Hire the best Network Security Engineers in Karachi, PK
Check out Network Security Engineers in Karachi, PK with the skills you need for your next job.
- $35 hourly
- 5.0/5
- (24 jobs)
With over 10 years of experience in Ethical Hacking, I have successfully led and executed hundreds of security audits, penetration tests, and red team engagements for clients ranging from multinational corporations with thousands of assets to nimble startups seeking a security edge in their competitive landscape. My expertise lies in hands-on offensive security, vulnerability assessment, and deep knowledge of both legacy and modern technology stacks—understanding their common pitfalls and security flaws. Below is an overview of the services I offer: ✅Penetration Testing Engagement Comprehensive manual and automated testing of websites, applications, servers, and infrastructure within the defined scope. This includes internal and external network testing, performed using industry-leading tools such as Burp Suite Professional, Nessus, and custom-developed scripts and utilities tailored from previous engagements. ✅Professional Reporting & Risk Analysis A detailed, professionally written report outlining each identified vulnerability, complete with: -Step-by-step exploitation methodology - Full HTTP requests/responses - Screenshots and Proof-of-Concepts - Standardized "CVSS v4.0" risk ratings - Business impact and affected asset ownership ✅Remediation Advice & Guidance Actionable, tailored remediation guidance for every identified security issue. I provide clear explanations of the risk associated with each finding and offer best-practice solutions to mitigate or eliminate the threat. ✅Asset Discovery & Mapping Active and passive reconnaissance to determine the breadth of your digital footprint. Includes: -Subdomain enumeration -Port and service discovery -Identification of public-facing assets susceptible to external threats ✅Free Retest & Validation Included in the service is a complimentary re-evaluation of previously identified vulnerabilities to verify that remediation efforts have been successfully implemented and that no alternate exploitation paths exist. ✅OSINT Reconnaissance Extensive Open-Source Intelligence (OSINT) gathering to identify publicly available data that could pose a threat, including: -Breached email addresses and associated credentials -Data circulating on forums or the dark web -Leaked documents or sensitive metadata Access to a curated repository of over 4 billion records enables comprehensive visibility into your company’s exposure. ✅Pre-Engagement Briefing I am available for consultation sessions to: -Define and refine the Scope of Work (SoW) -Determine the appropriate engagement type (black-box, white-box, or grey-box) -Establish access requirements and test scheduling -Provide guidance for organizations conducting a penetration test for the first time ✅Post-Engagement Debriefing After the assessment, I offer detailed walkthrough sessions of the findings. These sessions include: -Clarification of technical findings and their real-world impact -Prioritization of vulnerabilities based on risk -Strategic recommendations to strengthen your overall security posture With a strong track record of delivering high-impact, actionable security insights, I am committed to helping organizations identify, understand, and mitigate their risks in today’s complex threat landscape.Network Security
Kali LinuxWindows ServerNIST SP 800-53Security InfrastructureSecurity EngineeringWeb Application SecurityInternet SecurityOWASPEthical HackingManual TestingSecurity Assessment & TestingCybersecurity ManagementPenetration TestingVulnerability Assessment - $25 hourly
- 5.0/5
- (24 jobs)
🕑 𝗔𝘃𝗮𝗶𝗹𝗮𝗯𝗹𝗲 𝗱𝘂𝗿𝗶𝗻𝗴 𝗨𝗦, 𝗖𝗮𝗻𝗮𝗱𝗶𝗮𝗻, 𝗮𝗻𝗱 𝗔𝘂𝘀𝘁𝗿𝗮𝗹𝗶𝗮𝗻 𝘁𝗶𝗺𝗲𝘇𝗼𝗻𝗲𝘀.. A motivated cyber-security professional with diversified expertise and 6+ years of work experience in Information security, capable of quickly adapting to advanced environments, a good team player, and an effective leader. Excellent working knowledge of Security Technologies and having a commitment to keeping up to date with the latest developments. Being a Senior Security Analyst, I am skilled with the following: ✔SOC as a service ✔Threat Intelligence Service ✔VA/PT Service ✔SOC Gap Assessment Service ⚡⚡⚡⚡Technical Exposure⚡⚡⚡⚡ 🌟 Hands on Experience of managing on below SIEM technologies for monitoring, development of use-cases, and parsing/mapping and integration of devices: ✔IBM QRadar, ✔Splunk, ✔LogSign, ✔LogPoint ✔Elastic Search. 🌟 Hands on Experience of managing, Deployment, triage analysis, investigation and manage incidents, create prevention policies on 3000+ Hosts including Windows, Linux, MacBook Platform through below EDR technologies. ✔CrowdStrike EDR ✔TrendMicro ✔Carbon Black ✔Fire Eye (HX/NX/EX) ✔Microsoft Defender for Endpoint 🌟 Hands on Experience of managing, Deployment, and monitoring Microsoft XDR technology and identifying advance attacks. 🌟 Classification of malware after deep analysis, identification, validation and detection techniques and tactics. 🌟 Hands-on experience in preventing organization from brand impersonation through below mentioned tools which provides real-time visibility into potential underground cyber threats and analyzes domains to identify brand impersonation: ✔CrowdStrike falcon X Recon ✔CTM360 ✔Dark Owl 🌟 Hands-on experience of detecting policy violations (i.e., Block Mass Storage, Social Media Sites etc.), identifying known threats and IOC management in organizations through below Antivirus Solutions: ✔Symantec ✔Kaspersky ✔Trend Micro ✔CrowdStrike Prevent ✔McAfee 🌟 Hands-on experience of using and monitoring below listed network security controls for the detection of anomalies, suspicious Behavior, and policy violations. ✔Barracuda Email Security Appliance ✔Cisco Email Security Appliance ✔Microsoft Email Security Appliance ✔Palo Alto IDS/IPS Firewalls. ✔FortiGate IDS/IPS Firewalls. ✔Cisco IDS/IPS Firewalls. ✔Sophos Proxy ✔Cisco Proxy ✔Infoblox DNS Security ✔Trend Micro (DDI, DDEI, DDWI, DDAN) 🌟 Providing direction and guidance on customer security requirements and standards for monitoring, alerting and incident response. 🌟 Identifying strategy for containment, remediation steps and recovery procedures. 🌟 Identifying new security threats by conducting continual monitoring, security testing, vulnerability assessments and log analysis.Network Security
LinuxMicrosoft AzureCybersecurity MonitoringCrowdStrikeSecurity Operation CenterData ProtectionCyber Threat IntelligenceIncident Response PlanPenetration TestingInformation Security ConsultationInformation SecurityVulnerability AssessmentSystem SecurityMalware Removal - $20 hourly
- 5.0/5
- (45 jobs)
I have been working as a Technical support specialist for more than Five years. Out of 5 years, I have 4 years experience in customer facing role. I have excellent people skills and understand users' concerns well. Plus, I am a quick learner, coachable, and accountable. I will be a great asset in a customer support or technical support team. Moreover, I have lead a team of multiple Dispute Resolutions writers. I can effectively work as a team lead to manage their productivity and quality and to train them on different strategies. Plus, I am an excellent writer. Also, I can do extensive research work and can provide administrative services. I will be pleased to assist startups in completing day-to-day tasks and organizing their priorities and tasks. Please see my job feedback and history for the quality of my work! Thanks :)Network Security
