Certified Ethical Hacker job description template

An effective description can help you hire the best fit for your job. Check out our tips to provide details that skilled professionals are looking for.

Trusted by


Tips for Writing a Certified Ethical Hacker Job Description

A certified ethical hacker is a professional who is skilled in the art of hacking and uses that skill to provide cybersecurity. An ethical hacker will identify potential security issues and weaknesses in a company’s network, then compile a report of where the vulnerabilities lie, so the company can fix the problems and prevent future breaches.

Below, we will cover a sample job description, exploring the daily responsibilities and necessary qualifications for a certified ethical hacker. 

The Job Overview

We are seeking a certified ethical hacker to help us secure our network against potential threats. You will be responsible for testing our company network, servers, and infrastructure to identify vulnerabilities.

As a certified ethical hacker, you will be required to know how to use network and security tools and have an expert-level understanding of computer and network security. This will include an understanding of topics related to encryption and cryptography.

Responsibilities

Below are some of the responsibilities a certified professional ethical hacker is expected to assume:  

    • Ethical hacking and penetration testing
    • Vulnerability assessment
  • Malware analysis
  • Work with other penetration testers and information security analysts
  • Web application security
  • Social engineering
  • Database security
  • Reverse engineering
  • Network security
  • Threat modeling and risk assessment
Job Qualifications and Skill Sets

Below are the qualifications expected of a certified ethical hacker:

  • Bachelor’s degree in computer science, information technology security, or related field
  • Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH)
  • Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
  • Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
  • Experience with common network infrastructure and security tools
  • Familiarity with web applications, including HTTP and SQL injection attacks
  • Knowledge of security testing methodologies in accordance with the EC-Council
  • Ability to work in a fast-paced environment
Certified Ethical Hacker Hiring Resources
Explore talent to hire
ar_FreelancerAvatar_altText_292
ar_FreelancerAvatar_altText_292
ar_FreelancerAvatar_altText_292

4.7/5

Rating is 4.7 out of 5.

clients rate Certified Ethical Hackers based on 1K+ reviews

Hire Certified Ethical Hackers

Certified Ethical Hackers you can meet on Upwork

Maher K.
$50/hr
Maher K.

Certified Ethical Hacker

5.0/5(61 jobs)
Beirut, BA
  • Trophy Icon Ethical Hacking
  • Research & Development
  • Software Development
  • MikroTik
  • Linux
  • Firewall
  • Juniper
  • Cisco Certified Network Professional
  • Penetration Testing
  • System Administration
  • CentOS
  • C
  • C#
  • Python
  • Cisco Router

I have a long list of experience in computer systems (enterprise, and personal), programming, networking (architecture, engineering, implementation, and administration), satellite communications, penetration testing, and other sectors of the information technology industry. I also have an extensive background in engineering and deploying low cost, high performance custom solutions which work as efficiently, if not more efficiently than commercial counterparts. I hold several certifications including CCNP. • Computer systems (software development, hardware design). • Website and web application development. • Research and development. • Systems security and penetration testing. • Network security and penetration testing. • Enterprise networking (border, core, and edge routers and switches). • Engineering, implementation, and administration of enterprise servers (DNS, cache, SMTP, POP/IMAP, and storage servers. CDN’s, NAS’s). • Data recovery and data forensics. • Basic and intermediate cryptography. • Smart, secure, innovative solutions to common and uncommon problems. Certifications: • Cisco Certified Specialist - Enterprise Core. • Cisco Certified Specialist - Enterprise Advanced Infrastructure Implementation. • Cisco Certified Network Professional Enterprise (CCNP). • RIPE NCC - Mutually Agreed Norms for Routing Security. • RIPE NCC - IPv6 Security Training Course. • RIPE NCC - DNS Operations/DNSSEC. • RIPE NCC - Advanced IPv6 Training Course. • RIPE NCC - Basic IPv6 Training Course. • SIAE MICROELETTRONICA - AGS-20 Equipment. I am also currently working on validating my expertise in Linux, Penetration testing, and network design with the following certifications: CISCO Designing Cisco Enterprise Networks (ENSLD) Comptia Linux+ Comptia Pentest+ Certified Ethical Hacker I also plan on validating my knowledge of Juniper systems with two certifications: Juniper Enterprise Routing and Switching, Specialist (JNCIS-ENT) Juniper Enterprise Routing and Switching, Professional (JNCIP-ENT)

...
Karvelle S.
$75/hr
Karvelle S.

Certified Ethical Hacker

4.9/5(62 jobs)
Jackson, MS
  • Trophy Icon Ethical Hacking
  • Cisco ASA
  • Cisco Router
  • Cisco Certified Network Associate
  • Cisco Certified Network Professional
  • Email Technical Support
  • VPN
  • VoIP
  • Firewall
  • VMWare
  • System Configuration
  • Cisco CallManager

Current Certifications: * CCENT ( Cisco Certified Network Technician ) * CCNA (Cisco Certified Network Admin (Routing & Switching)) * CCNP (Cisco Certified Network Professional (Routing & Switching)) * CCNA-SECURITY (Cisco Certified Network Security Admin) * SECURITY+ CE (CompTIA Certified SECURITY) * CEH (Certified Ethical Hacker) I am a Sr. Network and Security Engineer (SME) with expertise in Cisco Network Engineering and Cyber Security Engineering with year of I.T. experience managing private and government enterprise networks and Cyber security Network environments for large and small businesses . I have over 18+ years total experience as a lead Sr. network engineering SME as my foundation , and 9 yrs experience in Cyber Network Security infrastructure , design, configurations, troubleshooting, Cyber threat hunting. Also upgrading enterprise networks and security infrastructures for private companies , government organizations , including large and small business Networks and information systems. These skills include SME experience in Cisco Routing and Switching, ASA Firewalls, Palo Alto, Pfsense , VPNs, F5 Load balancer, WLAN, VoIP, and Cyber Security tools and SIEMS and Network Scanning, Windows Server, and WiFi networks.

...
Andrew K.
$35/hr
Andrew K.

