Job Title | Budget | ||||
---|---|---|---|---|---|
GRC Expert required
|
20 - 50 USD
/ hr
|
1 day ago |
Client Rank
- Risky
1 jobs posted
open job
|
||
Job Title:
Cybersecurity & IT Assurance Expert (NIST CSF 2.0 / ISO 27001 / GRC Tools) --- Project Overview: We are a growing UK-based Managed Service Provider (MSP) working towards aligning our internal processes and customer assessments with NIST Cybersecurity Framework 2.0 and ISO 27001. We use tools such as Compliance Manager GRC and Network Detective to support our assessments and reporting. We’re looking for a cybersecurity and IT assurance professional to help us build and improve our compliance offering, assess customer environments, and produce clear, professional reports that align with cybersecurity frameworks. --- Scope of Work: 1. Customer Environment Assessment Review discovery data from tools like Network Detective and Compliance Manager GRC. Identify gaps and risks aligned with NIST CSF 2.0 and ISO 27001. Create or enhance client-facing reports using a risk-based RAG format. 2. Framework Mapping Map existing evidence and controls against relevant cybersecurity frameworks. Provide input into our internal asset management, access control, and incident response policies. 3. Report Writing Draft clear and concise audit findings, executive summaries, and remediation recommendations. Tailor reports for technical and non-technical audiences (including business leadership). 4. Internal Guidance & Advisory Advise on control improvement and audit readiness. Suggest improvements to our reporting templates and assessment workflow. --- Ideal Candidate: Strong knowledge of NIST CSF 2.0, ISO 27001, Cyber Essentials, or similar frameworks. Experience conducting IT audits, risk assessments, or gap analyses. Ability to work with data from tools like Compliance Manager GRC, Network Detective, or similar platforms. Strong English writing skills — clear, structured, and professional. Comfortable working with a remote UK-based team. Bonus: Experience working with MSPs or small-medium businesses. --- Project Duration & Hours: Initial project: 2–4 weeks of part-time work (~10–15 hours/week). Potential for long-term collaboration on audits and reporting work. --- To Apply: Please include: A brief summary of your experience with NIST CSF, ISO 27001, or IT audits. An example of a report or project you've completed (you may redact sensitive info). Availability and hourly rate.
Skills: Information Security, Cybersecurity Management, Incident Response Plan, Security Policies & Procedures Documentation
Hourly rate:
20 - 50 USD
1 day ago
|
|||||
Cloud Security Analyst Needed for Comprehensive Security Assessment
|
20 - 50 USD
/ hr
|
1 day ago |
Client Rank
- Risky
|
||
We are seeking a skilled Cloud Security Analyst to conduct a thorough assessment of our cloud infrastructure. The ideal candidate will evaluate security measures, identify vulnerabilities, and recommend best practices to enhance our cloud security posture. You will work closely with our IT team to ensure compliance with industry standards and regulations. Familiarity with various cloud platforms and security tools is essential. If you have a passion for cloud security and the skills to back it up, we want to hear from you!
Skills: Vulnerability Assessment, Information Security, Penetration Testing, Security Analysis, Network Security
Hourly rate:
20 - 50 USD
1 day ago
|
|||||
Workspace set up
|
not specified | 1 day ago |
Client Rank
- Excellent
$12 436 total spent
8 hires
8 jobs posted
100% hire rate,
open job
4.98
of 6 reviews
|
||
Only freelancers located in the U.S. may apply.
I have a personal Gmail and want to make it into a business workspace email. I have a business domain and it is associated with emails in my company but I want to keep my Gmail separate from my domain emails. I found out my personal Gmail has limitations to my business ads, analytics, tags etc. for tracking. I want to hire someone to help set up the best way to connect my personal Gmail to my business with out it interfering with my already configured set up. I think, i want to sign up for a workspace account so I can tie everything togeher.
Skills: DNS, System Administration, Microsoft Windows, Google Cloud Platform, Customer Service, Data Migration, Single Sign-On, Information Security, Computer Skills, Domain Migration, Cloud Computing, Google, Cloud Security, Backup & Migration, Email Communication
Budget:
not specified
1 day ago
|
|||||
Ruder Cyber Tech Sleuths: Your Trusted Partner for Cryptocurrency Asset Recovery.
|
50 - 80 USD
/ hr
|
1 day ago |
Client Rank
- Risky
|
||
Welcome to RUDER CYBER TECH SLEUTHS . We are a team of brilliant hackers Welcome to RUDER CYBER TECH SLEUTHS! We are a dedicated team of skilled hackers available 24/7 to assist you. Our range of services is extensive, and our process is straightforward, ensuring a smooth experience for every client.
