Hire the best Certified Ethical Hackers in Nigeria
Check out Certified Ethical Hackers in Nigeria with the skills you need for your next job.
- $40 hourly
- 5.0/5
- (127 jobs)
If you're in cybersecurity, AI, or digital transformation, you know how tough it can be to translate complex ideas into content that truly connects. That’s where I come in. I specialize in crafting engaging, research-driven content—from cybersecurity eBooks and AI-driven transformation articles to B2B Hero stories that showcase your impact. Whether you need to educate, inform, or convert, I create content that speaks to your audience and builds your brand authority. ✅ What I bring to the table: Clear, compelling content that simplifies complex topics SEO-optimized articles that drive engagement Thought leadership pieces that position you as an industry expert A deep understanding of cybersecurity, AI, and data management I’ve worked with tech companies across North America, Europe, the Gulf, and APAC, helping them share their expertise and stand out in a crowded market. Let’s connect and turn your insights into content that delivers real results! Cybersecurity Content Writer | Ghostwriter | Ebook Writer | Whitepaper Specialist | Amazon KDP Expert| Web3 Blog Writer|Academic Research & Editing Services P.S. Let’s team up and create the content your business deserves. Please shoot me a project invite, and let’s get started! 🚀Ethical Hacking
Social Media MarketingNewsletterEmail MarketingArticle WritingDigital TransformationWhite Paper WritingArtificial IntelligenceTech & ITContent WritingNetwork SecurityEbook WritingInformation SecurityDisaster RecoveryGhostwritingTechnical Writing - $60 hourly
- 4.7/5
- (205 jobs)
The world of tech-based writing is plagued with one thing - complexity. There are tons of complex concepts - too many to name - with more coming up every day. You need a writer with proven knowledge of technology and innovation to cook up easy-to-read content that would appeal to an average reader without losing the message. In other words, YOU NEED ME! Whether you have website blog content you want to write, a complicated research paper in the technology space, you need help with developing highly captivating website content for your SaaS, Cybersecurity, or tech company, or you're in urgent need of writing innovative articles for publication, I can work with you to ease your pain, help accommodate your writing woes with gusto and flair. HERE'S WHAT PREVIOUS UPWORK CLIENTS ARE SAYING ABOUT MY TECHNICAL WRITING SERVICES: "Gray is a highly skilled SEO content writer with a strong understanding of search intent and how to create content that will rank well in search engines. He is also a very creative writer with a knack for coming up with engaging and informative content that is both informative and enjoyable to read. Gray is also a highly organized and efficient worker who is always willing to go the extra mile to meet deadlines. I would highly recommend Gray to anyone looking for an SEO content writer who is both talented and professional." "Gray's SEO content writing for AlgoSec was exceptional! His expertise in optimizing content for search engines and engaging writing style made them an invaluable asset. Gray delivered high-quality work on time, and his professionalism and willingness to incorporate feedback were commendable. I highly recommend Gray for anyone in need of a skilled SEO content writer." "Gray produced a quality article for a difficult copy. It shows he is a good researcher and writer - something that is hard to come by these days!" Please use the "Invite" button to contact me. Let's get started! Cheers.Ethical Hacking
Health & FitnessContent WritingBlog WritingWebsite ContentGhostwritingEbookCopywritingArticle WritingAbout Us PageTechnical ReportCloud SecurityTechnical WritingInformation SecurityTech & ITSEO Writing - $15 hourly
- 5.0/5
- (11 jobs)
Hi, Thank you for stopping to check my profile. I am a professional and versatile freelancer. I am dynamic and proactive, and always ready to take on challenges. I take pride in giving 100% job satisfaction. My work experience includes but are not limited to the following: •Customer Service •Accounts Assistant (Knowledgeable in basics of Quickbooks) •Admin Support •Data Entry/ Analytics •Pivot and Visualization •Email Support •Chat Support Assistant •Information Security •Web/Online Research •Email Handling/Management - Outlook, Gsuite, Yahoo, Gmail I work pretty well under pressure and I can manage multiple projects concurrently without sacrificing the quality. I value communication too; it's very important to me that both are on the same page and has the same goal. I strive to give my best in my outputs to ensure my clients get their money's worth. Why hire me? • Fluent English. • Very diligent, I will take my time to get to know you and your business. I’m always available if you need support. • I have over 8 years of experience handling multiple tasks. • Proficient in using office tools • I am a quick learner. • Excellent Communication skill. You can see reviews from other clients I have worked with.Ethical Hacking
Information SecurityTravel PlanningVirtual AssistanceDraft CorrespondenceData CleaningGoogle WorkspaceCustomer ServiceCRM SoftwareFile ManagementAdministrative SupportMicrosoft ExcelEmail SupportPhone SupportOnline Chat Support - $20 hourly
