Hire the best Penetration Testers in Florida

Check out Penetration Testers in Florida with the skills you need for your next job.
  • $120 hourly
    I am Miguel Febres, a seasoned Senior IT Consultant with over two decades of versatile experience across various technology-driven roles. My expertise spans WordPress, Desktop Development, Web Development, Web Scraping, and Software Architecture. My deep knowledge and hands-on skills have enabled me to deliver successful outcomes across diverse projects, contributing to strategic growth and efficient solutions for clients. A commitment to innovation, high-quality standards, and effective problem-solving in the IT domain marks my career. WordPress I have extensive experience crafting customized and scalable WordPress solutions, ranging from simple blogs to complex e-commerce platforms. My proficiency includes theme and plugin development, ensuring optimized performance and security. Technologies used: PHP, HTML, CSS, JavaScript, MySQL, WooCommerce, Elementor, WPBakery, Yoast SEO. Desktop Development With strong skills in designing and implementing robust desktop applications, I have led numerous projects that require critical thinking and software management. I focus on user-centric design alongside efficient execution. Technologies used: C#, .NET Framework, Java, Python, Electron, WinForms, WPF. Web Development With a rich knowledge of front-end and back-end technologies, I have built and maintained scalable web applications that address organizations' unique needs. I approach projects by balancing aesthetic design with functionality. Technologies used: HTML, CSS, JavaScript, React, Angular, Node.js, PHP, Django, Ruby on Rails. Web Scraping I specialize in developing efficient web scraping solutions to extract, clean, and manage large data sets from complex web sources. My experience ensures compliance with data guidelines while maximizing scraping proficiency. Technologies used: Python (BeautifulSoup, Scrapy, Selenium), Puppeteer, PHP (Guzzle), REST APIs. Software Architecture My expertise in software architecture enables me to design and guide the development of scalable and maintainable systems. I emphasize strategic planning and architectural best practices to deliver high-performing software solutions. Technologies used: Microservices, RESTful Services, AWS, Azure, Docker, Kubernetes, UML, Agile and DevOps methodologies. I am also a Cybersecurity Analyst and Cloud Engineer. Check my specialized profiles for more information.
    Featured Skill Penetration Testing
    Microsoft Azure Administration
    Microsoft Azure
    Azure DevOps
    Web Scraping
    Reverse Engineering
    Web Application
    .NET Core
    .NET Framework
    Encryption
    Ethical Hacking
    API
    C#
    Python
    Delphi
  • $65 hourly
    Dear Potential Client, I am Thomas Hinson, an experienced Agile Project Manager with a solid educational background, an MBA in Information Technology Management, and a Bachelor's in Cybersecurity and Information Assurance. With over 15 years of dedicated experience in the field, I bring a wealth of knowledge and expertise to help you successfully navigate your projects. My proficiency extends to various Agile methodologies, including Scrum and Kanban, and I am well-versed in utilizing tools such as Jira, Asana, and GitLab to streamline project management processes. I excel in translating high-level objectives into actionable Themes, Initiatives, Epics, and User Stories, facilitating a structured and efficient workflow. What sets me apart is my skill in coaching and collaborating with cross-functional teams, ensuring that everyone is aligned and working towards common goals. I have a proven track record of creating comprehensive project reports, plans, and strategies that drive success and deliver value to stakeholders. Furthermore, I understand the importance of effective communication with stakeholders and gathering their requirements to ensure project outcomes meet their expectations. If you're seeking a dedicated Agile Project Manager who can manage projects and elevate them to their fullest potential, I am here to help you achieve your goals. Let's collaborate to bring your projects to new heights. Sincerely, Thomas Hinson, MBA
    Featured Skill Penetration Testing
    Risk Analysis
    Wireshark
    Cybersecurity Monitoring
    Metasploit
    Ethical Hacking
    Network Mapper
    Project Management
    Security Assessment & Testing
    Information Security
  • $80 hourly
    A resolute and motivated initiative-taker with 10+ years experience in software quality assurance/automation, web services, APIs, front-end, SQL and back-end in waterfall and Agile environments. Cybersecurity with OSINT, Penetration testing and Vulnerability Assessment. Ability to take on new assignments and follow through to completion.
    Featured Skill Penetration Testing
    Manual Testing
    Vulnerability Assessment
    Usability Testing
    Selenium
    Automated Testing
    Software QA
    Desktop Application Testing
    Compatibility Testing
    Web Testing
    Functional Testing
    Regression Testing
    Performance Testing
    SQL
  • $125 hourly
    Unconventional Solutions, Uncommon Results. A study from the National Cybersecurity Alliance shows that 20% of businesses with less than 100 employees will experience a cyber attack each year and that 60% of those businesses fail within 6 months of the attack. Preparation is key, identify your critical assets, secure those assets, monitor/alert/and respond to incidents when they occur, including having a response plan. Chances are if it hasn't happened to you, it will or it already has happened and you just don't know. My goal is to bring the experience and skills acquired over 23 years working for large organizations to the entrepreneur community in an attempt to reduce the statistics above at a price point that is approachable to those impacted businesses. Common Services: Malicious Email/File/URL analysis - Did you get a phishing email with a link or attachment and not sure if it is legitimate, then this service is what you want. Surprisingly, this is my most often requested service. This service includes analyzing files(exe, office files, zip files, or pdf), email, or URLs to determine if it is malicious and what happens if the file is run or the url is visited. The service includes executing the file/url in a sandbox, review OSINT on the file using tools like virustotal, as well as use reversing techniques on the file. Email headers will be reviewed to determine origin and intent. If you clicked the link or opened the attachment, then you might need the next level of service, Incident Response. Website Malicious Content Removal - Once an attacker finds a vulnerability and exploits that to gain access to your website they sometimes deface your website, sometimes gain access to the data, put malicious code in your pages to impact your users, but always give themselves a way back in. Our job is to not only find and remove the malicious content but determine how it got there and how to prevent it from reoccurring. Security Consulting - Make sure you have the proper controls in place, including logging, to reduce the risk but also make sure you can detect and recover from an incident in a timely manner. Get some peace of mind on questions like are my backups safe in the event of a ransomware attack. Has my system already been breached? How would I know if my system is breached? A vulnerability assessment is a rather quick process to identify known security issues like missing patches or common misconfigurations. These are identified through an automated scan, but the most notable point of a vulnerability assessment is that the vulnerabilities are not verified, it is assumed that if the system is missing the patch, it is at risk. This type of test is usually quicker and cheaper and gets 75% of the “low hanging fruit”. A penetration test takes this a bit further beyond just identification but actually tries to exploit the vulnerability to validate risk. A penetration test also goes a bit further as it might also test weaknesses in good configurations, processes, and implementations, items that can not be scanned automatically. A pentest usually also contains a vulnerability scan as part of the process, usually takes longer, and costs a bit more. Application Testing/Fuzzing and 0 day exploit development - The purpose of testing an application using techniques like fuzzing, is to ensure that the application can handle different types and lengths of unexpected input without crashing as well as testing to see if application handles the exceptions properly. If the fuzzing process has identified a crash based on unexpected input, it might be possible to develop an exploit that allows an attacker access to the system or perform some other nefarious activity. An exploit that has not been disclosed publicly but is actively being exploited in the world is known as a 0 day exploit. Having this type of test performed on your applications before release, can go a long way to reducing the risk of an attacker finding it and using it to attack your clients. Web application testing is the process of not just testing the application itself against vulnerabilities like cross site scripting, cross site request forgery, or sql injection among others, but the entire web application infrastructure including the framework used like Rails or Spring MVC, the server OS (Linux/Windows), the web server software (IIS, Apache, Web Logic), the language used (PHP, ASP.Net), any middle tier applications, and the databases on the back end. A vulnerability scan is generally also part of this type of test.
    Featured Skill Penetration Testing
    Security Engineering
    WordPress
    Security Analysis
    DNS
    Malware Removal
    Metasploit
    Application Security
    Information Security Consultation
    Digital Forensics
    Vulnerability Assessment
  • $100 hourly
    With an insight into technology and its unique challenges, my wide berthed set of skills makes me a highly prized asset to any company. By selecting me, you are assured to receive the highest caliber professional, with an eye always geared towards balancing the needs of Business and those of Security and Stability. Well versed in networking and network security, as well as MS and Linux technologies.
