Hire the best Penetration Testers in Maryland

Check out Penetration Testers in Maryland with the skills you need for your next job.
  • $80 hourly
    Hello, I am Alex Brown. I am a Certified Information System Security Professional (CISSP) and Offensive Security Certified Professional (OSCP) with 13 years of industry experience and a masters degree in Cybersecurity. The majority of my career I have spent working with NIST 800-37 Risk Management Framework (RMF), performing security assessments, architecting security solutions, and applying security remediations. I have worked through all 6 stages of the RMF process from system categorization to system maintenance. I have developed cyber documentation to support security controls, developed polices and procedures to enforce system security practices and document system configuration. In addition, I have implemented technical security controls such as Windows and Linux patches, Windows and Linux OS configuration settings, and network device firmware and configuration settings. I have extensive experience in vulnerability assessment, security analysis, and applying security controls. I am extremely familiar with industry scanning tools such as Nessus and DISA Security Technical Implementation Guides (STIGs). I have worked with other security tools including Kali Linux and Metasploit. I have worked with application firewalls including Windows Firewall, iptables, and Symantec Enterprise Protection. I have extensive experience analyzing results from security scans, assessing risk, and applying measures to mitigate or remediate the security issue. I have developed Vulnerability Assessment Reports identifying the open vulnerabilities impacting the organizations system. I have developed Risk Assessment Reports where open vulnerabilities are assessed for overall risk by looking at likelihood of a vulnerability being exploited and the impact it would have on the organization. I have maintained Plan of Actions and Milestones (POA&M) where ongoing non-compliant security controls are tracked and assigned completion expectations and criteria. In addition to my technical knowledge and experience in the cyber field, I have also performed project management activities on cyber efforts. I have managed control accounts, maintained schedules, managed sub-contractors, and worked directly with customer clients on cyber deliverables. I have a strong background in understanding expectations to meet customer demands with strict schedule and cost demands.
    Featured Skill Penetration Testing
    Nessus
    Microsoft Windows PowerShell
    Windows 10 Administration
    Certified Information Systems Security Professional
    Security Analysis
    Information Security Audit
    Cybersecurity Management
    Red Hat Enterprise Linux
    Vulnerability Assessment
    Bash Programming
  • $50 hourly
    🔥 As a cybersecurity consultant, I have helped many companies, such as AWS, TCM Security, Fortuna Tech, Runners Inc., Microsoft, Orbytek, and Techanew. 🛡️ About me ✔ 10+ years of providing technical expertise across departments for high-profile and mission-critical projects. Served as a cybersecurity leader focusing on solution-oriented strategies through a consultative leadership style, that addresses complex technical challenges to defend the enterprise and combat cyber threats, protecting privacy and digital assets. EXPERIENCE: 🏰 Build a robust security strategy and architecture 🔄 Cloud Security across AWS, Azure, and GCP 🌐 Penetesting as a Service 🌐 Cryptocurrency Forensics Investigator 📘 IT Security Compliance and Policy Writing 📊 Risk Assessment and Auditing expertise 🌐 Vendor Risk Assessment and Attestations 💼 Secure source coding using tools such as SonarQube, Snyk Enterprise(SAST & DAST) 📘 WP Development and Security 🛠️ Tech Stack: High-level expertise across AWS, Azure, MS Office 365, Apache, Linux, Windows/OSx, WordPress, Web Application Firewalls (WAF) like Azure Sentinel, CrowdStrike, CloudFlare, SOPHOS central, Intrusion Detection/Prevention Systems (IDS/IPS), and adept at architecture diagramming with VISIO or Lucidchart, Wazuh, Elk Stack, and logging/monitoring. 🤝 Working together I am excited to collaborate with you on delivering reliable, consistent, cost-effective solutions that address your security concerns and safeguard your institute's assets. Let's initiate a conversation to explore how we can comprehensively tailor our expertise to meet your business needs. Reach out to me now!
    Featured Skill Penetration Testing
    Web Development
    Machine Learning
    Django
    Drupal
    Squarespace
    Automation
    Data Science
    WordPress
    Linux System Administration
    Digital Forensics
    WordPress Malware Removal
    CMMC
    Risk Assessment
    Cloud Security
    Internet Security
    Information Security Awareness
    Security Analysis
    Email Security
    Security Policies & Procedures Documentation
    Cybersecurity Management
    Malware Removal
    Security Engineering
    Information Security
  • $150 hourly
    Currently CISO at multiple companies ranging from start ups to well-established companies in multiple verticals: health care, tech, marketing, insurance and real estate. I am a founder of Secureside.io, and a partner in Axl.net Security. My experience in the technology realm is as broad as it is deep. My skills range from the "in the weeds" world of the deep technical to the higher levels of architecture and design. On top of that I am an executive who represents the security posture of multiple organizations. I often present to and educate stakeholders including executives and board members, as well as partners and key clients. ► Cybersecurity Executive: Leadership over security program: build, operate, report, and improve them. Run the IT risk management program. Maintain Infosec roadmap and oversee projects. Mentoring and coaching of IT & Infosec staff. Compliance with regulations, certifications, and legal obligations. ► Technical Information Security Professional: Conduct penetration testing, vulnerability assessments, and red team exercises. Experience in the design and deployment of many security and technology solutions, including SIEM/SOC, EDR, Next-Gen Firewalls, MDM, virtualization and networking stacks, Azure/AWS, and much more. Scripting and automation proficiency, particularly in PowerShell, R, and Bash. ► Business Development Experience: Develop client relationships, win business, provide excellent service to companies ranging from startups to the Fortune 500. This includes passing client and investor security due diligence exercises through questionnaires & audits. ► Outstanding communication and people skills. Presentations, diagrams, report writing, and public speaking.
    Featured Skill Penetration Testing
    HIPAA
    SOC 2
    ISO 27001
    Risk Management
    Risk Assessment
    Cloud Security
    Regulatory Compliance
    Disaster Recovery Plan
    Information Security
    Cybersecurity Management
    Application Security
    Information Security Consultation
    Security Policies & Procedures Documentation
    Network Security
  • $50 hourly
    Dear Clients, Kindly check out the premium services we offer; 1. EMAIL HACK/RECOVERY 2.) FACEBOOK HACK/RECOVERY 3.) INSTAGRAM HACK/RECOVERY 4.) TWITTER HACK/RECOVERY 5.) SNAPCHAT HACK/RECOVERY 6.) WHATSAPP HACK 7.) CELL-PHONE HACK/SPY 8.) GPS TRACKING 9.) CRYPTOCURRENCY RECOVERY
    Featured Skill Penetration Testing
    Ethical Hacking
    Information Security
  • $75 hourly
    Results-oriented cybersecurity professional with over 10 years of expertise in Governance, Risk, and Compliance (GRC), third-party cyber risk management, IT auditing, and Information Assurance. Extensive experience in RMF field operations, supporting Air Force networks, and completing RMF accreditations for DoD-sponsored circuits, including NIPRNET, SIPRNET, ANG Decision Support System, and Continuity of Operations sites. Proficient in creating and executing OPSEC Plans in accordance with AFI 10-701 and operating within ITIPS and eMASS systems. Proven ability to safeguard organizational systems through comprehensive risk assessments, vendor risk management, and implementation of security frameworks aligned with global standards (SOC 1, SOC 2, GDPR, CCPA, NIST 800-53, ISO 27001). Adept at deploying tools like OneTrust, Cyber GRX, RSA Archer, and Logic Manager to streamline risk management processes and ensure compliance with regulatory requirements.
    Featured Skill Penetration Testing
    GDPR Compliance Review
    PCI DSS
    GDPR
    Management Consulting
    Analytical Presentation
    Security Policies & Procedures Documentation
    Information Security Threat Mitigation
    Incident Response Readiness Assessment
    Compliance Consultation
    Cloud Security
    Security Assessment & Testing
    Information Security Audit
    Security Analysis
    Risk Management
  • $50 hourly
    Professional Summary Highly motivated and results-driven cybersecurity professional with over 12 years of experience in safeguarding information systems. Expertise in identifying and mitigating vulnerabilities, conducting security assessments, penetration testing, and implementing secure coding practices. Proficient in industry standards and best practices, including OWASP, SANS, and NIST. Proven ability to collaborate effectively within teams and engage diverse stakeholders.
    Featured Skill Penetration Testing
    Incident Response Readiness Assessment
    Risk Management
    IT Compliance Audit
    Secure SDLC
    Security Assessment & Testing
  • $50 hourly
    I’m a computer scientist with varied experience. Primary experience in programming/scripting, pentesting, electronics engineering, and identity & access management. Whatever your goal, I want to help you achieve it!
    Featured Skill Penetration Testing
    Microsoft PowerPoint
    Microsoft Excel
    Data Entry
    Electronics
    User Identity Management
    SailPoint Technologies IdentityIQ
    Kali Linux
    JavaScript
    Java
    Python
    Scripting
    Compliance
    Computing & Networking
    Information Security
  • $40 hourly
    Cybersecurity Consultant | SOC Analyst | Vulnerability Management Specialist With 15 years of hands-on cybersecurity and IT experience, I specialize in securing digital assets, leading mission-critical operations, and delivering real-world solutions for complex security challenges. I’ve led cyber teams, developed technical strategies, and managed threat detection and response efforts across both enterprise and military environments. Certified CISSP, GCIH, and GPEN, I bring both technical depth and leadership clarity to every engagement. Open to contract, remote, and consulting opportunities.
    Featured Skill Penetration Testing
    Vulnerability Assessment
    Security Operation Center
    Security Assessment & Testing
    Network Security
    Ethical Hacking
    Red Team Assessment
    Cybersecurity Management
    Information Security
  • $60 hourly
    LinkedIn Profile Objective Looking for a Vice President, Director, or Lead Level position as a Penetration Tester, Red Teamer, Vulnerability Researcher, or Exploit Developer in Maryland, Northern Virginia, the Washington D.C. Area, or Remote. I have 5 years experience conducting Red Teaming Engagements as a Government Contractor/Civilian, and 7 years experience conducting Web Application/Network Penetration Testing. I have 2 years experience conducting Cloud Penetration Testing. I have 11 years experience in Cyber Security. I have 15 years of Information Technology Experience.
    Featured Skill Penetration Testing
    Software Development
    Red Team Assessment
    Web App Penetration Testing
    Network Penetration Testing
  • $86 hourly
    I am certified PMP, CISM, CGEIT, ITIL I have accumulated over 20 years of experience leading teams in IT Program Management, Cybersecurity, Governance, IT Strategy, Enterprise Architecture, Risk Management and Compliance programs, supporting the United States government agencies and Fortune 25 and affiliated organizations. Develop high valued technical reference architectures and security models such as Zero Trust Architecture, Identity Credentials and Access, Management, Trusted Interconnections to share data between partner organizations securely and regulatorily. I have developed over 2 dozens of security programs (security charter and policy design and promulgation), and in addition to their operationalization within FISMA, HIPAA/JAHCO, PCI DSS, SERPA, FERPA, UMMC security Framework for the United States Department of Defense, Department of Homeland Security, and many other private Fortune 25 organizations. I am offering the best in the industry at a very competitive rate. Perform roles as the primary lead in cybersecurity delivery engagements for a wide variety of clients. Subject matter expertise in emerging security and application architectural strategies. (Zero trust, DevSecOps, Microservices, IAM, Authentication, RBAC, containerization, cloud, Access Controls, Networks, etc.) Thought leader in security risk management programs with the ability to create unique risk and security control architecture with recommendations and requirements documentation for clients. Assess overall cybersecurity challenges within an environment, identify key strategic issues and advise on the best course of action, including recommendations and controls. Possess the ability to work in a client environment and develop a multitude of relationships with excellent communication skills. Develop and recommend plans to structure secure architectures, including network and systems infrastructure and tools. Understand the security interplay in the areas of application assurance, data classification, network security, and emerging IT trends and threats. Analyze and assess client-facing challenges, identify recommendations for solutions, and define a roadmap to implement such solutions successfully. Develop and deliver workshops in the areas of cybersecurity, compliance, and IAM to include but not be limited to security policy, process flows, workflows, entitlements, roles, and solution definitions. Develop reports and supporting presentations for both client and internal discussions with excellent communications skills that need to be demonstrated to internal and external teams. Lead and guide expert security team members to produce clear outcomes and results using industry best practices. Provide guidance and oversight to multiple customer projects.
    Featured Skill Penetration Testing
    ITIL
    Disaster Recovery Plan
    Governance, Risk & Compliance Software
    TOGAF
    Patent Registration
    ISO 27001
    Patent Search
    SOC 2
    Business Continuity Plan
    FedRAMP
    SOC 1
    NIST SP 800-53
    Vulnerability Assessment
    Incident Response Plan
  • $20 hourly
    SUMMARY KEY SKILLS Recent graduate with a strong academic foundation and a dedicated focus on pursuing a career in cybersecurity. Eager to leverage my knowledge and skills in information security, risk management, and threat analysis to contribute to a dynamic team. Committed to continuous learning and professional development in the ever-evolving field of cybersecurity.
    Featured Skill Penetration Testing
    Digital Forensics
    Security Assessment & Testing
    NIST Cybersecurity Framework
    Microsoft Office
    Machine Learning
    PostgreSQL
    MongoDB
    Node.js
    Python
    C++
    C
    Product Development
    Script
    Web Application
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses