Hire the best Nessus professionals

Check out Nessus professionals with the skills you need for your next job.
Clients rate Nessus professionals
Rating is 4.7 out of 5.
4.7/5
based on 117 client reviews
  • $80 hourly
    ✅ Penetration Tester and Cyber security consultant acknowledged by leading companies in the tech field for reporting several high, and critical vulnerabilities in their systems and websites. After I go through multiple pentestinig techniques manually and automatically, at the end of the engagement, professional reports are provided, that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Let's get in touch and get your website and system secured 🛡️ 🏆 Cyber security consultation 🏆 Cyber security training 🏆 Network Penetration Testing 🏆 Active Directory Penetration Testing 🏆 Web penetration testing 🏆 Vulnerabilities Assessment 🏆 Cyber security training labs Development 🏆 CTF Labs development 🏆 Synack Red Teamer 🏆 Acknowledged by tech lead companies, Yahoo, Nokia, ZTE, Swisscom, Synology, ElearnSecurity, Payoneer, Sophos, Xiaomi. 🏆 I was number 16 on Turkey and Egypt on HackTheBox. 🏆 Work on Weekends 🏆 5 Years Experience
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Digital Forensics
    Metasploit
    Penetration Testing
    Ethical Hacking
    Kali Linux
    Security Testing
    Vulnerability Assessment
    Web App Penetration Testing
    Network Penetration Testing
    Network Security
    Docker
    OWASP
    Web Application Security
    Linux
  • $100 hourly
    I am a dedicated professional with decades of comprehensive experience in Cyber Investigations, Cyber Intelligence, Cyber Operations, Cybersecurity, and Information Security. I am well-versed in creating robust security structures, implementing security strategies, and mitigating potential cyber threats, and I specialize in the detection, investigation, and mitigation of cyber threats, while providing strategic insights to enhance organizational cyber defense capabilities. I have a Bachelor's degree in Psychology and Cognitive Science, and am completing work toward Master's degrees in Cybersecurity and Information Technology, with specializations in Enterprise Networks and Cloud Computing. I have also earned various industry certifications such as Certified Ethical Hacker Master (CEH-Master), System Security Certified Practitioner (SSCP), Certified Cyber Intelligence Professional (CCIP), Certified Penetration Tester (CPT), and Certified Forensic Analyst (CFA). Types of Services Offered Include But Are Not Limited To: Consulting, Strategy, & GRC: • Cybersecurity Consulting • Cybersecurity Strategy Development • Security Policy Development and Implementation • Governance, Risk, and Compliance (GRC) Frameworks • Managed Security Services Risk Assessment and Management: • Security Risk Assessment • Risk Mitigation Strategies • Cyber Risk Analysis • Vulnerability Assessments • Incident Mitigation and Remediation Digital Forensics Incident Response: • Security Incident Investigation • Litigation Support • Regulatory Compliance Audits • Integrated Threat Intelligence Digital Forensics • Data Recovery and Analysis • Electronic Discovery (eDiscovery) • Mobile Device Forensics • Network Forensics • Forensic Imaging • Malware Forensics Incident Response • Incident Management and Coordination • Threat Hunting • Emergency Response • Root Cause Analysis • Post-Incident Reporting and Documentation Training Services: • Security Awareness Training • Workshops and Webinars • Cybersecurity Certification Preparation • Employee Cybersecurity Training Programs • Simulated Phishing and Other Training Exercises Offensive Security & Defense Security: • Penetration Testing • Ethical Hacking • Red Team Operations • Blue Team Defensive Strategies • Purple Team Exercises Cloud Services: • Cloud Security Architecture • Cloud Security Assessments • Cloud Data Protection • Cloud Compliance Audits • Managed Cloud Services Network and Architecture Services: • Network Design and Architecture • Network Security Implementation • Wireless Network Security • Network Performance Monitoring • Enterprise Network Management Cyber Investigations and Intelligence: • Cyber Investigations • Cyber Intelligence Gathering • Digital Forensics • Network Forensics • Fraud Investigation • Insider Threat Investigation • Social Media Forensics Cyber Operations: • Cyber Threat Hunting • Cyber Threat Intelligence • Information Operations (Info Ops) • Real-time Security Monitoring • Security Operation Center (SOC) Management Security Compliance and Auditing: • Compliance Auditing • Security Auditing • Security Policy Compliance Reviews • Regulatory Compliance Monitoring • Information Security Assessments Virtual CISO Services • Cybersecurity Program Leadership • Security Strategy and Planning • Policy Development and Management • Security Risk Management • Compliance Oversight • Incident Response Planning • Security Awareness and Training • Vendor Risk Management • Security Budget Management • Board Communication
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Cyber Threat Intelligence
    Ethical Hacking
    Microsoft Azure
    Solution Architecture
    Cloud Architecture
    IT Infrastructure
    Network Engineering
    Cloud Security
    Web App Penetration Testing
    Security Infrastructure
    Network Penetration Testing
    Network Security
    Penetration Testing
    Information Security
    Vulnerability Assessment
  • $25 hourly
    I am a Security enthusiast who is keen on learning and exploring the area of Cybersecurity. I am involved with VA/PT of web and mobile application projects and security research work. I have a total of 5+ years of work experience in Information Security. I worked on off-site testing of web applications, and mobile application VAPT and have conducted manual testing of applications and network testing for various domestic and international clients. I have good experience with penetration testing methodology and approach and have majorly worked on projects for domestic and international clients with a good track record of finding critical issues in applications and networks, which has eventually helped clients in patching issues and securing their IT assets. Profile Summary : --------------------- # Conducted web application penetration testing of business applications with a Business logic-focused testing approach. # Has good knowledge of IT infrastructure and configurations. # Can map out the network, and discover ports and services running on different exposed networks and security devices. # Conducted vulnerability assessment of mobile application penetration testing on Android and iOS platforms. # Performing social engineering attacks using Kali Linux. # Acquainted with various approaches to Gray & Black box security testing. # Deep knowledge about MySQL, Oracle, Microsoft office 2007 ~ 2020, Outlook, VM ware, Virtual Box. # Highly proficient in identifying OWASP Top 10 vulnerabilities in RedHat, WINDOWS XP/7/8/10, LINUX, Kali Linux, etc. # Methodologies worked on: Scrum, Agile, Waterfall, OWASP Rules. Professional Skill : -------------------- # Highly skilled individual with key interests in Audit, network security, and application-level penetration testing. # Well-versed in conducting application security audit both manually and through tools such as Burp Suite Professional, Metasploit Framework, Nessus, and Hands-on with tools like Burp Suite Pro, Kali Linux, Postman, etc. # Deep Knowledge of various Operating Systems like Windows XP, Vista,7,8,10; Mac OS; LINUX including Ubuntu and Kali. # Knowledge of OWASP Top 10 vulnerabilities and beyond and how to effectively mitigate them. We are a team of 3 members who have 2 years, 3+ years, and 6+ years of experience person with the same domain.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Information Security Consultation
    Vulnerability Assessment
    Network Penetration Testing
    Web App Penetration Testing
