Information Security Freelance Jobs

Find Information Security jobs online. Work from home and earn money online.
Signup for free to get access to all filter attributes and instant notifications when new jobs are posted.
Setup filter



Get access to over 30+ filter attributes, setup instant notifications, integrate with your CRM and marketing tools, and more.
Start free trial
59 projects published for past 72 hours.
Job Title Budget
Security & Compliance Specialist for SOC 2 Type II Renewal
40 - 70 USD / hr
4 hours ago
Client Rank - Excellent

Payment method verified
$61'670 total spent
4 hires , 3 active
5 jobs posted
80% hire rate, 1 open job
26.67 /hr avg hourly rate paid
2228 hours
5.00 of 1 reviews
Registered at: 09/08/2021
US United States
Excellent
Required Connects: 14
We are preparing for our SOC 2 Type II renewal and need immediate support to ensure our policies, controls, and tests reflect our current business reality. Given recent changes—transitioning to a fully remote setup, closing our office, and moving our platform from self-hosted on AWS to Bubble—we want to ensure our security and compliance framework remains strong and accurate.

This person will need to:
–Review existing policies and controls in Secureframe
–Identify any gaps due to our business changes and recommend updates
–Ensure tests align with our new environment
–Collaborate with our team to implement necessary adjustments

We're looking for:
–Experience with SOC 2 Type II audits, ideally with Secureframe and Prescient
–Strong understanding of security controls for remote-first businesses
–Familiarity with low-code platforms like Bubble, which manage infrastructure, data, and deployment pipelines
–Speed and efficiency—able to quickly assess and provide actionable recommendations
–Clear communication and documentation skills

Looking to onboard someone ASAP. Expecting ~20 hours of work over the next week. Please share relevant experience, and I'll reach out to schedule a quick intro call if we think there might be a fit.
Skills: Network Security, Information Security, Penetration Testing, Vulnerability Assessment, Security Infrastructure, IT Compliance Audit, Compliance Testing
Hourly rate: 40 - 70 USD
4 hours ago
  • IT & Networking, Information Security & Compliance
Cybersecurity Instructor Needed for Course Development and Mentoring
25 - 30 USD / hr
4 hours ago
Client Rank - Excellent

Payment method verified
$36'084 total spent
39 hires , 35 active
32 jobs posted
100% hire rate, 9 open job
6.46 /hr avg hourly rate paid
4336 hours
3.65 of 12 reviews
Registered at: 31/01/2024
US United States
Excellent
Required Connects: 17
We are seeking an experienced Cybersecurity Instructor to review existing course materials, record engaging instructional videos, and provide mentorship to students. The ideal candidate will have a strong understanding of cybersecurity principles and practices, along with the ability to communicate complex concepts clearly. Your role will involve collaborating with our team to enhance the curriculum and ensure students receive comprehensive guidance throughout their learning journey.
Skills: Education, Information Security, Online Instruction, Technical Writing, Curriculum Development
Hourly rate: 25 - 30 USD
4 hours ago
  • IT & Networking, Information Security & Compliance
Project Manager, Customer Success, Virtual Assistant Saas Experienced
3 - 5 USD / hr
4 hours ago
Client Rank - Good

Payment method verified
$6'041 total spent
21 hires , 7 active
44 jobs posted
48% hire rate, 3 open job
12.60 /hr avg hourly rate paid
356 hours
5.00 of 9 reviews
Registered at: 21/06/2022
BH Bahrain
Good
Required Connects: 17
### Job Title: Project Manager with SaaS Experience and Proficiency in Notion

#### Job Description:
We are seeking a highly skilled Project Manager with a background in SaaS to join our team on Upwork. The ideal candidate will have extensive experience in managing software-as-a-service projects and be proficient in using Notion for project management.

#### Responsibilities:
- Oversee and manage SaaS projects from initiation to completion.
- Collaborate with cross-functional teams including developers, designers, and marketers.
- Utilize Notion for project planning, tracking progress, and documenting processes.
- Ensure projects are delivered on time, within scope, and within budget.
- Identify and manage project risks and issues.
- Maintain clear and consistent communication with stakeholders.
- Monitor project performance and implement necessary adjustments.
- Prepare project reports and presentations for stakeholders.

#### Requirements:
- Proven experience as a Project Manager in the SaaS industry.
- Proficiency in using Notion for project management.
- Strong understanding of project management methodologies and best practices.
- Excellent organizational and multitasking skills.
- Strong problem-solving abilities and attention to detail.
- Exceptional communication and interpersonal skills.
- Ability to work independently and as part of a team.
- Familiarity with agile project management and information security methodologies is a plus.

#### Preferred Qualifications:
- PMP, Scrum Master, or other relevant certifications.
- Experience working with remote teams.
- Knowledge of additional project management tools and software.

#### How to Apply:
If you are a proactive and detail-oriented project manager with a passion for SaaS and expertise in Notion, we would love to hear from you. Please submit your resume and a cover letter detailing your relevant experience and why you are a good fit for this role.

---

This job description should attract qualified candidates with the right mix of skills and experience in SaaS and Notion, ensuring they can effectively manage projects and contribute to your team's success.
Skills: Customer Service, Email Communication, Project Management, Communications, Time Management, Administrative Support, Customer Support, Notion
Hourly rate: 3 - 5 USD
4 hours ago
  • Admin Support, Project Management
PCI Audit and Readiness
not specified 6 hours ago
Client Rank - Good

Payment method verified
$4'759 total spent
14 hires , 10 active
1 jobs posted
100% hire rate, 1 open job
19.43 /hr avg hourly rate paid
140 hours
4.63 of 2 reviews
Registered at: 12/06/2023
US United States
Good
Required Connects: 11
As per our last discussion I am sending a request to kick off the submission process
Skills: Vulnerability Assessment, Security Testing, Penetration Testing, Information Security, Risk Assessment, Cloud Computing, Certified Information Systems Security Professional, Amazon Web Services, Cloud Architecture, Cloud Security, SOC 2 Report, Compliance, NIST SP 800-53, PCI DSS, Certified Information Security Manager
Budget: not specified
6 hours ago
  • IT & Networking, Information Security & Compliance
QSA PCI-DSS Certified
40 - 80 USD / hr
7 hours ago
Client Rank - Medium

Payment method verified
5 jobs posted
5 open job
no reviews
Registered at: 19/06/2024
GB United Kingdom
Medium
Required Connects: 12
Description:
We are urgently seeking a PCI-DSS QSA (Qualified Security Assessor) to assist with a critical security compliance project. Our organization requires immediate support to assess, validate, and ensure full compliance with PCI-DSS (Payment Card Industry Data Security Standard) requirements. The ideal candidate must have prior experience in conducting PCI-DSS audits, gap assessments, and remediation guidance.

Responsibilities:

Conduct a thorough PCI-DSS assessment to determine compliance status.

Identify security vulnerabilities and provide a gap analysis report.

Develop a remediation plan and provide clear, actionable recommendations.

Perform risk analysis and advise on security best practices.

Work closely with our internal team to implement necessary security controls.

Prepare and issue a Report on Compliance (RoC) and Attestation of Compliance (AoC).

Ensure all compliance documentation is completed and submitted as per industry requirements.

Requirements:

Must be a certified PCI-DSS QSA (Qualified Security Assessor).

Proven experience in performing PCI-DSS assessments and audits.

Strong knowledge of information security standards and regulations.

Ability to provide clear, structured, and actionable compliance guidance.

Experience working with financial institutions, e-commerce, or payment processors is preferred.

Strong communication and documentation skills.

Ability to work on an urgent basis and meet tight deadlines.

Additional Information:

This is an urgent requirement; availability to start immediately is highly preferred.

The project may lead to long-term collaboration depending on performance.

Remote work is allowed, but the candidate must be available for regular check-ins and meetings.

If you are a certified PCI-DSS QSA with the expertise to help us achieve compliance on an urgent basis, please submit your proposal along with relevant experience and certifications.

Budget: To be discussed based on expertise and project scope.
Skills: PCI, PCI DSS, Network Security, Information Security
Hourly rate: 40 - 80 USD
7 hours ago
  • IT & Networking, Information Security & Compliance
Network Security Assessment Required
8 - 60 USD / hr
7 hours ago
Client Rank - Excellent

Payment method verified
$11'081 total spent
50 hires , 24 active
60 jobs posted
83% hire rate, 2 open job
32.84 /hr avg hourly rate paid
320 hours
4.96 of 32 reviews
Registered at: 16/08/2016
US United States
Excellent
Required Connects: 17
We were compromised with ransomware and We are looking for a skilled cybersecurity expert to conduct a thorough assessment of our network and endpoints. The objective is to identify any potential compromises or vulnerabilities that may exist. The ideal candidate will have a solid understanding of network security protocols and experience with penetration testing. Your insights will help us enhance our security measures and protect our sensitive data. If you have a proven track record in identifying vulnerabilities and can provide actionable recommendations, we would love to hear from you. In particular we are looking for any agent or any code that might sit inside the network that was installed during the compromise
Skills: Network Security, Firewall, Information Security, Vulnerability Assessment, VPN
Hourly rate: 8 - 60 USD
7 hours ago
  • IT & Networking, Information Security & Compliance
SaaS Security Plan Development for Health Data Application
25 - 50 USD / hr
7 hours ago
Client Rank - Risky

Payment method not verified
1 open job
US United States
Risky
Required Connects: 8
We are seeking an experienced security consultant to develop a comprehensive security plan for our SaaS application that provides users with actionable health advice from their data. The ideal candidate will have expertise in healthcare data security regulations and best practices. The project involves assessing current security measures, identifying potential vulnerabilities, and creating a robust action plan to protect sensitive user information while ensuring compliance with relevant laws. Your insights will be crucial in safeguarding our platform and building user trust.
Skills: Vulnerability Assessment, Information Security, HIPAA, SOC 2
Hourly rate: 25 - 50 USD
7 hours ago
  • IT & Networking, Information Security & Compliance
Get chat from GF's Instagram
not specified 8 hours ago
Client Rank - Medium

Payment method verified
$70 total spent
1 hires , 1 active
1 jobs posted
100% hire rate, 2 open job
no reviews
Registered at: 25/01/2025
IT Italy
Medium
Required Connects: 13
Hello, I have to see a chat of my GF to see if she's cheating on me.

Let me know if it's possible and how.

Thanks
Skills: Python, Ethical Hacking, Kali Linux, Web App Penetration Testing, Penetration Testing, Metasploit, Security Testing, Information Security, DevOps, Jenkins, Docker, Azure DevOps, Terraform, Network Security, Firewall
Budget: not specified
8 hours ago
  • Accounting & Consulting, Accounting & Bookkeeping
IT security technician
10 - 30 USD / hr
9 hours ago
Client Rank - Good

Payment method verified
$733 total spent
8 hires , 4 active
8 jobs posted
100% hire rate, 3 open job
5.99 /hr avg hourly rate paid
162 hours
4.49 of 7 reviews
Registered at: 01/09/2021
CA Canada
Good
Required Connects: 11
We're currently looking to hire an IT support specialist with extensive experience in Virtualization (ESXI and Hyper-V) and also good knowledge of PFsense, Mikrotik and Fortinet.
A long-term position is available.

