Hire the best WebApp Pentesters in Rawalpindi, PK
Check out WebApp Pentesters in Rawalpindi, PK with the skills you need for your next job.
- $50 hourly
- 5.0/5
- (19 jobs)
Unlock the Power of Your Vision with Expert Bubble.io Development Are you an entrepreneur with an innovative idea, ready to bring it to life as a fully-fledged web application? You’ve come to the right place. With over four years of experience in Bubble.io, I specialize in turning concepts into powerful digital products, comparable to platforms like Uber, Airbnb, and Amazon. Why Choose Me? My journey began as Software Developer, but I quickly recognized the immense potential of Bubble.io. This no-code framework offers more than just website creation—it’s a robust tool for developing complex web applications with responsive designs, intricate data structures, automated workflows, and seamless third-party integrations. I’ve had the pleasure of helping entrepreneurs at every stage, from initial ideation to product launch and beyond. What I Offer: • Responsive Design: Ensuring your application looks and works great on all devices. • Complex Data Structures: Building robust databases to support your app’s functionality. • Automated Workflows: Creating logic-driven actions that enhance user experience. • Third-Party Integrations: Connecting your app with external services through APIs. • Payment Gateways: Implementing secure payment solutions for smooth transactions. • Social Logins: Enabling easy and secure user authentication. • Geo-location Features: Adding location-based services for a tailored user experience. • UI/UX Design: Crafting intuitive interfaces that engage users. How I Work: 1- Discover: We begin by understanding your product, its goals, and its target audience. 2- Strategy/Planning: I strategize and plan the best approach to meet your brand’s objectives, 3- utilizing tools like Miro and ClickUp. 4- Design & Development: Before diving into Bubble, we’ll draft wireframes in Figma to streamline the development process. 5- Deliver: I’ll deliver your completed application on time and within budget, ready to make an impact. Let’s Build Something Great Together I’m ready to start working on your project and help you achieve your goals. Let’s build a long-term partnership that brings your vision to life. Kind regards,WebApp PentestingEcommerce Website DevelopmentWebsite AuditReactNodeJS FrameworkWordPress SecurityWordPress e-CommercePage Speed OptimizationWordPress Bug FixPenetration TestingWeb App Penetration TestingMERN StackWordPress ThemeAPI DevelopmentSearch Engine Optimization - $10 hourly
- 5.0/5
- (85 jobs)
As an experienced Cybersecurity Professional, my expertise encompasses Penetration Testing, Vulnerability Scanning, Information Security Management, and Compliance Oversight. With a comprehensive background, I provide multifaceted skills for effective digital asset protection in the dynamic cybersecurity landscape. In Cybersecurity Assessment, I excel in Threat Identification and Mitigation, adept in using tools like Burp Suite, Metasploit, OWASP ZAP, Nessus, and Nmap. My proficiency extends to Google CASA Tier 2 assessments, where I specialize in both dynamic and static scanning, leveraging OWASP ZAP and Fluid Attacks for robust evaluations. This expertise complements my in-depth understanding of Network Protocols, Firewall Configuration, and Database Management, and experience in various Operating Systems. My programming skills in Python, Perl, Ruby, and Bash Scripting enable the development of custom security tools, automating Penetration Testing and Vulnerability Assessment processes. These abilities, coupled with my analytical problem-solving skills, empower me to anticipate and counter Cyber Attacks effectively. In Web Application Security, I combine knowledge of Web Development and Penetration Testing for comprehensive Application Security Assessments. As an OSINT Specialist, I utilize public data sources for enhanced Risk Assessments and Threat Modeling. My role as a Chief Information Security Officer (CISO) and Compliance Officer underlines my commitment to Information Security Policies and regulatory