Hire the best Vulnerability Assessment Specialists in Kenya

Check out Vulnerability Assessment Specialists in Kenya with the skills you need for your next job.
  • $60 hourly
    I am a DevSecOps Practitioner, Application Security Analyst, and Cybersecurity Specialist. I have significant and well-diversified experience in multiple Cybersecurity domains, including: 1. Cloud Infrastructure: I help secure Cloud Infrastructure such as GCP AWS and Azure. 2.Penetration Testing and Vulnerability Assessment: I specialize in finding vulnerabilities in Web Applications, Mobile Applications, Networks, and Smart Contracts. 3. Bug Bounty Hunting: I find bugs for various companies on HackerOne - @l3s7r0z. I am constantly improving myself and getting better each day in the Cyber Security field. Lester Obbayi - @l3s7r0z
    Featured Skill Vulnerability Assessment
    Documentation
    Mobile App Testing
    Web Application Firewall
    Technical Documentation
    Black Box Testing
    Internet Security
    Software Testing
    Web App Penetration Testing
    Report Writing
    Ethical Hacking
    Article Writing
    Network Security
    Penetration Testing
    Information Security
  • $20 hourly
    Cyber Defense Solutions: Vulnerability Analysis and Penetration Testing to identify and address security gaps. Threat Modeling to anticipate and prevent cyber threats. Incident Response Planning to minimize the impact of security breaches. Firewall Configuration and Rule Creation for secure network management. Security Policy & Compliance: Development of Security Policies tailored to business needs. Compliance reviews for Data Protection (GDPR, HIPAA, etc.). Code Review for Secure Development Practices. Cybersecurity Training & Awareness: Cybersecurity training sessions for board members, experts, and employees. Custom training content development focused on security best practices. Ongoing support for security awareness programs. Information System & Data Protection Audits: Comprehensive audits to identify and mitigate security risks. Data protection assessments to ensure compliance with privacy standards.
    Featured Skill Vulnerability Assessment
    Compliance
    Government Reporting Compliance
    Information Security Awareness
    Security Assessment & Testing
    Intrusion Detection System
    Network Access Control
    FortiGate Firewall
    Incident Response Plan
    Security Policies & Procedures Documentation
    Cyber Threat Intelligence
    Penetration Testing
    Data Protection
    Training & Development
    Information Security
  • $11 hourly
    About Hassan is a cybersecurity expert with over seven years of specialised consultancy on Information Security Audits, Penetration Testing &Vulnerability Assessment, Information Security Policy Development and Implementation, malware analysis, cryptanalysis, exploit development and IT Due Diligence. He has worked with various technologies in complex business environments. He has a Master's in Information Management, BSc Computer Science Degree (2008), a Certified Ethical Hacker and Offensive Security Certified Professional (OSCP), SANS Application Security Testing, Microsoft certified security operations Analyst and Certified ITIL Practioner. Competency Areas a) Penetration Testing and Vulnerability Assessments b) Malware Analysis c) Web Applications Security Audits d) Security Reviews e) Risk-Based Information Systems Audits f) Information Security Awareness Training g) Applications Interfaces and Control Reviews h) IT Risk Assessment i) Social Engineering Methodologies a) OWASP (Open Web Application Security Project) Top 10 b) OSSTMM (Open Source Security Testing methodology Manual) c) SANS Top 20 critical security controls d) SAMM (Software Assurance Maturity Model) Tools a) Kali Linux b) BurpSuite c) Metasploit d) BeEF e) Acunetix f) Nessus g) Wapiti etc
    Featured Skill Vulnerability Assessment
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Security Infrastructure
    Office 365
    Microsoft Azure
    OpenOffice
    Microsoft Word
    Microsoft Certified Professional
    Security Management
    Microsoft Active Directory
    Security Analysis
    Cisco Meraki
    Penetration Testing
  • $35 hourly
    Experienced Information Security Engineer with a proven track record of enhancing cyber-security resilience for organizations across diverse industries. Expertise in incident response, digital forensics, and network and application security, supported by a robust academic foundation. Adept at integrating technical proficiency with strategic vision to fortify security postures, streamline operations, and foster a culture of security awareness.
