Hire the best Kali Linux Freelancers in Karachi, PK
Check out Kali Linux Freelancers in Karachi, PK with the skills you need for your next job.
- $25 hourly
- 5.0/5
- (5 jobs)
I'm a passionate cybersecurity professional with 5+ years of experience. As a seasoned Cybersecurity Consultant and Penetration Tester with a strong understanding in Governance, Risk, and Compliance (GRC), I specialize in securing critical infrastructures, creating policies and ensuring compliance. My experience in the Information Security domain has equipped me to assess, identify, and mitigate security vulnerabilities while ensuring that compliance requirements are met. What I Offer: ✅ Penetration Testing: Expert in identifying vulnerabilities through ethical hacking, simulating real-world cyberattacks to expose weaknesses. ✅ Vulnerability Assessments: Thorough assessments to discover security gaps and provide actionable recommendations. ✅ GRC Consulting: Guiding organizations through governance, risk management, and compliance frameworks to meet regulatory requirements such as PCI-DSS, ISO 27001, NIST, GDPR, and more. ✅ Security Audits: Conducting internal and external audits to ensure that organizations meet security standards and best practices. ✅ Incident Response: Rapid response to security incidents, helping organizations recover quickly and strengthen their defenses. ✅ Red Teaming: Advanced adversarial simulations designed to test your organization’s detection, response, and recovery capabilities under real-world attack scenarios. ✅ Post-Exploitation: Skilled in navigating compromised environments to assess the full extent of potential damage, lateral movement, and persistence techniques. Why Work with Me? Proven Experience: Years of experience in handling security findings, implementing solutions that work in real-world environments. Tailored Solutions: I customize my approach based on each organization's unique infrastructure and risk profile. Comprehensive Reporting: Clear and detailed reports that not only outline issues but also offer practical solutions. Compliance Expertise: In-depth understanding of regulatory requirements and industry standards. Let’s discuss how I can help strengthen your organization's cybersecurity posture.Kali Linux
Ethical HackingPenetration TestingSystem SecurityIonic FrameworkVulnerability AssessmentCybersecurity ToolAPI TestingJavaScriptWordPress.NET FrameworkWebsite SecurityAngularPHP - $47 hourly
- 4.6/5
- (7 jobs)
🛡️ Cybersecurity Expert with a Decade of Excellence With over 8 years of hands-on experience in vulnerability assessment and penetration testing, along with a solid background of 10+ years in Bug Bounty Hunting. Extensive expertise in Web, Mobile Apps (iOS / Android & Hybrid), and AWS Cloud Security, coupled with a strong background in Network/Infrastructure Vulnerability Assessment and Penetration Testing. Holds a bachelor’s degree in computer science and boasts a diverse array of notable cyber security certifications and achievements, including eLearnSecurity Certified Professional Penetration Tester (eCPPT), Certified Red Team Professional (CRTP), Certified Ethical Hacker (CEH), Certified Web Application Security Professional (CWASP), and eLearnSecurity Web Application Penetration Testing eXtreme (eWPTXv2). Recognized by industry leaders such as Microsoft, Google, Facebook, Salesforce, Dropbox, and Snapchat etc. Consistently ranked among HackerOne's top one hundred hackers for three consecutive years (2014 to 2016). Distinguished participation in the prestigious Live Hacking Competition H1-702 held in Las Vegas, organized by HackerOne and an active member of the Synack Red Team (SRT). 📜 Cybersecurity Certifications ✅ Certified Red Team Professional (CRTP) ✅ Certified Professional Penetration Tester (eCPPT) ✅ Certified Ethical Hacker (CEH) ✅ Web Application Penetration Testing eXtreme (eWPTXv2) ✅ Certified Web Application Security Professional (CWASP) 💼 Comprehensive Penetration Testing Services ✅ Vulnerability Assessment and Penetration Testing of Web Applications (SAST/DAST). ✅ Red Teaming Specialist ✅ Mobile Applications Penetration Testing (Android/iOS) ✦ Static & Dynamic Analysis (SAST, DAST & IAST) ✦ iOS Jailbreak Detection Bypass ✦ Android Root Detection Bypass ✦ iOS/Android SSL Pinning Bypass ✦ Reverse Engineering ✅ Network Infrastructure Security Assessment & Penetration Testing. ✅ Penetration Testing of REST/SOAP/GraphQL APIs, ESB, Middleware, or other channels ✅ Authentication protocols such as Kerberos, LDAP, SAML, OAuth2 etc. Penetration Testing. ✅ AWS/Azure/GCP Security Assessment & Penetration Testing. ✅ Active Directory Security Assessment & Penetration Testing. ✅ Docker Security & Penetration Testing. ✅ System & Application/Microservices Architecture Reviews. ✅ Security Source Code Reviews. ✅ Specialization in thin clients, ATMs, CMS hardening (e.g., WordPress) Penetration Testing. ✅ Database Security Assessment & Penetration Testing. ✅ System Security, Firewall, WAF (F5), User Access Management and Logs Reviews. ✅ Create written reports, detailing assessment findings and recommendations. ✅ Information Security frameworks such as NIST, ISO 27001/2 & PCI-DSS. 🛠️Tools & Techniques ✅ Experience with various Security Tools such as Burp Suite, MetaSploit, NMAP, Cobalt Strike, PowerShell, Mimikatz, AWSCLI, MobSF, Frida, Ghidra, Objection, Reflutter, Kali, Nessus, SonarQube etc. 🌐 Industry Recognition and Achievements ✅ Acknowledged by Microsoft, Google, Facebook, Salesforce, Dropbox, Snapchat, etc. ✅ Consistently ranked among HackerOne's top 100 hackers for three consecutive years (2014-2016) ✅ Distinguished participation in Live Hacking Competition H1-702 in Las Vegas ✅ Active member of the Synack Red Team (SRT) ✅ Tested over 1000 Web & Mobile Applications ✅ Conducted the Penetration of Core Banking Applications based on Microservices architecture. ✅ Recognized with a Spot Recognition Award for delivering outstanding Information Security Services at Bank Al Habib Limited. ✅ Received the Best Performance Award for conducting a comprehensive Cloud and IoT Devices Pentest at Trillium Information Security Systems. ✅ Participated in the Defcon H1-702 live hacking competition in Las Vegas, hosted by HackerOne. ✅ Discovered significant vulnerabilities in the cloud-native and financial applications of multiple banks and international companies. ✅ Identified vulnerabilities, including unauthorized transactions, in financial applications. ✅ Invited as a guest speaker on Cybersecurity and Application Security at various universities. 🚀 Secure Product Development (SSDLC) and Training ✅ Assist in developing secure products through Secure Architecture Design ✅ Provide training in Bug Bounty Hunting, Web & Mobile Application Penetration Testing, Network Security ✅ Cyber Security Awareness Training: ✦ Bug Bounty Hunting Training ✦ Web Application Penetration Testing Training ✦ Mobile Application Penetration Testing Training ✦ Network Penetration Testing Training ✦ Cyber Security Awareness Training (For Corporates) ✦ Cyber Security Employee Awareness Training ✦ Email Security Training ✦ Network & Infrastructure Security Training ✦ Mobile Device Security Training 🌐 CVE Recognition ✅ CVE on TrendMicro - CVE-2021-31521 I am ready to bring my experience, skills, and innovation to meet your cybersecurity needs.Kali Linux
Cyber Threat IntelligenceWebAPITestingWeb App Penetration TestingMobile App TestingEthical HackingSecurity InfrastructureWeb Application SecurityWebsite SecuritySecurity Assessment & TestingMetasploitSecurity TestingNetwork SecurityDatabase SecurityPenetration Testing - $30 hourly
- 5.0/5
- (10 jobs)
I am a highly skilled and certified cybersecurity professional with over 10 years of experience in safeguarding businesses against cyber threats. My expertise includes risk assessment, NIST-CSF, ISO 27000, ethical hacking, vulnerability assessments, penetration testing, and implementing robust security solutions. I have a proven track record of helping clients enhance their cybersecurity posture and protect sensitive data. Let me secure your digital assets and provide peace of mind. Key Skills: • SANS Top 25 detection • OWASP Top 10 detection • Vulnerability Assessment • Penetration Testing • Network Security • Source Code Review • Web / Mobile / Desktop Application Security • Application Security Architecture Review • Information Security Policy Development • Incident Response • Compromise Assessment • Security Awareness Training • Compliance (PCI DSS, GDPR, HIPAA) • ISO 27000 Gap Assessment / internal Audit / Readiness / Implementation • NIST • Risk Assessment and Management • CIS Top 18 • Forensics (Acquisition, Imaging, Documentation) • Application