Certified Ethical Hacker

5.0/5(13 jobs)
Lusaka, LUSAKA
  • Trophy Icon Ethical Hacking
  • Encryption
  • Incident Response Plan
  • Automated Testing
  • Malware Removal
  • Web Application Security
  • Internet Security
  • Web Testing
  • Database Security
  • Network Security
  • Network Penetration Testing
  • System Security
  • Information Security
  • Vulnerability Assessment
  • Kali Linux

PLEASE NOTE: I DO NOT AND WILL NOT ENGAGE IN ILLEGAL AND UNETHICAL HACKING JOBS. ALL ILLEGAL AND UNETHICAL JOBS SHALL BE REPORTED TO UPWORK Experienced cyber security professional with a demonstrated history of working in the computer and network security industry. Skilled in Computer Forensics, Ethical Hacking, Malware Analysis, Vulnerability Assessment, and Penetration Testing. Strong information technology professional with a Bachelor's degree focused in Information Security and Computer Forensics from information and communication university. Certified Ethical Hacker from EC-Council.

...
Anurag A.
$30/hr
Anurag A.

Certified Ethical Hacker

5.0/5(19 jobs)
Kathmandu, PROVINCE 3
  • Trophy Icon Ethical Hacking
  • Vulnerability Assessment
  • Penetration Testing
  • Database Security
  • Network Security
  • Security Testing
  • Firewall
  • Encryption
  • Metasploit
  • WordPress
  • WordPress Malware Removal
  • Security Management
  • Python
  • Risk Assessment
  • Malware

I’m a Computer Science Graduate working as a Security Engineer. I am also a Certified Ethical Hacker and a Certified Professional Penetration Tester. I love everything that has to do with Cyber Security. I have nearly six years of experience working as a freelancer and have worked on different projects from different categories. My other development projects usually include Python Projects and Automation. I have been studying and learning on my own. I love working with people, especially if they have the same passion for what they do. 🎓 Computer Science Graduate 🔐 Security Engineer with 5+ years of Experience 🎖️ EC Council Certified Ethical Hacker (Practical) CEH 🎖️ eLearnSecurity Certified Professional Penetration Tester (eCPPTv2) 🎙️ TEDx Organizer (Technical Lead) 🎖️ Microsoft Hall of Fame 👨‍💻 Worked as a Security Engineer and Security Analyst in a large Corporate 🎖️ Top 1% on Try Hack Me 🎖️ Freelancing Since 2013 You can count on me if you need the following: ✅ The analysis of the security posture of your Organization, Servers, Websites, Endpoints, etc. ✅ Malware Analysis and complete Incident Management for any incidents ✅ Need good reports for Senior Management and Technical teams like Developers, SysAdmins ✅ Solutions to website/server being hacked by an adversary/hacker ✅ Recommendations and best practices for a sustainable term ✅ Deep Penetration testing and vulnerability analysis of a Website/Server/App etc. ✅ Anything related to ethical Security ✅ Server issues troubleshooting ✅ Website Deployment / Hardening [PHP, Nodejs, Laravel, React, etc.] ✅ SSL issues troubleshooting Infosec Skills: 🌟 Penetration Testing 🌟 Vulnerability Assessment 🌟 Scripting through Python, Powershell, and Bash 🌟 Malware Analysis 🌟 Source code analysis for vulnerabilities 🌟 Experience with corporate tools and SIEMs 🌟 Linux, Windows, iOS, Android, and IoT Penetration testing and security analysis 🌟 Extensive reporting 🌟 DevSecOps skills Please DO NOT contact me if: ❌ You need to hack/retrieve social media accounts ❌ You need to seek revenge through hacking ❌ Illegal or unethical activities Please make sure you message me initially before initiating a contract. I understand that some of my clients do not have the expertise and have less knowledge in this field. So, I am ready to initially help you understand your queries for FREE and will be happy to proceed.

...
Waleed O.
$6/hr
Waleed O.

Certified Ethical Hacker

5.0/5(12 jobs)
Kuwait City, KU
  • Trophy Icon Ethical Hacking
  • Quality Assurance
  • Risk Analysis
  • Information Security
  • Web Application Security
  • Digital Forensics
  • Better Mobile Security Better
  • Security Analysis
  • Penetration Testing
  • Risk Assessment
  • Cybersecurity Management
  • Internet Security
  • ISO 27001
  • Cybersecurity Management

I am working as Information Security Officer, AI Expert, and Application developer for over 2 years, I can help to resolve most cybersecurity issues in an organization with almost any network device vendor, administer Windows and Linux server environments from one small business office to large enterprises with multiple locations internationally. i have developed the trouble isolation and resolution skills necessary system and network engineering and administration. As an information security expert in standards like OWSAP, PCI, NIST, HIPAA, ISO-27001, I can also help recommend and provide guidance to secure all aspects of data and network integrity, by providing assessments and audits of current environments. After all these years of technical experience, In addition to my technical operational experiences I have worked as Web and Game developer for android and Microsoft based platforms. I would like to help a small and medium-sized business achieve the security postures the larger companies obtain on a much smaller budget. I have also done my research work in digital forensics at proven my skill to highlight the issues and resolve them More often also worked in the field. - Application Security -Incident Management / Incident Response / Breach Response -Identity Management and Access control -Security Operations Center (SOC) - Governance Risk and Compliance (GRC) -Business requirements mapped to IT technologies and security for maximizing revenues and operational efficiency Certification and Skills • CEH Master of Science in Information Security

...
Neamul Kabir E.
$30/hr
Neamul Kabir E.