    Penetration Testing
    Website Security
    Information Security Audit
    Web Application Security
    Code Review
    API Testing
    Web Testing
    Network Security
  • $50 hourly
    HI!! I am Virtual CISO, Cyber Security, Cyber defense, Ethical Hacker, expert I am prompt engineer working to create and maintain AI-generated content in Spanish. I love finding creative and innovative ways to ensure the perfect prompts are provided for our users I am a computer security scientist with an intensive hacking background. I do have a Msc in computer engineering I am working for severals Internationals Enterprises where I do intensive researches in Penetration Testing, Vulnerability managements, Technological Risk, Security Architecture and Forensic I am Professional with over 20 years experience in the area of information and communications technology, including 15 years of experience in networks and security infrastructure Analytical skills to solve problems, ability to work with new technologies, adaptable to any situation, pro-activity and motivation to individual and team achievements Self-management capacity of the learning process to successfully assume the continued improvement of my functions My passion is to help SMBs gain a fighting chance in an increasingly hostile information security threat environment by providing part-time vCISO services. Whether PCI , GDPR, NIST, ISO27000 and any other Security Standards gap analysis, information security risk assessments, audit remediation, strategic planning, interim CISO services, or anything else information security related, I offer you my vCISO Services, Information security ISO27001 consultancy and Policies Documentations With the following responsibilities and functions; Recommend modifications to application development, database design, networking, or infrastructure architecture with the goal of complying with internal information security policies and standards. Monitoring emerging products, technologies or best practices that will improve security for the organization and its stakeholders. Perform security audits, identify security gaps, and develop and implement risk mitigation solutions. Design and develops the organizations overall information security architecture to protect its information assets. Perform work and recomedations in relation to network, data, application and or cloud security and liaises with other areas of IT in the dissemination of this information to counter threats and internal and external vulnerabilities. Perform advanced research and identifying information security products, services, and trends, testing security configurations, and developing configuration architectures. Stong experience in Information security and Network Security: • Design Network security architecture • Design Cloud Security architecture ( AWS and Azure) • IT Vulnerability Assessment • API Security Evaluation • Cloud Security Assessment • Active Directory Security • Network and Web Application/Mobile Penetration Testing • Threat Hunting, • Red Team Program Development/Red Team Attack Simulations • Open Source Intelligence (OSINT) Gathering • IT Risk Management • Incidents Response management • Technical Writing; Information Security Policies,: ISO2700, NIST, HISPAA, PCI • Working experience of supporting Cyber Security tools such as, McAfee SIEM, Ms-SENTINEL, CISCO IPS, Citrix NetScaler, TrendMicro endpoint. Checkpoint Firewall, Bluecoat, AWS WAF, AWS Shield and AWS Firewall Manager, antivirus, CYNET security endpoint • Kali Linux Toolkit, Qualys, Nessus • MS-365 security, Defender for Cloud Strong experiece in IT Support and admin • Technical Supports Windows Server • Active Directory management • Technical Supports Azure Cloud • Technical Supports Intunes • Technical Supports Windows 10 and 11 • Technical SupportsMS- 365 • Technical writing IT Procedures,
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Mobile App Testing
    Amazon EC2
    Blockchain
    ISO 27001
    Cloud Security
    Vulnerability Assessment
    Office 365
    Information Security
    Microsoft Azure
    Cybersecurity Management
    Penetration Testing
    WordPress
    Ethical Hacking
    Network Security
  • $60 hourly
    I have a total of 10+ years of experience in Cyber Security/ Network domain which includes project management and team leading experience. Strong understanding and expertise of Cyber and Network Security, which includes firewalls,IPS, VPN, endpoint security (Comtouch, Kaspersky, Avira), SIEM tools (Rapid7, Cybershark),VPN, Wazuh, CIS Benchmark, Device Integration, OWASP 10, Vulnerability Scanning Tools.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Antivirus & Security Software
    Security Operation Center
    Business Continuity Plan
    Network Monitoring
    Disaster Recovery Plan
    Security Engineering
    Computing & Networking
    System Monitoring
    Security Policies & Procedures Documentation
    Ethical Hacking
    Source Code Scanning
    Network Penetration Testing
    PCI DSS
    Security Testing
    Web App Penetration Testing
    Firewall
  • $40 hourly
    ✅ Amongst the Top 1000 hackers worldwide Web Pentesting | Mobile App Pentesting | API Pentesting | Vulnerability Assessment | Python & Bash Automation I work with companies to make their digital assets secure and provide solutions to enhance their security parameters. I create cybersecurity content on hackingloops.com explaining the practicalities and how-tos of the vulnerability and exploitation Part-time bug bounty hunter at Bugcrowd & Intigriti. Feel free to contact me for your queries and security-related issues.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Code Review
    Python
    Security Analysis
    Website Security
    Mobile App Testing
    Security Engineering
    Cloud Security
    Network Security
    Penetration Testing
    Security Assessment & Testing
    Cybersecurity Management
    Malware Removal
    Information Security
    Vulnerability Assessment
    Information Security Consultation
  • $90 hourly
    Information Security enthusiast, expert in cloud security, risk assessment, compliance, vulnerability management, Pen Testing, and security audit. I hold many professional credentials like CISSP, CISA, PMP, AWS Certified Cloud Practitioner certificate, ISO 22301 Lead Implementer, COBIT 5 Foundation, MCSE, RHCT and more. Experience in compliance frameworks and standards (HITRUST, ISO 27001, GDPR, SOC2, PCI-DSS, HIPAA, NIST)
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Microsoft Azure
    Information Security Audit
    HITRUST Common Security Framework
    ISO 27001
    HIPAA
    IT Compliance Audit
    Technical Project Management
    Compliance Consultation
    Cloud Computing
    Security Infrastructure
    Information Security
    Penetration Testing
    Vulnerability Assessment
    Network Security
    Security Policies & Procedures Documentation
  • $65 hourly
    Are you constantly concerned about your data being exposed, your web application getting hacked, and your reputation being put on the line? If you are handling data that is worth anything, doing regular penetration testing is not optional these days. Here are a few reasons why you need your cybersecurity systems strengthened using penetration testing services: HOW DOES PENETRATION TESTING HELP: - Developers are constantly under the pressure of deadlines to push features out fast; security is considered a nice-to-have - Just like any other system, your IT infrastructure needs to be regularly checked to satisfy standards - Many compliance certifications require regular professional penetration testing reports - You might have already put many security controls in place; penetration testing is about making sure those controls to make sure they are correctly implemented HOW I CAN HELP YOUR BUSINESS: - Find vulnerabilities in your systems before the bad guys do - Write a comprehensive report about the current state of your security level (executive summary and remediation tactics, included) - Test how are your security controls react to a simulated attack EXPERIENCE: I specialize in Web Application Pentesting, and I successfully use Python to automate pentesting tasks. I've helped my clients secure new and existing applications in highly regulated industries with sensitive financial and medical data. Also, have experience working with online publications and NGOs. ABOUT ME: - BSc, MSc Computer Science - 10+ Web Development - Certified eJPT (Junior Penetration Tester), eWPT (Web Application Penetration Tester) currently getting certified in ePPT(Professional Penetration Tester) - Microsoft Ventures Seattle Alumni with a startup I’ve co-founded + 2nd place in Collision Conf 2016 FAQ: Q: What tools do you use? A: It depends on the job but I am skilled in BurpSuite, Metasploit, Nessus, nmap, sqlmap, WPScan, Nikto. If I don’t find a suitable tool, I can usually build it myself. Q: Do you have samples of your work? A: Yes! Check out the Portfolio section. I have attached anonymized versions of some pentesting reports. Q: What times are you available? A: I currently live in the GMT timezone. I understand that pentesting is a delicate matter, and I need to sync with the engineering team in case systems go down (minimal risk), so I try to have as many overlapping hours Q: What type of penetration tests do you do, blackbox/whitebox? A: I can do both since I am also an experienced web developer. I am proficient in Python, SQL and I can comfortably read PHP, Javascript, Java. Stay Safe, George.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Web Application Security
    Network Penetration Testing
    Security Management
    OWASP
    Python
    Information Security
    Application Security
    Penetration Testing
    Metasploit
    Vulnerability Assessment
    Security Testing
  • $30 hourly
    Consolidating my past involvement in Ethical Hacking, Incident Response, IT Security Governance, and Project Management with solid relational and correspondence capacities, I am sure that I can give work that will surpass your desires. Security Analyst with 10+ years' experience in Endpoint security, Application Security, Change Management, Exception Handling and VAPT. Experience in system and network administration, managing server infrastructures and data center operations. Expert-level knowledge of Amazon EC2, S3, Simple DB, RDS, Elastic Load Balancing, SQS, and other services in the AWS cloud infrastructure such as IAAS, PAAS and SAAS. Deep experience with AWS components such as EC2, S3, Elastic IPs, EBS, Security Groups, Route 53, VPC, Elastic Beanstalk, RDS, DynamoDB, and Cloud Formation. Experience in administration of MS SQL server and MySQL in AWS cloud platform. Configured AWS IAM and Security Group in Public and Private Subnets in VPC. Architected, Designed and Developed the Backup and Archiving, Disaster Recovery in AWS Cloud. Security Tools: Nessus, Nmap, burp suite, Wire shark, Web scarab. Operating Systems & Platform: Kali Linux, Backtrack 5 r3, Windows 7, 8, 8.1,10, MAC. Programming Language: HTML, JavaScript. Framework: Metasploit, OWASP. Endpoint: Sophos, Check Point. Amazon Web Services: Ec2, EBS, IAM, VPC, RDS Azure: VNET, VM (Windows, Linux) Server: Windows 2008 server, windows 2012 server.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Information Security Consultation
    Security Infrastructure
    Security Assessment & Testing
    Web App Penetration Testing
    Information Security
    Amazon Web Services
    Penetration Testing
    Security Analysis
    Application Security
    Vulnerability Assessment
    Security Testing
    Microsoft Azure
    Kali Linux
    Cloudflare
  • $35 hourly
    Certifications that I hold: CEH ( Certified Ethical Hacker) 740 MCSA ( Installation, Storage and Compute with Windows Server 2016) To whom it may concern, In the last years I did more than 400 Penetration Tests and Security Assessments. Most of them on Web and Mobile ( Android and iOS ) applications with Finance Background implemented with various technologies and frameworks, server security testing and hardening. Sample reports can be provided who is interested. Prompt responses to your needs. You can consider me as and internal staff of your company , always helping you to do the best in security. --------------------------------------------------------------------- Phishing simulation for your company needs ___________________________________________________________ Professional Load and Stress Testing if you are interested for your application __________________________________________________________
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Security Engineering
    Web Application Security
    Internet Security
    NIST SP 800-53
    Windows Server
    OWASP
    Ethical Hacking
    Manual Testing
    Security Infrastructure
    Network Security
    Penetration Testing
    Application Security
    Kali Linux
    Vulnerability Assessment
    Security Assessment & Testing
  • $39 hourly
    I am OSCP and CRTO Certified with 8 years of professional experience in different pentesting and red teaming trade crafts. Challenges make me work more efficiently. What is a better challenge than doing penetration testing in which knowledge and experience are the main factors to successfully finding a way inside Targets? - Manual testing approaches with real-impact vulnerabilities - Exposure to multinational companies and Swiss banks - Industry-renowned certifications (OSCP - CRTO - eWPTXv2 - CMSE - CPTE - CEI - CCNA) - "Find my way in" mentality therefore 80% of projects end up in successful breaches Key Skills for Pentesting Jobs ---------------------------------- Web Applications Pentesting Network Pentesting REST API/SOAP Pentesting Mobile Applications Pentesting Desktop Applications Pentesting Source Code Reviews Active Directory Assessment Key Skills for Offensive Jobs --------------------------------- Email Phishing (Maldoc or stats based) Social Engineering Assume Breach Scenarios MITRE ATT&CK framework Simulations Tactics, Techniques, and Procedures Testing against patched Infra Malware Development
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Black Box Testing
    Information Security
    Vulnerability Assessment
    System Security
    Application Security
    Network Security
    Information Security Consultation
    Cloud Security
    Penetration Testing
    Web App Penetration Testing
    Network Penetration Testing
    Web Application Security
    Ethical Hacking
    Security Testing
    Mobile App Testing
  • $75 hourly
    ✅ Top Rated Plus Expert ✅ 3000+ Hours ✅ Professional Penetration Tester Cybersecurity researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform. For deliverables, professional reports are created, that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors. Core competency is performing black and gray box testing on live web applications/networks or lab environments. Familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of the work is confidential sample vulnerability report can be provided. Service Description 1)Web Application Penetration Testing based on OWASP TOP 10 2)Network Penetration Testing 3)Security Hardening Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python framework
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Web Application Security
    JavaScript
    Reverse Engineering
    Black Box Testing
    Ethical Hacking
    Web App Penetration Testing
    Network Penetration Testing
    Internet Security
    Security Testing
    Network Security
    Penetration Testing
    Vulnerability Assessment
  • $30 hourly
    Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP​ 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is our key differentiator. Please check my Upwork work history and client feedbacks. I look forward to hearing from you!
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Website Security
    OWASP
    Web Application Security
    Information Security Audit
    Certified Information Systems Security Professional
    Information Security
    Vulnerability Assessment
    Security Testing
    Network Security
    Penetration Testing
  • $40 hourly
    I'm an OSCP (Offensive Security Certified Professional), OSWE (Offensive Security Web Expert), CREST CRT, and CEH (Certified Ethical Hacker) certified penetration tester. I can conduct vulnerability assessments and penetration testing for your web applications, mobile applications, and cloud infrastructures. I can also audit the code of your PHP / Python / JS (NodeJS) applications and fix code-level vulnerabilities. My day to day work includes: -- Research on bleeding edge technologies -- PHP/Python/JavaScript development -- Code auditing -- Database management -- APIs development & integration -- AWS services (EC2, SES, SNS, SQS, Route53, S3, Lambda, API gateway) -- Penetration testing -- Data scraping -- and a lot more
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Network Security
    Security Testing
    Network Penetration Testing
    PHP
    JavaScript
    Laravel
    Penetration Testing
    Information Security
    Cloud Security
    Web App Penetration Testing
    Web Application Security
    Website Security
    Information Security Audit
    Linux System Administration
    Amazon Web Services
  • $78 hourly
    Hello, I have hands on experience in the following: - Writing governance, risk management policies - Technical writing and documentation - ISO 27001, NIST, CSF compliance; preparation, implementation, maintenance - Risk management; assessment, mitigation. - Standing up or maintaining your GRC program - Incident management; detection, handling. - SIEM / Microsoft Sentinel (Baselining, monitoring, alerts, rule analytics, playbooks) - Cloud Forensics and incident response - AWS, Microsoft Azure & O365 - Incident awareness and preparedness - Building executive tabletop cyber exercises - Building educational material - Expert PowerPoint slide decks. - Communicate complex subjects in easy visual slides for your C-Suite - CIS Version 8.1 Controls Assessment Book a consultation through Upwork or Cyberandcoffee.com
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Cybersecurity Management
    Risk Analysis
    Strategy
    Network Engineering
    Prompt Engineering
    NIST SP 800-53
    NIST Cybersecurity Framework
    Digital Forensics
    Incident Management
    Incident Response Readiness Assessment
    Enterprise Risk Management
    Certified Information Security Manager
    ISO 27001
    Risk Management
    Problem Solving
  • $25 hourly
    I am a Senior Cybersecurity/Information Security Analyst with 3 years of professional experience in the SOC field, providing services to leading corporations and medium-sized businesses in various industries. I have developed expertise in the following areas: ✔️Configuring SIEM alarm rules and creating incident response playbooks. ✔️With over 2 years of hands-on experience in utilizing industry-leading SIEM platforms such as LogRhythm, Splunk, Wazuh and IBM QRadar. ✔️Developing use cases to enhance the maturity of the environment. ✔️Hands-on experience with SOAR plugins. ✔️Expertise in SIEM administration. ✔️Deployment and integration of log sources. ✔️Proficiency in the entire incident response life cycle and incident report writing. ✔️Cybersecurity incident analysis. ✔️Writing framework documentation, including policies and procedures. ✔️Conducting security audits for IT systems and writing reports. ✔️Creating security guidelines for personnel. ✔️Training employees on various aspects of Cybersecurity Awareness. ✔️Performing vulnerability assessments and penetration testing. ✔️Able to manage SOC as a service. ✔️Technical writing for Cybersecurity. ✔️Parsing logs. I have acquired practical experience using the following tools: security awareness platforms, SIEMs such as LogRhythm, IBMQradar, and Wazu, Splunk firewalls like Fortinet, endpoint protection with Sophos and Kaspersky, ISO 27001, Packet Tracer (Wireshark), vulnerability assessment with Nessus, and web application penetration testing using Nmap and Burp Suite.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Technical Writing
    Security Operation Center
    Information Security Consultation
    Information Security Threat Mitigation
    Information Security
    SOC 2 Report
    SOC 2
    Cybersecurity Management
    Cyber Threat Intelligence
    Cybersecurity Tool
    Cybersecurity Monitoring
  • $65 hourly
    I am a highly skilled IT professional with a Bachelor’s in Computer Science and ongoing Master’s studies in Cybersecurity and Information Assurance from Western Governors University. With over five years of experience in IT security, system management, and technical support, I bring a robust blend of technical expertise and leadership skills. My certifications, including CompTIA Security+, AWS Certified Cloud Practitioner, and CompTIA Project+, demonstrate my commitment to excellence and adaptability in fast-evolving tech environments. I specialize in deploying multi-factor authentication (MFA), managing SOC operations, and designing Power BI dashboards using SQL and Python to deliver actionable insights. My dedication to improving operational efficiency has driven compliance rates to 100% and reduced escalated tickets by 40%. As a Security and IT Analyst at Cimatri Holdings LLC, I developed comprehensive troubleshooting guides, facilitated seamless software integrations, and maintained patch compliance above 90%. Previously, as a Project Manager at Persimmony International LLC, I optimized IT service desk operations, deployed Freshdesk, and sustained customer satisfaction rates above 95%. My expertise spans SIEM and EDR tools, VPN management, and scripting with Python and PowerShell. I am passionate about providing tailored solutions for clients, ensuring secure and efficient IT operations that meet their unique needs.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Dev & IT Project Management
    End User Technical Support
    Microsoft Active Directory
    Transaction Data Entry
    Bookkeeping
    Microsoft Dynamics 365
    Organizational Development
    C++
    Data Entry
    Java
    Technical Support
    Intuit QuickBooks
    SQL
  • $30 hourly
