Browse Network Security job posts for project examples or post your job on Upwork for free!

Network Security Job Cost Overview

Typical total cost of Upwork Network Security projects based on completed and fixed-price jobs.

Upwork Network Security Jobs Completed Quarterly

On average, 93 Network Security projects are completed every quarter on Upwork.

93

Time to Complete Upwork Network Security Jobs

Time needed to complete a Network Security project on Upwork.

Average Network Security Freelancer Feedback Score

Network Security Upwork freelancers typically receive a client rating of 4.74.

4.74
Last updated: July 1, 2015
Clear all filters
  1. BENOUHOUD Nadir

    BENOUHOUD Nadir

    Network & Security Engineer,programmer

    Morocco - Last active: 17 days ago - Tests: 4

    Servers setup, network setup, performance optimization, troubleshooting, maintenance, automation, documentation. Any kind of hardware and software for Unix-like operating systems. Web, DB, Mail, DNS, Firewall, etc... I would like to offer you my deep knowledge of servers hardware and software, which allows me to fine-tune servers according to their roles, and my ability to anticipate and solve problems in shortest time possible. windows or Linux no problem... Over the last 5 years I have developed a lot of desktop and serverside applications using C, C++, Java, SQL, PL/SQL, MYSQL languages for small business in Morocco and france

    $22.22 /hr
    0 hours
    5.00
  2. David Martens

    David Martens

    Security and network R&D engineer

    Belgium - Last active: 08/31/2014 - Tests: 2

    Security Experience (CISSP and GPEN certified): Defense in depth, Architectural design, 802.1x network access, PKI, digital certificates, Wi-Fi security, Web and Network Penetration testing, Vulnerability assessment, Firewall configuration, OpenVPN Network Experience (CCNA certified): Specialized in designing and implementing LAN setups with focus on advanced switching and routing of IP video multicast streams. Experience with Cisco and Extreme Networks equipment. Project Management: Jira Agile General Experience: Debian Linux, Gstreamer, Multimedia streaming

    $38.89 /hr
    0 hours
    0.00
  3. Leonel matías W.

    Leonel matías W.

    Network Security Consultant/ Linux Sysadmin Senior

    Argentina - Last active: 09/16/2014 - Tests: 2

    In LinkedIn, you can see a full profile: https://ar.linkedin.com/in/leonelwainer/en Some of the given services are: Information Security Audits An assessment is conducted to identify weaknesses on the IT infrastructure of your organisation. The attacks will be carried out in a controlled environment, using the same tools, techniques and methodologies that use a black-hat hacker to compromise the security of your organisation. Some of the technologies that we manage are: - Penetration Testing - Vulnerability Assessment (VRA) - Wireless Hacking - Audit / Assessment / Assurance Virtualised Environments - Audit / Assessment / Assurance SAN / NAS Managed Security Services (MSS) Managed Security On-Site (MSO) A specialised assigned resource will work at your facilities to operate and manage security systems, assisting the client in the verification, compliance and control of existing security policies in your organisation. Managed Security Monitoring (MSM) From our SOC (Security Operation Center) will monitor, remotely operate and manage your security systems that you already have installed on your network or in cases, if posible, remotely install them. Incident Prevention and Response Services Oriented on problem solving and data / connectivity / infrastructure recovery after an incident, used to address such complex and fast-growing attacks as data theft, network attacks, internal sabotage threats. A service 24 * 7. Service implementation: This service includes the design, planning and implementation of security solutions: - Firewalls - IDS / IPS - SSL VPNs - Strong Authentication Forensic Services. When you need to know that was exactly what happened, as it was and where it originated, we appear, using the latest forensic techniques we can determine all this information and more. Staff training service. Education and training of your employees, so that they are aware of how to respond and prevent threats from a digital flood of the global world.

