Hire the best Penetration Testers in North Carolina

Check out Penetration Testers in North Carolina with the skills you need for your next job.
  • $125 hourly
    UpWork Recognition: Expert-Vetted | Top-Rated Plus | 100% Job Success Score I provide affordable cyber security solutions to startups, small and medium-sized businesses, non-profits, and other organizations. I organizations that need improved security but don't have the budget to support an enterprise level. I work with these companies to create a security solution that is both affordable and effective. In today's world of ever-increasing cyber threats where small businesses are targeted more frequently, it is vital that these companies have IT Security systems in place. Statistics show that nearly half of small companies that suffer a cyber breach never recover. SPECIALITES: • Vulnerability Analysis • Penetration Testing • Compliance Assessment • Network Security Planning • Consultation • Managed Security Services • Risk Assessment & Management CMMC, HIPAA, SOC2, GDPR,
    Featured Skill Penetration Testing
    Data Privacy
    Vendor Management
    Information Security
    Security Analysis
    Risk Assessment
    Regulatory Compliance
    Cybersecurity Management
    Ethical Hacking
  • $40 hourly
    Hi I am Daniel Hayes a experienced penetration tester specializing in red teaming, with a strong focus on adversary emulation. I have been ethically hacking for over five years and working as a cybersecurity consultant for three. I have successfully breached multi-million and billion-dollar organizations worldwide. As a former penetration tester for one of the top seven professional services firms globally, I have extensive experience working with different organizations from various industries to ensure their cybersecurity needs are met. Services I Perform (But not limited to) - Web Application Penetration Testing (Black Box / White Box) - External Penetration Testing (Black Box / White Box) - Internal Penetration Testing (Black Box / White Box) - Red Teaming / Adversary Simulation - Compliance and Regularly Frameworks (NIST, SOC2, HIPAA, Etc) I look forward to helping you keep your organization safe from any threat!
    Featured Skill Penetration Testing
    Web App Penetration Testing
    Network Penetration Testing
  • $150 hourly
    ** RATE FLEXIBLE BASED ON SCOPE OF ENGAGEMENT ** Services Offered: - Network Penetration Testing (External / Internal) - Web Application / API Penetration Testing - Cloud Configuration Reviews Biography: Matt served four years in the United States Marine Corps as an infantryman. His passion for defending others and identifying security gaps led him to become an information security professional and enthusiast. With over 6 years in the private sector as a Penetration Tester and Security Consultant, and 2 years working for the Army Test and Evaluation Center as a federal employee, he has spent a considerable amount of time bolstering security for clients in the private sector. He also provided valuable strategic and tactical advice for emerging cybersecurity projects being fielded to U.S. Army Soldiers. His passion for security does not adhere to a “9 to 5” schedule, as he continuously contributes to research in the form of identifying vulnerabilities in publicly available products in the form of CVEs, and has provided research and responsible disclosures for multiple organizations to include the World Health Organization’s (WHO) COVID-19 Mobile Application. **Education & Certifications: - B.S. Information Technology, Towson University - Offensive Security Certified Professional (OSCP) - Certified Red Team Operator (CRTO) - Practical Network Penetration Tester (PNPT) - eLearnSecurity Web Application Penetration Tester Extreme (eWPTX) - CREST Registered Penetration Tester (CRT) **Community Engagement & Research: - Conference Talk: Your IPv6 is Showing - CarolinaCon - VetSec Con - World Health Organization COVID-19 Mobile Application Bug Bounty - Flight Circle Responsible Disclosure - CVE-2022-23320 - CVE-2022-23321 - CVE-2020-28408 - CVE-2020-28409
    Featured Skill Penetration Testing
    API Testing
    Web Application Security
    Network Penetration Testing
  • $40 hourly
    As a seasoned cybersecurity professional, I specialize in providing top-notch Web App Penetration Testing services to clients who prioritize the security and integrity of their web applications. With a keen eye for identifying and mitigating vulnerabilities, I am dedicated to delivering comprehensive security assessments that fortify your online assets. By employing industry-leading testing methodologies, I ensure that your web apps are resilient against potential threats. Partner with me to fortify your digital infrastructure and maintain peace of mind in an increasingly connected world.
    Featured Skill Penetration Testing
    API Testing
    Virtual Machine
    Web App Penetration Testing
    Splunk
    Virtual Machine Operating System
    Linux
    Bash
    Network Traffic Analysis
  • $10 hourly
    Cybersecurity expert with a passion for protecting organizations from cyberattacks. Proven ability to conduct penetration tests and vulnerability assessments, and to recommend remediation strategies. Skills, Penetration testing: This is the process of simulating an attack on a system or network in order to identify and exploit security vulnerabilities. Vulnerability assessment: This is the process of identifying and assessing security vulnerabilities in a system or network. Incident response: This is the process of responding to and mitigating security incidents. Security architecture: This is the process of designing and implementing security controls for a system or network. Security engineering: This is the process of building and maintaining secure systems and networks. Risk management: This is the process of identifying, assessing, and mitigating risks to an organization's information security. Compliance: This is the process of ensuring that an organization complies with applicable security regulations. Forensics: This is the process of collecting, analyzing, and preserving digital evidence. Malware analysis: This is the process of analyzing malware to understand its capabilities and intent. Cloud security: This is the process of securing data and applications that are hosted in the cloud. SIEM (Security Information and Event Management): This is a tool that collects and analyzes security logs from a variety of sources. UEBA (User and Entity Behavior Analytics): This is a tool that analyzes user behavior to identify potential security threats. Threat intelligence: This is the process of collecting, analyzing, and sharing information about threats to an organization's information security. DevSecOps: This is the practice of integrating security into the development and deployment process. Red teaming: This is the practice of simulating an attack on an organization's systems and networks in order to identify and exploit security vulnerabilities. Blue teaming: This is the practice of responding to and mitigating security incidents. Cyberlaw: This is the field of law that deals with cybersecurity issues.
    Featured Skill Penetration Testing
    TensorFlow
    Chatbot
    Generative AI
    Django
    Python
    Machine Learning
    Amazon Web Services
    Cloud Services
    Compliance
    Artificial Intelligence
    Cloud Computing
    Government Reporting Compliance
    Vulnerability Assessment
    Information Security
  • $150 hourly
    Zach Satterly is a senior-level DevSecOps and cloud security expert with over a decade of experience driving secure software delivery across large-scale, distributed systems. He specializes in cloud infrastructure, CI/CD automation, and integrating security into every stage of the development lifecycle. With deep expertise in Kubernetes, AWS, and infrastructure as code, Zach has led initiatives in container security, identity and access management, and compliance automation. He is known for designing scalable, resilient security architectures and implementing high-impact solutions that balance operational efficiency with risk reduction. His work consistently aligns engineering practices with security and regulatory best practices.
    Featured Skill Penetration Testing
    Cloud Security
    AI Security
    Infrastructure as Code
    Security Engineering
    PCI DSS
    Governance, Risk & Compliance Software
    Information Security Audit
    DevOps
    Application Security
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses