Information Security Projects on Upwork

Find and secure information security projects on Upwork with Vollna. Our advanced filters, real-time alerts, and analytics help you bid smarter and work more efficiently.
Signup for free to get access to all filter attributes and instant notifications when new jobs are posted.
Setup filter
"Information Security"



Get access to over 30+ filter attributes, setup instant notifications, integrate with your CRM and marketing tools, and more.
Start free trial
301 projects published for past 72 hours.
Job Title Budget
GRC Expert required
20 - 50 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
1 jobs posted
open job
no reviews
GB United Kingdom
Risky
Job Title:

Cybersecurity & IT Assurance Expert (NIST CSF 2.0 / ISO 27001 / GRC Tools)


---

Project Overview:

We are a growing UK-based Managed Service Provider (MSP) working towards aligning our internal processes and customer assessments with NIST Cybersecurity Framework 2.0 and ISO 27001. We use tools such as Compliance Manager GRC and Network Detective to support our assessments and reporting.

We’re looking for a cybersecurity and IT assurance professional to help us build and improve our compliance offering, assess customer environments, and produce clear, professional reports that align with cybersecurity frameworks.


---

Scope of Work:

1. Customer Environment Assessment

Review discovery data from tools like Network Detective and Compliance Manager GRC.

Identify gaps and risks aligned with NIST CSF 2.0 and ISO 27001.

Create or enhance client-facing reports using a risk-based RAG format.



2. Framework Mapping

Map existing evidence and controls against relevant cybersecurity frameworks.

Provide input into our internal asset management, access control, and incident response policies.



3. Report Writing

Draft clear and concise audit findings, executive summaries, and remediation recommendations.

Tailor reports for technical and non-technical audiences (including business leadership).



4. Internal Guidance & Advisory

Advise on control improvement and audit readiness.

Suggest improvements to our reporting templates and assessment workflow.





---

Ideal Candidate:

Strong knowledge of NIST CSF 2.0, ISO 27001, Cyber Essentials, or similar frameworks.

Experience conducting IT audits, risk assessments, or gap analyses.

Ability to work with data from tools like Compliance Manager GRC, Network Detective, or similar platforms.

Strong English writing skills — clear, structured, and professional.

Comfortable working with a remote UK-based team.

Bonus: Experience working with MSPs or small-medium businesses.



---

Project Duration & Hours:

Initial project: 2–4 weeks of part-time work (~10–15 hours/week).

Potential for long-term collaboration on audits and reporting work.



---

To Apply:

Please include:

A brief summary of your experience with NIST CSF, ISO 27001, or IT audits.

An example of a report or project you've completed (you may redact sensitive info).

Availability and hourly rate.
Skills: Information Security, Cybersecurity Management, Incident Response Plan, Security Policies & Procedures Documentation
Hourly rate: 20 - 50 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Cloud Security Analyst Needed for Comprehensive Security Assessment
20 - 50 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
no reviews
US United States
Risky
We are seeking a skilled Cloud Security Analyst to conduct a thorough assessment of our cloud infrastructure. The ideal candidate will evaluate security measures, identify vulnerabilities, and recommend best practices to enhance our cloud security posture. You will work closely with our IT team to ensure compliance with industry standards and regulations. Familiarity with various cloud platforms and security tools is essential. If you have a passion for cloud security and the skills to back it up, we want to hear from you!
Skills: Vulnerability Assessment, Information Security, Penetration Testing, Security Analysis, Network Security
Hourly rate: 20 - 50 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Workspace set up
not specified 1 day ago
Client Rank - Excellent

Payment method verified
$12 436 total spent
8 hires
8 jobs posted
100% hire rate, open job
4.98 of 6 reviews
US United States
Excellent
Only freelancers located in the U.S. may apply.
I have a personal Gmail and want to make it into a business workspace email. I have a business domain and it is associated with emails in my company but I want to keep my Gmail separate from my domain emails. I found out my personal Gmail has limitations to my business ads, analytics, tags etc. for tracking. I want to hire someone to help set up the best way to connect my personal Gmail to my business with out it interfering with my already configured set up. I think, i want to sign up for a workspace account so I can tie everything togeher.
Skills: DNS, System Administration, Microsoft Windows, Google Cloud Platform, Customer Service, Data Migration, Single Sign-On, Information Security, Computer Skills, Domain Migration, Cloud Computing, Google, Cloud Security, Backup & Migration, Email Communication
Budget: not specified
1 day ago
  • IT & Networking, DevOps & Solutions Architecture
Ruder Cyber Tech Sleuths: Your Trusted Partner for Cryptocurrency Asset Recovery.
50 - 80 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
no reviews
TW Taiwan
Risky
Welcome to RUDER CYBER TECH SLEUTHS . We are a team of brilliant hackers Welcome to RUDER CYBER TECH SLEUTHS! We are a dedicated team of skilled hackers available 24/7 to assist you. Our range of services is extensive, and our process is straightforward, ensuring a smooth experience for every client.

You can hire a hacker for various needs, including:

- Crypto scam recovery
- Social media account hacks
- Email and phone hacks
- Credit score improvement
- Academic score upgrades
- Monitoring your partner's activities

Feel free to reach out to us for more details, and we will be happy to help you resolve your issues. Our team consists of professionals with experience from high-profile digital security firms, bringing over 25 years of expertise to meet your needs.


Tele gram : @rudercybersleuths
Skills: Information Security, Vulnerability Assessment, Encryption, Security Analysis, Network Security
Hourly rate: 50 - 80 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Urgent Security Investigation Required
25 - 50 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
no reviews
US United States
Risky
I am seeking a professional to conduct a security investigation regarding potential safety issues related to my wife's phone. It's imperative that this task is handled discreetly and ethically to ensure the well-being of all parties involved. The goal is to assess any vulnerabilities and gather information that may help in addressing serious concerns. If you have experience in digital forensics, cybersecurity, or related fields, please reach out with your qualifications and approach to resolving this matter responsibly.
Skills: Penetration Testing, Information Security, Vulnerability Assessment, Firewall, Network Security
Hourly rate: 25 - 50 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Regain access
not specified 1 day ago
Client Rank - Risky

Payment method not verified
no reviews
US United States
Risky
Hello!
I need help regaining access to accounts, which have been hacked. This includes social media and emails etc. please contact me at your soonest convenience.

Thanks,
Brittany L
Skills: Information Security, WordPress Malware Removal, Internet Security, Ethical Hacking, Bitcoin, Network Security, Security Testing, OWASP, Malware Removal, Blockchain, Web Application Security, Website Security, WordPress, Penetration Testing, Cryptocurrency
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
VAPT and Security Compliance Support(CERT-IN Empanelled Vendor Required) -- 2
~5 - 9 USD / hr
1 day ago
Client Rank - Excellent

Payment method verified
$185 097 total spent
189 hires , 33 active
6 open job
4.99 of 11 reviews
Registered at: 07/01/2019
IN India
Excellent
Project Overview
We are seeking the services of a CERT-IN empanelled cybersecurity vendor or professional to carry out a Vulnerability Assessment and Penetration Testing (VAPT) and assist in completing mandatory client security compliance questionnaires. This engagement is crucial for vendor onboarding with major corporate clients and insurance partners.
Scope of Work:
1. Vulnerability Assessment & Penetration Testing (VAPT):
o Perform comprehensive internal and external VAPT of our infrastructure, including web applications, APIs, servers, and endpoints.
o Assess network and application layer vulnerabilities.
o Provide a detailed report including:
 Risk categorization (High/Medium/Low)
 Technical findings with evidence (screenshots, logs)
 Suggested remediation
 Final re-validation report after fixes
2. Compliance Documentation Support:
o Assist in completing two client security assessments:
 “Partner Onboarding – Security Parameters of Client Environment”
 “Digit – Vendor Self Assessment Questionnaire”
o Align responses with industry best practices and regulatory standards (ISO 27001, NIST, CERT-IN).
o Provide documented evidence such as:
 Information Security Policy
 Secure configuration baselines
 Data classification and protection policies
 Business continuity and disaster recovery plans
 Access control and monitoring procedures
3. Evaluation & Risk Score Optimization:
o Understand the evaluation matrix and risk scoring methodology used by clients.
o Recommend corrective actions to improve security posture and compliance scores.
o Ensure documentation is audit-ready and presentable.
Mandatory Requirement:
• The selected professional must be a CERT-IN empanelled vendor or work in association with one. Proof of empanelment will be required.
Deliverables:
• Initial and Final VAPT Reports
• Completed security assessment questionnaires
• Supporting documentation (security policies, technical artifacts)
• Advisory notes on risk mitigation and compliance readiness
Required Skills:
• Vulnerability Assessment & Penetration Testing (VAPT)
• Experience with CERT-IN standards and compliance
• Security Questionnaire Handling & Audit Documentation
• Knowledge of ISO 27001, NIST, and Indian IT Act compliance
• Network Security & Web Application Security Testing
• Firewall, IDS/IPS, and Endpoint Security Assessment
• Report Writing – Technical and Non-Technical (Audit-ready)
• Risk Analysis & Mitigation Planning
• Incident Response and Business Continuity Knowledge
• Familiarity with tools like Burp Suite, Nmap, Nessus, OWASP ZAP, Metasploit
• Certifications (preferred): CEH, OSCP, CISSP, CISA
Timeline:
• Kickoff: Immediate
• Duration: 2-3 weeks (negotiable based on availability and scope)
Budget:
• Please quote your fixed price for the complete engagement or hourly rate.
• Attach sample VAPT reports or redacted past project documentation, if available.

Skills: Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Hourly rate: 400 - 750 INR
1 day ago
  • Websites, IT & Software, Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
VAPT and Security Compliance Support(CERT-IN Empanelled Vendor Required)
~5 - 9 USD / hr
1 day ago
Client Rank - Excellent

Payment method verified
$185 097 total spent
189 hires , 33 active
6 open job
4.99 of 11 reviews
Registered at: 07/01/2019
IN India
Excellent

Project Overview
We are seeking the services of a CERT-IN empanelled cybersecurity vendor or professional to carry out a Vulnerability Assessment and Penetration Testing (VAPT) and assist in completing mandatory client security compliance questionnaires. This engagement is crucial for vendor onboarding with major corporate clients and insurance partners.
Scope of Work:
1. Vulnerability Assessment & Penetration Testing (VAPT):
o Perform comprehensive internal and external VAPT of our infrastructure, including web applications, APIs, servers, and endpoints.
o Assess network and application layer vulnerabilities.
o Provide a detailed report including:
 Risk categorization (High/Medium/Low)
 Technical findings with evidence (screenshots, logs)
 Suggested remediation
 Final re-validation report after fixes
2. Compliance Documentation Support:
o Assist in completing two client security assessments:
 “Partner Onboarding – Security Parameters of Client Environment”
 “Digit – Vendor Self Assessment Questionnaire”
o Align responses with industry best practices and regulatory standards (ISO 27001, NIST, CERT-IN).
o Provide documented evidence such as:
 Information Security Policy
 Secure configuration baselines
 Data classification and protection policies
 Business continuity and disaster recovery plans
 Access control and monitoring procedures
3. Evaluation & Risk Score Optimization:
o Understand the evaluation matrix and risk scoring methodology used by clients.
o Recommend corrective actions to improve security posture and compliance scores.
o Ensure documentation is audit-ready and presentable.
Mandatory Requirement:
• The selected professional must be a CERT-IN empanelled vendor or work in association with one. Proof of empanelment will be required.
Deliverables:
• Initial and Final VAPT Reports
• Completed security assessment questionnaires
• Supporting documentation (security policies, technical artifacts)
• Advisory notes on risk mitigation and compliance readiness
Required Skills:
• Vulnerability Assessment & Penetration Testing (VAPT)
• Experience with CERT-IN standards and compliance
• Security Questionnaire Handling & Audit Documentation
• Knowledge of ISO 27001, NIST, and Indian IT Act compliance
• Network Security & Web Application Security Testing
• Firewall, IDS/IPS, and Endpoint Security Assessment
• Report Writing – Technical and Non-Technical (Audit-ready)
• Risk Analysis & Mitigation Planning
• Incident Response and Business Continuity Knowledge
• Familiarity with tools like Burp Suite, Nmap, Nessus, OWASP ZAP, Metasploit
• Certifications (preferred): CEH, OSCP, CISSP, CISA
Timeline:
• Kickoff: Immediate
• Duration: 2-3 weeks (negotiable based on availability and scope)
Budget:
• Please quote your fixed price for the complete engagement or hourly rate.
• Attach sample VAPT reports or redacted past project documentation, if available.



Skills: Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Hourly rate: 400 - 750 INR
1 day ago
  • Websites, IT & Software, Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Instagram Account Security Consultant
30 USD 1 day ago
Client Rank - Risky

Payment method not verified
no reviews
IN India
Risky
We are seeking a skilled Instagram security consultant to assess and enhance the security of our Instagram account. The ideal candidate will have experience with ethical hacking, vulnerability assessment, and social media security protocols. Your responsibilities will include identifying potential security threats, providing recommendations for account protection, and ensuring our sensitive information remains secure. If you have a strong background in social media security and a passion for protecting online assets, we want to hear from you!
Skills: Information Security, Penetration Testing, Internet Security, Ethical Hacking, Instagram
Fixed budget: 30 USD
1 day ago
  • Accounting & Consulting, Accounting & Bookkeeping
Instagram y Facebook hackeado e inhabilitado
100 USD 1 day ago
Client Rank - Medium

Payment method verified
1 jobs posted
open job
no reviews
ES Spain
Medium
Hola, me pongo en contacto con usted porque me gustaría obtener más información sobre sus servicios. Me hackearon e inhabilitaron la cuenta de Instagram y Facebook.
Estoy buscando a alguien serio, experto y cualificado que sepa recuperar cuentas hackeadas o inhabilitadas.
En el mes de marzo me hackearon la cuenta de Instagram a través de Facebook, alguien entró desde el Facebook y vinculó una cuenta ajena dentro de mi perfil de Facebook y siguidamente entro en mi Instagram lo hackeo las dos cuenta, ahora mismo no puedo acceder a ninguna de mis redes sociales, intente por formulario, email, teléfono, por las plataformas de Instagram y Facebook pero no consigo acceder.

Adjunto algunas capturas para que veas y valores el caso, la cuenta @kmaria_drzdx5208 no es mi cuenta, es la que me ha hackeado el Facebook e Instagram.

Si crees que es posible recuperarlas, no dudes en ponerte en contacto conmigo para poder hablar y llegar a un acuerdo.

Quedo pendiente para cualquir cosa.

Un saludo y gracias.

Joe
Skills: Information Security, Ethical Hacking, Facebook, Penetration Testing, Network Security, Data Recovery, Instagram, Internet Security, Recover Data Recovery Software, HackerRank
Fixed budget: 100 USD
1 day ago
  • Admin Support, Virtual Assistance
iOS Forensics Expert Needed to Investigate Possible Spyware/Surveillance
20 - 50 USD / hr
23 hours ago
Client Rank - Medium

Payment method verified
$127 total spent
1 hires
1 jobs posted
100% hire rate, open job
no reviews
US United States
Medium
I am seeking an experienced iOS cybersecurity or mobile forensics expert to help investigate signs of potential spyware, surveillance, or unauthorized monitoring on a phone.. I need assistance with reviewing and interpreting logs, analyzing any provisioning profiles, background app activity, MDM profiles, certificate trust modifications, etc.

Following the above I need help to secure and reconfigure the device if compromised.
Skills: Digital Forensics, Information Security, Ethical Hacking, Cybersecurity Monitoring, iOS Jailbreaking, iPhone
Hourly rate: 20 - 50 USD
23 hours ago
  • IT & Networking, Information Security & Compliance
Systems and Security Director Needed for Integrated Security Solutions
40 - 70 USD / hr
19 hours ago
Client Rank - Risky

Payment method not verified
no reviews
US United States
Risky
We are seeking an experienced Systems and Security Director to oversee the integration and security of our employee systems and POS systems. The ideal candidate will have a proven track record in developing and implementing security strategies, ensuring data protection, and managing system integrations. You will work closely with our IT team to ensure seamless operations while maintaining the highest security standards. If you are diligent, detail-oriented, and have a solid understanding of system security best practices, we would love to hear from you!
Skills: Network Security, Information Security, Vulnerability Assessment, Firewall, Security Analysis
Hourly rate: 40 - 70 USD
19 hours ago
  • IT & Networking, Information Security & Compliance
SOC2 Consultant
15,000 USD 19 hours ago
Client Rank - Excellent

Payment method verified
$161 832 total spent
55 hires
88 jobs posted
63% hire rate, open job
3.70 of 26 reviews
US United States
Excellent
SOC2 Consultant needed for Vanta maintenance and compliance efforts
Skills: Information Security, SOC 2, SOC 2 Report, IT Compliance Audit
Fixed budget: 15,000 USD
19 hours ago
  • IT & Networking, Information Security & Compliance
Ethical Hacking & Penetration Testing Specialist Needed
20 - 150 USD / hr
19 hours ago
Client Rank - Medium

Payment method verified
$121 total spent
1 hires
5 jobs posted
20% hire rate, open job
no reviews
BA Bosnia and Herzegovina
Medium
We are seeking an experienced ethical hacker to conduct penetration testing and vulnerability assessments for our applications and systems. The ideal candidate should be well-versed in social engineering techniques and have experience with phishing simulations, keyloggers, and brute force attacks. Your insights will help us strengthen our security posture and protect against potential threats. If you have a strong background in cybersecurity and can provide detailed reports on findings and recommendations, we'd love to hear from you.
Skills: Vulnerability Assessment, Penetration Testing, Ethical Hacking, Information Security, Network Security
Hourly rate: 20 - 150 USD
19 hours ago
  • IT & Networking, Information Security & Compliance
SOC 2 Compliance Consultant for AWS Implementation
20 - 35 USD / hr
17 hours ago
Client Rank - Medium

Payment method verified
1 jobs posted
open job
no reviews
US United States
Medium
We are seeking an experienced consultant to assist our organization in achieving SOC 2 compliance specifically within our AWS environment. The ideal candidate will have a deep understanding of SOC 2 requirements and practical experience implementing necessary controls in AWS. You will work closely with our team to assess current practices, identify gaps, and develop a comprehensive compliance strategy tailored to our business needs. Your expertise will be critical in ensuring we meet the necessary standards for security, availability, processing integrity, confidentiality, and privacy.
Skills: Configuration Management, Penetration Testing, PCI DSS, HIPAA, ISO 27001, Information Security, PCI, Vulnerability Assessment, Network Security
Hourly rate: 20 - 35 USD
17 hours ago
  • IT & Networking, Information Security & Compliance
TCPA Compliance Subject Matter Expert (SME)
20 - 50 USD / hr
17 hours ago
Client Rank - Excellent

Payment method verified
$355 975 total spent
50 hires
30 jobs posted
100% hire rate, open job
4.97 of 27 reviews
US United States
Excellent
We are seeking a TCPA Compliance Subject Matter Expert (SME) to ensure our website terms, SMS marketing policies, privacy policies, and data collection practices comply with the Telephone Consumer Protection Act (TCPA) and other applicable regulations, including CAN-SPAM.

The ideal candidate has deep experience in regulatory compliance, risk management, and legal frameworks surrounding SMS marketing, website terms of use, and consumer privacy protections.

Key Responsibilities:

Review & Draft Policies: Develop and update Terms & Conditions, Privacy Policies, and SMS/MMS opt-in/out policies to align with TCPA, CCPA, GDPR, and CAN-SPAM requirements.
Compliance Audits: Assess current SMS marketing, website, and data collection processes for legal risks and compliance gaps.
Risk Mitigation: Provide recommendations to reduce TCPA-related legal exposure, including best practices for express written consent and automated dialing systems (ATDS) compliance.
Regulatory Monitoring: Stay updated on evolving TCPA regulations, FCC rulings, and litigation trends affecting digital marketing, telemarketing, and SMS campaigns.
Cross-Functional Collaboration: Partner with marketing, product, and legal teams to ensure all consumer communication strategies comply with TCPA and other privacy laws.
Training & Documentation: Develop internal compliance guidelines and conduct training sessions on TCPA best practices.
Requirements:

Proven Experience: Minimum 3-5 years of expertise in TCPA compliance, privacy law, or regulatory affairs related to marketing and consumer data.
Legal & Policy Expertise: Strong knowledge of TCPA, CCPA, CAN-SPAM, GDPR, and related laws affecting SMS, email, and digital marketing.
Industry Experience: Prior experience in industries that rely on SMS marketing, telemarketing, lead generation, or digital advertising (e.g., e-commerce, financial services, healthcare, or SaaS).
Technical Knowledge: Familiarity with SMS/MMS platforms, auto-dialing technologies, consent tracking, and data privacy frameworks.
Attention to Detail: Ability to analyze terms of service, disclosures, and data collection policies to ensure full compliance.
Communication Skills: Strong ability to educate internal teams and translate complex legal concepts into clear, actionable policies.
Legal Background (Preferred): JD or legal certification in compliance is a plus but not required.
Preferred Qualifications:

Experience working with SMS platforms (Twilio, EZ Texting, etc.)
Knowledge of lead generation regulations and consumer consent frameworks
Background in regulatory affairs or corporate legal departments
Skills: Regulatory Compliance, Finance & Accounting, Compliance, Legal, Information Security, Tech & IT
Hourly rate: 20 - 50 USD
17 hours ago
  • IT & Networking, Information Security & Compliance
Apple MDM (Mobile Device Management) Consultant – Expert Guidance for MDM Development
40 - 70 USD / hr
17 hours ago
Client Rank - Medium

Payment method verified
2 jobs posted
open job
no reviews
IN India
Medium
We are developing a cutting-edge Apple MDM (Mobile Device Management) solution and seek an experienced Apple MDM consultant to provide expert guidance on best practices, compliance, architecture, and implementation strategies.

Who We Are Looking For:

We need a highly skilled professional with proven experience in Apple MDM development and deployment. The ideal candidate should have deep knowledge of Apple’s MDM Protocol, Apple Business Manager (ABM), Automated Device Enrollment (ADE), Profile Management, APNs, DEP, VPP, and security best practices.

Responsibilities:

Provide technical consultation and strategic guidance on Apple MDM architecture and implementation.

Assist in configuring and integrating APNs, DEP, VPP, and Apple Business Manager with our MDM solution.

Guide our team in creating and managing configuration profiles, policies, and device enrollment workflows.

Help ensure compliance with Apple’s MDM security policies and industry best practices.

Troubleshoot issues related to device enrollment, policy enforcement, and app distribution.

Advise on scalability, performance optimization, and security hardening of the MDM solution.

Stay updated on Apple’s latest MDM protocol updates and iOS/macOS changes and guide implementation.

Requirements:

Extensive experience in Apple MDM solution development and deployment.

Strong expertise in Apple MDM protocol, APNs, ABM, ADE, DEP, and VPP.

Hands-on experience with configuration profiles, policy enforcement, and remote device management.

Deep understanding of security protocols, encryption, and compliance requirements in MDM.

Experience integrating MDM solutions with backend infrastructure (e.g., AWS, Azure, on-premises servers, etc.) is a plus.

Ability to clearly communicate technical concepts and provide structured guidance to the team.

Engagement Details:

Payment: Hourly basis. Competitive rates based on experience.

Engagement Type: Remote consultation via video calls, Slack, or other communication channels.

Duration: Ongoing engagement based on project requirements.

How to Apply:

Please include the following in your application:

A summary of your Apple MDM experience and relevant projects.

Your expertise in specific MDM technologies and protocols.

Availability and preferred communication methods.

If you are an Apple MDM expert who can provide valuable insights and strategic guidance, we’d love to hear from you!
Skills: Configuration Management, Information Security, Mobile Device Management, iOS, iOS Development
Hourly rate: 40 - 70 USD
17 hours ago
  • IT & Networking, Information Security & Compliance
Data Governance Policy Writer
not specified 15 hours ago
Client Rank - Excellent

Payment method verified
$44 107 total spent
3 hires
3 jobs posted
100% hire rate, open job
5.00 of 1 reviews
US United States
Excellent
Only freelancers located in the U.S. may apply.
1. Overview
Internet Society is seeking a Data Governance Policy Writer to develop key data governance policies and
associated Standard Operating Procedures (SOPs) in alignment with ISO 27001 standards. These policies
will establish clear guidelines for data ownership, classification, and access control, ensuring compliance
with best practices for information security and governance.

