Hire the best Penetration Testers in North Carolina
Check out Penetration Testers in North Carolina with the skills you need for your next job.
- $125 hourly
- 5.0/5
- (34 jobs)
UpWork Recognition: Expert-Vetted | Top-Rated Plus | 100% Job Success Score I provide affordable cyber security solutions to startups, small and medium-sized businesses, non-profits, and other organizations. I organizations that need improved security but don't have the budget to support an enterprise level. I work with these companies to create a security solution that is both affordable and effective. In today's world of ever-increasing cyber threats where small businesses are targeted more frequently, it is vital that these companies have IT Security systems in place. Statistics show that nearly half of small companies that suffer a cyber breach never recover. SPECIALITES: • Vulnerability Analysis • Penetration Testing • Compliance Assessment • Network Security Planning • Consultation • Managed Security Services • Risk Assessment & Management CMMC, HIPAA, SOC2, GDPR,Penetration Testing
Data PrivacyVendor ManagementInformation SecuritySecurity AnalysisRisk AssessmentRegulatory ComplianceCybersecurity ManagementEthical Hacking - $40 hourly
- 5.0/5
- (1 job)
Hi I am Daniel Hayes a experienced penetration tester specializing in red teaming, with a strong focus on adversary emulation. I have been ethically hacking for over five years and working as a cybersecurity consultant for three. I have successfully breached multi-million and billion-dollar organizations worldwide. As a former penetration tester for one of the top seven professional services firms globally, I have extensive experience working with different organizations from various industries to ensure their cybersecurity needs are met. Services I Perform (But not limited to) - Web Application Penetration Testing (Black Box / White Box) - External Penetration Testing (Black Box / White Box) - Internal Penetration Testing (Black Box / White Box) - Red Teaming / Adversary Simulation - Compliance and Regularly Frameworks (NIST, SOC2, HIPAA, Etc) I look forward to helping you keep your organization safe from any threat!Penetration Testing
Web App Penetration TestingNetwork Penetration Testing - $150 hourly
- 0.0/5
- (0 jobs)
** RATE FLEXIBLE BASED ON SCOPE OF ENGAGEMENT ** Services Offered: - Network Penetration Testing (External / Internal) - Web Application / API Penetration Testing - Cloud Configuration Reviews Biography: Matt served four years in the United States Marine Corps as an infantryman. His passion for defending others and identifying security gaps led him to become an information security professional and enthusiast. With over 6 years in the private sector as a Penetration Tester and Security Consultant, and 2 years working for the Army Test and Evaluation Center as a federal employee, he has spent a considerable amount of time bolstering security for clients in the private sector. He also provided valuable strategic and tactical advice for emerging cybersecurity projects being fielded to U.S. Army Soldiers. His passion for security does not adhere to a “9 to 5” schedule, as he continuously contributes to research in the form of identifying vulnerabilities in publicly available products in the form of CVEs, and has provided research and responsible disclosures for multiple organizations to include the World Health Organization’s (WHO) COVID-19 Mobile Application. **Education & Certifications: - B.S. Information Technology, Towson University - Offensive Security Certified Professional (OSCP) - Certified Red Team Operator (CRTO) - Practical Network Penetration Tester (PNPT) - eLearnSecurity Web Application Penetration Tester Extreme (eWPTX) - CREST Registered Penetration Tester (CRT) **Community Engagement & Research: - Conference Talk: Your IPv6 is Showing - CarolinaCon - VetSec Con - World Health Organization COVID-19 Mobile Application Bug Bounty - Flight Circle Responsible Disclosure - CVE-2022-23320 - CVE-2022-23321 - CVE-2020-28408 - CVE-2020-28409Penetration Testing
API TestingWeb Application SecurityNetwork Penetration Testing - $40 hourly
- 0.0/5
- (1 job)
As a seasoned cybersecurity professional, I specialize in providing top-notch Web App Penetration Testing services to clients who prioritize the security and integrity of their web applications. With a keen eye for identifying and mitigating vulnerabilities, I am dedicated to delivering comprehensive security assessments that fortify your online assets. By employing industry-leading testing methodologies, I ensure that your web apps are resilient against potential threats. Partner with me to fortify your digital infrastructure and maintain peace of mind in an increasingly connected world.Penetration Testing
API TestingVirtual MachineWeb App Penetration TestingSplunkVirtual Machine Operating SystemLinuxBashNetwork Traffic Analysis - $10 hourly
- 0.0/5
- (0 jobs)
Cybersecurity expert with a passion for protecting organizations from cyberattacks. Proven ability to conduct penetration tests and vulnerability assessments, and to recommend remediation strategies. Skills, Penetration testing: This is the process of simulating an attack on a system or network in order to identify and exploit security vulnerabilities. Vulnerability assessment: This is the process of identifying and assessing security vulnerabilities in a system or network. Incident response: This is the process of responding to and mitigating security incidents. Security architecture: This is the process of designing and implementing security controls for a system or network. Security engineering: This is the process of building and maintaining secure systems and networks. Risk management: This is the process of identifying, assessing, and mitigating risks to an organization's information security. Compliance: This is the process of ensuring that an organization complies with applicable security regulations. Forensics: This is the process of collecting, analyzing, and preserving digital evidence. Malware analysis: This is the process of analyzing malware to understand its capabilities and intent. Cloud security: This is the process of securing data and applications that are hosted in the cloud. SIEM (Security Information and Event Management): This is a tool that collects and analyzes security logs from a variety of sources. UEBA (User and Entity Behavior Analytics): This is a tool that analyzes user behavior to identify potential security threats. Threat intelligence: This is the process of collecting, analyzing, and sharing information about threats to an organization's information security. DevSecOps: This is the practice of integrating security into the development and deployment process. Red teaming: This is the practice of simulating an attack on an organization's systems and networks in order to identify and exploit security vulnerabilities. Blue teaming: This is the practice of responding to and mitigating security incidents. Cyberlaw: This is the field of law that deals with cybersecurity issues.Penetration Testing
TensorFlowChatbotGenerative AIDjangoPythonMachine LearningAmazon Web ServicesCloud ServicesComplianceArtificial IntelligenceCloud ComputingGovernment Reporting ComplianceVulnerability AssessmentInformation Security - $150 hourly
- 0.0/5
- (0 jobs)
Zach Satterly is a senior-level DevSecOps and cloud security expert with over a decade of experience driving secure software delivery across large-scale, distributed systems. He specializes in cloud infrastructure, CI/CD automation, and integrating security into every stage of the development lifecycle. With deep expertise in Kubernetes, AWS, and infrastructure as code, Zach has led initiatives in container security, identity and access management, and compliance automation. He is known for designing scalable, resilient security architectures and implementing high-impact solutions that balance operational efficiency with risk reduction. His work consistently aligns engineering practices with security and regulatory best practices.Penetration Testing
Cloud SecurityAI SecurityInfrastructure as CodeSecurity EngineeringPCI DSSGovernance, Risk & Compliance SoftwareInformation Security AuditDevOpsApplication Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.