Hire the best AlienVault professionals

Check out AlienVault professionals with the skills you need for your next job.
Clients rate AlienVault professionals
Rating is 4.9 out of 5.
4.9/5
based on 140 client reviews
  • $40 hourly
    Mustaque (CISSP) brings and assist clients in infrastructure Security, Cloud Security, Network Security, Cloud Migration, Threat Intelligence and integrating Information Security program for an organization. With over 15+ years of IT experience, I provide cost-effective solutions to Start-Ups, SMBs/SMEs, and Large Enterprises. I am passionate about helping people succeed in their core business while making an impact on securing their computing environment and making it difficult for outsiders to penetrate or get unauthorized access to the network. I have worked with organizations like IBM, Microland, Bank of America, and other Fortune 500 companies. My background covers the technology discipline (Security by design, Public Cloud Security, Public Cloud Migration, Network Security, threat intelligence, Vulnerability Assessment & Management, and Consulting). My Specialization is to build a solid platform using a security by design concept to stop inside and outside threats. Skill Set: IP Networking, Cisco, Juniper, Fortigate, F5 BigIP, OpenVPN, WAF , SIP, IPSec. SSL VPN Internet security, firewalls, IDS, IPS, Nessus, Qualys, Kali Linux, Meta-exploit, Honeypots. Here are some of the area's Mustaque can help with: - Design and Implement virtual data center in Public Cloud (Azure, AWS). - Design and Implement Cloud Security components while designing a virtual data center. - Design and Implement SDWAN at the enterprise level. Add SDWAN security while designing it. - Help to perform Risk Assessment. - Implementing Security Solutions at multiple layers to provide adequate security. - Audit and assist in implementing Compliance per the standard. - Security Incident & Reporting. - Design, implement and monitor Threat Intelligence program. - Design, implement and test the Disaster Recovery Program. - Research on System logs to build a security data lake. Product Experience: I have worked in Multi-Vendor Environment. Enough exposure to Industry-leading solutions. Professional Certifications: CISSP - Certified Information Systems Security Professional ZTCA - Zero Trust Certified Architect CASA - Certified AlgoSec Security Administrator ECSA - EC-Council Certified Security Analyst CEH - Certified Ethical Hacker MCSA - Microsoft Certified Solutions Associate
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    System Security
    IT Compliance Audit
    Network Engineering
    Kali Linux
    AT&T Cybersecurity
    Network Security
    Cloud Security
    Cloud Architecture
    Web Application Firewall
    Information Security
    Cloud Migration
    Cloud Implementation
    Vulnerability Assessment
    Network Administration
    Network Design
  • $45 hourly
    For over 16 years, I’ve helped companies and startups get ISO 27001/SOC2/PCI DSS/FedRAMP/HIPAA/HITRUST/NIST/CMMC certifications to pass assessments and strike deals with enterprise clients. Worked with US DoD and US Federal Agencies on compliance and cyber security technical writing projects. 𝗠𝗢𝗡𝗘𝗬-𝗕𝗔𝗖𝗞 𝗚𝗨𝗔𝗥𝗔𝗡𝗧𝗘𝗘! Press “...” on the top, then “Send a Message" to talk with me now. Securing your business, achieving a security certification (SOC 2, ISO 27001, PCI-DSS, HIPAA, or FedRAMP) for your company, or answering a security questionnaire should not be a cumbersome and painful exercise. You are looking for me if: ❓Lost business or leads due to lack of ISO 27001/HIPAA/HITRUST/SOC 2/PCI/FedRAMP certifications ❓Clients demanding information security certifications (PCI-DSS, SOC 2, ISO 27001, HIPAA, HITRUST, FedRAMP, CMMC 2). ❓Need guidance on choosing between SOC 2 and ISO 27001. ❓Seeking to safeguard intellectual property and company data. ❓Uncertain about how to respond to a security assessment questionnaire from a major client. ❓Limited time and resources for compliance efforts and meetings. ❓Struggling to understand the certification process, costs, and timelines. ❓Looking for the #1 Compliance, Security, and Certification Consultant @ Upwork with the best ROI. ❓Interested in implementing a compliance tool (Drata, Vanta, HeyLaika, Tugboat, Compliance Machine, etc.) but need guidance or lack time. Working with me, you will: ★ Get an end-to-end, professionally managed service ★ Get a consultant aiming for long-term support and providing advice and services after the certification achieved ★ Cut corners, and save time and money with a streamlined process ★ Gain an understanding of different security and compliance requirements ★ Be able to assure your clients and sell to Enterprise-level clients As a virtual/fractional CISO, I have created a streamlined and efficient workflow to take this off your shoulder and help the company achieve growth-phase plans and targets by establishing a solid security and governance framework to win Enterprise clients. That is what my clients are saying about me: "Muhammad delivered the project as per our expectations. His knowledge on security standards like NIST/ISO is commendable. He worked with our CTO and technical team to gather relevant information in a very collaborative and structured manner. We would be happy to take his services around IT compliance and security in the future as well." - CEO of Denarii.cash (acquired by Careem) ""Muhammad did a terrific job for us on a very short timeline (less than 48 hours from Proposal to Project Completion). The deliverable and outcome were exactly what we asked for and Mohammad was very accommodating on scheduling. His expertise was exactly as represented and what we needed. He worked well with our team from a standing start. We would definitely use him again!"" - CEO of Anonos "Muhammad immediately became an invaluable member of our team. He kept us on track, knew what was around every corner, and guided us to the finish line with a superior product. Highly recommended." - CISO of MSAG (a Service-Disabled, Veteran-Owned Small Businesses) "Ali was very professional, knowledgeable, and