- 4.8/5
- (88 jobs)
Hello! With 8 years of experience writing copy for clients in technological niches such as cybersecurity, SAAS, artificial intelligence, VPNs, web proxies, cloud computing, and blockchain, I craft copy that converts and content that builds trust and authority. My tailored strategies drive sales, improve ROI, and establish your brand as an authority. I will craft a unique message that aligns with your brand, audience and vision. I will help you to develop high-quality, informational, insightful, and engaging content with the primary purpose of educating and engaging your readers while building brand trust. Here’s what to expect from my research workflow for your projects: I get to know your company by immersing myself in your product/service, style guides, and company documents. Work from your brief, asking all necessary questions to ensure we have the same vision. Analyze competitive articles to stay one step ahead with your article. Schedule and conduct interviews with subject matter experts to add credibility to the piece. Find case studies and real-life examples to support the thesis and meet your business objectives. I gather the latest statistics from reliable sources to give your content up-to-date relevance. My expertise in technical writing/IT and technology includes: Crafting well-researched SEO articles Writing effective and engaging web/product copy Developing relatable and useful case studies Landing page writing and optimization Researching and writing knowledge base articles/user guide Writing objective service/product review Content updates And more! Working with me to write your copy and content is a win-win solution. My goal is to build and nurture clients' trust in your brand and improve your overall ROI. With enough experience writing technology-related deliverables, I understand the language and style that suit a wide range of audiences, services and products. Additionally, I have sufficient expertise in AI prompting, AI optimization and AI editing. Reach out now to allow me to make your brand stand out.Ethical Hacking
Information SecurityBlockchainTech & ITInformation TechnologyVPNSoftwareCloud ComputingCybersecurity ToolInternet of ThingsWeb ProxyCopywritingScientific WritingCryptocurrencyBlog WritingSEO Writing - $45 hourly
- 5.0/5
- (5 jobs)
Hello there, I'm Desmond Agbo. I see that you need assistance with your gig. I can execute it for you. I'm an Actor in the Nigeria Nollywood movie industry. I'm a YouTube video editor, Digital Content Creator, Virtual Assistant, a Music Artist. A voice Over Artist. A writer and a Cinematographer. I'm into advert, commercial and music video model. Due to my wealth of talent, the gig won’t be difficult for me! I’ll expressly deliver on time! I deliver before time. A great turnaround time Customer satisfaction is my goal. I bring out my best till my clients are satisfied. I will love to work with you. Please hit me up. Thank you.Ethical Hacking
Voice-Over RecordingApp DevelopmentNarrationInformation SecurityArticle WritingVideo ProductionVoice-OverVideo Editing & ProductionWeb DevelopmentVideo CommercialVoice ActingGoogle Ad ManagerVoice RecordingWritingSoftware DevelopmentMaleMiddle-Aged AdultUS English Dialect - $50 hourly
- 4.9/5
- (45 jobs)
Let’s be real: no matter how much they deny it, the sales team needs the marketing team. Why? Because closing deals often require a little extra nudge content. And trust me, you don’t want to hire a cybersecurity content manager, strategist or writer who’ll mess it up. You want to hire me. Why me? Glad you asked. I have a degree in computer engineering with a focus on cybersecurity. That means I speak your audience’s language and know the technical jargon that hits the mark. But knowing the lingo isn’t enough, right? I also have 5 years of experience in cybersecurity content marketing, so I can take your content from idea to publication—seamlessly. Not only that, I've also written for top cybersecurity brands like Keyfactor, Cobalt, Palo Alto (Unit 42) and I have written for publications like Dark Reading, Tripwire, etc. When I say “cybersecurity marketing content,” I mean whitepapers, reports, eBooks, buyer's guides, case studies, newsletters, and even the occasional landing or sales page. I can work solo, in-house, or with your agency—whatever suits you best. Either way, I’ll deliver marketing content that helps your sales team close deals and seal the success. So, what are you waiting for? Say hi, and let’s start closing those deals.Ethical Hacking
Cloud ComputingInformation SecurityReviewVirtual RealityContent EditingSearch Engine OptimizationAT&T CybersecurityCase Study DesignContent WritingWritingArtificial IntelligenceWhite Paper WritingEditing & ProofreadingTechnical Case Study - $35 hourly
- 5.0/5
- (0 jobs)
I offer one of the best hacking service provider in the Blacksites. There is a question that arises about how to choose the best hacker for hacking needs. There are following essential points, where you have to hire a hacker online. ✔ Catch Cheating Partner ✔ Access Confidential Info ✔ Evidence for Court Case ✔ Trace a Stalker ✔ Child Monitoring ✔ Monitor Employees ✔ Monitoring Services for any phone ✔ Android Monitoring ✔ iOS Monitoring. ✔ iCloud Monitoring ✔ Parental Control ✔ Phone Hacking ✔ Website Hacking ✔ Social Media Account ✔ Fix Bad Credit Score ✔ Online Reputation Management ✔ Online Article/Blog Post Removal ✔ Grade Change Service ✔ Crypto Currency Related Hacking and Recovery of Lost Crypto How to Hire a Hacker? ★★★ Simply send me a message and submit a contact form to reach out to me. ★★★ I have more than 9 years of experience in the hacking industry and we are specialists in hacking services with an outstanding hacking team. Do you know? I also work witj a huge team of engineers dedicated to hacking and the growth of mobile and web applications. Our team of expert hackers has over 12 years of experience in Ethical Hacking! We provide full phone monitoring services for situations like suspected cheating spouses or partners. Send us a message and we may offer the hacking service you need. Our proprietary app allows you to remotely monitor any device in real-time, without physical access. We have a large team dedicated to full phone monitoring for clients who need it for spouses, partners or kids. Hire one of our pros for genuine, professional services.A wide range of Ethical Hacking services is available 24/7 with online support. We ensure 100% safety and anonymity when hiring from us. Connect with our trusted, expert hackers nowEthical Hacking
Recover Data Recovery SoftwareGmailSnapchatTwitter/XWhatsAppFacebookWiresharkHackerRankGrowth HackingData MiningInternet SecurityInformation SecurityNetwork SecurityPenetration Testing - $40 hourly
- 5.0/5
- (8 jobs)
I am an enthusiastic Information Security professional with 10 years’ experience in SAP business application security, infrastructure security, ethical hacking, enterprise governance, risk and compliance, cybersecurity training and research. I have worked in various industries, including Oil & Gas, Retail, Professional Services and Education. With a B.Sc. in Computer Science, M.Sc. in Computer & Network Security, and relevant industry certifications, I am able to work on a wide range of Information Security projects. When working on a new project, I like to speak with my clients so that I can have a clear understanding of their needs and vision of the project. Thank you in advance for your time and consideration. I look forward to working with you soon.Ethical Hacking
Web DesignCryptographyGovernance, Risk & Compliance SoftwareInformation Security GovernanceCybersecurity ManagementCreative WritingNetwork AnalysisSystem AdministrationISO 27001Security AnalysisSAP BASISSAP ERPInformation SecurityNetwork Security - $40 hourly
- 5.0/5
- (19 jobs)
Are you concerned about the safety and integrity of your digital infrastructure? Look no further! As an experienced Security Engineer, I specialize in safeguarding your digital assets against evolving threats, ensuring your peace of mind and your organization's uninterrupted operation. What I Offer: I design and implement robust network security solutions, safeguarding your data against unauthorized access and cyber threats. I also perform in-depth code analysis, penetration testing, and security reviews to identify and patch vulnerabilities before they can be exploited. With over 4 years in the field, I've honed my skills working with diverse clients, from startups to enterprises. I've encountered and overcome a wide range of security challenges. Your security is my top priority. I work closely with you to understand your specific needs and tailor solutions accordingly. If you're ready to fortify your digital defenses and protect your business, let's discuss how I can help. Contact me to explore how we can work together to make your online presence secure.Ethical Hacking
Microsoft Endpoint ManagerCyberARKCybersecurity ToolMicrosoft Exchange OnlineCybersecurity ManagementIncident ManagementISO 27001Information SecurityMicrosoft SharePointSystem AdministrationOffice 365Microsoft Windows PowerShell - $5 hourly
- 5.0/5
- (2 jobs)
With over 5 years of experience in a service-oriented environment, I have consistently delivered outstanding customer support. My expertise in utilizing Zendesk as a support tool has enabled me to maintain a customer satisfaction rating exceeding 87%, while also reducing interaction errors to below 3% during my tenure at Channels Television. I have successfully collaborated with cross-functional teams to drive effective problem-solving and process improvements, ensuring a streamlined approach. I am a dependable and detail-oriented professional, committed to providing top-notch service. I look forward to bringing my skills and experience to your project.Ethical Hacking
Email SupportOnline Chat SupportAdministrative SupportCustomer Feedback DocumentationEnglishVirtual AssistanceZendeskCritical Thinking SkillsCustomer ServiceCommunication SkillsCloud ComputingPython-RequestsUX & UIInformation SecurityCustomer Support - $8 hourly
- 4.9/5
- (10 jobs)
Hi, I'm ThankGod! thank you for reading my profile! I hope you're happy and healthy. I LOVE my job. I know that sounds cliché, but I'm not going to apologize for being excited about what I do. What exactly is that? I'm glad you asked! Officially, I am a creative, skilled social media manager and customer service with years of experience managing professional social media accounts and can help you Recover you disabled Social media accounts. Not only that I'm pretty fearless when it comes to taking on challenges. But enough about me, let's talk about you and your needs. I'm ready to dive in and help you reach your business goals. Let's do this! Click the message button let's discuss more 💖Ethical Hacking
Virtual AssistanceSocial Customer ServiceCustomer EngagementInformation SecurityFacebookInstagramCustomer SupportCustomer CareSocial Media Account SetupCustomer ServiceSocial Media Management - $15 hourly
- 4.9/5
- (8 jobs)
"Enhance Your Business’s Security, Efficiency, and Creativity with a Multifaceted IT Professional" Are you looking for an IT expert who can deliver exceptional results? Look no further! As a seasoned professional in Information Security, IT Support, Software Engineering, and 3D Artistry, I bring a unique blend of skills to tackle diverse projects effectively. With a proven track record in various IT roles and certifications, I ensure your projects are executed with precision and creativity, driving business success and innovation. Core Skills: Security Tools: Proficient in Microsoft Sentinel, Splunk, BurpSuite, Metasploit, Nmap, and Wireshark. Programming Languages: Skilled in C++, Python, Java, JavaScript, and PHP. Frameworks: Expertise in Django, and Flask for robust software development. Databases: Experienced with MySQL, PostgreSQL, and MongoDB for effective data management. Cloud Computing: Skilled in AWS (S3, EC2), Azure, and Google Cloud Platform (Compute Engine, VPN). Operating Systems: Proficient in Windows, Linux, macOS, and Windows Server. Software Tools: Experienced with Google Workspace, ClickUp, Jira, and Active Directory. Project Management: Efficiently manage projects, ensuring timely delivery and adherence to standards like ISO 27001 and ISO 9001. Communication: Excellent communication skills for presenting insights and collaborating with cross-functional teams. 3D Artistry: Creating detailed and immersive 3D models and animations to bring ideas to life. I am a client-focused individual dedicated to helping you achieve your goals. With my extensive skills and experience, I can help you unlock the full potential of your IT infrastructure, software solutions, and creative projects. Let's collaborate to drive growth and success for your business.Ethical Hacking
Information SecurityRisk AnalysisLinux System AdministrationPythonIT Service ManagementDatabase Management3D ModelingData EntryData RecoveryCharacter AnimationTechnical Support3D AnimationCharacter Design - $20 hourly
- 5.0/5
- (2 jobs)
With over 2 years in the cybersecurity industry, using OSINT is part of what I do best. I am also good at other INT areas such as GEOINT and DARKINT (dark web intelligence) 👉🏼As an OSINT investigator, I can help you trace ip addresses, de-anonymize digital identities and geolocate images. 👉🏼I also offer cryptocurrency investigation and research services Promising 100% results every time would be a blatant lie. Why? because factors like time allocated for the project and other case by case factors lead to different outcomes for different cases. I can promise a refund if I don’t deliver. Do I seem like a good fit for your project? Send me a message, let’s talk about it!Ethical Hacking
Digital ForensicsSecurity AnalysisInformation SecurityLinkedInTech & ITArticle WritingGhostwritingWritingEmail & NewsletterEmail MarketingCopywritingContent WritingBlog Writing - $20 hourly
- 5.0/5
- (4 jobs)
I am a Senior Cybersecurity/Information Security Analyst with 4 years of professional experience in the SOC field, providing services to leading corporations and medium-sized businesses in various industries. I have developed expertise in the following areas: ✔️Configuring SIEM alarm rules and professional services ✔️With over 2 years of hands-on experience in utilizing industry-leading SIEM platforms such as ArcSight, Splunk, Wazuh, IBM QRadar, Rapid7, Microsoft Sentinel, and Alienvault (Appliance and Anywhere). ✔️Developing use cases to enhance the maturity of the environment. ✔️Expertise in SIEM administration and deployment and integration of log sources. ✔️Cybersecurity incident analysis and report writing. ✔️Writing framework documentation, including policies and procedures, and also writing technical reports. ✔️Training employees on various aspects of Cybersecurity Awareness. ✔️Performing vulnerability assessments and penetration testing. ✔️Parsing logs using regex. ✔️Proficiency with endpoint solutions like (MDE, Carbon Black, SentinelOne, Crowdstrike Falcon) I also specialize in digital forensics and cyber investigation services to uncover the truth behind cyber incidents. I bring: a) Digital Forensics: Expert analysis of digital devices to retrieve critical evidence. b) Incident Response: Swift response to contain breaches and identify attack vectors. c) Network & System Analysis: Identification of unauthorized access and vulnerabilities. d) Malware Analysis: In-depth examination to determine malware nature and impact. Here’s a highlight of the SIEM Tools I have extensive experience working with: - ArcSight - Splunk - Wazuh, - IBM QRadar, - Rapid7, - Microsoft Sentinel, - Alienvault (Appliance and Anywhere) ⭐️ Services: 🔍 Penetration Testing & Vulnerability Assessments 🌐 API Security Assessment ☁️ Cloud Penetration Testing 🌐 Web Application Penetration Testing 📱 Mobile Application Penetration Testing 🏢 Enterprise Network Penetration Testing 🤖 Social Engineering Assessments 📶 Wireless Network Security Testing 🌐 IoT (Internet of Things) Security Assessment I have acquired practical experience using the following tools: security awareness platforms, firewalls like Fortinet, Checkpoint, and Cisco, endpoint protection with MDE, Carbon Black, SentinelOne, Crowdstrike Falcon, ISO 27001, Packet Tracer (Wireshark), vulnerability assessment with Nessus, and web application penetration testing using Nmap and Burp Suite. My expertise is not just theoretical but strongly grounded in real-world applications, ensuring that I bring a practical and impactful approach to all projects. You can trust that my approach is grounded in a commitment to thorough attention to detail and the highest standards of professionalism.Ethical Hacking