    🔢 As a seasoned Penetration Tester, I have a proven track record of conducting and leading successful security audits, web application penetration tests, and red team engagements for a diverse range of clients. My experience ranges from working with multinational corporations with large-scale infrastructures to smaller companies seeking enhanced security measures for competitive advantage. As a security engineer, my day-to-day responsibilities revolve around leveraging my expertise in penetration testing, cyber security, and vulnerability assessment to identify and mitigate potential vulnerabilities. Through these experiences, I have comprehensively understood the prevailing technology stacks employed worldwide, allowing me to discern their security weaknesses with precision. 🚫No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined. Working with me, you will: ★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ★ Complete manual testing for your application and immediate notification if any high-impact issues are found. ★ Unlimited retesting for the fixed issues and unlimited revisions ★ Able to find critical bug classes that are often missed by automated pentests. 🔢 My stats are: ✅ Top-rated in information security and IT compliance categories ✅ Saved tens of thousands of dollars for clients by identifying critical vulnerabilities ✅ Ranked in the Top 50 at multiple bug bounty programs ✅ Supporting all time zones ✅ Long-term engagements ✅ Professional certifications (OSCP, CREST CPSA, OSEP, OSWP) Sound like a fit? 🟢 Press '...' button and then ‘Send Message’ button in the top right-hand corner Penetration Testing and Vulnerability Assessment Tools: Manual Testing: Burpsuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), Metasploit Framework, SQLmap, OWASP ZAP Automated Testing: Acunetix, Nessus, Netsparker, etc. Penetration testing service: 1. Penetration Testing Engagement: thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing. Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus. 2. Professional Report and Statistics: A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact. 3. Remediation Advice and Guidance: Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities. 4. Asset Discovery: Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery. 5. Free Retest: Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended. 6. OSINT Reconnaissance: Gather all valuable data about the company on the internet, including any breached email addresses and related passwords. 7. Briefing and debriefing: Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required. Calls or meetings are available after the penetration test is completed to discuss the engagement results, the main issues and concerns regarding the company's security, and any further clarification regarding any vulnerability and the associated impact or risk. ✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes: ► Executive Summary ► Assessment Methodology ► Types of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings: Each finding in the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections. ► Retest for issues (The vulnerabilities will be retested after they're fixed; multiple retests can be done to ensure the issues are remediated.) My Expertise: ★ Web Application Security Testing ★ API security testing ★ Penetration Testing ★ Internal Active Directory and External Network Pentest ★ Vulnerability Assessment. ★ Thick Client Pentest (Windows Desktop App Testing) ★ OSINT Assessement
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Risk Assessment
    OWASP
    Network Penetration Testing
    Black Box Testing
    Web Application Security
    Website Security
    Web App Penetration Testing
    Application Security
    System Security
    Vulnerability Assessment
    Security Testing
    Security Assessment & Testing
    Network Security
    Penetration Testing
    Information Security
  • $15 hourly
    Web Penetration Testing(OWASP Top 10 methodology) | Network Penetration testing | OWASP API Security | Mobile Vulnerability Assessment(iOS and Android) | Source Code Reviews(.Net, Java, PHP) | Vulnerability Assessment and Penetration Testing | SIEM team (Cloud(AWS and Azure) Security, File Integrity Monitoring and Event Monitoring, Endpoint Security and Encryption, Data Loss Prevention, Network Access Control, Threat Monitoring (Email Traffic and Malware Analysis), Privileged Access and Identity Management) Have 7+ years of experience in both black box and white box testing penetration testing. Perform VAPT (Vulnerability Assessment and Penetration Testing) services for web applications, networks, mobile; source code reviews; malware analysis; server hardening; and security analysis etc. Conduct penetration testing in a systematic approach. Follow the standard methodology of the industry like OWASP Testing Guide v4(OTGv4); SANS top 25; NIST SP 800-115; PCI DSS to perform penetration testing so that client can concentrate on their professions without worrying about security threats. Web Application Testing: Do web application penetration testing with the latest methodology like OWASP Top-10, SANS Top-25. Perform both manual and automated penetration testing for vulnerabilities like Injection flaws(such as SQL, NoSQL, OS, and LDAP injection etc),Broken Authentication, Sensitive Data Exposure,XML External Entities (XXE), Broken Access Control,Security Misconfiguration, Cross-site scripting(XSS), Insecure Deserialization, Using Components with Known Vulnerabilities,Insufficient Logging & Monitoring. Also, perform source code reviews for many technologies like Java, NET, PHP etc. Approach for Manual Web-Application Penetration Testing: Conduct manual testing with following controls: * Configuration and Deployment Management Testing * Identity Management Testing * Authentication Testing * Authorization Testing * Session Management Testing * Input Validation Testing * Testing for Error Handling * Testing for weak Cryptography * Business Logic Testing * Client Side Testing Tools that use for Automated Web Penetration Testing: Acunetix, Burp-Suite, Netsparker, Nexpose, Nikto, IBM AppScan, HP fortify, W3af etc. Network penetration testing: Provide both external and internal network Penetration Testing so that your Network Infrastructure is secured from the real world attacks. Do both manual and automated network penetration testing. Approach for Manual Network Penetration Testing: Manually check for IDS/IPS, Server, Networks switch, Network Router, VPN, Firewalls, Anti-virus, Password etc. Tools that use for automated network penetration testing: OpenVas, Wireshark, Nessus, Metasploit, Armitage, Scapy etc. Mobile Application Penetration Testing: Perform mobile applications application penetration testing with the latest OWASP methodology(MSTG). Performed both manual and automated penetration testing for vulnerabilities like Weak Server Side Controls, Insecure Data Storage, Insufficient Transport Layer Protection, Unintended Data Leakage, Poor Authorization and Authentication, Broken Cryptography, Client Side Injection, Security Decisions Via Untrusted Inputs, Improper Session Handling, Lack of Binary Protections. Tools: Burp-Suite, HP fortify, Dex2Jar, Apktool, framework-res.apk, iNalyzer. Source Code Reviews: Perform source code reviews for both front and back-end languages. Perform source code reviews standard methodology like OWASP top 10. Do manual and automated source code reviews for various web based security vulnerabilities like SQL injection, Cross site scripting (XSS), CSRF, RFI,LFI, Authentication bypass etc. Tools: CheckMarx, IBM Appscan source for analysis, Microfocus HP Fortify. Security Analysis and Server Hardening: Regularly check and maintain your systems, servers to ensure that they comply with the standards. Do hardening application checks the item automatically on a daily basis and monitors all critical networks and server components. We support various frameworks like CIS benchmarking for Desktops & Web Browsers, Mobile Devices, Network Devices, Servers – Operating Systems, Virtualization Platforms & Cloud etc. Social Engineering: Have experience in social engineering vectors: Vishing, Phishing, Smishing, Impersonation. Used the following social engineering cycle to conduct social engineering: Gather Information: Here Information gathered from company websites, social media and other publications. Plan Attack: Next step is outline how intends to execute the attack Acquire Tools: After planning, next include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics is used in attacks such as password guessing. Tools: SET(Kali-Linux); GetGoPhish
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Web Testing
    Information Security Audit
    Web Application Security
    Website Security
    Network Penetration Testing
    Software QA
    Security Analysis
    Internet Security
    Information Security
    Penetration Testing
    Vulnerability Assessment
    Network Security
  • $75 hourly
    Dwight Grupp INFORMATION SYSTEMS SECURITY / PENETRATION TESTER During the last 5 years, my education and experience have been focused on Website design, Information/Cyber Security, and Network Administration to work full time in the technology industry as a Penetration Tester/CEH. My skills include technical knowledge, creative problem, project management, and the understanding of digital transformation in the IoT and how this will affect future businesses. Demonstrated communication skills; able to explain complex concepts and ideas to non-technical individuals and the ability to work well within a team. They are recognized as excellent team leaders. Background includes: • Website design and development, website, and application security • Windows, Mac, and Linux platform troubleshooting • Technology fundamentals, networking concepts and security • Ethical hacking protocol, threats, vulnerabilities, exploits • Nessus IPS, IDS, network, and vulnerability scanning (host, wireless, application, database) • Bug bounties, capture the flag and hackathons • Microsoft Azure and AWS • Identity and Access Control (Auth0, Otka). ACL password management and multi-factor authentication • Digital transformation, artificial intelligence, IoTs, cloud engineering and security • Enterprise Architecture, Reference Architecture using TOGAF, smart cities, IoT, Big Data and data privacy policy and laws • Setting up virtual environments via VMware and Oracle Virtual Box TECHNICAL SUMMARY Programming Languages: Java Script, Python OS Environments: Microsoft Windows, Mac OS, Kali Linux, Ubuntu Development Environments: Microsoft Visual Studio Code Software Applications: Microsoft Suite/Azure and AWS RDBMS: MySQL Workbench Server, Microsoft Access Other technical skills: Familiarity with and able to learn quickly: • Network Security Monitoring Tools (SolarWinds Network Performance Monitor, Wireshark) • Encryption Tools (Folder Lock, BitLocker) • Web Vulnerability Scanning Tools (Rapid7, Nmap,Nessus, BurpSuite, Netsparker) • Network Defense Wireless Tools (Tor, Splunk) • Packet Sniffers and Password Auditing Tools (tcpdump, John the Ripper, Wireshark, RainbowCrack) • Antivirus software (McAfee, Bitdefender, Norton 360) • Firewall (ESET Endpoint Security, Splunk, SolarWinds) and above listed. • Managed Detection Services (Cisco Systems, ADT Cybersecurity, Alert Logic, Arctic Logic) • Penetration Testing (Metasploit, Kali Linux) • Working towards CompTIA network + and CompTIA security+ and CEH • Basic understanding of IT policies, regulations and standards via, ISO, NIST, CIS, OWSAP, ITU, W3C, IEEE, ASTM, ITIL • Have read CISSP, passionate, creative thinker with strong analytical and critical thinking skills. • Basic understanding of InfoSec and Business integration methods, ERP, EISA, SIEM, Rapid 7, Scrum and Agile. • Business Access Management and Information Encryption/Identity and Access Management • Command Prompt, Windows Power Shell, Git Bash, Kali Linux, and MySQL command client EDUCATION University of Denver | University College (Expected June 2021) Degree: Master of Science Level: Graduate, GPA 4.0 Department: Info & Communications Technology Concentration: Information Systems Security/Penetration Testing Relevant Classes: • Technology Fundamentals • Business Fundamentals • Web Enabled Information Systems • Creative Problems Solving and Programming • Principles of Information Security • Network Security • Identity and Access Management • Enterprise Architecture Western State University| Graduated (2007) Degree: Bachelor of Liberal Arts Level: Undergraduate Department: Recreation & Leadership Concentration: Leadership PROFESSIONAL EXPERIENCE Website Developer and Designer | Galalayo | Self Employed | Freelance (2015 - 2020) • Use web design platforms such as Word Press and Mobirise to design and build custom websites. • Custom websites, logo design, responsive designs, E-Commerce solutions, landing pages, hosting solutions, maintenance plans, security. Marketing | Galalayo | Freelance (2015 - 2020) • Analytics & optimization • Email marketing • Marketing brand development • Lead generation • Video marketing
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Network Penetration Testing
    Metasploit
    Kali Linux
    Web Application Security
    User Identity Management
    Windows 10 Administration
    Enterprise Architecture
    Network Design
    Virtual Machine
    Encryption
  • $60 hourly
