Hire the best Certified Ethical Hackers in Kenya
Check out Certified Ethical Hackers in Kenya with the skills you need for your next job.
- $100 hourly
- 4.7/5
- (147 jobs)
DO NOT contact me with requests to hack social media accounts, recover accounts, or engage in any illegal activities. This includes, but is not limited to, unauthorized network intrusions, financial fraud, identity theft, data breaches, or any form of hacking motivated by personal reasons, such as revenge/grudges, romantic relationships, and snooping on someone’s private details. I operate STRICTLY within LEGAL and ETHICAL boundaries and do not condone or participate in any UNLAWFUL or UNETHICAL behavior. Red Team Activities I engage in red teaming exercises under two distinct categories, ensuring all activities comply with legal and ethical standards: 1. Company or Home Penetration Tests These services are designed to identify vulnerabilities and strengthen the security of organizations or individuals. Common examples include: Simulated phishing attacks to test employee awareness or individual response to social engineering. Social engineering simulations, such as impersonation, attempts to access restricted areas or home networks. Network penetration testing to identify weak points in business or home systems. Web application security assessments to uncover exploitable flaws in personal or corporate applications. Requirements: Clients must provide WRITTEN AUTHORIZATION, including a clearly defined scope of engagement, confirming that the organization or homeowner sanctions the activities. 2. Criminal Investigations I also engage in verified investigations involving criminal activities. Examples include: Location tracking of missing persons or stolen devices (where legally sanctioned). Digital forensic analysis to identify and trace cybercriminal activities. Offensive actions, such as testing systems to retrieve data under explicit jurisdictional approval. Requirements: LEGAL DOCUMENTATION proving the case has been REPORTED to LAW ENFORCEMENT. WRITTEN APPROVAL authorizing offensive actions under the JURISDICTION OF THE LAW. Encrypted Communication for Privacy In rare and exceptional cases involving VERIFIED SPECIAL CRIMINAL INVESTIGATIONS, where the client requires ENCRYPTED communication to ensure their PRIVACY, I may reserve the right to communicate securely outside the platform ONLY after the contract is assigned on Upwork. My Expertise are; ✅ Dark Web Cyber Threat Intelligence, Fraud Investigation, Criminal Profiling, Company OSINT Investigations ✅ Mobile Security (Graphene and Calyx OS) ✅ Malware Reverse Engineering and Disassembly ✅ WordPress Malware Removal & Hacked Website Recovery ✅ Digital Forensics (Data Recovery and Analysis, Mobile Device Forensics (iPhone & Android), Network Forensics, Email Header Analysis) ✅ Network Security: Firewall (pfsense,), IDS/IPS (Snort and Suricata), OpenVPN Access Server, SIEM (Splunk, Wazuh), Proxy (Squid, Squid Guard) ✅ Cyber Security Articles: Technical Writing, Blog Writing, Article Writing, Research Reports, Scientific Reports, ebooks, and Blogs (Fluent in American or British English) ✅ Pcap File Analysis (Wireshark, Network Miner, Wireedit, Scapy, ParserCap) ✅ Phishing Simulation, Red Team Operations, Exploit Development I currently hold the following certifications: ➡ Certified Ethical Hacking ➡ Certified Penetration Tester and Bug Bounty Hunter ➡ Autopsy Digital Forensics ➡ Cyber Triage Digital Forensics Incidence ResponseEthical Hacking
SnortWiresharkInformation SecurityNetwork AnalysisPfSenseKali LinuxWebsite SecurityDigital ForensicsComputer NetworkNetwork SecurityIntrusion Detection SystemInformation TechnologyIntrusion Prevention SystemTechnical Writing - $38 hourly
- 4.7/5
- (56 jobs)
“The best tech writer I’ve ever hired. I’ve hired about 10 altogether. He’s the best of all.” -Paul Madsen, CTemplar. I am a compulsive tech writer with an exemplary command of the English language and diligent research skills. My specialties include: ‣ Cybersecurity – Online privacy and Internet security. ‣ Virtual Private Network (VPN) related content. ‣ Streaming – Cord-cutting, streaming services, and devices such as Fire TV Stick. ‣ Smartphones and related accessories. ‣ Information Technology and Computer content. ‣ How-To Articles. ‣ Cryptocurrency and NFTs. ‣ Trending and emerging topics. My professionalism will ensure that your content is: ‣ Accurate. ‣ Meets your requirements. ‣ Connects with the intended audience. ‣ Plagiarism-free. ‣ Delivered on time. If you’re looking for someone to work with, you just found one.Ethical Hacking
