You will get a SOC2 Gap Analysis and Assessment

Austin S.
Austin S.

Let a pro handle the details

Buy Cybersecurity & Data Compliance Services services from Austin, priced and ready to go.

You will get a SOC2 Gap Analysis and Assessment

Austin S.
Austin S.

What's included $1,500

SOC2 Gap Analysis & Assessment

SOC 2 Gap Analysis and Assessment based on the AICPA TSC.

  • Delivery Time 5 days
    • Gap Analysis

5 days delivery — Feb 29, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Austin gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Cybersecurity & Data Compliance Services services from Austin, priced and ready to go.

Project details

- Interviews with key stakeholders to gather information about the company.
- Capture the information in the audit sheet
- Analysis of the TSC requirements and the "as is" status
- Detailed audit report with recommendation
- Audit review meeting
Cybersecurity Expertise
Audit, Risk Assessment, Gap Analysis
Technology Type
IaaS, Data Center, Database, SaaS, Web Application, PaaS
Cybersecurity Regulation
SOC 2
What's included $1,500 These options are included with the project scope.
$1,500
  • Delivery Time 5 days
    • Gap Analysis
Optional add-ons You can add these on the next page.
Fast 3 Days Delivery
+$500
Austin S.

About Austin

Austin S.
Trusted Navy Veteran | Technology and Cybersecurity Expert
Oak Park, United States - 8:17 am local time
Certified, results-driven, Information Security Engineer who has a range of experience from Security monitoring and investigation, vulnerability management, cloud security and understanding of various security compliance policies. Profound ability to effectively communicate, both orally and in writing, to various departments, agencies, and stakeholders. Identity and Access Management experience with detailed understanding of Active Directory and implementation of SSO, MFA etc with multiple frameworks. Implemented security controls while performing ongoing system maintenance to prevent, detect, analyze and respond to security incidents. Experienced and effective participant in hunt, computer network defense, real-time analysis and incident response activities, to include ability to reconstruct events from network, endpoint, and log data.

Steps for completing your project

After purchasing the project, send requirements so Austin can start the project.

Delivery time starts when Austin receives requirements from you.

Austin works on your project following the steps below.

Revisions may occur after the delivery date.

Kick off call and information collection calls

During the kick-off call, the aim is to identify the key stakeholders and discuss the project execution. Depending on the size and complexity of the company information collection calls are required to identify the "as is" status.

Gap Analysis & Assessment

Based on the collected information a gap analysis is executed to compare the SOC 2 requirements with the company's "as is" status.

Review the work, release payment, and leave feedback to Austin.