Hire the best Certified Ethical Hackers in Noida, IN
Check out Certified Ethical Hackers in Noida, IN with the skills you need for your next job.
- $30 hourly
- 5.0/5
- (27 jobs)
Services Offering : Ethical Hacking, Vulnerability Assessment & Penetration Testing, DevSecOps, Web Application Security, API Security, Android & iOS Mobile application Security, Network Security, Desktop Application Security, Cloud Security Audits and Penetration Testing, Thick Client App Security, Secure Code Review, DevSecOps, Container Security, IoT/Hardware Security, Blockchain or Smart Contract Security Audit, Security Configuration Review - Firewall, Switches, Router, OS and Server, etc. I am a Certified Cyber Security Expert/Professional and Security Engineer. I have more than 5 years of corporate experience in vulnerability assessment & penetration testing of Web Application, API, Android & iOS Mobile application, Network, Desktop Application, Cloud Security Audits and Penetration Testing, Thick Client App Security, Secure Code Review, DevSecOps, Container Security, IoT/Hardware Security, Blockchain/Smart Contract Security Audit, Security Configuration Review - Firewall, Switches, Router, OS and Server, etc. Follow systematic approach and best industry methodology like OWASP Testing Guide v4(OTGv4) ; SANS top 25; NIST SP 800-115. I help to identify and mitigate the threats and vulnerabilities in systems and softwares with my skills I provide the following services: ✅ Penetration Testing Engagement ✅ This includes both thorough manual testing of all functionalities and automated testing for all websites, applications, servers or infrastructure included in the scope of work, using both professional enterprise grade software such as BurpSuite Professional and Nessus and also personal scripts and tools gathered over past engagements. This services extends as well to internal penetration tests and network infrastructure testing as well. ✅ Professional Report & Statistics ✅ Detailed report explaining step-by-step the exploitation and discovery method of each and every vulnerability discovered. Proof-of-Concept screen captures, full requests and responses, CVSS v3.0 standardised risk score, impact and ownership included. ✅ Remediation Advice & Guidance ✅ Remediation advice regarding all security issues discovered, how to fix them and warnings associated with the impact and risk of these vulnerabilities. ✅ Asset Discovery ✅ Through both active and passive methods, I can help you asses how big your digital footprint is on the internet and what is the attack platform visible from an outsider threat perspective. This includes subdomain enumeration and service/port discovery. ✅ Free Checkup ✅ Included in the price will be a checkup/retest of all aforementioned vulnerabilities present in the report in order to ensure that the implemented security controls and/or fixes are working as intended and that there is no other way to bypass them or exploit that vulnerability any longer. Technical Skills: - Vulnerability Assessment & Penetration Testing - Web Application VAPT - API VAPT - Android & iOS Mobile ApplicationVAPT - Network VAPT - AWS/ Azure/ GCP/ DigitalOcean Cloud Security Audit and Penetration Testing - Microsoft Office 365 Security Audit or Configuration Review - Thick Client or Desktop Application VAPT - Active Directory Security - DevSecOps - Container Security - VoIP Penetration Testing/ Security Testing - IoT/Hardware Security Testing - Smart Contract Security Audit - Threat Modeling - Threat Intelligence - Open Source Intelligence - Security Configuration Review - Firewall, Switches, Router, Operating Systems and Servers Certification Achieved: - CREST Practitioner Security Analyst (CPSA) - CREST Registered Penetration Tester (CRT) - Offensive Security Certified Professional (OSCP) - ISO 27001 Lead Auditor - (ISC)2 Certified in CyberSecurity - Information Security Certified Professional (ISCP) - Cyber Security Foundation Professional Certificate (CSFPC) - Certified AppSec Practitioner (CAP) Achievements : I got Appreciation Certificate from NCIIPC (Indian Government) for submitting few security issues. I attended private bugbounty programs organised by CCTNS (Crime and Criminal Tracking Network and Systems - Indian Government) and Bharti Airtel. I helped to secure some companies such as Dell, DigitalOcean, StatusPage, Caviar, Western Union, UnderArmour, Arlo Cash Rewards, Kenna Security, Pantheon, Mailgun, Seek, Skyscanner, Fitbit, Overstock and more.Ethical Hacking
Code ReviewISO 27001Network Penetration TestingWebsite SecurityCloud SecurityWeb App Penetration TestingVulnerability AssessmentSecurity TestingInformation SecurityApplication SecuritySource Code ScanningSecurity Assessment & TestingPenetration TestingNetwork Security - $21 hourly
- 0.0/5
- (2 jobs)
