Hire the best Network Pentesters in Virginia

Check out Network Pentesters in Virginia with the skills you need for your next job.
  • $17 hourly
    With more than fifteen years of experience editing and writing, I edit cybersecurity whitepapers, dissertations, and blogs. I also specialize in making AI-generated documents sound more "human," particularly in the tech and business fields. What you can expect if you work with me: You can expect me to give every document THREE readings. The first is a simple read-through to get a feel for your writing style and voice, as well as the feel and scope of the document. The second reading is a content edit that focuses on flow, inconsistencies in writing style and grammar, and any work-specific issues I find. Once all of those issues are addressed, I will give the final document a proofread, making certain that both it and you look fantastic.
    Featured Skill Network Pentesting
    Academic Editing
    Editing & Proofreading
    White Paper
    Bash Programming
    Music Arrangement
    Writing
    Network Penetration Testing
    Technical Editing
    Computer Science
    Cybersecurity Management
    Python
    Java
  • $55 hourly
    🚀 Need fast, reliable fixes for your website, hosting, or IT security? Whether it’s an SSL issue, cloud security setup, or a hosting migration, I specialize in keeping your systems running smoothly with zero downtime. 💡 How I Can Help: ✔ General IT Fixes – Resolve small but critical issues like software bugs, email errors, and connectivity problems. ✔ SSL & Hosting Fixes – Troubleshoot SSL errors, install premium certificates, and secure websites. ✔ Server & Cloud Security – Set up firewalls, VPNs, IAM policies, and secure AWS/Azure cloud environments. ✔ Hosting & Email Migrations – Transfer websites, set up business emails, and manage DNS configurations. ✔ Automation & DevOps – Automate cloud infrastructure using Terraform, Docker, and Kubernetes. 🔧 Tech Stack: AWS, Azure, SiteGround, Nginx, Cloudflare, Cisco, Fortinet, Terraform, Docker 🛠️ Why Work With Me? ✔ Fast & Reliable Fixes – I won’t waste your time. I solve issues efficiently and securely. ✔ Expert Guidance – I explain solutions in simple terms so you understand exactly what’s happening. ✔ Proven Experience – 10+ years securing networks, automating cloud systems, and fixing IT problems of all sizes.
    Featured Skill Network Pentesting
    Network Design
    Network Architecture
    Penetration Testing
    Security Assessment & Testing
    Network Planning
    Network Penetration Testing
    Security Engineering
    Network Security
  • $205 hourly
    Experienced IT Professional: Delivering High-Quality Solutions from the U.S. Innovative IT expert with a diverse skill set spanning technical implementation, resource management, and project oversight. Committed to delivering cutting-edge technological solutions for clients across the United States. Key Technical Skills: - Network Analysis and Visibility - Resource Management - Staff Recruitment and Retention - Administrative Oversight Notable Achievements: - Designed and implemented a Network Analysis and Visibility platform, resulting in [X%] improved network efficiency and [Y%] reduction in downtime for clients. - Successfully managed and grew a team of [number] IT professionals, achieving [Z%] increase in project delivery speed. Professional Background: - U.S. Navy Veteran: Served as an Avionics Technician, honing problem-solving skills and attention to detail. - Education: Supplemented self-directed learning with courses at College of DuPage, Lansing Community College, and Northern Virginia Community College. Why Choose Me: - Committed to delivering all work from within the United States, ensuring seamless communication and alignment with U.S. business practices. - Proven track record of translating complex technical concepts into practical, client-focused solutions. - Dedicated to continuous learning, staying ahead of emerging technologies to provide cutting-edge solutions. - Strong emphasis on clear communication and meeting project deadlines.
    Featured Skill Network Pentesting
    Solution Architecture
    AWS CloudFormation
    Amazon S3
    Security Analysis
    Amazon EC2
    AWS Lambda
    Computer Network
    Information Security
    Serverless Computing
    Network Penetration Testing
    Compliance
    Amazon Web Services
    Network Security
    Python
  • $90 hourly
    I represent Aegisbyte, and since 2016 I have offered a comprehensive suite of services designed to help businesses grow their offensive security capabilities. Our main focus is on helping businesses identify, assess, and mitigate risks associated with potential attacks. I have been in the offensive security scene since 1996 with over 20 years experience in the field, professionally, and I have achieved respected offensive security certification such as most of the Offensive Security certs (OSCP, OSEP, OSWE, OSED, OSEE), SANS GIAC certs (GPEN, GXPEN, GMOB, GCIH), eLearnSecurity (eCPPT, eCPTX, eWPTX, eMAPT, eCXD) and many more! I can help you assess our customers current security posture, understand their specific threat landscape, and build a comprehensive security program that includes both prevention and detection capabilities. Aegisbyte also offers a wide range of services, from managed services to training to operational support, that can help implement and maintain our customer’s security program. In addition, I offer a variety of consulting and training services to help businesses build their offensive security capabilities. The team of experts at Aegisbyte can provide customized guidance on everything from developing a comprehensive security strategy to implementing specific controls and best practices. We also offer a range of technical training courses that cover topics such as internal/external pen-tests, web application security, mobile application security testing, threat modeling, vulnerability management, vulnerability scanning and network defense. If you are interested in learning more about our offensive security services and how we can help your business grow its capabilities, please let me know and we can schedule a call. Aegisbyte engineers provide a 100% guarantee to our customers and if not we won’t charge a cent for our services and revise changes to the deliverable because our customers are our number one priority. At Aegisbyte we believe in building lasting business relationships.
    Featured Skill Network Pentesting
    Information Security Threat Mitigation
    Cloud Security
    Mobile App Bug Fix
    Mobile App Testing
    Cybersecurity Monitoring
    Web App Penetration Testing
    Cyber Threat Intelligence
    Web Application Security
    Incident Response Readiness Assessment
    Network Penetration Testing
    Cybersecurity Management
    Vulnerability Assessment
    Security Assessment & Testing
    Penetration Testing
  • $50 hourly
    I am a skilled penetration tester with over two years of experience identifying and exploiting security vulnerabilities across networks, systems, and applications. With a strong background in information security, I specialize in conducting in-depth security assessments, red teaming, and vulnerability analysis to help organizations strengthen their defenses. I stay up to date with the latest attack techniques and defensive strategies, continuously honing my skills to navigate the evolving cybersecurity landscape. Passionate about offensive security, I thrive on uncovering weaknesses and providing actionable recommendations to enhance security posture.
    Featured Skill Network Pentesting
    Network Penetration Testing
    Web App Penetration Testing
    Penetration Testing
    Compliance
    Government Reporting Compliance
    Information Security
  • $70 hourly
    As an experienced AWS Cloud Security Engineer, I specialize in securing cloud infrastructures, ensuring that organizations are protected against the latest threats. My background as a penetration tester and application security expert has provided me with the skills to identify and mitigate vulnerabilities across diverse environments, from enterprise systems to complex industrial control systems. Proficient in AWS Cloud Security: Expertise in building and securing cloud environments using AWS services, focusing on creating secure-by-default solutions. Infrastructure as Code (IaC) Security: Skilled in using Terraform for deploying and managing secure cloud infrastructures, with a strong emphasis on IaC security best practices. Security Automation: Adept at developing and implementing security automation tools and workflows using Python and PowerShell, streamlining processes to enhance security postures. Wiz CSPM: Hands-on experience with Wiz Cloud Security Posture Management (CSPM) to continuously monitor and manage security risks across AWS environments. Cloud, Network, and Web Application Penetration Testing: Extensive experience in identifying vulnerabilities across cloud environments, networks, and web applications, utilizing industry-standard tools and methodologies. (4 years total of experience) Collaboration: Experienced in working closely with DevOps, IT infrastructure, and software development teams to integrate security seamlessly into the development lifecycle.
    Featured Skill Network Pentesting
    Software Testing
    Linux
    Microsoft Active Directory
    Web Application Security
    Security Engineering
    Security Analysis
    JavaScript
    PHP
    Python
    Web Application Audit
    Software QA
    Application
    Network Penetration Testing
    Penetration Testing
    Application Security
  • $50 hourly
    Securify provides end-to-end security services making us your one stop solution for all security needs. With over 3000+ successful penetration tests and 500+ SOC2/ISO implementations, Securify expertly delivers actionable and repeatable results. Get your FIRST FREE Security Assessment from our services below: 1. Expert support for Compliance: * SOC 2, HIPAA, PCI DSS, ISO 27001 * GDPR, CCPA Compliance * Ongoing Compliance Maintenance 2. Web/API Security Assessment * OWASP Top 10 and ASVS * Penetration Test and Exploitation * Secure Code Review 3. Cloud Security Assessment * Multi Cloud Security Assessment * Identity and Access Management * Architecture Review 4. Network Security Testing * Penetration Testing * Red Team Assessment * Wireless Security Test 5. Mobile App Security * Static and Dynamic Assessment * IPA and APK Analysis * Secure Code Review 6. Threat Model * Threat Detection * Risk Assessment * Control Implementation
    Featured Skill Network Pentesting
    HIPAA
    ISO 27001
    SOC 2
    Network Penetration Testing
    Cloud Security
    Web App Penetration Testing
    Network Security
    Governance, Risk & Compliance Software
    Information Security Threat Mitigation
    Threat Detection
    AI Security
    Security Testing
    Security Engineering
    Penetration Testing
    Information Security
  • $75 hourly
    I am a highly skilled cybersecurity professional with extensive experience in penetration testing, vulnerability assessments, and managed cybersecurity services. As the Owner, CEO, and Chief of Cyber Operations at Aurora Technologies, I specialize in helping small and medium-sized businesses secure their digital assets and protect against evolving threats. What I Do Best: Penetration Testing & Vulnerability Assessments: Identifying weaknesses in networks, systems, and applications to mitigate risks before they become threats. Managed Cybersecurity Services: Providing 24/7 monitoring, incident response, and proactive defense using advanced tools like Microsoft Defender XDR. Custom Security Solutions: Tailoring strategies to meet the unique needs of each client, ensuring compliance with industry standards and best practices. Why Choose Me: With a strong foundation in IT management and advanced expertise in cybersecurity, I combine technical skills with a strategic approach to deliver actionable solutions. I excel in translating complex technical issues into clear, practical recommendations, empowering businesses to stay ahead of cyber risks. Let’s work together to fortify your digital defenses and give you peace of mind in today’s ever-changing cybersecurity landscape.
    Featured Skill Network Pentesting
    Web Hosting
    Managed Services
    Cybersecurity Management
    Vulnerability Assessment
    Web App Penetration Testing
    Network Penetration Testing
    Penetration Testing
    Cybersecurity Monitoring
    Cyber Threat Intelligence
    Computer Network
    Database Management
    Database
    Computing & Networking
    Information Security
    Compliance
  • $25 hourly
    NotTheFed is a cyber security consulting company specializing in low cost penetration testing for start-ups and dotcoms. We are a U.S.-based company with 100% native English speakers. We work on a fixed-rate basis to ensure quick project delivery and prevent any budget surprises. Our team of seasoned professionals includes: Marcus Johnson - Project Manager / Phishing Expert - PMP CSM ITILv4 CISSP Bill Breen - Technical Lead / Lead Pentester - CISSP ENCE CEH IAM CPT Rus Nesse - Mobile Security Expert / iOS and Android Our certified security professionals provide thorough assessments, complete with risk scores, detailed explanations, screenshots, and links to technical resources to ensure clarity. Once an NDA is signed, we’ll collaborate with you to understand your requirements and develop a tailored Statement of Work (SOW). Our minimum project size is $1,000. We are a HIPAA-certified organization. We look forward to helping you meet your security goals!
    Featured Skill Network Pentesting
    Web App Penetration Testing
    Network Penetration Testing
    Cloud Security
    OWASP
    Ethical Hacking
    Web Testing
    Certified Information Systems Security Professional
    Security Testing
    Penetration Testing
    Information Security
    Vulnerability Assessment
  • $75 hourly
    Dwight Grupp INFORMATION SYSTEMS SECURITY / PENETRATION TESTER During the last 5 years, my education and experience have been focused on Website design, Information/Cyber Security, and Network Administration to work full time in the technology industry as a Penetration Tester/CEH. My skills include technical knowledge, creative problem, project management, and the understanding of digital transformation in the IoT and how this will affect future businesses. Demonstrated communication skills; able to explain complex concepts and ideas to non-technical individuals and the ability to work well within a team. They are recognized as excellent team leaders. Background includes: • Website design and development, website, and application security • Windows, Mac, and Linux platform troubleshooting • Technology fundamentals, networking concepts and security • Ethical hacking protocol, threats, vulnerabilities, exploits • Nessus IPS, IDS, network, and vulnerability scanning (host, wireless, application, database) • Bug bounties, capture the flag and hackathons • Microsoft Azure and AWS • Identity and Access Control (Auth0, Otka). ACL password management and multi-factor authentication • Digital transformation, artificial intelligence, IoTs, cloud engineering and security • Enterprise Architecture, Reference Architecture using TOGAF, smart cities, IoT, Big Data and data privacy policy and laws • Setting up virtual environments via VMware and Oracle Virtual Box TECHNICAL SUMMARY Programming Languages: Java Script, Python OS Environments: Microsoft Windows, Mac OS, Kali Linux, Ubuntu Development Environments: Microsoft Visual Studio Code Software Applications: Microsoft Suite/Azure and AWS RDBMS: MySQL Workbench Server, Microsoft Access Other technical skills: Familiarity with and able to learn quickly: • Network Security Monitoring Tools (SolarWinds Network Performance Monitor, Wireshark) • Encryption Tools (Folder Lock, BitLocker) • Web Vulnerability Scanning Tools (Rapid7, Nmap,Nessus, BurpSuite, Netsparker) • Network Defense Wireless Tools (Tor, Splunk) • Packet Sniffers and Password Auditing Tools (tcpdump, John the Ripper, Wireshark, RainbowCrack) • Antivirus software (McAfee, Bitdefender, Norton 360) • Firewall (ESET Endpoint Security, Splunk, SolarWinds) and above listed. • Managed Detection Services (Cisco Systems, ADT Cybersecurity, Alert Logic, Arctic Logic) • Penetration Testing (Metasploit, Kali Linux) • Working towards CompTIA network + and CompTIA security+ and CEH • Basic understanding of IT policies, regulations and standards via, ISO, NIST, CIS, OWSAP, ITU, W3C, IEEE, ASTM, ITIL • Have read CISSP, passionate, creative thinker with strong analytical and critical thinking skills. • Basic understanding of InfoSec and Business integration methods, ERP, EISA, SIEM, Rapid 7, Scrum and Agile. • Business Access Management and Information Encryption/Identity and Access Management • Command Prompt, Windows Power Shell, Git Bash, Kali Linux, and MySQL command client EDUCATION University of Denver | University College (Expected June 2021) Degree: Master of Science Level: Graduate, GPA 4.0 Department: Info & Communications Technology Concentration: Information Systems Security/Penetration Testing Relevant Classes: • Technology Fundamentals • Business Fundamentals • Web Enabled Information Systems • Creative Problems Solving and Programming • Principles of Information Security • Network Security • Identity and Access Management • Enterprise Architecture Western State University| Graduated (2007) Degree: Bachelor of Liberal Arts Level: Undergraduate Department: Recreation & Leadership Concentration: Leadership PROFESSIONAL EXPERIENCE Website Developer and Designer | Galalayo | Self Employed | Freelance (2015 - 2020) • Use web design platforms such as Word Press and Mobirise to design and build custom websites. • Custom websites, logo design, responsive designs, E-Commerce solutions, landing pages, hosting solutions, maintenance plans, security. Marketing | Galalayo | Freelance (2015 - 2020) • Analytics & optimization • Email marketing • Marketing brand development • Lead generation • Video marketing
    Featured Skill Network Pentesting
    Network Penetration Testing
    Metasploit
    Kali Linux
    Web Application Security
    User Identity Management
    Windows 10 Administration
    Enterprise Architecture
    Network Design
    Virtual Machine
    Encryption
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses