Hire the best Vulnerability Assessment Specialists in Brazil
Check out Vulnerability Assessment Specialists in Brazil with the skills you need for your next job.
- $100 hourly
- 5.0/5
- (2 jobs)
✅ Cyber Security Consultant specialized in Offensive Security (Penetration Testing) and Application Security. 🔸Press “...” on the top, then “Send a Message” for more details! I have worked and studied with High Profile Clients and Organizations in my career, including the following: ★ Zcash Brazil ★ SiDi (Samsung P&D Institute in Brazil) ★ Status.im (Web3 DApp) ★ National University of Córdoba (Argentina) ★ University of Colorado (USA) I have a degree in Computer Science, specializing in Cyber Security at the University of Colorado in the United States and in Information Technology, Communication and Culture at the National University of Cordoba in Argentina. I have experience in Offensive Security in conducting security auditing activities on software (Web, Android and iOS), Code review and secure design, Dynamic Analysis and Pentesting, and Writing technical documentation and reports on vulnerabilities found with suggested solutions and remediation. 📌 WHY CHOOSE ME OVER OTHER FREELANCERS? ✅ Over-Delivering: This is core to my work as a Freelancer. My focus is on GIVING more than what I expect to RECEIVE. I take pride in leaving all of my clients saying "WOW". ✅ Responsiveness: Being extremely responsive and keeping all lines of communication readily open with my clients. ✅ Resilience: Reach out to any of my current or former clients and ask them about my resilience. Any issue that my clients face, I attack them and find a SOLUTION. ✅ Kindness: One of the greatest aspects I implement in all facets of my life. Treating everyone with respect, understanding all situations, and genuinely wanting to RESOLVE customer challenges. 🙋♂️I look forward to working with you to provide reliable, consistent, and high-level security consultation and analysis. With proven experience in the market, I am the right professional for your project. Please contact me so that we can work together to fully meet your business needs! 🔎 WHAT SERVICES AND TECHNOLOGIES CAN YOU REVIEW? • Infrastructure penetration testing • Web application testing • Mobile App security analysis (iOS, Android, WearOS) • Cloud security assessments • API penetration testing • DApp & Smart Contract Audits • Security best practices • Code Review and best practices • Red teaming and adversary emulation. 🗎 WHAT INFORMATION WILL BE IN THE TECHNICAL REPORT? I adopt a flexible approach to reporting and, as such, I aim to accommodate reporting requirements. The final report will provide a snapshot of the state of security for the assets at the time of testing. It will include the following: • Executive Summary • Risk classification • Technical Summary • Scope of Engagement • Key Findings • Vulnerability Risk Ratings • Technical Vulnerability Details • Recommendations 📚 EXPERIENCE AND EXPERTISE WITHIN THE FOLLOWING: • Web Application Penetration Testing • Mobile Applications Penetration Testing • API Penetration Testing (REST, SOAP, GraphQL) • External Infrastructure Penetration Testing • Internal Infrastructure Penetration Testing • Server Build Reviews • Workstation Build Reviews • Mobile Device and MDM Testing • Network Device Security Reviews • IoT Security • Embedded Hardware • Simulated Phishing • Wireless Assessments • Red Team Assessments • AWS Configuration Reviews • Azure Configuration Reviews • Open Source Projects Configuration & Reviews (Nextcloud, Wireguard, OpenVPN etc) Projects not for me: ✖Asking to hack/crack/access someone else accounts, systems, social media, etc ✖Asking to create falsified audit or assessment reportsVulnerability Assessment
WordPress Malware RemovalWeb App Penetration TestingNetwork Penetration TestingNIST Cybersecurity FrameworkSecurity AnalysisNIST SP 800-53Security EngineeringCloud SecurityApplication AuditMalware RemovalInformation SecurityPenetration TestingSecurity Assessment & TestingSecurity Testing - $65 hourly
- 3.5/5
- (3 jobs)
I'm a developer and cybersecurity expert who believes you shouldn't have to choose between building something amazing and keeping it secure. I specialize in bringing ambitious, AI-powered applications to life and ensuring they're fortified against real-world threats. As the founder of a cybersecurity consultancy, my perspective goes beyond just writing code. I partner with my clients to think strategically, building security into the very foundation of your project. Whether you have a game-changing idea for an AI tool or need to make sure your current application is bulletproof, I'm the person you call when you need it done right. Here's how I can help you: Bring Your AI Vision to Life Got an idea for a custom LLM-powered app or chatbot? I can build it from scratch. We can use powerful frameworks like LangChain and PyTorch to create truly intelligent solutions. I'll help you integrate AI into your existing systems to automate tasks, analyze threats, or unlock new data insights. Fortify Your Digital Assets I'll act as your dedicated ethical hacker, performing deep-dive penetration tests on your web apps, APIs, and cloud infrastructure to find and fix vulnerabilities before they're exploited. I build systems with security best practices (like data encryption and LGPD compliance) from the start, hardening them against common attacks. Build Your Application, The Right Way I create complete, full-stack applications—from a powerful backend in Python (FastAPI) to a fast, modern frontend using Next.js or React. Need a desktop app? I can build cross-platform solutions with Electron. Develop Robust & Secure APIs I design and build production-ready REST APIs that are not only scalable but also heavily tested for enterprise-grade security and privacy. My toolbox is always expanding, but here are the core technologies I use to deliver top-tier results: Languages: Python, TypeScript/JavaScript, Go, SQL, Move Frameworks: FastAPI, Next.js, React, Electron, Flask, React Native Databases: PostgreSQL, MySQL, Supabase AI/ML: LangChain, PyTorch, OpenAI, Pandas DevOps & CI/CD: GitHub Actions, GitLab CI, Jenkins Cybersecurity: OWASP, PTES, Burp Suite, Nmap, Metasploit, Wazuh, SOC/SIEM integration Cloud: AWS, Google Cloud, AzureVulnerability Assessment
Mobile App DevelopmentMachine LearningCode ReviewFull-Stack DevelopmentAI ImplementationArtificial IntelligenceLLM Prompt EngineeringAI SecurityEthical HackingFastAPIAPI DevelopmentWeb App Penetration TestingPenetration TestingPython - $55 hourly
- 4.9/5
- (2 jobs)
Technology professional with 20+ years of experience in IT, specializing in cybersecurity, cloud computing, and infrastructure management. Expertise in O365, Azure, IAM, SIEM (Microsoft Sentinel/ IBM QRADAR), PenTesting, Linux, Firewalls, API integrations, and governance frameworks such as NIST Cybersecurity Framework 2.0 and Governance Data Platform (OneTrust). Throughout my career, I have led and executed strategic IT security projects that significantly enhanced organizational resilience and operational efficiency. Notable achievements include: **5-Year Information Governance Strategy:** Designed and implemented a governance roadmap, transforming the organization's cybersecurity maturity from an initial stage to a managed and optimized state. This was achieved through a structured approach focusing on the right balance of tools, processes, and people, ensuring regulatory compliance and risk reduction. **Microsoft Sentinel SIEM Deployment:** Successfully deployed and configured, enhancing security visibility, incident response, and threat intelligence capabilities. Integrated various log sources, automated threat detection, and improved overall cybersecurity posture. **Firewall & Cloud Security Projects:** Led major **firewall security implementations**, ensuring network segmentation, secure remote access, and threat prevention. Additionally, drove security initiatives in cloud environments, focusing on **Azure security policies, identity management, access controls, Microsoft Defender and Defender for Cloud**. **IAM & Compliance:** Extensive experience with **Identity and Access Management (IAM - IBM Secure Verify Governance)** solutions, ensuring secure authentication, authorization, and compliance with industry best practices. Involved in projects aligning with **NIST CSF 2.0**, enhancing governance, risk management, and security operations. **API Integrations & Web Development:** Experienced in integrating **APIs** to enhance automation, data security, and business process optimization. Developed and managed web solutions, including **WIX-based** platforms, ensuring seamless digital experiences. **Security & Risk Management:** Hands-on experience with **penetration testing, vulnerability assessments, and incident response**. Adept at evaluating security risks, implementing proactive security measures, and ensuring business continuity. Passionate about leveraging technology to **enhance security, optimize IT environments, and drive digital transformation**, I continuously seek opportunities to innovate and implement best practices in cybersecurity, governance, and cloud security."**Vulnerability Assessment
ServiceNowMicrosoft IntunePalo Alto FirewallsUser Identity ManagementOffice 365Microsoft AzureKali LinuxWeb App Penetration TestingPenetration TestingSecurity Assessment & TestingAPI IntegrationWix - $75 hourly
- 0.0/5
- (0 jobs)
Cybersecurity Specialist with 9+ years of experience specializing in cloud security and AI-driven threat detection. Proven expertise in securing on-premises and cloud infrastructures (AWS, Azure, GCP) for global organizations and integrating security into DevSecOps pipelines. Adept at implementing advanced risk management strategies, automating compliance with frameworks (CIS, NIST), and managing secure deployments in remote environments.Vulnerability Assessment
TerraformFirewallPalo Alto FirewallsAI SecurityData ProtectionCIS Control AssessmentNIST SP 800-53Risk AssessmentNetwork SecurityCloud SecurityInformation Security - $65 hourly
- 0.0/5
- (0 jobs)
Hi! I’m Diogo, a cybersecurity analyst with over 5 years of practical experience in Blue Team operations, including SIEM management, threat detection, incident response, and cyber threat intelligence. Throughout my career, I've worked extensively with tools like QRadar, Splunk, FortiSIEM, MISP, and Axur. My expertise encompasses endpoint protection, vulnerability management, and the development of security playbooks. I have a strong track record in implementing security measures, conducting threat analyses, and collaborating with cross-functional teams to enhance organizational security posture. 🗣 Communication preference: I work best with written communication (Upwork chat or email). I am comfortable reading and writing in English, and I use tools to support clarity when needed. This allows me to focus on delivering quality results. Let’s connect and strengthen your cybersecurity strategy with practical, effective solutions.Vulnerability Assessment
Information SecurityMalware DetectionFortiGate FirewallLinux System AdministrationSecurity Operation CenterSplunkNetwork SecurityCyber Threat IntelligenceInformation AnalysisInformation Security Threat MitigationIncident Response PlanThreat Detection - $50 hourly
- 0.0/5
- (0 jobs)
Professional with 23 years of experience in the technology area, with solid knowledge in security incident response, SOC, hardening, cyber defense, vulnerability analysis, pentest, red team exercises, large cybersecurity projects in on-premises, Cloud and mobile environments (AppSec) and structuring high-performance teams. Solid experience in implementing technical solutions and structuring high-performance security teams. Responsible for implementing services, tools and processes such as: SOC/CSIRT 24x7, playbooks, Security Incident Response Plan (RIS), SIEM based on MITRE ATT&CK, hardening and security baselines, RedTeam exercises such as Pentest, BAS (Breach And Attack Simulation), DAST and SAST vulnerability analysis in on-premises/cloud infrastructure (OpSec), Android and IOS mobiles (AppSec) and defining secure architecture with Zero Trust concepts. Implementation of BlueTeam tools such as: NGAv/EDR, NGFw, MTLS, NAC, DLP, IDS, IPS, WAF, AppControl, Anti-DDoS, Password Vault and others. Graduated in "Information Systems", Post-Graduated in "Projects and Network Management" and with an MBA in "Strategic Business Management". I am a member of ISO/ABNT/CE-021 000.027 (Special Commission for the Study of Information Security, Cybersecurity and Data Privacy Protection), member of ANPPD (National Association of Data Privacy Professionals) and certified in the most renowned international frameworks, such as: ISO27001, ISO20000, ITIL, COBIT, Scrum, Kanban and others. Ranked among the TOP 04 Ethical Hackers on the largest BugBounty platform in Brazil in 2021 and TOP 05 on one of the largest international platforms, among more than 500,000 hackers and cybersecurity enthusiasts, in 2022. Advanced knowledge in RedTeam exercises, with: OWASP Zed Attack, Burpsuite, Metasploit, Maltego, Hydra, Nikito, SQLmap, Gitdorker, Nmap, Nessus, Nuclei, Tenable.io, Quixxi, MobSF, Yaazhini, among others from Kali Linux. • Great capacity for self-taught learning and determination to learn new technologies. • Competence to ensure continuous improvement, security and automation of the IT environment. • Excellent extra-personal relationships and resourcefulness to deal with work and situations under pressure.Vulnerability Assessment
Cloud Security FrameworkCybersecurity ToolSecurity ManagementDenial-of-Service Attack MitigationOWASPSQL Injection MitigationKali LinuxEthical HackingInformation Security - $50 hourly
- 0.0/5
- (0 jobs)
Na Tryad Security, acreditamos que segurança ofensiva de qualidade não deve ser privilégio de grandes corporações. Nossa missão é democratizar o acesso à cibersegurança no Brasil, protegendo pequenas e médias empresas com soluções acessíveis, práticas e eficazes. Somos movidos pelo propósito de transformar a forma como as empresas enxergam a segurança digital — não como um custo, mas como um investimento estratégico. Atuamos lado a lado com nossos clientes, oferecendo suporte contínuo e construindo juntos uma cultura sólida de prevenção. Nossa visão é clara: ser referência nacional em segurança ofensiva, com uma abordagem simples, inteligente e centrada nas reais necessidades de cada negócio. Nossos valores nos guiam: Resiliência Estratégica: reagimos com inteligência, agilidade e propósito diante das ameaças. Colaboração: acreditamos na força do trabalho em equipe, com foco e organização. Transparência: falamos a verdade, de forma clara e objetiva. Comprometimento com o Cliente: mais do que prestadores de serviço, somos parceiros na jornada da segurança. Seja qual for o tamanho da sua empresa, segurança é essencial. E com a Tryad, ela também pode ser simples, acessível e eficiente.Vulnerability Assessment
Cybersecurity MonitoringPenetration TestingCyber Threat IntelligenceCybersecurity Management - $20 hourly
- 0.0/5
- (0 jobs)
I am a professional and experienced Ethical Hacker, exclusively specialized in web application penetration testing. With a solid background in cybersecurity and information technology, I perform comprehensive Black Box, Grey Box, and White Box assessments tailored to each client's specific needs. My expertise includes identifying a wide range of attack vectors and delivering clear, actionable reports that go beyond simply pointing out vulnerabilities. Each report includes detailed documentation, proof of concept, and practical remediation guidance to help clients effectively secure their applications. Client satisfaction is my top priority — I ensure that every project provides real value by offering insights that not only uncover weaknesses but also contribute to continuous security improvement.Vulnerability Assessment
Web App Penetration TestingPenetration TestingInformation GatheringWeb Application SecurityEthical Hacking - $15 hourly
- 0.0/5
- (0 jobs)
🔐 Is your website really secure? Find out before hackers find out for you! You've invested time, money and effort in your website — but is it protected against attacks and security breaches? The truth is that most websites have vulnerabilities and don't even realize it. And when a problem appears, the damage can be huge: a drop in Google rankings, data loss, instability or even serious hacks. 💥 Avoid all of this now — and for a symbolic price. I'm here to identify and report all security breaches on your website, clearly and objectively, before an attack happens. And the best part: for just R$30.00. That's right: for $15.00 you can prevent losses that can reach thousands of reais. 💡 What you get: A complete analysis of your website Identification of critical flaws and correction recommendations Simple and straight-to-the-point report ⚠️ Security is not a luxury, it's a necessity. Get your website protected now — with experts — for a price that fits your budget.Vulnerability Assessment
WordPress SecurityBug ReportsWeb Application SecurityWeb App Penetration TestingInformation Security - $18 hourly
- 0.0/5
- (0 jobs)
I am a cybersecurity specialist, ethical hacker and back-end developer with more than 4 years of experience in Java, PHP and Node.js. I have expertise in creating personalized websites, systems and applications for small and medium-sized companies, ensuring safe, efficient and scalable solutions. Clear and regular communication is essential to me. Let's turn your idea into reality with innovative, high-performance solutions. Get in touch and let's talk!Vulnerability Assessment
Cybersecurity ManagementEthical HackingSystem SecurityPHPLinuxJestAWS ApplicationSQLiteSequelizeElectronJavaNode.jsJavaScript - $12 hourly
- 0.0/5
- (0 jobs)
I'm an aspiring cybersecurity professional focused on ethical hacking, network security, and vulnerability assessment. I'm currently studying through programs offered by Cisco and Google, while building hands-on experience with tools like Kali Linux, Nmap, and Wireshark. I’m passionate about helping businesses strengthen their digital defenses, and I’m always learning to stay ahead of threats. I'm available for: • Network monitoring • Vulnerability analysis • Basic penetration testing • Technical support in cybersecurity Let’s connect and build secure systems together.Vulnerability Assessment
GraphTechnical SupportPenetration TestingLinuxKali LinuxFirewallComputing & NetworkingNetwork EngineeringComputer NetworkInformation Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.