You can hire a hacker for various needs, including: - Crypto scam recovery - Social media account hacks - Email and phone hacks - Credit score improvement - Academic score upgrades - Monitoring your partner's activities Feel free to reach out to us for more details, and we will be happy to help you resolve your issues. Our team consists of professionals with experience from high-profile digital security firms, bringing over 25 years of expertise to meet your needs. Tele gram : @rudercybersleuths
Skills: Information Security, Vulnerability Assessment, Encryption, Security Analysis, Network Security
Hourly rate:
50 - 80 USD
1 day ago
|
|||||
Urgent Security Investigation Required
|
25 - 50 USD
/ hr
|
1 day ago |
Client Rank
- Risky
|
||
I am seeking a professional to conduct a security investigation regarding potential safety issues related to my wife's phone. It's imperative that this task is handled discreetly and ethically to ensure the well-being of all parties involved. The goal is to assess any vulnerabilities and gather information that may help in addressing serious concerns. If you have experience in digital forensics, cybersecurity, or related fields, please reach out with your qualifications and approach to resolving this matter responsibly.
Skills: Penetration Testing, Information Security, Vulnerability Assessment, Firewall, Network Security
Hourly rate:
25 - 50 USD
1 day ago
|
|||||
Regain access
|
not specified | 1 day ago |
Client Rank
- Risky
|
||
Hello!
I need help regaining access to accounts, which have been hacked. This includes social media and emails etc. please contact me at your soonest convenience. Thanks, Brittany L
Skills: Information Security, WordPress Malware Removal, Internet Security, Ethical Hacking, Bitcoin, Network Security, Security Testing, OWASP, Malware Removal, Blockchain, Web Application Security, Website Security, WordPress, Penetration Testing, Cryptocurrency
Budget:
not specified
1 day ago
|
|||||
VAPT and Security Compliance Support(CERT-IN Empanelled Vendor Required) -- 2
|
~5 - 9 USD
/ hr
|
1 day ago |
Client Rank
- Excellent
$185 097 total spent
189 hires
, 33 active
6 open job
4.99
of 11 reviews
Registered at: 07/01/2019
|
||
Project Overview
We are seeking the services of a CERT-IN empanelled cybersecurity vendor or professional to carry out a Vulnerability Assessment and Penetration Testing (VAPT) and assist in completing mandatory client security compliance questionnaires. This engagement is crucial for vendor onboarding with major corporate clients and insurance partners. Scope of Work: 1. Vulnerability Assessment & Penetration Testing (VAPT): o Perform comprehensive internal and external VAPT of our infrastructure, including web applications, APIs, servers, and endpoints. o Assess network and application layer vulnerabilities. o Provide a detailed report including: Risk categorization (High/Medium/Low) Technical findings with evidence (screenshots, logs) Suggested remediation Final re-validation report after fixes 2. Compliance Documentation Support: o Assist in completing two client security assessments: “Partner Onboarding – Security Parameters of Client Environment” “Digit – Vendor Self Assessment Questionnaire” o Align responses with industry best practices and regulatory standards (ISO 27001, NIST, CERT-IN). o Provide documented evidence such as: Information Security Policy Secure configuration baselines Data classification and protection policies Business continuity and disaster recovery plans Access control and monitoring procedures 3. Evaluation & Risk Score Optimization: o Understand the evaluation matrix and risk scoring methodology used by clients. o Recommend corrective actions to improve security posture and compliance scores. o Ensure documentation is audit-ready and presentable. Mandatory Requirement: • The selected professional must be a CERT-IN empanelled vendor or work in association with one. Proof of empanelment will be required. Deliverables: • Initial and Final VAPT Reports • Completed security assessment questionnaires • Supporting documentation (security policies, technical artifacts) • Advisory notes on risk mitigation and compliance readiness Required Skills: • Vulnerability Assessment & Penetration Testing (VAPT) • Experience with CERT-IN standards and compliance • Security Questionnaire Handling & Audit Documentation • Knowledge of ISO 27001, NIST, and Indian IT Act compliance • Network Security & Web Application Security Testing • Firewall, IDS/IPS, and Endpoint Security Assessment • Report Writing – Technical and Non-Technical (Audit-ready) • Risk Analysis & Mitigation Planning • Incident Response and Business Continuity Knowledge • Familiarity with tools like Burp Suite, Nmap, Nessus, OWASP ZAP, Metasploit • Certifications (preferred): CEH, OSCP, CISSP, CISA Timeline: • Kickoff: Immediate • Duration: 2-3 weeks (negotiable based on availability and scope) Budget: • Please quote your fixed price for the complete engagement or hourly rate. • Attach sample VAPT reports or redacted past project documentation, if available. Skills: Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Hourly rate:
400 - 750 INR
1 day ago
|
|||||
VAPT and Security Compliance Support(CERT-IN Empanelled Vendor Required)
|
~5 - 9 USD
/ hr
|
1 day ago |
Client Rank
- Excellent
$185 097 total spent
189 hires
, 33 active
6 open job
4.99
of 11 reviews
Registered at: 07/01/2019
|
||
Project Overview We are seeking the services of a CERT-IN empanelled cybersecurity vendor or professional to carry out a Vulnerability Assessment and Penetration Testing (VAPT) and assist in completing mandatory client security compliance questionnaires. This engagement is crucial for vendor onboarding with major corporate clients and insurance partners. Scope of Work: 1. Vulnerability Assessment & Penetration Testing (VAPT): o Perform comprehensive internal and external VAPT of our infrastructure, including web applications, APIs, servers, and endpoints. o Assess network and application layer vulnerabilities. o Provide a detailed report including: Risk categorization (High/Medium/Low) Technical findings with evidence (screenshots, logs) Suggested remediation Final re-validation report after fixes 2. Compliance Documentation Support: o Assist in completing two client security assessments: “Partner Onboarding – Security Parameters of Client Environment” “Digit – Vendor Self Assessment Questionnaire” o Align responses with industry best practices and regulatory standards (ISO 27001, NIST, CERT-IN). o Provide documented evidence such as: Information Security Policy Secure configuration baselines Data classification and protection policies Business continuity and disaster recovery plans Access control and monitoring procedures 3. Evaluation & Risk Score Optimization: o Understand the evaluation matrix and risk scoring methodology used by clients. o Recommend corrective actions to improve security posture and compliance scores. o Ensure documentation is audit-ready and presentable. Mandatory Requirement: • The selected professional must be a CERT-IN empanelled vendor or work in association with one. Proof of empanelment will be required. Deliverables: • Initial and Final VAPT Reports • Completed security assessment questionnaires • Supporting documentation (security policies, technical artifacts) • Advisory notes on risk mitigation and compliance readiness Required Skills: • Vulnerability Assessment & Penetration Testing (VAPT) • Experience with CERT-IN standards and compliance • Security Questionnaire Handling & Audit Documentation • Knowledge of ISO 27001, NIST, and Indian IT Act compliance • Network Security & Web Application Security Testing • Firewall, IDS/IPS, and Endpoint Security Assessment • Report Writing – Technical and Non-Technical (Audit-ready) • Risk Analysis & Mitigation Planning • Incident Response and Business Continuity Knowledge • Familiarity with tools like Burp Suite, Nmap, Nessus, OWASP ZAP, Metasploit • Certifications (preferred): CEH, OSCP, CISSP, CISA Timeline: • Kickoff: Immediate • Duration: 2-3 weeks (negotiable based on availability and scope) Budget: • Please quote your fixed price for the complete engagement or hourly rate. • Attach sample VAPT reports or redacted past project documentation, if available. Skills: Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Hourly rate:
400 - 750 INR
1 day ago
|
|||||
Instagram Account Security Consultant
|
30 USD | 1 day ago |
Client Rank
- Risky
|
||
We are seeking a skilled Instagram security consultant to assess and enhance the security of our Instagram account. The ideal candidate will have experience with ethical hacking, vulnerability assessment, and social media security protocols. Your responsibilities will include identifying potential security threats, providing recommendations for account protection, and ensuring our sensitive information remains secure. If you have a strong background in social media security and a passion for protecting online assets, we want to hear from you!
Skills: Information Security, Penetration Testing, Internet Security, Ethical Hacking, Instagram
Fixed budget:
30 USD
1 day ago
|
|||||
Instagram y Facebook hackeado e inhabilitado
|
100 USD | 1 day ago |
Client Rank
- Medium
1 jobs posted
open job
|
||
Hola, me pongo en contacto con usted porque me gustaría obtener más información sobre sus servicios. Me hackearon e inhabilitaron la cuenta de Instagram y Facebook.
