Hire Freelance Zero Trust Architects
Onkar Jog
Onkar is a network, endpoint, information, and cybersecurity professional with over 13 years of industry experience. He's worked on Zero Trust Network Access (ZTNA), security service edge (SSE), security information and event management (SIEM), security orchestration, automation and response (SOAR), endpoint detection and response (EDR), and network detection and response (NDR). Onkar is an expert in SWG, CASB, and DLP administration.
Show MoreGarland Kan
Garland is a DevOps engineer and consultant who helps small and medium-sized startups run large-scale, reliable applications. Over the past five years, he's worked with many development teams to architect, design, build, optimize, and operate cloud infrastructures using AWS, Google Cloud, and Azure. Garland maintains a widely-used Kubernetes open-source project focused on securely deploying Kubernetes systems with Terraform.
Show MoreChigozie Ejeofobiri
Chigozie is a network security consultant with over 12 years of experience working with organizations to use technology to support and drive business goals. He has extensive knowledge of network perimeter security, defense-in-depth architectures, zero-trust designs, security operations, system security risk analysis and assessment, and project management. Chigozie is also highly experienced in perimeter security implementation of on-premise and cloud firewalls.
Show MoreAnuj Pratap
Anuj is an accredited IT security professional with 14+ years of hands-on and academic experience. As a security operations center manager, he has gained extensive knowledge of network security implementation, deployment, configuration, and support. Anuj's areas of expertise are next-generation firewalls, load balancers, IPsec VPN, vulnerability assessment, network intrusion prevention systems (IPS/NIPS), cloud security solutions, solution documents, and high- and low-level designs.
Show MoreSaleem Oyebamiji
Saleem is a cybersecurity professional with 6+ years of experience. He specializes in the design, deployment, and management of network, endpoint, and infrastructure security implementations, including routers and switches, next-gen firewalls, VPNs, NAC solutions, F5, MFA, SIEM/SOAR, and EDR/XDR, across different OEMs. Saleem ensures confidentiality, integrity, and availability of mission-critical infrastructure, adopting known industry frameworks and best practices.
Show MoreStephen Adebowale
Stephen is a Certified Information Systems Security Professional and AWS Certified Solutions Architect. He has 10+ years of experience designing cybersecurity solutions for multitenant hybrid or public clouds and on-premise architectures. As a consultant and senior architect, Stephen has led cybersecurity engagements for clients and engineered solutions adhering to accepted governance, risk, and compliance, such as PCI-DSS, HIPAA standards, and CIS frameworks.
Show MoreKeidrych Oates Anton
Keidrych is a cloud architect who guides organizations through the quagmire of multi/poly-Cloud Native Computing Foundation (CNCF) technologies so their technological foundation may be secure to all, reliable for customers, and monetarily efficient, leveraging scorched earth capabilities toward zero production impact on plant-scale architecture. Keidrych believes trusted technology serves humanity; a 5% increase in internet or cyberspace trust results in a $3,000+ increase in GDP per capita.
Show MoreAbubakar Siddique
Abubakar is an information systems security professional with highly developed and result-driven skills and over 10+ years of experience designing, deploying, securing, operating, and troubleshooting medium and large enterprise networks. His strengths include working with multiple security solutions through industry-leading vendors to serve other clients worldwide.
Show MoreJohn Barchie
As a senior security manager and consultant, John established, implemented, or audited information security in over 150 institutions. As a certified and practicing trusted advisor with a background in cybersecurity and network engineering, John assists companies in optimizing the benefits of information security programs. Specializing in governance, risk, and compliance, John informs organizations how to evaluate, monitor, and direct information security risk.
Show MoreSalam Houchou
Salam is an IT security architect and consultant in information, cyber, and cloud security. With 20 years of experience, a master's degree in cyber security, and Microsoft Azure, GCP, and AWS security certifications, he excels in designing and implementing initiatives to manage security risks and compliance while maximizing safety and security expectations. Salam is keen on re-organizing, streamlining, and strengthening existing operations by implementing cutting-edge, cost-effective solutions.
Show MoreVictor Oghifobibi
Victor is a cloud architect with 12 years of experience, 3+ in designing and building cloud and hybrid solutions. He is a certified Azure Solutions Architect Expert with a computer science background and a deep understanding of how to undertake end-to-end cloud deployments, architectural design decisions, POCs, and migration plans. Victor specializes in developing highly available, scalable, secure, hybrid cloud environments and migration plans to help customers confidently adopt the cloud.
Show MoreDiscover More Zero Trust Architects in the Toptal Network
Start Hiring