Hire the best Certified Ethical Hackers in Hyderabad, IN

Check out Certified Ethical Hackers in Hyderabad, IN with the skills you need for your next job.
Clients rate Certified Ethical Hackers
Rating is 4.7 out of 5.
4.7/5
based on 248 client reviews
  • $70 hourly
    I am a keen Individual professional looking to work for a challenging and responsible position in the field of Various Platforms. I have the flexibility to adapt to any new environment and work tirelessly on interesting projects. My vigor and skill will be a great strength for the company or an individual and I will make sure to bring success to all projects. Seeking to leverage my expertise to join in your Stardom.I have also experience in Cyber Security and Digital forensics it adds value in this cyber attacks Era.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Black Box Testing
    Information Security
    Security Testing
    Internet Security
    Customer Support
    Penetration Testing
    Security Analysis
    HackerRank
    Digital Forensics
    AT&T Cybersecurity
  • $35 hourly
    Engineering background / / Communicative listener of your need / Critical thinker with a creative solution As an Electronics and Communication undergraduate, I am a highly motivated individual who is always ready to take on new challenges. My strong communication and influencing skills have been honed through various leadership roles, and I am eager to discuss any topic related to my field of expertise. I am a Defence aspirant looking forward to join the armed forces. I am also a skilled writer, with a particular interest in geopolitics, and have experience writing blogs on this topic. Recently, I have been fascinated by the field of cybersecurity and am eager to leverage my knowledge and experience through hands-on work in this area. My ultimate goal is to work in a challenging and intellectually stimulating environment that will provide both job satisfaction and steady professional growth.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Cybersecurity Management
    Blog Writing
    Technical Writing
    Web Application Security
    Information Security
  • $60 hourly
    An versatile GRC professional carrying 15+ years of industry experience in helping Large/Medium/SMB organizations achieve their business goals by successfully contributing in building their security & compliance. I have been an internal auditor, DPO & CISO for multiple organizations across Product, Market Research & IT Consulting Firms. My Mission statement: "To be perceived as a Trusted Business Partner" I specialize in the following: Strategy - Develop Security strategy of the Organization - Security Assessment approach of as-is to-be state - Build Strong & Cohesive relationships across the Organization Risk - Understand the IT Landscapes & the Crown Jewels of the Organization - Evaluate the risk posture right from inherent to residual state - Advise investments on a risk based approach to ensure Confidentiality, Integrity & Availability of the Crown Jewels People - Develop Trainings based on the Culture of the Organizations Compliance - Evaluate the applicability of the Compliance - Regulatory & Contractual - Specialize in adopting ISO27001, NIST, SOC 2 Frameworks, right from designing, implementing, monitoring & evaluating the effectiveness of the controls. - Develop Policies & Procedures in the context of the Organization - Developed Privacy Programmes tailor made for global needs including GDPR, CCPA, LGPD & HIPPA - Designed Audit methodologies for Sox, ISO 27001, Third Party Risk etc. - Developed Playbooks which aid in responding day to day 3rd Party Security Questionaire. Operational - Procedures & Playbooks for management of Asset Management, Incident Management, Vulnerability Management
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    SOC 2
    GDPR
    Internal Auditing
    Disaster Recovery
    Sarbanes-Oxley Act
    CIS Control Assessment
    Certified Information Security Manager
    ISO 27001
    Relationship Management
    Data Protection
    Data Privacy
    Information Security
  • $150 hourly
    Professional Experience Summary * Over 19 years working experience with leadership and management experience in the global cross cultural Pharmaceutical and Medical Device industry in various positions with expertise in Regulated System implementation (Research, R&D, Manufacturing, Post marketing survielance) Computerised system validation, IT Quality and Compliance program management performing IT GxP internal audits, Compliance assessments and process improvements according to US FDA, EU MDR and ISPE GAMP guidance for global MedTech and pharmaceutical companies. * Experienced in leading and managing Information security and GxP Compliance programs. Worked on latest technologies (AI/ML, SaaS, IaaS, PaaS platforms, Mobile Health apps, Bespoke applications etc.) * Excellent knowledge and expertise in QMS processes (CAPA, Deviation, Audits, Incident, Problem, Change
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Government Reporting Compliance
    Compliance
    Information Security
  • $100 hourly
    I have 6+ experienced Cyber Security Analyst with a demonstrated history of working in Cyber security with strong knowledge and expertise in the areas of Endpoint security, Cyber Incident Response Management, Security Information and event Management, Security Operations Center. Current Employer : TMF Services India Pvt Ltd Designation : Security Operations Center Analyst Tools : Qradar, Symantec Endpoint Security, EDR, CrowdStrike, Vulnerability Management, Forcepoint(Websense, DLP), Email Spam Monitoring and analysis, Microsoft Defender for cloud, Microsoft Sentinel, Cb-Protection, Email gateway (Mimecast), To develop a career in the Information Security/Cyber Security/ Network Security domain in a growing company where my skills and experience will be utilized in achieving the goals and objectives of the organization.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Phishing Detection
    Malware Detection
    Security Operation Center
    Cybersecurity Monitoring
    Cybersecurity Management
    Information Security
    Information Analysis
    Threat Detection
    Information Security Threat Mitigation
    Incident Management
    Incident Response Plan
    Cyber Threat Intelligence
    SOC 1
    SOC 2
  • $45 hourly
    PROFILE SUMMARY : Experienced Privileged Access Management (PAM) specialist with 4.4 years of expertise in CyberArk. Background includes work in the Financial, Energy and Pharmaceutical sectors. Proficient in IAM, Active Directory, and the DevOps lifecycle. Dedicated to improving cybersecurity strategies and fostering innovation in privileged access management. * Expertise in Installing, Configuring, and Upgrading different CyberArk Components like Vault, PVWA CPM, & PSM * Expertise in OS Migration Activity * Strong expertise in Primary-DR CyberArk architectures. * Well versed with BCM and Disaster Recovery (DR) tests planning and execution. * Skillful in Production support and Service Management functions such as Incident, Problem, Capacity, Change, On-Call, Build & Deployment managements. * Skillful in designing highly available application infrastructure. * Hands-on with SSL/TLS Certificates life cycle management.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Information Security
    CyberARK
  • $60 hourly
    Results-driven Technical Consultant with over Seven years of experience in IT Security Auditing, data analysis, data science and cybersecurity. Adept at leading complex projects, developing innovative solutions, and driving business growth. Proficient in Python, data science, and network security. Recognized for enhancing organizational performance through strategic insights and technical expertise.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Python
    Software Development
    Information Security
    Computer Network
    Computing & Networking
    Guest Interview Submission
    Interview Training
    Mock Interview
    Interview Preparation
    Client Interview
  • $80 hourly
    Digital forensics and incident Response | cyber security | 7 years of experience from government and private sector
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Information Security
    Compliance
    Training & Development
    Incident Response Plan
    Incident Management
    SOC 3
    SOC 2
    SOC 1
    Security Analysis
    Cybersecurity Tool
    Digital Forensics
  • $80 hourly
