Hire the best Penetration Testers in Maryland
Check out Penetration Testers in Maryland with the skills you need for your next job.
- $80 hourly
- 5.0/5
- (3 jobs)
Hello, I am Alex Brown. I am a Certified Information System Security Professional (CISSP) and Offensive Security Certified Professional (OSCP) with 13 years of industry experience and a masters degree in Cybersecurity. The majority of my career I have spent working with NIST 800-37 Risk Management Framework (RMF), performing security assessments, architecting security solutions, and applying security remediations. I have worked through all 6 stages of the RMF process from system categorization to system maintenance. I have developed cyber documentation to support security controls, developed polices and procedures to enforce system security practices and document system configuration. In addition, I have implemented technical security controls such as Windows and Linux patches, Windows and Linux OS configuration settings, and network device firmware and configuration settings. I have extensive experience in vulnerability assessment, security analysis, and applying security controls. I am extremely familiar with industry scanning tools such as Nessus and DISA Security Technical Implementation Guides (STIGs). I have worked with other security tools including Kali Linux and Metasploit. I have worked with application firewalls including Windows Firewall, iptables, and Symantec Enterprise Protection. I have extensive experience analyzing results from security scans, assessing risk, and applying measures to mitigate or remediate the security issue. I have developed Vulnerability Assessment Reports identifying the open vulnerabilities impacting the organizations system. I have developed Risk Assessment Reports where open vulnerabilities are assessed for overall risk by looking at likelihood of a vulnerability being exploited and the impact it would have on the organization. I have maintained Plan of Actions and Milestones (POA&M) where ongoing non-compliant security controls are tracked and assigned completion expectations and criteria. In addition to my technical knowledge and experience in the cyber field, I have also performed project management activities on cyber efforts. I have managed control accounts, maintained schedules, managed sub-contractors, and worked directly with customer clients on cyber deliverables. I have a strong background in understanding expectations to meet customer demands with strict schedule and cost demands.Penetration Testing
NessusMicrosoft Windows PowerShellWindows 10 AdministrationCertified Information Systems Security ProfessionalSecurity AnalysisInformation Security AuditCybersecurity ManagementRed Hat Enterprise LinuxVulnerability AssessmentBash Programming - $50 hourly
- 5.0/5
- (3 jobs)
🔥 As a cybersecurity consultant, I have helped many companies, such as AWS, TCM Security, Fortuna Tech, Runners Inc., Microsoft, Orbytek, and Techanew. 🛡️ About me ✔ 10+ years of providing technical expertise across departments for high-profile and mission-critical projects. Served as a cybersecurity leader focusing on solution-oriented strategies through a consultative leadership style, that addresses complex technical challenges to defend the enterprise and combat cyber threats, protecting privacy and digital assets. EXPERIENCE: 🏰 Build a robust security strategy and architecture 🔄 Cloud Security across AWS, Azure, and GCP 🌐 Penetesting as a Service 🌐 Cryptocurrency Forensics Investigator 📘 IT Security Compliance and Policy Writing 📊 Risk Assessment and Auditing expertise 🌐 Vendor Risk Assessment and Attestations 💼 Secure source coding using tools such as SonarQube, Snyk Enterprise(SAST & DAST) 📘 WP Development and Security 🛠️ Tech Stack: High-level expertise across AWS, Azure, MS Office 365, Apache, Linux, Windows/OSx, WordPress, Web Application Firewalls (WAF) like Azure Sentinel, CrowdStrike, CloudFlare, SOPHOS central, Intrusion Detection/Prevention Systems (IDS/IPS), and adept at architecture diagramming with VISIO or Lucidchart, Wazuh, Elk Stack, and logging/monitoring. 🤝 Working together I am excited to collaborate with you on delivering reliable, consistent, cost-effective solutions that address your security concerns and safeguard your institute's assets. Let's initiate a conversation to explore how we can comprehensively tailor our expertise to meet your business needs. Reach out to me now!Penetration Testing
Web DevelopmentMachine LearningDjangoDrupalSquarespaceAutomationData ScienceWordPressLinux System AdministrationDigital ForensicsWordPress Malware RemovalCMMCRisk AssessmentCloud SecurityInternet SecurityInformation Security AwarenessSecurity AnalysisEmail SecuritySecurity Policies & Procedures DocumentationCybersecurity ManagementMalware RemovalSecurity EngineeringInformation Security - $150 hourly
- 0.0/5
- (0 jobs)
Currently CISO at multiple companies ranging from start ups to well-established companies in multiple verticals: health care, tech, marketing, insurance and real estate. I am a founder of Secureside.io, and a partner in Axl.net Security. My experience in the technology realm is as broad as it is deep. My skills range from the "in the weeds" world of the deep technical to the higher levels of architecture and design. On top of that I am an executive who represents the security posture of multiple organizations. I often present to and educate stakeholders including executives and board members, as well as partners and key clients. ► Cybersecurity Executive: Leadership over security program: build, operate, report, and improve them. Run the IT risk management program. Maintain Infosec roadmap and oversee projects. Mentoring and coaching of IT & Infosec staff. Compliance with regulations, certifications, and legal obligations. ► Technical Information Security Professional: Conduct penetration testing, vulnerability assessments, and red team exercises. Experience in the design and deployment of many security and technology solutions, including SIEM/SOC, EDR, Next-Gen Firewalls, MDM, virtualization and networking stacks, Azure/AWS, and much more. Scripting and automation proficiency, particularly in PowerShell, R, and Bash. ► Business Development Experience: Develop client relationships, win business, provide excellent service to companies ranging from startups to the Fortune 500. This includes passing client and investor security due diligence exercises through questionnaires & audits. ► Outstanding communication and people skills. Presentations, diagrams, report writing, and public speaking.Penetration Testing
HIPAASOC 2ISO 27001Risk ManagementRisk AssessmentCloud SecurityRegulatory ComplianceDisaster Recovery PlanInformation SecurityCybersecurity ManagementApplication SecurityInformation Security ConsultationSecurity Policies & Procedures DocumentationNetwork Security - $50 hourly
- 0.0/5
- (0 jobs)
Dear Clients, Kindly check out the premium services we offer; 1. EMAIL HACK/RECOVERY 2.) FACEBOOK HACK/RECOVERY 3.) INSTAGRAM HACK/RECOVERY 4.) TWITTER HACK/RECOVERY 5.) SNAPCHAT HACK/RECOVERY 6.) WHATSAPP HACK 7.) CELL-PHONE HACK/SPY 8.) GPS TRACKING 9.) CRYPTOCURRENCY RECOVERYPenetration Testing
Ethical HackingInformation Security - $75 hourly
- 0.0/5
- (1 job)
Results-oriented cybersecurity professional with over 10 years of expertise in Governance, Risk, and Compliance (GRC), third-party cyber risk management, IT auditing, and Information Assurance. Extensive experience in RMF field operations, supporting Air Force networks, and completing RMF accreditations for DoD-sponsored circuits, including NIPRNET, SIPRNET, ANG Decision Support System, and Continuity of Operations sites. Proficient in creating and executing OPSEC Plans in accordance with AFI 10-701 and operating within ITIPS and eMASS systems. Proven ability to safeguard organizational systems through comprehensive risk assessments, vendor risk management, and implementation of security frameworks aligned with global standards (SOC 1, SOC 2, GDPR, CCPA, NIST 800-53, ISO 27001). Adept at deploying tools like OneTrust, Cyber GRX, RSA Archer, and Logic Manager to streamline risk management processes and ensure compliance with regulatory requirements.Penetration Testing
GDPR Compliance ReviewPCI DSSGDPRManagement ConsultingAnalytical PresentationSecurity Policies & Procedures DocumentationInformation Security Threat MitigationIncident Response Readiness AssessmentCompliance ConsultationCloud SecuritySecurity Assessment & TestingInformation Security AuditSecurity AnalysisRisk Management - $50 hourly
- 0.0/5
- (0 jobs)
Professional Summary Highly motivated and results-driven cybersecurity professional with over 12 years of experience in safeguarding information systems. Expertise in identifying and mitigating vulnerabilities, conducting security assessments, penetration testing, and implementing secure coding practices. Proficient in industry standards and best practices, including OWASP, SANS, and NIST. Proven ability to collaborate effectively within teams and engage diverse stakeholders.Penetration Testing
Incident Response Readiness AssessmentRisk ManagementIT Compliance AuditSecure SDLCSecurity Assessment & Testing - $50 hourly
- 0.0/5
- (0 jobs)
I’m a computer scientist with varied experience. Primary experience in programming/scripting, pentesting, electronics engineering, and identity & access management. Whatever your goal, I want to help you achieve it!Penetration Testing
Microsoft PowerPointMicrosoft ExcelData EntryElectronicsUser Identity ManagementSailPoint Technologies IdentityIQKali LinuxJavaScriptJavaPythonScriptingComplianceComputing & NetworkingInformation Security - $40 hourly
- 0.0/5
- (0 jobs)
