Certified Information Systems Security Professionals Untuk Diupah
Menunjukkan 9 hasil
Freelancers Ditaja
-
Hi, I’m Top 1% freelancer committed to keeping your digital world safe, secure, and unstoppable. With years of hands-on experience as a Cyber Security Analyst and SOC Analyst, you get tailored solutions that transform vulnerabilities into strengths and risks into confidence. From penetration testing and vulnerability...Hi, I’m Top 1% freelancer committed to keeping your digital world safe, secure, and unstoppable. With years of hands-on experience as a Cyber Security Analyst and SOC Analyst, you get tailored solutions that transform vulnerabilities into strengths and risks into confidence. From penetration testing and vulnerability assessments to threat intelligence, malware analysis, and incident response, I deliver cyber solutions that help businesses thrive without disruption. I don’t just apply generic fixes I design tailored security strategies that protect critical data and future-proof systems against evolving threats. With a background in ethical hacking, digital forensics, and compliance (ISO 27001, NIST, CIS, HIPAA), I cover the full spectrum of cyber defense. Whether it’s risk assessments, SOC monitoring, or advanced defense deployments, my approach is proactive, precise, and focused on long-term resilience. Why Choose Me? ✅ Elite Expertise: Cyber Security, SOC Analysis, Ethical Hacking, Linux Hardening & Forensics ✅ Battle-Tested Skills: Proven results in penetration testing, incident response, malware analysis, and SOC operations ✅ Cutting-Edge Tools: Kali Linux, Nessus, Metasploit, Burp Suite, Wireshark, Shodan, Maltego, EnCase, FTK, SIEM (Splunk, QRadar, Wazuh) ✅ 24/7 Availability: Cyber threats don’t sleep — and neither do I when it comes to real-time response ✅ Proven Results: Secured clients in finance, healthcare (HIPAA compliance), government, e-commerce, and enterprise sectors 🔧 My Specialized Services 🛡 Penetration Testing & Vulnerability Assessments (OWASP Top 10, ISO 27001, HIPAA, CASA Tier 2) 🕵️ Threat Intelligence & Dark Web Recon (Shodan, Maltego, TOR-based cyber investigations) 🔬 Incident Response & Forensic Support (FTK, EnCase – breach investigation, malware analysis) 📊 Risk Assessment & Threat Modelling (STRIDE, DREAD, MITRE ATT&CK, OWASP Threat Dragon) 🔒 SOC Monitoring & Network Security (SIEM, Firewalls, IDS/IPS, Endpoint Security, Compliance) ⚡ Advanced Security Testing & Problem Solving: - SIEM Tools: Wazuh, QRadar, Splunk - Testing: Black Box, Gray Box, White Box - Cloud & Compliance: NIST, CIS, HIPAA - Application Security: DAST, SAST, OWASP Top 10 - Vulnerability Scanners: Acunetix, Invicti, OWASP ZAP, Nessus, MSF (Metasploit) - Manual Testing & Tailored Problem Solving 🏆 What You Get Working With Me ⚡ Lightning-fast 24-hour response time ⏱️ 💬 Clear & transparent communication – no jargon, just results 🛡 Custom cyber defense strategies that go beyond compliance and deliver real-world protection 🔥 Whether you face complex challenges, tight deadlines, or ambitious goals, your success will be secured every step of the way. 👉 Together, we’ll turn complexity into simplicity and goals into results. kurang
Upah RomanSattar
-
My Name is Malaika Shahzadi. I am working as Data Scientist as well as programmer. I have vast working experience as Data Analyst, Model Building using -> Python, Python Data Analysis & Visualization, Proficient in using libraries such as Pandas, NumPy, Matplotlib, Seaborn, and Plotly to analyze large datasets and...My Name is Malaika Shahzadi. I am working as Data Scientist as well as programmer. I have vast working experience as Data Analyst, Model Building using -> Python, Python Data Analysis & Visualization, Proficient in using libraries such as Pandas, NumPy, Matplotlib, Seaborn, and Plotly to analyze large datasets and create insightful visualizations, Expertise in building and deploying machine learning models using Scikit-learn, TensorFlow, and Keras, Strong background in statistical methods and their application to real-world problems, Skilled in cleaning, transforming, and organizing raw data for accurate analysis and modeling, Model training and Testing, Model Designing and Development, Implementation of research paper model, and publication. -> R, R-Studio, R-Libraries, R Visualization, R Analytics, R, Model training and testing in R, R-Shiny, Algorithm Design and Development in R, R Machine and Deep learning, R-Dashboard, Hadoop, -> SPSS, SPSS AMOS, SPSS Modular, SPSS SEM Model, SPSS Visualization, SPSS Analysis, -> SAS, SAS Enterprise, SAS Studio, SAS Viya, SAS Miner, SAS Analytics, SAS Notebook -> Excel, Excel VBA, Excel VBA Macro, Excel Formula, Excel Advance Formula, Excel Automation, Excel Dashboard, Excel Integration, Excel Scrapping, Excel API, Excel Cryptocurrencies, Excel Economic Model, Excel Forecasting, Excel Economic Order Quantity, Excel Accounts, Excel Financial Models, Excel Balance Sheets, Excel Word, Excel Income Statement, Excel Discounted Cashflow, Excel Market Analysis, Excel Statistical Analysis. -> STATA, POWER BI, KNIME, TABLEAU, MINITAB, VISIO, PROWER POINT, PROJECT, MS PROJECT, PROJECT MANAGEMENT, Dashboard, Visualization, Analysis -> CISCO, Networking, Router Configuration, Virtual Machine, Linux, Unix, Ubuntu, MacOS, Operating System, CCNA, CCNP, -> I have worked as Research Assistant and I can do - Write up Synopsis, - Analysis Report - Data Analysis Report - Project Report - Research Project - Final Project - Thesis, Publication including IEEE, Springer, Elsevier and other Journals - can remove, AI, Plagrism, and also can write unique Research Paper for Master, PhD - Can Write PhD Research papers with publishing Material including Survey Paper, Review Paper, and Implementation Analysis Paper kurang
Upah malaikamb2001
-
Helping organizations secure their cloud infrastructure and optimize their multi-cloud strategies. I provide end-to-end cloud security services from comprehensive audits to hands-on implementation across AWS, Microsoft Azure, and Google Cloud Platform.Helping organizations secure their cloud infrastructure and optimize their multi-cloud strategies. I provide end-to-end cloud security services from comprehensive audits to hands-on implementation across AWS, Microsoft Azure, and Google Cloud Platform. kurang
Upah ss4net2
-
freelanceralig freelanceralig
$20 USD / jam
Book Writer | Fiction & Non-Fiction | SEO ContentUnited StatesFor over 25 years, I’ve been on a journey of transformation, guiding both organizations and individuals to reach their highest potential. It all began in the dynamic world of Sales & Business Development, where I learned to navigate the complexities of full-cycle sales strategies. From the art of the perfect pitch to...For over 25 years, I’ve been on a journey of transformation, guiding both organizations and individuals to reach their highest potential. It all began in the dynamic world of Sales & Business Development, where I learned to navigate the complexities of full-cycle sales strategies. From the art of the perfect pitch to the intricacies of risk management, I mastered the skills needed to drive success. My love for storytelling naturally led me into the realm of writing. I've authored fiction and non-fiction books that bring stories to life, and I've mastered the craft of SEO-optimized blogs, engaging articles, and persuasive sales copy. Every piece is a narrative designed to captivate, inform, and convert. This storytelling ability extends into the world of research writing as well. Over the years, I’ve penned research papers, proposals, questionnaires, case studies, journals, theses, and dissertations, helping clients transform complex ideas into impactful academic contributions. Whether it's a project report or a presentation, I ensure every detail resonates with its audience. Leading my own Business Consultancy for over a decade has been another chapter in my journey. With a diverse industry background, I’ve not only set up numerous businesses but also propelled them