    I am Umesh Varma, a Cyber Security Specialist at LTIMindtree, where my Master's degree in Information Technology from Charles Sturt University is put to good use. My strong foundation in computer science and industry certifications such as Fortinet Network Security Expert Level 1: Certified Associate and Certified Ethical Hacker (CEH) enable me to navigate the intricate world of cloud and infrastructure security with ease. In my role, I leverage my proficiency with knowledge graphs for compliance auditing, providing a unique perspective to identify and mitigate risks. My efforts, along with those of my team, ensure robust security measures that align with ISAE 3402 standards. This safeguards our digital space and protects sensitive data. With over 3+ years of experience in cyber security roles, I have honed skills such as cloud security and infrastructure security. These skills are instrumental in fortifying our organization's cyber defense.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Cyber Threat Intelligence
    SOC 2
    SOC 1
    Malware Detection
    Incident Response Plan
    Compliance
    Information Security
  • $60 hourly
    Results-driven Consultant with over six years of experience in IT Security Auditing, data analysis, data science and cybersecurity. Adept at leading complex projects, developing innovative solutions, and driving business growth. Proficient in Python, data science, and network security. Recognized for enhancing organizational performance through strategic insights and technical expertise.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    GDPR
    GDPR Compliance Review
    Python Script
    Information Security
    Forensic Accounting
    Digital Forensics
    IT Consultation
    Data Analysis
    Training & Development
  • $70 hourly
    SUMMARY OF QUALIFICATIONS * Over 8 years' experience in the Risk Management and Operations industry * Advanced computer skills including Windows, Microsoft Office, Unix/Linux * Excellent problem-solving, analysis, and critical thinking skills
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Risk Analysis
    IT Compliance Audit
    Strategic Audit
    Compliance Testing
    Risk Assessment
    Risk Management
    Government Reporting Compliance
    Information Security
    Compliance
  • $39 hourly
    Summary: Senior Consultant with experience in managing endpoint security solutions such as SentinelOne EDR and Trellix/McAfee ePolicy Orchestrator. Demonstrated expertise in enhancing endpoint security and managing cybersecurity solutions across global enterprises. Skilled in strategic planning and vendor coordination, significantly improving operational efficiency and security posture. Technical Skills:  SentinelOne EDR  SentinelOne DLP  Trellix/McAfee ePolilcy Orchestrator  Trlellix/McAfee Endpoint Security  Trellix/McAfee Threat Intelligence Exchange, DLP, Adaptive Threat protection, Data Exchange Layer  Trelix/McAfee File and Removable Media protection  Service Now  Microsoft Information Protection
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Information Security
  • $35 hourly
    Governance, Risk, and Compliance (GRC) Expert | Certified CISA | ISO 27001 & 9001 Lead Auditor Hi, I'm Vamsi , a seasoned GRC professional with over 12 years of experience in Governance, Risk Management, and Compliance across various industries. My expertise lies in ensuring that organizations meet their regulatory and compliance requirements while managing risks efficiently. *Key Certifications: - Certified Information Systems Auditor (CISA) - ISO 27001 Lead Auditor (Information Security) - ISO 9001 Lead Auditor (Quality Management) What I Can Do for You: - Perform comprehensive internal audits to assess compliance with IT security, risk management, and governance frameworks. - Assist with the development, implementation, and continuous improvement of ISO 27001 and ISO 9001 management systems. - Provide expert guidance on achieving and maintaining compliance with regulatory standards and industry best practices. - Conduct risk assessments and create tailored risk mitigation strategies. - Prepare organizations for external audits and certifications. - Develop and implement cybersecurity policies, procedures, and controls. Why Work With Me: With my extensive background in compliance, audit, and risk management, I ensure that businesses not only meet their compliance requirements but also establish sustainable practices for long-term success. I focus on providing actionable insights and practical solutions that align with your business goals. Let’s work together to safeguard your organization’s future. Feel free to reach out to discuss your project needs!