For this specific task:
Configuring a Fortigate 40F with one WAN (static IP) and one LAN.
DHCP + DNS for clients on the LAN
SSL-VPN server (just for administration)
Skills: Network Security, Firewall, Information Security, System Administration, VPN, Network Administration, Internet Security, WiFi
Hourly rate: 10 - 30 USD
9 hours ago
  • IT & Networking, Information Security & Compliance
Cybersecurity Expert Needed for Security Assessment
not specified 9 hours ago
Client Rank - Medium

Payment method verified
1 open job
GB United Kingdom
Medium
Required Connects: 12
We are seeking an experienced cybersecurity expert to conduct a thorough security assessment aligned with industry standards (ISO, CIS, etc.) . The ideal candidate will help in evaluating our current security posture, and identify vulnerabilities. If you have a proven track record in cybersecurity assessments /compliance and a strong understanding of relevant standards, we would love to hear from you.
Skills: Vulnerability Assessment, ISO 27001, Information Security
Budget: not specified
9 hours ago
  • IT & Networking, Information Security & Compliance
Ethical Hacking Services Needed for Account Investigation
20 - 50 USD / hr
11 hours ago
Client Rank - Risky

Payment method not verified
1 open job
GB United Kingdom
Risky
Required Connects: 8
I am looking for a skilled ethical hacker to help investigate my spouse's online account due to concerns about potential foul play. The ideal candidate will have experience in digital forensics and account security to uncover any unauthorized access or suspicious activities. Strong communication skills are essential for discussing findings and providing recommendations. If you have a proven track record in ethical hacking and can conduct this investigation discreetly, please apply.
Skills: Ethical Hacking, Encryption, Information Security, Network Security, Vulnerability Assessment
Hourly rate: 20 - 50 USD
11 hours ago
  • IT & Networking, Information Security & Compliance
Cybersecurity Policy Expert to refine hiring assessments (US Citizenship Required)
100 - 175 USD / hr
12 hours ago
Client Rank - Excellent

Payment method verified
$50'210 total spent
18 hires , 19 active
20 jobs posted
90% hire rate, 2 open job
132.66 /hr avg hourly rate paid
414 hours
5.00 of 25 reviews
Registered at: 30/03/2022
US United States
Excellent
Required Connects: 20
Only freelancers located in the U.S. may apply.
We are seeking individuals with advanced expertise in cybersecurity policy. Subject Matter Experts (SMEs) will be expected to possess extensive knowledge of information security, cybersecurity, and existing laws, regulations, policies, and doctrines. They should have experience developing and recommending policy changes to support their respective organization's mission needs. The should also have experience managing the impact of change in the security posture or policy within their organization. In addition, they should have experience developing and maintaining cybersecurity plans, strategy, and/or policies in alignment with cybersecurity evolutions, threat landscapes, initiatives, and related laws or regulations. Applicants that pass the screening process will participate in a series of workshops to evaluate and refine hiring assessment materials, such as interviews and knowledge tests, that will determine the proficiency of candidates.

Some of the responsibilities of the SMEs will include:
• Attend orientation and training meetings
• Attend and contribute to content development workshops
• Participate in regular and/or ad hoc status meetings
• Formulate and draft assessment scenarios (includes desk work or “homework” outside of workshop hours)
• Write assessment items relevant to scenarios and specific technical capabilities and competencies
• Complete competency coverage and difficulty ratings on assessment items
• Revise scenarios and items based on feedback

The type of technical skills that we are looking for include:
• Strategic Planning: Designs and supports a cybersecurity strategy that aligns to the organization’s broader vision, mission, and business goals. Ensures sound principles and best practices are implemented in the development of cybersecurity policy strategy.
• Policy Analysis: Analyzes cybersecurity evolutions, threat landscapes, initiatives, laws, and regulations to identify policy and strategy needs. Analyzes the implications (i.e., risk and benefits) of cybersecurity policies to organizational goals and business strategy. Regularly monitors the impact of cybersecurity strategies and policies on the organization.
• Cybersecurity Policy Development and Writing: Assesses cybersecurity policy needs to develop and revise cybersecurity policies and programs. Collaborates with stakeholders in developing and revising cybersecurity policies and programs. Translates applicable laws, statutes, and regulatory documents and frameworks and integrates into policy artifacts (e.g., instructions, SOPs, memos).
• Cybersecurity Governance: Applies knowledge of laws, government regulations, executive orders, agency rules, government organization and functions, and current Administration requirements to cybersecurity. Provides governance, risk, and compliance guidance to organizational stakeholders.
• Cybersecurity Legislative Affairs: Leads the Department’s engagement with the Legislative Branch to achieve and maintain the necessary authorities and resources required to meet mission critical priorities.
• Policy Advisement: Provides advisement to leadership and stakeholders on cybersecurity policy implementation and interpretation. Advises leadership of cybersecurity policy risks and benefits to organizational strategy.

Qualifications:
• 15+ years of experience in cybersecurity policy.
• Excellent communication skills, both oral and written, required. Must be able to convey technical information effectively to diverse audiences.
• Advanced degrees and/or publications in relevant fields preferred.
• U.S. citizenship required.
Skills: NIST Cybersecurity Framework, Strategic Planning, Policy Analysis, Cybersecurity Policy, Governance, Risk Management & Compliance, Legislative Affairs, Policy Writing, Content Writing
Hourly rate: 100 - 175 USD
12 hours ago
  • Writing, Professional & Business Writing
WhatsApp
not specified 12 hours ago
Client Rank - Risky

Payment method not verified
1 open job
PK Pakistan
Risky
Required Connects: 6
To give access of someone's WhatsApp. Reply back if you could do
Skills: Network Security, Information Security Consultation, Metasploit, Information Security Audit, Security Analysis, Information Security Governance, Information Security Awareness, Linux, Cybersecurity Management, Ethical Hacking, Penetration Testing, PHP, Information Security, JavaScript, Python
Budget: not specified
12 hours ago
  • IT & Networking, Information Security & Compliance
Expert Needed for Eliciting and Documenting Security Requirements
10 - 20 USD / hr
18 hours ago
Client Rank - Excellent

Payment method verified
$1'708 total spent
19 hires
11 jobs posted
100% hire rate, 2 open job
16.34 /hr avg hourly rate paid
49 hours
4.95 of 18 reviews
Registered at: 05/03/2020
PK Pakistan
Excellent
Required Connects: 20
We are seeking an expert with a strong background in eliciting and documenting security requirements for a research project. The ideal candidate should have extensive experience in identifying security needs, translating them into clear documentation, and collaborating with various stakeholders. If you have a proven track record in this area, we would love to hear from you!
Skills: Information Security, Vulnerability Assessment, ISO 27001, Security Analysis, software security
Hourly rate: 10 - 20 USD
18 hours ago
  • Web, Mobile & Software Dev, Desktop Application Development
Project Manager, Customer Success, Virtual Assistant Saas Experienced
3 - 5 USD / hr
20 hours ago
Client Rank - Good

Payment method verified
$6'041 total spent
21 hires , 7 active
43 jobs posted
49% hire rate, 2 open job
12.60 /hr avg hourly rate paid
356 hours
5.00 of 9 reviews
Registered at: 21/06/2022
BH Bahrain
Good
Required Connects: 17
### Job Title: Project Manager with SaaS Experience and Proficiency in Notion

#### Job Description:
We are seeking a highly skilled Project Manager with a background in SaaS to join our team on Upwork. The ideal candidate will have extensive experience in managing software-as-a-service projects and be proficient in using Notion for project management.