Network Penetration TestingLinuxTest DevelopmentBash ProgrammingPython ScriptOperating Systems DevelopmentNetwork SecurityCyber Threat IntelligenceCybersecurity ManagementCybersecurity ToolInformation SecuritySOC 2Digital ForensicsCybersecurity MonitoringSecurity Operation CenterPenetration TestingLinux System AdministrationNessusSecurity EngineeringPython - $30 hourly
- 4.6/5
- (16 jobs)
As a highly skilled and certified cybersecurity professional specializing in Vulnerability Assessment and Penetration Testing (VAPT), I help businesses of all sizes identify and address critical security flaws before malicious actors can exploit them. With a hands-on approach, I provide thorough security assessments designed to uncover vulnerabilities across web applications, networks, and cloud infrastructures. Why Work With Me? Expert Penetration Testing: I conduct in-depth, real-world penetration tests on your systems—whether it's your website, internal network, or cloud setup. I simulate attacks to uncover hidden vulnerabilities, security misconfigurations, and weaknesses in your defenses. Comprehensive Vulnerability Assessments: Using cutting-edge tools and techniques, I assess the security posture of your infrastructure, ensuring that every aspect, from applications to network protocols, is thoroughly tested and secured. Detailed Reporting with Actionable Insights: I deliver detailed, clear, and easy-to-understand vulnerability reports, including step-by-step remediation recommendations tailored to your specific needs. My reports empower your team to address security risks efficiently and effectively. Web Application & Cloud Security: I specialize in testing both web applications and cloud-based systems (AWS, Azure, GCP), focusing on key vulnerabilities like SQL injection, Cross-Site Scripting (XSS), privilege escalation, and misconfigured cloud services that can compromise your data. Real-World Security Audits: I conduct full security audits that cover everything from infrastructure configurations to access controls, ensuring your security policies are robust and aligned with industry best practices. Expert in Latest Threats & Tools: I stay up-to-date with the latest security threats, exploits, and penetration testing tools (e.g., Burp Suite, Metasploit, Nmap, Nessus) to ensure your systems are protected against emerging attack vectors. My Process: 1. Initial Consultation: Understanding your business and security needs. 2. Vulnerability Assessment: A thorough review and scan of your systems. 3. Penetration Testing: Real-world attack simulation to identify critical flaws. 4. Reporting & Remediation: Clear reports with prioritized remediation steps. 5. Post-Test Support: I’ll be with you every step of the way to help fix issues and ensure long-term security. Industries Served: 1. Finance & Banking 2. E-commerce & Retail 3. Healthcare 4. Tech & SaaS 5. Government & Enterprises My goal is to make your systems secure, resilient, and compliant with global standards such as OWASP, GDPR, PCI DSS, and more. If you're looking for a cybersecurity expert who is not only technically proficient but also committed to safeguarding your business, I’m here to help. Let's connect and start securing your future today.Ethical Hacking
NIST Cybersecurity FrameworkInformation SecurityNetwork SecurityWebsite SecuritySystem SecurityCybersecurity ToolCybersecurity MonitoringAntivirus & Security SoftwareSecurity EngineeringCloud SecurityInformation Security Threat MitigationCybersecurity ManagementAI SecuritySecurity TestingReport Writing - $40 hourly
- 0.0/5
- (0 jobs)
Highly skilled GRC and cybersecurity professional with 4+ years of experience in Governance, Risk, and Compliance (GRC) and Vulnerability Assessment and Penetration Testing (VAPT). Proven track record in strengthening organizational security posture, advancing maturity levels, and ensuring regulatory compliance. Core Expertise - Governance, Risk, and Compliance (GRC): Developing and implementing effective GRC strategies to ensure regulatory compliance, manage risk, and align with business objectives. - Information Security Strategy Development: Creating tailored security strategies to protect assets, data, and intellectual property. - GRC Transformation: Guiding organizations through GRC transformation to achieve optimized maturity levels, reduce risk, and improve compliance. - Vulnerability Assessment and management : Identifying vulnerabilities and weaknesses to strengthen security and protect against cyber threats. Technical Skills - Compliance Management (e.g., ISO 27001 and 2301, NIST, PCI DSS, GDPR) - Risk Management - Security Policy Development - Vulnerability Assessment - Penetration Testing - Ethical Hacking What I Can Do for You As a seasoned GRC and cybersecurity expert, I can help you: - Develop and implement effective GRC strategies. - Strengthen your organizational security posture. - Advance your maturity levels to optimized. - Ensure regulatory compliance. - Identify vulnerabilities and weaknesses through VAPT. - Create tailored security strategies to protect assets and data. Certifications - CISM -eJPTv2 - CC - CAP - ISO 27001 Lead ImplementerEthical Hacking
Policy DevelopmentTrainingInformation SecurityCybersecurity ManagementCommunication Skills - $20 hourly
- 5.0/5
- (2 jobs)
Hi, my name is Taofeek and I'm a certified IT support professional and Cybersecurity analyst. I have a passion for solving IT related problems.Ethical Hacking
Regex WritingJavaScriptTechnical SupportTroubleshootingWindows AdministrationInformation SecurityComputing & NetworkingLinux System AdministrationWindows ServerProblem Solving - $50 hourly
- 0.0/5
- (0 jobs)
CAREER OBJECTIVE To work collaboratively with IT Security Professionals in promoting the business objectives and goals of a Corporate Organization, and to contribute my quota in the protection of its critical infrastructures as well as securing its cyberspace.Ethical Hacking
Cybersecurity MonitoringInformation TechnologyMicrosoft OfficeCyber Threat IntelligenceComputing & NetworkingComputer NetworkNetwork Penetration TestingPenetration TestingInformation SecuritySystem SecurityIncident Response Plan - $9 hourly
- 5.0/5
- (5 jobs)
Hi, I’m Matthew — an IT Support Specialist with 10+ years of experience supporting users, deploying secure systems, and solving complex technical problems both remotely and on-site. Certifications: Google IT Support Professional Google Cybersecurity ISO/IEC 27001:2022 Associate ISC2 Certified in Cybersecurity What I Do: Helpdesk support (email, phone, remote connection, and on-site) Windows server and desktop deployment (secure, multi-user) Software/hardware troubleshooting Remote access setup and management Experience with Zendesk, Freshdesk, Zapier (for automation) Familiarity with Mikrotik and Ubiquiti environments I’m committed to fast, friendly, and effective tech support. Whether you're a business, school, or startup, I’m ready to keep your users happy and your systems running smoothly.Ethical Hacking
HelpdeskCiscoMikroTikUbiquitiRemote IT ManagementSystem AdministrationCyber Threat IntelligenceIT SupportmacOSWindows ServerWindows AdministrationInformation SecurityServerNetwork EngineeringMicrosoft Office - $20 hourly
- 5.0/5
- (8 jobs)
Welcome to my Upwork profile, "Are you looking for an experienced and highly skilled information security consultant? Look no further! I am a certified cybersecurity professional with over 5 years of experience in the field. My expertise includes vulnerability assessments, incident response planning, penetration testing and security management. I have a proven track record of success in securing networks and systems for clients in various industries. I understand the importance of staying up-to-date with the latest security threats and trends, and I can work with you to develop a comprehensive security plan that meets your unique needs. Whether you're looking to improve your overall security posture or respond to a specific incident, I have the skills and experience to help. In addition to my technical skills, I pride myself on my ability to communicate complex technical concepts in a clear and concise manner, making sure that you fully understand the steps that I am taking to protect your business. I'm confident that I can help you protect your business and mitigate risks, and I would love the opportunity to work with you. Please feel free to contact me to discuss your project in more detail, and I will be happy to provide you with a detailed proposal outlining my approach. Thank you for considering me for your project, I look forward to hearing from you soon!"Ethical Hacking
Technical WritingSecurity Operation CenterInformation Security Threat MitigationNIST Cybersecurity FrameworkCyber Threat IntelligenceNetwork MonitoringCybersecurity MonitoringSecurity FrameworkInformation SecurityCybersecurity ManagementNetwork SecurityMetasploit - $200 hourly
- 5.0/5
- (1 job)
TECHNICAL/M365 SUPPORT ENGINEER / NETWORK ENGINEER Motivated Technical Support amd M365 Engineer seeks new position in dynamic, growth-oriented company focused on cultivating exceptional customer experience. With experience handling networking concerns, implementing new software, installing new hardware, and addressing user concerns. 11, Deyinde Street, Graceland Estate, Egbeda Lagos. +234 7061210649 babsonsamuel@yahoo.com SKILLS * Excellent communication skills (written and verbal) with the ability to clearly explain IT concepts to both technical and non-technical users. * Strong analytical skills with demonstrated problem solving ability. * Excellent communicator at all levels. Empathizes with user frustrations; capable of dealing with people in a calm, professional and effective manner. * Computer hardware assembling, dissembling, configuration and maintenance of computers and troubleshooting of PC and printer's problemEthical Hacking