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Policy Development
    Information Security Governance
    Information Security Awareness
    Information Security Audit
    ISO 9001
    ISO 27001
    Information Security
    Audition Preparation
    Compliance
  • $35 hourly
    OBJECTIVE: Seeking a technically challenging position in IT Infrastructure Engineering, providing a highly motivated, progressive, friendly environment. This allows the pursuit of career advancement and expands my knowledge and skills. PROFESSIONAL PROFILE * Certified on various Microfocus (OpenText) solutions for Application Security and Infrastructure products. * Delivered Fortify SCA, SSC & Web-Inspect deployments and performed various POC's for the clients in Saudi Arabia. * Working on various Microfocus Tools for over 5 years. * Implement and administer PAM (Privileged Access Management) & Multifactor Authentication systems tools. * Worked on various migration and Disaster Recovery Projects. * Familiar with Identity Access Management tools from various vendors. * Proficient in working with VMware and Hyper-V Virtualization. * Extensive design & deployment experience in working with Active directory & Exchange server.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    System Administration
    Information Security
  • $27 hourly
    Welcome! With over 11 years of freelance experience, I specialize in Linux server administration and excel in optimizing web hosting platforms for peak performance. My focus on WordPress optimization, Odoo server architecture, and disaster recovery ensures robust security and seamless functionality for websites and business systems. Key Skills: Linux Server Administration: Extensive expertise in architecting, deploying, and securing LAMP/LEMP stack servers. WordPress Optimization: Proficient in enhancing WordPress sites for speed, reliability, and resilience. Odoo Server Architecture: Skilled in designing and maintaining server infrastructure for Odoo systems. Crisis Management: Effective in resolving malware issues, mitigating spam-related problems, and handling various site-related crises. Cloud Hosting Mastery: Familiarity with AWS, Digital Ocean, Vultr, and other cloud platforms for efficient server management. Notable Achievements: Reduced site downtime by 30% through meticulous optimizations, enhancing user experience. Swiftly recovered several WordPress sites affected by malware, ensuring minimal disruption. Provided ongoing server maintenance to ensure uninterrupted uptime and scalability planning for clients' Linux servers and Odoo systems. Client Testimonials: "Remarkable problem-solving skills, prompt responses, and clear communication—always a pleasure to work with." - Aashath VerveInnovation Australia "If no one can fix it Imtiaz can" -- Kenan Nekretnine365 Croatia "I've told my wife that in case something happens to me she should turn on the computer go to Skype and look for Imtiaz, he will ensure that the business keeps going" -- Al Smith CouponQueen New York "We discovered a whole new line of business where we started the vertical that provides Odoo on-prem support and development to clients thanks to Imtiaz" -- Carl Waoconnect Australia Continual Growth & Certifications: I consistently invest in upskilling and hold certifications in server administration, web hosting, and security to offer cutting-edge solutions aligned with the latest industry standards. I'm committed to not just meeting but exceeding your expectations, ensuring your web hosting platform operates at its peak, offering maximum security, performance, and reliability. Let's collaborate to elevate your online presence and fortify your digital assets.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    WordPress Optimization
    WordPress Security
    Odoo Administration
    LAMP Administration
    Linux System Administration
    Information Security
  • $25 hourly
    Having more than 10 Years of experience in cyber security domain with proven practical experience in Threat Hunting, Google Dorking, Open-Source Intelligence, threat modelling, security code review, Penetration Testing(Web/Mobile) and implementing cyber security best practices into the organizations. Proficient in threat hunting using MITRE ATT&CK, STRIDE, PASTA, OWASP Threat Dragon frameworks for conducting Threat Modelling framework, TTP’s and develop a heatmap. Experience in using Python Boto3, AWS responder, libcloudforensics, AWS Security - Step Functions, AWS Lambda, CSP header verification using Python Scripts, AWS Step Functions and Canary tokens. Hands-on experience in malware analysis through sandboxing techniques. Experienced in analyzing registry keys, event codes, and network telemetry logs. Capable of network traffic dumping and pcap analysis with tcpdump and network miner. Hands-On experience in malware analysis, specializing Android(Java) malware, reverse engineering, code obfuscation and static analysis. Familiar with fileless malware detection and other persistence techniques. Proficient in browser extension and double file extension analysis. Utilize threat analysis reports from Red Canary, CrowdStrike, and Palo Alto Networks for reconnaissance. Proficient with CTI methodologies including analysis through frameworks such as the Pyramid of Pain, Diamond Model, and Cyber Kill Chain. Capable of ensuring strong emphasis on security across web, thick client, API, mobile (iOS & Android), Kubernetes, containers, and cloud hosted services (AWS/AZURE). Experienced in handling F5 products (BIGIP-Next, F5OS, SPK), BIGIP, NGINX core and NGINX Plus. Strong technical experience in implementing cybersecurity methodologies such as NIST, OSSTMM, M(ASVS), SANS, MITRE ATT&CK and NIST & OWASP standards, with expertise in identifying application weaknesses, attack vectors, exploitation techniques, and countermeasures. Well versed with TCP/IP, packet analysis(pcap), protocol analysis, web sockets, Endpoint analysis, network forensics, OAUTH 2.0, OpenID Connect and SAML identity protocols. Implemented secure coding practices, reducing vulnerabilities and proficient in tools like Fortify and SecureCodeBox. Extensive experience in using fuzzing tools like DirBuster, FFUF tools. Hands-on programming skills using Java, JavaScript and Python Areas of Expertise– Digital Forensics, Threat Hunting, Automation by Python Scripting. Certified GIAC-Mobile Device Security and Ethical Hacker (GMOB). Certified EC-Secure Programmer (ECSP) and Certified Ethical Hacker (CEH). Successfully completed the "Advanced Infrastructure Security Assessment" course at the Null conference in 2022. Successfully completed the "Breaking and Owning Applications and Servers on AWS and Azure" course at the Null conference in 2019 Developed security policies, ensuring compliance and smooth application delivery. Good at using governance tools like JIRA, Confluence etc. Web & Mobile Application: CheckMarx, Fortify, SecureCodeBox, SonarQube, Burp Suite (Pro & Free), Fiddler, OWASP Zap Proxy, Paros Proxy, W3af, Echo Mirage, Snallygaster, PenCrawler, Hackbox, Galileo, FFUF, InfectionMonkey, Drozer, MobSF, Jadx, JD-GUI, Santoku, AndroidTamer, Adhrit, Reverse APK, Clutch, Rp++, Frida/Objection, Needle Framework, iFunbox, RastiCrac, Otool, Class-dump, iLEAPP, ALEAPP. Threat Hunting and Telemetry Analysis: Tcpdump, Wireshark, ATT&CK MITRE(TTP’s), Mimikatz, Scapy, PyShark, Network Miner, Zeek, Splunk, Sysmon, Snort, Wazuh, ElasticSearch(ELK), Suricata. Web Services & Network Assessment: WSSAT 2.0, Astra, Postman, SoapUI, API Fuzzer, Nmap, Nessus, Kali Linux, Metasploit, Crunch, Cain Cloud & Containers, Threat Modelling AWS Inspect, S3 Inspect, Bucket Finder, Guard, Clair, Anchore, Trivy, STRIDE, DREAD, Microsoft Threat Modelling Tool, Client satisfaction and quality of work are my top priorities. I'm a problem solver and I'm glad to help you with any task you have on your website. Regards, Sandeep T
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Security Testing
    Vulnerability Assessment
    Information Security
    Penetration Testing
    Kali Linux
    Wireshark
    Website Security
    Cryptography
    Mobile App Testing
    Web App Penetration Testing
    Network Penetration Testing
    Code Review
    Network Security
    Encryption
  • $600 hourly
    SUMMARY Subhajit is an Information Security, Technology Risk, and Data Privacy leader with 02 decades of experience in leading information security, digital resilience, risk management, and data privacy programs for global organizations. He has been successful in creating business-oriented security programs that are innovative, agile, cost-conscious, and suited for global regulated environments. He currently has 02 US Patents granted, 02 US Patents filed and 4 Bank of America Trade Secrets granted in areas of information security. Subhajit is on the advisory board of EC Council, CrowdStrike & CyberED (ISMG). He has won several awards including the Top 100 CISO awards from 2017 till 2021. He is a regular speaker/panelist at reputed security conferences and seminars in India. Skills/Expertise: Risk Management, Data Leakage Prevention, Human Risk Management/Insider Threat, Vendor/Supplier Governance, Incident Response and Management, Endpoint Security, Network Security, Application Security, Security Compliance (ISO 27001, SOC 2), GDPR Assessment and Implementation.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Pharmaceutical Industry
    Insurance
    Healthcare
    SOC 2
    ISO 27001
    NIST Cybersecurity Framework
    Cybersecurity Management
    Disaster Recovery
    Business Continuity Planning
    Incident Management
    Information Security
    Risk Management
    Cyber Threat Intelligence
  • $100 hourly
    I'm a highly motivated cybersecurity professional with 6 years of experience in safeguarding critical systems and data. Throughout my career, I've excelled in ethical hacking, information security analysis, penetration testing, data loss prevention, risk assessment. I'm passionate about staying ahead of evolving cyber threats and possess a proven ability to develop and implement effective security solutions.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Information Security
    Network Penetration Testing
    Penetration Testing
  • $15 hourly
    I’m a cyber specialist with experience in recovering and hacking social media accounts such as email, Gmail, Instagram, Facebook, and websites. Whether you’re trying to hack, recover, or secure your account, I can help! I RECOVER IT FIRST BEFORE YOU PAY. CONTACT ME ON TELEGRAM OR WHATSAPP FOR FAST CONVERSATION. 📞 Telegram: @the_guardian_7 📞 WhatsApp: +91-9409772260 ⭕ I only bid on that project, which I can deliver with complete satisfaction. ⭕ Are you looking for a hacker? ➡️ YOU ARE ON RIGHT PROFILE I have almost 9 years of experience in the fields of hacking and cybersecurity. I have helped many people get their social media accounts back. hack and check their partners social media and devices, hack complete devices, and many more. I was five-star rated on Upwork, but because of hacking work like this, that account got suspended. Please find my suspended account proof in the attachment to this proposal. I have worked at an MNC as a senior cybersecurity engineer and network engineer. Following is a list of my work. Please invite me if you are looking for this work. ➡️ Instagam Recovery ➡️ Instaram Hacking ➡️ Facebook Recovery ➡️ Facdebook Hacking ➡️ Complete device hacking (Android and iOS) ➡️ Device Lock Bypass ➡️ Twiteer Recovery ➡️ Twitter hacking ➡️ School-college site hacking ➡️ Changing Grades  ➡️ Any application hacking ➡️ Crypto Scam Tracking and Recovery  ➡️ Cradit Score Repair ➡️ SnapChat Recovery ➡️ SnapChat Haking  ➡️ Gmail or any mail recovery  ➡️ Gmail or any mail hacking If you have any work from the list or related to this, please feel free to contact me. There's no cost for guidance. If the client is not satisfied with work or we are unable to work, then we will give a give a full refund to the client.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    CyberARK
    Cyber Threat Intelligence
    Compliance
    Government Reporting Compliance
    System Security
    Information Security
  • $45 hourly
    Summary: Experienced Security Administrator with knowledge of Microsoft Information Protection, Trellix ePO, Agent, ENS, ATP, TIE, DXL, DLP, FRP supporting 3 Lakh endpoints throughout the globe. * Hands-on experience with McAfee products such as VSE, FRP, ENS, ATP, TIE, DXL, DLP-Device Control. * In Depth knowledge on VSE, FRP, ENS, ATP and experience in handling various issues related to these products. * Knowledge of Microsoft Information Protection, DLP * Knowledge of Implementing Sensitive Information Types, Sensitivity Labels * Implementing Microsoft DLP policies * Implementing Data Retention labels and policies * Managing Data Retention and Records Management * Supporting 3Lakh end points from all over the world with various McAfee products. Technical Skills: * Microsoft Information Protection * Microsoft DLP * Trellix ePolicy Orchestrator, Trellix Agent and ENS (End Point Security) Adaptive Threat Protection TIE, DXL FRP (File and Removable Media protection) DLP – Device control
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    McAfee ePolicy Orchestrator
    Security Infrastructure
    Microsoft Endpoint Manager
    Information Security
  • $25 hourly
