Im one of the few people that have successfully merged wordpress and Zen Cart so you can display categories, products and within your wordpress site. I have been working with zencart for many years now and have implemented multiple shops for a wide range of industries, from computer hardware, to handbags, to garden furniture. All have been run successfully and have been fully PCI compliant . No matter what sort of zencart or wordpress issue you may have I have the knowledge, skills and ability to resolve the issue for you.
PCI Compliance Job Cost Overview
Typical total cost of oDesk PCI Compliance projects based on completed and fixed-price jobs.
oDesk PCI Compliance Jobs Completed Quarterly
On average, 1 PCI Compliance projects are completed every quarter on oDesk.
Time to Complete oDesk PCI Compliance Jobs
Time needed to complete a PCI Compliance project on oDesk.
Average PCI Compliance Freelancer Feedback Score
PCI Compliance oDesk freelancers typically receive a client rating of 4.58.
I'm an Information Security professional with 8 yrs of PCI compliance experience working with payment processors, application developers and merchants. I've worked with most major QSA firms during assessments as well as Merchants attempting to validate their compliance.
I have over 15 years of programming experience in web based applications and web sites. Many systems I have worked with have high load, needed maximum uptime, and handled sensitive data like credit card details (I have worked with PCI compliant systems) I always provide code that is clear, easy to maintain and reliable. My key skills are Java, Databases, Spring MVC, Web Based Applications.
I am a very experienced manager and business owner with experience in a wide-range of business activities: Project Management, Quality Management, Business Process Improvement, Documentation, Contract Management, Process and Systems Engineering and Analysis. Past activities have included: * Document Management Systems Project Management. * Payment Card Industry Compliance for retail and on-line merchant activities. * Significant Process Improvement experience within Manufacturing environments (Consumer goods and Mass Customization). * Contract management and bid response management (Requests For Proposals - RFP's) * Process improvement: Six Sigma, Lean, Theory of Constraints, Functional Analysis, Kepner-Tregoe Problem solving. * Process and Business analysis and documentation * Training and Development of staff, including Conference Presentations * Process Engineering (Chemical Engineering qualification) As a small business owner (AuzCan Professional Services), I am also experienced in developing systems and processes to streamline a business (think the "E-Myth" by Michael Gerber) enabling owners to "work on the business rather than in the business'. On a personal level, I am friendly, focused, action and results oriented whilst providing excellent customer/client service in a timely manner.
Over 13 years of IT Cyber Security Experience. Specialize in hacking forensics investigations, incident handling and response. Protecting and disinfecting computers, servers, websites and networks from compromise. Cleaning up Malware, Worms, Trojans, Spyware, Viruses and Vulnerabilities. I have experience eradicating Advanced Persistent Threats and identifying Indicators of Compromise. My background is in extremely large Multi site locations. A few previous contracts I have worked at included Intel and Department of Engery. In January 2014 the NSA extended a job offer that I ultimately turned down.
Joshua possesses three years of professional experience and four years of education in information security with a strong focus on security engineering, penetration testing, cyber defense, auditing, and compliance. He has achieved multiple high demand cyber security certifications directly related to work experience. His strong background with experience in network and system administration at a professional level provides a solid groundwork for future growth into new technologies. Passion and determination provided the path to leadership roles at multiple companies, which provided experience into project and resource management. Joshua’s key competencies include project management, vulnerability management, system and web application penetration testing, vulnerability scanning, vulnerability management, system hardening, SIEM, antivirus, data loss prevention, IDS/IPS, post-exploitation techniques, mobile application testing, and system timeline forensic analysis.
Consultant with more than 10 years of experience in Open Source and Security projects, worked 3 years as a field engineer designing, implementing and supporting middleware solutions based on open source technologies, 2 more years working with security oriented solutions for GBM an IBM Alliance Partner, Focused the last 3 years on Design and sales of security oriented solutions based on Tivoli and ISS portfolio from the IBM brand as an IBM Certified Advanced Deployment Professional Also has experience with other vendor’s technologies: McAfee Linux (RedHat, Novell and others) Aladdin Passlogix BigFix Being a natural team player and natural teacher, has lead several middleware projects to success. Specialties: Security Middleware Software, Server Architecture, Security Compliance
With over 18 years of industry experience, I bring a unique set of skills to the modern, cloud computing era. I have been involved with Amazon Web Services since 2008 and as the AWS platform matured and expanded, so has my involvement. I have designed, maintained, and supported resilient infrastructures utilizing EC2, S3, Route53, VPC, IAM, DynamoDB, SimpleDB, Cloudwatch, CloudFront, CloudFormation and SES. My philosophy as always been to automate anything one must do more than once. A such, i have extensive experience using chef as application automation tool as well as Jenkins to provide continuous integration. Other specialties include Linux and Windows administration, SumoLogic logging, PCI and FINRA regulatory compliance, BCP/DR planning and much more.
Astute and accomplished information security professional equipped with a demonstrated background in leading all domains of complex information security. Consistently ensures that all Information Security objectives are established and/or met and tackles/resolves key issues information security. Remain abreast of ever-changing technologies and industry trends. Exhibits superior communication skills while coordinating with teams in all organizational levels.