Hire the best Internet Security Specialists in Delhi, IN
Check out Internet Security Specialists in Delhi, IN with the skills you need for your next job.
- $40 hourly
- 5.0/5
- (12 jobs)
I help my clients web server security and get their email out of spam and into people's inboxes. I will help diagnose and spot issues, strategize and explain the next steps all during our consultation. ⭐️ Better Web Server Security ⭐️ Over the last 10 years, I have worked on 2500+ sites security and experiences range from setting up secure and scalable Cloud servers for your websites and apps to setting up SSL certificates, Email Servers, performing a complete audit of websites/servers cleaning the Malware/Virus code, hardening servers for security, blocking & preventing hackers intrusion, and Penetration Testing. * Malware / Virus Removal from Sites / Servers (URL Injection, SQL Injection, base64, etc) * Penetration Testing (Checking site code for security vulnerabilities) * Full Vulnerability Scan and remove all Malware or Malicious codes * Fix Suspended WordPress or any website by Hosting due to Malware Infection * Site Transfer/Migrate to New Host / Domain (Any PHP based CMS or custom-coded site) * Website / Server Security & Firewall Protection * Optimize & Increasing the Speed of Sites (Reducing Page Load Time) * Website Security and Maintenance (Implementing security measures to maintain security) Also Good Experience in Server Setup and Maintaining - ( Windows 2008/2012/2016; Linux/ Ubuntu / Redhat / Debian ; Apache / Centos / Nginx / Chef / Critix ; Cpanel/ Plesk / DirectAdmin/ WHM/ Webmin ) ⭐️ Better Email Deliverability ⭐️ * Implementation of fixes and recommendations from deliverability audit * Monitoring deliverability KPIs on a retainer basis and sending weekly deliverability reports * Managing IP and domain reputation (MxToolBox, EmailonAcid, ReturnPath, 250ok, etc) * DNS & authentication protocols (e.g., SPF, DKIM, DMARC, BIMI) * Take all active/reactive measures to ensure healthy email open rates * Reducing spam score * Signing feedback loop with ISP (Google Postmaster, Microsoft SNDS, ReturnPath, Yahoo/AOL) I firmly believe in "under-promise and over-deliver" and endeavor to take on all projects with a win-win attitude and high consideration for my clients' needs. I work well with both technical and non-technical audiences. Contact and invite me TODAY, so we can discuss your business and see how we can work together.Internet SecurityMauticEmail DeliverabilityPostfix SMTP ServerMailWizzZimbra AdministrationWordPress Malware RemovalWeb HostingLinux System AdministrationSQLZabbixSSLOffice 365DNSNGINX - $12 hourly
- 4.9/5
- (30 jobs)
Hi, I am Amit Singh and having 10+ years of significant and well-diversified experience in Cybersecurity domains, including ⭐Web Application penetration testing (SaaS, Cloud etc.)⭐Network Penetration testing(Servers, Active Directory, IoT etc.)⭐Web API pen-testing ⭐Mobile penetration testing (android & iOS)⭐Web 3.0 DApps & Smart Contract pen-testing (Blockchain technology)⭐ Source Code Review etc. 🏆Top Rated Profile on Upwork ✅I have performed penetration tests & vulnerability assessments and delivered professional reports to companies all over the world in accordance with: ☑️ Offensive Security (OSCP) standards ☑️ OWASP Top 10 Vulnerability ☑️ OWASP API Security Top 10 Vulnerability ☑️ OWASP Mobile Security Top 10 Vulnerability ☑️ Application Security Verification Standard 4.0 (ASVS 4.0) ☑️ CWE Top 25 Most Dangerous Software Errors ☑️ ISO 27001 Penetration Testing ☑️ Payment Card Industry Data Security Standard (PCI DSS) ☑️ General Data Protection Regulation (GDPR) ☑️ Common Vulnerability Scoring System (CVSS) ☑️ Open Source Security Testing Methodology Manual (OSSTMM) ✅ Cybersecurity Certifications:- ☑️ Certified eLearnSecurity Web application penetration tester (eWPT) ☑️ Certified API Security Professional( CASP) ☑️Certified Ethical hacker(CEH) ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ☑️ Executive Summary ☑️ Assessment Methodology ☑️ Type of Tests ☑️Risk Level Classifications ☑️ Result Summary ☑️ Table of Findings ☑️ Detailed Findings. Each finds listed within the report will contain a CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ✅ Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, checkmax and Zaproxy etc. Note-For more info lets connect over the chat section. ThanksInternet SecurityEthical HackingSecurity Assessment & TestingWeb App Penetration TestingCode ReviewOWASPAPI TestingWebsite SecurityInformation Security AuditNetwork Penetration TestingWeb Application SecurityPenetration TestingVulnerability AssessmentNetwork SecuritySecurity Testing - $15 hourly
- 5.0/5
- (127 jobs)
Web Penetration Testing(OWASP Top 10 methodology) | Network Penetration testing | OWASP API Security | Mobile Vulnerability Assessment(iOS and Android) | Source Code Reviews(.Net, Java, PHP) | Vulnerability Assessment and Penetration Testing | SIEM team (Cloud(AWS and Azure) Security, File Integrity Monitoring and Event Monitoring, Endpoint Security and Encryption, Data Loss Prevention, Network Access Control, Threat Monitoring (Email Traffic and Malware Analysis), Privileged Access and Identity Management) Have 7+ years of experience in both black box and white box testing penetration testing. Perform VAPT (Vulnerability Assessment and Penetration Testing) services for web applications, networks, mobile; source code reviews; malware analysis; server hardening; and security analysis etc. Conduct penetration testing in a systematic approach. Follow the standard methodology of the industry like OWASP Testing Guide v4(OTGv4); SANS top 25; NIST SP 800-115; PCI DSS to perform penetration testing so that client can concentrate on their professions without worrying about security threats. Web Application Testing: Do web application penetration testing with the latest methodology like OWASP Top-10, SANS Top-25. Perform both manual and automated penetration testing for vulnerabilities like Injection flaws(such as SQL, NoSQL, OS, and LDAP injection etc),Broken Authentication, Sensitive Data Exposure,XML External Entities (XXE), Broken Access Control,Security Misconfiguration, Cross-site scripting(XSS), Insecure Deserialization, Using Components with Known Vulnerabilities,Insufficient Logging & Monitoring. Also, perform source code reviews for many technologies like Java, NET, PHP etc. Approach for Manual Web-Application Penetration Testing: Conduct manual testing with following controls: * Configuration and Deployment Management Testing * Identity Management Testing * Authentication Testing * Authorization Testing * Session Management Testing * Input Validation Testing * Testing for Error Handling * Testing for weak Cryptography * Business Logic Testing * Client Side Testing Tools that use for Automated Web Penetration Testing: Acunetix, Burp-Suite, Netsparker, Nexpose, Nikto, IBM AppScan, HP fortify, W3af etc. Network penetration testing: Provide both external and internal network Penetration Testing so that your Network Infrastructure is secured from the real world attacks. Do both manual and automated network penetration testing. Approach for Manual Network Penetration Testing: Manually check for IDS/IPS, Server, Networks switch, Network Router, VPN, Firewalls, Anti-virus, Password etc. Tools that use for automated network penetration testing: OpenVas, Wireshark, Nessus, Metasploit, Armitage, Scapy etc. Mobile Application Penetration Testing: Perform mobile applications application penetration testing with the latest OWASP methodology(MSTG). Performed both manual and automated penetration testing for vulnerabilities like Weak Server Side Controls, Insecure Data Storage, Insufficient Transport Layer Protection, Unintended Data Leakage, Poor Authorization and Authentication, Broken Cryptography, Client Side Injection, Security Decisions Via Untrusted Inputs, Improper Session Handling, Lack of Binary Protections. Tools: Burp-Suite, HP fortify, Dex2Jar, Apktool, framework-res.apk, iNalyzer. Source Code Reviews: Perform source code reviews for both front and back-end languages. Perform source code reviews standard methodology like OWASP top 10. Do manual and automated source code reviews for various web based security vulnerabilities like SQL injection, Cross site scripting (XSS), CSRF, RFI,LFI, Authentication bypass etc. Tools: CheckMarx, IBM Appscan source for analysis, Microfocus HP Fortify. Security Analysis and Server Hardening: Regularly check and maintain your systems, servers to ensure that they comply with the standards. Do hardening application checks the item automatically on a daily basis and monitors all critical networks and server components. We support various frameworks like CIS benchmarking for Desktops & Web Browsers, Mobile Devices, Network Devices, Servers – Operating Systems, Virtualization Platforms & Cloud etc. Social Engineering: Have experience in social engineering vectors: Vishing, Phishing, Smishing, Impersonation. Used the following social engineering cycle to conduct social engineering: Gather Information: Here Information gathered from company websites, social media and other publications. Plan Attack: Next step is outline how intends to execute the attack Acquire Tools: After planning, next include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics is used in attacks such as password guessing. Tools: SET(Kali-Linux); GetGoPhishInternet SecurityWeb TestingInformation Security AuditWeb Application SecurityWebsite SecurityNetwork Penetration TestingSoftware QASecurity AnalysisInformation SecurityPenetration TestingVulnerability AssessmentNetwork Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Internet Security Specialist near Delhi, on Upwork?
You can hire a Internet Security Specialist near Delhi, on Upwork in four simple steps:
- Create a job post tailored to your Internet Security Specialist project scope. We’ll walk you through the process step by step.
- Browse top Internet Security Specialist talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Internet Security Specialist profiles and interview.
- Hire the right Internet Security Specialist for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Internet Security Specialist?
Rates charged by Internet Security Specialists on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Internet Security Specialist near Delhi, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Internet Security Specialists and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Internet Security Specialist team you need to succeed.
Can I hire a Internet Security Specialist near Delhi, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Internet Security Specialist proposals within 24 hours of posting a job description.