Cybersecurity Consultant | SOC Analyst | Vulnerability Management Specialist With 15 years of hands-on cybersecurity and IT experience, I specialize in securing digital assets, leading mission-critical operations, and delivering real-world solutions for complex security challenges. I’ve led cyber teams, developed technical strategies, and managed threat detection and response efforts across both enterprise and military environments. Certified CISSP, GCIH, and GPEN, I bring both technical depth and leadership clarity to every engagement. Open to contract, remote, and consulting opportunities.Penetration Testing
Vulnerability AssessmentSecurity Operation CenterSecurity Assessment & TestingNetwork SecurityEthical HackingRed Team AssessmentCybersecurity ManagementInformation Security - $60 hourly
- 0.0/5
- (0 jobs)
LinkedIn Profile Objective Looking for a Vice President, Director, or Lead Level position as a Penetration Tester, Red Teamer, Vulnerability Researcher, or Exploit Developer in Maryland, Northern Virginia, the Washington D.C. Area, or Remote. I have 5 years experience conducting Red Teaming Engagements as a Government Contractor/Civilian, and 7 years experience conducting Web Application/Network Penetration Testing. I have 2 years experience conducting Cloud Penetration Testing. I have 11 years experience in Cyber Security. I have 15 years of Information Technology Experience.Penetration Testing
Software DevelopmentRed Team AssessmentWeb App Penetration TestingNetwork Penetration Testing - $86 hourly
- 5.0/5
- (2 jobs)
I am certified PMP, CISM, CGEIT, ITIL I have accumulated over 20 years of experience leading teams in IT Program Management, Cybersecurity, Governance, IT Strategy, Enterprise Architecture, Risk Management and Compliance programs, supporting the United States government agencies and Fortune 25 and affiliated organizations. Develop high valued technical reference architectures and security models such as Zero Trust Architecture, Identity Credentials and Access, Management, Trusted Interconnections to share data between partner organizations securely and regulatorily. I have developed over 2 dozens of security programs (security charter and policy design and promulgation), and in addition to their operationalization within FISMA, HIPAA/JAHCO, PCI DSS, SERPA, FERPA, UMMC security Framework for the United States Department of Defense, Department of Homeland Security, and many other private Fortune 25 organizations. I am offering the best in the industry at a very competitive rate. Perform roles as the primary lead in cybersecurity delivery engagements for a wide variety of clients. Subject matter expertise in emerging security and application architectural strategies. (Zero trust, DevSecOps, Microservices, IAM, Authentication, RBAC, containerization, cloud, Access Controls, Networks, etc.) Thought leader in security risk management programs with the ability to create unique risk and security control architecture with recommendations and requirements documentation for clients. Assess overall cybersecurity challenges within an environment, identify key strategic issues and advise on the best course of action, including recommendations and controls. Possess the ability to work in a client environment and develop a multitude of relationships with excellent communication skills. Develop and recommend plans to structure secure architectures, including network and systems infrastructure and tools. Understand the security interplay in the areas of application assurance, data classification, network security, and emerging IT trends and threats. Analyze and assess client-facing challenges, identify recommendations for solutions, and define a roadmap to implement such solutions successfully. Develop and deliver workshops in the areas of cybersecurity, compliance, and IAM to include but not be limited to security policy, process flows, workflows, entitlements, roles, and solution definitions. Develop reports and supporting presentations for both client and internal discussions with excellent communications skills that need to be demonstrated to internal and external teams. Lead and guide expert security team members to produce clear outcomes and results using industry best practices. Provide guidance and oversight to multiple customer projects.Penetration Testing
ITILDisaster Recovery PlanGovernance, Risk & Compliance SoftwareTOGAFPatent RegistrationISO 27001Patent SearchSOC 2Business Continuity PlanFedRAMPSOC 1NIST SP 800-53Vulnerability AssessmentIncident Response Plan - $20 hourly
- 0.0/5
- (0 jobs)
SUMMARY KEY SKILLS Recent graduate with a strong academic foundation and a dedicated focus on pursuing a career in cybersecurity. Eager to leverage my knowledge and skills in information security, risk management, and threat analysis to contribute to a dynamic team. Committed to continuous learning and professional development in the ever-evolving field of cybersecurity.Penetration Testing
Digital ForensicsSecurity Assessment & TestingNIST Cybersecurity FrameworkMicrosoft OfficeMachine LearningPostgreSQLMongoDBNode.jsPythonC++CProduct DevelopmentScriptWeb Application Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.