ProofreadingInformation SecurityVPNContent WritingCopywritingSearch Engine OptimizationArticle WritingBusiness WritingBlog WritingTech & IT - $60 hourly
- 5.0/5
- (75 jobs)
I am a DevSecOps Practitioner, Application Security Analyst, and Cybersecurity Specialist. I have significant and well-diversified experience in multiple Cybersecurity domains, including: 1. Cloud Infrastructure: I help secure Cloud Infrastructure such as GCP AWS and Azure. 2.Penetration Testing and Vulnerability Assessment: I specialize in finding vulnerabilities in Web Applications, Mobile Applications, Networks, and Smart Contracts. 3. Bug Bounty Hunting: I find bugs for various companies on HackerOne - @l3s7r0z. I am constantly improving myself and getting better each day in the Cyber Security field. Lester Obbayi - @l3s7r0zEthical Hacking
DocumentationMobile App TestingWeb Application FirewallTechnical DocumentationBlack Box TestingInternet SecuritySoftware TestingWeb App Penetration TestingReport WritingArticle WritingNetwork SecurityPenetration TestingInformation SecurityVulnerability Assessment - $20 hourly
- 4.0/5
- (5 jobs)
I am an Experienced Information Technology Administrator with a demonstrated history of working in the Automobile and Transportation tracking Industry and currently in the Renewables and Environment industry. Skilled in Computer Hardware Troubleshooting, Microsoft 365 Administration, Azure Administration, Asset Management, ERP Support (NAV and SAP), IT Project Management, Network Administration, SQL, and Vendor & Contract Management. Junior in Java developing language with a hunger to perfect it and Python as a coding language too. Diverse Information Technology professional with a CCNA focused in Networking from Strathmore University.Ethical Hacking
Computing & NetworkingInventory ManagementComputer NetworkSystem SecurityDatabaseCloud ComputingInformation SecurityDatabase Management SystemIT InfrastructureCompany PolicyTechnical Project ManagementOffice 365Microsoft Active DirectoryMicrosoft Azure - $35 hourly
- 4.9/5
- (18 jobs)
Experienced Information Security Engineer with a proven track record of enhancing cyber-security resilience for organizations across diverse industries. Expertise in incident response, digital forensics, and network and application security, supported by a robust academic foundation. Adept at integrating technical proficiency with strategic vision to fortify security postures, streamline operations, and foster a culture of security awareness.Ethical Hacking
Cybersecurity ManagementPenetration TestingSecurity AnalysisInformation Security AuditVulnerability AssessmentISO 27001Kali LinuxNIST SP 800-53Research PapersSplunkInformation SecurityNetwork SecurityPython - $55 hourly
- 4.9/5
- (7 jobs)
I am an IBM Middleware Consultant with over 20 years field experience in technical support, project management, and management of enterprise ICT infrastructure Solutions, products and services. I have specific technical Skills, and experience in the following areas. System Hardware infrastructure: Deployments of Mid-range to High-end IBM, HP and Oracle server & Storage Expert level experience in IBM Power Systems, Power 5 to Power 10 Systems, IBM Z Systems and IBM Storage systems. Experts experience in Dell/EMC Servers and storage, Oracle Sun Solaris Systems. Expert Experience in IBM AIX & i OS, LINUX OS, Sun Solaris and Microsoft Server OS 2012 & 2016. IBM Middleware Software solutions: Pre-sales support and implementations of IBM Middleware & Security management Solutions ,Collaboration and workplace solutions, Content and Document management, Expert in the following Products IBM WebSphere, IBM MQ, IBM Integration Bus, IBM App Connect, IBM Data Power, IBM Cloud Pak for Integration, IBM QRADAR, IBM GUARDIUM,IBM ACCESS Manager, IBM Netcool, IBM Control Desk, IBM Network Manager and IBM Configuration ManagerEthical Hacking
Maximo Asset ManagementInformation SecurityProject ManagementITILLinuxCognosAIXGoogle Cloud PlatformMicrosoft AzureIBM CloudDevOpsAmazon Web ServicesIBM WebSphereIBM MQJavaScript - $40 hourly
- 5.0/5
- (74 jobs)
