• Hourly
  • Intermediate
  • Est. time: 3 to 6 months, Less than 30 hrs/week

Saturn Partners is a cybersecurity consultancy specializing in providing tailored security solutions to small and medium-sized banks and healthcare institutions. As an offshoot of our network security policy development practice, we have expanded our services to encompass a range of cybersecurity projects. We are also considering a future expansion into the logistics industry. Currently, our focus is on project-based work, with most engagements involving external testing and other related activities. I am actively seeking a highly skilled and experienced Cybersecurity Engineer to join our team as a contracted freelancer. As a Cybersecurity Engineer at Saturn Partners, you will play a pivotal role in executing various cybersecurity projects for our clients in the banking and healthcare sectors. Here are some examples of what I am looking for: - Conducting comprehensive security assessments, penetration testing, and vulnerability assessments to identify weaknesses and vulnerabilities in clients' digital infrastructures. - Assisting in the development of incident response plans and providing rapid support in the event of security incidents. - Collaborating with our team to design and deliver engaging security awareness training programs for our clients' staff. - Contributing your expertise to the creation and implementation of robust security strategies tailored to our clients' specific needs and industry standards. - Ensuring that our clients meet regulatory and compliance requirements related to cybersecurity. Requirements: - Proven experience in cybersecurity engineering, including penetration testing, vulnerability assessment, and incident response. - Strong knowledge of security best practices, industry standards, and compliance regulations. - Excellent communication skills, both written and verbal, to effectively convey technical information to clients. - A clear and concise presentation style for delivering findings and recommendations to clients and technical teams. - Flexibility and adaptability to work on various projects with different scopes and complexities.

System SecurityCybersecurity ManagementPenetration TestingInformation SecurityApplication SecuritySecurity InfrastructureInternet SecuritySOC 2 ReportIT Compliance AuditTechnical WritingISO 27001NIST SP 800-53Technical DocumentationHIPAA
Posted last week
  • Hourly: $20.00 - $60.00
  • Intermediate
  • Est. time: More than 6 months, 30+ hrs/week

We are seeking a Security Specialist to contribute to our ongoing security initiatives. The ideal candidate will have a strong understanding of cybersecurity, current threats and the ability to apply security concepts in practical applications. Responsibilities: Assist our Lead Security Engineer to implement our security initiatives and operations. Assist in analyzing and reporting on security vulnerabilities and risks, and contribute to strategies for mitigating them. Support compliance efforts, adhering to SOC 2, GDPR, and other global regulations, while facilitating third-party audits. Monitoring security logs, alerts, and incident reports. Conducting regular risk assessments, vulnerability scans, and internal security audits for threat identification and policy compliance. Staying current with cybersecurity trends, technologies and sharing insights with the team. Required Skills: Understanding of network infrastructure, firewall configurations, and cloud technologies. In-depth knowledge of security protocols, concepts, SIEM tools, IDS/IPS systems, IAM solutions and security analysis techniques. Experience with vulnerability scanning, log analysis, security auditing, and compliance assessments. Exceptional problem-solving and analytical abilities, coupled with strong communication and documentation skills. Knowledge of compliance frameworks such as GDPR, SOC 2, and other relevant industry regulations Proficiency in Linux operating systems and virtualization technologies. Preferred Experience: Previous experience in a dedicated cybersecurity role, with hands-on responsibilities in threat detection, incident response, and security operations. Familiarity with advanced persistent threats (APTs), phishing campaigns, malware analysis, and other sophisticated attack vectors and techniques used by threat actors. Industry-recognized certification (CISSP, CISM, CompTIA Security+, etc.) or education in cybersecurity, computer science, or a related field. Proficiency in scripting languages such as Python or PowerShell for automation of security tasks. What Makes a Good Candidate: A strong candidate for this role should possess technical skills in cybersecurity, coupled with a proactive and analytical mindset. They should thrive in a collaborative team environment and demonstrate excellent communication abilities. Ideal candidates should exhibit a genuine passion for security, staying ahead of emerging threats and continuously enhancing their knowledge and expertise. They should be driven to anticipate and mitigate potential risks, while consistently seeking to fortify our organization's security posture. The ability to work closely with cross-functional teams, including the Lead Security Engineer, is crucial to ensuring our security initiatives are successfully implemented and compliance requirements are consistently met.

