Hire the best Certified Ethical Hackers in Noida, IN

Check out Certified Ethical Hackers in Noida, IN with the skills you need for your next job.

Clients rate Certified Ethical Hackers
Rating is 4.7 out of 5.
4.7/5
based on 248 client reviews
Harshit S.
$30/hr
  • Trophy Icon Ethical Hacking
  • Web App Penetration Testing
  • Cloud Security
  • Website Security
  • Network Penetration Testing
  • ISO 27001
  • Code Review
  • Network Security
  • Penetration Testing
  • Security Assessment & Testing
  • Source Code Scanning
  • Application Security
  • Information Security
  • Security Testing
  • Vulnerability Assessment

Services Offering : Ethical Hacking, Vulnerability Assessment & Penetration Testing, DevSecOps, Web Application Security, API Security, Android & iOS Mobile application Security, Network Security, Desktop Application Security, Cloud Security Audits and Penetration Testing, Thick Client App Security, Secure Code Review, DevSecOps, Container Security, IoT/Hardware Security, Blockchain or Smart Contract Security Audit, Security Configuration Review - Firewall, Switches, Router, OS and Server, etc. I am a Certified Cyber Security Expert/Professional and Security Engineer. I have more than 3 years of corporate experience in vulnerability...

Anirudh K.
$250/hr
  • Trophy Icon Ethical Hacking
  • Reverse Engineering
  • Better Mobile Security Better
  • SSL
  • Web App Penetration Testing
  • Bash
  • Linux
  • Web Testing
  • Website Security
  • Microsoft Windows Powershell
  • Vulnerability Assessment
  • Information Security
  • Penetration Testing

I am a SOC analyst and a security researcher with over 4 years of experience breaking and fixing multiple security and business logic issues in web and mobile applications. My expertise lies in Web Application Security, Mobile Application Security, Network Security, Cloud Architecture, Secure Code Review, Process Workflow Automation(using Python, Powershell, Batch, bash, etc), Dashboard creation, Excel Macro automation, VBA scripting, and more. I have experience with tools like BurpSuite, Acunetix, Nessus, SQLMap, Nmap, MobSF, ADB, and more. Recognized as a Security Researcher in Hall of Fames by: Google, Microsoft, Amazon Web Services,...

Kalpna G.
$150/hr
  • Trophy Icon Ethical Hacking
  • Elliptic Curve Cryptography
  • Linux
  • Information Security
  • Encryption
  • Application Security
  • Cryptography
  • Python
  • Android
  • C
  • NFC
  • Reverse Engineering
  • JavaScript
  • Java
  • C++
  • Blockchain, NFT & Cryptocurrency
  • Windows API Development
  • OAuth

PKI Security products and solutions related Cryptography, PKCS#11, HSM, Smart Card, Multi-factor Authentication, OTP Authentication, Bio-metric authentication, Application Security, Encryption, Digital Signature, CSP, Credential Provider, solution conforming to NIST FIPS-140 level 2/3 certification, PIV, CAC, Entrust, Id-entrust, CMS solutions, MS Identity life cycle Manager, Minidriver, SSL and VPN integration, Various Identity access control and management solutions, Worked on solutions targeted for Desktop (Windows, Linux, Mac), Embedded Software, IOT Device solutions, Android Native Development, Cloud solutions, - Languages*:: C,...

Akash G.
$50/hr
  • Trophy Icon Ethical Hacking
  • Financial Planning
  • Security Operation Center
  • Information Security
  • Compliance
  • Cloud Security

Experienced Microsoft Professional with more than 3.10 year of Development, Migration and Transformation experience in desktop and web based applications with the leading organisations. Currently involved in projects related to below technology 1. MIP 2. Azure AD MFA, Duo MFA, PingID MFA 3. DLP 4. MDI 5. MDO 6. MDATP 7. MCAS 8. SSPR 9. PIM 10. EXCEL, PPT and Documentation Apart from this, worked on RFP creation, client interaction, Timely project delivery, Upskilling junior resources and more

Vijay K.
$15/hr
  • Trophy Icon Ethical Hacking
  • Risk Analysis
  • Cyber Threat Intelligence
  • Information Security Awareness
  • Data Privacy
  • Cloud Security Framework
  • ISO 27001
  • Security Framework
  • SOC 2 Report
  • Information Security Audit
  • Information Security Governance
  • Policy Writing
  • Firewall
  • Security Policies & Procedures Documentation
  • Information Security
  • Cybersecurity Management

A Certified Information Systems Security Professional with 20+ years of experience, expertise in Information Security Management System (ISMS). I can help you with Information Security Governance, Risk and Compliance (GRC), ISO27001 certification (end-to-end), HITRUST/ HIPAA, SOC2, CMMC compliance and certifications, risk management, incident management, internal audit, awareness programs, BCP/DR, and Policy documentation. My Professional Qualification Includes CISSP, ISO27001:2013 LA, ISO22301, ISO31000:2009, CCSE, CCSA, CCNA, Qualys VA certifications, and Educational Qualification include Bachelor of Engineering degree in Electrical and...

Supriya C.
$90/hr
  • Trophy Icon Ethical Hacking
  • ISO 27001
  • Request for Information
  • Risk Assessment
  • Governance, Risk & Compliance Software
  • Internal Auditing
  • Information Security Consultation
  • Information Security

Summary Supriya has experience in Information Security. In my past roles I have: 1) Done risk assessments ensuring data integrity, security and data Governance is followed as agreed with clients and internal stakeholders 2) Done vendor risk assessment to ensure that vendor environment is aligned with organizations security protocol 3) Done framework based assessments Conducting Project Level Information Security Risk Assessments and Third Party Information Security Risk Assessments.  Providing consultation to the projects on specific security requirements.  Performs MSA/ Contract Reviews for Information Security.  Coordinating with...

Pacific C.
$70/hr
  • Trophy Icon Ethical Hacking
  • Microsoft Active Directory
  • Cloud Architecture
  • Information Security
  • Cloud Computing
  • Microsoft Azure
  • Computer
  • Directory
  • Active Directory Federation Services
  • User Identity Management
  • Cloud Security
  • Cloud Security Framework

I am a highly skilled Cloud Security Architect, is an expert in designing, implementing, and managing security solutions for cloud-based systems on the Amazon Web Services (AWS) platform. With their certification on AZ500 AWS Security Specialty, they possess in-depth knowledge of AWS security services and features and are proficient in identifying and addressing security risks and implementing best practices for securing AWS environments. I have proven track record of assessing security requirements, implementing security controls, and monitoring and reporting on security events. Their technical expertise and proficiency with AWS security...

Proff M.
$100/hr
  • Trophy Icon Ethical Hacking
  • Computing & Networking
  • Kali Linux
  • C
  • Intrusion Detection System
  • Network Engineering
  • System Security
  • Information Security
  • Artificial Intelligence
  • Intrusion Prevention System
  • Computer Network
  • Application Security

Targeting senior level assignments in Research Operations with an organization of repute in IT & Edtech industry Location Preference: Delhi NCR PROFILE SUMMARY * A dedicated & result-driven professional with over 20 years of experience in Curriculum Planning & Designing, Research Operations and Teaching Operations in Education industry * Hands-on experience & skills in developing computer science curriculum to accommodate different learning styles and maximizing students' comprehension; designed micro-level planning chart and complete teaching & reference material *...

Umang B.
$15/hr
  • Trophy Icon Ethical Hacking
  • Active Directory Federation Services
  • Single Sign-On
  • Security Assertion Markup Language
  • Auth0
  • LDAP
  • Information Security
  • Microsoft Active Directory
  • OAuth
  • OKTA
  • Microsoft Azure
  • Windows Administration
  • User Identity Management
  • Google Workspace Administration

SAML and SSO integration expert, Worked on Single Sign-on Integration tool, Identity and Access Management, and SIEM Tool ,having experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, ADFS, Azure, Okta, Cognito, OneLogin, Auth0, JumpCloud, SalesForce, Spring Security SAML, Ping, ComponentSpace, FIM, SiteMinder, SAP, OAM, Keycloak, ForgeRock, etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, etc.).

Akshansh B.
$15/hr
  • Trophy Icon Ethical Hacking
  • SEO Backlinking
  • SEO Keyword Research
  • On-Page SEO
  • Off-Page SEO
  • SEO Writing
  • Information Security
  • Search Engine Optimization
  • Social Media Management
  • Social Media Advertising
  • Information Technology Operations
  • Social Media Strategy
  • IT Service Management
  • Information & Communications Technology
  • Information Technology
  • Tech & IT

As a Tech & IT Digital Marketing expert, I have extensive experience in local and eCommerce search engine optimization (SEO), search engine marketing (SEM), pay-per-click (PPC) advertising, social media marketing, online reputation management, brand promotion, and creative content writing services. My approach is based on research, analysis, and implementation, with a focus on ROI. I have already optimized and promoted 30+ local and eCommerce websites and iOS/Android apps with top page ranking on thousands of business prospective keywords, high visibility, millions of traffic, and ongoing business lead improvements. Internet marketing is...

Anurag S.
$30/hr
  • Trophy Icon Ethical Hacking
  • Fortinet
  • Information Security
  • Border Gateway Protocol
  • Procedure Development
  • Information Technology
  • Firewall
  • Network Engineering
  • SSH
  • Cisco
  • Palo Alto Firewalls
  • Juniper

Experienced Network Engineer with a demonstrated history of working in the information technology and services industry. Skilled in Networking, Border Gateway Protocol (BGP), LAN Switching, Gateway, and Open Shortest Path First (OSPF). Strong information technology professional with a BCA focused in Computer Software and Media Applications

Pratyush Y.
$70/hr
  • Trophy Icon Ethical Hacking
  • Vulnerability Assessment
  • System Security
  • Security Engineering
  • Security Analysis
  • Malware
  • Email Security
  • Information Security
  • Network Monitoring

I am CEO and founder of turtlcybersecurity which are providing cyber security related solutions Turtl tech providing a full range of business consulting and advisory services to small medium and international companies worldwide . We use innovations and experience to drive your success Turtltech.com

Aditya S.
$7/hr
  • Trophy Icon Ethical Hacking
  • PCI DSS
  • Cloud Security
  • Cloud Security Framework
  • Information Security
  • Internal Auditing
  • Risk Assessment
  • IT Compliance Audit

I am a seasoned IT auditor with 5 years of experience in evaluating and auditing various operating systems, databases, and networks. I specialize in conducting cloud security audits, application control audits, and business process audits, and are adept at identifying gaps and excess controls through controls benchmarking and testing. The individual has extensive experience in implementing and managing ISO 27001 (ISMS), PCI-DSS, ISO 27701 (PIMS) in organizations across diverse sectors such as IT, publications, manufactures, aggrotech, and insurance. My expertise in risk assessment while implementing ISMS, PCIDSS, and PIMS has been...

Pankaj K.
$6/hr
  • Trophy Icon Ethical Hacking
  • Mobile App Testing
  • Source Code Scanning
  • Application Audit
  • NIST Cybersecurity Framework
  • Security Testing
  • Secure SDLC
  • Information Security
  • Penetration Testing
  • Code Review
  • Web App Penetration Testing
  • Vulnerability Assessment
  • Network Penetration Testing

Information Security Consultant with 11+ years of experience in SAST, DAST & Penetration Testing for Web Applications, Mobile Applications, Web Services and Cloud platforms. Extensively involved in application security programmed carried out architecture reviews – SAST, DAST and Penetration Testing activities. Strong knowledge of security vulnerabilities and remediation as per regulation like OWSAP top 10 and SANS 25.

Raman S.
$35/hr
  • Trophy Icon Ethical Hacking
  • Information Security
  • Architectural Design
  • Web Application Firewall
  • Microsoft Azure
  • Microsoft Azure SQL Database

Summary I am an Azure infosec consultant enriched experience in reviewing Azure web and native application, data platform and hybrid models .I am experienced in end to end security architectural review of on Prem and hybrid models .

Pawan P.
$50/hr
  • Trophy Icon Ethical Hacking
  • Information Security
  • Business Continuity Planning
  • ISO 27001
  • Compliance

SUMMARY & CAREER OBJECTIVE * Governance, Risk and Compliance professional with 3 years of work experience across diverse functions with focus on Information Security, Cyber Security and Business Continuity Planning & Management.

$NaN/hr

How hiring on Upwork works

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses

How do I hire a Certified Ethical Hacker near Noida, on Upwork?

You can hire a Certified Ethical Hacker near Noida, on Upwork in four simple steps:

  • Create a job post tailored to your Certified Ethical Hacker project scope. We’ll walk you through the process step by step.
  • Browse top Certified Ethical Hacker talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Certified Ethical Hacker profiles and interview.
  • Hire the right Certified Ethical Hacker for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Certified Ethical Hacker?

Rates charged by Certified Ethical Hackers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Certified Ethical Hacker near Noida, on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Certified Ethical Hackers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Certified Ethical Hacker team you need to succeed.

Can I hire a Certified Ethical Hacker near Noida, within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Certified Ethical Hacker proposals within 24 hours of posting a job description.