With over 21 years of expertise in Process & Project Management, I specialize in CMMI 3.0 DEV/SVC, ISO 9001, ISO 27001, Cybersecurity, PMO, SEPG, Process Improvements, Internal Audits, and Agile/Lean practices. I offer comprehensive services, including gap analysis, process definition and improvement, audits, reviews, training, and tailored consultation to align with ISO and CMMI standards. 1) CMMI Consultation and Certification - Guide the client organization in achieving CMMI Dev/Services certification. - Discuss with team about existing processes, identify gaps/improvement areas - Analyze current processes, develop quality standards, and implement continuous improvement strategies. - Design and implement process improvement frameworks aligned with CMMI/Agile practices. - Conduct training sessions and workshops for stakeholders to build internal process capabilities. 2) Cybersecurity Compliance: - Define project scope, goals, success criteria, and deliverables. - Develop detailed project plans, schedules, and resource allocation. - Track project progress, risks, and issues; proactively drive resolutions. - Ensure projects comply with frameworks such as CMMC, NIST, ISO 27001, or SOC 2. - Support internal and external audits, documentation, and security assessments. 3) Project Manager/PMO Consultant: - Define project scope, goals, and deliverables that support business objectives. - Create detailed project plans, schedules, budgets, and resource allocation. - Lead and coordinate internal teams and third-party vendors/consultants. - Set up and managed PMO processes, templates, and governance frameworks to ensure consistent project execution. - Support project planning, tracking, and reporting through dashboards and reviews, enabling informed decision-making. - Guide teams on project management best practices, process improvements, and compliance with standards like CMMI and ISO. Why Choose Me? ✅ 20+ Years of Expertise – Proven track record in Process & Project Management, CMMI Dev and Services Model , SEPG, and Internal Audits. ✅ Certified & Experienced Auditor – Extensive experience CMMI assessments, ensuring compliance and continuous improvement, Consulted 15+ Organizations in achieving CMMI Level 3 and Level 5 ✅ Customized, Results-Driven Approach – I don’t just provide audits—I deliver tailored strategies that drive efficiency, quality, and business growth. ✅ Comprehensive Training & Support – Empowering your team with the right knowledge and tools to maintain and improve compliance standards. ✅ End-to-End Consulting – From gap analysis to process definition, implementation, and audits, I provide full-spectrum support to strengthen your organization’s systems. Whether you're looking to achieve initial CMMI certification, maintain compliance, or improve your existing systems, I am here to guide you every step of the way. Let's work together to elevate your organization's quality and security standards to new heights!Ethical Hacking
Kanban MethodologyScrumAgile Software DevelopmentProject ManagementProcess ImprovementProcess OptimizationProcess Flow DiagramProcess DesignISO 14001ISO 9001ISO 27001Information SecurityCompliance - $45 hourly
- 5.0/5
- (3 jobs)
With over 22 years of global IT experience, I have built a strong reputation for designing, implementing, and managing secure, scalable, and compliant IT environments tailored to the needs of diverse industries. My expertise lies in aligning businesses with international IT compliance standards such as ISO 27001 and SOC 2, enabling organizations to safeguard their data, meet regulatory requirements, and build customer trust through robust security frameworks. My technical proficiency spans a broad spectrum of IT domains, including cloud computing (AWS, Azure, GCP, and OCI), cybersecurity with a focus on Zero Trust Network Access (ZTNA), and advanced IT operations. I am highly skilled in administering platforms like Microsoft 365 and Google Workspace (G Suite), enhancing network and system security, and optimizing data center operations to deliver seamless business performance. A key area of my expertise is in implementing comprehensive disaster recovery setups and establishing business continuity processes. These initiatives ensure organizations can recover swiftly from potential disruptions, maintain operations, and protect critical data. My approach combines strategic planning and technical execution, ensuring systems remain resilient and scalable to meet evolving business demands. In my extensive career, I have supported global clients, overseeing Network Operations Centers (NOC) and Security Operations Centers (SOC) to deliver high-quality IT services. I am adept at managing complex IT infrastructures and teams, ensuring round-the-clock monitoring, rapid incident response, and optimal uptime for critical business systems. As a Virtual Chief Information Security Officer (vCISO), I provide organizations with the strategic guidance needed to navigate the ever-evolving cybersecurity landscape. My vCISO services focus on developing and implementing tailored cybersecurity strategies, aligning IT systems with compliance standards like ISO 27001 and SOC 2, and addressing industry-specific challenges to minimize risks. Through this role, I empower businesses to establish a strong security posture, protect sensitive data, and ensure compliance with legal and regulatory requirements. In addition to compliance, my vCISO services include conducting risk assessments, establishing governance frameworks, and managing vendor relationships to enhance overall security and operational efficiency. By combining technical expertise with strategic oversight, I help organizations strengthen their cybersecurity maturity, build resilience, and drive continuous improvement. Over the years, I have worked across various industries, leveraging my technical acumen and leadership capabilities to deliver impactful IT solutions. My hands-on approach, combined with a deep understanding of compliance frameworks and industry best practices, ensures that my clients achieve not only technical excellence but also business success. In today’s complex IT landscape, where cybersecurity threats and compliance challenges are at an all-time high, I am committed to delivering solutions that are not only secure and scalable but also aligned with the strategic goals of the organizations I serve. My experience and passion for driving innovation and security make me a trusted partner for businesses seeking to excel in a technology-driven world. By leveraging my expertise in IT operations, cloud computing, cybersecurity, and compliance, I help organizations achieve their objectives while mitigating risks, improving efficiency, and delivering value to stakeholders. Whether as a strategic advisor or a hands-on practitioner, my goal is to empower businesses with IT solutions that are secure, compliant, and future-ready. With a career spanning over two decades, I remain dedicated to staying at the forefront of industry trends, technologies, and standards, ensuring my clients benefit from the latest advancements and best practices in IT and cybersecurity. My work reflects a commitment to excellence, innovation, and customer success, making me a valuable asset to any organization aiming to thrive in today’s dynamic digital environment.Ethical Hacking
Windows AdministrationVirtual Desktop InfrastructureNetwork AdministrationLinux System AdministrationIT Service ManagementIT Asset ManagementAmazon Web ServicesRemote IT ManagementOffice 365Citrix Virtual Apps & DesktopsEnd User Technical SupportDatabase AdministrationCloud ComputingSecurity Operation CenterInformation Security - $150 hourly
- 4.8/5
- (12 jobs)
PKI Security products and solutions related Cryptography, PKCS#11, HSM, Smart Card, Multi-factor Authentication, OTP Authentication, Bio-metric authentication, Application Security, Encryption, Digital Signature, CSP, Credential Provider, solution conforming to NIST FIPS-140 level 2/3 certification, PIV, CAC, Entrust, Id-entrust, CMS solutions, MS Identity life cycle Manager, Minidriver, SSL and VPN integration, Various Identity access control and management solutions, PDF Signing on Mobile, Remote PDF signing, Personalization of NFC mifare Classic 1K and 4Ksmart card, Access authentications, Worked on solutions targeted for Desktop (Windows, Linux, Mac), Embedded Software, IOT Device solutions, Android Native Development, Cloud solutions, - Languages*:: C, C++, Java, QT, C# ,Python,Javascript, TypeScript - Operating System:: Windows, Android,vxWorks, Linux, Embedded Linux - Tools:: GCC, GDB,LLVM, LLD, Android Studio, Shell scripting, Eclipse, Visual Studio - Standards/ API:: PKCS # 11, #12 , MS CAPI, Credential Provider, TokenD, KeyChain APIs, ISO - 7816, Bluetooth / Bluetooth LE APIs, FIPS-140 level 2 & 3, KMIP specification, FIDO specifications, PCSC lite, EMV specification, Master/Visa, ANSI Standard for key exchanges, TR31 and TR34 Key blocks, PIN, PCI DSS, CCSS level 3, - OpenSource:: OpenSSL, OpenSSH, BouncyCastle (FIPS/Non-Fips) - Web Technologies:: NodeJS, Protobuffer, DJanfo, Angular, HTML, CSS, React.js, Next.js, XML, WS security - HSM: IBM CloudHSM, AWS-CloudHSM, Google Cloud HSM, Azure Cloud HSM, Thales DPoD, Thales Luna HSM, AWS-KMS, Payment HSMs, SafeNet CloudHSM, DPoD, SoftHSM, AWS Payment Cryptography, nShiled, CiperTrust, Utimaco, - Blockchain: Bitcoin and Ethereum signing with CloudHSM, BIP32 Signing, secp256k1 signing, Ethereum Signer with CloudHSM.Ethical Hacking
OAuthWindows API DevelopmentBlockchain, NFT & CryptocurrencyC++JavaJavaScriptReverse EngineeringNFCCAndroidPythonCryptographyApplication SecurityEncryptionInformation SecurityLinuxElliptic Curve Cryptography - $50 hourly
- 5.0/5
- (23 jobs)
SAML and SSO integration expert, Worked on Single Sign-on Integration tool, Identity and Access Management, and SIEM Tool ,having experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, ADFS, Azure, Okta, Cognito, OneLogin, Auth0, JumpCloud, SalesForce, Spring Security SAML, Ping, ComponentSpace, FIM, SiteMinder, SAP, OAM, Keycloak, ForgeRock, etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, etc.).Ethical Hacking
Google Workspace AdministrationUser Identity ManagementWindows AdministrationMicrosoft AzureOKTAOAuthMicrosoft Active DirectoryInformation SecurityLDAPAuth0Security Assertion Markup LanguageSingle Sign-OnActive Directory Federation Services - $15 hourly
- 5.0/5
- (20 jobs)
A Certified Information Systems Security Professional with 20+ years of experience, expertise in Information Security Management System (ISMS). I can help you with Information Security Governance, Risk and Compliance (GRC), ISO27001 certification (end-to-end), HITRUST/ HIPAA, SOC2, CMMC compliance and certifications, risk management, incident management, internal audit, awareness programs, BCP/DR, and Policy documentation. My Professional Qualification Includes CISSP, ISO27001:2013 LA, ISO22301, ISO31000:2009, CCSE, CCSA, CCNA, Qualys VA certifications, and Educational Qualification include Bachelor of Engineering degree in Electrical and Electronics Engineering.Ethical Hacking
Policy WritingInformation Security GovernanceInformation Security AuditSOC 2 ReportSecurity FrameworkISO 27001Cloud Security FrameworkData PrivacyInformation Security AwarenessCyber Threat IntelligenceRisk AnalysisCybersecurity ManagementInformation SecuritySecurity Policies & Procedures DocumentationFirewall - $50 hourly
- 0.0/5
- (0 jobs)
AREAS OF EXPERTISE IT Infrastructure Management Operating Systems & Network Security Project Management IT Budgeting & Control IT Resource Management Risk Management Business Process Improvement Stakeholder Management Cross Functional Coordination Vendor Management Escalation Management Team Management EXECUTIVE PROFILE Savvy IT professional with 8 years of experience in IT and Digital, IT-OT Network, IT Security, Process Improvement Team Management across Manufacturing, Power, Energy, and IT sectors. Extensive experience in setting up of entire IT operations, creating robust IT architectures and infrastructures with abilities to bring the benefits of IT to solve business issues. KEY STRENGTHS & ATTRIBUTES * Planning, project management and implementation leadership, identifying opportunities for automation, cost savings, and service quality improvement. * Development of enterprise standards and technology architecture and the IT operations governance process.Ethical Hacking
ComplianceInformation SecurityGovernment Reporting ComplianceFreshworks CRMServiceNowITILIT Project ManagementIT Service ManagementIT InfrastructureProject Management - $50 hourly
- 0.0/5
- (0 jobs)
I am the Founder and CEO of Cloud9 Power Technologies, a company that delivers innovative and cost-effective IT solutions for business operations, remote managed services, practice development, and IT consulting. With over 26 years of experience in the IT industry, I have a strong background in databases, applications, middleware, and operating systems, and I am certified in ITIL V3. My mission is to create value for my clients by offering them customized and scalable solutions that meet their business needs and expectations. I have successfully managed and delivered complex and challenging projects for clients across the globe, achieving profit and business growth objectives within start-up, turnaround, and rapid-change environments. I have also built and managed a decent mid-size Database and Application Services practice, and established strong relationships with service providers and customers. I am passionate about leveraging technology toEthical Hacking
SOC 1Oracle Data IntegratorOracle DatabaseOracle E-Business SuiteHelpdeskLinux System AdministrationIT SupportInformation SecurityIT InfrastructureJavaSAP ERPOracle ApplicationsCloud MigrationERP SoftwareDatabase Management - $45 hourly
- 0.0/5
- (0 jobs)
With having 15 years of experience with global software MNCs and startups, Accomplished Technology Leader with Expertise in Tech solution such as Self-Service Products, Cloud Solutions, Agile Development, and IT Strategy Execution. My core competencies are: Cloud Architecture & Application Development: Built Scalable, Self-Service Platforms Across HR & Sales self-service products in HR recruitment and Sales domain. It includs database design (MySQL, Cosmos DB, Dynamo DB, Amazon Redshift, Oracle) and integration of payment systems, email services, and Google Maps. Comprehensive experience in leveraging Azure DevOps for CI/CD pipelines, code repositories, and project tracking to enhance productivity and delivery efficiencyEthical Hacking
Information SecurityComplianceArchitectureDatabase ManagementDevOpsArchitectural Design - $35 hourly
- 0.0/5
- (0 jobs)
Experienced Enterprise Architect with 20+ years of experience in in Oracle Cloud Security, specializing in IAM, SSO, MFA, Adaptive Secuity, PAM, OAuth2.0, API Security, Network security, Data security, OCI landing zone, and secure SaaS & PaaS integration. Proven track record of architecting security Oracle fusion ERP and HCM environment, enabling third-party app integrations using Oauth and Federated Identity. Skilled in designing and Implementing DR-ready cloud solutions, combining infrastructure security (FastConnect, IPSec, SD-WAN) with application security to ensure robust, scalable and compliant systems Passionate about delivering secure, future-ready cloud architectures that align business goals with security best practicesEthical Hacking
Active Directory Federation ServicesSingle Sign-OnMulti-Factor AuthenticationCloud ArchitectureNetwork ArchitectureOracle Fusion ApplicationsCloud Security AllianceCloud SecurityOracle Identity ManagementOAuthOracle CloudArchitectural DesignInformation SecurityNetwork EngineeringArchitecture - $85 hourly
- 0.0/5
- (0 jobs)
CAREER OBJECTIVE A seasoned cybersecurity professional with over 12.6 years of experience in information security, specializing in Security Operations (SOC), cloud security, and threat management. Seeking to leverage my expertise to enhance security ecosystems, drive cybersecurity awareness, and implement advanced security solutions to protect organizational assets. PRÉCIS As an experienced professional, I have excelled in building Operating and Managing SOC, cloud security (Azure, AWS). As the DART Head at Birlasoft Pvt Ltd, I have successfully led teams in deploying, operating, and administrating comprehensive security solutions.Ethical Hacking
Architectural DesignSecurity Operation CenterSecurity EngineeringArchitectureInformation Security - $50 hourly
- 0.0/5
- (0 jobs)
We have more than 15 Years of experience in IT hardware and software skills. We are your complete outsourced IT support department. From remote or onsite IT support, cybersecurity, or cloud services, We are your personal and dedicated team to solve your IT problemsEthical Hacking
Computing & NetworkingInformation SecurityComputer Network - $75 hourly
- 0.0/5
- (0 jobs)
12 Years 9 Months of experience PROFILE SUMMARY Experienced Quality Assurance Manager adept at optimizing processes and developing teams across diverse industries. Skilled in ISO standards, risk management, and driving continuous improvement for enhanced product reliability. Recognized for leadership in fostering innovation and elevating quality standards. KEY SKILLS Information Security Management System Quality Management system SOC 2 General Data Protection Regulation Audit Facilitation Risk Management Incident Management Change Management Documentation and Compliance Internal Audit Training Delivery Vendor Management Food Safety Management System BRC Packaging HACCP Root Cause Analysis FSC-COC Verification and Validation CERTIFICATION Lead Auditor ISO 14001 Environment Management System Lead Auditor OHSAS 18001 Occupational Health Safety Management SystemEthical Hacking
Information SecurityGovernment Reporting ComplianceComplianceDocumentationDocument ControlRisk ManagementRisk AssessmentRisk AnalysisISO 9001ISO 27001ISO 14001 - $10 hourly
- 1.6/5
- (4 jobs)
Greetings! I'm Sanjeev karn, As a seasoned Penetration Tester, I have a proven track record of conducting and leading successful security audits, web application penetration tests, and red team engagements for a diverse range of clients. As a security engineer, my day-to-day responsibilities revolve around leveraging my expertise in penetration testing, cyber security, and vulnerability assessment to identify and mitigate potential vulnerabilities. Through these experiences, I have comprehensively understood the prevailing technology stacks employed worldwide, allowing me to discern their security weaknesses with precision. 🚫No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined. Working with me, you will: ★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ★ Complete manual testing for your application and immediate notification if any high-impact issues are found. ★ Unlimited retesting for the fixed issues and unlimited revisions ★ Able to find critical bug classes that are often missed by automated pentests. Penetration Testing and Vulnerability Assessment Tools: Manual Testing: Burpsuite Professional, Nuclei, , Nmap, Postman (API testing), Metasploit Framework, SQLmap, OWASP ZAP Automated Testing: Acunetix, Nessus, Netsparker, etc. Penetration testing service: 1. Penetration Testing Engagement: thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing. Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus. 2. Professional Report and Statistics: A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact. 3. Remediation Advice and Guidance: Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities. 4. Asset Discovery: Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery. 5. Free Retest: Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended. 6. OSINT Reconnaissance: Gather all valuable data about the company on the internet, including any breached email addresses and related passwords. 7. Briefing and debriefing: Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required. ✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes: ► Executive Summary ► Assessment Methodology ► Types of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings Each finding listed within the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections. ► Retest for issues (The vulnerabilities will be retested after they're fixed; multiple retests can be done to ensure the issues are remediated.) My Expertise: ★ Web Application Security Testing ★ API security testing ★ Penetration Testing ★ Internal Active Directory and External Network Pentest ★ Vulnerability Assessment. ★ Thick Client Pentest (Windows Desktop App Testing). Thanks, Looking forward !!Ethical Hacking
Website SecurityNetwork Penetration TestingInformation SecurityPenetration TestingWeb App Penetration TestingData ProtectionRisk ManagementNetwork AnalysisVulnerability AssessmentCybersecurity Management - $20 hourly
- 0.0/5
- (0 jobs)
Reach amount of experience in IT domain. Experienced in AWS Cloud. Readiness of ec2 for SAP ECC / S4/Hana environment. Implemented / Migrated multiple projects from On-Prime / Other Cloud to AWS public cloud. Implemented / Hosted multiple MSSQL/MySQL/PostGreSQL DB and Web Application. AWS Business Plan, FTR Rediness, Aws Architecture, CSAT, Aws Partner Path, Tier upgrade and othersEthical Hacking
Information SecurityComplianceComputer NetworkProblem SolvingArchitectureComputing & Networking - $30 hourly
- 0.0/5
- (0 jobs)
With 3+ years of experience, I specialize in designing, developing, and optimizing scalable applications using modern technologies. I have hands-on experience in building microservices-based architectures, working with event-driven systems, and leveraging AI/ ML to develop business-driven solutions that drive growth. Key Skills & Technologies: Frontend: HTML5, CSS3, Bootstrap 5, Tailwind CSS Backend: Java, Spring Boot, Yii2 Framework, Python Databases: Amazon DynamoDB, MySQL Version Control: Git, GitHub Architecture: Microservices, Event-Driven Architecture, transitioning from Monolithic to Microservices AI & Machine Learning: Developing AI/ML-powered solutions to enhance business performance DevOps & Deployment: Docker, Jenkins, testing, and debugging Servers & Infrastructure: Tomcat, NGINX I thrive in fast-paced environments, collaborating with teams to develop efficient, scalable, and high-performance applications. My passion for continuous learning keeps me at the forefront ofEthical Hacking
Information SecurityComplianceArchitectural DesignDatabaseProblem Solving - $199 hourly
- 0.0/5
- (0 jobs)
With over 15 years of hands-on experience in software repair and troubleshooting, I have developed an extensive skill set in diagnosing and resolving software-related issues across various platforms and industries. My expertise lies in identifying software defects, resolving system errors, and ensuring smooth system functionality for both small and large-scale applications. Throughout my career, I have worked with a wide range of software, from operating systems to complex enterprise applications, providing clients with prompt and efficient solutions. My deep understanding of programming languages, debugging techniques, and software maintenance processes allows me to offer tailored solutions to meet clients' specific needs. I am proficient in utilizing modern software tools, conducting system tests, and ensuring the highest level of software performance and reliability. I have also built strong communication skills, collaborating effectively with cross-functional teams to deliver solutions that exceed expectations. Passionate about continuous learning, I keep up with the latest industry trends and emerging technologies to maintain a competitive edge in the field. Whether it’s repairing legacy systems or optimizing modern software, I take pride in delivering results that enhance system stability, reduce downtime, and improve user experience.Ethical Hacking
Database ManagementComputer NetworkInformation SecurityNetwork EngineeringComputing & Networking - $30 hourly
- 0.0/5
- (0 jobs)
Security Operations Senior Analyst with Expertise in Azure Sentinel and Microsoft Defender I specialize in safeguarding organizational infrastructures through management of security solutions, particularly Azure Sentinel and Microsoft Defender for Endpoint, Identity, and Office 365. With a robust understanding of modern cybersecurity practices, I provide actionable insights, real-time monitoring, and proactive threat detection to help organizations minimize risks and ensure data protection. I have hands-on experience on Azure Sentinel SIEM (Security Information and Event Management) for efficient incident response, while leveraging Microsoft Defender to provide comprehensive endpoint protection, identity security, and secure Office 365 environments. My deep knowledge of threat hunting, security alerts management, and response workflows enables me to quickly detect and mitigate advanced threats before they impact business operations. With a strong focus on automation and integration within the Microsoft security ecosystem, I work closely with cross-functional teams to continuously enhance threat detection capabilities and ensure compliance with industry standards and regulations. Passionate about staying ahead of emerging threats, I am committed to driving security improvements and delivering peace of mind to organizations relying on cloud-based environments. Key skills include: Azure Sentinel Management Microsoft Defender for Endpoint, Identity, and Office 365 Threat Detection, Incident Response & Remediation SIEM Operations & Tuning Vulnerability Assessment & Risk Mitigation Cybersecurity Best Practices & Compliance Active Certifications: - SC-200 - AZ-500Ethical Hacking
Security Operation CenterSecurity AnalysisInformation Security - $6 hourly
- 0.0/5
- (0 jobs)
Summary Recent B.Tech graduate in Computer Science Engineering with hands-on experience in SOC analysis, penetration testing, and vulnerability assessment. Proficient in Python, C++, AWS, Azure, and security tools like Wireshark, Metasploit, and Nmap. Interned at Meon Technologies to enhance product security and Lumiq Technologies on IoT security. Led projects on password strength analysis and smart home security. Passionate about securing digital assets and mitigating cyber threats. : SOC Analysis, Penetration Testing, Vulnerability Assessment, Incident Response Program : Python, C++ , C : Firewall Configuration, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) : AWS Security, Azure Security, Identity and Access Management (IAM) : Wireshark, Metasploit, Nmap, Nessus, Burp Suite , Metaspoilt, Cloud ComputingEthical Hacking
