Hire the best Certified Ethical Hackers in Kenya

Check out Certified Ethical Hackers in Kenya with the skills you need for your next job.
  • $100 hourly
    DO NOT contact me with requests to hack social media accounts, recover accounts, or engage in any illegal activities. This includes, but is not limited to, unauthorized network intrusions, financial fraud, identity theft, data breaches, or any form of hacking motivated by personal reasons, such as revenge/grudges, romantic relationships, and snooping on someone’s private details. I operate STRICTLY within LEGAL and ETHICAL boundaries and do not condone or participate in any UNLAWFUL or UNETHICAL behavior. Red Team Activities I engage in red teaming exercises under two distinct categories, ensuring all activities comply with legal and ethical standards: 1. Company or Home Penetration Tests These services are designed to identify vulnerabilities and strengthen the security of organizations or individuals. Common examples include: Simulated phishing attacks to test employee awareness or individual response to social engineering. Social engineering simulations, such as impersonation, attempts to access restricted areas or home networks. Network penetration testing to identify weak points in business or home systems. Web application security assessments to uncover exploitable flaws in personal or corporate applications. Requirements: Clients must provide WRITTEN AUTHORIZATION, including a clearly defined scope of engagement, confirming that the organization or homeowner sanctions the activities. 2. Criminal Investigations I also engage in verified investigations involving criminal activities. Examples include: Location tracking of missing persons or stolen devices (where legally sanctioned). Digital forensic analysis to identify and trace cybercriminal activities. Offensive actions, such as testing systems to retrieve data under explicit jurisdictional approval. Requirements: LEGAL DOCUMENTATION proving the case has been REPORTED to LAW ENFORCEMENT. WRITTEN APPROVAL authorizing offensive actions under the JURISDICTION OF THE LAW. Encrypted Communication for Privacy In rare and exceptional cases involving VERIFIED SPECIAL CRIMINAL INVESTIGATIONS, where the client requires ENCRYPTED communication to ensure their PRIVACY, I may reserve the right to communicate securely outside the platform ONLY after the contract is assigned on Upwork. My Expertise are; ✅ Dark Web Cyber Threat Intelligence, Fraud Investigation, Criminal Profiling, Company OSINT Investigations ✅ Mobile Security (Graphene and Calyx OS) ✅ Malware Reverse Engineering and Disassembly ✅ WordPress Malware Removal & Hacked Website Recovery ✅ Digital Forensics (Data Recovery and Analysis, Mobile Device Forensics (iPhone & Android), Network Forensics, Email Header Analysis) ✅ Network Security: Firewall (pfsense,), IDS/IPS (Snort and Suricata), OpenVPN Access Server, SIEM (Splunk, Wazuh), Proxy (Squid, Squid Guard) ✅ Cyber Security Articles: Technical Writing, Blog Writing, Article Writing, Research Reports, Scientific Reports, ebooks, and Blogs (Fluent in American or British English) ✅ Pcap File Analysis (Wireshark, Network Miner, Wireedit, Scapy, ParserCap) ✅ Phishing Simulation, Red Team Operations, Exploit Development I currently hold the following certifications: ➡ Certified Ethical Hacking ➡ Certified Penetration Tester and Bug Bounty Hunter ➡ Autopsy Digital Forensics ➡ Cyber Triage Digital Forensics Incidence Response
    Featured Skill Ethical Hacking
    Snort
    Wireshark
    Information Security
    Network Analysis
    PfSense
    Kali Linux
    Website Security
    Digital Forensics
    Computer Network
    Network Security
    Intrusion Detection System
    Information Technology
    Intrusion Prevention System
    Technical Writing
  • $38 hourly
    “The best tech writer I’ve ever hired. I’ve hired about 10 altogether. He’s the best of all.” -Paul Madsen, CTemplar. I am a compulsive tech writer with an exemplary command of the English language and diligent research skills. My specialties include: ‣ Cybersecurity – Online privacy and Internet security. ‣ Virtual Private Network (VPN) related content. ‣ Streaming – Cord-cutting, streaming services, and devices such as Fire TV Stick. ‣ Smartphones and related accessories. ‣ Information Technology and Computer content. ‣ How-To Articles. ‣ Cryptocurrency and NFTs. ‣ Trending and emerging topics. My professionalism will ensure that your content is: ‣ Accurate. ‣ Meets your requirements. ‣ Connects with the intended audience. ‣ Plagiarism-free. ‣ Delivered on time. If you’re looking for someone to work with, you just found one.
    Featured Skill Ethical Hacking
    Proofreading
    Information Security
    VPN
    Content Writing
    Copywriting
    Search Engine Optimization
    Article Writing
    Business Writing
    Blog Writing
    Tech & IT
  • $60 hourly
    I am a DevSecOps Practitioner, Application Security Analyst, and Cybersecurity Specialist. I have significant and well-diversified experience in multiple Cybersecurity domains, including: 1. Cloud Infrastructure: I help secure Cloud Infrastructure such as GCP AWS and Azure. 2.Penetration Testing and Vulnerability Assessment: I specialize in finding vulnerabilities in Web Applications, Mobile Applications, Networks, and Smart Contracts. 3. Bug Bounty Hunting: I find bugs for various companies on HackerOne - @l3s7r0z. I am constantly improving myself and getting better each day in the Cyber Security field. Lester Obbayi - @l3s7r0z
    Featured Skill Ethical Hacking
    Documentation
    Mobile App Testing
    Web Application Firewall
    Technical Documentation
    Black Box Testing
    Internet Security
    Software Testing
    Web App Penetration Testing
    Report Writing
    Article Writing
    Network Security
    Penetration Testing
    Information Security
    Vulnerability Assessment
  • $20 hourly
    I am an Experienced Information Technology Administrator with a demonstrated history of working in the Automobile and Transportation tracking Industry and currently in the Renewables and Environment industry. Skilled in Computer Hardware Troubleshooting, Microsoft 365 Administration, Azure Administration, Asset Management, ERP Support (NAV and SAP), IT Project Management, Network Administration, SQL, and Vendor & Contract Management. Junior in Java developing language with a hunger to perfect it and Python as a coding language too. Diverse Information Technology professional with a CCNA focused in Networking from Strathmore University.
    Featured Skill Ethical Hacking
    Computing & Networking
    Inventory Management
    Computer Network
    System Security
    Database
    Cloud Computing
    Information Security
    Database Management System
    IT Infrastructure
    Company Policy
    Technical Project Management
    Office 365
    Microsoft Active Directory
    Microsoft Azure
  • $35 hourly
    Experienced Information Security Engineer with a proven track record of enhancing cyber-security resilience for organizations across diverse industries. Expertise in incident response, digital forensics, and network and application security, supported by a robust academic foundation. Adept at integrating technical proficiency with strategic vision to fortify security postures, streamline operations, and foster a culture of security awareness.
    Featured Skill Ethical Hacking
    Cybersecurity Management
    Penetration Testing
    Security Analysis
    Information Security Audit
    Vulnerability Assessment
    ISO 27001
    Kali Linux
    NIST SP 800-53
    Research Papers
    Splunk
    Information Security
    Network Security
    Python
  • $55 hourly
    I am an IBM Middleware Consultant with over 20 years field experience in technical support, project management, and management of enterprise ICT infrastructure Solutions, products and services. I have specific technical Skills, and experience in the following areas. System Hardware infrastructure: Deployments of Mid-range to High-end IBM, HP and Oracle server & Storage Expert level experience in IBM Power Systems, Power 5 to Power 10 Systems, IBM Z Systems and IBM Storage systems. Experts experience in Dell/EMC Servers and storage, Oracle Sun Solaris Systems. Expert Experience in IBM AIX & i OS, LINUX OS, Sun Solaris and Microsoft Server OS 2012 & 2016. IBM Middleware Software solutions: Pre-sales support and implementations of IBM Middleware & Security management Solutions ,Collaboration and workplace solutions, Content and Document management, Expert in the following Products IBM WebSphere, IBM MQ, IBM Integration Bus, IBM App Connect, IBM Data Power, IBM Cloud Pak for Integration, IBM QRADAR, IBM GUARDIUM,IBM ACCESS Manager, IBM Netcool, IBM Control Desk, IBM Network Manager and IBM Configuration Manager
    Featured Skill Ethical Hacking
    Maximo Asset Management
    Information Security
    Project Management
    ITIL
    Linux
    Cognos
    AIX
    Google Cloud Platform
    Microsoft Azure
    IBM Cloud
    DevOps
    Amazon Web Services
    IBM WebSphere
    IBM MQ
    JavaScript
  • $40 hourly
    I am a technical writer with a background in cybersecurity and software engineering. I provide content that positively impacts client search visibility and sales. My content increases organic traffic, user engagement, and revenue for enterprise businesses including Kiteworks, Cloudflare Inc., Education Ecosystem, DQLabs.ai, Lepide, Unilever, and more. My content targets CISOs, CIOs, CTOs, cybersecurity practitioners, software engineers, and other technical people. I have the ability to engage executives with the buying power to purchase your products. I have helped many cybersecurity companies, software engineers, B2B businesses, SaaS developers, API developers, and other technical organizations improve their search engine rank and generate revenue. Client analytics show that my content drives traffic and customers to client products, and they see an increase in revenue directly from my content. Most recently, using Quattr, an SEO platform that uses AI and large language models, I have managed to double the web traffic, impressions, and engagement for Kiteworks in a record 6 months. I can work with your SEO research or work with my own. I have a SEMRush account to perform keyword research and generate ideas for your site. I keep my workflow flexible for my customers so that they can focus on marketing their products and let me handle the content. I write content mainly in the form of: - Industry blog posts - Whitepapers - Technical documentation, mainly for API endpoints and SaaS - Copywriting - Website content - eBooks I cover topics around: - Cybersecurity - Network engineering, network security - Information security, infrastructure security - Email security - Software engineering, application development - NIST Cybersecurity Framework - Regulatory compliance including CMMC, ISO 27000, GDPR, HIPAA, and PCI DSS.
    Featured Skill Ethical Hacking
    White Paper Writing
    CMMC
    GDPR
    Data Protection
    Internet Security
    Technical Writing
    Blog Writing
    NIST Cybersecurity Framework
    Article Writing
    Data Privacy
    Cloud Security Framework
    Regulatory Compliance
    Information Security
  • $38 hourly
    I am a software developer with a passion for developing intelligent, cloud-first applications. I also have experience building end to end IoT solutions. On top of that, I am a certified cloud administrator. I can work as a full-stack developer. I am comfortable using Python, JavaScript, and C#. Technologies I can work with and have experience in include: - NodeJS, React, MongoDB, Postgres, SQL Server, .net Core, HTML, CSS, ElasticSearch, AWS, Azure, Heroku, Docker, and Django.
    Featured Skill Ethical Hacking
    Information Security
    Azure IoT HuB
    AWS IoT Core
    Telecommunications Engineering
    Internet of Things
    Django
    Writing
    ASP.NET
    Amazon Web Services
    Microsoft Azure
    Cloud Computing
  • $30 hourly
    I'm an experienced and skilled technical support engineer. I'm good at: - troubleshooting and managing Windows & Linux environments i.e workstations, servers. - troubleshooting email configuration, email security using secure email gateways, SMTP filters, proxies, ISPconfig. - setting up VPNs, deploying security software and hardware. - handling customer problems on phone, email and chat-based communication. - troubleshooting and problem solving using ticketing systems. - handling escalations. - excellent communication skills both written and spoken. - AWS cloud administration - EC2, S3, ELB, IAM, - Core network routing, switching & security on routers, switches, access points, load balancers, proxies and firewalls. (Cisco, Juniper, Fortinet, SonicWall, Ubiquiti, Sophos, pfSense, etc.). - Creation of web and network proxy servers. - SIEM installations i.e. Zabbix, ELK, FortiSIEM, AlienVault, Splunk. - Endpoint security tools i.e. MalwareBytes, FireEye, Symantec, Trend Micro, Cybereason, etc. - Managing domains and DNS records.
    Featured Skill Ethical Hacking
    Network Engineering
    DNS
    Network Monitoring
    System Administration
    Information Security Awareness
    Network Design
    Network Security
    Windows Administration
    Information Security
    AWS CloudFront
    Amazon Web Services
    Windows Server
    Linux System Administration
    Microsoft Windows
    Technical Support
  • $15 hourly
    I am an expert in white paper writing, technical, research, and content writing. I have been doing this for more than you can imagine. I am a BSc degree holder in computer science, a Bachelor's degree holder in commerce, and a diploma in project management additionally I hold certification in CCNA—Master's degree in strategic management. I have over 5 years of experience in providing technical writing, research writing, article writing, content writing, and SEO technical article writing. Below are some services that I offer in technical writing,  Cyber security and Computer network Finance Analysis  Project management (WBS, scheduling, Gantt charts, charter, scope, project cost estimation)  Software requirements specification (SRS) and system design specification (SDS)  Proposal writing  Database management and design(ERD design, Normalization, database schema )  Digital forensic  Software Engineering (UML diagrams: Use Case, Class diagram, flowcharts, Sequence diagram)  Software documentation  Computer programming(Python, Java and Php )  Cloud Computing  Internet of Things (IoT)  Machine Learning and Artificial Intelligent  Business analysis and BPMN design  Vulnerability risk assessments and Data breach writing  Digital Laws and Regulations  SWOT Analysis  And Many more ......... I believe in creating excellent services for my clients by understanding the instructions, thus providing well-versed results. As a technical writer, I remain committed to delivering quality technical work, free from plagiarism, with proper grammar and intensive research. My key purpose in the freelance industry is to relentlessly and passionately deliver high-quality work. My core values are always  Commitment,  reliability,  time- conscious,  honesty  And Many more ......... I am always open to invitations from clients who have confidence in my skill set and share the same interest in perfection and good working relations. Please click "Hire me" and I will never disappoint you, thank you. So why wait? Contact me today and let's secure high-quality output within your deadline!
    Featured Skill Ethical Hacking
    Software Documentation
    Report Writing
    Cybersecurity Management
    Information Security
    Academic Writing
    Copywriting
    Article Writing
    Research Papers
    Computer Science
    Content Writing
    Unified Modeling Language
    Proposal Writing
    Editing & Proofreading
    SEO Writing
    Technical Writing
  • $150 hourly
    I am a programmer by profession with a high level of experience in computer softwares.I deliver my assignments in time.For any computer related assignments please hit my dm.
    Featured Skill Ethical Hacking
    Data Collection
    Company Research
    Data Analysis
    Security Management
    Program Evaluation
    Linear Programming
    Information Security
  • $110 hourly
    PROFESSIONAL SUMMARY ? I have a background in information technology ,information security, computer forensics and incident response, information systems, accounting software, Customer relationship models, enterprise resource planning (ERP s), information systems (IS) audit and risk management. ? My experience also cuts across IT governance and policy implementations based on industry standards and good practice. ? My experience cuts across systems audit , IT maintenance and support, cybersecurity and customer relations, data analytics, big data, cloud security and artificial intelligence. ? I have performed systems audit on systems varying from POS systems, financial systems, CRM system and transaction processing systems. ? I have developed reports and management letters to advise management on possible changes to improve and better information technology in their organizations. ?
    Featured Skill Ethical Hacking
    Data Analytics
    COBIT
    Cloud Security
    Database
    Agile Software Development
    System Security
    Cybersecurity Management
    Information Security
  • $18 hourly
    "I'm a developer experienced in coding software for small and medium-sized businesses, with a strong emphasis on cybersecurity. Whether you're aiming to win work, list your services, or establish a new online store, I can offer comprehensive solutions that prioritize the security of your data and systems. Proficient in Golang, Python, C, C++, jQuery, and JavaScript, I develop robust applications while implementing best practices in cybersecurity. From encryption protocols to secure authentication mechanisms, I ensure that your software is fortified against potential threats. Moreover, I provide full project management support from inception to completion, ensuring that security measures are seamlessly integrated at every stage. Regular communication is vital throughout the process, and I am committed to keeping you informed and involved every step of the way. Let's work together to create software solutions that not only meet your business needs but also safeguard your valuable assets from cyber threats."
    Featured Skill Ethical Hacking
    Network Penetration Testing
    Web App Penetration Testing
    Information Security
    Golang
    Certified Associate in Python Programming
    JavaScript
    Java
    C++
    C
  • $45 hourly
    We have a diverse team of 70, each providing different services; gaming development, android/ios app development, Project management, AI model development, UI Designing, Web Application Development and Cyber Security. It is a mixture of IT professionals, Students, Cybersecurity experts managers and Marketers at your disposal.
    Featured Skill Ethical Hacking
    Logo Design
    Game Art
    AI Model Development
    Data Analysis
    Problem Solving
    Database
    Information Security
    Team Management
    Web API
    Flutter
    Android App Development
    Gyroscope Framework
    UnrealScript
    Unreal Engine
    React
  • $50 hourly
    PROFESSIONAL SUMMARY I am a highly motivated and detail-oriented Cybersecurity Engineer with a solid foundation in network security, ethical hacking, and system administration. Seeking to leverage skills in identifying vulnerabilities, threat analysis, and implementing security measures to contribute to the security infrastructure of a forward-thinking organization.
    Featured Skill Ethical Hacking
    Network Engineering
    Information Security
    System Administration
    Computing & Networking
  • $50 hourly
    I am a programmes coordinator, IT and digital security strategist & trainer, and communications expert with more than 20 years diverse work experience in communications, IT, digital security and project management in the sectors of environment, climate change, security and human rights.
    Featured Skill Ethical Hacking
    WordPress Website Design
    Cybersecurity Monitoring
    Training
    Information Security
  • $45 hourly
    Experienced Security Operations Center (SOC) Analyst skilled in incident analysis, incident response, and threat hunting. Proficient in network security with a strong background in penetration testing and digital forensics. Passionate about cyber security and its integral role in my daily work. Demonstrated success in leading vulnerability assessments and penetration tests (VAPTs) both independently and as part of a team. Thrive in web-based and Active Directory challenges in Capture The Flag (CTF) competitions. Security Analyst Trainer.
    Featured Skill Ethical Hacking
    Cybersecurity Management
    Cybersecurity Monitoring
    Incident Management
    Digital Forensics
    SOC 2
    Penetration Testing
    Database
    Database Management
    Network Engineering
    Computing & Networking
    Compliance
    Computer Network
    Information Security
    Government Reporting Compliance
    Cyber Threat Intelligence
  • $556 hourly
    I am a wed developer whose passionate with experience to build responsive and user-friendly websites. Skilled in JavaScript and am dedicated to solve problems with efficient code
    Featured Skill Ethical Hacking
    Database Management
    Compliance
    Information Security
    Database
  • $75 hourly
    I bring over 3 years of experience, including 2 years as an Oracle Database Administrator and 1 year as a Cybersecurity Analyst. In my role as an Oracle DBA, I specialize in database management, optimization, and security, ensuring high availability and performance. As a Cybersecurity Analyst, I am skilled in penetration testing, risk assessments, and data-driven security strategies. Proficient with tools like NMAP, Metasploit, Wireshark, and Burp Suite, I provide secure, efficient solutions tailored to your needs. I also have experience in creating technical reports and analyses in both database management and cybersecurity. Let's work together to enhance your systems and ensure robust security.
    Featured Skill Ethical Hacking
    Unix Shell
    C
    Wireless Security
    Oracle Database
    Oracle PLSQL
    Java
    Python
    Data Analysis
    Penetration Testing
    Linux
    Government Reporting Compliance
    Information Security
    Computing & Networking
    Cybersecurity Management
  • $45 hourly
    I'm a Networking and Cybersecurity Specialist with over 5 years of experience in securing and optimizing network infrastructures for small and medium-sized businesses. Whether you need to protect sensitive data, enhance network performance, or implement robust security protocols, I can help. Skills: Network configuration and management (TCP/IP, DHCP, DNS), cybersecurity measures implementation, risk assessment, and mitigation strategies. Services: Comprehensive security assessments, network performance optimization, and continuous monitoring to prevent security incidents. Regular communication is important to me, so let's keep in touch.
