Hire the best Vulnerability Assessment specialists

Check out Vulnerability Assessment specialists with the skills you need for your next job.
Clients rate Vulnerability Assessment specialists
Rating is 4.8 out of 5.
4.8/5
based on 1,414 client reviews
  • US$200 hourly
    𝗜'𝗺 𝗮𝗻 𝗲𝘅𝗽𝗲𝗿𝘁 𝘀𝗲𝗿𝘃𝗲𝗿 𝗮𝗱𝗺𝗶𝗻𝗶𝘀𝘁𝗿𝗮𝘁𝗼𝗿 & 𝗰𝗹𝗼𝘂𝗱 𝗮𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁 𝘄𝗶𝘁𝗵 𝗱𝗲𝗰𝗮𝗱𝗲𝘀 𝗼𝗳 𝗲𝘅𝗽𝗲𝗿𝗶𝗲𝗻𝗰𝗲; 𝗵𝗲𝗿𝗲 𝘁𝗼 𝗵𝗲𝗹𝗽 𝗮𝗹𝗹𝗲𝘃𝗶𝗮𝘁𝗲 𝘆𝗼𝘂𝗿 𝗽𝗮𝗶𝗻 𝗽𝗼𝗶𝗻𝘁𝘀! 𝗜 𝗽𝗿𝗶𝗱𝗲 𝗺𝘆𝘀𝗲𝗹𝗳 𝗼𝗻 𝗽𝗿𝗼𝘃𝗶𝗱𝗶𝗻𝗴 𝘄𝗵𝗶𝘁𝗲-𝗴𝗹𝗼𝘃𝗲 𝗰𝗼𝗻𝗰𝗶𝗲𝗿𝗴𝗲-𝗹𝗲𝘃𝗲𝗹 𝘀𝘂𝗽𝗽𝗼𝗿𝘁. 𝗖𝗵𝗲𝗰𝗸 𝗼𝘂𝘁 𝗺𝘆 𝗿𝗲𝘃𝗶𝗲𝘄𝘀; 𝗺𝘆 𝗰𝗹𝗶𝗲𝗻𝘁𝘀 𝗿𝗮𝘃𝗲 𝗮𝗯𝗼𝘂𝘁 𝗺𝘆 𝘀𝗲𝗿𝘃𝗶𝗰𝗲𝘀. 𝗔𝗻𝗱 𝗜'𝗹𝗹 𝗯𝗲 𝘀𝘂𝗿𝗲 𝘆𝗼𝘂 𝗱𝗼 𝘁𝗼𝗼! 📞 Invite me to your Upwork job to book a free consultation call. I’m not your average tech. As a member of your team, I go above and beyond to provide you with an exceptional experience: ✅ Unparalleled reliability, patience, communication & professionalism ✅ Over a decade of server/system administration experience ✅ 100% track record with over 5,000 Upwork hours ✅ Exceptional problem-solving skills ✅ Very fast learner of new technologies Here are just a few of the technologies & service providers that I have extensive experience working with: 🛠 Amazon Web Services AWS (EC2, RDS, S3, Route53, Lamda, +) 🛠 Google Cloud Platform & Google Suite Administrator 🛠 Azure Cloud Architect & Server Administrator 🛠 Digital Ocean, Linode, Godaddy, Bluehost, Hostgator & many other hosts 🛠 cPanel/WHM, Plesk, Webmin, DirectAdmin, No Panel Servers 🛠 LAMP stack (Linux, Apache, MySQL, PHP) ⚡ I am fully insured with $1,000,000 in professional liability coverage. Anyone touching your critical servers should be! I specialize in server & application security, performance optimization, and on-demand support services. However, the list doesn’t end there. I’ve spent every working day of the past decade putting out fires. I’ve dealt with hacked servers & websites, mission-critical technical failures, application failures, and many other issues. It has been my utmost pleasure to take on the challenge of both resolving the technical issues while providing customer service with a smile during the most difficult of times. Being the best in class, excellence requires effort. Simply meeting expectations is not sufficient. Anticipating and satisfying one’s unknown needs is what makes for an incredible consultant. Beyond my technical skills, these are lessons the past decade has afforded me. ⭐⭐⭐⭐⭐ 𝟱-𝗦𝘁𝗮𝗿 𝗥𝗲𝘃𝗶𝗲𝘄𝘀 ❝ Steven is the best freelancer I have ever hired (and I have hired very many in various venues). Whipsmart, committed, and conscientious, I am utterly blown away by the quality of his work, and of his funny, personable manner. Highest possible recommendation. ❞ ❝ Steven is fantastic and goes above and beyond for his clients. We will 100% use him again and recommend him enthusiastically. THANK YOU! ❞ ❝ Steven is amazing. Hire him before he raises his rate. Super helpful and responsive. If you need help with anything related to servers, hosting, migration, performance optimization, WordPress support, security or overall optimization, look no further. ❞ ❝ Steven is a Gem. Simply put, Steven is the most knowledgeable IT person I have ever met. He helped me navigate through a very delicate situation that threatened to shut down my business completely. Without Steven, I probably would have had to close down my business and let my people go. He has a DEEP working knowledge of servers and server admin as well Wordpress and many other tools. He is EXTREMELY Professional and a great communicator. I will hire Steven again. ❞ I can support you with… + Linux & Windows Server Administration + Cloud Architecture, Performance & Cost Optimizations + Best practice performance optimization, server security & on-demand support. + Deployment of elastic cloud server clusters. + Managed migrations & system upgrades. + Mitigation of DDoS attacks & other malicious activity. + PCI Compliance & Resolution of failed vulnerability audits & scans. + Application Support - WordPress, Moodle, Magento, WHMCS, Drupal + Disaster Recovery - Backup plan creation & testing. + Additional Web Host Support - When your hosting provider drops the ball. + Mail Security & Authentication - SPF, DKIM, DMARC Support + DNS Management + Project Management + Customer Support + Marketing - PR, SEM (search engine marketing), Pay-Per-Click (PPC) on Google, Bing, Facebook, Twitter, and others. Extensive SEO work (on-page & off-page optimization). Re-targeting campaigns (Adroll, Perfect Audience, Google, Facebook, Youtube) Affiliate marketing via directly managed programs & third-party networks (CJ, Shareasale, ClickBank, Pepperjam, and others.) Mail marketing automation (Mailchimp, Infusionsoft, Marketo, Convertkit) and many CRM systems. + Development - PHP & Python. + Business Management - I've worn many other hats during the management of my business, including work in HR, support, sales, finance, marketing, PR, etc. I'd love to use this experience to help you out! Drop me a line to further discuss your needs. Thanks, 𝗦𝘁𝗲𝘃𝗲𝗻 𝗛. 𝗖𝗹𝗮𝗿𝗸𝗲 Clarkes.Team
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Amazon Web Services
    Google Cloud Platform
    DigitalOcean
    Website Optimization
    PCI
    Keap Marketing
    Malware Removal
    PHP
    Cloudflare
    Mailchimp
    Linux System Administration
    Magento
    WordPress
    Workspace
  • US$145 hourly
    Vastly experience IT expert and top ranked AWS consultant on Upwork that specializes in AWS consulting and migrating business environments, applications and data centers to the AWS cloud. Certified AWS Solutions Architect and AWS Certified Security - Specialty and specialist at creating secure, highly available and cost efficient environments in the AWS cloud that meet all modern compliance standards such as HIPAA, PCI and SOC2. AWS instructor and SME for Simplilearn, an online IT training and certification site and instructor for A Cloud Guru, world leader in cloud computing training. Over 15 years experience of in-house IT consulting for large investment banks in London, Sydney & New York. Contact me if you need highly recommended AWS certified consulting services to evaluate your needs, make the move to the cloud, and vastly improve your technology environment. Specialties: - All things AWS - Cloud migrations - Cloud architecture - Cloud cost optimization - Compliance: HIPAA/SOC2 - IaaS/PaaS/SaaS - Disaster Recovery - Storage solutions - Databases
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Application Security
    Security Infrastructure
    AWS Server Migration
    Amazon EC2
    Microsoft SQL Server Administration
    MySQL
    AWS Lambda
    Amazon Web Services
    Amazon RDS
    Amazon S3
    IT Management
    Database Administration
  • US$240 hourly
    I have provided HIPAA consulting services for the last 20 years and over that time served over 1,000 clients. Client experience includes work with covered entities including hospitals, physicians, other health providers, insurers, union health plans and county government agencies. Experience with business associates include software vendors, IT managed services providers, cloud computing vendors, mobile app developers, medical billing services, value-added resellers, third-party administrators and pharmaceutical marketing companies. Services include virtual Privacy/Security Officer, policy and procedure development, policy gap analysis, computer security risk analysis, technical vulnerability analysis, vendor audits, HIPAA training, business associate contracting and other HIPAA related services. Other related experience includes use of security frameworks including ISO 27001/27002, NIST and HITRUST as well as the PCI DSS. I have worked with other government regulations including 42 CFR Part 2, GxP, FERPA, IDEA, DEA Regulations for E-prescribing of controlled substances and state laws relating to medical privacy and data breach in over 20 states.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Company Policy
    Security Analysis
    PCI
    Information Security Governance
    Project Risk Management
    Information Security
    Data Privacy
    ISO 27001
    HIPAA
    Risk Assessment
    GDPR
  • US$165 hourly
    I am an accomplished and experienced Cyber Security Engineer, CISO, and consultant with over 20 years experience in government, commercial, non-profit and private organizations. I'm a Certified Information Systems Security Professional (CISSP) and CMMC Registered Practitioner. My education includes a Master's degree in Information Assurance and Security specializing in Digital Forensics, a Bachelor's Degree in Information Technology, and daily, hands-on work governing, securing and administering complex information technology environments. My current efforts include cybersecurity compliance implementations for regulated industries and government contractors including the NIST Cybersecurity Framework, Risk Management Framework, NIST SP 800-171, and Cybersecurity Maturity Model Certification (CMMC). For those not bound to other regulatory guidelines, I assist with implementation of the Center for Internet Security (CIS) Critical Security Controls and the CIS Risk Assessment Method. I assist with expert advice, gap assessments, requirements and implementation reviews. I help develop and refine cybersecurity documentation including System Security Plans, POA&Ms, and Policies and procedures. I will share national background check results for qualified opportunities.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Gap Analysis
    Cybersecurity Monitoring
    Amazon Web Services
    Governance, Risk Management & Compliance
    Security Engineering
    Cloud Security
    Security Policies & Procedures Documentation
    Information Security Awareness
    Cybersecurity Management
    Network Security
    Certified Information Systems Security Professional
    Information Security
  • US$30 hourly
    I'm a Penetration Tester and Cyber Security Specialist who is a professional in evaluating the security posture of Web-Applications (Websites) and ensuring the security of personal clients' online identities, accounts, devices, and networks, I've possessed my current knowledge through 3+ years of self-study and research plus 2+ years of work in the industry, protecting clients on a personal level and running vulnerability assessments against business websites, always leaving positive impression and impact, I hold a great record of being able to expertly provide the following services: - Perform comprehensive security checkups on Emails and Phone numbers and pinpoint security holes which often lead victims to be hacked with zero interaction nor awareness from them. - Assist in Account Recovery (Ex. Instagram, Facebook) - Educate thoroughly on the findings and remediations for a vulnerable target, equipping clients with enough information to trust themselves as they continue to utilize the technologies as normal with no fear of being targetted by hackers. - Investigate and educate on online frauds/scams, especially crypto ones, why and how they work, and how to distinguish between legit and not legit easily. - Clean up networks and devices from viruses/malware and ensure optimal patching for security. - Report fraud websites that impersonate legit businesses for a takedown. IMPORTANT: When it comes to cybersecurity-related services, there is a number of scammers not to be underestimated, whether within or outside of Upwork, therefore stay vigilant and keep in mind the following, 1. If you were scammed online via crypto, there's no one out there with the right to give a guarantee that they will be able to recover it for you despite how well furnished the so-called hacker's portfolio appears to be, the chance remains very slim and you should only pursue this kind of service for the sake of leaving no stone unturned knowing the high probability of failure, and you should only select a freelancer with a reputable profile and reviews to back up their activity because scammer accounts are usually fresh with no reviews and no verified ID, feel free to consult me to evaluate that. 2. Same applies to the request of hacking an account, there are complicated caveats that explain why it DOES NOT work the way you think it does but to keep it short, if you want someone's account hacked, aside from it being illegal and unethical and isn't the type of "service" I provide, the chance for it to work is about 1% to begin with, again, I'm available for consultation, account recovery is a different subject with a higher probability for success as long as it's your own account that was lost/hacked.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Malware Removal
    Information Security
    System Security
    Network Security
    Information Security Consultation
    Website Security
    Penetration Testing
    Network Penetration Testing
    Internet Security
    Ethical Hacking
    Security Testing
    Security Assessment & Testing
  • US$55 hourly
    IT Professional with over 30 years experience. 15+ years experience in web development. 8+ Years experience in PCI-DSS Consultation, including level 1 companies, working with QSA's to swiftly obtain compliance. For the past five years, I have been providing GDPR consultation to many small to medium-sized companies. Three years experience with ISO 27001 helping clients get and maintain ISO 27001 accredited certification. I spent 20 years working in various IT roles, mainly support, engineering, and web development, within one of the largest companies in the world. I was awarded Charted IT Professional status from the British Computer Society in July 2008. Since then, I have run my own company with a small team producing web-based platforms and services and offering freelance compliance consultation to small businesses. I have also worked as a CTO on several start-up projects managing their entire IT infrastructure and gaining valuable PCI compliance experience, essential to all e-commerce projects. Due to my experience and varied IT roles, I have a good knowledge of web design, programming, databases, security, SEO, troubleshooting, technical writing & more. I am a highly organised and reliable individual, utilising existing knowledge and experiences to find practical solutions to even the most complex project.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Compliance Consultation
    Data Privacy
    Information Security
    PCI DSS
    Data Protection
    Website Security
    PCI
    Compliance
    ISO 27001
    Risk Assessment
    Information Security Audit
    GDPR
    Web Content Accessibility Guidelines
    Security Analysis
  • US$40 hourly
    Mustaque (CISSP) brings and assist clients in infrastructure Security, Cloud Security, Network Security, Cloud Migration, Threat Intelligence and integrating Information Security program for an organization. With over 15+ years of IT experience, I provide cost-effective solutions to Start-Ups, SMBs/SMEs, and Large Enterprises. I am passionate about helping people succeed in their core business while making an impact on securing their computing environment and making it difficult for outsiders to penetrate or get unauthorized access to the network. I have worked with organizations like IBM, Microland, Bank of America, and other Fortune 500 companies. My background covers the technology discipline (Security by design, Public Cloud Security, Public Cloud Migration, Network Security, threat intelligence, Vulnerability Assessment & Management, and Consulting). My Specialization is to build a solid platform using a security by design concept to stop inside and outside threats. Skill Set: Next Generation Firewalls (Cisco FTD, FortiGate, PaloAlto, Meraki) F5 SSLO, WAF , IPSec. SSL VPN, Zero Trust Architecture, Cloud Security, Internet security, firewalls, IDS, IPS, Nessus, Qualys, Kali Linux, Meta-exploit, Honeypots. Here are some of the area's Mustaque can help with: - Design and Implement Secure virtual data center in Public Cloud (Azure, AWS). - Design and Implement Cloud Security components while designing a virtual data center. - Design and Implement SDWAN at the enterprise level. Add SDWAN security while designing it. - Design and Implement Zero Trust Architecture using state of art zero trust technologies - Help to perform Risk Assessment. - Implementing Security Solutions at multiple layers to provide adequate security. - Audit and assist in implementing Compliance per the standard. - Security Incident & Reporting. - Design, implement and monitor Threat Intelligence program. - Design, implement and test the Disaster Recovery Program. - Research on System logs to build a security data lake. Product Experience: I have worked in Multi-Vendor Environment. Enough exposure to Industry-leading solutions. Professional Certifications: CISSP - Certified Information Systems Security Professional ZTCA - Zero Trust Certified Architect CASA - Certified AlgoSec Security Administrator ECSA - EC-Council Certified Security Analyst CEH - Certified Ethical Hacker MCSA - Microsoft Certified Solutions Associate
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    IT Compliance Audit
    Network Engineering
    Cloud Security
    Cloud Implementation
    Web Application Firewall
    Cloud Architecture
    Cloud Migration
    Network Administration
    Network Design
    System Security
    Information Security
    Kali Linux
    AT&T Cybersecurity
    Network Security
  • US$50 hourly
    With a rich background spanning over 5+ years in designing and executing robust cybersecurity solutions, I am a Cybersecurity Specialist Consultant dedicated to safeguarding digital landscapes. My journey has taken me from the foundational steps of security analysis to spearheading roles as a Co-Founder and CTO, alongside pivotal positions in cybersecurity engineering and ethical hacking across global landscapes from Jakarta to Dallas, and Sydney to the Netherlands. My expertise lies in a deep understanding of cyber threats and vulnerabilities, backed by a Bachelor's degree in Cybersecurity from Deakin University and certified mastery in Blockchain Security, Advanced Penetration Testing, and Fuzzing and Crash Analysis. I've successfully led comprehensive security initiatives, including developing XDR and SIEM solutions, managing multi-layered security systems, and pioneering full-scale cybersecurity startups. My approach is rooted in innovation and efficiency, aiming to protect organizational assets against ever-evolving cyber threats with customized security strategies. At the heart of my service is a commitment to operational excellence and a proactive stance on cybersecurity, ensuring I'm always ready to counteract cyber threats swiftly. Through Encripti, my cybersecurity startup, and various contractor roles, I've honed my skills in vulnerability assessments, red/blue team engagements, and crafting defensive architectures against complex cyber attacks. My portfolio is a testament to my ability to communicate complex security concepts effectively and to collaborate towards enhancing cybersecurity resilience in dynamic environments. In seeking new opportunities on Upwork, I aim to bring my wealth of experience and a proactive approach to cybersecurity to organizations looking to fortify their defenses. Whether through strategic consulting, hands-on penetration testing, or crafting comprehensive security frameworks, my goal is to deliver unparalleled value and security assurance to my clients.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Blockchain Security
    API Testing
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Risk Analysis
    Virus Removal
    Web Application Security
    Data Analytics
    Smart Contract
    Malware Removal
    Security Testing
    Application Security
    Cybersecurity Management
    Penetration Testing
    Digital Forensics
  • US$100 hourly
    Hello I am an experienced cyber security professional and owner of the UK based boutique consultancy Periculo.co.uk who specialise in Digital health, medical devices, fintech, SaaS companies and more. Having drawn on my experience over a number of years, working with a huge variety of customers ranging from construction companies to banks, charities, medical devices, fintech and MOD contractors I became a freelancer to offer affordable expertise that benefits everyone. I strongly believe that every organisation needs to take security and compliance seriously however not all have the big budget that most consultancies demand for their work. Through my own internal processes I'm able to quickly deliver high quality, best in class security and compliance consultancy and testing. My organisation is accredited to the following; Cyber Essentials Cyber Essentials Plus IASME Gold GDPR readiness ISO27001 ISO9001 CREST Penetration Testing We are certified to these standards to provide assurance but also so I practice what I preach and know how to implement it in an efficient way. If you require an affordable security and compliance expert who always reaches a solution with the appropriate risk v reward balance then please get in touch. - Able to assess, audit and certify to GDPR ready, IASME Gold, Cyber Essentials and Cyber Essentials + - GDPR Advisory, DPO as a Service (as I have technical expertise I can often cover a lot more than your traditional DPO) - Providing project consultancy (From small changes to extensive, high risk programs) - Providing operational consultancy and escalation - Supplier and internal assessments - FDA submissions - EUMDR submissions - Penetration testing - Penetration testing for medical devices, inline with IEC60601-4-5 - SOUP management - Hazard analysis - CISO as a service - Digital health cyber security - Infrastructure Security and configuration, AWS, Azure - Security operations consultancy and build - Business and technical policy, standards author Cover all aspects of security including penetration testing, vulnerability scanning etc. ** I am currently available for hire**
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Cybersecurity Management
    ISO 27001
    Information Security Audit
    Penetration Testing
    Security Testing
    Technical Writing
    Data Protection
    PCI
    Network Security
    Information Security
    Cloud Computing
  • US$50 hourly
    I'm a senior offensive security engineer conducting and leading penetration testing engagements. I have conducted and led security audits, penetration tests, and red team engagements for a variety of companies, ranging from enterprise level with thousands of hosts in scope to startups or small clients that want to have an edge over their competition security-wise. Daily activities include, but are not limited to: - Client meetings - Scoping - Hands-on activities (pentesting, etc) - Researching new vulnerabilities - Report writing My skillsets include: - Penetration Testing (web applications, APIs, internal/external networks, mobile (android) applications, server security review) - Vulnerability Assessments - Red Teaming Exercises - Phishing Simulation Owner of CVE-2023-4843. Volunteer at Hackout (a project/platform having collaboration with CERT) where I responsibly disclose vulnerabilities. Former contributor member/content creator at Try Hack Me. Certificates owned: [+] Certified Professional Penetration Tester (eCPPT) from eLearnSecurity [+] Network Defense Professional (eNDP/PND) from eLearnSecurity [+] Certified Red Team Professional (CRTP) from Pentester Academy [+] Certified Red Team Expert (CRTE) from Pentester Academy [+] Web Application Penetration Tester from eLearnSecurity [+] Red Team Operations - Windows Privilege Escalation from Sektor7 [+] Certified Enterprise Security Specialist (PACES) from Pentester Academy [+] Certified Penetration Tester Extreme - eLearnSecurity [+] Certified Red Team Operator - Zero Point Security [+] Offensive Security Experienced Pentester (OSEP) - Offensive Security
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Ethical Hacking
    Web Application Security
    Linux
    Information Security Audit
    OWASP
    Security Testing
    Information Security Consultation
    Security Assessment & Testing
    Application Security
    Network Penetration Testing
    Penetration Testing
    Web App Penetration Testing
    Information Security
    Network Security
  • US$20 hourly
    Need help to recover your HACKED & DISABLED social media accounts in the least possible time? You are at right place if you have lost access to your personal or business social media account (s). Lost credentials or your account got hacked. Your account was disabled by a mistake. You want to remove old accounts or remove your content from search engines or social media. Or if have any other Instagram and Facebook related issue. You might have tried available support options and scrolled through forums but could not find help because: I have been providing virtual assistance with the related issues for a long time and enjoying my successful journey. I have proudly offered my clients to pay only after the successful results and resolved dozens of cases. You will find the support and solution for almost every kind of issue related to the Instagram and Facebook and other social media platforms with full compliance to ethics and respective platform's terms and service. I would love to answer your queries for free of cost and will suggest a way forward that would help you to accomplish your goals. Please send me a message with issue details and screenshots (if feasible). Invite me for the interview if your: Facebook account is disabled. Instagram account is disabled. Facebook account is restricted. Instagram account is restricted. Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Or if you are seeking help for: Recover hacked Instagram account Facebook recovery Instagram restoration Facebook restoration Instagram security Facebook security Instagram verification Facebook verification Instagram & Facebook Integration Instagram & Facebook Marketing Recovery of account in case of lost credentials Recovery from underlying technical issues, bugs and glitches Snapchat issues LinkedIn issues TikTok issues Social media content removal Facebook Instagram Integration Facebook and Instagram verification problem Facebook content removal Instagram content removal Instagram fake followers removal Instagram fake accounts removal Facebook fake accounts removal ''DON'T FORGET TO READ THE REVIEWS ON MY PROFILE'' Disclaimer: Write me about the issues related to your ''own'' social media account (s) or only if you are an authorized representative. Avoid making requests that are not compliant with Upwork and Instagram's terms of service. You will get ethical virtual assistance to get your problem resolved through this channel. Thank you for your precious attention. Looking forward to your invites. Anxiously waiting for assisting you better. :)
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Social Media Marketing
    Social Media Account Setup
    Instagram API
    Internet Security
    Technical Support
    Information Security
    Network Security
    Ethical Hacking
    Troubleshooting
    Data Recovery
    Cybersecurity Management
    Social Media Management
    Instagram
    Facebook
  • US$60 hourly
    Cyber Security Professional with demonstrated experience in Penetration Testing, Security Engineering and Security Consulting. BS in Cyber Operations, Offensive Security Certified Professional (OSCP), Offensive Security Wireless Professional (OSWP), CASA (Certified API Security Analyst), API Penetration Testing, SANS Technology Insitute. Core Competencies: 1. Network Penetration Testing 2. Web Application Penetration Testing 3. Social Engineering (Phishing, Vishing) 4. API Penetration Testing 5. Security Training 6. Defensive Solution Configurations/Reviews (Security Engineering) 7. Malware Analysis 8. Cyber Risk Analysis
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Database
    Ethical Hacking
    Security Engineering
    Web App Penetration Testing
    Network Penetration Testing
    Web Testing
    Cryptography
    Python
    Reverse Engineering
    Penetration Testing
  • US$60 hourly
    Transforming Information Security into a Competitive Advantage! I have the ability to translate complex compliance requirements into clear and concise language that resonates with the business. I'm a certified senior professional specializing in implementing and managing diverse security frameworks, including ISO 27000 family, SOC 2, PCI, GDPR, HIPAA, FedRAMP and CMMC. With a proven track record of guiding businesses to successful certification, I can help you achieve compliance while mitigating risks. Don't wait until it's too late! Contact me now and avoid drowning in compliance requirements. I'm well-versed in compliance platforms like Thoropass, Drata, StrikeGraph, and TrustCloud. Explore how I can assist you and inquire about my 10% referral discount.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    CMMC
    Risk Management
    Microsoft SQL Server
    Security Framework
    NIST Cybersecurity Framework
    HIPAA
    GDPR
    NIST SP 800-53
    Data Privacy
    Information Security Audit
    Compliance
    Governance, Risk Management & Compliance
    ISO 27001
    SOC 2 Report
    Information Security
  • US$220 hourly
    Former private sector and government executive with leadership, consulting, advising, strategic and business development at the forefront of my professional skills. Compliance expertise in: FISMA, NIST CSF, NIST SPs 800 Series, HIPAA, FedRAMP, PCI DSS, Sarbanes Oxley, GLBA, GDPR, ISO 27001. CISSP with more than 20 years in cybersecurity and IT. Cybersecurity professor and skilled trainer in risk management and compliance, with expertise in developing professionals into the cyber managers and leaders they want to become. I teach fundamentals and advanced coursework in risk assessments, security testing, business continuity, secure application development, and securing emerging technologies. Business expertise in grant and proposal writing, as well as policy and procedure development. Technical writing to include strategic plans, white papers, briefing papers, and presentations. I have been writing, convincing, persuading, and communicating effectively through writing my entire career. I am also effective in providing business capture and business development support.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Nonprofit Organization
    Certified Information Systems Security Professional
    Data Protection
    Policy Writing
    Information Security Audit
    Compliance
    Tech & IT
    Risk Analysis
    Business Continuity Plan
    Business Consulting
    Enterprise Risk Management
    Risk Assessment
    Project Risk Management
    Technical Writing
    Technical Documentation
  • US$35 hourly
    Experienced WordPress web developer, available 24h, on your service for urgent tasks and long term projects, same as complete server maintenance on daily/weekly level for all time zones! -WordPress website complete development per urgent basis -WordPress websites maintenance, monitoring weekly/monthly packages -Security works / cleaning / protection of WP sites -Urgent bugs/errors solving -Certified IT Security (London University) specialist and website malware removal expert! More than 5000 websites successfully cleaned and protected! I am a Bachelor of Science in Software and Web Development, specializing in WordPress, E-Commerce, HTML, CSS(3), jquery, JavaScript, PHP, MySQL, Cryptography, and a lot more. Particularly concerned with and proficient in high-level computer security, protection, and threat prevention and removal tactics. -Stanford University certified Human-computer interaction and UI expert. CMS platform designer with particular attention to WordPress theme building, modifications, and customization. Expert in plugin and code tweaking, infrastructure design, and bug prevention and fixes. Extremely high-level computer skills and strong ability for adaptation under different working conditions and environments. Ability to work with many modern handhelds, desktops, and interaction devices.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Domain Migration
    Page Speed Optimization
    WordPress Malware Removal
    Malware Removal
    Virus Removal
    Linux
    WordPress e-Commerce
    WordPress Migration
    WordPress Bug Fix
    PSD to WordPress
    Yoast SEO
    Website
    WordPress
    Web Design
    Search Engine Optimization
    PHP
  • US$75 hourly
    With a wealth of technical experience and a strong background in Office 365, Mac, and Apple technologies, I am an expert in utilizing and optimizing these systems to their fullest potential. My hands-on experience with Microsoft Exchange online, Security & Compliance, Microsoft Teams, Active Directory, and AD Connect, among other systems, have prepared me to effectively manage and maintain these platforms. I am proud to be a Certified Microsoft Enterprise Administrator Expert, Security Administrator, Azure Administrator, Security Analyst, ISO certified and Microsoft Certified Trainer, and my experience in training over 60 individuals on Office 365, leading a team of 19 technical support engineers, and maintaining a strong focus on customer satisfaction all make me the ideal candidate for helping you save cost, ensure efficiency and provide top-notch customer service. I am always eager to tackle new challenges and provide solutions that exceed your expectations. By choosing me as your Cloud Infrastructure Security Expert, you can trust that your technology will be in capable hands, and your business will be running at peak performance.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Security Analysis
    Mac OS X Administration
    System Administration
    Customer Support
    Information Security
    Technical Support
    Customer Service
    Migration
    Email Support
    Incident Response Plan
    Network Administration
    Application Security
    Office 365
    Microsoft Active Directory
    Microsoft Azure
  • US$60 hourly
    Hi, my name is Martin and I've been a principal penetration tester since 2011. Over the years, I've worked on a range of projects across Europe, East Asia, the Middle East, and the UK, serving clients from start-ups to global high street names. My focus is on providing a wide range of penetration testing services, including infrastructure, web and mobile applications, APIs, and cloud security assessments. One of the things that sets me apart from other penetration testers is my approach to the work. I've spent years mastering my craft, staying up-to-date with the latest technologies and techniques, and honing my skills. When I take on a project, I bring all of this knowledge and experience to bear, quickly identifying and exploiting vulnerabilities to provide my clients with the information they need to improve their security posture. In addition to my technical expertise, I'm also an excellent communicator. I understand that many of my clients are not technical experts themselves, so I'm always happy to explain complex technical concepts in simple, easy-to-understand language. I work closely with my clients to understand their needs and provide tailored solutions that meet their specific requirements. When it comes to deliverables, I take great pride in producing detailed reports and other materials that provide clear, concise information about the results of my testing. I know that my clients rely on this information to make important decisions about their security, so I always ensure that my reports are accurate, thorough, and actionable. Overall, I'm proud of the work I do as a principal penetration tester, and I'm committed to helping my clients stay safe and secure in an increasingly complex digital landscape. If you need infrastructure testing, web and mobile application testing, or cloud security assessments, please don't hesitate to get in touch – I'd be happy to discuss how I can help. Experience and expertise within the following disciplines: • Web Application Penetration Testing • Mobile Applications Penetration Testing • API Penetration Testing (REST, SOAP, GraphQL) • Thick Client Application Penetration Testing • External Infrastructure Penetration Testing • Internal Infrastructure Penetration Testing • Server Build Reviews • Workstation Build Reviews • Mobile Device and MDM Testing • Network Device Security Reviews • IoT Security • Embedded Hardware • Simulated Phishing • Wireless Assessments • Red Team Assessments • AWS Configuration Reviews • Azure Configuration Reviews • Office365 Configuration Reviews
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Web App Penetration Testing
    Website Security
    Ethical Hacking
    Certified Information Systems Security Professional
    WordPress
    Security Assessment & Testing
    Cloud Security
    Security Testing
    Web Application Security
    Security Analysis
    Penetration Testing
    Security Infrastructure
    Information Security
    Cybersecurity Management
  • US$25 hourly
    ✅ As a CREST/Offensive Security (OSCP) Certified Penetration Tester and Cyber Security Consultant, I have deep knowledge of Security Assessment Methodology to identify vulnerabilities in Network, API, Web, and Mobile Applications. ✅ I have conducted Penetration Test, Vulnerability Assessment and delivered professional reports to companies in the world complying with: ► CREST standards ► Offensive Security (OSCP) standards ► OWASP Top 10 Vulnerability ► OWASP API Security Top 10 Vulnerability ► OWASP Mobile Security Top 10 Vulnerability ► Application Security Verification Standard 4.0 (ASVS 4.0) ► CWE Top 25 Most Dangerous Software Errors ► ISO 27001 Penetration Testing ► Payment Card Industry Data Security Standard (PCI DSS) ► General Data Protection Regulation (GDPR) ► Common Vulnerability Scoring System (CVSS) ► Open Source Security Testing Methodology Manual (OSSTMM) ✅ I have some cybersecurity certifications including: ► CREST Registered Penetration Tester (CRT) ► CREST Practitioner Security Analyst (CPSA) ► Offensive Security Certified Professional (OSCP) ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ► Executive Summary ► Assessment Methodology ► Type of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings. Each finding listed within the report will contain CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ► Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, Zaproxy, Gobuster, etc.) ✅ Please contact me if you have any question. ✅ Thank you and have a good day!
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Security Analysis
    Software Testing
    White Box Testing
    Web App Penetration Testing
    OWASP
    Black Box Testing
    Network Penetration Testing
    Information Security
    Website Security
    System Security
    Penetration Testing
    Security Testing
  • US$15 hourly
    I have a strong background in ISO 27001, 22301 and SOC2 documentation (mandatory policies, risk assessment and treatment registry, etc.) implementation and certification. Achievements ISO 27001 Lead Auditor Managed Readiness up to Certification for ISO 27001: 2013 ISO 9001:2015 ISO 22301:2019 ISO 17100:2015 SOC 2 CREST Other achievements: • Implemented a Document Management System • Established ACE Hour • Increase turnaround time by implementation of Automation Projects: Buying Requisition Canvassing Request Request for Payment Online Facilities Request
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Security Analysis
    Information Security
    Atlassian Confluence
    ISO 27001
    SOC 2 Report
    Document Control
    ISO 9001
    Documentation
    Internal Auditing
    Business Process Management
    Technical Writing
  • US$60 hourly
    I am a Certified Compliance and Ethics Professional - International (provided by SCCE). I have an Advanced Diploma in Accounting and Business (provided by ACCA). I am ACCA certified. I have 15 years of experience in Compliance, Internal Audit, and Risk Management in Fortune 500 companies in diverse industries (Information Technology, Financial Services, Pharmaceuticals, FMCG, Telecom, and others). I am an experienced professional with a proven track record of delivering profitability, sustainable business growth, operational optimization, and driving innovation. My areas of focus: 1. Information Security (ISO 27001, SOC2, NIST). 2. Data Privacy (GDPR, HIPAA, CCPA, PECR, etc). 3. PCI:DSS Compliance. 4. Risk Management (ERM). 5. Internal Audit. 6. Contracts and Policies writing. 7. MSA and ADA compliance. 8. FCPA, UKBA Compliance. 9. AML/CTF. 10. KYC (Due Diligence). Feel free to contact me whenever it will be convenient for you. Looking forward to hearing from you and hope for our productive cooperation. Regards,
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    ISO 27001
    Information Security Audit
    ISO 9001
    PCI
    Policy Writing
    GDPR
    Anti-Money Laundering
    IT Compliance Audit
    Due Diligence
    Internal Control
  • US$33 hourly
    I am a senior Application Security Engineer with experience performing blackbox penetration tests (web applications, mobile applications and network security), code reviews and configurations review. I have worked in large companies such as Facebook(Meta) as a Security Analyst and I found a number of serious vulnerabilities in large companies through their bug bounty programs. I have also performed thousands of penetration tests throughout my career and I worked on a significant number of tech stacks/programming languages. I can help you secure your platform, products, APIs from outsider and insider threats and I work with any budget. My services include but not limited to : - Web Application Penetration Testing - Mobile App (Android & iOS) Penetration Testing - API Penetration Testing - Network Penetration Testing - Cloud Audit - Network Configuration Assessment - Infrastructure Assessment Methodology : OWASP Tooling : BurpSuite, Nmap, SQLMap, WPScan, ScoutSuite, Acunetix, MITMProxy, Metasploit, CodeQL ...
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Web Application Security
    Website Security
    Security Engineering
    Information Security
    Security Assessment & Testing
    Security Testing
    System Security
    Penetration Testing
    Application Security
    Network Security
    Database Security
  • US$40 hourly
    ✅ Top Rated Plus Expert ✅ 1000+ Hours ✅ Professional Penetration Tester Senior Penetration Tester with more than 6+ years of rich industry experience in Web, Mobile, API, and Network Penetration Testing. I have successfully completed 500+ Web application Pentests, 200+ Mobile Application Penetration Tests, 300+ API Penetration Tests, 100+ External Network Penetration Tests and 30+ Internal Penetration Tests. I am also a Security researcher acknowledged by Yahoo (among other notable companies like SolarEdge, Imgur, Artsy, etc.) for disclosing a number of vulnerabilities via the HackerOne bug bounty platform. My core competency is Blackbox, Greybox Testing on Web, API, Mobile, and Network applications. I am familiar with all attacks and mitigations and am well-versed in OWASP, NIST, and PTES Frameworks. My Pentesting reports include clear documentation of the vulnerabilities found along with the remediations to make sure the client is 100% satisfied. I am also certified in AWS, and Azure and have a very keen knowledge of Cloud Security and cloud administration. ✅ I have conducted Penetration Tests, Vulnerability Assessments and delivered professional reports to companies around the world complying with the following: ►OWASP Web Security Top 10 Vulnerability ►OWASP API Security Top 10 Vulnerability ►OWASP Mobile Security Top 10 Vulnerability ►External Network Penetration Testing ►Internal Network Penetration Testing ►Payment Card Industry Data Security Standard (PCI DSS) ►System and Organization Controls 2 (SOC2) ►General Data Protection Regulation (GDPR) ►Common Vulnerability Scoring System (CVSS) ►Open Source Security Testing Methodology Manual (OSSTMM) My Certs include: ►CompTIA Pentest+ ►AWS Solutions Architect ►Azure Administrator Tools: Burp Suite, Nikto, Nmap, Zap, Metasploit, Nessus, W3af, Ffuf, Dirb, etc... I am available 24/7. If you are interested in cooperation, drop me a line :)
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Web Application Security
    Network Penetration Testing
    Web App Penetration Testing
    Cloud Security
    Mobile App Testing
    Information Security Audit
    Information Security
    Metasploit
    Network Security
    Penetration Testing
  • US$65 hourly
    Top Rated and Vetted Expert for Cloud, Security, AI, FinOps and Blockchain projects! Contact me to discuss your goals and scope of your project/s regarding any of the following aspects: ISO 27001, PCI DSS, GDPR, HIPAA, SOC, SOC1, SOC2, Cyber Essentials compliance/certification. Cloud cost optimisation FinOps strategy, mentoring and delivery. Cloud migration strategy, implementation and delivery on AWS, Azure and GCP. Cloud and hybrid architecture design and alignment with Enterprise Architecture MLOps, AI Analytics, LLM AI design, development and delivery. Blockchain infrastructure and smart contracts auditing for Hyperledger, Ethereum etc. SecOps and SOC building and management. Application Security SAST / DAST. Networking security and architecture. Pentest for external and internal infrastructure, black / grey / white box Feel free to invite me for a brief chat to discuss the scope of your project and try to find a strategic solution, either short-term or long-term.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Information Architecture
    Data Engineering
    Cloud Architecture
    Cloud Engineering
    Cloud Computing
    Project Management
    Digital Transformation
    Data Analytics
    Cloud Security
    Strategic Planning
    Risk Assessment
    Risk Management
    Blockchain Architecture
    Information Security
  • US$30 hourly
    🔢 As a seasoned Penetration Tester, I have a proven track record of conducting and leading successful security audits, web application penetration tests, and red team engagements for a diverse range of clients. My experience ranges from working with multinational corporations with large-scale infrastructures to smaller companies seeking enhanced security measures for competitive advantage. As a security engineer, my day-to-day responsibilities revolve around leveraging my expertise in penetration testing, cyber security, and vulnerability assessment to identify and mitigate potential vulnerabilities. Through these experiences, I have comprehensively understood the prevailing technology stacks employed worldwide, allowing me to discern their security weaknesses with precision. 🚫No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined. Working with me, you will: ★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ★ Complete manual testing for your application and immediate notification if any high-impact issues are found. ★ Unlimited retesting for the fixed issues and unlimited revisions ★ Able to find critical bug classes that are often missed by automated pentests. 🔢 My stats are: ✅ Top-rated in information security and IT compliance categories ✅ Saved tens of thousands of dollars for clients by identifying critical vulnerabilities ✅ Ranked in the Top 50 at multiple bug bounty programs ✅ Supporting all time zones ✅ Long-term engagements ✅ Professional certifications (OSCP, CREST CPSA, OSEP, OSWP) Sound like a fit? 🟢 Press '...' button and then ‘Send Message’ button in the top right-hand corner Penetration Testing and Vulnerability Assessment Tools: Manual Testing: Burpsuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), Metasploit Framework, SQLmap, OWASP ZAP Automated Testing: Acunetix, Nessus, Netsparker, etc. Penetration testing service: 1. Penetration Testing Engagement: thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing. Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus. 2. Professional Report and Statistics: A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact. 3. Remediation Advice and Guidance: Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities. 4. Asset Discovery: Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery. 5. Free Retest: Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended. 6. OSINT Reconnaissance: Gather all valuable data about the company on the internet, including any breached email addresses and related passwords. 7. Briefing and debriefing: Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required. Calls or meetings are available after the penetration test is completed to discuss the results of the engagement, the main issues and concerns regarding the company's security, and any further clarification regarding any vulnerability and the associated impact or risk. ✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes: ► Executive Summary ► Assessment Methodology ► Types of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings Each finding listed within the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections. ► Retest for issues (The vulnerabilities will be retested after they're fixed; multiple retests can be done to ensure the issues are remediated.) My Expertise: ★ Web Application Security Testing ★ API security testing ★ Penetration Testing ★ Internal Active Directory and External Network Pentest ★ Vulnerability Assessment. ★ Thick Client Pentest (Windows Desktop App Testing)
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Risk Assessment
    OWASP
    Network Penetration Testing
    Black Box Testing
    Web Application Security
    Website Security
    Web App Penetration Testing
    Application Security
    System Security
    Security Testing
    Security Assessment & Testing
    Network Security
    Penetration Testing
    Information Security
  • US$90 hourly
    R&D services in the following areas: C++ development and C development Qt development Kernel and Device Driver Development for Windows, Linux and macOS Low-level Software Development for Windows, Linux and macOS Cybersecurity expertise Reverse Engineering Penetration Testing Security testing Automation testing Vulnerability Assessment Blockchain Networking tools (e.g. Firewall, Monitoring, Encryption etc) OpenVPN / VPN development Native Android and native iOS development We have a certified (ISQTB QA) and an experienced team of QA experts according to the specialty of our company - kernel-level drivers, mobile development, web development areas, virtualization, blockchain. Our experts are familiar with Hyper-V/SCVMM, ESXi/VMWareWorkstation/vCenter, KVM, Qemu, MS SQL, Firebird, PostgreSQL, React, AWS, Node.js, Python, JavaScript, TypeScript, C#, Web API (MS ASP.Net), MVC, WCF, perform testing and writing of Unit tests using programming languages. The key areas of development where I have strong experience are Kernel development, Embedded Solutions, Data Acquisition,Mobile Data Management (MDM) and Mobile Application Management(MAM), Reverse Engineering, Proxy filters, Access management and Enterprise security, Pen testing (VAPT) and Cyber security, Blockchain. If my experience is interesting for you, please feel free to contact me!
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Application Security
    React
    web3.js
    Desktop Application
    Cryptocurrency
    Kernel
    Penetration Testing
    Data Protection
    Web Application Security
    Smart Contract
    DApps
    Blockchain
    Reverse Engineering
    C++
  • US$50 hourly
    Following is a summary of my skills: • ISO27001 compliance and gap analysis • IT Security Policies and Frameworks • PCI DSS Assessment level 1 & 2 for merchants and Service provider • Penetration testing • SIEM and Forensics analysis • NIST 800-53 • Risk Assessment and Treatment • Application security vulnerabilities, testing techniques, and the OWASP framework • GDPR • Vulnerability Scanning Experience: • Advise Network and system team to securely build/change Azure and AWS cloud infrastructure for existing and potential clients. • Engage with Client to understand their infrastructure requirements to build and integrate AWS API’s and services. • Maintain and improve ISMS framework that includes SOA, Risk assessment and treatment plan, Risk register and ISM forum to convey the risk to management for their review and support. • Maintain security certifications, including ISO 27001, IRAP and PCI dss. • Conducts Gap assessment as per ISM, PSPF, ISO27001, PCI, NIST and GDPR. • Monitor and assure compliance with information security and privacy regulations, including APRA CPS 234, Privacy Act and GDPR • Manage internal and external audits and remediation • Deliver training programs for security and privacy awareness • Conduct/review security risk assessments of assets and projects • Manage supply chain security • Support Sales and commercials team in responding to security questionnaires • Provides application security services including secure coding techniques and reviews, education & awareness, process and tools, security testing support and guidance for internal software development projects • Reviews information security policies, incident response plans, change management, vulnerability management, patch management policies, etc., as they apply to various facets of the infrastructure in scope. • Performs internal penetration tests, network vulnerability assessments to provide a comprehensive view of the client’s network weaknesses that are exposed to threats. Following are the certifications I have: CISSP CCSP (Cloud security) CEH
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Employee Training
    Data Protection
    PCI
    Certified Information Systems Security Professional
    HIPAA
    OWASP
    GDPR
    AT&T Cybersecurity
    Nessus
  • US$999 hourly
    Computer Science Engineer/Ethical Hacker/Cyber Security Expert who has been providing security for corporate and individuals. ✌Cyber Security/Ethical Hacking - Securing mobile & Pc, running tests for vulnerabilities & server-side security (13+ experience) ✌Web development - JavaScript , Php (12+ experience) ✌CMS - Joomla, WordPress, Drupal (10+ experience) I usually develop cross-platform and Android apps and build dynamic websites. I can develop the product very quickly and with high accuracy. I believe in customer satisfaction. U say it I develop it any language any software you need and if you want to secure your self from attacks I am always available. My work is fast and secure. *Price will vary on the complexity of the project Happy new year 2024 !!!
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Information Security
    Security Engineering
    Ripple
    Bitcoin
    Internet Security
    Android App Development
    XML
    Ethical Hacking
    Cryptocurrency
    Digital Marketing
    PHP
    JavaScript
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Vulnerability Assessment Specialist on Upwork?

You can hire a Vulnerability Assessment Specialist on Upwork in four simple steps:

  • Create a job post tailored to your Vulnerability Assessment Specialist project scope. We’ll walk you through the process step by step.
  • Browse top Vulnerability Assessment Specialist talent on Upwork and invite them to your project.
  • Once the proposals start coming in, create a shortlist of top Vulnerability Assessment Specialist profiles and start to interview.
  • Hire the right Vulnerability Assessment Specialist for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Vulnerability Assessment Specialist?

Rates charged by Vulnerability Assessment Specialists on Upwork can vary with a number of factors including experience, location and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Vulnerability Assessment Specialist on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Vulnerability Assessment Specialists and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Vulnerability Assessment Specialist team you need to succeed.

Can I hire a Vulnerability Assessment Specialist within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Vulnerability Assessment Specialist proposals within 24 hours of posting a job description.

Schedule a call