Hire the best Information Security Audit Freelancers in Delhi, IN
Check out Information Security Audit Freelancers in Delhi, IN with the skills you need for your next job.
- $12 hourly
- 4.9/5
- (26 jobs)
Hi, I am Amit Singh and having 10+ years of significant and well-diversified experience in Cybersecurity domains, including ⭐Web Application penetration testing (SaaS, Cloud etc.)⭐Network Penetration testing(Servers, Active Directory, IoT etc.)⭐Web API pen-testing ⭐Mobile penetration testing (android & iOS)⭐Web 3.0 DApps & Smart Contract pen-testing (Blockchain technology)⭐ Source Code Review etc. 🏆Top Rated Profile on Upwork ✅I have performed penetration tests & vulnerability assessments and delivered professional reports to companies all over the world in accordance with: ☑️ Offensive Security (OSCP) standards ☑️ OWASP Top 10 Vulnerability ☑️ OWASP API Security Top 10 Vulnerability ☑️ OWASP Mobile Security Top 10 Vulnerability ☑️ Application Security Verification Standard 4.0 (ASVS 4.0) ☑️ CWE Top 25 Most Dangerous Software Errors ☑️ ISO 27001 Penetration Testing ☑️ Payment Card Industry Data Security Standard (PCI DSS) ☑️ General Data Protection Regulation (GDPR) ☑️ Common Vulnerability Scoring System (CVSS) ☑️ Open Source Security Testing Methodology Manual (OSSTMM) ✅ Cybersecurity Certifications:- ☑️ Certified eLearnSecurity Web application penetration tester (eWPT) ☑️ Certified API Security Professional( CASP) ☑️Certified Ethical hacker(CEH) ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ☑️ Executive Summary ☑️ Assessment Methodology ☑️ Type of Tests ☑️Risk Level Classifications ☑️ Result Summary ☑️ Table of Findings ☑️ Detailed Findings. Each finds listed within the report will contain a CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ✅ Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, checkmax and Zaproxy etc. Note-For more info lets connect over the chat section. ThanksInformation Security AuditEthical HackingSecurity Assessment & TestingWeb App Penetration TestingCode ReviewOWASPAPI TestingWebsite SecurityInternet SecurityNetwork Penetration TestingWeb Application SecurityPenetration TestingVulnerability AssessmentNetwork SecuritySecurity Testing - $15 hourly
- 5.0/5
- (127 jobs)
Web Penetration Testing(OWASP Top 10 methodology) | Network Penetration testing | OWASP API Security | Mobile Vulnerability Assessment(iOS and Android) | Source Code Reviews(.Net, Java, PHP) | Vulnerability Assessment and Penetration Testing | SIEM team (Cloud(AWS and Azure) Security, File Integrity Monitoring and Event Monitoring, Endpoint Security and Encryption, Data Loss Prevention, Network Access Control, Threat Monitoring (Email Traffic and Malware Analysis), Privileged Access and Identity Management) Have 7+ years of experience in both black box and white box testing penetration testing. Perform VAPT (Vulnerability Assessment and Penetration Testing) services for web applications, networks, mobile; source code reviews; malware analysis; server hardening; and security analysis etc. Conduct penetration testing in a systematic approach. Follow the standard methodology of the industry like OWASP Testing Guide v4(OTGv4); SANS top 25; NIST SP 800-115; PCI DSS to perform penetration testing so that client can concentrate on their professions without worrying about security threats. Web Application Testing: Do web application penetration testing with the latest methodology like OWASP Top-10, SANS Top-25. Perform both manual and automated penetration testing for vulnerabilities like Injection flaws(such as SQL, NoSQL, OS, and LDAP injection etc),Broken Authentication, Sensitive Data Exposure,XML External Entities (XXE), Broken Access Control,Security Misconfiguration, Cross-site scripting(XSS), Insecure Deserialization, Using Components with Known Vulnerabilities,Insufficient Logging & Monitoring. Also, perform source code reviews for many technologies like Java, NET, PHP etc. Approach for Manual Web-Application Penetration Testing: Conduct manual testing with following controls: * Configuration and Deployment Management Testing * Identity Management Testing * Authentication Testing * Authorization Testing * Session Management Testing * Input Validation Testing * Testing for Error Handling * Testing for weak Cryptography * Business Logic Testing * Client Side Testing