Hire the best Vulnerability Assessment Specialists in Kenya
Check out Vulnerability Assessment Specialists in Kenya with the skills you need for your next job.
- $60 hourly
- 5.0/5
- (76 jobs)
I am a DevSecOps Practitioner, Application Security Analyst, and Cybersecurity Specialist. I have significant and well-diversified experience in multiple Cybersecurity domains, including: 1. Cloud Infrastructure: I help secure Cloud Infrastructure such as GCP AWS and Azure. 2.Penetration Testing and Vulnerability Assessment: I specialize in finding vulnerabilities in Web Applications, Mobile Applications, Networks, and Smart Contracts. 3. Bug Bounty Hunting: I find bugs for various companies on HackerOne - @l3s7r0z. I am constantly improving myself and getting better each day in the Cyber Security field. Lester Obbayi - @l3s7r0zVulnerability Assessment
DocumentationMobile App TestingWeb Application FirewallTechnical DocumentationBlack Box TestingInternet SecuritySoftware TestingWeb App Penetration TestingReport WritingEthical HackingArticle WritingNetwork SecurityPenetration TestingInformation Security - $20 hourly
- 5.0/5
- (2 jobs)
Cyber Defense Solutions: Vulnerability Analysis and Penetration Testing to identify and address security gaps. Threat Modeling to anticipate and prevent cyber threats. Incident Response Planning to minimize the impact of security breaches. Firewall Configuration and Rule Creation for secure network management. Security Policy & Compliance: Development of Security Policies tailored to business needs. Compliance reviews for Data Protection (GDPR, HIPAA, etc.). Code Review for Secure Development Practices. Cybersecurity Training & Awareness: Cybersecurity training sessions for board members, experts, and employees. Custom training content development focused on security best practices. Ongoing support for security awareness programs. Information System & Data Protection Audits: Comprehensive audits to identify and mitigate security risks. Data protection assessments to ensure compliance with privacy standards.Vulnerability Assessment
ComplianceGovernment Reporting ComplianceInformation Security AwarenessSecurity Assessment & TestingIntrusion Detection SystemNetwork Access ControlFortiGate FirewallIncident Response PlanSecurity Policies & Procedures DocumentationCyber Threat IntelligencePenetration TestingData ProtectionTraining & DevelopmentInformation Security - $11 hourly
- 4.9/5
- (8 jobs)
About Hassan is a cybersecurity expert with over seven years of specialised consultancy on Information Security Audits, Penetration Testing &Vulnerability Assessment, Information Security Policy Development and Implementation, malware analysis, cryptanalysis, exploit development and IT Due Diligence. He has worked with various technologies in complex business environments. He has a Master's in Information Management, BSc Computer Science Degree (2008), a Certified Ethical Hacker and Offensive Security Certified Professional (OSCP), SANS Application Security Testing, Microsoft certified security operations Analyst and Certified ITIL Practioner. Competency Areas a) Penetration Testing and Vulnerability Assessments b) Malware Analysis c) Web Applications Security Audits d) Security Reviews e) Risk-Based Information Systems Audits f) Information Security Awareness Training g) Applications Interfaces and Control Reviews h) IT Risk Assessment i) Social Engineering Methodologies a) OWASP (Open Web Application Security Project) Top 10 b) OSSTMM (Open Source Security Testing methodology Manual) c) SANS Top 20 critical security controls d) SAMM (Software Assurance Maturity Model) Tools a) Kali Linux b) BurpSuite c) Metasploit d) BeEF e) Acunetix f) Nessus g) Wapiti etcVulnerability Assessment
Cyber Threat IntelligenceCybersecurity MonitoringSecurity InfrastructureOffice 365Microsoft AzureOpenOfficeMicrosoft WordMicrosoft Certified ProfessionalSecurity ManagementMicrosoft Active DirectorySecurity AnalysisCisco MerakiPenetration Testing - $35 hourly
- 4.9/5
- (18 jobs)
Experienced Information Security Engineer with a proven track record of enhancing cyber-security resilience for organizations across diverse industries. Expertise in incident response, digital forensics, and network and application security, supported by a robust academic foundation. Adept at integrating technical proficiency with strategic vision to fortify security postures, streamline operations, and foster a culture of security awareness.Vulnerability Assessment
Cybersecurity ManagementPenetration TestingSecurity AnalysisInformation Security AuditISO 27001Kali LinuxNIST SP 800-53Research PapersSplunkInformation SecurityNetwork SecurityPython - $5 hourly
- 5.0/5
- (3 jobs)
I am a creative, and ambitious software developer always seeking new experiences and learning opportunities. My commitment to delivering high-quality work ensures timely delivery and complete customer satisfaction. With extensive exposure to a wide range of technologies and skills, I am well-equipped to handle diverse and complex projects. I also have significant experience in mobile and ARM-based device security. My expertise includes vulnerability discovery, code review, exploit development, and security research. I am adept at delivering technical training and creating advanced security course content. My contributions to the field of cybersecurity have been recognized through multiple awards and top placements in national and international CTF competitions. Skills and Technologies Programming Languages & Frameworks: Java: Extensive experience with Java, Maven, Gradle, and Android development. Java-Spark Framework and SpringBoot: Proficient in building robust back-end services. Kotlin: Skilled in developing Android applications. JavaScript & TypeScript: Expertise in front-end and back-end development. Ruby: Experienced in Ruby on Rails for web development. Angular Framework: Proficient in building dynamic single-page applications. React & React Native: Skilled in developing responsive web and mobile applications. Scripting Languages: Proficient in PHP, Bash, and Python. Development Tools & Platforms: Heroku, Railway, Git, GitHub, GitHub Actions, and Jenkins: Experienced in continuous integration, deployment, and version control. Databases: Proficient in SQLite, MySQL, and PostgreSQL. API Development: Skilled in API development, documentation, and consumption. Other Experiences: Telegram Bots and WhatsApp Bots: Developed automated messaging solutions. Android Applications: Extensive experience in mobile app development. Algorithms and Data Structures: Strong foundation in computer science principles. Ruby On Rails: Developed Ruby-based full-stack web applications. Django: Developed full-stack Python-based web applications. Daraja API Integration: Integrated mobile money APIs for seamless transactions. Payment Gateways and Aggregators: Developed and consumed payment solutions. Web Scraping: Expertise in extracting data from websites. WordPress: Experience in website development and customization. Cybersecurity Expertise Zero-Day Vulnerability Researcher: Extensive experience in mobile and ARM-based device security. Proven track record in vulnerability discovery, exploit development, and security research. Adept at delivering technical training and creating advanced security course content. Recognized for excellence in cybersecurity through multiple awards and honors, including top placements in national and international CTF competitions. Awards & Honors Finalist, Defcon Red Team CTF 2nd Runners-up, Kenya National CyberSecurity CTF 2020 Winner in Mobile Security, Aspire CTF 2021 Finalist, Defcon 29 Red Team Village CTF HackerOne Ambassador, Nairobi Club Member 1st Place, USIU CTF Hackathon 2022Vulnerability Assessment
Mobile App TestingResearch & DevelopmentRubyReverse EngineeringJavaScriptJavaPythonAndroidFlaskRuby on RailsAndroid App DevelopmentReactDjangoPenetration Testing - $25 hourly
- 4.7/5
- (15 jobs)
For anything related to Software and Security, you can count on me through Upwork. Check out my bio and see what my past happy clients have to say! Looking forward to potentially working together!Vulnerability Assessment
Security AnalysisNetwork Penetration TestingCloud Security FrameworkEthereumBlockchain SecurityDevOpsSmart ContractWebsite SecuritySecurity Assessment & TestingMetasploitNetwork SecurityApplication SecurityPenetration Testing - $40 hourly
- 0.0/5
- (0 jobs)
I am a results-driven Cybersecurity Expert with a degree in Computer Science from Kabarak University and over 3 years of hands-on experience in protecting digital assets, identifying vulnerabilities, and strengthening IT infrastructures. Whether you're a startup looking to secure your first deployment, a company preparing for a compliance audit, or a business in need of round-the-clock threat monitoring I bring strategic thinking, technical precision, and clear communication to ensure your systems remain safe and resilient. Clients hire me not just for tools, but for peace of mind. I don't just run scans I deliver real protection and long-term cybersecurity solutions.Vulnerability Assessment
Data EntryAWS DevelopmentPythonDevOpsProblem SolvingWiresharkDatabase AdministrationNetwork AnalysisNetwork Access ControlPenetration Testing - $20 hourly
- 0.0/5
- (0 jobs)
An adaptable Information and Cyber Security professional with sufficient experience, properly versed in Vulnerability Assessment, Penetration Testing, DevSecOps, Network Threat Monitoring, Bug Hunting, Secure Code Review and Threat Intelligence Gathering. Am also proficient in reverse engineering of software applications. I have also discovered vulnerabilities in some small open-source projects, which I have responsibly disclosed on Exploit Database and Packet Storm Security. I have also been selected by EC-Council, one of the Cyber Security exam bodies as a Cyber Security Career Mentor. I have also recently achieved OSCP Certification from Offensive Security. I also currently possess Certified Ethical Hacker certification.Vulnerability Assessment
Computer SkillsCode ReviewApplication AuditReport WritingBug BountySecure SDLCSource Code ScanningPenetration Testing - $20 hourly
- 5.0/5
- (1 job)
As a seasoned expert in design, training, documentation, implementation, upgrade, audit, and certification, I specialize in guiding organizations through the intricate journey of ISO implementation across multiple standards, including: ISO 9001 - Quality Management System ISO 27001 - Information Security Management System ISO 14001 - Environment Management System ISO 45001 - Occupational Health and Safety Management System ISO 14298 - Security Printing Management System GSMA SAS - GSMA Security Accreditation Scheme PCI-CP - Payment Card Industry - Logical & Physical Security Requirements for Card Production I carry out the following implementation steps seamlessly for the above management systems for your organization: Gap Assessment Awareness Training SOP & Flowcharts documentation and guidance on implementation Objective Setting Risks and Opportunities Training and Assessment Training of Internal Auditors Internal Audits Management Review Coordination with Certification Bodies Other services that I offer which might benefit you include: Vulnerability Assessments and Penetration Testing (VAPT) Firewall Rules Review Development of Security Manuals, etc. By partnering with me, you're choosing a consultant dedicated to upholding the highest standards of integrity and excellence, driving your organization towards a secure, compliant future. I am also a Certification Auditor for IRCLASS India, and Intellcert Gmbh Germany for the above ISO Standards. Looking forward to serving you.Vulnerability Assessment
Process DocumentationProcess Flow DiagramISO 14001PCIGSMISO 9001ISO 27001Compliance ConsultationInternal AuditingHuman Resources ConsultingInformation Security AuditFirewall - $7 hourly
- 0.0/5
- (1 job)
With a strong cybersecurity and digital forensics background, I specialize in incident response, threat analysis, and forensic investigations to help businesses and individuals safeguard their digital environments. My expertise spans Windows, macOS, and mobile (Android & iOS) forensics, as well as cloud security, malware analysis, and network defense, enabling me to detect, investigate, and mitigate cyber threats effectively. I take a proactive approach to cybersecurity and incident response, ensuring threats are identified and neutralized before they can cause damage. Whether it's analyzing malware, investigating unauthorized access, securing cloud environments, or responding to security breaches, I utilize advanced forensic tools and methodologies to provide tailored, data-driven security solutions. As cyber threats evolve, I continuously refine my skills to stay ahead of emerging risks, ensuring my clients receive the most up-to-date and effective security strategies. If you need a cybersecurity professional who can investigate threats, respond to incidents, and fortify your digital infrastructure, I’m here to help. Let’s work together to secure your systems, protect your data, and build long-term resilience against cyber threats.Vulnerability Assessment
Malware RemovalBug BountySOC 1Malware DetectionDigital ForensicsPenetration TestingEthical HackingSecurity Analysis - $20 hourly
- 4.7/5
- (4 jobs)
Founder of LEVILYN, a cybersecurity and digital forensics company with over 12 years of practical and field experience. My areas of specialization are: [cybersecurity and compliance services] Penetration Testing and Vulnerability Assessments [VAPT]: web application and mobile applications Cloud computing Network security: Firewalls, IDS/IPS, OpenVPN Research work on cybersecurity, Articles, Blogs, ebooks. Compliance policies [ PCC DSS, HIPAA, COBIT, NIST, ISO 27001,GDPR] Risk assessment Business Continuity and Disaster Recovery Plan [BCDR] Controls (NIST, ISO/IEC 27000, ISO27701 series) Document the best IT audit standards and policies [Digital Forensic Services] Mobile Forensics Computer Forensic Network Forensics Cloud Forensics Cyber Security Compliances Policies and Risk Assessment, Cybercrime Investigations Research Work Digital Forensic Report Writing [Forensics Tools competency] ▪ Autopsy ▪ Belkasoft ▪ Cellebrite UFED ▪ FTK Imager ▪ Magnet Axiom ▪ OS Forensic ▪ OSINT ▪ Wireshark ▪ Nmap ▪ Netcat ▪ Network Minor ▪ Volatility ▪ SplankVulnerability Assessment
Artificial IntelligenceResearch PapersSystem SecurityMalware RemovalCloud SecurityCloud Security FrameworkCybersecurity ManagementApplication SecurityNIST Cybersecurity FrameworkDigital ForensicsPenetration TestingNetwork Security - $8 hourly
- 0.0/5
- (1 job)
Hello, my name is Emmanuel Mwara. A Professional Penetration Tester & Bug Bounty Hunter. Bug hunting is my passion and Penetration Testing is my profession. As a bug hunter I am able to find vulnerability in deep and as penetration tester I am able to create a good & clear penetration testing report. In a world where cyber threats are constantly evolving and becoming more sophisticated, it's imperative that you work with a trusted pentester who understands the latest techniques and trends. With years of proven experience as a pentester, I have honed my skills and expertise to deliver results that exceed expectations. My passion for helping businesses stay secure is second to none, and I always look forward to establishing new long-term relationships with clients to ensure that their security remains strong and resilient. My expertise in penetration testing:- ✅Web-Application Penetration Testing based on OWASP TOP 10 ✅Vulnerability Assessment-website & web application ✅SQL Injection ✅XSS-Cross Site Scripting ✅CSRF-Cross Site Request Forgery ✅SSRF-Server Site Request Forgery ✅Business Logic Flaw ✅IDOR-Insecure Direct Object ✅RCE-Remote Code Execution ✅RFI-Remote File Inclusion ✅LFI-Local File Inclusion ✅Path Traversal ✅Authentication Bypass ✅File upload ✅Host Header Injection ✅Open Redirect ✅HTML Injection ✅CORS-Cross Origin Resource Sharing ✅Clickjacking ✅E-mail Spoofing Pentesting tools: BurpSuite Professional, sqlmap, nmap, wireshark, Metasploit, Nessus, XSSStrike etc Thank you so much for taking the time to visit my profile, and feel free to reach out at any time if you have any questions! Keep your business safe & secure!!Vulnerability Assessment
Microsoft Active DirectoryWeb ScrapingScriptingPythonInformation SecurityWeb Application SecurityApplication SecuritySecurity Assessment & TestingPenetration TestingKali LinuxNetwork Penetration TestingWeb App Penetration TestingNetwork Security - $50 hourly
- 0.0/5
- (0 jobs)
Web & API Security Expert | Bug Bounty Hunter | Cybersecurity Consultant. Malware Removal | Website Security Audits | Ethical HackingVulnerability Assessment
Security TestingDomain TestingWeb ServerWebsite SecurityPenetration TestingWeb DevelopmentCybersecurity ToolVirtual Assistance - $14 hourly
- 0.0/5
- (2 jobs)
Career objectives * To contribute efficiently to any organization through application of my skills and capabilities. * To obtain top quality result of any organization standards, through excellence, in the growth and development of the organization alongside my personal growth and development.Vulnerability Assessment
Cybersecurity ToolDocument TranslationMicrosoft Virtual ServerSoftwareSoftware Development - $7 hourly
- 0.0/5
- (0 jobs)
Information Security Specialist | Cloud & Cybersecurity | Secure Software & Web Developer helping businesses protect digital assets, build secure infrastructures, and stay compliant with ISO 27001, NIST, and GDPR standards. Are you looking for a cybersecurity specialist who can not only protect your digital assets but also build secure, scalable, and high-performing solutions? You’ve found the right partner. I am a highly skilled Information Security Specialist with proven expertise in: Cybersecurity & Threat Management: • Real-time threat detection & incident response (Splunk SIEM, Microsoft Sentinel) • Vulnerability assessments, penetration testing (Nessus, Burp Suite, Nmap) • Red teaming, phishing simulations, endpoint and network security • ISO 27001, NIST, and GDPR compliance consulting Cloud Security Architecture: • AWS & Azure security design (IAM, NSG/ASG, Firewall, Key Vaults, Serverless Security) • Privilege escalation testing and hardening cloud environments • Cloud governance frameworks and cloud security audits Secure Software and Web Development: • Building secure web apps (HTML, CSS, JavaScript, Python, REST APIs) • Backend database hardening (PostgreSQL, MySQL) • Automating security workflows with Python, Bash, PowerShell • CI/CD pipeline integration with DevSecOps principles (Docker, Jenkins) UI/UX Design & Security: • Designing responsive, accessible, and secure user interfaces • Balancing security with user experience for optimal engagement Why Clients Trust Me: • Strong problem-solving mindset with attention to detail • Clear and timely communication with all stakeholders • Focused on business outcomes, not just technical checklists • Proactive in anticipating risks and providing long-term security solutions When you work with me, you get more than just technical skills, you get a strategic partner committed to protecting and elevating your digital environment. Ready to make your systems stronger, smarter, and safer? Let’s build something powerful together!Vulnerability Assessment
System AdministrationIT SupportComputer ScienceNIST Cybersecurity FrameworkISO 27001CompliancePenetration TestingUser Identity ManagementCloud SecurityNetwork SecurityWeb DevelopmentSoftwareDatabaseSoftware Development - $35 hourly
- 0.0/5
- (0 jobs)
I am an experienced and diligent Network and Infrastructure Engineer, Cybersecurity Analyst, Azure Cloud and Microsoft 365 Solution Architect. I have vast expertise in the Microsoft products ecosystem (Windows, Azure, Intune, Microsoft 365, Identity & Security Suite – Defender, Sentinel, Entra ID) among others such as Cisco Meraki and Ubiquiti Unifi. With my wealth of knowledge and experience, I help businesses secure, optimize, and scale their IT environments. Some amazing stuff I can help you do are: ● Automating and streamlining business processes using Power Automate and Power Apps with Power BI reporting. ● Securing your environment by configuring Microsoft Sentinel and using the platform for log ingestion, monitoring, detection and remediation of security alerts and incidents. ● Managing devices using Microsoft Intune including compliance and other policies, apps deployment, endpoint settings, feature management and update settings, with Power BI reporting. ● Building secure and resilient Azure cloud infrastructure in a Zero Trust Architecture. ● Securing infrastructure, identity, apps and assets using Microsoft Defender. ● Setting up a Microsoft and Azure tenants. ● Deploying conditional access based multi factor authentication and other conditional access policies to protect your identities. ● Administering Microsoft Exchange Online. ● Managing, configuring and securing identities On Entra ID. ● Configuring Single Sign-On to ease administration and secure your identities Skills & Expertise ✅ Microsoft 365 & Azure Administration ✅ Network Security & Infrastructure ✅ Microsoft Defender & Sentinel Security Solutions ✅ Intune Endpoint Management ✅ Entra ID & Identity Security ✅ Threat Intelligence & Incident Response ✅ Microsoft Power Platform (Power BI, Power Automate, PowerApps) Why Work with Me? - Proven Experience Securing & Optimizing IT Environments - Deep Knowledge of Microsoft Security & Cloud Solutions - Strong Troubleshooting & Problem-Solving Skills - Dedicated to Performance, Security, and Compliance Let’s work together to improve efficiency and efficacy in your business processes, strengthen your IT infrastructure and security posture!Vulnerability Assessment
Microsoft SharePointMicrosoft PowerAppsMicrosoft Power BIMicrosoft Power AutomateMicrosoft Endpoint ManagerMicrosoft IntuneMicrosoft Azure AdministrationInformation SecuritySecurity Operation CenterCybersecurity ManagementCybersecurity Monitoring - $30 hourly
- 0.0/5
- (1 job)
I’m a highly skilled and results-driven Cybersecurity and Network Engineering expert with over 4 years of progressive experience in information security, including over 2 years working as a SOC Analyst and Vulnerability Assessor. I bring a comprehensive command of globally recognized cybersecurity frameworks, technical tools, and strategic methodologies empowering businesses to operate securely in today’s evolving threat landscape. My expertise spans across: 1. Cybersecurity Governance & Risk Management: I possess deep working knowledge of industry-leading frameworks such as NIST Cybersecurity Framework (CSF), ISO/IEC 27001, CIS Controls, MITRE ATT&CK, and COBIT, which I have practically applied in building secure environments, guiding risk-based decision-making, and aligning security controls with business objectives. 2. Threat Detection & Incident Response: Skilled in leveraging SIEM platforms like IBM QRadar, I specialize in real-time threat monitoring, analysis, and incident response using structured frameworks such as NIST SP 800-61 and the Cyber Kill Chain. My toolset includes Nessus for vulnerability scanning, and I hold certifications in CEH and Cisco CyberOps Associate, underscoring my capabilities in ethical hacking, network defense, and secure system architecture. 3. Network Engineering Excellence: I have a proven record in designing and managing robust network infrastructures, encompassing data center migrations, wired/wireless deployments, network performance tuning, and virtualization with VMware vSphere. My hands-on experience with Cisco, Aruba, and Meraki hardware, paired with diagnostics tools like Wireshark and SolarWinds NPM, ensures seamless connectivity and operational efficiency. 4. Data Center Operations & Scalability: I played a pivotal role in executing a complex data center migration at the Kenya Revenue Authority, ensuring zero data loss, enhanced scalability, and improved system resilience all under high-security standards and continuity protocols. With a Bachelor’s degree in Computer Science and a Master’s in Information Security, I combine theoretical depth with real-world execution. Whether it’s implementing a risk management framework, securing enterprise networks, or translating technical security policies into actionable SOPs, I’m passionate about helping organizations fortify their cyber defenses and drive secure digital transformation. Let's connect to discuss how I can contribute to your success by providing top-tier cybersecurity and network engineering solutions.Vulnerability Assessment
Content WritingDigital AdvertisingVirtual AssistanceInformation Security AuditData ProtectionMicrosoft Active DirectoryRisk AssessmentIncident Response PlanNetwork MonitoringCybersecurity MonitoringPenetration TestingOnline ResearchTechnical SupportWeb Development - $32 hourly
- 0.0/5
- (0 jobs)
Experienced professional in ethical hacking, offering. Brilliant Hackers committed to excellence & Success. Here are a couple of of most generally used hacker for hire services we can provide you within 24 hours. Hire A Hacker For Lost E-Mail Password Retrieval Hire A Hacker For Monitoring Services for Smartphones (iPhone and Android) Hire A Hacker For Cryptocurrency Fraud Investigation & Retrieval Hire Hacker For Unethical Cheating Partner / Cheating Spouse Monitoring Hire A Hackers For Social Messaging apps WhatsApp, iMessages, SMS, iCloud Hire A Hacker Lost Social Media Password Retrieval Hire A Hacker Facebook, Instagram & Snapchat Related Services Hire A Hacker For Live Location TrackingVulnerability Assessment
InstagramSoftware TestingComputer ScienceUbuntuLinuxGrowth HackingPenetration TestingEthical Hacking - $5 hourly
- 0.0/5
- (0 jobs)
I'm a full-stack web app developer with real-world product experience and a background in security. I build a variety of apps (like social platforms, dating apps) with scalable architecture and fortified protection against common vulnerabilities. I have six years experience in the industry in total as an intern and as a software developer at my previous company. My last project, SatoLove, gained 4,987+ users within two weeks—built entirely by me, from backend to frontend. I specialize in Node.js, Express, MongoDB, Tailwind CSS, and secure REST APIs. As a bug bounty hunter, I approach web dev with a security-first mindset—meaning no weak endpoints, no insecure auth, no lazy code. I make sure your app doesn’t just work—it survives the real world. - Authentication Systems - Social Platforms & Messaging - Pen-tested Web Backends (XSS, SQLi, IDOR, etc.) - Fast Delivery + Clear Communication Yes, I may be new to the application, Upwork, but one thing I can promise is I won't deliver what you'll expect, I'll deliver better! Give me a shot, and I'm sure I won't miss.Vulnerability Assessment
WritingContent WritingDatabase ServerDevOpsAI Model TrainingMachine LearningWeb DevelopmentBug BountyInformation Security - $30 hourly
- 0.0/5
- (0 jobs)
I’m an IT Support Specialist and Cybersecurity Professional with over 5 years of experience helping businesses stay secure, connected, and productive. Whether you need help setting up systems, solving tech issues, or improving your network security, I’m here to assist. I’ve worked across various industries including consulting, education, and real estate, and I’m skilled in troubleshooting, system administration, user support, and network configuration. I offer end-to-end support from initial setup to ongoing maintenance and I take pride in clear, consistent communication throughout every project. Let’s work together to make your tech work smarter.Vulnerability Assessment
Information SecurityFigma to Webflow PluginDocumentationCybersecurity Monitoring - $20 hourly
- 4.6/5
- (75 jobs)
I am a dedicated and hardworking cyber security expert with vast experience in Web application pentesting,android apps and mobile security,binary and malware reverse engineering. I believe in communication as the greatest skill in dealing with clients.I am looking forward to working with you great clientsVulnerability Assessment
Data EntryWeb Application SecurityNetwork AnalysisEthical HackingTechnical WritingWeb TestingDigital ForensicsNetwork Penetration TestingInformation SecurityInternet SecuritySecurity EngineeringInformation Security AuditIntrusion Detection SystemWeb Design - $40 hourly
- 0.0/5
- (0 jobs)
A certified Cybersecurity Specialist with over 6 years of experience securing infrastructure, conducting risk assessments, and leading cybersecurity initiatives across law firms, fintech platforms, and enterprise environments. I specialize in helping businesses: Detect and respond to threats Harden systems (Linux/Windows/Cloud) Conduct vulnerability scans & audits Align with ISO 27001, GDPR, and Kenya's Data Protection Act Deliver cybersecurity training to staff and teams ✅ What I bring to your team: Penetration testing & vulnerability scanning (OWASP, ZAP, Nessus) Secure system configuration for web servers, databases, and APIs Incident response and root cause analysis Security policy creation (BYOD, password, remote access) Data protection compliance for regulated industries Awareness trainingVulnerability Assessment
Linux System AdministrationData ProtectionSystem HardeningInformation SecurityOWASPIncident Response PlanInformation Security AwarenessRisk ManagementCybersecurity Management - $23 hourly
- 0.0/5
- (0 jobs)
Cybersecurity Specialist | Digital Forensics | Ethical Hacking | SIEM & Threat Intelligence Are you looking for a cybersecurity professional who can safeguard your digital assets, identify vulnerabilities, hunt threats, recover digital assets or enhance your security posture? Whether you’re an individual or an SME, I help secure systems, investigate threats, and improve overall security defenses. 💡 What I Offer: ✔️ Website & Network Security Audits – Identify vulnerabilities & recommend fixes ✔️ Basic Ethical Hacking & Penetration Testing – Simulate attacks & improve defenses ✔️ Digital Forensics & Incident Response – Investigate security incidents & breaches ✔️ SIEM & Log Analysis (Graylog, Splunk, ELK) – Detect threats & analyze logs ✔️ Security Consultation – Guide businesses & individuals on cybersecurity best practices 🔧 Tools & Technologies: 🛡️ SIEM: Splunk, Graylog, ELK Stack 🔎 Ethical Hacking: Burp Suite, Nmap, Metasploit 💻 Forensics: Autopsy, Wireshark, OSINT techniques 🔐 Network Security: IDS/IPS, Endpoint Protection, Firewalls 🎯 Why Work with Me? ✅ Hands-on experience in SOC environments & real-world security operations ✅ Deep knowledge of threat intelligence & incident response ✅ Strong background in network security & system hardening ✅ Passion for cybersecurity education & spreading awareness 📌 Notable Projects: 🔹 Assisted a client in identifying a malware infection and securing their systems 🔹 Conducted a penetration test for a small business, uncovering multiple vulnerabilities 🔹 Set up SIEM logging & monitoring for a growing e-commerce company Let's secure your systems, investigate threats, and build a safer digital environment for your digital assets! Contact me, and let’s discuss how I can assist you. 🚀Vulnerability Assessment
Information Security AwarenessTroubleshootingTechnical SupportPython ScriptCybersecurity MonitoringEthical HackingDigital ForensicsCyber Threat IntelligenceIncident ManagementSecurity Operation Center - $10 hourly
- 0.0/5
- (0 jobs)
Hi! My name is Mary and I am a professional Cybersecurity engineer. I have worked in the roles of a Cyber Security Analyst, SOC Analyst, Data Compliance, Pre-sales engineer and Application security analyst. I am also a Cyber Security trainer. My skills range from Vulnerability Assessment and Penetration testing, OSINT, Compliance, Risk and Governance, Digital Forensics and Network Security. I identify as a #Purple TEAMER. Further, I have experience as a technical writer for now 10 years. Kindly reach out and lets get started on projects related. My certifications include: CompTIA Network+, Certified Expert Symantec Endpoint Sales, Certified Expert Symantec Endpoint Pre-Sales, Symantec Information Security, Kenyan NC4 Cyber Security. Regards, May!Vulnerability Assessment
Network AdministrationCisco RouterCOBITNetwork SecurityDigital ForensicsComputing & NetworkingLinuxComputer ScienceSecurity Operation CenterUser Identity ManagementWeb Application SecurityLinux System AdministrationPenetration TestingFirewallSystem Security - $9 hourly
- 0.0/5
- (0 jobs)
A competent Information Technology systems security professional with expertise in Penetration Testing, Security Administration, and Quality Assurance. I have over 7 years of experience in Systems Security and Administration, Logging and Alerting, Security Design, Secure Coding, and Vulnerability Assessment. I am skilled in conducting IT Security Risk Assessments in accordance with NIST and FFIEC frameworks, and I have experience in penetration testing using various tools like Burp Suite, Dir-Buster, Metasploit, OWASP ZAP proxy, Accunetix, NMAP, Nessus, Nikto, web scanner, w3af, HP Fortify, IBM App Scan enterprise, and Kali Linux among others. I have excellent communication skills with proven abilities in resolving complex networking, hardware & software related issues, and I am proficient in Linux operating system configuration, utilities, and programming to provide a powerful combination of analysis, implementation, and support. I have managed the cycle of projects continuity, reviewed teams technical work , and ensured the quality of service deliverables. I am skilled in Customer relation, business requirement gathering, and Threat modeling.Vulnerability Assessment
User Acceptance TestingUsability TestingPerformance TestingFunctional TestingSecurity TestingThreat DetectionTest AutomationQuality ControlQuality AssuranceManual TestingPenetration TestingTest Case Design - $20 hourly
- 0.0/5
- (0 jobs)
" I'm a penetration tester with almost two years experience in testing Networks, Computer Systems, Web Applications in identifying vulnerabilities, threats and flaws within the network, performing physical security assessments of systems, servers and network devices and come up with a solution that will minimize risks in the near future".Vulnerability Assessment
Information AnalysisInformation SecurityPenetration Testing - $20 hourly
- 0.0/5
- (0 jobs)
An IT expert with experience in Ethical Hacking, Penetration Testing and Cybersecurity. I have a track record in social media account recovery, and device security. I will fully project manage your brief from start to finish. Regular communication is important, so lets keep in touch.Vulnerability Assessment
SQLMicrosoft ExcelSoftwarePenetration TestingCybersecurity ManagementKali LinuxEthical HackingIBM SPSSMicrosoft Virtual ServerPython Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
Top cities for Vulnerability Assessment Specialists in Kenya
Vulnerability Assessment Specialists near Nairobi
Penetration Testers near Nairobi
Network Pentesters near Nairobi
Reverse Engineers near Nairobi
Cisco Certified Internetwork Expert (CCIE) near Nairobi
Embedded Linux Specialists near Nairobi
Django Developers near Nakuru
Python Consultants near Thika
Assessment Activities Freelancers near Nairobi
Academic Writing Specialists near Ongata Rongai
Writers near Thika
Internet Researchers near Ongata Rongai
Data Extraction Specialists near Thika
Translators near Ruiru
Online Writers near Kericho
Active Listeners near Nakuru
Ghostwriters in Mombasa
Historians near Nakuru
JavaScript Developers near Nanyuki
Web Analysts near Nairobi
Article Writers near Kericho
SEO Writers near Chuka
Letter Writers near Meru
Web Researchers near Ongata Rongai
More top skills in Kenya
Penetration Testers in Kenya
Network Pentesters in Kenya
Kali Linux Freelancers in Kenya
Certified Ethical Hackers in Kenya
Internet Security Specialists in Kenya
Malware Analysts in Kenya
Reverse Engineers in Kenya
WebApp Pentesters in Kenya
Encryption Freelancers in Kenya
SSL Specialists in Kenya
Cryptographers in Kenya
Cloud Security Framework Specialists in Kenya
Similar Vulnerability Assessment Specialist Skills
WebApp Pentesters
Network Pentesters
Vulnerability Assessment Specialists
Nessus Freelancers
White Hat Hackers
Kali Linux Freelancers
Digital Forensics Freelancers
Certified Ethical Hackers
Penetration Testers
Wireshark Specialists
Web Application Security Freelancers
Antispam and Antivirus Specialists