Hire the best AlienVault professionals
Check out AlienVault professionals with the skills you need for your next job.
- $40 hourly
- 5.0/5
- (12 jobs)
Mustaque (CISSP) brings and assist clients in infrastructure Security, Cloud Security, Network Security, Cloud Migration, Threat Intelligence and integrating Information Security program for an organization. With over 15+ years of IT experience, I provide cost-effective solutions to Start-Ups, SMBs/SMEs, and Large Enterprises. I am passionate about helping people succeed in their core business while making an impact on securing their computing environment and making it difficult for outsiders to penetrate or get unauthorized access to the network. I have worked with organizations like IBM, Microland, Bank of America, and other Fortune 500 companies. My background covers the technology discipline (Security by design, Public Cloud Security, Public Cloud Migration, Network Security, threat intelligence, Vulnerability Assessment & Management, and Consulting). My Specialization is to build a solid platform using a security by design concept to stop inside and outside threats. Skill Set: Next Generation Firewalls (Cisco FTD, FortiGate, PaloAlto, Meraki) F5 SSLO, WAF , IPSec. SSL VPN, Zero Trust Architecture, Cloud Security, Internet security, firewalls, IDS, IPS, Nessus, Qualys, Kali Linux, Meta-exploit, Honeypots. Here are some of the area's Mustaque can help with: - Design and Implement Secure virtual data center in Public Cloud (Azure, AWS). - Design and Implement Cloud Security components while designing a virtual data center. - Design and Implement SDWAN at the enterprise level. Add SDWAN security while designing it. - Design and Implement Zero Trust Architecture using state of art zero trust technologies - Help to perform Risk Assessment. - Implementing Security Solutions at multiple layers to provide adequate security. - Audit and assist in implementing Compliance per the standard. - Security Incident & Reporting. - Design, implement and monitor Threat Intelligence program. - Design, implement and test the Disaster Recovery Program. - Research on System logs to build a security data lake. Product Experience: I have worked in Multi-Vendor Environment. Enough exposure to Industry-leading solutions. Professional Certifications: CISSP - Certified Information Systems Security Professional ZTCA - Zero Trust Certified Architect CASA - Certified AlgoSec Security Administrator ECSA - EC-Council Certified Security Analyst CEH - Certified Ethical Hacker MCSA - Microsoft Certified Solutions AssociateAlienVault
IT Compliance AuditNetwork EngineeringCloud SecurityCloud ImplementationWeb Application FirewallCloud ArchitectureCloud MigrationNetwork AdministrationNetwork DesignSystem SecurityInformation SecurityKali LinuxAT&T CybersecurityVulnerability AssessmentNetwork Security - $20 hourly
- 4.9/5
- (139 jobs)
The content is good if it is 100% original, SEO-optimized, grammatically correct, coherent, current (not generic), and attention-grabbing. Moreover, it should have small paragraphs, bullet points, and a catchy introduction and conclusion. Despite all these, I always welcome clients who need multiple edits. That is why the InfoSec Institute in the US trusts me. I'm a Professional Cybersecurity Writer with a higher education degree in Master of Science in Information Technology (MSc-IT). I also studied Journalism, Law, and World Politics (International Relations) during my Central Superior Services (CSS) examination, one of the toughest competitive examinations in Pakistan. I have a specialty in the following subjects: ★ To write articles about various Information Security Certifications, including Computer Forensics, CASP, Security+, CISM, CCFE, and Certified Information Systems Security Professionals (CISSP). ★ To perform academic writing. ★ To write technical content about cybersecurity, IT, cryptocurrency, and technology. ★ To draft thought leadership content ★ To write about Cybersecurity / Cyber Security ★ To create a Security Awareness and Training Program ★ To write about tasks related to Information Technology (IT). ★ To write about Journalism, Law, and World Politics. ★ To write regarding the SD-WAN - Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) ★ To write about the Internet of Things (IoT) Security and Privacy. ★ To write about artificial intelligence (AI), machine learning (ML), language learning models (LLMs), deep learning (DL), and so on. ★ To write about Cryptocurrency / Crypto and Blockchain. ★ To write about DevOps (e.g., Containers). ★ To create product reviews, such as VPN reviews, software reviews, etc. ★ Specialist in content regarding antidetect browsers and free proxies. ★ I have a strong command of English that helps me write error-free content. ★ To write about Information Technology (IT) ★ To act as a copywriter for a SaaS content ★ To create SaaS articles ★ To write technical articles on IT industry Moreover, I produce 100% original, error-free, well-researched Copyscape works on time for my Clients. I'm also reliable and hardworking. I will take a complete approach to your project and correspond with you to ensure you receive the exceptional service you deserve. *************************◄█▓▒░►►▬▬▬▬▬ஜஜ۩۞۩ஜஜ▬▬▬▬▬◄◄░▒▓█►***********************AlienVault
Thought Leadership ContentGrammar & Syntax ReviewProduct ReviewNews WritingWritingCopywritingTechnical CopywritingInformation Security Threat MitigationTechnical WritingInformation Security AwarenessBlog WritingSEO WritingArticle WritingVPNInformation Security - $45 hourly
- 4.9/5
- (95 jobs)
Cybersecurity Professional focused on making sure your data and information are secure by properly identifying, mitigating and fixing vulnerabilities as well as setting up monitoring platforms for monitoring, additionally I have worked with Python and other scripting languages for data collection, manipulation and visualization. I have experience as a ghostwriter and an editing of texts, I currently hold the position of editor and proofreader for an e-magazine that has been running three years strong delivering books every six months.AlienVault
ScriptingTechnical WritingIncident Response PlanElasticsearchHistoryDockerLinux System AdministrationWeb DevelopmentAT&T CybersecurityBash ProgrammingSplunkWritingData ScrapingPythonMySQL - $75 hourly
- 4.9/5
- (49 jobs)
⭐ Top Rated Plus vICISO for AI, Cybersecurity and Data Privacy Regulations. ⭐ Data Protection & Privacy Expert with 17+ years of experience in GDPR, HIPAA, PDPL, CCPA, CMMC, PDPA and SOC 2 compliance. Trusted by hundreds of organizations across Tech, HealthTech, EdTech, Fintech, Marketing, Asset Management, and Insurance to simplify complex regulations and ensure airtight compliance. ⭐Founder of a budget-friendly compliance automation tool, Compliancemachine.ai 🚀 | My Moto is Simplify Compliance to Enable Trust 🔒 ⭐Expert in risk assessments, customize compliance strategies, and data protection frameworks. I drive regulatory adherence while fostering a culture of privacy through practical implementation, team training, and awareness. ⭐Let’s turn compliance into your competitive edge—not just a checkbox. 🔑 Your one message. Just a 15-minute call ⏱️, and your path to compliance begins with a clear scope, audit-ready assurance, and a roadmap to certification. 