Tools that use for Automated Web Penetration Testing: Acunetix, Burp-Suite, Netsparker, Nexpose, Nikto, IBM AppScan, HP fortify, W3af etc. Network penetration testing: Provide both external and internal network Penetration Testing so that your Network Infrastructure is secured from the real world attacks. Do both manual and automated network penetration testing. Approach for Manual Network Penetration Testing: Manually check for IDS/IPS, Server, Networks switch, Network Router, VPN, Firewalls, Anti-virus, Password etc. Tools that use for automated network penetration testing: OpenVas, Wireshark, Nessus, Metasploit, Armitage, Scapy etc. Mobile Application Penetration Testing: Perform mobile applications application penetration testing with the latest OWASP methodology(MSTG). Performed both manual and automated penetration testing for vulnerabilities like Weak Server Side Controls, Insecure Data Storage, Insufficient Transport Layer Protection, Unintended Data Leakage, Poor Authorization and Authentication, Broken Cryptography, Client Side Injection, Security Decisions Via Untrusted Inputs, Improper Session Handling, Lack of Binary Protections. Tools: Burp-Suite, HP fortify, Dex2Jar, Apktool, framework-res.apk, iNalyzer. Source Code Reviews: Perform source code reviews for both front and back-end languages. Perform source code reviews standard methodology like OWASP top 10. Do manual and automated source code reviews for various web based security vulnerabilities like SQL injection, Cross site scripting (XSS), CSRF, RFI,LFI, Authentication bypass etc. Tools: CheckMarx, IBM Appscan source for analysis, Microfocus HP Fortify. Security Analysis and Server Hardening: Regularly check and maintain your systems, servers to ensure that they comply with the standards. Do hardening application checks the item automatically on a daily basis and monitors all critical networks and server components. We support various frameworks like CIS benchmarking for Desktops & Web Browsers, Mobile Devices, Network Devices, Servers – Operating Systems, Virtualization Platforms & Cloud etc. Social Engineering: Have experience in social engineering vectors: Vishing, Phishing, Smishing, Impersonation. Used the following social engineering cycle to conduct social engineering: Gather Information: Here Information gathered from company websites, social media and other publications. Plan Attack: Next step is outline how intends to execute the attack Acquire Tools: After planning, next include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics is used in attacks such as password guessing. Tools: SET(Kali-Linux); GetGoPhishInformation Security AuditWeb TestingWeb Application SecurityWebsite SecurityNetwork Penetration TestingSoftware QASecurity AnalysisInternet SecurityInformation SecurityPenetration TestingVulnerability AssessmentNetwork Security - $70 hourly
- 3.7/5
- (2 jobs)
Business Continuity Manager I have strong business development professional skilled in; Business Continuity planning, ISO22301, Business Resilience, Crisis Management, Disaster Recovery, Training and Exercising, Leadership, Disaster Response and Risk Management, information security, cybersecurity, vulnerability assessment ISO 27001 ISO 22301 TrainingInformation Security AuditInternal AuditingEmail SupportOnline Chat SupportProject Management ProfessionalMicrosoft Excel PowerPivotPowerPoint PresentationArtificial IntelligenceInformation SecurityCybersecurity ManagementISO 27001Crisis ManagementCrisis Communications PlanBusiness Continuity PlanDisaster Recovery - $9 hourly
- 0.0/5
- (1 job)
Academics ✅ Chartered Accountant from The Institute of Chartered Accountant of India. ✅ Commerce Graduate from Indira Gandhi University, Delhi. ✅ Diploma Information System Audit from The Institute of Chartered Accountant of India. ✅ Certification in Information System audit from ISACA (USA). Working Organization ✔️ BDO India LLP ✔️ KPMG India ✔️ Genpact ✔️ Agilent Technologies ✔️ PKM & Co., India. Work Exposure ➕Financial Planning ➕ Management Consultancy ➕ Proficient in Microsoft Office ➕ Book Keeping, Payrolls, Budgeting. ➕ Presentation- Charts, Graphical, lines, V-X look Up, Pivot Tables etc. ➕ Power Point Presentations, MIS Reporting ➕ Audit: Internal, Statutory, Bank Audits, Income Tax as per Indian Law ➕ Knowledge of IFRS, US GAAP, IND AS, Accounting Standards. ➕ Reconciliation, GL, PL, Receivables, Payables, Financial Statements. ➕ Financial Modelling, Variance Analysis. ➕ Projections in EXCEL Spread Sheet. ➕Inventory Management. Strength and Weakness ➕ Always keen to learn and grab the opportunity ➕ Flexibility to adopt working environment ➕ Worked as team leader and team member both ➖ Delivery of work timely and remuneration accordingly Software Knowledge 💻 Tally 💻 ERP 💻 Quick Books and other accounting software’s. Motive to be the freelancer on Upwork is to establish myself cross border and learning more and more. If you are looking for a creative, dedicated and expert freelancer of the field means you are on the right place here.Information Security AuditFinancial ModelFinancial ReportingFinancial ManagementForensic AccountingFinancial AnalysisInformation TechnologyBookkeepingAccountingMicrosoft ExcelBank ReconciliationFinancial AccountingFinancial ProjectionFinancial AuditFinancial Variance Analysis - $25 hourly
- 0.0/5
- (0 jobs)
A seasoned professional with overall 35 years of experience in IT industry and superannuated on 29 Feb 2024. Started my professional journey in 1988 and worked with multiple organizations in IT Industry. Joined Tata Consultancy Services (TCS) in 2000 and later moved into cyber security domain. Past 18 years of experience was in cyber security, security governance, business continuity planning, risk assessment, training & awareness, investigation of security incidents, security audits, and compliance. Have rich experience in security audits of medium and large data centers and drive ISO 27001 certification at engagement level. Was actively involved in risk assessment and security governance of large accounts under Central and State Government Departments managing mission critical applications for citizens of India. Did Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), ISOInformation Security AuditRisk ManagementSystem SecurityISO 27001Cybersecurity Management - $60 hourly
- 0.0/5
- (0 jobs)
I am a CISA Certified Information Security & Compliance Consultant with extensive experience in ISO 27001 consulting, audits, and certification preparation. I specialize in guiding organizations through complex compliance landscapes, helping them achieve certification for ISO 27001 (Information Security) and ISO 22301 (Business Continuity). My background includes an MBA, which enhances my strategic perspective and enables me to align security and continuity initiatives with business objectives. My Core Expertise: 🔸ISO 27001 Consulting & Certification Preparation: Preparing organizations to meet rigorous standards in information security, from risk assessments to audit readiness. 🔸BCMS (ISO 22301) Consulting: Developing business continuity plans to safeguard critical operations and ensure resilient recovery. 🔸Risk Management & Compliance: Conducting gap analyses, implementing security controls, and creating customized mitigation strategies. 🔸Security Awareness Training: Empowering teams to uphold compliance standards and foster a security-conscious culture. Why choose me ⚡Proven Expertise: Demonstrated success in auditing and consulting across diverse organizations, driving improvements in quality and security standards. ⚡ Client-Focused Strategy: Committed to understanding unique business challenges and objectives to deliver tailored, impactful solutions. ⚡ Continuous Learning: Dedicated to maintaining up-to-date knowledge of ISO standards and advanced auditing methodologies to ensure best-in-class services. ⚡Precision and Thoroughness: Rigorous attention to detail ensures every aspect of your systems is comprehensively evaluated and addressed. ⚡Clear Communication: Ensuring seamless collaboration through clear, concise, and transparent communication at every stage of the engagement. If your goal is to achieve ISO certification, maintain compliance, or enhance your current systems, I am here to provide expert guidance at every step. My approach is collaborative and results-driven, focusing on delivering resilient, compliant, and sustainable security solutions that empower businesses to grow securely. Let’s collaborate to elevate your organization’s quality and security standards to new heights. Contact Information: ✉️ Email: ipvinaysharma@yahoo.co.in 📱 Phone: +966 565530914 🤳Whatsapp: +91 9716737124Information Security AuditCertified Information Security ManagerCIS Control AssessmentBusiness Continuity PlanningNetwork Penetration TestingWeb App Penetration TestingPrivacy Impact AssessmentInformation Security ConsultationNIST Cybersecurity FrameworkIT Compliance AuditInternal AuditingPolicy DevelopmentCybersecurity ManagementRisk ManagementISO 27001 - $20 hourly