Estoy buscando a alguien serio, experto y cualificado que sepa recuperar cuentas hackeadas o inhabilitadas. En el mes de marzo me hackearon la cuenta de Instagram a través de Facebook, alguien entró desde el Facebook y vinculó una cuenta ajena dentro de mi perfil de Facebook y siguidamente entro en mi Instagram lo hackeo las dos cuenta, ahora mismo no puedo acceder a ninguna de mis redes sociales, intente por formulario, email, teléfono, por las plataformas de Instagram y Facebook pero no consigo acceder. Adjunto algunas capturas para que veas y valores el caso, la cuenta @kmaria_drzdx5208 no es mi cuenta, es la que me ha hackeado el Facebook e Instagram. Si crees que es posible recuperarlas, no dudes en ponerte en contacto conmigo para poder hablar y llegar a un acuerdo. Quedo pendiente para cualquir cosa. Un saludo y gracias. Joe
Skills: Information Security, Ethical Hacking, Facebook, Penetration Testing, Network Security, Data Recovery, Instagram, Internet Security, Recover Data Recovery Software, HackerRank
Fixed budget:
100 USD
1 day ago
|
|||||
iOS Forensics Expert Needed to Investigate Possible Spyware/Surveillance
|
20 - 50 USD
/ hr
|
23 hours ago |
Client Rank
- Medium
$127 total spent
1 hires
1 jobs posted
100% hire rate,
open job
|
||
I am seeking an experienced iOS cybersecurity or mobile forensics expert to help investigate signs of potential spyware, surveillance, or unauthorized monitoring on a phone.. I need assistance with reviewing and interpreting logs, analyzing any provisioning profiles, background app activity, MDM profiles, certificate trust modifications, etc.
Following the above I need help to secure and reconfigure the device if compromised.
Skills: Digital Forensics, Information Security, Ethical Hacking, Cybersecurity Monitoring, iOS Jailbreaking, iPhone
Hourly rate:
20 - 50 USD
23 hours ago
|
|||||
Systems and Security Director Needed for Integrated Security Solutions
|
40 - 70 USD
/ hr
|
19 hours ago |
Client Rank
- Risky
|
||
We are seeking an experienced Systems and Security Director to oversee the integration and security of our employee systems and POS systems. The ideal candidate will have a proven track record in developing and implementing security strategies, ensuring data protection, and managing system integrations. You will work closely with our IT team to ensure seamless operations while maintaining the highest security standards. If you are diligent, detail-oriented, and have a solid understanding of system security best practices, we would love to hear from you!
Skills: Network Security, Information Security, Vulnerability Assessment, Firewall, Security Analysis
Hourly rate:
40 - 70 USD
19 hours ago
|
|||||
SOC2 Consultant
|
15,000 USD | 19 hours ago |
Client Rank
- Excellent
$161 832 total spent
55 hires
88 jobs posted
63% hire rate,
open job
3.70
of 26 reviews
|
||
SOC2 Consultant needed for Vanta maintenance and compliance efforts
Skills: Information Security, SOC 2, SOC 2 Report, IT Compliance Audit
Fixed budget:
15,000 USD
19 hours ago
|
|||||
Ethical Hacking & Penetration Testing Specialist Needed
|
20 - 150 USD
/ hr
|
19 hours ago |
Client Rank
- Medium
$121 total spent
1 hires
5 jobs posted
20% hire rate,
open job
|
||
We are seeking an experienced ethical hacker to conduct penetration testing and vulnerability assessments for our applications and systems. The ideal candidate should be well-versed in social engineering techniques and have experience with phishing simulations, keyloggers, and brute force attacks. Your insights will help us strengthen our security posture and protect against potential threats. If you have a strong background in cybersecurity and can provide detailed reports on findings and recommendations, we'd love to hear from you.
Skills: Vulnerability Assessment, Penetration Testing, Ethical Hacking, Information Security, Network Security
Hourly rate:
20 - 150 USD
19 hours ago
|
|||||
SOC 2 Compliance Consultant for AWS Implementation
|
20 - 35 USD
/ hr
|
17 hours ago |
Client Rank
- Medium
1 jobs posted
open job
|
||
We are seeking an experienced consultant to assist our organization in achieving SOC 2 compliance specifically within our AWS environment. The ideal candidate will have a deep understanding of SOC 2 requirements and practical experience implementing necessary controls in AWS. You will work closely with our team to assess current practices, identify gaps, and develop a comprehensive compliance strategy tailored to our business needs. Your expertise will be critical in ensuring we meet the necessary standards for security, availability, processing integrity, confidentiality, and privacy.
Skills: Configuration Management, Penetration Testing, PCI DSS, HIPAA, ISO 27001, Information Security, PCI, Vulnerability Assessment, Network Security
Hourly rate:
20 - 35 USD
17 hours ago
|
|||||
TCPA Compliance Subject Matter Expert (SME)
|
20 - 50 USD
/ hr
|
17 hours ago |
Client Rank
- Excellent
$355 975 total spent
50 hires
30 jobs posted
100% hire rate,
open job
4.97
of 27 reviews
|
||
We are seeking a TCPA Compliance Subject Matter Expert (SME) to ensure our website terms, SMS marketing policies, privacy policies, and data collection practices comply with the Telephone Consumer Protection Act (TCPA) and other applicable regulations, including CAN-SPAM.
The ideal candidate has deep experience in regulatory compliance, risk management, and legal frameworks surrounding SMS marketing, website terms of use, and consumer privacy protections. Key Responsibilities: Review & Draft Policies: Develop and update Terms & Conditions, Privacy Policies, and SMS/MMS opt-in/out policies to align with TCPA, CCPA, GDPR, and CAN-SPAM requirements. Compliance Audits: Assess current SMS marketing, website, and data collection processes for legal risks and compliance gaps. Risk Mitigation: Provide recommendations to reduce TCPA-related legal exposure, including best practices for express written consent and automated dialing systems (ATDS) compliance. Regulatory Monitoring: Stay updated on evolving TCPA regulations, FCC rulings, and litigation trends affecting digital marketing, telemarketing, and SMS campaigns. Cross-Functional Collaboration: Partner with marketing, product, and legal teams to ensure all consumer communication strategies comply with TCPA and other privacy laws. Training & Documentation: Develop internal compliance guidelines and conduct training sessions on TCPA best practices. Requirements: Proven Experience: Minimum 3-5 years of expertise in TCPA compliance, privacy law, or regulatory affairs related to marketing and consumer data. Legal & Policy Expertise: Strong knowledge of TCPA, CCPA, CAN-SPAM, GDPR, and related laws affecting SMS, email, and digital marketing. Industry Experience: Prior experience in industries that rely on SMS marketing, telemarketing, lead generation, or digital advertising (e.g., e-commerce, financial services, healthcare, or SaaS). Technical Knowledge: Familiarity with SMS/MMS platforms, auto-dialing technologies, consent tracking, and data privacy frameworks. Attention to Detail: Ability to analyze terms of service, disclosures, and data collection policies to ensure full compliance. Communication Skills: Strong ability to educate internal teams and translate complex legal concepts into clear, actionable policies. Legal Background (Preferred): JD or legal certification in compliance is a plus but not required. Preferred Qualifications: Experience working with SMS platforms (Twilio, EZ Texting, etc.) Knowledge of lead generation regulations and consumer consent frameworks Background in regulatory affairs or corporate legal departments
Skills: Regulatory Compliance, Finance & Accounting, Compliance, Legal, Information Security, Tech & IT
Hourly rate:
20 - 50 USD
17 hours ago
|
|||||
Apple MDM (Mobile Device Management) Consultant – Expert Guidance for MDM Development
|
40 - 70 USD
/ hr
|
17 hours ago |
Client Rank
- Medium
2 jobs posted
open job
|
||
We are developing a cutting-edge Apple MDM (Mobile Device Management) solution and seek an experienced Apple MDM consultant to provide expert guidance on best practices, compliance, architecture, and implementation strategies.
Who We Are Looking For: We need a highly skilled professional with proven experience in Apple MDM development and deployment. The ideal candidate should have deep knowledge of Apple’s MDM Protocol, Apple Business Manager (ABM), Automated Device Enrollment (ADE), Profile Management, APNs, DEP, VPP, and security best practices. Responsibilities: Provide technical consultation and strategic guidance on Apple MDM architecture and implementation. Assist in configuring and integrating APNs, DEP, VPP, and Apple Business Manager with our MDM solution. Guide our team in creating and managing configuration profiles, policies, and device enrollment workflows. Help ensure compliance with Apple’s MDM security policies and industry best practices. Troubleshoot issues related to device enrollment, policy enforcement, and app distribution. Advise on scalability, performance optimization, and security hardening of the MDM solution. Stay updated on Apple’s latest MDM protocol updates and iOS/macOS changes and guide implementation. Requirements: Extensive experience in Apple MDM solution development and deployment. Strong expertise in Apple MDM protocol, APNs, ABM, ADE, DEP, and VPP. Hands-on experience with configuration profiles, policy enforcement, and remote device management. Deep understanding of security protocols, encryption, and compliance requirements in MDM. Experience integrating MDM solutions with backend infrastructure (e.g., AWS, Azure, on-premises servers, etc.) is a plus. Ability to clearly communicate technical concepts and provide structured guidance to the team. Engagement Details: Payment: Hourly basis. Competitive rates based on experience. Engagement Type: Remote consultation via video calls, Slack, or other communication channels. Duration: Ongoing engagement based on project requirements. How to Apply: Please include the following in your application: A summary of your Apple MDM experience and relevant projects. Your expertise in specific MDM technologies and protocols. Availability and preferred communication methods. If you are an Apple MDM expert who can provide valuable insights and strategic guidance, we’d love to hear from you!
Skills: Configuration Management, Information Security, Mobile Device Management, iOS, iOS Development
Hourly rate:
40 - 70 USD
17 hours ago
|
|||||
Data Governance Policy Writer
|
not specified | 15 hours ago |
Client Rank
- Excellent
$44 107 total spent
3 hires
3 jobs posted
100% hire rate,
open job
5.00
of 1 reviews
|
||
Only freelancers located in the U.S. may apply.
1. Overview
Internet Society is seeking a Data Governance Policy Writer to develop key data governance policies and associated Standard Operating Procedures (SOPs) in alignment with ISO 27001 standards. These policies will establish clear guidelines for data ownership, classification, and access control, ensuring compliance with best practices for information security and governance. 2. Scope of Work The consultant will be responsible for drafting and finalizing the following policies and their corresponding SOPs: a. Ownership and Stewardship Policy i. Defines the roles and responsibilities for data owners and stewards. ii. Establishes accountability for data quality, and lifecycle management. iii. SOP: Step-by-step guidelines for staff on how to assign, track, and fulfill data ownership responsibilities. b. Classification Policy i. Establishes a structured framework for categorizing data based on sensitivity, criticality, and regulatory requirements. ii. Defines labeling, handling, and retention requirements. iii. SOP: Instructions for staff on how to classify, store, and manage data according to policy guidelines. c. Access and Usage Policy i. Sets criteria for granting, reviewing, and revoking data access. ii. Defines user roles, responsibilities, and permitted usage in compliance with ISO 27001. iii. SOP: Clear procedures for staff on how to request, review, and manage access permissions in alignment with security protocols. For each policy, the consultant will: Research and incorporate ISO 27001 best practices. Draft policies and ensure alignment with existing governance frameworks. Develop corresponding SOPs that provide clear, actionable steps for staff to function within the policy. Revise and finalize documents based on stakeholder feedback. 3. Deliverables Draft versions of each policy and SOP for review. Finalize policies and SOPs incorporating stakeholder input. Implementation guidelines to assist in operationalizing the policies 4. Timeline Project Start Date: TBD First Draft Submission: 3 Weeks Final Deliverables: 2 weeks after draft 5. Required Skills and Experience Proven experience in data governance, policy writing, and compliance. Strong understanding of ISO 27001 and information security principles. Ability to create clear, actionable, and organization-specific policies. 6. Reporting and Communication The consultant will provide at least weekly status updates and coordinate with Morgan Steinlin for feedback and revisions.
Skills: English, Writing, Policy Writing, ISO 27001, Compliance
Budget:
not specified
15 hours ago
|
|||||
I’ve been hacked & want to know by who
|
not specified | 13 hours ago |
Client Rank
- Risky
|
||
I’ve been hacked & have been receiving threats ! I’ve been receiving threatening messages & so has my family members. I just want to trace the number that has been messaging me.
Skills: Penetration Testing, Information Security, Vulnerability Assessment, Application Security, System Security, Firewall, Ethical Hacking, Security Analysis, Security Infrastructure, Security Testing, Internet Security, Database Security, Security Assessment & Testing
Budget:
not specified
13 hours ago
|
|||||
Penetration Testing for a Web application
|
not specified | 13 hours ago |
Client Rank
- Risky
|
||
ethically stress test a QA website by simulating high volumes of realistic user traffic using advanced tools and proxy-based techniques. Your goal is to identify performance bottlenecks, server limitations, or potential failure points by gradually increasing load until the website slows down or returns errors. You aim to mimic real user behavior, including browsing, clicking, scrolling, and interacting with APIs or forms, rather than just sending empty requests. You intend to bypass superficial CDN layers (if any) and apply intelligent proxy rotation to simulate traffic from thousands of unique IP addresses. Ultimately, your objective is to expose how the backend handles pressure under near-real-world conditions, helping improve scalability and infrastructure readiness.
Skills: C++, C#, Windows App Development, Ethical Hacking, Application Security, Encryption, Security Testing, System Security, Information Security, Article Writing, Desktop Application, Security Analysis, Security Assessment & Testing, Penetration Testing, Writing, Virus Removal
Budget:
not specified
13 hours ago
|
|||||
CISA and NIST Certified Security Expert Needed
|
not specified | 11 hours ago |
Client Rank
- Medium
$346 total spent
4 hires
8 jobs posted
50% hire rate,
open job
4.57
of 4 reviews
|
||
Only freelancers located in the U.S. may apply.
We are seeking a highly skilled Security Expert to work on a state project long-term in a key leadership position, send me a message with your resume.
System Security Analyst for 1+4 years State Project Must be a US Citizen: Working on a Government proposal and looking for Sub Contractors to help with the following: Please describe your approach to ensuring the Modernized System meets the security standards required to prepare for an Independent Third-Party Assessment and system security compliance throughout the SDLC. Also, describe their approach to conducting required security-related activities, including vulnerability scans, security validation testing, and compliance reviews. Key Requirements: -------------------- • Three (3) years or more experience with governmental system security assessments and remediations. • Three (3) years or more experience ensuring systems are compliant with National Institute of Standards and Technology (NIST) SP80053 and FIPS200 security requirements. • Preferred certifications include Certified Information Security System Professional (CISSP) Certification from ISC2 or comparable certifications e.g., Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) **Relevant Skills:** - CISA Certification - NIST Framework - Risk Assessment - Security Compliance - Vulnerability Management - Information Security Policies
Skills: NIST Cybersecurity Framework, NIST SP 800-53
Budget:
not specified
11 hours ago
|
|||||
Privacy, Security & AI Compliance Consultant for MVP Launch
|
not specified | 11 hours ago |
Client Rank
- Good
$6 353 total spent
16 hires
10 jobs posted
100% hire rate,
open job
5.00
of 2 reviews
|
||
Overview
We’re Aivana—a next-generation AI gateway designed to make artificial intelligence more useful, accessible, and affordable for non-technical users. Our platform combines: ✅ A curated AI Marketplace to discover the best tools by goal or persona ⚙️ Chatbot and prebuilt, integrated AI Workflows that automate real-world tasks 💳 Centralized Subscription Management to track and optimize AI tool usage We’re launching our MVP in the next 60–90 days and are seeking a Privacy, Security, and AI Compliance Consultant to help us ship with clarity, trust, and readiness for scale. What You’ll Help Us Build 🔐 Privacy & Legal Foundations: Privacy Policy, Terms of Service, and Cookie Policy Data Minimization Policy & Retention Schedule GDPR/CCPA-compliant user rights procedures (access, deletion, portability, etc.) Clear language around AI-generated outputs and user opt-out for data use in training Risk assessment and documentation of cross-border data transfers Vendor compliance tracker (OpenAI, Stripe, Plaid, Synthesia, etc.) 🛡️ Lightweight Security Stack: Data Security Policy (encryption, access control, incident response) Credential handling and API key storage practices (e.g., AWS Secrets Manager) Breach playbook and team security awareness guidelines Recommendations for logging, auditing, and vulnerability management Guidance on input sanitization to mitigate AI prompt injection risks 🤖 AI-Specific Compliance: Transparent disclaimers for AivanaAI and AI-generated workflow content Strategy for bias mitigation, explainability, and model governance (lightweight) Privacy-by-design and responsible AI use best practices baked into product flow Who We're Looking For 3+ years advising early-stage startups on privacy, security, or AI risk Hands-on experience drafting and implementing policies for SaaS or API platforms Strong knowledge of GDPR, CCPA, and AI-related legal considerations Comfort working cross-functionally with founders, developers, and UX teams Familiarity with SOC 2 Lite, ISO 27001, OWASP Top 10, or NIST frameworks a plus Prior experience working with OpenAI, LLM APIs, or AI model workflows a plus Skills We’re Looking For: Privacy Law (GDPR, CCPA) Cybersecurity & Data Protection SaaS & API Compliance AI Governance & Transparency Legal Policy Drafting Data Security Architecture Risk Management & Vendor Review Security Awareness & SOPs Security Frameworks (ISO, NIST, SOC 2 Lite)
Skills: Information Security, Tech & IT, HIPAA, Amazon Web Services, Web Development
Budget:
not specified
11 hours ago
|
|||||
Instagram got hacked
|
not specified | 11 hours ago |
Client Rank
- Risky
2 jobs posted
open job
|
||
Urgent: Instagram got hacked .
My instagram got hacked .I discovered that my password, email, phone number and two factor authentication had been changed, and unauthorised posts were made. I have attempted to reset my password, but it was unsuccessful. My account activity shows suspicious stories containing scam links. I am the rightful owner of this account. I am requesting you to please help me to get my account back.
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget:
not specified
11 hours ago
|
|||||
Certified Digital Forensics Expert Needed for Email Metadata Review
|
40 - 70 USD
/ hr
|
9 hours ago |
Client Rank
- Risky
|
||
We are seeking a certified digital forensics expert based in Canada to conduct a thorough review of email metadata. The ideal candidate will have extensive experience in digital forensics and a strong understanding of email protocols, metadata analysis, and forensic tools. Your insight will be crucial in interpreting the data accurately and providing a detailed report.
Certifications (EnCE, CFCE, GIAC) Legal experience ("expert witness," "court testimony") This project has a budget range of $300–500 CAD. Please apply only if you meet the requirements and can deliver high-quality work within the stipulated budget.
Skills: Content Writing, Copywriting, Search Engine Optimization, Information Security
Hourly rate:
40 - 70 USD
9 hours ago
|
|||||
Getting documents from ukraine
|
not specified | 9 hours ago |
Client Rank
- Risky
|
||
Hello
I am new to this and I am not sure if you can help me. I am a medical resident and I completed my residency from a Ukraine university. But because of the war and town tearing down I had to leave all my documents behind. Now it's been over 6 months since I have been trying to reach the school for my documents and I am not able to get in contact with anyone who can help at the faculty. If I provide you with my information would you be able to get those documents from their system?
Skills: Cybersecurity Management, Information Security Governance, NIST Cybersecurity Framework, Network Security, GDPR, Governance, Risk & Compliance Software, CIS Control Assessment, Information Security, Information Technology, PCI, Information Security Audit, Security Policies & Procedures Documentation, SOC 2, Information Security Consultation, ISO 27001
Budget:
not specified
9 hours ago
|
|||||
Cyber Security Plan Development for Small Business
|
125 USD | 8 hours ago |
Client Rank
- Medium
$217 total spent
2 hires
4 jobs posted
50% hire rate,
open job
5.00
of 1 reviews
|
||
**Job Description:*
I am currently in search of a seasoned cybersecurity professional to assist in the formulation of a comprehensive cybersecurity strategy specifically designed for a small business environment. Need something in writing PDF. Your expertise will be instrumental in safeguarding sensitive information for us in th future.
Skills: Information Security, Market Research, Lead Generation, Marketing Strategy
Fixed budget:
125 USD
8 hours ago
|
|||||
Looking for a cybersecurity expert with experience in Mac / apple products
|
not specified | 7 hours ago |
Client Rank
- Excellent
$7 403 total spent
47 hires
43 jobs posted
100% hire rate,
open job
4.86
of 23 reviews
|
||
Looking for a cybersecurity expert who can work with mac and iphone to analyze devices and identify if they have been hacked
Recently had someone be able to access an account with 2FA app codes on and I need to identify how they did it
Skills: Cybersecurity Management, Configuration Management, Incident Response Plan, Information Security, Information Security Consultation, macOS, iOS, Swift, Mac OS App Development, Apple Xcode
Budget:
not specified
7 hours ago
|
|||||
Malware testing for detection and response
|
300 USD | 4 hours ago |
Client Rank
- Excellent
$101 651 total spent
70 hires
148 jobs posted
47% hire rate,
open job
4.89
of 41 reviews
|
||
Looking someone to evaluate an new EDR solution, against other EDRs, under different frameworks, Testing scope will be provided, Looking someone who can work with offshore team and complete the testing, we need someone who knows how to work with offshore developers and get desired results, this may become on going task once we go for proper certifications
Skills: Information Security, Network Security, Penetration Testing, Security Analysis, Internet Security
Fixed budget:
300 USD
4 hours ago
|
|||||
Email Security Expert Needed for Consultation
|
500 - 999 USD
/ hr
|
3 hours ago |
Client Rank
- Medium
$199 total spent
2 hires
1 jobs posted
100% hire rate,
open job
4.29
of 2 reviews
|
||
I am looking for someone who can hack into an email with two factor authentication or teach me how to hack an email. I know this is near impossible but I thought it was worth putting it out there.
Skills: Information Security, Email Deliverability, Vulnerability Assessment, Encryption, Network Security
Hourly rate:
500 - 999 USD
3 hours ago
|
|||||
Instagram problem
|
500 USD | 3 hours ago |
Client Rank
- Medium
2 jobs posted
50% hire rate,
open job
|
||
Our department publishes a publication for students to read, and we have always posted it on our official website as well as shared relevant information on Facebook. However, we recently discovered an Instagram account impersonating us, posting articles not authored by our students or staff, which is damaging our school's reputation. We have attempted to report this to Instagram, but it has been ineffective.
Skills: Information Security, Cybersecurity Management, Digital Forensics, Ethical Hacking, Online Reputation Management, Reputation Management, Bad Link Removal, Google, Search Engine Optimization, Instagram, Facebook, Cyber Threat Intelligence, Cybersecurity Monitoring, Cybersecurity Tool
Fixed budget:
500 USD
3 hours ago
|
|||||
Need a ethical hacker
|
not specified | 1 hour ago |
Client Rank
- Risky
|
||
Need a ethical hacker for a smll project related to cyber security
Skills: Security Testing, Network Security, Vulnerability Assessment, Penetration Testing, Web Application Security, Network Penetration Testing, Internet Security, Information Security Audit, Website Security, API Testing, OWASP, Code Review, Web App Penetration Testing, Security Assessment & Testing, Ethical Hacking
Budget:
not specified
1 hour ago
|
Streamline your Upwork workflow and boost your earnings with our smart job search and filtering tools. Find better clients and land more contracts.