Delhi, Delhi, India
$40/hr · Starting at $200
I have 6+ Years of dedicated experience in the field of Information/Network Security. Currently working in Cyber Intelligence Center of a US based client as Security Researcher. Here leading a team of…
Pharr, Texas, United States
$25/hr · Starting at $25
• Conduct training on security officers of current company • Oversee night operations of contracts at different locations • Cover and enforce state, local laws, and policies governing the security com…
Cairo, Al Qahirah, Egypt
$50/hr · Starting at $50
I'm a network security engineer who has over than 4 years of experience of security field including : - Configuration of F5 (LTM, ASM, APM) Hardware Appliances & Virtual Editions. - Configuration of…
Hyderabad, Telangana, India
Having around 4.5 years of Strong Expertise in SAP Security and Authorization area having experience in GRC, roles and authorization, Emergency Access Management (Firefighter) , Access Risk Analysis a…
$50/hr · Starting at $300
I have two years of consulting experience in the cyber security domain, with specific technical expertise in the following areas of cyber security: • Web Application Assessment: • Secure Code Review…
Mumbai, Maharashtra, India
$50/hr · Starting at $40
? IT Risk Management (GRC), analysis of Risk, Security Controls ? ISO 27001, PCI-DSS, SOX standards & Security implementation projects. ? Implemented Security Governance practice and inserted effort
Mobile, Alabama, United States
$5/hr · Starting at $25
I am a certified peace officer with many years experience. I have worked both at state and municipal levels and have training in various areas. I also have knowledge and experience in maritime securit…
Little Rock, Arkansas, United States
$45/hr · Starting at $360
Plan and implement a secure network infrastructure that is customized to meet your budget and policy needs.
South Jakarta, Jakarta Raya, Indonesia
$10/hr · Starting at $30
For those who wanted an in depth security review in all areas in Indonesia, including security Review of the hotels for people who wanted to visit our lovely country.
Secunderabad, Telangana, India
Spangle technologies has established itself as Premier IT service provider for Data Management, Data availability & Data security. Our focus area to ensure data availability & data security for our cl…
Esenyurt, Istanbul, Turkey
As someone with an extensive technical background in Network Security, Integration of video conferencing systems and project management, I can make things happen against all the odds.
Nakuru, Nakuru, Kenya
Development of risk-based information security strategies, systems and processes Profile management of all system users while ensuring enterprise-level responsibility and control for all information s…
N.N.Kandigai, Tamil Nadu, India
$1,200/hr · Starting at $25,000
describe your work here minimum 100 words describe your work here minimum 100 words describe your work here minimum 100 words describe your work here minimum 100 words
Montreal, Quebec, Canada
$80/hr · Starting at $50
- IT Consulting - Network and Internet Security Consulting - Virtual IT - Internet Support Professional
Haag, Niederosterreich, Austria
$15/hr · Starting at $30
IT Security, Debian enthusiast, Webhosting, GNU/Linux friend, focus lvl over 9000 during hacking sessions.
Mombasa, Coast, Kenya
$10/hr · Starting at $50
I am an expert in cyber security. I make the cyber very much secure and deal with threats like petya and wannacry cripple. I prevent unauthorized access to data centre
Hagerstown, Maryland, United States
$35/hr · Starting at $280
Information Security technical writing, and editing, to include software documentation, and information security policies.
Routing, Switching, Security and Wireless experience. 5 years of experience IBM Egypt Engineer CCNA, CCNP JNCIA, JNCIS PCNSE7
Houston, Texas, United States
$50/hr · Starting at $25
Well versed in many aspects of IT, dedicated, and honest.
Salem, Virginia, United States
Past Earnings
$60/hr · Starting at $25
I can help secure your WordPress sites by hardening many of the common entry points and vulnerabilities.