Hire the best Nessus professionals

Check out Nessus professionals with the skills you need for your next job.
Clients rate Nessus professionals
Rating is 4.7 out of 5.
4.7/5
based on 117 client reviews
  • $25 hourly
    I am a Security enthusiast who is keen on learning and exploring the area of Cybersecurity. I am involved with VA/PT of web and mobile application projects and security research work. I have a total of 5+ years of work experience in Information Security. I worked on off-site testing of web applications, and mobile application VAPT and have conducted manual testing of applications and network testing for various domestic and international clients. I have good experience with penetration testing methodology and approach and have majorly worked on projects for domestic and international clients with a good track record of finding critical issues in applications and networks, which has eventually helped clients in patching issues and securing their IT assets. Profile Summary : --------------------- # Conducted web application penetration testing of business applications with a Business logic-focused testing approach. # Has good knowledge of IT infrastructure and configurations. # Can map out the network, and discover ports and services running on different exposed networks and security devices. # Conducted vulnerability assessment of mobile application penetration testing on Android and iOS platforms. # Performing social engineering attacks using Kali Linux. # Acquainted with various approaches to Gray & Black box security testing. # Deep knowledge about MySQL, Oracle, Microsoft office 2007 ~ 2020, Outlook, VM ware, Virtual Box. # Highly proficient in identifying OWASP Top 10 vulnerabilities in RedHat, WINDOWS XP/7/8/10, LINUX, Kali Linux, etc. # Methodologies worked on: Scrum, Agile, Waterfall, OWASP Rules. Professional Skill : -------------------- # Highly skilled individual with key interests in Audit, network security, and application-level penetration testing. # Well-versed in conducting application security audit both manually and through tools such as Burp Suite Professional, Metasploit Framework, Nessus, and Hands-on with tools like Burp Suite Pro, Kali Linux, Postman, etc. # Deep Knowledge of various Operating Systems like Windows XP, Vista,7,8,10; Mac OS; LINUX including Ubuntu and Kali. # Knowledge of OWASP Top 10 vulnerabilities and beyond and how to effectively mitigate them. We are a team of 3 members who have 2 years, 3+ years, and 6+ years of experience person with the same domain.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Information Security Consultation
    Vulnerability Assessment
    Network Penetration Testing
    Web App Penetration Testing
    Penetration Testing
    Website Security
    Information Security Audit
    Web Application Security
    Code Review
    API Testing
    Web Testing
    Network Security
  • $80 hourly
    ✅ Penetration Tester and Cyber security consultant acknowledged by leading companies in the tech field for reporting several high, and critical vulnerabilities in their systems and websites. After I go through multiple pentestinig techniques manually and automatically, at the end of the engagement, professional reports are provided, that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Let's get in touch and get your website and system secured 🛡️ 🏆 Cyber security consultation 🏆 Cyber security training 🏆 Network Penetration Testing 🏆 Active Directory Penetration Testing 🏆 Web penetration testing 🏆 Vulnerabilities Assessment 🏆 Cyber security training labs Development 🏆 CTF Labs development 🏆 Synack Red Teamer 🏆 Acknowledged by tech lead companies, Yahoo, Nokia, ZTE, Swisscom, Synology, ElearnSecurity, Payoneer, Sophos, Xiaomi. 🏆 I was number 16 on Turkey and Egypt on HackTheBox. 🏆 Work on Weekends 🏆 5 Years Experience
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Digital Forensics
    Metasploit
    Penetration Testing
    Ethical Hacking
    Kali Linux
    Security Testing
    Vulnerability Assessment
    Web App Penetration Testing
    Network Penetration Testing
    Network Security
    Docker
    OWASP
    Web Application Security
    Linux
  • $30 hourly
    Consolidating my past involvement in Ethical Hacking, Incident Response, IT Security Governance, and Project Management with solid relational and correspondence capacities, I am sure that I can give work that will surpass your desires. Security Analyst with 10+ years' experience in Endpoint security, Application Security, Change Management, Exception Handling and VAPT. Experience in system and network administration, managing server infrastructures and data center operations. Expert-level knowledge of Amazon EC2, S3, Simple DB, RDS, Elastic Load Balancing, SQS, and other services in the AWS cloud infrastructure such as IAAS, PAAS and SAAS. Deep experience with AWS components such as EC2, S3, Elastic IPs, EBS, Security Groups, Route 53, VPC, Elastic Beanstalk, RDS, DynamoDB, and Cloud Formation. Experience in administration of MS SQL server and MySQL in AWS cloud platform. Configured AWS IAM and Security Group in Public and Private Subnets in VPC. Architected, Designed and Developed the Backup and Archiving, Disaster Recovery in AWS Cloud. Security Tools: Nessus, Nmap, burp suite, Wire shark, Web scarab. Operating Systems & Platform: Kali Linux, Backtrack 5 r3, Windows 7, 8, 8.1,10, MAC. Programming Language: HTML, JavaScript. Framework: Metasploit, OWASP. Endpoint: Sophos, Check Point. Amazon Web Services: Ec2, EBS, IAM, VPC, RDS Azure: VNET, VM (Windows, Linux) Server: Windows 2008 server, windows 2012 server.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Information Security Consultation
    Security Infrastructure
    Security Assessment & Testing
    Web App Penetration Testing
    Information Security
    Amazon Web Services
    Penetration Testing
    Security Analysis
    Application Security
    Vulnerability Assessment
    Security Testing
    Microsoft Azure
    Kali Linux
    Cloudflare
  • $90 hourly
    Information Security enthusiast, expert in cloud security, risk assessment, compliance, vulnerability management, Pen Testing, and security audit. I hold many professional credentials like CISSP, CISA, PMP, AWS Certified Cloud Practitioner certificate, ISO 22301 Lead Implementer, COBIT 5 Foundation, MCSE, RHCT and more. Experience in compliance frameworks and standards (HITRUST, ISO 27001, GDPR, SOC2, PCI-DSS, HIPAA, NIST)
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Microsoft Azure
    Information Security Audit
    HITRUST Common Security Framework
    ISO 27001
    HIPAA
    IT Compliance Audit
    Technical Project Management
    Compliance Consultation
    Cloud Computing
    Security Infrastructure
    Information Security
    Penetration Testing
    Vulnerability Assessment
    Network Security
    Security Policies & Procedures Documentation
  • $90 hourly
    I have over 30 certifications in the technology industry. My expertise is Small business security and network design. I Provide support for Active directory environments, network troubleshooting issues and communications, Meraki device support, Veeam, Autotask, Datto, and many others. I also provide vulnerability assessment and security audits. Certifications CISSP GCIH CompTIA A+ CompTIA Network + CompTIA Security + ISC2 SSCP ITIL Foundations ITIL Intermediate Service Operations ITIL Intermediate Service Transitions Wireshark Certified Nessus Certified Cisco CCENT Hootsuite Platform Certified Kaseya Certified Administrator Microsoft Certified Tech Specialist in Active Directory Microsoft Certified Professional in Win XP Hubspot Content Marketing Certified Hubspot Inbound Sales Certified Hubspot Inbound Marketing Certified Certified SonicWall Security Administrator
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Office 365
    Firewall
    Veeam
    VMware ESX Server
    Computer Network
    System Administration
    Cisco Meraki
    Data Backup
    Active Directory
    Information Security
    Wireshark
    Network Administration
    Windows Server
    ITIL
  • $40 hourly
    ✅ Amongst the Top 1000 hackers worldwide Web Pentesting | Mobile App Pentesting | API Pentesting | Vulnerability Assessment | Python & Bash Automation I work with companies to make their digital assets secure and provide solutions to enhance their security parameters. I create cybersecurity content on hackingloops.com explaining the practicalities and how-tos of the vulnerability and exploitation Part-time bug bounty hunter at Bugcrowd & Intigriti. Feel free to contact me for your queries and security-related issues.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Network Penetration Testing
    Python
    Security Analysis
    Malware
    Website Security
    Mobile App Testing
    Security Engineering
    WordPress
    Cloud Security
    Network Security
    Penetration Testing
    Security Assessment & Testing
    Cybersecurity Management
    Malware Removal
    Firewall
    Information Security
    Vulnerability Assessment
    Information Security Consultation
  • $35 hourly
    Certifications that I hold: CEH ( Certified Ethical Hacker) 740 MCSA ( Installation, Storage and Compute with Windows Server 2016) To whom it may concern, In the last years I did more than 400 Penetration Tests and Security Assessments. Most of them on Web and Mobile ( Android and iOS ) applications with Finance Background implemented with various technologies and frameworks, server security testing and hardening. Sample reports can be provided who is interested. ___________________________________________________________ Professional Load and Stress Testing if you are interested for your application ___________________________________________________________ Migration of infrastructure among cloud solutions ( AWS , Azure , Office 365, Google cloud). Many of you struggle to shift your infrastructure from On-premise to Azure , AWS ( amazon) or vice versa , I can do it in a short time frame with zero downtime if there is a possibility. And offer you support as long as you and your team are self reliable on new infrastructure. Regarding Windows Server Services ,I am focused on Microsoft enterprise-driven solutions: Windows Server( Active directory,IIS ,DNS, DHCP ,WDS , Hyper-V, Backup, Exchange, RPD farming) Expert troubleshoot Server Hardening and securing Windows and Linux servers. Monitoring software setup ( PRTG Paesler ,Nagious , Zabbix) Keen on Deadlines, fair on doing business together always ready to negotiate price
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Security Engineering
    Web Application Security
    Internet Security
    NIST SP 800-53
    Windows Server
    OWASP
    Ethical Hacking
    Manual Testing
    Security Infrastructure
    Network Security
    Penetration Testing
    Application Security
    Kali Linux
    Vulnerability Assessment
    Security Assessment & Testing
  • $39 hourly
    I am OSCP Certified with 6+ years of professional experience in different trade crafts of pentesting and red teaming. Challenges make me work more efficiently and what is a better challenge than doing penetration testing in which knowledge and experience is the main factor to successfully finding a way inside Targets. - Manual testing approaches with real-impact vulnerabilities - Exposure to multinational companies and Swiss banks - Industry-renowned certifications (OSCP - eWPTXv2 - CEH - CPTE - CEI - CCNA) - "Find my way in" mentality therefore 80% of projects ends up in successful breaches Key Skills for Pentesting Jobs ---------------------------------- Web Applications Pentesting Network Pentesting REST API/SOAP Pentesting Mobile Applications Pentesting Desktop Applications Pentesting Source Code Reviews Active Directory Assessment Key Skills for Offensive Jobs --------------------------------- Email Phishing (Maldoc or stats based) Social Engineering Assume Breach Scenarios MITRE ATT&CK framework Simulations Tactics, Techniques, and Procedures Testing against patched Infra Malware Development
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Black Box Testing
    Information Security
    Vulnerability Assessment
    System Security
    Application Security
    Network Security
    Information Security Consultation
    Cloud Security
    Penetration Testing
    Web App Penetration Testing
    Network Penetration Testing
    Web Application Security
    Ethical Hacking
    Security Testing
    Mobile App Testing
  • $30 hourly
    Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP​ 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is our key differentiator. Please check my Upwork work history and client feedbacks. I look forward to hearing from you!
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Network Security
    Information Security Audit
    Security Testing
    OWASP
    Information Security
    Web Application Security
    Website Security
    Vulnerability Assessment
    Penetration Testing
    Certified Information Systems Security Professional
  • $40 hourly
    I'm an OSCP (Offensive Security Certified Professional), OSWE (Offensive Security Web Expert), CREST CRT, and CEH (Certified Ethical Hacker) certified penetration tester. I can conduct vulnerability assessments and penetration testing for your web applications, mobile applications, and cloud infrastructures. I can also audit the code of your PHP / Python / JS (NodeJS) applications and fix code-level vulnerabilities. My day to day work includes: -- Research on bleeding edge technologies -- PHP/Python/JavaScript development -- Code auditing -- Database management -- APIs development & integration -- AWS services (EC2, SES, SNS, SQS, Route53, S3, Lambda, API gateway) -- Penetration testing -- Data scraping -- and a lot more
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Network Security
    Security Testing
    Network Penetration Testing
    PHP
    JavaScript
    Laravel
    Penetration Testing
    Information Security
    Cloud Security
    Web App Penetration Testing
    Web Application Security
    Website Security
    Information Security Audit
    Linux System Administration
    Amazon Web Services
  • $50 hourly
    HI!! I am Virtual CISO, Cyber Security, Cyber defense, Ethical Hacker, expert I am prompt engineer working to create and maintain AI-generated content in Spanish. I love finding creative and innovative ways to ensure the perfect prompts are provided for our users I am a computer security scientist with an intensive hacking background. I do have a Msc in computer engineering I am working for severals Internationals Enterprises where I do intensive researches in Penetration Testing, Vulnerability managements, Technological Risk, Security Architecture and Forensic I am Professional with over 20 years experience in the area of information and communications technology, including 15 years of experience in networks and security infrastructure Analytical skills to solve problems, ability to work with new technologies, adaptable to any situation, pro-activity and motivation to individual and team achievements Self-management capacity of the learning process to successfully assume the continued improvement of my functions My passion is to help SMBs gain a fighting chance in an increasingly hostile information security threat environment by providing part-time vCISO services. Whether PCI , GDPR, NIST, ISO27000 and any other Security Standards gap analysis, information security risk assessments, audit remediation, strategic planning, interim CISO services, or anything else information security related, I offer you my vCISO Services, Information security ISO27001 consultancy and Policies Documentations With the following responsibilities and functions; Recommend modifications to application development, database design, networking, or infrastructure architecture with the goal of complying with internal information security policies and standards. Monitoring emerging products, technologies or best practices that will improve security for the organization and its stakeholders. Perform security audits, identify security gaps, and develop and implement risk mitigation solutions. Design and develops the organizations overall information security architecture to protect its information assets. Perform work and recomedations in relation to network, data, application and or cloud security and liaises with other areas of IT in the dissemination of this information to counter threats and internal and external vulnerabilities. Perform advanced research and identifying information security products, services, and trends, testing security configurations, and developing configuration architectures. Stong experience in Information security and Network Security: • Design Network security architecture • Design Cloud Security architecture ( AWS and Azure) • IT Vulnerability Assessment • API Security Evaluation • Cloud Security Assessment • Active Directory Security • Network and Web Application/Mobile Penetration Testing • Threat Hunting, • Red Team Program Development/Red Team Attack Simulations • Open Source Intelligence (OSINT) Gathering • IT Risk Management • Incidents Response management • Technical Writing; Information Security Policies,: ISO2700, NIST, HISPAA, PCI • Working experience of supporting Cyber Security tools such as, McAfee SIEM, Ms-SENTINEL, CISCO IPS, Citrix NetScaler, TrendMicro endpoint. Checkpoint Firewall, Bluecoat, AWS WAF, AWS Shield and AWS Firewall Manager, antivirus, CYNET security endpoint • Kali Linux Toolkit, Qualys, Nessus • MS-365 security, Defender for Cloud Strong experiece in IT Support and admin • Technical Supports Windows Server • Active Directory management • Technical Supports Azure Cloud • Technical Supports Intunes • Technical Supports Windows 10 and 11 • Technical SupportsMS- 365 • Technical writing IT Procedures,
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Mobile App Testing
    Amazon EC2
    Blockchain
    ISO 27001
    Cloud Security
    Vulnerability Assessment
    Office 365
    Information Security
    Microsoft Azure
    Cybersecurity Management
    Penetration Testing
    WordPress
    Ethical Hacking
    Network Security
  • $75 hourly
    ✅ Top Rated Expert ✅ 3000+ Hours ✅ Professional Penetration Tester Security researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform. For deliverables, professional reports are created,that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors. Core competency is performing black and gray box testing on live web applications/networks or lab environments. Familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of the work is confidential sample vulnerability report can be provided. Service Description 1)Web Application Penetration Testing based on OWASP TOP 10 2)Network Penetration Testing 3)Security Hardening Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python framework
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Web Application Security
    JavaScript
    Reverse Engineering
    Black Box Testing
    Security Testing
    Ethical Hacking
    Network Penetration Testing
    Network Security
    Malware
    Vulnerability Assessment
    Web App Penetration Testing
    Internet Security
    Penetration Testing
  • $15 hourly
    I have extensive hand-on experience with ConnectWise Automate(Formerly known as LabTech). I am working on Connectwise Automate since 2014 and I have developed expertise in many fields such as: SQL : I have a great knowledge of SQL queries and have used in various Automations that lies under Connectwise Automate(LabTech) like Monitoring, Agent based Scripting, Database scripting, various day to day tasks. ConnectWise Automate administrator, Management and Monitoring including: Customized Monitoring : Monitor creations as per requirements for different issues. Fix Default Monitors : Fix default monitors to stop False Positives and lower down the alerts count with genuine alerts only. Automate/LabTech Scripting : Advance Level Scripting for automating most of day to day and to-do list of tasks. Automate/LabTech Patching : Patching setup via Automate for different schedules or for schedules as per client needs. Automate/LabTech Reports : Report additions and amendments in existing reports for fixing bugs while fetching details. Migrations : Automate/LabTech, Control/ScreenConnect Migrations. Plugin Integrations : Integrate Automate/LabTech with various available plugins. Upgrades : Automate/LabTech , ConnectWise Manage and Control Upgrade to latest/current versions.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Desktop Support
    Backup Administration
    Veeam
    Microsoft Hyper-V Server
    ScreenConnect
    ConnectWise Automate
    System Administration
  • $125 hourly
    Having worked for many Fortune 100 companies, I now run a boutique cybersecurity consultancy called Careful Security. We serve businesses of all sizes, We providing a 360-degree cybersecurity solution by #Securing Website #Protecting Data #Pass an audit/vendor questionnaire/cyber-insurance questionnaire #SIEM Solution for security monitoring and alerting Past Accomplishments # Designed and Implemented security controls for Warner Bros. iconic shows and movies such as Harry Potter, The Game of Thrones, Curb your enthusiasm. ## Secured video games for EA Sports - FIFA, The Sims, and Madden. ### Secured financial information for high net-worth clients for Goldman Sachs. #### Managed security of personal information for the millions of policyholders in State Farm Insurance. ##### Presented at Conferences and written articles for security journals.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    PCI
    Email Security
    Certified Information Systems Security Professional
    ISO 27001
    Security Engineering
    Security Infrastructure
    Compliance Consultation
    Cloud Security Framework
    Web Application Security
    Information Security Audit
    Information Security
    Vulnerability Assessment
    Penetration Testing
    Security Policies & Procedures Documentation
  • $125 hourly
    Unconventional Solutions, Uncommon Results. A study from the National Cybersecurity Alliance shows that 20% of businesses with less than 100 employees will experience a cyber attack each year and that 60% of those businesses fail within 6 months of the attack. Preparation is key, identify your critical assets, secure those assets, monitor/alert/and respond to incidents when they occur, including having a response plan. Chances are if it hasn't happened to you, it will or it already has happened and you just don't know. My goal is to bring the experience and skills acquired over 23 years working for large organizations to the entrepreneur community in an attempt to reduce the statistics above at a price point that is approachable to those impacted businesses. Common Services: Malicious Email/File/URL analysis - Did you get a phishing email with a link or attachment and not sure if it is legitimate, then this service is what you want. Surprisingly, this is my most often requested service. This service includes analyzing files(exe, office files, zip files, or pdf), email, or URLs to determine if it is malicious and what happens if the file is run or the url is visited. The service includes executing the file/url in a sandbox, review OSINT on the file using tools like virustotal, as well as use reversing techniques on the file. Email headers will be reviewed to determine origin and intent. If you clicked the link or opened the attachment, then you might need the next level of service, Incident Response. Website Malicious Content Removal - Once an attacker finds a vulnerability and exploits that to gain access to your website they sometimes deface your website, sometimes gain access to the data, put malicious code in your pages to impact your users, but always give themselves a way back in. Our job is to not only find and remove the malicious content but determine how it got there and how to prevent it from reoccurring. Security Consulting - Make sure you have the proper controls in place, including logging, to reduce the risk but also make sure you can detect and recover from an incident in a timely manner. Get some peace of mind on questions like are my backups safe in the event of a ransomware attack. Has my system already been breached? How would I know if my system is breached? A vulnerability assessment is a rather quick process to identify known security issues like missing patches or common misconfigurations. These are identified through an automated scan, but the most notable point of a vulnerability assessment is that the vulnerabilities are not verified, it is assumed that if the system is missing the patch, it is at risk. This type of test is usually quicker and cheaper and gets 75% of the “low hanging fruit”. A penetration test takes this a bit further beyond just identification but actually tries to exploit the vulnerability to validate risk. A penetration test also goes a bit further as it might also test weaknesses in good configurations, processes, and implementations, items that can not be scanned automatically. A pentest usually also contains a vulnerability scan as part of the process, usually takes longer, and costs a bit more. Application Testing/Fuzzing and 0 day exploit development - The purpose of testing an application using techniques like fuzzing, is to ensure that the application can handle different types and lengths of unexpected input without crashing as well as testing to see if application handles the exceptions properly. If the fuzzing process has identified a crash based on unexpected input, it might be possible to develop an exploit that allows an attacker access to the system or perform some other nefarious activity. An exploit that has not been disclosed publicly but is actively being exploited in the world is known as a 0 day exploit. Having this type of test performed on your applications before release, can go a long way to reducing the risk of an attacker finding it and using it to attack your clients. Web application testing is the process of not just testing the application itself against vulnerabilities like cross site scripting, cross site request forgery, or sql injection among others, but the entire web application infrastructure including the framework used like Rails or Spring MVC, the server OS (Linux/Windows), the web server software (IIS, Apache, Web Logic), the language used (PHP, ASP.Net), any middle tier applications, and the databases on the back end. A vulnerability scan is generally also part of this type of test.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Malware Removal
    Metasploit
    Application Security
    Information Security Consultation
    Security Engineering
    WordPress
    Malware
    Microsoft Office 365
    DNS
    Azure
    Penetration Testing
    Security Analysis
    Active Directory
    Vulnerability Assessment
    Digital Forensics
  • $999 hourly
    Computer Science Engineer/Ethical Hacker/Cyber Security Expert who has been providing security for corporate and individuals. ✌Cyber Security/Ethical Hacking - Securing mobile & Pc, running tests for vulnerabilities & server-side security (11+ experience) ✌Web development - JavaScript , Php (10+ experience) ✌App development - java , Cross-platform (7+ experience) ✌App/ Backend Development: Golang, Clojure, Scala, Ruby on Rails (5+ Experience) ✌CMS - Joomla, WordPress, Drupal (8+ experience) ✌Databases/Caches: Postgres, Redis I usually develop cross-platform and Android apps and build dynamic websites. I can develop the product very quickly and with high accuracy. I believe in customer satisfaction. U say it I develop it any language any software you need and if you want to secure your self from attacks I am always available. My work is fast and secure. *Price will vary on the complexity of the project Happy new year 2023 !!!
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Information Security
    Security Engineering
    Ripple
    Bitcoin
    Internet Security
    Android App Development
    XML
    Ethical Hacking
    Cryptocurrency
    Digital Marketing
    PHP
    JavaScript
  • $15 hourly
    Web Penetration Testing(OWASP Top 10 methodology) | Network Penetration testing | OWASP API Security | Mobile Vulnerability Assessment(iOS and Android) | Source Code Reviews(.Net, Java, PHP) | Vulnerability Assessment and Penetration Testing | SIEM team (Cloud(AWS and Azure) Security, File Integrity Monitoring and Event Monitoring, Endpoint Security and Encryption, Data Loss Prevention, Network Access Control, Threat Monitoring (Email Traffic and Malware Analysis), Privileged Access and Identity Management) Have 7+ years of experience in both black box and white box testing penetration testing. Perform VAPT (Vulnerability Assessment and Penetration Testing) services for web applications, networks, mobile; source code reviews; malware analysis; server hardening; and security analysis etc. Conduct penetration testing in a systematic approach. Follow the standard methodology of the industry like OWASP Testing Guide v4(OTGv4); SANS top 25; NIST SP 800-115; PCI DSS to perform penetration testing so that client can concentrate on their professions without worrying about security threats. Web Application Testing: Do web application penetration testing with the latest methodology like OWASP Top-10, SANS Top-25. Perform both manual and automated penetration testing for vulnerabilities like Injection flaws(such as SQL, NoSQL, OS, and LDAP injection etc),Broken Authentication, Sensitive Data Exposure,XML External Entities (XXE), Broken Access Control,Security Misconfiguration, Cross-site scripting(XSS), Insecure Deserialization, Using Components with Known Vulnerabilities,Insufficient Logging & Monitoring. Also, perform source code reviews for many technologies like Java, NET, PHP etc. Approach for Manual Web-Application Penetration Testing: Conduct manual testing with following controls: * Configuration and Deployment Management Testing * Identity Management Testing * Authentication Testing * Authorization Testing * Session Management Testing * Input Validation Testing * Testing for Error Handling * Testing for weak Cryptography * Business Logic Testing * Client Side Testing Tools that use for Automated Web Penetration Testing: Acunetix, Burp-Suite, Netsparker, Nexpose, Nikto, IBM AppScan, HP fortify, W3af etc. Network penetration testing: Provide both external and internal network Penetration Testing so that your Network Infrastructure is secured from the real world attacks. Do both manual and automated network penetration testing. Approach for Manual Network Penetration Testing: Manually check for IDS/IPS, Server, Networks switch, Network Router, VPN, Firewalls, Anti-virus, Password etc. Tools that use for automated network penetration testing: OpenVas, Wireshark, Nessus, Metasploit, Armitage, Scapy etc. Mobile Application Penetration Testing: Perform mobile applications application penetration testing with the latest OWASP methodology(MSTG). Performed both manual and automated penetration testing for vulnerabilities like Weak Server Side Controls, Insecure Data Storage, Insufficient Transport Layer Protection, Unintended Data Leakage, Poor Authorization and Authentication, Broken Cryptography, Client Side Injection, Security Decisions Via Untrusted Inputs, Improper Session Handling, Lack of Binary Protections. Tools: Burp-Suite, HP fortify, Dex2Jar, Apktool, framework-res.apk, iNalyzer. Source Code Reviews: Perform source code reviews for both front and back-end languages. Perform source code reviews standard methodology like OWASP top 10. Do manual and automated source code reviews for various web based security vulnerabilities like SQL injection, Cross site scripting (XSS), CSRF, RFI,LFI, Authentication bypass etc. Tools: CheckMarx, IBM Appscan source for analysis, Microfocus HP Fortify. Security Analysis and Server Hardening: Regularly check and maintain your systems, servers to ensure that they comply with the standards. Do hardening application checks the item automatically on a daily basis and monitors all critical networks and server components. We support various frameworks like CIS benchmarking for Desktops & Web Browsers, Mobile Devices, Network Devices, Servers – Operating Systems, Virtualization Platforms & Cloud etc. Social Engineering: Have experience in social engineering vectors: Vishing, Phishing, Smishing, Impersonation. Used the following social engineering cycle to conduct social engineering: Gather Information: Here Information gathered from company websites, social media and other publications. Plan Attack: Next step is outline how intends to execute the attack Acquire Tools: After planning, next include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics is used in attacks such as password guessing. Tools: SET(Kali-Linux); GetGoPhish
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Web Testing
    Information Security Audit
    Web Application Security
    Website Security
    Network Penetration Testing
    Software QA
    Security Analysis
    Internet Security
    Information Security
    Penetration Testing
    Vulnerability Assessment
    Network Security
  • $25 hourly
    ✅ As a CREST/Offensive Security (OSCP) Certified Penetration Tester and Cyber Security Consultant, I have deep knowledge of Security Assessment Methodology to identify vulnerabilities in Network, Cloud, Web, and Mobile Applications. ✅ I have conducted Penetration Test, Vulnerability Assessment and delivered professional reports to companies in the world complying with: ► CREST standards ► Offensive Security (OSCP) standards ► OWASP Top 10 Vulnerability ► OWASP API Security Top 10 Vulnerability ► OWASP Mobile Security Top 10 Vulnerability ► Application Security Verification Standard 4.0 (ASVS 4.0) ► CWE Top 25 Most Dangerous Software Errors ► ISO 27001 Penetration Testing ► Payment Card Industry Data Security Standard (PCI DSS) ► General Data Protection Regulation (GDPR) ► Common Vulnerability Scoring System (CVSS) ► Open Source Security Testing Methodology Manual (OSSTMM) ✅ I have some cybersecurity certifications including: ► CREST Registered Penetration Tester (CRT) ► CREST Practitioner Security Analyst (CPSA) ► Offensive Security Certified Professional (OSCP) ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ► Executive Summary ► Assessment Methodology ► Type of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings. Each finding listed within the report will contain CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ► Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, Zaproxy, Gobuster, etc.) ✅ Please contact me if you have any question. ✅ Thank you and have a good day!
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Website Security
    Security Analysis
    System Security
    Software Testing
    White Box Testing
    Black Box Testing
    Network Penetration Testing
    Website Security
    OWASP
    Web App Penetration Testing
    Information Security
    Vulnerability Assessment
    Security Testing
    Penetration Testing
  • $30 hourly
    Red Team member, performing penetretion tests in all company's assets, vulenrability management and security analyst, Wordpress security expert, site cleanup and hardening. 10 years of experience with Linux servers in the hosting environment, with emphasis on web security, identification and malware removal(site cleanup) , investigation of how the hacking occurred, identify failures in web systems, pentest in web systems and solve other problems related to the hosting environment.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Malware Website
    WordPress
    Web Host Manager
    Python
    cPanel
    MySQL
    Network Penetration Testing
    Website Security
    Email Security
    Web App Penetration Testing
    Linux
    Kali Linux
    System Security
    Malware Removal
    Security Testing
  • $40 hourly
    ✅ 2x ⭐️⭐️⭐️⭐️⭐️ Upwork Enterprise Client ✅ Top Rated on Upwork Hi 👋, I’m Anas, an Offensive Security Certified Professional with 5+ years of industry rich experience. I have tested 100+ web and mobile applications and also posses decent skill set in Network Security. I have helped various Government Sectors, Private Business and SaaS startups to achieve their information security needs whether it be just Penetration Testing/ Vulnerability Assessment of their applications or making their environment compliant with various Information Security standards like ISO27001, SOC2 or PCI. Also, I have participated in various bug bounty programs and have acknowledgments from AT&T, Helium, Usability Hub and likes. If you’re looking for something similar, please reach out to me as I’m eagerly waiting to impress you with my work quality and delivery speed. Certification I hold: 1- Offensive Security Certified Professional (OSCP) 2- ISO27001:2013 Lead Implementer (Udemy)
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Ethical Hacking
    Website Security
    Python
    Information Security Audit
    Web Application Security
    Security Engineering
    Mobile App Testing
    Linux
    Security Analysis
    Amazon Web Services
    Information Security
    Business with 10-99 Employees
    Application Security
    Penetration Testing
    Kali Linux
    Vulnerability Assessment
  • $60 hourly
    Extensive success in providing clients with various IT and cybersecurity solutions. I have wide experience in handling individual clients as well as larger companies/organizations to help them build a customized and secure environment for all their digital assets. How I can help you: -Perform penetration testing against web & mobile applications, internal & external networks, and cloud systems (Azure, GCP, AWS) -Perform smart contracts auditing -Consult on any IT solutions, primarily focusing on open-source tools which can benefit by cutting down cost -Create a monitoring setup for all your digital/IT assets exposed to the Internet -Create security policies -Create custom tools in Python -Provide and implement security best practices -Consult on Governance, Risk, and Compliance (GRC) -Provide one-on-one cybersecurity training -Perform red team activities against an organization -Incident response -Digital forensic analysis All the services I provide will come with a complete report and a slide deck, which I will present to the stakeholders and provide them with an in-depth analysis. Furthermore, I am an eager and quick learner, performing research after hours to provide my clients with the best possible solution to their IT problems.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Blockchain Security
    API Testing
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Malware
    Risk Analysis
    Virus Removal
    Web Application Security
    Data Analytics
    Smart Contract
    Malware Removal
    Security Testing
    Vulnerability Assessment
    Application Security
    Cybersecurity Management
    Penetration Testing
    Digital Forensics
  • $20 hourly
    Have you lost access to your personal or business Instagram account? Lost the credentials or, did the account get hacked? Or, going through any technical error? Tried Instagram support and scrolled through forums but, all in vain. "Yes" Don't Worry, I am here to help you. I have proudly offered my clients to pay only after a successful recovery I'll charge a fixed Price and have solved dozen of cases with their satisfaction. You will find the support and solution for almost every kind of issue related to Instagram with full compliance with ethics and Instagram terms and service. I would love to answer your queries free of cost and will suggest a way forward that would help you to get back into your Instagram account. Please send me a message with the issue details. I will provide the following support and solutions: - Lost Instagram account recovery, retrieval, or restoration - Instagram account activation - Recovery of disabled Instagram account - Recovery from a hacking event or if the account was compromised - Recovery of account in case of lost credentials - Recovery of hacked or lost FB page and account - Error In FB ads or Business manager - I also provide services with google account recovery I Can provide the services of error fixing or suspended listings of Google My Business as well. Feel free to discuss any kinds of Recovery or Technical Assistance
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Social Media Advertising
    Facebook Ads Manager
    Internet Marketing
    Instagram
    Facebook Plugin
    Instagram Plugin
    Facebook
    Social Media Account Setup
    Ethical Hacking
    HTML
    Data Entry
    Technical Support
    CSS
    Graphic Design
    Canva
  • $20 hourly
    I am a CEH professional certified by the EC council and have been awarded as Cyber Security Mentor by EC council. I have more than eight years of experience in the Security domain. I have experience in information security, Penetration Testing, and Vulnerability assessment. I help organizations identify and meet their security goals through security assessments like: - Penetration Testing - Vulnerability Assessment - Policies and Procedures Assessment - Security Compliance Services - Risk Assessment - Social Engineering I can reveal all known and unknown vulnerabilities within your website/web application. I can find 0-day vulnerabilities, and I can help you fix them with the best and most efficient practice. Thanks! Regards Arvind N
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Application Security
    Website Security
    Cloud Security
    Security Operation Center
    Azure
    Ethical Hacking
    Python
    Network Security
    Security Analysis
    Information Security
    Internet Security
    Vulnerability Assessment
    Web App Penetration Testing
    Network Penetration Testing
    Penetration Testing
  • $25 hourly
    Diligent Cyber Security Specialist proficient in online security research, planning, execution, and maintenance. Adept at training and educating internal users on relevant cybersecurity procedures and preventative measures. Specialize in network monitoring, security software installation, and working to prevent cyber attacks, especially in business and corporate settings. Tremendous experience in application security enables me to conduct code analysis, vulnerability assessment, and security simulations to determine how attacks are conducted and mitigated. I hustle and tussle hard to come up with solutions to security issues encountered. Competent in DevOps activities for automation of deployment with skills in Jenkins, CI/CD pipeline, Github, docker and Ansible
    vsuc_fltilesrefresh_TrophyIcon Nessus
    API Documentation
    Docker
    Compliance Consultation
    Jira
    Process Documentation
    Incident Management
    Linux System Administration
    Technical Documentation Management
    System Configuration
    User Technical Training
    System Administration
    Technical Editing
    System Monitoring
    Atlassian Confluence
    Information Security
  • $125 hourly
    AWS architecture and implementation, DevSec(Ops), SDN, Windows/Linux systems administration, ESXi/VMware builds/upgrades, root-cause analysis on infrastructure including networks, enterprise endpoint product test and eval, test case builds. Selective experience working through NIST/CMMC security controls and documentation. Throughout my 15 years I've seen and touched almost everything. Very efficient, communicative and thorough.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Cybersecurity Management
    Solution Architecture
    Cloud Engineering Consultation
    Systems Engineering
    Network Design
    Network Security
    Infrastructure Management
    Information Security
    VMware Administration
    Security Engineering
    DNS
    Microsoft Azure
    Server Virtualization
    Amazon Web Services
    Microsoft Active Directory
  • $100 hourly
    I specialize in Cybersecurity, threat mitigation (hacking cleanup and repair) and system administration on a enterprise scale, as well as full stack development. Complete, integrated and reliable solutions to the most challenging and unique business IT needs, no matter the complexity or difficulty. Fluent in PHP, HTML, JavaScript, Node, and several other programming languages. Experienced Network architect Cybersecurity preventative monitoring and protection, threat detection, and response Cloud Infrastructure management, consulting, and deployment Web & Database migration, management and repair I am your complete IT solutions provider, with over 5+ years of experience!
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Security Assessment & Testing
    System Administration
    Vulnerability Assessment
    Security Engineering
    Cloud Security
    Malware Removal
    Cloud Management
    Cloud Architecture
    Security Infrastructure
    IT Consultation
    DevOps
    Information Security
    System Hardening
    PHP
    WordPress
  • $25 hourly
    My name is Alexander. I am a cybersecurity specialist. I am engaged in the assessment of the security of IT resources of organizations. I am proficient in penetration testing and digital forensics. I am also well versed in network security and the configuration of various services. I have over 8 years of experience in this field. Certifications: Certified Ethical Hacker Offensive Security Certified Professional CCNA CyberOPS CompTIA Security+ CCNA Routing And Switching
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Bash Programming
    Microsoft Windows PowerShell
    Network Engineering
    Website Security
    Linux System Administration
    Windows Server
    Information Security Audit
    Digital Forensics
    Network Security
    Ethical Hacking
    Penetration Testing
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

How do I hire a Nessus Freelancer on Upwork?

You can hire a Nessus Freelancer on Upwork in four simple steps:

  • Create a job post tailored to your Nessus Freelancer project scope. We’ll walk you through the process step by step.
  • Browse top Nessus Freelancer talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Nessus Freelancer profiles and interview.
  • Hire the right Nessus Freelancer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Nessus Freelancer?

Rates charged by Nessus Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Nessus Freelancer on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Nessus Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Nessus Freelancer team you need to succeed.

Can I hire a Nessus Freelancer within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Nessus Freelancer proposals within 24 hours of posting a job description.

Schedule a call