Certified Ethical Hacker

5.0/5(58 jobs)
Dhaka, C
  • Trophy Icon Ethical Hacking
  • Virus Removal
  • Network Security
  • Internet Security
  • Web Application Security
  • Security Assessment & Testing
  • Cybersecurity Management
  • Security Testing
  • Digital Forensics
  • Vulnerability Assessment
  • Web App Penetration Testing
  • Website Security
  • Information Security
  • Penetration Testing
  • Network Penetration Testing

✅ Certified Ethical Hacker (CEH) ✅ Penetration tester! ✅ Top Rated! ✅ It's Me Neamul Kabir Emon, I am a Certified Ethical Hacker(CEH) and Professional Penetration tester an expert in Web, API, Android, and iOS Application Penetration testing. I will provide you cybersecurity plan to protect all your websites, computers, Mobile phone, and online accounts. Protect your online business by testing the Security/ Penetration testing of your website to discover all the security vulnerabilities before cybercriminals exploit them! I will conduct a complete Penetration testing & security review of your web, Android & iOS application. Ethical hackers can hack computer systems like black hat hackers and secure them like security experts & Ethical hackers.Are you worried about the security of your system? Globally, 30,000 websites are hacked daily & 64% of companies worldwide have experienced at least one form of a cyber-attack. Are you next? A lot is lost when a system is breached or hacked. Systems go down, data gets leaked, customer trust is lost…etc, this adds up to a huge cost. All this can be avoided by hiring me to test the security as a Penetration tester of your system(s). Secure your System, Website, Server & Application from hackers using my Penetration testing service before it is too late. Build trust in your business’s security with a comprehensive Penetration test. Fix every single vulnerability before it hurts your business and achieves your compliance goals, with my comprehensive Penetration Testing and Cyber Security Service. In my deliverables, I create Professional Penetration testing reports detailing each vulnerability I find, proofs-of-concept, and solutions to how you fix those vulnerabilities. Provide The Right Way To Prevent Vulnerabilities and Protect your web application, Network, and System from hackers. Service Description: ★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★ ✅Web-Application Penetration Testing based on OWASP TOP 10 ✅Ethical Hacking : ★Securing mobile & PC ★Running Penetration tests for vulnerabilities ★Providing security from hackers ✅Hacking and Pentesting Android Applications ✅Hacking and Pentesting iOS Applications ✅Network Penetration Testing / Hacking ✅Hacking and Penetration testing API (Application programming interface) ✅Clean malware-hosting server. ✅protect your online accounts from hackers. ✅wordpress protection solution. ✅Social Engineering attacks test for an organisation.. ✅Malware Threats Analysis: ★Dissecting Malicious Software ✅Location Tracking ✅Vulnerability Analysis ✅SQL Injection Web Attacks test ✅Computer Forensics Investigation ★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★ ⭐ Why you should choose me over other freelancers ⭐ ✅ Client Reviews: I focus on providing value to all of my clients and earning their TRUST. ✅ Over-Delivering: this is core to my work as a freelancer. My focus is on giving more than what I expect to receive. I take pride in leaving all of my clients saying "WOW" ✅ Responsiveness: being extremely responsive and keeping all lines of communication readily open with my clients. ✅ Resilience: reach out to any of my current or former clients and ask them about my resilience. For any issue that my clients face, I attack them and find a solution. ✅ Kindness: one of the main aspects of my life that I implement in every facet. Treat everyone with respect, understand all situations with empathy, and genuinely want to improve my client's situations. The 🏆Client Review🏆 below which you will find in my reviews section and numerous others like it describes the quality of work and value that you can expect from working with me: ⭐⭐⭐⭐⭐"Neamul is very intelligent and smart in his work. He understood my requirements in one go and provided me with the desired result. I must say he knows well about cyber security and Penetration testing protection.⭐⭐⭐⭐⭐...."." ⭐⭐⭐⭐⭐" Emon is the truth!!!!! YOU DO HAVE ENOUGH STARS TO RATE HIS SERVICE PERIOD...10 STARS IS MY RATING. I DO GIVE THAT TO JUST ANYONE PERIOD. He Walks me through my process of what and how he was going to do it and asked for 3 days and got it done the next day. It is a very detailed report and all info was right on point" ⭐⭐⭐⭐⭐ ⭐⭐⭐⭐⭐"He is very intelligent and smart in his work. He understood my requirements in one go and provided me with the desired result. I must say he knows well about cyber security/Penetration Testing and protection. Looking for to working on more projects together. I Highly Recommend Kabir...."⭐⭐⭐⭐⭐

...
Dan T.
$25/hr
Dan T.

Certified Ethical Hacker

0.0/5(1 job)
Tecuci, GL
  • Trophy Icon Ethical Hacking
  • Python
  • CSS
  • Kali Linux
  • JavaScript
  • Java
  • Jenkins
  • Bash Programming
  • Computing & Networking
  • Ansible
  • Adobe Experience Manager
  • Terraform
  • Amazon Web Services
  • Unity
  • C#

Hello ! I'm a junior DevOps and a certified Junior Penetration Tester. Now I'm working as a DevOps Engineer and I have knowledge in technologies like AWS, Terraform, Ansible, Jenkins and Adobe Experience Manager, as I'm working with those everyday. Beside that, my great passion is the CyberSecurity field and I spend the most of my free time on platforms like TryHackMe and HackTheBox, daily discovering new vulnerabilities and new ways to exploit them.

...
Umair U.
$45/hr
Umair U.

Certified Ethical Hacker

4.7/5(166 jobs)
Karachi, SD
  • Trophy Icon Ethical Hacking
  • Python-Goose
  • Network Administration
  • Penetration Testing
  • Fortinet Technologies
  • Network Security
  • Cybersecurity Management
  • Web App Penetration Testing
  • Malware
  • Security Testing
  • Security Engineering
  • C++
  • Android
  • Computer Science
  • Amazon EC2

I am Umair Muhammad, with 10+ years of experience managing organizational security for external threats and risks, I look forward to bringing my exceptional technical, analytical, and problem-solving skills. From implementing effective cybersecurity plans to delivering proactive information security and threat management services to large organizations, I’m adept at maintaining optimal security and business continuity. In my current role as Cyber Security Engineer for Value Stream Engineering, I keep the security of 300+ network users to protect against unauthorized modification, destruction, and disclosure. Please consider the following highlights of my career: • Detected and removed over 250 new viruses and malware while safeguarding and observing more than 60 websites without any major attacks • Reduced security risks by 20% by installing physical access controls • Implemented a multi-layer security system for the institution, including enhanced anti-virus, anti-spam, and anti-spyware software, which reduced malware risk by 47% • Penetration testing projects success rate is 87% where I have penetrate and much I’m confident that my strengths in cyber security planning, information security, and IT operations will help maintain a 100% risk-free environment. Certifications: Cisco Certified Network Associate (CCNA Routing & Switching) Cisco Certified Network Professional (Routing & Switching & Security) Certified Ethical Hacking (Penetration Tester) Cisco Certifed Network Associate (Cyber Ops)

...
Ajit H.
$10/hr
Ajit H.

Certified Ethical Hacker

4.4/5(7 jobs)
Barishal, BANGLADESH
  • Trophy Icon Ethical Hacking
  • Python
  • Virus Removal
  • Website Security
  • Information Security Audit
  • Security Analysis
  • Recover Data Recovery Software
  • Vulnerability Assessment
  • Digital Forensics
  • Security Testing
  • Cybersecurity Management
  • Malware Removal
  • Kali Linux
  • Penetration Testing

Hello, I'm a Certified Ethical Hacker and also a highly experienced & qualified penetration tester and malware Removal with Six years of professional specialist. I can test the below vulnerability and give you a report about your website security. I still ensure a flexible, efficient, and cost-effective Security service. With My services here, • Server Security Misconfiguration • Sensitive Data Exposure • Vulnerability Assessment • Broken Authentication and Session Management • Cross-Site Scripting (XSS) • Ethical Hacking • Digital Forensic • Information Security • Linux & Windows Administration • Server-Side Injection • Cross-Site Request Forgery (CSRF) Expert In 1. Application Penetration Testing with the recommendation for remediation 2. Complete security assessment of Application with the recommendation for remediation 3. Cloud (AWS) infrastructure complete vulnerability assessment, security & penetration testing with the recommendation for remediation 4. Static and Dynamic code analysis (SAST & DAST) with the recommendation for remediation 5. Reconnaissance - Open Source Intelligence (OSINT) using Datasploit, Spiderfoot, Buscador, Maltego, Recon-ng, Shodan, the harvester, etc. 6. API Security 7. Malware, Phishing, Breach, data leakage detection 8. Firewall audit and configure 9. Security and penetration testing trainer 10. Android and iOS application vulnerability detection and security testing CMS Security Expert 1. WordPress Theme, Plugin Virus, Malware detection, and removal expert 2. Joomla Theme, Plugin Virus, Malware detection, and removal expert 3. Magento Theme, Plugin Virus, Malware detection, and removal expert 4. Drupal. woo-commerce security expert including PCI-DSS compliance audit Why trust me? • Two Couple of Years of Experienced • Flexibility • Express Delivery in Few Time • My 1st goal is Customer Satisfaction • 100% accurate with safety work. • Any time contact with me Note: If you have any questions, please get in touch with me. I will be happy to assist you. Kind Regards, Ajit

...
Umar A.
$30/hr
Umar A.

Certified Ethical Hacker

5.0/5(36 jobs)
Lahore, PB
  • Trophy Icon Ethical Hacking
  • Network Security
  • Database Security
  • Penetration Testing
  • Metasploit
  • Malware Removal
  • VPN
  • ISO 27001
  • WordPress Malware Removal
  • VoIP
  • Virus Removal
  • Source Code Scanning
  • Website Security
  • Computer Network
  • Security Assessment & Testing
  • Black Box Testing
  • Red Team Assessment
  • Information Security Consultation

I'm a Red Teamer/Senior Penetration Tester. I've worked on external/internal network infrastructure Penetration tests, web applications, system and mobile applications Red Teamer Ethical Hacker Web/network/system penetration tester Information Security SSL Pinning Bypass Lateral movement Pivoting Penetration Testing Secure intranet Implementation Hacking SQL Injection VPN Development / Remote Environment VOIP Networking Socket Server Communication (RAT) Reverse Engineering Reverse Proxy Proxy Chains TOR Nodes Deployment System Malware Removal Website Malware Removal WordPress Malware Removal Windows Customization Linux Customization Pre-install Windows environment My Certifications Certified Professional Penetration Tester (eCPPTv2) Certified Red Team Professional (CRTP) ISO 27001 (INTERNAL AUDITOR) Lead Cybersecurity Professional - LCSPC™ CERTIFIED ETHICAL HACKER (CEH) Cyber Security Foundation Professional - CSFPC™ Alibaba Cloud Computing

...
Steffin S.
$30/hr
Steffin S.

Certified Ethical Hacker

4.9/5(32 jobs)
Kozhikode, KL
  • Trophy Icon Ethical Hacking
  • System Security
  • Vulnerability Assessment
  • Security Testing
  • Web App Penetration Testing
  • Website Security
  • Penetration Testing
  • Application Security
  • Web Application Security
  • Security Assessment & Testing
  • Security Engineering
  • Network Security
  • Black Box Testing
  • Information Security
  • Network Penetration Testing

✅ I am an experienced penetration tester with 3+ years of expertise in Web Application Security, Infrastructure Security, OSINT, API testing, and Python scripting. I have a strong track record of helping businesses improve their overall security through security assessments and bug bounties. ✅I have obtained various certifications such as OSCP and OSWP, and I have received numerous Hall of Fame and bug bounties from various sites for discovering bugs in their web applications. ✅I'm currently employed as a Penetration Tester and Bug Bounty Hunter, performing web application and network security assessments. ✅Have been acknowledged by Microsoft, the United States Department of Defense, Sony, Nokia, Asus, Lenovo, and others. ( Proof links given in the bottom section of the page ). ✅I have performed penetration tests, and vulnerability assessments, and delivered professional reports to companies all over the world in accordance with: ► Offensive Security (OSCP) standards ► OWASP Top 10 Vulnerability ► OWASP API Security Top 10 Vulnerability ► OWASP Mobile Security Top 10 Vulnerability ► Application Security Verification Standard 4.0 (ASVS 4.0) ► CWE Top 25 Most Dangerous Software Errors ► ISO 27001 Penetration Testing ► Payment Card Industry Data Security Standard (PCI DSS) ► General Data Protection Regulation (GDPR) ► Common Vulnerability Scoring System (CVSS) ► Open Source Security Testing Methodology Manual (OSSTMM) ✅ Cybersecurity Certifications Achieved: ► Offensive Security Certified Professional (OSCP) ► Offensive Security Wireless Professional (OSWP) ► Offshore Pro Labs ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ► Executive Summary ► Assessment Methodology ► Type of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings. Each findings listed within the report will contain a CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ► Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, Zaproxy, Gobuster, etc.) Participant in the "HackerOne Bug Bounty Platform" and the "Synack Red Team Platform" Web Penetration Testing | Network Penetration Testing | API Security | Vulnerability Assessment | Crypto Security | Crypto Mining My Expertise: Web Application Security Testing Penetration Testing Vulnerability Assessment.

...
Josphat S.
$30/hr
Josphat S.

Certified Ethical Hacker

5.0/5(7 jobs)
Nairobi, NAIROBI AREA
  • Trophy Icon Ethical Hacking
  • Information Security
  • Firewall
  • System Security
  • Malware
  • Network Security
  • Security Information & Event Management
  • Reverse Engineering
  • Penetration Testing
  • Vulnerability Assessment
  • Network Engineering
  • Active Directory
  • Computer Network
  • Incident Response Plan
  • Application Security
  • Web App Penetration Testing

Qualified and Certified Information Systems Security expert with a solid academic background and a comprehensive skill-set underpinned by enthusiasm and diligence in delivery of tasks. I hold a bachelor's of science in Computer science from University of Nairobi, Certified Ethical Hacker from E Council University, Huawei Networks Security Associate, Palo Alto Networks Cybersecurity certificate, proactive computer security from University of Colorado Systems & managing successful projects with PRINCE2. I have gained 3 years of experience in vulnerability management, SOC analysis, IT security policy and procedures, penetration testing, network infrastructure security and ahead of latest cybersecurity techniques and attacks. I’m versatile team player willing to quickly learn and adapt as well as support other team members.

...
Md.Tauhidul I.
$30/hr
Md.Tauhidul I.

Certified Ethical Hacker

4.3/5(30 jobs)
Rajbari, RANGPUR DIVISION
  • Trophy Icon Ethical Hacking
  • Web Testing
  • Information Security
  • Security Engineering
  • Reverse Engineering
  • Penetration Testing
  • Manual Testing
  • Smoke Testing
  • Website Security
  • User Acceptance Testing
  • Network Penetration Testing
  • Security Testing
  • Web Application Security
  • Security Analysis
  • Software QA
  • Malware Removal

You want to hire a reliable, experienced, professional, and educated individual to handle Cyber Security, Penetration Testing, and general IT Security planning for your business. If that’s what you are looking for, then I am your guy! As an experienced Cyber Security Consultant and Expert Penetration Tester and Certified Ethical Hacker, I have the knowledge and experience to help you discover just how attackers can get into your network. I am a Cybersecurity professional with over 8 years of experience in the field working in various positions for multiple Fortune 100 companies and large IT Firms. Positions held include: Cybersecurity consultant & Penetration Tester, Senior Cybersecurity Engineer, Information Security Analyst, Mobile Security Analyst, and Systems Engineer. My education can be summed up as follows: *Bachelor's Degree in Computer Science & Engineering with a concentration in Information Security *Master's Degree in Computer Science & Engineering. *Certified Ethical Hacker Certification I am skilled in the following: -Server Security Misconfiguration -Broken Authentication and Session Management -Sensitive Data Exposure -Insecure OS/Firmware -Broken Cryptography -Automotive Security Misconfiguration -Sensitive Data Exposure -Cross-Site Scripting (XSS) -Broken Access Control (BAC) -Cross-Site Request Forgery (CSRF) -Application-Level Denial-of-Service (DoS) -Insecure OS/Firmware -Server-Side Injection -Client-Side Injection -Sensitive Data Exposure -Malware Detected -Location Tracking You also need someone who has the technical and non-technical skills required to protect your company. So if you are ready to secure your network, conduct a Penetration test, build a cybersecurity plan, or do anything else cybersecurity related, please do not hesitate to reach out to me! Thanks for reading this far and I am looking forward to working with you.

...
Muhammad Khizer J.
$69/hr
Muhammad Khizer J.

Certified Ethical Hacker

5.0/5(8 jobs)
Lahore, PB
  • Trophy Icon Ethical Hacking
  • Network Penetration Testing
  • Web Application Security
  • Penetration Testing
  • Security Analysis
  • Cybersecurity Management
  • Information Security Audit
  • Website Security
  • Security Engineering
  • Open Web Application Security Project
  • Web App Penetration Testing
  • Security Information & Event Management
  • Information Security Consultation
  • Security Management
  • Vulnerability Assessment

As a certified cybersecurity professional with over six years of experience, I am skilled in web and mobile application penetration testing, vulnerability assessments, and information security consulting. My work as a bug bounty hunter and penetration tester has earned me recognition from top companies such as Apple, Microsoft, Facebook, Government of Singapore and the US Department of Defense. I am also an active participant on the HackerOne and Bugcrowd platforms, consistently delivering high-quality results in the areas of web application security testing, Android application security testing, and vulnerability assessment. Whether you're looking for a comprehensive security review or targeted testing, I'm here to help keep your business safe and secure. In addition to testing services, I also offer information security consulting to help you navigate the ever-evolving landscape of cybersecurity threats.

...
Dwayne T.
$150/hr
Dwayne T.

Certified Ethical Hacker

5.0/5(13 jobs)
Crestview, FL
  • Trophy Icon Ethical Hacking
  • Web Design
  • Information Security Governance
  • IT Compliance Audit
  • Information Security Consultation
  • Network Security
  • Certified Information Systems Security Professional
  • Information Security Awareness
  • Regulatory Compliance
  • Compliance Consultation
  • Information Security Audit
  • Vulnerability Assessment
  • HIPAA
  • Information Security
  • Network Analysis
  • Security Infrastructure
  • Data Protection

Specialist in IT implementation and system security management across numerous sectors, to include audit and compliance management with numerous frameworks including FISMA, SOX, SOC, PCI DSS, HIPAA, HITECH, GDPR, IASME, CIS, DOD RMF, and NIST Risk Management Framework. Recognized expert at designing complex IT architectures, policy creation and enforcement, and developing dynamic and tailored security programs; balancing business operations with IT operations and cyber-security. Degrees: Master in Business Administration (concentration in IT Security), Bachelor of Science, IT Management Certifications: Certified Information System Security Professional - Information Security System Engineering Professional (CISSP-ISSEP) Certified Information System Security Professional (CISSP) Certified Information Systems Auditor (CISA) Certified Ethical Hacker (CEH) IT Infrastructure Library (ITIL) Languages: English, German

...
Thomas R.
$60/hr
Thomas R.

