Faisalabad, Punjab, Pakistan
$14/hr · Starting at $50
i am a networking Solution Provider, i am Cisco Certified, Microsoft Certified, Huawei Certified, i can provide solution of all kind of Networking and communication relevant Tasks.
Bengaluru, Karnataka, India
$20/hr · Starting at $100
Responsible for SAP User administration, user maintenance and Role design, internal audit, external audit for quarterly and yearly.
Faridabad, Haryana, India
$8/hr · Starting at $25
Thorough analysis and explanation of queries related to security concepts related to Firewalls, proxy, SIEM tool, EDR tool, Exchange online protection, Email protection and so on...
Nairobi, Nairobi Area, Kenya
$15/hr · Starting at $200
I am a cyber Security professional with almost 10 years in the field of Cyber with well versed knowledge on APT solutions, NGFW, MFA,NAC,Malware Analysis, VAPT services among others
Ernakulam, Kerala, India
I can provide you with information security and make sure your website and services are on the safer side.I cab also do data entry an other related works.
Kota, Rajasthan, India
$15/hr · Starting at $30
systems Analysis, system security expert and ethical hacking, any work software, World me ESA software nhi bna jisko me nhi chla skta.
Otomin, Pomorskie, Poland
$100/hr · Starting at $25
7 years of experience in endpoint technologies (McAfee, CrowdStrike) and additional in security services building as architect for cloud technologies (CASB, GCP, O365).
Nakuru, Nakuru, Kenya
$10/hr · Starting at $30
Development of risk-based information security strategies, systems and processes Profile management of all system users while ensuring enterprise-level responsibility and control for all information s…
Secunderabad, Telangana, India
$5/hr · Starting at $25
Spangle technologies has established itself as Premier IT service provider for Data Management, Data availability & Data security. Our focus area to ensure data availability & data security for our cl…
South Jakarta, Jakarta Raya, Indonesia
For those who wanted an in depth security review in all areas in Indonesia, including security Review of the hotels for people who wanted to visit our lovely country.
MUMBAI, Maharashtra, India
web application penetration testing, mobile application penetration testing, API (web based services), internal and external vulnerability assessment
Hagerstown, Maryland, United States
$35/hr · Starting at $280
Information Security technical writing, and editing, to include software documentation, and information security policies.
Morley, Western Australia, Australia
$28/hr · Starting at $25
Technical Troubleshooting End User Training Digital Workspace Support Cloud Computing Customer Service System Upgrades & Optimization Information Security
N.N.Kandigai, Tamil Nadu, India
$1,200/hr · Starting at $25,000
describe your work here minimum 100 words describe your work here minimum 100 words describe your work here minimum 100 words describe your work here minimum 100 words
Mombasa, Coast, Kenya
$10/hr · Starting at $50
I am an expert in cyber security. I make the cyber very much secure and deal with threats like petya and wannacry cripple. I prevent unauthorized access to data centre
Mumbai, Maharashtra, India
$25/hr · Starting at $25
Having 14 years of experience in Network security and information security. Working as QSA and handled many banks, payment agreegator, switch, PG
Karachi, Sindh, Pakistan
$10/hr · Starting at $25
I am a Network security expert. My expertise ranging from Security, Malware Analysis, to cryptography.
Raleigh, North Carolina, United States
$160/hr · Starting at $480
Cyber security assessment, training, remediation, policy development, secure development of web applications, privacy, IoT device security, HIPPA compliance, NIST 800-171 compliance.
New Delhi, Delhi, India
Trained in various field in cyber security from Delhi university i.e Web,Networking, compliance and auditing, cloud deployment etc
Eldoret, Rift Valley, Kenya
$11/hr · Starting at $33
I specialize in testing the strength of the security of an organization and evaluate the organizations security posture.