Hire the best Vulnerability Assessment specialists

Check out Vulnerability Assessment specialists with the skills you need for your next job.
Clients rate Vulnerability Assessment specialists
Rating is 4.8 out of 5.
4.8/5
based on 1,414 client reviews
  • $145 hourly
    Vastly experience IT expert and top ranked AWS consultant on Upwork that specializes in AWS consulting and migrating business environments, applications and data centers to the AWS cloud. Certified AWS Solutions Architect and AWS Certified Security - Specialty and specialist at creating secure, highly available and cost efficient environments in the AWS cloud that meet all modern compliance standards such as HIPAA, PCI and SOC2. AWS instructor and SME for Simplilearn, an online IT training and certification site and instructor for A Cloud Guru, world leader in cloud computing training. Over 15 years experience of in-house IT consulting for large investment banks in London, Sydney & New York. Contact me if you need highly recommended AWS certified consulting services to evaluate your needs, make the move to the cloud, and vastly improve your technology environment. Specialties: - All things AWS - Cloud migrations - Cloud architecture - Cloud cost optimization - Compliance: HIPAA/SOC2 - IaaS/PaaS/SaaS - Disaster Recovery - Storage solutions - Databases
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Application Security
    Security Infrastructure
    AWS Server Migration
    Database Administration
    AWS Lambda
    Amazon RDS
    Amazon S3
    Amazon EC2
    IT Management
    MySQL
    Microsoft SQL Server Administration
    Amazon Web Services
  • $30 hourly
    With IT as my biggest passion, and Engineering background. I believe the best is to work in what we love.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Code Review
    Bash
    Web App Penetration Testing
    Network Security
    Linux
    Cryptocurrency
    Information Security
    Technical Writing
    Cryptography
    Reverse Engineering
    Engineering
    Tutoring
    Online Research
    Python
  • $75 hourly
    ✅ Top Rated Expert ✅ 3000+ Hours ✅ Professional Penetration Tester Security researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform. For deliverables, professional reports are created,that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors. Core competency is performing black and gray box testing on live web applications/networks or lab environments. Familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of the work is confidential sample vulnerability report can be provided. Service Description 1)Web Application Penetration Testing based on OWASP TOP 10 2)Network Penetration Testing 3)Security Hardening Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python framework
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Web Application Security
    JavaScript
    Reverse Engineering
    Black Box Testing
    Security Testing
    Ethical Hacking
    Network Penetration Testing
    Network Security
    Malware
    Web App Penetration Testing
    Internet Security
    Penetration Testing
  • $40 hourly
    Mustaque (CISSP) brings and assist clients in infrastructure Security, Cloud Security, Network Security, Cloud Migration, Threat Intelligence and integrating Information Security program for an organization. With over 15+ years of IT experience, I provide cost-effective solutions to Start-Ups, SMBs/SMEs, and Large Enterprises. I am passionate about helping people succeed in their core business while making an impact on securing their computing environment and making it difficult for outsiders to penetrate or get unauthorized access to the network. I have worked with organizations like IBM, Microland, Bank of America, and other Fortune 500 companies. My background covers the technology discipline (Security by design, Public Cloud Security, Public Cloud Migration, Network Security, threat intelligence, Vulnerability Assessment & Management, and Consulting). My Specialization is to build a solid platform using a security by design concept to stop inside and outside threats. Skill Set: IP Networking, Cisco, Juniper, Fortigate, F5 BigIP, OpenVPN, WAF , SIP, IPSec. SSL VPN Internet security, firewalls, IDS, IPS, Nessus, Qualys, Kali Linux, Meta-exploit, Honeypots. Here are some of the area's Mustaque can help with: - Design and Implement virtual data center in Public Cloud (Azure, AWS). - Design and Implement Cloud Security components while designing a virtual data center. - Design and Implement SDWAN at the enterprise level. Add SDWAN security while designing it. - Help to perform Risk Assessment. - Implementing Security Solutions at multiple layers to provide adequate security. - Audit and assist in implementing Compliance per the standard. - Security Incident & Reporting. - Design, implement and monitor Threat Intelligence program. - Design, implement and test the Disaster Recovery Program. - Research on System logs to build a security data lake. Product Experience: I have worked in Multi-Vendor Environment. Enough exposure to Industry-leading solutions. Professional Certifications: CISSP - Certified Information Systems Security Professional ZTCA - Zero Trust Certified Architect CASA - Certified AlgoSec Security Administrator ECSA - EC-Council Certified Security Analyst CEH - Certified Ethical Hacker MCSA - Microsoft Certified Solutions Associate
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    System Security
    IT Compliance Audit
    Network Engineering
    Kali Linux
    AT&T Cybersecurity
    Network Security
    Cloud Security
    Cloud Architecture
    Web Application Firewall
    Information Security
    Cloud Migration
    Cloud Implementation
    Network Administration
    Network Design
  • $100 hourly
    I am Google Cybersecurity Career Certificate Graduate, Chartered IT Professional, OWASP Core Security Belt Certified, OWASP API Security Certified, Certified Information Systems Security Auditor, Certified ISO 27001 Lead Implementer, Certified ISO 27001 Lead Auditor, Certified Identity Governance Expert, Certified Identity and Access Manager, Certified GRC Professional, Certified GRC Auditor, Integrated Data Privacy Professional, Certified Scrum Master, BCG Certified Strategy Consultant, Six Sigma Black Belt Professional, GDPR Certified Data Protection Officer, Certified HIPAA Officer & results driven management consultant with 15 years experience in compliance, data protection, SOC 2 and ISO 27001 Controls Implementation, innovation, design thinking, ideating solutions, process improvement, pricing strategy, data analytics, business process outsource, project management, market research, financial analysis, investment banking, cybersecurity and diagnosing a range of problems, from small businesses to multi-million dollar corporations. I have done past projects with PwC, Skoda Minotti, DNX VC, Lum Chang, Syntervision, AI Chatbot, FourthRev and Loggi. Previously I have worked as Engagement Manager at KPMG and Senior Associate at Deloitte, where I took part in several consulting assignments in healthcare and life sciences, logistics, TMT, services, consumer and transportation sectors. I also have vast experience of managing projects from start to inception including projects funded by ADB, UNESCO and WHO. I have also completed more than 15 market research studies in different verticals for determining the market size and overall analysis of target markets. I also have experience of working as Head of Product Design where I led the development teams to identify customer pain-points, develop user needs and solve customer problems by creating products with built-in security features. I also worked on developing customer personas & identifying and recruiting sponsor users for A/B testing of product features and arranging Cognitive walkthroughs for establishing the usability of products. I also applied knowledge of Scrum Framework with sprint planning and delegation of tasks on product development projects for various public and private sector organizations. I managed 10 projects of more than $1 Million in total budget. Other than above, I also have hands on experience with various compliance frameworks including GDPR, HIPAA, PCI DSS, ISO 27001, HITRUST, CCPA and NCSF (NIST Cybersecurity Framework). Key Achievements: ✅ Successfully led 8 companies through the SOC 2 Type 2 attestation process, meeting stringent requirements and passing all audits in the first attempt. This achievement significantly enhanced their reputation for data privacy and security. ✅ Guided 4 clients through the rigorous process of achieving ISO 27001 certification, ensuring that all security controls and management processes were robust, auditable, and internationally recognized. ✅ Reduced the costs of IT infrastructure maintenance by 5% for 3 consulted clients ✅ Analyzed business conditions, market/industry trends, competitive influences and demographic factors to identify opportunities of business growth for 5 consulted clients ✅ Created advanced analytics for both internal and marketing use using Tableau, SQL and other BI tools for 4 consulted clients ✅ Managed $400 million donor funded projects as PMO and Project Lead ✅ Performed business process re-engineering for 3 consulted clients ✅ Consulted as lead revenue data analyst on a team responsible for collecting $60M receivables ✅ Repeatedly delivered cost reductions through the implementation of Lean principles, improved scheduling via resource loads and volume analysis ✅ Evaluated and increased operational effectiveness of organizations through the implementation of Continuous Improvement methods and Training/Coaching programs ✅ Identified opportunities within the client organization for improving productivity and operational efficiencies by installing a system by which the client can measure and realize improvement ✅ Analyzed existing processes and applied methodologies to eliminate wasted resources and time for 3 consulted clients
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    OWASP
    Management Consulting
    ISO 27018
    ISO 27017
    ISO 27001
    KPI Metric Development
    Business Operations
    Information Security Audit
    Incident Response Plan
    Web Application Security
    Incident Management
    Amazon Web Services
    Cybersecurity Management
    Reverse Engineering
    SOC 2 Report
  • $30 hourly
    I'm a Penetration Tester and Cyber Security Specialist who is a professional in evaluating the security posture of Web-Applications (Websites) and ensuring the security of personal clients' online identities, accounts, devices, and networks, I've possessed my current knowledge through 3+ years of self-study and research plus 2+ years of work in the industry, protecting clients on a personal level and running vulnerability assessments against business websites, always leaving positive impression and impact, I hold a great record of being able to expertly provide the following services: - Perform comprehensive security checkups on Emails and Phone numbers and pinpoint security holes which often lead victims to be hacked with zero interaction nor awareness from them. - Assist in Account Recovery (Ex. Instagram, Facebook) - Educate thoroughly on the findings and remediations for a vulnerable target, equipping clients with enough information to trust themselves as they continue to utilize the technologies as normal with no fear of being targetted by hackers. - Investigate and educate on online frauds/scams, especially crypto ones, why and how they work, and how to distinguish between legit and not legit easily. - Clean up networks and devices from viruses/malware and ensure optimal patching for security. - Report fraud websites that impersonate legit businesses for a takedown. IMPORTANT: When it comes to cybersecurity-related services, there is a number of scammers not to be underestimated, whether within or outside of Upwork, therefore stay vigilant and keep in mind the following, 1. If you were scammed online via crypto, there's no one out there with the right to give a guarantee that they will be able to recover it for you despite how well furnished the so-called hacker's portfolio appears to be, the chance remains very slim and you should only pursue this kind of service for the sake of leaving no stone unturned knowing the high probability of failure, and you should only select a freelancer with a reputable profile and reviews to back up their activity because scammer accounts are usually fresh with no reviews and no verified ID, feel free to consult me to evaluate that. 2. Same applies to the request of hacking an account, there are complicated caveats that explain why it DOES NOT work the way you think it does but to keep it short, if you want someone's account hacked, aside from it being illegal and unethical and isn't the type of "service" I provide, the chance for it to work is about 1% to begin with, again, I'm available for consultation, account recovery is a different subject with a higher probability for success as long as it's your own account that was lost/hacked.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Malware
    Malware Removal
    Information Security
    System Security
    Network Security
    Information Security Consultation
    Website Security
    Penetration Testing
    Network Penetration Testing
    Internet Security
    Ethical Hacking
    Security Testing
    Security Assessment & Testing
  • $165 hourly
    I am an accomplished and experienced Cyber Security Engineer, CISO, and consultant with over 20 years experience in government, commercial, non-profit and private organizations. I'm a Certified Information Systems Security Professional (CISSP) and CMMC Registered Practitioner. My education includes a Master's degree in Information Assurance and Security specializing in Digital Forensics, a Bachelor's Degree in Information Technology, and daily, hands-on work governing, securing and administering complex information technology environments. My current efforts include cybersecurity compliance implementations for regulated industries and government contractors including the NIST Cybersecurity Framework, Risk Management Framework, NIST SP 800-171, and Cybersecurity Maturity Model Certification (CMMC). For those not bound to other regulatory guidelines, I assist with implementation of the Center for Internet Security (CIS) Critical Security Controls and the CIS Risk Assessment Method. I assist with expert advice, gap assessments, requirements and implementation reviews. I help develop and refine cybersecurity documentation including System Security Plans, POA&Ms, and Policies and procedures. I will share national background check results for qualified opportunities.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Gap Analysis
    Cybersecurity Monitoring
    Amazon Web Services
    Governance, Risk Management & Compliance
    Security Engineering
    Security Policies & Procedures Documentation
    Security Information & Event Management
    Cloud Security
    Information Security Awareness
    Cybersecurity Management
    Certified Information Systems Security Professional
    Network Security
    Cybersecurity Management
    Information Security
  • $175 hourly
    As a Top Rated vCISO with a 100% job success rate, rest assured that I execute at a high level of expertise, integrity, and professionalism. I am the President & Founder of Aspire Cyber, a full-service consulting firm that rapidly delivers privacy and cybersecurity compliance solutions to help small and medium-sized businesses satisfy their legal, regulatory, and contractual requirements. Aspire Cyber was founded on the core belief that every business should have access to world-class cybersecurity talent, regardless of budget or security needs. I have over 20 years ​of experience managing information security projects and implementing strategic cybersecurity controls for the United States Army, Bank of America, and numerous Fortune 100 companies. We offer entirely “Done For You” solutions that help your business rapidly achieve compliance while we manage everything. Don’t waste 6-18 months trying to figure this out yourself. Regulatory and industry cybersecurity frameworks have hundreds of different controls you must comply with and require knowledge of IT, Cybersecurity, HR, Legal, and more. Aspire Cyber is a leading provider of comprehensive cybersecurity compliance solutions. Our team of experts has a proven track record of implementing NIST SP 800-171 practices to help defense contractors achieve Cybersecurity Maturity Model Certification (CMMC). We make it easy for your business to prove it's a safe choice for handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Schedule a free call with me to learn how our team of dedicated cybersecurity experts can help save you months of time and, in many cases, five or even six figures in excessive spending trying to become compliant without expert guidance. ★High Profile Clients ✔ I worked for the United States Army, Lockheed Martin, Bank of America, Hewlett-Packard Enterprise, and many others. Aspire Cyber specializes in the following areas: ★ Risk Assessment and Auditing - We have conducted over 200 Information Security, Business Continuity, and Cloud assessments. -Compliance (NIST, PCI, HIPAA, ISO 27001, GDPR, CCPA, COPPA, FedRAMP) - Cybersecurity Advisor -Cloud Secure Design -Data Privacy Officer (DPO) -Cloud Security -Policy Writing -Penetration Testing -Application Security -Incident Response -Vulnerability Management -Third-Party Risk Management -Security Awareness Training ★ I hold the following degrees and certifications: ✅ Certified CMMC Assessor (CCA) ✅ Certified CMMC Professional (CCP) ✅ CMMC Provisional Instructor ✅ Certified Information Systems Security Professional (CISSP) ✅ Certified Cloud Security Professional (CCSP) ✅ Certified Information Security Manager (CISM) ✅ Certified Risk and Information Systems Control (CRISC) ✅ CMMC Registered Practitioner ✅ CompTIA Security+ ✅ CompTIA A+ ✅ Master of Business Administration (MBA) ✅ Graduate Certificate Cybersecurity Technology WHY CHOOSE ASPIRE CYBER? -Professionalism: We treat all clients respectfully and adhere to the highest ethical standards. -Fast: We always aim to deliver your project ahead of schedule. -Expertise: We have vast experience across various cybersecurity and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. 🙋🏼‍♂️Our team is eager to partner with your organization to deliver cybersecurity compliance solutions rapidly. Contact Aspire Cyber today to learn how we can fulfill your cybersecurity needs.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Cloud Security Framework
    NIST SP 800-53
    Policy Writing
    Information Security Governance
    FedRAMP
    Information Security Awareness
    Risk Assessment
    NIST Cybersecurity Framework
    Business Continuity Plan
    Information Security Audit
    Information Security
    Incident Response Plan
    Security Testing
    Cybersecurity Management
  • $75 hourly
    I have Experience in Penetration Testing(Network, Web Application, Desktop, Mobile, IVR and webservice), performed lots of Security Implementations related to Security Solutions such as SIEM, Two Factor Authentication, Firewalls,...etc. in Egypt and Large banks in Qatar. . I have experience in PCI Audits , did lot's of gap assessments and pre-audits on many banks and payment gateway. Also I wrote multiple articles in big security magazines like Hakin9 in Europe and Security Kaizen in Middle East, I'm currently having two 0day vulnerability and listed in multiple hall of fames including Microsoft. I have multiple certifications like CEH and OSCP. Job Experience: • Running PCI-DSS Gap Assessments, Pre-Audits, Final Audits in big payment gateways and large ISP's in Egypt • Performing Internal / External Network Penetration testing for large bank, ISP & other clients. • Performing Internal / External Application Penetration Testing “Web / Desktop” for large customers in Egypt and Qatar. • Performing advanced Penetration testing including Mobile,Web service, IOT and IVR PT in Egypt. • Supervising big Vulnerability Assessment projects in Egypt most required by PCI-DSS clients. • Performing large SIEM Solution implementations for ISPs, Banks, government sector & others in Egypt, Qatar • Implementing biggest Two Factor Authentication Solution implementation in the middle east. • Vulnerability Management Solutions for large customers in Egypt •End Point Protection implementation in large banks in Egypt • McAfee Next Generation FW deployments for large clients in Qatar. • McAfee Network Security Manager IPS deployments for large clients in Qatar. •Deploying Anti Fraud solutions at one of the biggest banks in Middle east. •Deploying Mobile Device Management solutions (Mobile Iron)at one of the biggest banks in Middle east. •One of the consultants responsible for securing the 4G Network(IMS Core,HSS,...etc.) at one of the biggest Mobile operators in Egypt. •Leading a team of 3 Engineers to perform mentioned activities previously.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Information Security
    Computer Network
    Python
    Penetration Testing
    Code Review
    PCI
    Network Penetration Testing
    Web App Penetration Testing
  • $240 hourly
    I have provided HIPAA consulting services for the last 20 years and over that time served over 1,000 clients. Client experience includes work with covered entities including hospitals, physicians, other health providers, insurers, union health plans and county government agencies. Experience with business associates include software vendors, IT managed services providers, cloud computing vendors, mobile app developers, medical billing services, value-added resellers, third-party administrators and pharmaceutical marketing companies. Services include virtual Privacy/Security Officer, policy and procedure development, policy gap analysis, computer security risk analysis, technical vulnerability analysis, vendor audits, HIPAA training, business associate contracting and other HIPAA related services. Other related experience includes use of security frameworks including ISO 27001/27002, NIST and HITRUST as well as the PCI DSS. I have worked with other government regulations including 42 CFR Part 2, GxP, FERPA, IDEA, DEA Regulations for E-prescribing of controlled substances and state laws relating to medical privacy and data breach in over 20 states.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Data Privacy
    Information Security
    Policies & Procedures
    Project Risk Management
    Risk Assessment
    Security Analysis
    Information Security Governance
    PCI
    ISO 27001
    GDPR
    HIPAA
  • $40 hourly
    ✅ Amongst the Top 1000 hackers worldwide Web Pentesting | Mobile App Pentesting | API Pentesting | Vulnerability Assessment | Python & Bash Automation I work with companies to make their digital assets secure and provide solutions to enhance their security parameters. I create cybersecurity content on hackingloops.com explaining the practicalities and how-tos of the vulnerability and exploitation Part-time bug bounty hunter at Bugcrowd & Intigriti. Feel free to contact me for your queries and security-related issues.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Network Penetration Testing
    Python
    Security Analysis
    Malware
    Website Security
    Mobile App Testing
    Security Engineering
    WordPress
    Cloud Security
    Network Security
    Penetration Testing
    Security Assessment & Testing
    Cybersecurity Management
    Malware Removal
    Firewall
    Information Security
    Information Security Consultation
  • $35 hourly
    Certifications that I hold: CEH ( Certified Ethical Hacker) 740 MCSA ( Installation, Storage and Compute with Windows Server 2016) To whom it may concern, In the last years I did more than 400 Penetration Tests and Security Assessments. Most of them on Web and Mobile ( Android and iOS ) applications with Finance Background implemented with various technologies and frameworks, server security testing and hardening. Sample reports can be provided who is interested. ___________________________________________________________ Professional Load and Stress Testing if you are interested for your application ___________________________________________________________ Migration of infrastructure among cloud solutions ( AWS , Azure , Office 365, Google cloud). Many of you struggle to shift your infrastructure from On-premise to Azure , AWS ( amazon) or vice versa , I can do it in a short time frame with zero downtime if there is a possibility. And offer you support as long as you and your team are self reliable on new infrastructure. Regarding Windows Server Services ,I am focused on Microsoft enterprise-driven solutions: Windows Server( Active directory,IIS ,DNS, DHCP ,WDS , Hyper-V, Backup, Exchange, RPD farming) Expert troubleshoot Server Hardening and securing Windows and Linux servers. Monitoring software setup ( PRTG Paesler ,Nagious , Zabbix) Keen on Deadlines, fair on doing business together always ready to negotiate price
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Security Engineering
    Web Application Security
    Internet Security
    NIST SP 800-53
    Windows Server
    OWASP
    Ethical Hacking
    Manual Testing
    Security Infrastructure
    Network Security
    Penetration Testing
    Application Security
    Kali Linux
    Security Assessment & Testing
  • $55 hourly
    IT Professional with over 30 years experience. 15+ years experience in web development. 8+ Years experience in PCI-DSS Consultation, including level 1 companies, working with QSA's to swiftly obtain compliance. For the past five years, I have been providing GDPR consultation to many small to medium-sized companies. Three years experience with ISO 27001 helping clients get and maintain ISO 27001 accredited certification. I spent 20 years working in various IT roles, mainly support, engineering, and web development, within one of the largest companies in the world. I was awarded Charted IT Professional status from the British Computer Society in July 2008. Since then, I have run my own company with a small team producing web-based platforms and services and offering freelance compliance consultation to small businesses. I have also worked as a CTO on several start-up projects managing their entire IT infrastructure and gaining valuable PCI compliance experience, essential to all e-commerce projects. Due to my experience and varied IT roles, I have a good knowledge of web design, programming, databases, security, SEO, troubleshooting, technical writing & more. I am a highly organised and reliable individual, utilising existing knowledge and experiences to find practical solutions to even the most complex project.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Compliance Consultation
    Data Privacy
    Information Security
    PCI DSS
    Data Protection
    Website Security
    PCI
    Compliance
    ISO 27001
    Risk Assessment
    Information Security Audit
    GDPR
    Web Content Accessibility Guidelines
    Security Analysis
  • $30 hourly
    Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP​ 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is our key differentiator. Please check my Upwork work history and client feedbacks. I look forward to hearing from you!