to new heights. By optimizing strategies, conducting thorough market research, and crafting clear, compelling business plans, I’ve helped clients navigate the challenging waters of entrepreneurship. Whether it’s a startup or an established company, my tailored solutions drive expansion, attract funding, and build strong personal brands. As the world went digital, so did I. Embracing digital marketing became essential, and I dove into it headfirst. From Wikipedia editing to ensure an authoritative digital footprint, to leveraging social media marketing, SEO, email campaigns, and Google Ads, I’ve expanded businesses' reach online. Helping clients thrive in the digital space has been a thrilling part of my journey. This is my story—a blend of sales expertise, a passion for storytelling, strategic consulting, and a knack for digital innovation. Now, I’m here to help you craft the next chapter of yours. kurang
Upah freelanceralig
-
◙ 14+ years of Industrial Experience in CyberSecurity ◙ Certified Red Team Operator ◙ Lead Auditor Registered CVE-2022-40055 ◙ https://nvd.nist.gov/vuln/detail/CVE-2022-40055 ◙...◙ 14+ years of Industrial Experience in CyberSecurity ◙ Certified Red Team Operator ◙ Lead Auditor Registered CVE-2022-40055 ◙ https://nvd.nist.gov/vuln/detail/CVE-2022-40055 ◙ https://blog.alphathreat.in/index.php?post/2022/10/01/Achieving-CVE-2022-40055 Technical Skills ◙ Vulnerability Assessment ◙ Penetration Testing ◙ Web Application security audit ◙ API testing ◙ Source Code Review ◙ Mobile Application Testing (Android/iOS) ◙ Cloud Audit ◙ Security Configuration review ◙ Log review ◙ Digital Forensics ◙ Threat simulation ◙ Cybersecurity and general Awareness training kurang
Upah kunalmaharUK
-
Profesional Keselamatan Sistem Maklumat Bertauliah (CISSP), Keselamatan Awan, Keselamatan Komputer, Keselamatan Internet, Keselamatan RangkaianI'm a cybersecurity engineer specializing in Threat Vulnerability Management (TVM), Penetration Testing, and Ethical Hacking. With a strong background in threat intelligence and incident response, I work as a consultant for IBM's X-Force Red team, helping organizations identify, assess, and remediate security...I'm a cybersecurity engineer specializing in Threat Vulnerability Management (TVM), Penetration Testing, and Ethical Hacking. With a strong background in threat intelligence and incident response, I work as a consultant for IBM's X-Force Red team, helping organizations identify, assess, and remediate security vulnerabilities. I hold several industry-recognized certifications, including Introduction to Cybersecurity, ITIL v4, and OWASP Top 10 Web 2021 & 2017, which reinforce my expertise in security frameworks and best practices and Certified in ISO 27001, 27032, PCI DSS, NIST, BASC. Throughout my career, I have taken on roles such as Network Engineer, Support Engineer, System Analyst, and System Administrator, allowing me to develop a deep understanding of network infrastructure, system hardening, and security operations. My experience extends to vulnerability assessments, exploit development, red teaming, and secure system architecture, enabling me to proactively strengthen security postures. Fluent in Spanish and English, I am currently pursuing a degree in Systems Engineering at UNAD to further enhance my technical expertise. Passionate about offensive security, I am committed to applying cutting-edge ethical hacking techniques to protect organizations from emerging threats. kurang
Upah johnm0503
-
Alias, Pembungkusan Aplikasi, Penggodaman Etika Bertauliah, Profesional Keselamatan Sistem Maklumat Bertauliah (CISSP), Data AwanJe suis un professionnel en support informatique et administration systèmes et réseaux avec une expérience solide en Windows Server, Active Directory, gestion de réseaux, et support aux utilisateurs. Je fournis : • Résolution rapide de problèmes techniques • Maintenance et optimisation d’infrastructures IT • Gestion...Je suis un professionnel en support informatique et administration systèmes et réseaux avec une expérience solide en Windows Server, Active Directory, gestion de réseaux, et support aux utilisateurs. Je fournis : • Résolution rapide de problèmes techniques • Maintenance et optimisation d’infrastructures IT • Gestion et sécurisation de comptes, serveurs et réseaux • Support utilisateur clair, efficace, en français et anglais Je travaille avec sérieux, transparence et réactivité. 💡 Disponible pour des missions freelance, support à distance ou intervention en entreprise. kurang