Information Security AwarenessMicrosoft Active DirectorySecurity Operation CenterEnd User Technical SupportEthical HackingPenetration TestingProduct OnboardingInformation SecurityTechnical SupportSystem AdministrationOnline Chat SupportWeb App Penetration TestingWeb Application SecurityAdministrative Support - $50 hourly
- 5.0/5
- (4 jobs)
▁ ▂ ▄ ▅ ▆ ▇ █ 🎀 𝒢𝓇𝑒𝑒𝓉𝒾𝓃𝑔𝓈❢ 🎀 █ ▇ ▆ ▅ ▄ ▂ ▁ I'm a seasoned Cyber Security Engineer and Web Security Specialist with over 10 years of hands-on experience safeguarding digital landscapes. My expertise lies in fortifying web applications, network infrastructures, and IT systems against emerging threats and vulnerabilities. ⫸ 𝗪𝗵𝗮𝘁 𝗜 𝗢𝗳𝗳𝗲𝗿: ✅ 𝗖𝗼𝗺𝗽𝗿𝗲𝗵𝗲𝗻𝘀𝗶𝘃𝗲 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗔𝘀𝘀𝗲𝘀𝘀𝗺𝗲𝗻𝘁𝘀: Thorough vulnerability assessments and penetration testing to identify and mitigate risks. ✅ 𝗪𝗲𝗯 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆: Implementation of robust security measures for web applications, including firewalls, intrusion detection systems, and secure coding practices. ✅ 𝗜𝗻𝗰𝗶𝗱𝗲𝗻𝘁 𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗲: Swift and effective response to security incidents, minimizing damage and ensuring swift recovery. ✅ 𝗖𝗼𝗻𝘀𝘂𝗹𝘁𝗮𝘁𝗶𝗼𝗻 𝗮𝗻𝗱 𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴: Providing expert advice on security best practices and conducting training sessions to empower your team. ⫸ 𝗪𝗵𝘆 𝗖𝗵𝗼𝗼𝘀𝗲 𝗠𝗲: ✅ 𝗣𝗿𝗼𝘃𝗲𝗻 𝗧𝗿𝗮𝗰𝗸 𝗥𝗲𝗰𝗼𝗿𝗱: Successfully secured numerous projects for clients across various industries. ✅ 𝗨𝗽-𝘁𝗼-𝗗𝗮𝘁𝗲 𝗞𝗻𝗼𝘄𝗹𝗲𝗱𝗴𝗲: Constantly staying ahead of the curve with the latest security trends and technologies. ✅ 𝗧𝗮𝗶𝗹𝗼𝗿𝗲𝗱 𝗦𝗼𝗹𝘂𝘁𝗶𝗼𝗻𝘀: Customizing security strategies to meet your specific needs and business goals. ✅ 𝗣𝗿𝗼𝗮𝗰𝘁𝗶𝘃𝗲 𝗔𝗽𝗽𝗿𝗼𝗮𝗰𝗵: Focused on preventive measures to keep your digital assets safe and sound. Furthermore, I've recovered 100s of websites and I've been acknowledged by many tech giants like Apple, Microsoft, eBay, Intel etc. for identifying and reporting vulnerabilties. ⫸ 𝗦𝗽𝗲𝗰𝗶𝗮𝗹𝗶𝘁𝘆: ✅ 𝐖𝐞𝐛𝐬𝐢𝐭𝐞 𝐏𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐓𝐞𝐬𝐭𝐢𝐧𝐠 : Skilled in Web Pentesting having hands-on experience with industry latest tools like Burpsuite etc. ✅ 𝐌𝐚𝐥𝐰𝐚𝐫𝐞 𝐑𝐞𝐦𝐨𝐯𝐚𝐥: Experienced in Malware removal, not like other guys just using Wordfence or Sucuri etc. ✅ 𝐇𝐚𝐜𝐤 𝐑𝐞𝐜𝐨𝐯𝐞𝐫𝐲: Expertise with recovering hacked website even it's fully compromised. ✅ 𝐃𝐃𝐨𝐒 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧: Great knowledge and experience of DDoS Protection. ✅ 𝐖𝐀𝐅: Experienced with different WAFs ( Web Application Firewalls) like StackPath, Cloudflare, AWS, Akamai, Imperva etc. Expert knowledge of Cloudflare. Let's collaborate to build a secure and resilient digital environment for your business. Reach out to me, and let's discuss how I can help you protect your most valuable assets.Network Security
PHPLinuxWeb Application FirewallBash ProgrammingEthical HackingVulnerability AssessmentCloudflareWeb App Penetration TestingWordPressInformation SecurityPenetration Testing - $47 hourly
- 4.6/5
- (7 jobs)
🛡️ Cybersecurity Expert with a Decade of Excellence With over 8 years of hands-on experience in vulnerability assessment and penetration testing, along with a solid background of 10+ years in Bug Bounty Hunting. Extensive expertise in Web, Mobile Apps (iOS / Android & Hybrid), and AWS Cloud Security, coupled with a strong background in Network/Infrastructure Vulnerability Assessment and Penetration Testing. Holds a bachelor’s degree in computer science and boasts a diverse array of notable cyber security certifications and achievements, including eLearnSecurity Certified Professional Penetration Tester (eCPPT), Certified Red Team Professional (CRTP), Certified Ethical Hacker (CEH), Certified Web Application Security Professional (CWASP), and eLearnSecurity Web Application Penetration Testing eXtreme (eWPTXv2). Recognized by industry leaders such as Microsoft, Google, Facebook, Salesforce, Dropbox, and Snapchat etc. Consistently ranked among HackerOne's top one hundred hackers for three consecutive years (2014 to 2016). Distinguished participation in the prestigious Live Hacking Competition H1-702 held in Las Vegas, organized by HackerOne and an active member of the Synack Red Team (SRT). 📜 Cybersecurity Certifications ✅ Certified Red Team Professional (CRTP) ✅ Certified Professional Penetration Tester (eCPPT) ✅ Certified Ethical Hacker (CEH) ✅ Web Application Penetration Testing eXtreme (eWPTXv2) ✅ Certified Web Application Security Professional (CWASP) 💼 Comprehensive Penetration Testing Services ✅ Vulnerability Assessment and Penetration Testing of Web Applications (SAST/DAST). ✅ Red Teaming Specialist ✅ Mobile Applications Penetration Testing (Android/iOS) ✦ Static & Dynamic Analysis (SAST, DAST & IAST) ✦ iOS Jailbreak Detection Bypass ✦ Android Root Detection Bypass ✦ iOS/Android SSL Pinning Bypass ✦ Reverse Engineering ✅ Network Infrastructure Security Assessment & Penetration Testing. ✅ Penetration Testing of REST/SOAP/GraphQL APIs, ESB, Middleware, or other channels ✅ Authentication protocols such as Kerberos, LDAP, SAML, OAuth2 etc. Penetration Testing. ✅ AWS/Azure/GCP Security Assessment & Penetration Testing. ✅ Active Directory Security Assessment & Penetration Testing. ✅ Docker Security & Penetration Testing. ✅ System & Application/Microservices Architecture Reviews. ✅ Security Source Code Reviews. ✅ Specialization in thin clients, ATMs, CMS hardening (e.g., WordPress) Penetration Testing. ✅ Database Security Assessment & Penetration Testing. ✅ System Security, Firewall, WAF (F5), User Access Management and Logs Reviews. ✅ Create written reports, detailing assessment findings and recommendations. ✅ Information Security frameworks such as NIST, ISO 27001/2 & PCI-DSS. 🛠️Tools & Techniques ✅ Experience with various Security Tools such as Burp Suite, MetaSploit, NMAP, Cobalt Strike, PowerShell, Mimikatz, AWSCLI, MobSF, Frida, Ghidra, Objection, Reflutter, Kali, Nessus, SonarQube etc. 🌐 Industry Recognition and Achievements ✅ Acknowledged by Microsoft, Google, Facebook, Salesforce, Dropbox, Snapchat, etc. ✅ Consistently ranked among HackerOne's top 100 hackers for three consecutive years (2014-2016) ✅ Distinguished participation in Live Hacking Competition H1-702 in Las Vegas ✅ Active member of the Synack Red Team (SRT) ✅ Tested over 1000 Web & Mobile Applications ✅ Conducted the Penetration of Core Banking Applications based on Microservices architecture. ✅ Recognized with a Spot Recognition Award for delivering outstanding Information Security Services at Bank Al Habib Limited. ✅ Received the Best Performance Award for conducting a comprehensive Cloud and IoT Devices Pentest at Trillium Information Security Systems. ✅ Participated in the Defcon H1-702 live hacking competition in Las Vegas, hosted by HackerOne. ✅ Discovered significant vulnerabilities in the cloud-native and financial applications of multiple banks and international companies. ✅ Identified vulnerabilities, including unauthorized transactions, in financial applications. ✅ Invited as a guest speaker on Cybersecurity and Application Security at various universities. 🚀 Secure Product Development (SSDLC) and Training ✅ Assist in developing secure products through Secure Architecture Design ✅ Provide training in Bug Bounty Hunting, Web & Mobile Application Penetration Testing, Network Security ✅ Cyber Security Awareness Training: ✦ Bug Bounty Hunting Training ✦ Web Application Penetration Testing Training ✦ Mobile Application Penetration Testing Training ✦ Network Penetration Testing Training ✦ Cyber Security Awareness Training (For Corporates) ✦ Cyber Security Employee Awareness Training ✦ Email Security Training ✦ Network & Infrastructure Security Training ✦ Mobile Device Security Training 🌐 CVE Recognition ✅ CVE on TrendMicro - CVE-2021-31521 I am ready to bring my experience, skills, and innovation to meet your cybersecurity needs.Network Security
Cyber Threat IntelligenceWebAPITestingWeb App Penetration TestingMobile App TestingEthical HackingSecurity InfrastructureWeb Application SecurityWebsite SecuritySecurity Assessment & TestingKali LinuxMetasploitSecurity TestingDatabase SecurityPenetration Testing - $35 hourly
- 5.0/5
- (53 jobs)
Service 1: Helpdesk IT Support Tier 2 As a highly experienced IT professional with over 10 years of expertise in Helpdesk IT Support Tier 2, I am dedicated to providing exceptional technical support to businesses of all sizes. My service encompasses a wide range of activities aimed at ensuring the efficient functioning of your IT environment. Here's what you can expect from my Helpdesk IT Support Tier 2 service: Advanced Troubleshooting: I have a deep understanding of IT systems, networks, and software applications. When issues arise, I can quickly identify the root cause and provide effective solutions, minimizing downtime. User Assistance: I offer prompt and friendly assistance to end-users, helping them with technical issues, software installations, account setups, and general IT-related inquiries. Ticket Management: I am well-versed in ticketing systems and can efficiently manage and prioritize support requests, ensuring that critical issues receive immediate attention. Remote Support: With the ability to provide remote support, I can resolve issues efficiently without the need for on-site visits, reducing costs and minimizing disruptions. Documentation: I maintain comprehensive documentation of support activities, including solutions to common problems, to facilitate knowledge sharing and future reference. Escalation Handling: In cases that require Tier 3 support or specialized attention, I am proficient in escalating issues to the appropriate teams or experts. Software and Application Support: I am experienced in supporting a wide array of software and applications, including Microsoft Office Suite, Adobe products, email clients, and more. Service 2: Server Administration Tier 3 With over a decade of hands-on experience in Server Administration Tier 3, I offer specialized expertise in managing and optimizing server environments. My service is tailored to meet the specific needs of your organization's server infrastructure. Here's what you can expect from my Server Administration Tier 3 service: Microsoft Azure Cloud Services: I am well-versed in Microsoft Azure, including the provisioning, configuration, and management of virtual machines, storage, and other Azure services. I can help you leverage the cloud for scalability, cost-efficiency, and flexibility. Server Deployment and Maintenance: I have a proven track record in setting up, configuring, and maintaining Windows and Linux servers, ensuring they operate at peak performance. Security and Compliance: I implement robust security measures to protect your servers and data, including regular updates, firewall configuration, access controls, and compliance with industry standards. Backup and Disaster Recovery: I design and implement reliable backup and disaster recovery solutions to safeguard your critical data and minimize downtime in case of unforeseen events. Performance Optimization: I continuously monitor server performance and fine-tune configurations to ensure optimal resource utilization and response times. Firewall Expertise: I have extensive experience working with various firewall technologies, including FortiGate, Fortinet, Sophos, WatchGuard, and SonicWALL. This expertise allows me to secure your network infrastructure effectively. Patch Management: I handle patch management, applying updates and security patches to servers in a timely manner to mitigate vulnerabilities. 24/7 Monitoring: I offer round-the-clock monitoring to detect and address server issues proactively, reducing the risk of service interruptions. Documentation and Reporting: I maintain detailed documentation of server configurations, changes, and performance metrics. Regular reporting keeps you informed about the health and status of your server infrastructure. Scalability Planning: I work with you to plan for future growth, ensuring your server infrastructure can scale seamlessly to accommodate your organization's evolving needs. My commitment to excellence, in-depth technical knowledge, and extensive experience makes me the ideal partner for all your Helpdesk IT Support Tier 2 and Server Administration Tier 3 requirements. I look forward to collaborating with you to optimize your IT environment and drive your business's success. I’m ready willing to help as much as possible in your organization/Business tech issues. Looking forward to reply your queries.Network Security
Microsoft Endpoint ManagerGoogle Workspace AdministrationTechnical SupportMicrosoft ServerManaged ServicesFreshworks CRMMicrosoft Certified Information Technology ProfessionalSecurity ManagementMicrosoft AzureRemote IT ManagementIT SupportComputerServer VirtualizationEnd User Technical Support - $50 hourly
- 5.0/5
- (219 jobs)
I am a 2x Certified Elastic Stack (ELK) Engineer and successfully designed and implemented over 200 Elasticsearch projects, managing hundreds of terabytes of data for different use cases. My expertise include consulting and implementation of the Elastic Stack, including Elasticsearch, Kibana, and Logstash. I specialize in cluster architecture, setup, configuration, scalability optimization, maintenance, and integration with databases, third-party tools, and custom data sources. My key skills are 1. Data Processing and Pipeline Development: Expert in crafting complex ingest and Logstash pipelines for efficient data cleaning and transforming raw logs into structured data. 2. Advanced Integrations and Tooling: Skilled in integrating Elastic Stack with machine learning, Generative AI (RAG), Elastic Agent, filebeat, metricbeat, auditbeat, winlogbeat, uptime monitoring, APM, Kibana Canvas, and other Elastic tools. 3. Specialized Applications: Implemented Elastic Stack solutions for a variety of applications, including log analytics, SIEM, cybersecurity, full-text search, data analytics, and reporting. If you’re seeking support for implementation, upgrades, maintenance, optimization, cluster review, or proof-of-concept development around the Elastic Stack, I’m here to help. Additionally, I provide migration services from other platforms such as Solr, OpenSearch (OpenDistro), QRadar, and Splunk.Network Security
IT InfrastructureObservational Data AnalysisGrok FrameworkKibanaLogstashFirewallElasticsearchApache LuceneFull-Text SearchSphinxApache SolrMySQL - $15 hourly
- 5.0/5
- (5 jobs)
I have 6+ Years Experience in Removing Malware, Penetration Testing, Vulnerability Assessments, Ethical Hacking, Network Security.. familiar with python, java, php, JavaScript . I found many vulnerability such as XSS . there are so many i cannot remember as i hunt for the every day, almost all vulnerability types related to web application security i.e RCE, LCE ,RFI , LFI , Arbitrary file upload, SQL injection, XSS etc. Well, honestly, little of everything, First of all, I don't only hunt vulnerabilities on websites having bug bounty program, I also report to websites that do not have them. Some to get listed in responsible disclosures and of course to make the world a better place. I use my personal tactics to discover bugs and vulnerabilities in a website and web application. My all set of skill listed below . + Internal and external network penetration tests + Web and mobile application penetration tests + Wireless penetration tests + Social engineering security testing (physical, pre-text calling, and phishing) + Cleaning database from malicious codes and spams + Cleaning Malware and Phishing pages from your hacked all framework websites + Cleaning database from malicious codes,spam links and other kind of spams. + Secure Database Functionality + Code Review + Distributed denial of service (DDoS) testing + Other customized and threat-focused penetration testing + Ethical Hacking Training + Fully report when vulnerability found step by stepNetwork Security
Data ExtractionData ScrapingWordPress Malware RemovalVirus RemovalInformation SecurityVulnerability AssessmentPenetration Testing - $30 hourly
- 5.0/5
- (5 jobs)
I'm an experienced and passionate Information Security SOC Analyst (Level 3) based in Karachi, Pakistan. With 5+ years of hands-on experience in cybersecurity, I specialize in delivering Managed Security Services (MSSP) to global clients helping organizations detect threats, respond to incidents, and strengthen their overall security posture 🛡️ Whether you're aiming to boost your threat detection, build a robust incident response program, or automate your security workflows for greater efficiency I’m here to help💡 📞 I'm also available for meetings to discuss your project needs in detail and explore how I can add value to your security operations. 📅 🔐 What I Bring to the Table: As a Level 3 SOC Analyst in an MSSP environment, I’ve worked with multiple international clients, managing security monitoring, proactive threat hunting, and advanced incident response. My work also includes designing IR Playbooks and DFIR procedures, giving clients a structured approach to security operations. 🧠 Core Skills & Strengths: ✅ Proactive Threat Hunting & Detection ✅ Incident Response & DFIR ✅ Playbook Creation (Malware, Phishing, C2, IOC-based threats, etc.) ✅ Use Case Development based on client environment ✅ Timely task execution & dependable delivery ✅ Clear & professional communication ✅ Strong teamwork & interdepartmental collaboration ✅ Well-versed in reporting and documentation 🔧 Tools & Technologies I Work With: 🧠 SIEM: QRadar, Splunk, Sumo Logic, Microsoft Sentinel 🛡️ EDR/MDR/XDR: CrowdStrike Falcon, ReaQta, Microsoft Defender, KATA 🖥️ EPP: Kaspersky Security Center ⚙️ SOAR: SIRP, Sumo Logic 🌐 NDR: DarkTrace 🔍 ATP: Trend Micro DDI 📧 Email Security: Trend Micro DDEI, Proofpoint, Mimecast 🌐 Cloud Security: Netskope 🛠️ Vulnerability Tools: Zenmap, Tenable Nessus 🧾 Services Offered: 🔹 24/7 Monitoring of Security Tools (SIEM, EDR, WAF, etc.) 🔹 Use Case Creation and SIEM Implementation 🔹 Incident Response Plan Development 🔹 EDR Workflow Automation 🔹 IOC Blocking & Response Tuning 🔹 Threat Intelligence Hunting & DFIR 🔹 Security Reporting – Daily, Weekly, Monthly 🔹 Ticket Creation & Escalation (SOAR Integration) 🤝I’m friendly, approachable, and easy to collaborate. 📩 Let’s connect and make your security posture stronger than ever!Network Security
Incident ManagementSOC 3SOC 2SOC 1Cybersecurity ManagementCybersecurity MonitoringCrowdStrikeInformation Security Threat MitigationThreat DetectionEmail SecuritySecurity Operation CenterRoot Cause AnalysisInformation SecurityIncident Response Plan - $30 hourly
- 5.0/5
- (10 jobs)
I am a highly skilled and certified cybersecurity professional with over 10 years of experience in safeguarding businesses against cyber threats. My expertise includes risk assessment, NIST-CSF, ISO 27000, ethical hacking, vulnerability assessments, penetration testing, and implementing robust security solutions. I have a proven track record of helping clients enhance their cybersecurity posture and protect sensitive data. Let me secure your digital assets and provide peace of mind. Key Skills: • SANS Top 25 detection • OWASP Top 10 detection • Vulnerability Assessment • Penetration Testing • Network Security • Source Code Review • Web / Mobile / Desktop Application Security • Application Security Architecture Review • Information Security Policy Development • Incident Response • Compromise Assessment • Security Awareness Training • Compliance (PCI DSS, GDPR, HIPAA) • ISO 27000 Gap Assessment / internal Audit / Readiness / Implementation • NIST • Risk Assessment and Management • CIS Top 18 • Forensics (Acquisition, Imaging, Documentation) • Application Stress Testing • Data Privacy Tools: • Nessus • Nexpose • Burp Suite • Core Impact • Metasploit • Acunetix • HCL Scan • SonarQube • JMeter • SQL Map Certifications: • CISM (Certified Information Security Manager) • OSCP (Offensive Security Certified Professional) • C) PTE (Penetration Testing Engineering) • C) VA (Certified Vulnerability Assessor) • CHFI (Computer Hacking Forensics Investigator) • C) SS (Certified Security Sentinel) Why Choose Me: • Proven Expertise: I have successfully helped numerous clients secure their businesses against cyber threats. • Custom Solutions: Tailor-made security solutions to fit your unique business requirements. • Client Education: Empowering clients with knowledge about cybersecurity best practices. • Timely Delivery: Punctual delivery of high-quality results within specified deadlines. Let’s Secure Your Future: I am dedicated to ensuring your digital assets are protected from evolving cyber threats. Let’s discuss how I can enhance your cybersecurity strategy and provide you with the peace of mind you deserve. Feel free to reach out to me for a detailed discussion about your cybersecurity needs.Network Security
ISO 27001Information Security AuditInternet SecurityWebsite SecurityInformation Security GovernanceCybersecurity ManagementVulnerability AssessmentSecurity TestingKali LinuxInformation SecurityPenetration Testing - $15 hourly
- 5.0/5
- (9 jobs)
🚀 Experienced Senior Infrastructure and Network Engineer 🌐 | Network Security Specialist 🔒 | IT Professional 💻 🔹 Key Strengths & Expertise Cloud Infrastructure Design & Implementation: Proficient in deploying scalable and cost-effective cloud solutions tailored to meet business needs, improving performance, reliability, and security. Network Security & Management: Certified Network Security Associate (NSE) by Fortinet with expertise in firewall management, risk assessment, and vulnerability management. I ensure your network is resilient against potential threats. Cloud Networking: Advanced knowledge in AWS, Azure, and Google Cloud Platform. Experience in designing network topologies, managing hybrid cloud environments, and optimizing cloud resources for performance and cost-efficiency. System Administration: Expertise in administering servers, databases, and network devices. Skilled in Linux and Windows OS, ensuring smooth operation and minimal downtime. Troubleshooting & Optimization: Proficient in using advanced diagnostic tools such as Packet Tracer and GNS3 for troubleshooting network issues and optimizing performance. Automation & Scripting: Experience with Python and C Language, enabling automation of routine tasks, enhancing network performance, and reducing manual interventions. 🎓 Education: BSc. in Electronics Engineering from The Islamia University of Bahawalpur MSc in Information Security from NED University of Engineering and Technology, Karachi 💼 Work Experience: Senior Infrastructure and Network Engineer Level-2 at RapidCompute, spearheading the design and implementation of robust cloud infrastructure solutions. (Nov 2023 – Present) IT Engineer Level-1, with hands-on experience in network monitoring, system administration, and technical support. (Mar 2022 – Oct 2023) 🔧 Skills and Certifications: Certified Network Security Associate (NSE) by Fortinet, with expertise in firewall management and cybersecurity strategies. Networking certifications from Cisco, proficient in configuring and troubleshooting network devices and protocols. Proficient in tools like Packet Tracer, GNS3, MS Office, Linux, Power BI, Matlab, Python, and C Language. 🏆 Achievements: Recognized as one of the top 30 ICT students of Pakistan by HEC for the Huawei Seeds for the Future Program in 2020 and 2021. Demonstrated leadership skills as Chairperson and Vice Chair in IEEE, showcasing commitment to professional development and community engagement. 💡 Summary: With a proven track record in infrastructure design, network engineering, and system administration, I bring a blend of technical expertise, leadership, and a passion for innovation to every project. From optimizing cloud infrastructure to implementing robust security protocols, I am committed to delivering results that drive organizational success. Let's collaborate to bring your projects to life and achieve your business objectives!Network Security
MathematicsPower ElectronicsAmplifiers & FiltersIntegrated CircuitCircuit DesignX86 Assembly LanguageLab ReportScriptingCiscoIT SupportCybersecurity ToolNetwork Traffic AnalysisNetwork DesignDifferential CalculusAnalog ElectronicsCalculusElectronic Circuit DesignMATLABC++ - $20 hourly
- 5.0/5
- (16 jobs)
I am an expert in information security, having worked as an information security analyst for several prestigious financial organizations. I have extensive exposure to Cyber security deployment, integrations, SOC operations, Incident response and phishing email analysis and web takedowns. hands-on experience with the SIEMs listed below for monitoring, use-case creation, parsing/mapping, and device integration. - IBM Qradar - LogRhythm - Wazuh - Securonix - Alienvault - Practical experience with the EDR/XDR indicated below for in-depth research and triage analysis. -TrendMicro Vision one - Symantec SEPM - Fidelis EDR - Hands-on experience of preventing organization from brand impersonation through Digital risk protection tools. - Skurio. -CTM360 - Hands-on experience of using and monitoring listed network security controls for the detection of anomalies and policy violations. - Fortigate IDS/IPS Firewalls. - Cisco IDS/IPS Firewalls. - Cisco Ironport Proxy - F5 WAF - Cloudflare - I am a technical cybersecurity researcher and writer adept at unraveling complex security concepts and communicating them effectively for diverse audiencesNetwork Security
Cybersecurity ToolCyber Threat IntelligenceCybersecurity MonitoringInformation SecurityNetwork Operating SystemMalware DetectionUse CaseLogRhythmIBM CloudBug InvestigationNetwork MonitoringEmail SecuritySecurity AnalysisSecurity Operation Center - $20 hourly
- 5.0/5
- (7 jobs)
Hello, My name is Muhammad Waqas. I am dadicated and hardwork network security engineer who believes in honesty and good working relations. Though i am professional at this sector of job but i have certain qualities which make me good at this. I am graduate in beachlors in Computer system and information technology .My skills and education background helps me to perform accroding to my client's expectation. I am very skilled in network security and engineering administration of an enterprize network and provide you professional services on a decent rates. I am very much confident of our succession together as i am punctual and creative. I look forward to hear from you soon. Thank You. Expertise • MPLS • L2/L3 MPLS VPN • VRF • Routing Protocols(BGP,OSPF,EIGRP,RIPv2) • Fortigate 600D,100E, FortiAnalyzer 200D • PaloAlto 220 • Ubiquiti Controller and UNIFI Access Points • Cisco Routers 72xx,76xx and switches 29xx, 35xx,37xx, Huawei switches S5720 & CE6810LI,C9300stack switches • IPSec and GRE Tunnels • IPSec /SSL VPNS • Network Virtualization NSX • Network Optimization • Layer 2 QOS • Network Monitoring : STG, CACTI, Nagios Core, Solarwind, MRTG,Network Security
Mikrotik RouterBOARDNetwork PlanningVMWareAmazon EC2Palo Alto FirewallsLinux System AdministrationUbiquitiPfSenseUbuntuNetwork DesignCisco RouterCisco Certified Network ProfessionalMikroTik RouterOSCisco ASA - $35 hourly
- 0.0/5
- (0 jobs)
I have experience for firewalls, proxies, SIEM, antivirus, and IDPS concepts. Understanding how to identify and mitigate network vulnerabilities. Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact.Network Security
Intrusion Prevention SystemSecurity TestingIBM WatsonSplunkLinuxCrowdStrikeSystem SecuritySecurity Operation CenterInformation SecurityRisk AssessmentCybersecurity MonitoringGap AnalysisDigital ForensicsReverse Engineering - $25 hourly
- 5.0/5
- (4 jobs)
Hi, This is Hooria Buksh! With 4+ years of experience in Technical Writing, Research, SEO, and Digital Marketing, I specialize in creating well-researched, SEO-optimized content tailored for DevOps, Blockchain, AI, Cybersecurity, and Crypto industries. Core Expertise: ✅ Technical Research & Documentation ✅ SEO-Optimized Articles & Blogs ✅ Keyword Research & Competitor Analysis ✅ Content Strategy for Websites & Social Media SEO & Research Tools I Use: ⭐ SEMrush ⭐ Ubersuggest ⭐ Grammarly Why Choose Me? ⭐ In-Depth Research for Accurate Insights ⭐ Keyword-Rich, Engaging Technical Content ⭐ Error-Free & SEO-Friendly Writing ⭐ Clear Communication & Timely Delivery Let’s collaborate to turn complex ideas into impactful content! 🚀Network Security
Research & StrategyAcademic WritingCloud ComputingArtificial IntelligenceDevOpsTechnical WritingScriptwritingBlog WritingWordPressWebsite ContentOn-Page SEOSEO WritingCreative WritingArticle Writing - $20 hourly
- 4.9/5
- (28 jobs)
Available to work during 𝗘𝗦𝗧 🕐, 𝗣𝗦𝗧 🕘, 𝗖𝗦𝗧 🕓, 𝗠𝗦𝗧 🕒, and 𝗔𝘂𝘀𝘁𝗿𝗮𝗹𝗶𝗮𝗻 𝗧𝗶𝗺𝗲𝘇𝗼𝗻𝗲𝘀 🕖 I am an 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 with in-depth exposure to 𝗜𝗻𝗰𝗶𝗱𝗲𝗻𝘁 𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗲🚨 and 𝗦𝗢𝗖 𝗢𝗽𝗲𝗿𝗮𝘁𝗶𝗼𝗻𝘀 🛡️. I bring extensive experience in managing SOC customers across financial 💰 and non-financial industries, coupled with the successful development of Managed Security Services for vendor firms, including: ✔️ SOC as a Service 🖥️ ✔️ Threat Intelligence Service 🕵️♂️ ✔️ SOC Gap Assessment Service 📊 𝗧𝗲𝗰𝗵𝗻𝗶𝗰𝗮𝗹 𝗘𝘅𝗽𝗼𝘀𝘂𝗿𝗲 🧑💻 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻 & 𝗠𝗼𝗻𝗶𝘁𝗼𝗿𝗶𝗻𝗴 𝗧𝗼𝗼𝗹𝘀 ✔️ Proficient in Microsoft XDR for detecting advanced attacks 🚨. 𝗦𝗢𝗔𝗥 (𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗢𝗿𝗰𝗵𝗲𝘀𝘁𝗿𝗮𝘁𝗶𝗼𝗻, 𝗔𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗼𝗻, 𝗮𝗻𝗱 𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗲) 🛠️ ✔️ Developed playbooks and managed alerts using: ✔️ IBM Resilient ✔️ LogSign SOAR ✔️ SIRP 𝗦𝗜𝗘𝗠 (𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 𝗮𝗻𝗱 𝗘𝘃𝗲𝗻𝘁 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁) 📈 ✔️ Hands-on experience in monitoring, use-case development, and integration of devices with: ✔️ IBM QRadar ✔️ LogPoint ✔️ LogSign 𝗘𝗗𝗥 (𝗘𝗻𝗱𝗽𝗼𝗶𝗻𝘁 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻 𝗮𝗻𝗱 𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗲) 🔎 ✔️ Performed detailed investigations and triage analyses using: ✔️ FireEye (HX/NX/EX) 🔥 ✔️ Trend Micro EDR ✔️ Windows Defender 🛡️ ✔️ Carbon Black 𝗕𝗿𝗮𝗻𝗱 𝗣𝗿𝗼𝘁𝗲𝗰𝘁𝗶𝗼𝗻 & 𝗧𝗵𝗿𝗲𝗮𝘁 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻 ✔️ Prevented brand impersonation using: ✔️ Skurio Breach Alert 🛑 ✔️ CTM360 🌐 𝗔𝗻𝘁𝗶𝘃𝗶𝗿𝘂𝘀 & 𝗘𝗻𝗱𝗽𝗼𝗶𝗻𝘁 𝗣𝗿𝗼𝘁𝗲𝗰𝘁𝗶𝗼𝗻 🦠 ✔️ Detected policy violations and viruses through: ✔️ Symantec ✔️ Kaspersky ✔️ Trend Micro ⚡ With a diverse skill set and hands-on expertise across a broad spectrum of security tools, I ensure the protection, detection, and response essential for robust cybersecurity operations. 🛡️Network Security
AWS Cloud9HIPAASOC 2SOC 1Governance, Risk Management & ComplianceEthical HackingComputer NetworkCisco Certified Network AssociateSecurity AnalysisNetwork Penetration TestingDigital ForensicsSecurity Policies & Procedures DocumentationInformation Security ConsultationVulnerability Assessment - $35 hourly
- 0.0/5
- (0 jobs)
Certifications I Hold: CEH - Practical ( Certified Ethical Hacker) CNSP ( Certified Network Security Practitioner) CAP ( Certified Appsec Practitioner) PEH ( Practical Ethical Hacking) PWST (Practical Web Application Security Testing) To whom it may concern, Over the years, I have conducted numerous Penetration Tests and Security Assessments, focusing extensively on Web and Mobile (Android and iOS) applications, API security, and infrastructure hardening. My experience spans a diverse range of industries, including finance, with technologies implemented using various frameworks. I deliver prompt and professional responses tailored to your unique security needs. You can consider me an extension of your team, dedicated to helping you strengthen your security posture. Sample reports are available for those interested in my approach and results. My expertise has been acknowledged by the following organizations, which have featured my name in their prestigious Hall of Fame: 1. Dropbox 2. Sophos 3. Western Union 4. Patreon 5. cPanel 6. Unilever Let’s collaborate to secure your digital assets effectively! Client Testimonials "Sammam participated in our Bug Bounty program. He helped us to find vulnerabilities in our software solution. The cooperation was very professional and friendly at every moment. Thank you so much!" - Daniel Scherrer - Abraxas "Sammam was a helpful member of our bug bounty program and reported several issues to us responsibly, and tracked them through to resolution." - Nicholas Firth - Lyssna "Sammam advised Megekko.nl at implementing and improving some of the security features of the website. He gave us complete information in his report." - Remi Romme - MegekkoNetwork Security
Application SecuritySonarQubeBug BountySQL Injection MitigationNetwork Penetration TestingWeb App Penetration TestingEthical HackingPenetration TestingInformation SecuritySecurity TestingMetasploitKali LinuxVulnerability Assessment - $30 hourly
- 5.0/5
- (1 job)
I am a highly experienced cybersecurity engineer with over 6 years of expertise in protecting organizations from digital threats. With a strong background in network security, encryption protocols, and intrusion detection systems, I have successfully developed and implemented comprehensive security strategies, conducted vulnerability assessments, and responded to incidents promptly. I am proactive in educating teams on best practices and ensuring regulatory compliance. Let me handle your cybersecurity needs and safeguard your digital assets effectively.Network Security
Risk ManagementSystem HardeningSplunkRisk AssessmentCrowdStrikeCloud SecurityCloud Security FrameworkSOC 2Incident Response PlanPenetration TestingApplication SecurityDigital ForensicsVulnerability AssessmentSystem Security - $75 hourly
- 0.0/5
- (0 jobs)
Enthusiastic Network and System Engineer / Administration with several years of professional experience is looking for a challenging career move into Network Engineer / Administrator. Profile * More than 14 years of experience in IT, Network and System engineering/Administration, System Support, and management activities in Pakistan with a reputed organization. * Hold a 4 year Bachelor's Degree in Computer Science from a national university of Pakistan. * Well-versed in Network Engineering & system Administration. * Well experienced in training staff. * Can achieve organizational goals by building an effective team. * Strongly commercial with excellent communication and interpersonal skills.Network Security
FortiGate FirewallCisco Certified Network ProfessionalProxmox VEVMware ESX ServerJuniperFirewallVPNCloud ComputingVirtualizationRoutingDocker ComposeDockerNetwork EngineeringSystem Administration - $25 hourly
- 4.9/5
- (100 jobs)
I am certified and experienced IT professional. Over the past 15 years, I have accumulated a vast range of experience which entails me to tackle most IT situations. My core area is assessment of internal control environment for information systems and critical IT processes; evaluating system of internal control and risk management; pre & post implementation reviews; security reviews of operating system, database and applications/ERP(s). I have specialized in information and cybersecurity management and compliance, IT security risk, IT audit and policy writing with 15 years of experience (CISA, CDPSE and CISSP certifications), and proven ISO 27001 Lead Implementation practice. I can help organizations with ISO 27001, SOC 2, HIPAA, and PCI-DSS compliance framework implementation identifying the best solutions and managing the whole process (requirements identification, solution selection, implementation, documentation, certification). If your company need to update its policies and procedures or need to create new ones for: - a due diligence process/RFP security questioner, - you want to be compliant for regulatory reasons (PCI-DSS, GDPR, CCPA, HIPPA,) - you are aiming at security certification (ISO 27001, SOC 2, HITURST CSF, HIPAA IRAP, FEDRAM, GDPR), - you just would like to level up your maturity in the security domain - simply just would like to consult and get informed of security best practices and need professional advice. Please don't hesitate to contact me! My skills in Information (IT) and Cybersecurity includes: - Information Security Policies based on NIST guidelines or ISO 27001 including Incident Response Plan, Acceptable Use, Encryption Policy, Risk management, Audit logging, and monitoring policy, User account and access management, Asset management, Data Classification, Change Management, Vulnerability and patch management, Asset Disposal, Third-party Management, Security Configuration, and many more. - Business Continuity Planning and Disaster Recovery Planning (BCP, DRP), PIA & TRA, investigating cyber and information security incidents, - Policy reviews, GAP analysis, - IT audit - Risk assessment, - Evaluation of operation/technology/procedure against current industry best practices or regulatory requirements. - Information security awareness training and training material - Compliance specific training (GDPR, SOC2, NIST. RISK management). My Certifications: CISSP - Certified Information Security Professional - Certification No 302621 CISA - Certified Information System Auditor - Certification No 161318 83 ITIL Foundation, CBAP - Certified Business Analysis Professional As a Project Manager some of the solution technologies I have managed the projects on AWS, GCP, Unix, Linux, Oracle, CISCO, Solarwind, Windows Server Tools: Pen-testing/InfoSec Tools: Kali Linux, Acunetix WVS, Nmap and Metasploit pro SIEM: ManageEngine, Solarwind , OSSIM Project Management: MS project, Asana, JIRA, Slack and ZenDesk Office tools: Google Docs, Drop box, and office 365 Specialties.Network Security
ISO 27001GDPRNetwork AdministrationLinux System AdministrationData PrivacyCompliance ConsultationData ProtectionSaaSTechnical WritingInternet SecurityDisaster RecoveryVMware AdministrationInformation SecurityPenetration Testing - $40 hourly
- 5.0/5
- (1 job)
I am a highly skilled IT professional with over 12 years of extensive experience in network and system administration, specializing in advanced firewall management, comprehensive network security strategies, Linux server optimization, and penetration testing methodologies. My expertise lies in safeguarding network infrastructures and enhancing system resilience through a proactive risk assessment approach and the implementation of best practices. Certifications: CCNA Routing and Switching. Brocade BVCRE. CCNP Route, CCNP Switch. Technical Skills Operating Systems: Highly proficient in CentOS, Red Hat, Ubuntu, and Debian. Open Source Solutions: In-depth knowledge of open-source solutions, network management systems, and deployment strategies. Server Management: Proven skills in managing various server types, including: Mail Servers FTP Servers VPN Servers Hypervisors Web Servers Database Servers Network Management System (NMS) Servers DHCP and Gateway Servers Networking: Expertise in configuring and managing servers, routers, switches, DNS, NAT, VLANs, subnets, TCP/IP, DHCP, and VOIP. Proficient in server security using IPTables and TCP Wrapper. Knowledge of network protocols such as HSRP, VRRP, GLBP, OSPF, EIGRP, BGP, VTP, RSTP, MSTP, and NetFlow. Automation: Automation skills using Shell and Python scripting, along with Cron jobs. File Systems: Experience in implementing fully redundant file systems via GlusterFS, rsync, and Unison. Mail Server Optimization: Expertise in custom configuration and optimization of mail servers. Virtualization: Experienced with KVM, XenServer, and VirtualBox. Cloud Solutions: Knowledgeable in cloud file storage/syncing solutions like OwnCloud and Seafile. Expertise in cloud infrastructure for IaaS (Virtual Machines) and DaaS (VDI). Network Management: Skills in managing firewalls, DHCP, proxies, and bandwidth shaping. Techniques using Samba, DHCP, and IPTables. Network Management Systems: Familiar with NMS servers such as Zabbix, Nagios, and Icinga. Logging and Monitoring: Experience with Elasticsearch and the ELK stack for enterprise logging. DNS Management: Deployment of Bind DNS servers. High Availability Solutions: Fully redundant Zimbra mail server deployment and experience with HA setups. Distributed File Systems: Proficient in OpenMediaVault and Openfiler-based central iSCSI target/Samba share storage. Experience with XtreemFS and GlusterFS for distributed high-availability replicated file systems. Collaboration Systems: Knowledgeable in OpenMeeting and BigBlueButton open-source collaboration systems. Database Management: Experienced in HA and replication strategies in MySQL, MariaDB, and Galera Cluster (Master/Master, Master/Slave). Vendor Equipment: Expertise in configuring devices from vendors such as Cisco, Juniper, Fortinet, Palo Alto, and Check Point. Hosting Platforms: Proficient in managing hosting environments such as DigitalOcean, GoDaddy, HostDime, and AWS. Vulnerability Assessment & Penetration Testing: Experience using tools like Burp Suite, Nessus, Maltego, OpenVAS, Nmap, and Wireshark for vulnerability assessment and penetration testing.Network Security
FortinetZabbixPenetration TestingLinux System AdministrationNetwork PlanningCentOSNagios CoreMySQLNetwork Monitoring - $20 hourly
- 0.0/5
- (1 job)
I am in Research from 2007 I have work in different projects in different companies like AUA solutions and F tech Solutions mostly projects are on Data Entry and Customer Support Executive.Network Security
Dorian Business Systems Charms Office AssistantMicrosoft AccessMicrosoft FrontPageMicrosoft PowerPointMicrosoft WordMicrosoft Excel - $30 hourly
- 0.0/5
- (1 job)
Unmask Vulnerabilities & Secure Your Apps: Mobile & Web App Pentesting Guarantee the security of your mobile and web applications with my comprehensive penetration testing service. I am a highly skilled penetration tester with 4+ years of experience in identifying and mitigating critical vulnerabilities in mobile and web applications. My approach leverages both automated and manual techniques to ensure a thorough assessment, adhering to industry-standard OWASP guidelines. My Services: In-Depth Vulnerability Assessments: I meticulously pinpoint weaknesses in your applications before attackers can exploit them. Comprehensive Penetration Testing: I simulate real-world attacks to discover even the most obscure vulnerabilities in your apps. Expert Patch Implementation: I recommend essential security patches to mitigate vulnerabilities discovered during testing. Clear & Actionable Reports: You'll receive easy-to-understand reports outlining identified threats, their impact, and actionable steps for remediation. Ongoing Security Guidance : Gain peace of mind with ongoing support packages that include regular re-testing and priority service. Why Choose Me? Proven Track Record: 4+ years of experience securing applications for clients. In-Depth Knowledge: Extensive expertise in penetration testing methodologies and OWASP standards. Clear Communication: I provide clear and concise reports with actionable recommendations. Dedicated Support: Get the support you need throughout the testing process and beyond . Additional Information: I hold industry-recognized certifications in IBM Cybersecurity, Barracuda WAF, THM Certified Penetration Tester, Actunix, and Invicti, demonstrating my technical expertise. As a passionate CTF competitor (Capture the Flag), I actively participate in these challenges to stay at the forefront of hacking techniques. Ready to fortify your applications? Contact me today to discuss your security needs!Network Security
SOC 2Microsoft Endpoint ManagerSOC 1Security Operation CenterIntrusion Prevention SystemIntrusion Detection SystemWeb Application FirewallNetwork Penetration TestingNIST Cybersecurity FrameworkCyber Threat IntelligenceVulnerability AssessmentCybersecurity ManagementPenetration TestingWeb App Penetration Testing - $20 hourly
- 0.0/5
- (0 jobs)
✅ 60+ Assessments ✅ One Year of Remote work Experience (UK) ✅ Professional Penetration Tester I’m a penetration tester and security consultant experienced in securing web applications, APIs, and external networks for businesses of all sizes. Whether you need a comprehensive security assessment, vulnerability remediation, or ongoing security consulting, I can help. Skills and Expertise: Web Application Penetration Testing based on OWASP TOP 10 API &Mobile Application Security Vulnerability Assessment Key Accomplishments: Conducted over 60 security assessments, ensuring robust protection for clients. Awarded MVP of Bugcrowd in 2022 for exceptional contributions. Successfully identified and mitigated critical vulnerabilities for various well-known organisations. Services Offered: Web Application Penetration Testing based on OWASP TOP 10 Comprehensive security assessments for API, and mobile applications. Detailed vulnerability reports with actionable remediation steps. Writing detailed technical reports including high-level and consultant-level summaries. Ongoing security consulting and support. Participation in bug bounty programs to uncover high-impact vulnerabilities. #Why Choose Me: Proven track record with over 60 successful assessments. Expertise in a wide range of security domains. Client-focused approach with tailored solutions. Regular communication to ensure project success. Regular communication is important to me, so let’s keep in touch. Let's work together to enhance your security posture and protect your valuable assets.Network Security
Mobile App TestingCybersecurity ToolInformation Security AuditOWASPEthical HackingBug BountyInformation Security ConsultationVulnerability AssessmentAPI TestingWeb Application SecurityPenetration Testing - $100 hourly
- 0.0/5
- (0 jobs)
Cybersecurity Services Lead | SOC | XDR | SIEM | Threat Intelligence | Managed Security Services I represent a team of seasoned Information Security professionals with hands-on expertise in SOC operations, incident response, and threat detection across diverse industries, including finance, telecom, and enterprise IT. Acting as your primary point of contact, I ensure streamlined communication, timely delivery, and end-to-end project oversight, while my team focuses on the technical execution. We offer a full suite of Managed Security Services, including: SOC-as-a-Service Threat Intelligence & Monitoring Vulnerability Assessment & Penetration Testing (VA/PT) SOC Gap Assessment & Compliance Reviews 🛡️ Our Technical Capabilities Include: XDR & EDR Tools Microsoft XDR, FireEye (HX/NX/EX), Trend Micro EDR, Windows Defender, Carbon Black SOAR Platforms IBM Resilient, LogSign SOAR, SIRP (for automated alert handling and playbook execution) SIEM Solutions IBM QRadar, LogPoint, LogSign (for log correlation, custom use-cases, parsing & integration) Email & Network Security Palo Alto, Fortigate, Cisco Firewalls (IDS/IPS) Email Security Appliances: Barracuda, Cisco, Microsoft Proxies: Sophos, Cisco DNS Protection: Infoblox Trend Micro Network Defense Suite (DDI, DDEI, DDWI) Brand Protection & Policy Enforcement Skurio Breach Alert, CTM360 (brand impersonation monitoring) Antivirus & DLP: Symantec, Kaspersky, Trend MicroNetwork Security
Web Application SecurityCybersecurity MonitoringCyber Threat IntelligenceApplication SecuritySecurity Assessment & TestingVulnerability AssessmentInformation SecuritySOC 3 ReportSOC 1 ReportSOC 2 ReportNetwork Penetration TestingNetwork MonitoringEthical HackingFirewall - $25 hourly
- 5.0/5
- (1 job)
I have many years of experience in installation, configuration, and troubleshooting networking and virtualization solutions using VMware products, cloud solutions(Azure)/migrations, Cisco Routers/Switches based on Microsoft Office 365, and security implementations using Fortigate. I also have experience in building and implementing complete (from the endpoint to the perimeter) projects for small/medium LAN/WAN environments using vmware/microsoft virtualization solutions, cisco datacenter networking/computing technologies (Nexus and UCS) and storage solutions based on iSCSI or NFS (NAS or SAN). SKILLS SUMMARY - Any system administration tasks - Operating Systems: any *nix (Linux, FreeBSD, SGI IRIX, SCO, Solaris, OSX), Windows /Me/XP/Vista/W7/W8/W10, WinServer NT/2K/2003/2008/2012/2016 - LAN & WAN: Ethernet, Fast Ethernet, Gigabit Ethernet, FDDI and Wireless LANs. T1/T3, SDH/SONET, Frame Relay, WDM, ISDN, ADSL, SHDSL, Cable Modems, Cellular, X.25. - Network Protocols: TCP/IP, IPv6, UDP, OSI, CDP, IP Multicast, IPSec, VoIP, Routing, VLANs, Bridging, Trunking, VPN, SNA, DLS, VPNs - Network Services & servers: SMTP/POP3/IMAP, FTP/SFTP, Telnet/SSH, HTTP/HTTPS, DNS, DHCP, NNTP, NTP, LDAP, SNMP, NETBIOS, Apache, Nginx, MySQL, Plesk, cPanel, Zimbra, VMware, CentOS, Ubuntu, Debian - Routing Protocols: OSPF, BGP, EIGRP - Network Equipment: various types of modems, firewalls, switches and routers. - Dedicated, VPS and cloud environment servers (Amazon AWS, Google Cloud, MS Azure).Network Security
Cybersecurity MonitoringNetwork MonitoringVMware ESX ServerNetwork AnalysisSecurity EngineeringNetwork EngineeringVMware AdministrationCisco Certified Internetwork ExpertMicrosoft AzureSystem Administration - $15 hourly
- 0.0/5
- (1 job)
An enthusiastic self-starter with strong leadership and communications skills. Proven academic and curricular achievements, and possess the right technical and soft skill required to propel an IT organization in achieving its goals and objectsNetwork Security
Research ProtocolsNetwork PlanningCloud ComputingMalware RemovalVirtualizationSophos Sophos UTMLinuxVPNOSPFDNSNetwork AdministrationRoutingMikroTikFirewall Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Network Security Engineer near Karachi, on Upwork?
You can hire a Network Security Engineer near Karachi, on Upwork in four simple steps:
- Create a job post tailored to your Network Security Engineer project scope. We’ll walk you through the process step by step.
- Browse top Network Security Engineer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Network Security Engineer profiles and interview.
- Hire the right Network Security Engineer for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Network Security Engineer?
Rates charged by Network Security Engineers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Network Security Engineer near Karachi, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Network Security Engineers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Network Security Engineer team you need to succeed.
Can I hire a Network Security Engineer near Karachi, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Network Security Engineer proposals within 24 hours of posting a job description.