#### Responsibilities:
- Oversee and manage SaaS projects from initiation to completion.
- Collaborate with cross-functional teams including developers, designers, and marketers.
- Utilize Notion for project planning, tracking progress, and documenting processes.
- Ensure projects are delivered on time, within scope, and within budget.
- Identify and manage project risks and issues.
- Maintain clear and consistent communication with stakeholders.
- Monitor project performance and implement necessary adjustments.
- Prepare project reports and presentations for stakeholders.

#### Requirements:
- Proven experience as a Project Manager in the SaaS industry.
- Proficiency in using Notion for project management.
- Strong understanding of project management methodologies and best practices.
- Excellent organizational and multitasking skills.
- Strong problem-solving abilities and attention to detail.
- Exceptional communication and interpersonal skills.
- Ability to work independently and as part of a team.
- Familiarity with agile project management and information security methodologies is a plus.

#### Preferred Qualifications:
- PMP, Scrum Master, or other relevant certifications.
- Experience working with remote teams.
- Knowledge of additional project management tools and software.

#### How to Apply:
If you are a proactive and detail-oriented project manager with a passion for SaaS and expertise in Notion, we would love to hear from you. Please submit your resume and a cover letter detailing your relevant experience and why you are a good fit for this role.

---

This job description should attract qualified candidates with the right mix of skills and experience in SaaS and Notion, ensuring they can effectively manage projects and contribute to your team's success.
Skills: Customer Service, Email Communication, Project Management, Communications, Time Management, Administrative Support, Customer Support, Notion
Hourly rate: 3 - 5 USD
20 hours ago
  • Admin Support, Project Management
Cyber Security Trainer
40 - 70 USD / hr
1 day ago
Client Rank - Excellent

Payment method verified
$71'276 total spent
86 hires , 1 active
318 jobs posted
27% hire rate, 1 open job
24.55 /hr avg hourly rate paid
1342 hours
4.72 of 74 reviews
Registered at: 18/08/2013
CA Canada
Excellent
Required Connects: 17
Need an experienced cyber security trainer to provide training for organizations.

Please reply back citing relevant experience and a detailed resume.
Skills: Information Security, Network Security, Vulnerability Assessment, Penetration Testing, Security Infrastructure, Security Analysis
Hourly rate: 40 - 70 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Hacking
not specified 1 day ago
Client Rank - Risky

Payment method not verified
1 open job
LK Sri Lanka
Risky
Required Connects: 6
Bro, I need access to two accounts on WhatsApp and Telegram while the other person also has access, so that I can view all their chats. Tell me how much it will cost, meaning the price, as I need this done.

Can you tell me the things I need? I can give you the necessary details for the work, but I can’t do anything directly on the owner’s phone.
Skills: Security Assessment & Testing, Security Testing, Ethical Hacking, Internet Security, Network Penetration Testing, Penetration Testing, Website Security, Information Security Consultation, Network Security, System Security, Vulnerability Assessment, Information Security, Malware Removal
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
Multiple account recovery and locate possible other accounts
not specified 1 day ago
Client Rank - Medium

Payment method verified
1 jobs posted
1 open job
no reviews
Registered at: 03/02/2025
US United States
Medium
Required Connects: 8
so my fiancé made many different emails and accounts over the last 7 years (gmail,outlook,microsoft,snapchat,instagram,facebook,icloud,chime,cashapp and many other accounts). Her memory is terrible. Is there any way to find all emails and the accounts that she's made so she can delete certain ones, Or anything like that? she also had multiple snapchats that she'd like to recover, same with emails. We were wondering how much that costs or estimated amount. How long does that take on average? I do have a list of user names and emails put together for guarenteed her accounts and some are just leads where she thought making that account sounded familiar. What are my options?
Thank you for your time hope to hear from you soon.
Skills: Accounting, Technical Support, Information Security, Instagram, Digital Marketing, Social Media Marketing, Social Media Management, Ethical Hacking, Facebook Page, Malware Removal, WordPress Malware Removal, Facebook, Instagram Reels, Data Recovery, Internet Security
Budget: not specified
1 day ago
  • Admin Support, Virtual Assistance
Security Awareness Training & Compliance Support for Small Online Business
100 USD 1 day ago
Client Rank - Excellent

Payment method verified
$19'066 total spent
43 hires , 16 active
45 jobs posted
96% hire rate, 6 open job
27.26 /hr avg hourly rate paid
640 hours
4.01 of 22 reviews
Registered at: 02/11/2019
CA Canada
Excellent
Required Connects: 11
We are looking for an information security expert to help us set up a simple Security Awareness Training program and assist with answering compliance-related questions for our business.

Scope of Work:

- Develop a Basic Security Awareness Training Program
Create a straightforward yet effective program that we can implement and document.

- Provide Supporting Documentation
Help us generate an image or document to showcase the training program.

- Assist with Security Guide Questions
Help us answer compliance-related questions to ensure we meet security best practices.

----

Address Specific Compliance Questions:

Does our company have logical access to a partner's Order Entry (OE) tool for entering customer and payment details?

How do we ensure credit card numbers are not written down or stored while inputting them into partner portals?

----

Ideal Candidate:

- Experience in information security and compliance
- Knowledge of security awareness training programs
-Familiarity with payment security best practices (PCI compliance)
-Ability to create clear and concise security documentation

This is an urgent task, and we are looking for someone who can start immediately. If you have experience with similar security and compliance projects, please share relevant examples.