easy to work with." - CEO of DataKitchen.io You will get all the support, tools, and knowledge to get your company and saas/solution / product secured and compliant with ISO 27001, SOC 2, HIPAA, CMMC, PCI-DSS, FedRAMP, StateRAMP, NY DFS, GDPR (or other data privacy) compliance framework by identifying the best solutions and managing the whole process. As your remote (virtual) Information Security Officer (ISO) or Chief Information Security Officer (CISO), you will get all the following information security and compliance-related services: ✅ Information security management strategy, assessments, action plan, ✅ Participating in calls during client or vendor engagements, representing the company's Security team, ✅ Vendor relations, ✅ Security framework implementation and certification (ISO 27001/17/18, SOC 2, HIPAA, PCI-DSS) ✅ Risk assessment, management, treatment plan, remediation tracking ✅ Answering and filling security assessment questionnaires (OneTrust, SIG, CyberGRX, CAIQ, HEVCAT, VAS, or any other questionnaire), ✅ Information security policy and procedure creation/update/review, ✅ Budgeting, ✅ Security operation ✅ Unique, company-specific tasks ✅ Internal audit, gap assessments, ✅ Consulting, ✅ On-demand/part-time/full-time. Additional to the vCISO and certification services, I can provide the same benefits to you as one-off projects. My stats: ✅#1 in Information Security and IT compliance categories (100K+ earned in 2 years) ✅Constant Top-Rated status ✅Over 20+ completed projects ✅82+ hours via Upwork ✅Supporting all time zones ✅Long-term engagements
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    SOC 2
    Information Security Governance
    Information Security Audit
    Cloud Security
    GDPR
    Penetration Testing
    Information Security Consultation
    NIST SP 800-53
    Security Assessment & Testing
    Cybersecurity Management
    IT Compliance Audit
    ISO 27001
    Information Security
    Risk Assessment
    Security Policies & Procedures Documentation
  • $30 hourly
    Cybersecurity Professional focused on making sure your data and information are secure by properly identifying, mitigating and fixing vulnerabilities as well as setting up monitoring platforms for monitoring, additionally I have worked with Python and other scripting languages for data collection, manipulation and visualization. I have experience as a ghostwriter and an editing of texts, I currently hold the position of editor and proofreader for an e-magazine that has been running three years strong delivering books every six months.
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Scripting
    Incident Response Plan
    Technical Writing
    History
    Docker
    Elasticsearch
    Writing
    Data Scraping
    Bash Programming
    Splunk
    AT&T Cybersecurity
    Web Development
    MySQL
    Linux System Administration
    Python
  • $40 hourly
    ✅ Amongst the Top 1000 hackers worldwide Web Pentesting | Mobile App Pentesting | API Pentesting | Vulnerability Assessment | Python & Bash Automation I work with companies to make their digital assets secure and provide solutions to enhance their security parameters. I create cybersecurity content on hackingloops.com explaining the practicalities and how-tos of the vulnerability and exploitation Part-time bug bounty hunter at Bugcrowd & Intigriti. Feel free to contact me for your queries and security-related issues.
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Network Penetration Testing
    Python
    Security Analysis
    Malware
    Website Security
    Mobile App Testing
    Security Engineering
    WordPress
    Cloud Security
    Network Security
    Penetration Testing
    Security Assessment & Testing
    Cybersecurity Management
    Malware Removal
    Firewall
    Information Security
    Vulnerability Assessment
    Information Security Consultation
  • $80 hourly
    ✅ Penetration Tester and Cyber security consultant acknowledged by leading companies in the tech field for reporting several high, and critical vulnerabilities in their systems and websites. After I go through multiple pentestinig techniques manually and automatically, at the end of the engagement, professional reports are provided, that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Let's get in touch and get your website and system secured 🛡️ 🏆 Cyber security consultation 🏆 Cyber security training 🏆 Network Penetration Testing 🏆 Active Directory Penetration Testing 🏆 Web penetration testing 🏆 Vulnerabilities Assessment 🏆 Cyber security training labs Development 🏆 CTF Labs development 🏆 Synack Red Teamer 🏆 Acknowledged by tech lead companies, Yahoo, Nokia, ZTE, Swisscom, Synology, ElearnSecurity, Payoneer, Sophos, Xiaomi. 🏆 I was number 16 on Turkey and Egypt on HackTheBox. 🏆 Work on Weekends 🏆 5 Years Experience
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Digital Forensics
    Metasploit
    Penetration Testing
    Ethical Hacking
    Kali Linux
    Security Testing
    Vulnerability Assessment
    Nessus
    Web App Penetration Testing
    Network Penetration Testing
    Network Security
    Docker
    OWASP
    Web Application Security
    Linux
  • $999 hourly
    Computer Science Engineer/Ethical Hacker/Cyber Security Expert who has been providing security for corporate and individuals. ✌Cyber Security/Ethical Hacking - Securing mobile & Pc, running tests for vulnerabilities & server-side security (11+ experience) ✌Web development - JavaScript , Php (10+ experience) ✌App development - java , Cross-platform (7+ experience) ✌App/ Backend Development: Golang, Clojure, Scala, Ruby on Rails (5+ Experience) ✌CMS - Joomla, WordPress, Drupal (8+ experience) ✌Databases/Caches: Postgres, Redis I usually develop cross-platform and Android apps and build dynamic websites. I can develop the product very quickly and with high accuracy. I believe in customer satisfaction. U say it I develop it any language any software you need and if you want to secure your self from attacks I am always available. My work is fast and secure. *Price will vary on the complexity of the project Happy new year 2023 !!!