📈 ⭐ Specializing in B2B clients, I offer money-back guaranteed services for ISO 27001, SOC 2, GDPR, HIPAA, PCI-DSS, CMMC, and FedRAMP projects. ⭐ If you need affordable vCISO (virtual CISO) services, i am best choice. What my Clients says about me: CEO of Denarii.cash (acquired by Careem) 🍾Muhammad knowledge of security standards like NIST/ISO is commendable, We attained the certification faster than ever. CEO of DataKitchen.io 🥂 "Ali was very professional, knowledgeable, and easy to work with." CEO of Anonos 👏 "Muhammad did a terrific job for us on a very short timeline (less than 48 hours from Proposal to Project Completion). Yes! I’m Your Perfect Match for Streamlined Security Solutions and Compliance Support If, 🤔 You’re focused on product development and lack the time or resources to manage compliance and endless meetings. 🤔 You’ve already invested in compliance tool like Drata, Vanta, or Sprinto but are unsure about the next steps or are pressed for time. 😢 You urgently need security awareness training, cloud security assessments (AWS, GCP, Azure), endpoint security (MS 365 Intune, JumpCloud, Google Workspace), or penetration testing. 💪 You want to shorten your sales cycle by having all the right answers for security and privacy questionnaires. 💪 You’re grappling with security and privacy concerns for AI products. 💪 You need continuous access to a certified security, compliance, and privacy expert to manage your framework with affordable vCISO services. 😟 You need fast, world-class security policies tailored to your business needs that can effortlessly pass third-party audits. 💪 You want to work with the best consultant to resolve your security challenges. Working with me means: - Step confidently toward securing enterprise sales with a comprehensive, enterprise-level security framework. - Receive ready-to-implement solutions tailored for long-term success, designed by a senior team of seasoned architects, penetration testers, engineers, and auditors. - Our expert team regularly supports clients in navigating complex security requirements and achieving enterprise-level deals, ensuring your business meets the highest standards. My track record: ✅ Helped clients to save thousands of dollars by recommending the most effective security tools and solutions ✅ Ranked #Top rated in Information Security and IT Compliance on Upwork ✅ More then 200 Projects with delivering for 10000 hours across all time zones. ✅ Multiple professional certifications (CISA, CISSP, ISO 27001 IA, PMP ). About my team: I am dedicated to deliver high-quality projects by ensuring efficiency and adaptability at every stage, always aligning with client expectations. Our motto, "Delivering excellence that exceeds expectations and delights clients," reflects our commitment. My team of specialized consultants excels in compliance and regulations, with deep expertise in AWS, Azure, GCP DevOps, SecOps, penetration testing, Google Workspace, MS 365 Intune, AppSec, and auditing. Their expertise ensures that every project meets the highest standards in cloud security, cybersecurity best practices, and compliance solutions. Why Client HIRE me. ● Open-minded, relaxed attitude ● Values integrity & long-term relationships ● Willing to accept guidance and advice in the complex field of security. I am proficient in Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, SIG Lite, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Process Unity Frameworks and standards: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, Center of Information Security (CIS) CSAT, IRAP, PIPEDA, ISO 42001,SAMA Compliance Specialist Contact me to leverage my IT compliance and security expertise and secure your path to meeting your million-💲goals.AlienVault
SOC 2Information Security GovernanceInformation Security AuditCloud SecurityGDPRPenetration TestingInformation Security ConsultationNIST SP 800-53Security Assessment & TestingCybersecurity ManagementIT Compliance AuditISO 27001Information SecurityRisk AssessmentSecurity Policies & Procedures Documentation - $30 hourly
- 4.7/5
- (20 jobs)
🔒 𝐈𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 🛡️ 𝐏𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐓𝐞𝐬𝐭𝐢𝐧𝐠 🌐 𝐖𝐞𝐛 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 📱 𝐌𝐨𝐛𝐢𝐥𝐞 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 📝 𝐈𝐓 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐨𝐥𝐢𝐜𝐲 🔍 𝐕𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐀𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭 Hello, I’m Delwar Alam, an Information Security Expert with over 5 years of experience. I have completed more than 100 penetration tests and security assessments, specializing in web and mobile applications in the finance sector. Throughout my career, I have become proficient in various technologies and frameworks such as J2EE, ASP, and PHP. My work includes understanding all common attack vectors and implementing effective mitigation techniques. My qualifications include OSCP Penetration Testing with Kali Linux and Certified Ethical Hacker (CEH) v.10. I am dedicated to providing top-notch IT Security services while maintaining professionalism. 🔒 𝐈𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 Experienced in safeguarding data through the implementation of robust security measures and practices. 🛡️ 𝐏𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐓𝐞𝐬𝐭𝐢𝐧𝐠 Conducting thorough penetration tests to identify vulnerabilities in web and mobile applications. 🌐 𝐖𝐞𝐛 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 Ensuring web applications are secure from potential threats through comprehensive security assessments and reporting. 📱 𝐌𝐨𝐛𝐢𝐥𝐞 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 Specializing in securing mobile applications by testing for security flaws across various platforms. 📝 𝐈𝐓 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐨𝐥𝐢𝐜𝐲 Creating detailed and effective IT security policies to safeguard organizational data and compliance. 🔍 𝐕𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐀𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭 Identifying and evaluating vulnerabilities in IT systems to prevent potential security breaches. 𝐒𝐨𝐫𝐫𝐲, 𝐈 𝐚𝐦 𝐧𝐨𝐭 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐥𝐨𝐜𝐚𝐭𝐞 𝐲𝐨𝐮𝐫 𝐠𝐢𝐫𝐥𝐟𝐫𝐢𝐞𝐧𝐝, 𝐫𝐞𝐜𝐨𝐯𝐞𝐫 𝐲𝐨𝐮𝐫 𝐥𝐨𝐬𝐭 𝐅𝐀𝐂𝐄𝐁𝐎𝐎𝐊, 𝐆𝐌𝐀𝐈𝐋, 𝐘𝐀𝐇𝐎𝐎, 𝐞𝐭𝐜. 𝐚𝐜𝐜𝐨𝐮𝐧𝐭, 𝐨𝐫 𝐟𝐢𝐧𝐝 𝐲𝐨𝐮𝐫 𝐥𝐨𝐬𝐭 𝐩𝐡𝐨𝐧𝐞. 𝐏𝐥𝐞𝐚𝐬𝐞 𝐝𝐨 𝐧𝐨𝐭 𝐢𝐧𝐯𝐢𝐭𝐞 𝐦𝐞 𝐭𝐨 𝐬𝐮𝐜𝐡 𝐣𝐨𝐛𝐬. Before I start offensive tests, I may ask you for evidence that you are the site owner or to show me that you have admin access. If you are looking for an expert to enhance your cybersecurity posture, let’s connect and discuss how I can help your business.AlienVault
WordPress Malware RemovalWebsite SecurityCertified Information Systems Security ProfessionalSecurity EngineeringWeb Application SecurityInformation Security AuditSecurity AnalysisWeb App Penetration TestingInformation SecurityKali LinuxAT&T CybersecurityVulnerability AssessmentMalware RemovalPenetration Testing - $40 hourly
- 4.9/5
- (105 jobs)
I have more than 10 years of practical working experience in cyber security sector. I am crypto scam investigator and recovery specialist. I am expert on blackmailer and scammer Investigation. I can help you for blackmailer and scammer issues. My expertise areas: 1. Crypto Scam Investigator & Recovery Expert, I am a crypto scam investigator & recovery expert. I have done 80+ cases already. I understand the importance of recovering funds for clients and bringing scammers to justice. I am professional & worked with clients from USA, Canada, UK, Australia, and more locations. I will handle your case with the utmost professionalism and dedication. Normally Scammers manipulate clients to invest in scam sites. After that, they shows the fake growing amount. Then clients invest a huge amount for a handsome profit. But when the client want to withdraw the amount then the scammer tells the client to pay for taxes & services, etc. If the client even pay taxes they will never allow for withdrawal requests. These are the very common tricks that scammers apply nowadays. Here is an outline of how I will assist you in recovering your clients' funds and catching the criminal: a) I will track all the transactions and find the final holding wallet addresses b) I will lnvestigate Scammers Information & verify them c) I will check the scammer website for vulnerabilities d) I will provide a report that include every single step details for the law enforcement Hire me to get this service immediately 2. SOC Setup for monitoring your target devices. My project offers a comprehensive Security Operations Center (SOC) setup service that integrates Elastic Search, Wazuh, and Filebeat to provide an all-encompassing solution for monitoring and securing your IT infrastructure. This service is designed to help organizations of all sizes protect their digital assets, ensure compliance with industry standards, and respond swiftly to security incidents. #Elastic Search Installation: #Wazuh Installation: #Filebeat Installation: #Manager Installation on Client Machine: #Dashboard and Reporting Setup: #Testing and Validation: #Training and Handover: Providing training sessions to your team on how to use and manage the SOC setup. Key Benefits: Enhanced Security Posture: Gain comprehensive visibility into your network, identify threats in real-time, and respond swiftly to security incidents. Why Choose My Service? With 5 years of experience in cybersecurity and SOC implementations, I bring a wealth of knowledge and skills to ensure your project is successful. My background includes working with various organizations to enhance their security measures and protect their digital assets. Hire Me Now! 3. Cyber Crime Investigator: I investigate and prevents criminal activities in the digital world. I analyze digital evidence and work with law enforcement to protect individuals and organizations from online threats. Hire me to get this service immediately Hire me to get this service immediately 4. Digital Forensics Service: I specialize in digital forensics and cyber investigation services to uncover the truth behind cyber incidents. With 10 years of experience, I offer: a) Digital Forensics: Expert analysis of digital devices to retrieve critical evidence. b) Incident Response: Swift response to contain breaches and identify attack vectors. c) Network & System Analysis: Identification of unauthorized access and vulnerabilities. d) Malware Analysis: In-depth examination to determine malware nature and impact. e) Expert Witness Testimony: Qualified to provide clear technical support in legal proceedings Hire me to get this service immediate 5. Vulnerability Assessment & Penetration Testing (VA/PT) Service: With nearly 10 years of experience in vulnerability assessment & penetration testing, I aim to provide the highest level of security for clients' websites and applications. Through testing and a comprehensive report, I identify vulnerabilities and offer actionable recommendations for improvement. Please provide project details for an accurate estimate. Hire me to get this service immediately 6. Hack Investigation & Hack Removal Service: I offer comprehensive Hack Investigation & Removal services a) Thoroughly investigate the hack, identify its source and impact. b) Swiftly remove malicious code and unauthorized access. c) Recover compromised data and fortify security measures. d) Continuous monitoring and support for ongoing protection. Hire me to get this service immediately 7. Crypto transaction tracking service: I have done 50+ crypto scam cases already. I can tracking your scammed crypto money that you have send to the scammer unfortunately. I will track all the transactions & will find the final folding wallet addresses where your money is currently stored. By that information you can claim to retrieve your money back. 8. Ethical Hacking Service: I will do it to protect you from cyber criminals legally and ethically.AlienVault
CryptocurrencyGrowth HackingiPhoneNetwork SecurityInformation & Communications TechnologyPenetration TestingInformation SecurityInformation AnalysisMySQLVulnerability AssessmentCybersecurity ManagementDigital ForensicsSystem SecurityCryptographyEthical Hacking - $30 hourly
- 4.8/5
- (5 jobs)
*Penetration Testing * CEH CERTIFIED ENGINEER ISO Lead Auditor Web Application /Mobile Application / Infrastructure /Desktop Application/ Source Code Assisment BruteForce Assessment : Hydra , Ncrack DOS Assessment : LOIC Protocol Assessment : Nmap , Hping Directory Assessment : Dirbuster, Gobuster Web Assessment : Burpsuite Host Assessment : Nessus * Network Infrastructure Development * (Routing / Switching / Collaboration) *Network Security Implementations* (Next Generation Firewalls / Load Balancing ( LTM + GTM )/ Web Proxy/VPN/SSL/TLS) * Cloud Engineer* (Architecture/Implementation/Maintenance) *Telecommunication Engineer* (2G/3G/4G Architecture) Skills and Product Experience Terminologies. Related Technologies Routing technologies Static/Floating Routing, RIP, OSPF,EIGRP,BGP,MPLS Switching Technologies VLAN, STP,VTP, DTP,CDP,RSTP,PVST, HSRP,GLBP WAN Connectivity Leased Line, HDLC, PPP , GRE Fake Tunnels, Metro-Ethernet, DSL, VPNV4 MPLS Hardware(Routers) Cisco 7600, MWR2941, ASR901, Cisco 1800, Juniper (MX80,MX240) Hardware (switches) Cisco Catalyst Series (2960,3650) ,Juniper QFX series, Nexus 6k and 7k Hardware(Firewalls ) Juniper SRX 1500 , Net screen, Palo Alto (PA 5060, 7050,5050) , ASA Load Balancer F5 LTM,GTM , F5 VE Proxy McAfee Web gateway Proxy Infrastructure Security. Kali, Metasploit, Nessus, Qualys, Splunk, Qradar Web Security Burp Suite, Sqlmap, Veracode, Netsparker, Msfvenom , Hydra, LOIC, Sublist3r Security Frameworks Mitre ATT&CK, NIST, CIS, ISO 27001AlienVault
QA TestingSoftware QAVulnerability AssessmentCybersecurity ManagementSecurity Assessment & TestingSecurity TestingOracle CloudPenetration TestingInformation SecurityLoad BalancingJuniperEthical HackingAmazon Web ServicesNetwork EngineeringFirewall - $999 hourly
- 5.0/5
- (137 jobs)
Computer Science Engineer/Ethical Hacker/Cyber Security Expert who has been providing security for corporate and individuals. ✌Cyber Security/Ethical Hacking - Securing mobile & Pc, running tests for vulnerabilities & server-side security (13+ experience) ✌Web development - JavaScript , Php (12+ experience) ✌CMS - Joomla, WordPress, Drupal (10+ experience) I usually develop cross-platform and Android apps and build dynamic websites. I can develop the product very quickly and with high accuracy. I believe in customer satisfaction. U say it I develop it any language any software you need and if you want to secure your self from attacks I am always available. My work is fast and secure. *Price will vary on the complexity of the project Happy new year 2024 !!!AlienVault
Information SecuritySecurity EngineeringRippleBitcoinInternet SecurityAndroid App DevelopmentXMLEthical HackingCryptocurrencyDigital MarketingPHPJavaScript - $30 hourly
- 4.9/5
- (76 jobs)
I am a Microsoft Certified professional with over five years of experience working in the Software Development Industry and writing Academic Papers and Research Articles. I have recently worked with Microsoft on the documentation of Accera, an open-source Python library. My diverse capabilities extend beyond technical expertise, showcasing proficiency in academic writing and research that spans various disciplines. My adeptness seamlessly navigates through the spheres of IT, social sciences, and international relations, where I skillfully craft scholarly compositions that shed illuminating insights. Some of my recent academic and industry projects are listed below: • The socio-economic implications of blockchain technology adoption • AI's role in shaping modern international diplomacy • Data privacy challenges in a digitally connected world • The interplay of programming languages with cultural paradigms. • Orchestrated a blockchain-powered solution revolutionizing supply chain logistics. • Brought to life an AIML-driven chatbot, revolutionizing customer engagement. • Engineered a data science pipeline unraveling intricate customer behavior patterns. • Safeguarded sensitive data with an airtight encryption and cryptography framework. • Authored a research paper illuminating the interplay between AI and the workforce. • Crafted an enlightening piece exploring the future landscape of programming languages. • Distilled complexity into clarity with meticulously crafted software documentation. My area of expertise include: • Software Development: My expertise spans the entire software development lifecycle. From meticulously analyzing requirements to crafting elegant solutions, I'm proficient in languages including RoR, PHP, Python, Java, C++, and JavaScript. • Software Quality Assurance: I'm well-versed in ensuring impeccable software quality. My testing skills encompass unit testing, integration testing, and user acceptance testing, utilizing a diverse range of methodologies and tools. (Cypress/Selenium/Playwright/POSTMAN/JMeter) • AI & Machine Learning Aficionado: Crafting AI and machine learning solutions is my forte. I'm adept at leveraging various frameworks and tools to create intelligent systems that drive business insights and growth. • Data Alchemist: My passion is the art of data science and data engineering. I specialize in harvesting, refining, and distilling data into meaningful narratives. My toolkit includes a rich array of data science and engineering tools. • Encryption Maestro: I deeply understand encryption and cryptography techniques. Securing sensitive data is my priority, employing diverse encryption and cryptography algorithms. • Blockchain Pioneer: I have hands-on experience in developing and deploying innovative blockchain applications. My familiarity extends to platforms like Ethereum, Hyperledger Fabric, and Corda, empowering me to architect secure and efficient solutions. I am committed to delivering excellence that surpasses expectations. Be it short-term projects or long-term partnerships; I pledge to bring a solution-focused mindset, strong work ethic, and unwavering dedication to your project.AlienVault
Artificial IntelligenceMachine LearningDissertation WritingReportEssayEssay WritingCreative WritingBlog WritingArticle WritingTechnical DocumentationWeb DevelopmentScientific Literature ReviewTechnical WritingResearch ProposalsAcademic Writing - $40 hourly
- 4.8/5
- (42 jobs)
✅ Amongst the Top 1000 hackers worldwide Web Pentesting | Mobile App Pentesting | API Pentesting | Vulnerability Assessment | Python & Bash Automation I work with companies to make their digital assets secure and provide solutions to enhance their security parameters. I create cybersecurity content on hackingloops.com explaining the practicalities and how-tos of the vulnerability and exploitation Part-time bug bounty hunter at Bugcrowd & Intigriti. Feel free to contact me for your queries and security-related issues.AlienVault
Code ReviewPythonSecurity AnalysisWebsite SecurityMobile App TestingSecurity EngineeringCloud SecurityNetwork SecurityPenetration TestingSecurity Assessment & TestingCybersecurity ManagementMalware RemovalInformation SecurityVulnerability AssessmentInformation Security Consultation - $20 hourly
- 4.8/5
- (25 jobs)
✔️ Get the burden of security and compliance management taken off your shoulder, so you can focus on building your company. Cybersecurity expert with specialization in SIEM/SOC and SOAR technologies, offering comprehensive information security engineering services. With a track record of safeguarding organizations from cyber threats, I bring expertise in threat detection, incident response, and automation to enhance your security posture. Let's fortify your digital defenses and ensure your data remains secure. Expertise: 🛡️ Vulnerability Scans and Assessment. ✔️ Deployment of different SIEM solutions (LogRhythm, Splunk, IBM QRadar, Log Sign, Wazuh, Rapid7, etc.) ✔️ Deployment of EDR, XDR solutions. ✔️ finely-tuned SIEM alarm rules and developed incident response playbooks for enhanced security readiness. ✔️ Comprehensively defend by aligning MITRE ATT&CK against cyber threats at every phase of an attack. ✔️ Manage SOCAAS(SOC as a Service) 💰 Save money by knowing the right approach, security tool, or solutions. ✔️ Cyber Security Tutor | Conduct Training for Cyber Awareness. ✔️ Tasks of Programming (C++, Python, JavaScript) | Logs Parsing (Regular Expression). ✔️ Digital Forensic. Commitments: ✅ Safeguard Your Business Ahead of Threats ✅ Client Satisfaction ✅ Supporting all time zones ✅ Long-term engagements I have gained expertise in most cyber security tools for Vulnerability Assessment (VA) and Penetration Testing (PT). I am eager to partner with your organization to deliver cybersecurity & compliance solutions. Just chat me up 🤙AlienVault
Vulnerability AssessmentPenetration TestingCyber Threat IntelligenceSecurity Operation CenterTechnical WritingInformation Security ConsultationInformation Security Threat MitigationInformation Security GovernanceInformation Security AuditInformation SecuritySOC 2 ReportSOC 2Cybersecurity ToolCybersecurity ManagementCybersecurity Monitoring - $50 hourly
- 4.9/5
- (228 jobs)
✅ Top Rated Plus Expert ✅ 3000+ Hours ✅ Professional Penetration Tester Cybersecurity researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform. For deliverables, professional reports are created, that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors. Core competency is performing black and gray box testing on live web applications/networks or lab environments. Familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of the work is confidential sample vulnerability report can be provided. Service Description 1)Web Application Penetration Testing based on OWASP TOP 10 2)Network Penetration Testing 3)Security Hardening Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python frameworkAlienVault
Web Application SecurityJavaScriptReverse EngineeringBlack Box TestingEthical HackingWeb App Penetration TestingNetwork Penetration TestingInternet SecuritySecurity TestingNetwork SecurityPenetration TestingVulnerability Assessment - $20 hourly
- 4.1/5
- (59 jobs)
Hi. Hope you are well. I am Cyber Security Expert and Information Technology professional having 18 years of an experience in Cyber Security, Information Technology, Website Design and Development and Graphics Designing. • My qualification is MS in Cyber Security from Scotland, UK and MSc in IT. • I am also CISM (Certified Information Security Manager) from ISACA . • I am expert in managing Cyber Security and Information Security Standards. • I prepare policies and procedures as per the latest Cyber Security Standards. • I also provide services for ISO27001 ISMS, NIST Cyber Security Framework. • I am expert in Vulnerability Assessment Penetration Testing. • I perform security scanning of websites with the consent of the owner. • I prepare excellent penetration testing reports based on CVSS (Common Vulnerability Scoring System). • I also provide advice to clients to mitigate vulnerabilities. • I am available to provide Cyber Security Consultancy Services. • My team member includes my wife, she has done MSc in Computer Science. She is expert Website Designer and Developer, Typing tasks in MS Word, worksheets in MS Excel, presentations in MS PowerPoint and content writing. • My other team member includes my brother, who is an Experienced Network Support Engineer with a demonstrated history of working in the executive office industry. He is an expert in Local Area Networks (LAN), Routing Protocols, VLAN, Switching, and Linux. He Information Technology professional with a BSc in Electrical Telecommunication Engineering and Cisco certifications/training. Your's Sincerely Noor Mustafa AwanAlienVault
Technical WritingAWS Systems ManagerISO 27001Information Security AwarenessNIST SP 800-53Information Security AuditGDPRInformation Security ConsultationAT&T CybersecurityCybersecurity ManagementInformation Security - $30 hourly
- 4.9/5
- (265 jobs)
Red Team member, performing penetretion tests in all company's assets, vulenrability management and security analyst, Wordpress security expert, site cleanup and hardening. 10 years of experience with Linux servers in the hosting environment, with emphasis on web security, identification and malware removal(site cleanup) , investigation of how the hacking occurred, identify failures in web systems, pentest in web systems and solve other problems related to the hosting environment.AlienVault
Malware WebsiteWordPressWeb Host ManagerPythoncPanelMySQLNetwork Penetration TestingWebsite SecurityEmail SecurityWeb App Penetration TestingLinuxKali LinuxSystem SecurityMalware RemovalSecurity Testing - $150 hourly
- 5.0/5
- (205 jobs)
I am the founder of BetterCyber Consulting, a cybersecurity consulting and managed services firm specializing in startups, small businesses, and mid-sized companies. As an Upwork Expert-Vetted Cybersecurity Consultant, I help businesses identify risks, implement security controls, and meet compliance requirements without unnecessary costs or complexity. My experience in cybersecurity includes positions at Fortune 100 companies like PayPal and Marathon Petroleum. I hold several security certifications and earned a master’s degree in Information Security Engineering from The SANS Technology Institute. I offer the following cybersecurity services: ● Technical Security Assessments – Security reviews for AWS, Azure, Google Cloud, Microsoft 365, Google Workspace, Slack, and more. ● Penetration Testing – Web, cloud, mobile, and on-premises security testing. ● Compliance Assessments – NIST 800-171 & 800-53, FedRAMP, ISO 27001, CIS Controls, CMMC, HIPAA, and SOC 2. ● Security Strategy & Architecture – Build scalable security programs. ● Incident Response & Threat Mitigation – Detect and respond to threats. ● Managed Security Services – Ongoing security monitoring and advisory. ● Virtual CISO (vCISO) Services – Security leadership for businesses without a full-time CISO.AlienVault
PCI DSSNIST SP 800-53CMMCRisk AssessmentCloud SecurityInternet SecurityInformation Security AuditInformation Security AwarenessSecurity EngineeringSecurity AnalysisEmail SecurityPenetration TestingInformation SecuritySecurity Policies & Procedures DocumentationCybersecurity Management - $65 hourly
- 4.3/5
- (16 jobs)
Seasoned Information Security and IT Engineer with over 20 years of extensive hands-on experience. Proficient in all aspects in Cyber- Security, Incident Response, Vulnerability Management, Vendor Risk management, and network defense. Strong analytical problemsolving skills with solutions-driven focus that excels at leading crossfunctional teams. Passionate about new technology and ready to take up new challenges.AlienVault
Information TechnologySystem SecurityInformation SecurityCybersecurity Management - $30 hourly
- 5.0/5
- (6 jobs)
CISM-certified Cyber Security Consultant with 9 years of experience implementing and managing comprehensive security solutions. Expertise in endpoint protection, SIEM solution, cloud security and penetration testing. I have a strong ability to assess, mitigate, and respond to complex security threats. I am experienced in leading security projects, creating tailored policies, and providing expert guidance to organizations of all sizes. Experienced in working with global teams across time zones, cultures, and languages AREAS OF EXPERTISE * Vulnerability Assessment and Penetration Testing (VAPT) * Endpoint Protection * Threat hunting * SOC Architecture and Implementation * Cloud Security * Azure and Microsoft 365 SecurityAlienVault
Incident ManagementMicrosoft Endpoint ManagerCloud SecurityCloud Security FrameworkInformation SecurityIncident Response PlanPenetration TestingVulnerability AssessmentSystem Security - $15 hourly
- 5.0/5
- (136 jobs)
Web Penetration Testing(OWASP Top 10 methodology) | Network Penetration testing | OWASP API Security | Mobile Vulnerability Assessment(iOS and Android) | Source Code Reviews(.Net, Java, PHP) | Vulnerability Assessment and Penetration Testing | SIEM team (Cloud(AWS and Azure) Security, File Integrity Monitoring and Event Monitoring, Endpoint Security and Encryption, Data Loss Prevention, Network Access Control, Threat Monitoring (Email Traffic and Malware Analysis), Privileged Access and Identity Management) Have 7+ years of experience in both black box and white box testing penetration testing. Perform VAPT (Vulnerability Assessment and Penetration Testing) services for web applications, networks, mobile; source code reviews; malware analysis; server hardening; and security analysis etc. Conduct penetration testing in a systematic approach. Follow the standard methodology of the industry like OWASP Testing Guide v4(OTGv4); SANS top 25; NIST SP 800-115; PCI DSS to perform penetration testing so that client can concentrate on their professions without worrying about security threats. Web Application Testing: Do web application penetration testing with the latest methodology like OWASP Top-10, SANS Top-25. Perform both manual and automated penetration testing for vulnerabilities like Injection flaws(such as SQL, NoSQL, OS, and LDAP injection etc),Broken Authentication, Sensitive Data Exposure,XML External Entities (XXE), Broken Access Control,Security Misconfiguration, Cross-site scripting(XSS), Insecure Deserialization, Using Components with Known Vulnerabilities,Insufficient Logging & Monitoring. Also, perform source code reviews for many technologies like Java, NET, PHP etc. Approach for Manual Web-Application Penetration Testing: Conduct manual testing with following controls: * Configuration and Deployment Management Testing * Identity Management Testing * Authentication Testing * Authorization Testing * Session Management Testing * Input Validation Testing * Testing for Error Handling * Testing for weak Cryptography * Business Logic Testing * Client Side Testing Tools that use for Automated Web Penetration Testing: Acunetix, Burp-Suite, Netsparker, Nexpose, Nikto, IBM AppScan, HP fortify, W3af etc. Network penetration testing: Provide both external and internal network Penetration Testing so that your Network Infrastructure is secured from the real world attacks. Do both manual and automated network penetration testing. Approach for Manual Network Penetration Testing: Manually check for IDS/IPS, Server, Networks switch, Network Router, VPN, Firewalls, Anti-virus, Password etc. Tools that use for automated network penetration testing: OpenVas, Wireshark, Nessus, Metasploit, Armitage, Scapy etc. Mobile Application Penetration Testing: Perform mobile applications application penetration testing with the latest OWASP methodology(MSTG). Performed both manual and automated penetration testing for vulnerabilities like Weak Server Side Controls, Insecure Data Storage, Insufficient Transport Layer Protection, Unintended Data Leakage, Poor Authorization and Authentication, Broken Cryptography, Client