Hire the best Wireshark developers

Check out Wireshark developers with the skills you need for your next job.
Clients rate Wireshark developers
Rating is 4.7 out of 5.
4.7/5
based on 105 client reviews
  • $45 hourly
    My experience in the VOIP domain has been for 15 years. My customer satisfaction is my goal. I have extensive experience with Asterisk/Kamailio systems, as well as Linux and network administration. I have the ability to do advanced troubleshooting . My expertise on this: * Asterisk, Kamailio, OpenSips, FreePBX, A2billing, SIP, H323, IAX, Webrtc, hylafax, Asterisk-Pannel, iaxmodem, rtpproxy, MediaProxy, WebRTC, SipML5, SMS API, IVR (Interactive Voice Record),Wireshark * IP routing, router configuration (cisco, iptables routing), switch, Vlan, VPN (Ipsec linux, cisco vpn, fortigate, OpenFire). * Fail2ban, Iptables, OpenSwan, Squid, Cisco FirePower, Vmware, Proxmox * Php, Mysql, Postgresql, sqlite, Mongodb, Bash , LUA , Java, AGI, AMI * Roundcube, Zimbra, Zabbix, Smokeping, munin, Nagios, Cisco NetFlow, Voipmonitor * Git, Ansible, bitbuket, atlassian My time is my value. So when you choosing me you can expect that job will be done in short terms and perfect. I don't like to do something that not need be done. @linkedin linkedincom/in/alaeddine-hertelli/ SKYP:alasupcom1
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    OpenSIPS
    Network Engineering
    Linux
    FreePBX
    PostgreSQL
    VoIP
    Vtiger
    PHP
    MySQL
    Iptables
    Session Initiation Protocol
    Bash Programming
    Kamailio
    Asterisk
  • $15 hourly
    I have 13 year's experience as a Website/Software Senior QA Manager/Engineer in the I.T. Industries and gained a set of skills specifically for development and Quality Assurance. I already have experience working on a Saas platform, E-commerce, Dynamic website, One-pager, Wordpress, and Mobile application. I can create different test plans and test cases adapting to different kinds of projects. I like working directly with the client so I can easily understand the business workflow and can easily adapt to their existing process and will work with minimal supervision with intact quality in mind. Thank you for taking your time and I am looking forward to working with you. What my skills covers: ● Performance testing. ● Exploratory testing ● Cross-browser testing ● Game Testing ● Software & App Testing ● Manual Testing ● Mobile App Testing ● Accessibility Testing ● Stress and Load Testing ● Functional QA ● Regression testing ● Upgrade and continuity testing ● Issue reproduction
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cryptocurrency
    Automation
    Business with 10-99 Employees
    Laravel
    Mobile Development Framework
    Figma
    PHP
    Regression Testing
    Black Box Testing
    Performance Testing
    React
    Load Testing
    Website Development
    Software QA
  • $23 hourly
    I have 12 years experience in the field except my degree on computer engineering. Beside that I have many certification about my field.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    NPS
    OSPF
    Multiprotocol BGP
    Kali Linux
    RADIUS
    TCP/IP
    Cisco Router
    Penetration Testing
    Web Testing
    PHP
    Python
    System Administration
    Network Engineering
    Computer Network
  • $100 hourly
    🌟 Upwork TOP RATED Expert Cybersecurity Analyst ✅ Dark Web Cyber Threat Intelligence ✅ Reverse Engineering, Malware Analyst ✅ WordPress Malware Removal & Hacked Website Recovery ✅ Digital Forensic investigations (Access Data FTK Imager, Autopsy, OSF Forensics, Autopsy, Winhex Editor, and more). ✅ Vulnerability Management: OSINT Investigation, Passive and Active Scanning ✅ Network Security: Firewall (Sophos, pfsense, Fortigate, and Palo Alto), IDS/IPS (Snort and Suricata), OpenVPN (Site-to-Site) ✅ Cyber Security Articles: Technical Writing, Blog Writing, Article Writing, Research Reports, Scientific Reports, ebooks, and Blogs (Fluent in American or British English) Hello, My name is Stephen, a Cyber Security Analyst specializing in Network and Information Security 🌟 I have provided expert cybersecurity and compliance consulting for startups to fortune 50 enterprises! 🌟 I currently hold the following educational degrees and certifications: ✅ Bachelor's Degree in Mathematics and Computer Science ✅ Certified Ethical Hacking ✅ Certified Penetration Tester and Bug Bounty Hunter ✅ Autopsy Digital Forensics My vision is to create Cyber Security awareness and provide security solutions to companies.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Snort
    Information Security
    Ethical Hacking
    Network Analysis
    PfSense
    Kali Linux
    Website Security
    Digital Forensics
    Computer Network
    Network Security
    Intrusion Detection System
    Information Technology
    Intrusion Prevention System
    Technical Writing
  • $20 hourly
    A Cyber Security Enthusiast who wants to transform the cyber world in a secured way for many users. I have experience in Penetration Testing, CCNA/Networking, Network Security and Web Development, Technical Writing and providing SOC services. My upmost priority is to provide an excellent service, quality work and delivering before the deadline. I participate in hackthebox, and vulnhub in my spare time. If you have any questions, do not hesitate to contact me.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cisco Certified Network Associate
