Hire the best Vulnerability Assessment Specialists in Egypt
Check out Vulnerability Assessment Specialists in Egypt with the skills you need for your next job.
- $48 hourly
- 5.0/5
- (10 jobs)
I hold a Bachelor's degree in Computer Science And Master's Degree In AI. I have acquired extensive knowledge and expertise in programming languages such as Python, JavaScript, and Dart (Flutter). My professional experience encompasses a broad range of skills, including a strong background in Open-Source Intelligence (OSINT) and Penetration Testing. I am highly motivated and committed to keeping myself up-to-date with the latest technologies, frameworks, and methodologies to enhance my skillset. Continual learning and professional growth are fundamental components of my work ethic and personal philosophy.Vulnerability Assessment
Digital ForensicsInternet SecurityUI/UX PrototypingWeb DevelopmentAutomationBug BountyData StructuresAlgorithmsAndroidiOSFlutterDartMobile App DevelopmentPython - $30 hourly
- 4.9/5
- (8 jobs)
I am an Ethical hacker, Web appliaction penetration tester, Mobile appliaction penetration tester, I worked at Hackerone Platform for almost 4 years , Found 150 Valid bug at different big companies like Autodesk, Dyson, Horizen, GrabCAD, BitMEX, Pfizer, Acronis, SEGA, etc... , Received 150 Thanks from diff companies , Created/wrote private tools with python programming langauge to automate find bugsVulnerability Assessment
Smart ContractWeb3Web Application SecurityUsability TestingBug BountyDesktop Application TestingMobile App TestingEthical HackingNetwork Penetration TestingWeb App Penetration TestingApplication SecurityKali LinuxPenetration TestingInformation Security - $66 hourly
- 5.0/5
- (22 jobs)
⚠️DISCLAIMER ⚠️: I DON'T ACCEPT ILLEGAL WORK AND I DO NOT HACK MOBILE PHONES OR ACCOUNTS OR ANY TYPE OF THIS WORK As a dedicated Computer Engineering student, I've invested years in mastering ethical hacking, web app penetration testing, and conducting OSINT investigations, starting my journey in 2018. Through practical application and thorough testing of these skills, I've evolved into a versatile professional, excelling as a hacker, proficient web app penetration tester, adept vulnerability assessment specialist, and detail-oriented OSINT investigator. My track record speaks for itself, boasting a pristine reputation and a flawless 100% success rate across all Jobs FAQ Q: Am I certified 🤔? A: yes,I am certified web app Penetration tester with eWPTX from INE Q: What tools do i use in Penetration testing? A: That depends on the job, so sometimes i use manual scans and exploits and sometimes i use tools like (Nmap, BurpSuite, Metasploit, Nessus, SQLmap, OpenVAS, WPScan, Nikto, TestSSL)Vulnerability Assessment
Linux System AdministrationInternet SecurityWebsite SecurityWeb App Penetration TestingAircrack-ngArticle WritingBlack Box TestingCybersecurity MonitoringEthical HackingWeb TestingDigital ForensicsCybersecurity ManagementSystem SecurityPenetration Testing - $70 hourly
- 4.9/5
- (14 jobs)
As a cybersecurity expert and projects manager at XEye Security (XEyecs.com), I have worked with clients across the EU, the US, the Middle East, and South Africa and provided high-quality cybersecurity, Penetration Testing, Digital Forensics, and Cyber Investigation services ensuring their system's security against all kinds of cyber threats. I have more than 12 years of dedicated and outstanding experience with extensive knowledge dedicated to delivering high-quality security services that meet and exceed client's expectations. I believe that innovation, efficiency, and quality are the cornerstones of exceptional cybersecurity. At XEye Security we provide robust cybersecurity solutions and services as below: - Security Operations Center - Network Security - OT Security - Blockchain Security - Cloud Security - Email Security - Information Security Compliance Standards consulting and auditing - Cyber Investigation - Digital Forensics - Security Review - Vulnerability Remediation and Malware Removal - Dark Web Monitoring We also provide through our XEye Academy Cybersecurity recorded, live and private trainings, our private trainings include: - Security Analyst - Red Teaming - Application Security - Network Security - Security Awareness Training - Cybersecurity Certificate Based Training Please reach out to me though Upwork and I and my team are happy to support you anytime.Vulnerability Assessment
Information Security AuditCybersecurity ToolSecurity Assessment & TestingSecurity AnalysisSecurity TestingCloud SecurityRed Team AssessmentCode ReviewCybersecurity MonitoringISO 27001Information SecurityPenetration TestingDigital ForensicsCybersecurity Management - $30 hourly
- 5.0/5
- (93 jobs)
I'm a Penetration Tester and Cyber Security Specialist who is a professional in evaluating the security posture of Web-Applications (Websites) and ensuring the security of personal clients' online identities, accounts, devices, and networks, I've possessed my current knowledge through 3+ years of self-study and research plus 2+ years of work in the industry, protecting clients on a personal level and running vulnerability assessments against business websites, always leaving positive impression and impact, I hold a great record of being able to expertly provide the following services: - Perform comprehensive security checkups on Emails and Phone numbers and pinpoint security holes which often lead victims to be hacked with zero interaction nor awareness from them. - Assist in Account Recovery (Ex. Instagram, Facebook) - Educate thoroughly on the findings and remediations for a vulnerable target, equipping clients with enough information to trust themselves as they continue to utilize the technologies as normal with no fear of being targetted by hackers. - Investigate and educate on online frauds/scams, especially crypto ones, why and how they work, and how to distinguish between legit and not legit easily. - Clean up networks and devices from viruses/malware and ensure optimal patching for security. - Report fraud websites that impersonate legit businesses for a takedown. IMPORTANT: When it comes to cybersecurity-related services, there is a number of scammers not to be underestimated, whether within or outside of Upwork, therefore stay vigilant and keep in mind the following, 1. If you were scammed online via crypto, there's no one out there with the right to give a guarantee that they will be able to recover it for you despite how well furnished the so-called hacker's portfolio appears to be, the chance remains very slim and you should only pursue this kind of service for the sake of leaving no stone unturned knowing the high probability of failure, and you should only select a freelancer with a reputable profile and reviews to back up their activity because scammer accounts are usually fresh with no reviews and no verified ID, feel free to consult me to evaluate that. 2. Same applies to the request of hacking an account, there are complicated caveats that explain why it DOES NOT work the way you think it does but to keep it short, if you want someone's account hacked, aside from it being illegal and unethical and isn't the type of "service" I provide, the chance for it to work is about 1% to begin with, again, I'm available for consultation, account recovery is a different subject with a higher probability for success as long as it's your own account that was lost/hacked.Vulnerability Assessment
Malware RemovalInformation SecuritySystem SecurityNetwork SecurityInformation Security ConsultationWebsite SecurityPenetration TestingNetwork Penetration TestingInternet SecurityEthical HackingSecurity TestingSecurity Assessment & Testing - $40 hourly
- 0.0/5
- (0 jobs)
Experienced Junior Cyber Security Engineer with expertise in network security and ethical hacking. I am skilled in identifying vulnerabilities, fortifying defenses, and staying updated on industry trends. Eager to contribute to organizational security and advance in cybersecurity.Vulnerability Assessment
Digital ForensicsFortiGate FirewallSplunkSecurity Operation CenterSecurity ApplianceIntrusion Prevention SystemIntrusion Detection SystemMalware DetectionNetwork Security - $40 hourly
- 0.0/5
- (0 jobs)
Professional Profile Information Security Engineer with a solid knowledge in the field of Cyber Security, that enables me to go through different technical issues and provide variety of solutions, interested in Web application and Network penetration testing and have a big passion to learn new attacks and methodologies, looking always to improve and sharpen my skills. - Core Skills: Red Teaming Active directory attacks and defenses. Penetration Testing Network security expertise in different devices Bug Hunting Skilled Penetration testing for network& web applications Solid background in scripting (Python, PHP), - Solution Expertise: Application Security Testing Software (Burp Suite) Vulnerability Management(Nessus,Acunetix, Netsparker)Vulnerability Assessment
Red Team AssessmentMicrosoft Active DirectoryPHP ScriptWeb App Penetration TestingMobile AppNetwork SecurityNessusApplication SecurityMetasploitAT&T CybersecurityPenetration TestingSystem Security - $50 hourly