Side Injection, Security Decisions Via Untrusted Inputs, Improper Session Handling, Lack of Binary Protections. Tools: Burp-Suite, HP fortify, Dex2Jar, Apktool, framework-res.apk, iNalyzer. Source Code Reviews: Perform source code reviews for both front and back-end languages. Perform source code reviews standard methodology like OWASP top 10. Do manual and automated source code reviews for various web based security vulnerabilities like SQL injection, Cross site scripting (XSS), CSRF, RFI,LFI, Authentication bypass etc. Tools: CheckMarx, IBM Appscan source for analysis, Microfocus HP Fortify. Security Analysis and Server Hardening: Regularly check and maintain your systems, servers to ensure that they comply with the standards. Do hardening application checks the item automatically on a daily basis and monitors all critical networks and server components. We support various frameworks like CIS benchmarking for Desktops & Web Browsers, Mobile Devices, Network Devices, Servers – Operating Systems, Virtualization Platforms & Cloud etc. Social Engineering: Have experience in social engineering vectors: Vishing, Phishing, Smishing, Impersonation. Used the following social engineering cycle to conduct social engineering: Gather Information: Here Information gathered from company websites, social media and other publications. Plan Attack: Next step is outline how intends to execute the attack Acquire Tools: After planning, next include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics is used in attacks such as password guessing. Tools: SET(Kali-Linux); GetGoPhishAlienVault
Web TestingInformation Security AuditWeb Application SecurityWebsite SecurityNetwork Penetration TestingSoftware QASecurity AnalysisInternet SecurityInformation SecurityPenetration TestingVulnerability AssessmentNetwork Security - $30 hourly
- 4.9/5
- (160 jobs)
🔢 As a seasoned Penetration Tester, I have a proven track record of conducting and leading successful security audits, web application penetration tests, and red team engagements for a diverse range of clients. My experience ranges from working with multinational corporations with large-scale infrastructures to smaller companies seeking enhanced security measures for competitive advantage. As a security engineer, my day-to-day responsibilities revolve around leveraging my expertise in penetration testing, cyber security, and vulnerability assessment to identify and mitigate potential vulnerabilities. Through these experiences, I have comprehensively understood the prevailing technology stacks employed worldwide, allowing me to discern their security weaknesses with precision. 🚫No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined. Working with me, you will: ★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ★ Complete manual testing for your application and immediate notification if any high-impact issues are found. ★ Unlimited retesting for the fixed issues and unlimited revisions ★ Able to find critical bug classes that are often missed by automated pentests. 🔢 My stats are: ✅ Top-rated in information security and IT compliance categories ✅ Saved tens of thousands of dollars for clients by identifying critical vulnerabilities ✅ Ranked in the Top 50 at multiple bug bounty programs ✅ Supporting all time zones ✅ Long-term engagements ✅ Professional certifications (OSCP, CREST CPSA, OSEP, OSWP) Sound like a fit? 🟢 Press '...' button and then ‘Send Message’ button in the top right-hand corner Penetration Testing and Vulnerability Assessment Tools: Manual Testing: Burpsuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), Metasploit Framework, SQLmap, OWASP ZAP Automated Testing: Acunetix, Nessus, Netsparker, etc. Penetration testing service: 1. Penetration Testing Engagement: thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing. Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus. 2. Professional Report and Statistics: A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact. 3. Remediation Advice and Guidance: Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities. 4. Asset Discovery: Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery. 5. Free Retest: Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended. 6. OSINT Reconnaissance: Gather all valuable data about the company on the internet, including any breached email addresses and related passwords. 7. Briefing and debriefing: Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required. Calls or meetings are available after the penetration test is completed to discuss the engagement results, the main issues and concerns regarding the company's security, and any further clarification regarding any vulnerability and the associated impact or risk. ✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes: ► Executive Summary ► Assessment Methodology ► Types of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings: Each finding in the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections. ► Retest for issues (The vulnerabilities will be retested after they're fixed; multiple retests can be done to ensure the issues are remediated.) My Expertise: ★ Web Application Security Testing ★ API security testing ★ Penetration Testing ★ Internal Active Directory and External Network Pentest ★ Vulnerability Assessment. ★ Thick Client Pentest (Windows Desktop App Testing) ★ OSINT AssessementAlienVault
Risk AssessmentOWASPNetwork Penetration TestingBlack Box TestingWeb Application SecurityWebsite SecurityWeb App Penetration TestingApplication SecuritySystem SecurityVulnerability AssessmentSecurity TestingSecurity Assessment & TestingNetwork SecurityPenetration TestingInformation Security - $20 hourly
- 5.0/5
- (734 jobs)
Need help to recover your HACKED & DISABLED social media accounts in the least possible time? Or want to protect your copyrights and remove your content online? You are at right place if you have lost access to your personal or business social media account (s). Lost credentials or your account got hacked. Your account was disabled by a mistake. You want to remove old accounts or remove your content from search engines or social media. Or if have any other Instagram and Facebook related issue. You might have tried available support options and scrolled through forums but could not find help because: I have been providing virtual assistance with the related issues for a long time and enjoying my successful journey. I have proudly offered my clients to pay only after the successful results and resolved hundreds of cases. You will find the support and solution for almost every kind of issue related to the Instagram and Facebook and other social media platforms with full compliance to ethics and respective platform's terms and service. I would love to answer your queries for free of cost and will suggest a way forward that would help you to accomplish your goals. Please send me a message with issue details and screenshots (if feasible). Invite me for the interview if your: Facebook account is disabled. Instagram account is disabled. Facebook account is restricted. Instagram account is restricted. Facebook account is hacked. Instagram account is hacked. Facebook account is locked. Instagram account is locked. Facebook account is compromised. Instagram account is compromised. Facebook account is lost. Instagram account is lost. Or if you are seeking help for: Recover hacked Instagram account Facebook recovery Instagram restoration Facebook restoration Instagram security Facebook security Instagram verification Facebook verification Instagram & Facebook Integration Instagram & Facebook Marketing Recovery of account in case of lost credentials Recovery from underlying technical issues, bugs and glitches Snapchat issues LinkedIn issues TikTok issues Social media content removal Facebook Instagram Integration Facebook and Instagram verification problem Facebook content removal Instagram content removal Instagram fake followers removal Instagram fake accounts removal Facebook fake accounts removal Stolen content removal DMCA takedowns Search engine removal and monitoring ''DON'T FORGET TO READ THE REVIEWS ON MY PROFILE'' Disclaimer: Write me about the issues related to your ''own'' social media account (s) or only if you are an authorized representative. Avoid making requests that are not compliant with Upwork and Instagram's terms of service. You will get ethical virtual assistance to get your problem resolved through this channel. Thank you for your precious attention. Looking forward to your invites. Anxiously waiting for assisting you better. :)AlienVault