Security TestingPenetration TestingInformation Security ConsultationCybersecurity ManagementBusiness with 10-99 EmployeesInformation SecurityNetwork SecurityInternet SecuritySecurity AnalysisVulnerability Assessment
  • Hourly: $50.00 - $90.00
  • Expert
  • Est. time: Less than 1 month, Less than 30 hrs/week

Help Setup Keeper Password Manager! Use Zoom to see my screen. Show me how to set up personal and company passwords. Probably one hour job. But you need to know how to use Keeper.

Internet Protocol SecurityNetwork SecuritySecurity AnalysisInternet SecurityInformation SecurityEthical HackingKeeper Security KeeperIT ManagementNetwork Administration
  • Hourly: $15.00 - $45.00
  • Expert
  • Est. time: Less than 1 month, Less than 30 hrs/week

We are seeking an expert in Microsoft to assess the security of our account and determine if it has been compromised. We would like to assess what files were affected and how to fix any issues with the account. Additionally, we need assistance organizing our Microsoft work files between accounts to improve efficiency and accessibility. The ideal candidate should have a deep understanding of Microsoft security features and be experienced in managing and organizing files within the Microsoft ecosystem. This is a great opportunity for someone who can provide comprehensive insights and implement effective strategies to enhance the security of our account while optimizing our file management system. If you have the expertise and skills required, we look forward to hearing from you.

Information SecurityWindows ServerOffice 365Vulnerability AssessmentApplication SecurityInternet SecurityInformation Security Audit
Posted 2 weeks ago
  • Hourly
  • Intermediate
  • Est. time: More than 6 months, Less than 30 hrs/week

We are a small company of about 50 users. All of our employees are utilizing laptops and located around the US. We are in need of someone that we can call upon whenever there is a hardware related issue that our internal software team cannot handle. This may include troubleshooting Chrome, Microsoft 365, and any Windows or home network related issues. Ideally, while we have employees in other time zones, we would like this person to be available Monday-Friday 8AM-5PM CST. We would like for billing to be only as a as needed basis. Meaning, billed only for the hours utilized.

Internet SecuritySecurity AnalysisLinux System AdministrationLAMP AdministrationNetwork AdministrationTechnical SupportWindows AdministrationHelpdeskMicrosoft WindowsData RecoveryOffice 365Incident ManagementMicrosoft Active DirectoryDatabase AdministrationMicrosoft Azure
  • Fixed price
  • Expert
  • Est. budget: $500.00

1. CAPTCHA or other anti-spam measures to be implemented to prevent spam and filter out automated spam submissions. 2. Content management system. 3. Install the necessary patches and software plugins for regularly scheduled updates to protect against malware. 4. Anti-virus and anti-malware solutions. 5. A trusted Web Application Firewall (WAF) to filter and monitor incoming web traffic, blocking suspicious requests and known attack patterns. 6. The ability to perform routine security scans and audits to regularly scan websites for vulnerabilities, malware, and security weaknesses. 7. Implement Secure Authentication Mechanisms to use robust authentication methods such as multi-factor authentication (MFA) unique and complex passwords. 8. Limitations on login attempts and monitoring for suspicious login activity. 9. Capabilities to ensure the encryption of sensitive data in the usage of HTTPS (SSL/TLS) to encrypt data and sensitive information transmitted between the user’s browser and my server or host, especially for the encryption of sensitive user information, payment details, and login credentials. 10. Inability or unavailability to store plaintext passwords. 11. A recommended secure web hosting provider that offers advanced security features, providing DDoS protection, firewalls, and intrusion detection systems (IDS). 12. Capabilities for regularly scheduled backup of the website that can quickly restore the website in case of a security incident, secured storage areas for backups away from the production environment, and the testing of the restoration process periodically.

WordPressWebsite SecurityInternet SecurityWeb DevelopmentWeb Design
Posted 4 weeks ago
  • Hourly: $20.00 - $100.00
  • Expert
  • Est. time: 1 to 3 months, 30+ hrs/week

We are looking to improve cyber security for our business

Information SecurityEncryptionFirewallPenetration TestingKali LinuxNetwork SecuritySecurity AnalysisInternet Security
Posted 4 weeks ago
  • Hourly
  • Intermediate
  • Est. time: Less than 1 month, Less than 30 hrs/week

Ethical hacking. Need a partners messenger, Facebook, emails, web history, text messages, photos, iPhone hack. Suspected of cheating. Would like all information as possible.

Information SecurityDigital MarketingSocial Media ManagementEthical HackingFacebook PageFacebookData RecoveryInternet SecurityChat & Messaging SoftwareEmail
Jobs Per Page: Â