    Featured Skill Vulnerability Assessment
    Cybersecurity Management
    Penetration Testing
    Security Analysis
    Information Security Audit
    ISO 27001
    Kali Linux
    NIST SP 800-53
    Research Papers
    Splunk
    Information Security
    Network Security
    Python
  • $5 hourly
    I am a creative, and ambitious software developer always seeking new experiences and learning opportunities. My commitment to delivering high-quality work ensures timely delivery and complete customer satisfaction. With extensive exposure to a wide range of technologies and skills, I am well-equipped to handle diverse and complex projects. I also have significant experience in mobile and ARM-based device security. My expertise includes vulnerability discovery, code review, exploit development, and security research. I am adept at delivering technical training and creating advanced security course content. My contributions to the field of cybersecurity have been recognized through multiple awards and top placements in national and international CTF competitions. Skills and Technologies Programming Languages & Frameworks: Java: Extensive experience with Java, Maven, Gradle, and Android development. Java-Spark Framework and SpringBoot: Proficient in building robust back-end services. Kotlin: Skilled in developing Android applications. JavaScript & TypeScript: Expertise in front-end and back-end development. Ruby: Experienced in Ruby on Rails for web development. Angular Framework: Proficient in building dynamic single-page applications. React & React Native: Skilled in developing responsive web and mobile applications. Scripting Languages: Proficient in PHP, Bash, and Python. Development Tools & Platforms: Heroku, Railway, Git, GitHub, GitHub Actions, and Jenkins: Experienced in continuous integration, deployment, and version control. Databases: Proficient in SQLite, MySQL, and PostgreSQL. API Development: Skilled in API development, documentation, and consumption. Other Experiences: Telegram Bots and WhatsApp Bots: Developed automated messaging solutions. Android Applications: Extensive experience in mobile app development. Algorithms and Data Structures: Strong foundation in computer science principles. Ruby On Rails: Developed Ruby-based full-stack web applications. Django: Developed full-stack Python-based web applications. Daraja API Integration: Integrated mobile money APIs for seamless transactions. Payment Gateways and Aggregators: Developed and consumed payment solutions. Web Scraping: Expertise in extracting data from websites. WordPress: Experience in website development and customization. Cybersecurity Expertise Zero-Day Vulnerability Researcher: Extensive experience in mobile and ARM-based device security. Proven track record in vulnerability discovery, exploit development, and security research. Adept at delivering technical training and creating advanced security course content. Recognized for excellence in cybersecurity through multiple awards and honors, including top placements in national and international CTF competitions. Awards & Honors Finalist, Defcon Red Team CTF 2nd Runners-up, Kenya National CyberSecurity CTF 2020 Winner in Mobile Security, Aspire CTF 2021 Finalist, Defcon 29 Red Team Village CTF HackerOne Ambassador, Nairobi Club Member 1st Place, USIU CTF Hackathon 2022
    Featured Skill Vulnerability Assessment
    Mobile App Testing
    Research & Development
    Ruby
    Reverse Engineering
    JavaScript
    Java
    Python
    Android
    Flask
    Ruby on Rails
    Android App Development
    React
    Django
    Penetration Testing
  • $25 hourly
    For anything related to Software and Security, you can count on me through Upwork. Check out my bio and see what my past happy clients have to say! Looking forward to potentially working together!
    Featured Skill Vulnerability Assessment
    Security Analysis
    Network Penetration Testing
    Cloud Security Framework
    Ethereum
    Blockchain Security
    DevOps
    Smart Contract
    Website Security
    Security Assessment & Testing
    Metasploit
    Network Security
    Application Security
    Penetration Testing
  • $40 hourly
    I am a results-driven Cybersecurity Expert with a degree in Computer Science from Kabarak University and over 3 years of hands-on experience in protecting digital assets, identifying vulnerabilities, and strengthening IT infrastructures. Whether you're a startup looking to secure your first deployment, a company preparing for a compliance audit, or a business in need of round-the-clock threat monitoring I bring strategic thinking, technical precision, and clear communication to ensure your systems remain safe and resilient. Clients hire me not just for tools, but for peace of mind. I don't just run scans I deliver real protection and long-term cybersecurity solutions.
    Featured Skill Vulnerability Assessment
    Data Entry
    AWS Development
    Python
    DevOps
    Problem Solving
    Wireshark
    Database Administration
    Network Analysis
    Network Access Control
    Penetration Testing
  • $20 hourly
    An adaptable Information and Cyber Security professional with sufficient experience, properly versed in Vulnerability Assessment, Penetration Testing, DevSecOps, Network Threat Monitoring, Bug Hunting, Secure Code Review and Threat Intelligence Gathering. Am also proficient in reverse engineering of software applications. I have also discovered vulnerabilities in some small open-source projects, which I have responsibly disclosed on Exploit Database and Packet Storm Security. I have also been selected by EC-Council, one of the Cyber Security exam bodies as a Cyber Security Career Mentor. I have also recently achieved OSCP Certification from Offensive Security. I also currently possess Certified Ethical Hacker certification.
    Featured Skill Vulnerability Assessment
    Computer Skills
    Code Review
    Application Audit
    Report Writing
    Bug Bounty
    Secure SDLC
    Source Code Scanning
    Penetration Testing
  • $20 hourly
    As a seasoned expert in design, training, documentation, implementation, upgrade, audit, and certification, I specialize in guiding organizations through the intricate journey of ISO implementation across multiple standards, including: ISO 9001 - Quality Management System ISO 27001 - Information Security Management System ISO 14001 - Environment Management System ISO 45001 - Occupational Health and Safety Management System ISO 14298 - Security Printing Management System GSMA SAS - GSMA Security Accreditation Scheme PCI-CP - Payment Card Industry - Logical & Physical Security Requirements for Card Production I carry out the following implementation steps seamlessly for the above management systems for your organization: Gap Assessment Awareness Training SOP & Flowcharts documentation and guidance on implementation Objective Setting Risks and Opportunities Training and Assessment Training of Internal Auditors Internal Audits Management Review Coordination with Certification Bodies Other services that I offer which might benefit you include: Vulnerability Assessments and Penetration Testing (VAPT) Firewall Rules Review Development of Security Manuals, etc. By partnering with me, you're choosing a consultant dedicated to upholding the highest standards of integrity and excellence, driving your organization towards a secure, compliant future. I am also a Certification Auditor for IRCLASS India, and Intellcert Gmbh Germany for the above ISO Standards. Looking forward to serving you.
    Featured Skill Vulnerability Assessment
    Process Documentation
    Process Flow Diagram
    ISO 14001
    PCI
    GSM
    ISO 9001
    ISO 27001
    Compliance Consultation
    Internal Auditing
    Human Resources Consulting
    Information Security Audit
    Firewall
  • $7 hourly
    With a strong cybersecurity and digital forensics background, I specialize in incident response, threat analysis, and forensic investigations to help businesses and individuals safeguard their digital environments. My expertise spans Windows, macOS, and mobile (Android & iOS) forensics, as well as cloud security, malware analysis, and network defense, enabling me to detect, investigate, and mitigate cyber threats effectively. I take a proactive approach to cybersecurity and incident response, ensuring threats are identified and neutralized before they can cause damage. Whether it's analyzing malware, investigating unauthorized access, securing cloud environments, or responding to security breaches, I utilize advanced forensic tools and methodologies to provide tailored, data-driven security solutions. As cyber threats evolve, I continuously refine my skills to stay ahead of emerging risks, ensuring my clients receive the most up-to-date and effective security strategies. If you need a cybersecurity professional who can investigate threats, respond to incidents, and fortify your digital infrastructure, I’m here to help. Let’s work together to secure your systems, protect your data, and build long-term resilience against cyber threats.
    Featured Skill Vulnerability Assessment
    Malware Removal
    Bug Bounty
    SOC 1
    Malware Detection
    Digital Forensics
    Penetration Testing
    Ethical Hacking
    Security Analysis
  • $20 hourly
    Founder of LEVILYN, a cybersecurity and digital forensics company with over 12 years of practical and field experience. My areas of specialization are: [cybersecurity and compliance services]  Penetration Testing and Vulnerability Assessments [VAPT]: web application and mobile applications  Cloud computing  Network security: Firewalls, IDS/IPS, OpenVPN  Research work on cybersecurity, Articles, Blogs, ebooks.  Compliance policies [ PCC DSS, HIPAA, COBIT, NIST, ISO 27001,GDPR]  Risk assessment  Business Continuity and Disaster Recovery Plan [BCDR]  Controls (NIST, ISO/IEC 27000, ISO27701 series)  Document the best IT audit standards and policies [Digital Forensic Services]  Mobile Forensics  Computer Forensic  Network Forensics  Cloud Forensics  Cyber Security Compliances Policies and Risk Assessment,  Cybercrime Investigations  Research Work  Digital Forensic Report Writing [Forensics Tools competency] ▪ Autopsy ▪ Belkasoft ▪ Cellebrite UFED ▪ FTK Imager ▪ Magnet Axiom ▪ OS Forensic ▪ OSINT ▪ Wireshark ▪ Nmap ▪ Netcat ▪ Network Minor ▪ Volatility ▪ Splank
    Featured Skill Vulnerability Assessment
    Artificial Intelligence
    Research Papers
    System Security
    Malware Removal
    Cloud Security
    Cloud Security Framework
    Cybersecurity Management
    Application Security
    NIST Cybersecurity Framework
    Digital Forensics
    Penetration Testing
    Network Security
  • $8 hourly
    Hello, my name is Emmanuel Mwara. A Professional Penetration Tester & Bug Bounty Hunter. Bug hunting is my passion and Penetration Testing is my profession. As a bug hunter I am able to find vulnerability in deep and as penetration tester I am able to create a good & clear penetration testing report. In a world where cyber threats are constantly evolving and becoming more sophisticated, it's imperative that you work with a trusted pentester who understands the latest techniques and trends. With years of proven experience as a pentester, I have honed my skills and expertise to deliver results that exceed expectations. My passion for helping businesses stay secure is second to none, and I always look forward to establishing new long-term relationships with clients to ensure that their security remains strong and resilient. My expertise in penetration testing:- ✅Web-Application Penetration Testing based on OWASP TOP 10 ✅Vulnerability Assessment-website & web application ✅SQL Injection ✅XSS-Cross Site Scripting ✅CSRF-Cross Site Request Forgery ✅SSRF-Server Site Request Forgery ✅Business Logic Flaw ✅IDOR-Insecure Direct Object ✅RCE-Remote Code Execution ✅RFI-Remote File Inclusion ✅LFI-Local File Inclusion ✅Path Traversal ✅Authentication Bypass ✅File upload ✅Host Header Injection ✅Open Redirect ✅HTML Injection ✅CORS-Cross Origin Resource Sharing ✅Clickjacking ✅E-mail Spoofing Pentesting tools: BurpSuite Professional, sqlmap, nmap, wireshark, Metasploit, Nessus, XSSStrike etc Thank you so much for taking the time to visit my profile, and feel free to reach out at any time if you have any questions! Keep your business safe & secure!!
    Featured Skill Vulnerability Assessment
    Microsoft Active Directory
    Web Scraping
    Scripting
    Python
    Information Security
    Web Application Security
    Application Security
    Security Assessment & Testing
    Penetration Testing
    Kali Linux
    Network Penetration Testing
    Web App Penetration Testing
    Network Security
  • $50 hourly
    Web & API Security Expert | Bug Bounty Hunter | Cybersecurity Consultant. Malware Removal | Website Security Audits | Ethical Hacking
    Featured Skill Vulnerability Assessment
    Security Testing
    Domain Testing
    Web Server
    Website Security
    Penetration Testing
    Web Development
    Cybersecurity Tool
    Virtual Assistance
  • $14 hourly
    Career objectives * To contribute efficiently to any organization through application of my skills and capabilities. * To obtain top quality result of any organization standards, through excellence, in the growth and development of the organization alongside my personal growth and development.