Stress Testing • Data Privacy Tools: • Nessus • Nexpose • Burp Suite • Core Impact • Metasploit • Acunetix • HCL Scan • SonarQube • JMeter • SQL Map Certifications: • CISM (Certified Information Security Manager) • OSCP (Offensive Security Certified Professional) • C) PTE (Penetration Testing Engineering) • C) VA (Certified Vulnerability Assessor) • CHFI (Computer Hacking Forensics Investigator) • C) SS (Certified Security Sentinel) Why Choose Me: • Proven Expertise: I have successfully helped numerous clients secure their businesses against cyber threats. • Custom Solutions: Tailor-made security solutions to fit your unique business requirements. • Client Education: Empowering clients with knowledge about cybersecurity best practices. • Timely Delivery: Punctual delivery of high-quality results within specified deadlines. Let’s Secure Your Future: I am dedicated to ensuring your digital assets are protected from evolving cyber threats. Let’s discuss how I can enhance your cybersecurity strategy and provide you with the peace of mind you deserve. Feel free to reach out to me for a detailed discussion about your cybersecurity needs.Kali Linux
ISO 27001Information Security AuditInternet SecurityWebsite SecurityInformation Security GovernanceCybersecurity ManagementVulnerability AssessmentNetwork SecuritySecurity TestingInformation SecurityPenetration Testing - $50 hourly
- 0.0/5
- (0 jobs)
Hi, I am Sajid, A seasoned Linux Tech Support Freelancer, WordPress Web Developer, and Graphic Designer with a passion for crafting seamless digital experiences. With extensive expertise in troubleshooting Linux systems and developing custom WordPress solutions, I specialize in empowering businesses to optimize their online presence and streamline their operations. Currently, I am expanding my skill set by delving into Flutter App Development, driven by a commitment to staying at the forefront of technological innovation. Let's connect and explore how I can help elevate your digital projects to the next level.Kali Linux
Video EditingOracle CloudFlutterDigitalOceanCloud ComputingFigmaUbuntuArch LinuxCentOSInformation TechnologyLinux System AdministrationWordPress e-CommerceWordPress DevelopmentWordPress Landing PageWordPress InstallationWordPress SEO PluginWordPress BackupWordPress Bug FixWordPress MigrationWordPress OptimizationWordPress CustomizationWordPress Website DesignWordPress WebsiteWordPress - $10 hourly
- 5.0/5
- (2 jobs)
I am a Application Security Engineer and DevSecOps Engineer Freelancer holding BS(Computer Science) Degree and MS(Cyber Security). I am looking for perminent/long term clients and monthly remote jobs here on upwork. I provide following services: Static Application Security Testing (SAST) Using SonarQube. Dynamic Application Security Testing (DAST) using Burp Suite and Owasp Zap. Software Composite Analysis (SCA) using Dependency Check SBOM Analysis Automation using CycloneDx and Dependency Track. Integrating SAST, DAST and SCA in CI/CD Pipelines. CI/CD Pipelines Development. Web Application Penetration testing API Penetration Testing Network Penetration testing and ISO 27001 Compliance. Mobile Application penetration Testing Cloud Penetration Testing and SOC2 Compliance. Vulnerability assessment and Report writing System Administration Secure Code Reviews Cyber Security Researh work I am always ready to work on new technology and learn new skills. I am open to working on long term monthly projects. Please feel free to contact me if you need any assistance, I am always happy to help.Kali Linux
Scripting LanguageLinuxAzure DevOpsSonarQubePenetration TestingVulnerability AssessmentEthical HackingContent WritingNetwork Penetration TestingWeb Application SecurityCloud SecuritySecurity AnalysisSOC 1 ReportSystem Administration - $10 hourly
- 5.0/5
- (3 jobs)
Hi there! My name is Sajjad, and I have several years of expertise as a graphic designer, web designer, WordPress developer, and IT specialist. Using design to visually engage audiences and convey ideas and stories is something I'm passionate about. Working on a range of projects over my career has given me the chance to develop my skills in branding and identity, print and digital advertising, social media content, packaging design, and website design. In my opinion, each project offers a different set of challenges, and I take pleasure in closely collaborating with clients to comprehend their objectives and provide innovative solutions that satisfy their demands. Things I am proficient at: 1. Using Photoshop or Illustrator for graphic design. 2. Possessing intense expertise in HTML, CSS, and Javascript to build the ideal website. 3. Rapid e-commerce website design with in-depth knowledge of WordPress development. 4. The capacity of the virtual assistant to communicate efficiently and clearly. 5. Able to use Ai to find answers to a variety of problems and activities. 6. Ai art creation.Kali Linux
Streetwear3D MockupDesign MockupWeb ApplicationComputer Basics3D Logo RevealCoursework AssignmentLogo DesignClothing & Merchandise DesignT-Shirt DesignAdobe PhotoshopGraphic Design - $30 hourly
- 5.0/5
- (1 job)
I’m a University student currently pursuing a degree in computer science, with years of knowledge in fields related to Computer Science, Specifically Cyber Security, Linux and Programming. I can provide you with the following Services: -Content and Article Writing for various blogs( includes SEO) -Programming and Linux Tutorials -Front End Web Development -HTML Canvas -Wordpress I have 4 years of Linux experience, solving many bugs and issues, doing Bash programming in it and using a debian based Linux Distribution (Parrot OS) as my day to day OS. I have multiple years of programming experience in JAVA, Python and FrontEnd Web Development and have done many projects in them. I Specialize in making courses and tutorials related to Programming, Linux, Cybersecurity as well as General Computer Science and IT fields, but I am willing to put in effort and time to research and make you a course on any topic you provide me. Please feel free to contact me, I am happy to help you get an idea before you wish to commit to hiring me. I am available for ongoing projects and one time gigs. I'll continue to be available and engaged with you until you are satisfied with my work. Feel free to message me anytime. I am also able to provide a free voice call interview with me if you require consultation before asking me for work.Kali Linux
Linux System AdministrationBash ProgrammingLinuxPythonCustom Web DesignHTML5 CanvasTutorialWeb DesignWeb DevelopmentCourseBlog WritingArticle WritingSearch Engine OptimizationContent Writing - $15 hourly
- 5.0/5
- (1 job)
Cybersecurity Expert | Penetration Testing | Information Security I am a skilled Information Security Analyst specializing in safeguarding digital assets through practical, hands-on experience. My focus is on identifying vulnerabilities, improving security posture, and ensuring robust protection against cyber threats. Disclaimer: Your security is my priority. Let's secure your digital assets today! # Key Expertise: Penetration Testing - I uncover vulnerabilities, deliver detailed reports, and provide actionable solutions to secure your systems. Cybersecurity Audits - Specialized in intrusion detection, incident response, and implementing effective security policies. CTF Enthusiast - Problem-solving expert in cryptography, reverse engineering, and real-world security challenges. --- # Technical Skills: - Programming: C++, Data Structures, SQL - Cybersecurity: Vulnerability Assessment, Security Audits, Incident Management - Tools: Wireshark, Burpsuite, Metasploit, Nessus, Nmap, OWASP ZAP, SQLmap, Cisco Packet Tracer --- # Key Strengths: - IT Security, Endpoint Protection, Vulnerability Management, Threat Analysis, Incident Response --- # Accomplishments: - Led website audits, enhancing security and reducing risk. - Reduced vulnerabilities with tailored remediation strategies. - Founded cybersecurity initiatives, leading penetration testing efforts for faster results. --- Why Work With Me? I bring deep cybersecurity expertise and a passion for protecting digital assets. Let’s work together to fortify your systems against threats!Kali Linux
Incident Response PlanCybersecurity MonitoringVulnerability AssessmentSecurity ApplianceInformation Security AuditSecurity TestingSecurity Assessment & TestingSecurity AnalysisNessusWiresharkOWASPWeb App Penetration TestingCyber Threat IntelligenceNetwork Penetration Testing - $4 hourly
- 4.7/5
- (1 job)
Certified Ethical Hacker and Penetration Tester dedicated to safeguarding digital environments. I specialize in identifying vulnerabilities, conducting advanced security assessments, and delivering actionable insights to fortify systems against threats. With expertise in tools like Metasploit, Burp Suite, and Kali Linux, I simulate real-world attacks to expose risks before malicious actors can exploit them. Whether it's securing web applications, networks, or endpoints, I ensure your systems remain robust and compliant with industry standards. Let’s collaborate to strengthen your security and protect what matters most. Your data deserves nothing less than the best defense.Kali Linux
Penetration TestingEthical HackingCybersecurity ManagementComputing & NetworkingComputer NetworkInformation SecurityCompliance - $34 hourly
- 0.0/5
- (2 jobs)
Hi, I’m Anas—a mobile app developer with a passion for building more than just apps; I create solutions that people enjoy using. Whether it’s a fintech app requiring top-notch security or a fitness platform with smooth, engaging interfaces, I take pride in making things work seamlessly across iOS, Android, and the cloud. With solid backend experience (Spring Boot, Node.js) and AWS skills, I ensure apps aren’t just beautiful but built to scale and perform. I believe in keeping things efficient and well-architected while always pushing for innovative, user-focused design. If you're looking for someone who truly cares about both the tech and the user experience, I’m ready to help bring your idea to life.Kali Linux
ETLiOS DevelopmentData ScienceAndroidC#DjangoC++PythonOracle PLSQLMobile AppFlutterDartDatabase ManagementLinuxFlaskMySQL - $45 hourly
- 0.0/5
- (0 jobs)
Hello! I'm Noorulhuda Sheikh, a dedicated student and a passionate IT specialist with a strong foundation in various cutting-edge technologies. My expertise spans across ethical hacking, C++ programming, HTML development, Android app creation, game development, and managing FiveM servers. I am committed to leveraging my skills to provide top-notch solutions and contribute to innovative projects. Skills & Expertise: Ethical Hacking: Proficient in identifying vulnerabilities and securing systems against potential threats. I prioritize ethical practices to ensure robust cybersecurity. C++ Programming: Experienced in developing efficient, high-performance software applications. I am adept at solving complex problems and optimizing code. HTML Development: Skilled in creating clean, responsive, and user-friendly websites. I focus on delivering seamless web experiences. Android Development: Capable of designing and developing engaging and functional Android applications. I stay updated with the latest trends and best practices in mobile app development. Game Development: Proficient in designing and developing immersive and interactive games. I bring creative ideas to life through various game engines and programming languages. FiveM Server Management: Expertise in setting up, customizing, and maintaining FiveM servers. I ensure smooth performance and an enhanced gaming experience for users. Why Choose Me: Technical Proficiency: I bring a solid technical skill set to the table, enabling me to handle diverse and challenging projects. Continuous Learning: As a student, I am always eager to learn and adapt to new technologies and methodologies, ensuring my skills remain current and competitive. Problem-Solving: I thrive on tackling complex problems and finding innovative solutions that meet client needs. Dedication: I am committed to delivering high-quality work and exceeding client expectations through diligent effort and attention to detail.Kali Linux
LinuxNodeJS FrameworkNode.jsJavaScriptBack-End DevelopmentHTMLPDF ConversionMySQLTypingSQLCloud ComputingCopywritingC++Scripting - $20 hourly
- 5.0/5
- (2 jobs)
I completed my Bachelor of Science in Computer Science from FAST National University. I have a robust background in Software Development, Web Development, and Cyber Security. Strong in design and integration with intuitive problem-solving skills. Good Experience in Java, C#, .NET, and with database analysis and design. Skilled in developing business plans, requirements specifications, user documentation, and architectural systems research, Strong written and verbal communications. I am working as a Microsoft Dynamics 365 Consultant & Developer, currently serving services as CRM Solution Engineer for 2 years. My expertise domains are Microsoft dynamics CRM, and Power platform. I am here to assist you related to CRM. Services I provide: - Microsoft Power Apps - Functional Implementation - Plugins in C# - Custom Workflow Assemblies - Web Resources (HTML and JavaScript) - Dialogues and Business Rules - Forms, Views - Site Map customization - Fetch XML & Web API - Power Platform Consultation (Canvas App, Model-Driven App, Portals and Power Automate) - Security Rules and User Privileges - Business Units, Business Rules, Business Process Flows - Custom Actions - Ribbon workbench - Customization and ImplementationKali Linux
Microsoft PowerAppsDatabaseCRM DevelopmentMicrosoft Dynamics 365Penetration TestingMicrosoft Dynamics CRMRESTful APIPythonJavaScriptHTMLMySQLC# - $15 hourly
- 1.0/5
- (2 jobs)
Hello, and welcome to my Upwork profile! I am a highly skilled and experienced Penetration Tester and VAPT professional with over 5 years of experience in the industry. I am passionate about cybersecurity and have a strong background in both offensive and defensive security measures. My expertise includes: Conducting comprehensive vulnerability assessments and penetration testing on web applications, networks, and infrastructure. Identifying and exploiting security weaknesses, including SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), and other common attack vectors. Providing detailed reports and recommendations to clients, including remediation steps and mitigation strategies. Performing security audits and assessments to identify and mitigate potential risks. Conducting manual and automated testing to ensure the highest level of security and compliance with industry standards. In addition to my technical skills, I am also highly organized, detail-oriented, and committed to delivering high-quality work to my clients. I am an excellent communicator and always strive to exceed my clients' expectations. I hold several industry certifications, including the Offensive Security Certified Professional (OSCP) and Certified Ethical Hacker (CEH) certifications. I am also well-versed in various tools and technologies used in the industry, including Kali Linux, Metasploit, and Nmap. If you're looking for a skilled and experienced Penetration Tester and VAPT professional to help secure your systems and applications, please don't hesitate to reach out. I'm always happy to discuss your needs and provide a customized solution to meet your unique requirements. Let's work together to ensure your systems are secure and protected from cyber threats!Kali Linux
Local SEOSecure SDLCWebsite SecuritySEO StrategyAPI TestingOpenVASSearch Engine OptimizationInformation SecurityTechnical SEOSystem SecuritySecurity TestingVulnerability AssessmentPHP ScriptCustom PHPEthical HackingPenetration TestingShopify SEONetwork SecurityMetasploit - $20 hourly
- 0.0/5
- (0 jobs)
- About me A senior penetration tester skilled in multiple domains with more than 50 clients managing experience across the globe. - What I Offer ✅ [+] Web Application Penetration Testing [+] Mobile Application Penetration Testing ( Android + iOS ) [+] Network Penetration Testing [+] Desktop Penetration Testing [+] Cloud Pentest [+] Social Engineering Simulation Tests [+] CTF Challenge Development [+] CTF Challenge Solving [+] Professional Compliance Report Making - Why Work With Me 🤷♂️ Professional Industry-Recognized Certifications Problem-Solving Mindset Clear Communication Client-Centric Work Methodology Industry Framework-Based Approach Satisfied Client DealingKali Linux
Digital ForensicsSonarQubeRapid7 NexposeWiresharkMetasploitVulnerability AssessmentApplication SecurityWeb Application SecuritySecurity Assessment & TestingOpenVASNessusWeb App Penetration TestingNetwork Penetration TestingPenetration Testing - $20 hourly
- 0.0/5
- (0 jobs)
