacier, amazon route53, amazon elb, amazon elastic load balancer, amazon cloudwatch, amazon auto scaling, amazon workspaces, amazon efs, amazon cloudfront, amazon elastic file system, amazon cloudtrail, amazon iam, amazon directory service, amazon trusted advisor, amazon sqs, amazon ses, amazon sns, stonegate, stonesoft, checkpoint, imperva, websense, bluecoat, symantec endpoint protection, mcafee, mcafee epolicy, Vyatta firewall, vyatta vpn, Kaspersky, splunk, nagios, MRTG, bash shell scripting, ssl, tls, apache, haproxy, nginx, compliance, pci dss, saq d, saq d v3, cpanel, whmcs, whm, migration, replication, rsync, tcpdump, wireshark, stp, rstp, eigrp, ospf, nmap, kali linux, white hacking, backtrack, metasploit, whitehat, ethical hacking, certification, ceh, ccna, ccnp, oscp, security hardening, cis, sans, CISSP, google cloud, microsoft azure, google compute engine, l2tp, pptp, sstp, softether offensive security, owasp, burpsuite, sqlmap, static code analysis, code review, network planning, dmz, failover, load balancing, clustering, ddos mitigation, backup, data restore, monitoring, antivirus.

    $29.63 /hr
    1,484 hours
    4.65