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Network Security
    Information Security Audit
    Security Testing
    OWASP
    Information Security
    Web Application Security
    Website Security
    Penetration Testing
    Certified Information Systems Security Professional
  • $120 hourly
    ✅TOP RATED ISO 27001 / SOC 2 / IT Compliance and Cybersecurity consultant, specializing in getting your security compliance in line. Ex-Big 4 senior consultant, based in London with 6+ years of experience in assisting clients in cybersecurity, IT compliance and security risk assessment projects. ❗You have lost contracts because you were not ISO 27001/SOC 2/PCI/FedRAMP certified? ❗Your clients pressure you to provide them with an information security certification (PCI-DSS, SOC 2, ISO 27001, HIPAA, FedRAMP, CMMC) ? ❗You don't know what to answer to the security assessment questionnaire you recently received from your biggest client & it's taking too much time ? ❗You don't have time and resources to be consumed by compliance efforts and endless meetings? ❗You are struggling to understand the certification process, the related cost, and the timelines? ❗You just purchased a compliance tool (Drata, Vanta, HeyLaika, Tugboat...) but don't know the next step or don't have time for it? Services provided: 📝 Policies & Procedure writing & review 📝 Security gap analysis (based on frameworks on your choice, ISO 27001, NIST, SOC 2, etc.) 📝 IT and Compliance Audits 📝 Performing Risk Assessments, risk treatments, and establishing actions plans & roadmaps. 📝 Evaluation of the existing IT security state of maturity against established standards & regulatory requirements. 📝 Organization-wide security strategy 📝 Support in Governance, Risk & Compliance (GRC) projects 📝 Cloud security governance, management and strategy 📝 Security Operations 📝 DPO service: I can provide you with assistance with regards to GDPR/CCPA compliance, policy writing/reviewing, GDPR gap assessment analysis, and accompanying you in your GDPR compliance journey and Data Privacy requirements. 📝 CISO service: I can provide you with assistance and support in defining your security strategy, putting in place action plans and following up implementation over the long run. 💥WHY ME AND NOT ANOTHER FREELANCER?💥 ✅ Big 4 consultant expertise, but suiting your budget. ✅ All work is completed by myself, with constant communication with you and taking into account your every remark & need. ✅ Excellent Client Reviews: I focus on providing you with VALUE and earning your TRUST. ✅ Over-Delivering: I focus on GIVING you more than what I expect to RECEIVE. I am happy when my client's expectations are exceeded. ✅ Responsiveness: All lines of communications are open, and I can be reached very easily. ✅ Kindness & Ethics: As security and compliance professional, we hold ourselves to high ethical values, treating everyone with respect, understanding and genuinely IMPROVING my client's situation. Let's get in touch. (The hourly rate shown is indicative only, as I adapt depending on the project and client's budget)
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Security Management
    Data Privacy
    SOC 2 Report
    GDPR
    IT Compliance Audit
    Risk Assessment
    ISO 27001
    Information Security
    Security Policies & Procedures Documentation
    Information Security Consultation
  • $40 hourly
    If your WordPress website has been hacked, don't panic! I can help you get it back up and running quickly and securely. With 𝟗 𝐲𝐞𝐚𝐫𝐬 𝐨𝐟 𝐞𝐱𝐩𝐞𝐫𝐢𝐞𝐧𝐜𝐞, I excel in vulnerability identification, malware resolution, and proactive security. A 𝟏𝟎𝟎% 𝐣𝐨𝐛 𝐬𝐮𝐜𝐜𝐞𝐬𝐬 𝐬𝐜𝐨𝐫𝐞, speaks to my success in swiftly recovering hacked websites, resolving malware issues, and fortifying security. I will get your website back up and running in just 𝟒 𝐡𝐨𝐮𝐫𝐬. My services go beyond simply updating and installing security plugins. I conduct security audits, providing detailed reports and actions to secure your site, ensuring future protection. 𝙒𝙝𝙖𝙩 𝙄 𝙊𝙛𝙛𝙚𝙧: 🛡️ Restoring your website's integrity by removing malware 🛡️ Restoration of your website to its original state 🛡️ Identification and resolution of intrusion sources and vulnerabilities 🛡️ Advanced security hardening backed by a 𝟏-𝐲𝐞𝐚𝐫 𝐰𝐚𝐫𝐫𝐚𝐧𝐭𝐲 𝐟𝐨𝐫 𝐩𝐞𝐚𝐜𝐞 𝐨𝐟 𝐦𝐢𝐧𝐝. 🛡️ Backdoor script removal 🛡️ Malicious redirect removal 🛡️ Japanese keywords hack removal 🛡️ WordPress advanced security measures, firewall integration 🛡️ Linux server administration, security hardening 🛡️ DDoS mitigation, firewall (Cloudflare, CSF) 🛡️ Google search clean up, Google Ads approval 🛡️ Website blacklist removal 🛠️ Server setup and optimization. 🛠️ Old WordPress update/upgrade, migration, and bug fixing. 🛠️ Restore broken WordPress and bug fixing. 🛠️ Audit & identify the bugs causing website or server crashes. 🛠️ WordPress websites and server migration. Let's schedule a free consultation to evaluate your website or server's health and determine if we would make a great team. And the best part? If we move forward with a paid project and I fail to meet your expectations, you will not owe me a single penny. 𝙺𝚒𝚗𝚍 𝚁𝚎𝚐𝚊𝚛𝚍𝚜, 𝐓𝐮𝐡𝐢𝐧 𝐀. 𝘍𝘰𝘶𝘯𝘥𝘦𝘳 & 𝘉𝘶𝘴𝘪𝘯𝘦𝘴𝘴 𝘔𝘢𝘯𝘢𝘨𝘦𝘳, 𝘚𝘦𝘤𝘶𝘳𝘦𝘸𝘱.𝘯𝘦𝘵
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    WordPress
    Bug Fix
    Web Hosting
    DNS
    Virus Removal
    WordPress Malware Removal
    Email Deliverability
    Website Security
    WordPress Development
    Cloudflare
    Troubleshooting
    System Administration
    Information Security
    Malware Removal
  • $75 hourly
    I specialize in Cybersecurity, threat mitigation (hacking cleanup and repair) and system administration on a enterprise scale, as well as full stack development. Complete, integrated and reliable solutions to the most challenging and unique business IT needs, no matter the complexity or difficulty. Fluent in PHP, HTML, JavaScript, Node, and several other programming languages. Experienced Network architect Cybersecurity preventative monitoring and protection, threat detection, and response Cloud Infrastructure management, consulting, and deployment Web & Database migration, management and repair I am your complete IT solutions provider, with over 5+ years of experience!
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Security Assessment & Testing
    System Administration
    Security Engineering
    Cloud Security
    Malware Removal
    Cloud Management
    Cloud Architecture
    Security Infrastructure
    IT Consultation
    DevOps
    Information Security
    System Hardening
    PHP
    WordPress
  • $60 hourly
    SSO expert having Identity and Access Management expertise of 16+ years in SAML / OpenId Connect / Oauth 2.0 / JWT / FIDO2/ Webauthn / 2FA etc. I have experience with open source and commercial SAML implementations (Shibboleth, SimpleSAMLphp, Okta, OneLogin, Auth0, Spring Security SAML, Keycloak, ForgeRock, IBM Security Access Manager etc.), and I am comfortable working in any programming language (PHP, Java, JavaScript, Python, ASP.NET, C#, Ruby, Go, etc.) or framework (Node.js, Meteor, Angular, Django, CodeIgniter, Concrete5, Yii, Symfony, Laravel, WordPress etc.). I have a strong track record of helping clients succeed with: -Adding SAML authentication to custom applications -Troubleshooting SAML Identity Provider and Service Provider errors -Deploying SAML Identity Providers (IdPs) and Service Providers (SPs) -Finding the right architecture for layering SSO technologies (AD, LDAP, OAuth, OpenID Connect, CAS, Kerberos, JWT, multi-factor, etc.) -Providing training, documentation and third-party support -Deployment and architectures of LDAP solutions (OpenDJ, OpenLDAP, IBM Security Directory Server etc). Architectures with high availablity and custom schema. LDAP proxy / bridge solutions deployment. -Architectures and solution Implementation of Identity and Access governance solutions (Sailpoint IIQ , IBM Security Identity Manager, IBM Security directory integrator ). -Role based access control implementation in Identity management solutions. -Risk based access control implementation with Access Management solutions. Devops and cloud security - - Dockerize applications and platforms. - Deployment of applications on AWS EKS platform. - Deployment of applications on GCP GKE platform. Complex Integrations - - Rest API development and security with Oauth / JWT tokens. - API gateway integrations of API. SSO and Identity Access Management Integration Expert | Technical Project Manager
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Solution Architecture Consultation
    OKTA
    Application Security
    Single Sign-On
    API Integration
    OAuth
    Cybersecurity Management
    Security Analysis
    Information Security Consultation
    Auth0
    LDAP
    User Identity Management
    Amazon Cognito
  • $56 hourly
    18 years of extensive experience in ISO 27001, 9001, 22301, 14001, 31000 focusing on quality management, information security, policy writing, project management, governance, risk, and compliance (GRC) in construction management, information technology, and with Big 4 company. Certified ISO 27001 Lead Auditor and ISO 22301 Lead Implementer. Completed seven (7) ISO 27001 Certification Project Completed one (1) ISO 9001 Certification Project Completed one (1) ISO 14001 Certification Project Completed two (2) ISO 27001 Re-certification Project Completed two (2) ISO 9001 Re-certification Project Completed two (2) ISO 140001 Re-certification Project Completed fourteen (14) ISO 27001 Internal Audit Completed eigtheen (18) ISO 9001 Internal Audi Completed eigtheen (18) ISO 14001 Internal Audit Areas of Expertise: ISO Certification Process Management Quality Management Systems Environmental Management Systems Occupational Health and Safety Management Systems Information Security Management System ISO Standards Lead Internal Auditing Technical Documentation Technical Writing Policy and Procedure Writing Risk Assessment Business Continuity Management Information Technology Infrastructure Library Electronic Document Management Systems Business Process and Continual Improvement Statistics and Metrics Development SharePoint Administration
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    NIST SP 800-53
    Document Control
    Microsoft SharePoint Administration
    Market Research
    ISO 27001
    Policy Writing
    Governance, Risk Management & Compliance
    Compliance Training
    Compliance Consultation
    ISO 9001
    Internal Auditing
    Records Management
    Information Security Consultation
    Information Security
  • $50 hourly
    Georges Kirillos is a loving father with over 8 years of experience in cybersecurity, and over 12 years of experience in paramedic as technical mission leader. He has started his security career when he was 16 years old as script kitty. At age 23 he has won 10000 USD as first place prize in an innovative competition organized by the higher center for research at his university, He has finished his Master engineering degree in network and information security at 24 years of age with a high GPA. Georges is holding multiple certificates in cybersecurity and medical fields. In his over 8 years of experience in cybersecurity, Georges was providing top level cybersecurity service to his employer and employers customer with excellent reports, some of the services are as follow: penetration testing, vulnerability assessment, red teaming, security officer services, technical risk assessment, ISO/IEC 27001 27002 services, hardening, providing cybersecurity awareness sessions, solution architecture, conducting POC, providing L2 support and providing training on security product. Georges has gained an immense experience in managerial skills with his over 12 years of experience as paramedic mission leading at the Lebanese Red Cross as a volunteer; and he is also the IT Manager in his station, he has created a highly secure hardened environment with administrative segregation from scratch using latest technology with 100% open source software's and OS; in order to securely host a custom build web application. This system is now being uses by more than 3 Stations.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Security Analysis
    Security Management
    Information Security Audit
    Compliance
    ISO 27001
    Information Security Awareness
    Cloud Security
    Information Security
    Information Security Consultation
    Application Security
    System Security
    Network Security
    Penetration Testing
    Security Policies & Procedures Documentation
  • $30 hourly
    Consolidating my past involvement in Ethical Hacking, Incident Response, IT Security Governance, and Project Management with solid relational and correspondence capacities, I am sure that I can give work that will surpass your desires. Security Analyst with 10+ years' experience in Endpoint security, Application Security, Change Management, Exception Handling and VAPT. Experience in system and network administration, managing server infrastructures and data center operations. Expert-level knowledge of Amazon EC2, S3, Simple DB, RDS, Elastic Load Balancing, SQS, and other services in the AWS cloud infrastructure such as IAAS, PAAS and SAAS. Deep experience with AWS components such as EC2, S3, Elastic IPs, EBS, Security Groups, Route 53, VPC, Elastic Beanstalk, RDS, DynamoDB, and Cloud Formation. Experience in administration of MS SQL server and MySQL in AWS cloud platform. Configured AWS IAM and Security Group in Public and Private Subnets in VPC. Architected, Designed and Developed the Backup and Archiving, Disaster Recovery in AWS Cloud. Security Tools: Nessus, Nmap, burp suite, Wire shark, Web scarab. Operating Systems & Platform: Kali Linux, Backtrack 5 r3, Windows 7, 8, 8.1,10, MAC. Programming Language: HTML, JavaScript. Framework: Metasploit, OWASP. Endpoint: Sophos, Check Point. Amazon Web Services: Ec2, EBS, IAM, VPC, RDS Azure: VNET, VM (Windows, Linux) Server: Windows 2008 server, windows 2012 server.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Information Security Consultation
    Security Infrastructure
    Security Assessment & Testing
    Web App Penetration Testing
    Information Security
    Amazon Web Services
    Penetration Testing
    Security Analysis
    Application Security
    Security Testing
    Microsoft Azure
    Kali Linux
    Cloudflare
  • $90 hourly
    R&D services in the following areas: C++ development and C development Qt development Kernel and Device Driver Development for Windows, Linux and macOS Low-level Software Development for Windows, Linux and macOS Cybersecurity expertise Reverse Engineering Penetration Testing Security testing Automation testing Vulnerability Assessment Blockchain Networking tools (e.g. Firewall, Monitoring, Encryption etc) OpenVPN / VPN development Native Android and native iOS development We have a certified (ISQTB QA) and an experienced team of QA experts according to the specialty of our company - kernel-level drivers, mobile development, web development areas, virtualization, blockchain. Our experts are familiar with Hyper-V/SCVMM, ESXi/VMWareWorkstation/vCenter, KVM, Qemu, MS SQL, Firebird, PostgreSQL, React, AWS, Node.js, Python, JavaScript, TypeScript, C#, Web API (MS ASP.Net), MVC, WCF, perform testing and writing of Unit tests using programming languages. The key areas of development where I have strong experience are Kernel development, Embedded Solutions, Data Acquisition,Mobile Data Management (MDM) and Mobile Application Management(MAM), Reverse Engineering, Proxy filters, Access management and Enterprise security, Pen testing (VAPT) and Cyber security, Blockchain. If my experience is interesting for you, please feel free to contact me!
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Application Security
    React
    web3.js
    Desktop Application
    Cryptocurrency
    Kernel
    Penetration Testing
    Data Protection
    Web Application Security
    Smart Contract
    DApps
    Blockchain
    Reverse Engineering
    C++
  • $40 hourly
    ✅ Top Rated Plus Expert ✅ 500+ Hours ✅ Professional Penetration Tester Hey, I am Chakradhar having 6+ years of rich industry experience in Web, Mobile, API, and Network Penetration Testing. I have successfully completed 250+ Web application Pentest, 100+ Mobile Application Penetration Tests, and 30+ Internal Penetration Tests. I am also a Security researcher acknowledged by Yahoo (among other notable companies like SolarEdge, Imgur, Artsy, etc.) for disclosing a number of vulnerabilities via the HackerOne bug bounty platform. My core competency is Blackbox, Greybox Testing on Web, API, Mobile, and Network applications. I am familiar with all attacks and mitigations and am well-versed in OWASP, NIST, and PTES Frameworks. My Pentesting reports include clear documentation of the vulnerabilities found along with the remediations to make sure the client is 100% satisfied. I am also certified in AWS, Azure and have a very keen knowledge of Cloud Security & Cloud administration. ✅ I have conducted Penetration Tests, Vulnerability Assessments and delivered professional reports to companies around the world complying with the following: ►OWASP Web Security Top 10 Vulnerability ►OWASP API Security Top 10 Vulnerability ►OWASP Mobile Security Top 10 Vulnerability ►External Network Penetration Testing ►Internal Network Penetration Testing ►Payment Card Industry Data Security Standard (PCI DSS) ►System and Organization Controls 2 (SOC2) ►General Data Protection Regulation (GDPR) ►Common Vulnerability Scoring System (CVSS) ►Open Source Security Testing Methodology Manual (OSSTMM) My Certs include: ►CompTIA Pentest+ ►AWS Solutions Architect ►Azure Administrator Tools: Burp Suite, Nikto, Nmap, Zap, Metasploit, Nessus, W3af, Ffuf, Dirb, etc... I am available 24/7. If you are interested in cooperation, drop me a line :)
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Content Writing
    Cloud Computing
    Cloud Security
    Mobile App Testing
    Cloud Management
    Network Access Control
    Technical Writing
    Information Security Audit
    Information Security
    Metasploit
    Search Engine Optimization
    Network Security
    Penetration Testing
  • $50 hourly
    Following is a summary of my skills: • ISO27001 compliance and gap analysis • IT Security Policies and Frameworks • PCI DSS Assessment level 1 & 2 for merchants and Service provider • Penetration testing • SIEM and Forensics analysis • NIST 800-53 • Risk Assessment and Treatment • Application security vulnerabilities, testing techniques, and the OWASP framework • GDPR • Vulnerability Scanning Experience: • Advise Network and system team to securely build/change Azure and AWS cloud infrastructure for existing and potential clients. • Engage with Client to understand their infrastructure requirements to build and integrate AWS API’s and services. • Maintain and improve ISMS framework that includes SOA, Risk assessment and treatment plan, Risk register and ISM forum to convey the risk to management for their review and support. • Maintain security certifications, including ISO 27001, IRAP and PCI dss. • Conducts Gap assessment as per ISM, PSPF, ISO27001, PCI, NIST and GDPR. • Monitor and assure compliance with information security and privacy regulations, including APRA CPS 234, Privacy Act and GDPR • Manage internal and external audits and remediation • Deliver training programs for security and privacy awareness • Conduct/review security risk assessments of assets and projects • Manage supply chain security • Support Sales and commercials team in responding to security questionnaires • Provides application security services including secure coding techniques and reviews, education & awareness, process and tools, security testing support and guidance for internal software development projects • Reviews information security policies, incident response plans, change management, vulnerability management, patch management policies, etc., as they apply to various facets of the infrastructure in scope. • Performs internal penetration tests, network vulnerability assessments to provide a comprehensive view of the client’s network weaknesses that are exposed to threats. Following are the certifications I have: CISSP CCSP (Cloud security) CEH
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Nessus
    HIPAA
    Certified Information Systems Security Professional
    PCI
    GDPR
    Employee Training
    AT&T Cybersecurity
    Data Protection
    OWASP
  • $55 hourly
    🌟Available for Meetings & Calls 🌟 🏆 Top Rated Expert (Among Top 5% on Upwork & 100% Satisfaction from Clients ) ✅Certified Ethical Hacker ✅ ✅Top rated Cybersecurity Expert ✅ ✅ Server Security Misconfiguration✅ ✅ Broken Authentication and Session Management ✅ ✅ OWASP Certified Security Tester ✅ ✅ Android Penetration Tester ✅ ✅ Webapp Penetration Tester✅ ✅ WebApplicaiton Penetration Tester ✅ ✅ Network Penetration Tester✅ ✅Malware Removal Sites , Device ,Network ✅ Greeting, I have years of experience being an Ethical Hacker ,Penetration Test,Information ,Network Security & Wordpress Development, I can successfully complete your assignment faster and with higher pleasure than anyone. why and how? 🌟🌟🌟Please Keep Reading🌟🌟🌟 So Basically, I can surely assist you in this regard if you are considering anything that has been said. I have a Master's degree in Cyber security and am well-versed in the fields of network security, forensics, cloud computing, and information security. have completed training programs with several government agencies. numerous college-level projects completed were employed as a policymaker. Intern at eShikhon completed. furthermore has an experienced R&D person who is trained in cutting-edge mobile and wireless security. working as a Consultant and Freelance Cyber Security Expert ► Web-APP Penetration Testing ► Android Pentest Web Applications Penetration Testing ► Network Penetration Testing ► Mobile Applications Penetration testing ► API Penetration Testing _________________________________________________________________________ - Cloud Computing - AWS - Azure Security - Web hosting and security - DEV OPS ENGINEERING - ISO - OSINT - OSCP - IEC - Microsoft 365 Security - Cryptocurrency analysis - G-Suite - Secure Wordpress Site - Network Pentration Test - Template changes (cosmetic and functional) - Optimize related posts - WordPress administration - SSL certificates - Plugin updates, maintenance and recommendations - Custom plugin development in Javascript, CSS, HTML and php - increase Site security / decrease vulnerability - Minify CSS & Java script - Clean up orphaned posts, media duplicates, etc. - Optimize hosting -WordPress theme development - develop a small app on Wordpress to generate automated offers and push it in our Salesforce instance through REST API. Good Command on given below : * Python (including frameworks such as Django(3+ years) * 4+ years of experience in software development * LMS * Scripting by Python & Bash * WordPress Theme Development * WordPress Plugin * WordPress update (core) * JavaScript * HTML * CSS * PHP [Some of My Client Reviews] 🌟🌟🌟🌟🌟"Mr Jahangir is a very resourceful and knowledgeable person who knows his job. He was able to decipher my issue and helped me resolve it and guided me to the things that needed to be done to improve my website performance. Best Ethical Hacker , I will certainly use his expertise in future"🌟🌟🌟🌟🌟 🌟🌟🌟🌟🌟"Dedicated to the task with the highest level of competence and professionalism. A real expert and a breeze to work with. Thanks 👍"🌟🌟🌟🌟🌟 🌟🌟🌟🌟🌟"Highly recommend, Great Hacker will try every possible mean to get the job done"🌟🌟🌟🌟🌟 🌟🌟🌟🌟🌟"Super fast and easy to work with. Will definitely hire MD again""🌟🌟🌟🌟🌟 🌟🌟🌟🌟🌟"Very good freelancer! Does good work and is superbly (I can't find a more positive adjective) flexible to problems!" 🌟🌟🌟🌟🌟 🌟🌟🌟🌟🌟"He is responsive and responsible. Also, he is a quick learner." 🌟🌟🌟🌟🌟 I aspire to be someone with strong work ethic. I always strive to build lasting ties with my clients and leave them happy with my work! I'll be a good guy on the project, I promise.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Website Security
    Virus Removal
    Web App Penetration Testing
    Network Penetration Testing
    Internet Security
    Ethical Hacking
    Security Engineering
    Network Security
    Digital Forensics
    Penetration Testing
    Malware Removal
    Information Security
    Cybersecurity Management
    Security Assessment & Testing
  • $125 hourly
    Having worked for many Fortune 100 companies, I now run a boutique cybersecurity consultancy called Careful Security. We serve businesses of all sizes, We providing a 360-degree cybersecurity solution by #Securing Website #Protecting Data #Pass an audit/vendor questionnaire/cyber-insurance questionnaire #SIEM Solution for security monitoring and alerting Past Accomplishments # Designed and Implemented security controls for Warner Bros. iconic shows and movies such as Harry Potter, The Game of Thrones, Curb your enthusiasm. ## Secured video games for EA Sports - FIFA, The Sims, and Madden. ### Secured financial information for high net-worth clients for Goldman Sachs. #### Managed security of personal information for the millions of policyholders in State Farm Insurance. ##### Presented at Conferences and written articles for security journals.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    PCI
    Email Security
    Certified Information Systems Security Professional
    ISO 27001
    Security Engineering
    Security Infrastructure
    Compliance Consultation
    Cloud Security Framework
    Web Application Security
    Information Security Audit
    Information Security
    Penetration Testing
    Security Policies & Procedures Documentation
  • $25 hourly
    I am a cybersecurity engineer with a very broad range of IT skills and technologies. I worked as a pentester and a systems and networks administrator in local companies. During those years, I acquired strong experience as a cybersecurity consultant working on web/mobile applications security. I enjoy analyzing malwares, and I like to reverse engineer binaries and figure out how things work. I'm a big lover of binary exploitation. In my free time, I like to dig deeper into the world of exploiting executables and learn new tricks and techniques. I have strong knowledge and years of experience with the following technologies: - Linux - Python, bash - C++ - C - JavaScript - C# - Java - PHP - Laravel
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Linux
    Mobile App
    Web App Penetration Testing
    API
    C
    C++
    Reverse Engineering
    Scriptwriting
    Penetration Testing
    Security Testing
    Network Security
    Bash
    Python
  • Want to browse more freelancers?
    Sign up

How it works

 

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by 5M+ businesses

How do I hire a Vulnerability Assessment Specialist on Upwork?

You can hire a Vulnerability Assessment Specialist on Upwork in four simple steps:

  • Create a job post tailored to your Vulnerability Assessment Specialist project scope. We’ll walk you through the process step by step.
  • Browse top Vulnerability Assessment Specialist talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Vulnerability Assessment Specialist profiles and interview.
  • Hire the right Vulnerability Assessment Specialist for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Vulnerability Assessment Specialist?

Rates charged by Vulnerability Assessment Specialists on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Vulnerability Assessment Specialist on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Vulnerability Assessment Specialists and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Vulnerability Assessment Specialist team you need to succeed.

Can I hire a Vulnerability Assessment Specialist within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Vulnerability Assessment Specialist proposals within 24 hours of posting a job description.

Schedule a call