standards adherence. Dedicated to professional growth, I continuously engage with the latest Cybersecurity Trends and technologies through Industry Conferences and Professional Development Courses. My extensive skill set is geared towards providing effective Risk Mitigation Strategies, ensuring the security and integrity of digital assets.WebApp PentestingISO 27001Information Security AuditInformation Security Threat MitigationMaltegoTechnical SupportTechnical WritingNetwork Penetration TestingRisk AssessmentEthical HackingRisk AnalysisCyber Threat IntelligenceWeb App Penetration TestingRisk ManagementVulnerability AssessmentPenetration Testing - $60 hourly
- 5.0/5
- (2 jobs)
Securing your digital infrastructure requires expertise and precision—qualities I bring with over 4 years of experience in cybersecurity and threat intelligence. I specialize in delivering tailored solutions that enhance security and mitigate risks effectively. Cybersecurity Services ✔ Penetration Testing (Web, Network, Cloud) ✔ OSINT Investigations & Threat Intelligence ✔ Incident Response & Digital Forensics ✔ Vulnerability Assessments & Risk Mitigation ✔ SOC Monitoring (SIEM Tools: Splunk, Elastic) ✔ Compliance & Security Framework Implementation (NIST, ISO 27001) ✔ Cloud Security (AWS, Azure, Google Cloud) Let's safeguard your systems with expert-driven strategies. Always happy to deliver more than expected!WebApp PentestingEthical HackingCyber Threat IntelligenceThreat DetectionNIST Cybersecurity FrameworkCybersecurity ManagementCybersecurity ToolNetwork Penetration TestingPenetration TestingWeb App Penetration TestingSOC 1 ReportTechnical WritingQuantitative ResearchArticleInformation Technology - $60 hourly
- 5.0/5
- (3 jobs)
I specialize in blockchain security, with a deep understanding of both EVM (Ethereum Virtual Machine) and non-EVM chains. I have conducted audits of various smart contracts on Ethereum, Cosmos, and Solana, as well as blockchain protocols. I have successfully reported multiple issues in blockchain-related projects and offer comprehensive services in smart contract auditing and security assessments tailored to the unique requirements of decentralized applications and blockchain networks. In addition to blockchain security, I have 5 years of experience in penetration testing, actively participating in bug bounty and responsible disclosure programs. I have extensive expertise in identifying vulnerabilities in web and mobile applications and have been involved in over 100 programs, including Apple, Dropbox, Opera, Steam, and Datadog. I provide professional Black and Grey-box penetration testing to ensure robust security for web and mobile platforms.WebApp PentestingWeb App Penetration TestingPenetration TestingWeb Application SecurityELK StackCybersecurity ToolVulnerability AssessmentPythonKibanaSecurity Testing - $17 hourly
- 5.0/5
- (98 jobs)
🔒 Securing Networks, Protecting Data, and Stopping Threats – That's My Expertise. I am an accomplished SIEM/SOAR Engineer and SOC Analyst with expertise in IBM QRadar SIEM and SOAR, Elastic SIEM. My journey in the field of Information Security has equipped me with a robust skill set that combines the power of leading security tools and a hands-on approach to threat detection and mitigation. My Expertise: ✅ SOC Tool Mastery: Proficient in deploying and managing security tools such as IBM QRadar SIEM, IBM Resilient SOAR, and Elastic SIEM. ✅ Threat Detection: Exceptional at monitoring and analyzing security alerts, quickly identifying potential threats and responding effectively. ✅ Incident Response: Skilled in designing and executing incident response playbooks, streamlining security operations for rapid incident resolution. ✅ Log Analysis: Experienced in integrating diverse log sources into SIEM systems, providing a unified view of security events and threats. ✅ System Administration: Adept at managing Linux and Windows servers, Active Directory, and system configurations for optimal security. ✅ Client Empowerment: Effective in conducting training sessions and delivering presentations to clients, enhancing their understanding of security solutions. With a strong background in information security and a commitment to ongoing learning and skill development, I am dedicated to protecting your organization's digital assets. Let's work together to fortify your defenses against the ever-evolving threat landscape. Ready to take the next step in safeguarding your organization? Let's chat!WebApp PentestingIncident ManagementGovernance, Risk & Compliance SoftwareWeb App Penetration TestingPenetration TestingMalware RemovalThreat DetectionSOC 1Security Operation CenterLinux System AdministrationScriptingEthical HackingInformation SecurityCybersecurity Monitoring - $30 hourly
- 4.9/5
- (44 jobs)
Ex Top Rated freelancer (Information security category) on Upwork Blackhat MEA Speaker Cyber Security Researcher. Multiple CVEs holder. Penetration Tester Consultant Certified Ethical Hacker Ex-Chapter Leader @ OWASP Bug Bounty Hunter Certified Vulnerability Assessor (CVA) - FBI Cyber Security Certification Requirement, Tier 1 Fortinet - NSE 1 Network Security Associate Certified Network Security Specialist (CNSS) - Trained. Major expertise are web and mobile applications penetration testing. I have 8+ years of experience in web application penetration testing, mobile application penetration testing and network vulnerability assessments Most of my clients are SaaS, Startups, and multi-national companies. Acknowledged by Nokia, Opera, Microsoft, Apple and many other big names for reporting security vulnerabilities and participating in bug bounties. Expertise include :- Web application penetration testing. Information Security Consultancy. Android and iOS applications penetration testing. Malware analysis and removal. Security consultancy. Code revision from security point of view. Vulnerability Assessment of Network Devices/Databases/Web Server/Application Server. Documentations related to information security (NIST, ISO 27001 etc) *Not available for anything illegal or unethical.WebApp PentestingWeb App Penetration TestingWordPressSecurity AnalysisInformation Security AuditIT Compliance AuditEthical HackingWordPress Malware RemovalInformation SecurityNetwork SecurityPenetration Testing - $30 hourly
- 4.9/5
- (15 jobs)
Hello, I’m Alliyan, a Cyber Security Specialist with a strong interest in Artificial Intelligence and Machine Learning, as well as experience managing projects. With over four years in the industry, I offer a range of services to protect businesses from cyber threats and successfully manage cybersecurity and AI/ML projects. My services include: Cybersecurity Expertise: Vulnerability Assessments: Identifying weaknesses in your systems and providing solutions. Penetration Testing: Simulating cyberattacks to find security flaws in your networks and infrastructure. Security Audits: Conducting thorough checks to ensure compliance with industry standards. Risk Assessments: Identifying and prioritizing risks, along with actionable recommendations. Incident Response: Offering fast and effective responses to security breaches or cyber incidents. Security Awareness Training: Educating employees to recognize and prevent cyber threats. Regulatory Compliance: Ensuring adherence to standards like HIPAA, PCI DSS, GDPR, and more. Security Policy Development: Creating policies to protect your organization comprehensively. Mobile Device Security: Protecting mobile devices from cyber threats. AI/ML Integration: Using AI and Machine Learning for advanced threat detection and response. Project Management Skills: Project Planning & Execution: Managing cybersecurity and AI/ML projects from start to finish, ensuring they are completed on time and within budget. Team Coordination: Working with different teams to meet project goals. Risk Management: Identifying project risks and addressing them to avoid delays. Client Communication: Keeping clients updated on progress and meeting expectations. Agile & Waterfall Methods: Adapting project management approaches to fit client needs. Background: I have a Bachelor’s degree in Cyber Security from Air University Islamabad, where I studied subjects like programming, cryptography, web security, ethical hacking, and AI/ML. Over the past three years on Fiverr, I have successfully delivered customized solutions to clients. I’ve also managed projects focused on malware detection, code obfuscation, and the use of AI/ML in cybersecurity. I am committed to delivering high-quality cybersecurity services and managing projects effectively to ensure successful outcomes. Best regards, AlliyanWebApp PentestingRemote IT ManagementIT ManagementProject ManagementPenetration TestingDigital ForensicsVulnerability AssessmentSecurity TestingInformation SecurityEthical HackingCryptographyNetwork Penetration TestingWeb App Penetration TestingSecurity InfrastructureSecurity AnalysisNetwork Security - $15 hourly
- 4.7/5
- (8 jobs)
👋 Greetings, 🌐 With expertise in network security, web exploitation, digital forensics, OSINT and networking, I have a diverse background in cybersecurity and Information security. I have successfully secured networks, identified web application vulnerabilities, conducted digital forensic investigations, and implemented robust networking solutions. 🏆 CTF Achievements: I have achieved commendable positions in national and international Capture The Flag (CTF) competitions with my team "Griffyns". We are Ranked 2nd in the country on CTFtimes. These experiences have demonstrated my ability to solve complex cybersecurity challenges and think critically under pressure. ✍️ I am also offering expertise in technical content and article writing, Proof of Concepts (POCs), Pentest Reports, and academic writing in this field. I'm committed to delivering clear, deadline-driven work, bridging the gap between technical complexities and understandable content. 💼 Services Offered: Ethical Hacking and Penetration Testing 🔍💻 Digital Forensics 🔍🕵️ Networking Solutions 🌐🔒 OSINT Investigation 🌐📊 CTF Challenge Designing 🚩🏁 Cybersecurity Assignments, Tasks, and Projects 📚💼 Cybersecurity Strategy and Consulting 📈🤝 Network and System Security 🔐🖥️ 🌟 Why Choose Me: Extensive Expertise 🛡️💡 CTF Achievements 🏆🧩 Comprehensive Services 📋🌐 Professional Approach 🤝👔 If you require a skilled cybersecurity professional to enhance your organization's defenses, I am ready to take on assignments and projects. Together, we can strengthen your cybersecurity posture and protect your digital assets. 🔐💼🌐🚀WebApp PentestingAcademic WritingContent WritingReport WritingWeb App Penetration TestingNetwork Penetration TestingCyber Threat IntelligenceWeb ProxyEthical HackingComputing & NetworkingWeb ApplicationPython ScriptDigital ForensicsPenetration TestingVulnerability AssessmentCybersecurity Management - $30 hourly
- 5.0/5
- (1 job)
A motivated cyber-security professional with diversified expertise and 5+ years of work experience in Information security, capable of quickly adapting of advance environments, a good team player, and an effective leader. Excellent working knowledge of Security Technologies and having a commitment to keep up to date with the latest developments. Being a Senior Security Analyst, I am skilled with the following: ✔SOC as a service ✔Threat Intelligence Service ✔VA/PT Service ✔SOC Gap Assessment Service ⚡⚡⚡⚡Technical Exposure⚡⚡⚡⚡ 🌟 Hands on Experience of managing on below SIEM technologies for monitoring, development of use-cases and parsing/mapping and integration of devices: ✔IBM QRadar, ✔Splunk, ✔LogSign, ✔LogPoint ✔Elastic Search. 🌟 Hands on Experience of managing, Deployment, triage analysis, investigation and manage incidents, create prevention policies on 3000+ Hosts including Windows, Linux, MacBook Platform through below EDR technologies. ✔CrowdStrike EDR ✔TrendMicro ✔Carbon Black ✔Fire Eye (HX/NX/EX) ✔Microsoft Defender for Endpoint 🌟 Hands on Experience of managing, Deployment, and monitoring Microsoft XDR technology and identify advance attacks. 🌟 Classification of malware after deep analysis, identification, validation and detection techniques and tactics. 🌟 Hands-on experience of preventing organization from brand impersonation through below mentioned tools which provides real-time visibility into potential underground cyber threats and analyzes domains to identify brand impersonation: ✔CrowdStrike falcon X Recon ✔CTM360 ✔Dark Owl 🌟 Hands-on experience of detecting policy violations (i.e., Block Mass Storage, Social Media Sites etc.), identifying known threats and IOC management in organizations through below Antivirus Solutions: ✔Symantec ✔Kaspersky ✔Trend Micro ✔CrowdStrike Prevent ✔McAfee 🌟 Hands-on experience of using and monitoring below listed network security controls for the detection of anomalies, suspicious Behavior, and policy violations. ✔Barracuda Email Security Appliance ✔Cisco Email Security Appliance ✔Microsoft Email Security Appliance ✔Palo Alto IDS/IPS Firewalls. ✔FortiGate IDS/IPS Firewalls. ✔Cisco IDS/IPS Firewalls. ✔Sophos Proxy ✔Cisco Proxy ✔Infoblox DNS Security ✔Trend Micro (DDI, DDEI, DDWI, DDAN) 🌟 Providing direction and guidance on customer security requirements and standards for monitoring, alerting and incident response. 🌟 Identifying strategy for containment, remediation steps and recovery procedures. 🌟 Identifying new security threats by conducting continual monitoring, security testing, vulnerability assessments and log analysis.WebApp PentestingC++JavaAngularReactPHPAndroid App DevelopmentWeb ApplicationWeb App Penetration TestingC#Programming Bug FixCyber Threat IntelligenceCryptographySoftwareSystem SecurityCybersecurity Management - $25 hourly
- 4.9/5
- (21 jobs)
Looking for Cyber Security, Assembly language and Reverse Engineering projects. Can provide consultation as well. . Can reverse engineer executables of Windows and Linux both. Can perform penetration testing (for cyber security). Looking for long-term engagement. ThanksWebApp PentestingC++AndroidHTML5SQLPHPWordPressInformation SecurityWeb App Penetration TestingX86 Assembly LanguageUnix ShellPDF ConversionReverse EngineeringPythonLinux - $24 hourly
- 4.3/5
- (5 jobs)
Ready to fortify your digital defenses? With over 4+ years of hands-on cybersecurity experience, I specialize in penetration testing, vulnerability assessment, digital forensics, and malware analysis. My expertise spans IoT/OT pentesting, exploit development, and reverse engineering. • I hold the CRTP certification and offer fast turnaround, competitive rates, and clear communication. My reports are detailed, professional, and actionable, helping you strengthen your security posture. Whether you need ongoing support or specialized training, I'm here to secure your digital assets. Available for full-time, part-time, and project-based work. P.S. Make sure to add my profile in your talent list.WebApp PentestingSecurity AnalysisJavaScriptPHPCybersecurity ManagementInformation SecurityMetasploitSystem TestingQA TestingReverse EngineeringEthical HackingWeb App Penetration TestingSoftware TestingNetwork Penetration TestingDigital ForensicsPenetration Testing - $20 hourly
- 0.0/5
- (1 job)
Cyber Security Professional with 3 Years of Proven Industry Experience having relevant academic qualification i.e. Computer Science Graduate Services Penetration Testing Web Apps, Mobile Apps, API, Networks, Active Directory, Desktop Apps, AWS Cloud, Azure Cloud, GCP Cloud, IoT, Smart Cards • Source code analysis Web apps, mobile apps, Desktop apps, API • Red teaming assessment • Phishing and social engineering attacks • Configuration assessment services Network devices, cloud platforms (AWS, Azure, GCP, OpenStack, etc.), workstations, servers, security products (firewalls, EDR, IPS, IDS, etc.) • Architecture review • Compromise assessment • Digital Forensics and Incident Response (DFIR) • DDOS testing Web apps, network infrastructure • Stress testing Web apps, APIsWebApp PentestingCyber Threat IntelligenceWordPress Malware RemovalWeb App Penetration TestingAPI TestingPenetration TestingIncident Response PlanRisk AssessmentMalware DetectionVulnerability AssessmentWeb ApplicationSystem SecurityCybersecurity Management - $20 hourly
- 0.0/5
- (0 jobs)
I am an Information Security Professional with experience in identifying vulnerabilities and fortifying defenses. I offer comprehensive Web App Pentesting, Vulnerability Assessment, Log Monitoring and Reporting, SEIM Management and Alerting, and SOC L1 services utilizing both manual techniques and advanced tools. My detailed reports provide actionable insights to enhance your security posture. I am committed to delivering high-quality, confidential services tailored to your needs. Let’s work together to secure your digital assets.WebApp PentestingLogRhythmBlack Box TestingWhite Box TestingNetwork Penetration TestingC++PythonCybersecurity ToolCybersecurity MonitoringEthical HackingSOC 1Security Operation CenterVulnerability AssessmentWeb App Penetration TestingPenetration TestingInformation Security - $5 hourly
- 0.0/5
- (1 job)
With over a year of experience in cybersecurity, I specialize in assessing and mitigating threats, identifying vulnerabilities, and implementing robust security solutions. My background includes hands-on work in penetration testing, vulnerability scanning, and risk management across various sectors, including both private organizations and government agencies. I am proficient in a range of security tools such as 𝐁𝐮𝐫𝐩 𝐒𝐮𝐢𝐭𝐞, 𝐌𝐞𝐭𝐚𝐬𝐩𝐥𝐨𝐢𝐭, 𝐎𝐖𝐀𝐒𝐏 𝐙𝐀𝐏, 𝐍𝐞𝐬𝐬𝐮𝐬, and 𝐍𝐦𝐚𝐩, enabling me to conduct thorough security assessments of systems, networks, and web applications. In my work, I leverage a combination of 𝐬𝐭𝐚𝐭𝐢𝐜 and 𝐝𝐲𝐧𝐚𝐦𝐢𝐜 𝐬𝐜𝐚𝐧𝐧𝐢𝐧𝐠 techniques to identify vulnerabilities in web applications and networks. Tools like 𝐎𝐖𝐀𝐒𝐏 𝐙𝐀𝐏 are used for real-time vulnerability scanning, focusing on security risks such as cross-site scripting (XSS), SQL injection, and improper session management. I utilize 𝐌𝐞𝐭𝐚𝐬𝐩𝐥𝐨𝐢𝐭 for exploiting vulnerabilities during penetration tests, allowing me to assess the effectiveness of defenses and identify potential areas for improvement in system security. 𝐁𝐮𝐫𝐩 𝐒𝐮𝐢𝐭𝐞 is a critical tool in my approach to web application security, enabling in-depth testing for common vulnerabilities like broken authentication and insecure communication. 𝐍𝐞𝐬𝐬𝐮𝐬 is employed to perform comprehensive vulnerability scans across different systems, ensuring that they are properly configured and free from known exploits. Additionally, 𝐍𝐦𝐚𝐩 is used for network reconnaissance, helping to map network services and identify potential attack vectors that could be exploited by attackers. My expertise also extends to 𝐰𝐞𝐛 𝐚𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲, where I apply both penetration testing knowledge and a deep understanding of web development to identify and mitigate security risks. I focus on preventing attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF), ensuring applications are secure against common vulnerabilities and safeguarding sensitive data. Automation plays a key role in my workflow, and I use programming languages such as 𝐏𝐲𝐭𝐡𝐨𝐧, 𝐂++, 𝐂#, and 𝐁𝐚𝐬𝐡 𝐬𝐜𝐫𝐢𝐩𝐭𝐢𝐧𝐠 to create custom tools that automate various security tasks, including penetration testing, vulnerability scanning, and incident response. These tools help streamline security processes, improve efficiency, and ensure the accuracy of security assessments. In addition to penetration testing and vulnerability scanning, I have extensive knowledge of 𝐧𝐞𝐭𝐰𝐨𝐫𝐤 𝐩𝐫𝐨𝐭𝐨𝐜𝐨𝐥𝐬, 𝐟𝐢𝐫𝐞𝐰𝐚𝐥𝐥 𝐜𝐨𝐧𝐟𝐢𝐠𝐮𝐫𝐚𝐭𝐢𝐨𝐧, and 𝐝𝐚𝐭𝐚𝐛𝐚𝐬𝐞 𝐦𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭. I am proficient in securing both 𝐋𝐢𝐧𝐮𝐱 and 𝐖𝐢𝐧𝐝𝐨𝐰𝐬 environments, ensuring that systems are properly configured, patched, and hardened to reduce the attack surface and mitigate the risk of exploitation. As an 𝐎𝐒𝐈𝐍𝐓 𝐬𝐩𝐞𝐜𝐢𝐚𝐥𝐢𝐬𝐭, I leverage open-source intelligence techniques to gather data and build comprehensive risk assessments and threat models. This approach helps identify potential threats early and empowers me to implement proactive security measures. I am committed to continuous learning to stay ahead of emerging cyber threats and enhance my skill set. My goal is to work collaboratively within organizations, developing strong security frameworks, educating teams on best practices, and providing effective solutions that protect critical assets and sensitive information.WebApp PentestingThreat DetectionInformation SecurityMaltegoTechnical SupportNetwork Penetration TestingEthical HackingRisk AnalysisCyber Threat IntelligenceWeb App Penetration TestingRisk ManagementMalware DetectionNetwork SecurityRisk AssessmentVulnerability AssessmentPenetration Testing - $20 hourly
- 0.0/5
- (0 jobs)
I can make effective use of my experience and education skills towards achieving the goals and objectives. Experience of staffing and recruitment in IT & Engineering skill sets. Self-motivated, having the capabilities of problem solving and quick decision making possess, well at logic building, adaptable according to working environment with a very short span learning curve. Performing Vulnerability Assessment, Penetration Testing, Third Party Security Assessments and managing organizational compliance (Windows, Linux, and AWS) to ensure the security of the organization. Preparation of appropriate reports to communicate findings to the concern team. Perform Configuration review of Network devices. Assist in fixing the issues identified. Security baseline review of IT Assets. I can make effective use of my experience and education skills towards achieving the goals and objectives. Experience of staffing and recruitment in IT & Engineering skill sets. Self-motivated, having the capabilities of problem solving and quick decision making possess, well at logic building, adaptable according to working environment with a very short span learning curve. Our Services • Penetration Testing • Vulnerability Assessment • Information Security • Network Security • Security Analysis • Internet Security • Supplier Security Assessment/Third Party Security Assessment • Designing Assessment Questionnaire for Internal Audit • Designing Assessment Questionnaire for Auditing Third Parties • PCI DSS Consulting • Drafting Hardening documents - Windows, Linux, Network and AWS • Security review of Network configurations • Support for remediation activities for Penetration Test, Vulnerability Assessment and Audit findings. • Compliance Management • Framework creation for Organization compliance management • Policy Creation - Information Security, Penetration Testing, Vulnerability Assessment, Other Services • Ethical Hacking Training • Application Security Training • Assist in choosing the right antivirus and anti-malware solution for end user computing • Information Security Career Guidance • Information Security Interview preparation Project list: • Internet Of Things Simulator(Android App) & MQTT Server(C#) • Car Lock\Unlock using Face Authentication(Hardware & Android App). • Bluetooth Based Electric Appliance Control System(Hardware & Android App). • Door Security System(Hardware & Android App). • Shop Security System(IR Based). • Obstacle Avoiding Robot. • Automatic Safety Generator Change Over (Automatic ON/OFF). • Automatic Solar Panel System. • Hurdle Sensing Robot. • Automatic Bottle Filling System. • Car Security System With Auto Car Stop. • Mobile Based Wireless Automatic Water Level Maintaining System. • Line Following Robot. • Face Authentication using MATLAB Algorithm. • Data mining project(Python). • Secret Data Transmission (Steganography and Cryptography) Project on Matlab. • Online Shopping Cart using asp.Net.and much more. Help companies and users ensures securityWebApp PentestingInternet SecuritySecurity AnalysisWeb App Penetration TestingComplianceSystem AnalysisBlack Box TestingNetwork Penetration TestingAI DevelopmentPoint of Sale & Payment SystemsPayment Gateway IntegrationAPIMongoDBSQLMERN StackReact.NET CoreFlutterPHPBot DevelopmentAndroid App DevelopmentWeb ApplicationPython - $7 hourly
- 0.0/5
- (0 jobs)
I am a student of 4th semestet of Bs Cyber Security currently learning at Pakistan best University FAST NUCES in Computet sciences . I am also Gold medalist . I have 3 gold medals for each semester. I have deep interest in penetration testing ( I have attended different hands on workshops on pentesting too )and I have done research in MLS (Message Layer security) the most secure protocol for group messaging.WebApp PentestingWeb App Penetration TestingPenetration TestingNIST Cybersecurity FrameworkCybersecurity MonitoringCybersecurity Management - $20 hourly
- 0.0/5
- (0 jobs)
