You will get a security audit of your endpoints, network, and Internet resources

Jared W.
Jared W.
4.7
Top Rated
Play video

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Jared, priced and ready to go.

You will get a security audit of your endpoints, network, and Internet resources

Jared W.
Jared W.
4.7
Top Rated

Select service tier

Small Business Audit

Audit and report on device, network, and Internet resources up to 100 sources

  • Delivery Time 30 days
    • Small Company Size
    • Medium Company Size
    • Large Company Size
30 days delivery — Oct 27, 2023
Revisions may occur after this date.
Upwork Payment Protection

Fund the project upfront. Jared gets paid once you are satisfied with the work.

Play video

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Jared, priced and ready to go.

Project details

Every business needs to know what issues exist, in order to protect against them. A third-party security audit will detail issues discovered by an independent assessor to detail issues that may not have been disclosed by internal findings. A detailed report, remediation recommendations, and an open discussion between customer and assessor to explain findings and methods used to discover them.

My resume available upon request.
 
Cybersecurity Expertise Configuration Management, Audit, Risk Assessment
Technology Type Firewall, IaaS, Computer Network, Data Center, Operating System, SaaS, Web Application, CRM, Email System, ERP, PaaS
Cybersecurity Regulation HIPAA, HITECH, NIST Cybersecurity Framework, PCI DSS, SOC 2
What's included
Service Tiers
Starter
$1,500
Standard
$6,000
Advanced
$10,000
Delivery Time
30 days
30 days
29 days
Small Company Size
Medium Company Size
Large Company Size
4.7
8 reviews
88% Complete
4 stars
1% Complete
(0)
13% Complete
2 stars
1% Complete
(0)
1 star
1% Complete
(0)
Rating breakdown
Availability
4.8
Deadlines
4.5
Skills
5.0
Quality
5.0
Cooperation
4.5
Communication
4.5

TH

Tracy H.
5.00
Aug 5, 2023
You will get a complete Microsoft 365 Security Audit It was great working with Jared again! He offers a wealth of knowledge and advice, and he patiently answers all of my questions. I really like how he customizes his services to address my small business's specific issues. Thanks again!  

SM

Sus M.
5.00
Jul 11, 2023
website security updates and WP Jared was very responsive and professional in helping me with this job. It didn't require much time but he was very efficient in completing it and explaining all the technical aspects of it to me.  

MD

Michael D.
2.90
Oct 29, 2022
CTO, CIO who knows something about the security landscape at the enterprise level, larger scale Jared did great work but watch out for him. I had a patent pending invention and when asked to sign an NDA he swore he would but never signed it and that is the mark of an evasive person who is looking to take my ideas and run them as I did share the content of my invention enough were he could run with it. Watch out!!!!  

TH

Tracy H.
5.00
Oct 13, 2022
You will get a complete Microsoft 365 Security Audit Working with Jared was great! He patiently explained everything, helped me adjust my security settings, and answered all my questions. He's very knowledgeable and I highly recommend!  

YM

Yona Marionne M.
5.00
Sep 28, 2022
Need Assistance with DNS and Domain Issues Jared understood the urgency of the situation and helped us handle the issue promptly and professionally. It was an excellent and smooth experience working with Jared. Thank you!  

About Jared

Jared W.
Cyber Security Expert
Cyber Security Expert
100% Job Success
Lenoir City, United States - 5:08 am local time
Working to make cyber easier and more accessible for everyone. Experienced in communicating the technical aspects of IT and cyber security to all levels of users and management.  

Steps for completing your project

After purchasing the project, send requirements so Jared can start the project.

Delivery time starts when Jared receives requirements from you.

Jared works on your project following the steps below.

Revisions may occur after the delivery date.

Identify resources

Initial discovery and discussion with customer to determine which assets are in scope for this engagement.

Review configurations

Detailed review of configurations, software versions, and vulnerability scanning to document issues discovered.

Review the work, release payment, and leave feedback to Jared.