Hire the best Network Security Engineers in New Delhi, IN
Check out Network Security Engineers in New Delhi, IN with the skills you need for your next job.
- $45 hourly
- 4.8/5
- (2 jobs)
I am Zaid, also known as cyxploiter in the InfoSec community, My area of expertise is Ethical hacking and Penetration testing. I am looking for opportunities to work on real-world projects and contribute something. I believe that my skills and knowledge are of interest to a growing being like you, and I’m looking for a technical, security-related function. I possess a hacker-like mindset and a passion for information security. I work as Freelance Bug Hunter and DevOps Developer. My day to day work includes: - Web Application & API Pentesting - Mobile Application Pentesting (iOS, Android) - Network Pentesting & Vulnerability Assessment - Cloud Security Assessment (Kubernetes) - Writing comprehensive reports on Vulnerability Findings Training & Courses I've studied: - PWK v2020 - Pentester Academy Web Application Pentesting Course - Metasploit Unleashed - CEH v10 - CNSS ICSI My Technical Skills include: - Web App Testing (SQLi, XSS, RFI/LFI, OWASP TOP 10, etc.) - Android/iOS Penetration Testing (Frida, Objection, SSL pinning/Root check bypass, OWASP Mobile Top 10) - C, C++, C#, BASH, Python, PowerShell, JavaScript, and Linux. - Computer Networking (WireShark, Scapy and Cisco Packet Tracer) - Wireless Security (Aircrack-ng suite, ARP Spoofing, Honey Pots, etc.) - Network Security (Nmap, Metasploit, OWASP ZAP) - Cloud Computing and Storage (AWS, Azure, GCP, Docker) Tools I use: BurpSuite, Sqlmap, Nmap, Wireshark, Metasploit, OpenVAS, Mimikatz, Nikto2, IBM Appscan, Acunetix, Aircrack-ng, Netcat, Neo4j. In my spare time, I hack VulnHub and Hack The Box machines and write their Walkthroughs.Network Security
RustReverse EngineeringC++Bash ProgrammingCScriptingC#LinuxPythonAutomationJavaScriptLinux System AdministrationSystem AdministrationData Backup - $50 hourly
- 5.0/5
- (37 jobs)
I am a CCIE Security/NSE4/AWS, Azure and OCI Foundation certified network professional and I have worked for 6 plus years in Cisco TAC security team. I have an over all 10 plus years of experience. I have worked on multivendor products like firewalls like Palo Alto, Cisco, Fortigate, Sonicwall etc, load balancers (F5 LTM, AFM), SDN solutions, Cisco Switches like catalyst, nexus etc. I have good exposure of configuring cisco switches (Nexus and Catalyst) and routers. I have expert level knowledge of Cisco firewalls (ASA/FTD), fortigate, pfsense and palo alto. I have very strong troubleshooting skills and I have done several migrations of firewalls and other technologies. I have migrated several multi vendor firewalls to Cisco Firewalls and vice versa. Also, have worked on a mass migration project like migrated more than 70 cisco ASAs to Cisco FTDs. I am managing more than 15 Palo Alto firewalls and 30 Fortigate firewalls. I have sounds concepts and working knowledge of AWS advanced networking and Azure networking. I have configured several VPN connections between cloud and multivendor firewalls.Network Security
VMware NSXNetwork AdministrationPython ScriptCisco Certified Internetwork ExpertPalo Alto FirewallsVPNF5, Inc.Amazon Web ServicesCisco Certified Network ProfessionalMicrosoft AzureVirtualizationCisco ASAFortinetComputer Network - $25 hourly
- 5.0/5
- (4 jobs)
Hello, I'm accomplished IT and cyber security professional with 12+ years of experience in: ➤Network Security | Internet Security | Web Security | Data Security | Information Security ➤Security and IT compliance | Leading IT and security operations | Risk management ➤Policy and process development | Systems analysis | Driving security initiatives across organizations 🦾 I have an innate ability to translate complex security and IT requirements into clear and concise language that resonates across all levels of your business. I’ve built, managed, and driven comprehensive security and IT initiatives across industries, from companies as small as mom-and-pop shops to global corporations, leading teams, or as a one-man show. When it comes to managing business operations, information security, IT/security compliance, and technical procedures and operations, you need a qualified expert to help. If you want a detail-oriented, determined, and knowledgeable subject matter expert who cares about getting the job done right, I'm your guy. I only take on projects where I know I can deliver outstanding results, and my client-centric approach ensures your satisfaction. 😁 🔐 Need to meet security or regulatory compliance (ISO 27001, SOC 2, HIPAA)? Ask me about the Thoropass, Vanta, and Secureframe! I work with you throughout the entire audit process to ensure your security is top-notch, you receive the necessary support, and can effectively utilize the platforms. ✅ Popular platforms I support for clients: ➤Google Workspace | Google Cloud | Miro | Slack | Asana | Jira | ClickUp | macOS | Kandji | Jamf | ESET | Malwarebytes EDR | CIS SecureSuite | Zapier and Make | AI Tools: Google Gemini, Claude, and OpenAI/ChatGPT 🚀 I've worked with SMB clients from various industries, such as: ➤Healthcare providers | Business services | Startups | SaaS providers | AI/ML-based services | Manufacturers 📒 Primary Services: ➤Applying and assessing security configurations | Company policy and process development ➤Google Workspace configuration and security | Data management and security support ➤Compliance platform implementation (Thoropass, Vanta, and Secureframe) ➤Security audit readiness and support (ISO 27001, HIPAA, SOC 2, CMMC) ➤Vendor security assessments and due diligence questionnaires ➤IT automation | IT and security product and service selection support ➤Integrating AI tools into business operations and processes | vCISO 🦾 Skills driving success: ➤Client-centric focus | Strong attention to detail | Creative and adaptable approach to challenges ➤Unmatched integrity | Populizer | Empathetic and driven leader | Self-starterNetwork Security
Penetration TestingVulnerability AssessmentOpenVASInformation SecuritySecurity Assessment & TestingApplication SecurityOWASPFirewallWeb App Penetration TestingWebsite SecurityDevOpsWordPress SecurityWeb Application SecurityComputing & Networking - $10 hourly
- 0.0/5
- (1 job)
Hi! I’m a tech-savvy Cybersecurity and Data Analysis professional, currently pursuing my MSc in Cyber Security at Queen’s University Belfast. I specialize in both cyber threat detection and data-driven insights—a rare combination that lets me approach problems with a security-focused and analytical mindset. 🔐 Cybersecurity Focus: I’m diving deep into Malware Analysis, SIEM (Security Information and Event Management), and EDR (Endpoint Detection and Response). I’ve worked with tools like Splunk, Wireshark, and Security Onion, and I’m building hands-on experience in: • Threat detection & log analysis • Vulnerability scanning (Nessus, OpenVAS) • Incident response support • Endpoint protection configurations • Security awareness documentation 📊 Data Analysis Expertise: Alongside security, I bring strong data analytics capabilities to the table. With Power BI, Advanced Excel, and basic SQL, I help businesses turn raw data into actionable insights. • Interactive dashboards & data visualizations in Power BI • Advanced Excel (PivotTables, VLOOKUP/XLOOKUP, Power Query, Macros) • Data cleaning, transformation, and KPI reporting • Cross-functional reporting for decision-makers I can support your team in analyzing large datasets securely, visualizing KPIs, or helping spot unusual activity patterns that could indicate potential threats. Whether you’re looking for help with security log insights, dashboard building, or hybrid support on tech/data tasks—I’m here to deliver accurate, reliable, and efficient results. Let’s connect and make your data work smarter and safer.Network Security
Cybersecurity ToolVulnerability AssessmentWiresharkNetwork AnalysisCyber Threat IntelligenceData AnalysisMicrosoft Power BI Data VisualizationMicrosoft Power BIPythonSQL - $30 hourly
- 5.0/5
- (2 jobs)
🔒 Cybersecurity Expert | OSCP & CREST Certified I deliver cutting-edge security and compliance solutions, safeguarding businesses with a proven track record of vulnerability management and threat mitigation. ------------------------------------------------------------------------------------------------------------ 🎓 Professional Credentials ------------------------------------------------------------------------------------------------------------ With 8+ years in the field, I am dedicated to securing complex systems across various industries, ensuring top-tier security and compliance for businesses. ------------------------------------------------------------------------------------------------------------ 🏆 Key Certifications ------------------------------------------------------------------------------------------------------------ ✅ OSCP (Offensive Security Certified Professional) ✅ CREST Registered Penetration Tester (CRT) ✅ CREST Practitioner Security Analyst (CPSA) ------------------------------------------------------------------------------------------------------------ 🌐 Industry/Sector Expertise ------------------------------------------------------------------------------------------------------------ 🚀 Secured over 300 applications/assets, including: • Web Applications: Fortified against OWASP Top 10 vulnerabilities • Mobile Security: Enhanced security for Android & iOS apps • APIs: Ensured secure API integrations • Thick Clients: Protected enterprise-grade thick client applications • Network Security: Conducted extensive network pentests to uncover misconfigurations and vulnerabilities 🏢 Sector Experience: Worked with Fortune 500 companies in BFSI, healthcare, e-commerce, and telecom, specializing in highly regulated industries and securing critical infrastructure. 1. Fintech - Banking, Financial Services, Insurance 2. HealthCare 3. E-Commerce 4. Manufacturing 5. Telecommunications 6. Energy and Utilities 7. Government and Public Sector and many more. ------------------------------------------------------------------------------------------------------------ 📜 Compliance & Standards ------------------------------------------------------------------------------------------------------------ 🛡️ Expertise in ISO 27001, HIPAA, GDPR, PCI DSS, and FDA (Healthcare Compliance). Adhere to OWASP, SANS Checklist, and NIST guidelines to maintain stringent security and regulatory standards. ------------------------------------------------------------------------------------------------------------ 🔬 Notable Research ------------------------------------------------------------------------------------------------------------ 🕵️ Vulnerability Disclosures: 🛡️CVE-2019-12744 – Remote Code Execution 🛡️CVE-2019-12745 – Cross-Site Scripting (XSS) 🛡️CVE-2019-12801 – Cross-Site Scripting (XSS) 🛡️CVE-2019-12932 – Cross-Site Scripting (XSS) ------------------------------------------------------------------------------------------------------------ 🚀 Advanced Skills ------------------------------------------------------------------------------------------------------------ ✔️ Red & Blue Teaming: Conducted both offensive and defensive security assessments ✔️ Cloud Security: Expert in AWS, Azure, and GCP security configurations and penetration testing ✔️ Social Engineering: Simulated real-world phishing attacks to gauge organizational readiness ✔️ API Testing: Secured RESTful and SOAP APIs ------------------------------------------------------------------------------------------------------------ 🤝 Professionalism & Delivery ------------------------------------------------------------------------------------------------------------ ✅ Leadership & Communication: Led teams and collaborated with international clients for seamless project delivery ✅ Timely Execution: Consistently deliver projects punctually, balancing thorough technical assessments with client requirements ✅ Collaboration: Partnered with development and business teams to implement robust security solutions ------------------------------------------------------------------------------------------------------------ 🎯 Client-Focused Solutions ------------------------------------------------------------------------------------------------------------ 🔑 Tailoring industry-specific solutions to secure sensitive data, ensure compliance, and protect businesses from potential threats. I promise clear communication and effective results. Let’s discuss how we can comprehensively secure your systems. Reach out to explore tailored security solutions for your business today.Network Security
Information Security AuditWebsite SecurityInformation Security ConsultationSecurity Assessment & TestingSecurity TestingCybersecurity ManagementMobile App TestingSecurity AnalysisNetwork Penetration TestingWeb App Penetration TestingInformation SecurityVulnerability AssessmentApplication SecurityPenetration Testing - $3 hourly
- 0.0/5
- (0 jobs)
I am an accomplished risk management professional with extensive experience managing Third Party risk management (TPRM) from onboarding to offboarding of all vendors, Vendor risk management covering Cyber Security, Data Privacy and Information security, Risk management, Risk assessment, Designing TPRM framework, Third Party, Risk Assurance, Contract Review/Due Diligence, Procurement Governance/Assurance Review, Project Management, Stakeholder management, My expertise spans across designing and implementing comprehensive TPRM frameworks, overseeing risk assessments, and managing vendor-related activities. Core Competencies: a) Third-Party Risk Management (TPRM): I lead and oversee the entire risk assessment and due diligence process for third-party vendors. This includes managing the onboarding processes and checklists to ensure thorough risk evaluations. I design and implement detailed TPRM project plans, outlining tasks, timelines, and milestones to ensure effective risk management. b) Vendor and Contract Management: My role involves handling contract management processes for hardware and software, including new contracts, amendments, and renewals. I coordinate with external vendors, internal stakeholders, and legal teams to ensure timely contract execution and issue resolution. c) Stakeholder Engagement: I engage with key stakeholders from various departments and external vendors to ensure smooth communication and collaboration throughout the risk management process. I manage expectations and provide direction on risk assessments and non-compliance issues. d) Risk Assessment and Audits: I conduct comprehensive risk assessments and audits focusing on people, processes, and technology. My work includes identifying gaps, risks, and opportunities for improvement, and providing recommendations for enhancing policies and standards. e) Reporting and Process Improvement: I create regular reports on the status of third-party assessments, highlighting roadblocks and key issues to management and stakeholders. I have successfully implemented process improvements, such as transitioning quarterly scorecard activities from manual processes to Google Forms to minimize errors and enhance efficiency. f) Team Leadership and Development: I lead and develop teams of TPRM specialists and consultants, providing knowledge sharing, training, and motivation. I manage projects, stakeholder presentations, and client relationships to drive successful outcomes.Network Security
Information Security ConsultationEnterprise Risk ManagementRisk ManagementCybersecurity MonitoringCybersecurity ManagementGDPR Compliance ReviewIT Compliance AuditISO 27001Governance, Risk & Compliance SoftwareRisk AssessmentVendor ManagementContract ManagementInformation SecurityCompliance - $10 hourly
- 0.0/5
- (0 jobs)
As a freelancer with expertise in both SIEM deployment(Wazuh , ELK, Splunk) and Kali training, I bring a unique set of skills to the table. With years of experience in designing and implementing comprehensive security infrastructures, I am well-versed in various security technologies and frameworks, enabling me to provide top-notch security solutions to clients. My expertise in Kali training allows me to empower organizations with the knowledge and skills needed to detect and respond to cyber threats proactively. By providing hands-on training sessions, I help organizations improve their security posture and minimize the risk of cyber-attacks. With a passion for cybersecurity and a drive to stay up-to-date with the latest security trends and technologies, I am committed to helping organizations protect their critical assets and maintain a robust security posture.Network Security
SOC 1Security TestingSQL Injection MitigationPHPCyber Threat IntelligenceCybersecurity ToolEthical HackingInformation SecurityIntrusion Prevention System - $20 hourly
- 0.0/5
- (2 jobs)
Hey there! 👋 I'm Varun Chawla, your go-to cyber security guru and information security consultant here on Upwork. With a passion for safeguarding digital realms and a knack for simplifying complex concepts, I'm on a mission to empower individuals and organizations with the knowledge and tools to stay one step ahead of cyber threats. My Approach: As a seasoned cyber security professional, I blend expertise with empathy, ensuring that even the most technical topics are approachable and understandable. Whether it's training individuals on best practices or fortifying systems against potential attacks, I prioritize clarity, practicality, and impact in everything I do. Why Choose Me: 🛡️ Expert Trainer: With experience as a Cyber Security Trainer, I've honed my skills in delivering engaging and effective training sessions on a wide range of topics, from network security to incident response. 🔍 Penetration Testing Pro: As a skilled Penetration Tester, I specialize in identifying vulnerabilities and providing actionable insights to enhance security measures. Quick turnaround? No problem—I'll have that comprehensive security scan done and dusted within 24 hours. 💡 Strategic Consultant: Need advice on fortifying your systems against cyber threats? Look no further. As a Cybersecurity Consultant, I develop and implement robust security measures tailored to your specific needs, ensuring peace of mind and resilience in the face of evolving risks. Let's Connect: Ready to take your cyber security game to the next level? Let's chat! Whether you're a beginner looking to boost your security know-how or a seasoned pro seeking strategic guidance, I'm here to help. Together, we'll navigate the digital landscape with confidence and resilience. Looking forward to safeguarding your digital world together! Varun ChawlaNetwork Security
Incident ManagementIncident Response PlanApplication SecurityEthical HackingISO 27001Vulnerability AssessmentOWASPCloud SecurityComplianceCybersecurity MonitoringNetwork Penetration TestingKali LinuxPenetration TestingInformation Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Network Security Engineer near New Delhi, on Upwork?
You can hire a Network Security Engineer near New Delhi, on Upwork in four simple steps:
- Create a job post tailored to your Network Security Engineer project scope. We’ll walk you through the process step by step.
- Browse top Network Security Engineer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Network Security Engineer profiles and interview.
- Hire the right Network Security Engineer for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Network Security Engineer?
Rates charged by Network Security Engineers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Network Security Engineer near New Delhi, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Network Security Engineers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Network Security Engineer team you need to succeed.
Can I hire a Network Security Engineer near New Delhi, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Network Security Engineer proposals within 24 hours of posting a job description.