Information Security Projects on Upwork

Find and secure information security projects on Upwork with Vollna. Our advanced filters, real-time alerts, and analytics help you bid smarter and work more efficiently.
Signup for free to get access to all filter attributes and instant notifications when new jobs are posted.
Setup filter
"Information Security"



Get access to over 30+ filter attributes, setup instant notifications, integrate with your CRM and marketing tools, and more.
Start free trial
283 projects published for past 72 hours.
Job Title Budget
Cyber Security Support for Divorcee
400 USD 1 day ago
Client Rank - Medium

Payment method verified
2 jobs posted
no reviews
US United States
Medium
We are seeking a skilled cybersecurity expert to provide support for a divorcee who needs to ensure their online safety and digital privacy. The ideal candidate will help assess potential risks, secure personal devices, and guide on best practices for online interactions. Additionally, assistance with protecting sensitive information and managing social media privacy is crucial. If you have experience in personal cybersecurity, please apply with your relevant experience and approach to this sensitive matter.
Skills: Information Security, Encryption, Network Security, Vulnerability Assessment, Firewall
Fixed budget: 400 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Instagram access
not specified 1 day ago
Client Rank - Medium

Payment method verified
2 jobs posted
no reviews
GB United Kingdom
Medium
Regain access to an Instagram page I own. All access has been lost
Skills: Information Security, Ethical Hacking, Penetration Testing, WhatsApp, Facebook, Snapchat, Instagram, Growth Hacking, Social Media Account Setup, Vulnerability Assessment, Data Recovery, Technical Support, Social Media Website, Instagram Story, Social Media Management
Budget: not specified
1 day ago
  • Accounting & Consulting, Accounting & Bookkeeping
Level 1 (L1) SOC Analyst
45 - 60 USD / hr
1 day ago
Client Rank - Excellent

Payment method verified
$517 150 total spent
34 hires
99 jobs posted
34% hire rate,
4.99 of 17 reviews
US United States
Excellent
Only freelancers located in the U.S. may apply.
Job Description: Level 1 SOC Analyst
Location: Onsite — West Lake, TX (MUST BE ONSITE)
Duration: 3 years
Work Schedule: 24x7x365 rotational coverage
Hourly Rate: $45-$60
________________________________________

Role Overview:
We are seeking a Level 1 SOC Analyst to join our Security Operations Center team onsite in West Lake, TX. This individual will focus on real-time security monitoring, triaging alerts, and supporting incident investigations to safeguard client environments. You will work closely with L2 SOC Analysts and client stakeholders to ensure timely, effective responses to potential security threats.
________________________________________

Key Responsibilities:
• Provide 24x7x365 security event monitoring within the SOC environment
• Triage security alerts to determine severity, urgency, and required actions
• Gather additional context and evidence from logs, systems, and tools
• Conduct preliminary incident analysis and escalate complex cases to Level 2 SOC Analysts
• Support client teams with response actions, containment, and remediation efforts
• Generate ad-hoc and scheduled reports on security events, incidents, and SOC performance
• Review dashboards and data feeds to identify anomalous patterns or emerging threats
________________________________________

Required Qualifications:
• Minimum 2 years of hands-on experience working in a Managed SOC environment
• Strong technical expertise in threat analysis and cyber incident triage
• Familiarity with SIEM platforms (such as Splunk, QRadar, ArcSight, or similar)
• Knowledge of common attack vectors, tactics, techniques, and procedures (TTPs)
• Understanding of basic networking, operating systems, and security controls
• Ability to work on a 24x7x365 rotational schedule, including nights, weekends, and holidays
________________________________________

Preferred Skills (Nice to Have):
• Relevant certifications (e.g., CompTIA Security+, SOC Analyst, CEH, GCIA, GCIH)
• Familiarity with incident management tools and ticketing systems
• Experience with threat intelligence platforms and feeds
• Strong analytical, problem-solving, and communication skills
Skills: Information Security, Information Security Threat Mitigation, Splunk, Incident Management
Hourly rate: 45 - 60 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Level 2 (L2) SOC Analyst
65 - 75 USD / hr
1 day ago
Client Rank - Excellent

Payment method verified
$517 150 total spent
34 hires
99 jobs posted
34% hire rate,
4.99 of 17 reviews
US United States
Excellent
Only freelancers located in the U.S. may apply.
Job Title: Level 2 (L2) SOC Analyst
Location: Onsite — West Lake, TX (MUST BE ONSITE)
Duration: 3 years
Hourly Rate: $65–$75/hour
Work Schedule: 24x7x365 rotational coverage
________________________________________
Role Overview:
We are seeking an experienced L2 SOC Analyst to join our onsite Security Operations Center team in West Lake, TX. This role serves as a key escalation point for L1 SOC Analysts, providing advanced technical expertise in threat analysis, incident investigations, containment, and remediation support. The L2 SOC Analyst will also help improve operational playbooks, tune threat intelligence integrations, and mentor junior analysts to strengthen overall SOC performance.
________________________________________
Key Responsibilities:
• Deliver 24x7x365 security event monitoring and oversight
• Act as a technical escalation resource for L1 SOC Analysts, providing mentorship and support
• Conduct advanced incident analysis, threat investigations, and digital forensics
• Correlate threat intelligence with SIEM events to identify and assess emerging risks
• Provide containment, recovery, and remediation recommendations to client teams
• Support onsite breach investigations and forensic reviews as needed
• Define, update, and optimize SOPs, incident response playbooks, and SOAR automation logic
• Maintain and manage threat intelligence feeds within the SIEM environment
• Generate detailed reports on incidents, investigations, trends, and threat landscape updates
________________________________________
Required Qualifications:
• Minimum 5 years of experience working in a Managed SOC environment
• Strong technical expertise in threat analysis, advanced incident response, and remediation
• Proficiency with SIEM platforms (e.g., Splunk, QRadar, ArcSight) and SOAR tools
• Familiarity with threat intelligence platforms, digital forensics tools, and breach investigation processes
• Solid understanding of advanced attack techniques, TTPs, and frameworks like MITRE ATT&CK
• Availability to work on a 24x7x365 rotational schedule, including nights, weekends, and holidays
________________________________________
Preferred Skills (Nice to Have):
• Relevant certifications (e.g., GCIA, GCIH, CISM, CISSP, CEH, SOC Analyst, SANS)
• Prior experience mentoring or leading SOC teams
• Experience defining and optimizing SOAR playbooks and automation workflows
• Strong client communication skills and the ability to deliver actionable, clear recommendations
Skills: Information Security, Vulnerability Assessment, Splunk, Cyber Threat Intelligence, Backdoor Attack Mitigation
Hourly rate: 65 - 75 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Ethical Hacker Needed for Cybersecurity Assessment
5 USD 1 day ago
Client Rank - Risky

Payment method not verified
no reviews
IN India
Risky
We are seeking an experienced ethical hacker to conduct a comprehensive cybersecurity assessment of our systems. The ideal candidate will identify vulnerabilities, simulate cyber attacks, and provide actionable insights to enhance our security posture. You should have a strong background in penetration testing and familiarity with various security tools and methodologies. If you're passionate about protecting digital assets and have a proven track record, we would love to hear from you.
Skills: Vulnerability Assessment, Security Analysis, Information Security, Penetration Testing, Encryption
Fixed budget: 5 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Recover deleted chats from instagram
not specified 1 day ago
Client Rank - Risky

Payment method not verified
no reviews
IN India
Risky
Hii
This side Rinku
Actually I am very disturbed in my relationship
My wife is chatting with someone in Instagram and deleted it recently
So I just want that deleted chats from his instagram account plzz help me if u can
I need it very urgently
Call me I will explain you more
Instagram id rinkugujjar07
Skills: Information Security, SOC 2 Report, ISO 27001, Governance, Risk Management & Compliance, Compliance, Information Security Audit, Data Privacy, NIST SP 800-53, GDPR, HIPAA, NIST Cybersecurity Framework, Security Framework, Microsoft SQL Server, Risk Management, CMMC
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
Cyber security/Malware specialist
40 - 70 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
1 jobs posted
no reviews
IN India
Risky
1) Restoring the site and removing malware
2) Re-verifying with Google and addressing any
flagged issues
3) Hardening the site security
4) Providing a clean backup and handover
Skills: Firewall, Internet Security, Security Analysis, Vulnerability Assessment, Information Security, Network Security
Hourly rate: 40 - 70 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Penetration Tester & Information Security Engineer
10 USD 1 day ago
Client Rank - Medium

Payment method verified
$270 total spent
5 hires
6 jobs posted
83% hire rate,
5.00 of 4 reviews
PK Pakistan
Medium
We're looking for an experienced Penetration Tester and Information security engineer to assess our infrastructure, identify vulnerabilities, and help design a more secure network architecture. The ideal candidate should be skilled in conducting thorough penetration tests (web apps, internal/external networks), analyzing risk, and recommending effective security measures. Experience with firewalls, IDS/IPS, VPNs, and cloud security (AWS/Azure) is a plus.

Key Tasks:
Perform comprehensive penetration testing
Identify and document security vulnerabilities
Review and improve current network architecture
Recommend and help implement best-practice security controls
Deliver detailed reports with actionable remediation steps

Duration: Short-term (with potential for ongoing work)
Location: Remote
Start: ASAP
Skills: Firewall, Penetration Testing, Information Security, Vulnerability Assessment
Fixed budget: 10 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Help Me Investigate and Report a WhatsApp Scammer (Cyber Investigation Support)
not specified 1 day ago
Client Rank - Medium

Payment method verified
2 jobs posted
no reviews
MA Morocco
Medium
I need help identifying and documenting information related to a scam I experienced via a messaging platform. I’m looking for someone experienced in cyber investigation or OSINT (Open Source Intelligence) who can:

Conduct legal, ethical research on a phone number or account used by the scammer

Help compile evidence to report the scam to appropriate authorities

Provide guidance on steps I can take to protect myself and possibly recover losses

Please note: I am not asking for hacking, tracking, or illegal services — only lawful research and advice.
Skills: Information Security, Network Security, Technical Support, Encryption, Vulnerability Assessment, Security Analysis, English, Python
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
Fractional CISO (SOC 2 / ISO 27001) – AI-Compliance SaaS
8 - 140 USD / hr
1 day ago
Client Rank - Good

Payment method verified
$9 432 total spent
15 hires
7 jobs posted
100% hire rate,
5.00 of 7 reviews
GB United Kingdom
Good
Fractional CISO (SOC 2, ISO 27001)
Startup building an audit-grade provenance layer for AI-generated content. We need a part-time security/compliance lead.
Must-have experience
Led or co-led at least one SOC 2 Type II or ISO 27001 audit.

Familiar with AWS Object-Lock, KMS rotation, CloudTrail log integrity.

Understand upcoming EU AI-Act disclosure & traceability requirements.
Screening – please answer
Share one SOC 2 or ISO 27001 control matrix (redacted is fine) you authored.

Describe briefly how you’ve assured immutable log integrity on AWS (Object-Lock, Glacier Vault Lock, etc.).

Confirm hourly rate & availability (GMT overlap ok?).

Upwork NDA required before deeper product details.
Skills: ISO 27001, SOC 2, Information Security, Risk Management, Cloud Security
Hourly rate: 8 - 140 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Instagram account recovery
not specified 22 hours ago
Client Rank - Risky

Payment method not verified
no reviews
TT Trinidad and Tobago
Risky
My Instagram account was hacked 48 hours ago and I am trying to retrieve it . They would’ve turned on two factor authentication and I do not have any photos of myself on that account to use their selfie recover
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget: not specified
22 hours ago
  • Customer Service, Customer Experience & Tech Support
Ethical cyber support
not specified 19 hours ago
Client Rank - Risky

Payment method not verified
no reviews
AE United Arab Emirates
Risky
Hello,

I am writing to request your professional assistance regarding a case of online abuse I am facing.

A group of Fake ID's has been posting abusive/harassing comments against me during YouTube Live sessions of some you tubers.I would like to understand if it is possible to find out the,
Collect technical evidence (e.g., metadata, screenshots, usernames)
Identify or trace the person within legal limit
I am seeking only ethical support from you so that its easy for me to bring the culprits in front of law.
Please let me know if you are able to assist in such a matter and what the process or consultation fee would be.Thank you for your time and consideration.
Thank you
Rosy
Skills: Security Assessment & Testing, Security Testing, Ethical Hacking, Internet Security, Network Penetration Testing, Penetration Testing, Website Security, Information Security Consultation, Network Security, System Security, Vulnerability Assessment, Information Security, Malware Removal
Budget: not specified
19 hours ago
  • IT & Networking, Information Security & Compliance
Social Media Recovery
20 - 50 USD / hr
14 hours ago
Client Rank - Risky

Payment method not verified
no reviews
MY Malaysia
Risky
I am looking for someone who can help me for social media recovery. I need to gather it as fast as possible.
Skills: Penetration Testing, Network Security, Information Security, Internet Security, Data Mining, Ethical Hacking, Growth Hacking, HackerRank, Wireshark, Facebook, WhatsApp, Twitter/X, Snapchat, Gmail, Recover Data Recovery Software
Hourly rate: 20 - 50 USD
14 hours ago
  • IT & Networking, Information Security & Compliance
Penetration Testing Report Writer for HackTheBox
not specified 13 hours ago
Client Rank - Risky

Payment method not verified
no reviews
US United States
Risky
We are seeking a skilled professional to create a comprehensive penetration testing report based on HackTheBox challenges. The ideal candidate will possess a strong understanding of penetration testing methodologies and the ability to document findings in a clear and concise manner. The report should detail vulnerabilities identified, exploitation techniques used, and recommend remediation strategies. Previous experience in cybersecurity reporting is essential. If you are adept at translating technical information into actionable insights, we want to hear from you!
Skills: Information Security, Vulnerability Assessment, Security Analysis, Penetration Testing, Report Writing
Budget: not specified
13 hours ago
  • IT & Networking, Information Security & Compliance
Research and development
not specified 12 hours ago
Client Rank - Risky

Payment method not verified
no reviews
IN India
Risky
We are looking for some research and development of a dashboard wherein we can monitor certain activities. It will be great to hear from you.
Skills: Network Security, Vulnerability Assessment, Penetration Testing, Information Security, Internet Security, Security Analysis, Software QA, Network Penetration Testing, Website Security, Web Application Security, Information Security Audit, Web Testing
Budget: not specified
12 hours ago
  • IT & Networking, Information Security & Compliance
Snapchat hack
not specified 12 hours ago
Client Rank - Risky

Payment method not verified
no reviews
AU Australia
Risky
hello. i want to see all my gf chats to check if she is cheating on me. i have a doubt on her
Skills: Cloudflare, Kali Linux, Microsoft Azure, Security Testing, Vulnerability Assessment, Application Security, Security Analysis, Penetration Testing, Amazon Web Services, Information Security, Web App Penetration Testing, Security Assessment & Testing, Security Infrastructure, Information Security Consultation
Budget: not specified
12 hours ago
  • IT & Networking, Information Security & Compliance
Lead MuleSoft Consultant - REMOTE
7 - 10 USD / hr
11 hours ago
Client Rank - Medium

Payment method verified
53 jobs posted
no reviews
IN India
Medium
Role: Lead Engineer - Senior Consultant
Location: REMOTE
Budget: Rs 1,50,000 per month (No Deductions)

Skills – Mandatory: Java, Python, Java Script, Azure , MuleSoft
Total Experience: 15+ years

Job Description
▪ Expertise in Azure services including App Services, Functions, DevOps pipelines and ADF
▪ Expert-level knowledge of MuleSoft Anypoint Platform, API lifecycle management, and enterprise integration
▪ Proven skills in Java-based web applications with RDBMS or NoSQL backends
▪ Proven skills in Python and JavaScript for backend and full-stack solutions
▪ Deep understanding of object-oriented programming and design patterns
▪ Solid hands-on experience with RESTful API development and microservices architecture
▪ Familiarity with unit testing frameworks (e.g., TestNG) and integration testing in Java
▪ Experience with code review processes, test coverage validation, and CI/CD pipelines
▪ Proficiency in Git, SVN, and other version control systems
▪ Comfortable working with static code analysis tools and agile methodologies
▪ Good knowledge of JIRA, Confluence, and project collaboration tools
▪ Strong communication skills and ability to mentor team members
▪ Ability to prepare detailed technical documentation and design specifications
▪ Passion for clean code, best practices, and scalable architecture
▪ Nice to have: experience with identity providers like Auth0, Keycloak, IdentityServer
▪ Adhere to the Information Security Management policies and procedures.

Duties and Responsibilities:
▪ Take ownership of tasks and user stories; provide accurate estimations
▪ Provide technically sound advice/decisions on how to develop functionality to implement client’s business logic in software systems
▪ Lead sprint activities, including task management and code reviews
▪ Design and implement secure, scalable, and maintainable solutions
▪ Conduct technical discovery and performance analysis of critical systems
▪ Write low-level design and as-built documents
▪ Translate business requirements into technical specifications and working code
▪ Develop and maintain unit, integration, and regression test cases
▪ Ensure adherence to TDD and promote high code coverage
▪ Integrate multiple data sources and systems with dissimilar structures
▪ Contribute to overall system design with focus on security and resilience
▪ Use static code analysis tools and set up CI/CD pipelines
▪ Participate in Agile ceremonies: grooming, planning, stand-ups, and retrospectives
▪ Collaborate with technical architects on solution design
▪ Mentor junior team members on coding standards, sprint tasks, and technology
▪ Troubleshoot, test, and optimize core software and databases
▪ Stay updated with industry trends and promote best practices within the team
▪ Identify challenges, initiate PoCs, and perform feasibility studies
Skills: Java, Python, Microsoft Azure, Mulesoft, Azure App Service, DevOps, REST API
Hourly rate: 7 - 10 USD
11 hours ago
  • IT & Networking, DevOps & Solutions Architecture
Migrate Fully Hosted System from AWS to Azure | Cloud Migration Expert Needed
not specified 7 hours ago
Client Rank - Risky

Payment method not verified
no reviews
FR France
Risky
Looking for an expert to migrate a full system from AWS to Azure. Must understand AWS–Azure service mapping, set up secure architecture, and optimize for cost. Minimal downtime required.

Requirements:
Proven AWS to Azure migration experience
Security setup and best practices
Cost optimization skills
Clear communication
Ability to work seamlessly with the rest of the offshore development in Sri Lanka
Skills: Computing & Networking, DevOps, Problem Solving, Information Security, Azure DevOps, Microsoft Azure, AWS CloudFormation, Cloud Architecture, Kubernetes, Docker, System Administration, Linux, Ansible, Python, System Automation, Git, CI/CD, Deployment Automation
Budget: not specified
7 hours ago
  • IT & Networking, DevOps & Solutions Architecture
Security Consultant for SaaS Start Up
40 - 50 USD / hr
7 hours ago
Client Rank - Medium

Payment method verified
2 jobs posted
no reviews
US United States
Medium
What You’ll Do:

Security Strategy and Implementation: Develop and implement a comprehensive security strategy to protect SaaS systems, data, and applications, aligning with industry best practices and regulatory requirements.

Cloud Security Management: Design, implement, and manage security controls within our cloud environments (e.g., Azure), ensuring the secure deployment and operation of our AI solutions.

Compliance and Certification: Lead and manage security compliance efforts, including achieving and maintaining certifications such as SOC2, GDPR, and ISO 27001.

Security Best Practices: Drive the adoption of security best practices across all areas of the organization, including application development, infrastructure management, and data handling.

Vulnerability and Threat Management: Proactively identify, assess, and mitigate security vulnerabilities and threats, utilizing security tools and technologies.

Incident Response: Develop and execute incident response plans to effectively detect, contain, and recover from security incidents, minimizing impact and ensuring business continuity.

Security Monitoring and Analysis: Implement and manage security monitoring systems to detect and analyze security events, providing timely alerts and reports.

Security Architecture and Design: Contribute to the design and implementation of secure system architectures, ensuring that security is integrated into all phases of the development lifecycle.

Security Awareness and Training: Promote a security-conscious culture by developing and delivering security awareness training programs for employees.

Collaboration and Communication: Work closely with engineering, product, and other teams to integrate security considerations into their workflows and provide expert security guidance.

Experience working with Azure cloud platform, Office 365, endpoint management (preferably Intune) solutions, DevSecOps, Infra-as-Code and security monitoring solutions like Defender or Sentinel, DLP.

Deep understanding of IT security principles, practices, and technologies, including network security, system security, application security, and data security.

Extensive experience securing cloud environments (preferably Azure), including identity and access management, network security, and data protection.

Solid understanding of security compliance frameworks and standards (SOC2, GDPR, ISO 27001) and experience in leading or supporting compliance audits.

Experience with security tools and technologies, such as SIEM, intrusion detection/prevention systems, vulnerability scanners, and firewalls.
Skills: Information Security, Incident Response Plan, Cloud Security, Cybersecurity Monitoring
Hourly rate: 40 - 50 USD
7 hours ago
  • IT & Networking, Information Security & Compliance
Data Protection & Information Security Officer
20 - 999 USD / hr
7 hours ago
Client Rank - Medium

Payment method verified
24 jobs posted
no reviews
IT Italy
Medium
We're an AI SaaS startup preparing for launch, handling personal data and committed to GDPR and ISO 27001 compliance. We're looking for an experienced professional to lead our privacy and security efforts.

Responsibilities:

Ensure GDPR and ISO 27001 compliance across our systems and processes
Manage ISMS policies, audits, and risk assessments
Handle DPIAs and act as DPO
Advise on security for our cloud infrastructure (DigitalOcean)
Requirements:

Experience with GDPR and ISO 27001
Strong understanding of cloud security
Certifications like CIPP/E or ISO 27001 Lead Implementer are a plus
Skills: Encryption, Information Security, GDPR Compliance Review, ISO 27001, Security Analysis, Vulnerability Assessment, Penetration Testing, Internet Security
Hourly rate: 20 - 999 USD
7 hours ago
  • IT & Networking, Information Security & Compliance
Expert Securitate Cibernetică (Cybersecurity Specialist – Public Sector Platform)
30 - 50 USD / hr
6 hours ago
Client Rank - Medium

Payment method verified
$400 total spent
2 hires
5 jobs posted
40% hire rate,
no reviews
RO Romania
Medium
Expert Securitate Cibernetică (Cybersecurity Specialist – Public Sector Platform)
Căutăm un expert în securitate cibernetică care să evalueze, configureze și mențină măsurile de protecție pentru o platformă digitală destinată administrației publice.

Responsabilități:
- Configurare politici de securitate (acces, criptare, jurnale, autentificare)
- Audit intern de securitate, recomandări privind GDPR, NIS2, eIDAS
- Colaborare cu arhitectul și dezvoltatorii pentru implementări sigure

Cerințe:
- Experiență :la nivel de minim 6 contracte
- Cunoștințe despre SSO, MFA, firewall, backup, protecție date personale
Skills: Information Security
Hourly rate: 30 - 50 USD
6 hours ago
  • IT & Networking, Information Security & Compliance
Tutor needed for cybersecurity exam prep (CompTIA Security +)
10 - 15 USD / hr
6 hours ago
Client Rank - Good

Payment method verified
$727 total spent
19 hires
22 jobs posted
86% hire rate,
5.00 of 10 reviews
US United States
Good
Tutor needed for preparation for the CompTIA Security + 701 exam.
Skills: Network Security, Information Security, Vulnerability Assessment, Security Analysis, Encryption, Firewall
Hourly rate: 10 - 15 USD
6 hours ago
  • IT & Networking, Information Security & Compliance
IT specialists, users of antivirus products.
50 - 100 USD / hr
5 hours ago
Client Rank - Excellent

Payment method verified
$16 988 total spent
73 hires
69 jobs posted
100% hire rate,
4.98 of 53 reviews
DE Germany
Excellent
We are looking for IT specialists who:

-Work with antivirus solutions in their daily activities (such as system administrators, technical support, cybersecurity specialists, CIOs, and others);
-Use specific antivirus software regularly in their companies;
-Work in companies of any size (small, medium, or large) located in Saudi Arabia.
If you work in IT and use antivirus solutions in your role, we invite you to participate in our project.

Your participation will help us improve cybersecurity solutions from a well-known vendor for IT professionals.

To participate in the study, please answer the screening questions.

MORE DETAILS ABOUT WHO WE ARE LOOKING FOR:
1. We need IT specialists working with different antivirus products. This can include system administrators, technical support, cybersecurity specialists, CIOs, and others who are involved in the setup, configuration and regular use of antivirus products.
2. IT specialist working in a company with more than 100 employees.
3. Employees who can confirm their place of work and company name.


The format of participation is remote, by filling out the survey. You can start the survey on any day and complete it within approximately a week. The total duration is 45 minutes. The survey will be available in both English and Arabic, and you can choose the language in which to complete it. The majority of the questions will be closed-ended (e.g., ratings from 1 to 10). There will also be up to 10 open-ended questions where you will need to provide detailed answers.




*Filling out the short questionnaire is required before we will invite you to participate.
Skills: Information Security, English, Antivirus & Security Software, Security Infrastructure, Technical Support, SOC 2, Security Engineering, System Administration
Hourly rate: 50 - 100 USD
5 hours ago
  • IT & Networking, Information Security & Compliance
IT specialists, users of antivirus products.
50 - 100 USD / hr
5 hours ago
Client Rank - Excellent

Payment method verified
$16 988 total spent
73 hires
69 jobs posted
100% hire rate,
4.98 of 53 reviews
DE Germany
Excellent
We are looking for IT specialists who:

-Work with antivirus solutions in their daily activities (such as system administrators, technical support, cybersecurity specialists, CIOs, and others);
-Use specific antivirus software regularly in their companies;
-Work in companies of any size (small, medium, or large) located in Saudi Arabia.
If you work in IT and use antivirus solutions in your role, we invite you to participate in our project.

Your participation will help us improve cybersecurity solutions from a well-known vendor for IT professionals.

To participate in the study, please answer the screening questions.

MORE DETAILS ABOUT WHO WE ARE LOOKING FOR:
1. We need IT specialists working with different antivirus products. This can include system administrators, technical support, cybersecurity specialists, CIOs, and others who are involved in the setup, configuration and regular use of antivirus products.
2. IT specialist working in a company with more than 100 employees.
3. Employees who can confirm their place of work and company name.


The format of participation is remote, by filling out the survey. You can start the survey on any day and complete it within approximately a week. The total duration is 45 minutes. The survey will be available in both English and Arabic, and you can choose the language in which to complete it. The majority of the questions will be closed-ended (e.g., ratings from 1 to 10). There will also be up to 10 open-ended questions where you will need to provide detailed answers.




*Filling out the short questionnaire is required before we will invite you to participate.
Skills: Information Security, English, Antivirus & Security Software, Security Infrastructure, Technical Support, SOC 2, Security Engineering, System Administration
Hourly rate: 50 - 100 USD
5 hours ago
  • IT & Networking, Information Security & Compliance
Azure AD & Microsoft 365 Security Configuration and Optimization
not specified 5 hours ago
Client Rank - Risky

Payment method not verified
no reviews
PT Portugal
Risky
We are seeking a highly qualified professional to assist with the configuration, review, and optimization of our Microsoft Azure and Office 365 environments, with a strong focus on security and compliance.

**Scope of Work:**
- Audit and improve current Azure AD configuration
- Implement security best practices in Microsoft 365
- Configure Conditional Access, MFA, and compliance policies
- Review Intune policies and device compliance
- Assist with role-based access control (RBAC) and identity governance
- Provide documentation and recommendations for long-term management

**Our Expectations:**
- Proven experience with Microsoft Azure, Intune, and Office 365 security features
- Excellent communication skills and ability to explain complex configurations clearly
- Ability to work independently and deliver results within a short timeframe
- Proactive, detail-oriented, and trustworthy

**Deliverables:**
- Updated and secure configuration for Azure and O365
- Documentation outlining implemented changes and suggestions
- One follow-up session to clarify or adjust settings, if needed

We are a small but growing organization looking for someone who can not only deliver technical expertise, but also become a trusted advisor as we scale our digital infrastructure securely.

Looking forward to working with a dedicated and skilled professional!
Skills: Solution Architecture Consultation, Cloud Implementation, Information Security, Cloud Security, Microsoft Endpoint Manager, Mobile Device Management, Security Analysis, Risk Assessment, Cloud Engineering Consultation, Microsoft Azure, Office 365, Email Security, Microsoft Exchange Online, Spam Filter
Budget: not specified
5 hours ago
  • IT & Networking, Network & System Administration
UI Design of of state of the art network discovery and systems management tool for cyber security
20 - 40 USD / hr
4 hours ago
Client Rank - Excellent

Payment method verified
$43 996 total spent
15 hires
12 jobs posted
100% hire rate,
4.98 of 8 reviews
US United States
Excellent
Looking for someone to help build a state of the art application security platform using open source IDS, SIEM and firewall tools for threat and intrusion detection and response management. Candidates should have an advanced degree in computer science or related discipline and direct experience building and/or customizing open source cyber security tools in a Linux environment.
Skills: Web Design, Information Security, Figma, User Interface Design, Graphic Design
Hourly rate: 20 - 40 USD
4 hours ago
  • IT & Networking, Information Security & Compliance
Ethical Hacker and Cybersecurity Specialist Needed
100 - 250 USD / hr
3 hours ago
Client Rank - Risky

Payment method not verified
no reviews
IN India
Risky
We are seeking an experienced ethical hacker and cybersecurity expert to help identify vulnerabilities in our systems and protect our data. The ideal candidate will conduct penetration testing, assess security protocols, and provide actionable recommendations for improvement. Your expertise will play a vital role in ensuring the safety of our digital assets and compliance with industry standards. If you have a background in ethical hacking, risk assessment, and threat analysis, we want to hear from you!
Skills: Encryption, Information Security, Ethical Hacking, Security Analysis, Kali Linux, Network Security
Hourly rate: 100 - 250 USD
3 hours ago
  • IT & Networking, Information Security & Compliance
Ethical Hacker Needed for Vulnerability Assessment
50 - 150 USD / hr
3 hours ago
Client Rank - Risky

Payment method not verified
no reviews
IN India
Risky
We are seeking an Ethical Hacker to conduct a comprehensive penetration test on our web applications and infrastructure. The ideal candidate will have a strong understanding of cybersecurity principles and experience in identifying, exploiting, and reporting vulnerabilities. You will be responsible for providing actionable insights to improve our security posture. If you have a passion for ethical hacking and a track record of successful assessments, we want to hear from you!
Skills: Kali Linux, Ethical Hacking, Information Security, Network Security
Hourly rate: 50 - 150 USD
3 hours ago
  • IT & Networking, Information Security & Compliance
Instagram account got hacked
not specified 2 hours ago
Client Rank - Risky

Payment method not verified
no reviews
GB United Kingdom
Risky
My instagram account got hacked want to talk about it to recover or to permanently delete it
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget: not specified
2 hours ago
  • Customer Service, Customer Experience & Tech Support
Office 365 Administrator
not specified 20 minutes ago
Client Rank - Good

Payment method verified
$6 394 total spent
3 hires
3 jobs posted
100% hire rate,
4.99 of 3 reviews
US United States
Good
We need some help to clean up our Office 365 implementation and to help us better secure it as well. I'd also like some help to set up SSO using our Microsoft credentials with third party platforms.
Skills: Microsoft Active Directory, Microsoft Exchange Server, Windows Administration, Microsoft Azure, Active Directory Federation Services, Microsoft Windows PowerShell, System Security, Office 365, Microsoft 365 Copilot, Security Infrastructure, Vulnerability Assessment, Information Security, Security Analysis, Mobile Device Management, Data Migration
Budget: not specified
20 minutes ago
  • IT & Networking, DevOps & Solutions Architecture
Cyber Security Support Needed After Hacking Incident
40 - 70 USD / hr
3 minutes ago
Client Rank - Risky

Payment method not verified
no reviews
DE Germany
Risky
I am seeking a knowledgeable cyber security expert to assist me in addressing a recent hacking incident. The ideal candidate will provide guidance on immediate steps to secure my systems, assess the damage, and recommend long-term solutions to prevent future breaches. Your expertise is crucial in navigating this troubling situation and ensuring my digital safety. If you have a strong background in cyber security, incident response, and risk management, I would love to hear from you.
Skills: Encryption, Information Security, Vulnerability Assessment, Network Security, Firewall
Hourly rate: 40 - 70 USD
3 minutes ago
  • IT & Networking, Information Security & Compliance
Call to action
Freelancing is a business
Make it more profitable with Vollna

Streamline your Upwork workflow and boost your earnings with our smart job search and filtering tools. Find better clients and land more contracts.