2. Scope of Work
The consultant will be responsible for drafting and finalizing the following policies and their corresponding
SOPs:
a. Ownership and Stewardship Policy
i. Defines the roles and responsibilities for data owners and stewards.
ii. Establishes accountability for data quality, and lifecycle management.
iii. SOP: Step-by-step guidelines for staff on how to assign, track, and fulfill data ownership
responsibilities.
b. Classification Policy
i. Establishes a structured framework for categorizing data based on sensitivity, criticality, and
regulatory requirements.
ii. Defines labeling, handling, and retention requirements.
iii. SOP: Instructions for staff on how to classify, store, and manage data according to policy
guidelines.
c. Access and Usage Policy
i. Sets criteria for granting, reviewing, and revoking data access.
ii. Defines user roles, responsibilities, and permitted usage in compliance with ISO 27001.
iii. SOP: Clear procedures for staff on how to request, review, and manage access permissions in
alignment with security protocols.
For each policy, the consultant will:
Research and incorporate ISO 27001 best practices.
Draft policies and ensure alignment with existing governance frameworks.
Develop corresponding SOPs that provide clear, actionable steps for staff to function within the policy.
Revise and finalize documents based on stakeholder feedback.

3. Deliverables
Draft versions of each policy and SOP for review.
Finalize policies and SOPs incorporating stakeholder input.
Implementation guidelines to assist in operationalizing the policies

4. Timeline
Project Start Date: TBD
First Draft Submission: 3 Weeks
Final Deliverables: 2 weeks after draft

5. Required Skills and Experience
Proven experience in data governance, policy writing, and compliance.
Strong understanding of ISO 27001 and information security principles.
Ability to create clear, actionable, and organization-specific policies.

6. Reporting and Communication
The consultant will provide at least weekly status updates and coordinate with Morgan Steinlin for feedback
and revisions.
Skills: English, Writing, Policy Writing, ISO 27001, Compliance
Budget: not specified
15 hours ago
  • Writing, Professional & Business Writing
I’ve been hacked & want to know by who
not specified 13 hours ago
Client Rank - Risky

Payment method not verified
no reviews
US United States
Risky
I’ve been hacked & have been receiving threats ! I’ve been receiving threatening messages & so has my family members. I just want to trace the number that has been messaging me.
Skills: Penetration Testing, Information Security, Vulnerability Assessment, Application Security, System Security, Firewall, Ethical Hacking, Security Analysis, Security Infrastructure, Security Testing, Internet Security, Database Security, Security Assessment & Testing
Budget: not specified
13 hours ago
  • IT & Networking, Information Security & Compliance
Penetration Testing for a Web application
not specified 13 hours ago
Client Rank - Risky

Payment method not verified
no reviews
IN India
Risky
ethically stress test a QA website by simulating high volumes of realistic user traffic using advanced tools and proxy-based techniques. Your goal is to identify performance bottlenecks, server limitations, or potential failure points by gradually increasing load until the website slows down or returns errors. You aim to mimic real user behavior, including browsing, clicking, scrolling, and interacting with APIs or forms, rather than just sending empty requests. You intend to bypass superficial CDN layers (if any) and apply intelligent proxy rotation to simulate traffic from thousands of unique IP addresses. Ultimately, your objective is to expose how the backend handles pressure under near-real-world conditions, helping improve scalability and infrastructure readiness.
Skills: C++, C#, Windows App Development, Ethical Hacking, Application Security, Encryption, Security Testing, System Security, Information Security, Article Writing, Desktop Application, Security Analysis, Security Assessment & Testing, Penetration Testing, Writing, Virus Removal
Budget: not specified
13 hours ago
  • IT & Networking, Information Security & Compliance
CISA and NIST Certified Security Expert Needed
not specified 11 hours ago
Client Rank - Medium

Payment method verified
$346 total spent
4 hires
8 jobs posted
50% hire rate, open job
4.57 of 4 reviews
US United States
Medium
Only freelancers located in the U.S. may apply.
We are seeking a highly skilled Security Expert to work on a state project long-term in a key leadership position, send me a message with your resume.

System Security Analyst for 1+4 years State Project Must be a US Citizen: Working on a Government proposal and looking for Sub Contractors to help with the following: Please describe your approach to ensuring the Modernized System meets the security standards required to prepare for an Independent Third-Party Assessment and system security compliance throughout the SDLC. Also, describe their approach to conducting required security-related activities, including vulnerability scans, security validation testing, and compliance reviews.

Key Requirements: --------------------
• Three (3) years or more experience with governmental system security assessments and remediations.
• Three (3) years or more experience ensuring systems are compliant with National Institute of Standards and Technology (NIST) SP80053 and FIPS200 security requirements.
• Preferred certifications include Certified Information Security System Professional (CISSP) Certification from ISC2 or comparable certifications e.g., Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA)


**Relevant Skills:**
- CISA Certification
- NIST Framework
- Risk Assessment
- Security Compliance
- Vulnerability Management
- Information Security Policies
Skills: NIST Cybersecurity Framework, NIST SP 800-53
Budget: not specified
11 hours ago
  • IT & Networking, Information Security & Compliance
Privacy, Security & AI Compliance Consultant for MVP Launch
not specified 11 hours ago
Client Rank - Good

Payment method verified
$6 353 total spent
16 hires
10 jobs posted
100% hire rate, open job
5.00 of 2 reviews
US United States
Good
Overview
We’re Aivana—a next-generation AI gateway designed to make artificial intelligence more useful, accessible, and affordable for non-technical users. Our platform combines:

✅ A curated AI Marketplace to discover the best tools by goal or persona
⚙️ Chatbot and prebuilt, integrated AI Workflows that automate real-world tasks
💳 Centralized Subscription Management to track and optimize AI tool usage

We’re launching our MVP in the next 60–90 days and are seeking a Privacy, Security, and AI Compliance Consultant to help us ship with clarity, trust, and readiness for scale.

What You’ll Help Us Build
🔐 Privacy & Legal Foundations:
Privacy Policy, Terms of Service, and Cookie Policy

Data Minimization Policy & Retention Schedule

GDPR/CCPA-compliant user rights procedures (access, deletion, portability, etc.)

Clear language around AI-generated outputs and user opt-out for data use in training

Risk assessment and documentation of cross-border data transfers

Vendor compliance tracker (OpenAI, Stripe, Plaid, Synthesia, etc.)

🛡️ Lightweight Security Stack:
Data Security Policy (encryption, access control, incident response)

Credential handling and API key storage practices (e.g., AWS Secrets Manager)

Breach playbook and team security awareness guidelines

Recommendations for logging, auditing, and vulnerability management

Guidance on input sanitization to mitigate AI prompt injection risks

🤖 AI-Specific Compliance:
Transparent disclaimers for AivanaAI and AI-generated workflow content

Strategy for bias mitigation, explainability, and model governance (lightweight)

Privacy-by-design and responsible AI use best practices baked into product flow

Who We're Looking For
3+ years advising early-stage startups on privacy, security, or AI risk

Hands-on experience drafting and implementing policies for SaaS or API platforms

Strong knowledge of GDPR, CCPA, and AI-related legal considerations

Comfort working cross-functionally with founders, developers, and UX teams

Familiarity with SOC 2 Lite, ISO 27001, OWASP Top 10, or NIST frameworks a plus

Prior experience working with OpenAI, LLM APIs, or AI model workflows a plus

Skills We’re Looking For:
Privacy Law (GDPR, CCPA)

Cybersecurity & Data Protection

SaaS & API Compliance

AI Governance & Transparency

Legal Policy Drafting

Data Security Architecture

Risk Management & Vendor Review

Security Awareness & SOPs

Security Frameworks (ISO, NIST, SOC 2 Lite)
Skills: Information Security, Tech & IT, HIPAA, Amazon Web Services, Web Development
Budget: not specified
11 hours ago
  • Admin Support, Virtual Assistance
Instagram got hacked
not specified 11 hours ago
Client Rank - Risky

Payment method not verified
2 jobs posted
open job
no reviews
PK Pakistan
Risky
Urgent: Instagram got hacked .

My instagram got hacked .I discovered that my password, email, phone number and two factor authentication had been changed, and unauthorised posts were made. I have attempted to reset my password, but it was unsuccessful. My account activity shows suspicious stories containing scam links. I am the rightful owner of this account. I am requesting you to please help me to get my account back.
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget: not specified
11 hours ago
  • Customer Service, Customer Experience & Tech Support
Certified Digital Forensics Expert Needed for Email Metadata Review
40 - 70 USD / hr
9 hours ago
Client Rank - Risky

Payment method not verified
no reviews
CA Canada
Risky
We are seeking a certified digital forensics expert based in Canada to conduct a thorough review of email metadata. The ideal candidate will have extensive experience in digital forensics and a strong understanding of email protocols, metadata analysis, and forensic tools. Your insight will be crucial in interpreting the data accurately and providing a detailed report.

Certifications (EnCE, CFCE, GIAC)

Legal experience ("expert witness," "court testimony")

This project has a budget range of $300–500 CAD. Please apply only if you meet the requirements and can deliver high-quality work within the stipulated budget.
Skills: Content Writing, Copywriting, Search Engine Optimization, Information Security
Hourly rate: 40 - 70 USD
9 hours ago
  • IT & Networking, Information Security & Compliance
Getting documents from ukraine
not specified 9 hours ago
Client Rank - Risky

Payment method not verified
no reviews
CA Canada
Risky
Hello
I am new to this and I am not sure if you can help me. I am a medical resident and I completed my residency from a Ukraine university. But because of the war and town tearing down I had to leave all my documents behind. Now it's been over 6 months since I have been trying to reach the school for my documents and I am not able to get in contact with anyone who can help at the faculty. If I provide you with my information would you be able to get those documents from their system?
Skills: Cybersecurity Management, Information Security Governance, NIST Cybersecurity Framework, Network Security, GDPR, Governance, Risk & Compliance Software, CIS Control Assessment, Information Security, Information Technology, PCI, Information Security Audit, Security Policies & Procedures Documentation, SOC 2, Information Security Consultation, ISO 27001
Budget: not specified
9 hours ago
  • IT & Networking, Information Security & Compliance
Cyber Security Plan Development for Small Business
125 USD 8 hours ago
Client Rank - Medium

Payment method verified
$217 total spent
2 hires
4 jobs posted
50% hire rate, open job
5.00 of 1 reviews
US United States
Medium
**Job Description:*

I am currently in search of a seasoned cybersecurity professional to assist in the formulation of a comprehensive cybersecurity strategy specifically designed for a small business environment. Need something in writing PDF.

Your expertise will be instrumental in safeguarding sensitive information for us in th future.
Skills: Information Security, Market Research, Lead Generation, Marketing Strategy
Fixed budget: 125 USD
8 hours ago
  • IT & Networking, Information Security & Compliance
Looking for a cybersecurity expert with experience in Mac / apple products
not specified 7 hours ago
Client Rank - Excellent

Payment method verified
$7 403 total spent
47 hires
43 jobs posted
100% hire rate, open job
4.86 of 23 reviews
US United States
Excellent
Looking for a cybersecurity expert who can work with mac and iphone to analyze devices and identify if they have been hacked

Recently had someone be able to access an account with 2FA app codes on and I need to identify how they did it
Skills: Cybersecurity Management, Configuration Management, Incident Response Plan, Information Security, Information Security Consultation, macOS, iOS, Swift, Mac OS App Development, Apple Xcode
Budget: not specified
7 hours ago
  • IT & Networking, Information Security & Compliance
Malware testing for detection and response
300 USD 4 hours ago
Client Rank - Excellent

Payment method verified
$101 651 total spent
70 hires
148 jobs posted
47% hire rate, open job
4.89 of 41 reviews
US United States
Excellent
Looking someone to evaluate an new EDR solution, against other EDRs, under different frameworks, Testing scope will be provided, Looking someone who can work with offshore team and complete the testing, we need someone who knows how to work with offshore developers and get desired results, this may become on going task once we go for proper certifications
Skills: Information Security, Network Security, Penetration Testing, Security Analysis, Internet Security
Fixed budget: 300 USD
4 hours ago
  • IT & Networking, Information Security & Compliance
Email Security Expert Needed for Consultation
500 - 999 USD / hr
3 hours ago
Client Rank - Medium

Payment method verified
$199 total spent
2 hires
1 jobs posted
100% hire rate, open job
4.29 of 2 reviews
US United States
Medium
I am looking for someone who can hack into an email with two factor authentication or teach me how to hack an email. I know this is near impossible but I thought it was worth putting it out there.
Skills: Information Security, Email Deliverability, Vulnerability Assessment, Encryption, Network Security
Hourly rate: 500 - 999 USD
3 hours ago
  • Sales & Marketing, Display Advertising
Instagram problem
500 USD 3 hours ago
Client Rank - Medium

Payment method verified
2 jobs posted
50% hire rate, open job
no reviews
HK Hong Kong
Medium
Our department publishes a publication for students to read, and we have always posted it on our official website as well as shared relevant information on Facebook. However, we recently discovered an Instagram account impersonating us, posting articles not authored by our students or staff, which is damaging our school's reputation. We have attempted to report this to Instagram, but it has been ineffective.
Skills: Information Security, Cybersecurity Management, Digital Forensics, Ethical Hacking, Online Reputation Management, Reputation Management, Bad Link Removal, Google, Search Engine Optimization, Instagram, Facebook, Cyber Threat Intelligence, Cybersecurity Monitoring, Cybersecurity Tool
Fixed budget: 500 USD
3 hours ago
  • Sales & Marketing, Display Advertising
Need a ethical hacker
not specified 1 hour ago
Client Rank - Risky

Payment method not verified
no reviews
IN India
Risky
Need a ethical hacker for a smll project related to cyber security
Skills: Security Testing, Network Security, Vulnerability Assessment, Penetration Testing, Web Application Security, Network Penetration Testing, Internet Security, Information Security Audit, Website Security, API Testing, OWASP, Code Review, Web App Penetration Testing, Security Assessment & Testing, Ethical Hacking
Budget: not specified
1 hour ago
  • IT & Networking, Information Security & Compliance
Call to action
Freelancing is a business
Make it more profitable with Vollna

Streamline your Upwork workflow and boost your earnings with our smart job search and filtering tools. Find better clients and land more contracts.