You will get help with preparing for a Compliance Audit

4.9

Let a pro handle the details

Buy Cybersecurity & Data Compliance Services services from Austin, priced and ready to go.

You will get help with preparing for a Compliance Audit

4.9

Let a pro handle the details

Buy Cybersecurity & Data Compliance Services services from Austin, priced and ready to go.

Project details

I will help you or your organization prepare for a compliance audit or certification of some kind. My framework experience ranges from HITRUST, HIPAA, SOC2, ISO 27001, NIST SP 800-53, DoD Cybersecurity Maturity Model Certification (CMMC), and Fedramp.
Cybersecurity Expertise
Audit, Risk Assessment, Cybersecurity Awareness
Cybersecurity Regulation
GDPR, ISO, HIPAA, PCI DSS, SOC 2
What's included
Service Tiers Starter
$800
Standard
$1,600
Advanced
$5,000
Delivery Time 14 days 28 days 70 days
Compliance Plan
-
Gap Analysis
Implementation
-
-
4.9
9 reviews
100% Complete
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
Rating breakdown
Availability
5.0
Deadlines
5.0
Skills
5.0
Quality
5.0
Cooperation
4.9
Communication
4.8

jb

john b.
5.00
Dec 29, 2021
SOC Compliance Planning

SM

Scott M.
4.55
Mar 10, 2020
Bash Expert

MC

Michael C.
5.00
Feb 21, 2020
Network Security Help to prevent internet detection for Real Estate Business Austin was a phenomenal person to work with and was available at any time that I needed help. He provided great assistance for my efforts and treated my project like it was his own. He immediately understood the complexities around my requirements, provided a recommendation and then executed. I would highly recommend him!

DJ

David J.
5.00
Feb 21, 2020
InfoSec Policies for Software Startup

BB

Breck B.
5.00
Jan 20, 2020
Setup WireGuard on CentOS 7
Austin S.

About Austin

Austin S.
CISSP | Navy Veteran | Governance, Risk, and Compliance | Security
4.9  (9 reviews)
Oak Park, United States - 10:08 pm local time
Certified, results-driven, Information Security Engineer who has a range of experience from Security monitoring and investigation, vulnerability management, cloud security and understanding of various security compliance policies. Profound ability to effectively communicate, both orally and in writing, to various departments, agencies, and stakeholders. Identity and Access Management experience with detailed understanding of Active Directory and implementation of SSO, MFA etc with multiple frameworks. Implemented security controls while performing ongoing system maintenance to prevent, detect, analyze and respond to security incidents. Experienced and effective participant in hunt, computer network defense, real-time analysis and incident response activities, to include ability to reconstruct events from network, endpoint, and log data.

Steps for completing your project

After purchasing the project, send requirements so Austin can start the project.

Delivery time starts when Austin receives requirements from you.

Austin works on your project following the steps below.

Revisions may occur after the delivery date.

Client is sent questionnaire and fills the questionnaire out.

Review the work, release payment, and leave feedback to Austin.