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Information Security
    Security Engineering
    Ripple
    Bitcoin
    Internet Security
    Android App Development
    XML
    Ethical Hacking
    Cryptocurrency
    Digital Marketing
    PHP
    JavaScript
  • $125 hourly
    I am a DevSecOps Practitioner, Application Security Analyst, and Cybersecurity Specialist. I have significant and well-diversified experience in multiple Cybersecurity domains, including: 1. Cloud Infrastructure: I help secure Cloud Infrastructure such as GCP AWS and Azure. 2.Penetration Testing and Vulnerability Assessment: I specialize in finding vulnerabilities in Web Applications, Mobile Applications, Networks, and Smart Contracts. 3. Bug Bounty Hunting: I find bugs for various companies on HackerOne - @l3s7r0z. I am constantly improving myself and getting better each day in the Cyber Security field. Lester Obbayi - @l3s7r0z
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Documentation
    Mobile App Testing
    Web Application Firewall
    Technical Documentation
    Black Box Testing
    Internet Security
    Software Testing
    Web App Penetration Testing
    Report Writing
    Ethical Hacking
    Network Security
    Penetration Testing
    Information Security
    Vulnerability Assessment
    Article Writing
  • $75 hourly
    ✅ Top Rated Expert ✅ 3000+ Hours ✅ Professional Penetration Tester Security researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform. For deliverables, professional reports are created,that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors. Core competency is performing black and gray box testing on live web applications/networks or lab environments. Familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of the work is confidential sample vulnerability report can be provided. Service Description 1)Web Application Penetration Testing based on OWASP TOP 10 2)Network Penetration Testing 3)Security Hardening Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python framework
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Web Application Security
    JavaScript
    Reverse Engineering
    Black Box Testing
    Security Testing
    Ethical Hacking
    Network Penetration Testing
    Network Security
    Malware
    Vulnerability Assessment
    Web App Penetration Testing
    Internet Security
    Penetration Testing
  • $80 hourly
    I have 15 years experience facilitating cross-functional BC/DR solutions that fit the budget and meet or exceed recovery requirements. A proven professional combining leadership, technical talent, and business experience to build effective recovery strategies among diverse perspectives. An excellent communicator with a demonstrated ability to build rapport, manage resources, and unite individuals. Areas of Expertise include: Business Impact Analysis Business Continuity Planning DR Planning - cloud or on-prem Crisis Management Planning Enterprise Risk Evaluation and Management BC/DR Exercising and Testing 3rd Party Risk Management Cross-functional Stakeholder Collaboration Data Privacy Compliance BC/DR Program Management Platform Implementation Cyber Security Policy and Compliance
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Information Management
    IT Outsourcing
    IT Compliance Audit
    IT Management
    Information Technology Operations
    Information Technology Strategy
    Project Management
    Project Risk Management
    Disaster Recovery Plan
    Business Continuity Plan
  • $75 hourly
    🏆 EXPERT-VETTED Over 15 years of experience in IT, working in several areas, such as Governance, Project Management, Engineering, IT Operations, and Business/Commercial. Advanced knowledge and involvement in IT Service Management and IT Governance, including Implementation, Management, Consulting, and Audit. Acting in huge national and international companies, with complex projects and dynamic environments. More Skills: ✔️Cobit ✔️ITIL Expert ✔️IT Governance ✔️ISO9001, ISO 20000, ISO 27001 ✔️Lean Six Sigma ✔️SOX ✔️ISAE 3402 ✔️User Experience ✔️Scrum, Agile, Design Thinking ✔️Project Management, PMI, PMP Please take a look at my Portfolio for more details and results.
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    ServiceNow
    ISO/IEC 20000
    Project Management
    QA Testing
    Business Process Modeling
    ISO 9001
    Microsoft Power BI
    Process Improvement
    IT Service Management
    Management Consulting
    ITIL
    IT Management
    Business IT Alignment
  • $111 hourly
    I specialize in Cybersecurity, threat mitigation (hacking cleanup and repair) and system administration on a enterprise scale, as well as full stack development. Complete, integrated and reliable solutions to the most challenging and unique business IT needs, no matter the complexity or difficulty. Fluent in PHP, HTML, JavaScript, Node, and several other programming languages. Experienced Network architect Cybersecurity preventative monitoring and protection, threat detection, and response Cloud Infrastructure management, consulting, and deployment Web & Database migration, management and repair I am your complete IT solutions provider, with over 5+ years of experience!
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Security Assessment & Testing
    System Administration
    Vulnerability Assessment
    Security Engineering
    Cloud Security
    Malware Removal
    Cloud Management
    Cloud Architecture
    Security Infrastructure
    IT Consultation
    DevOps
    Information Security
    System Hardening
    PHP
    WordPress
  • $20 hourly
    I am a CEH professional certified by the EC council and have been awarded as Cyber Security Mentor by EC council. I have more than eight years of experience in the Security domain. I have experience in information security, Penetration Testing, and Vulnerability assessment. I help organizations identify and meet their security goals through security assessments like: - Penetration Testing - Vulnerability Assessment - Policies and Procedures Assessment - Security Compliance Services - Risk Assessment - Social Engineering I can reveal all known and unknown vulnerabilities within your website/web application. I can find 0-day vulnerabilities, and I can help you fix them with the best and most efficient practice. Thanks! Regards Arvind N
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Application Security
    Website Security
    Cloud Security
    Security Operation Center
    Azure
    Ethical Hacking
    Python
    Network Security
    Security Analysis
    Information Security
    Internet Security
    Vulnerability Assessment
    Web App Penetration Testing
    Network Penetration Testing
    Penetration Testing
  • $30 hourly
    Red Team member, performing penetretion tests in all company's assets, vulenrability management and security analyst, Wordpress security expert, site cleanup and hardening. 10 years of experience with Linux servers in the hosting environment, with emphasis on web security, identification and malware removal(site cleanup) , investigation of how the hacking occurred, identify failures in web systems, pentest in web systems and solve other problems related to the hosting environment.
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Malware Website
    WordPress
    Web Host Manager
    Python
    cPanel
    MySQL
    Network Penetration Testing
    Website Security
    Email Security
    Web App Penetration Testing
    Linux
    Kali Linux
    System Security
    Malware Removal
    Security Testing
  • $50 hourly
    Looking for exceptional content demonstrating your expertise in networking, SASE, SD-WAN, ZTNA, cloud technologies, generative AI, or digital transformation? Look no further. As an innovative and relentlessly curious writer, I bring a passion for storytelling to every piece I write. My experience includes cloud computing, artificial intelligence, software development, SaaS, data analytics, data privacy, cybersecurity, and much more. Whether you need high-level technical writing or engaging content for the layman, I can deliver on time and with precision. I've written security awareness columns for corporate employees, opinion pieces for CISOs and CIOs, website content for SaaS, and ghostwritten articles for top-tier publications like Forbes and CSO Online. 90% of my clients on Upwork stick with me long-term because of my commitment to quality, responsiveness, and meticulous attention to detail. If you're looking for cornerstone blogs that won't leave room for your readers to click the next link, ping me! If you're trying to establish thought leadership in the cloud computing and cybersecurity space, even better! Looking forward to learning about your business and content needs. Isra.
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Case Studies
    VPN
    Landing Page
    Article Writing
    Product Description
    Blog Content
    Blog Writing
    Copywriting
  • $50 hourly
    I am a Microsoft Certified professional with over five years of experience working in the Software Development Industry and writing Academic Papers and Research Articles. I have recently worked with Microsoft on the documentation of Accera, an open-source Python library. My diverse capabilities extend beyond technical expertise, showcasing proficiency in academic writing and research that spans various disciplines. My adeptness seamlessly navigates through the spheres of IT, social sciences, and international relations, where I skillfully craft scholarly compositions that shed illuminating insights. Some of my recent academic and industry projects are listed below: • The socio-economic implications of blockchain technology adoption • AI's role in shaping modern international diplomacy • Data privacy challenges in a digitally connected world • The interplay of programming languages with cultural paradigms. • Orchestrated a blockchain-powered solution revolutionizing supply chain logistics. • Brought to life an AIML-driven chatbot, revolutionizing customer engagement. • Engineered a data science pipeline unraveling intricate customer behavior patterns. • Safeguarded sensitive data with an airtight encryption and cryptography framework. • Authored a research paper illuminating the interplay between AI and the workforce. • Crafted an enlightening piece exploring the future landscape of programming languages. • Distilled complexity into clarity with meticulously crafted software documentation. My area of expertise include: • Software Development: My expertise spans the entire software development lifecycle. From meticulously analyzing requirements to crafting elegant solutions, I'm proficient in languages including RoR, PHP, Python, Java, C++, and JavaScript. • Software Quality Assurance: I'm well-versed in ensuring impeccable software quality. My testing skills encompass unit testing, integration testing, and user acceptance testing, utilizing a diverse range of methodologies and tools. (Cypress/Selenium/Playwright/POSTMAN/JMeter) • AI & Machine Learning Aficionado: Crafting AI and machine learning solutions is my forte. I'm adept at leveraging various frameworks and tools to create intelligent systems that drive business insights and growth. • Data Alchemist: My passion is the art of data science and data engineering. I specialize in harvesting, refining, and distilling data into meaningful narratives. My toolkit includes a rich array of data science and engineering tools. • Encryption Maestro: I deeply understand encryption and cryptography techniques. Securing sensitive data is my priority, employing diverse encryption and cryptography algorithms. • Blockchain Pioneer: I have hands-on experience in developing and deploying innovative blockchain applications. My familiarity extends to platforms like Ethereum, Hyperledger Fabric, and Corda, empowering me to architect secure and efficient solutions. I am committed to delivering excellence that surpasses expectations. Be it short-term projects or long-term partnerships; I pledge to bring a solution-focused mindset, strong work ethic, and unwavering dedication to your project.
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Artificial Intelligence
    Machine Learning
    Dissertation Writing
    Report
    Essay
    Essay Writing
    Creative Writing
    Blog Writing
    Article Writing
    Technical Documentation
    Web Development
    Scientific Literature Review
    Technical Writing
    Research Proposals
    Academic Writing
  • $35 hourly
    Hi, With more than 4+ years’ experience as an Information Security Analyst, I am adept in risk assessment, planning, and mitigation strategies. Moreover, my on-the-job experience has afforded me a well-rounded skill set, including first-rate project management and problem-solving abilities.I have deep knowledge of Security Assessment Methodology to identify vulnerabilities in Network, Cloud, API, Web, and Mobile Applications. I have conducted and led hundreds of security audits, penetration tests and red team engagements for a variety of companies, ranging from multinational corporations with thousands of hosts in scope to startups or small clients that want to have an edge over their competition security-wise. My day-to-day job is that of an ethical hacker, which has allowed me to amass great hands-on experience in the field of Penetration Testing, Cyber Security and Vulnerability Assessment, and to have a great understanding of the most widespread and modern technology stacks currently in use around the globe and their flaws from a security standpoint. Follow systematic approach and best industry methodology like OWASP Testing Guide v4(OTGv4) ; SANS top 25; NIST SP 800-115; PCI DSS etc to perform penetration testing I am able to provide the following services: ✅ Penetration Testing Engagement ✅ This includes both thorough manual testing of all functionalities and automated testing for all websites, applications, servers or infrastructure included in the scope of work, using both professional enterprise grade software such as BurpSuite Professional and Nessus and also personal scripts and tools gathered over past engagements. This services extends as well to internal penetration tests and network infrastructure testing as well. ✅ Professional Report & Statistics ✅ Detailed report explaining step-by-step the exploitation and discovery method of each and every vulnerability discovered. Proof-of-Concept screen captures, full requests and responses, CVSS v3.0 standardised risk score, impact and ownership included. ✅ Remediation Advice & Guidance ✅ Remediation advice regarding all security issues discovered, how to fix them and warnings associated with the impact and risk of these vulnerabilities. ✅ Asset Discovery ✅ Through both active and passive methods, I can help you asses how big your digital footprint is on the internet and what is the attack platform visible from an outsider threat perspective. This includes subdomain enumeration and service/port discovery. ✅ Free Checkup ✅ Included in the price will be a checkup/retest of all aforementioned vulnerabilities present in the report in order to ensure that the implemented security controls and/or fixes are working as intended and that there is no other way to bypass them or exploit that vulnerability any longer. ✅ OSINT Reconnaissance ✅ Gathering of all valuable data pertaining to your company available on the internet. This includes any breached email addresses and related passwords available in cleartext on the internet, usually being traded on the dark web. Full access to over 4 billion records of personally curated lists of such information will help you to asses how vulnerable you are and what passwords need to be changed as soon as possible. ✅ Briefing ✅ I am available for calls/meetings discussing what the Scope of Work will be, where the focus of the penetration testing engagement will be, if all subdomains need to be included, if you want a black-box type of engagement or a white-box engagement, if accounts will be required, preferred hours for load testing and any other guidance your company would require if this is the first penetration test engagement that you are doing. ✅ Debriefing ✅ I am available for calls/meetings after the penetration test is completed in order to discuss with you the results of the engagement, what the main issues were and what my concerns regarding the security of your company are. This includes any further clarification regarding any vulnerability and the impact/risk associated with it.
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Linux System Administration
    Reverse Engineering
    Malware Removal
    Android App Development
    Cloud Security Framework
    Bash Programming
    Nessus
    Security Operation Center
    White Box Testing
    Python
    System Security
    Assembly Language
    Network Penetration Testing
    Penetration Testing
    Kali Linux
  • $12 hourly
    I am a lead penetration tester, currently working as an information security consultant for a Lahore-based information security company. I'm a master of certified ethical hacking by worldwide recognized EC-Council and have eCPPT certification from eLearn Security. In my professional career, I have completed more than 100 projects which include Banking sectors, government organizations, insurance companies, software houses, hospitals, universities and private sectors and many more. Most of the project include grey box and black-box pen-testing of web apps, mobile apps, networks, databases, APIs, and IoT devices. Certifications ---------------- eLearn Security Certified Professional Penetration Tester (eCPPT) Certified Ethical Hacker v11 Certified Ethical Hacker (Practical) CEH (MASTER) Certified Network & Website Pen testing Professional (CNWPP ) Certified AppSec Practitioner (CAP) Certified Network Security Practitioner (CNSP). Skills ------ Network Security Assessment and Pentesting: Nessus Pro, OpenVAS, Nexpose, Insight VM, Nikto, Nmap, CrackMapEexec, SMBMap, Maltego, Netcat, Hydra, Aircrack, John The Ripper, Metasploit, CrackMapExec, Hashcat, Powershell Empire, Impacket, Mimikatz, Powersploit, UACme, PRET, Bloodhound, Sharphound, PowerUpSQL, rpivot, Chisel, SSH Tunneling Web Application Pentesting: Maltego, Google Hacking, Wappalyzer, Nmap, Nikto, Burpsuite Pro, ZAP, Acunetix, BeEF, Metasploit, sqlmap, hydra, Custom Tools/Scripts Mobile Application Pentesting: MoBSF, Frida, Xposed, Logcat, Drozer, cycript, Needle, iNalyzer, Passion Fruite, House, Adb, Andbug, apktool, jadx, otool, clutch, class-dump, Radare2, Dumpdecrypt
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    IT Compliance Audit
    Cyber Threat Intelligence
    Compromise Assessment
    System Hardening
    Ethical Hacking
    Compliance Testing
    Cloud Security
    Information Security Audit
    Web Application Security
    Security Assessment & Testing
    Application Security
    Information Security Consultation
    Vulnerability Assessment
    Network Security
    Security Testing
    Penetration Testing
  • $150 hourly
    I am the CEO & founder of BetterCyber Consulting, a cybersecurity consulting, technology, and managed services company helping startups and micro, small, and mid-sized companies create secure operating environments to increase business opportunities. I am also part of Upwork's Expert-Vetted Talent program. My priority is to create cost-effective, business-focused, and risk-driven cybersecurity solutions to help my clients secure their information assets against cyber threats. Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I hold a bachelor's degree in Telecommunications Engineering from the Airforce University in Argentina, a master's degree in Information Security Engineering from the SANS Technology Institute, and many cybersecurity certifications, including CISSP (Certified Information Systems Security Professional) and GSE (GIAC Security Expert).
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    CMMC
    Risk Assessment
    System Monitoring
    Cloud Security
    Internet Security
    Information Security Audit
    Security Management
    Information Security Awareness
    Security Engineering
    Security Analysis
    Email Security
    Penetration Testing
    Information Security
    Security Policies & Procedures Documentation
    Cybersecurity Management
  • $25 hourly
    I am a cybersecurity engineer with a very broad range of IT skills and technologies. I worked as a pentester and a systems and networks administrator in local companies. During those years, I acquired strong experience as a cybersecurity consultant working on web/mobile applications security. I enjoy analyzing malwares, and I like to reverse engineer binaries and figure out how things work. I'm a big lover of binary exploitation. In my free time, I like to dig deeper into the world of exploiting executables and learn new tricks and techniques. I have strong knowledge and years of experience with the following technologies: - Linux - Python, bash - C++ - C - JavaScript - C# - Java - PHP - Laravel
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Linux
    Mobile App
    Web App Penetration Testing
    API
    C
    C++
    Reverse Engineering
    Scriptwriting
    Penetration Testing
    Security Testing
    Network Security
    Vulnerability Assessment
    Bash
    Python
  • $50 hourly
    Linux/Windows/AWS Cloud Administrator. Proficient with Linux/Windows servers, Active Directory, and VMware vSphere. Skiiled in Compute, Networking, and Storage, for DataCenter Hosted corporate networks. Design AWS, Microsoft Azure, and Google Cloud Infrastructure. ● VMware vSphere HA cluster ● Linux Server ● Windows Server 2012,2016,2019,2022 ● Active Directory ● Network and SAN ● Juniper Fortinet Cisco Firewalls ● Amazon AWS Administrator ● HPC Systems Integration ● Global Technical Support Team at NetApp ● HPC Systems Administration at RENCI ● 10 years of experience in a Systems Administrator/Engineer Position ● 10 years of experience in End User/Technical Support Position ● WatchGuard Certified April 2022
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Internet Security
    Malware Removal
    Linux System Administration
    Network Security
    VMWare
    Amazon EC2
    Storage Area Network
    Cisco Certified Network Associate
    NGINX
    Encryption
    Juniper
    Load Balancing
    Microsoft Windows
    OpenVPN
    Windows Server
    Google Cloud Platform
    Firewall
  • $25 hourly
    ⚡ TOP RATED Freelancer | ⚡ 11+ Years Experience I'm a Top Rated Upwork Freelancer and Offer Services in Malware Removal, Virus Removal, Ethical Hacking / Internet Security, WordPress Speed Optimization, Websites Transfer, SSL Installation, WordPress Development, Linux Server Administration and Zen Cart / Drupal / MODX / Moodle / Joomla Upgrade. Over the last 11 years, I Have Worked on 4000+ Websites Security (Cleaning from Malicious Code and Hardening Security), 1000+ Websites Transfer, 200+ WordPress Websites Speed Optimization (Delivered Results As Per Google PageSpeed Insights, GTmetrix) and 500+ SSL Installs (Including HTTP to HTTPS migration). Service Description: 1. Malware / Virus Removal from Websites (Cleaning Hacked Websites) and Servers. ✔100% Malware Cleanup Including Database Clean ✔Japanese Keyword Hack, SEO Spam / Pharma Hack Fix ✔Credit Card Stealers and Ecommerce Malware Fix ✔Google Blacklist Removal (This Site may be Hacked), Google Deceptive Warning Fix ✔McAfee SiteAdvisor, Norton Blacklist or Any VirusTotal Based Blacklist Fix ✔WP-VCD Malware, Backdoor / Malicious Javascript / Conditional Redirects Fix 2. Website Security Maintenance (Implementing Future Security Measures and Guiding How to Maintain Security for the Future). 3. Website Transfer/Migrate to New Host / Domain (Any PHP-based CMS or Custom-coded Website). 4. SSL Install, HTTP to HTTPS Migration with Secure Padlock. 5. WordPress (Websites Development and Troubleshooting Which Includes Fixing Critical Error / Fatal Errors). 6. Linux Server Administration. 7. Optimize and Increase the Speed of WordPress Websites. 8. Zen Cart / Drupal / MODX / Moodle / Joomla Upgrade (Upgrade to the Latest Stable Version). 9. Penetration Testing (Checking Websites for Security Vulnerabilities).
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Website Migration
    Malware
    WordPress Malware Removal
    WordPress
    SSL
    McAfee VirusScan
    Internet Security
    Information Security Audit
    Website Security
    Virus Removal
    Penetration Testing
    Malware Removal
    Firewall
    Vulnerability Assessment
    Network Security
  • $205 hourly
    Risk management specialist, vCISO - 20 years of experience with business IT consulting, regulatory compliance, and acting as a virtual CISO for multiple companies. Commonly assist with vendor risk questionnaires and cybersecurity strategy for organizations of all sizes. Risk management done correctly helps a business grow and save money. Managing losses properly means that the organization makes more money, retains more clients, and while others in similar companies disregard the importance of information privacy, businesses that make cybersecurity a cornerstone of modern business will grow. I want to show you how proactive cybersecurity management is as critical to a business as sales. Expert services: ✅Vendor questionnaires from clients ✅Compliance with PCI, HIPAA, GDPR, SOC2, ISO27001 ✅SSDLC ✅Internal Audits ✅Cloud Security Architecture ✅Policy Creation ✅Security Testing
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    AI Consulting
    Artificial Intelligence
    Enterprise Risk Management
    Information Security Threats
    Secure SDLC
    Data Breach
    Incident Management
    Data Privacy
    Disaster Recovery
    Incident Response Plan
    Regulatory Compliance
    Business Continuity Plan
    Risk Assessment
    HIPAA
    Disaster Recovery Plan
  • $35 hourly
    🔢 As a seasoned Penetration Tester, I have a proven track record of conducting and leading successful security audits, web application penetration tests, and red team engagements for a diverse range of clients. My experience ranges from working with multinational corporations with large-scale infrastructures to smaller companies seeking enhanced security measures for competitive advantage. As a security engineer, my day-to-day responsibilities revolve around leveraging my expertise in penetration testing, cyber security, and vulnerability assessment to identify and mitigate potential vulnerabilities. Through these experiences, I have comprehensively understood the prevailing technology stacks employed worldwide, allowing me to discern their security weaknesses with precision. 🚫No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined. Working with me, you will: ★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ★ Complete manual testing for your application and immediate notification if any high-impact issues are found. ★ Unlimited retesting for the fixed issues and unlimited revisions ★ Able to find critical bug classes that are often missed by automated pentests. 🔢 My stats are: ✅ Top-rated in information security and IT compliance categories ✅ Saved tens of thousands of dollars for clients by identifying critical vulnerabilities ✅ Ranked in the Top 50 at multiple bug bounty programs ✅ Supporting all time zones ✅ Long-term engagements ✅ Professional certifications (OSCP, OSEP, OSWP) Sound like a fit? 🟢 Press '...' button and then ‘Send Message’ button in the top right-hand corner Penetration Testing and Vulnerability Assessment Tools: Manual Testing: Burpsuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), Metasploit Framework, SQLmap, OWASP ZAP Automated Testing: Acunetix, Nessus, Netsparker, etc. Penetration testing service: 1. Penetration Testing Engagement: thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing. Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus. 2. Professional Report and Statistics: A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact. 3. Remediation Advice and Guidance: Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities. 4. Asset Discovery: Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery. 5. Free Retest: Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended. 6. OSINT Reconnaissance: gathering all valuable data about the company available on the internet, including any breached email addresses and related passwords available in cleartext on the internet. 7. Briefing and debriefing: Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required. Calls or meetings are available after the penetration test is completed to discuss the results of the engagement, the main issues and concerns regarding the security of the company, and any further clarification regarding any vulnerability and the associated impact or risk. ✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes: ► Executive Summary ► Assessment Methodology ► Types of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings Each finding listed within the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections. ► Retest for issues (The vulnerabilities will be retested after they're fixed; multiple retests can be done to ensure the issues are remediated.) My Expertise: ★ Web Application Security Testing ★ API security testing ★ Penetration Testing ★ Internal Active Directory and External Network Pentest ★ Vulnerability Assessment.
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Risk Assessment
    OWASP
    Network Penetration Testing
    Black Box Testing
    Web Application Security
    Website Security
    Web App Penetration Testing
    Application Security
    System Security
    Vulnerability Assessment
    Security Testing
    Security Assessment & Testing
    Network Security
    Penetration Testing
    Information Security
  • $30 hourly
    I have completed my BS in Software Engineering from National University of Sciences and Technology(NUST) -Pakistan in 2019. I am working in the cyber security from 2017. I have hands on experience of Splunk and QRadar.I have worked on multiple Endpoint security tools like Kaspersky and TrendMicro. I have also performed security auditing for multiple clients. I have managed SOC ensuring the vigilant monitoring 27/7.I have real time experience of CTF and I have done multiple rooms in TryHackMe. I have done security and risk assessments, TPRA, SLA, OLA and RFPs for multiple projects. My Core Job Responsibilities are the following: • Manage Incident response with all required tools and defined roles • Administration of SIEM solution and other SOC tools • Perform threat management, threat modelling, identify threat vectors and develop use cases for security monitoring • Mentor and guide SOC team and perform knowledge transfer to other teams as required • Integration of standard and non-standard logs in SIEM • Evaluate existing SIEM rules, filters, events, and use cases and adapt to meet the business requirements • Build and manage playbooks in order to document how to respond, set severity, and how to escalate specific threat types • Creation of reports, dashboards, metrics for SOC operations and presentation to Head ISD and ITD • Co-ordination with stakeholders, build and maintain positive working relationships with them • Coordinate, work with and liaise with business stakeholders, technical resources, and third-party vendors • Provide oversight of analysis activities and direct the activities of the team to ensure the effective resolution • Contribute to the development of Attack Analysis SOPs to ensure that they stay current and effective. • Correlate network activity across networks to identify trends of unauthorized use • Review alerts and data from sensors and documents formal, technical incident reports • Research emerging threats and vulnerabilities to aid in the identification of network incidents • Deliver assessments to senior leadership and recommend course of action to be undertaken. • Manage and improve information security documentation as required. • Help analyze findings in investigative matters, and develop fact-based reports of events over period My Core Skills are: - Security Defender - Security Auditing - Drafting Security Policy - NIST Policies - GDPR and PCI-DSS Compliance - SOC Manuals - Playbooks - Use Cases in SIEM - Tools User manuals - Cyber Laws - Digital Forensics - GRC Tools: -Qradar -Splunk -Kaspersky -TrendMicro -Microsoft Defender - Tripwire - Qualys Please contact me for quality services in cyber security. Thanks Regards Muhammad Arsalan Qadir -
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Information Security Awareness
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    PCI DSS
    Governance, Risk Management & Compliance
    Cloud Security
    Computer Network
    Security Operation Center
    NIST Cybersecurity Framework
    Splunk
    System Security
    Digital Forensics
    Incident Response Plan
    Penetration Testing
    Information Security
  • $25 hourly