Certified Ethical Hacker

4.9/5(134 jobs)
Wiener Neustadt, LOWER AUSTRIA
  • Trophy Icon Ethical Hacking
  • Penetration Testing
  • Internet Security
  • Information Security
  • Network Security
  • Certified Information Systems Security Professional
  • Security Analysis
  • Application Programming
  • Java
  • Wireless Security
  • Internet Security

In the last years I did more than 100 Penetration-Tests and Security Assessments. Most of them on Web and Mobile applications with Finance Background implemented with various technologies and frameworks. (J2EE, ASP, PHP). Based on my daily work I am experienced with all common attack vectors and mitigation techniques. Since 2009 I am CISSP (Certified Information Systems Security Professional) and since 2017 I am CEH (Certified Ethical Hacker) certified. Please check also my UPWORK work history and client feedbacks. I am offering professional Black and Grey-box Penetration tests for Web and Mobile Applications. Sorry, I am not able to locate your girlfriend, recover your lost FACEBOOK, GMAIL, YAHOO etc. account or find your lost phone. Please do not invite me to such jobs. Before I start offensive tests, I may ask you for evidence that you are the site owner or to show me that you have admin access.

...
Muhammad A.
$25/hr
Muhammad A.

Certified Ethical Hacker

5.0/5(19 jobs)
Rahim Yar Khan, PB
  • Trophy Icon Ethical Hacking
  • Malware
  • Network Penetration Testing
  • Penetration Testing
  • Web Application Security
  • Security Information & Event Management
  • Security Operation Center
  • Vulnerability Assessment
  • Security Testing
  • Information Security Consultation
  • Network Security
  • Application Security
  • Writing
  • Copywriting
  • Website Content

You want to hire a reliable, experienced, professional and educational individual to handle Cyber Security ,Penetration Testing ,Network Security Testing, API Security or HIPAA Compliance and general IT Security Planning for your business . If that you are looking for, then I am your guy! As an experience in Cyber Security Consultant and Presentation Tester and Certified Ethical Hacker , I have experience and knowledge to help you discover just how attackers can get into your network. Multiple international corporations with 10,000-20,000 employees have trusted me to ensure there Internal and external security Testing and InfoSec Audit.

...
Florjan L.
$30/hr
Florjan L.

Certified Ethical Hacker

5.0/5(397 jobs)
Tirana, TIRANË
  • Trophy Icon Ethical Hacking
  • Security Infrastructure
  • Manual Testing
  • Security Assessment & Testing
  • Penetration Testing
  • Application Security
  • Open Web Application Security Project
  • Windows Server
  • Vulnerability Assessment
  • NIST SP 800-53
  • Kali Linux
  • Network Security
  • Internet Security
  • Web Application Security
  • Security Engineering

Certifications that I hold: CEH ( Certified Ethical Hacker) 740 MCSA ( Installation, Storage and Compute with Windows Server 2016) To whom it may concern, In the last years I did more than 300 Penetration Tests and Security Assessments. Most of them on Web and Mobile ( Android and iOS ) applications with Finance Background implemented with various technologies and frameworks, server security testing and hardening. Sample reports can be provided who is interested. ___________________________________________________________ Professional Load and Stress Testing if you are interested for your application ___________________________________________________________ Migration of infrastructure among cloud solutions ( AWS , Azure , Office 365, Google cloud). Many of you struggle to shift your infrastructure from On-premise to Azure , AWS ( amazon) or vice versa , I can do it in a short time frame with zero downtime if there is a possibility. And offer you support as long as you and your team are self reliable on new infrastructure. Regarding Windows Server Services ,I am focused on Microsoft enterprise-driven solutions: Windows Server( Active directory,IIS ,DNS, DHCP ,WDS , Hyper-V, Backup, Exchange, RPD farming) Expert troubleshoot Server Hardening and securing Windows and Linux servers. Monitoring software setup ( PRTG Paesler ,Nagious , Zabbix) Keen on Deadlines, fair on doing business together always ready to negotiate price

...
Alde A.
$15/hr
Alde A.

Certified Ethical Hacker

4.7/5(36 jobs)
Padang, WEST SUMATRA
  • Trophy Icon Ethical Hacking
  • WordPress
  • Cisco Certified Network Associate
  • Learning Management System
  • Amazon EC2

I have experience of 8 years in a different IT project. I can contribute to your project with the following skills: Cybersecurity Specialist, Cloud Solution Architect, Linux System Administrator, and DevOps, I bring high standards, tried and tested methodology with industry standard tools and techniques to deliver you professional results. I hold few certification such as : Certified Ethical Hacker (CEH); Certified Threat Intelligence Analyst (CTIA) Certified Cisco Cyber Ops Associate Seco-IT-Security Practitioner (S-ITSP) Seco-Ethical Hacking Practitioner (S-EHP) Alibaba Cloud Associate : Cloud Security (ACA) Alibaba Cloud Associate : Cloud Computing (ACA) If you are looking for a Cyber Security Enthusiast, Cloud Solution Architect, Linux System Administrator and DevOps feel free to contact me.. I look forward to hearing from you!

...
Abhisek R.
$30/hr
Abhisek R.

Certified Ethical Hacker

3.1/5(13 jobs)
Jalpaiguri, WEST BENGAL
  • Trophy Icon Ethical Hacking
  • Web App Penetration Testing
  • Vulnerability Assessment
  • Penetration Testing
  • Information Security Consultation
  • Security Testing
  • Security Analysis
  • Information Security Audit
  • Information Security Awareness
  • Metasploit
  • Kali Linux
  • Ubuntu
  • API Testing
  • Network Penetration Testing
  • Web Application Security

Hello, my name is Abhishek from India. I hold industry accredited certification OSCP (Offensive Security Certified Professional) by Offensive Security. Besides OSCP I have also an OSCE(Offensive Security Certified Expert) certificate and preparing for CSSLP (Certified Secure Software Lifecycle Professional). I am a Security Researcher, Ethical Hacker, Penetration Tester and part-time Bug-Bounty hunter. I have performed 300+ applications in the domain of the ITES, Energy and BFSI sector with prestigious clients. I have almost 6 years of experience in information security services with several Multi-National Companies. My current organisation is BIP(Milan, Italy), where I’m working as Sr. Security Consultant. I see your project which is similar to my work and my education, Here are all my expertise and skills • Strong exposure in providing consultancy on Information Security standards, regulations & best practices, vulnerability findings and policy non-compliance remediation. • In total Consultant has handled around 300+ projects in web application security, vulnerability assessments, network audits, penetration testing, information security, code review, source code review and ethical hacking. • Conducting systematic web application security assessments and penetration tests. The assessments involve manual testing and analysis as well as the use of automated web application vulnerability scanning/testing tools. • Conducted External/Internal vulnerability assessment, penetration testing. • Application Security Assessment for aide range of business applications: 200+ web applications in ITES/BFSI domain against Standards such as OWASP Top 10. • Proficient in understanding and executing application-level vulnerability attacks like - XSS (Cross-Site Scripting), SQL injection, CSRF (Cross-Site Request Forgery), Response Splitting, Session Hijacking, Variable Manipulation, Privilege escalation, Authorization Bypass, Weak Cryptography, Authentication flaws, Design level vulnerabilities etc. • Contributes towards the preparation and authorizes the implementation of necessary information security policies, standards, procedures and guidelines that include Windows, Linux, AIX, HP-UX, Oracle and MSSQL databases, IIS and Apache Web servers. Easily able to research a network, identify vulnerabilities and successfully execute attacks. This often includes modifying exploit code with the goal to compromise systems and gain administrative access and identify existing vulnerabilities and execute organized attacks in a controlled and focused manner, write simple Bash or Python scripts, perform network pivoting, data exfiltration and compromise poorly written web applications. • Passive Information Gathering • Active Information Gathering • Vulnerability Scanning • Buffer Overflows • Win32 Buffer Overflow Exploitation • Linux Buffer Overflow Exploitation • Working with Exploits • File Transfers • Privilege Escalation • Client-Side Attacks • Web Application Attacks • Password Attacks • Port Redirection and Tunnelling • The Metasploit Framework • Bypassing Antivirus Software • Debugging Windows binaries • Working through encoding issues and space restrictions while crafting exploits • Understanding PE structure to learn techniques that backdoor executables and bypass AV • Familiarity with more advanced protections like ASLR • Using creative and lateral thinking to achieve an expanded view of standard vectors • Thinking outside the box to determine innovative ways of penetrating internal network If you are interested in discussing an engagement, please reach out to me via the platform, and we can discuss what services would work best for your organization.

...
Md.Repon H.
$10/hr
Md.Repon H.

Certified Ethical Hacker

4.8/5(39 jobs)
Kushtia, KHULNA
  • Trophy Icon Ethical Hacking
  • WordPress
  • Virus Removal
  • Penetration Testing
  • Information Security
  • Web Application Security
  • Malware Removal
  • Digital Forensics
  • Kali Linux
  • System Security
  • Cybersecurity Tool
  • Vulnerability Assessment
  • Malware
  • Network Security
  • WordPress Malware Removal
  • Security Analysis

I specialize as a Certified Ethical hacker, Cybersecurity Specialist as well as penetration Tester. I have these Cybersecurity Certifications & Training: **************************************************** ==Juniper Networks Certified Associate (JNCIA-Security) ==ICSI | CNSS Certified Network Security Specialist (International Cybersecurity Institute, UK) ==Juniper Networks Certified Associate (JNCIA- Junos) ==The Complete Python Hacking (EC-Council) ==Computer Networks Security from Scratch to Advanced (EC-Council) Ethical hacker, Cybersecurity Specialist as well as penetration Tester Tools and Services: ********************************************** ==Security Operation Center (Splunk, SIEM). ==Security Incident Response, Vulnerability Management & Risk Assessment. ==Incident Response, Threat Hunting using Splunk. ==Cryptography, Steganography, Digital Forensics, Mobile Application Testing, Web-Pentestng, ==Reverse-Engineering, Osint. ==Ethical Hacking, Web-Penetration Testing, Networking, CTF Player. ==Network Pentestng, Social Engineering, Dark Web Privacy Security. == Metasploit, Nmap, Wpscaner, Burp-suite, Zap, Autopsy, Wireshark, Gobuster, Dirsearch, Hydra, Postman. CMS Security Expert: ************************ ==WordPress Theme, Plugin Virus, Malware detection, and removal expert ==Joomla Theme, Plugin Virus, Malware detection, and removal expert == Drupal. woo-commerce security expert == Magento Theme, Plugin Virus, Malware detection, and removal expert In addition to my technical skills, I have excellent communication skills and can clearly articulate my findings and recommendations to clients. I am reliable and always strive to deliver high-quality work on time and on budget. I assure you that customer satisfaction & Guarantee is my top priority. Have Questions or Doubts? Hit Inbox ANYTIME. Regards Md. Repon Hossen

...
Luca F.
$70/hr
Luca F.

Certified Ethical Hacker

5.0/5(51 jobs)
Valdagno, VENETO
  • Trophy Icon Ethical Hacking
  • Penetration Testing
  • Web App Penetration Testing
  • Vulnerability Assessment
  • Information Security
  • Web Application Security
  • Network Security
  • Information Security Audit
  • Application Security
  • Security Analysis
  • Security Infrastructure
  • System Security
  • Database Security
  • Security Testing
  • Internet Security
  • Cloud Security

Hi All! I am an experienced IT Security Specialist with over 9 years of experience. I am a Certified Ethical Hacker (CEHv9) and an OSCP Certified Tester. My core competencies are Security Assessments and Penetration Test. My job is to increase the security of all of your IT Resources and to help you to find corrective solutions to protect your business. My specialties are: ✅ Web Application Penetration Testing ✅ Network Penetration Testing ✅ Mobile Application Penetration Testing ✅ Security Audits ✅ Vulnerability Assessments ✅ Dynamic Code Analyses ✅ Infrastructure Penetration Test If you are looking for a Cyber Security Enthusiast click the green "Invite" or "Hire Now" button at the top of the page to contact me now! I look forward to hearing from you! Thanks.

...
Payton G.
$75/hr
Payton G.

Certified Ethical Hacker

5.0/5(14 jobs)
Adelphi, MD
  • Trophy Icon Ethical Hacking
  • Penetration Testing
  • Customer Service
  • Vulnerability Assessment
  • Technical Support
  • VoIP Administration
  • Data Entry
  • Network Administration
  • VoIP
  • Network Engineering
  • Network Design
  • Network Security
  • AWS Lambda
  • AWS CodeDeploy
  • AWS Systems Manager
  • System Security

I currently work freelance projects. I used to work for Vonage Business (VoIP service provider) as a VoIP Engineer and had been provisioning, troubleshooting, and maintaining VoIP services and networks for 7 years. I am also a Certified Ethical Hacker (CEH) through International Electronic Commerce Council. Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. Hacking websites and discovering security vulnerabilities along with recommending remediation is my specialty. If your business is online, it is your business to ensure that it is secure.

...
Howard Eldon P.
$150/hr
Howard Eldon P.

Certified Ethical Hacker

4.9/5(262 jobs)
Dayton, OH
  • Trophy Icon Ethical Hacking
  • Reverse Engineering
  • Cryptography
  • Malware
  • Blockchain
  • Cryptocurrency
  • Information Security

I am a cybersecurity professional with a Master's Degree in Cyber Operations and two years of work experience in cybersecurity research and development at a world-class R&D laboratory. In that job, I gained experience in network traffic analysis, malware analysis, and cryptography. For over two years, I have worked as a freelancer, providing consulting, content development, and course creation in cybersecurity and blockchain security. I specialize in development of technical content (blogs, whitepapers, case studies, and courseware) in the field of cybersecurity. I currently hold the Certified Ethical Hacker and Certified Blockchain Security Professional certifications.

...
Thomas B.
$125/hr
Thomas B.

Certified Ethical Hacker

5.0/5(7 jobs)
Millville, NJ
  • Trophy Icon Ethical Hacking
  • Slack
  • JAMF
  • Bash Programming
  • Google
  • Linux
  • Microsoft Office
  • DigitalOcean
  • Python
  • Automation
  • Google Apps Script
  • OKTA
  • API
  • macOS
  • Selenium

Skills: - Identity and Access Management - Apple Device management using MDM and open source tools - Systems Integration specialist using Python and other tools such as Function as a service (FaaS), Okta Workflows, Zapier, etc. - Linux management on cloud providers and using Ansible configuration management - Selenium browser automation Education: - Bachelors Degree - Okta Certified Professional - Jamf Certified Administrator - Certified Ethical Hacker Accomplishments: - Open source patch management automation - Okta SSO provisioning and de-provisioning via SAML, OIDC, SCIM, and Okta Workflows - Digital Ocean Rocky Linux web server deployment, securing, and managing with Ansible - Browser workflow automation with Selenium - Syncing and cleaning data from various SaaS services via API

...
Mukarram K.
$40/hr
Mukarram K.

Certified Ethical Hacker

5.0/5(289 jobs)
Singapore, CENTRAL SINGAPORE
  • Trophy Icon Ethical Hacking
  • Linux System Administration
  • Information Security Audit
  • Website Security
  • Web Application Security
  • Web App Penetration Testing
  • Information Security Analyst
  • Cloud Security
  • Information Security
  • Penetration Testing
  • Laravel
  • JavaScript
  • PHP
  • Network Penetration Testing
  • Security Testing
  • Amazon Web Services
  • Network Security

I'm an OSCP (Offensive Security Certified Professional), OSWE (Offensive Security Web Expert), CREST CRT, and CEH (Certified Ethical Hacker) certified penetration tester. I can conduct vulnerability assessments and penetration testing for your web applications, mobile applications, and cloud infrastructures. I can also audit the code of your PHP / Python / JS (NodeJS) applications and fix code-level vulnerabilities. My day to day work includes: -- Research on bleeding edge technologies -- PHP/Python/JavaScript development -- Code auditing -- Database management -- APIs development & integration -- AWS services (EC2, SES, SNS, SQS, Route53, S3, Lambda, API gateway) -- Penetration testing -- Data scraping -- and a lot more

...
Ayman E.
$20/hr
Ayman E.

Certified Ethical Hacker

5.0/5(4 jobs)
Alexandria, ALEXANDRIA
  • Trophy Icon Ethical Hacking
  • System Security
  • System Administration
  • Network Security
  • Linux System Administration
  • Python
  • Network Penetration Testing
  • Penetration Testing
  • Kali Linux
  • Firewall
  • Microsoft Azure
  • Network Design
  • Windows Server
  • Virtual LAN
  • Ubiquiti
  • Docker

I'm an ambitious, enthusiastic and quick learner person graduated from faculty of science department of mathematics and computer science. Having a passion for IT infrastructure and systems security encourage me to be certified cybersecurity specialist, ethical hacker (CEH) and security analyst (ECSA) from EC-Council ready to take any penetration testing projects. Experienced in plethora of appliances and systems like Microsoft Windows, Red hat Linux, Cisco routers and switches, Apple Mac OS, HPE servers and storage , Dell EMC, Oracle Solaris, Sophos XG Firewall, Fortinet FortiGate and VMware products. Experienced in deploying and implementing a plethora of the formally mentioned products and software. Experienced in Backup Solutions and products from vendors like QNAP, Synology, Kaspersky, Veeam and Symantec. Certified Ethical Hacker from the EC-Council Certified Security Analyst from the EC-Council Certified Professional Android Developer from Google on Udacity Certified Cybersecurity Specialist from University of Maryland on Coursera Certified IT Essentials from Alexandria University FSCC

...
Want to browse more talent?Sign Up

Join the world’s work marketplace

Find Talent

Post a job to interview and hire great talent.

Hire Talent
Find Work

Find work you love with like-minded clients.

Find Work