Computing & NetworkingServer AdministrationComputer EngineeringCisco RouterCloud ComputingOffice DesignComputer NetworkInformation SecurityCiscoMicrosoft OfficeLAN AdministrationOffice 365Engineering & ArchitectureComputerNetwork Equipment - $30 hourly
- 4.7/5
- (51 jobs)
Account Recovery Specialist /Expert | Ethical Hacker | Cybersecurity Expert 🔥 Need urgent help recovering your Facebook, Instagram, TikTok, Snapchat, or Gmail account? Or looking to secure your website, app, or server against cyber threats? I'm Abdul-Azeez Hammed., an Account Recovery Specialist and Certified Cybersecurity Expert with 5+ years of experience. I help individuals and businesses recover hacked, suspended, locked, disabled accounts quickly and secure their digital assets professionally. ✅ Social Media Account Recovery Services: Facebook Page and Profile Recovery Instagram Account Recovery Gmail and Email Account Recovery TikTok and Snapchat Recovery ✅ Cybersecurity Services: Website & Web App Penetration Testing Vulnerability Assessment and Security Reports Ethical Hacking (Web, API, Network) Malware Removal and Security Hardening Why Choose Me? 5+ Years Experience 100+ Accounts Recovered Certified Ethical Hacker (CEH) and Cybersecurity Specialist Fast Communication, Full Confidentiality 🛡️ Whether you need urgent account recovery or professional security testing — I’m here to help you. 📩 Contact me today — let's secure your success!Ethical Hacking
Social Media Account SetupSocial Media MarketingInstagram APIInternet SecurityTechnical SupportInformation SecurityNetwork SecurityVulnerability AssessmentTroubleshootingData RecoveryCybersecurity ManagementSocial Media ManagementInstagramFacebook - $10 hourly
- 5.0/5
- (4 jobs)
MICROSOFT 365 TECHNICAL SUPPORT ADMINISTRATOR PROFESSIONAL PROFILE STATEMENT Dedicated and ambitious professional with 3 years of work experience and proven knowledge of Microsoft 365 technologies, software, hardware, and networking. Extensive experience in troubleshooting and resolving complex IT issues, providing professional technical support for users, and managing IT projects. Excellent diagnostic and problem-solving skills with a commitment to delivering cost-effective and high quality IT solutionsEthical Hacking
TrainingMicrosoft Active DirectoryMicrosoft Outlook DevelopmentComputer SkillsOffice 365Microsoft AzureMicrosoft OfficeTechnical Project ManagementMicrosoft OutlookInformation SecurityTech & IT - $12 hourly
- 5.0/5
- (1 job)
💬 Schedule a Free Consultation! Ready to elevate your application security? 🔐 I specialize in cutting-edge vulnerability assessments, software testing, web application security and mobile application VAPT that follow NIST SP 800-115 standards, OWASP WSTG methodology and leverage the latest techniques in the field. 🚀 With a focus on pinpointing and addressing potential threats, I'll help you safeguard your applications and keep your data secure. 🛡️ Let’s take your security to the next level! 🌐 🔒 My Expertise: • Mobile App VAPT • API Testing • Web Testing • Information Security • Manual QA Testing • Penetration Testing Why Work With Me (www.me)? 🌟 Customized Approach: Your needs are unique. I tailor my methods to deliver the most comprehensive and effective security testing for your specific requirements. ⏰ Timely Delivery: Time is critical in security. I ensure on-time delivery of detailed reports without compromising quality. 🔍 Complete Manual Testing: I provide thorough manual testing and immediate notifications if high-impact issues are found. 🔄 Unlimited Retesting: Fixed issues get unlimited retests and revisions to ensure robust security. 🔑 Critical Bug Detection: My expertise allows me to uncover critical vulnerabilities often missed by automated tests. ________________________________________ Tools and Methodologies: • Manual Testing: BurpSuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), Metasploit Framework, SQLmap, OWASP ZAP • Automated Testing: Acunetix, Nessus, Netsparker, Nikto etc.. ________________________________________ Penetration Testing Services: 1. Comprehensive Testing: I implement Manual and automated testing of all functionalities, including internal tests and network infrastructure assessments with tools like BurpSuite Professional, Acunetix, Nessus and lots more. 2. Detailed Reporting: I provide you with In-depth reports with exploitation methods, proof-of-concept screenshots, CVSS v3.0 risk scores, and impact analysis. 3. Remediation Guidance: Every report is accompanied with a clear advice on fixing vulnerabilities and understanding their risks. 4. Free Retests: I offer free retest to ensure your fixes work as intended with included retesting. Key Competencies: 🔥 Penetration Testing: Thoroughly identify and exploit vulnerabilities using a blend of manual and automated techniques to simulate real-world attacks. 🔥 Web / Mobile Application Vulnerability Assessment: Carefully uncover vulnerabilities like SQL injection, cross-site scripting (XSS), and more to strengthen your web security. 🔥 Source Code Review: Detailed code analysis to find and fix security flaws early in the development process. Consultation Services 🔥 Security assessment strategy sessions 🔥 Custom vulnerability analysis 🔥 Tailored recommendations and action plans 🔥 Follow-up consultations for ongoing support About Me: I am a passionate cybersecurity analyst specializing in penetration testing, web application vulnerability assessment, source code review, I offer comprehensive security solutions for various industries. I am committed to delivering exceptional service that meets your security goals and exceeds your expectations. Let’s work together to safeguard your infrastructure.Ethical Hacking
