Hire the best Application Security Freelancers in Bengaluru, IN

Check out Application Security Freelancers in Bengaluru, IN with the skills you need for your next job.
Clients rate Application Security professionals
Rating is 4.6 out of 5.
4.6/5
based on 537 client reviews
  • $25 hourly
    New here so rates are low! I am a Cyber security consultant and I conduct security audits, penetration testing, and red team engagements for a variety of medium to large companies Daily activities include, but are not limited to: - Penetration testing against web applications, Mobile applications, network infrastructure and AD. - Security assessment of network devices such as routers, switches, firewall, intrusion prevention systems, endpoint protection systems - Security Hardening assessment of servers and network equipment Previously I was responsible for infrastructure and web application security management for an enterprise-level company where I was leading a team of many security professionals, handling their whole SOC for all their sites [40+], actively involved in host/network-based incident response, conducting various security audits, OS Hardening, vulnerability assessments and penetration tests. Deliverables include weekly meetings, weekly and quarterly security posture improvement reports, RCA/POC Reports, SOP/Playbooks etc. Certificates owned: [+] ICSI-CNSS: Certified Network Security Specialist from International Cybersecurity Institute, UK [+] EC-Council CEH: Certified Ethical Hacker from EC-Council [+] Offsec OSCP: Offensive Security Certified Professional from Offsec [+] Fortinet NSE4: Network Security Expert 4 from Fortinet [+] Offensive Pentesting from TryHackMe [+] Cisco SCOR: Cisco Certified Specialist - Security Core Volunteering/Other Engagements: [+] Active Member on TryHackMe - Top 1% [+] Active Member on HackTheBox [+] Active Member on BugCrowd and Hackerone [+] Active Member on Proving Grounds by Offsec - 70%+ boxes hacked [+] Developing my own blog site - providing walkthroughs, explaining RFCs, and other cyber security concepts - Still under Development. (hackershares.com) During my free time I conduct seminars and webinars for topics related to red teaming and cyber security in general, bug bounty programs, capture-the-flag hacking competitions and personal security research projects. I do believe that my education, experience and dedication to the field makes me a prime candidate for all your cyber/network security related requirements.
    vsuc_fltilesrefresh_TrophyIcon Security
    Application Security
    OWASP
    Security Testing
    Linux
    Information Security Audit
    Security Assessment & Testing
    Web Application Security
    Microsoft Windows
    Penetration Testing
    Network Administration
    Security Operation Center
    Vulnerability Assessment
    Incident Response Plan
    Cisco Certified Internetwork Expert
    Ethical Hacking
  • $38 hourly
    Organisations such as Philips, McAfee, and Beckman Coulter have one thing in common; Their products and platforms have implemented the “Security by Design” methodology I conceived and implemented! I am delighted to introduce myself as a Senior Penetration Tester and Senior Security Architect, CEH, ECSA, OSCP, and OSCE certified, looking for a new challenge. I have more than 16 years of expertise in product & cloud security, writing security policies, implementing standards, technology roadmaps, risk management frameworks, penetration testing, vulnerability assessments, security code reviews, and exploit development. My achievement includes delivering over 400+ cyber security projects on medical devices, software products, web applications, networks, and cloud infrastructure for organisations such as Philips, Accenture, AOL, McAfee, Beckman Coulter, Danaher, and Dell. Whether you are a startup, small, medium, or big organisation, I look forward to successful collaboration and venture on your upcoming cybersecurity projects. Please feel free to reach out.
    vsuc_fltilesrefresh_TrophyIcon Security
    Network Penetration Testing
    Red Team Assessment
    Secure SDLC
    Cloud Security Framework
    Cloud Security
    Fuzzing
    Security Engineering
    Ethical Hacking
    ISO 27001
    Security Testing
    Penetration Testing
    Vulnerability Assessment
    System Security
    Application Security
  • $50 hourly
    A seasoned IT and Compliance Professional with more than eight years of experience in IT Operational Systems, Information Security Governance, and Compliance. Previously working with Amazon and as a Senior Associate at PwC in the Netherlands, I now work as the Director of Privacy Technology at Tsaaro, supporting enterprises in developing stronger Security Policies or Information Management Awareness. 😢Are you busy developing your product or business and don’t have time and resources to be consumed by compliance efforts and endless meetings, halting your production for months? 💰Do you want to save serious money by knowing the right approach, security tool, or solution? 🥱Are you bored filling out the security assessment questionnaires and want someone to provide client-winning answers? 💪💸Do you want to feel confident that your security project will be successful? --> ISO 27001/SOC 2/PCI-DSS Certification projects are delivered with a MONEY BACK GUARANTEE! If you don’t get certified, all my fees will be refunded! 🤔Do you want to know which is better for you: a SOC 2 report or an ISO 27001 certification? What does it take, how much does it cost, and how long will it be? 😟You have clients pressuring you to provide them with an information security certification (PCI-DSS, SOC 2, ISO 27001, HIPAA, FedRAMP, CMMC 2)? 🤔Already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, OneTrust Compliance Automatization/Tugboat Logic, SecureFrame, Strike Graph, Audit Board, and so on) but don’t know the next step or don’t have time for it? 😱Are you afraid of insider or external threats, data loss, or leakage? 📣If your answer is yes to any of the above, work with the one of the best Security, Compliance, and Certification Consultant at Upwork! Click the green invite button in the top right corner to invite or message me!📣 Working with me, you will: ★ Get the burden of security and compliance management taken off your shoulder, so you can focus on building your company. ★ Will experience a cost-effective, streamlined process with clear steps all the way. ★ Save money by taking my battle-proven policies and procedures and reusing them with several client projects. ★ Get an end-to-end, professionally managed service. ★ Get a consultant aiming for long-term support and providing advice and services to enable you to achieve growth-phase plans and targets by establishing a solid security and governance framework to win Enterprise clients. ★ Gain an understanding of different security and compliance requirements. ★ Be able to assure your clients and sell to Enterprise-level clients. Projects not for me: ✖Asking to hack/crack/access someone else accounts, systems, social media, etc ✖Asking to fill security questionnaires, providing the appropriate answers but not implementing controls ✖Asking to create falsified audit or assessment reports.
    vsuc_fltilesrefresh_TrophyIcon Security
    Risk Assessment
    Privacy Law
    Data Protection
    Security Infrastructure
    Data Privacy
    Website Security
    SOC 2 Report
    ISO 27001
    Cybersecurity Management
    Penetration Testing
    Vulnerability Assessment
    Network Security
    Information Security
    Application Security
  • $80 hourly
    David Lawn Cybersecurity Expert | Web Application Penetration Tester | Microsoft Alumnus As a seasoned cybersecurity professional with a passion for securing digital landscapes, I bring a wealth of experience gained through years of dedicated service in the field. My expertise lies in web application penetration testing, ensuring the resilience of digital platforms against evolving cyber threats. Professional Background: I am proud to have contributed significantly to the field of cybersecurity during my tenure at Microsoft, a global technology leader. Serving in various roles, I actively participated in developing and implementing robust security measures to safeguard critical systems and user data. My time at Microsoft allowed me to collaborate with some of the brightest minds in the industry, contributing to cutting-edge security solutions and best practices. Specialization: Web Application Penetration Testing: My specialization in web application penetration testing reflects my commitment to staying at the forefront of cybersecurity challenges. I possess in-depth knowledge of identifying vulnerabilities, conducting thorough security assessments, and recommending tailored solutions to fortify web applications against potential exploits. My hands-on experience encompasses a diverse range of industries, ensuring adaptability to unique security requirements. Key Competencies: Vulnerability Assessment: Conducting comprehensive assessments to identify and prioritize potential vulnerabilities within web applications. Penetration Testing: Executing ethical hacking techniques to simulate real-world cyberattacks and uncover security weaknesses. Risk Mitigation: Developing and implementing effective risk mitigation strategies to enhance the overall security posture of digital assets. Security Awareness: Providing education and training to stakeholders to foster a culture of cybersecurity awareness and proactive risk management. Continuous Learning and Certification: I am dedicated to continuous learning and professional development, holding industry-recognized certifications such as [relevant certifications]. My commitment to staying informed about the latest cyber threats and security trends allows me to adapt strategies to the ever-evolving threat landscape. Community Engagement and Thought Leadership: Beyond my professional endeavors, I actively engage with the cybersecurity community through [conferences, workshops, blogs, etc.]. I am committed to sharing knowledge, contributing to thought leadership, and fostering a collaborative environment that promotes cybersecurity awareness and resilience. With a proven track record in cybersecurity and a focus on web application penetration testing, I bring a unique blend of experience, expertise, and passion to the ever-evolving landscape of digital security.
    vsuc_fltilesrefresh_TrophyIcon Security
    Cloud Security
    API Testing
    Threat Detection
    Security Analysis
    NIST Cybersecurity Framework
    OWASP
    Network Penetration Testing
    Application
    Penetration Testing
    Application Security
  • $20 hourly
    1- Expertise in Application Security, Code Review, Design Review, Penetration testing, Vulnerability assessment, Secure Coding Training, DevSecOps Implementation. 2- 17 years of Industrial experience with Fortune 500 companies 3- CISSP certified - Certified Information Systems Security Professional 4- GIAC/SANS GXPN advanced penetration testing certified. 5- GMOB mobile device security analyst certified 6- Project Management and leadership skills
    vsuc_fltilesrefresh_TrophyIcon Security
    Code Review
    Security Analysis
    Secure SDLC
    Web Application Security
    Training Presentation
    Information Security
    Application Security
  • $30 hourly
    Consolidating my past involvement in Ethical Hacking, Incident Response, IT Security Governance, and Project Management with solid relational and correspondence capacities, I am sure that I can give work that will surpass your desires. Security Analyst with 10+ years' experience in Endpoint security, Application Security, Change Management, Exception Handling and VAPT. Experience in system and network administration, managing server infrastructures and data center operations. Expert-level knowledge of Amazon EC2, S3, Simple DB, RDS, Elastic Load Balancing, SQS, and other services in the AWS cloud infrastructure such as IAAS, PAAS and SAAS. Deep experience with AWS components such as EC2, S3, Elastic IPs, EBS, Security Groups, Route 53, VPC, Elastic Beanstalk, RDS, DynamoDB, and Cloud Formation. Experience in administration of MS SQL server and MySQL in AWS cloud platform. Configured AWS IAM and Security Group in Public and Private Subnets in VPC. Architected, Designed and Developed the Backup and Archiving, Disaster Recovery in AWS Cloud. Security Tools: Nessus, Nmap, burp suite, Wire shark, Web scarab. Operating Systems & Platform: Kali Linux, Backtrack 5 r3, Windows 7, 8, 8.1,10, MAC. Programming Language: HTML, JavaScript. Framework: Metasploit, OWASP. Endpoint: Sophos, Check Point. Amazon Web Services: Ec2, EBS, IAM, VPC, RDS Azure: VNET, VM (Windows, Linux) Server: Windows 2008 server, windows 2012 server.
    vsuc_fltilesrefresh_TrophyIcon Security
    Information Security Consultation
    Security Infrastructure
    Security Assessment & Testing
    Web App Penetration Testing
    Information Security
    Amazon Web Services
    Penetration Testing
    Security Analysis
    Application Security
    Vulnerability Assessment
    Security Testing
    Microsoft Azure
    Kali Linux
    Cloudflare
  • $30 hourly
    I am an Information Security Professional with over 5 years of industry experience. My primary focus is on performing Security Compliance Audits (ISO 27001, SOC2, HIPAA, etc.), Vulnerability Assessments, and Penetration Tests for Web Applications, Mobile Applications, Networks, and APIs. In addition, I have also earned the CEH (Certified Ethical Hacker) and ECSA (Certified Security Analyst) certifications from EC-Council, which further validates my expertise in this field. As a freelance professional, I am committed to providing high-quality services, timely delivery, and clear communication. Let's discuss your specific security needs and how I can help strengthen your organization's security posture.
    vsuc_fltilesrefresh_TrophyIcon Security
    IT Compliance Audit
    HIPAA
    SOC 2
    Website Security
    Web App Penetration Testing
    ISO 27001
    Web Application Security
    OWASP
    Network Security
    Cybersecurity Management
    Security Assessment & Testing
    Information Security Consultation
    Application Security
    Nessus
    Penetration Testing
  • $7 hourly
    Security Analyst with an experience of almost 3 years of experience working in the Application Security domain in critical real-time projects. Working knowledge of Penetration testing for Mobile, Web and web services. A certified ethical hacker, detail-oriented security researcher with excellent analytical and multi-tasking skills.
    vsuc_fltilesrefresh_TrophyIcon Security
    Smoke Testing
    Web App Penetration Testing
    Application Security
    Information Security
    Vulnerability Assessment
    Penetration Testing
    Network Security
  • $25 hourly
    Prasanna caught many Cyber Threats. He is working as a cybersecurity professional for more than 8 years. His expertise precisely lies in the Threat Hunting, SIEM-Security Information Event Management, Security Operations, Threat Intelligence, and Risk Management.. Utilizing the latest practices, He loves to devise processes with a comprehensive lifecycle. Over the years, he worked with different companies in the domain of cyber-security. His primary aim is always remained in the sphere of Various security services. He also worked as a Threat Hunter and SME for different companies. Some of his accomplishments are as follows. 1. Awarded with "Pat on the Back" for detecting and responding to various kind Cyber threats for prime customers on daily basis at Netsurion Technologies. 2. Awarded with "Pat on the Back" for introducing new prime forensic service at Netsurion Technology. With team leader responsibilities, provided different kind of security 3. Predictive Threat Intelligence and Targeted Threat Intelligence for various types of customers at CloudSEK. 4. Creating security values for the customers by identify the security gaps and fixing them with offered services at ColorTokens. 5. Planned and designed Threat Intelligence service and offerings for the different domain based customers at ColorTokens. 6. Created various use cases, playbooks and run books for multiple type of detection mechanism which helps team and ease the detection, hunting and investigation at ColorTokens. 7. Awarded as Annual Champion for the excellent performance in the year of 2020 at ColorTokens. You can contact him on his email address to discuss the details about my cyber-security services. Furthermore, you can also read his recent posts, blogs and some of learning experience on his LinkedIn Feed. He would be happy to assist aspiring organizations in the domain of cyber-security. Expertise: Security Log Management (SIEM-Security Information Event Management), SOC, Threat Intelligence, Threat Hunting and Risk Management, XDR, Security as a service, Security Analysis and Investigation, Thought Leadership, Managed Security Services, Competitive Security Analysis. He also offer freelancing work to help Financial, Healthcare, Holdings and other industry clients to provide security consulting for the better security and also to find, prevent the threats and finding risks in their organizations to improve their security. Finally, loves the rule of sharing and caring.
    vsuc_fltilesrefresh_TrophyIcon Security
    Information Security Threat Mitigation
    Cloud Security
    Elasticsearch
    Network Penetration Testing
    Security Analysis
    Computer Network
    Intrusion Prevention System
    Cyber Threat Intelligence
    Snort
    Intrusion Detection System
    Application Security
    Information Security
    Network Security
    System Security
    Cybersecurity Management
  • $5 hourly
    My experience spans 7.4 years, of which 2.4 years are relevant. to pursue excellence in cyber security with enthusiasm, commitment, focus, initiative, and a positive outlook. I want to make the most use of my knowledge and abilities to achieve organizational objectives and pick up new skills along the road.
    vsuc_fltilesrefresh_TrophyIcon Security
    Network Security
    Application Security
  • $15 hourly
    Ethical Hacker | Penetration Tester | Information Security Consultant Seeking a freelance work role to serve on the Cyber Security projects ? An Information Security Professional with almost 12 years of experience in the field of information security. During my professional life, I have worked on a wide range of different projects touching different branches of information security, ranging from VAPT (Penetration Testing) of web applications, Mobile, Network, Open Source Security. I am willing to work on the Cyber Security based penetration testing projects to further the companies mandate on Cyber Security towards safer and stronger security measures. I am curious to learn new technologies and even do POC of Cyber Security tools which would enhance the security tech stacks for the clients that I am working for. I have expertise in using security tools like: Burpsuite, Zapproxy, Metasploit, Nmap, Wireshark, Wapiti, Dirb, Nikto, Nessus, SQLMap, Sonatype Nexus and Nexus IQ, Artifactory XRAY and JAS, Synopsis Black Duck, Sonarqube. I can work on the feasibility of the comfortable working hours of the client.
    vsuc_fltilesrefresh_TrophyIcon Security
    Vulnerability Assessment
    Web App Penetration Testing
    Security Assessment & Testing
    Application Security
    Cybersecurity Management
    System Security
    Network Penetration Testing
    Penetration Testing
  • $3 hourly
    I am an Ethical Hacker having 6 years experience in Cyber Security and also I am an CEH certified. Below are my skillet -> Experience in performing SAST, DAST of web applications. -> Experience in performing Manual Testing. -> Experience in Performing Network Vulnerability Assessment.
    vsuc_fltilesrefresh_TrophyIcon Security
    Web Application Security
    Manual Testing
    Ethical Hacking
    Security Engineering
    Vulnerability Assessment
    Penetration Testing
    Application Security
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Application Security Freelancer near Bengaluru, on Upwork?

You can hire a Application Security Freelancer near Bengaluru, on Upwork in four simple steps:

  • Create a job post tailored to your Application Security Freelancer project scope. We’ll walk you through the process step by step.
  • Browse top Application Security Freelancer talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Application Security Freelancer profiles and interview.
  • Hire the right Application Security Freelancer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Application Security Freelancer?

Rates charged by Application Security Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Application Security Freelancer near Bengaluru, on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Application Security Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Application Security Freelancer team you need to succeed.

Can I hire a Application Security Freelancer near Bengaluru, within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Application Security Freelancer proposals within 24 hours of posting a job description.