Banner Image

All Services

Programming & Development Management / Leadership / Training

Chief Information Security Officer

$250/hr Starting at $1K

  • Security operations: Real-time analysis of immediate threats, and triage when something goes wrong
  • Cyberrisk and cyber intelligence: Keeping abreast of developing security threats, and helping the board understand potential security problems that might arise from acquisitions or other big business moves
  • Data loss and fraud prevention: Making sure internal staff doesn't misuse or steal data
  • Security architecture: Planning, buying, and rolling out security hardware and software, and making sure IT and network infrastructure is designed with best security practices in mind
  • Identity and access management: Ensuring that only authorized people have access to restricted data and systems
  • Program management: Keeping ahead of security needs by implementing programs or projects that mitigate risks—regular system patches, for instance
  • Investigations and forensics: Determining what went wrong in a breach, dealing with those responsible if they're internal, and planning to avoid repeats of the same crisis

About

$250/hr Ongoing

Download Resume

  • Security operations: Real-time analysis of immediate threats, and triage when something goes wrong
  • Cyberrisk and cyber intelligence: Keeping abreast of developing security threats, and helping the board understand potential security problems that might arise from acquisitions or other big business moves
  • Data loss and fraud prevention: Making sure internal staff doesn't misuse or steal data
  • Security architecture: Planning, buying, and rolling out security hardware and software, and making sure IT and network infrastructure is designed with best security practices in mind
  • Identity and access management: Ensuring that only authorized people have access to restricted data and systems
  • Program management: Keeping ahead of security needs by implementing programs or projects that mitigate risks—regular system patches, for instance
  • Investigations and forensics: Determining what went wrong in a breach, dealing with those responsible if they're internal, and planning to avoid repeats of the same crisis

Skills & Expertise

Agile DevelopmentAnalyticsBusiness Process ManagementComputer EngineerComputer HardwareData ManagementDesignDirectorIT Infrastructure DesignIT Project ManagementIT TrainingITILKnowledge ManagementNetworkingSecurity ConsultingSoftware ArchitectureSoftware Configuration ManagementSoftware Lifecycle ManagementStrategy DevelopmentTest Driven DevelopmentTrainingVendor ManagementWaterfall ModelWeb ManagementWorkflow Management

0 Reviews

This Freelancer has not received any feedback.