- 4.5/5
- (27 jobs)
We are a group of Senior Cyber Security Experts with over 4+ years of Hands-on Digital Forensics (Windows/ Linux/ Mac OS) and Cyber Security Specialist. We've created multiple cyber security related services and training delivered them to several clients. Also provide a large number of Investigations and Consulting Services to our clients such as: • Malicious Emails Investigations • Email Attachments Investigations (Malware Analysis) • Email Inboxing Handling (Inbox any mail to any inbox) • Computer System Forensics (Digital Forensics) • Memory Forensics (Hard Drive, Ram Evidence Recovery) • Offensive Engagements (Penetration Testing Services) • Creating Cyber Security Training If your issue is not listed here, please don't be disappointed. We'll probably be able to help out so feel free to reach out with a message at least once. -----------------------------------------ANTI PHISHING------------------------------------- What is being investigated in Email Investigation:- - Header Analysis - Identifying possible source of origin - Identifying Spoofed emails - Validate legitimacy by examining SPF, DKIM and DMARC Records - Link Analysis - Follow up investigation on any links the email contains or redirects to with a verdict on that site - Verdict on attachments (Malicious / Non-Malicious) With our Advanced Investigation you'll receive Detailed Report (Malicious Reasons, Links and Attachments Information, Malware Analysis Information) also provide our ANTI-PHISHING EXTENSION for your browser security. -----------------------------------------ANTI PHISHING------------------------------------- ----------------------------------------- FORENSICS ----------------------------------------- What is being investigated in Forensics (Windows/ Linux/ Mac OS):- - Computer System Forensics - Real-Time, on-line Evidence gathering - Off-line Computer Disk Forensic - Memory Forensics - Physical Memory Forensic (With Destroyed Data Recovery) - Critical Data pertaining to Threats exists solely in System Memory - Non-cacheable Injected Code fragments ----------------------------------------- FORENSICS ----------------------------------------- It's important for us to build long term relationships with clients, so we provide the best quality of work with the best price offers. We thought "A satisfied customer is the best business strategy". Looking forward to hearing from you! Thank You!Information Security AuditInformation Security AwarenessInformation Security GovernanceAntivirus & Security SoftwareOffice 365Email SecurityEthical HackingOWASPMultiple Email Account ManagementInformation SecuritySystem SecurityInformation Security ConsultationApplication SecurityDigital Forensics Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Information Security Audit Freelancer near Delhi, on Upwork?
You can hire a Information Security Audit Freelancer near Delhi, on Upwork in four simple steps:
- Create a job post tailored to your Information Security Audit Freelancer project scope. We’ll walk you through the process step by step.
- Browse top Information Security Audit Freelancer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Information Security Audit Freelancer profiles and interview.
- Hire the right Information Security Audit Freelancer for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Information Security Audit Freelancer?
Rates charged by Information Security Audit Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Information Security Audit Freelancer near Delhi, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Information Security Audit Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Information Security Audit Freelancer team you need to succeed.
Can I hire a Information Security Audit Freelancer near Delhi, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Information Security Audit Freelancer proposals within 24 hours of posting a job description.