    Featured Skill Penetration Testing
    Chief Architect
    Financial Audit
    GDPR
    Linux
    Governance, Risk Management & Compliance
    Network Engineering
    Certified Information Systems Security Professional
    Leadership Skills
    HITRUST Common Security Framework
    Check Point
    Amazon Web Services
    Information Security
    Firewall
  • $50 hourly
    John O’Donnell – Cyber Security Business and Channel Development Leader, Jupiter Florida John O’Donnell brings 25 years of experience in enterprise sales, channel development and service provider sales in both Cyber Security and Voice Security disciplines. John has developed Fortune 500 clients, Value Added Reseller, Distribution and Service Provider relationships in sell to and sell thru scenarios. He has also participated in developing and selling co-marketed solutions with Cisco and Microsoft. John created the Voice Security market in NYC by leveraging enterprise relationships to buy through channel partners vs buying direct. Through these efforts he got Verizon, AT&T and Presidio to onboard SecureLogix. John relocated to Florida when Covid impacted his career. John is consulting for Aligned Data and leveraged his personal brand to sign on global Distribution with TD Synnex and contracts with Oracle, AT&T and Validsoft. John worked for Cybereason as their NYC Sales Director with a focus on Managed Detection and Response Cyber Security solutions. Cybereason was in transition to a channel model and he developed NYC channels such as Sprint, Guidepoint and Presidio. John helped fill the top of the funnel for the region and one market impact example is his work with Sprint. He convinced the Sprint NYC sales team and Cybereason sales reps to prospect together on a ransomware topic and then recruited speakers to present. Those speakers were Sprints CEO, Former CTO of AT&T, Softbank portfolio manager and RSA’s former CISO. Mobile security for stopping ransomware as an MDR offering was established. This 1st event allowed John to be invited as a speaker for a Sprint NYC SLED team event with 20 prospects. With McAfee Security, he sold to new clients and renewal contracts to multinational clients John is also involved in a security organizations such as ISACCA, OWASP, ISSA, Hack NYC and CREST. Below are 2 channel examples where John was the top sales person and transitioned each company to a channel model. With Vocaltec, John’s sales eclipsed a 15 million in revenue selling to a global service provider called ITXC, now owned by TATA communications. Renewal sales and a global pro services contract renewal were part of the global strategy with this client. John transitioned ITXC to become a global channel partner. While at Securelogix, John’s leadership by example created a companywide sales revenue increase of 140%. One major service provider deal became a 2012 Cisco live keynote demo performed by John Chambers. NYC's largest city department is a 2 time client of John's and for 32k users. Other Past clients include: BNP Paribas, Comcast, New York City DOITT, NYPD, CUNY, Depository Trust Clearing Corp, Hospital for Special Surgery, White & Case, State Street Bank, Bloomberg, British Telecom, NYC Dept of Social Services, State Street Bank and the State of New Jersey. Channel Partners include: Sprint, Verizon, AT&T, Presidio, Ciphertechs, Optiv, World Wide Technologies, Guidepoint, Presidio, Cerner and more. I look forward to meeting in person soon. John O'Donnell Cell 610-213-2468 Johnodo15@gmail.com
    Featured Skill Penetration Testing
    Social Engineering Assessment
    Oracle
    Cloud Security Framework
    Cloud Security
    OWASP
    VoIP
    SaaS
    Network Security
    Database Security
    Cisco
    Channel Setup & Optimization
    Network Penetration Testing
    Cloud Computing
    Salesforce CRM
  • $200 hourly
    🌟 TOP RATED PLUS Cybersecurity Consultant with 100% Job success rate 🌟 ✅ Penetration Testing: Standard, Web application, mobile applications. ✅ Compliance: CMMC, DFARS, NIST 800-53, NIST 800-171, PCI, HIPAA, GDPR, ISO, SOC, SOX, GLBA, FedRAMP, CCPA, and more. ✅ Incident Response: Ransomware recovery, hacking response, forensic investigations. ✅ vCISO: Virtual Chief Information Security Officer ✅ Vulnerability Management: Vulnerability Scanning Hello, It is great to meet you (virtually)! My name is Tyler. I have over 15 years of cyber-security experience in multiple verticals. I have worked with fortune 500 brands, government, military, and intelligence agencies. 🌟 I have provided expert cybersecurity and compliance consulting for startups to hundreds of businesses! 🌟 My core expertise resides in: compliance and governance (PCI, HIPAA, SOC 2, NYSDFS, CMMC, DFARS, ISO, NIST, GDPR, and more), ethical hacking, incident response, penetration testing, secure design and architecture, and public speaking. I am an excellent writer and also possess business savvy. Pairing technical expertise with exemplary writing skills is my forte. I am also fluent in Brazilian Portuguese. I currently hold the following educational degrees and certifications: ✅ Master of Business Administration (MBA) ✅ Bachelor of Science in Cyber-Security ✅ Certified Information Systems Security Professional (CISSP) ✅ GIAC Certified Incident Handler (GCIH) ✅ GIAC Security Essentials Certification (GSEC) ✅ Microsoft Certified Systems Expert (MCSE) ✅ Microsoft Certified Systems Administrator (MCSA) ✅ Microsoft Certified IT Professional (MCITP) ✅ CompTIA Security+ ✅ CompTIA A+ ✅ CIW Web Design Associate WHY CHOOSE ME OVER OTHER FREELANCERS? -Professionalism: I treat all clients with respect and honor their trust in my services. -Expertise: I have expertise across many cybersecurity, information technology, and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. -Dedication: When i take on a task or project, you deserve my undivided attention and focus! -Versatility: I can easily pivot from many different tasks. Whether your project is a standard penetration test or a Chief Information Security Officer engagement, I have the ability, knowledge, experience, and credentials to adjust based on your requirements. -I have led over 150 incident response cases. -I have brought over 75 organizations to full compliance for DFARS, NIST, PCI, HIPAA, GDPR, and more. -I have conducted over 200 penetration tests. ✅ I will ensure that you get the results that you deserve. My clients trust me to complete their tasks and I ALWAYS deliver! Whether you are seeking a long term partner or a short term project, I am ready to deliver the high quality results that you deserve.
