Hire the best Application Security Freelancers in Pune, IN
Check out Application Security Freelancers in Pune, IN with the skills you need for your next job.
- $60 hourly
- 4.8/5
- (158 jobs)
SSO expert having Identity and Access Management expertise of 16+ years in SAML / OpenId Connect / Oauth 2.0 / JWT / FIDO2/ Webauthn / 2FA etc. I have experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, Okta, OneLogin, Auth0, Spring Security SAML, Keycloak, ForgeRock, IBM Security Access Manager etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, Ruby, Go, etc.) or framework (Node.js, Meteor, Angular, Django, CodeIgniter, Concrete5, Yii, Symfony, Laravel, WordPress etc.). I have a strong track record of helping clients succeed with: -Adding SAML authentication to custom applications -Troubleshooting SAML Identity Provider and Service Provider errors -Deploying SAML Identity Providers (IdPs) and Service Providers (SPs) -Finding the right architecture for layering SSO technologies (AD, LDAP, OAuth, OpenID Connect, CAS, Kerberos, JWT, multi-factor, etc.) -Providing training, documentation and third-party support -Deployment and architectures of LDAP solutions (OpenDJ, OpenLDAP, IBM Security Directory Server etc). Architectures with high availablity and custom schema. LDAP proxy / bridge solutions deployment. -Architectures and solution Implementation of Identity and Access governance solutions (Sailpoint IIQ , IBM Security Identity Manager, IBM Security directory integrator ). -Role based access control implementation in Identity management solutions. -Risk based access control implementation with Access Management solutions. Devops and cloud security - - Dockerize applications and platforms. - Deployment of applications on AWS EKS platform. - Deployment of applications on GCP GKE platform. Complex Integrations - - Rest API development and security with Oauth / JWT tokens. - API gateway integrations of API. SSO and Identity Access Management Integration Expert | Technical Project ManagerSecurity
Solution Architecture ConsultationOKTAVulnerability AssessmentApplication SecuritySingle Sign-OnAPI IntegrationOAuthCybersecurity ManagementSecurity AnalysisInformation Security ConsultationAuth0LDAPUser Identity ManagementAmazon Cognito - $9 hourly
- 5.0/5
- (21 jobs)
Cybersecurity expert, offering expertise to help protect companies, organizations, and agencies from malicious attacks. I am experienced in working with Fortune 800 brands, multinational companies, government, military, and intelligence agencies. 🛡️As a Certified Penetration Tester, I search for weaknesses, business logic mistakes, and weak end-points, among other things, in the following areas: ➜ Web Application Security (WebApp Pentesting) ➜ Website Security ➜ Mobile Apps ➜ Web Assets ➜ Network ➜ Server ➜ Any internet-connected product or device. 🎯 Types of Cyber Security Services: ➜ Penetration Testing (External & Internal) ➜ Vulnerability Assessment ➜ Gap Analysis ➜ Internet Security ➜ Security Analysis ➜ Web Testing ➜ Network Security ➜ 24x7 Monitoring, Managed SOC ➜ Digital Forensics ➜ Risk Assessment ➜ Black Box Penetration Testing ➜ Red Teaming Operations 📟 In the security assessment, I will conduct a thorough security check and cover the following topics: ➜ Web Application vulnerabilities (SQLi, XSS, CSRF, unpatched software libraries, OWASP, etc.). ➜ Open ports on your hosting server. ➜ Exposed Credentials for your domain across the dark web. ➜ Email security issues that affect your email deliverability. ➜ SSL Certificate security issues (detect misconfigurations). ➜ Exposed subdomains. ➜ IP address information and malware infections on your website. ➜ Domain name information and security issues (domain expiry date, name servers, etc.). 🌟 I will offer you a complete pentesting report on vulnerabilities that I will create using a set of methods and manual approaches that I have built publically accessible scripts, and professional automated techniques. 🌟 The pentesting report will include a detailed explanation of how to reproduce vulnerabilities and remediation/patch/fix procedures. 👨🏼💻Since 2013, I've been compromising and pentesting online systems, and I have professional knowledge in the following areas: ➜ Web Application Pentesting. ➜ Red Teaming ➜ Mobile Application Assessments (Android & iOS) 🌟 We will discuss specific recommendations for your further actions and support you in the further procedure even after the review.Security
Virus RemovalInternet SecurityInformation Security AuditWeb Application SecurityBlack Box TestingWhite Box TestingOWASPApplication SecurityVulnerability AssessmentInformation SecurityWebsite SecurityKali LinuxPenetration TestingWeb App Penetration TestingEthical HackingSecurity Testing - $45 hourly
- 0.0/5
- (0 jobs)
Accomplished Hybrid Cloud Security - DevSecOps seeks a challenging career opportunity where IT initiatives through strategic planning, proactive project management, decisive leadership, dynamic client relations and targeted IT MNC. Be able to proactively take technology ideas and solutions to senior people within the business. Collaborate across the IT organization to drive change. Support the Technology Service Leader/Technology Transformation Leader for an assigned portfolio as the go to contact for CTO/CISO around project pipeline, innovation and escalation. Leading engagements to define and design IT architectures on Cloud & On premise landscape. Google Cloud Security *GRC * Blockchain Security* Leadership * SANS Top 25* STRIDE * Threat Hunting* Threat Modelling*Cyber Security* Information Security*e-mail Security* CASB* SASE *IAM*Risk Analysis* Privacy Impact Assessment*Infrastructure Security*CCM Matrix*Microservices Security*Cloud Native Security*Network Security*CI/CD Pipeline Security*PKI* ISO 27001* NIST*CIS*PCI DSS*GDPR*API Security*Red Team*Blue Team*CSO*PCSO*MCT*Mentorship*Documentation*Python*Terraform Certified Cloud Security Knowledge CCSK - CSA (Cloud Security Alliance) Microsoft Cybersecurity Architect SC-100 AWS Certified Security Specialty- SCS- C01 Azure Certified Cloud Security Architect - AZ-500 Google Cloud Certified Professional Cloud Security Engineer MCT - Microsoft Certified Trainer 2023-2024 Certified Information Security Manager (CISM) Training completed Certified Information Systems Security Professional (CISSP) Training Completed MS-500: Microsoft 365 Security Administration SC-400 : Microsoft Information Protection Administrator Certified Cloud Security Knowledge CCSK CSA AZ-500 Azure Certified Security Architect AWS Certified Security Specialty- SCS- C01 Google Cloud Certified Professional Cloud Security Engineer Microsoft certified Azure Solution Architect AWS certified Cloud Solution Architect Associate AWS Certified Cloud Solution Architect Professional Google Cloud Architect - Professional (Google Cloud Certified-GCP) CKA Certified Kubernetes Administrator - CNCF LFS267: Jenkins Essentials LFS262: Implementing DevSecOps LFS260: Kubernetes Security Essentials SC-200 - Microsoft Security Operations Analyst SC-300 - Microsoft Identity and Access Administrator SC-100 - Microsoft Cybersecurity Architect IVM- Qualys/Tanium/AWS Inspector Patch Management SCCM -Intune/Puppet/Jenkins/Ansible/AWS Config/Google reCAPTCHA Enterprise/ AWS Systems Manager SCA -Software Composition Analysis - Synk/Black Duck - Synopsys/Veracode/Checkmarx/Micro Focus Fortify CASB- Microsoft Cloud App Security - MDCA /Zscaler/Cloudflare/Netskope IAM Azure AD/Okta/SailPoint/AWS and Google Directory Services/CyberArk EDR/XDR/MDR Crowdstrike/MS Defender/ AWS Guard Duty/Alert Logic Pentest -Metasploit/Kali Linux for Automated Penetration Test SIEM Qradar, Splunk, MS Sentinel, Google Chronicle and integration xSOAR Palo Alto Demisto/Splunk SOAR IOT Security Microsoft Defender for IOT license Management/AWS IOT device defender CSPM tools Azure MDC/AWS Security Hub/GSC/ Palo Alto Prisma Cloud/Wiz DevOps Jenkins/Ansible IAC Infrastructure as Code Terraform/Bicep- ARM templates/AWS Cloud formation SAST SonarQube/Checkmarx/Veracode/HCL AppScan DAST OWASP Zap Scan/Acunetix/HCL AppScan/Micro focus fortify/Veracode IAST Invicti (Netsparker)/Checkmarx/Contrast Security SecDevOps Kube-audit/Kube-scan/Nessus/Kube-hunter/Kue -bench Threat Modelling Microsoft Threat Modelling tool/IriusRisk/OWASP Threat Dragon E-mail Security Proofpoint/Cisco secure email/SonicWall hosted email Security Firewalls Palo Alto/Fire eye/Cisco ASA/Azure FW/AWS FW/Google Armor/AWS WAF/Azure WAF/Azure DDOS/AWS Sheild Security Monitoring Amazon CloudWatch/CloudTrail/Azure Monitoring/Google Operations (Stackdriver) Compliance & Governance AWS artifact/AWS Audit Manager/ Microsoft Purview Compliance Manager/Google Compliance reports Manger Certificate Management- MS PKI/ Azure Key vault/AWS KMS/Google Certificate Manager /HashiCorp Vault Kubernetes/Microservices Environment AKS/EKS/GKE Cloud Platforms Azure, AWS, IBM & OCI Implementing and overseeing Aligning cybersecurity/Cloud Security and business objectives. Reporting on cybersecurity/Cloud Security Recognizing the security threats, and configuring the environment, should have up-to-the-minute details of cybersecurity threats and the latest software. should also possess knowledge of the implementation of risk assessment techniques and the latest security best practices Hands on experience of secure coding methodologies including OWASP 10 -2021, SANS top 25 & MITRE top 25 Threat modelling in accordance with STRIDE framework by using Microsoft Threat Modelling Tool. DFD- Data Flow diagram creation from Lucid chart, Mermaid Risk assessment by OWASP risk calculator in conjunction with Threat modelling reports and Security documentation. Managing business continuity and disaster recovery inSecurity
CIS Control AssessmentCloud Security FrameworkCloud Security AllianceCloud SecurityApplication SecurityCybersecurity Management - $50 hourly
- 0.0/5
- (0 jobs)
Projects _____________________________________________________________________ * DNS over DTLS: Created a PoC DNS Client-Server that uses DTLS in transport layer for better security, than plaintext DNS. * Oauth2 PoC : Implemented small subset of RFC6749, for learning Oauth2 authorization frameworkSecurity
System SecurityWiresharkPython ScriptAPIAPI DevelopmentSecurity EngineeringGitHubGolangApplication SecurityDNSPython - $50 hourly
- 3.7/5
- (6 jobs)
javascript, HTML, Wordpress, C#, ASP.NET, MVC, Python, AWS Lambda, AWS IOT Core, PHP, Data Science, cybersecurity, .Net, and many more core technologiesSecurity
Reverse EngineeringInternet SecurityArtificial IntelligenceMachine LearningApplication Security.NET FrameworkPenetration TestingJava Servlet APIMalware RemovalIntrusion Detection SystemASP.NETPython - $25 hourly
- 5.0/5
- (3 jobs)
Bhanu is a highly analytical, seasoned professional with over 7 years of experience in analytics, brand development, product + project management and business strategy. With a core skillset of developing, testing, deploying and managing scalable applications across various cloud based technologies. Well versed with defensive security practices, modern attacker kill chain, MITRE ATT&CK framework and ISO 27001:2022 standards. Proven track record in deriving brands from scratch while managing the business plan, product roadmap and business relationships. Extensive experience in conducting product & market research, competitor analysis, product pricing creation, feature segmentation, securing intellectual properties and business assets. Strong interpersonal and critical thinking skills with ability to lead the overall product and project lifecycle by influencing cross functional teams of development, creative and marketing departments. Competent in: - project and team management; resource allocation, milestone creation, planning, managing and delivering projects while following agile methodology and bringing process improvements using lean principles. - developing and securing cloud based apps; orchestrating end to end applications using LAMP stack while following relevant SDLC techniques. Carrying out QA, beta testing, web security and compliance audits. - drafting documentation, reports, strategies and presentations. - managing, monitoring and securing server side environments across various cloud computing platforms. - generating business leads, closing deals managing clients and business relationships. - extending technical and general support wherever required. Actively working towards digitalisation, online commerce, deploying convenient and efficient cloud based solutions to help businesses develop and strengthen their web infrastructure. Connect with me for: - Designing custom tech solutions for your needs. - Product and brand development, growth and management. - Project strategizing and planning.Security
Application SecurityWeb DesignProduct DevelopmentBrand DevelopmentCopywritingWooCommerceWordPressPHPMySQLStrategySocial Media ManagementProject ManagementDatabase MaintenanceWeb Development - $20 hourly
- 0.0/5
- (0 jobs)
Hello! I’m Arpit, a seasoned DevOps freelancer with a passion for optimizing cloud infrastructure and streamlining development processes. With extensive experience in CI/CD, automation, and cloud architecture, I help businesses enhance their operational efficiency and deliver high-quality software faster. My Expertise Includes: CI/CD Pipelines: Skilled in setting up robust pipelines using tools like GitLab and AWS CodePipeline, ensuring seamless integration and deployment. Configuration Management: Proficient in Ansible for automating configuration tasks and ensuring consistency across environments. Infrastructure as Code: Experienced with Terraform for provisioning and managing cloud resources efficiently. Cloud Platforms: In-depth knowledge of AWS, Azure, and their services for effective cloud implementation and management. Containerization & Orchestration: Expertise in Docker and Kubernetes for building, deploying, and managing containerized applications. Monitoring & Logging: Proficient in using Grafana and Prometheus for real-time monitoring and performance optimization. Version Control: Strong command of GitHub for collaboration and code management. What I Offer: Tailored solutions to fit your specific needs, whether it’s setting up CI/CD pipelines, managing cloud infrastructure, or automating processes. A commitment to delivering high-quality work and maintaining clear communication throughout the project. Continuous support and consultation to help you navigate the complexities of DevOps. Let’s collaborate to transform your DevOps practices and accelerate your project delivery!Security
Application SecurityJenkinsGitHubGitLabGap AnalysisManaged ServicesStaffing NeedsJiraProject ManagementVulnerability AssessmentCloud MigrationData Center MigrationApplication Performance Monitoring SoftwareCI/CD PlatformDevOps - $150 hourly
- 0.0/5
- (0 jobs)
I am an experienced Penetration Tester and Cybersecurity Specialist, skilled in identifying vulnerabilities and securing systems against potential threats. With expertise in ethical hacking and advanced Blackhat techniques, I bring unique insights to simulate real-world cyberattacks, enabling organizations to strengthen their defenses. In addition to penetration testing, I specialize in fund recovery from financial scams, leveraging advanced tools and investigative methods to trace fraudulent transactions, recover stolen assets, and assist clients in resolving cyber fraud cases effectively. Key Expertise: • Penetration Testing (Web, Network, Cloud, and Mobile Applications) • Vulnerability Assessment & Exploitation • Blackhat Techniques for Ethical and Controlled Testing • Fund Recovery from Financial Scams (Cryptocurrency, Online Frauds, and Social Engineering Attacks) • Cybersecurity Incident Response and Forensics • Compliance with ISO 27001, GDPR, and PCI DSS I have a proven track record of delivering actionable insights, robust security strategies, and measurable results for businesses and individuals alike. My passion lies in protecting digital assets, preventing cyberattacks, and assisting victims of cybercrime in regaining their financial stability. If you need an expert to secure your systems, recover lost funds, or consult on advanced cybersecurity strategies, let’s connect and make it happen.Security
Social Engineering AssessmentBlockchain, NFT & CryptocurrencyMalware DetectionDigital ForensicsIncident Response PlanApplication SecurityNetwork SecurityVulnerability AssessmentEthical HackingPenetration TestingCyber Threat IntelligenceCybersecurity ToolInformation Security - $25 hourly
- 0.0/5
- (0 jobs)
Software Engineer experienced in developing runtime monitoring agents for CI/CD environments. Skills: Golang. eBPF, Linux, ShellScriptingSecurity
Software DevelopmentSystems EngineeringSecurity EngineeringGolangApplication Security - $15 hourly
- 0.0/5
- (0 jobs)
Certified Security Analyst | Application Security & VAPT Specialist With 3+ years of professional experience as a Security Analyst specializing in Vulnerability Assessment and Penetration Testing (VAPT), I help businesses identify, assess, and mitigate security risks to safeguard their digital assets. My expertise lies in uncovering vulnerabilities in applications, networks, and systems, and providing actionable recommendations to fortify your security posture. What I Offer: - Web & Mobile Application Security: Identifying OWASP Top 10 vulnerabilities (e.g., XSS, SQLi, CSRF). - Network Penetration Testing: Comprehensive scanning, exploitation, and reporting. - API Security Testing: Secure APIs against unauthorized access and data breaches. - Cloud Security Audits: Assessing cloud configurations for potential misconfigurations. - Detailed Reporting: Clear, professional PoC reports with steps to reproduce, risk assessments, and mitigation strategies. Certifications: - Certified VAPT Specialist - Diploma in CybersecuritySecurity
Bug BountySecurity TestingSecurity Assessment & TestingApplication AuditApplication SecurityPenetration TestingVulnerability Assessment - $3 hourly
- 0.0/5
- (0 jobs)
I am a passionate Cybersecurity enthusiast actively pursuing OSCP training with a strong foundation in full-stack development. My technical journey began with a B.Tech in Mechanical Engineering (2018-2022) from Symbiosis Institute of Technology, where I cultivated a problem-solving mindset that seamlessly transitioned into the IT domain. With experience providing Application Support to ITES and working across vendor and client-side UAT/Production teams, I have honed my skills in tackling complex technical challenges within banking applications. This exposure has not only enhanced my communication and technical proficiency but also deepened my understanding of cross-functional collaboration. I possess strong problem-solving abilities, a keen eye for detail, and an ability to bridge the gap between technology and business requirements. My goal is to secure a role that allows me to leverage my combined expertise in cybersecurity and software development, contributing to innovative solutions while continuing to grow symbiotically with the organization. Beyond work, I enjoy traveling, exploring global cuisines, and discussing current market trends, history, and economics. My diverse interests and technical versatility enable me to bring a unique perspective to every challenge I tackle. Key Skills: -Cybersecurity fundamentals, OSCP training (in progress) -Full-stack development -Application support & troubleshooting -Client and vendor collaboration in UAT/Production -Strong communication and analytical skills -Let’s connect to collaborate and explore opportunities to make a difference in the tech world!Security
Microsoft IISMongoDBSQLApplication SecurityNetwork AdministrationPenetration TestingVulnerability AssessmentGitHubMicrosoft Windows PowerShellKali LinuxPython Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Application Security Freelancer near Pune, on Upwork?
You can hire a Application Security Freelancer near Pune, on Upwork in four simple steps:
- Create a job post tailored to your Application Security Freelancer project scope. We’ll walk you through the process step by step.
- Browse top Application Security Freelancer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Application Security Freelancer profiles and interview.
- Hire the right Application Security Freelancer for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Application Security Freelancer?
Rates charged by Application Security Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Application Security Freelancer near Pune, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Application Security Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Application Security Freelancer team you need to succeed.
Can I hire a Application Security Freelancer near Pune, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Application Security Freelancer proposals within 24 hours of posting a job description.