Social Media MarketingSocial Media Account SetupInstagram APIInternet SecurityTechnical SupportInformation SecurityNetwork SecurityVulnerability AssessmentEthical HackingTroubleshootingData RecoveryCybersecurity ManagementSocial Media ManagementInstagramFacebook - $25 hourly
- 4.7/5
- (32 jobs)
I am CISSP certified and seasoned information security consultant and CISO enhancing security posture of companies. As the Chief Information Security Officer (CISO), I am responsible for leading the development and execution of the organization’s cybersecurity strategy, focusing on protecting critical assets and ensuring compliance with regulatory standards. My role involves helping start-ups and SaaS-based products build secure and compliant systems by providing guidance on Governance, Risk, and Compliance (GRC), ensuring they meet industry best practices and regulatory requirements, such as GDPR, HIPAA, SOC 2, and ISO 27001. A key aspect of my work is incident response, where I manage the process with the necessary tools and defined roles, ensuring rapid and effective responses to security events. I oversee the administration of SIEM and SOC tools, perform threat management, modelling, and develop use cases for security monitoring. Additionally, I mentor and guide the SOC team, facilitating knowledge transfer and promoting skill development. I ensure the integration of both standard and non-standard logs into SIEM and adapt security monitoring rules to meet business requirements. I am also responsible for building and maintaining incident response playbooks, creating reports and dashboards, and working closely with stakeholders to improve security operations. I provide oversight on analysis activities and collaborate with technical and business teams to resolve incidents. I continuously evaluate emerging threats and vulnerabilities, keeping our incident response procedures up-to-date and effective. Along with managing security operations, I focus on securing AI and machine learning technologies, safeguarding against risks such as data poisoning, adversarial attacks, and algorithmic bias. I guide start-ups in implementing responsible AI practices, securing AI pipelines, and adhering to evolving regulations. In my leadership role, I balance strategic oversight, technical expertise, and practical advice, enabling organizations to scale securely, maintain compliance, and leverage technology to drive growth while upholding a strong security posture.AlienVault
Information Security AwarenessCyber Threat IntelligenceCybersecurity MonitoringPCI DSSGovernance, Risk Management & ComplianceCloud SecurityComputer NetworkSecurity Operation CenterNIST Cybersecurity FrameworkSplunkSystem SecurityDigital ForensicsIncident Response PlanPenetration TestingInformation Security - $13 hourly
- 5.0/5
- (6 jobs)
Hello, Thanks for stopping by my profile. I bring over a decade of hands-on experience in software development, architecture design, and technical leadership. As a full-stack developer and solution architect, I specialize in delivering end-to-end web and mobile applications that are scalable, maintainable, and user-friendly. 🔍 What sets me apart? Beyond just coding, I focus on design thinking, problem-solving, and engineering best practices. I’ve led multiple development teams, contributed to project architecture, and worked directly with stakeholders to translate business goals into technical solutions. I thrive in Agile environments and am highly familiar with tools like JIRA, Trello, and Monday.com for seamless collaboration. 🛠️ Core Expertise Frontend: React.js, Angular (2+ to 14), Redux, Flutter, HTML5, CSS3, Bootstrap, jQuery UI Backend & APIs: ASP.NET Core MVC, ASP.NET MVC 5, Web Forms, Node.js, REST APIs, GraphQL Databases: PostgreSQL, MySQL, MongoDB, SQL Server, Azure Tables Architecture & Design: Clean Architecture, Microservices, Domain-Driven Design (DDD), Dockerized deployments Cloud & DevOps: Azure (App Services, SQL Azure, Storage), AWS (EC2, ECS, RDS, S3), CI/CD pipelines CMS & eCommerce: WordPress, Shopify, Magento Automation & Integration: Monday.com Automation, Google APIs, Salesforce, QuickBooks, FreshBooks, DevExpress Desktop Applications: WPF, Windows Forms Project Tools & Version Control: JIRA, Trello, Asana, Git, Bitbucket, Azure DevOps ✅ Why work with me? 10+ years of real-world project experience Strong in full-cycle development — from planning to deployment & support Proven track record leading teams and mentoring junior developers Deep understanding of Agile, Scrum, and modern project management practices Client-focused, proactive communicator, and solution-driven mindset Whether you're starting from scratch, scaling up an existing product, or need expert support for ongoing development — I’m here to deliver value. Let’s build something impactful together!AlienVault
Project ManagementInvestment BankingResolves ConflictAgile Software DevelopmentProject PlansPeople ManagementInformation SecurityCybersecurity ManagementAT&T Cybersecurity - $60 hourly
- 5.0/5
- (353 jobs)
I am a computer engineer and a full time freelancer as a Full Stack Web Developer. And an "Expert-Vetted" developer on Upwork After I got my first project as a freelancer I realized that this is what I wanted to do. Looking over the projects I have completed and my clients' feedbacks means a lot to me and always keeps me going. As much as I like to create long working relations with my clients, I am always eager to work with new clients. I believe the best thing I gained over my vast experience is the ability to work out of my comfort zone. If I don't know something that doesn't mean I can't do it. That being said here is a summary of my experience and technical skills in web development: • Frameworks: Vuejs, Laravel (PHP) • Javascript, TypeScript, Jquery, AJAX • HTML 5, CSS 3, .LESS, Tailwind and Bootstrap • AWS, Serverless AWS, lambda, cognito, CI/CD pipeline • Firebase, Cloud functions, GCP • Wordpress, Wordpress plugins: WoocommerceAlienVault
SupabaseStripeFirebaseTailwind CSSAPI IntegrationGoogle Chrome ExtensionVue.jsBrowser ExtensionNode.jsPHPTypeScriptWeb DevelopmentLaravelMySQLWordPress - $50 hourly
- 4.8/5
- (107 jobs)
Expert Technical Writer | Copywriter | Content Writing Specialist. I am a native English speaker and can help you drive business success using this. I'm the man to contact if you're looking at generating traffic for your website through SEO writing or through engaging blog articles. My specialty is breaking down complex technical concepts into simple, easy-to-read, and engaging content. Whether it's in creating help documentation for your users or content for your blogs, I can help you ensure that your users fully understand the benefits of your tech platform or solution. In recent times, I have successfully delivered on B2B and Tech Writing projects. So whether you're interested in writing about Penetration Testing, Virtualization, Web Host Managers (WHM), VPNs, Ransomware attacks, or how to improve business processes, I can help you produce brilliant and engaging content. The following are some of the recent topics and industries I have recently covered: - Cyber Threat Intelligence - Authentication - VPN Comparisons - WannaCry Ransomware - Linux OS Versions - Security Automation tools - Security Orchestration - Web Hosting Tutorials - Cloud Security - IoT and Bots - SaaS - ... and so much more I also have experience designing WordPress blogs and websites, which has gone hand in hand with my writing expertise, especially in terms of SEO-related articles and blog management over the past few years. Furthermore, I'm currently studying software engineering and have a fair understanding of how the software works. I'm proficient with the following; - Linux Commands - Scripting - Shell Navigation - Shell Permissions - Git Versioning - Git Hub - Setting up Virtual Machines - Basic C Programming - Basic Python Programming It'd be great to chat more about your project if you're still reading this. Hit the Hire button!AlienVault
CopywritingGitHubGitUnix ShellProduct PageScriptingArticle WritingCase StudiesWordPressTechnical Case StudyWritingTechnical WritingIntercomHubSpotYoast SEO - $25 hourly
- 5.0/5
- (11 jobs)
Looking for a real-world ethical hacker who doesn’t just run tools — but thinks like an attacker? You’re in the right place. I’m a Lead Penetration Tester & Senior Cyber Security Consultant with 100+ successful security assessment projects under my belt. I help companies—from fintech and healthcare to SaaS startups and government sectors—identify and fix security flaws before attackers do. 🛠️ Services I Offer on Upwork Web Application Penetration Testing (OWASP Top 10, business logic flaws, SSO misconfig, DFIR, Compromise Assessment, IoT Testing, Network Penetration Testing, Mobile App penetration testing, API Security penetration testing, Network device configuration review, Source code review etc.) API Security Testing (REST & GraphQL, broken object level authorization, insecure design) Mobile App Pentesting (Android/iOS, rooted/jailbroken or production-level testing) Network Pentesting (Internal, External, Active Directory attacks) Cloud Security Review (AWS, Azure environments) Vulnerability Assessments & Compliance Checks (NIST, ISO 27001, SAMA/NCA CCC) ✅ Why Clients Trust Me Certified & Battle-Tested: CEH (Practical + Theory), eCPPT, CNWPP, Blue Team Analyst, API Security Certified. Proven Track Record: Over 100 projects delivered, including penetration tests for banks, insurance companies, government, and tech firms. Tool-Proficient: Burp Suite Pro, Nmap, Nessus, Metasploit, Frida, MobSF, ZAP, Acunetix, Nikto, sqlmap, and custom scripts. Real Impact: I don’t just scan — I exploit, document, and recommend actionable fixes with a focus on risk, severity, and business logic. 🔐 Certifications Certified Ethical Hacker (CEHv11) – Theory & Practical (EC-Council) eLearnSecurity Certified Professional Penetration Tester (eCPPT) Certified Network & Web Professional Pentester (CNWPP – PODIA x XSSRAT) API Penetration Tester (API SEC University) Blue Team Analyst (Security Blue Team) Certified Network Security Practitioner (CNSP – The SecOps Group) Certified AppSec Practitioner (CAP – The SecOps Group) Google Cybersecurity Foundations ...and many more. Credentials are backed by hands-on expertise, not just exams. 🔧 Toolkits I Use Daily Web & API Testing: Burp Suite Pro, ZAP, Acunetix, sqlmap, Wappalyzer, OWASP Amass, BeEF, Nikto, Postman, custom payloads/scripts Mobile Pentesting: MobSF, Frida, Drozer, apktool, jadx, ADB, Xposed, iNalyzer, Radare2, otool, class-dump Network & Infrastructure: Nmap, Nessus Pro, OpenVAS, CrackMapExec, BloodHound, Metasploit, Hydra, Empire, Mimikatz, Netcat, Impacket, Chisel, SharpHound, PowerSploit Let’s work together if: ✔ You want a detailed pentest report with CVSS, CWE ID, severity scoring, and fix recommendations. ✔ You care about real security and not just “check-the-box” compliance. ✔ You want someone who responds fast, delivers quality, and respects your deadlines. Ready to secure your application or network? Let's connect.AlienVault
Database SecurityCyber Threat IntelligenceCompromise AssessmentSystem HardeningEthical HackingCompliance TestingCloud SecurityWeb Application SecuritySecurity Assessment & TestingApplication SecurityInformation Security ConsultationVulnerability AssessmentNetwork SecuritySecurity TestingPenetration Testing - $80 hourly
- 5.0/5
- (55 jobs)
I have 15 years experience facilitating cross-functional BC/DR solutions that fit the budget and meet or exceed recovery requirements. A proven professional combining leadership, technical talent, and business experience to build effective recovery strategies among diverse perspectives. An excellent communicator with a demonstrated ability to build rapport, manage resources, and unite individuals. Areas of Expertise include: Business Impact Analysis Business Continuity Planning DR Planning - cloud or on-prem Crisis Management Planning Enterprise Risk Evaluation and Management BC/DR Exercising and Testing 3rd Party Risk Management Cross-functional Stakeholder Collaboration Data Privacy Compliance BC/DR Program Management Platform Implementation Cyber Security Policy and ComplianceAlienVault
Project ManagementIT SourcingInformation Technology OperationsIT ManagementBusiness Continuity PlanInformation ManagementInformation Technology StrategyProject Risk ManagementDisaster Recovery PlanIT Compliance Audit - $85 hourly
- 5.0/5
- (24 jobs)
🏆 EXPERT-VETTED Over 17 years of experience in IT, working in several areas, such as Governance, Project Management, Engineering, IT Operations, and Business/Commercial. Advanced knowledge and involvement in IT Service Management and IT Governance, including Implementation, Management, Consulting, and Audit. Acting in huge national and international companies, with complex projects and dynamic environments. More Skills: ✔️Cobit ✔️ITIL Expert ✔️IT Governance ✔️ISO9001, ISO 20000, ISO 27001 ✔️Lean Six Sigma ✔️SOX ✔️ISAE 3402 ✔️User Experience ✔️Scrum, Agile, Design Thinking ✔️Project Management, PMI, PMP Please take a look at my Portfolio for more details and results.AlienVault
ServiceNowISO/IEC 20000Project ManagementQA TestingBusiness Process ModelingISO 9001Microsoft Power BIProcess ImprovementIT Service ManagementManagement ConsultingITILIT ManagementBusiness IT Alignment Want to browse more freelancers?
Sign up
How it works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a AlienVault Freelancer on Upwork?
You can hire a AlienVault Freelancer on Upwork in four simple steps:
- Create a job post tailored to your AlienVault Freelancer project scope. We’ll walk you through the process step by step.
- Browse top AlienVault Freelancer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top AlienVault Freelancer profiles and interview.
- Hire the right AlienVault Freelancer for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a AlienVault Freelancer?
Rates charged by AlienVault Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a AlienVault Freelancer on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance AlienVault Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream AlienVault Freelancer team you need to succeed.
Can I hire a AlienVault Freelancer within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive AlienVault Freelancer proposals within 24 hours of posting a job description.