    Featured Skill Penetration Testing
    Certified Information Systems Security Professional
    HIPAA
    Defense Federal Acquisition Regulation Supplement
    Policy Writing
    GDPR
    Internet Security
    Security Analysis
    Information Security
    Encryption
    Security Assessment & Testing
    Application Security
    Incident Response Plan
    Vulnerability Assessment
    Network Security
  • $55 hourly
    Information Technology Management with over 10 years of experience in cyber security, IT management, computer repair, computer networks and IT Customer support. Skilled with endpoint security, firewalls, cloud security, and threat hunting.
    Featured Skill Penetration Testing
    Network Administration
    Vulnerability Assessment
    IT Consultation
    Website Customization
    Malware Removal
    Cisco Firepower Threat Defense
    IT Support
    Antivirus & Security Software
    Firewall
    Palo Alto Firewalls
    Security Testing
    Computer Network
    Computer Maintenance
    Windows Server
  • $70 hourly
    With a strong business background in personnel management, excellent interpersonal skills, and strategic expertise, I have excelled in various roles throughout my career. I have experience leading in diverse settings, from K-6 classrooms to managing remote fly-fishing lodges and their offices. My experience as a sales and marketing manager before transitioning to teaching has provided me with valuable insights on exceeding sales targets and building meaningful customer relationships. I have effectively collaborated with clients, corporate executives, sales professionals, proprietors, and stakeholders, consistently aiming to uphold the utmost level of integrity in all my pursuits. As I focus on Information Security in my Master's program, I am exploring the current challenges of cybersecurity in today's digital landscape. Through coursework focusing on analyzing costs and benefits of security operations, formulating security policies, and
    Featured Skill Penetration Testing
    Educational Leadership
    Education Architecture
    Educational Technology
    Cybersecurity Management
    Security Testing
    Security Assessment & Testing
    Security Framework
    IT Compliance Audit
    Content Development
    Content Creation
    Cybersecurity Monitoring
    AI Content Writing
    IT Support
    AI Consulting
  • $50 hourly
    Special expertise in: Healthcare (HIPAA readiness) SaaS & Tech (SOC 2 / ISO 27001 compliance) WordPress, custom web apps, APIs Cloud infrastructure (AWS, Azure)
    Featured Skill Penetration Testing
    Government Reporting Compliance
    Information Security
    API Testing
    Cloud Security
    Web App Penetration Testing
    Website Security
    SOC 2
    Compliance
    Ethical Hacking
    Cybersecurity Tool
    Vulnerability Assessment
  • $62 hourly
    I’m a professional penetration tester with hands-on experience in 25+ enterprise-scale engagements across internal/external networks, web apps, cloud environments (AWS/Azure), assumed breach, and social engineering scenarios. I specialize in identifying high-impact vulnerabilities and providing clear, actionable remediation — not just generic reports. ✅ What I deliver: Internal/External Network Assessments Web/App/API Pentesting (OWASP Top 10 & beyond) Cloud Security Testing (AWS, Azure, GCP) Phishing Campaigns & Social Engineering Active Directory & Privilege Escalation Attacks Custom Tooling & Scripts (Python, PowerShell, Bash) Detailed Reporting for Tech Teams & Executives 🛡️ Certs: GPEN • GWAPT • Security+ • CySA+ 💬 I’ve worked directly with SOCs, dev teams, and compliance managers — so I know how to explain findings at any level.
    Featured Skill Penetration Testing
    Security Engineering
    Windows 11 Administration
    Linux
    Active Directory Federation Services
    Bash Programming
    Python
    Cyber Threat Intelligence
    Problem Solving
    Computing & Networking
    Computer Network
    Network Engineering
    Information Security
    Government Reporting Compliance
    Compliance
  • $70 hourly
    Certified Information Systems Security Professional (CISSP) with extensive experience as a Network Engineer and Cyber Security Engineer. Proven track record of optimizing network performance, driving infrastructure security, and ensuring operational excellence across over 300 client locations. Highly skilled in network design, security audits, and IT project management with a focus on reliability and innovation. Known for leadership in cybersecurity initiatives, exceptional problem-solving, and a dedication to continuous improvement in the ever-evolving IT landscape.
    Featured Skill Penetration Testing
    Professional Tone
    Communications
    Network Engineering
    Risk Analysis
    Cybersecurity Management
    Certified Information Systems Security Professional
    Problem Solving
    Information Security
    Computer Network
    Computing & Networking
    Compliance
  • $120 hourly
    I possess an extensive track record of more than two decades in the field of Information Technology, complemented by over 15 years of hands-on expertise specifically in IT Security. My background encompasses a wide range of competencies, including Security policy development and implementation, Privacy Policy, Terms of use, and a comprehensive understanding of regulations such as CCPA, GDPR, HIPAA/HITECH & PCI-DSS. My professional services encompass security consulting, strategic advisement, and virtual Chief Information Security Officer (CISO) support, tailored to the unique needs of small and mid-sized enterprises. Moreover, I hold esteemed certifications, including CCISO (Certified Chief Information Security Officer), CISSP (Certified Information Systems Security Professional), CEH (Certified Ethical Hacker), CHFI (Computer Hacking Forensic Investigator), and Project+. Rest assured, my wealth of experience and qualifications equip me to provide the utmost value and excellence in meeting your IT security requirements.
    Featured Skill Penetration Testing
    Privacy Policy
    EU-US Privacy Shield
    Privacy Policy Writing
    California Consumer Privacy Act
    Data Privacy
    Compliance
    GDPR
    Internet Security
    HIPAA
    Web Application Security
    PCI
    Information Security
    Security Policies & Procedures Documentation
  • $50 hourly
    My expertise is in ITGC testing, design, and implementation leveraging multiple security infrastructure and security management frameworks (NIST 800-53, 800-37, ISO 27001, SOC 2, PCI DSS), I can also perform security audits and provide reports with observations and risk levels based on risk of data loss and risk of service failure. My strengths also lie in creating policies and procedures tailored to specific business purposes, requirements, and needs. I can analyze third party vendors and assess their risk based on data access levels and provide businesses with a recommendation of continuing/discontinuing business relationships with their suppliers/service providers. I can perform maturity assessments to determine the appropriate level an organization's security posture/baseline should be at by providing scores for each domain (network security, application security, physical security, TPRM, hardware/software security, cloud security. SDLC security, disaster recovery, change management, data backup/restoration, data retention). I also have experience with system administration - technical support for Windows and web/mobile applications, Windows Server 2019, GPOs, user management, DNS configurations, networking configurations, and security implementations. As a freelancer, I spend my free time on logo design and animation gigs. I can create, customize, and design business/company logos that will enhance business performance and attract an enormous amount of customer traffic leveraging modern, sleek, and luxurious digital designs optimized for websites, social media profiles, and physical business advertisements. Deliverables can be requested in all sizes, dimensions, and file types. Source files and vector files will be included along with free and unlimited revisions. I carry the following certifications: CompTIA Security+ CE AWS Cloud Practitioner AWS Solutions Architect Associate Splunk Basics ICSI - Certified Network Security Specialist Nessus Certified Professional Fortinet - NSE 2 Network Security Associate
    Featured Skill Penetration Testing
    Logo Design
    End User Technical Support
    Windows Administration
    Logo Animation
    Risk Analysis
    Information Security Audit
    Risk Management
    Web Application Security
    IT General Controls Testing
    Risk Assessment
    Governance, Risk & Compliance Software
    Network Security
    System Security
    Vulnerability Assessment
  • $100 hourly
    Red Team Operator / Penetration Tester with over 8 years of experience dedicated to perform cybersecurity assessments to a wide variety of clients, including high-profile companies that ended up increasing its security posture after every engagement. Experienced in leading through all aspects of Penetration Testing exercises, from objectives and scoping, to report generation, debriefing, and remediation validation. Here is a list of what can I do for you today, - Identify any security threat to your Internet facing assets and uncover those that you are not aware of via an External Penetration Testing exercise. - Internal Penetration Test [Assumed Breach] designed to evaluate the robustness and security posture of your organization's internal network environment. - Run an Open Source Intelligence [OSINT] assessment for you as an individual or for your company in order to identify how much exposure you have on the Internet and if this exposure could represent a potential threat to you. Not sure where to start?; Have questions?; Need a quote? Contact me and let's talk. I am pretty sure we can negotiate a good price without compromising the quality of the cyber security assessment.
    Featured Skill Penetration Testing
    NIST Cybersecurity Framework
    Cybersecurity Tool
    Red Team Assessment
    Network Security
    Web Testing
    OWASP
    Expert
    Network Penetration Testing
  • $50 hourly
    Professional Summary Highly motivated and results-oriented Information Technology professional available to analyze, develop databases and program source code. Seeking a challenging role in dynamic technologies such as: MS SQL server, Object Oriented Programming with JAVA, MS Visual Studio, Azure, Python, Automated Cisco Networking, and Generative AI.
    Featured Skill Penetration Testing
    Vulnerability Assessment
    AI Development
    SQL
    Python
    System Administration
    Computing & Networking
    Computer Network
    Database Management
    Database
  • $70 hourly
    Cybersecurity expert with nearly a decade dedicated to offensive security, testing, reporting, training, and education. Development, IT, networking, and other technical skills available as well.
    Featured Skill Penetration Testing
    API Testing
    AI Security
    Security Testing
    Security Framework
    Security Assessment & Testing
    Ethical Hacking
    PostgreSQL Programming
    PostgreSQL
    Kali Linux
    Python
    NIST Cybersecurity Framework
    Nessus
    Red Team Assessment
    Information Security
  • $12 hourly
    Who I Am: I'm a cybersecurity student with hands-on experience in identifying vulnerabilities, securing websites, and analyzing traffic using tools like Nikto, Wireshark, and John the Ripper. Skills: Website vulnerability scans & reports Basic penetration testing with open-source tools Log file analysis Security hardening recommendations for small businesses or creators Wireshark traffic capture analysis Why Should You Care: As someone actively studying cybersecurity and gaining certifications, I stay up to date with real-world threats and techniques. I bring energy, detail, and a hunger to prove myself.
    Featured Skill Penetration Testing
    Ethical Hacking
    Network Security
    Python
    Information Security
    Linux
    Wireshark
    Vulnerability Assessment
    Security Analysis
    Cybersecurity Monitoring
  • $30 hourly
    QA Engineer SUMMARY Quality Assurance Engineer with over 7 years of manual and automation experience in the following industries: E-commerce, Healthcare, SaaS, Airlines, and Cruise line. Dedicated to delivering a high-quality end-user product through careful inspection and analysis of functional and technical requirements, tracking and documenting bugs, and Validation & Verification.
    Featured Skill Penetration Testing
    Traceability Matrix
    Test Case Design
    TestNG
    pytest
    Java
    SQL
    Selenium
    ServiceNow
    SAP
    Postman
    Software QA
    Quality Assurance
  • $31 hourly
    I’m a self-taught polymath with 20+ years of experience blending art, tech, and storytelling. As a mangaka, game developer, and screenwriter, I craft immersive worlds—from children’s books to adult novels—designed for monetization through merch, licensing, and scalable IP. My technical expertise extends to smart contract auditing, crypto trading, and app design, merging analytical rigor with creative vision. Whether developing educational content for young artists or collaborating on animations and blockchain projects, I bridge creativity and commerce, ensuring every idea thrives as both art and asset. **Collaborate & Build the Future** Based in Orlando, I’m open to commissions, audits, and partnerships—from securing DeFi protocols to co-writing screenplays or designing game narratives. My work is rooted in empowering creators, offering actionable strategies to monetize their craft. Let’s connect and turn bold concepts into enduring IPs. -my DMs are always open -add me up on discord -shoot me a correspondence via email Let’s work ✍🏾😏
    Featured Skill Penetration Testing
    Cryptocurrency Trading
    DApp Development
    Music Production
    Screenwriting
    Game Design
    web3.js
    Smart Contract Development
    Animation
    NFT
    Game Art
    Illustration
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses