Hire the best Vulnerability Assessment Specialists in Qatar
Check out Vulnerability Assessment Specialists in Qatar with the skills you need for your next job.
- $30 hourly
- 5.0/5
- (20 jobs)
✅ Penetration Tester with 7+ years of experience ✅ 63+ projects delivered ✅ Cybersecurity Expert - Worked with Fortune 500 companies ✅ Recognized in the Hall of Fame for platforms such as Pinterest, Walmart, Optimizely, etc. ✅ Certified Penetration Tester and Ethical Hacker Hi! I'm Arslan, A Cyber Security Expert, Penetration Tester with 7+ years of experience. With more than 110 reviews online. I am uniquely qualified to secure your digital assets effectively. My track record includes collaborating with 500 Fortune companies and fortifying their digital assets against the ever-evolving threat landscape. During these 7 years, I have identified and addressed vulnerabilities in digital assets for top companies like Pinterest, Walmart, and Optimizely. My expertise spans Authentication Bypass, SQL Injection, Sensitive Information Disclosure, Cross-Site Scripting, and CSRF. I have conducted Internal/External network assessments, web app and mobile app security audits, and active directory penetration tests for various organizations, contributing to strengthened cybersecurity measures. Reviews: "Arslan is an excellent penetration tester. He's hard-working, diligent, and fast. We're looking forward to hiring him for a future contract. If you have the opportunity to hire Arslan, I suggest you take it!" "Wonderful work. A really in-depth vulnerability and penetration test. I would gladly recommend him to other businesses." 🔒 Your Digital Fort is Only as Strong as its Guardian. Let's Secure the Future Together! 🔒Vulnerability Assessment
IT Compliance AuditComplianceNetwork Penetration TestingManual TestingRisk AssessmentBlack Box TestingWebsite SecurityOWASPCloud SecurityInformation SecurityEthical HackingWeb App Penetration TestingAI SecurityPenetration Testing - $40 hourly
- 5.0/5
- (18 jobs)
I am a seasoned cybersecurity professional, holding certifications such as OSCP, CEH, eWPT, and eJPT, and boasting over 8 years of experience in Information Security. Throughout my career, I've assisted clients in establishing robust cybersecurity foundations, utilizing my expertise in Security Assessment Methodology to pinpoint vulnerabilities in Networks, Web, and Mobile Applications. I specialize in offering VAPT (Vulnerability Assessment & Penetration Testing) services, providing you with a comprehensive and easily understandable report, complete with proof-of-concept examples. Skills: 🌐 Web App Pen-Testing: I cover everything from SQL injection to Cross-Site Scripting, ensuring your web applications are secure. 📱 Mobile (Android & iOS) Pentesting: Fortifying your mobile apps is my priority. Let me ensure they're as secure as Fort Knox on a smartphone. 💻 Thick Client (Desktop) App Pentesting: Whether it's Windows, macOS, or Linux, I'll identify and fix vulnerabilities in your desktop applications. ☁️ Cloud Security (AWS, Azure, GCP): Your cloud infrastructure's security is paramount. Let me assess and enhance your cloud security posture. 💼 Network Pentesting: Identifying and closing vulnerabilities to keep your digital highways secure. 📡 Smart Contract & DApp Pentesting: In the decentralized world, security is key. I'll scrutinize your smart contracts and DApps to ensure they're hacker-proof. ⚠️ Threat Modeling: I employ threat modeling techniques to proactively identify potential risks and vulnerabilities in your systems. I adhere to industry standards like OWASP ASVS, NIST Cybersecurity Framework, and CIS Controls. I've conducted Penetration Tests and Vulnerability Assessments for global companies, aligning with standards such as OWASP Top 10, API Security Top 10, Mobile Security Top 10, ASVS, CWE, and SANS TOP 25. The deliverable includes a professional Penetration Testing/Vulnerability Assessment report, encompassing: ✅ Executive Summary ✅ Assessment Methodology ✅ Type of Tests ✅ Risk Level Classifications ✅ Result Summary ✅ Table of Findings ✅ Detailed Findings: Each finding includes CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. If this aligns with your needs, feel free to reach out! 🔒💻Vulnerability Assessment
Web Application SecuritySecurity AnalysisEthical HackingWebsite SecurityOWASPReport WritingNetwork Penetration TestingWeb App Penetration TestingInformation Security ConsultationApplication SecurityInformation SecurityPenetration TestingSecurity TestingCybersecurity Management - $50 hourly
- 4.8/5
- (18 jobs)
13 Years of experience in Wireless network, Network security, Information Security, Cyber Security, SOC. Implemented SOC solution using different vendor SIEM such as Sentinel, Fortisiem, logrythm. Document all activities during an incident and providing leadership with status updates during the life cycle of the incident. Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, SIEM, IPS, Data loss prevention etc.) to determine the correct remediation actions and escalation paths for each incident. Conducting security audits of the whole infrastructure and coordinating with different teams to fix the issues based on criticality. Creating playbooks, workbooks for the SOC environment and also help in creating MSB document for several security products. Expertise in wireless networks with different vendors such as Aruba, fortinet, sonicwall and worked on devices like Aruba Instant Access point, Aruba controller, fortiAP, Sonicpoint, Routing and switching, Wireless security. Administrating s veral firewall vendors such as ASA firewall, Dell SonicWALL UTM Appliance, Fortigate, Palo Alto and several other products such as FortiADC, FortiDDDOS, tipping point, trellix Fireye, arbor ddos, Akamai WAF, Zscaler Proxy, Symantec blue cost proxy, forcepoint DLP, Microsoft Azure, F5 FortiWeb, FortiAP, Penetration Testing and Vulnerability Assessment Techniques. • Experience in Vulnerability/Risk/Web Security assessment using Qualys Guard, Nessus.Vulnerability Assessment
FortinetNetwork AnalysisWeb Application FirewallSecurity AnalysisWireless CommunicationCloud SecurityPalo Alto FirewallsAntivirus & Security SoftwareSecurity Operation CenterNetwork SecurityInternet Protocol SecurityFirewallPenetration Testing - $40 hourly
- 0.0/5
- (1 job)
I am a certified penetration tester and security researcher specializing in web application, network, and wireless security. With deep expertise in ethical hacking and red teaming, I help businesses identify and mitigate vulnerabilities before cybercriminals exploit them. 🔹 Key Skills & Expertise: ✔ Web App & Network Penetration Testing ✔ Active Directory & Cloud Security ✔ Vulnerability Assessments & Exploitation ✔ Red Teaming & Adversary Simulation ✔ Security Hardening & Risk Mitigation 🔹 Tools & Technologies: I utilize industry-leading tools to perform in-depth security assessments, including: ✅ Web & API Security: Burp Suite, ZAP, SQLMap ✅ Exploitation & Recon: Metasploit, Nmap, Nessus ✅ Password Cracking & OSINT: Hydra, John the Ripper ✅ Network & Wireless Security: Wireshark, Aircrack-ng ✅ Scripting & Automation: PowerShell, Python As an ethical hacker, I adhere to strict professional standards, ensuring confidentiality, integrity, and compliance in all security engagements. Let’s work together to fortify your digital infrastructure and prevent cyber threats before they happen! Contact me today. 🚀Vulnerability Assessment
Red Team AssessmentCybersecurity ManagementSecurity TestingNetwork Penetration TestingEthical HackingWeb App Penetration TestingReport WritingMetasploitPenetration Testing - $75 hourly
- 0.0/5
- (0 jobs)
IT & Cyber Security Expert with over 16 years of experience in the industry, including work for top companies like Hewlett Packard Enterprise (Fortune 500 Company) & Qatar Foundation. I offer a unique blend of cybersecurity expertise and hands-on IT infrastructure management, ensuring solutions that are both secure and practical. Some of my top skills and credentials are: ✅ CISSP (Certified Information Systems Security Professional) ✅ Cybersecurity strategy and implementation ✅ Identity and Access Management (IAM) ✅ Vulnerability Assessment & Remediation (Nessus, Nikto) ✅ Network Security Monitoring (PRTG, SolarWinds) ✅ Microsoft 365 (including Teams, SharePoint, OneDrive) planning & implementation ✅ Cloud solutions and security (Azure focus) ✅ Enterprise Windows Server and Windows 10 administration ✅ Virtualization and IT infrastructure optimization ✅ Mobile Device Management (Intune & Meraki) ✅ Data Recovery and Rescue ✅ PowerShell scripting for automation ✅ macOS management ✅ Security analysis and consultation I specialize in: 1. Comprehensive cybersecurity assessments and strategy development 3. Implementation of robust Identity and Access Management solutions 4. Setting up proactive vulnerability management programs 5. Deployment of network security monitoring systems 6. Data recovery and rescue operations 7. IT infrastructure optimization with a security-first approach 8. Development of custom security awareness training programs Whether you need to enhance your security posture, streamline IT operations, recover critical data, or navigate the complexities of secure cloud migrations, I offer tailored solutions to meet your specific needs. I highly value positive human connection, transparent and swift communication, and integrity. My approach combines technical expertise with clear communication, ensuring that complex security and IT concepts are understood by both technical and non-technical stakeholders. Let's collaborate to strengthen your organization's security, optimize your IT infrastructure, and protect your valuable data!Vulnerability Assessment
