Hire the best Vulnerability Assessment Specialists in Indonesia

Check out Vulnerability Assessment Specialists in Indonesia with the skills you need for your next job.
  • $25 hourly
    A Cyber Security Consultant with over 7 years of experience in penetration testing and vulnerability assessment across Web, Mobile Apps, Networks, and Infrastructure. I am certified as an Offensive Security Certified Professional (OSCP), CREST Registered Penetration Tester (CRT), CREST Practitioner Security Analyst (CPSA), and Burp Suite Certified Practitioner (BSCP).
    Featured Skill Vulnerability Assessment
    OWASP
    Reverse Engineering
    Security Assessment & Testing
    Web Testing
    Cloud Security
    Website Security
    Kali Linux
    Application Security
    Cybersecurity Management
    Security Testing
    Python
    Network Security
    Information Security
    Penetration Testing
  • $80 hourly
    I am an IT Professional that works on widely scope expertise of multiple domains in IT such as Information Security and Ethical Hacking. I am able to provide you the following services : - Full Conduct Red-Teaming Real World Hacking Scenario - Penetration Testing Engagement - OWASP Top 10 Testing on your Web Application - Vulnerability Assessments, Analysis - Vulnerability Remediation Advice & Guidance - Web Application Security and Database Security Audits - OSINT Reconnaissance - Perimeter Device Configuration Audits [Routers & Firewalls] - Mitigation Security - Hardening IT Security Environment with Customized Firewall IDS/ IPS - SOC Implementation - Malware Analysis - Exploit Development (for Legal Purposes or Educational) - Forensics and Incident Handling - Cyber Crime Investigation - Receive a blueprint for conducting your own penetration test . - Explore a number of exploitation methods that can be used to gain full control over a target computer - Mobile Android or iOS Hack & explore countermeasures to each kind of attack - Threat Analysis, Risk Analysis and Risk Treatment
    Featured Skill Vulnerability Assessment
    Web Application Firewall
    Web App Penetration Testing
    System Administration
    WordPress
    Information Security
    Penetration Testing
    Ethical Hacking
    Network Security
    Linux System Administration
    Security Analysis
    Android App Development
    PHP
  • $35 hourly
    Hi! I’m a cybersecurity professional with a strong background in cryptography, network defense, penetration testing, and threat detection. I specialize in identifying and mitigating vulnerabilities across systems, applications, and infrastructures—ensuring security from both offensive and defensive perspectives. My core competencies include: ✅ Vulnerability Assessment & Penetration Testing (VAPT) – web apps, APIs, networks, and cloud ✅ Security Monitoring & Incident Response – using SIEM tools, log analysis, and threat hunting ✅ Blue Team Operations – 24/7 traffic monitoring, anomaly detection, threat intelligence correlation ✅ Applied Cryptography – secure communication, data encryption, protocol analysis ✅ Reporting & Remediation Guidance – clear, actionable documentation for both tech and non-tech audiences 📩 Let’s work together to secure your digital assets.
    Featured Skill Vulnerability Assessment
    Information Security Awareness
    Information Security
    Risk Management
    Risk Assessment
    Risk Analysis
    Cybersecurity Monitoring
    SOC 2
    SOC 1 Report
    SOC 1
    Ethical Hacking
    Incident Response Plan
    Penetration Testing
  • $10 hourly
    I'm network engineer with experience more 10 years in building network infrastructure for small and medium sized business. I am also as IT instructor for many corporate in Indonesia. Please check my profile for sure. I will give my support to our client.
    Featured Skill Vulnerability Assessment
    Computing & Networking
    Engineering & Architecture
    Security Engineering
    Computer Network
    Security Operation Center
    Penetration Testing
    Cloud Computing
    Network Engineering
  • $35 hourly
    I am an Android Developer with a strong passion for developing high-quality mobile applications. Despite my minimum experience, I have a wide range of skills and knowledge in various areas of Android development. I use Android Studio and occasionally IntelliJ IDEA to build apps that incorporate the latest trends and technologies, such as MVVM architecture, Database with Room, Retrofit, Dependency Injection with Dagger-Hilt, and other cutting-edge technologies. I am also fluent in the Kotlin programming language, which helps you create robust and efficient applications. In addition to my technical expertise, I also have a keen eye for design and sometimes utilize Figma to create visually appealing UIs for your apps. I take pride in delivering robust, user-friendly, and well-optimized Android applications that meet my client's needs and exceed their expectations. I am dedicated to staying up-to-date with the latest trends and best practices in the Android development space and continuously improving your skills to become a top-notch developer.
    Featured Skill Vulnerability Assessment
    Python
    Wireshark
    Network Mapper
    Nessus
    Metasploit
    Web Proxy
    Kali Linux
    OWASP
    Database Security
    Website Security
    Web App Penetration Testing
    Penetration Testing
    Ethical Hacking
    Information Security
  • $5 hourly
    About Me System Administrator with experience in Monolithic and Microservice. Skilled in using tools and frameworks such as Kubernetes, Grafana, Graylog and Dynatrace. I love educating people about cybersecurity which the Telegram community responds great to getting many members.
    Featured Skill Vulnerability Assessment
    Network Penetration Testing
    Penetration Testing
    Kubernetes
    System Security
    Linux System Administration
    Security Analysis
    OpenShift
    Ansible
    Security Engineering
    Red Hat Enterprise Linux
    Microservice
    Grafana
    Dynatrace
    Static Testing
  • $10 hourly
    I'm Fathur, an IT Infrastructure professional with two years of progressive experience. I am passionate about leveraging technology to solve complex problems and optimize system performance. My expertise in IT security includes managing system patching, conducting comprehensive vulnerability assessments, and maintaining critical operating systems (Windows, Redhat Enterprise Linux) and databases (MSSQL Server), notably at PT Bank Danamon Indonesia Tbk. Previously, as a Web Developer Intern at BONS MARKET, I demonstrated a strong aptitude for innovation by implementing security solutions that significantly reduced web security incidents and optimizing web performance by a substantial margin through engaging, responsive designs. While my foundation is strong in infrastructure, I am eager to expand my capabilities within backend development, continuously seeking opportunities to learn, hone new skills, and contribute to challenging projects as a dedicated team player.
    Featured Skill Vulnerability Assessment
    CyberARK
    Jira
    Oracle Patching
    Security Patch Installation
    Microsoft SQL Server Service Broker
    Oracle Solaris
    Microsoft Server
    JavaScript
    Node.js
    ExpressJS
    Back-End Development
  • $30 hourly
    I'm an IT Security Engineer with experience in IT security and cloud computing. I've educated my team on security tools and webinars at PT Sarana Solusindo Informatika. At PT Indotek Sukses Sekawan, I fixed security issues and set up secure remote work systems. In my role at PT Awan Integrasi Sandidata, I dealt with security threats and helped set up a Security Operations Center. I'm good at managing cloud projects and have certifications in security. My skills include cloud computing, security tools, and network administration. Here is my certification: ❏ CCSK v4 ❏ AWS Certified Security - Specialty ❏ Microsoft AZ-305 Azure Solution Architect Expert ❏ Microsoft AZ-400 DevOps Engineer Expert ❏ Microsoft SC-200 Security Operations Analyst ❏ Microsoft AZ-500 Azure Security Engineer ❏ Microsoft SC-400 Information Protection Administrator ❏ Microsoft AZ-104 Azure Administrator Associate ❏ Alibaba Cloud ACP – Cloud Security ❏ Alibaba Cloud ACP – Cloud Computing ❏ Alibaba Cloud ACA – Enterprise Database Cloud Transformation Architect ❏ Alibaba Cloud ACA – Cloud Native (DevOps) ❏ Fortinet NSE 1-3 – Network Security Associate ❏ Oracle Cloud Infrastructure - Cloud Operations Associate ❏ Aviatrix ACE - Multi-Cloud Networking Associate ❏ AttackIQ – Foundations of Operationalizing MITRE ATT&CK ❏ AttackIQ – Foundations of Purple Teamin
    Featured Skill Vulnerability Assessment
    Cloud Security Framework
    Network Traffic Analysis
    Rapid7 Nexpose
    Threat Detection
    Cybersecurity Monitoring
    Security Assessment & Testing
    Web App Penetration Testing
    Information Technology
    Office 365
    System Security
    Alibaba Cloud
    Microsoft Azure Administration
    Cloud Security Alliance
    Cloud Security
  • $22 hourly
    I am dedicated to continuously expanding my knowledge and experience in this dynamic field. I am a well-rounded individual with a strong commitment to the principles and practices of cyber security.
    Featured Skill Vulnerability Assessment
    Information Security Awareness
    Antivirus & Security Software
    Web App Penetration Testing
    Information Security
    Compliance
  • $25 hourly
    I’m an experienced IT professional specializing in cybersecurity, with a strong background in penetration testing, vulnerability assessment, and securing networks and systems. I help businesses identify weaknesses, strengthen their digital defenses, and stay protected against evolving cyber threats. 🔐 Services I offer: 1. Web, Network, and Mobile Penetration Testing 2. Vulnerability Assessment & Remediation 🔍 My VAPT Approach Includes: ✅ Scoping & Information Gathering Understanding client objectives, assets, and threat landscape. Collecting intelligence through passive and active reconnaissance. ✅ Vulnerability Scanning Using automated tools (e.g., Nessus, BurpSuite, Nmap) to identify potential weaknesses in systems and applications. ✅ Manual Verification & Exploitation Validating findings manually to avoid false positives and attempting controlled exploitation to assess real-world impact. ✅ Post-Exploitation & Privilege Escalation Assessing how far an attacker could go if a vulnerability is exploited, including data access and lateral movement. ✅ Reporting Delivering detailed and structured reports with severity ratings, business impact, and practical remediation steps. ✅ Remediation Support & Re-Testing Assisting teams in patching or securing the systems and verifying that vulnerabilities have been properly fixed. Security is not just about technology — it’s about strategy, awareness, and accountability. I’m here to help you build resilient systems and protect what matters most.
    Featured Skill Vulnerability Assessment
    Penetration Testing
    Security Testing
    Application Security
    Network Penetration Testing
    NIST Cybersecurity Framework
    Website Security
    Web App Penetration Testing
    Linux System Administration
    Risk Analysis
    Risk Assessment
    System Security
    DevOps
    Information Security
    Problem Solving
  • $15 hourly
    Introducing Alvin Ferdiansyah, a Cyber Security Consultant with proven professional years of experience in the field. With a top industry certification, Alvin specializes in offensive security, focusing mainly on web applications and infrastructure. He's passionate about learning, often diving into bug write ups to pick up new tricks. His favorite moments come about when he can give his best and uncover impactful vulnerability holes in his work. My expertise lies in delivering end-to-end security assessments, from reconnaissance and manual exploitation to in-depth analysis and detailed reporting. I’ve led and contributed to both black-box and grey-box testing engagements, working directly with development and security teams to provide impactful recommendations and reduce attack surface. Over the past years, I’ve conducted security testing across a wide range of environments including financial systems, e-commerce websites, CMS, SaaS platforms, banking sector, cloud hosted infrastructures, insurance and health care companies, and custom software developed by various software houses. Certifications: - CREST Registered Penetration Tester (CRT) - OffSec Certified Professional (OSCP) - PortSwigger Burp Suite Certified Practitioner (BSCP) - CREST Practitioner Security Analyst (CPSA) - Web application Penetration Tester eXtreme (eWPTX) - Mobile Application Penetration Tester (eMAPT) Core Capabilities: - Web Application Penetration Testing: Manual exploitation of OWASP Top 10 vulnerabilities (XSS, IDOR, SQLi, SSRF, CSRF, auth bypass, etc.) - API Security: RESTful, Postman collections, JSON/XML/SOAP based APIs, token tampering, weak token implementation, etc. - Mobile App Security Testing: Reverse engineering APKs, Frida based dynamic instrumentation, root detection bypass, certificate pinning bypass, insecure storage analysis (shared prefs, SQLite, internal files), .so/native lib analysis. - Advanced tool usage (Burp Suite, Kali Linux, nmap, metasploit, nessus, etc) - End2End encryption bypassed. - Custom scripting in Python for automation, request manipulation, and response parsing - Red Team Support: Custom payload development, client-side attacks, infrastructure enumeration, phishing simulation. My testing process is rooted in proven frameworks of OWASP Testing Guide. Each engagement is tailored based on client objectives, risk appetite, and application architecture, but generally follows this structure: - Scoping & Rules of Engagement - Reconnaissance & Threat Modeling - Vulnerability Discovery (automated + manual) - Exploitation (controlled and risk-aware) - Post-Exploitation Analysis (privilege escalation, data exposure) - Reporting (technical + business impact, PoCs, remediation guidance) - Retesting (to verify fixes and validate security posture) This methodology ensures coverage, clarity, and repeatability, allowing stakeholders to clearly understand risk while prioritizing fixes effectively. Deliverables You Can Expect: - PDF report with detailed vulnerabilities, CVSS scores, descriptions, PoCs, and remediation steps - CVSS Scoring and component details. - Executive summary (1 page) for management - Exploitable PoCs with step by step replication - Clear technical and business impact descriptions - Mitigation and recommendation strategies aligned to your environment - OWASP/CWE mapping for risk classification - Structured documentation, screenshots, logs, and retesting summaries Why work with me? - I don’t just find bugs. I help you understand their risk, context, and business impact. - I offer fullcycle engagement: from scoping and execution to documentation and retesting. - I respect deadlines, communicate transparently, and provide clean, organized results. Let’s ensure your application stands secure against today’s threat landscape. I’m available to start as early as you need, and I’ll tailor the engagement to fit your testing scope and business needs. Looking forward to the opportunity. Alvin Ferdiansyah Cybersecurity Consultant | Penetration Tester | OSCP, CREST CRT, CPSA, eWPTX, eMAPT, BSCP
    Featured Skill Vulnerability Assessment
    OWASP
    Metasploit
    Kali Linux
    Linux
    Security Analysis
    Red Team Assessment
    Network Penetration Testing
    Web App Penetration Testing
    Penetration Testing
    Information Security
  • $7 hourly
    A highly motivated individual with a strong interest in cybersecurity and technology. Skilled in Linux systems, Metasploit, and promoting Security Awareness. I enjoy solving problems, adapting quickly to new challenges, and continuously learning in fast-paced environments. Passionate about building secure and resilient digital systems to support business and user safety, I can help. Cybersecurity: Penetration Testing, Vulnerability Assessment, Threat Intelligence, Cybersecurity Awareness, Phishing Simulation, Network Attacks, Web Application Security (SQL Injection, XSS), Malware Analysis Programming Languages: Java, Golang, C++, C, COBOL, Assembler, Python, Ruby Database Management Systems (DBMS) Operating Systems: Windows, Linux Software Proficiency: Microsoft Office, MYOB, Blender, Cisco Packet Tracer, Delphi, Visual Basic Security Tools: Burp Suite, Wazuh, SOCRadar, Qualys
    Featured Skill Vulnerability Assessment
    Linux System Administration
    Web Application Security
    Penetration Testing
    Cybersecurity Tool
    Cybersecurity Monitoring
    Cybersecurity Management
    Security Operation Center
    Security Engineering
    Security Analysis
    Database Administration
    Network Engineering
    Computing & Networking
    Computer Network
    Information Security
  • $23 hourly
    Certified Cybersecurity Analyst with 4+ years of experience in vulnerability management, penetration testing, and compliance auditing, along with 2+ years in manual QA testing for web and mobile applications. Strong background in validating vulnerabilities, conducting risk assessments, managing IAM, and executing manual test cases. Known for attention to detail, clear communication, and effective cross-functional collaboration.
    Featured Skill Vulnerability Assessment
    Quality Assurance
    Penetration Testing
    User Identity Management
  • $8 hourly
    I'm a passionate QA Tester and Junior Pentester with hands-on experience ensuring applications are secure, stable, and user-friendly. I’ve worked on real-world web security testing projects for the past 10 months, focusing on vulnerabilities like XSS, SQLi, IDOR, and Rate Limiting. As a QA enthusiast, I specialize in manual testing, bug reporting, API testing (Postman), and writing effective test cases using tools like TestRail and Jira.
    Featured Skill Vulnerability Assessment
    Performance Testing
    Bug Reports
    Trello
    API Testing
    Manual Testing
    Kali Linux
    MySQL
    Microsoft Excel
    Apache JMeter
    TestRail
    Jira
    Katalon Studio
    Network Penetration Testing
    Penetration Testing
  • $30 hourly
    Hey there! I’m a seasoned cybersecurity pro with over 20 years of experience, including 6 years at one of Indonesia’s largest banks and 3 years in IT infrastructure. I’ve tackled everything from securing high-risk systems to leading incident response teams—basically, I’ve seen it all in the cybersecurity world. Now, I’m diving into freelancing to help businesses lock down their digital assets. Whether you need a quick security audit, help with compliance (like ISO 27001 or PCI-DSS), or just want to patch up vulnerabilities before the bad guys find them—I’ve got your back. Big bonus: I speak ‘bank-level security,’ so if you need tight, regulated-industry expertise, let’s chat! Why hire me? Straightforward advice, no unnecessary jargon, and a focus on real-world solutions—not just paperwork. Let’s make your systems safer without the headache.
    Featured Skill Vulnerability Assessment
    Teaching
    Data Entry
    Tech & IT
    Helpdesk
    Linux
    Microsoft Windows
    IT Support
    Information Security Governance
    Cybersecurity Management
    IT Management
    Remote IT Management
    Cybersecurity Monitoring
    Network Security
    Information Security
  • $15 hourly
    🔐 Senior Information Security Consultant with 10+ years of experience in Web, Network & Mobile Penetration Testing (OWASP Top 10 / SANS 25 / NIST / PCI-DSS). I help companies identify vulnerabilities before attackers do. ✅ Certified in Black-box & White-box Testing ✅ Expert in VAPT for Web, Network, Mobile, API, and Source Code ✅ Hands-on with Burp Suite, Acunetix, Nexpose, Fortify, Nessus, Metasploit, and more ✅ Cloud & SIEM Security (AWS, Azure, DLP, EDR, NAC, PAM) **What I offer:** - Web App Security Testing (Manual + Automated) - Source Code Review (.NET, PHP, Java) - Mobile App VAPT (OWASP MSTG for Android/iOS) - Network Pentesting (Internal & External) - Server Hardening & Compliance Audit (CIS Benchmark) - Social Engineering Simulation (Phishing, Vishing, etc.) 🧰 Tools I use: Burp Suite, Nexpose, Nessus, Metasploit, Checkmarx, Fortify, IBM AppScan, Wireshark, Apktool, etc. Let’s secure your apps & infrastructure from real-world threats. 📩 Send me a message to discuss your security needs.
    Featured Skill Vulnerability Assessment
    MySQL
    Web Testing
    PHP
    Web Development
    CodeIgniter
    Web Service
    Laravel
    API Development
    Web Application
    Mobile App
    Software Development
    Cybersecurity Tool
    Security Testing
    Cloud Security
    Information Security
    Source Code Scanning
    OWASP
    Mobile App Testing
    Network Security
    Web Application Security
    Penetration Testing
  • $12 hourly
    I'm a IT Security experienced in Analyst, Engineer, and Web Penetration Testing. While on my career, I was Wazuh Siem Administrator, Security Analyst Layer 2. Now, I'm Penetration Testing in my full-time work. If you need help, please don't be shy to contact me!
    Featured Skill Vulnerability Assessment
    Information Technology
    Security Analysis
    System Security
    Penetration Testing
  • $23 hourly
    I have over 20 years of experience in the field of networking, developing and cybersecurity. High-level analytical skills and attention to detail in work.
    Featured Skill Vulnerability Assessment
    System Security
    Cybersecurity Management
    Penetration Testing
  • $3 hourly
    I have skills and abilities as a Pentester, Wordpress developer, Graphic Design and Digital forensics.
    Featured Skill Vulnerability Assessment
    Digital Forensics
    Cybersecurity Tool
    Penetration Testing
    Computer Network
    Network Engineering
    Computing & Networking
    Information Security
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.