Hire the best Internet Security specialists

Check out Internet Security specialists with the skills you need for your next job.
Clients rate Internet Security specialists
Rating is 4.8 out of 5.
4.8/5
based on 1,161 client reviews
  • US$30 hourly
    I'm a Penetration Tester and Cyber Security Specialist who is a professional in evaluating the security posture of Web-Applications (Websites) and ensuring the security of personal clients' online identities, accounts, devices, and networks, I've possessed my current knowledge through 3+ years of self-study and research plus 2+ years of work in the industry, protecting clients on a personal level and running vulnerability assessments against business websites, always leaving positive impression and impact, I hold a great record of being able to expertly provide the following services: - Perform comprehensive security checkups on Emails and Phone numbers and pinpoint security holes which often lead victims to be hacked with zero interaction nor awareness from them. - Assist in Account Recovery (Ex. Instagram, Facebook) - Educate thoroughly on the findings and remediations for a vulnerable target, equipping clients with enough information to trust themselves as they continue to utilize the technologies as normal with no fear of being targetted by hackers. - Investigate and educate on online frauds/scams, especially crypto ones, why and how they work, and how to distinguish between legit and not legit easily. - Clean up networks and devices from viruses/malware and ensure optimal patching for security. - Report fraud websites that impersonate legit businesses for a takedown. IMPORTANT: When it comes to cybersecurity-related services, there is a number of scammers not to be underestimated, whether within or outside of Upwork, therefore stay vigilant and keep in mind the following, 1. If you were scammed online via crypto, there's no one out there with the right to give a guarantee that they will be able to recover it for you despite how well furnished the so-called hacker's portfolio appears to be, the chance remains very slim and you should only pursue this kind of service for the sake of leaving no stone unturned knowing the high probability of failure, and you should only select a freelancer with a reputable profile and reviews to back up their activity because scammer accounts are usually fresh with no reviews and no verified ID, feel free to consult me to evaluate that. 2. Same applies to the request of hacking an account, there are complicated caveats that explain why it DOES NOT work the way you think it does but to keep it short, if you want someone's account hacked, aside from it being illegal and unethical and isn't the type of "service" I provide, the chance for it to work is about 1% to begin with, again, I'm available for consultation, account recovery is a different subject with a higher probability for success as long as it's your own account that was lost/hacked.
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Malware Removal
    Information Security
    Vulnerability Assessment
    System Security
    Network Security
    Information Security Consultation
    Website Security
    Penetration Testing
    Network Penetration Testing
    Ethical Hacking
    Security Testing
    Security Assessment & Testing
  • US$275 hourly
    🌟 TOP RATED PLUS Cybersecurity Consultant with 100% Job success rate 🌟 ✅ Penetration Testing: Standard, Web application, mobile applications. ✅ Compliance: CMMC, DFARS, NIST 800-53, NIST 800-171, PCI, HIPAA, GDPR, ISO, SOC, SOX, GLBA, FedRAMP, CCPA, and more. ✅ Incident Response: Ransomware recovery, hacking response, forensic investigations. ✅ vCISO: Virtual Chief Information Security Officer ✅ Vulnerability Management: Vulnerability Scanning Hello, It is great to meet you (virtually)! My name is Tyler. I have over 15 years of cyber-security experience in multiple verticals. I have worked with fortune 500 brands, government, military, and intelligence agencies. 🌟 I have provided expert cybersecurity and compliance consulting for startups to hundreds of businesses! 🌟 My core expertise resides in: compliance and governance (PCI, HIPAA, SOC 2, NYSDFS, CMMC, DFARS, ISO, NIST, GDPR, and more), ethical hacking, incident response, penetration testing, secure design and architecture, and public speaking. I am an excellent writer and also possess business savvy. Pairing technical expertise with exemplary writing skills is my forte. I am also fluent in Brazilian Portuguese. I currently hold the following educational degrees and certifications: ✅ Master of Business Administration (MBA) ✅ Bachelor of Science in Cyber-Security ✅ Certified Information Systems Security Professional (CISSP) ✅ GIAC Certified Incident Handler (GCIH) ✅ GIAC Security Essentials Certification (GSEC) ✅ Microsoft Certified Systems Expert (MCSE) ✅ Microsoft Certified Systems Administrator (MCSA) ✅ Microsoft Certified IT Professional (MCITP) ✅ CompTIA Security+ ✅ CompTIA A+ ✅ CIW Web Design Associate WHY CHOOSE ME OVER OTHER FREELANCERS? -Professionalism: I treat all clients with respect and honor their trust in my services. -Expertise: I have expertise across many cybersecurity, information technology, and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. -Dedication: When i take on a task or project, you deserve my undivided attention and focus! -Versatility: I can easily pivot from many different tasks. Whether your project is a standard penetration test or a Chief Information Security Officer engagement, I have the ability, knowledge, experience, and credentials to adjust based on your requirements. -I have led over 150 incident response cases. -I have brought over 75 organizations to full compliance for DFARS, NIST, PCI, HIPAA, GDPR, and more. -I have conducted over 200 penetration tests. ✅ I will ensure that you get the results that you deserve. My clients trust me to complete their tasks and I ALWAYS deliver! Whether you are seeking a long term partner or a short term project, I am ready to deliver the high quality results that you deserve.
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Certified Information Systems Security Professional
    HIPAA
    Defense Federal Acquisition Regulation Supplement
    Policy Writing
    GDPR
    Security Analysis
    Information Security
    Encryption
    Security Assessment & Testing
    Application Security
    Incident Response Plan
    Vulnerability Assessment
    Network Security
    Penetration Testing
  • US$49 hourly
    For more than twenty years, I have been involved in the design, development, optimisation, maintenance, migration, and support of websites and servers. My expertise includes over eighteen years of specialisation in Joomla for both end-users and web design agencies. I have extensive experience working on numerous Joomla sites, including those with multiple languages. Throughout my career, I have successfully completed various Joomla-related projects. These include building new websites, ensuring responsiveness, creating AMP versions, migrating existing websites to Joomla, enhancing functionality, resolving security issues, installing SSL certificates, implementing HTTP security headers, managing user accounts and subscriptions, integrating payment gateways, removing malware, customising extensions and templates, developing custom extensions, optimising search engine performance, conducting search engine marketing, optimising content delivery, improving site speed, ensuring GDPR compliance, implementing various forms with anti-spam solutions, and utilising GeoIP services for auto field population. I also provide ongoing support, training, and any necessary measures to maintain the functionality, security, and stability of websites. Joomla Search Engine Optimisation services include producing search engine friendly URL's, meta descriptions and header tags combined with dynamic HTML and XML site maps, integrated with Google Search Console, Bing Webmaster tools, and Google Analytics as well as Privacy-respecting analytics such as Fathom and Matomo. I have a Matomo self hosted setup on my own server which clients use and find very useful as apart from not needing a degree in Google Analytics to understand it by default it tracks outgoing links from their sites. I possess extensive expertise in importing various types of website data into new and existing Joomla websites. This includes importing websites from HTML files, databases, and multiple Content Management Systems such as Drupal, Episerver, and WordPress. Additionally, I am well-versed in importing data from previous versions of Joomla websites. Since 2011, I've been utilising the Jreviews review and rating system to create custom themes and enhance functionality with features like advanced searches and notifications for updates in saved searches or user lists. I have extensive experience in customising the widely-used RSForm extension for numerous projects. This includes integrating forms with API's and external systems for various applications such as price comparison, quote creation, and e-commerce. I have also worked with multiple payment gateways in different currencies and utilised GeoIP services to automatically populate fields. I have extensively customised both the Eshop and Events Booking Joomdonation extensions within Joomla sites, working with online stores and event booking and ticketing for several years. My experience with both is vast. In addition to setting up, constructing, implementing, and overseeing Joomla-optimised cloud hosting and servers for multiple websites, I am proficient in managing various aspects such as firewall installation, virus and spam control, backups, migrations, and updates. I am well-versed in utilising Linux CLI, as well as working with Cpanel, Plesk, Hpanel and Spanel on a daily basis. Furthermore, I have experience with not only Apache and Nginx but also with LiteSpeed and OpenLiteSpeed Web Servers, particularly when speed is of utmost importance for a website. I possess servers and storage capabilities to duplicate a website onto a development environment. This allows for thorough analysis, debugging, updating, or development tasks to be carried out before transferring the changes back to the original source or a high-speed Joomla optimized hosting platform. I provide a Support Helpdesk Ticketing system with automated tasks in place, for example, client sites get monitored for availability. If a site is unavailable, a ticket gets created. Apart from documenting all work and changes, clients can report bugs, ask questions, and request additional features. I also work with clients using Project Management and Collaboration Tools such as Asana, Basecamp, Freedcamp and Teamwork. I can manage projects and teams or act as part of a team providing support both internally and externally on a clients behalf. I have excellent communication skills, my native language is English, and with an engineering background, I am extremely detail orientated. Security and confidentiality are paramount. I use secure email and chat environments with end-to-end encryption and use Bitwarden to share passwords with multiple users and organisations.
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    API Integration
    Apache Administration
    Linux System Administration
    Joomla Migration
    MySQL
    Web Hosting
    Joomla
    HTML
    PHP
    HTML5
    CSS
    Web Development
    Web Design
    Website
  • US$15 hourly
    🏆 TOP RATED PLUS Freelancer | ⚡ 13+ Years Experience | 🔥 11775+ Hours Worked I am PHP, WordPress Expert, Malware Specialist. I have 13+ Years of Experience in website Development and I've made a total of about 800+ websites and expertise in WordPress & PHP. - Client's satisfaction is my main goal, keeping that in my mind so far I have completed my all projects with their 100% satisfaction. I always got a very good rating and great feedback. I guarantee my work and make sure my clients are 100% satisfied with the work and that’s how I have achieved lots of client. I have years of experience in WordPress website design & development and Website migration, website transfer. I qucikly respond and communicate to make sure Client site is Malware free and I will provide my 100% to make sure the site is working the highest capacity. My clients love my work and I have lots of repeated satisfied clients. My Specialization in: BEST WEBSITE SECURITY SERVICES: ★★★★★★★★★★ ✔ WordPress Website Malware Removal. ✔ Fix hacked WordPress infected websites. ✔ Detect and Clean Wp-vcd malware,iframe hacks, JavaScript hacks, base64 hacks etc. ✔ Clean URL Injection, SQL Injection, Code Injection, Cross-Site Malware Warnings etc. ✔ Remove "This Site May be hacked" message from Google Search. ✔ Remove Google Malware Red Screen Warning ✔ Fix the "Japanese keyword hack" ✔ Google Blacklist Removal ✔ Malware & Hack Prevention(Security Hardening) ✔ Fix Suspended WordPress website by Hosting due to Malware Infection ✔ Website Security & Firewall Protection ✔ Clean all malware from your shared hosting account/Linux hosting server or any other hosting server. ✔ Full Vulnerability Scan and remove all Malware or Malicious codes. ✔ .htaccess Fixing (For Security) ★★★★★★★★★★ I guarantee my work, so give me chance, you will become my very happy and most satisfied client. Are Your WordPress website Got Hacked? Got Blacklisted By Google? Got Suspended from Hosting ? Dont worry i am here to make you free from these kinds of issue with full guranted satisfcation. ✅ Website Malware removal ✅ Website Hack Repair ✅ Website Virus removal ✅ Google Blacklist Removal ✅ Phishing Related Issues ✅ Websites Spam Removal ✅ Testing Vulnerability ✅ Penetration Testing and Patching ✅ Top Website Server Security ✅ Best WordPress Security ✅ Website Host Migration ✅ Themes development, setup and customization ✅ ACF - Advanced Custom Fields PRO ✅ On page SEO ✅ Website Testing ✅ Website Maintenance I am offering you @ TOP GURANTEED WEBSITE SECURITY HACK SOLUTION HERE @ * Instant Availability for any Kind of Support related to websites issues. * I want opportunities to showcase my skills & experience. Thanks for visiting my profile :)
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    PHP Script
    CMS Development
    Website Migration
    WordPress
    Website Security
    Malware Removal
    Virus Removal
    WordPress Malware Removal
    PHP
    Web Development
    On-Page SEO
  • US$35 hourly
    Certifications that I hold: CEH ( Certified Ethical Hacker) 740 MCSA ( Installation, Storage and Compute with Windows Server 2016) To whom it may concern, In the last years I did more than 400 Penetration Tests and Security Assessments. Most of them on Web and Mobile ( Android and iOS ) applications with Finance Background implemented with various technologies and frameworks, server security testing and hardening. Sample reports can be provided who is interested. Prompt responses to your needs. You can consider me as and internal staff of your company , always helping you to do the best in security. --------------------------------------------------------------------- Phishing simulation for your company needs ___________________________________________________________ Professional Load and Stress Testing if you are interested for your application __________________________________________________________
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Security Engineering
    Web Application Security
    NIST SP 800-53
    Windows Server
    OWASP
    Ethical Hacking
    Manual Testing
    Security Infrastructure
    Network Security
    Penetration Testing
    Application Security
    Kali Linux
    Vulnerability Assessment
    Security Assessment & Testing
  • US$75 hourly
    ✅ Top Rated Plus Expert ✅ 3000+ Hours ✅ Professional Penetration Tester Security researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform. For deliverables, professional reports are created,that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors. Core competency is performing black and gray box testing on live web applications/networks or lab environments. Familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of the work is confidential sample vulnerability report can be provided. Service Description 1)Web Application Penetration Testing based on OWASP TOP 10 2)Network Penetration Testing 3)Security Hardening Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python framework
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Web Application Security
    JavaScript
    Reverse Engineering
    Black Box Testing
    Ethical Hacking
    Web App Penetration Testing
    Network Penetration Testing
    Security Testing
    Network Security
    Penetration Testing
    Vulnerability Assessment
  • US$150 hourly
    I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startups and micro, small, and mid-sized companies create secure operating environments to increase business opportunities. I am also part of Upwork's Expert-Vetted Talent program. My priority is to create cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold a bachelor's degree in Telecommunications Engineering from the Airforce University in Argentina, a master's degree in Information Security Engineering from the SANS Technology Institute, and many cybersecurity certifications, including CISSP (Certified Information Systems Security Professional) and GSE (GIAC Security Expert).
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    WordPress Malware Removal
    Malware Removal
    CMMC
    Risk Assessment
    Cloud Security
    Information Security Audit
    Information Security Awareness
    Security Engineering
    Security Analysis
    Email Security
    Penetration Testing
    Information Security
    Security Policies & Procedures Documentation
    Cybersecurity Management
  • US$50 hourly
    You come first. Your requirements are my desire, fully accomplish your needs - my pleasure. 🥇 Skills: Web Hosting: 📤 MIGRATION MASTER and FASTER ✔️ Web Hosting Control Panels: cPanel, Plesk, DirectAdmin (Management) ✔️ Billing Systems: WHMCS (Management) 🐧 Linux server administration CMS: 🚀 Wordpress Website Speed Optimisation ✔️ Wordpress, Joomla. DLE, Drupal and etc. (Management and Development) Web Design: ✔️ Graphics Software: Photoshop, Adobe XD, Figma, Adobe Illustrator ✔️ High-Conversive Landing Pages Bonus Skills: ✔️ SEO ✔️ HTML/CSS/PHP Basics 🏆 Experience: ✅ 9 year Web Hosting technical support. ✅ 5 year Wordpress Project Development ✅ 1 Year of UI/UX 👨‍💻 Attitude: When working for a particular project my goal is to satisfy all requirements of an employer and preserve the high quality of the services.
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Technical Support
    Web Hosting
    cPanel
    Virus Removal
    Domain Migration
    WordPress
    WooCommerce
    PHP
  • US$100 hourly
    I've been working in the tech field for more than 5 years. I am a software engineer with a strong IT background. I have professional experience in the Cybersecurity field, Networking, Software Development, Web Development, Online Reputation Management (ORM) and Search Engine Optimization (SEO). I have worked on several small and large Cyber Security, Network Security, Software Development, Web Development, Online Reputation Management & SEO projects for different international organizations and individual clients. My Expertise are ✅Social Media Accounts & Business Pages Recovery (Facebook, Instagram, Twitter, LinkedIn etc) ✅Information Security ✅Penetration Testing ✅Digital Forensics Investigation ✅Data Recovery ✅System/Device Security ✅Network Security ✅GPS & Wireless Tracking ✅Information Removal from The Internet (Search Engines/Websites) ✅Links/URLs Suppression ✅Online Reputation Management (ORM) ✅Onpage SEO ✅Offpage SEO ✅Ecommerce SEO ✅WordPress & Shopify Website Development ✅WordPress & Shopify SEO ✅Flutter Development (Android/iOS App) ✅Amazon FBA/FBM VA ✅Patent Search ✅Filing Trademark Please don't hesitate and feel free to contact me. Thanks
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Shopify Development
    WordPress Development
    Reputation Management
    Technical SEO
    Ecommerce SEO
    On-Page SEO
    Off-Page SEO
    SEO Keyword Research
    Online Reputation Management
    Ethical Hacking
    Kali Linux
    Penetration Testing
    Digital Forensics
    Cybersecurity Management
    Information Security
  • US$999 hourly
    Computer Science Engineer/Ethical Hacker/Cyber Security Expert who has been providing security for corporate and individuals. ✌Cyber Security/Ethical Hacking - Securing mobile & Pc, running tests for vulnerabilities & server-side security (11+ experience) ✌Web development - JavaScript , Php (10+ experience) ✌App development - java , Cross-platform (7+ experience) ✌App/ Backend Development: Golang, Clojure, Scala, Ruby on Rails (5+ Experience) ✌CMS - Joomla, WordPress, Drupal (8+ experience) ✌Databases/Caches: Postgres, Redis I usually develop cross-platform and Android apps and build dynamic websites. I can develop the product very quickly and with high accuracy. I believe in customer satisfaction. U say it I develop it any language any software you need and if you want to secure your self from attacks I am always available. My work is fast and secure. *Price will vary on the complexity of the project Happy new year 2023 !!!
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Information Security
    Security Engineering
    Ripple
    Bitcoin
    Android App Development
    XML
    Ethical Hacking
    Cryptocurrency
    Digital Marketing
    PHP
    JavaScript
  • US$10 hourly
    **I only bid on that project which I can deliver with complete satisfaction.** If your Instagram got HACKED or Locked and your Email or Number was Changed and Facing 2FA you are in the right place. *For Hacked Instagram or Facebook Accounts Recovery I Take Fix Price Which I Discuss before starting the project* I can provide solutions with the followings: ✅ Social media accounts set up and integration ✅ Social Media Management ✅ Social Media Optimization ✅ Social Media Error Fixing ✅ Hacked Instagram Recovery ✅ Assistance with your Instagram or Facebook removal ✅ Assistance with hacked Instagram account ✅ Assitance with stolen Facebook account ✅ Facebook business page recovery ✅ unauthorized ads payment on ads manager recovery ✅ Accounting ✅ Social media account recovery ✅ 2FA solution ✅ Google My Business ✅ Virtual Assitance ✅ All kinds of Social accounts Retrieve and All sorts of Error Fixing and name a few & I will let you know my experience. I am always eager to learn new skills. Also, please invite me for an interview if your's: Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Virtual assistance if your Instagram got disabled or restricted Facebook Business Suite hacked or compromised Facebook ads account recovery. Or if you are looking assistance for help: Recover hacked Instagram account Facebook Recovery Instagram restoration Social media Verification Facebook Business Suite verification Instagram & Facebook Integration Recovery of account in case of lost credentials Recovery from technical issues, bugs, and glitches Virtual Assitance Removal of old lost Instagram or Facebook profiles. assistance in Google My Business profile retrieval. Email accounts assistance. I Provide virtual assistance in all that and the result depends on them. Feel free to discuss the project before starting a contract. In response to your expectations: 1. I have expertise in the area required by you. 2. I can start the project immediately and complete your milestone as per your timeline. I believe communication is key to any successful project, and I'd like to start things off on the right foot, but I suggest we schedule a call to discuss the project further. This will enable us to make sure that we communicate well and are completely comfortable with the scope of the project. Please let me know the time that works best for you and I will make sure that I make myself available. Thank you for your time and consideration.
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Data Recovery
    Instagram Reels
    Facebook
    WordPress Malware Removal
    Malware Removal
    Facebook Page
    Ethical Hacking
    Social Media Management
    Social Media Marketing
    Digital Marketing
    Instagram
    Information Security
    Technical Support
    Accounting
  • US$100 hourly
    Discover the benefits of working with a U.S. "Top Rated" Developer with over 17+ Years of Magento / Wordpress experience: ☑ Easy communication. No more "Oops sorry I don't understand" or mix up due to translation problems. Schedule a call with me any time to go over any new tasks or upcoming projects. ☑ Safe and Secure. 3rd world developers may not be who they say they are. They will use Upwork jobs to get onto your server and install malware and credit card siphoning programming. My identify is verified and I've been a trusted member of the Magento eco-system since 2007. ☑ Enterprise level ticket system. I utilize one of the top support / work flow ticket systems in the industry. You will be able to easily create new support tickets / issues with me and have your problem handled efficiently. ☑ Integration with our private GIT repository. This means that all work which is not ideal to be performed in the live admin (majority of development work) will occur on a local development copy. All modifications are recorded in our GIT versioning system, for full history and clarity into changes made throughout the life of our business relationship. ☑ Full development process. Each issue / task goes through a comprehensive work flow which includes: Investigation and clarification, Development process, Quality Assurance review, Code Review, and Deployment. 20,000+ Working hours with Magento 1.x (CE and EE) and Magento 2.x (CE and EE), 10,000+ Working hours with Wordpress / WooCommerce. Brian Wade President / Senior Developer
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    HTML5
    HTML
    Ecommerce Website Development
    WooCommerce
    Magento
    PHP
    WordPress
    MySQL Programming