- 0.0/5
- (1 job)
PERSONAL PROFILE Highly skilled and knowledgeable engineer with 10 years IT experience in the Security Field. Wide-ranging expertise in Network Security, Security management, anti-virus solutions, firewalls. Excellent interpersonal skills and proven ability to learn new technologies and concepts.Vulnerability Assessment
CompTIASecurity EngineeringComputing & NetworkingTeachingVirus RemovalNetwork EngineeringCybersecurity ManagementFirewallSystem Security - $999 hourly
- 5.0/5
- (1 job)
Penetration Tester with a passion for identifying and mitigating security vulnerabilities. Leveraging a strong technical background and extensive experience in ethical hacking, I specialize in assessing network and application security, conducting thorough vulnerability assessments, and providing actionable recommendations to enhance cyber defenses. I am committed to staying up-to-date with the latest hacking techniques and security trends to deliver comprehensive and effective solutions.Penetration Tester with a passion for identifying and mitigating security vulnerabilities. Leveraging a strong technical background and extensive experience in ethical hacking, I specialize in assessing network and application security, conducting thorough vulnerability assessments, and providing actionable recommendations to enhance cyber defenses. I am committed to staying up-to-date with the latest hacking techniques and security trends to deliver comprehensive and effective solutions.Vulnerability Assessment
Web Application SecurityNetwork SecurityPenetration Testing - $5 hourly
- 5.0/5
- (2 jobs)
🔐 Penetration Testing Expertise I specialize in various penetration testing methodologies, ranging from reconnaissance and enumeration to exploitation and post-exploitation phases. My self-taught journey has allowed me to dive deep into: Network Penetration Testing: Identifying open ports, services, and vulnerabilities using tools like Nmap, Wireshark, and Metasploit. Web Application Testing: Knowledge of the OWASP Top 10 vulnerabilities, with hands-on experience in finding and exploiting web application security flaws like SQL injection, XSS, and CSRF. System Exploitation: Familiar with exploiting misconfigurations, weak credentials, and outdated systems on Linux and Windows environments. 🔧 Tools and Techniques I have practical experience with a wide range of industry-standard tools used in penetration testing: Nmap: Network scanning and port enumeration. Metasploit Framework: Exploitation and post-exploitation. Burp Suite: Web application vulnerability identification. Wireshark: Network protocol analysis and traffic monitoring. OpenVAS & Nessus: Vulnerability scanning and reporting. SQLMap: Automated SQL injection and database testing. Hydra: Brute force attack tools for login and credential testing. John the Ripper & Hashcat: Password cracking and analysis. 📚 Self-Study & Certifications (In Progress) While I’m still pursuing formal certifications, my continuous learning path has exposed me to the same concepts and knowledge covered in recognized programs such as: TryHackMe: Participated in Capture the Flag (CTF) challenges, working on various real-world penetration testing scenarios. Hack The Box: Completed multiple labs focused on web and network exploitation, privilege escalation, and post-exploitation. YouTube & Blogs: Regularly follow prominent cybersecurity experts and resources for up-to-date learning and practical knowledge. 🖥️ Personal Projects To further sharpen my skills, I’ve developed and maintained a personal cybersecurity lab to simulate penetration testing environments. Here are a few highlights of my hands-on projects: Home Lab Setup: Created virtual environments using VirtualBox, simulating networks and vulnerable machines such as Metasploitable and DVWA for practice. Conducted vulnerability scans and exploited systems using tools like Nmap, Nessus, and Metasploit. CTF Participation: Regularly engage in Capture the Flag events on TryHackMe and Hack The Box, successfully identifying and exploiting vulnerabilities in both Linux and Windows environments. Scripting Automation: Developed basic Python scripts to automate repetitive tasks like scanning and vulnerability assessment. 🕵️♂️ Key Services I Offer Whether you’re a small business or an individual looking to secure your systems, I can provide valuable services to enhance your security posture: Web Application Penetration Testing: Comprehensive testing to identify and exploit web vulnerabilities, including SQL injection, XSS, and broken authentication mechanisms. Network Penetration Testing: Identify open ports, vulnerable services, and misconfigurations in your network infrastructure. Vulnerability Assessment: A detailed report on potential vulnerabilities within your systems, offering insights and suggestions on remediation. Password Auditing and Brute Forcing: Ensure that your systems have strong, secure password policies by testing them against various brute force methods and password cracking techniques. Wireless Network Testing: Evaluate the security of your wireless infrastructure, including encryption and access point vulnerabilities. Security Consultation: Provide strategic guidance on how to strengthen your security practices, including best practices in securing web applications, networks, and user data. 🧠 Continuous Learning & Future Goals Cybersecurity is an ever-evolving field, and I pride myself on being a lifelong learner. I regularly participate in online courses, hands-on labs, and CTFs to stay current with the latest attack vectors, vulnerabilities, and defense strategies. I’m currently working towards formal certifications such as: CompTIA Security+ Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) I am committed to continuously expanding my knowledge and refining my skills to provide high-quality cybersecurity services. 🚀 Why Choose Me? While I may be at the beginning of my career in cybersecurity, my enthusiasm, dedication, and hands-on experience set me apart. Here’s why you should consider me for your next project: Self-Motivated and Fast Learner: I have developed a strong technical foundation through self-study and practical experience, giving me the ability to adapt to new tools and technologies quickly. Passion for Cybersecurity: I am deeply passionate about identifying vulnerabilities and helping others secure their systems. My work is driven by curiosity and a desire to protect against cyber threats. Attention to Detail: Cybersecurity requires thorough analysis anVulnerability Assessment
Security AnalysisKali LinuxRisk AssessmentRisk AnalysisSecurity TestingNetwork SecurityOWASPPenetration TestingInternet of ThingsTroubleshootingOperating SystemProblem SolvingNetwork DesignInformation Technology - $20 hourly
- 3.8/5
- (2 jobs)
I am a highly skilled penetration tester with 2 years of hands-on experience in cybersecurity, specializing in Web, API, Android, and Network Penetration Testing. Throughout my career, I've worked with top companies such as SecqLinq, Bugswagger, and DeepStrike, delivering thorough and actionable security assessments. Certified in EWPTXv2 and Certified Authorization Professional (CAP), I bring in-depth knowledge and technical expertise to every project. My approach includes detailed penetration testing and comprehensive reporting to ensure that vulnerabilities are identified and mitigated effectively. Expertise Includes: Web Penetration Testing: Identifying and fixing vulnerabilities in web applications. API Penetration Testing: Securing APIs against common and advanced attack vectors. Android Penetration Testing: Protecting Android applications from security threats. Network Penetration Testing: Enhancing network security by identifying infrastructure weaknesses. I take pride in delivering detailed and professional pentest reports that include thorough risk analysis and remediation recommendations to help clients fortify their security posture.Vulnerability Assessment
Kali LinuxWeb App Penetration TestingPenetration Testing - $70 hourly
- 0.0/5
- (1 job)
Security consultant offer security advise to many companies and public figures also worked as a website administrator for many local business fields , Big data seller ...Vulnerability Assessment
Web Application SecurityInformation Security AuditData MiningWeb App Penetration TestingSecurity AnalysisSecurity EngineeringInformation Security - $30 hourly
- 0.0/5
- (0 jobs)
Experienced cybersecurity professional, penetration tester, and ethical hacker with a proven track record in securing digital environments. I excel in identifying vulnerabilities, assessing risks, and implementing effective security measures to safeguard digital assets. 🔒 My Expertise: - Penetration Testing & Vulnerability Assessment: Comprehensive automated and manual testing to uncover and address potential security flaws across applications and networks. Using tools like Nessus, OpenVas, Burp Suite, Nmap, OWASP ZAP, Nikto, and others. - Web App Security Testing: Assessing web applications to protect against the OWASP Top 10 vulnerabilities, the latest threats, and how to address them. - Security Policy Development & Compliance: Crafting security policies tailored to your organization’s needs, ensuring compliance with industry standards. - Threat Intelligence: Monitoring CVE websites like NVD and CXsecurity, as well as cybersecurity RSS feeds and the dark web, to stay updated on the latest threats, vulnerabilities, and incidents. - Cybersecurity Technical Writing & Content Creation: Crafting high-quality articles, guides, and tutorials on cybersecurity topics to help others understand and navigate the security landscape. What I Offer: Custom Cybersecurity Solutions: Tailored strategies to meet your specific security needs, from small businesses to large enterprises. Ethical Hacking: Utilizing advanced tools and techniques to test your defenses and strengthen your security posture. Risk Assessment & Mitigation: Identifying potential risks and implementing proactive measures to mitigate them. SIEM and EDR Implementation: Deploying SIEM and EDR solutions to provide real-time monitoring and alerting for incidents across your infrastructure. Security Awareness Training: Training your team on security threats and best practices to maintain a secure environment. Let’s Work Together: Whether you need a comprehensive security audit, a one-time penetration test, or ongoing cybersecurity consulting, I am here to help you stay ahead of evolving cyber threats. Let’s collaborate to create a secure digital environment that allows your business to thrive without the fear of cyber attacks.Vulnerability Assessment
Web App Penetration TestingEthical HackingSecurity AnalysisWeb Application AuditInformation Security AwarenessInformation SecurityRisk ManagementNetwork SecurityNIST Cybersecurity FrameworkPenetration TestingCybersecurity ManagementCybersecurity MonitoringSQLPython - $10 hourly
- 0.0/5
- (0 jobs)
As a professional penetration tester with a strong focus on cybersecurity, I specialize in identifying and mitigating vulnerabilities in web applications, networks, and systems. My expertise lies in performing comprehensive security assessments, vulnerability analysis, and ethical hacking to ensure that your digital assets are secure. With a commitment to safeguarding your business from potential threats, I offer tailored solutions that align with industry standards and best practices. Whether you need a detailed penetration test, vulnerability assessment, or security consultation, I am hereVulnerability Assessment
Penetration TestingWeb App Penetration TestingWebsite AuditWeb TestingNetwork SecuritySecurity AnalysisMalware RemovalMalware DetectionSecurity TestingGrowth HackingCybersecurity ManagementEthical Hacking - $50 hourly
- 0.0/5
- (0 jobs)
I am a penetration tester and cybersecurity analyst with expertise in ethical hacking, vulnerability assessment, and system security. I specialize in identifying and exploiting security weaknesses to help businesses strengthen their defenses. My skills include: Penetration Testing – Conducting reconnaissance, scanning, exploitation, and post-exploitation to assess system security. Vulnerability Assessment – Identifying and analyzing security flaws in networks, web applications, and systems. Network Security – Performing security audits, detecting misconfigurations, and implementing protective measures. System Hardening – Securing operating systems, reducing attack surfaces, and enforcing security best practices. Security Tools – Experienced with Metasploit, Nmap, Burp Suite, Wireshark, and other penetration testing frameworks. I provide security assessments, penetration testing, and consultancy to help businesses protect their assets and data.Vulnerability Assessment
Penetration TestingJavaC++Problem Solving - $30 hourly
- 0.0/5
- (0 jobs)
With over three years of dedicated experience in penetration testing and bug bounty hunting on prestigious global platforms, I offer deep expertise in securing digital environments. Specializing in detailed web and network penetration testing, I effectively counteract the evolving landscape of cybersecurity threats. My approach is meticulously thorough, ensuring that every aspect of your systems is rigorously tested and secured. I am adept at collaborating with diverse, remote teams, actively contributing through all stages of security assessments. My commitment to continuous professional development keeps me at the cutting edge, integrating the latest cybersecurity tools and techniques into my practice to enhance the security posture of your projects. Beyond technical expertise, I excel in problem-solving, data organization, and clear communication of security findings. This comprehensive skill set guarantees not just the identification but also the strategic resolution of vulnerabilities, promoting robust digital resilience. If you're seeking a proficient and proactive penetration tester to fortify your digital assets, let's connect and discuss how I can bring value to your team and protect your operations against cyber threats.Vulnerability Assessment
Information Security ConsultationCybersecurity ManagementSecurity Assessment & TestingNetwork SecuritySoftware TestingTest Results & AnalysisRetestingWeb Application SecurityReport WritingBug BountyNetwork Penetration TestingPenetration Testing - $15 hourly
- 0.0/5
- (0 jobs)
With over 5 years of hands-on experience in IT infrastructure and system administration, I’ve seamlessly transitioned into the dynamic field of cybersecurity, specializing in penetration testing and vulnerability assessment. Armed with industry-recognized certifications, including CEH Master, CPTS, and CEH Practical, I bring a wealth of knowledge in identifying and mitigating complex security risks. My journey is fueled by a passion for ethical hacking, a sharp analytical mindset, and a commitment to safeguarding digital environments. Whether simulating real-world cyberattacks or uncovering critical vulnerabilities in systems and applications, I thrive on delivering actionable insights that bolster organizational security. Beyond certifications, I’ve built a strong foundation in practical testing through platforms like TryHackMe and Hack The Box, consistently demonstrating my skills in capturing flags and resolving real-world challenges. I'm now focused on advancing my expertise further and contributing to secure systems globally. Let’s connect and collaborate to strengthen cybersecurity defenses!Vulnerability Assessment
Red Team AssessmentCybersecurity ToolPenetration TestingWeb App Penetration TestingNetwork Penetration TestingNetwork EngineeringSystem AdministrationInformation SecurityComputing & NetworkingComputer Network - $25 hourly
- 0.0/5
- (0 jobs)
Professional Summary Dedicated cybersecurity professional with over a year of hands-on experience in penetration testing and bug bounty hunting. Skilled in identifying vulnerabilities and implementing advanced solutions to strengthen digital security. Proven expertise in network penetration testing, web application security, and OSINT methodologies. Recognized in the Hall of Fame at telecomitalia.it and contributed over 100 vulnerability reports to global organizations. Adept at scripting automation for enhanced efficiency in security assessments.Vulnerability Assessment
Information SecurityRed Team AssessmentBug ReportsBug BountyPenetration TestingCybersecurity ToolCybersecurity ManagementPython - $20 hourly
- 0.0/5
- (0 jobs)
🚀 About Me I am a Cybersecurity Engineer & IoT Embedded Systems Specialist with expertise in penetration testing, ethical hacking, and IoT security. With a strong foundation in network security and embedded hardware, I combine offensive security techniques with IoT development to create secure and scalable connected systems. 🛡️ Cybersecurity Expertise ✔ Penetration Testing – Web, network, and API security testing ✔ Threat Intelligence – Vulnerability assessment and risk analysis ✔ Secure Coding – Encryption methods and secure firmware development ✔ Network Defense – Firewalls, ACL management, and intrusion prevention 🔌 IoT & Embedded Systems Expertise ✔ IoT Security – Secure device connectivity and data protection ✔ Embedded Systems – AVR, ESP, Arduino, and real-time system design ✔ PCB Design & Manufacturing – High-performance circuit layout ✔ Automation & Smart Devices – Industrial IoT, robotics, and AI integrationVulnerability Assessment
HydraMetasploitPenetration TestingSystem AdministrationNetwork EngineeringProject EngineeringArduinoEmbedded SystemPCB DesignNetwork Security - $12 hourly
- 0.0/5
- (0 jobs)
Summary I am a Cybersecurity Engineer specializing in SOC Analysis, and passionate about continuously developing my skills in network security. With a strong background in network management, I have earned several certifications in cybersecurity, such as CCNA and QRadar. Currently, I am focused on enhancing my skills in system analysis, threat monitoring, and network defense. My goal is to be part of a strong cybersecurity team, contributing to securing systems and protecting them from threats. I am committed to staying up-to-date with the latest cybersecurity defense technologies and look forward to new opportunities to achieve this goal.Vulnerability Assessment
PythonC++Threat DetectionFirewallNetwork AnalysisCybersecurity ManagementCybersecurity MonitoringIT Project ManagementComputing & NetworkingComputer Network - $7 hourly
- 0.0/5
- (0 jobs)
Summary Passionate Cybersecurity enthusiast with a strong focus on Web and Mobile penetration testing. Proficient in utilizing tools such as Burp Suite, Nmap, Wireshark, and Metasploit. Skilled in Vulnerability Assessment, exploiting and mitigating OWASP Top 10 vulnerabilities. Gained hands-on experience through platforms such as Hack The Box, TryHackMe and government-led cybersecurity training programs.Vulnerability Assessment
Information SecurityCybersecurity ManagementPenetration Testing - $30 hourly
- 0.0/5
- (0 jobs)
I’m a certified Pentester with extensive experience in web and network security. Whether you’re looking to secure your website, network infrastructure, or perform a detailed vulnerability assessment, I can help. • I am Proficient in Nmap, Burp Suite, Metasploit, and various other tools • Focused on real exploitation and providing actionable insights through detailed vulnerability reports • Certified in CCNA, CyberOps, and offensive security certs from platforms like TryHackMe,Hackthebox.Vulnerability Assessment
OWASPPenetration TestingCisco Certified Network Associate - $75 hourly
- 3.8/5
- (94 jobs)
I am a vastly experienced IT expert and a Top Rated Plus on Upwork, specializing in DevOps and AWS architecting [AWS certified solution architect professional] with deep Linux experience and exceptional troubleshooting skills down to the system calls and even the packet level. More than 12 years of experience in providing secure, stable, modern, and reliable environments based on the latest reliable technologies starting from the blank canvas up to the automation and the administration I am also a team player. I can communicate very well. You will not keep searching for me to get an update and you will not have any language barrier that could affect the workflow as I have experience being a client too, and I totally understand clients' pain. ✅ AWS skills: -Designing and deploying scalable, highly available, and fault-tolerant systems on AWS -Lift and shift of an existing on-premises application to AWS -Identifying appropriate use of AWS Well-Architected Framework -Estimating AWS costs and identifying cost optimization points -General AWS account administration, including automation, monitoring, and security ✅ DevOps skills: -Automation for building and deployment of your app from any repository to AWS (EC2, Lambda, ECS, BeanStalk, S3, etc.). -Develop Shell/Ansible code or use cloud-native services to automate server builds, OS patches, and deployment of applications to dev, test, and production environments. -Infrastructure-as-code expert, especially Terraform. -Fluent in Bash and Python, I can use them to automate any task, including building and modifying custom CI/CD-related pipes in addition to dockerizing applications. -Building and managing Kubernetes-based highly available and secure infrastructure ✅ Linux skills: -Building, optimizing, securing, managing, and monitoring Linux-based infrastructure -Troubleshooting performance issues such as high-traffic website bottlenecks -Optimizing Storage, Webservers [Apache/nginx], and Databases for high load -Experience with caching and CDN -Experience implementing, and supporting storage services using Linux in addition to storage replication using ZFS -Delivered 2000 hours of official RedHat training, including RHCE and RedHat cluster ✅ Programming skills: -Fluent in Bash and Python. I can automate any task using them. -Experience creating Python-based APIs using Flask -Experience with Python AI libraries. I can also build and train models. -I can understand PHP. 📜 Certificates: Valid: AWS certified solution architect professional Past: Puppet certified professional, RHCE[7] AWS certified [Developer|SysOps|Developer] Associate 🧑🏼🎓 Education: - Bachelor's degree in Telecom [2005-2010] - Post-graduate diploma in AI [2021-2022] Notes: I am not into porn or alcohol-related projectsVulnerability Assessment
Amazon ECS for KubernetesAmazon ECSAWS LambdaWeb ServerKubernetesDevOpsApache AdministrationLinux System AdministrationBash ProgrammingAmazon Web Services - $35 hourly
- 0.0/5
- (0 jobs)
✅ Certified Professional Penetration Tester | eCPPTv2 | eWPTXv2 I'm an autodidact Security Consultant with 3 years of experience, I provide security consultation and perform penetration tester & red team engagements that identify vulnerabilities before they are exploited in web applications, networks, and their supporting infrastructure including servers, databases, and operating systems. by using the latest techniques, methodologies, attack simulation, and industry standards e.g. ISO 27001, HIPAA, PCI-DSS, OWASP. my services ensure that your infrastructure is optimally protected against malicious users.Vulnerability Assessment
PCIWeb App Penetration TestingSecurity AnalysisEthical HackingInternet SecurityNetwork Penetration TestingInformation Security ConsultationKali LinuxSecurity TestingPenetration Testing - $95 hourly
- 0.0/5
- (0 jobs)
Ahmed Taha, PhD Cybersecurity Expert | Cloud Security Architect | CISO-Level Consultant Based in Germany & Egypt | Fluent in English & Arabic With over a decade of experience across top-tier global firms including SAP Germany, PwC, RSA, and Unifonic, I specialize in delivering enterprise-grade cybersecurity solutions. My mission is to help organizations build secure, compliant, and resilient digital ecosystems. What I Do Best: Cybersecurity Leadership & Strategy: Acting CISO at Unifonic Cloud Security Architecture: Deep expertise in AWS, Azure, GCP, and OCI; built and secured multi-cloud environments for Fortune 500 clients. Regulatory Compliance & GRC: Hands-on with ISO 27001, SAMA, PDPL, NCA, SOC 2, PCI-DSS, and NIST frameworks. Technical Implementation: Security reviews, vulnerability management, and threat modeling tailored to enterprise needs. Security Assessments & Audits: Architecture reviews, gap analysis, and full compliance alignment. Security Awareness & Training: Built customized training programs to embed a security-first mindset across organizations. Tools & Technologies: Security Platforms: CrowdStrike, SentinelOne, Qualys, Devocean, Wiz, Orca, Prisma Cloud, Sysdig, Snyk, Semgrep, Mesh Security, Checkmarx GRC & Risk Tools: RSA Archer, SAP Solution Manager, Microsoft Purview Cloud Providers: AWS, Microsoft Azure, Google Cloud Platform (GCP), Oracle Cloud Infrastructure (OCI) Identity & Access Management: Okta, Keycloak, Azure AD, MFA, IAM architecture design Compliance Frameworks: ISO/IEC 27001/2, SAMA, PDPL, NCA ECC/CRF, PCI-DSS, SOC 2, CSA STAR, GDPR, NIST 800-53 Key Highlights: PhD in Cloud Security from TU Darmstadt, Germany. Speaker at Black Hat MEA, Falling Walls Berlin, AsiaCCS, and others Built entire security teams from scratch and led major compliance programs. Achieved full compliance with CST Cybersecurity Framework and multiple international standards. Why Hire Me: I bring the rare combination of academic depth, real-world CISO experience, and hands-on technical execution. Whether you need to audit your security posture, implement a Zero Trust model, or ensure regulatory compliance — I’ll deliver results you can trust.Vulnerability Assessment
PCI DSSDisaster RecoveryZero Trust ArchitectureRegulatory ComplianceInformation Security AwarenessIncident Response PlanGovernance, Risk & Compliance SoftwareSOC 2 ReportGDPR Compliance ReviewISO 27018ISO 27017ISO 27001Cloud Security AllianceCloud Security - $10 hourly
- 0.0/5
- (0 jobs)
I am a Cyber Security Associate in safeguarding critical data and systems against evolving cyber threats. Familiar with incident response, and vulnerability Analyst. I am skilled in conducting security assessments to protect digital assets effectively.Vulnerability Assessment
Incident Response Readiness AssessmentInvestigative ReportingSOC 1Data EntryNetwork Penetration TestingSystem AdministrationComputing & NetworkingAdministratePenetration TestingEthical HackingTestingNetwork Security - $15 hourly
- 0.0/5
- (1 job)
Hello! I’m Saif Aboalnaga, a Junior Penetration Tester specializing in cybersecurity with a strong focus on networks and ethical hacking. Currently studying Computer Science at Cairo University, I possess hands-on experience from my internships and participation in cybersecurity competitions, including winning 3rd place in a recent Capture the Flag event. I am proficient in various tools such as Burp Suite and Wireshark, and I’m dedicated to helping clients identify vulnerabilities and secure their systems. With a passion for continuous learning and a commitment to delivering high-quality results, I look forward to contributing to your projects and enhancing your cybersecurity posture.Vulnerability Assessment
Security AnalysisNetwork SecurityEthical HackingMetasploitKali LinuxCybersecurity MonitoringInformation SecurityMicrosoft Active DirectoryWeb App Penetration TestingNetwork Penetration TestingPenetration Testing Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.