Muhammad Ashraf – Expert in Grandstream VoIP Telephony, Firewalls and Networking With years of experience in the IT and networking industry, Muhammad Ashraf is a skilled professional specializing in Grandstream VoIP telephony, Firewall management, and advanced networking solutions. Muhammad Ashraf has successfully designed, deployed, and managed robust telecommunication systems and secure network infrastructures for a wide range of organizations, ensuring efficient and seamless communication while safeguarding against potential cyber threats. An expert in Grandstream VoIP systems, Muhammad Ashraf has extensive experience with the installation, configuration, and optimization of IP-based telephony solutions. From integrating IP phones to managing SIP trunks, they have a proven track record of enhancing voice communication systems to deliver high-quality service with minimal downtime. In the realm of network security, Muhammad Ashraf is highly proficient in deploying and managing Firewalls, configuring security policies, VPNs, and intrusion prevention systems to protect networks from external and internal threats. Their deep understanding of firewall management and security configurations ensures that businesses maintain strong and compliant IT environments. A strong background in networking complements their expertise, with hands-on experience in network design, implementation, and troubleshooting. Passionate about technology and problem-solving, Muhammad Ashraf is dedicated to delivering innovative and secure solutions that help organizations thrive in a constantly evolving digital landscape.Kali Linux
VirtualizationVMWareFortinetFortiGate FirewallRouterComputing & NetworkingInformation SecurityComputer NetworkElastixFreePBXPBXGrandstreamVoIP AdministrationVoIP PBX - $20 hourly
- 0.0/5
- (0 jobs)
Name: Vinesh Kumar Professional Title: Cybersecurity Expert Overview: I am a seasoned cybersecurity professional with 5 years of hands-on experience in the field. My expertise lies in conducting comprehensive Vulnerability Assessments and Penetration Testing across web, mobile, and network environments. With a track record of completing over 40 successful projects, I am well-versed in both manual and automated testing methods. Key Skills: Web Vulnerability Assessment Mobile Application Security Testing Network Penetration Testing Manual Testing Automated Testing Previous Projects: I have successfully completed more than 40 projects in the cybersecurity domain, helping clients secure their digital assets and infrastructure. Trained Certified Ethical Hacker (CEH), ISO -27001 lead auditor Education: Masters in information security (MS-IS) Bachelors of computer science (BSCS)Kali Linux
Rapid7 NexposeMetasploitNessusRed Team AssessmentRisk AssessmentNetwork Penetration TestingWeb App Penetration TestingPenetration TestingVulnerability Assessment - $15 hourly
- 0.0/5
- (1 job)
Hi there! I'm Muhammad Fozan, a skilled penetration tester with . My expertise lies in identifying security vulnerabilities and providing detailed reports on how to fix them. I am proficient in using various security tools such as Burp Suite Professional, Kali Linux, Metasploit, MobSF and other popular tools in my arsenal. With my technical expertise and hands-on experience, I can provide comprehensive security assessments, identify potential attack vectors, and help you strengthen your overall security posture. My services include web application testing, Android Application testing, vulnerability assessments, and more. Whether you're a small business or a large enterprise, I can help you secure your assets and prevent cyber attacks. Let me help you ensure that your systems are secure. Contact me today to discuss your security needs!Kali Linux
WordPress SecurityBash ProgrammingScriptingCryptographyNetwork Penetration TestingPenetration TestingVulnerability AssessmentInformation Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Kali Linux Freelancer near Karachi, on Upwork?
You can hire a Kali Linux Freelancer near Karachi, on Upwork in four simple steps:
- Create a job post tailored to your Kali Linux Freelancer project scope. We’ll walk you through the process step by step.
- Browse top Kali Linux Freelancer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Kali Linux Freelancer profiles and interview.
- Hire the right Kali Linux Freelancer for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Kali Linux Freelancer?
Rates charged by Kali Linux Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Kali Linux Freelancer near Karachi, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Kali Linux Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Kali Linux Freelancer team you need to succeed.
Can I hire a Kali Linux Freelancer near Karachi, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Kali Linux Freelancer proposals within 24 hours of posting a job description.