Hire the best Vulnerability Assessment Specialists in Hyderabad, IN

Check out Vulnerability Assessment Specialists in Hyderabad, IN with the skills you need for your next job.
Clients rate Vulnerability Assessment specialists
Rating is 4.8 out of 5.
4.8/5
based on 229 client reviews
  • $25 hourly
    Having more than 10 Years of experience in cyber security domain with proven practical experience in Threat Hunting, Google Dorking, Open-Source Intelligence, threat modelling, security code review, Penetration Testing(Web/Mobile) and implementing cyber security best practices into the organizations. Proficient in threat hunting using MITRE ATT&CK, STRIDE, PASTA, OWASP Threat Dragon frameworks for conducting Threat Modelling framework, TTP’s and develop a heatmap. Experience in using Python Boto3, AWS responder, libcloudforensics, AWS Security - Step Functions, AWS Lambda, CSP header verification using Python Scripts, AWS Step Functions and Canary tokens. Hands-on experience in malware analysis through sandboxing techniques. Experienced in analyzing registry keys, event codes, and network telemetry logs. Capable of network traffic dumping and pcap analysis with tcpdump and network miner. Hands-On experience in malware analysis, specializing Android(Java) malware, reverse engineering, code obfuscation and static analysis. Familiar with fileless malware detection and other persistence techniques. Proficient in browser extension and double file extension analysis. Utilize threat analysis reports from Red Canary, CrowdStrike, and Palo Alto Networks for reconnaissance. Proficient with CTI methodologies including analysis through frameworks such as the Pyramid of Pain, Diamond Model, and Cyber Kill Chain. Capable of ensuring strong emphasis on security across web, thick client, API, mobile (iOS & Android), Kubernetes, containers, and cloud hosted services (AWS/AZURE). Experienced in handling F5 products (BIGIP-Next, F5OS, SPK), BIGIP, NGINX core and NGINX Plus. Strong technical experience in implementing cybersecurity methodologies such as NIST, OSSTMM, M(ASVS), SANS, MITRE ATT&CK and NIST & OWASP standards, with expertise in identifying application weaknesses, attack vectors, exploitation techniques, and countermeasures. Well versed with TCP/IP, packet analysis(pcap), protocol analysis, web sockets, Endpoint analysis, network forensics, OAUTH 2.0, OpenID Connect and SAML identity protocols. Implemented secure coding practices, reducing vulnerabilities and proficient in tools like Fortify and SecureCodeBox. Extensive experience in using fuzzing tools like DirBuster, FFUF tools. Hands-on programming skills using Java, JavaScript and Python Areas of Expertise– Digital Forensics, Threat Hunting, Automation by Python Scripting. Certified GIAC-Mobile Device Security and Ethical Hacker (GMOB). Certified EC-Secure Programmer (ECSP) and Certified Ethical Hacker (CEH). Successfully completed the "Advanced Infrastructure Security Assessment" course at the Null conference in 2022. Successfully completed the "Breaking and Owning Applications and Servers on AWS and Azure" course at the Null conference in 2019 Developed security policies, ensuring compliance and smooth application delivery. Good at using governance tools like JIRA, Confluence etc. Web & Mobile Application: CheckMarx, Fortify, SecureCodeBox, SonarQube, Burp Suite (Pro & Free), Fiddler, OWASP Zap Proxy, Paros Proxy, W3af, Echo Mirage, Snallygaster, PenCrawler, Hackbox, Galileo, FFUF, InfectionMonkey, Drozer, MobSF, Jadx, JD-GUI, Santoku, AndroidTamer, Adhrit, Reverse APK, Clutch, Rp++, Frida/Objection, Needle Framework, iFunbox, RastiCrac, Otool, Class-dump, iLEAPP, ALEAPP. Threat Hunting and Telemetry Analysis: Tcpdump, Wireshark, ATT&CK MITRE(TTP’s), Mimikatz, Scapy, PyShark, Network Miner, Zeek, Splunk, Sysmon, Snort, Wazuh, ElasticSearch(ELK), Suricata. Web Services & Network Assessment: WSSAT 2.0, Astra, Postman, SoapUI, API Fuzzer, Nmap, Nessus, Kali Linux, Metasploit, Crunch, Cain Cloud & Containers, Threat Modelling AWS Inspect, S3 Inspect, Bucket Finder, Guard, Clair, Anchore, Trivy, STRIDE, DREAD, Microsoft Threat Modelling Tool, Client satisfaction and quality of work are my top priorities. I'm a problem solver and I'm glad to help you with any task you have on your website. Regards, Sandeep T
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Security Testing
    Information Security
    Penetration Testing
    Kali Linux
    Wireshark
    Website Security
    Cryptography
    Mobile App Testing
    Web App Penetration Testing
    Network Penetration Testing
    Code Review
    Network Security
    Encryption
  • $95 hourly
    I am a Cyber Security Expert & Advisor with over 11 years of experience in Security Engineering, Security Architecture, Product Security SIEM, Cyber Security & Defense Operations, DLP, EDR, XDR, MDR Cyber Threat Intelligence(CTI) & Cyber Threat Hunting(CTH). I currently work as an Advisory Senior Solution Advisor at Deloitte, one of the leading professional services firms in the world. In my role, I help clients achieve cyber resilience and strategic alignment by designing, implementing, and optimizing cyber security solutions that address complex and evolving threats. As part of the Cyber & Strategic Risk team, I collaborate with global and cross-functional teams to deliver high-quality and innovative cyber services across various domains. I also contribute to thought leadership, quality initiatives, and best practices within Deloitte and the cyber community. My mission is to empower organizations to protect their assets, reputation, and stakeholders from cyber risks, while leveraging the opportunities and benefits of the cloud. I am passionate about learning new technologies, sharing my insights, and working with diverse and talented professionals. I strive to continuously improve my skills and knowledge, and to provide value and excellence to my clients and colleagues.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Digital Forensics
    Information Technology Strategy
    Information Technology Operations
    Information Systems Engineering
    Information Security Threat Mitigation
    NIST Cybersecurity Framework
    Cyber Threat Intelligence
    Security Operation Center
    Cybersecurity Monitoring
    Information Security
    Cybersecurity Management
  • $45 hourly
    A seasoned Information Security professional with over 17 years of experience in Governance, Risk Management, and Compliance (GRC). Expertise in developing and maintaining Information Security Management Systems (ISMS) in line with ISO27001, NIST, and other industry frameworks. Proven track record of managing cloud security , driving security compliance, and leading internal and external audits. Skilled in designing security policies, training programs, and collaborating with cross-functional teams to implement security strategies. Experienced in conducting third-party risk assessments, defining security contractual clauses, and ensuring adherence to regulatory and industry standards. Adept at fostering organizational security awareness and managing security risk across global teams.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    AI Compliance
    Sarbanes-Oxley Act
    SOC 2
    Network Security
    Application Security
    Cloud Security
    Cybersecurity Management
    Data Privacy
    ISO 27017
    ISO 9001
    ISO 27001
    Business Continuity Planning
    Governance, Risk Management & Compliance
    Information Security Audit
  • $40 hourly
    LINKS LinkedIn PROFILE Cybersecurity Enthusiast and Researcher with over 25 years of experience as a Senior Information Manager, specializing in IT support and security services. Skilled in Initial Build-out of stealth mode companies from scratch for Gaming, healthcare Industries, Managing IT budgets, vendor relationships, and leading diverse projects, IT Operations, Network Operations Centre, Data Centre management & Cloud Computing,
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    DevOps
    Problem Solving
    Architecture
    Computing & Networking
    Information Security
    Compliance
    AWS CloudFormation
    Azure DevOps
    Storage Area Network
    Penetration Testing
    FortiGate Firewall
    Cisco ASA
    Linux System Administration
    Windows 10 Administration
  • $28 hourly
    With over 7 years of experience in DevSecOps, I specialize in securing, automating, and optimizing software delivery pipelines in cloud environments, particularly AWS. My goal is to help businesses streamline their development processes while ensuring robust security measures are in place at every stage of the software lifecycle. I excel in integrating DevSecOps best practices to build efficient, secure, and scalable solutions tailored to client needs. What I Do Best: *CI/CD Automation: I design and implement CI/CD pipelines using tools like Jenkins, Ansible, Git, and Terraform to automate software builds, deployments, and testing processes. This ensures faster, error-free releases while maintaining a high level of security. *Cloud Security: I focus on securing cloud environments through best practices such as vulnerability scanning, secret management using HashiCorp Vault, and compliance with industry standards. Using AWS services like GuardDuty, CloudTrail, and WAF, I secure infrastructure and applications, reducing potential risks. *Containerization: I create and manage containerized applications using Docker and deploy them securely within Kubernetes clusters. By implementing Pod Security Policies and cluster hardening techniques, I ensure that applications run in a safe and controlled environment. * Infrastructure as Code (IaC): I automate infrastructure provisioning using Terraform, ensuring seamless management of AWS resources like EC2, EKS, VPC, S3, EBS, and more. This helps in maintaining infrastructure consistency, scalability, and compliance. *DevSecOps Pipelines: I incorporate security tools such as Fortify, Trivy, Black Duck, and OWASP ZAP into CI/CD pipelines to perform continuous security scanning during every stage of the build process. This ensures early detection and remediation of vulnerabilities. *Automation and Optimization: Through scripting languages like Groovy and Bash, I automate routine tasks, reducing manual intervention by up to 50%. From infrastructure validation to security reviews, automation streamlines workflows and increases operational efficiency. *Monitoring and Troubleshooting: Using tools like Prometheus, Grafana, and CloudWatch, I provide real-time monitoring and alerting for environments, ensuring proactive issue resolution. I also utilize logs and metrics to troubleshoot and maintain system performance in Kubernetes and Linux environments. *Collaboration and Communication: I work closely with development teams, product managers, and stakeholders to create seamless workflows that balance performance and security. My ability to communicate complex concepts effectively ensures that everyone involved understands the processes and results. Why Work With Me? My extensive background in DevSecOps provides a comprehensive approach to software delivery, balancing speed with security. I understand the unique challenges that come with deploying in complex, cloud-based environments, and I take pride in providing customized solutions that drive efficiency, security, and innovation. Whether you’re looking to improve CI/CD pipelines, secure infrastructure, or automate development workflows, I bring a solutions-oriented mindset to every project.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Network Security
    Cloud Security
    Cloud Computing
    Ansible
    Linux
    Bash
    Python
    Jenkins
    CI/CD
    Docker
    AWS Application
    Kubernetes
    Terraform
    DevOps
  • $6 hourly
    As a seasoned Cybersecurity Strategist and Security Manager with a passion for entrepreneurship, I have dedicated my career to safeguarding businesses from the ever-evolving landscape of cyber threats. With over 9+ years of experience in the field, I specialize in developing and implementing comprehensive security strategies that protect critical assets and ensure compliance with industry standards. My journey in cybersecurity began with a deep interest in technology and its potential to both empower and challenge organizations. Over the years, I have honed my skills in vulnerability assessment, penetration testing, incident response, and risk management. As an entrepreneur, I founded SearchSutra, where I lead a team of experts committed to delivering innovative and tailored security solutions to our clients. Key Achievements: • Successfully identified and mitigated critical vulnerabilities for numerous clients, reducing their risk exposure. • Developed and executed security awareness training programs that enhanced employee vigilance and reduced incidents by 75%. • Pioneered the implementation of cutting-edge security technologies, resulting in improved overall security posture for clients. My approach is client-centric, focusing on understanding each organization's unique needs and challenges. I thrive on building strong relationships and providing solutions that not only address current threats but also anticipate future risks. When I'm not immersed in the world of cybersecurity, I enjoy Play and listen, which helps me stay balanced and energized. I'm always eager to connect with like-minded professionals and explore new opportunities to collaborate and innovate in the field of cybersecurity.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    SEM Audit
    Cybersecurity Management
    Security Analysis
    PCI DSS
    ISO 27001
    Penetration Testing
    Security Assessment & Testing
  • $10 hourly
    BRIEF SUMMARY A recent graduate with a strong interest in cybersecurity is looking to launch their career by applying their skills in areas like vulnerability detection, network protection, and incident management in a remote work environment. I also perform Bug Hunting. I mostly focus on Web application Pentesting. I found 30 + bugs and reported to their respective Security Teams
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Bug Reports
    Information Security Audit
    Web App Penetration Testing
    Ethical Hacking
    Cybersecurity Tool
  • $10 hourly
    Hi, I’m Kairamkonda Sandhya, a software developer specializing in creating secure and efficient applications. With expertise in Python, HTML, CSS, and full-stack development, I design and build tools that solve real-world problems. Whether it's crafting robust applications or integrating security into development, I’m passionate about delivering innovative solutions tailored to your needs.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Web Design
    Web Application
    Penetration Testing
    Web Development
  • $5 hourly
    🚀 Cybersecurity Specialist | Ethical Hacker | Penetration Tester Certified CEH v12 professional with expertise in penetration testing, vulnerability assessment, and ethical hacking. I help businesses identify and fix security risks to protect their digital assets. 🔹 Skills: Web & Network Security | Security Audits | Threat Analysis | Incident Response | Cloud & IoT Security 🔹 Tools: Nmap | Metasploit | Burp Suite | Wireshark | Nessus | Kali Linux 🔹 Why Me? Strong technical skills, problem-solving mindset, and hands-on experience from Hacker School & CTF challenges. 💡 Need a security expert? Let’s connect!
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Metasploit
    Linux
    Ethical Hacking
    Splunk
    SOC 1
    Network Security
    Cryptography
    Penetration Testing
    Information Security
    Network Engineering
    Computing & Networking
    Computer Network
  • $3 hourly
    ISO 27001 Lead Auditing, Lead Implementer, Controls Testing, Security Analysis, ITGC Testing, Risk Management, Compliance Audit, Compliance testing, Risk Audits, web application testing
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Enterprise Risk Management
    Penetration Testing
    Government Reporting Compliance
    Compliance Testing
    IT Compliance Audit
    SOC 2
    Web App Penetration Testing
    Security Analysis
    Risk Analysis
    ISO 27001
  • $3 hourly
    OBJECTIVE Aspiring cybersecurity professional with a background in web development and UI design, looking to transition into offensive security (red teaming). Passionate about identifying vulnerabilities, securing systems, and learning advanced techniques in ethical hacking. Eager to leverage my technical skills and proactive mindset in penetration testing, vulnerability assessment, and red team operations. PROJECTS Red Team Simulation: Conducted simulated penetration tests and vulnerability assessments on various web applications Vulnerability Analysis: Used tools like Nmap, Burp Suite, and OWASP ZAP to assess potential vulnerabilities in web applications Capture The Flag (CTF): Actively participated in CTF challenges to strengthen skills in exploitation and red teaming techniques Networking & Security Tools: Familiarized myself with key tools such as Wireshark, Metasploit, and Kali Linux for vulnerability research and exploitation
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Digital Marketing
    Front-End Development
    React
    DevOps
    Bootstrap
    JavaScript
    CSS
    HTML
    Web App Penetration Testing
    Bug Bounty
    Red Team Assessment
    Penetration Testing
    Cyber Threat Intelligence
  • $5 hourly
    Skilled Information Security Analyst with expertise in risk management unauthorized access viruses and a wide range of vulnerabilities and threats. Well-versed in direct and remote analysis with strong critical thinking communication and people skills. Able to thrive in fast-paced and challenging environments where accuracy and efficiency matter.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    IT Compliance Audit
    Static Testing
    ISO 27001
    Application Security
    Penetration Testing
    Security Management
    Administrative Support
    Cybersecurity Tool
    Security Analysis
  • $5 hourly
    Hi, I am Ajay, an Ethical Hacker, Penetration Tester, and content writer **I am a security analyst and also help to found bugs(vulnerabilities) in websites** ✌Seeking website and web application scans to find out all the medium, advanced, and complex vulnerabilities. ✌Account recovery. ✌Devices scanning. Well, if you are looking at all of this then I can definitely help you in this regard. I'm an btech in Cyber Security and Having Good Knowledge in the field of Information Security, Cloud Computing, digital Forensics, and Network Security. Doing Training under Ec Council . Done various college-level Projects. Done internship in Slytherin EduTech pvt Ltd. trained in finding bugs and recovering accounts working as a Freelance Cyber Security Expert and Ethical Hacker My technical skills include: - Web Application Development: ASP.NET, Django. - Reverse Engineering: Malware analysis, Binary Reversing, Firmware Reversing - Vulnerability Testing: Vulnerability Assessment, Penetration Testing using Kali Linux, ParrotSecurity, Blackarch. - Database Design: MySQL, Oracle, SQL Server, SQLite. ✌And Also , A content writer📝 (story writing).... ✌Web development - Javascript.
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Test Results & Analysis
    System Security
    Web Application
    C
    Linux System Administration
    Digital Forensics
    Content Writing
    Python
    Ethical Hacking
    Website Content
    Linux
    Writing
    Web Testing
    Kali Linux
  • $3 hourly
    SUMMARY * Dedicated Billing System Analyst II with over 6 years of experience in cultivating long-term partnerships with vendors and clients. * Skilled in installing, configuring, and monitoring complex systems and infrastructures. * Experienced in providing IT services, developing security projects, and offering day-to-day operational support. * Proficient in collaborating with application development teams to implement fixes and enhancements. * Bilingual Database Developer with expertise in designing, modifying, and managing database objects. * Excels in moving supporting data between non-production environments. * Committed to contributing to the growth of the company and personal development. * Threat Hunting Understanding
    vsuc_fltilesrefresh_TrophyIcon Vulnerability Assessment
    Incident Management
    Jira
    Metasploit
    SQL
    Unix Shell
    Ethical Hacking
    Nessus
    OWASP
    Penetration Testing
    Database Management
    Database
    Information Security
    Computer Network
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Vulnerability Assessment Specialist near Hyderabad, on Upwork?

You can hire a Vulnerability Assessment Specialist near Hyderabad, on Upwork in four simple steps:

  • Create a job post tailored to your Vulnerability Assessment Specialist project scope. We’ll walk you through the process step by step.
  • Browse top Vulnerability Assessment Specialist talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Vulnerability Assessment Specialist profiles and interview.
  • Hire the right Vulnerability Assessment Specialist for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Vulnerability Assessment Specialist?

Rates charged by Vulnerability Assessment Specialists on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Vulnerability Assessment Specialist near Hyderabad, on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Vulnerability Assessment Specialists and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Vulnerability Assessment Specialist team you need to succeed.

Can I hire a Vulnerability Assessment Specialist near Hyderabad, within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Vulnerability Assessment Specialist proposals within 24 hours of posting a job description.