Hire the best Vulnerability Assessment Specialists in Dublin, IE
Check out Vulnerability Assessment Specialists in Dublin, IE with the skills you need for your next job.
- $80 hourly
- 0.0/5
- (0 jobs)
SUMMARY Master's graduate in Cybersecurity with strong hands-on experience in system support, vulnerability assessment, and incident response. Proficient in tools like Nmap, Wireshark, OpenVAS, SQLMap, and Burp Suite, with a solid understanding of TCP/IP, DNS, IDS/IPS, and firewalls. Skilled in scripting Python, Bash. I have hands-on experience with vulnerability assessments, penetration testing, and security frameworks and continuing self learning paths and challenges . I'm always looking to expand my knowledge in areas like cloud security and risk management. Known for a proactive mindset, strong problem-solving skills, and a commitment to high-quality service delivery. PROJECTS Techniques to Identify Possible Attack Surfaces in Web Applications Using Vulnerability AssessmentJan '25 & Penetration Testing, Dublin Business School DublinVulnerability Assessment
SQLBashPythonOperating SystemIncident ManagementSecurity Operation Center - $40 hourly
- 0.0/5
- (1 job)
As a Certified ISO Quality Cybersecurity Specialist with over two years of experience and a Master’s degree in Cybersecurity (Distinction) from Dublin Business School. I offer unparalleled expertise in endpoint, network, data security, and cloud technologies. I specialize in delivering threat intelligence, incident response, vulnerability management, and advanced automation, ensuring robust, scalable, and innovative cybersecurity solutions tailored to meet client needs. KEY SKILLS AND EXPERTUSE - Network & Endpoint Security: Proficient in deploying, configuring, and managing firewalls (e.g., VMware NSX-DFW), intrusion detection/prevention systems (Snort, Zeek), and endpoint security solutions like CrowdStrike and Symantec. - Cloud Security: Expertise in securing AWS, GCP, and Azure environment, including IAM policy creation, VPC configurations, and Infrastructure-as-Code (IaC) automation using tools like Terraform and Ansible. - Security Monitoring & SIEM Tools: Advanced knowledge of SIEM tools, including Splunk, ELK Stack, and open-source platforms such as Security Onion for real-time threat monitoring and detection. - Threat Intelligence & Vulnerability Management: Adept at using frameworks like MITRE ATT&CK, Cyber Kill Chain, and OSINT tools to craft threat models, assess vulnerabilities, and mitigate risks. - Automation & Scripting: Proficient in Bash, Python, and PowerShell for automating security tasks, managing CI/CD pipelines, and enhancing operational efficiency. - Cryptographic Endpoint Protection: Deep understanding of cryptographic protocols and techniques to secure sensitive data and mitigate endpoint threats effectively. - Penetration Testing & Vulnerability Assessment: Conduct comprehensive security tests for web and mobile applications using tools like **Kali Linux, Metasploit, OWASP ZAP, and Burp Suite. - Secure Development Practices: Expert in SDLC, microservices security, and secure API development with frameworks like Express.js, Flask, and Node.js. - Documentation & Policy Development: Experienced in developing detailed incident response playbooks, data protection policies, and strategies aligned with ISO 27001, NIST, SANS, OWASP, and PCI DSS frameworks. ACHIEVEMENTS - Designed and implemented a SOC for a financial institution, integrating SIEM systems, IDS/IPS, threat intelligence platforms, and network monitoring tools. - Developed automation playbooks for incident response using AWS Incident Manager, improving response times across all lifecycle stages. - Automated cloud infrastructure management using Terraform, Boto3, and Ansible, overseeing AWS services like EC2, S3, ELB, VPCs, and Lambda. - Built over 10 secure network architectures, incorporating both cloud-native and on-premise solutions. - Secured email and web traffic for clients with advanced Email Security Appliances and Content Filtering systems. - Deployed honeypots to track malicious actors and enhance client security protocols. - Conducted over 40 security assessments for web applications, including vulnerability testing (SAST, DAST, IAST), threat modeling, and penetration testing. - Simulated 20+ advanced attack scenarios in containerized environments to validate organizational defenses. - Led forensic investigations using tools like Autopsy, FTK Imager, and TCPDump, identifying and mitigating malicious activities. - Implemented cryptographic protocols to secure sensitive data in cloud environments. - Developed 15+ customized threat detection and remediation playbooks for cloud-native SOCs. - Enhanced multi-tier access management with IAM policies and advanced monitoring tools. - Identified misconfigurations in banking applications, leading to significant system hardening. WHY CHOOSE ME? I provide end-to-end cybersecurity solutions, from policy creation to advanced penetration testing, leveraging cloud-native tools and automation for efficiency and scalability. My proactive approach and attention to detail consistently enhance security postures across industries, while clear communication and seamless collaboration ensure timely and effective delivery of client goals. TECHNICAL STACK Security Tools: Splunk, ELK Stack, Security Onion, Snort, CrowdStrike, VirusTotal, Anyrun. Cloud Platforms: AWS (EC2, S3, IAM, VPC), GCP, Azure. Programming & Automation: Python, Bash, PowerShell, Ansible, Terraform, Docker. Penetration Testing: Kali Linux, Metasploit, OWASP ZAP, Burp Suite. Networking & Forensics: Zeek, Wireshark, FTK Imager, Autopsy, TCPDump. Development Frameworks: React.js, Node.js, Flask, Express.js. Frameworks & Standards: MITRE ATT&CK, Cyber Kill Chain, ISO 27001, NIST, SANS, PCI DSS. Let’s collaborate to enhance your organization’s cybersecurity resilience and efficiency. Contact me today to secure your digital a digital assets and infrastructure with confidence.Vulnerability Assessment
DevOps EngineeringCloud ServicesCryptographyApplication SecurityMicrosoft Endpoint ManagerInformation Security Threat MitigationScriptingAutomationPenetration TestingCyber Threat IntelligenceCloud SecurityNetwork SecurityIncident Response PlanFirewall - $50 hourly
- 0.0/5
- (0 jobs)
Having served as a Security Consultant/Engineer and Analyst for 8 years, I have knowledge and experience in Vulnerability Assessment and Pentesting, designing and implementing, VM, Cloud Security, Data Security and Operations. I am seeking opportunities to gain experience in cyber security where I can put my technical skills to practical use for the company and develop my career.Vulnerability Assessment
Cybersecurity ToolNIST Cybersecurity FrameworkCybersecurity MonitoringCyber Threat IntelligenceCybersecurity ManagementSecurity Policies & Procedures DocumentationSecurity EngineeringSecurity Operation CenterCloud SecurityEmail SecurityNetwork SecurityPenetration Testing Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Vulnerability Assessment Specialist near Dublin, on Upwork?
You can hire a Vulnerability Assessment Specialist near Dublin, on Upwork in four simple steps:
- Create a job post tailored to your Vulnerability Assessment Specialist project scope. We’ll walk you through the process step by step.
- Browse top Vulnerability Assessment Specialist talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Vulnerability Assessment Specialist profiles and interview.
- Hire the right Vulnerability Assessment Specialist for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Vulnerability Assessment Specialist?
Rates charged by Vulnerability Assessment Specialists on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Vulnerability Assessment Specialist near Dublin, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Vulnerability Assessment Specialists and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Vulnerability Assessment Specialist team you need to succeed.
Can I hire a Vulnerability Assessment Specialist near Dublin, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Vulnerability Assessment Specialist proposals within 24 hours of posting a job description.