Im one of the few people that have successfully merged wordpress and Zen Cart so you can display categories, products and within your wordpress site. I have been working with zencart for many years now and have implemented multiple shops for a wide range of industries, from computer hardware, to handbags, to garden furniture. All have been run successfully and have been fully PCI compliant . No matter what sort of zencart or wordpress issue you may have I have the knowledge, skills and ability to resolve the issue for you.
PCI Compliance Job Cost Overview
Typical total cost of oDesk PCI Compliance projects based on completed and fixed-price jobs.
oDesk PCI Compliance Jobs Completed Quarterly
On average, 1 PCI Compliance projects are completed every quarter on oDesk.
Time to Complete oDesk PCI Compliance Jobs
Time needed to complete a PCI Compliance project on oDesk.
Average PCI Compliance Freelancer Feedback Score
PCI Compliance oDesk freelancers typically receive a client rating of 4.74.
I'm an Information Security professional with 8 yrs of PCI compliance experience working with payment processors, application developers and merchants. I've worked with most major QSA firms during assessments as well as Merchants attempting to validate their compliance.
I am a very experienced manager and business owner with experience in a wide-range of business activities: Project Management, Quality Management, Business Process Improvement, Documentation, Contract Management, Process and Systems Engineering and Analysis. Past activities have included: * Document Management Systems Project Management. * Payment Card Industry Compliance for retail and on-line merchant activities. * Significant Process Improvement experience within Manufacturing environments (Consumer goods and Mass Customization). * Contract management and bid response management (Requests For Proposals - RFP's) * Process improvement: Six Sigma, Lean, Theory of Constraints, Functional Analysis, Kepner-Tregoe Problem solving. * Process and Business analysis and documentation * Training and Development of staff, including Conference Presentations * Process Engineering (Chemical Engineering qualification) As a small business owner (AuzCan Professional Services), I am also experienced in developing systems and processes to streamline a business (think the "E-Myth" by Michael Gerber) enabling owners to "work on the business rather than in the business'. On a personal level, I am friendly, focused, action and results oriented whilst providing excellent customer/client service in a timely manner.
I have over 15 years of programming experience in web based applications and web sites. Many systems I have worked with have high load, needed maximum uptime, and handled sensitive data like credit card details (I have worked with PCI compliant systems) I always provide code that is clear, easy to maintain and reliable. My key skills are Java, Databases, Spring MVC, Web Based Applications.
Joshua possesses three years of professional experience and four years of education in information security with a strong focus on security engineering, penetration testing, cyber defense, auditing, and compliance. He has achieved multiple high demand cyber security certifications directly related to work experience. His strong background with experience in network and system administration at a professional level provides a solid groundwork for future growth into new technologies. Passion and determination provided the path to leadership roles at multiple companies, which provided experience into project and resource management. Joshua’s key competencies include project management, vulnerability management, system and web application penetration testing, vulnerability scanning, vulnerability management, system hardening, SIEM, antivirus, data loss prevention, IDS/IPS, post-exploitation techniques, mobile application testing, and system timeline forensic analysis.
Astute and accomplished information security professional equipped with a demonstrated background in leading all domains of complex information security. Consistently ensures that all Information Security objectives are established and/or met and tackles/resolves key issues information security. Remain abreast of ever-changing technologies and industry trends. Exhibits superior communication skills while coordinating with teams in all organizational levels.
I have over 7 years of experience developing Wordpress, Magento & custom web systems. I strictly follow timelines, development standards. My clients not only receive a project on time & on budget, but I often support them well after the site is launched for further success. I focus on quality projects with clients who want a long term relationship with their developer/designer.
With over 18 years of industry experience, I bring a unique set of skills to the modern, cloud computing era. I have been involved with Amazon Web Services since 2008 and as the AWS platform matured and expanded, so has my involvement. I have designed, maintained, and supported resilient infrastructures utilizing EC2, S3, Route53, VPC, IAM, DynamoDB, SimpleDB, Cloudwatch, CloudFront, CloudFormation and SES. My philosophy as always been to automate anything one must do more than once. A such, i have extensive experience using chef as application automation tool as well as Jenkins to provide continuous integration. Other specialties include Linux and Windows administration, SumoLogic logging, PCI and FINRA regulatory compliance, BCP/DR planning and much more.
My name is Jesse Lee, and I am the founder / principal consultant of JLLConsulting, LLC. JLLConsulting is a cyber-security consulting firm specializing in penetration testing, black box web application assessments, security architecture assessments, and training. We would like to be the high-level technical security resource for your networks, systems, web and applications vulnerability issues. We have experience coordinating and conducting vulnerability and intrusion assessments at the network, web application, operating system, and database level. Our engineers have senior experience in cyber security and are familiar with a variety of old, new, open-source, custom, and commercial tools. We are very knowledgeable on the latest security threats, techniques and exploits targeting vulnerabilities. We also have experience in calculating risk, producing professional reports and presentations, identifying custom mitigation solutions, security research, and policy creation.