You will get a Privileged Access Management & SoD matrix implementation guidance

zeeshan s.
zeeshan s.

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from zeeshan, priced and ready to go.

You will get a Privileged Access Management & SoD matrix implementation guidance

zeeshan s.
zeeshan s.

Select service tier

  • Delivery Time 5 days
    • Small Company Size
5 days delivery — Jul 18, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. zeeshan gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from zeeshan, priced and ready to go.

Project details

ARCOS/ Cyber-Ark / FIM Privileged Access Management and Segregation of Duties - SoD matrix implementation guidance.


I will accept unlimited revisions until you're delighted with the outcome. Undoubtedly, client satisfaction is my topmost priority.

I am looking forward to discussing your next game-changing project with you!

Cheers!
Cybersecurity Expertise
Configuration Management, Audit, Risk Assessment
Technology Type
Computer Network, Operating System, CRM, ERP
Cybersecurity Regulation
ISO, NIST Cybersecurity Framework, SOC 2
What's included
Service Tiers Starter
$250
Standard
$400
Advanced
$600
Delivery Time 5 days 10 days 15 days
Small Company Size
-
-
Medium Company Size
-
-
Large Company Size
-
-

Frequently asked questions

zeeshan s.

About zeeshan

zeeshan s.
Zeeshan Satti, CISSP | OSCP | CISA | MCSE | CDFE | CCNP | ISO27001LA
Doha, Qatar - 8:01 am local time
A passionate Security, Network and Audit professional who always enjoys new challenges and focus on continuous process improvement, service in the community and constant acquisition of relevant, applicable skills.

About 8 years of acquaintance (Big4 experience) in managing Information Systems Security audits by way of assessing risk, determining controls, performing controls testing and thus checking for compliance;

Skill Set:

Security and Risk Management,
Assets Security,
Security Engineering,
Communication and Network Security,
Identify and access Management,
Security Operations,
Software Development Security

Penetration Testing, Incident Response, Risk Management, Malware Forensics, Vulnerability Assessment, DLP (Data Leakage Prevention), Firewalls, Implement network security, Email Security.

Hold numerous industry certifications including CISSP, OSCP, CISA, CDFE, CEHv9, CCNP R&S, CREST CSPA, CCNA, MCSE, MS, ITIL, MCITP, MCTP,MCSE cloud, eCPPT, ISO 27001 LA, CDFE, AZ900, AZ104 and CREST Certified Penetration Tester.

Steps for completing your project

After purchasing the project, send requirements so zeeshan can start the project.

Delivery time starts when zeeshan receives requirements from you.

zeeshan works on your project following the steps below.

Revisions may occur after the delivery date.

Implementation Use Cases and Requirements

Design infrastructure and connectors

Review the work, release payment, and leave feedback to zeeshan.