    Results-driven project management and training professional with over 8 years of experience in leading comprehensive training programs and employee development initiatives. • Successfully managed the revamped New Hire Training Program, training over 2,000 interns and overseeing 50+ batches. Full project management from start to finish • Developed and implemented data collection frameworks and dashboards to measure training effectiveness, contributing to enhanced resource management and reduced attrition through targeted employee retention programs • Expert in compliance training management, maintaining a 99% compliance rate, and a certified internal auditor for ISMS (ISO 27001) and QMS (ISO 9001), with a strong track record of conducting internal audits and collaborating with certifying agencies • Proven ability to design competency frameworks and learning roadmaps, and played a key role in the development and implementation of a new Learning Management System • Currently leading a team of 18 experts in Digital Ad Operations and Data Visualization, leveraging extensive experience to drive performance and innovation • Regular communication is important to me, so let’s keep in touch
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Google Sites
    Time Management
    Communication Skills
    Office 365
    Training Needs Analysis
    Content Management
    Moodle
    Looker Studio
    Google Sheets
    Management Skills
    Business Management
    Data Visualization
    Project Management
    Visualization
    Information Security
  • $10 hourly
    SUMMARY I'm a Computer Science student at Loyola Academy passionate about coding, especially in Python and C language, with a strong interest in machine learning. I've developed effective communication and leadership skills. Seeking to leverage my technical expertise and creativity in corporate environments to drive innovation in computer science. ACHIEVEMENTS - Improved public speaking abilities. - Actively participated in department fest as the organizing head.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Information Security
    Computing & Networking
    Computer Network
  • $25 hourly
    COULD NETWORK SECURITY ENGINEER CAREER OBJECTIVE: To obtain a challenging and rewarding position in Network Security engineer with an organization which recognizes my true potential and provides me sufficient avenues for professional growth through nurturing my technical skills and competencies SUMMARY OF SKILLS : * Passionate, diligent and focused Engineer with 7+ years of experience as a Network & Security Engineer. * Technical knowledge & proficiency in network maintenance, hardware maintenance, operating systems, Linux, Windows (All versions) and the willingness to learn and effectively apply new technologies. * Analytical thinker, consistently resolving ongoing issues, often called upon to consult on problems that have eluded resolution by others. * Extensive exposure to a comprehensive range of team activities, thrive on working in challenging environment. * Demonstrated problem analysis/ resolution skills, ability to troubleshoot, solve problems quickly
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Load Balancing
    Check Point
    FortiGate Firewall
    Palo Alto Firewalls
    Information Security
    Network Engineering
    Computing & Networking
  • $30 hourly
    SKILLS TPRM Internal audit Type-II report, vulnerability scan report, independent penetration test report, ISO 27001:2013 certification, and PCI-DSS certification. * Conducted in-depth risk-based security assessments of housed, Cloud, vendor and third party hosted environment. Assessment focus included Risk Management, Physical Security, Identity & Access Management, Encryption, BCP/PCIDSS/TPRM Risk Management ISO27001;2013 Data Loss Prevention, Secure Development, Incident Management, Security Infrastructure, and Security Policy. * I document critical third-party risks in a formal report, escalate any control gaps to management as necessary, present the findings, and offer recommendations to key stakeholders in technology and business processes to raise awareness and implement mitigating controls or remediation measures * I make sure that any risks identified during vendor assessments are addressed within a reasonable timeframe.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Information Security
    Compliance
    Risk Management
    Enterprise Risk Management
    Risk Assessment
    ISO 27001
  • $10 hourly