I am a technical writer with a background in cybersecurity and software engineering. I provide content that positively impacts client search visibility and sales. My content increases organic traffic, user engagement, and revenue for enterprise businesses including Kiteworks, Cloudflare Inc., Education Ecosystem, DQLabs.ai, Lepide, Unilever, and more. My content targets CISOs, CIOs, CTOs, cybersecurity practitioners, software engineers, and other technical people. I have the ability to engage executives with the buying power to purchase your products. I have helped many cybersecurity companies, software engineers, B2B businesses, SaaS developers, API developers, and other technical organizations improve their search engine rank and generate revenue. Client analytics show that my content drives traffic and customers to client products, and they see an increase in revenue directly from my content. Most recently, using Quattr, an SEO platform that uses AI and large language models, I have managed to double the web traffic, impressions, and engagement for Kiteworks in a record 6 months. I can work with your SEO research or work with my own. I have a SEMRush account to perform keyword research and generate ideas for your site. I keep my workflow flexible for my customers so that they can focus on marketing their products and let me handle the content. I write content mainly in the form of: - Industry blog posts - Whitepapers - Technical documentation, mainly for API endpoints and SaaS - Copywriting - Website content - eBooks I cover topics around: - Cybersecurity - Network engineering, network security - Information security, infrastructure security - Email security - Software engineering, application development - NIST Cybersecurity Framework - Regulatory compliance including CMMC, ISO 27000, GDPR, HIPAA, and PCI DSS.Ethical Hacking
White Paper WritingCMMCGDPRData ProtectionInternet SecurityTechnical WritingBlog WritingNIST Cybersecurity FrameworkArticle WritingData PrivacyCloud Security FrameworkRegulatory ComplianceInformation Security - $38 hourly
- 5.0/5
- (24 jobs)
I am a software developer with a passion for developing intelligent, cloud-first applications. I also have experience building end to end IoT solutions. On top of that, I am a certified cloud administrator. I can work as a full-stack developer. I am comfortable using Python, JavaScript, and C#. Technologies I can work with and have experience in include: - NodeJS, React, MongoDB, Postgres, SQL Server, .net Core, HTML, CSS, ElasticSearch, AWS, Azure, Heroku, Docker, and Django.Ethical Hacking
Information SecurityAzure IoT HuBAWS IoT CoreTelecommunications EngineeringInternet of ThingsDjangoWritingASP.NETAmazon Web ServicesMicrosoft AzureCloud Computing - $30 hourly
- 5.0/5
- (11 jobs)
I'm an experienced and skilled technical support engineer. I'm good at: - troubleshooting and managing Windows & Linux environments i.e workstations, servers. - troubleshooting email configuration, email security using secure email gateways, SMTP filters, proxies, ISPconfig. - setting up VPNs, deploying security software and hardware. - handling customer problems on phone, email and chat-based communication. - troubleshooting and problem solving using ticketing systems. - handling escalations. - excellent communication skills both written and spoken. - AWS cloud administration - EC2, S3, ELB, IAM, - Core network routing, switching & security on routers, switches, access points, load balancers, proxies and firewalls. (Cisco, Juniper, Fortinet, SonicWall, Ubiquiti, Sophos, pfSense, etc.). - Creation of web and network proxy servers. - SIEM installations i.e. Zabbix, ELK, FortiSIEM, AlienVault, Splunk. - Endpoint security tools i.e. MalwareBytes, FireEye, Symantec, Trend Micro, Cybereason, etc. - Managing domains and DNS records.Ethical Hacking
Network EngineeringDNSNetwork MonitoringSystem AdministrationInformation Security AwarenessNetwork DesignNetwork SecurityWindows AdministrationInformation SecurityAWS CloudFrontAmazon Web ServicesWindows ServerLinux System AdministrationMicrosoft WindowsTechnical Support - $15 hourly
- 5.0/5
- (25 jobs)
I am an expert in white paper writing, technical, research, and content writing. I have been doing this for more than you can imagine. I am a BSc degree holder in computer science, a Bachelor's degree holder in commerce, and a diploma in project management additionally I hold certification in CCNA—Master's degree in strategic management. I have over 5 years of experience in providing technical writing, research writing, article writing, content writing, and SEO technical article writing. Below are some services that I offer in technical writing, Cyber security and Computer network Finance Analysis Project management (WBS, scheduling, Gantt charts, charter, scope, project cost estimation) Software requirements specification (SRS) and system design specification (SDS) Proposal writing Database management and design(ERD design, Normalization, database schema ) Digital forensic Software Engineering (UML diagrams: Use Case, Class diagram, flowcharts, Sequence diagram) Software documentation Computer programming(Python, Java and Php ) Cloud Computing Internet of Things (IoT) Machine Learning and Artificial Intelligent Business analysis and BPMN design Vulnerability risk assessments and Data breach writing Digital Laws and Regulations SWOT Analysis And Many more ......... I believe in creating excellent services for my clients by understanding the instructions, thus providing well-versed results. As a technical writer, I remain committed to delivering quality technical work, free from plagiarism, with proper grammar and intensive research. My key purpose in the freelance industry is to relentlessly and passionately deliver high-quality work. My core values are always Commitment, reliability, time- conscious, honesty And Many more ......... I am always open to invitations from clients who have confidence in my skill set and share the same interest in perfection and good working relations. Please click "Hire me" and I will never disappoint you, thank you. So why wait? Contact me today and let's secure high-quality output within your deadline!Ethical Hacking
Software DocumentationReport WritingCybersecurity ManagementInformation SecurityAcademic WritingCopywritingArticle WritingResearch PapersComputer ScienceContent WritingUnified Modeling LanguageProposal WritingEditing & ProofreadingSEO WritingTechnical Writing - $150 hourly
- 0.0/5
- (0 jobs)
I am a programmer by profession with a high level of experience in computer softwares.I deliver my assignments in time.For any computer related assignments please hit my dm.Ethical Hacking
Data CollectionCompany ResearchData AnalysisSecurity ManagementProgram EvaluationLinear ProgrammingInformation Security - $110 hourly
- 0.0/5
- (1 job)
PROFESSIONAL SUMMARY ? I have a background in information technology ,information security, computer forensics and incident response, information systems, accounting software, Customer relationship models, enterprise resource planning (ERP s), information systems (IS) audit and risk management. ? My experience also cuts across IT governance and policy implementations based on industry standards and good practice. ? My experience cuts across systems audit , IT maintenance and support, cybersecurity and customer relations, data analytics, big data, cloud security and artificial intelligence. ? I have performed systems audit on systems varying from POS systems, financial systems, CRM system and transaction processing systems. ? I have developed reports and management letters to advise management on possible changes to improve and better information technology in their organizations. ?Ethical Hacking
Data AnalyticsCOBITCloud SecurityDatabaseAgile Software DevelopmentSystem SecurityCybersecurity ManagementInformation Security - $18 hourly
- 4.7/5
- (2 jobs)
"I'm a developer experienced in coding software for small and medium-sized businesses, with a strong emphasis on cybersecurity. Whether you're aiming to win work, list your services, or establish a new online store, I can offer comprehensive solutions that prioritize the security of your data and systems. Proficient in Golang, Python, C, C++, jQuery, and JavaScript, I develop robust applications while implementing best practices in cybersecurity. From encryption protocols to secure authentication mechanisms, I ensure that your software is fortified against potential threats. Moreover, I provide full project management support from inception to completion, ensuring that security measures are seamlessly integrated at every stage. Regular communication is vital throughout the process, and I am committed to keeping you informed and involved every step of the way. Let's work together to create software solutions that not only meet your business needs but also safeguard your valuable assets from cyber threats."Ethical Hacking
Network Penetration TestingWeb App Penetration TestingInformation SecurityGolangCertified Associate in Python ProgrammingJavaScriptJavaC++C - $45 hourly
- 0.0/5
- (0 jobs)
We have a diverse team of 70, each providing different services; gaming development, android/ios app development, Project management, AI model development, UI Designing, Web Application Development and Cyber Security. It is a mixture of IT professionals, Students, Cybersecurity experts managers and Marketers at your disposal.Ethical Hacking
Logo DesignGame ArtAI Model DevelopmentData AnalysisProblem SolvingDatabaseInformation SecurityTeam ManagementWeb APIFlutterAndroid App DevelopmentGyroscope FrameworkUnrealScriptUnreal EngineReact - $50 hourly
- 0.0/5
- (0 jobs)
PROFESSIONAL SUMMARY I am a highly motivated and detail-oriented Cybersecurity Engineer with a solid foundation in network security, ethical hacking, and system administration. Seeking to leverage skills in identifying vulnerabilities, threat analysis, and implementing security measures to contribute to the security infrastructure of a forward-thinking organization.Ethical Hacking
Network EngineeringInformation SecuritySystem AdministrationComputing & Networking - $50 hourly
- 0.0/5
- (0 jobs)
I am a programmes coordinator, IT and digital security strategist & trainer, and communications expert with more than 20 years diverse work experience in communications, IT, digital security and project management in the sectors of environment, climate change, security and human rights.Ethical Hacking
WordPress Website DesignCybersecurity MonitoringTrainingInformation Security - $45 hourly
- 0.0/5
- (0 jobs)
Experienced Security Operations Center (SOC) Analyst skilled in incident analysis, incident response, and threat hunting. Proficient in network security with a strong background in penetration testing and digital forensics. Passionate about cyber security and its integral role in my daily work. Demonstrated success in leading vulnerability assessments and penetration tests (VAPTs) both independently and as part of a team. Thrive in web-based and Active Directory challenges in Capture The Flag (CTF) competitions. Security Analyst Trainer.Ethical Hacking
Cybersecurity ManagementCybersecurity MonitoringIncident ManagementDigital ForensicsSOC 2Penetration TestingDatabaseDatabase ManagementNetwork EngineeringComputing & NetworkingComplianceComputer NetworkInformation SecurityGovernment Reporting ComplianceCyber Threat Intelligence - $556 hourly
- 0.0/5
- (0 jobs)
I am a wed developer whose passionate with experience to build responsive and user-friendly websites. Skilled in JavaScript and am dedicated to solve problems with efficient codeEthical Hacking
Database ManagementComplianceInformation SecurityDatabase - $75 hourly
- 0.0/5
- (0 jobs)
I bring over 3 years of experience, including 2 years as an Oracle Database Administrator and 1 year as a Cybersecurity Analyst. In my role as an Oracle DBA, I specialize in database management, optimization, and security, ensuring high availability and performance. As a Cybersecurity Analyst, I am skilled in penetration testing, risk assessments, and data-driven security strategies. Proficient with tools like NMAP, Metasploit, Wireshark, and Burp Suite, I provide secure, efficient solutions tailored to your needs. I also have experience in creating technical reports and analyses in both database management and cybersecurity. Let's work together to enhance your systems and ensure robust security.Ethical Hacking
Unix ShellCWireless SecurityOracle DatabaseOracle PLSQLJavaPythonData AnalysisPenetration TestingLinuxGovernment Reporting ComplianceInformation SecurityComputing & NetworkingCybersecurity Management - $45 hourly
- 0.0/5
- (0 jobs)
I'm a Networking and Cybersecurity Specialist with over 5 years of experience in securing and optimizing network infrastructures for small and medium-sized businesses. Whether you need to protect sensitive data, enhance network performance, or implement robust security protocols, I can help. Skills: Network configuration and management (TCP/IP, DHCP, DNS), cybersecurity measures implementation, risk assessment, and mitigation strategies. Services: Comprehensive security assessments, network performance optimization, and continuous monitoring to prevent security incidents. Regular communication is important to me, so let's keep in touch.Ethical Hacking
Computer NetworkNetwork EngineeringInformation SecurityComputing & Networking - $100 hourly
- 0.0/5
- (0 jobs)
>Software designer and developer >Programming > Database management system >Agricultural engineeringEthical Hacking
Information SecurityGovernment Reporting ComplianceComplianceDatabase ManagementDatabase - $100 hourly
- 0.0/5
- (0 jobs)
I am an experienced software developer and app developer.i offer all the services that are computer relatadEthical Hacking
Database ManagementInformation SecurityComplianceAutodesk RevitAbaqusDatabase - $49 hourly
- 0.0/5
- (0 jobs)
Hi there! I’m a seasoned Network Infrastructure Specialist with expertise in designing, implementing, and troubleshooting robust IT systems. With a strong foundation in networking, structured cabling, and DHCP configuration, I deliver seamless connectivity solutions tailored to your business needs. What I Bring to the Table: ✅ Networking & Cabling Mastery: From installing high-performance structured cabling systems (CAT5e/6/6a, fiber optics) to configuring routers, switches, and VLANs, I ensure reliable and scalable network setups. ✅ DHCP & IP Management: Proficient in DHCP server setup, IP address allocation, and subnetting to optimize network efficiency and avoid conflicts. ✅ Problem-Solving Agility: Whether it’s diagnosing connectivity issues, resolving latency problems, or troubleshooting hardware/software conflicts, I thrive on turning complex challenges into simple solutions. ✅ Clear Communication: I translate technical jargon into easy-to-understand insights, ensuring smooth collaboration with clients and teams. Why Work With Me? I pride myself on delivering timely, precise, and future-proof solutions that minimize downtime and maximize productivity. Whether you need a small office network set up, a cabling overhaul, or ongoing IT support, I approach every project with professionalism, attention to detail, and a commitment to your success. Let’s connect to discuss how I can strengthen your network infrastructure and keep your operations running smoothly. I’m here to make technology work for you, not against you! Skills Snapshot: Network Design | Structured Cabling | DHCP/DNS Configuration | Troubleshooting | Client-Focused Communication Ready to optimize your network? Let’s get started!Ethical Hacking
ArchitectureComplianceInformation SecurityComputer NetworkNetwork EngineeringProblem SolvingComputing & Networking - $33 hourly
- 0.0/5
- (0 jobs)
Professional summary College graduate with networking, programming and system administration knowledge, including back up, security management, e-mail systems, pc repair and maintenance and application support. Skills * Programming with C, C++, VB * Web Design with HTML 5, Javascript, Joomla and Word press * Network maintenance * Data back up and retrieval * Coding modularization * Cisco router management * System administration * Excellent problem solving abilities * Computerized accounting: quick books, sage, pastel, tally and systematics. * Window server management.Ethical Hacking
Network EngineeringComputing & NetworkingGovernment Reporting ComplianceDatabase ManagementDatabaseInformation SecurityComplianceComputer Network - $40 hourly
- 0.0/5
- (0 jobs)
PROJECTS Web Portfolio: Developed a portfolio using HTML, CSS, JAVASCRIPT and Node js. Interactive calculator app and a system recommendation system : Developed an app and a recommendation system using python, React, HTML, CSS and Node js Modern Business Landing Page: Developed an interactive business landing page.Ethical Hacking
Computer NetworkProblem SolvingInformation SecurityComputing & Networking - $50 hourly
- 0.0/5
- (0 jobs)
Knows HTML and CSS3, PHP, jQuery, Wordpress, and SEO Full project management from start to finish Regular communication is important to me, so let’s keep in touch.Ethical Hacking
Government Reporting ComplianceDatabaseAbaqusDatabase ManagementAutodesk RevitComplianceInformation Security - $50 hourly
- 0.0/5
- (0 jobs)
Experienced cybersecurity expert specializing in protecting digital assets, mitigating cyber threats, and ensuring compliance with industry standards. Skilled in network security, penetration testing, risk assessment, and incident response. Passionate about safeguarding organizations from evolving cyber risks with cutting-edge security solutions. Let's secure your business together!Ethical Hacking
Government Reporting ComplianceComplianceInformation Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.