    ✅ My Brand value 🔝 Top-Rated Professional 🤴🏽 🔥 5 Star Rating on Upwork ✅ 100+ Projects completed offline 👨‍🎓 Google Certified SEO Expert 👨‍🎓 Hubspot Certified 🔥 100% Completed Profile. ✅ I am a dedicated SEO consultant and Content Marketing specialist with almost 6+ years of experience. I have worked on many different types of websites in several industries, and I am proficient in many SEO and content marketing-related skills, including keyword research, competitive analysis, SEO audits, editorial calendar creation, project management, and more. ➤ Objective - To offer top quality Digital Marketing services to my clients that can help them to enhance the online visibility of their businesses and to deliver them the maximum for their investment. ➤ In the last 6+ years of working as a full-time SEO, SEM, SMM consultant for the industry, I have provided marketing solutions to all kinds of websites. I keep myself updated with the latest SEO trends and techniques. Hiring me as your SEO provider guarantees you the highest ROI for your SEO Campaign. ➤ Services Provided - ✅ Website Audit and Analysis - My website audit reports are completely customized. I'll manually analyze your website and will provide you with an action plan that you can easily implement to improve the online visibility of your website. ✅ Penalty Clean Up Services - I can help you in removing both manual and algorithmic penalties from your website. ✅ Reputation Management - I'll help you in cleaning the first page of the search engine by pushing any negative listing to the second page. ✅ Link Building/Link Research - I'll do link building for your website or will search the potential link targets for you so that you can build links of your own. When it comes to Off-Page SEO, The most effective way to skyrocket your site on Google SERPs is to build a variety of high-quality backlinks to your website. Backlinks have always been the big-ticket in jumping up the rankings and getting more traffic. All we care about is that you get trustworthy backlinks which will be loved by Google and don’t have to play a game with search engine algorithms. ✅ Express Delivering (less than 24 hours) ✅ 100% Safe and White Hat ✅ Very High-Quality DA 65+ ✅ Dofollow Backlinks ✅ Best Customer Support ✅ Detailed Report About Each Step ✅ Massive Value I can be your Website Developer I can be your SEO Guru I can be your E-Commerce Manager I can be your Customer Support Specialist I can be your Project Manager I can be your Moderator and many more 👑 I'm not limited to the above-mentioned things, this is just a trial. My main work is only shared with my clients Leave your work in my hands and relax, I will take care of the rest 😎
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Web Design
    Business Analysis
    HTML5
    Website Security
    PHP
    Real Estate Marketing
    Digital Marketing
    Mobile App Design
    WordPress
    WordPress e-Commerce
    App Development
    YouTube Marketing
    Software Design
    Real Estate
  • $30 hourly
    *Penetration Testing * CEH CERTIFIED ENGINEER Web Application /Mobile Application / Infrastructure /Desktop Application/ Source Code Assisment BruteForce Assessment : Hydra , Ncrack DOS Assessment : LOIC Protocol Assessment : Nmap , Hping Directory Assessment : Dirbuster, Gobuster Web Assessment : Burpsuite Host Assessment : Nessus * Network Infrastructure Development * (Routing / Switching / Collaboration) *Network Security Implementations* (Next Generation Firewalls / Load Balancing ( LTM + GTM )/ Web Proxy/VPN/SSL/TLS) * Cloud Engineer* (Architecture/Implementation/Maintenance) *Telecommunication Engineer* (2G/3G/4G Architecture) Skills and Product Experience Terminologies. Related Technologies Routing technologies Static/Floating Routing, RIP, OSPF,EIGRP,BGP,MPLS Switching Technologies VLAN, STP,VTP, DTP,CDP,RSTP,PVST, HSRP,GLBP WAN Connectivity Leased Line, HDLC, PPP , GRE Fake Tunnels, Metro-Ethernet, DSL, VPNV4 MPLS Hardware(Routers) Cisco 7600, MWR2941, ASR901, Cisco 1800, Juniper (MX80,MX240) Hardware (switches) Cisco Catalyst Series (2960,3650) ,Juniper QFX series, Nexus 6k and 7k Hardware(Firewalls ) Juniper SRX 1500 , Net screen, Palo Alto (PA 5060, 7050,5050) , ASA Load Balancer F5 LTM,GTM , F5 VE Proxy McAfee Web gateway Proxy Infrastructure Security. Kali, Metasploit, Nessus, Qualys, Splunk, Qradar Web Security Burp Suite, Sqlmap, Veracode, Netsparker, Msfvenom , Hydra, LOIC, Sublist3r Security Frameworks Mitre ATT&CK, NIST, CIS, ISO 27001
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    QA Testing
    Software QA
    Vulnerability Assessment
    Cybersecurity Management
    Security Assessment & Testing
    Security Testing
    Oracle Cloud
    Penetration Testing
    Information Security
    Load Balancing
    Juniper
    Ethical Hacking
    Amazon Web Services
    Network Engineering
    Firewall
  • $35 hourly
    With 10 years of experience in the public and private sector, I bring a vast spectrum of experience from many platforms and technologies. I started my career doing web scraping the first 2 years and migrated into DBA, data management, data automation, and pretty much anything you can think of that deals with data. I enjoy solving extremely complex data issues with my skill set. My passion is data readiness and making data "work" for my clients. I still do some web scraping for clients Let's talk about your project and see if I am a good fit! 🙋🏼‍♂️I am eager to work with you, to provide reliable, consistent, and High-Level solutions to design/development challenges. Please contact me, so we can discuss how we can work together to FULLY meet your Business Needs!
    vsuc_fltilesrefresh_TrophyIcon AlienVault
    Microsoft Excel
    Mandarin Dialect
    Translation
    MySQL
    RabbitMQ
    SQL Programming
    Redis
    Java
    Data Extraction
    API Integration
    Python
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a AlienVault Freelancer on Upwork?

You can hire a AlienVault Freelancer on Upwork in four simple steps:

  • Create a job post tailored to your AlienVault Freelancer project scope. We’ll walk you through the process step by step.
  • Browse top AlienVault Freelancer talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top AlienVault Freelancer profiles and interview.
  • Hire the right AlienVault Freelancer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a AlienVault Freelancer?

Rates charged by AlienVault Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a AlienVault Freelancer on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance AlienVault Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream AlienVault Freelancer team you need to succeed.

Can I hire a AlienVault Freelancer within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive AlienVault Freelancer proposals within 24 hours of posting a job description.

Schedule a call