User Identity ManagementMobile Device ManagementMicrosoft AzureOffice 365Network SecurityCloud ComputingSystem AdministrationVirtualizationData RecoveryMicrosoft IntuneMicrosoft Windows PowerShellMicrosoft Active DirectoryCybersecurity ManagementInformation Security - $20 hourly
- 0.0/5
- (0 jobs)
As a seasoned Governance, Risk, and Compliance (GRC) expert with over 10 years of experience, I specialize in helping organizations across diverse industries—including data centers, telecom, and financial institutions—navigate complex risk landscapes. My qualifications include certifications such as CISA, CISM, ISMS, BCMS, CISSP, CCSP, CIPP, CDMP, and more, reflecting my broad expertise in risk management, cybersecurity, data privacy, and business continuity. I have a proven track record of designing and implementing effective GRC frameworks, ensuring compliance with industry regulations, and aligning business objectives with security and risk management strategies. I am adept at helping organizations develop resilient systems, mitigate risks, and maintain a secure, compliant environment while fostering innovation and continuous improvement. Whether you need help with security assessments, risk analysis, or creating a custom GRC program, I bring a wealth of knowledge and a strategic approach to every project. I am passionate about providing expert advice that empowers businesses to grow safely, stay compliant, and thrive in a rapidly evolving digital world. Let’s collaborate to tackle your toughest GRC challenges and take your organization to the next level!Vulnerability Assessment
Gap AnalysisGovernance, Risk & Compliance SoftwareRisk ManagementRisk AssessmentSOC 2 ReportSOC 2IT General Controls TestingIT Compliance AuditPrivate Labeling & White LabelingPrivacy Impact AssessmentPrivacyInformation SecurityGovernment Reporting ComplianceCompliance - $15 hourly
- 0.0/5
- (0 jobs)
🔐 "Are your web applications or systems vulnerable to attacks? Let’s identify and eliminate those threats before they cause harm!" 🔐 👨💻 With 5+ years of hands-on experience in penetration testing and cybersecurity, I specialize in uncovering hidden vulnerabilities in web applications, websites, and enterprise systems. If you're looking to secure your digital assets and prevent costly breaches, I am here to provide custom solutions tailored to your needs. 🚨 Why Clients Choose Me: Web applications exposed to potential attacks—leading to data breaches and financial loss. Websites with undetected vulnerabilities—resulting in poor security posture and high-risk exposure. Corporate systems at risk of exploitation by malicious actors—jeopardizing your business. Lack of automation in testing security—leading to inefficiencies and missed vulnerabilities. I’m passionate about securing your digital environment and ensuring your business remains protected against evolving cyber threats. 🔒 🌟 Key Achievements: 🛠️ Developed 30+ advanced penetration testing tools for web apps, helping businesses enhance their security by 30%. 🔍 Discovered and mitigated over 100 vulnerabilities in critical infrastructure, reducing exposure to attacks by 50%. 🏆 Worked with 40+ clients to implement robust cybersecurity measures, preventing unauthorized access and data loss. 🤖 Automated security testing for clients, saving them 50% of time and reducing human error in vulnerability detection. 🛠️ My Expertise Includes: 🔐 Penetration Testing for Web Applications, Websites, and Network Systems 🐍 Python Development for Security Tool Automation 🔍 Security Audits and Vulnerability Assessments ⚙️ Risk Management & Incident Response 🎓 Education & Certifications: Bachelor's in Cybersecurity – Isra University Ethical Hacker By cisco Certified Ethical Hacker (CEH) Cisco Certified Network Associate (CCNA) 💡 Why I’m the Right Choice for You ? 🚀 Over 5 years of hands-on experience working with clients across industries to secure their digital assets. ✅ Proven track record of identifying hidden vulnerabilities and providing actionable, high-impact solutions. 🛡️ Tailored security strategies that align with your business goals, ensuring comprehensive protection. 💬 Clear communication, reliable results, and efficient project delivery. Let’s take the first step towards securing your web applications and protecting your valuable data. Contact me now for a detailed security consultation!Vulnerability Assessment
Social Media AuditPythonNetwork SecurityEthical HackingPython ScriptPenetration Testing Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.