Let us know how you can help! 🚀
Skills: Information Security
Fixed budget: 100 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Cybersecurity GRC Analyst & Compliance Specialist
not specified 1 day ago
Client Rank - Excellent

Payment method verified
$10'656 total spent
20 hires , 4 active
8 jobs posted
100% hire rate, 1 open job
17.78 /hr avg hourly rate paid
471 hours
4.98 of 12 reviews
Registered at: 20/09/2023
US United States
Excellent
Required Connects: 17
🚀 Join Our Team! 🚀

We are a small cybersecurity consulting firm looking to hire cybersecurity compliance specialists on an as-needed basis to support our clients with compliance projects.

If you have a strong background in GRC (Governance, Risk, and Compliance), security assessments, and policy writing, we’d love to connect with you! This is a remote, freelance opportunity with flexible hours.

As a Cybersecurity Compliance Specialist, you may be responsible for:

✅ Assisting with SOC 2 readiness assessments (security controls review, gap analysis, and evidence collection).
✅ Mapping security controls to NIST, ISO 27001, HIPAA, and PCI-DSS.
✅ Conducting vendor risk assessments and evaluating third-party security postures.
✅ Drafting and updating security policies, procedures, and compliance documentation.
✅ Tracking and managing compliance remediation tasks to help businesses meet security requirements.
✅ Assisting in audit preparations (gathering documentation, responding to auditor requests).
✅ Developing security awareness training materials for clients.

What We’re Looking For

💡 Strong understanding of SOC 2, NIST, ISO 27001, HIPAA, and PCI-DSS.
💡 Experience with compliance gap assessments and security documentation.
💡 Excellent technical writing skills (security policies, risk assessments, audit documentation).
💡 Familiarity with compliance tools like Drata, Vanta, or Tugboat Logic (preferred but not required).
💡 Detail-oriented, self-motivated, and able to work independently.

Preferred Qualifications (Nice to Have, but Not Required)

🎓 Certifications: Security+, CISA, CRISC, CCSP, CISSP.
📌 Experience in cybersecurity consulting or working with SMBs on compliance projects.
📌 Familiarity with risk management processes and vendor risk assessment methodologies.
Skills: Information Security, Information Security Audit
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
My emails have been hacked
not specified 1 day ago
Client Rank - Risky

Payment method not verified
1 open job
US United States
Risky
Required Connects: 6
my emails have been hacked i cant acess them i have proof theyre my accounts and they have hundreds of dollars worth of games on them
Skills: Network Security, Information Security Consultation, Metasploit, Information Security Audit, Security Analysis, Information Security Governance, Information Security Awareness, Linux, Cybersecurity Management, Ethical Hacking, Penetration Testing, PHP, Information Security, JavaScript, Python
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
Data Analyst & Cybersecurity Policy Specialist – Business Intelligence & Security Documentation
350 USD 1 day ago
Client Rank - Medium

Payment method verified
$50 total spent
4 hires , 4 active
6 jobs posted
67% hire rate, 3 open job
no reviews
Registered at: 03/02/2025
US United States
Medium
Required Connects: 10
📊 Project Overview

We are looking for a highly skilled professional with expertise in data analysis, business intelligence, and cybersecurity policy development. This project consists of two distinct workstreams:

1. Data Visualization & Dashboard Development (Tableau, Power BI, Excel) – Focused on business intelligence, data transformation, and executive dashboard creation.


2. Cybersecurity Policy & Risk Management – Focused on developing security policies, governance frameworks, encryption strategies, and compliance documentation for business implementation.



Each milestone is structured to ensure clear deliverables, business insights, and alignment with industry standards.

⚠️ Freelancers may apply for one or both sections depending on expertise. Please specify in your application which section(s) you are applying for.


---

📌 Section 1: Data Visualization & Dashboard Development (Tableau, Power BI, Excel)

We are seeking a data analyst skilled in data visualization, dashboard creation, and business intelligence reporting. The goal is to develop interactive dashboards that transform large datasets into actionable business insights.

📌 Phase 1: Business Dashboard Development (Tableau)

Dataset: NYPD Arrests Dataset (2023)

✅ Develop 8 interactive visualizations using Tableau, including:

Funnel Chart

Pie Chart

Heatmap

Scatter Plot

Area Chart

Bubble Chart

Horizontal Bar Chart

Line Chart


✅ Ensure consistent formatting for readability and executive decision-making.
✅ Provide a brief analysis on visualization effectiveness.

📅 Deadline: 2-3 days after project start

Deliverables:

✔ Tableau Public link with all visualizations
✔ Business insights report evaluating dashboard effectiveness
✔ Screenshots of all visualizations


---

📌 Phase 2: Data Visualization Optimization (Power BI & Excel)

Dataset: State of Iowa Salary Dataset

✅ Create 4 business-focused visualizations in Power BI:

Donut Chart

Treemap Chart

Area Chart

Funnel Chart


✅ Create 4 business-focused visualizations in Excel:

Donut Chart

Line Chart

Area Chart

Bar Chart


✅ Evaluate visualization effectiveness & formatting in both tools.
✅ Provide recommendations for improvements.

📅 Deadline: 2-3 days after Phase 1 approval

Deliverables:

✔ Power BI & Excel files with all visualizations
✔ Business insights report comparing Power BI & Excel


---

📌 Phase 3: Data Cleaning & Transformation (Tableau, Power BI, Excel)

Dataset: Provided (500,000+ customer records)

✅ Perform the following data cleaning & transformation tasks:

Fix incorrect birthdates (e.g., 17XX → 19XX)

Fix incorrect joining dates (e.g., 21XX → 20XX)

Remove special characters from the gender field

Extract 5-digit ZIP codes from full ZIP code

Compute customer age from birthdate

Compute membership years from joining date


✅ Create 3 visualizations per tool (Tableau, Power BI, Excel):

Geographical Distribution (Map Visualization)

Membership Years Distribution (Horizontal Bar Chart)

Gender Distribution (Pie Chart)


📅 Deadline: 3-4 days after Phase 2 approval

Deliverables:

✔ Power BI & Excel files with cleaned datasets & visualizations
✔ Tableau Public link
✔ Business insights report comparing data transformation tools


---

📌 Phase 4: Tableau Sales Dashboard Development

Dataset: Provided (1,000,000+ sales records)

✅ Define 4 key business insights (e.g., top-selling products, sales trends).
✅ Develop a fully interactive Tableau dashboard that includes:

Key performance indicators (KPIs)

Sales trends over time

Product performance analysis

Geographic sales distribution


📅 Deadline: 3-4 days after Phase 3 approval

Deliverables:

✔ Tableau Public link to dashboard
✔ Business insights report summarizing findings


---

📌 Phase 5: Power BI & Excel Dashboard Development + Business Reflection

Dataset: (Same dataset as Phase 4)

✅ Develop Power BI & Excel dashboards focusing on:

Sales trends over time

Profit variation by state

Statistical outliers in hardware/software sales

Top 10 most popular products


✅ Write a 1-page professional reflection on:

How dashboard storytelling impacts business decision-making

Key strengths & weaknesses of Power BI vs. Excel dashboards


📅 Deadline: 4-5 days after Phase 4 approval

Deliverables:

✔ Power BI & Excel dashboard files
✔ Business insights report comparing tools
✔ 1-page professional reflection


---

📌 Section 2: Cybersecurity Policy & Risk Management

We are looking for a cybersecurity specialist to develop enterprise security policies, governance frameworks, and encryption strategies for business compliance.

📌 Phase 1: Cryptographic Policy Development & Key Management

✅ Research and document Active Directory PKI implementation, including:

Certificate issuance

Key security & encryption policies


📅 Deadline: 2-3 days after project start

Deliverables:

✔ Enterprise Key Management Report
✔ PKI Implementation Guidelines


---

📌 Phase 2: Ethical Data Collection & Cybersecurity Governance

✅ Research mass data collection, surveillance policies, & compliance (GDPR, CCPA).
✅ Develop a business policy for ethical data governance.

📅 Deadline: 2-3 days after Phase 1 approval

Deliverables:

✔ Ethical Data Collection & Surveillance Policy
✔ Governance Report


---

📌 Phase 6: Comprehensive Cybersecurity Policy Framework

✅ Develop a full cybersecurity policy framework, including:

Encryption & Access Control Policies

Data Governance & Compliance Policies

Cloud Security & Risk Management


📅 Deadline: 4-5 days after Phase 5 approval

Deliverables:

✔ Enterprise Cybersecurity Policy Document (2,000+ words)
✔ Compliance & Risk Management Strategy


---

📥 How to Apply:

✅ Indicate whether you are applying for Data Visualization, Cybersecurity Policy Development, or both.
✅ Share past work samples (business intelligence dashboards OR cybersecurity policies/reports).
✅ Provide estimated completion time for each milestone.
✅ Indicate your rate (per milestone or full project).

🚀 Looking forward to working with a talented professional to develop powerful business insights & security policies!
Skills: Information Security, Vulnerability Assessment, Security Analysis, Technical Writing, Network Security
Fixed budget: 350 USD
1 day ago
  • IT & Networking, Information Security & Compliance
issues with home network and devices. Resolve threat, establish new
not specified 1 day ago
Client Rank - Risky

Payment method not verified
1 open job
US United States
Risky
Required Connects: 6
Only freelancers located in the U.S. may apply.
Seeking cybersecurity professional to assess my home network's security, develop a threat model, resolve vulnerabilities, and implement ongoing monitoring.

I have an ongoing issue with devices and phone network security being breached that poses a sincere threat to not only my propriety data, but a very real threat to my personal safety and possibly that of my family and pets.

I've employed premium security features via Verizon Digital Secure, Verizon Protect, Tech Coach, Advanced Security for Xfinity, factory data resets, complete device and router replacements, purchasing various premium anti virus apps and countless hours troubleshooting my devices and home network the threat continues to resurface.

Although source of threat is considered technically unknown I believe it is likely my former partner, a jilted friend, personal adversary or some combination thereof.

Please note I am a gay man and have been recently somehow doxxed or targeted by bad actors slandering my name and possibly creating content of me without my consent. I am a strong advocate for children's rights, anti trafficking and consent. I have never willing created content of myself in a state of undress or engaged in adult activities and decline all offers to create content of an adult nature. I believe this is what targeted me. My research into this harassment contained in my photo library largely contains screenshots, photos, notes (from various dating apps) most of which is of (18 dates or suspects 18+) an adult nature and was attained as proof or evidence of possible leads. If you are opposed to to seeing to the aforementioned content, I completely understand, but this job isn't for you.

Although I'm considered quite tech savvy by those surrounding me I can guarantee you that comparatively I'm not. That being said, once we establish a threat model, determine the source or sources of my intrusions, I would you to monitor them for my device is Network to ensure that our implementation of any security features are going correctly. However I will ultimately have to begin to monitor myself monitor it myself after we've established safety.

Please contact me with any questions regarding devices Network or other assets that need on boarding as well as any questions you might need to ascertain a strategy and preliminary timeline or budget thereof.
Skills: Information Security Consultation, Vulnerability Assessment, Information Security, Malware Removal, Cybersecurity Management, Security Assessment & Testing, Penetration Testing, Network Security, Cloud Security, Security Engineering, Mobile App Testing, Website Security, Security Analysis, Python, Code Review
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
TikTok Recovery
not specified 1 day ago
Client Rank - Risky

Payment method not verified
1 open job
US United States
Risky
Required Connects: 6
My tiktok was hacked. Can you get it back? Also how much is it?
Skills: Information Security, SOC 2 Report, ISO 27001, Governance, Risk Management & Compliance, Compliance, Information Security Audit, Data Privacy, NIST SP 800-53, GDPR, HIPAA, NIST Cybersecurity Framework, Security Framework, Microsoft SQL Server, Risk Management, CMMC
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
Delete old Facebook account
20 - 50 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
1 open job
AE United Arab Emirates
Risky
Required Connects: 6
Hi dear, my friend request to delete his old account, he has forget the username and password (no number no email).
He doesn't have any access now to that account because it was old.

I can share with you profile link, but it's very important to delete the account, because he was used by someone we don't know and we need now to delete the account permanently
Skills: Information Security Consultation, Vulnerability Assessment, Information Security, Malware Removal, Cybersecurity Management, Security Assessment & Testing, Penetration Testing, Network Security, Cloud Security, Security Engineering, Mobile App Testing, Website Security, Security Analysis, Python, Code Review, Facebook
Hourly rate: 20 - 50 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Cybersecurity Policies & Cryptography Assignments – Multiple Milestones
200 USD 1 day ago
Client Rank - Medium

Payment method verified
$50 total spent
4 hires , 4 active
6 jobs posted
67% hire rate, 3 open job
no reviews
Registered at: 03/02/2025
US United States
Medium
Required Connects: 10
Cybersecurity Policies & Cryptography Assignments – Multiple Milestones

Job Type: One-time project with multiple milestones
I need an experienced cybersecurity professional with strong technical writing, research, and policy documentation skills to complete six assignments related to cybersecurity policies, cryptography, and ethical considerations in cybersecurity.

The work involves:

✅ Writing research-based papers (500–2,000 words) with proper APA formatting.
✅ Creating cybersecurity policies for various domains (e.g., encryption, remote access, system security).
✅ Developing a PowerPoint presentation for upper management.
✅ Constructing a full organizational security policy document.

Each milestone focuses on a different unit of the assignment, and payment will be made after successful approval of each milestone.

📌 Milestones & Deliverables

📌 Milestone 1: Unit 7 Assignment 1 – Cryptography & Cybersecurity Policies
Tasks:
Part 1 (500-1,000 words):
✅ Explain how Active Directory implements PKI. Cover the use of certificates, keys, and key security.

Part 2 (200+ words each):
✅ Give an example of a protocol that uses both public key and private key cryptography, explaining its purpose.
✅ Explain the relationship between public and private keys in asymmetric cryptography and why it is a "one-way" process.

Deliverables:
✔ Word document with:

Responses to all questions.
Proper APA citations.
📅 Deadline: 2-3 days.

📌 Milestone 2: Unit 7 Assignment 2 – Ethics & Mass Data Collection
Tasks:
Research & write a 2-page paper (double-spaced) on the following:
✅ Ethical arguments of mass data collection (e.g., NSA’s Bluffdale, Utah facility).
✅ Government's role in data surveillance – should it capture and store all data?
✅ Should the government compel companies (Google, Microsoft, Lavabit) to reveal customers’ encryption keys?
✅ Impact of Snowden's revelations on public perception of surveillance.
Requirements:
Must include at least 5 references.
Proper APA formatting (Title & References page required).
Deliverables:
✔ Word document with:

Research paper (2+ pages, double-spaced).
APA citations & references.
📅 Deadline: 2-3 days after Milestone 1.

📌 Milestone 3: Unit 8 – Cryptography & Cybersecurity Policies
Tasks:
Part 1 (1,000+ words):
✅ Step-by-step guide for implementing a secure wireless network using Active Directory & RADIUS server (including screenshots).

Part 2 (200+ words each):
✅ Explain how a hacker would crack passwords in both non-Active Directory and Active Directory environments.
✅ Write a remote access cybersecurity policy for remote users.
✅ Explain the key considerations of a mobile device management security policy.

Deliverables:
✔ Word document with:

Secure wireless network guide.
Remote access policy & mobile device security policy.
Proper APA citations.
📅 Deadline: 3-4 days after Milestone 2.

📌 Milestone 4: Unit 9 Assignment 1 – Cryptography & System Security Policies
Tasks:
Part 1 (1,000+ words):
✅ Research & explain the Stuxnet virus:

Its purpose and goals.
How it was discovered.
Initial infection methods.
Long-term impact on cyber-warfare.
Part 2 (200+ words):
✅ Construct a security policy for the physical domain.

Deliverables:
✔ Word document with:

Research-based report on Stuxnet.
Physical security policy.
APA citations & references.
📅 Deadline: 3-4 days after Milestone 3.

📌 Milestone 5: Unit 9 Assignment 2 – Cybersecurity Professional Presentation
Tasks:
Create a 10-slide PowerPoint presentation on a cybersecurity policy recommendation.

Prepare the slides for a 15-minute professional presentation to upper management.

Slides must include:
✅ Title slide & Reference slide (APA format).
✅ Well-structured slides (not just bullet points – include clear explanations).
✅ Speaker notes for each slide.

Write a 1-page paper (APA format) explaining:
✅ How you would use interpersonal skills (communication, decision-making, problem-solving, negotiation) to get management buy-in for your policy.

Deliverables:
✔ PowerPoint file (10 slides, with speaker notes).
✔ Word document (1-page reflection paper, APA format).

📅 Deadline: 3-4 days after Milestone 4.

📌 Milestone 6: Unit 10 – Cybersecurity Policy Documentation
Tasks:
Write a 2,000+ word comprehensive cybersecurity policy document, covering:
✅ All necessary security controls and cybersecurity domains.
✅ Policies for secure data warehousing and virtualized environments.
✅ Detailed sections covering organizational security measures.

Requirements:
✅ Minimum 5 sources cited.
✅ Must be paraphrased in your own words (no plagiarism).
✅ Proper APA formatting (Title & References page required).

Deliverables:
✔ Word document (2,000+ words, APA format).

📅 Deadline: 4-5 days after Milestone 5.

🎯 Required Skills & Tools:
🔹 Cybersecurity expertise (network security, encryption, policies).
🔹 Technical writing & research (APA formatting required).
🔹 PowerPoint presentation skills (for Milestone 5).
🔹 Knowledge of Active Directory, RADIUS, and password security.

💰 Budget & Payment:
💵 Payment released per milestone upon approval.

📥 How to Apply:
✅ Past cybersecurity writing samples (research papers, policies, or presentations).
✅ Estimated time for each milestone.
✅ Rate for full project or per milestone.

🚀 Looking forward to working with a talented freelancer!
Skills: Encryption, Information Security, Security Analysis
Fixed budget: 200 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Phishing scam 6k ouch pls help
not specified 1 day ago
Client Rank - Risky

Payment method not verified
1 open job
US United States
Risky
Required Connects: 8
I need you to find her, report her so she can’t harm anyone else, send back my money if possible and make sure I am protected from harm or stalking I also want to make sure she never does this to any other vulnerable young women, I’ve been scouring the internet for advice but the police and bank weren’t helpful. I don’t know how ethical this is but it’s my hard earned money and idk how else to get it back
Skills: Information Security, Computer Science, Python, Scala, Machine Learning, Java, C, C++, Digital Forensics, Bash, JavaScript, React, Node.js, Redux, System Administration
Budget: not specified
1 day ago
  • Web, Mobile & Software Dev, Web Development
Rapid miner project presentation
not specified 1 day ago
Client Rank - Risky

Payment method not verified
1 open job
US United States
Risky
Required Connects: 8
below are the guidelines for the presentation and what I need. I will upload the excel datafile for the presentation once accepted. I will need the presentation outline as below


i. Hands-on Tool Assessment Method

You are provided with a RapidMiner (.rmp) / KNIME (.knwf) file which is present on the page "No-Code Tool Files - Hotel Booking Cancellation Prediction" that already has the process prepared. Your task is to run the RapidMiner or run the KNIME file.
After executing the file, kindly include relevant screenshots from RapidMiner / KNIME utilized for deriving insights while answering the questions in the presentation or slide deck.
Please note that the provided RapidMiner / KNIME file is intended as a guide to help you complete the project. You are not restricted to using only the provided flow. You are encouraged to use your methods to reach the solution as well. These templates can be used as a reference to understand the structure of the project but feel free to explore other techniques to generate insights for the given problem.
Please use the deck from "Project Presentation Template - Hands-on Tool Assessment" to make the final submission and you can edit the file directly for the final submission.


Best Practices for Submission

The presentation or slide deck should be made keeping in mind that the audience will be the Data Science lead of a company.
The key points in the presentation/slide deck should be the following:
Business Overview of the Problem and solution approach
Key findings and insights
Business recommendations
Focus on explaining the key takeaways in an easy-to-understand manner
The inclusion of the potential benefits of implementing the solution will give you the edge.
Any submission found copied/plagiarized with other learners will not be scored and marked as zero.
Please ensure timely submission as post-deadline assignments will not be accepted.


Objective

The increasing number of cancellations calls for a Machine Learning-based solution that can help in predicting which booking is likely to be canceled. INN Hotels Group has a chain of hotels in Portugal, they are facing problems with the high number of booking cancellations and have reached out to your firm for data-driven solutions. You as a data scientist have to analyze the data provided to find which factors have a high influence on booking cancellations, build a predictive model that can predict which booking is going to be canceled in advance, and help in formulating profitable policies for cancellations and refunds.
Skills: Data Analysis, MySQL, SQL, Database Design, Oracle, Statistical Analysis, Python, Tableau, RapidMiner, Microsoft Excel, Data Engineering, Cybersecurity Tool, Information Security, Information Security Awareness
Budget: not specified
1 day ago
  • Data Science & Analytics, Data Analysis & Testing
I need an automate software.
not specified 1 day ago
Client Rank - Risky

Payment method not verified
1 open job
BD Bangladesh
Risky
Required Connects: 6
I am trying to submit Thailand visa on the website but I am unable to do so.
Can you help me with this ? every time different type of error .

website URL: https://www.combank.net.bd/thaievisa/
Skills: WordPress Security, Web Application Security, WordPress Customization, Website Security, WordPress Bug Fix, Vulnerability Assessment, Network Penetration Testing, Information Security, Penetration Testing, Cybersecurity Management, Web App Penetration Testing, WordPress Malware Removal, Custom PHP, Core PHP, Python
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
Ethical Hacker / Penetration Tester Needed for Cybersecurity Assessment
20 - 500 USD / hr
1 day ago
Client Rank - Excellent

Payment method verified
$110'279 total spent
287 hires , 13 active
1102 jobs posted
26% hire rate, 1 open job
15.21 /hr avg hourly rate paid
6649 hours
3.98 of 185 reviews
Registered at: 21/07/2013
DK Denmark
Excellent
Required Connects: 17
🚀 Are you passionate about IT security and love thinking like a hacker? We are looking for an ethical hacker to help us identify and close security gaps before malicious actors exploit them.

If you can find and exploit vulnerabilities in systems but want to use your skills for good, read on!

💻 What Will You Be Doing?
✅ Conduct penetration tests on networks, systems, and applications
✅ Identify, document, and report security vulnerabilities
✅ Perform social engineering tests, including phishing simulations
✅ Use OSINT to gather information about companies and employees
✅ Develop recommendations and implement solutions to enhance security

🛠 Who Are You?
✔ Experience with penetration testing, ethical hacking, and cybersecurity
✔ Familiarity with tools like Burp Suite, Metasploit, Nmap, Wireshark, Hydra
✔ Strong skills in Linux and Windows security
✔ Understanding of networks, firewalls, and access controls
✔ Certifications such as CEH, OSCP, CISSP, or similar are a plus but not required!

🚀 What We Offer
✨ Exciting security projects in a company that takes IT security seriously
✨ The opportunity to work with the latest hacking techniques and tools
✨ Flexible working hours and remote options
✨ A strong team of passionate security professionals
✨ Competitive salary and opportunities for further training

📍 Location: Remote
⏳ Employment type: Full-time / Part-time / Freelance

🔗 How to Apply
Are you ready to use your hacking skills to strengthen security? Send us your application and, if available, examples of previous penetration tests (without sensitive information).
Skills: Vulnerability Assessment, Penetration Testing, Security Analysis, Information Security, Kali Linux, Ethical Hacking, Network Security
Hourly rate: 20 - 500 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Call to action
Freelancing is a business
Make it more profitable with Vollna

Streamline your Upwork workflow and boost your earnings with our smart job search and filtering tools. Find better clients and land more contracts.