Cybersecurity Specialist | GRC Expert | Penetration Tester I am a seasoned cybersecurity professional with expertise in Governance, Risk, and Compliance (GRC), penetration testing, and advanced security configurations. With over years of experience, I have a proven track record of safeguarding businesses through meticulous assessments and tailored security solutions. Key Skills and Expertise: GRC and Compliance: Extensive experience conducting 150+ audits for frameworks such as SOC 2, ISO 27001, GDPR, NIST, and HIPAA. Penetration Testing: Delivered 20+ comprehensive web and Android application vulnerability assessments, uncovering critical security gaps and recommending actionable remediations. Security Configurations: Proficient in SOC, SIEM, and SOAR implementations to enhance threat detection and incident response. Cybersecurity Training: Skilled in educating and mentoring professionals, currently delivering training sessions on GRC at Zerox Innovations. I am passionate about aligning security strategies with organizational goals to ensure compliance, mitigate risks, and enhance resilience against emerging threats. My hands-on approach, combined with a deep understanding of industry best practices, enables me to deliver impactful results tailored to client needs. If you're looking for a dedicated professional to strengthen your security posture and navigate compliance requirements, let’s connect! I look forward to contributing to your success.WebApp PentestingAudition PreparationPolicy DevelopmentHIPAANIST Cybersecurity FrameworkISO 27001GDPR Compliance ReviewInformation Security AuditSOC 2 ReportSOC 2Social Engineering AssessmentTrainingEthical HackingWeb App Penetration TestingNetwork Penetration TestingPenetration Testing - $30 hourly
- 0.0/5
- (0 jobs)
Hello there! I am Emaad Abbasi and I am an Ethical Hacker from Pakistan. HOW CAN I HELP YOU: - Find vulnerabilities in your systems before the bad guys do - I will provide you with a detailed report with all my findings, supporting evidence, and recommendations for mitigation of discovered vulnerabilities. - Map out your business's attack surface through asset discovery and subdomain enumeration. EXPERIENCE: I am working as a Research Assistant at NCSAEL NUST, Islamabad. I am proficient in Web Application Penetration Testing, Vulnerability Assessment, maintaining and developing scanners, Network Security and Python Web Development. I have almost 1 year experience working in Cybersecurity, on the Offensive side. For my day job, I perform penetration tests for various clients, develop tools using Django. I am also a bug bounty hunter on Intigriti and Hackerone platforms. I invest my time and skills to help people protect their businesses from Cybercriminals. RELEVANT EDUCATION: I have recently completed a six month cybersecurity bootcamp from Al-Nafi, a Canadian educational platform. I have learned penetration testing, web application security assessment, ISO 27001 Compliance, and completed projects on OWASP WSTG (Web Security Testing Guide). Besides that, I have also completed the Junior Penetration Tester Path on TryHackMe.WebApp PentestingWeb ApplicationCybersecurity ManagementNetwork SecurityBug BountyWhite Box TestingVulnerability AssessmentInformation SecurityPenetration TestingEthical HackingWeb App Penetration TestingDjangoBlack Box TestingWeb Application SecurityWebsite AuditPython Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a WebApp Pentester near Rawalpindi, on Upwork?
You can hire a WebApp Pentester near Rawalpindi, on Upwork in four simple steps:
- Create a job post tailored to your WebApp Pentester project scope. We’ll walk you through the process step by step.
- Browse top WebApp Pentester talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top WebApp Pentester profiles and interview.
- Hire the right WebApp Pentester for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a WebApp Pentester?
Rates charged by WebApp Pentesters on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a WebApp Pentester near Rawalpindi, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance WebApp Pentesters and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream WebApp Pentester team you need to succeed.
Can I hire a WebApp Pentester near Rawalpindi, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive WebApp Pentester proposals within 24 hours of posting a job description.