NessusWeb ProxyWeb TestingAPI TestingInformation SecuritySoftware TestingNetwork SecurityMetasploitOWASPVulnerability AssessmentWeb Application SecurityPenetration Testing - $15 hourly
- 5.0/5
- (13 jobs)
☆☆☆☆☆ "Israel is accommodating. He makes extra effort to help his clients. All the best for your future endeavors! :)" Are you searching for a skilled Technical Support Specialist or a Customer Success expert with a proven track record of resolving over 1,000 support tickets? I specialize in helping businesses overcome complex IT challenges, optimize productivity, and ensure seamless operations. Unlike others, I don’t just troubleshoot—I empower organizations by delivering lasting solutions and exceptional customer experiences. With my expertise, I’ve resolved Microsoft 365 and Google Workspace issues, including Outlook configurations, domain setups, and email authentication protocols like MX records, SPF, DKIM, and DMARC, leading to significant operational improvements for well-known organizations. Here’s what I bring to the table: - Expert-level support for Microsoft 365 and Google Workspace environments. - Comprehensive experience in securing Microsoft 365 and implementing best practices. - Expertise in domain setups and configuring MX records, SPF, DKIM, and DMARC for secure and reliable email delivery. - Quick diagnosis and resolution of performance issues with a focus on urgency. - Reliable, round-the-clock communication to meet your needs. - A results-driven mindset focused on adding value to your business. My technical skills include: - Office 365 & Google Workspace Administration - Microsoft Exchange, Teams, SharePoint, and Azure - Domain setup and email authentication (MX, SPF, DKIM, DMARC) - Windows Server & Desktop Support - PowerShell scripting - Compliance and Information Security -Onedrive setup - Teams setup If you’re ready to eliminate IT frustrations, enhance system performance, and elevate customer satisfaction, let’s connect! Microsoft 365 Expert | Google Workspace Specialist | Domain Setup & Email Authentication Pro | Technical Support Professional | Customer Success Advocate| Onderive | Teams | End user technical supportEthical Hacking
Information Security ConsultationCybersecurity MonitoringEmail DeliverabilityOffice 365Cloud MigrationTechnical SupportEnd User Technical SupportMicrosoft OutlookEmail SecurityData MigrationGoogle Workspace AdministrationInformation Security AuditInformation SecurityIT SupportMicrosoft Office - $8 hourly
- 4.6/5
- (1 job)
I am Chuka, an Expert Tech Support / Cybersecurity Professional with 8+ years of experience. I specialize in empowering leaders and organizations through technical support, cybersecurity, and exceptional customer success services. Let's collaborate for success! 🚀 I am passionately driven to optimize digital security for executives and individuals, consistently making impactful contributions to organizational growth. I am a highly motivated and results-oriented professional with excellent communication and interpersonal skills. I innovate processes, foster team excellence, and drive down operational costs. 💡 HIGHLIGHT OF MY TECHNICAL SKILL INCLUDE: 🎣 Phishing Expertise 🧠 Provide Cybersecurity Awareness and Training 📧 Email Security 💻 Linux and Other OS 🔧 Technical Support 📩 Email Marketing 🤝 Email & Chat Support 🌐 Tech & IT Support 💼 Administrative Efficiency 💰 Cryptocurrency Acumen 🔒 Information Security Send me a message now and lets have a chat Best🤝Ethical Hacking
SplunkAgile Project ManagementExecutive SupportEmail SecurityLinux System AdministrationTechnical SupportEmail MarketingEmail CommunicationAdministrative SupportCryptocurrencyInformation SecurityCustomer SupportOnline Chat SupportTech & ITEmail Support - $12 hourly
- 5.0/5
- (1 job)
I am a dedicated Information Security professional with a proven track record in safeguarding digital assets and ensuring the integrity, confidentiality, and availability of sensitive information. Possessing a deep understanding of cybersecurity principles, risk management, and compliance frameworks, I am adept at implementing robust security measures to protect against evolving threats. My expertise extends across various domains, including network security, application security, and data protection. Proficient in the following; - SOC Analysis - Identifying Indicator of Compromise - SIEM Monitoring / Engineering - Incident Handling - Endpoint Detection and Response Tools - Threat Hunting - Linux/Windows Administration - Ethical Hacking - DevSecOps In addition to technical proficiency, I excel in collaborating with cross-functional teams, communicating complex security concepts to non-technical stakeholders, and developing comprehensive security awareness programs. My goal is to create a resilient and secure digital environment by implementing best practices, fostering a culture of security awareness, and adapting to the ever-changing threat landscape.Ethical Hacking
Linux System AdministrationCyber Threat IntelligenceIncident Response PlanSOC 2SOC 1Information Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.