Optimize Network Security Projects on Upwork

Boost your success in finding network security projects on Upwork with Vollna. Utilize 30+ filters, real-time alerts, and analytics to refine and win more bids.
Signup for free to get access to all filter attributes and instant notifications when new jobs are posted.
Setup filter



Get access to over 30+ filter attributes, setup instant notifications, integrate with your CRM and marketing tools, and more.
Start free trial
297 projects published for past 72 hours.
Job Title Budget
Sophos Firewall Configuration Help
not specified 1 day ago
Client Rank - Medium

Payment method verified
Phone number verified
$473 total spent
7 hires, 5 active
10 jobs posted
70% hire rate, 2 open job
19.50 /hr avg hourly rate paid
16 hours paid
5.00 of 1 reviews
Registered: Apr 8, 2024
United States
United States
Zumbrota 10:54 PM
3
Sophos XGS126 Firewall Configuration for Security and Remote Access

This engagement covers the configuration of the Sophos XGS126 firewall to strengthen network security and enable secure remote access.

Scope of Work:

Initial Setup: Deploy the firewall, configure WAN/LAN interfaces, and integrate with existing network infrastructure.
Security Policies: Establish firewall rules, enable IPS, ATP, Sandstorm, and web filtering to protect against threats and enforce usage policies.
User Access Control: Configure user groups, authentication methods, and apply role-based access restrictions.
VPN Setup: Implement SSL or IPsec VPN for remote users, including certificate generation, access policies, and testing.
Monitoring & Alerts: Enable logging, alerts, and reporting via Sophos Central or on-prem systems.
Documentation & Handoff: Deliver system documentation and conduct a brief training session for IT staff.
Outcome:
A secure, fully configured Sophos firewall providing threat protection and encrypted remote access to support hybrid work environments.
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
MSP IT System Support Engineer – Tier II
17 - 21 USD / hr
1 day ago
Client Rank - Excellent

Payment method verified
$120 646 total spent
119 hires, 18 active
220 jobs posted
54% hire rate, 1 open job
14.33 /hr avg hourly rate paid
6 982 hours paid
4.64 of 78 reviews
Registered: Jan 24, 2012
United States
United States
FALLS CHURCH 12:54 AM
5
The MSP IT System Support Engineer – will be looked at as one of the senior technical members of the team and will be responsible for fielding complex high-level escalations and projects. Experience with at least 90% of the following technologies is required – Meraki, vLANS, smart switches, routers, VPN technology, Wireless networks, and network configurations. Strong Windows desktop experience, PowerShell scripting, O365 administration, and migration. Windows Server administration, including Active Directory and Remote Desktop Services. Virtualization experience with one or more of Azure, AWS, Hyper-V, or VMware. Experience implementing and troubleshooting Microsoft Office 365 and Azure. IT Glue documentation. Addigy, Mac experience is a plus… Previous MSP experience is a must-have

As an IT Systems Engineer Tier, you will be

Serving as an escalation point for support issues that are escalated.
Implementing new systems and network solutions and/or improving the efficiency of current implementations
Serving as an integral member of the Project Delivery teams by providing hands on technical support for complex projects, focusing on production and implementation.
Install, configure, and support network equipment, including routers, switches, and firewalls.
Support VMware virtual server technical issues.
Support Windows Server 2019+, including issues with Active Directory, domain operations, etc.
Provide infrastructure support in all areas needed, including storage networking, server/desktop OS, Cloud environments, network security, active directory, virtualization, system and network monitoring, and application installation, configuration, and troubleshooting.
Mentor/Coach to junior support engineers
An active leader of the technical support team.
Effectively applying Capital Techies methodology and enforcing Capital Techies standards.
Responsible for creating detailed documentation outlining how systems were configured and creating end-user guides to Capital Techies standards.
Responsible for maintaining detailed time tracking of your work
Core Skills and experience

· 5+ years of relevant MSP support experience

· 5+ years of Windows Server troubleshooting and deployment experience, including Domain creation, DHCP/DNS, and DFS replication.

· 5+ years of firewall/network layer support and deployment experience, including VLAN and switch configuration and troubleshooting.

· Vmware ESXi 6. X host build-out and troubleshooting experience.

· Hands-on experience with implementation and support of O365 services

· Expert knowledge of PowerShell and scripting.

· 2+ years of SAML/Single Sign-On experience (Azure, Okta)

· 5+ years of hands-on networking experience (routing and switching) with Sonicwall, Cisco, and Cisco Meraki is required

· Exceptional troubleshooting skills

Preferred experience with

Meraki Firewalls, Switches, APs
Connectwise RMM, Manage, Sell
IT Glue
Addigy
REQUIRED PROFESSIONAL SKILLS:

Superior verbal and written communication skills
Top-class customer service skills
Excellent documentation, reporting, and planning skills
Conscientious, accountable, detail-oriented, thorough, and consistent
Professional demeanor and appearance; punctual, team player
Outstanding people skills
Ambition and passion for learning and teaching
Create/maintain/improve network support documentation and processes
Client's questions:
  • Please list any certifications related to this project
  • How do you create a dependency map for systems operating in multi-tier architecture?
  • Describe your recent experience with similar projects
Hourly rate: 17 - 21 USD
1 day ago
  • IT & Networking, Network & System Administration
Microsoft Sentinel SIEM analyst
20 USD 21 hours ago
Client Rank - Excellent

Payment method verified
$18 579 total spent
167 hires, 45 active
358 jobs posted
47% hire rate, 10 open job
14.81 /hr avg hourly rate paid
460 hours paid
4.72 of 116 reviews
Registered: Jan 19, 2016
United States
United States
Cedar Park 12:54 AM
5
Seek a cyber security Analyst for a SOC.
Must have ability to use Microsoft Sentinel and Defender.

Proven ability to create playbooks and run books.
Must have credentials and certification.

Apply with your background and resume
Fixed budget: 20 USD
21 hours ago
  • IT & Networking, Information Security & Compliance
Remote vpn access with juniper srx
not specified 21 hours ago
Client Rank - Risky

Payment method not verified
Phone number verified
3 open job
no reviews
Registered: May 25, 2025
Kenya
Kenya
6:54 AM
1
Remote vpn access with juniper srx office access to remote staff. Platforms are purelyjuniper srx
Budget: not specified
21 hours ago
  • IT & Networking, Network & System Administration
Remote vpn access with juniper srx
not specified 21 hours ago
Client Rank - Risky

Payment method not verified
Phone number verified
3 open job
no reviews
Registered: May 25, 2025
Kenya
Kenya
6:54 AM
1
Remote vpn access with juniper srx for remote staff to access office resources remotely
Budget: not specified
21 hours ago
  • IT & Networking, Network & System Administration
Remote access VPNs - Juniper
not specified 21 hours ago
Client Rank - Risky

Payment method not verified
Phone number verified
3 open job
no reviews
Registered: May 25, 2025
Kenya
Kenya
6:54 AM
1
I have network security project that I would want to know if you are interested. It entails configuring upto 3 SRX300 devices for remote access VPNs. The objective is to enable remote staff to access office resources from their homes.
Budget: not specified
21 hours ago
  • IT & Networking, Network & System Administration
Openshift Security Architect- part time
not specified 19 hours ago
Client Rank - Medium

Payment method verified
13 jobs posted
1 open job
no reviews
Industry: Tech & IT
Company size: 10
Registered: Feb 16, 2023
India
India
Secunderabad 9:24 AM
3
The ideal candidate will have extensive experience securing the full OpenShift stack—
including platform components, secrets management, encryption protocols, network
connectivity, and integrations with service mesh architectures. You will serve as a
security-focused subject matter expert (SME) in OpenShift, leading secure architecture
designs, platform hardening, and regulatory alignment initiatives.

- Part Time Availability in IST
- 50-60hours per month
Looking for any freelancer with strong expertise in OpenShift Security.


Key Responsibilities:
• Design and architect secure, scalable, on-premise OpenShift clusters, aligned to
best practices in cybersecurity, zero-trust, and compliance.
• Implement and enforce secrets management solutions (e.g., HashiCorp Vault,
OpenShift Secrets) across workloads and platform services.
• Oversee encryption strategies for data at rest and in transit, ensuring alignment
with enterprise data protection policies.
• Lead implementation of zero-touch provisioning and automated deployment
pipelines that prioritize security from the outset.
• Design and validate network segmentation, policy enforcement, and service
mesh (e.g., Istio) configurations to ensure secure east-west and north-south
traffic flows.
• Collaborate with DevSecOps and Infrastructure teams to embed security
controls across CI/CD pipelines, container registries, and runtime environments.
• Develop security baselines, perform threat modeling, and guide remediation of
vulnerabilities across the OpenShift platform.
• Provide documentation, training, and guidance to internal teams on OpenShift
security best practices and operational handover.
• Understand and work with core containerization features such as namespaces,
SELinux labels, cgroups, and security capabilities.
• Deploy applications and assess their container runtime security settings and
limitations using Security Context Constraints (SCCs).
• Configure and manage SCCs to define the security context for containers,
minimizing privileges and restricting operations to align with enterprise security
standards.
• Enforce use of trusted container registries and images through signed image
policies and registry integrations.
• Identify and work exclusively with trusted and signed container images; scan and
verify image integrity before deployment.
• Load, sign, and manage images within secure, internal registries.
• Build secure container images using best practices, including Source-to-Image
(S2I) methods and secure Dockerfile construction.
• Integrate Jenkins pipelines to automate builds, perform scanning, and enforce
code validation as part of the CI/CD lifecycle.
• Implement fine-grained access control mechanisms by assigning user roles,
permissions, and binding policies within the OpenShift cluster.
• Integrate with Red Hat Identity Management (IdM) services to authenticate users,
manage groups, and facilitate identity federation.
• Log in to OpenShift using IdM-managed accounts and ensure proper
authorization workflows are in place for cluster operations.
• Install and configure SSO authentication mechanisms for the OpenShift cluster.
• Integrate enterprise web applications with OpenShift SSO to support centralized
authentication and seamless user access experiences.
• Define and automate deployment policies that enforce usage of approved
images, registries, and deployment patterns.
• Configure deployment triggers for automated image updates and use secrets to
manage access credentials for external registries securely.
• Use quotas, limits, and scheduling constraints to govern resource utilization and
ensure container orchestration aligns with business SLAs.
• Restrict container placement on nodes based on label selectors, affinity rules,
and node taints.
• Manage the secure use of secrets and config maps for dynamic configuration of
applications and access to protected resources.
• Configure and manage software-defined networking (SDN) policies to isolate
applications, tenants, and environments.
• Design and enforce network segmentation and micro-segmentation using
network policies and service mesh capabilities (e.g., Istio).
• Configure and manage file-based and block-based container storage, applying
encryption, access control, and data retention policies.
• Ensure persistent storage is provisioned securely using CSI drivers and
OpenShift storage classes.