    $38.89 /hr
    0 hours
    0.00
  4. Awais Munawar

    Awais Munawar

    Systems & Network Engineer, Information Security Professional

    Pakistan - Last active: 28 days ago - Tests: 6

    With almost 9 years of experience in managing Systems/Network design and deployments for various enterprises and last five years focused on Information Security management and research, I have a skill set that is suitable for variety of tasks related to Open Source system (Linux flavors, BSD) configurations like LAMP (Linux, Apache, Mysql, Php) web servers, Syslogs client/server, and various open source and vendor specific Firewalls (e.g Pfsense, Smoothwall, Cisco ASA, Juniper). A part form that, I have hands on experience in Linux shell scripting, Perl, PHP and have developed various applications with client/server model. Also, as a Certified Information Systems Security Professional (CISSP) and ISO/IEC 27001 Lead Implementer, I am well established to provide consultancy on information security projects, ranging from ISMS management to designing controls for systems. Last but not least, I have skills in Penetration Testing/Vulnerability Assessments of Web application and Android applications. Well aware of OWASP and tools like Burp, Acunitex, nmap, metasploit and others included in Kali Linux flavor.

    $25.00 /hr
    7 hours
    5.00
  5. Hoang Vu NGUYEN

    Hoang Vu NGUYEN Agency Contractor

    Network Expert (Cisco CCIE RS, Security)

    France - Last active: 2 days ago - Tests: 5 - Portfolio: 1

    I am a network consultant/engineer with more than 15 years experiences and a Cisco CCIE in RS/Security, Fortinet Expert, Wireshark Expert for Network Audit. I'm working as independent network consultant/expert for some large Enterprise/ISP in France and Europe. During my years of experience as an network engineer I have developed deep active knowledge of following technologies: Routing and switching: Dynamic routing protocols (BGP, OSPF, EIGRP, RIP) L2 protocols (STP, RPVST+, MST, CDP, VTP, LLDP) WAN infrastructure (DMVPN, MPLS L2, MPLS L3, WAN optimalization) IPv6 Transition Cisco Nexus QoS Security: Firewalling (Cisco ASA, Cisco PIX, Sonicwall, Juniper SSG, Fortinet) VPN (Multi-vendor IPSec, L2L, Remote access, DMVPN) IPS ( Cisco IPS) Identity services (802.1x, TrustSec) OTN: CWDM DWDM (ADVA, Alcatel-Lucent) I'm looking for miscellaneous work in network design, implementation, and/or troubleshooting up to 30 hours/week. I am available on weekdays during US working hours and also on weekend. I offer services from planning, through implementation up to acceptance testing stages. I work only remotely (SSH/RDP/VPN/Team viewer). My goal is to solve issues at hand quickly, precisely and without any delays. For your contact, my Skype ID is VULEVY (Hoang Vu NGUYEN / FRANCE)

    Associated with: NETSOLUTION

    $49.99 /hr
    281 hours
    4.89
  6. Miguel Fagyan

    Miguel Fagyan

    Network Security

    Philippines - Last active: 29 days ago - Tests: 3

    Professional in network and security, able to do any related job from encoder to security design and architect. Looking for par time job to regular that would practice my expertise and would benefit my client or employer.

    $27.78 /hr
    0 hours
    0.00
  7. Razvan Muscalu

    Razvan Muscalu

    Information Technology and Security Expert

    Romania - Last active: 4 months ago - Tests: 8

    I enjoy investigating a multitude of subjects, for example when I was 14 I started to learn PHP, three weeks after I was programming an internal chat system for a casino in Holland. Afterwards, small web-related projects followed; when I was 16-17 I was hired as a company administrator in the fields of IT Security, Computers and Network administration/installation, CCTV surveillance, PBX administration and Access Control. At 18, I've started to research the field of reverse software engineering and subsequently developed web-crawlers/spiders as well as playing around with various programming languages. Soon after, I have found interest in the field of Ethical Hacking and developed applications regarding protocols such as POP3, SMTP, FTP and I have also conducted research on how the aforementioned protocols can be correlated in order to subdue RDP-enabled servers. To cut the story short, I have a diverse interest which spans a multitude of IT related fields.

    $13.00 /hr
    0 hours
    5.00