Hire the best Malware Analysts in Turkey
Check out Malware Analysts in Turkey with the skills you need for your next job.
- $45 hourly
- 4.9/5
- (43 jobs)
99% of penetration testers deliver a scan. I show you what will actually get you hacked. If you're a SaaS founder, startup team, or technical lead who can’t afford a breach, you're in the right place. I’m a Certified Penetration Tester (CPTS) with 5+ years of deep, hands-on experience in Web Security, API Testing, and Vulnerability Assessment. I go beyond automated scans to deliver manual, real-world attacks that simulate how hackers break into systems then I help you fix it, fast. 📌My Services: 🔹Web Application Penetration Testing (OWASP Top 10, business logic flaws) 🔹API Security Assessments (REST, SOAP, GraphQL) 🔹Cloud Infrastructure Security (AWS/Azure/GCP hardening, IAM flaws, misconfigurations) 🔹Mobile App Penetration Testing (Android & iOS, using MobSF, Frida, etc.) 🔹Network Penetration Testing (internal/external assessments) 🔹DevSecOps Integration (security into CI/CD pipelines) 🔹Red Teaming & Social Engineering 🔹Malware Analysis & Reverse Engineering 🔹Compliance Support (NIST, SOC 2, ISO 27001 readiness) 🔹Free Retesting after fixes are made 📌Deliverables You Get: 🔹Full Technical Report with proof-of-concept examples 🔹Executive Summary for stakeholders and executives 🔹Risk Ratings aligned with OWASP and CVSS standards 🔹Clear, actionable Remediation Steps tailored for developers 🔹Free Retesting to confirm fixes 📌Let’s Make Sure Hackers Never Have the First Move Click “Invite to Job” or message me your app or API URL. I’ll review and share exactly how I can secure your systems.Malware
Security InfrastructurePythonInternet SecurityKali LinuxWebsite SecurityNetwork SecurityInformation SecurityEncryptionSecurity TestingSecurity AnalysisEthical HackingSystem SecurityApplication SecurityVulnerability AssessmentPenetration Testing - $30 hourly
- 5.0/5
- (3 jobs)
Multilingual computer engineer, specialized in IT, AI, machine learning, deep learning, networks and cybersecurity. Fluent in Arabic, French, English and professionally speaking Spanish, Turkish, Korean, and beginner in Russian. Experienced with various programming languages including but not limited to: Python, C, C++, C#, JS, CSS, HTML, XAML, SQL, NoSQL, Java, Bash, absolute hands on projects on pentesting, cryptography, NLP, web and app development. Academic high honors in Bachelor's and Master's programs with interest research focus on Bluetooth security and blockchain in EHRs. Passionate about continious learning, interactive teaching, and pursuing a PhD. Hobbies: reading, writing, playing Piano/Violin, Psychology, Quantum Mechanics, Design, Astronomy.Malware
Programming Bug FixDatabase AdministrationPythonArtificial IntelligenceMicrosoft Active DirectoryWeb DevelopmentMicrosoft OfficeMachine LearningLinuxDockerComputer EngineeringCryptographyWindows ServerInformation SecurityCybersecurity Management - $100 hourly
- 5.0/5
- (21 jobs)
Unleash the Power of Technology with Your Very Own Geek Friend! As a tech-savvy individual, I spent my childhood in front of computer screens, gaining an advanced insight into the vast world of the internet. This introverted personality combined with my digital know-how has equipped me with the skills to solve a wide range of problems - including yours! I am: ➣ A seasoned developer, who crafts code with precision and ease. ➣ An ethical hacker, who keeps your digital assets secure. ➣ A computer engineer, who blends creativity with technical know-how. ➣ Your geek friend, who is always ready to solve your tech problems. My toolkit consists of multiple programming languages and technologies, and I'm not afraid to pick up a new one if the situation calls for it. I believe in pushing boundaries and exceeding expectations. Get in touch and let's tackle your tech challenges together!Malware
Web ScrapingEthical HackingScriptingPage Speed OptimizationInformation SecurityWeb App Penetration TestingSystem AdministrationNetwork SecurityMySQLWordPressPHPJavaScriptWeb DevelopmentPythonDjango - $99 hourly
- 4.8/5
- (45 jobs)
I'm an experienced Windows, iOS and Android Reverse Engineer. I have a lot of experience in reversing applications, games, programs and systems. With +15 years of hands-on experience in Reverse Engineer and Malware Analysis, I am also a cybersecurity expert with experience in cybersecurity research and development at a world-class R&D laboratory in the field of Cyber Operations. In this work, I gained experience in network traffic analysis, malware analysis and cryptography. My main skills: * Extract Data, Code, Algorithms, Signatures and Network Addresses from Android Apps, iOS App and Windows App * Deep expertise in Smali bytecode * Decompile Apk File and convert to full source code * Application Modification for Add, Remoave, Modify Functionalities * Bypass SSL pinning. Interception, Modification and Analysis of Network Traffic * Creation of Private API for a Applications or Programs * Decompilation, Debugging, Analysis and Modification of Native Android Libraries * Know arm and x86 assembler * Expertise in analyzing sophisticated malware using tools like IDA Pro, Ghidra, and x64dbg. * Have Experience in Reverse Unity, Cocos, Kony Android Apks * Debuggers, Disassemblers with Windows x86 and x64. * Creating Scripts/Plugins for Deobfuscation * Reversing iOS, Android Apps and Developing Tools to Automate * Server solutions (including serverless solutions) * interaction with BLE devices (BLE 4, BLE 5 Coded Phy) * Mobile apps Reverse Engineering (decompilation, creation of mods, API extraction, decryption) * Android APK patching and Binary Patching, Binary Decompilation * Root Detection and Emulator Detection Bypass * Network Traffic Analysis and Malware Analysis * Deobfuscation and Unpacking Applications * Web-Scraping/Crawling and Automation Expert * Browser Automation & Testing with Leverage Selenium, Multilogin, and Puppeteer * Data Analysis & Manipulation * Making custom tools for unpacking executable files as standalone tools and as plugins for debuggers * Reverse engineering eprom communication and ecu reverse engineering * firmware and hardware reverse engineering * Creating scripts/plugins for automatic and semi-automatic deobfuscation with IDA * Developing disk/storage/volume stack drivers * reversing iOS/android apps and developing tools to automate it * Advanced Web Scraping Techniques external APIs, uncovering hidden functionalities and potential enhancements through reverse engineering.Malware
HackerRankPenetration TestingVulnerability AssessmentEthical HackingInternet SecurityCryptographySecurity EngineeringEncryptionPythonFirmwareAndroid App DevelopmentAndroidAssembly LanguageInformation SecurityReverse Engineering - $40 hourly
- 5.0/5
- (3 jobs)
Risk&IT Control Leader with 13 years of experience at this field especially in IBM Turkey. Proven ability to successful analyze IT processes aligned with ITIL perspective, perform all IT external/internal/customer audits with exceed results. Expert in IT Risk Management, IT Audit, ISO20000, ISO27001, ISO22301, ISO31000, PCI-DSS and ISAE3402. Leadership skills involving managing and motivating team to achieve business objectives. Experience in designing, implementing and auditing IT processes. I am also good at to draw process in MS Visio and creating plans in MS Project.Malware
Information TechnologyITILBusiness Continuity PlanProcess Flow DiagramIT Service ManagementPCI DSSIT Compliance AuditBusiness Process Outsourcing IT ServicesBusiness Continuity PlanningRisk ManagementISO 27001Process ImprovementInformation Security - $100 hourly
- 5.0/5
- (1 job)
I am passionate about leveraging my Comptia Security+ certification and skills in Splunk, QRadar, Pentest, and Digital Forensic to protect and optimize the IT infrastructure and systems of Firstmedicall and its clients. I have successfully implemented and managed cybersecurity solutions for various contracts in the UK, as well as for Brookdale University Hospital and Medical Center and One Brooklyn Health. I am also a co-founder and former managing director of SmartHub Int'l LLC, a cybersecurity consulting firm that provided innovative and customized services to various sectors. My mission is to drive excellence and transformation in healthcare delivery and cybersecurity, using my expertise and experience to create value and impact.Malware
Information TechnologyTech & ITComplianceSystem SecurityGovernment Reporting ComplianceInformation Security - $40 hourly
- 4.9/5
- (7 jobs)
I'm a cyber-security engineer who has experience in both red team and blue team. I can help you with cyber security architecture, penetration testing, static code analysis, network and Active Directory hardening. I'm also an experienced ctf player. Computer Engineer BSc, MSc | Offensive Security Engineer | CTF Player | OSCP | CREST CRT | OSWP | C-AI/MLPen | eDFP | PIPA |Malware
Computing & NetworkingInformation SecurityArchitectural DesignComputer NetworkNetwork EngineeringIncident Response PlanDigital ForensicsSecurity AnalysisSecurity Operation CenterWeb Application SecurityApplication SecuritySecurity Assessment & TestingNetwork Penetration TestingWeb App Penetration TestingPenetration Testing - $22 hourly
- 4.8/5
- (7 jobs)
In short, I’m very talented in IT 🙂 I am happy to solve your IT problem fast! 🥳 I am a Software Developer with good experience in Android Development, Front End Development. Java, C++ and Python. I’m also a database designer. I have a Master’s degree in Cyber Security Engineering and cryptography and a bachelors degree in information systems. I am Arabic native speaker. I’m also fluent in English and can manage myself in Turkish language.Malware
Machine LearningFront-End DevelopmentSystem AnalysisInformation SecurityBlockchain DevelopmentCryptographyMobile App DevelopmentMathematicsPythonJava - $100 hourly
- 0.0/5
- (3 jobs)
Chris Rock is a Cyber Mercenary who has worked in the Middle East, US and Asia for the last 30 years working for both government and private organizations. He is also the co-founder of a security logging platform called SIEMonster. Chris presented I will Kill you at Defcon 23. Where he detailed how hackers could create fake people and kill them using vulnerabilities in the Birth and Death Registration systems around the world. Chris also presented How to Overthrow a Government at Defcon 24 working with the coup mercenary Simon Mann. Chris presented "Killer Hertz" at Defcon 30 in August in Las Vegas on custom equipment to defeat the Jammer. "I will kill you and birth you" "How to overthrow a government" "Killer Hertz - Terrorists Win" He is also the author of the Baby Harvest, a book based on criminals and terrorists using virtual babies and fake deaths for financing.Malware
Public SpeakingInformation Security - $10 hourly
- 5.0/5
- (1 job)
Hello, I'm Ozan. I'm a video editor and an expert in my field, an original article writer. I'm experienced and talented in producing Turkish and English content on all kinds of topics and writing original and SEO-friendly articles. I'm an expert in using Chatgpt, Canva, Wondershare Filmora 13 programs. Are you also looking for a Turkish-English, English-Turkish translator? Here I am. Why should you choose me? -Hardworking and disciplined -Expert in my field -Open to development -Strong communication -Patient and practical What are you waiting for, I'm ready.Malware
English to Turkish TranslationTurkishTranslationTurkish to English TranslationYouTube VideoYouTubeEnglishArticle WritingProduction PlanningMicrosoft WordMicrosoft OfficeMicrosoft ExcelInformation SecurityCompliance - $200 hourly
- 0.0/5
- (0 jobs)
Hello, I am an 18-year-old young man. I have been working in the field of cyber security in the industry for 5 or 6 years. I am extremely interested in technology due to the curiosity I had in my youth. My main job is to find vulnerabilities for operating systems. I created a vulnerability in both MacOS, Windows and Linux operating systems with a code I wrote last time. Fixing this vulnerability is only up to me. I have it because this vulnerability is the exact opposite of the normal known shell vulnerabilities. I have detected and reported many security vulnerabilities to companies such as Apple and Windows. My field is network network security, operating system security, web security and cyber security.Malware
System AdministrationCybersecurity ManagementCybersecurity ToolMalware RemovalMalware DetectionSecurity EngineeringCyber Threat IntelligenceNetwork EngineeringComputing & NetworkingComputer NetworkInformation Security - $200 hourly
- 0.0/5
- (0 jobs)
Основные навыки Infrastructure as a code CICD Virtualization Personal Information Konstantin Bryukhanov DeusOps Founder & CEO / ITMO Docent Lecturer Санкт-Петербург, Санкт-Петербург, Россия Общие сведения I work with Docker, Kubernetes, Jenkins, GitLAB CI, Terraform, Ansible, Prometheus, Grafana Influenced of UX and agile :) Love to learn something new and glad to teach others I take an active part of improving the company's IT infrastructure. I attend conferences and meetings to expand my professional horizons.Malware
Architectural DesignComputing & NetworkingInformation SecurityDevOps - $40 hourly
- 0.0/5
- (0 jobs)
**IT Consultant | System Engineer | Cloud & Backup Solutions Expert** With over 25 years of experience in IT and system engineering, I specialize in designing and managing secure, scalable IT infrastructures. I have built network cabling and system infrastructure from scratch for headquarters and multiple branches, managed a 5M TL annual IT budget, and optimized outsourcing and vendor processes. I have designed ISO 27001-compliant server rooms, implemented KVKK-compliant security policies, and integrated Microsoft CRM into business workflows. My expertise includes virtualization (VMware, Hyper-V), backup solutions (Veeam, Synology NAS, Azure DR), and network security (Fortinet, SSL VPN). I have led major IT transformations, including migrating PBX to VoIP for cost efficiency, deploying enterprise-wide video conferencing solutions, and ensuring seamless remote work capabilities. Additionally, I have managed 500+ domains, hosted corporate websites on IIS and Linux servers, and provided IT support for 150+ users through a ticketing system. Let's connect and optimize your IT infrastructure for efficiency and security!Malware
Microsoft AzureWordPress Website DesignManage eBay SiteData MiningData EntryLinuxDatabase ManagementMicrosoft IISDNSWindows AdministrationFortiGate FirewallVeeamVMware AdministrationWindows ServerInformation Security - $40 hourly
- 0.0/5
- (0 jobs)
🔹 Cybersecurity & Business Intelligence Professional 🔹 I am a results-driven cybersecurity and business intelligence specialist with 4 years of experience. My expertise includes: ✅ Cybersecurity & SecOps – SIEM management (Elasticsearch), log analysis, security event monitoring, WireGuard VPN configuration, vulnerability assessments (OpenVAS, Nessus). ✅ System & Network Administration – Linux (Ubuntu), network security, firewall management, patch management, and compliance (ISO 27001). ✅ Virtualization & Cloud – vSphere, QEMU/KVM, Docker, Keycloak, Cloudflare. ✅ Data Analytics & Automation – SQL, Power BI dashboards, data modeling, Bash scripting. I’m passionate about securing systems, optimizing infrastructure, and providing data-driven insights. Let’s collaborate on your next project! 🚀Malware
BashSOC 1DevOpsComputer NetworkInformation SecurityISO 27001ElasticsearchLinux - $50 hourly
- 0.0/5
- (0 jobs)
Computer Engineering, Software Engineering, Security Researcher, White Hacker, Security Analyst, Business AnalystMalware
Usability TestingDesign & Usability ResearchProduct AnalyticsProject ManagementProject AnalysisUser Experience DesignUI/UX PrototypingPython FirePythonPHPNetwork EngineeringComputing & NetworkingComputer NetworkInformation SecurityDatabase Management - $300 hourly
- 0.0/5
- (0 jobs)
I am a seasoned professional with over two decades of experience at the forefront of mission-critical systems and architectures. My career has been defined by successfully designing, implementing, and supporting numerous first-of-a-kind (FoIK) projects across a wide range of fields. What truly sets me apart is my comprehensive understanding of technology, from the most fundamental levels to complex, large-scale deployments, coupled with an unwavering dedication to operational excellence. I pride myself on my proven ability to navigate and resolve any outage or disaster, consistently ensuring that I never depart a data center or customer site until the root causes have been fully identified and rectified.Malware
Information SecurityGovernment Reporting ComplianceComplianceProblem SolvingDevOpsArchitectural DesignArchitectureNetwork EngineeringComputing & NetworkingComputer Network - $75 hourly
- 0.0/5
- (0 jobs)
Summary CV Graduated with a master's degree in computer engineering, majoring in software, and a bachelor's degree in information technology Seeking to strengthen and upgrade skills and expertise in the field of computers for a better and higher job positionMalware
Autodesk RevitBrewmaxxAbaqusAgaviGraphNetwork EngineeringComputer NetworkInformation SecurityGovernment Reporting ComplianceComplianceComputing & Networking - $40 hourly
- 0.0/5
- (0 jobs)
I am an IT with experience in digital transformation. My specialty is SAP's all modules (MM, SD, FICO, HR) I also have a lot of experience in ERP and RPA fields. Apart from these, I am also familiar with NATO protocols. Highly motivated Project Leader. Former National AthleteMalware
Microsoft Dynamics CRMReportDigital DesignProject ReportAutodesk RevitFramework7Government Reporting ComplianceSAP ERPSAP C/4HANASAPCRM SoftwareInformation SecurityDatabase ManagementDatabase - $67 hourly
- 0.0/5
- (0 jobs)
Travel & Hospitality Technology Expert | 30+ Years Experience Specializing in Hotel Software, IT Integration & Operational Efficiency I help hotels, DMCs, and travel agencies leverage technology to boost revenue, streamline operations, and enhance guest experiences. With deep expertise in PMS/POS systems (Sihot, Sejour, TourVisio), B2B/B2C platform setup, and data-driven pricing, I bridge the gap between hospitality operations and IT solutions. ✅ How I Deliver Value: Software Implementation & Training: Deployed and trained teams on Sihot PMS/POS, Sejour, and TourVisio across 15+ hotels and agencies. Revenue Optimization: Designed dynamic pricing strategies, yield management systems, and package deals to maximize profitability. IT Transformation: Led SaaS integrations, system migrations, and workflow automation for hotels and travel businesses (EMEA regions). End-to-End Project Leadership: From B2B booking platforms to inventory management systems, I ensure on-time, budget-aligned delivery. Why Work With Me? 30+ years of hands-on experience in hospitality ops + IT Bilingual (English + Turkish) with cross-regional project experience (MENA/Europe) User-focused approach: I train teams to adopt tools effectively—not just install them. Let’s connect to discuss how I can support your tech-driven growth!Malware
Computer NetworkInformation SecurityNetwork EngineeringComputing & NetworkingCustomer ServiceTechnical SupportTech & ITTechnical Project Management - $60 hourly
- 0.0/5
- (0 jobs)
With a deep passion for securing digital landscapes, I specialize in cybersecurity, ethical hacking, and information security to protect businesses from cyber threats. Whether it's penetration testing, security infrastructure, or network engineering, I bring advanced technical skills to safeguard applications and networks. I am also interested in machine learning and Python programmingMalware
Linux System AdministrationEthical HackingWeb Application SecurityWeb Application FirewallWeb App Penetration TestingIT Compliance AuditSecurity Policies & Procedures DocumentationInformation SecurityNetwork EngineeringMachine LearningPython ScriptSecurity Assessment & TestingSecurity InfrastructureSecurity EngineeringSecurity Analysis - $80 hourly
- 0.0/5
- (0 jobs)
I am a CEH certified cyber security expert and also have expertise in graphic design and video editing.Malware
Information SecurityCybersecurity Management - $17 hourly
- 0.0/5
- (0 jobs)
Hello! I am a computer engineer with expertise in Python programming, Networking and IT solutions. I specialize in developing efficient software solutions, optimizing network infrastructures and troubleshooting IT-related challenges. In addition to my technical skills, I also offer English translation services, providing accurate and fluent translations. My attention to detail and problem-solving mindset make me a reliable freelancer for a variety of projects. Feel free to reach out to me; I am ready to help!Malware
ComplianceComputer NetworkComputing & NetworkingNetwork EngineeringInformation Security - $17 hourly
- 0.0/5
- (0 jobs)
SUMMARY * As dedicated IT professional with a strong foundation in networking and cybersecurity, I possess a solid understanding of IP protocols and intermediate firewall knowledge, I am adept at identifying and mitigating network vulnerabilities. My practical experience with SIEM tools like Splunk and Wazuh, EDR tools like Crowdstrike, and packet analysis with Wireshark has equipped me with the skills to effectively detect, analyze, and respond to cyber threats. * With a keen interest in cloud technology and AWS certification, I am committed to staying updated with the latest industry trends. My strong attention to detail and collaborative approach ensure efficient and effective teamwork, making me a valuable asset to any IT organization.Malware
ComplianceGraphSystem AdministrationComputer NetworkNetwork EngineeringComputing & NetworkingInformation SecurityGovernment Reporting Compliance - $15 hourly
- 0.0/5
- (1 job)
Cybersecurity Professional | Python Developer for AI & Automation | SOC Analyst Protect your business from cyber threats with proven security expertise. I'm a hands-on cybersecurity professional and Python developer specializing in AI-powered security solutions, automation, and threat detection. With active OSCP and CISSP training, I bridge the gap between traditional security practices and modern AI technology to help businesses automate their defenses and identify threats faster. What I Deliver: Complete Cybersecurity Solutions 🤖 AI-Powered Security Automation Custom Python Security Scripts: Automated threat hunting, log analysis, and incident response workflows that reduce manual tasks by 70% Intelligent SOAR Solutions: End-to-end Security Orchestration, Automation & Response platforms tailored to your environment AI Chatbots for Security Teams: LLM-powered assistants for incident triage, threat intelligence queries, and security awareness training 🛡️ Advanced Threat Detection & Response Machine Learning Threat Detection: Custom ML models that identify anomalies and zero-day threats traditional tools miss Real-time SOC Operations: 24/7 threat monitoring, incident analysis, and rapid response coordination Automated Incident Response: Python-driven