Hire the best Vulnerability Assessment Specialists in Delhi, IN
Check out Vulnerability Assessment Specialists in Delhi, IN with the skills you need for your next job.
- $12 hourly
- 4.9/5
- (30 jobs)
Hi, I am Amit Singh and having 10+ years of significant and well-diversified experience in Cybersecurity domains, including ⭐Web Application penetration testing (SaaS, Cloud etc.)⭐Network Penetration testing(Servers, Active Directory, IoT etc.)⭐Web API pen-testing ⭐Mobile penetration testing (android & iOS)⭐Web 3.0 DApps & Smart Contract pen-testing (Blockchain technology)⭐ Source Code Review etc. 🏆Top Rated Profile on Upwork ✅I have performed penetration tests & vulnerability assessments and delivered professional reports to companies all over the world in accordance with: ☑️ Offensive Security (OSCP) standards ☑️ OWASP Top 10 Vulnerability ☑️ OWASP API Security Top 10 Vulnerability ☑️ OWASP Mobile Security Top 10 Vulnerability ☑️ Application Security Verification Standard 4.0 (ASVS 4.0) ☑️ CWE Top 25 Most Dangerous Software Errors ☑️ ISO 27001 Penetration Testing ☑️ Payment Card Industry Data Security Standard (PCI DSS) ☑️ General Data Protection Regulation (GDPR) ☑️ Common Vulnerability Scoring System (CVSS) ☑️ Open Source Security Testing Methodology Manual (OSSTMM) ✅ Cybersecurity Certifications:- ☑️ Certified eLearnSecurity Web application penetration tester (eWPT) ☑️ Certified API Security Professional( CASP) ☑️Certified Ethical hacker(CEH) ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ☑️ Executive Summary ☑️ Assessment Methodology ☑️ Type of Tests ☑️Risk Level Classifications ☑️ Result Summary ☑️ Table of Findings ☑️ Detailed Findings. Each finds listed within the report will contain a CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ✅ Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, checkmax and Zaproxy etc. Note-For more info lets connect over the chat section. ThanksVulnerability AssessmentEthical HackingSecurity Assessment & TestingWeb App Penetration TestingCode ReviewOWASPAPI TestingWebsite SecurityInformation Security AuditInternet SecurityNetwork Penetration TestingWeb Application SecurityPenetration TestingNetwork SecuritySecurity Testing - $25 hourly
- 5.0/5
- (3 jobs)
Thanks for visiting my Profile. My name is Deepansh Hooda & I'm a Security Professional. My skills are:- * Network Security * Internet Security * Web Security * Data Security * LINUX * UBUNTU I have 5+ years of rich experience in above mentioned skills. Client Satisfaction is my Top Priority. I guarantee you Excellent Quality Work.Vulnerability AssessmentWeb App Penetration TestingPython ScriptBash ProgrammingcURLSQLNetwork Penetration TestingLinuxSQL ProgrammingPythonUnixComputing & NetworkingInformation SecurityPenetration TestingSystem Security - $15 hourly
- 5.0/5
- (127 jobs)
Web Penetration Testing(OWASP Top 10 methodology) | Network Penetration testing | OWASP API Security | Mobile Vulnerability Assessment(iOS and Android) | Source Code Reviews(.Net, Java, PHP) | Vulnerability Assessment and Penetration Testing | SIEM team (Cloud(AWS and Azure) Security, File Integrity Monitoring and Event Monitoring, Endpoint Security and Encryption, Data Loss Prevention, Network Access Control, Threat Monitoring (Email Traffic and Malware Analysis), Privileged Access and Identity Management) Have 7+ years of experience in both black box and white box testing penetration testing. Perform VAPT (Vulnerability Assessment and Penetration Testing) services for web applications, networks, mobile; source code reviews; malware analysis; server hardening; and security analysis etc. Conduct penetration testing in a systematic approach. Follow the standard methodology of the industry like OWASP Testing Guide v4(OTGv4); SANS top 25; NIST SP 800-115; PCI DSS to perform penetration testing so that client can concentrate on their professions without worrying about security threats. Web Application Testing: Do web application penetration testing with the latest methodology like OWASP Top-10, SANS Top-25. Perform both manual and automated penetration testing for vulnerabilities like Injection flaws(such as SQL, NoSQL, OS, and LDAP injection etc),Broken Authentication, Sensitive Data Exposure,XML External Entities (XXE), Broken Access Control,Security Misconfiguration, Cross-site scripting(XSS), Insecure Deserialization, Using Components with Known Vulnerabilities,Insufficient Logging & Monitoring. Also, perform source code reviews for many technologies like Java, NET, PHP etc. Approach for Manual Web-Application Penetration Testing: Conduct manual testing with following controls: * Configuration and Deployment Management Testing * Identity Management Testing * Authentication Testing * Authorization Testing * Session Management Testing * Input Validation Testing * Testing for Error Handling * Testing for weak Cryptography * Business Logic Testing * Client Side Testing Tools that use for Automated Web Penetration Testing: Acunetix, Burp-Suite, Netsparker, Nexpose, Nikto, IBM AppScan, HP fortify, W3af etc. Network penetration testing: Provide both external and internal network Penetration Testing so that your Network Infrastructure is secured from the real world attacks. Do both manual and automated network penetration testing. Approach for Manual Network Penetration Testing: Manually check for IDS/IPS, Server, Networks switch, Network Router, VPN, Firewalls, Anti-virus, Password etc. Tools that use for automated network penetration testing: OpenVas, Wireshark, Nessus, Metasploit, Armitage, Scapy etc. Mobile Application Penetration Testing: Perform mobile applications application penetration testing with the latest OWASP methodology(MSTG). Performed both manual and automated penetration testing for vulnerabilities like Weak Server Side Controls, Insecure Data Storage, Insufficient Transport Layer Protection, Unintended Data Leakage, Poor Authorization and Authentication, Broken Cryptography, Client Side Injection, Security Decisions Via Untrusted Inputs, Improper Session Handling, Lack of Binary Protections. Tools: Burp-Suite, HP fortify, Dex2Jar, Apktool, framework-res.apk, iNalyzer. Source Code Reviews: Perform source code reviews for both front and back-end languages. Perform source code reviews standard methodology like OWASP top 10. Do manual and automated source code reviews for various web based security vulnerabilities like SQL injection, Cross site scripting (XSS), CSRF, RFI,LFI, Authentication bypass etc. Tools: CheckMarx, IBM Appscan source for analysis, Microfocus HP Fortify. Security Analysis and Server Hardening: Regularly check and maintain your systems, servers to ensure that they comply with the standards. Do hardening application checks the item automatically on a daily basis and monitors all critical networks and server components. We support various frameworks like CIS benchmarking for Desktops & Web Browsers, Mobile Devices, Network Devices, Servers – Operating Systems, Virtualization Platforms & Cloud etc. Social Engineering: Have experience in social engineering vectors: Vishing, Phishing, Smishing, Impersonation. Used the following social engineering cycle to conduct social engineering: Gather Information: Here Information gathered from company websites, social media and other publications. Plan Attack: Next step is outline how intends to execute the attack Acquire Tools: After planning, next include computer programs that an attacker will use when launching the attack. Attack: Exploit the weaknesses in the target system. Use acquired knowledge: Information gathered during the social engineering tactics is used in attacks such as password guessing. Tools: SET(Kali-Linux); GetGoPhishVulnerability AssessmentWeb TestingInformation Security AuditWeb Application SecurityWebsite SecurityNetwork Penetration TestingSoftware QASecurity AnalysisInternet SecurityInformation SecurityPenetration TestingNetwork Security - $70 hourly
- 5.0/5
- (14 jobs)
~Steering Blockchain concentric projects on the process and importance of Security Audits ~Researching use-cases and the process of Blockchain Implementation ~Building Connections to strengthen a more secure and safe community in the Blockchain space | DeFiVulnerability AssessmentSecurity EngineeringWeb Application SecurityFinancial AuditDAppsBlockchain DevelopmentBlockchain SecurityEthereumSmart ContractRustBlockchainBlockchain ArchitectureSolidityLayer 2 BlockchainBinance Coin - $50 hourly
- 5.0/5
- (2 jobs)
Since 2015 I work professionally as a Pen Tester/Security Researcher providing cyber security services like penetration testing, network security, Web application security using global standards like OWASP, SANS 24. I am Certified CEH and OSCP. Providing Cyber Security Services: 1. Web Application Penetration Testing 2. Network Penetration Testing 3. Cloud Security Assessments 4. C/C++ source code audits and vulnerability research 5 Mobile Application Penetration Testing 6 Source Code Review 7 Threat Modeling Offered Solutions: 5. Continuous, Expert-assisted Vulnerability Assessment or re-validation of Vulnerabilities Pride of Quality Work: 1. Offering high quality penetration testing services and Delivery of Service. 2. Focus on advanced cyber security business solutions like manual attack techniques and on adherence to industry-wide standards and methodologies: OWASP TOP 10, OWASP ASVS, OSSTMM and SANS 24 during the testing. 3. Delivering actionable and professionally written reports with mitigation of reported vulnerabilities.Vulnerability AssessmentMobile App TestingAPI TestingIT Compliance AuditInformation SecurityNetwork SecurityPenetration Testing - $25 hourly
- 4.8/5
- (6 jobs)
Cyber security / Data Protection / Penetration testing / Vulnerability assessment expert with 19+ years of experience. Certifications include - CISSP, CEH, ECSA, CIPP/E, CIPP/US, CIPT, FIP, ISO27001 LA/LI and many others. Team members have CREST CPSA and CPENT certifications as well. Assisted many clients on Penetration testing projects, Wordpress hacks, Vulnerability assessment, Mobile application testing, Data Protection compliance, Privacy audits, PIAs, DPIAs, Privacy policies, Data discovery, ISO 27001, NIST etc. Assisted many clients with Security architecture. Assisted many clients with ISO27001 certification across countries. Expert in Vulnerability assessment and Penetration testing of network, websites and mobile applications. As Director in PwC for over 7 years I have managed large national critical projects and their Vulnerability management. Complexity of clients included upto 10000 devices, 200 applications, more than 20 mobile apps etc. I am very confident of my capabilities and would leverage my 18 years of total experience to provide a great value add to your company.Vulnerability AssessmentPrivacy LawData PrivacyData ProtectionISO 27001Penetration TestingCybersecurity ManagementNetwork Penetration Testing - $75 hourly
- 0.0/5
- (1 job)
Seasoned Risk Management Specialist with highly analytical and technically minded approach to cybersecurity and information technology, aligning security architecture plans and processes I'll fully manage your project from start to finish within the time constraint and delivery quality results. I'm experienced in Cyber Risk Management , Governance and NIST-CSF Security Assessments Adept at collaborating with like-minded passionate individuals so let's connect!Vulnerability AssessmentNetwork DesignUX & UIJavaNIST Cybersecurity FrameworkCyber Threat IntelligenceRisk AnalysisSystem SecurityInformation TechnologyGovernance, Risk Management & ComplianceCybersecurity ManagementNetwork AdministrationPython - $45 hourly
- 0.0/5
- (0 jobs)
About Me Experienced Security Analyst with 1.5+ years of expertise in vulnerability assessment, penetration testing, and incident response. Proven track record in securing over 300+ organizations , including their websites, mobile applications (iOS & Android), APIs, cloud environments, infrastructure, and desktop applications. Adept at utilizing advanced security tools such as Burp Suite, OWASP ZAP, and Metasploit to identify and mitigate critical vulnerabilities. Achieved numerous bounties and recognitions from globally renowned organizations. Proficient in risk management, threat modeling, and ensuring compliance with industry standards like OWASP Top 10, CWE, NIST, and ISO 27001. Author of CVE-2024-46547. Key Achievements * Reported a critical IDOR vulnerability, earning $2000 bounty for a P0 severity bug. * Successfully identified an account takeover vulnerability (P1 severity), rewarded with a $1000 bounty.Vulnerability AssessmentComplianceInformation SecurityAPI TestingSource Code ScanningMobile App TestingWeb App Penetration TestingNetwork Penetration TestingNessusWebsiteAPIPenetration TestingCybersecurity ManagementBug BountyEthical Hacking - $8 hourly
- 0.0/5
- (0 jobs)
As a dedicated cybersecurity student with a relentless passion for protecting the digital realm and a strong proficiency in full-stack web development, I'm on a mission to fortify our connected world against evolving cyber threats. Currently pursuing a Bachelor's degree in Information Technology at IPU, Delhi. I'm set to graduate in 2025. My ultimate goal is to become a cybersecurity analyst, contributing to the protection of critical digital infrastructures, and to leverage my full-stack web development skills to enhance cybersecurity solutions. I'm determined to make a meaningful impact in the fight against cyber threats. Let's connect and explore the fascinating world of cybersecurity and web development together. Feel free to message me for discussions, networking, or collaboration. Together, we can build a safer digital future.Vulnerability AssessmentISO 27001Cybersecurity ToolPenetration TestingSecurity TestingSecurity FrameworkSystem SecurityEthical HackingCybersecurity Management - $15 hourly
- 0.0/5
- (0 jobs)
I help businesses secure their web and mobile applications, ensuring compliance and safeguarding them from potential security breaches. As a Certified Security Engineer with extensive experience in Vulnerability Assessment and Penetration Testing (VAPT) for Web, APIs, and Mobile applications, I specialize in identifying and mitigating critical vulnerabilities, ensuring secure and seamless operations for businesses. Key Achievements: - Successfully led security audits, achieving a 40% reduction in vulnerabilities. - Recognized in the Hall of Fame by the U.S. Department of Energy and TrendMicro, and received Letters of Appreciation from Lenovo and Ananta Drive for my contributions to cybersecurity. - Authored the CVE-2022-3585, showcasing my ability to identify critical vulnerabilities. - Certified in CEH (Certified Ethical Hacker) and AWS Certified Cloud Practitioner, demonstrating my expertise in ethical hacking and cloud security. I am proficient in industry-leading tools such as Burp Suite, OWASP Zap, Nessus, MobSF, Frida, and SonarQube. I take a results-driven approach to every project, delivering actionable insights and comprehensive security solutions tailored to the needs of each client. Whether you are a small business or a large enterprise, I am committed to ensuring your digital assets remain secure and resilient against evolving threats. Let’s collaborate to enhance the security and robustness of your systems!Vulnerability AssessmentSecurity TestingISO 27001Network Penetration TestingOWASPSecurity AnalysisAI SecurityAWS ApplicationApplication SecurityInformation Security AuditWeb App Penetration TestingDevOpsAPI TestingPenetration TestingInformation Security - $50 hourly
- 0.0/5
- (0 jobs)
-VAPT -Cloud Computing -Virtual CISO -Banking Cyber Security -Endpoint Security -Dark Web Monitoring Conduct VAPT and Provide Official Report VA report Generated by Nessus tool Conduct cyber-attack simulations as part of the RED team activity Conduct Vulnerability Assessment and Penetration Testing and configuration review for network, web application , mobile application and thick -client application Conduct configuration reviews for OS , DB, Firewall, routers, Switches and other security devices/components Perform manual testing of web applications Conduct source-code review using automated and manual approaches Prepare detailed reports Ensure timely delivery of status updates and final reports to clients Handle Clients queries Keep oneself updated on the latest IT Security news ,exploits, hacks Prepare Threat Intelligence reports for newly discovered threat agents, exploits, attacksVulnerability AssessmentCybersecurity MonitoringPenetration TestingCybersecurity ToolNessusNetwork Penetration TestingSecurity FrameworkNetwork MapperNetwork SecurityPCI DSSCybersecurity Management - $10 hourly
- 0.0/5
- (0 jobs)
Results-driven IT professional with notable success in planning, analysis and implementation of security initiatives. Strengths in providing comprehensive network design and security frameworks By having technical hands-on experience and knowledge of vulnerability assessment and Penetration testing with broad understanding of reporting in ISMS/IT compliances.Vulnerability AssessmentISO 27001PCI DSSInformation Security Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Vulnerability Assessment Specialist near Delhi, on Upwork?
You can hire a Vulnerability Assessment Specialist near Delhi, on Upwork in four simple steps:
- Create a job post tailored to your Vulnerability Assessment Specialist project scope. We’ll walk you through the process step by step.
- Browse top Vulnerability Assessment Specialist talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Vulnerability Assessment Specialist profiles and interview.
- Hire the right Vulnerability Assessment Specialist for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Vulnerability Assessment Specialist?
Rates charged by Vulnerability Assessment Specialists on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Vulnerability Assessment Specialist near Delhi, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Vulnerability Assessment Specialists and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Vulnerability Assessment Specialist team you need to succeed.
Can I hire a Vulnerability Assessment Specialist near Delhi, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Vulnerability Assessment Specialist proposals within 24 hours of posting a job description.