$2,500.00 Fixed
Overview:
We are a global tech company with a distributed workforce and a diverse set of cloud-based applications. Our traditional perimeter-based security model is no longer effective in protecting our assets.
The Challenge:
Our security posture is based on the outdated "trust but verify" model, which assumes that everything inside our network is secure. This is not viable in a world where employees use personal devices and access corporate data from anywhere, making us highly vulnerable to insider threats and lateral movement by attackers.
Problems Caused:
The lack of a zero-trust model exposes us to significant security risks. A single compromised credential could allow an attacker to move freely across our network. This model also makes it difficult to manage and secure our assets in a modern, distributed environment.
Proposed Method:
We need a senior cybersecurity architect to design and implement a complete zero-trust security architecture. This includes:
- Identity and Access Management (IAM): Implementing a robust IAM solution with granular access controls.
- Micro-segmentation: Dividing our network into smaller, isolated segments.
- Endpoint Security: Ensuring all devices, regardless of location, are secured and monitored.
- Data Security: Implementing strong encryption and data loss prevention (DLP) policies.
- Automation: Automating the security response to detected threats.
Required Experience:
At least 8+ years of experience in cybersecurity architecture. The freelancer must have a proven track record of designing and implementing complex security solutions.
Required Expertise:
- Deep expertise in Zero-Trust principles and architecture.
- Experience with Identity and Access Management platforms (Okta, Auth0, etc.).
- Knowledge of micro-segmentation tools and techniques.
- Proficiency in cloud security (AWS, Azure, GCP).
Sample Work Required:
Please provide a case study or technical documentation from a previous Zero-Trust implementation, highlighting the design choices, implementation challenges, and results.
Freelancer Proposal:
The freelancer should submit a detailed technical proposal outlining the full Zero-Trust architecture, including a phased implementation plan, a risk assessment, and a list of recommended technologies.
- United States
- Proposal: 0
- Verified
- Less than a month