    Linux System Administration
    Ecommerce Development Consultation
    Unix
    WordPress Theme
    Magento 2
  • US$39 hourly
    I have 30-years experience in network projects including design, implementation, system administration and in software development. For the first 5 years of my career I worked on software development: coding and especially testing. For the last 25 years I'm working on implementation and maintenance of University of Nis WAN. Last 20 years I'm deeply involved in AMRES (Academic Network of Serbia) project. Don't fix it if it ain't broken, don't break it if you can't fix it! SKILLS SUMMARY - Any system administration tasks - Operating Systems: any *nix (Linux, FreeBSD, SGI IRIX, SCO, Solaris, OSX), Windows 3.1/9x/Me/XP/Vista/W7/W8/W10, WinServer NT/2K/2003/2008/2012/2016 - LAN & WAN: Ethernet, Fast Ethernet, Gigabit Ethernet, FDDI and Wireless LANs. T1/T3, SDH/SONET, Frame Relay, WDM, ISDN, ADSL, SHDSL, Cable Modems, Cellular, X.25. - Network Protocols: TCP/IP, IPv6, UDP, OSI, CDP, IP Multicast, IPSec, VoIP, Routing, VLANs, Bridging, Trunking, VPN, SNA, DLS - Network Services & servers: SMTP/POP3/IMAP, FTP/SFTP, Telnet/SSH, HTTP/HTTPS, DNS, DHCP, NNTP, NTP, LDAP, SNMP, NETBIOS, Apache, Nginx, MySQL, Plesk, cPanel, Zimbra, VMware, CentOS, Ubuntu, Debian - Network Equipment: various types of modems, firewalls, switches and routers. - Dedicated, VPS and cloud environment servers (Amazon AWS, Google Cloud, MS Azure, Digital Ocean, Linode). - Programming Languages: Unix Shell scripting, BASH, C, Pascal, MS Visual Basic, PHP, HTML, (a bit of Python).
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    CentOS
    Ubuntu
    System Administration
    Apache Administration
    SSL
    Let's Encrypt
    Linux System Administration
    Firewall
    Red Hat Administration
    Cloudflare
    Zimbra Administration
    Unix System Administration
    Network Security
    Network Administration
  • US$45 hourly
    I'm a software developer / server administrator / MSP / and cybersecurity consultant from Canada with excellent communication skills and attention to client needs. I can develop new solutions, and update, migrate or secure existing applications and systems. I entered the IT industry in 1995 and hold a high standard, guarantee my work, and can provide continuing support and hosting. I look forward to meeting new clients. I especially am happy to discuss your project details with you before hiring to help us together gain insight in to your needs and expectations. My services include: - Custom development & hosting (including WordPress) - Technical and research writing for IT subjects - Marketing content writing for IT subjects - Updating and modifying existing apps / services - Migrating apps / services - Server maintenance, security, and automation scripting - Lead generation for business - Data-services such as scraping, statistical analysis, data-conversion, data-extraction, etc. - Developing educational content such as videos, lesson-plans, etc. I look forward to a discussion about your needs!
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Website Migration
    Linux System Administration
    Policy Analysis
    PHP
    Python
    System Security
    Vulnerability Assessment
    Data Science
    WordPress
    Web App Penetration Testing
    Website Security
    Data Scraping
    Cybersecurity Tool
    Content Writing
  • US$70 hourly
    Greetings! 🛡️ Welcome to the forefront of Cybersecurity, where your digital safety is my utmost priority. With over 9 years of dedicated experience in IT Security, I'm not just an expert; I'm your strategic partner in fortifying your digital presence. As a Certified Ethical Hacker (CEHv9) and an OSCP Certified Tester, I bring a blend of expertise, passion, and precision to every challenge. Why Choose Me? 🔍 My expertise lies in conducting meticulous Security Assessments and Penetration Tests, designed to unearth vulnerabilities and bolster the defenses of your IT infrastructure. My mission? To elevate your organization's security posture and engineer robust solutions that safeguard your digital assets against the ever-evolving cyber threats. Specialized Services Tailored to Your Needs: ✅ Web Application Penetration Testing: Probing and fortifying web applications to withstand cyber assaults. ✅ Network Penetration Testing: Securing your network's nooks and crannies against intrusion. ✅ Mobile Application Penetration Testing: Shielding your mobile apps from the prying eyes of cyber adversaries. ✅ Security Audits: Comprehensive examinations to ensure your security measures are up to snuff. ✅ Vulnerability Assessments: Identifying chinks in your digital armor, paving the way for fortification. ✅ Dynamic Code Analyses: Scrutinizing the veins of your code for vulnerabilities. ✅ Infrastructure Penetration Test: A deep dive into your infrastructure to secure it from potential threats. 🚀 If you're on the hunt for a Cyber Security Vanguard who's passionate about crafting impenetrable digital domains, look no further. Hit the green "Invite" or "Hire Now" button to catapult your security to the next level. I'm eager to embark on this journey with you and transform your cyber defense mechanisms. Let's connect and explore how we can turn your IT environment into a bastion of security.
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Cloud Security
    Web App Penetration Testing
    Security Analysis
    Security Infrastructure
    Information Security Audit
    Web Application Security
    Information Security
    Vulnerability Assessment
    Security Testing
    Database Security
    System Security
    Application Security
    Network Security
    Penetration Testing
  • US$40 hourly
    A self-motivated, quick learner and capable Technology Consultant with a solid technical and managerial background and a proven record in consultation, planning, preparation, implementation, management & maintenance of various result-oriented IT solutions. With extensive knowledge and strong analytical skills complemented by excellent interpersonal skills and a commitment to customer satisfaction and experience in planning, preparation and designing customized solutions to address specific customer requirements, improve overall productivity, and dramatically increase efficiency. I have about 15+ years of planning, preparation, deployment, support and consultant experience on Microsoft infrastructure solutions including but not limited to Active Directory, ADCS, ADFS, ADRMS, Exchange, SfB, System Center, Private Cloud, Public Cloud, Virtualization, Azure, O365 & security solution.
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Microsoft Hyper-V Server
    Fortinet
    Information Security Audit
    Cloud Implementation
    ISO 27001
    Cloud Security
    Private Cloud
    Microsoft SCCM
    Network Security
    Microsoft SCVMM
    Microsoft Active Directory
    Microsoft Exchange Server
    Windows Server
    Microsoft Azure
  • US$40 hourly
    ✅ 𝗧𝗼𝗽 𝗥𝗮𝘁𝗲𝗱 ✅ 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗲𝗱 𝗗𝗲𝘃𝗢𝗽𝘀 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿 ✅ 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗲𝗱 𝗘𝘁𝗵𝗶𝗰𝗮𝗹 𝗛𝗮𝗰𝗸𝗲𝗿 (𝗖𝗘𝗛) As a 𝗧𝗼𝗽-𝗥𝗮𝘁𝗲𝗱 𝗜𝗧 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 with 6+ years of experience, I specialize in transforming digital landscapes through my expertise in DevOps engineering and cybersecurity. 📜 𝗘𝘅𝗽𝗲𝗿𝗶𝗲𝗻𝗰𝗲 & 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀: 🏅 AWS Certified DevOps Engineer Professional 🏅 AWS Certified Developer Associate 🏅 Certified Ethical Hacker (CEH) 🏅 HashiCorp Certified: Terraform Associate (003) 🏅 Certified in Cybersecurity (ISC2-CC) 🔧 𝗖𝗼𝗿𝗲 𝗗𝗲𝘃𝗢𝗽𝘀 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀 : ------------------------------------------------------------------------------------------------------------ ● 𝗖𝗜/𝗖𝗗 𝗣𝗶𝗽𝗲𝗹𝗶𝗻𝗲𝘀: Expertise in AWS CodePipeline, Jenkins, GitLab CI; enabling continuous innovation and automated workflows. ● 𝗞𝘂𝗯𝗲𝗿𝗻𝗲𝘁𝗲𝘀 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁: Masterful management for high-availability applications. ● 𝗜𝗻𝗳𝗿𝗮𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲 𝗮𝘀 𝗖𝗼𝗱𝗲 (𝗜𝗮𝗖): Proficiency in Terraform and AWS CloudFormation, ensuring consistent and reliable environment setups. ● 𝗣𝗲𝗻𝗲𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝗧𝗲𝘀𝘁𝗶𝗻𝗴 𝗦𝗲𝗿𝘃𝗶𝗰𝗲:Comprehensive assessments on your mobile and web applications to identify vulnerabilities and enhance security measures. ● 𝗠𝗼𝗻𝗶𝘁𝗼𝗿𝗶𝗻𝗴 & 𝗟𝗼𝗴𝗴𝗶𝗻𝗴: Proactive performance insights with ELK and Prometheus. ● 𝗠𝗶𝗰𝗿𝗼𝘀𝗲𝗿𝘃𝗶𝗰𝗲𝘀/𝗦𝗲𝗿𝘃𝗲𝗿𝗹𝗲𝘀𝘀 𝗔𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲𝘀: Efficiency with AWS Lambda, enhancing agility and cost-effectiveness. ● 𝗔𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗼𝗻 𝗦𝗰𝗿𝗶𝗽𝘁𝘀: Precision-crafted scripts to streamline operations. ● 𝗖𝗼𝗻𝗳𝗶𝗴𝘂𝗿𝗮𝘁𝗶𝗼𝗻 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁: Seamless control with Ansible over distributed systems. ------------------------------------------------------------------------------------------------------------ 🔒 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝘀 𝗮 𝗣𝗿𝗶𝗼𝗿𝗶𝘁𝘆: ● Implementing top-tier security practices from ethical hacking insights to vulnerability assessments, ensuring resilient infrastructure. 