Banner Image

All Services

Other

Cybersecurity consulting

$50/hr Starting at $50

I am a CISSP certified professional working in the field of cybersecurity since 2012.  I work with businesses to prevent the hacking, theft, or damage of data, software, and hardware.

I can help implement the CIS 20 cybersecurity controls and contour your business' cybersecurity posture around the NIST Cybersecurity Framework functions:  Identify, Protect, Detect, Respond and Recover.

My professional experience includes the following sectors:  Information Technology, Telecommunications, Utility, Finance.

The CIS 20 cybersecurity controls:

  1. Inventory and Control of Hardware Assets
  2. Inventory and Control of Software Assets
  3. Continuous Vulnerability Management
  4. Controlled Use of Administrative Privileges
  5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
  6. Maintenance, Monitoring and Analysis of Audit Logs
  7. Email and Web Browser Protections
  8. Malware Defenses
  9. Limitation and Control of Network Ports, Protocols and Services
  10. Data Recovery Capabilities
  11. Secure Configuration for Network Devices, such as Firewalls, Routers and Switches
  12. Boundary Defense
  13. Data Protection
  14. Controlled Access based on the Need to Know
  15. Wireless Access Control
  16. Account Monitoring and Control
  17. Implement a Security Awareness and Training Program
  18. Application Software Security
  19. Incident Response & Management
  20. Penetration Tests and Red Team Exercises

About

$50/hr Ongoing

Download Resume

I am a CISSP certified professional working in the field of cybersecurity since 2012.  I work with businesses to prevent the hacking, theft, or damage of data, software, and hardware.

I can help implement the CIS 20 cybersecurity controls and contour your business' cybersecurity posture around the NIST Cybersecurity Framework functions:  Identify, Protect, Detect, Respond and Recover.

My professional experience includes the following sectors:  Information Technology, Telecommunications, Utility, Finance.

The CIS 20 cybersecurity controls:

  1. Inventory and Control of Hardware Assets
  2. Inventory and Control of Software Assets
  3. Continuous Vulnerability Management
  4. Controlled Use of Administrative Privileges
  5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
  6. Maintenance, Monitoring and Analysis of Audit Logs
  7. Email and Web Browser Protections
  8. Malware Defenses
  9. Limitation and Control of Network Ports, Protocols and Services
  10. Data Recovery Capabilities
  11. Secure Configuration for Network Devices, such as Firewalls, Routers and Switches
  12. Boundary Defense
  13. Data Protection
  14. Controlled Access based on the Need to Know
  15. Wireless Access Control
  16. Account Monitoring and Control
  17. Implement a Security Awareness and Training Program
  18. Application Software Security
  19. Incident Response & Management
  20. Penetration Tests and Red Team Exercises

Skills & Expertise

Computer HardwareConsultantConsultingCybersecurityInternet SecurityIT Security OperationsPowerShell

0 Reviews

This Freelancer has not received any feedback.