Hire the best Network Pentesters in Virginia
Check out Network Pentesters in Virginia with the skills you need for your next job.
- $17 hourly
- 5.0/5
- (141 jobs)
With more than fifteen years of experience editing and writing, I edit cybersecurity whitepapers, dissertations, and blogs. I also specialize in making AI-generated documents sound more "human," particularly in the tech and business fields. What you can expect if you work with me: You can expect me to give every document THREE readings. The first is a simple read-through to get a feel for your writing style and voice, as well as the feel and scope of the document. The second reading is a content edit that focuses on flow, inconsistencies in writing style and grammar, and any work-specific issues I find. Once all of those issues are addressed, I will give the final document a proofread, making certain that both it and you look fantastic.Network Pentesting
Academic EditingEditing & ProofreadingWhite PaperBash ProgrammingMusic ArrangementWritingNetwork Penetration TestingTechnical EditingComputer ScienceCybersecurity ManagementPythonJava - $55 hourly
- 5.0/5
- (6 jobs)
🚀 Need fast, reliable fixes for your website, hosting, or IT security? Whether it’s an SSL issue, cloud security setup, or a hosting migration, I specialize in keeping your systems running smoothly with zero downtime. 💡 How I Can Help: ✔ General IT Fixes – Resolve small but critical issues like software bugs, email errors, and connectivity problems. ✔ SSL & Hosting Fixes – Troubleshoot SSL errors, install premium certificates, and secure websites. ✔ Server & Cloud Security – Set up firewalls, VPNs, IAM policies, and secure AWS/Azure cloud environments. ✔ Hosting & Email Migrations – Transfer websites, set up business emails, and manage DNS configurations. ✔ Automation & DevOps – Automate cloud infrastructure using Terraform, Docker, and Kubernetes. 🔧 Tech Stack: AWS, Azure, SiteGround, Nginx, Cloudflare, Cisco, Fortinet, Terraform, Docker 🛠️ Why Work With Me? ✔ Fast & Reliable Fixes – I won’t waste your time. I solve issues efficiently and securely. ✔ Expert Guidance – I explain solutions in simple terms so you understand exactly what’s happening. ✔ Proven Experience – 10+ years securing networks, automating cloud systems, and fixing IT problems of all sizes.Network Pentesting
Network DesignNetwork ArchitecturePenetration TestingSecurity Assessment & TestingNetwork PlanningNetwork Penetration TestingSecurity EngineeringNetwork Security - $205 hourly
- 5.0/5
- (18 jobs)
Experienced IT Professional: Delivering High-Quality Solutions from the U.S. Innovative IT expert with a diverse skill set spanning technical implementation, resource management, and project oversight. Committed to delivering cutting-edge technological solutions for clients across the United States. Key Technical Skills: - Network Analysis and Visibility - Resource Management - Staff Recruitment and Retention - Administrative Oversight Notable Achievements: - Designed and implemented a Network Analysis and Visibility platform, resulting in [X%] improved network efficiency and [Y%] reduction in downtime for clients. - Successfully managed and grew a team of [number] IT professionals, achieving [Z%] increase in project delivery speed. Professional Background: - U.S. Navy Veteran: Served as an Avionics Technician, honing problem-solving skills and attention to detail. - Education: Supplemented self-directed learning with courses at College of DuPage, Lansing Community College, and Northern Virginia Community College. Why Choose Me: - Committed to delivering all work from within the United States, ensuring seamless communication and alignment with U.S. business practices. - Proven track record of translating complex technical concepts into practical, client-focused solutions. - Dedicated to continuous learning, staying ahead of emerging technologies to provide cutting-edge solutions. - Strong emphasis on clear communication and meeting project deadlines.Network Pentesting
Solution ArchitectureAWS CloudFormationAmazon S3Security AnalysisAmazon EC2AWS LambdaComputer NetworkInformation SecurityServerless ComputingNetwork Penetration TestingComplianceAmazon Web ServicesNetwork SecurityPython - $90 hourly
- 5.0/5
- (2 jobs)
I represent Aegisbyte, and since 2016 I have offered a comprehensive suite of services designed to help businesses grow their offensive security capabilities. Our main focus is on helping businesses identify, assess, and mitigate risks associated with potential attacks. I have been in the offensive security scene since 1996 with over 20 years experience in the field, professionally, and I have achieved respected offensive security certification such as most of the Offensive Security certs (OSCP, OSEP, OSWE, OSED, OSEE), SANS GIAC certs (GPEN, GXPEN, GMOB, GCIH), eLearnSecurity (eCPPT, eCPTX, eWPTX, eMAPT, eCXD) and many more! I can help you assess our customers current security posture, understand their specific threat landscape, and build a comprehensive security program that includes both prevention and detection capabilities. Aegisbyte also offers a wide range of services, from managed services to training to operational support, that can help implement and maintain our customer’s security program. In addition, I offer a variety of consulting and training services to help businesses build their offensive security capabilities. The team of experts at Aegisbyte can provide customized guidance on everything from developing a comprehensive security strategy to implementing specific controls and best practices. We also offer a range of technical training courses that cover topics such as internal/external pen-tests, web application security, mobile application security testing, threat modeling, vulnerability management, vulnerability scanning and network defense. If you are interested in learning more about our offensive security services and how we can help your business grow its capabilities, please let me know and we can schedule a call. Aegisbyte engineers provide a 100% guarantee to our customers and if not we won’t charge a cent for our services and revise changes to the deliverable because our customers are our number one priority. At Aegisbyte we believe in building lasting business relationships.Network Pentesting
Information Security Threat MitigationCloud SecurityMobile App Bug FixMobile App TestingCybersecurity MonitoringWeb App Penetration TestingCyber Threat IntelligenceWeb Application SecurityIncident Response Readiness AssessmentNetwork Penetration TestingCybersecurity ManagementVulnerability AssessmentSecurity Assessment & TestingPenetration Testing - $50 hourly
- 0.0/5
- (0 jobs)
I am a skilled penetration tester with over two years of experience identifying and exploiting security vulnerabilities across networks, systems, and applications. With a strong background in information security, I specialize in conducting in-depth security assessments, red teaming, and vulnerability analysis to help organizations strengthen their defenses. I stay up to date with the latest attack techniques and defensive strategies, continuously honing my skills to navigate the evolving cybersecurity landscape. Passionate about offensive security, I thrive on uncovering weaknesses and providing actionable recommendations to enhance security posture.Network Pentesting
Network Penetration TestingWeb App Penetration TestingPenetration TestingComplianceGovernment Reporting ComplianceInformation Security - $70 hourly
- 0.0/5
- (0 jobs)
As an experienced AWS Cloud Security Engineer, I specialize in securing cloud infrastructures, ensuring that organizations are protected against the latest threats. My background as a penetration tester and application security expert has provided me with the skills to identify and mitigate vulnerabilities across diverse environments, from enterprise systems to complex industrial control systems. Proficient in AWS Cloud Security: Expertise in building and securing cloud environments using AWS services, focusing on creating secure-by-default solutions. Infrastructure as Code (IaC) Security: Skilled in using Terraform for deploying and managing secure cloud infrastructures, with a strong emphasis on IaC security best practices. Security Automation: Adept at developing and implementing security automation tools and workflows using Python and PowerShell, streamlining processes to enhance security postures. Wiz CSPM: Hands-on experience with Wiz Cloud Security Posture Management (CSPM) to continuously monitor and manage security risks across AWS environments. Cloud, Network, and Web Application Penetration Testing: Extensive experience in identifying vulnerabilities across cloud environments, networks, and web applications, utilizing industry-standard tools and methodologies. (4 years total of experience) Collaboration: Experienced in working closely with DevOps, IT infrastructure, and software development teams to integrate security seamlessly into the development lifecycle.Network Pentesting
Software TestingLinuxMicrosoft Active DirectoryWeb Application SecuritySecurity EngineeringSecurity AnalysisJavaScriptPHPPythonWeb Application AuditSoftware QAApplicationNetwork Penetration TestingPenetration TestingApplication Security - $50 hourly
- 0.0/5
- (0 jobs)
Securify provides end-to-end security services making us your one stop solution for all security needs. With over 3000+ successful penetration tests and 500+ SOC2/ISO implementations, Securify expertly delivers actionable and repeatable results. Get your FIRST FREE Security Assessment from our services below: 1. Expert support for Compliance: * SOC 2, HIPAA, PCI DSS, ISO 27001 * GDPR, CCPA Compliance * Ongoing Compliance Maintenance 2. Web/API Security Assessment * OWASP Top 10 and ASVS * Penetration Test and Exploitation * Secure Code Review 3. Cloud Security Assessment * Multi Cloud Security Assessment * Identity and Access Management * Architecture Review 4. Network Security Testing * Penetration Testing * Red Team Assessment * Wireless Security Test 5. Mobile App Security * Static and Dynamic Assessment * IPA and APK Analysis * Secure Code Review 6. Threat Model * Threat Detection * Risk Assessment * Control ImplementationNetwork Pentesting
HIPAAISO 27001SOC 2Network Penetration TestingCloud SecurityWeb App Penetration TestingNetwork SecurityGovernance, Risk & Compliance SoftwareInformation Security Threat MitigationThreat DetectionAI SecuritySecurity TestingSecurity EngineeringPenetration TestingInformation Security - $75 hourly
- 0.0/5
- (0 jobs)
I am a highly skilled cybersecurity professional with extensive experience in penetration testing, vulnerability assessments, and managed cybersecurity services. As the Owner, CEO, and Chief of Cyber Operations at Aurora Technologies, I specialize in helping small and medium-sized businesses secure their digital assets and protect against evolving threats. What I Do Best: Penetration Testing & Vulnerability Assessments: Identifying weaknesses in networks, systems, and applications to mitigate risks before they become threats. Managed Cybersecurity Services: Providing 24/7 monitoring, incident response, and proactive defense using advanced tools like Microsoft Defender XDR. Custom Security Solutions: Tailoring strategies to meet the unique needs of each client, ensuring compliance with industry standards and best practices. Why Choose Me: With a strong foundation in IT management and advanced expertise in cybersecurity, I combine technical skills with a strategic approach to deliver actionable solutions. I excel in translating complex technical issues into clear, practical recommendations, empowering businesses to stay ahead of cyber risks. Let’s work together to fortify your digital defenses and give you peace of mind in today’s ever-changing cybersecurity landscape.Network Pentesting
Web HostingManaged ServicesCybersecurity ManagementVulnerability AssessmentWeb App Penetration TestingNetwork Penetration TestingPenetration TestingCybersecurity MonitoringCyber Threat IntelligenceComputer NetworkDatabase ManagementDatabaseComputing & NetworkingInformation SecurityCompliance - $25 hourly
- 4.6/5
- (24 jobs)
NotTheFed is a cyber security consulting company specializing in low cost penetration testing for start-ups and dotcoms. We are a U.S.-based company with 100% native English speakers. We work on a fixed-rate basis to ensure quick project delivery and prevent any budget surprises. Our team of seasoned professionals includes: Marcus Johnson - Project Manager / Phishing Expert - PMP CSM ITILv4 CISSP Bill Breen - Technical Lead / Lead Pentester - CISSP ENCE CEH IAM CPT Rus Nesse - Mobile Security Expert / iOS and Android Our certified security professionals provide thorough assessments, complete with risk scores, detailed explanations, screenshots, and links to technical resources to ensure clarity. Once an NDA is signed, we’ll collaborate with you to understand your requirements and develop a tailored Statement of Work (SOW). Our minimum project size is $1,000. We are a HIPAA-certified organization. We look forward to helping you meet your security goals!Network Pentesting
Web App Penetration TestingNetwork Penetration TestingCloud SecurityOWASPEthical HackingWeb TestingCertified Information Systems Security ProfessionalSecurity TestingPenetration TestingInformation SecurityVulnerability Assessment - $75 hourly
- 5.0/5
- (4 jobs)
Dwight Grupp INFORMATION SYSTEMS SECURITY / PENETRATION TESTER During the last 5 years, my education and experience have been focused on Website design, Information/Cyber Security, and Network Administration to work full time in the technology industry as a Penetration Tester/CEH. My skills include technical knowledge, creative problem, project management, and the understanding of digital transformation in the IoT and how this will affect future businesses. Demonstrated communication skills; able to explain complex concepts and ideas to non-technical individuals and the ability to work well within a team. They are recognized as excellent team leaders. Background includes: • Website design and development, website, and application security • Windows, Mac, and Linux platform troubleshooting • Technology fundamentals, networking concepts and security • Ethical hacking protocol, threats, vulnerabilities, exploits • Nessus IPS, IDS, network, and vulnerability scanning (host, wireless, application, database) • Bug bounties, capture the flag and hackathons • Microsoft Azure and AWS • Identity and Access Control (Auth0, Otka). ACL password management and multi-factor authentication • Digital transformation, artificial intelligence, IoTs, cloud engineering and security • Enterprise Architecture, Reference Architecture using TOGAF, smart cities, IoT, Big Data and data privacy policy and laws • Setting up virtual environments via VMware and Oracle Virtual Box TECHNICAL SUMMARY Programming Languages: Java Script, Python OS Environments: Microsoft Windows, Mac OS, Kali Linux, Ubuntu Development Environments: Microsoft Visual Studio Code Software Applications: Microsoft Suite/Azure and AWS RDBMS: MySQL Workbench Server, Microsoft Access Other technical skills: Familiarity with and able to learn quickly: • Network Security Monitoring Tools (SolarWinds Network Performance Monitor, Wireshark) • Encryption Tools (Folder Lock, BitLocker) • Web Vulnerability Scanning Tools (Rapid7, Nmap,Nessus, BurpSuite, Netsparker) • Network Defense Wireless Tools (Tor, Splunk) • Packet Sniffers and Password Auditing Tools (tcpdump, John the Ripper, Wireshark, RainbowCrack) • Antivirus software (McAfee, Bitdefender, Norton 360) • Firewall (ESET Endpoint Security, Splunk, SolarWinds) and above listed. • Managed Detection Services (Cisco Systems, ADT Cybersecurity, Alert Logic, Arctic Logic) • Penetration Testing (Metasploit, Kali Linux) • Working towards CompTIA network + and CompTIA security+ and CEH • Basic understanding of IT policies, regulations and standards via, ISO, NIST, CIS, OWSAP, ITU, W3C, IEEE, ASTM, ITIL • Have read CISSP, passionate, creative thinker with strong analytical and critical thinking skills. • Basic understanding of InfoSec and Business integration methods, ERP, EISA, SIEM, Rapid 7, Scrum and Agile. • Business Access Management and Information Encryption/Identity and Access Management • Command Prompt, Windows Power Shell, Git Bash, Kali Linux, and MySQL command client EDUCATION University of Denver | University College (Expected June 2021) Degree: Master of Science Level: Graduate, GPA 4.0 Department: Info & Communications Technology Concentration: Information Systems Security/Penetration Testing Relevant Classes: • Technology Fundamentals • Business Fundamentals • Web Enabled Information Systems • Creative Problems Solving and Programming • Principles of Information Security • Network Security • Identity and Access Management • Enterprise Architecture Western State University| Graduated (2007) Degree: Bachelor of Liberal Arts Level: Undergraduate Department: Recreation & Leadership Concentration: Leadership PROFESSIONAL EXPERIENCE Website Developer and Designer | Galalayo | Self Employed | Freelance (2015 - 2020) • Use web design platforms such as Word Press and Mobirise to design and build custom websites. • Custom websites, logo design, responsive designs, E-Commerce solutions, landing pages, hosting solutions, maintenance plans, security. Marketing | Galalayo | Freelance (2015 - 2020) • Analytics & optimization • Email marketing • Marketing brand development • Lead generation • Video marketingNetwork Pentesting
Network Penetration TestingMetasploitKali LinuxWeb Application SecurityUser Identity ManagementWindows 10 AdministrationEnterprise ArchitectureNetwork DesignVirtual MachineEncryption Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.