    I am a DevSecOps Practitioner, Application Security Analyst, and Cybersecurity Specialist. I have significant and well-diversified experience in multiple Cybersecurity domains, including: 1. Cloud Infrastructure: I help secure Cloud Infrastructure such as GCP AWS and Azure. 2.Penetration Testing and Vulnerability Assessment: I specialize in finding vulnerabilities in Web Applications, Mobile Applications, Networks, and Smart Contracts. 3. Bug Bounty Hunting: I find bugs for various companies on HackerOne - @l3s7r0z. I am constantly improving myself and getting better each day in the Cyber Security field. Lester Obbayi - @l3s7r0z
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Documentation
    Mobile App Testing
    Web Application Firewall
    Technical Documentation
    Black Box Testing
    Internet Security
    Software Testing
    Web App Penetration Testing
    Report Writing
    Ethical Hacking
    Article Writing
    Network Security
    Penetration Testing
    Information Security
    Vulnerability Assessment
  • $25 hourly
    As an experienced Penetration Tester, I've conducted and led successful security audits, web application penetration testing, and red team engagements for a wide range of companies. My experience varies from working with global enterprises with large-scale infrastructures to smaller businesses looking to improve security measures for a competitive edge. I have worked with organizations like - HackerRank - World Bank - HDFC Bank - RBLBank - Kotak Mahindra Bank - Ganpat University - GTU University - BookMyShow - MakeMyTrip Certifications: CEH, eJPT, OSCP, Certified Metaverse Security Consultant. As a security engineer, my daily tasks include identifying and mitigating potential vulnerabilities by applying my knowledge of penetration testing, cyber security, and vulnerability assessment. Through these experiences, I have completely studied the prevailing technology stacks used globally, allowing me to determine their security vulnerabilities with precision. 🚫No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined. Working with me, you will: ★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ★ Complete manual testing for your application and immediate notification if any high-impact issues are found. ★ Unlimited retesting for the fixed issues and unlimited revisions ★ Able to find critical bug classes that are often missed by automated pentests. 🔢 My stats are: ✅ Top-rated in information security and IT compliance categories ✅ Saved tens of thousands of dollars for clients by identifying critical vulnerabilities ✅ Ranked in the Top 50 at multiple bug bounty programs ✅ Supporting all time zones ✅ Long-term engagements ✅ Professional certifications (OSCP, CREST CPSA, OSEP, OSWP, CEH) Penetration Testing and Vulnerability Assessment Tools: Manual Testing: Burpsuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), Metasploit Framework, SQLmap, OWASP ZAP Automated Testing: Acunetix, Nessus, Netsparker, etc. Penetration testing service: 1. Penetration Testing Engagement: Thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing. Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus. 2. Professional Report and Statistics: A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact. 3. Remediation Advice and Guidance: Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities. 4. Asset Discovery: Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery. 5. Free Retest: Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended. 6. OSINT Reconnaissance: Gather all valuable data about the company on the internet, including any breached email addresses and related passwords. 7. Briefing and debriefing: Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required. Calls or meetings are available after the penetration test is completed to discuss the engagement results, the main issues and concerns regarding the company's security, and any further clarification regarding any vulnerability and the associated impact or risk. ✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes: ► Executive Summary ► Assessment Methodology ► Types of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings: Each finding in the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections. ► Retest for issues My Expertise: ★ Web Application Security Testing ★ API security testing ★ Penetration Testing ★ Internal Active Directory and External Network Pentest ★ Vulnerability Assessment. ★ Thick Client Pentest (Windows Desktop App Testing) ★ OSINT Assessement
    vsuc_fltilesrefresh_TrophyIcon Nessus
    OpenVAS
    Application Security
    Penetration Testing
    Vulnerability Assessment
    NIST SP 800-53
    Web Application Security
    Ethical Hacking
    Security Analysis
    Cloud Security
    OWASP
    Network Penetration Testing
  • $60 hourly
    I am a certified professional with unique skillset and profound knowledge of DBA, Solution Architecture, SysOps and DevOps. With over 10 years of hands-on experience, I am designing, building, managing and optimizing various databases and environments for Startups, SMBs and Fortune 100 Enterprises from different industries. Reviews have it! ✅ DBA Expertise: 𝐃𝐁 𝐀𝐝𝐦𝐢𝐧𝐢𝐬𝐭𝐫𝐚𝐭𝐢𝐨𝐧: Oracle 9i, 10g, 11g, 12c - 19c on premise and in Cloud, MS SQL, PostgreSQL, MySQL, SQL Server, and more. 𝐂𝐥𝐮𝐬𝐭𝐞𝐫𝐰𝐚𝐫𝐞: Automatic Storage Management (ASM), Real Application Clusters (RAC) 𝐎𝐫𝐚𝐜𝐥𝐞 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐞𝐝 𝐒𝐲𝐬𝐭𝐞𝐦𝐬: Exadata, ZDLRA, Exalogic, ODA 𝐌𝐢𝐝𝐝𝐥𝐞𝐰𝐚𝐫𝐞 𝐚𝐧𝐝 𝐄𝐑𝐏 𝐚𝐝𝐦𝐢𝐧𝐢𝐬𝐭𝐫𝐚𝐭𝐢𝐨𝐧: NetSuite, Oracle E-Business Suite, Weblogic Server, Apache Tomcat, Glassfish, OBIEE, Discoverer, Fusion Middleware, OAM/IDM 𝐄𝐧𝐭𝐞𝐫𝐩𝐫𝐢𝐬𝐞-𝐜𝐥𝐚𝐬𝐬 𝐁𝐚𝐜𝐤𝐮𝐩, 𝐑𝐞𝐜𝐨𝐯𝐞𝐫𝐲 𝐚𝐧𝐝 𝐑𝐞𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧: RMAN, Dataguard, Golden Gate 𝐃𝐞𝐯𝐞𝐥𝐨𝐩𝐦𝐞𝐧𝐭, 𝐒𝐜𝐫𝐢𝐩𝐭𝐢𝐧𝐠, 𝐚𝐧𝐝 𝐀𝐮𝐭𝐨𝐦𝐚𝐭𝐢𝐨𝐧: bash, SQL, PL/SQL, Python 𝐂𝐥𝐨𝐮𝐝 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬: Oracle Cloud, AWS, Azure 𝐒𝐲𝐬𝐭𝐞𝐦 𝐀𝐝𝐦𝐢𝐧𝐢𝐬𝐭𝐫𝐚𝐭𝐢𝐨𝐧: Unix and Linux, Windows (on premise or in Cloud) ✅ DevOps, SysOps Expertise: 𝐒𝐲𝐬𝐭𝐞𝐦 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠: Scalable, secure, and highly available designs tailored to business needs. 𝐒𝐲𝐬𝐎𝐩𝐬 & 𝐈𝐧𝐟𝐫𝐚𝐬𝐭𝐫𝐮𝐜𝐭𝐮𝐫𝐞: Managing virtual machines, containers, storage, backup, migration, networking, and databases. 𝐃𝐞𝐯𝐎𝐩𝐬 𝐀𝐮𝐭𝐨𝐦𝐚𝐭𝐢𝐨𝐧: CI/CD, infrastructure as code (IaC), tools like Jenkins, GitLab CI/CD, Azure DevOps, etc. 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 & 𝐂𝐨𝐦𝐩𝐥𝐢𝐚𝐧𝐜𝐞: Data encryption, access control, IAM, GDPR, HIPAA, PCI-DSS compliance. Choosing me as your IT Architect, DBA, SysOps, and DevOps Engineer means you gain a trusted partner who will go the extra mile to deliver exceptional results and help your organisation thrive. Let's discuss your requirements and get you the best solution. Contact me today!
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Git
    Kubernetes
    Python
    Enterprise Software
    Linux
    Oracle E-Business Suite
    Oracle Cloud
    Amazon Web Services
    Azure DevOps
    Cloud Architecture
    Database Architecture
    Solution Architecture
    Database Administration
    SQL
    Oracle Database
  • $50 hourly
    With a rich background spanning over 5+ years in designing and executing robust cybersecurity solutions, I am a Cybersecurity Specialist Consultant dedicated to safeguarding digital landscapes. My journey has taken me from the foundational steps of security analysis to spearheading roles as a Co-Founder and CTO, alongside pivotal positions in cybersecurity engineering and ethical hacking across global landscapes from Jakarta to Dallas, and Sydney to the Netherlands. My expertise lies in a deep understanding of cyber threats and vulnerabilities, backed by a Bachelor's degree in Cybersecurity from Deakin University and certified mastery in Blockchain Security, Advanced Penetration Testing, and Fuzzing and Crash Analysis. I've successfully led comprehensive security initiatives, including developing XDR and SIEM solutions, managing multi-layered security systems, and pioneering full-scale cybersecurity startups. My approach is rooted in innovation and efficiency, aiming to protect organizational assets against ever-evolving cyber threats with customized security strategies. At the heart of my service is a commitment to operational excellence and a proactive stance on cybersecurity, ensuring I'm always ready to counteract cyber threats swiftly. Through Encripti, my cybersecurity startup, and various contractor roles, I've honed my skills in vulnerability assessments, red/blue team engagements, and crafting defensive architectures against complex cyber attacks. My portfolio is a testament to my ability to communicate complex security concepts effectively and to collaborate towards enhancing cybersecurity resilience in dynamic environments. In seeking new opportunities on Upwork, I aim to bring my wealth of experience and a proactive approach to cybersecurity to organizations looking to fortify their defenses. Whether through strategic consulting, hands-on penetration testing, or crafting comprehensive security frameworks, my goal is to deliver unparalleled value and security assurance to my clients.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Blockchain Security
    API Testing
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Risk Analysis
    Virus Removal
    Web Application Security
    Data Analytics
    Smart Contract
    Malware Removal
    Security Testing
    Vulnerability Assessment
    Application Security
    Cybersecurity Management
    Penetration Testing
    Digital Forensics
  • $99 hourly
    I help organizations build and manage a strong cybersecurity program. I have established resilient cybersecurity in Fortune 100 companies —Warner Bros., EA Sports, Pfizer, State Farm Insurance, and Goldman Sachs and can do the same for your business.
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Cloud Security
    Network Security
    Cybersecurity Monitoring
    SOC 2
    HIPAA
    PCI
    Certified Information Systems Security Professional
    ISO 27001
    Security Infrastructure
    Compliance Consultation
    Web Application Security
    Information Security Audit
    Vulnerability Assessment
    Penetration Testing
    Security Policies & Procedures Documentation
  • $999 hourly
    Computer Science Engineer/Ethical Hacker/Cyber Security Expert who has been providing security for corporate and individuals. ✌Cyber Security/Ethical Hacking - Securing mobile & Pc, running tests for vulnerabilities & server-side security (13+ experience) ✌Web development - JavaScript , Php (12+ experience) ✌CMS - Joomla, WordPress, Drupal (10+ experience) I usually develop cross-platform and Android apps and build dynamic websites. I can develop the product very quickly and with high accuracy. I believe in customer satisfaction. U say it I develop it any language any software you need and if you want to secure your self from attacks I am always available. My work is fast and secure. *Price will vary on the complexity of the project Happy new year 2024 !!!
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Information Security
    Security Engineering
    Ripple
    Bitcoin
    Internet Security
    Android App Development
    XML
    Ethical Hacking
    Cryptocurrency
    Digital Marketing
    PHP
    JavaScript
  • $25 hourly
    ✅ As a CREST/Offensive Security (OSCP) Certified Penetration Tester and Cyber Security Consultant, I have deep knowledge of Security Assessment Methodology to identify vulnerabilities in Network, API, Web, and Mobile Applications. ✅ I have conducted Penetration Test, Vulnerability Assessment and delivered professional reports to companies in the world complying with: ► CREST standards ► Offensive Security (OSCP) standards ► OWASP Top 10 Vulnerability ► OWASP API Security Top 10 Vulnerability ► OWASP Mobile Security Top 10 Vulnerability ► Application Security Verification Standard 4.0 (ASVS 4.0) ► CWE Top 25 Most Dangerous Software Errors ► ISO 27001 Penetration Testing ► Payment Card Industry Data Security Standard (PCI DSS) ► General Data Protection Regulation (GDPR) ► Common Vulnerability Scoring System (CVSS) ► Open Source Security Testing Methodology Manual (OSSTMM) ✅ I have some cybersecurity certifications including: ► CREST Registered Penetration Tester (CRT) ► CREST Practitioner Security Analyst (CPSA) ► Offensive Security Certified Professional (OSCP) ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ► Executive Summary ► Assessment Methodology ► Type of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings. Each finding listed within the report will contain CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ► Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, Zaproxy, Gobuster, etc.) ✅ Please contact me if you have any question. ✅ Thank you and have a good day!
    vsuc_fltilesrefresh_TrophyIcon Nessus
    Security Analysis
    Software Testing
    White Box Testing
    Web App Penetration Testing
    OWASP
    Black Box Testing
    Network Penetration Testing
    Information Security
    Website Security
    System Security
    Penetration Testing
    Security Testing
    Vulnerability Assessment
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Nessus Freelancer on Upwork?

You can hire a Nessus Freelancer on Upwork in four simple steps:

  • Create a job post tailored to your Nessus Freelancer project scope. We’ll walk you through the process step by step.
  • Browse top Nessus Freelancer talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Nessus Freelancer profiles and interview.
  • Hire the right Nessus Freelancer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Nessus Freelancer?

Rates charged by Nessus Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Nessus Freelancer on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Nessus Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Nessus Freelancer team you need to succeed.

Can I hire a Nessus Freelancer within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Nessus Freelancer proposals within 24 hours of posting a job description.

Schedule a call