playbooks that contain threats within minutes, not hours 🔍 Comprehensive Security Testing Web Application Penetration Testing: OWASP-based assessments with detailed remediation roadmaps Network & Infrastructure Testing: Complete vulnerability assessments with risk prioritization Cloud Security Audits: AWS security reviews and DevSecOps pipeline integration 📊 Enterprise SIEM Implementation Splunk/QRadar/Elastic SIEM: Expert deployment, custom dashboards, and advanced correlation rules Security Metrics & Reporting: Executive-level dashboards and compliance reporting automation Log Management Optimization: Efficient data ingestion and retention strategies that reduce costs ☁️ Cloud Security & DevSecOps AWS Security Architecture: Infrastructure-as-Code security controls using Terraform CI/CD Security Integration: Automated security testing in development pipelines Container & Kubernetes Security: Secure containerization strategies and runtime protection 🎯 Why Choose My Services? Proven Results: Clients see 60% reduction in security incidents and 80% faster threat response times Modern Approach: I combine traditional cybersecurity with cutting-edge AI technology for maximum protection Business-First Mindset: Every solution is designed to protect your business while enabling growth, not hindering it Continuous Support: From initial implementation to ongoing optimization, I'm your long-term security partner Technical Skills: Python Expertise: Security automation, AI/ML integration, API development, data analysis AI Technologies: LLM integration, Ollama, n8n workflow automation, custom chatbot development Frameworks: MITRE ATT&CK, NIST CSF, OWASP, CIS Controls Tools: Splunk, QRadar, Elastic SIEM, Terraform Certifications: OSCP (in progress), CISSP (trainee) I combine deep cybersecurity knowledge with advanced Python development skills to create intelligent, automated security solutions. From building custom AI-powered threat detection systems to developing automated incident response workflows, I help organizations leverage cutting-edge technology to stay ahead of cyber threats. Ready to strengthen your security posture? Let's discuss your project.Malware
n8nZapierLarge Language ModelAI Agent DevelopmentGenerative AIAI SecurityPythonEthical HackingSystem AdministrationInformation Security - $6 hourly
- 0.0/5
- (0 jobs)
In addition to completing my Electrical and Electronics Engineering education at Pamukkale University with a Certificate of Honor, I participated in a 1-year Erasmus education and 3-month internship program at Bialystok University of Technology in Poland. I also received Cyber Security Specialist training for 3 months (600 hours) at Bahçeşehir University Wissen Akademie. For this reason, I would like to state that I am extremely devoted and enthusiastic about being effective and fast in business life, and that I want to take on the responsibility required by the position to be hired with curiosity and enthusiasm.Malware
Technical SupportProduct SupportIT SupportDocumentationTranslationTestingSystem AdministrationInformation Security - $10 hourly
- 0.0/5
- (0 jobs)
ABOUT ME Throughout my career, I have gained extensive experience in the field of information technology and have actively participated in various system management and digitalization projects. I have developed my technical competencies with the experience I gained in areas such as information security, network management, data management, and system integration. I have deep knowledge in the installation, management, and optimization of secure and efficient IT infrastructures. With an approach focused on continuous development and producing innovative solutions, I aimed to make the IT processes of the institutions I worked for more efficient, secure, and sustainable. In the future, I aim to further advance my experiences and develop myself in technical and strategic areas.Malware
Security ManagementSystem AdministrationGovernment Reporting ComplianceComputer NetworkInformation SecurityComputing & NetworkingCompliance - $200 hourly
- 0.0/5
- (0 jobs)
I live in Turkey, I have a beautiful family, I love technology and security, I am an expert especially in website security and network data security. Since I am familiar with the requirements of the personal data protection law, I provide technology and information security consultancy and testing services to companies in this field. I spend my free time with my family and researching innovations.Malware
Network EngineeringComputer NetworkSystem AdministrationComputing & NetworkingInformation Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.