Banner Image

Skills

  • Antivirus
  • Data Security
  • Email Security
  • Encryption
  • Engineering
  • Malware Removal
  • Management
  • Mobile Security
  • Penetration Testing
  • Proposal Writing
  • Security Testing
  • User Authentication
  • Virus Removal

Services

  • Cybersecurity Engineer

    $20/hr Starting at $25 Ongoing

    Dedicated Resource

    I am a multidisciplinary cybersecurity professional offering end-to-end security services across Cloud Security Engineering, Security Operations, Governance Risk and Compliance, and Security Engineering...

    AntivirusData SecurityEmail SecurityEncryptionEngineering

About

Cloud Security Engineer SIEM & GRC Specialist — Secure, Automate, Comply

I am a multidisciplinary Cybersecurity Engineer with hands‑on experience as an Information Security Analyst, Security Operations Analyst, and GRC practitioner. I secure cloud environments, design resilient security architectures, and automate incident detection and response so teams can focus on core business goals. My core strengths include AWS cloud hardening, IAM redesign, Microsoft Sentinel SOAR playbooks, Trend Micro VisionOne XDR tuning, threat hunting, forensic triage, and mapping controls to GDPR, HIPAA, and ISO 27001. I combine technical delivery with risk‑based governance to produce audit‑ready evidence, measurable KPIs, and non‑disruptive deployments. Certifications include AWS Security Specialty and CompTIA Security+. I work with startups and enterprise teams on one‑off audits, automation builds, and ongoing SOC tuning retainers. Message me your environment size and primary concerns for a tailored proposal and fixed‑price options

Work Terms

Scope and Deliverables
• I deliver clear, itemized scopes before starting.
• Typical deliverables: executive summary, prioritized findings, remediation roadmap, playbooks, runbooks, architecture diagrams, sanitized evidence.
Pricing and Payment
• Fixed‑price or hourly engagements available.
• 50% upfront for fixed projects over two weeks; balance on delivery.
• Monthly retainers are billed at the start of each month.
• Payments via platform escrow; additional payment methods by agreement.
Timeline and Communication
• I provide estimated delivery times in the proposal.
• Regular updates via platform messages, email, or scheduled calls.
• Typical response time is within 24 hours on business days.
Access and Requirements
• I require scoped access to relevant systems or sanitized logs; credentials handled via secure channels.
• If privileged access is needed, I recommend temporary accounts and least privilege.
Revisions and Acceptance
• Includes 1–2 rounds of revisions for deliverables; additional changes billed hourly.
• Final acceptance upon client sign‑off.
Confidentiality and Compliance
• I sign NDAs on request.
• I never share client data; screenshots and artifacts are redacted.
• I follow data protection best practices and maintain secure collaboration channels.
Cancellation and Liability
• Projects may be paused or canceled with 7 days’ notice; work completed is billed pro rata.
• I limit liability to the total project fee; I do not guarantee immunity from breaches, but deliver industry best practices.
Onboarding
• Quick scoping call or written questionnaire to confirm objectives, environment size, and compliance needs.
Ready to start; message me your environment size and priority areas for a tailored proposal and timeline.