Hire the best Vulnerability Assessment Specialists in Indonesia
Check out Vulnerability Assessment Specialists in Indonesia with the skills you need for your next job.
- $25 hourly
- 5.0/5
- (27 jobs)
A Cyber Security Consultant with over 7 years of experience in penetration testing and vulnerability assessment across Web, Mobile Apps, Networks, and Infrastructure. I am certified as an Offensive Security Certified Professional (OSCP), CREST Registered Penetration Tester (CRT), CREST Practitioner Security Analyst (CPSA), and Burp Suite Certified Practitioner (BSCP).Vulnerability Assessment
OWASPReverse EngineeringSecurity Assessment & TestingWeb TestingCloud SecurityWebsite SecurityKali LinuxApplication SecurityCybersecurity ManagementSecurity TestingPythonNetwork SecurityInformation SecurityPenetration Testing - $80 hourly
- 5.0/5
- (10 jobs)
I am an IT Professional that works on widely scope expertise of multiple domains in IT such as Information Security and Ethical Hacking. I am able to provide you the following services : - Full Conduct Red-Teaming Real World Hacking Scenario - Penetration Testing Engagement - OWASP Top 10 Testing on your Web Application - Vulnerability Assessments, Analysis - Vulnerability Remediation Advice & Guidance - Web Application Security and Database Security Audits - OSINT Reconnaissance - Perimeter Device Configuration Audits [Routers & Firewalls] - Mitigation Security - Hardening IT Security Environment with Customized Firewall IDS/ IPS - SOC Implementation - Malware Analysis - Exploit Development (for Legal Purposes or Educational) - Forensics and Incident Handling - Cyber Crime Investigation - Receive a blueprint for conducting your own penetration test . - Explore a number of exploitation methods that can be used to gain full control over a target computer - Mobile Android or iOS Hack & explore countermeasures to each kind of attack - Threat Analysis, Risk Analysis and Risk TreatmentVulnerability Assessment
Web Application FirewallWeb App Penetration TestingSystem AdministrationWordPressInformation SecurityPenetration TestingEthical HackingNetwork SecurityLinux System AdministrationSecurity AnalysisAndroid App DevelopmentPHP - $35 hourly
- 0.0/5
- (0 jobs)
Hi! I’m a cybersecurity professional with a strong background in cryptography, network defense, penetration testing, and threat detection. I specialize in identifying and mitigating vulnerabilities across systems, applications, and infrastructures—ensuring security from both offensive and defensive perspectives. My core competencies include: ✅ Vulnerability Assessment & Penetration Testing (VAPT) – web apps, APIs, networks, and cloud ✅ Security Monitoring & Incident Response – using SIEM tools, log analysis, and threat hunting ✅ Blue Team Operations – 24/7 traffic monitoring, anomaly detection, threat intelligence correlation ✅ Applied Cryptography – secure communication, data encryption, protocol analysis ✅ Reporting & Remediation Guidance – clear, actionable documentation for both tech and non-tech audiences 📩 Let’s work together to secure your digital assets.Vulnerability Assessment
Information Security AwarenessInformation SecurityRisk ManagementRisk AssessmentRisk AnalysisCybersecurity MonitoringSOC 2SOC 1 ReportSOC 1Ethical HackingIncident Response PlanPenetration Testing - $10 hourly
- 0.0/5
- (0 jobs)
I'm network engineer with experience more 10 years in building network infrastructure for small and medium sized business. I am also as IT instructor for many corporate in Indonesia. Please check my profile for sure. I will give my support to our client.Vulnerability Assessment
Computing & NetworkingEngineering & ArchitectureSecurity EngineeringComputer NetworkSecurity Operation CenterPenetration TestingCloud ComputingNetwork Engineering - $35 hourly
- 0.0/5
- (0 jobs)
I am an Android Developer with a strong passion for developing high-quality mobile applications. Despite my minimum experience, I have a wide range of skills and knowledge in various areas of Android development. I use Android Studio and occasionally IntelliJ IDEA to build apps that incorporate the latest trends and technologies, such as MVVM architecture, Database with Room, Retrofit, Dependency Injection with Dagger-Hilt, and other cutting-edge technologies. I am also fluent in the Kotlin programming language, which helps you create robust and efficient applications. In addition to my technical expertise, I also have a keen eye for design and sometimes utilize Figma to create visually appealing UIs for your apps. I take pride in delivering robust, user-friendly, and well-optimized Android applications that meet my client's needs and exceed their expectations. I am dedicated to staying up-to-date with the latest trends and best practices in the Android development space and continuously improving your skills to become a top-notch developer.Vulnerability Assessment
PythonWiresharkNetwork MapperNessusMetasploitWeb ProxyKali LinuxOWASPDatabase SecurityWebsite SecurityWeb App Penetration TestingPenetration TestingEthical HackingInformation Security - $5 hourly
- 0.0/5
- (0 jobs)
About Me System Administrator with experience in Monolithic and Microservice. Skilled in using tools and frameworks such as Kubernetes, Grafana, Graylog and Dynatrace. I love educating people about cybersecurity which the Telegram community responds great to getting many members.Vulnerability Assessment
Network Penetration TestingPenetration TestingKubernetesSystem SecurityLinux System AdministrationSecurity AnalysisOpenShiftAnsibleSecurity EngineeringRed Hat Enterprise LinuxMicroserviceGrafanaDynatraceStatic Testing - $10 hourly
- 0.0/5
- (0 jobs)
I'm Fathur, an IT Infrastructure professional with two years of progressive experience. I am passionate about leveraging technology to solve complex problems and optimize system performance. My expertise in IT security includes managing system patching, conducting comprehensive vulnerability assessments, and maintaining critical operating systems (Windows, Redhat Enterprise Linux) and databases (MSSQL Server), notably at PT Bank Danamon Indonesia Tbk. Previously, as a Web Developer Intern at BONS MARKET, I demonstrated a strong aptitude for innovation by implementing security solutions that significantly reduced web security incidents and optimizing web performance by a substantial margin through engaging, responsive designs. While my foundation is strong in infrastructure, I am eager to expand my capabilities within backend development, continuously seeking opportunities to learn, hone new skills, and contribute to challenging projects as a dedicated team player.Vulnerability Assessment
CyberARKJiraOracle PatchingSecurity Patch InstallationMicrosoft SQL Server Service BrokerOracle SolarisMicrosoft ServerJavaScriptNode.jsExpressJSBack-End Development - $30 hourly
- 5.0/5
- (2 jobs)
I'm an IT Security Engineer with experience in IT security and cloud computing. I've educated my team on security tools and webinars at PT Sarana Solusindo Informatika. At PT Indotek Sukses Sekawan, I fixed security issues and set up secure remote work systems. In my role at PT Awan Integrasi Sandidata, I dealt with security threats and helped set up a Security Operations Center. I'm good at managing cloud projects and have certifications in security. My skills include cloud computing, security tools, and network administration. Here is my certification: ❏ CCSK v4 ❏ AWS Certified Security - Specialty ❏ Microsoft AZ-305 Azure Solution Architect Expert ❏ Microsoft AZ-400 DevOps Engineer Expert ❏ Microsoft SC-200 Security Operations Analyst ❏ Microsoft AZ-500 Azure Security Engineer ❏ Microsoft SC-400 Information Protection Administrator ❏ Microsoft AZ-104 Azure Administrator Associate ❏ Alibaba Cloud ACP – Cloud Security ❏ Alibaba Cloud ACP – Cloud Computing ❏ Alibaba Cloud ACA – Enterprise Database Cloud Transformation Architect ❏ Alibaba Cloud ACA – Cloud Native (DevOps) ❏ Fortinet NSE 1-3 – Network Security Associate ❏ Oracle Cloud Infrastructure - Cloud Operations Associate ❏ Aviatrix ACE - Multi-Cloud Networking Associate ❏ AttackIQ – Foundations of Operationalizing MITRE ATT&CK ❏ AttackIQ – Foundations of Purple TeaminVulnerability Assessment
Cloud Security FrameworkNetwork Traffic AnalysisRapid7 NexposeThreat DetectionCybersecurity MonitoringSecurity Assessment & TestingWeb App Penetration TestingInformation TechnologyOffice 365System SecurityAlibaba CloudMicrosoft Azure AdministrationCloud Security AllianceCloud Security - $22 hourly
- 0.0/5
- (0 jobs)
I am dedicated to continuously expanding my knowledge and experience in this dynamic field. I am a well-rounded individual with a strong commitment to the principles and practices of cyber security.Vulnerability Assessment
Information Security AwarenessAntivirus & Security SoftwareWeb App Penetration TestingInformation SecurityCompliance - $25 hourly
- 0.0/5
- (0 jobs)
I’m an experienced IT professional specializing in cybersecurity, with a strong background in penetration testing, vulnerability assessment, and securing networks and systems. I help businesses identify weaknesses, strengthen their digital defenses, and stay protected against evolving cyber threats. 🔐 Services I offer: 1. Web, Network, and Mobile Penetration Testing 2. Vulnerability Assessment & Remediation 🔍 My VAPT Approach Includes: ✅ Scoping & Information Gathering Understanding client objectives, assets, and threat landscape. Collecting intelligence through passive and active reconnaissance. ✅ Vulnerability Scanning Using automated tools (e.g., Nessus, BurpSuite, Nmap) to identify potential weaknesses in systems and applications. ✅ Manual Verification & Exploitation Validating findings manually to avoid false positives and attempting controlled exploitation to assess real-world impact. ✅ Post-Exploitation & Privilege Escalation Assessing how far an attacker could go if a vulnerability is exploited, including data access and lateral movement. ✅ Reporting Delivering detailed and structured reports with severity ratings, business impact, and practical remediation steps. ✅ Remediation Support & Re-Testing Assisting teams in patching or securing the systems and verifying that vulnerabilities have been properly fixed. Security is not just about technology — it’s about strategy, awareness, and accountability. I’m here to help you build resilient systems and protect what matters most.Vulnerability Assessment
Penetration TestingSecurity TestingApplication SecurityNetwork Penetration TestingNIST Cybersecurity FrameworkWebsite SecurityWeb App Penetration TestingLinux System AdministrationRisk AnalysisRisk AssessmentSystem SecurityDevOpsInformation SecurityProblem Solving - $15 hourly
- 0.0/5
- (0 jobs)
Introducing Alvin Ferdiansyah, a Cyber Security Consultant with proven professional years of experience in the field. With a top industry certification, Alvin specializes in offensive security, focusing mainly on web applications and infrastructure. He's passionate about learning, often diving into bug write ups to pick up new tricks. His favorite moments come about when he can give his best and uncover impactful vulnerability holes in his work. My expertise lies in delivering end-to-end security assessments, from reconnaissance and manual exploitation to in-depth analysis and detailed reporting. I’ve led and contributed to both black-box and grey-box testing engagements, working directly with development and security teams to provide impactful recommendations and reduce attack surface. Over the past years, I’ve conducted security testing across a wide range of environments including financial systems, e-commerce websites, CMS, SaaS platforms, banking sector, cloud hosted infrastructures, insurance and health care companies, and custom software developed by various software houses. Certifications: - CREST Registered Penetration Tester (CRT) - OffSec Certified Professional (OSCP) - PortSwigger Burp Suite Certified Practitioner (BSCP) - CREST Practitioner Security Analyst (CPSA) - Web application Penetration Tester eXtreme (eWPTX) - Mobile Application Penetration Tester (eMAPT) Core Capabilities: - Web Application Penetration Testing: Manual exploitation of OWASP Top 10 vulnerabilities (XSS, IDOR, SQLi, SSRF, CSRF, auth bypass, etc.) - API Security: RESTful, Postman collections, JSON/XML/SOAP based APIs, token tampering, weak token implementation, etc. - Mobile App Security Testing: Reverse engineering APKs, Frida based dynamic instrumentation, root detection bypass, certificate pinning bypass, insecure storage analysis (shared prefs, SQLite, internal files), .so/native lib analysis. - Advanced tool usage (Burp Suite, Kali Linux, nmap, metasploit, nessus, etc) - End2End encryption bypassed. - Custom scripting in Python for automation, request manipulation, and response parsing - Red Team Support: Custom payload development, client-side attacks, infrastructure enumeration, phishing simulation. My testing process is rooted in proven frameworks of OWASP Testing Guide. Each engagement is tailored based on client objectives, risk appetite, and application architecture, but generally follows this structure: - Scoping & Rules of Engagement - Reconnaissance & Threat Modeling - Vulnerability Discovery (automated + manual) - Exploitation (controlled and risk-aware) - Post-Exploitation Analysis (privilege escalation, data exposure) - Reporting (technical + business impact, PoCs, remediation guidance) - Retesting (to verify fixes and validate security posture) This methodology ensures coverage, clarity, and repeatability, allowing stakeholders to clearly understand risk while prioritizing fixes effectively. Deliverables You Can Expect: - PDF report with detailed vulnerabilities, CVSS scores, descriptions, PoCs, and remediation steps - CVSS Scoring and component details. - Executive summary (1 page) for management - Exploitable PoCs with step by step replication - Clear technical and business impact descriptions - Mitigation and recommendation strategies aligned to your environment - OWASP/CWE mapping for risk classification - Structured documentation, screenshots, logs, and retesting summaries Why work with me? - I don’t just find bugs. I help you understand their risk, context, and business impact. - I offer fullcycle engagement: from scoping and execution to documentation and retesting. - I respect deadlines, communicate transparently, and provide clean, organized results. Let’s ensure your application stands secure against today’s threat landscape. I’m available to start as early as you need, and I’ll tailor the engagement to fit your testing scope and business needs. Looking forward to the opportunity. Alvin Ferdiansyah Cybersecurity Consultant | Penetration Tester | OSCP, CREST CRT, CPSA, eWPTX, eMAPT, BSCPVulnerability Assessment
OWASPMetasploitKali LinuxLinuxSecurity AnalysisRed Team AssessmentNetwork Penetration TestingWeb App Penetration TestingPenetration TestingInformation Security - $7 hourly
- 0.0/5
- (0 jobs)
A highly motivated individual with a strong interest in cybersecurity and technology. Skilled in Linux systems, Metasploit, and promoting Security Awareness. I enjoy solving problems, adapting quickly to new challenges, and continuously learning in fast-paced environments. Passionate about building secure and resilient digital systems to support business and user safety, I can help. Cybersecurity: Penetration Testing, Vulnerability Assessment, Threat Intelligence, Cybersecurity Awareness, Phishing Simulation, Network Attacks, Web Application Security (SQL Injection, XSS), Malware Analysis Programming Languages: Java, Golang, C++, C, COBOL, Assembler, Python, Ruby Database Management Systems (DBMS) Operating Systems: Windows, Linux Software Proficiency: Microsoft Office, MYOB, Blender, Cisco Packet Tracer, Delphi, Visual Basic Security Tools: Burp Suite, Wazuh, SOCRadar, QualysVulnerability Assessment
Linux System AdministrationWeb Application SecurityPenetration TestingCybersecurity ToolCybersecurity MonitoringCybersecurity ManagementSecurity Operation CenterSecurity EngineeringSecurity AnalysisDatabase AdministrationNetwork EngineeringComputing & NetworkingComputer NetworkInformation Security - $23 hourly
- 0.0/5
- (0 jobs)
Certified Cybersecurity Analyst with 4+ years of experience in vulnerability management, penetration testing, and compliance auditing, along with 2+ years in manual QA testing for web and mobile applications. Strong background in validating vulnerabilities, conducting risk assessments, managing IAM, and executing manual test cases. Known for attention to detail, clear communication, and effective cross-functional collaboration.Vulnerability Assessment
Quality AssurancePenetration TestingUser Identity Management - $8 hourly
- 0.0/5
- (0 jobs)
I'm a passionate QA Tester and Junior Pentester with hands-on experience ensuring applications are secure, stable, and user-friendly. I’ve worked on real-world web security testing projects for the past 10 months, focusing on vulnerabilities like XSS, SQLi, IDOR, and Rate Limiting. As a QA enthusiast, I specialize in manual testing, bug reporting, API testing (Postman), and writing effective test cases using tools like TestRail and Jira.Vulnerability Assessment
Performance TestingBug ReportsTrelloAPI TestingManual TestingKali LinuxMySQLMicrosoft ExcelApache JMeterTestRailJiraKatalon StudioNetwork Penetration TestingPenetration Testing - $30 hourly
- 0.0/5
- (0 jobs)
Hey there! I’m a seasoned cybersecurity pro with over 20 years of experience, including 6 years at one of Indonesia’s largest banks and 3 years in IT infrastructure. I’ve tackled everything from securing high-risk systems to leading incident response teams—basically, I’ve seen it all in the cybersecurity world. Now, I’m diving into freelancing to help businesses lock down their digital assets. Whether you need a quick security audit, help with compliance (like ISO 27001 or PCI-DSS), or just want to patch up vulnerabilities before the bad guys find them—I’ve got your back. Big bonus: I speak ‘bank-level security,’ so if you need tight, regulated-industry expertise, let’s chat! Why hire me? Straightforward advice, no unnecessary jargon, and a focus on real-world solutions—not just paperwork. Let’s make your systems safer without the headache.Vulnerability Assessment
TeachingData EntryTech & ITHelpdeskLinuxMicrosoft WindowsIT SupportInformation Security GovernanceCybersecurity ManagementIT ManagementRemote IT ManagementCybersecurity MonitoringNetwork SecurityInformation Security - $15 hourly
- 0.0/5
- (0 jobs)
🔐 Senior Information Security Consultant with 10+ years of experience in Web, Network & Mobile Penetration Testing (OWASP Top 10 / SANS 25 / NIST / PCI-DSS). I help companies identify vulnerabilities before attackers do. ✅ Certified in Black-box & White-box Testing ✅ Expert in VAPT for Web, Network, Mobile, API, and Source Code ✅ Hands-on with Burp Suite, Acunetix, Nexpose, Fortify, Nessus, Metasploit, and more ✅ Cloud & SIEM Security (AWS, Azure, DLP, EDR, NAC, PAM) **What I offer:** - Web App Security Testing (Manual + Automated) - Source Code Review (.NET, PHP, Java) - Mobile App VAPT (OWASP MSTG for Android/iOS) - Network Pentesting (Internal & External) - Server Hardening & Compliance Audit (CIS Benchmark) - Social Engineering Simulation (Phishing, Vishing, etc.) 🧰 Tools I use: Burp Suite, Nexpose, Nessus, Metasploit, Checkmarx, Fortify, IBM AppScan, Wireshark, Apktool, etc. Let’s secure your apps & infrastructure from real-world threats. 📩 Send me a message to discuss your security needs.Vulnerability Assessment
MySQLWeb TestingPHPWeb DevelopmentCodeIgniterWeb ServiceLaravelAPI DevelopmentWeb ApplicationMobile AppSoftware DevelopmentCybersecurity ToolSecurity TestingCloud SecurityInformation SecuritySource Code ScanningOWASPMobile App TestingNetwork SecurityWeb Application SecurityPenetration Testing - $12 hourly
- 0.0/5
- (0 jobs)
I'm a IT Security experienced in Analyst, Engineer, and Web Penetration Testing. While on my career, I was Wazuh Siem Administrator, Security Analyst Layer 2. Now, I'm Penetration Testing in my full-time work. If you need help, please don't be shy to contact me!Vulnerability Assessment
Information TechnologySecurity AnalysisSystem SecurityPenetration Testing - $23 hourly
- 0.0/5
- (0 jobs)
I have over 20 years of experience in the field of networking, developing and cybersecurity. High-level analytical skills and attention to detail in work.Vulnerability Assessment
System SecurityCybersecurity ManagementPenetration Testing - $3 hourly
- 0.0/5
- (0 jobs)
I have skills and abilities as a Pentester, Wordpress developer, Graphic Design and Digital forensics.Vulnerability Assessment
Digital ForensicsCybersecurity ToolPenetration TestingComputer NetworkNetwork EngineeringComputing & NetworkingInformation Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
Top cities for Vulnerability Assessment Specialists in Indonesia
Vulnerability Assessment Specialists near Jakarta
Network Security Engineers near Jakarta
Network Pentesters near Jakarta
Penetration Testers near Jakarta
CentOS Specialists near Bandung
Virtualization Specialists near Jakarta
User Acceptance Testing Specialists near Jakarta
SQL Consultants near Surabaya
Computer Skills Specialists near Bekasi
Web Services Specialists near Jakarta
Data Entry Specialists near Bengkulu
Data Collection Specialists near Jakarta
WordPress Developers near Klaten
Data Entry Specialists near Manado
Accountants near Semarang
IT Freelancers near Jakarta
Bootstrap Specialists near Makassar
Figma Freelancers near Sidoarjo
Data Entry Specialists near Purwakarta
Adobe Premiere Pro Specialists near Sidoarjo
CorelDRAW Specialists near Klaten
PHP Developers near Madiun
Data Entry Specialists near Pacitan
Bootstrap Specialists near Indramayu
More top skills in Indonesia
WebApp Pentesters in Indonesia
Penetration Testers in Indonesia
Network Pentesters in Indonesia
Internet Security Specialists in Indonesia
Network Security Engineers in Indonesia
Certified Ethical Hackers in Indonesia
Information Security Analysts in Indonesia
Network Analysts in Indonesia
Malware Analysts in Indonesia
Red Hat Enterprise Linux (RHEL) Specialists in Indonesia
Telecommunications Engineers in Indonesia
IT Service Management Specialists in Indonesia
Similar Vulnerability Assessment Specialist Skills
WebApp Pentesters
Network Pentesters
Vulnerability Assessment Specialists
Nessus Freelancers
Kali Linux Freelancers
White Hat Hackers
Digital Forensics Freelancers
AlienVault Freelancers
Certified Ethical Hackers
Hackers
Security Consultants
Certified Information Systems Security Professional (CISSP)