You will get a SOC2 Gap Analysis and Assessment

4.9

Let a pro handle the details

Buy Cybersecurity & Data Compliance Services services from Austin, priced and ready to go.

You will get a SOC2 Gap Analysis and Assessment

4.9

Let a pro handle the details

Buy Cybersecurity & Data Compliance Services services from Austin, priced and ready to go.

Project details

- Interviews with key stakeholders to gather information about the company.
- Capture the information in the audit sheet
- Analysis of the TSC requirements and the "as is" status
- Detailed audit report with recommendation
- Audit review meeting
Cybersecurity Expertise
Audit, Risk Assessment, Gap Analysis
Technology Type
IaaS, Data Center, Database, SaaS, Web Application, PaaS
Cybersecurity Regulation
SOC 2

What's included $1,500

These options are included with the project scope.

$1,500
  • Delivery Time 5 days
    • Gap Analysis
Optional add-ons You can add these on the next page.
Fast 3 Days Delivery
+$500
4.9
9 reviews
100% Complete
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
Rating breakdown
Availability
5.0
Deadlines
5.0
Skills
5.0
Quality
5.0
Cooperation
4.9
Communication
4.8

jb

john b.
5.00
Dec 29, 2021
SOC Compliance Planning

SM

Scott M.
4.55
Mar 10, 2020
Bash Expert

MC

Michael C.
5.00
Feb 21, 2020
Network Security Help to prevent internet detection for Real Estate Business Austin was a phenomenal person to work with and was available at any time that I needed help. He provided great assistance for my efforts and treated my project like it was his own. He immediately understood the complexities around my requirements, provided a recommendation and then executed. I would highly recommend him!

DJ

David J.
5.00
Feb 21, 2020
InfoSec Policies for Software Startup

BB

Breck B.
5.00
Jan 20, 2020
Setup WireGuard on CentOS 7
Austin S.

About Austin

Austin S.
CISSP | Navy Veteran | Governance, Risk, and Compliance | Security
4.9  (9 reviews)
Oak Park, United States - 12:01 am local time
Certified, results-driven, Information Security Engineer who has a range of experience from Security monitoring and investigation, vulnerability management, cloud security and understanding of various security compliance policies. Profound ability to effectively communicate, both orally and in writing, to various departments, agencies, and stakeholders. Identity and Access Management experience with detailed understanding of Active Directory and implementation of SSO, MFA etc with multiple frameworks. Implemented security controls while performing ongoing system maintenance to prevent, detect, analyze and respond to security incidents. Experienced and effective participant in hunt, computer network defense, real-time analysis and incident response activities, to include ability to reconstruct events from network, endpoint, and log data.

Steps for completing your project

After purchasing the project, send requirements so Austin can start the project.

Delivery time starts when Austin receives requirements from you.

Austin works on your project following the steps below.

Revisions may occur after the delivery date.

Kick off call and information collection calls

During the kick-off call, the aim is to identify the key stakeholders and discuss the project execution. Depending on the size and complexity of the company information collection calls are required to identify the "as is" status.

Gap Analysis & Assessment

Based on the collected information a gap analysis is executed to compare the SOC 2 requirements with the company's "as is" status.

Review the work, release payment, and leave feedback to Austin.