Hire the best Malware Analysts in Hyderabad, IN
Check out Malware Analysts in Hyderabad, IN with the skills you need for your next job.
- $25 hourly
- 4.7/5
- (9 jobs)
Having more than 10 Years of experience in cyber security domain with proven practical experience in Threat Hunting, Google Dorking, Open-Source Intelligence, threat modelling, security code review, Penetration Testing(Web/Mobile) and implementing cyber security best practices into the organizations. Proficient in threat hunting using MITRE ATT&CK, STRIDE, PASTA, OWASP Threat Dragon frameworks for conducting Threat Modelling framework, TTP’s and develop a heatmap. Experience in using Python Boto3, AWS responder, libcloudforensics, AWS Security - Step Functions, AWS Lambda, CSP header verification using Python Scripts, AWS Step Functions and Canary tokens. Hands-on experience in malware analysis through sandboxing techniques. Experienced in analyzing registry keys, event codes, and network telemetry logs. Capable of network traffic dumping and pcap analysis with tcpdump and network miner. Hands-On experience in malware analysis, specializing Android(Java) malware, reverse engineering, code obfuscation and static analysis. Familiar with fileless malware detection and other persistence techniques. Proficient in browser extension and double file extension analysis. Utilize threat analysis reports from Red Canary, CrowdStrike, and Palo Alto Networks for reconnaissance. Proficient with CTI methodologies including analysis through frameworks such as the Pyramid of Pain, Diamond Model, and Cyber Kill Chain. Capable of ensuring strong emphasis on security across web, thick client, API, mobile (iOS & Android), Kubernetes, containers, and cloud hosted services (AWS/AZURE). Experienced in handling F5 products (BIGIP-Next, F5OS, SPK), BIGIP, NGINX core and NGINX Plus. Strong technical experience in implementing cybersecurity methodologies such as NIST, OSSTMM, M(ASVS), SANS, MITRE ATT&CK and NIST & OWASP standards, with expertise in identifying application weaknesses, attack vectors, exploitation techniques, and countermeasures. Well versed with TCP/IP, packet analysis(pcap), protocol analysis, web sockets, Endpoint analysis, network forensics, OAUTH 2.0, OpenID Connect and SAML identity protocols. Implemented secure coding practices, reducing vulnerabilities and proficient in tools like Fortify and SecureCodeBox. Extensive experience in using fuzzing tools like DirBuster, FFUF tools. Hands-on programming skills using Java, JavaScript and Python Areas of Expertise– Digital Forensics, Threat Hunting, Automation by Python Scripting. Certified GIAC-Mobile Device Security and Ethical Hacker (GMOB). Certified EC-Secure Programmer (ECSP) and Certified Ethical Hacker (CEH). Successfully completed the "Advanced Infrastructure Security Assessment" course at the Null conference in 2022. Successfully completed the "Breaking and Owning Applications and Servers on AWS and Azure" course at the Null conference in 2019 Developed security policies, ensuring compliance and smooth application delivery. Good at using governance tools like JIRA, Confluence etc. Web & Mobile Application: CheckMarx, Fortify, SecureCodeBox, SonarQube, Burp Suite (Pro & Free), Fiddler, OWASP Zap Proxy, Paros Proxy, W3af, Echo Mirage, Snallygaster, PenCrawler, Hackbox, Galileo, FFUF, InfectionMonkey, Drozer, MobSF, Jadx, JD-GUI, Santoku, AndroidTamer, Adhrit, Reverse APK, Clutch, Rp++, Frida/Objection, Needle Framework, iFunbox, RastiCrac, Otool, Class-dump, iLEAPP, ALEAPP. Threat Hunting and Telemetry Analysis: Tcpdump, Wireshark, ATT&CK MITRE(TTP’s), Mimikatz, Scapy, PyShark, Network Miner, Zeek, Splunk, Sysmon, Snort, Wazuh, ElasticSearch(ELK), Suricata. Web Services & Network Assessment: WSSAT 2.0, Astra, Postman, SoapUI, API Fuzzer, Nmap, Nessus, Kali Linux, Metasploit, Crunch, Cain Cloud & Containers, Threat Modelling AWS Inspect, S3 Inspect, Bucket Finder, Guard, Clair, Anchore, Trivy, STRIDE, DREAD, Microsoft Threat Modelling Tool, Client satisfaction and quality of work are my top priorities. I'm a problem solver and I'm glad to help you with any task you have on your website. Regards, Sandeep TMalwareSecurity TestingVulnerability AssessmentInformation SecurityPenetration TestingKali LinuxWiresharkWebsite SecurityCryptographyMobile App TestingWeb App Penetration TestingNetwork Penetration TestingCode ReviewNetwork SecurityEncryption - $60 hourly
- 5.0/5
- (7 jobs)
An versatile GRC professional carrying 15+ years of industry experience in helping Large/Medium/SMB organizations achieve their business goals by successfully contributing in building their security & compliance. I have been an internal auditor, DPO & CISO for multiple organizations across Product, Market Research & IT Consulting Firms. My Mission statement: "To be perceived as a Trusted Business Partner" I specialize in the following: Strategy - Develop Security strategy of the Organization - Security Assessment approach of as-is to-be state - Build Strong & Cohesive relationships across the Organization Risk - Understand the IT Landscapes & the Crown Jewels of the Organization - Evaluate the risk posture right from inherent to residual state - Advise investments on a risk based approach to ensure Confidentiality, Integrity & Availability of the Crown Jewels People - Develop Trainings based on the Culture of the Organizations Compliance - Evaluate the applicability of the Compliance - Regulatory & Contractual - Specialize in adopting ISO27001, NIST, SOC 2 Frameworks, right from designing, implementing, monitoring & evaluating the effectiveness of the controls. - Develop Policies & Procedures in the context of the Organization - Developed Privacy Programmes tailor made for global needs including GDPR, CCPA, LGPD & HIPPA - Designed Audit methodologies for Sox, ISO 27001, Third Party Risk etc. - Developed Playbooks which aid in responding day to day 3rd Party Security Questionaire. Operational - Procedures & Playbooks for management of Asset Management, Incident Management, Vulnerability ManagementMalwareSOC 2GDPRInternal AuditingDisaster RecoverySarbanes-Oxley ActCIS Control AssessmentCertified Information Security ManagerISO 27001Relationship ManagementData ProtectionData PrivacyInformation Security - $35 hourly
- 4.9/5
- (2 jobs)
Engineering background / / Communicative listener of your need / Critical thinker with a creative solution As an Electronics and Communication undergraduate, I am a highly motivated individual who is always ready to take on new challenges. My strong communication and influencing skills have been honed through various leadership roles, and I am eager to discuss any topic related to my field of expertise. I am a Defence aspirant looking forward to join the armed forces. I am also a skilled writer, with a particular interest in geopolitics, and have experience writing blogs on this topic. Recently, I have been fascinated by the field of cybersecurity and am eager to leverage my knowledge and experience through hands-on work in this area. My ultimate goal is to work in a challenging and intellectually stimulating environment that will provide both job satisfaction and steady professional growth.MalwareCybersecurity ManagementBlog WritingTechnical WritingWeb Application SecurityInformation Security - $80 hourly
- 0.0/5
- (0 jobs)
I am Umesh Varma, a Cyber Security Specialist at LTIMindtree, where my Master's degree in Information Technology from Charles Sturt University is put to good use. My strong foundation in computer science and industry certifications such as Fortinet Network Security Expert Level 1: Certified Associate and Certified Ethical Hacker (CEH) enable me to navigate the intricate world of cloud and infrastructure security with ease. In my role, I leverage my proficiency with knowledge graphs for compliance auditing, providing a unique perspective to identify and mitigate risks. My efforts, along with those of my team, ensure robust security measures that align with ISAE 3402 standards. This safeguards our digital space and protects sensitive data. With over 3+ years of experience in cyber security roles, I have honed skills such as cloud security and infrastructure security. These skills are instrumental in fortifying our organization's cyber defense.MalwareCyber Threat IntelligenceSOC 2SOC 1Malware DetectionIncident Response PlanComplianceInformation Security - $40 hourly
- 0.0/5
- (0 jobs)
I am a Senior DevOps Engineer with over 10 years of experience implementing DevOps solutions for various organizations and clients. I manage multiple AWS and Azure accounts single-handedly, demonstrating my extensive knowledge in infrastructure creation, deployment, and monitoring. My expertise spans a wide range of tools and technologies, including: Architecture Design AWS Azure Docker Kubernetes Helm ArgoCD Prometheus Grafana DataDog PagerDuty Linux Python Shell scripting Terraform CloudFormation GitLab Bitbucket Jenkins Azure DevOps Azure ReposMalwareComputer NetworkNetwork EngineeringProblem SolvingInformation SecurityArchitectural DesignComputing & NetworkingDevOpsArchitecture - $40 hourly
- 0.0/5
- (0 jobs)
Seeking a dynamic environment that will enhance my expertise in cybersecurity, I am eager to secure a challenging role where I can leverage my skills to achieve and surpass organizational objectives. Envisioning a rewarding position offering continual learning opportunities and challenges, I aim for a role that fosters both personal and professional advancement.MalwareInformation SecurityComplianceMalware DetectionSOC 2Cyber Threat Intelligence - $75 hourly
- 0.0/5
- (0 jobs)
IT General Controls Professional Detail-oriented IT General Controls professional with over 7 years of experience in auditing and compliance. Skilled in implementing IT controls, enhancing data security, and ensuring regulatory compliance. Strong knowledge of COBIT and ISO standards, committed to continuous improvement and risk reduction.MalwareRisk AnalysisRisk AssessmentAgile CRMIT General Controls TestingISO 27001GDPRCOBITIT Compliance AuditInformation SecurityGovernment Reporting ComplianceComplianceNetwork EngineeringComputing & NetworkingComputer Network - $55 hourly
- 0.0/5
- (0 jobs)
Passionate about Technology , ARTIFICIAL INTELLIGENCE AND DATA SCIENCE. Successfully completed online certified training on Ethical Hacking. The training consisted of Basics of Information Security and Computer Networking, Information Gathering and Basics of Web Development, Introduction to Web VAPT, OWASP and SQL Injections, Advanced Web Application Attacks, Client Side Attacks, Identifying SecurityMalwareNetwork EngineeringSQLSQL ProgrammingWeb ApplicationComputer NetworkDatabaseCloud ComputingGoogle Cloud PlatformMachine Learning ModelArtificial IntelligenceInformation SecurityPythonJavaJavaScriptC - $10 hourly
- 0.0/5
- (0 jobs)
I have a vast experience in IT access management and SAP security, I am very good at root cause analysis, incident management and problem management. Active Directory Admin and IT Asset management. Microsoft Excel.MalwareMicrosoft Active DirectoryInformation SecurityVirtual MachineVirtual AssistanceAsset ManagementUser Identity ManagementDesktop Application - $15 hourly
- 0.0/5
- (0 jobs)
**Ekansh Patel:** Ekansh Patel is a seasoned cybersecurity engineer with over a decade of experience in safeguarding digital ecosystems and combatting cyber threats. With a robust background in the intricacies of cybersecurity and hacking, Ekansh has emerged as a stalwart in the realm of digital defense, consistently demonstrating proficiency and innovation in his field. Born with an innate curiosity for technology, Ekansh's journey into cybersecurity commenced at an early age. His fascination with computers and programming languages led him to delve deep into the intricacies of cybersecurity, where he discovered a passion for unraveling the complexities of digital security systems. Ekansh embarked on his professional journey armed with a strong educational foundation, earning a degree in Computer Science from a prestigious institution. Equipped with theoretical knowledge and practical skills, he swiftly transitioned into the corporate arena, eager to apply his expertise in real-world scenarios. Throughout his illustrious career, Ekansh has honed his skills across various domains of cybersecurity, including network security, cryptography, penetration testing, and incident response. His proficiency in identifying vulnerabilities and devising robust defense strategies has been instrumental in fortifying the digital infrastructure of multinational corporations. As a cybersecurity engineer in MNC companies, Ekansh has consistently demonstrated his ability to adapt to evolving threats and emerging technologies. His strategic approach to cybersecurity, coupled with his meticulous attention to detail, has enabled him to stay ahead of adversaries and mitigate potential risks effectively. With a relentless pursuit of excellence, Ekansh has amassed a wealth of experience in navigating the complex landscape of cybersecurity challenges. His extensive repertoire of achievements includes successfully thwarting cyber attacks, conducting comprehensive security assessments, and implementing cutting-edge technologies to enhance digital resilience. Beyond his professional endeavors, Ekansh is deeply committed to knowledge sharing and community engagement. He actively participates in cybersecurity forums, conferences, and workshops, where he imparts his insights and best practices to aspiring professionals. His dedication to fostering a culture of cybersecurity awareness reflects his altruistic spirit and desire to contribute to a safer digital world. In recognition of his contributions to the field, Ekansh has received accolades and commendations from peers and industry experts alike. His reputation as a trusted cybersecurity expert precedes him, earning him the respect and admiration of colleagues and clients across the globe. Looking ahead, Ekansh remains steadfast in his commitment to pushing the boundaries of cybersecurity innovation and excellence. With an unwavering dedication to his craft and a relentless pursuit of knowledge, he continues to shape the future of cybersecurity, safeguarding digital assets and empowering organizations to thrive in an increasingly interconnected world.MalwareCybersecurity ManagementCyber Threat IntelligenceCyberARKCyberlink PowerDirectorCyberGrantsComplianceEthical HackingSystem SecurityGovernment Reporting ComplianceInformation Security - $25 hourly
- 0.0/5
- (0 jobs)
ABRIDGEMENT Senior IT Professional with Three decades of Experience in that 20yrs into core management experience mainly critical IT Infrastructure, Applications and Information Security. Worked with world TOP companies IBM, Kyndryl, Unisys, Cognizant, Tata, Axis... and supported IT& ITES, Telecom, Finance, Insurance, Banking, Insurance, Banking, Automotive, life science, Energy, Electronics, IT Hardware and services, Manufacturing, oil & Gas, Electronics, Retail, Networking and Service Providers etc., globally. About: Immediately available to work. Looking for Senior Management role preferably Hybrid /Remote preferable locations Hyderabad or Bangalore AREAS OF EXPERTISE Specialties: * End-to-End management of Critical Information systems, Applications and Information Security. * Deep understanding of critical IT business functions asses and manage the Risks and Impacts.MalwareGovernance, Risk & Compliance SoftwareInformation SecurityCybersecurity MonitoringCybersecurity ManagementApplication SecurityIT InfrastructureInfrastructure ManagementSecurity EngineeringSecurity AnalysisHIPAASOC 2ISO 27001 - $5 hourly
- 0.0/5
- (0 jobs)
As a cybersecurity expert, I specialize in conducting comprehensive vulnerability assessments and penetration testing to identify and mitigate potential security risks. My expertise extends to configuring and managing network firewalls, ensuring robust protection against unauthorized access and threats. Additionally, I offer services related to cloud and data migration, ensuring secure transitions while maintaining data integrity and compliance. I also focus on email security to safeguard sensitive communications and protect against phishing and other email-based threats. My commitment is to provide organizations with the highest level of cybersecurity resilience and peace of mind.MalwareInformation SecurityCloud SecurityData MigrationCloud MigrationMicrosoft 365 CopilotMicrosoft Active DirectoryEmail SecurityMicrosoft Endpoint ManagerFortiGate FirewallPenetration TestingVulnerability Assessment - $20 hourly
- 0.0/5
- (0 jobs)
As a passionate and detail-oriented Security Analyst, I bring a robust computer science background and specialized cybersecurity training. With hands-on experience in vulnerability management, threat intelligence, and network forensics, I am dedicated to identifying and mitigating cyber threats to protect critical digital assets. My academic journey, including a Bachelor's in Computer Science Engineering and a Post Graduate Program in Cyber Security, has equipped me with a solid foundation in cybersecurity principles. I have worked on projects involving the MITRE ATT&CK Framework, Nessus vulnerability assessments, Wireshark packet analysis, SSL certificate analysis, and more. These experiences have honed my ability to respond effectively to a wide range of cybersecurity challenges. I am particularly skilled in log analysis, incident investigation, and using forensic tools like FTK Imager and Atopcy. My commitment toMalwareInvestigative ReportingRisk AssessmentIncident ManagementInformation SecuritySSL CertificateSOC 1Social Engineering AssessmentNetwork EngineeringComputing & NetworkingComputer Network - $25 hourly
- 0.0/5
- (0 jobs)
I'm a IT security analyst, specialized in Security Compliance have worked with multiple clients for 8 years with integrity. Technically abled in understand different technologies and precisely able to identify the risk track to mitigate the risk while ensuring the customer requirements are in place as per ISO 27001 standards agreed with security policy.MalwareWeb DevelopmentKubernetesDockerMicrosoft ExcelCisco Certified Entry Networking TechnicianRed Hat Enterprise LinuxEthical HackingRisk AnalysisAnsibleBash ProgrammingGovernment Reporting ComplianceInformation SecurityISO 27001Compliance - $20 hourly
- 0.0/5
- (0 jobs)
I'm an ex-software developer. Now, I am focusing on the cybersecurity domain. I would like to provide my expertise in GCR, Risk management, and Compliance.MalwareInformation SecurityNetwork SecurityCloud SecurityCybersecurity MonitoringCompTIA - $10 hourly
- 0.0/5
- (0 jobs)
I’m Karthikeya Chowdary Pydi, a developer and machine learning engineer passionate about building innovative solutions. With expertise in HTML, CSS, ReactJS, Java, Python, and machine learning frameworks like TensorFlow and PyTorch, I specialize in developing full-stack web applications and predictive ML models. -Designed and deployed scalable web platforms integrating real-time chat and PDF processing. -Built predictive models to optimize stock price forecasting and enhance accuracy in time-series data analysis. -Developed robust asset mapping systems for telecom services, leveraging Java SpringBoot and GIS tools like QGIS. I take pride in managing projects from ideation to deployment and ensuring clear communication throughout the process. Let’s connect to transform ideas into impactful solutions!MalwareWeb ApplicationWeb DevelopmentComputing & NetworkingNetwork EngineeringDatabaseDatabase ManagementInformation SecurityComputer Network - $25 hourly
- 0.0/5
- (0 jobs)
CAREER OBJECTIVE An initiative-taking IT Professional with a background in, Service Now, Active Directory, IT Security, and Infrastructure background, who also has enhanced technical and analytical skills to work in a fast-paced professional environment. I can work autonomously as well as can lead a team, have sound time, and task management such as solving technical issues in a timely manner. This allows me to prioritize and manage tasks, as well as problem-solving and responding to issues in a constantly changing environment. I have excellent communication and presentation capabilities. This allows me to manage clients and provide them extensive support.MalwareComputer NetworkComputing & NetworkingInformation Security - $30 hourly
- 0.0/5
- (0 jobs)
Career Objective: To seek a position which extracts my technical and interpersonal skills and which makes me an efficient and competent professional in the corporate world. Summary: Since May 2015, have 9.6 years of extensive hands on experience in Cyber Security domain as IT Security product engineer & administrator. An experienced team player with good communication and interpersonal skills with Hands on Experience on Endpoint Security, EDR,XDR, Encryption and Vulnerability management tools. Known Tools and Technologies: * Microsoft XDR Tools MDE (Microsoft Defender Endpoint & Vulnerability management) MDATP for network devices MDO (Microsoft Defender for O365), MDI (Microsoft Defender Identity Protection) MDCA (Microsoft Defender Cloud Apps Security) CASB product AADIP (Azure Active Directory Identity Protection )MalwareCybersecurity ManagementVulnerability AssessmentEncryptionInformation SecurityComplianceCybersecurity Tool - $10 hourly
- 0.0/5
- (0 jobs)
Experienced Network Engineer with 15+ years in designing and managing enterprise networks. Proficient in switching (VLAN, STP, MSTP), routing (EIGRP, OSPF, BGP), and securing environments with Palo Alto, Cisco ASA, and VPNs. Skilled in wireless technologies (MIST AP, Cisco AP,Aura AP), cloud platforms (Meraki, AWS), and Python for network automation.MalwareMultiprotocol BGPOSPFInformation SecurityNetwork EngineeringComputing & NetworkingComputer Network - $15 hourly
- 0.0/5
- (0 jobs)
Proficient Information Security professional with over 6+ years of experience delivering security solutions across industries including Healthcare, E-Commerce, Education, Retail, BFSI, Telecom, Airlines, IT, and Gaming. Expert in a wide range of security services such as Threat Modeling, Web Application VAPT, Network VAPT, Mobile and API Security, Thick-Client Application Testing, Software Composition Analysis (SCA), Static Application Security Testing (SAST), and Container Security. Adept at crafting tailored security strategies and conducting thorough security architecture reviews to enhance organizational resilience against evolving threats. In-depth understanding and practical experience in identifying and mitigating OWASP Top 10 vulnerabilities, such as Injection flaws, Cross-Site Scripting (XSS), Broken Access Control, Security Misconfigurations, and Cryptographic Failures. Experienced in designing and integrating end-to-end DevSecOps pipelines, embedding security tools seamlessly into CI/CD workflows. Skilled in OS hardening based on CIS benchmarks and conducting configuration reviews for cloud platforms such as AWS and GCP to ensure compliance with industry standards. Demonstrated expertise in aligning security practices with regulatory requirements and frameworks, including PCI-DSS, HIPAA, ISO 27001, and GDPR. Skilled at performing security assessments in gaming environments, addressing unique challenges like real-time data protection, player account integrity, and in-game transaction security. Proven ability to act as a SPOC for multiple projects, ensuring deliverables align with customer requirements while maintaining a focus on business objectives. Highly proficient in advanced deception technology, implementing solutions to proactively detect and mitigate threats across infrastructures. Strong communication and reporting skills, with a focus on translating complex technical findings into actionable insights for stakeholdersMalwareEthical HackingPenetration TestingVulnerability AssessmentHIPAAOWASPCloud SecurityAPI TestingNetwork SecurityApplication SecurityPCI DSSISO 27001ComplianceInformation Security - $20 hourly
- 0.0/5
- (0 jobs)
Solve your problem Technical and non technical. I can code,hack, fight,solve your problems in given time.MalwareInformation Security - $12 hourly
- 0.0/5
- (0 jobs)
Network and security administratorwho is in charge of the planning, installation process, and upkeep of the computers on company networks. Local Area Networks (LANs), Wide Area Networks (WANs), and other communication technologies are included. The position necessitates a thorough knowledge of networking protocols and security measures and the ability to troubleshoot and optimise network performance. As a network engineer, you play a critical role in designing, implementing, and managing an organisation's computer networks. Your expertise ensures the network infrastructure's seamless connectivity, reliability, and security, enabling efficient communication and data transfer within the organisationMalwareInformation SecurityNetwork EngineeringComputer Network - $12 hourly
- 0.0/5
- (0 jobs)
Cyber Security Analyst | Certified Ethical Hacker (CEH V12) |As a recent graduate with a strong academic foundation in computer science and a keen interest in cybersecurity, I am eager to leverage my skills in securing digital infrastructures and protecting sensitive information. I have gained a solid understanding of various cybersecurity principles, such as threat analysis, risk management, and encryption techniques, and I am excited to apply my knowledge in a practical setting. My goal is to contribute to securing networks, systems, and data while continuously learning and adapting to the ever-evolving cybersecurity landscape. Key Skills * Cybersecurity Fundamentals: Knowledge of network security, cryptography, penetration testing, firewalls, and VPNs. * Security Tools & Software: Hands-on experience with tools like Wireshark, Kali Linux, Metasploit, Nessus, and Nmap. * Networking: Understanding of protocols like TCP/IP, DNS, HTTP, and HTTPS. Familiar with routers, switches, and network configurations. * Incident Response: Ability to detect, analyze, and respond to security breaches with a focus on minimizing damage. * Risk Management & Vulnerability Assessment: Experience with risk analysis, vulnerability scanning, and security auditing techniques. * Operating Systems: Comfortable with Linux, Windows, and MacOS environments, focusing on security configurations and hardening.MalwareMetasploitSplunkVulnerability AssessmentWeb App Penetration TestingWeb Analytics ReportNetwork MonitoringNetwork Access ControlEmail Marketing ReportMalware RemovalMalware DetectionInformation SecurityCyber Threat IntelligenceEmail SecurityNetwork AnalysisPhishing Detection - $30 hourly
- 0.0/5
- (0 jobs)
I'm a Senior Network Engineer with over 7 years of experience in designing, implementing, and optimizing complex network infrastructures, I bring a wealth of expertise in network architecture, troubleshooting, and performance tuning. My proficiency spans across a range of networking technologies including routing, switching, firewalls, VPNs, and network security, enabling me to provide robust and scalable solutions to meet business and operational needs. Key Skills & Technologies: Network Design & Architecture (LAN, WAN) Network Security (Firewalls, VPNs) Network Performance Monitoring & TroubleshootingMalwareInformation SecurityComputing & NetworkingSystem AdministrationNetwork EngineeringComputer NetworkCisco RouterCisco IOSWireless LAN ControllerCiscoCheck PointFortiGate FirewallPalo Alto Firewalls - $5 hourly
- 0.0/5
- (0 jobs)
At Genpact, my focus is on fortifying cybersecurity, a vital domain where I apply my Master's in Data Science and Business Analytics from Shiv Nadar University. My expertise in Azure Active Directory and Security Information, CyberArk PAM, EPM and Event Management (SIEM) plays a crucial role in safeguarding our digital landscape. The technical acumen developed through my studies and handson experience in internet security drives my commitment to creating robust defenses. In collaboration with my team, we strive to maintain an innovative, secure environment, enabling growth and protecting against evolving threats.MalwareSailPoint Technologies IdentityIQSystem AdministrationIT Asset ManagementITILMulti-Factor AuthenticationSingle Sign-OnJiraServiceNowMicrosoft Active DirectoryCyberARKUser Identity ManagementInformation Security - $10 hourly
- 0.0/5
- (0 jobs)
PROFES SIONA LOVERVIEW Graduated with a B.Tech degree specializing in Computer Science & Engineering; applied cybersecurity expertise to design secure systems that resolved three major issues causing data breaches within simulated project environments .AIG's "Shields Up," Walmart USA's software engineering initiative, and Tata Group's Cybersecurity Analyst role. Engaged directly with faculty-led research initiatives focused on emerging cyber threats, producing documented findings highlighting two critical areas requiring immediate attention which informed future academic studies.MalwareMetasploitWiresharkC++JavaPythonUser Identity ManagementInformation Security - $5 hourly
- 0.0/5
- (0 jobs)
Profile Summary A skilled IT Support Specialist with experience in helping users with technical issues. I am proficient in solving problems related to hardware, software, and networks to ensure smooth operations. I provide support through help-desk tickets, perform system updates, and assist with any technical challenges that arise. Comfortable working with different operating systems like Windows, mac OS, and Linux, I focus on resolving issues quickly to minimize downtime. Known for strong communication skills and a commitment to delivering excellent customer service, I work well under pressure and enjoy being part of a team to keep IT systems running efficiently.MalwareService Cloud AdministrationSystem AdministrationVPNComputer NetworkCisco MerakiSecurity Patch InstallationHardware TroubleshootingPrinterMicrosoft Endpoint ManagerMicrosoft Azure AdministrationMicrosoft Active DirectoryMicrosoft IntuneOffice 365Information SecurityCompliance Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Malware Analyst near Hyderabad, on Upwork?
You can hire a Malware Analyst near Hyderabad, on Upwork in four simple steps:
- Create a job post tailored to your Malware Analyst project scope. We’ll walk you through the process step by step.
- Browse top Malware Analyst talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Malware Analyst profiles and interview.
- Hire the right Malware Analyst for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Malware Analyst?
Rates charged by Malware Analysts on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Malware Analyst near Hyderabad, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Malware Analysts and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Malware Analyst team you need to succeed.
Can I hire a Malware Analyst near Hyderabad, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Malware Analyst proposals within 24 hours of posting a job description.