Requirements:
• Bachelor’s or Master’s degree in Computer Science, Information Security, or
related technical field.
• 9+ years of experience in infrastructure or platform architecture with at least 3+ years focused on OpenShift (preferably on-prem).
• Proven expertise in OpenShift platform security, Kubernetes RBAC, network
policies, and container hardening techniques.
• Hands-on experience with:
o Secrets management (e.g., Vault, OpenShift Secrets)
o Encryption and key management
o Service Mesh (Istio or equivalent)
o Network security including firewalls, ingress/egress controls, and network
segmentation
o Automation and Infrastructure-as-Code (Terraform, Ansible, GitOps
pipelines such as Argo CD or Tekton)
o Strong understanding of compliance and governance frameworks (e.g.,
ISO 27001, NIST, CIS Benchmarks).
o Practical experience integrating security into DevOps and CI/CD
environments (e.g., Jenkins, OpenShift Pipelines, GitHub Actions).
o Excellent problem-solving, communication, and documentation skills.
• Strong understanding of containerization fundamentals, including Linux
namespaces, cgroups, and container runtime security. Ability to identify
potential risks within containerized environments and apply isolation and
hardening techniques to mitigate them.
• Experience configuring OpenShift to pull container images exclusively from
trusted, validated registries, ensuring images meet enterprise security and
compliance standards. Familiarity with using image signing and image stream
policies to enforce trust.
• Demonstrated ability to select, validate, and maintain secure base images for
application deployment. Skilled in using image scanning tools (e.g., Clair, Trivy,
or Quay Security Scanner) to identify and remediate vulnerabilities in container
images.
• Proficient in designing secure Dockerfiles and build pipelines that enforce least
privilege, minimize attack surfaces, and avoid unnecessary binaries or tools.
Incorporates security controls during image build and integrates static analysis
into CI/CD.
• Experience designing and implementing Role-Based Access Control (RBAC) and
Security Context Constraints (SCCs) to limit user and service account
permissions. Ability to design multi-tenant environments with tightly scoped
permissions and security boundaries.
• Proven ability to configure and manage SSO with OpenShift, integrating identity
providers such as LDAP, Active Directory, or OAuth for seamless authentication
and centralized access management.
• Skilled in implementing automated, policy-driven deployments using GitOps
(e.g., Argo CD, OpenShift GitOps) and integrating admission controllers or
OPA/Gatekeeper to enforce security, compliance, and operational policies at
deployment time.
• In-depth knowledge of Kubernetes-native orchestration capabilities within
OpenShift. Ability to define and manage Helm charts, Operators, and Custom
Resource Definitions (CRDs) to orchestrate application lifecycle while enforcing
security policies.
• Expertise in configuring network policies, service mesh security (e.g., Istio
mTLS), and ingress/egress controls to isolate workloads and protect against
lateral movement within the cluster. Familiarity with CNI plugins and advanced
networking features in OpenShift.
• Experience with configuring persistent storage in OpenShift using CSI drivers,
dynamic provisioning, and storage class policies. Capable of securing storage
with encryption-at-rest, access control, and multi-tenancy safeguards.

Preferred Certifications:
• Red Hat Certified Specialist in OpenShift Administration
• Red Hat Certified OpenShift Architect
• Certified Kubernetes Administrator (CKA)
• HashiCorp Vault Associate or other secrets management credentials
• Security certifications (e.g., CISSP, CKS)

Interested Freelancers Please Share your Latest CV with your proposal.
Client's questions:
  • Please list any certifications related to this project
  • How do you create a dependency map for systems operating in multi-tier architecture?
Budget: not specified
19 hours ago
  • IT & Networking, DevOps & Solution Architecture
Configure firewall, configure mysql, secutriy
30 USD 18 hours ago
Client Rank - Excellent

Payment method verified
$2 472 total spent
72 hires, 17 active
233 jobs posted
31% hire rate, 5 open job
8.23 /hr avg hourly rate paid
136 hours paid
4.68 of 41 reviews
Industry: Tech & IT
Individual client
Registered: Oct 16, 2012
United Kingdom
United Kingdom
Coventry 6:54 AM
5
Server is getting high mysql load, and its causing issues in server performance, it might need configuration or it might be an attack on server

need someone who can fix and configure firewall , optimize php--fpm and mysql according to current server spec
Fixed budget: 30 USD
18 hours ago
  • IT & Networking, Network & System Administration
AWS Workspaces Setup (Secure VDI for Offshore Financial Analysts)
25 - 60 USD / hr
18 hours ago
Client Rank - Medium

Payment method verified
Phone number verified
1 jobs posted
100% hire rate, 1 open job
no reviews
Industry: Finance & Accounting
Company size: 10
Registered: May 26, 2025
United States
United States
Azusa 8:54 PM
3
Job Description:
We’re building a next-generation financial outsourcing firm and need an AWS-certified professional to set up a secure, cloud-based Virtual Desktop Infrastructure (VDI) using AWS Workspaces.
This setup will support offshore analysts (Pakistan-based) working with U.S. financial advisors. Security, speed, and simplicity are key. This is a one-time setup, with potential for ongoing support.

Scope of Work:
Provision 3–5 AWS Workspaces (U.S. region)
Set up:
• IAM roles with least privilege
• MFA for all users
• User session timeout, IP whitelisting
• Disable USB, clipboard, local file sharing
• Access to apps only (Zoom, Teams, VOIP, Asana via browser)
Install inside Workspace:
• Zoom, Microsoft Teams
• VOIP (Zoom Phone or Dialpad)
• Asana (web only, no desktop install)
Endpoint Protection:
• Recommend and install business-grade endpoint security (e.g., Bitdefender, CrowdStrike, or SentinelOne)
Logging / Admin:
• Basic usage tracking and audit logging (CloudTrail, CloudWatch, or alternative)
• Cost control settings (auto shutdown, idle timeout)
• Simple handover guide or Loom video
Hourly rate: 25 - 60 USD
18 hours ago
  • IT & Networking, Network & System Administration
Website Security Expert Needed to Mitigate Bot Attacks
40 - 70 USD / hr
17 hours ago
Client Rank - Medium

Payment method verified
Phone number verified
$40 total spent
2 hires
4 jobs posted
50% hire rate, 1 open job
5.00 of 1 reviews
Industry: Retail & Consumer Goods
Individual client
Registered: Jan 4, 2024
United States
United States
Fairfax 8:54 PM
3
We are experiencing persistent bot attacks on our website, resulting in frequent 403 and 504 errors. Despite our use of AWS Cloudfront with Web ACLs and the fail2ban application, we are unable to resolve these issues. We are looking for an experienced professional who can identify vulnerabilities and implement effective solutions to secure our site. Your expertise in web security and bot mitigation will be essential to restore optimal functionality and protect our online resources.
Client's questions:
  • Do you have experience with AWS Cloudfront and setting Web ACL rules? Do you have experience stopping bot attacks?
Hourly rate: 40 - 70 USD
17 hours ago
  • IT & Networking, Information Security & Compliance
Website Security Expert Needed to Stop Bot Attacks
80 USD 17 hours ago
Client Rank - Medium

Payment method verified
Phone number verified
$40 total spent
2 hires
4 jobs posted
50% hire rate, 1 open job
5.00 of 1 reviews
Industry: Retail & Consumer Goods
Individual client
Registered: Jan 4, 2024
United States
United States
Fairfax 8:54 PM
3
We are experiencing persistent bot attacks on our website, resulting in frequent 403 and 504 errors. We are using AWS Cloudfront with Web ACLs and the fail2ban application, but still unable to resolve these issues. Looking for an experienced professional who can identify vulnerabilities and implement effective solutions to secure our site.
Client's questions:
  • Do you have experience with AWS Cloudfront and setting Web ACL rules? Do you have experience stopping bot attacks?
Fixed budget: 80 USD
17 hours ago
  • IT & Networking, Information Security & Compliance
Cisco Firewall Configuration Migration Expert Needed
25 - 50 USD / hr
17 hours ago
Client Rank - Risky

Payment method not verified
1 jobs posted
1 open job
no reviews
Company size: 10
Registered: Jan 3, 2022
United States
United States
10:54 PM
1
We are seeking an experienced network security specialist to assist in migrating the configuration from a Cisco 5516x ASA firewall to a new Cisco ASA 1120 equipped with FTD software. The ideal candidate will possess a deep understanding of Cisco ASA devices and firewall configurations, ensuring a seamless transition without compromising security policies. Strong troubleshooting skills and attention to detail are essential. If you have prior experience with similar migrations and can optimize the process, we'd love to hear from you.
Hourly rate: 25 - 50 USD
17 hours ago
  • IT & Networking, Network & System Administration
DevOps Engineer Needed for Containerization & Security Hardening of Research Environment
500 USD 16 hours ago
Client Rank - Medium

Payment method verified
Phone number verified
$350 total spent
1 hires
3 jobs posted
33% hire rate, 1 open job
5.00 of 1 reviews
Industry: Finance & Accounting
Company size: 2
Registered: Sep 3, 2022
India
India
Gurgaon 9:24 AM
3
We are seeking an experienced DevOps Engineer with expertise in CentOS to help us containerize a single-server research environment.
We want to run multiple binaries that:

Read large, immutable binary market-data files from the NVMe (RO).
Do compute intensive operations
Write logs & results to the SSD (RW).

We need each research user to launch their own Docker-packaged simulation while being strictly capped to a pre-assigned slice of CPU cores, RAM, and I/O bandwidth—no cross-talk, no data corruption, full reproducibility.

1. CentOS Setup & Hardening
2. Container Infrastructure
3. Internal Registry
4. Resource Fencing
5. Job-Launch Workflow
6. Monitoring & Alerting
7. Documentation & Handoff
Fixed budget: 500 USD
16 hours ago
  • IT & Networking, DevOps & Solution Architecture
Terraform Automation on Azure
25 - 50 USD / hr
15 hours ago
Client Rank - Risky

Payment method not verified
1 open job
no reviews
Registered: Jun 16, 2025
United States
United States
1
I need assistance with automating infrastructure provisioning using Terraform for Azure. The focus is on provisioning network infrastructure.

Key requirements:
- Write Terraform scripts to automate the provisioning of Azure network resources such as Virtual Networks, Subnets, and Network Security Groups.
- Ensure scripts are well-documented and modular for future scalability.
- Provide a brief walkthrough of the code and setup.

Ideal skills and experience:
- Proficiency in Terraform and Azure.
- Experience with Azure network resource provisioning.
- Strong documentation skills.

Skills: Cloud Computing, Azure, Network Administration, Terraform
Hourly rate: 25 - 50 USD
15 hours ago
  • Websites, IT & Software, Cloud Computing, Azure, Network Administration, Terraform
macOS Endpoint Security & Remote Dev Environment Setup
3,000 USD 15 hours ago
Client Rank - Risky

Payment method not verified
Phone number verified
1 open job
India
India
9:24 AM
1
📝 Project Description:
We are a tech company looking to secure our codebase and developer workstations using a centralized and locked-down macOS-based setup. We want to implement a high-security remote development environment where all employees work through Mac minis (either in-office or accessed remotely), with no local code access on their personal or company laptops.

🔍 What We Need:
An experienced endpoint security / macOS infrastructure consultant or agency to help us:

🔐 Device Management:
Set up and configure MDM solution (Kandji, Jamf, or JumpCloud) on Mac minis and developer laptops.

Enforce policies:

USB/AirDrop/Bluetooth restrictions

App whitelisting

FileVault encryption

Terminal access control

Remote wipe and lock

👀 Activity Monitoring:
Implement and configure Teramind (or equivalent DLP software)

Clipboard, file access, Git activity, and screen monitoring

Alerts for risky behavior (e.g., Git push to unapproved repos, large clipboard copy)

Periodic or real-time session recording

💻 Centralized Workstation Setup:
Configure Mac minis for:

Controlled IDE access (VS Code, GitHub Desktop, etc.)

Remote access via Jump Desktop, AnyDesk, or similar tools

Git remotes locked to company repos only

VPN (Tailscale/ZeroTier) for remote access to Mac mini

Optional: Implement DNS or network-level outbound restrictions (e.g., Cloudflare Gateway)

🧑‍💻 Access Control:
Restrict development activity to Mac minis only

No local development or Git access on employee laptops

Enforce session timeouts, access logging, etc.

⚙️ Tools/Tech Stack (we are flexible):
Preferred MDM: Kandji (open to Jamf or JumpCloud)

DLP: Teramind (or similar)

Remote access: Jump Desktop / AnyDesk / Apple Remote Desktop

VPN: ZeroTier, Tailscale, or similar

GitHub-based source control

📄 Deliverables:
Fully configured Mac minis and developer devices (via MDM)

Monitoring dashboards and rule sets

Git repo access controls

Documentation/SOP for future onboarding

Optional: Ongoing support offer (retainer model welcome)

✅ Ideal Skills:
Experience with macOS security hardening

Kandji, Jamf, or JumpCloud expertise

Teramind (or any DLP) deployment experience

Endpoint monitoring, MDM, and insider threat prevention

Strong understanding of Git-based dev workflows

📍 Location:
Remote (India-based professionals/agencies preferred, but open globally)
Fixed budget: 3,000 USD
15 hours ago
  • IT & Networking, Network & System Administration
Linux Network Bonding Configuration Expert Needed
15 - 25 USD / hr
13 hours ago
Client Rank - Excellent

Payment method verified
$2 594 total spent
29 hires, 12 active
98 jobs posted
30% hire rate, 6 open job
13.40 /hr avg hourly rate paid
84 hours paid
4.98 of 17 reviews
Registered: Dec 3, 2012
United States
United States
Wilmington 12:54 AM
5
Skilled professional to configure network bonding in a Linux environment to pool bandwidth together . The ideal candidate will have hands-on experience with various bonding modes, kernel networking, and performance tuning. You will work closely with our team to optimize our network setup and ensure seamless connectivity. If you have a strong background in Linux networking and a passion for enhancing system performance, we would love to hear from you!

Regards
Hourly rate: 15 - 25 USD
13 hours ago
  • IT & Networking, Network & System Administration
IT Help Desk Network Tech L1/L2
6 - 12 USD / hr
12 hours ago
Client Rank - Good

Payment method verified
$4 154 total spent
9 hires
14 jobs posted
64% hire rate, 1 open job
6.14 /hr avg hourly rate paid
534 hours paid
4.19 of 7 reviews
Industry: Tech & IT
Company size: 2
Registered: Feb 9, 2021
United States
United States
Jamesburg 11:54 PM
4
Managed Services Provider seeking an experienced IT Help Desk technician to work US Eastern Standard / Daylight Time schedule (GMT -5) or earlier.

Fluent English speaking is required.

The position's tasks include:

- Remote and scheduled installations and updates for Windows Desktops & Servers.
- End user support for Microsoft and other 3rd party software via phone and ticketing system
- End user mobile device support (iPhone / Android / Windows)
- Microsoft Administration (On boarding/off boarding users)
- Troubleshoot network issues that may be related to printing, routers, OS and others.

Applicants must be familiar with technical support roles in a managed I.T. services environment and able to perform technical tasks and research solutions with minimal assistance. It is also important to be a team player able to work with other technicians and / or mentor those in a junior role.

We use a ticketing system (Kaseya) so you must also be familiar with keeping detailed notes about communications, technical troubleshooting, and setup steps you take when performing assigned duties.

Applicants must have strong communication skills and be able to communicate in clear English via phone (calls to U.S. based clients), e-mail, and chat. - ability to provide support via phone is required.

Critical thinking, decision making, and troubleshooting skills will be needed on a daily basis - our technicians frequently research solutions on their own using Google and other available resources.

Job applicants must have strong experience with:

Managed Services Provider environment
Windows Server 2022/2019
Microsoft 365 and Office 365
Microsoft Outlook configuration
Windows 10 & 11 Professional
Microsoft Hyper-V (or other virtualization platforms)
Active Directory setup and maintenance
Active Directory, user and computer management
Windows Server based remote access (RWW, RDS, RDP, Terminal Services)
DNS / DHCP Services
NTFS File and Share permissions
Storage Management (hardware RAID)
Server Troubleshooting
Workstation Troubleshooting
TCP/IP Networking
Firewall configurations (including NAT, ACLs, inbound/outbound rules)
Windows Desktop support in Active Directory domain environments
Virus / Malware detection and removal

A plus to have experience with the following:

Office365 / Hosted Exchange
Lenovo or HP Server Hardware
MS SQL server maintenance
Batch file and scripting
Server performance monitoring
Network performance monitoring
Network Switch configuration including VLANs
Kaseya experience
Business-Grade Anti-Virus platform experience
Business-Grade Backup software (MSP360, Wasabi, AWS.)
Microsoft Azure and Entra
Service Desk / Help Desk Management
Microsoft, Sonicwall, or Cisco certifications

Customer Service Skills

The ability to provide prompt and friendly service to clients is critical so we are looking for applicants who enjoy resolving issues and being pro-active to help users enjoy the support experience.

This position will be a contract based position but for the right applicant it is expected to be steady and require "full time hours" for an extended period of time and work solely for the company.

Thank you for your interest!
Client's questions:
  • Describe your recent experience with similar projects
  • Please list any certifications related to this project
  • Describe the best customer service you have ever received. What made it special?
  • What is your current availability in hours/week?
  • What CRM tools do you have experience using?
Hourly rate: 6 - 12 USD
12 hours ago
  • IT & Networking, Network & System Administration
DevOps Lead/Engineer with CI/CD and Security Compliance Expertise
15 - 30 USD / hr
12 hours ago
Client Rank - Excellent

Payment method verified
$115 335 total spent
34 hires
116 jobs posted
29% hire rate, 3 open job
15.80 /hr avg hourly rate paid
6 893 hours paid
4.15 of 31 reviews
Registered: May 6, 2016
India
India
Navi Mumbai 9:24 AM
5
We are seeking a highly skilled DevOps Lead/Engineer with 3 to 10+ years of experience to join our team. The ideal candidate will be responsible for implementing CI/CD pipelines and managing containerized environments using Docker and Kubernetes. Additionally, expertise in Infrastructure as Code (IaC) with Terraform and Ansible is required. Familiarity with IAM and HIPAA/GDPR-compliant systems is essential to ensure the highest security standards. If you have a passion for DevSecOps and can drive our projects to success, we want to hear from you!
Hourly rate: 15 - 30 USD
12 hours ago
  • IT & Networking, DevOps & Solution Architecture
Virtualization Expert for Mobile Devices on Ampere Instances
20 - 50 USD / hr
10 hours ago
Client Rank - Good

Payment method verified
Phone number verified
$5 752 total spent
5 hires, 2 active
18 jobs posted
28% hire rate, 1 open job
33.22 /hr avg hourly rate paid
41 hours paid
5.00 of 4 reviews
Individual client
Registered: Jan 20, 2018
Canada
Canada
Toronto 12:54 AM
4
We are seeking a skilled professional with a strong background in virtualizing mobile devices, specifically on Ampere instances. The ideal candidate should have extensive experience with Android environments, and familiarity with additional operating systems is a plus. Your role will involve setting up, configuring, and optimizing virtual mobile device environments for testing and development purposes. If you have a proven track record in mobile virtualization and a passion for technology, we want to hear from you!
Client's questions:
  • Describe your recent experience with similar projects
  • Describe common challenges of maintaining SLAs
  • How do you operationalize your projects?
Hourly rate: 20 - 50 USD
10 hours ago
  • IT & Networking, Network & System Administration
Mobile App & API Penetration Test (3-Day Delivery – Remote)
3,000 USD 9 hours ago
Client Rank - Excellent

Payment method verified
$29 320 total spent
15 hires, 8 active
14 jobs posted
100% hire rate, 2 open job
10.41 /hr avg hourly rate paid
2 621 hours paid
4.84 of 8 reviews
Individual client
Registered: Dec 27, 2021
United Arab Emirates
United Arab Emirates
Dubai 7:54 AM
5
We are hiring an experienced application security expert to conduct a mobile app and API penetration test for an utility client. The project must be conducted fully remotely and completed within 3 business days from the kickoff.

You will be supporting our consulting firm in delivering a high-impact audit that includes automated vulnerability scanning and manual penetration testing.

Scope of Work:
Target Assets:

Android Mobile Application (APK will be provided)

Associated API endpoints (documentation or discovery-based)

Test/staging environment access with user credentials

Testing Objectives:

Automated scanning aligned with OWASP Mobile Top 10 and OWASP API Security Top 10

Manual exploitation (authentication bypass, injection, insecure storage, etc.)

API token/session testing, privilege escalation, and logic flaws

Generate a clear, well-documented vulnerability report with PoC and mitigation advice

Deliverables:
Technical report (PDF): Vulnerabilities with CVSS rating, descriptions, and remediation

Executive summary (1-page overview for management)

Screenshots, logs, and PoC material

Delivery within 3 days from project start

Requirements:
Proven experience in mobile and API penetration testing (please include past reports or references)

Familiar with OWASP standards, PTES methodology

Strong written communication for clear, client-ready reporting

Certifications like OSCP, CEH, or GIAC (preferred, not required)

Ability to sign NDA (required)

Budget:
💵 Fixed-price: $2,000 – $3,000 USD, depending on experience and quality of deliverables.

Proposal Instructions:
Please include:

A short summary of your relevant experience

Example of a past mobile/API pentest you’ve conducted (can be redacted)

Your proposed timeline to complete this assignment

Tools you plan to use
Fixed budget: 3,000 USD
9 hours ago
  • IT & Networking, Information Security & Compliance
Help Recover Lost PS4 Account
10 USD 9 hours ago
Client Rank - Risky

Payment method not verified
Phone number verified
1 open job
United States
United States
10:54 PM
1
I am seeking assistance to recover my lost PlayStation account. Unfortunately, I have forgotten both the email and password associated with the account, but I do remember the username, which is 'hotcheetos38'. If you have experience with account recovery processes, particularly for PlayStation accounts, please reach out. I am willing to pay $10 (im broke :( ) for this service. Your expertise in navigating the recovery steps will be greatly appreciated.
Fixed budget: 10 USD
9 hours ago
  • Accounting & Consulting, Accounting & Bookkeeping
Consultant Needed for PCI-SP Level 2 Certification Guidance
not specified 8 hours ago
Client Rank - Good

Payment method verified
$4 535 total spent
8 hires, 1 active
9 jobs posted
89% hire rate, 1 open job
4.19 /hr avg hourly rate paid
789 hours paid
5.00 of 8 reviews
Registered: Oct 8, 2015
United States
United States
Covina 8:54 PM
4
We are seeking an experienced consultant to guide us through the PCI-SP level 2 certification process. We would like to work with a QSA who can provide assistance with Self-Assessment Questionnaires (SAQs), penetration testing, and implementing automated monitoring solutions. Your expertise will help ensure compliance and strengthen our security posture.

Given our size, we should be able to get away with level 2 SP certification, which allows for us to do an AOC versus a ROC. Depending on price, we could be open to the higher level certification, but it is not required.

We don't have any CC data flowing through our systems, but rather use iframe-based solutions (and P2PE hardware) that, if we were a merchant, would qualify for SAQ-A. With PCI v4, however, we are now in-scope so need assistance filling out the service-provider SAQ D and meeting the requirements thereof. Many sections won't apply, so we hope this won't be too onerous.

Ideally, we'd like a fixed-price quote for completing the entire process, but we realize this may not be practical. **This project will be for a small (couple of hours) exploratory scoping project to determine exactly the cost and what is needed, after which we will hire you on a flat-rate model.**

If you are a QSA but not a pentester, we are OK moving that into a separate project.

We host a PHP-based web app on AWS, using RDS databases and the WAF firewall.

If you have a strong understanding of PCI requirements and can provide practical guidance, we would love to hear from you.
Client's questions:
  • What is a rough (can be wide) estimate for total cost of a project like this?
  • Please list any certifications related to this project
  • Describe your recent experience with similar projects
Budget: not specified
8 hours ago
  • IT & Networking, Information Security & Compliance
Security Operations Analyst with Crowdstrike and Trellix Expertise
20 - 45 USD / hr
9 hours ago
Client Rank - Medium

Payment method verified
Phone number verified
1 jobs posted
1 open job
no reviews
Company size: 10
Registered: Oct 9, 2023
United States
United States
11:54 PM
3
We are seeking a skilled Security Operations Analyst with extensive experience in Crowdstrike (Logscale, NG SIEM, Falcon Platform) Trellix (Helix, Forensics, E-PO, EDR) and Microsoft Sentinel SIEM, endpoint E5 Cal portfolio of products . The ideal candidate will monitor, analyze, and respond to security incidents while leveraging these tools for efficient threat detection and response. Your role will involve maintaining security protocols and reporting on security incidents. If you're passionate about cybersecurity and have a strong background in these platforms, we would love to hear from you!
Hourly rate: 20 - 45 USD
9 hours ago
  • IT & Networking, Information Security & Compliance
Ubiquiti Home Network Expansion / solar expansion
50 USD / hr
7 hours ago
Client Rank - Medium

Payment method verified
1 open job
no reviews
Registered: Jun 16, 2025
United States
United States
3
I need help expanding an existing Ubiquiti home network using UniFi Access Points, and solar powered remote points which will include battery power backups to solar points, camera, etc. One access point needs to be configured such that a doorbell type application can trigger relays on a large gate to open/close the gate.

Consultant must be able to travel and project is located in West Central TX.

Requirements:
Spec out all required hardware consistent with clients input-
Install Solar powered UniFi Access Points / camera and wifi broadcastng for optimal coverage
- Integrate with existing home internet service
- Ensure network security and stability
-

Skills:
- Must have Experience with Ubiquiti products, especially UniFi
- Networking knowledge for home setups
- Technical support skills
- Good communication for tutorials

Skills: System Admin, Network Administration, Solar, WiFi, Ubiquiti
Hourly rate: 50 USD
7 hours ago
  • Websites, IT & Software, Engineering & Science, System Admin, Network Administration, Solar, WiFi, Ubiquiti
Looking for a technical consultant with the experience below.
20 USD 7 hours ago
Client Rank - Medium

Payment method verified
Phone number verified
$677 total spent
19 hires, 11 active
51 jobs posted
37% hire rate, 8 open job
4.96 of 4 reviews
Industry: Engineering & Architecture
Company size: 2
Registered: May 25, 2024
United States
United States
Arlington 10:54 PM
3
I am looking for someone with following experience below

Incident management and reducing time-to-recovery
Security networking and infrastructure awareness and knowledge (experience is a plus)
Driving org-wide initiatives across multiple engineering teams
Working on critical level, high-visibility priorities

🔧 What I Need Help With:
✅ Real-time support during one conversation (via chat, notes, or shared doc)
✅ Help shaping and improving technical answers (incident response, systems, security, AI)
✅ Assisting with live phrasing of cross-functional collaboration examples

🧠 Ideal Background:

Experience as a Staff+ Engineer, TPM, SRE, or Engineering Manager

Strong knowledge of:

Incident management
Security and networking
Large-scale system design
AI systems and development
Software engineering and development

Availability is needed of the 18th and for 1 hour
Fixed budget: 20 USD
7 hours ago
  • IT & Networking, Information Security & Compliance
Hacker needed for stalking case
not specified 7 hours ago
Client Rank - Risky

Payment method not verified
Phone number verified
1 open job
United States
United States
8:54 PM
1
I’ve recently been cyber stalked by burner numbers for the last 8 months. They have been happening continuously, and ruining my life. The info I’ve received is that is a voIP provider called onvoy. I have both of the numbers and wanted to track the ip or emails associated with it so I can figure out who is stalking me.

Kalisha
Budget: not specified
7 hours ago
  • IT & Networking, Information Security & Compliance
Level 2 IT Technician (MSP | Intune + Networking Expert)
not specified 6 hours ago
Client Rank - Excellent

Payment method verified
$11 483 total spent
10 hires, 3 active
37 jobs posted
27% hire rate, 2 open job
12.66 /hr avg hourly rate paid
842 hours paid
4.98 of 4 reviews
Industry: Tech & IT
Company size: 2
Registered: Mar 7, 2021
United States
United States
Toms River 11:54 PM
5
Are you a highly skilled IT professional looking for a position where trust, autonomy, and technical excellence are non-negotiable? We're seeking a Level 2 IT Technician to join our MSP team — someone who eats, sleeps, and breathes Microsoft Intune, and who takes pride in owning issues from start to finish.

This isn’t a role for someone looking to just follow checklists. We need a trusted expert who can configure environments from scratch, automate solutions, solve problems independently, and ensure our clients’ systems and networks run like clockwork.

The hours are 9-6pm EST.

- Be the go-to Intune expert, configuring tenants from the ground up — including compliance policies, application deployments, device profiles, and endpoint security.
- Manage OneDrive and SharePoint setups for folder redirection, collaboration, and backup strategies.
- Leverage PowerShell to automate onboarding, policy enforcement, and system diagnostics.
- Deploy, configure, and secure pfSense firewalls, Unifi switches, access points, and full LAN/WLAN environments.
- Set up and manage VLANs across client environments for segmentation, performance, and security.
- Provide advanced support for Office 365, Outlook, and Teams-related issues.
- Deploy and troubleshoot Azure-based solutions, including identity, security, and DNS.
- Perform full-stack troubleshooting: user machines, software conflicts, networking, permissions, and system availability.
- Respond and resolve tickets
- Document configurations and resolution processes in our ticketing and documentation systems.
- Collaborate with other engineers to refine processes, improve deployment standards, and maintain operational excellence.

Some of our Stack

- Microsoft Intune (Endpoint Manager): full tenant configuration, app and policy deployments, Windows Autopilot, security baselines.
- pfSense: firewall setup, VPN tunnels, routing, traffic shaping, rule management.
- Unifi: switch and access point deployment, Wi-Fi configuration, adoption, firmware, and controller-based management.
- VLAN design and segmentation: tagged/trunk ports, inter-VLAN routing, DHCP scopes.
- PowerShell scripting: automation for system tasks, onboarding, and troubleshooting.
- Microsoft 365: user provisioning, licensing, SharePoint and OneDrive configuration and redirection.
- Azure AD: user and group management, Conditional Access, DNS zone configuration, identity protection.
- Active Directory and Group Policy (GPO).
- Strong familiarity with Windows Server, basic virtualization, and core networking protocols (TCP/IP, DHCP, DNS, NAT, etc).
- Experience working in a Managed Services Provider (MSP) — handling multiple clients, varied environments, and complex ticket queues.
Budget: not specified
6 hours ago
  • IT & Networking, Network & System Administration
Fortinet Switch/Networking Expert for Sophos NDR Deployment Consultation
42 - 75 USD / hr
5 hours ago
Client Rank - Excellent

Payment method verified
$24 867 total spent
10 hires, 2 active
18 jobs posted
56% hire rate, 1 open job
64.24 /hr avg hourly rate paid
361 hours paid
5.00 of 5 reviews
Industry: Tech & IT
Company size: 2
Registered: Mar 15, 2019
United States
United States
Dallas 10:54 PM
5
We are seeking a knowledgeable Fortinet Switch and Networking Expert to provide consultation on the configuration required for deploying Sophos Network Detection and Response (NDR) solutions. The ideal candidate will have extensive experience with Fortinet devices and a strong understanding of network security. Your insights will help us optimize our network configuration to ensure seamless integration and functionality of the Sophos NDR system. If you are passionate about network security and have a proven track record in similar projects, we would love to hear from you.
Hourly rate: 42 - 75 USD
5 hours ago
  • IT & Networking, Network & System Administration
Ubiquiti Security Card Access Control System Installation
25 - 60 USD / hr
3 hours ago
Client Rank - Excellent

Payment method verified
$11 295 total spent
8 hires, 1 active
13 jobs posted
62% hire rate, 1 open job
92.28 /hr avg hourly rate paid
113 hours paid
4.06 of 6 reviews
Company size: 10
Registered: Oct 23, 2019
United States
United States
Pleasant Shade 12:54 AM
5
We are seeking a skilled technician to install a Ubiquiti Security Card Access Control system at a church in Tennessee. The ideal candidate will have experience with security systems and will be responsible for the installation, configuration, and testing of the system to ensure optimal performance. Strong communication skills are essential for coordinating with church staff and ensuring all requirements are met. If you have a passion for security solutions and experience in installation, we would love to hear from you.
Hourly rate: 25 - 60 USD
3 hours ago
  • IT & Networking, Information Security & Compliance
Google Account Password Recovery
5 USD 3 hours ago
Client Rank - Medium

Payment method verified
Phone number verified
2 jobs posted
1 open job
no reviews
Registered: Jun 11, 2025
Egypt
Egypt
8:54 PM
3
I have google account ,I lost password of login and the phone was lost ,I was make 2 steps Verification first sending code to my phone Number and second sending code to the same gmail of my google account that I forget the login password of it ,I passed the first step of 2 steps Verification (sending code to my phone number) ,but I can not pass the second step of 2 steps Verification that sending code to the same gmail of my google account that I forget the login password of it , because I forget the password and lost the phone that was the only device that the google account opened on it
I want to recover my google and change the password of it
Fixed budget: 5 USD
3 hours ago
  • IT & Networking, Information Security & Compliance
Cloud Network Engineer Needed for Multi-Cloud Networking Project
not specified 1 hour ago
Client Rank - Good

Payment method verified
Phone number verified
$3 519 total spent
3 hires, 4 active
3 jobs posted
100% hire rate, 1 open job
30.00 /hr avg hourly rate paid
29 hours paid
5.00 of 1 reviews
Registered: Jan 7, 2021
United States
United States
CLARENDON HLS 12:54 AM
4
We are seeking a skilled cloud network engineer with expertise in multi-cloud and poly-cloud networking practices for a short-term project. The ideal candidate will not only assist us with our networking requirements but also provide valuable insights and teaching on current best practices in the cloud domain. If you have a strong background in cloud networking and a passion for knowledge sharing, we want to hear from you!
Budget: not specified
1 hour ago
  • IT & Networking, Network & System Administration
Call to action
Freelancing is a business
Make it more profitable with Vollna

Streamline your Upwork workflow and boost your earnings with our smart job search and filtering tools. Find better clients and land more contracts.