    Career Objective: To secure a dynamic position in a professionally challenging environment in the field of Informa on Security, with success in enhancement of the technology road map in providing better solutions to the security aspects. Professional Summary: Overall, 12 years of experience into Sales, Informa on technology, Cyber security & cloud (Azure, AWS, GCP, & Cloud Na ve Pla orm) security related compliance, networking, security solu ons integra on, security Architecture, DevSecOps (Security related to Containers, Kubernetes, CICD Pipeline, IAC, & APIs), monitoring, opera on and POCs. Leading the digital SOC Team as Sr. Cloud Security Engineer for Cybersecurity, CyberRisk & IT Compliance. Working on cloud (Azure, AWS, GCP, & Cloud Native Platform) security related compliance, networking, security solutions integration, security Architecture,
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Cybersecurity Tool
    Cyber Threat Intelligence
    Cybersecurity Management
    Security Operation Center
    Security Assessment & Testing
    Information Security Governance
    Information Security
    Security Engineering
    Compliance
    Governance, Risk Management & Compliance
    Governance, Risk & Compliance Software
    Cloud Security Framework
    Cloud Security Alliance
    Cloud Security
  • $25 hourly
    • General queries about AWS. • AWS Infrastructure Architecture overview. • Recommendations on Security best practices. • Quick consultation on any issues you might be facing • Troubleshooting any issues related to AWS EC2, S3, CloudFront, Route53, VPC, Route Tables, RDS, IAM, etc. • Cost Estimation and Cost Optimization Recommendation for AWS Account. • Guidance on what infrastructure would be best suited based on your requirements. • Recommendations for migrating applications to serverless architectures using AWS Lambda. • Strategies for integrating AWS with third-party services and tools. • Advice on implementing effective monitoring and logging solutions using CloudWatch. • Insights on multi-region and multi-AZ deployment strategies for high availability. • Guidance on setting up and managing content delivery networks (CDNs) with AWS CloudFront. • Strategies for securing AWS environments, including network design and IAM best practices.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Server Administration
    Windows Administration
    Architectural Design
    Network Engineering
    Computer Network
    Information Security
    Computing & Networking
    DevOps
    Architecture
    AWS CloudFront
  • $5 hourly
    As a cybersecurity expert, I specialize in conducting comprehensive vulnerability assessments and penetration testing to identify and mitigate potential security risks. My expertise extends to configuring and managing network firewalls, ensuring robust protection against unauthorized access and threats. Additionally, I offer services related to cloud and data migration, ensuring secure transitions while maintaining data integrity and compliance. I also focus on email security to safeguard sensitive communications and protect against phishing and other email-based threats. My commitment is to provide organizations with the highest level of cybersecurity resilience and peace of mind.
    vsuc_fltilesrefresh_TrophyIcon Ethical Hacking
    Information Security
    Cloud Security
    Data Migration
    Cloud Migration
    Microsoft 365 Copilot
    Microsoft Active Directory
    Email Security
    Microsoft Endpoint Manager
    FortiGate Firewall
    Penetration Testing
    Vulnerability Assessment
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Certified Ethical Hacker near Hyderabad, on Upwork?

You can hire a Certified Ethical Hacker near Hyderabad, on Upwork in four simple steps:

  • Create a job post tailored to your Certified Ethical Hacker project scope. We’ll walk you through the process step by step.
  • Browse top Certified Ethical Hacker talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Certified Ethical Hacker profiles and interview.
  • Hire the right Certified Ethical Hacker for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Certified Ethical Hacker?

Rates charged by Certified Ethical Hackers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Certified Ethical Hacker near Hyderabad, on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Certified Ethical Hackers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Certified Ethical Hacker team you need to succeed.

Can I hire a Certified Ethical Hacker near Hyderabad, within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Certified Ethical Hacker proposals within 24 hours of posting a job description.