Upah moutlakz
-
ZempelITSecurity ZempelITSecurity
$160 USD / jam
IT Security Professional Certified InfoSec ExpertGermanyProfesional Keselamatan Sistem Maklumat Bertauliah (CISSP), Pengkomputeran Awan, Keselamatan Awan, Pematuhan, Keselamatan KomputerMy name is Björn Zempel. I was born on March 27, 1986, and I am a proud husband and father. I began my journey in IT as an IT specialist for system integration in July 2005. From January 2006 until May 2018, I served as a non-commissioned officer in the German Bundeswehr, reaching the rank of Feldwebel (senior...My name is Björn Zempel. I was born on March 27, 1986, and I am a proud husband and father. I began my journey in IT as an IT specialist for system integration in July 2005. From January 2006 until May 2018, I served as a non-commissioned officer in the German Bundeswehr, reaching the rank of Feldwebel (senior NCO). In February 2013, I became an Operational Professional and certified IT Project Manager (IHK), also earning the AdA instructor certificate. I have experience teaching IT basics and IT security at the Bundeswehr Fachschule in Kassel. Since January 2018, I have been a sworn examiner for the Heilbronn-Franken IHK, evaluating candidates in “IT Specialist” and “IT Project Manager” exams. My passion lies in information security - I channel this dedication daily as the founder of Zempel IT Security, offering expert consulting, risk management, and cloud security solutions. In September 2024, I completed the prestigious (ISC)² CCSP certification on top of my CISSP, CISM, PCIP, CDPO, and ISO 27001 credentials, reinforcing our leadership in cloud security services. kurang
Upah ZempelITSecurity
-
⚡ Rapid technical fixes from an R&D Engineer. Currently building my reputation on the platform, offering Premium-grade support at promotional rates for my first 10 reviews. Specialist in n8n troubleshooting, API integrations, and business process automation I am a Senior Software Engineer specializing in advanced Web...⚡ Rapid technical fixes from an R&D Engineer. Currently building my reputation on the platform, offering Premium-grade support at promotional rates for my first 10 reviews. Specialist in n8n troubleshooting, API integrations, and business process automation I am a Senior Software Engineer specializing in advanced Web Applications (React), Automation (Python), and Cybersecurity. My unique advantage? I don't just write code that works; I write code that is secure, scalable, and mathematically precise—attributes derived from my background in R&D and Security. 🛡️ Why hire a Security Expert for Web Development? Standard developers build features. I build Architectures. When I create a React dashboard or a Python bot for you, it comes with "Security by Design"—optimized, bulletproof, and professional. 💎 Core Services: Advanced Web Apps: React.js dashboards, Three.js (3D) visualizers, and interactive tools that feel premium (Glassmorphism, Cyber-Corporate aesthetics). Python Automation: Custom bots, scrapers, and data pipelines that run reliably 24/7. Cybersecurity & Repair: RASP integration, Penetration Testing, and Forensic Malware Removal. 🚀 Tech Stack: Frontend: React, TypeScript, Three.js, Tailwind/Vanilla CSS. Backend: Python, Node.js, SQL. Security: OWASP Standards, RASP SDKs, Anti-Bot Engineering. My Promise: No "spaghetti code." No quick hacks. Just solid engineering that protects your business and impresses your customers. Check my portfolio for examples of "Engineering-Grade" design. kurang
Upah maksks00