🤝 𝗖𝗹𝗶𝗲𝗻𝘁 𝗖𝗼𝗹𝗹𝗮𝗯𝗼𝗿𝗮𝘁𝗶𝗼𝗻: Through clear communication, collaboration, and a keen focus on your unique challenges and goals, we'll forge an optimized digital ecosystem. Your success is my commitment. 🌟 𝗪𝗵𝘆 𝗖𝗵𝗼𝗼𝘀𝗲 𝗠𝗲 𝗢𝘃𝗲𝗿 𝗢𝘁𝗵𝗲𝗿 𝗙𝗿𝗲𝗲𝗹𝗮𝗻𝗰𝗲𝗿𝘀? ------------------------------------------------------------------------------------------------------------ ◈ Client Reviews: Dedicated to providing value and earning trust. ◈ Over-Delivering: I take pride in exceeding expectations and leaving clients impressed. ◈ Responsiveness: Always available and communicative. ◈ Resilience: Problem-solving focus with the resilience to overcome challenges. ◈ Kindness: Treating everyone with respect, empathy, and a genuine desire to improve situations. ------------------------------------------------------------------------------------------------------------ 𝗦𝗼𝘂𝗻𝗱𝘀 𝗹𝗶𝗸𝗲 𝗮 𝗴𝗼𝗼𝗱 𝗳𝗶𝘁? 𝗛𝗲𝗿𝗲'𝘀 𝘄𝗵𝗮𝘁 𝘁𝗼 𝗱𝗼 𝗻𝗲𝘅𝘁: 1. 📺 Watch my videos on my Upwork profile and in my work examples. 2. 🟢 Click the green “Send Message” ✉️ button in the top right-hand corner. 3. 💬 Write a personalized note highlighting why you think we’re a good fit. 🌟 𝗦𝗮𝘁𝗶𝘀𝗳𝗮𝗰𝘁𝗶𝗼𝗻 𝗚𝘂𝗮𝗿𝗮𝗻𝘁𝗲𝗲𝗱: If you're not 100% satisfied with my quality work, I offer a 𝗺𝗼𝗻𝗲𝘆-𝗯𝗮𝗰𝗸 𝗴𝘂𝗮𝗿𝗮𝗻𝘁𝗲𝗲 —no questions asked. 🚫 𝗘𝘁𝗵𝗶𝗰𝘀 & 𝗜𝗻𝘁𝗲𝗴𝗿𝗶𝘁𝘆: 𝗜 𝘄𝗶𝗹𝗹 𝗻𝗼𝘁: ------------------------------------------------------------------------------------------------------------ ◈ Hack, crack, or access unauthorized systems or accounts. ◈ Fill out security questionnaires or assist with certifications. ◈ Create falsified penetration testing or assessment reports. I believe in using my skills to protect rather than harm others, ensuring everyone’s right to privacy and security. ------------------------------------------------------------------------------------------------------------ Feel free to connect with me to discuss your security needs or DevOps challenges. Let's build a secure, scalable, and efficient future together!
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Kubernetes
    Python
    CI/CD
    Infrastructure as Code
    Product Development
    Amazon Web Services
    Cloud Computing
    DevOps Engineering
    Solution Architecture
    DevOps
    Ethical Hacking
    Penetration Testing
    Network Security
    Information Security
    Vulnerability Assessment
  • US$20 hourly
    Need help to recover your HACKED & DISABLED social media accounts in the least possible time? You are at right place if you have lost access to your personal or business social media account (s). Lost credentials or your account got hacked. Your account was disabled by a mistake. You want to remove old accounts or remove your content from search engines or social media. Or if have any other Instagram and Facebook related issue. You might have tried available support options and scrolled through forums but could not find help because: I have been providing virtual assistance with the related issues for a long time and enjoying my successful journey. I have proudly offered my clients to pay only after the successful results and resolved dozens of cases. You will find the support and solution for almost every kind of issue related to the Instagram and Facebook and other social media platforms with full compliance to ethics and respective platform's terms and service. I would love to answer your queries for free of cost and will suggest a way forward that would help you to accomplish your goals. Please send me a message with issue details and screenshots (if feasible). Invite me for the interview if your: Facebook account is disabled. Instagram account is disabled. Facebook account is restricted. Instagram account is restricted. Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Or if you are seeking help for: Recover hacked Instagram account Facebook recovery Instagram restoration Facebook restoration Instagram security Facebook security Instagram verification Facebook verification Instagram & Facebook Integration Instagram & Facebook Marketing Recovery of account in case of lost credentials Recovery from underlying technical issues, bugs and glitches Snapchat issues LinkedIn issues TikTok issues Social media content removal Facebook Instagram Integration Facebook and Instagram verification problem Facebook content removal Instagram content removal Instagram fake followers removal Instagram fake accounts removal Facebook fake accounts removal ''DON'T FORGET TO READ THE REVIEWS ON MY PROFILE'' Disclaimer: Write me about the issues related to your ''own'' social media account (s) or only if you are an authorized representative. Avoid making requests that are not compliant with Upwork and Instagram's terms of service. You will get ethical virtual assistance to get your problem resolved through this channel. Thank you for your precious attention. Looking forward to your invites. Anxiously waiting for assisting you better. :)
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Social Media Marketing
    Social Media Account Setup
    Instagram API
    Technical Support
    Information Security
    Network Security
    Vulnerability Assessment
    Ethical Hacking
    Troubleshooting
    Data Recovery
    Cybersecurity Management
    Social Media Management
    Instagram
    Facebook
  • US$99 hourly
    I am a professional freelancer with THIRD PARTY LIABILITY INSURANCE for over two and a half million dollars, so you are in safe hands. I am Microsoft Certified Trainer, Office 365, GCP, AWS, and Azure Expert. Honored as Microsoft Most Valuable Professional in Azure area. I cover architecting, security, administrating, and migration of all three major clouds – Azure, AWS, and GCP. Apart from the main area of Cloud expert in the field of infrastructure servers Windows Server 2003-2016, Microsoft Active Directory, Hyper-V Private Cloud, IIS, System Center, SQL. Private Cloud, System Center, Hyper-V, Open Stack Expert, and all Microsoft products Expert. Linux Server administrator. I am the holder of certificates: • pSeries AIX UNIX Support • First Certificate in English • PRINCE2 Practitioner • Microsoft Certified: Azure Administrator Associate • Microsoft® Certified Solutions Expert: Cloud Platform and Infrastructure • Microsoft® Certified Solutions Associate: Cloud Platform • Microsoft® Certified Solutions Expert: Productivity • Microsoft® Certified Solutions Expert: Data Management and Analytics • Microsoft® Certified Solutions Associate: Windows Server 2016 • Microsoft® Certified Solutions Associate: Windows 10 • Microsoft Specialist: Configuring Windows Devices • Microsoft Specialist: Architecting Microsoft Azure Solutions • Microsoft Certified Solutions Developer: Azure Solutions Architect • Microsoft Specialist: Developing Microsoft Azure Solutions • Microsoft® Certified Solutions Expert: Data Platform • Microsoft Specialist: Implementing Microsoft Azure Infrastructure Solutions • Microsoft® Certified Solutions Associate: Office 365 • Microsoft® Certified Solutions Expert: Private Cloud • Microsoft® Certified Solutions Expert: Messaging • Microsoft® Certified Solutions Associate: SQL Server 2012/2014 • Microsoft® Certified Solutions Associate: Windows Server 2012 • Microsoft® Certified Solutions Expert: Server Infrastructure • Microsoft® Certified IT Professional: Enterprise Administrator on Windows Server 2008 • Microsoft® Certified Solutions Associate: Windows Server 2008 • Microsoft® Certified Technology Specialist: Windows Server 2008 Applications • Microsoft® Certified Technology Specialist: Windows Server 2008 Network • Microsoft® Certified Technology Specialist: Windows Server 2008 Active Directory • Microsoft® Certified Technology Specialist: Microsoft Exchange Server 2010
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Database Administration
    Disaster Recovery
    Amazon ECS
    Alexa Skills Kit
    Azure App Service
    Microsoft Azure SQL Database
    Linux System Administration
    AWS Lambda
    Windows Server
    Microsoft Exchange Server
    Microsoft Azure
  • US$20 hourly
    Enterprise level Linux system engineer and Cloud architect with 8+ years of experience in:- -- LAMP/LEMP(Nginx) administration and server security hardening (Ubuntu, Debian, Centos,RHEL,HAProxy, Ruby deployment, DevOps, Python/Django deployment DevOps,Nagios, fail2ban, CloudFlare..) -- Amazon web services - AWS (EC2, VPC, RDS, S3, Route53, Cloudfront, Elastic Load Balancer, AutoScaleing, etc..) -- DDoS mitigation and prevention -- Nginx rewrites -- Google pagespeed -- Linux troubleshooting -- VPS providers: Linode, Rackspace, Amazon(AWS), MediaTemple, HostGator, Cloudflare, MaxCDN, CloudFront, NameCheap, GoDaddy, DigitalOcean, EC2, Bluehost -- Parallels Plesk -- Odoo/OpenERP installation -- VPS administration -- AWS EC2 administration -- VMware vSphere --NewRelic -- fail2ban -- openswan -- HAProxy -- keepalived, vrrp -- elasticsearch -- Nagios monitoring -- Elastic Load Balancer -- LINUX deployment and migration -- Rackspace Cloud Services -- Ruby on Rails app deployment -- Python - Djengo app deployment -- CPANEL, PLESK, WEBMIN, SHELL/SSH administration -- proftpd, pure-ftpd, pure ftp -- DNS, BIND, PowerDNS -- SSL certificates -- Site migration -- Network troubleshooting -- CSF firewall -- VPN -- Cisco, Mikrotik, Juniper Networks, Extreme Networks.. -- Linux PENTAHO deployment -- Squid, AiCache, AiScaler. Experience with various providers such as:- -AMAZON WEB SERVICES (AWS, EC2..) -RACKSPACE -HOSTGATOR -GoDaddy -MediaTemple -Cloudflare -NameCheap -LINODE -QuickWeb -HAProxy -heroku -etc.. -WHMCS RESELLER setup and migration on project or permanent basis. Including DNS, EMAIL, WORDPRESS migration -CPANEL, PLESK, WEBMIN, H-sphere, SHELL administration -SSL certificates
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    cPanel
    Plesk
    WordPress
    Google Workspace Administration
    Email Security
    DevOps
    Email Support
    Linux System Administration
    Amazon EC2
    AWS Lambda
    GoDaddy
    AWS Server Migration
    Amazon Web Services
    Jenkins
    Microsoft Azure
  • US$25 hourly
    I am certified and experienced IT professional. Over the past 15 years, I have accumulated a vast range of experience which entails me to tackle most IT situations. My core area is assessment of internal control environment for information systems and critical IT processes; evaluating system of internal control and risk management; pre & post implementation reviews; security reviews of operating system, database and applications/ERP(s). I have specialized in information and cybersecurity management and compliance, IT security risk, IT audit and policy writing with 15 years of experience (CISA, CDPSE and CISSP certifications), and proven ISO 27001 Lead Implementation practice. I can help organizations with ISO 27001, SOC 2, HIPAA, and PCI-DSS compliance framework implementation identifying the best solutions and managing the whole process (requirements identification, solution selection, implementation, documentation, certification). If your company need to update its policies and procedures or need to create new ones for: - a due diligence process/RFP security questioner, - you want to be compliant for regulatory reasons (PCI-DSS, GDPR, CCPA, HIPPA,) - you are aiming at security certification (ISO 27001, SOC 2, HITURST CSF, HIPAA IRAP, FEDRAM, GDPR), - you just would like to level up your maturity in the security domain - simply just would like to consult and get informed of security best practices and need professional advice. Please don't hesitate to contact me! My skills in Information (IT) and Cybersecurity includes: - Information Security Policies based on NIST guidelines or ISO 27001 including Incident Response Plan, Acceptable Use, Encryption Policy, Risk management, Audit logging, and monitoring policy, User account and access management, Asset management, Data Classification, Change Management, Vulnerability and patch management, Asset Disposal, Third-party Management, Security Configuration, and many more. - Business Continuity Planning and Disaster Recovery Planning (BCP, DRP), PIA & TRA, investigating cyber and information security incidents, - Policy reviews, GAP analysis, - IT audit - Risk assessment, - Evaluation of operation/technology/procedure against current industry best practices or regulatory requirements. - Information security awareness training and training material - Compliance specific training (GDPR, SOC2, NIST. RISK management). My Certifications: CISSP - Certified Information Security Professional - Certification No 302621 CISA - Certified Information System Auditor - Certification No 161318 83 ITIL Foundation, CBAP - Certified Business Analysis Professional As a Project Manager some of the solution technologies I have managed the projects on AWS, GCP, Unix, Linux, Oracle, CISCO, Solarwind, Windows Server Tools: Pen-testing/InfoSec Tools: Kali Linux, Acunetix WVS, Nmap and Metasploit pro SIEM: ManageEngine, Solarwind , OSSIM Project Management: MS project, Asana, JIRA, Slack and ZenDesk Office tools: Google Docs, Drop box, and office 365 Specialties.
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    ISO 27001
    GDPR
    Network Administration
    Linux System Administration
    Data Privacy
    Compliance Consultation
    Data Protection
    SaaS
    Technical Writing
    Disaster Recovery
    VMware Administration
    Information Security
    Penetration Testing
    Network Security
  • US$100 hourly
    I am a cyber security professional with over 9 years of cyber security experience working with multinational clients across countries both in public and private sectors specializing in secure SDLC, security architecture, data protection, risk assessment, compliance reviews, and penetration testing. Currently, I am working as a Senior Application Security Engineer at a unicorn based out of London. I hold CISSP, ISSAP and OSCP ceritications, currently doing Masters in cyber security from University of London.
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Content Writing
    Copywriting
    Cloud Security
    Privacy Policy
    Certified Information Systems Security Professional
    PCI DSS
    SOC 2
    Information Security Governance
    Blog Content
    Security Analysis
    Penetration Testing
    Information Security
    Security Policies & Procedures Documentation
    Network Security
  • US$30 hourly
    Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP​ 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is our key differentiator. Please check my Upwork work history and client feedbacks. I look forward to hearing from you!
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Website Security
    OWASP
    Web Application Security
    Information Security Audit
    Certified Information Systems Security Professional
    Information Security
    Vulnerability Assessment
    Security Testing
    Network Security
    Penetration Testing
  • US$50 hourly
    I am an Elastic Stack (ELK) Certified Engineer. I am an expert for Elasticsearch, Logstash, Kibana, SIEM, Beats, Wazuh, Elastalert and other elastic stack products. I have been working with Elasticsearch since its version 1.5. I have implemented large-scale implementations dealing with billions of documents and TBs of data. I have implemented various use cases with Elasticsearch for organizing, cleaning, visualizing and securing data at a large scale. I am also an expert in Solr, Sphinx Search, and Manticore search. I have 10+ years of experience implementing, scaling, fine-tuning large scale full-text search using Solr, Sphinx/Manticore search. Have implemented several large-scale searches with Elasticsearch, Sphinx, Manticore and Solr for eCommerce, forums, portals, internal custom search and more. I am an expert in setting up fully functional, large-scale SIEM using Elastic Stack (ELK). Have implemented log ingestion, thread hunting, alerting, reporting etc. for SIEM. I am an expert of beats, wazuh, elastalert and many more. I am also an expert with XPack for securing Elastic Stack. If you need to implement, upgrade, maintain, optimize, need proof of concept around ELK, I can help. If you are having any sort of issues with Sphinx / Manticore, Elasticsearch or Solr, you should contact me.
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Grok Framework
    Network Security
    Grafana
    Kibana
    Logstash
    Firewall
    Elasticsearch
    Magento
    Apache Lucene
    PHP
    Full-Text Search
    Sphinx
    Apache Solr
    MySQL
  • US$15 hourly
    Web Penetration Testing(OWASP Top 10 methodology) | Network Penetration testing | OWASP API Security | Mobile Vulnerability Assessment(iOS and Android) | Source Code Reviews(.Net, Java, PHP) | Vulnerability Assessment and Penetration Testing | SIEM team (Cloud(AWS and Azure) Security, File Integrity Monitoring and Event Monitoring, Endpoint Security and Encryption, Data Loss Prevention, Network Access Control, Threat Monitoring (Email Traffic and Malware Analysis), Privileged Access and Identity Management) Have 7+ years of experience in both black box and white box testing penetration testing. Perform VAPT (Vulnerability Assessment and Penetration Testing) services for web applications, networks, mobile; source code reviews; malware analysis; server hardening; and security analysis etc. Conduct penetration testing in a systematic approach. Follow the standard methodology of the industry like OWASP Testing Guide v4(OTGv4); SANS top 25; NIST SP 800-115; PCI DSS to perform penetration testing so that client can concentrate on their professions without worrying about security threats. Web Application Testing: Do web application penetration testing with the latest methodology like OWASP Top-10, SANS Top-25. Perform both manual and automated penetration testing for vulnerabilities like Injection flaws(such as SQL, NoSQL, OS, and LDAP injection etc),Broken Authentication, Sensitive Data Exposure,XML External Entities (XXE), Broken Access Control,Security Misconfiguration, Cross-site scripting(XSS), Insecure Deserialization, Using Components with Known Vulnerabilities,Insufficient Logging & Monitoring. Also, perform source code reviews for many technologies like Java, NET, PHP etc. Approach for Manual Web-Application Penetration Testing: Conduct manual testing with following controls: * Configuration and Deployment Management Testing * Identity Management Testing * Authentication Testing * Authorization Testing * Session Management Testing * Input Validation Testing * Testing for Error Handling * Testing for weak Cryptography * Business Logic Testing * Client Side Testing Tools that use for Automated Web Penetration Testing: Acunetix, Burp-Suite, Netsparker, Nexpose, Nikto, IBM AppScan, HP fortify, W3af etc. Network penetration testing: Provide both external and internal network Penetration Testing so that your Network Infrastructure is secured from the real world attacks. Do both manual and automated network penetration testing. Approach for Manual Network Penetration Testing: Manually check for IDS/IPS, Server, Networks switch, Network Router, VPN, Firewalls, Anti-virus, Password etc. Tools that use for automated network penetration testing: OpenVas, Wireshark, Nessus, Metasploit, Armitage, Scapy etc. Mobile Application Penetration Testing: Perform mobile applications application penetration testing with the latest OWASP methodology(MSTG). Performed both manual and automated penetration testing for vulnerabilities like Weak Server Side Controls, Insecure Data Storage, Insufficient Transport Layer Protection, Unintended Data Leakage, Poor Authorization and Authentication, Broken Cryptography, Client Side Injection, Security Decisions Via Untrusted Inputs, Improper Session Handling, Lack of Binary Protections. Tools: Burp-Suite, HP fortify, Dex2Jar, Apktool, framework-res.apk, iNalyzer. Source Code Reviews: Perform source code reviews for both front and back-end languages. Perform source code reviews standard methodology like OWASP top 10. Do manual and automated source code reviews for various web based security vulnerabilities like SQL injection, Cross site scripting (XSS), CSRF, RFI,LFI, Authentication bypass etc. Tools: CheckMarx, IBM Appscan source for analysis, Microfocus HP Fortify. Security Analysis and Server Hardening: Regularly check and maintain your systems, servers to ensure that they comply with the standards. Do hardening application checks the item automatically on a daily basis and monitors all critical networks and server components. We support various frameworks like CIS benchmarking for Desktops & Web Browsers, Mobile Devices, Network Devices, Servers – Operating Systems, Virtualization Platforms & Cloud etc. Social Engineering: Have experience in social engineering vectors: Vishing, Phishing, Smishing, Impersonation. Used the following social engineering cycle to conduct social engineering: Gather Information: Here Information gathered from company websites, social media and other publications. Plan Attack: Next step is outline how intends to execute the attack Acquire Tools: After planning, next include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics is used in attacks such as password guessing. Tools: SET(Kali-Linux); GetGoPhish
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Web Testing
    Information Security Audit
    Web Application Security
    Website Security
    Network Penetration Testing
    Software QA
    Security Analysis
    Information Security
    Penetration Testing
    Vulnerability Assessment
    Network Security
  • US$39 hourly
    ✅ 5+ years Experience ✅ 150+ Hours ✅ Professional Penetration Tester ✅ Rising Talent ⭐⭐⭐⭐⭐ Rubel was great! He was responsive, professional, and good at communicating. He delivered and helped us after delivering as well. I would definitely recommend him. ⭐⭐⭐⭐⭐ I'm a Security Specialist and a penetration tester I can test the bellow vulnerability and give you a report about your current situation. I am also a malware remover and help people properly by fixing and securing many malware infected websites and I can restore your hacked social media accounts. Expert In ✔️Web Application And Network Penetration Testing with the recommendation for remediation(wordpress website, e-commerce website, educational website etc) ✔️ Complete security assessment of Application with the recommendation for remediation ✔️ Cloud (AWS) infrastructure complete vulnerability assessment, security & penetration testing with the recommendation for remediation ✔️ Static and Dynamic code analysis (SAST & DAST) with the recommendation for remediation ✔️ API Security ✔️ Reconnaissance - Open Source Intelligence (OSINT) using Datasploit, Spiderfoot, foca pro, Buscador, Maltego, Recon-ng, Shodan, theHarvester etc. ✔️ Malware, Phishing, Breach, data leakage detection ✔️ Firewall audit and configure ✔️ Android and iOS application vulnerability detection and security testing Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python framework 💯 If you have any question. Feel free to leave a message Thanks #hack #penetrationtesting #pentest #malware #malwareremove #security #vulnerability #osint #investigator #informationsecurity
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    WordPress Malware Removal
    Penetration Testing
    Website Security
    Web App Penetration Testing
    Ethical Hacking
    Network Penetration Testing
    Security Assessment & Testing
    Cybersecurity Management
    Vulnerability Assessment
    Information Security
    Open Source
    Virus Removal
    Malware Removal
  • US$150 hourly
    👤 Elliott Crifasi ⭐ Fractional CTO | Devops Engineer | Engineering Leader 🚀 📍 Chicago, IL 🏈 I am part of the Top 1% of Upwork Freelancers, and help my clients get the most out of their teams and resources. I have exceptional problem solving, project/time management skills. My clients work with me because I am a level of expertise that allows me to get things done quickly and efficiently. I can contribute in the following ways: - Fractional CTO - Cloud Infrastructure - Kubernetes - DevOps Transformations - Automated CI/CD Pipelines - Custom API Development (GraphQL/Rest) - Custom Web Development (React.js, Vue.js) - Event-Driven Systems - Database Design (SQL/NoSQL) - Automation Recent Testimonials: **"After going through numerous front-end and back-end developers that took 3 years and were jerked around by other firms with nothing to show for it, we found Elliott. Thank goodness we did. His attention to detail and his communication are second to none."** — Mike T. **"Elliot is a very organized individual. He has a great communication style and makes himself available for questions/comments. He is detail-oriented and was able to learn the components of my project in order to assist me in properly executing my design. With that being said, he is very intelligent and can think abstractly/outside the box in order to complete the task and solve problems that arise. I would highly recommend Elliot for your next project."** — Elizabeth T. Keywords: AWS (Amazon Web Services), GCP (Google Cloud Platform), Azure, Kotlin, Go, Kinesis, Lambda, DynamoDB, Apache Kafka, Node.js, GraphQL, REST, Kubernetes, Typescript, Terraform, Ansible, Docker
    vsuc_fltilesrefresh_TrophyIcon Internet Security
    Golang
    Apache Kafka
    Infrastructure as Code
    Functional Programming
    React
    TypeScript
    JavaScript
    Serverless Computing
    DevOps
    CI/CD
    Node.js
    Terraform
    Amazon Web Services
    Kubernetes
    Google Cloud Platform
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How to Hire Internet Security Specialists

Encryption Basics: How It Works & Why You Need It

What is encryption and how does it work?

While IT security seeks to protect our physical assets—networked computers, databases, servers, etc.—encryption protects the data that lives on and between those assets. It’s one of the most powerful ways to keep your data safe, and while it isn’t impenetrable, it’s a major deterrent to hackers. Even if data does end up getting stolen, it will be unreadable and nearly useless if it’s encrypted.

How does it work? Encryption—based on the ancient art of cryptography—uses computers and algorithms to turn plain text into unreadable, jumbled code. To decrypt that ciphertext into plaintext, you need an encryption key, a series of bits that decode the text. The key is something only you or the intended recipient has in their possession. Computers are capable of breaking encrypted code by guessing an encryption key, but for very sophisticated algorithms like an elliptic curve algorithm, this could take a very, very long time.

Here’s a very simple example. Say you want to encrypt this sentence: “Protect your data with encryption.” If you use a 39-bit encryption key, the encrypted sentence would look like this:

“EnCt210a37f599cb5b5c0db6cd47a6da0dc9b728e2f8c10a37f599cb5b5c0db6cd47asQK8W/ikwIb97tVolfr9/Jbq5NU42GJGFEU/N5j9UEuWPCZUyVAsZQisvMxl9h9IwEmS.”

You can send that encrypted message to someone, separately share the key, then they’re able to decrypt it and read the original sentence.

If you send an encrypted email, only the person with the encryption key can read it. If you’re using an encrypted internet connection to shop online, your information and credit card number are hidden from unauthorized users, like hackers, illegal surveillance, or identity thieves. If you encrypt data before syncing it with the cloud, the cloud—or anyone breaking into it—can’t read that data. Even iPhones are encrypted to protect their data if they’re lost or stolen—something that has made headlines when organizations like the FBI or the NSA need access to them for investigations.

But encryption can be used for bad, too. Ransomware attacks are becoming more prevalent, also called denial of service (DOS) attacks that use encryption software to lock users out of their computers until they pay a fee.

Encrypting Data “In Transit” vs. Data “At Rest”

Basically, the data we encrypt is always either:

  • In transit, meaning it’s moving via email, in apps, or through browsers and other web connections
  • At rest, when data is stored in databases, the cloud, computer hard drives, or mobile devices

Encrypting this data is achieved mainly through:

  1. Full disk encryption (FDE): the primary way to protect computer hard drives and the at-rest data on them. Any files saved to the disk (or an external hard drive) are automatically encrypted. There are intermediate options for disk encryption, as well–folder encryption, volume encryption, etc.–that aren’t quite full-disk encryption, but in between.
  2. File encryption: a way to encrypt at-rest data on a file-by-file basis so it cannot be read if intercepted. This isn’t automatic, but it’s beneficial because that data will stay encrypted after it’s left its place of origin.
  3. End-to-end (E2E) encryption: obscures any content of messages so only senders and receivers can read it, like the early Pretty Good Privacy (PGP) email encryption software. The idea with E2E encryption is that it tackles all the vulnerabilities on the communication chain: the middle (intercepting a message during delivery), and both ends (sender and receiver). This is not just a niche offering anymore, either—platforms like Facebook Messenger and Apple’s iMessage have E2E encryption now, too.
  4. Encrypted web connections: via HTTPS, encrypted web connections use a Secure Sockets Layer (SSL) or transport layer security (TLS) protocols. With secure internet connections, we’re able to have better protected communications on the web. These aren’t impenetrable, but there’s less risk of exploitation. How it works: HTTPS uses SSL and TLS certificates when a browser and server communicate over the web. These are encryption keys, and when both browser and server have them, they’re authorized to access the encrypted data that’s passed between them. It’s a very basic, but very important, security measure when connecting to the web. If you’ve ever seen “https” instead of “http,” or noticed a lock in the URL bar of your browser, you’re accessing a secure site.
  5. Encrypted email servers: S/MIME (Secure/Multipurpose Internet Mail Extensions) public key encryption essentially gives SMTP (simple mail transfer protocol) email servers a leg up by allowing them to send and receive encrypted messages, not just simple text messages.
  6. Pre-encrypting data that’s synced with the cloud: there’s plenty of software available that can pre-encrypt data before it even gets to the cloud, making it unreadable by the cloud or anyone who hacks into it. Note that any files still stored on the local machine aren’t encrypted and are still vulnerable. This accounts only for files sent to the cloud encrypting tech.

Encryption can be simple, like secret-key, or incredibly complex, like the Advanced Encryption Standard (AES), depending on the algorithm and the length of the key. The longer the key, the more protection, but also the more processing power required to handle the encrypting and decrypting process.

A few types of encryption to know include:

  • Secret-key algorithms: Also known as symmetric algorithms, or private-key, this algorithm uses the same key for encryption and decryption. This is a touch more vulnerable because anyone who gets a hold of that one key can read anything you encrypt. Also, passing that secret key over internet or network connections makes it more vulnerable to theft.
  • Public-key algorithms: These are also known as asymmetric algorithms. With public-key encryption, there are two different, related encryption keys—one for encryption, and one for decryption. The public key is how the information is sent to you, and the private key decodes it (much like having a secure lock box on your front porch that a delivery person can put a package in, then only you can access that package with your private key). The benefit here is the key isn’t subject to being sent over insecure networks, but it does require more computer processing power so it’s a bit slower.
  • Block ciphers: Like the Triple Data Encryption Standard (DES), or 3DES, these encrypt data a block at a time. Triple DES uses three keys and is a pretty great encryption option for financial institutions that need to protect sensitive information.
  • Stream ciphers: A symmetric algorithm, it uses a keystream, a series of randomized numbers, to encrypt plaintext one character at a time. Rabbit, W7, and RC4 are popular stream ciphers.
  • Elliptic curve cryptography: A form of public-key encryption, it can be practically unbreakable for normal computers, or “hard.” This is security industry speak for technology that’s not completely unbreakable, but is generally accepted to be up to best standards.
  • Blockchain cryptography: Blockchain technology is essentially a type of distributed database, best known as the basis for Bitcoin, that uses cryptography to safely store data about financial transactions. Blockchain cryptography is a form of “cryptocurrency,” using public-key encryption, and it’s valuable in its ability to provide direct, trustworthy and fraud-proof transactions between users on a peer-to-peer network. Because blockchain databases are distributed, they’re more resilient in the face of a DOS attack, so more companies are exploring this.

A few popular algorithms include:

  • Advanced Encryption Standard (AES): A block cipher, this is pretty much the gold standard, per the U.S. Government. It offers 128-, 192-, and 256-bit encryption, the last two reserved for instances that require extra-strength protection.
  • RSA: This asymmetric algorithm uses paired keys and is pretty standard for encrypting information sent over the internet, although it’s been through some issues of getting broken, which have then been resolved.
  • IDEA (International Data Encryption Algorithm): This block cipher with a 128-bit key has a great track record for not being broken.
  • Signal Protocol: This open-source encryption protocol is used for asynchronous messaging, like email.
  • Blowfish and Twofish: Both of these block ciphers are free to use and popular among e-commerce platforms for protecting payment information. They were created by the same person and offer symmetric encryption with keys varying in bit length. Twofish is the successor and offers longer encryption keys.
  • Ring Learning With Errors or Ring-LWE: This protocol ramps up elliptic curves by adding in a new type of encryption that might be unbreakable by quantum computers.

What is key management and why is it important?

Key management is another important aspect of encryption. Keys are how all of that encrypted data becomes readable, so how you handle them is just as sensitive as the data itself.

Many businesses worry about this aspect of encryption—after all, if you lose an encryption key, you lose access to your data, too. That’s why key management dictates how keys are stored (and shared) so prying eyes can’t get a hold of them, making your entire encryption schema moot.

  • Diffie-Hellman key exchange: This secure way for people to create a key allows them to share secure information. This method is also touted as “perfect forward secrecy,” meaning that theoretically, at no point in the future can messages get encrypted with a Diffie-Hellman key be decrypted.
  • Double Ratchet algorithm: Based on the above, the Double Ratchet algorithm is a key management algorithm used in end-to-end encryption of instant messaging, like the Signal messaging app.

This article just scratches the surface of the art and science of encryption, but hopefully, it gives you enough basic understanding of this important security technology. If you’re considering enlisting the help of a data security expert, you’re in luck: there are plenty of IT services and IT security freelancers (as well as cyber security consultants) on Upwork with expertise in encryption who are able to consult with you on an encryption strategy that’s best for you and your data.

View less
Schedule a call