Hire the best Application Audit Freelancers in Pakistan
Check out Application Audit Freelancers in Pakistan with the skills you need for your next job.
- $35 hourly
- 5.0/5
- (18 jobs)
Hi, I’m Blockchain Developer & Auditor in Solidity currently working as a freelancer on Upwork. I will review smart contracts, blockchain infrastructure code, and decentralized applications for security vulnerabilities using a combination of manual code review and analysis with our tool suite. I work directly with the leading blockchain industry teams to review their code and help secure their products. I will Design and implement solutions to difficult engineering and research problems of your contracts. I will also Collaborate with my teammates to maintain and continually improve your existing blockchain smart contract. Our Methodology: We like to work with a transparent process and make our reviews a collaborative effort. The goals of our security audits are to improve the quality of systems we review and aim for sufficient remediation to help protect users. The following is the methodology we use in our security audit process. 1. Manual Code Review: In manually reviewing all of the code, we look for any potential issues with code logic, error handling, protocol and header parsing, cryptographic errors, and random number generators. We also watch for areas where more defensive programming could reduce the risk of future mistakes and speed up future audits. Although our primary focus is on the in-scope code, we examine dependency code and behavior when it is relevant to a particular line of investigation. 2. Vulnerability Analysis: Our audit techniques included manual code analysis, user interface interaction, and whitebox penetration testing. We look at the project's web site to get a high-level understanding of what functionality the software under review provides. We then meet with the developers to gain an appreciation of their vision of the software. We install and use the relevant software, exploring the user interactions and roles. While we do this, we brainstorm threat models and attack surfaces. We read design documentation, review other audit results, search for similar projects, examine source code dependencies, skim open issue tickets, and generally investigate details other than the implementation. 3. Documenting Results: We follow a conservative, transparent process for analyzing potential security vulnerabilities and seeing them through successful remediation. Whenever a potential issue is discovered, we immediately create an Issue entry for it in this document, even though we have not yet verified the feasibility and impact of the issue. This process is conservative because we document our suspicions early even if they are later shown to not represent exploitable vulnerabilities. We generally follow a process of first documenting the suspicion with unresolved questions, then confirming the issue through code analysis, live experimentation, or automated tests. Code analysis is the most tentative, and we strive to provide test code, log captures, or screenshots demonstrating our confirmation. After this we analyze the feasibility of an attack in a live system. 4. Suggested Solutions: We search for immediate mitigations that live deployments can take, and finally we suggest the requirements for remediation engineering for future releases. The mitigation and remediation recommendations should be scrutinized by the developers and deployment engineers, and successful mitigation and remediation is an ongoing collaborative process after we deliver our report, and before the details are made public. Some samples audit reports are attached.Application Audit
CryptographyBlockchainSmart ContractBlockchain DevelopmentCryptocurrencyBinance CoinSolidityEthereumBlockchain ArchitectureNFTTRONMarketing Audit - $20 hourly
- 5.0/5
- (7 jobs)
My Certifications Overview: -Certified Information System Auditor (CISA) -ISO/IEC 27001:2022 ISMS Certified Lead Auditor (USA) -Diploma in GDPR and Data Protection -HIPAA Compliance -NIST AI Risk Management Framework -Cisco Certified Network Associate (R&S) -ISO20000 IT Service Management Associate -ISO/IEC 27001 Information Security Associate **Key Skills:** - Information Security Auditing - Cyber Security Strategy - Risk Assessment & Management - Compliance & Regulatory Frameworks (ISO 27001,GDPR, HIPAA, NIST CSF) - Vulnerability Assessment & Penetration Testing - Incident Response & Crisis Management - Security Policy Development & Implementation - Security Awareness Training I am a dedicated and experienced Cybersecurity Consultant with a passion for ensuring the security and integrity of organizational data. With a solid background in information security auditing, cyber security analysis and over 5 years of experience, I bring extensive expertise in ensuring the integrity, confidentiality, and availability of organizational data assets. My specialization encompasses compliance frameworks such as ISO 27001 , NIST Cyber Security Framework, HIPAA and GDPR, allowing me to effectively assess and mitigate risks while aligning with industry best practices.Application Audit
Penetration TestingVulnerability AssessmentInformation Security ConsultationInformation TechnologyCyber Threat IntelligenceCybersecurity ManagementNIST Cybersecurity FrameworkISO 27001Information SecurityIT Compliance AuditIT General Controls TestingComplianceInformation Security Audit - $20 hourly
- 5.0/5
- (1 job)
Reliable, modern, and user-focused web solutions built from the ground up. From initial concept to final deployment, I bring together clean design and robust development to create seamless digital experiences. Every project is treated with careful attention to both form and function, ensuring that users not only engage they return. Clients often come to me when they need more than just code or design they’re looking for a partner who understands product thinking, visual clarity, performance, and long-term maintainability. 🔧 Services at a Glance UI/UX Design (Figma) High-fidelity, responsive design Intuitive user journeys and structure Interactive prototypes for clear feedback cycles Front-End Development Clean, maintainable code using HTML, CSS, JavaScript Frameworks: React.js, Vue.js, Tailwind CSS Fully responsive interfaces across all devices Back-End Development Scalable and secure server-side logic Frameworks: Node.js, Express, Laravel, PHP Database architecture: MySQL, MongoDB, PostgreSQL Custom Web Solutions Dynamic websites, dashboards, and admin tools E-commerce integrations and business automation API integration, optimization, and deployment 🧠 How Projects Are Handled Structured workflows from design to deployment Transparent communication and progress updates Clean version control and codebase handoff Emphasis on long-term scalability and user satisfaction ⚙️ Tech Stack Design Tools: Figma, Adobe XD Frontend: React, Vue, JavaScript, Tailwind, Bootstrap Backend: Node.js, PHP, Laravel, Express Databases: MySQL, MongoDB, PostgreSQL Others: Git, GitHub, REST APIs, Hosting Setup, Deployment Tools (Vercel, Netlify, cPanel) Let’s Build Something Worth Using If you’re looking for someone who can design with intent and build with precision, I’d be glad to collaborate. Send a message to start a focused, professional conversation about your project goals.Application Audit
Bug FixProduct DesignWeb Application AuditCustom PHPWebflowWordPressFigmaBranding & MarketingAutomationQA TestingLanding PageWeb DesignBack-End Development Framework - $10 hourly
- 4.6/5
- (2 jobs)
🔍 Certified IT Auditor with a keen eye for security, ITGC, ITAC, compliance, and risk management. I specialize in evaluating IT systems, ensuring regulatory compliance, and strengthening cybersecurity controls (covering logical accesses, change management and IT operations) to protect businesses from threats and vulnerabilities. What I Offer: ✅ IT Audits & Risk Assessments (ISO 27001, NIST, COBIT, SOX, HIPAA, PCI-DSS) ✅ Cybersecurity Assessments & Compliance Checks ✅ IT Governance & Internal Control Reviews ✅ Security Policy Development & Implementation ✅ IT General Control Testing, IT Application Control Testing ✅ Business Continuity & Disaster Recovery Planning Why Work With Me? ✔ 5+ years of experience in IT auditing, cybersecurity, and compliance ✔ Expertise in regulatory frameworks & industry best practices ✔ Strong communication skills—clear, actionable reporting ✔ Commitment to helping businesses secure their IT environment 💡 Let’s work together to strengthen your IT security, ensure compliance, and mitigate risks effectively. Contact me today to discuss your project!Application Audit
Sarbanes-Oxley ActPolicy WritingSAPISO 27001GDPR Compliance ReviewSOC 1IT Compliance AuditSOC 2Information Security AuditIT General Controls TestingInternal AuditingChange ManagementOS SecuritySecurity Policies & Procedures Documentation - $60 hourly
- 0.0/5
- (0 jobs)
Writing applications audit graphics design logo making art work every type of handwriting work making assignmentsApplication Audit
T-Shirt DesignGraphSellingLetter WritingAI Writing GeneratorLogo AnimationGraphics Animation & Compositing FrameworkTypingWriting CritiqueBrand ManagementBrand DevelopmentBranding & MarketingConstruction Document PreparationSpecifications - $5 hourly
- 0.0/5
- (0 jobs)
I will develop complete desktop application in Microsoft Access and have full command on Database design and development in Microsoft Access. I can help you with any query you want. You may Use my vast experience to get a job done quickly and perfectly and affordably. I have done many projects and known as expert in Designing Microsoft Access Databases. I will give you Following Services: • Tables • Queries • Macros • Relationships • FixingApplication Audit
Web ApplicationVisual Basic for ApplicationsGoogle SheetsMicrosoft ExcelUser AuthenticationSQL ProgrammingMicrosoft SharePoint AdministrationMicrosoft Access ProgrammingDatabase QueryMicrosoft AccessSQL Server Integration ServicesDatabase Design - $7 hourly
- 0.0/5
- (0 jobs)
As a Credentialing Specialist for the past 5 years. My experience covers almost all states in the USA, where I have been involved in credentialing and contracting tasks. If anyone needs assistance, I can help with the enrollment of doctors with payers. As I am Credentialing Specialist with expertise in verifying and managing professional qualifications, certifications, and licenses. Skilled in ensuring compliance with industry regulations, maintaining accurate records, and facilitating the credentialing process for healthcare professionals, contractors, or other licensed individuals. Known for attention to detail, organizational skills, and ability to navigate complex regulatory frameworks to support operational efficiency and risk management. Dedicated to ensuring the highest standards of quality and safety in credentialing practices.Application Audit
Office ManagementProject Management OfficeInsurance VerificationApplicationInsuranceMedical BillingMedical Mastermind Medical Billing ServicesMedical Billing & CodingData Entry - $25 hourly
- 0.0/5
- (1 job)
Hi there! I'm Shahrez, a Cybersecurity Expert and Penetration Tester. I specialize in conducting thorough security audits for websites, web applications, and Android apps. 🚀Here’s what I offer: 🏳️Vulnerability Assessment: I’ll help identify critical weaknesses and potential risks in your system. 🏳️Detailed Audit Reports: You’ll receive a clear, comprehensive report highlighting vulnerabilities and providing actionable steps to enhance security. 🏳️Complete Confidentiality: Rest assured, your project will be handled with the utmost confidentiality. 🚀Why Choose Me? 🏳️A 100% money-back guarantee for quality assurance. 🏳️Fast, reliable, and accurate results. 🏳️Tailored solutions focused on delivering the best outcomes for your needs.Application Audit
Adobe Premiere ProPSD to WordPressAndroid StudioPhoto EditingAndroid App DevelopmentVideo Editing3D Animation2D AnimationSoftware TestingWeb TestingGUI TestingQA TestingDesktop Application TestingWeb Application SecurityWeb Application AuditApplication SecurityWebsite SecurityWebsite AuditCybersecurity ManagementPenetration TestingSEO Keyword ResearchOn-Page SEO Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.