Cybersecurity MonitoringCybersecurity ManagementDatabaseGraphGovernment Reporting ComplianceComplianceNetwork EngineeringInformation SecurityComputing & NetworkingComputer NetworkDatabase Management - $50 hourly
- 0.0/5
- (0 jobs)
Expert level of understanding on Managing Alliances and Business Relation, Sound knowledge on IT Infrastructure e.g. Sizing Servers Storage and Data communication technologies e.g. IP/MPLS/ Ethernet etc. particularly in the service provider and Large enterprise area, Strong fundamentals in Cloud, IOT AI, and Data-center domain. Experienced in large e Governance projects Consultation Solution Architecting Business development Specialist having industry certifications proven technological, and Management abilities to qualify, design, and sell IT Infrastructure related solutions. My diverse technical background provides a unique perspective to clients and business partners In recent times, I've been considering a transition into the Finops /Security fieldEthical Hacking
System AdministrationNetwork EngineeringComplianceGovernment Reporting ComplianceComputer NetworkComputing & NetworkingInformation Security - $20 hourly
- 0.0/5
- (0 jobs)
We are THQ (Technology-HQ), a leading provider of cutting-edge technology solutions, specializing in Artificial Intelligence (AI), Cloud Computing, DevOps, and Cybersecurity. We partner with top-tier providers to deliver comprehensive solutions that empower businesses to thrive in the digital age. THQ helps businesses of all sizes leverage the latest technologies to achieve their strategic objectives. Our expertise spans the following areas: Artificial Intelligence (AI): We design and implement AI solutions, including machine learning, deep learning, and natural language processing, to automate processes, gain insights, and drive innovation. Cloud Computing: We provide cloud solutions on leading platforms (AWS, Azure, Google Cloud), including cloud migration, infrastructure management, and optimization. DevOps: We streamline software development lifecycles with DevOps practices, including continuous integration/continuous delivery (CI/CD), automation, and infrastructure as code. Cybersecurity: We protect businesses from evolving cyber threats with comprehensive security solutions, including risk assessments, vulnerability management, and security implementation. GPUaaS: We deliver high-performance GPU resources tailored to meet the demanding needs of businesses in AI, machine learning, and data science. We are committed to delivering exceptional service, building long-term partnerships, and exceeding client expectations. We combine deep technical expertise with a client-centric approach to provide tailored solutions that address unique business challenges. Skills: Artificial Intelligence (AI) Machine Learning Deep Learning Natural Language Processing (NLP) Cloud Computing Amazon Web Services (AWS) Microsoft Azure Google Cloud Platform (GCP) DevOps Continuous Integration/Continuous Delivery (CI/CD) Infrastructure as Code (IaC) Cybersecurity Risk Assessment Vulnerability Management Security Implementation GPUaaS NVIDIA GPUs High-Performance Computing (HPC) Python Java Agile Methodologies Project Management Technical Consulting Solution ArchitectureEthical Hacking
ComplianceInformation SecurityComputing & NetworkingDevOpsNetwork EngineeringArchitectureComputer Network - $20 hourly
- 0.0/5
- (0 jobs)
PROFESSIONAL SUMMARY: Security Analyst with 3+ years of experience in Vulnerability Assessment and Penetration Testing (VAPT), including web, API, and Android testing. Skilled in identifying and reporting security vulnerabilities, client communication, and remediation support. Experienced with compliance standards such as ISO 27001, PCI-DSS, HIPAA, and NIST. Active in bug bounty programs with valid disclosures. Proficient in scripting and automation using Bash and custom tools. PROJECT HIGHLIGHTS * Led security testing for a Health application with 1 million+ users, finding critical RCE and privilege escalation issues * Performed API security testing for a healthcare platform ensuring HIPAA compliance * Developed internal Bash-based tools to automate network and vulnerability scanning * Conducted thick client application assessments uncovering serious business logic flaws ADDITIONAL INFORMATION Created custom scripts and tools for internal VAPT processEthical Hacking
Security AnalysisComplianceInformation Security - $5 hourly
- 0.0/5
- (0 jobs)
Next.js expert – Building full-stack, responsive, and user-friendly web applications. Strong in both frontend and backend development, ensuring complete end-to-end solutions. Experienced with Cloudinary for seamless image upload, optimization, and management. Implementing secure authentication using Clerk, Google OAuth, and similar providers. Effective at working with cross-functional teams to design, build, and deploy tailored features. Skilled in performance optimization, ensuring fast, efficient, and scalable applications. Proficient with modern dev tools (ESLint, Prettier, Git, Vercel, etc.) and best practices. Always learning, exploring new tech, and solving complex technical challenges.Ethical Hacking
Information SecurityNetwork EngineeringGraphComputing & NetworkingComputer NetworkDatabase ManagementDatabase - $15 hourly
- 0.0/5
- (0 jobs)
Professional Synopsis * Total 15+ Year Experience in Application Development. * 12.0+ Year Experience in Software Application Development, Project Delivery and Team Handling. * 10.0 Year Experience in LAMP Technology Web application, Web API, Framework (CodeIgniter & Laravel) Application Development & Deployment Slim Framework Web API (SOAP, Restful), Android etc. * 3.0+Year Python Application, Open CV2, Face recognition, NPR, OCR, Django Framework AWS Server EC2, ECR, ECS, ECS, Docker Push, Docker Container and Application Development experience. * Strong Experience of AWS Server, EC2, Elastic Beanstalk, S3, ECR, ECS, Docker Container, Task Management, Docker Image, Load Balancer management etc. * Have good exposure of Google Cloud API, Office 365, Tracking & Google push Notification etc * Have Strong experience in WhatsApp API Integration with Python Application & LAMP Application.Ethical Hacking
Customer Relationship ManagementInformation SecurityCRM SoftwareSoftware DevelopmentSoftware - $21 hourly
- 0.0/5
- (0 jobs)
I am a Cybersecurity consultant having experience more than 7+ years. Worked on ISO frameworks such as ISO 27001:2022, ISO 27701, ISO 31000, ISO 27017 / 277018, ISO 9001:2015 , ISO 42001, ISO 20000, ISO 22301, ISO 50001 (Energy Management System), ISO 26000 (Corprtae Social Responsibility), ISO 28000 (Supply Chain), NIST CSF 2.0, NIST 800-53, NIS 2 , DORA, FEDRAMP , GDPR , SOC 2 Type 2 and many more. Top Clients worked for: Pfizer, Anaplan, Hitachi, Amazon, Capital One Bank, Lloyd, DLG Insurance , Volkswagen Group, Man Energy, Paytm Payments Bank, Religare Broking Limited, Mashreq Bank, Rothschild Bank, Vanguard Group, Blackrock India etc. I provide end-to-end service in Cybersecurity.Ethical Hacking
SOC 2 ReportData PrivacyVulnerability AssessmentNIST SP 800-53NIST Cybersecurity FrameworkFedRAMPGDPRISO 9001ISO 27017ISO 27001Risk AssessmentRisk ManagementComputer NetworkInformation SecurityGovernment Reporting Compliance - $11 hourly
- 0.0/5
- (0 jobs)
Results-driven Service Manager with over 17 years of experience in managing service operations, optimizing customer satisfaction, and leading high-performing teams. Proven expertise in implementing process improvements, resolving complex issues, and maintaining compliance with service-level agreements (SLAs). Adept at fostering strong client relationships and driving business growth through exceptional service delivery. Roles And Responsibilities * Business Requirements Analysis: Initiated business support application consolidation and now leading a global team of Business Application Support having team across India, France, Italy. Also managing outsourced support activities. * Cross-Functional Collaboration: Prioritize, track, and follow up on requirements with cross-functional teams such as operations, technology vendors, security, product, and hardware. * RPA - Solution Manager and product owner - Responsible for driving the RPA initiative,Ethical Hacking
DevOpsProblem SolvingArchitectural DesignArchitectureInformation SecurityGovernment Reporting ComplianceComplianceDatabase ManagementDatabase - $30 hourly
- 0.0/5
- (0 jobs)
Career Objective A dedicated and accomplished IT professional with over 15 years of experience in Microsoft Azure, Google Cloud Consulting, and various high-level cloud solutions. I seek to contribute to a progressive organisation by leveraging my expertise in cloud architecture, security, and application development, continuously striving towards innovation and excellence. Target Sectors: IT & Development Professional Summary * Cloud Architect with comprehensive experience in Microsoft Azure and Google Cloud Platform (GCP). * Certified in Azure (MCSE & MCSA) with a proven track record of consulting, designing, implementing, and planning cloud solutions. * Expertise in cloud-based application development, security assessments, and cloud infrastructure management. * Currently working with GenInvo as a Cloud Architect, managing high-level cloud infrastructure projects and security audits. Core CompetenciesEthical Hacking
DevOpsNetwork EngineeringProblem SolvingArchitectureComputing & NetworkingArchitectural DesignInformation SecurityComputer NetworkCompliance Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Certified Ethical Hacker near Noida, on Upwork?
You can hire a Certified Ethical Hacker near Noida, on Upwork in four simple steps:
- Create a job post tailored to your Certified Ethical Hacker project scope. We’ll walk you through the process step by step.
- Browse top Certified Ethical Hacker talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Certified Ethical Hacker profiles and interview.
- Hire the right Certified Ethical Hacker for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Certified Ethical Hacker?
Rates charged by Certified Ethical Hackers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Certified Ethical Hacker near Noida, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Certified Ethical Hackers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Certified Ethical Hacker team you need to succeed.
Can I hire a Certified Ethical Hacker near Noida, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Certified Ethical Hacker proposals within 24 hours of posting a job description.