    Featured Skill Ethical Hacking
    Computer Network
    Network Engineering
    Information Security
    Computing & Networking
  • $100 hourly
    >Software designer and developer >Programming > Database management system >Agricultural engineering
    Featured Skill Ethical Hacking
    Information Security
    Government Reporting Compliance
    Compliance
    Database Management
    Database
  • $100 hourly
    I am an experienced software developer and app developer.i offer all the services that are computer relatad
    Featured Skill Ethical Hacking
    Database Management
    Information Security
    Compliance
    Autodesk Revit
    Abaqus
    Database
  • $49 hourly
    Hi there! I’m a seasoned Network Infrastructure Specialist with expertise in designing, implementing, and troubleshooting robust IT systems. With a strong foundation in networking, structured cabling, and DHCP configuration, I deliver seamless connectivity solutions tailored to your business needs. What I Bring to the Table: ✅ Networking & Cabling Mastery: From installing high-performance structured cabling systems (CAT5e/6/6a, fiber optics) to configuring routers, switches, and VLANs, I ensure reliable and scalable network setups. ✅ DHCP & IP Management: Proficient in DHCP server setup, IP address allocation, and subnetting to optimize network efficiency and avoid conflicts. ✅ Problem-Solving Agility: Whether it’s diagnosing connectivity issues, resolving latency problems, or troubleshooting hardware/software conflicts, I thrive on turning complex challenges into simple solutions. ✅ Clear Communication: I translate technical jargon into easy-to-understand insights, ensuring smooth collaboration with clients and teams. Why Work With Me? I pride myself on delivering timely, precise, and future-proof solutions that minimize downtime and maximize productivity. Whether you need a small office network set up, a cabling overhaul, or ongoing IT support, I approach every project with professionalism, attention to detail, and a commitment to your success. Let’s connect to discuss how I can strengthen your network infrastructure and keep your operations running smoothly. I’m here to make technology work for you, not against you! Skills Snapshot: Network Design | Structured Cabling | DHCP/DNS Configuration | Troubleshooting | Client-Focused Communication Ready to optimize your network? Let’s get started!
    Featured Skill Ethical Hacking
    Architecture
    Compliance
    Information Security
    Computer Network
    Network Engineering
    Problem Solving
    Computing & Networking
  • $33 hourly
    Professional summary College graduate with networking, programming and system administration knowledge, including back up, security management, e-mail systems, pc repair and maintenance and application support. Skills * Programming with C, C++, VB * Web Design with HTML 5, Javascript, Joomla and Word press * Network maintenance * Data back up and retrieval * Coding modularization * Cisco router management * System administration * Excellent problem solving abilities * Computerized accounting: quick books, sage, pastel, tally and systematics. * Window server management.
    Featured Skill Ethical Hacking
    Network Engineering
    Computing & Networking
    Government Reporting Compliance
    Database Management
    Database
    Information Security
    Compliance
    Computer Network
  • $40 hourly
    PROJECTS Web Portfolio: Developed a portfolio using HTML, CSS, JAVASCRIPT and Node js. Interactive calculator app and a system recommendation system : Developed an app and a recommendation system using python, React, HTML, CSS and Node js Modern Business Landing Page: Developed an interactive business landing page.
    Featured Skill Ethical Hacking
    Computer Network
    Problem Solving
    Information Security
    Computing & Networking
  • $50 hourly
    Knows HTML and CSS3, PHP, jQuery, Wordpress, and SEO Full project management from start to finish Regular communication is important to me, so let’s keep in touch.
    Featured Skill Ethical Hacking
    Government Reporting Compliance
    Database
    Abaqus
    Database Management
    Autodesk Revit
    Compliance
    Information Security
  • $50 hourly
    Experienced cybersecurity expert specializing in protecting digital assets, mitigating cyber threats, and ensuring compliance with industry standards. Skilled in network security, penetration testing, risk assessment, and incident response. Passionate about safeguarding organizations from evolving cyber risks with cutting-edge security solutions. Let's secure your business together!
    Featured Skill Ethical Hacking
    Government Reporting Compliance
    Compliance
    Information Security
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.