    Featured Skill Vulnerability Assessment
    Cybersecurity Tool
    Document Translation
    Microsoft Virtual Server
    Software
    Software Development
  • $7 hourly
    Information Security Specialist | Cloud & Cybersecurity | Secure Software & Web Developer helping businesses protect digital assets, build secure infrastructures, and stay compliant with ISO 27001, NIST, and GDPR standards. Are you looking for a cybersecurity specialist who can not only protect your digital assets but also build secure, scalable, and high-performing solutions? You’ve found the right partner. I am a highly skilled Information Security Specialist with proven expertise in: Cybersecurity & Threat Management: • Real-time threat detection & incident response (Splunk SIEM, Microsoft Sentinel) • Vulnerability assessments, penetration testing (Nessus, Burp Suite, Nmap) • Red teaming, phishing simulations, endpoint and network security • ISO 27001, NIST, and GDPR compliance consulting Cloud Security Architecture: • AWS & Azure security design (IAM, NSG/ASG, Firewall, Key Vaults, Serverless Security) • Privilege escalation testing and hardening cloud environments • Cloud governance frameworks and cloud security audits Secure Software and Web Development: • Building secure web apps (HTML, CSS, JavaScript, Python, REST APIs) • Backend database hardening (PostgreSQL, MySQL) • Automating security workflows with Python, Bash, PowerShell • CI/CD pipeline integration with DevSecOps principles (Docker, Jenkins) UI/UX Design & Security: • Designing responsive, accessible, and secure user interfaces • Balancing security with user experience for optimal engagement Why Clients Trust Me: • Strong problem-solving mindset with attention to detail • Clear and timely communication with all stakeholders • Focused on business outcomes, not just technical checklists • Proactive in anticipating risks and providing long-term security solutions When you work with me, you get more than just technical skills, you get a strategic partner committed to protecting and elevating your digital environment. Ready to make your systems stronger, smarter, and safer? Let’s build something powerful together!
    Featured Skill Vulnerability Assessment
    System Administration
    IT Support
    Computer Science
    NIST Cybersecurity Framework
    ISO 27001
    Compliance
    Penetration Testing
    User Identity Management
    Cloud Security
    Network Security
    Web Development
    Software
    Database
    Software Development
  • $35 hourly
    I am an experienced and diligent Network and Infrastructure Engineer, Cybersecurity Analyst, Azure Cloud and Microsoft 365 Solution Architect. I have vast expertise in the Microsoft products ecosystem (Windows, Azure, Intune, Microsoft 365, Identity & Security Suite – Defender, Sentinel, Entra ID) among others such as Cisco Meraki and Ubiquiti Unifi. With my wealth of knowledge and experience, I help businesses secure, optimize, and scale their IT environments. Some amazing stuff I can help you do are: ● Automating and streamlining business processes using Power Automate and Power Apps with Power BI reporting. ● Securing your environment by configuring Microsoft Sentinel and using the platform for log ingestion, monitoring, detection and remediation of security alerts and incidents. ● Managing devices using Microsoft Intune including compliance and other policies, apps deployment, endpoint settings, feature management and update settings, with Power BI reporting. ● Building secure and resilient Azure cloud infrastructure in a Zero Trust Architecture. ● Securing infrastructure, identity, apps and assets using Microsoft Defender. ● Setting up a Microsoft and Azure tenants. ● Deploying conditional access based multi factor authentication and other conditional access policies to protect your identities. ● Administering Microsoft Exchange Online. ● Managing, configuring and securing identities On Entra ID. ● Configuring Single Sign-On to ease administration and secure your identities Skills & Expertise ✅ Microsoft 365 & Azure Administration ✅ Network Security & Infrastructure ✅ Microsoft Defender & Sentinel Security Solutions ✅ Intune Endpoint Management ✅ Entra ID & Identity Security ✅ Threat Intelligence & Incident Response ✅ Microsoft Power Platform (Power BI, Power Automate, PowerApps) Why Work with Me? - Proven Experience Securing & Optimizing IT Environments - Deep Knowledge of Microsoft Security & Cloud Solutions - Strong Troubleshooting & Problem-Solving Skills - Dedicated to Performance, Security, and Compliance Let’s work together to improve efficiency and efficacy in your business processes, strengthen your IT infrastructure and security posture!
    Featured Skill Vulnerability Assessment
    Microsoft SharePoint
    Microsoft PowerApps
    Microsoft Power BI
    Microsoft Power Automate
    Microsoft Endpoint Manager
    Microsoft Intune
    Microsoft Azure Administration
    Information Security
    Security Operation Center
    Cybersecurity Management
    Cybersecurity Monitoring
  • $30 hourly
    I’m a highly skilled and results-driven Cybersecurity and Network Engineering expert with over 4 years of progressive experience in information security, including over 2 years working as a SOC Analyst and Vulnerability Assessor. I bring a comprehensive command of globally recognized cybersecurity frameworks, technical tools, and strategic methodologies empowering businesses to operate securely in today’s evolving threat landscape. My expertise spans across: 1. Cybersecurity Governance & Risk Management: I possess deep working knowledge of industry-leading frameworks such as NIST Cybersecurity Framework (CSF), ISO/IEC 27001, CIS Controls, MITRE ATT&CK, and COBIT, which I have practically applied in building secure environments, guiding risk-based decision-making, and aligning security controls with business objectives. 2. Threat Detection & Incident Response: Skilled in leveraging SIEM platforms like IBM QRadar, I specialize in real-time threat monitoring, analysis, and incident response using structured frameworks such as NIST SP 800-61 and the Cyber Kill Chain. My toolset includes Nessus for vulnerability scanning, and I hold certifications in CEH and Cisco CyberOps Associate, underscoring my capabilities in ethical hacking, network defense, and secure system architecture. 3. Network Engineering Excellence: I have a proven record in designing and managing robust network infrastructures, encompassing data center migrations, wired/wireless deployments, network performance tuning, and virtualization with VMware vSphere. My hands-on experience with Cisco, Aruba, and Meraki hardware, paired with diagnostics tools like Wireshark and SolarWinds NPM, ensures seamless connectivity and operational efficiency. 4. Data Center Operations & Scalability: I played a pivotal role in executing a complex data center migration at the Kenya Revenue Authority, ensuring zero data loss, enhanced scalability, and improved system resilience all under high-security standards and continuity protocols. With a Bachelor’s degree in Computer Science and a Master’s in Information Security, I combine theoretical depth with real-world execution. Whether it’s implementing a risk management framework, securing enterprise networks, or translating technical security policies into actionable SOPs, I’m passionate about helping organizations fortify their cyber defenses and drive secure digital transformation. Let's connect to discuss how I can contribute to your success by providing top-tier cybersecurity and network engineering solutions.
    Featured Skill Vulnerability Assessment
    Content Writing
    Digital Advertising
    Virtual Assistance
    Information Security Audit
    Data Protection
    Microsoft Active Directory
    Risk Assessment
    Incident Response Plan
    Network Monitoring
    Cybersecurity Monitoring
    Penetration Testing
    Online Research
    Technical Support
    Web Development
  • $32 hourly
    Experienced professional in ethical hacking, offering. Brilliant Hackers committed to excellence & Success. Here are a couple of of most generally used hacker for hire services we can provide you within 24 hours. Hire A Hacker For Lost E-Mail Password Retrieval Hire A Hacker For Monitoring Services for Smartphones (iPhone and Android) Hire A Hacker For Cryptocurrency Fraud Investigation & Retrieval Hire Hacker For Unethical Cheating Partner / Cheating Spouse Monitoring Hire A Hackers For Social Messaging apps WhatsApp, iMessages, SMS, iCloud Hire A Hacker Lost Social Media Password Retrieval Hire A Hacker Facebook, Instagram & Snapchat Related Services Hire A Hacker For Live Location Tracking
    Featured Skill Vulnerability Assessment
    Instagram
    Software Testing
    Computer Science
    Ubuntu
    Linux
    Growth Hacking
    Penetration Testing
    Ethical Hacking
  • $5 hourly
    I'm a full-stack web app developer with real-world product experience and a background in security. I build a variety of apps (like social platforms, dating apps) with scalable architecture and fortified protection against common vulnerabilities. I have six years experience in the industry in total as an intern and as a software developer at my previous company. My last project, SatoLove, gained 4,987+ users within two weeks—built entirely by me, from backend to frontend. I specialize in Node.js, Express, MongoDB, Tailwind CSS, and secure REST APIs. As a bug bounty hunter, I approach web dev with a security-first mindset—meaning no weak endpoints, no insecure auth, no lazy code. I make sure your app doesn’t just work—it survives the real world. - Authentication Systems - Social Platforms & Messaging - Pen-tested Web Backends (XSS, SQLi, IDOR, etc.) - Fast Delivery + Clear Communication Yes, I may be new to the application, Upwork, but one thing I can promise is I won't deliver what you'll expect, I'll deliver better! Give me a shot, and I'm sure I won't miss.
    Featured Skill Vulnerability Assessment
    Writing
    Content Writing
    Database Server
    DevOps
    AI Model Training
    Machine Learning
    Web Development
    Bug Bounty
    Information Security
  • $30 hourly
    I’m an IT Support Specialist and Cybersecurity Professional with over 5 years of experience helping businesses stay secure, connected, and productive. Whether you need help setting up systems, solving tech issues, or improving your network security, I’m here to assist. I’ve worked across various industries including consulting, education, and real estate, and I’m skilled in troubleshooting, system administration, user support, and network configuration. I offer end-to-end support from initial setup to ongoing maintenance and I take pride in clear, consistent communication throughout every project. Let’s work together to make your tech work smarter.
    Featured Skill Vulnerability Assessment
    Information Security
    Figma to Webflow Plugin
    Documentation
    Cybersecurity Monitoring
  • $20 hourly
    I am a dedicated and hardworking cyber security expert with vast experience in Web application pentesting,android apps and mobile security,binary and malware reverse engineering. I believe in communication as the greatest skill in dealing with clients.I am looking forward to working with you great clients
    Featured Skill Vulnerability Assessment
    Data Entry
    Web Application Security
    Network Analysis
    Ethical Hacking
    Technical Writing
    Web Testing
    Digital Forensics
    Network Penetration Testing
    Information Security
    Internet Security
    Security Engineering
    Information Security Audit
    Intrusion Detection System
    Web Design
  • $40 hourly
    A certified Cybersecurity Specialist with over 6 years of experience securing infrastructure, conducting risk assessments, and leading cybersecurity initiatives across law firms, fintech platforms, and enterprise environments. I specialize in helping businesses: Detect and respond to threats Harden systems (Linux/Windows/Cloud) Conduct vulnerability scans & audits Align with ISO 27001, GDPR, and Kenya's Data Protection Act Deliver cybersecurity training to staff and teams ✅ What I bring to your team: Penetration testing & vulnerability scanning (OWASP, ZAP, Nessus) Secure system configuration for web servers, databases, and APIs Incident response and root cause analysis Security policy creation (BYOD, password, remote access) Data protection compliance for regulated industries Awareness training
    Featured Skill Vulnerability Assessment
    Linux System Administration
    Data Protection
    System Hardening
    Information Security
    OWASP
    Incident Response Plan
    Information Security Awareness
    Risk Management
    Cybersecurity Management
  • $23 hourly
    Cybersecurity Specialist | Digital Forensics | Ethical Hacking | SIEM & Threat Intelligence Are you looking for a cybersecurity professional who can safeguard your digital assets, identify vulnerabilities, hunt threats, recover digital assets or enhance your security posture? Whether you’re an individual or an SME, I help secure systems, investigate threats, and improve overall security defenses. 💡 What I Offer: ✔️ Website & Network Security Audits – Identify vulnerabilities & recommend fixes ✔️ Basic Ethical Hacking & Penetration Testing – Simulate attacks & improve defenses ✔️ Digital Forensics & Incident Response – Investigate security incidents & breaches ✔️ SIEM & Log Analysis (Graylog, Splunk, ELK) – Detect threats & analyze logs ✔️ Security Consultation – Guide businesses & individuals on cybersecurity best practices 🔧 Tools & Technologies: 🛡️ SIEM: Splunk, Graylog, ELK Stack 🔎 Ethical Hacking: Burp Suite, Nmap, Metasploit 💻 Forensics: Autopsy, Wireshark, OSINT techniques 🔐 Network Security: IDS/IPS, Endpoint Protection, Firewalls 🎯 Why Work with Me? ✅ Hands-on experience in SOC environments & real-world security operations ✅ Deep knowledge of threat intelligence & incident response ✅ Strong background in network security & system hardening ✅ Passion for cybersecurity education & spreading awareness 📌 Notable Projects: 🔹 Assisted a client in identifying a malware infection and securing their systems 🔹 Conducted a penetration test for a small business, uncovering multiple vulnerabilities 🔹 Set up SIEM logging & monitoring for a growing e-commerce company Let's secure your systems, investigate threats, and build a safer digital environment for your digital assets! Contact me, and let’s discuss how I can assist you. 🚀
    Featured Skill Vulnerability Assessment
    Information Security Awareness
    Troubleshooting
    Technical Support
    Python Script
    Cybersecurity Monitoring
    Ethical Hacking
    Digital Forensics
    Cyber Threat Intelligence
    Incident Management
    Security Operation Center
  • $10 hourly
    Hi! My name is Mary and I am a professional Cybersecurity engineer. I have worked in the roles of a Cyber Security Analyst, SOC Analyst, Data Compliance, Pre-sales engineer and Application security analyst. I am also a Cyber Security trainer. My skills range from Vulnerability Assessment and Penetration testing, OSINT, Compliance, Risk and Governance, Digital Forensics and Network Security. I identify as a #Purple TEAMER. Further, I have experience as a technical writer for now 10 years. Kindly reach out and lets get started on projects related. My certifications include: CompTIA Network+, Certified Expert Symantec Endpoint Sales, Certified Expert Symantec Endpoint Pre-Sales, Symantec Information Security, Kenyan NC4 Cyber Security. Regards, May!
    Featured Skill Vulnerability Assessment
    Network Administration
    Cisco Router
    COBIT
    Network Security
    Digital Forensics
    Computing & Networking
    Linux
    Computer Science
    Security Operation Center
    User Identity Management
    Web Application Security
    Linux System Administration
    Penetration Testing
    Firewall
    System Security
  • $9 hourly
    A competent Information Technology systems security professional with expertise in Penetration Testing, Security Administration, and Quality Assurance. I have over 7 years of experience in Systems Security and Administration, Logging and Alerting, Security Design, Secure Coding, and Vulnerability Assessment. I am skilled in conducting IT Security Risk Assessments in accordance with NIST and FFIEC frameworks, and I have experience in penetration testing using various tools like Burp Suite, Dir-Buster, Metasploit, OWASP ZAP proxy, Accunetix, NMAP, Nessus, Nikto, web scanner, w3af, HP Fortify, IBM App Scan enterprise, and Kali Linux among others. I have excellent communication skills with proven abilities in resolving complex networking, hardware & software related issues, and I am proficient in Linux operating system configuration, utilities, and programming to provide a powerful combination of analysis, implementation, and support. I have managed the cycle of projects continuity, reviewed teams technical work , and ensured the quality of service deliverables. I am skilled in Customer relation, business requirement gathering, and Threat modeling.
    Featured Skill Vulnerability Assessment
    User Acceptance Testing
    Usability Testing
    Performance Testing
    Functional Testing
    Security Testing
    Threat Detection
    Test Automation
    Quality Control
    Quality Assurance
    Manual Testing
    Penetration Testing
    Test Case Design
  • $20 hourly
    " I'm a penetration tester with almost two years experience in testing Networks, Computer Systems, Web Applications in identifying vulnerabilities, threats and flaws within the network, performing physical security assessments of systems, servers and network devices and come up with a solution that will minimize risks in the near future".
    Featured Skill Vulnerability Assessment
    Information Analysis
    Information Security
    Penetration Testing
  • $20 hourly
    An IT expert with experience in Ethical Hacking, Penetration Testing and Cybersecurity. I have a track record in social media account recovery, and device security. I will fully project manage your brief from start to finish. Regular communication is important, so lets keep in touch.
    Featured Skill Vulnerability Assessment
    SQL
    Microsoft Excel
    Software
    Penetration Testing
    Cybersecurity Management
    Kali Linux
    Ethical Hacking
    IBM SPSS
    Microsoft Virtual Server
    Python
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.