Banner Image

All Services

Programming & Development information security

Information Security Services

$15/hr Starting at $100

  • Information Security Audits – Conducting IT and ISMS audits as per ISO 27001, RBI, and CERT-In guidelines.

  • Risk Assessment & Gap Analysis – Identifying vulnerabilities, compliance gaps, and recommending mitigation measures.

  • Policy & Procedure Development – Drafting and reviewing IT Security Policies, Cybersecurity Frameworks, and SOPs.

  • Regulatory Compliance Advisory – Ensuring adherence to RBI, MeitY, NPCI, SEBI, and CERT-In regulations.

  • Third-Party Risk Management – Assessing vendor systems and data security practices.

  • Network Security Design – Reviewing and securing network, firewall, and segmentation architecture.

  • Application Security Review – Assessing web and mobile applications for OWASP Top 10 and other vulnerabilities.

  • Endpoint & Server Hardening – Implementing configuration baselines and security controls.

  • Cloud Security Assessment – Reviewing cloud environments (AWS, Azure, GCP) for misconfigurations and data security.

  • Data Protection & Encryption Strategy – Ensuring confidentiality and integrity of critical data assets.

  • Vulnerability Assessment & Penetration Testing (VAPT) – Periodic scanning and exploitation testing of internal/external systems.

  • Red Team & Blue Team Exercises – Simulating real-world cyberattacks and testing detection/response capabilities.

  • Threat Modeling & Risk Profiling – Prioritizing cyber threats and mapping them to business impact.

  • Business Continuity & Disaster Recovery (BCDR) – Reviewing or designing DR plans and conducting mock drills.

About

$15/hr Ongoing

Download Resume

  • Information Security Audits – Conducting IT and ISMS audits as per ISO 27001, RBI, and CERT-In guidelines.

  • Risk Assessment & Gap Analysis – Identifying vulnerabilities, compliance gaps, and recommending mitigation measures.

  • Policy & Procedure Development – Drafting and reviewing IT Security Policies, Cybersecurity Frameworks, and SOPs.

  • Regulatory Compliance Advisory – Ensuring adherence to RBI, MeitY, NPCI, SEBI, and CERT-In regulations.

  • Third-Party Risk Management – Assessing vendor systems and data security practices.

  • Network Security Design – Reviewing and securing network, firewall, and segmentation architecture.

  • Application Security Review – Assessing web and mobile applications for OWASP Top 10 and other vulnerabilities.

  • Endpoint & Server Hardening – Implementing configuration baselines and security controls.

  • Cloud Security Assessment – Reviewing cloud environments (AWS, Azure, GCP) for misconfigurations and data security.

  • Data Protection & Encryption Strategy – Ensuring confidentiality and integrity of critical data assets.

  • Vulnerability Assessment & Penetration Testing (VAPT) – Periodic scanning and exploitation testing of internal/external systems.

  • Red Team & Blue Team Exercises – Simulating real-world cyberattacks and testing detection/response capabilities.

  • Threat Modeling & Risk Profiling – Prioritizing cyber threats and mapping them to business impact.

  • Business Continuity & Disaster Recovery (BCDR) – Reviewing or designing DR plans and conducting mock drills.

Skills & Expertise

Data SecurityEthical HackingMobile SecurityPenetration TestingSecurity Testing

0 Reviews

This Freelancer has not received any feedback.