    ISO 27001
    Python
    Penetration Testing
    Security Analysis
    Data Protection
    Information Security Audit
    Linux
    SOC 1
    SOC 1 Report
    Computer Network
    Network Security
    Technical Writing
    Information Technology
  • $60 hourly
    Extensive success in providing clients with various IT and cybersecurity solutions. I have wide experience in handling individual clients as well as larger companies/organizations to help them build a customized and secure environment for all their digital assets. How I can help you: -Perform penetration testing against web & mobile applications, internal & external networks, and cloud systems (Azure, GCP, AWS) -Perform smart contracts auditing -Consult on any IT solutions, primarily focusing on open-source tools which can benefit by cutting down cost -Create a monitoring setup for all your digital/IT assets exposed to the Internet -Create security policies -Create custom tools in Python -Provide and implement security best practices -Consult on Governance, Risk, and Compliance (GRC) -Provide one-on-one cybersecurity training -Perform red team activities against an organization -Incident response -Digital forensic analysis All the services I provide will come with a complete report and a slide deck, which I will present to the stakeholders and provide them with an in-depth analysis. Furthermore, I am an eager and quick learner, performing research after hours to provide my clients with the best possible solution to their IT problems.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Blockchain Security
    API Testing
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Malware
    Risk Analysis
    Virus Removal
    Web Application Security
    Data Analytics
    Smart Contract
    Malware Removal
    Security Testing
    Vulnerability Assessment
    Application Security
    Cybersecurity Management
    Penetration Testing
    Digital Forensics
  • $70 hourly
    Welcome to Your Digital Fortress Are you in search of a Penetration Testing expert who delivers not just promises, but concrete results? Look no further! I am your Certified Penetration Testing Specialist, committed to safeguarding your digital empire. With an astonishing average vulnerability discovery rate of 85%, I can provide exceptional Web application penetration testing and Vulnerability Assessments to fortify your online assets. Your business deserves unstoppable security, efficiency, and peace of mind, and that's precisely what I deliver. Why Choose Me? 👉🏼Methodology that Works: You can trust my proven testing methodology to shield your digital domain from attackers. 👉🏼Peace of Mind: Rest easy, knowing that your business is running securely, efficiently, and with unparalleled protection. 👉🏼Comprehensive Services: From Penetration Testing to API Security Assessment, CMS Security Testing, Cloud Penetration Testing, and much more, I've got your security needs covered. ⚙️My Proven Process: ⭐️Discovery & Scoping: We identify the weak points in your digital fortress. ⭐️Penetration Testing & Vulnerability Analysis: We dive deep into the battle, uncovering vulnerabilities. ⭐️Reporting & Retesting: You receive detailed reports and retesting to confirm your security. ⭐️Mitigation & Enhancement: We work together to fortify your defenses. ⭐️90 Days of Free Retesting: We're here to ensure you remain impenetrable. ⭐️ Services: 🔍 Penetration Testing & Vulnerability Assessments 🌐 API Security Assessment 📄 CMS Security Testing ☁️ Cloud Penetration Testing 🌐 Web Application Penetration Testing 📱 Mobile Application Penetration Testing 🏢 Enterprise Network Penetration Testing 🤖 Social Engineering Assessments 📶 Wireless Network Security Testing 🌐 IoT (Internet of Things) Security Assessment 💼 Thick Client Application Testing 🚩 Red Team Engagements 🚀 Security Awareness Training 🛠️ Customized Security Solutions Ready to propel your business to new heights with an 85% vulnerability discovery rate? Contact me now for a thorough cybersecurity assessment.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Information Security Audit
    Security Analysis
    OWASP
    Website Security
    Network Penetration Testing
    White Box Testing
    Web App Penetration Testing
    Application Security
    System Security
    Information Security
    Cybersecurity Management
    Security Assessment & Testing
    Security Testing
    Penetration Testing
    Vulnerability Assessment
  • $70 hourly
    I am an experienced and certified SOC Analyst mainly focused in Incident Response, Digital Forensics, Malware Analysis, building detections, etc.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Malware
    Internet Security
    Cybersecurity Tool
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Programming Bug Fix
    Incident Management
    Incident Response Plan
    Malware Removal
    Network Security
    Digital Forensics
  • $150 hourly
    Certified Wireless Network Expert #317 and the world's first Certified Wireless IoT Solutions Expert, Landon Foster is a Wireless Engineering consultant proficient in IoT implementation and Enterprise 802.11 Networks. An Outstandingly curious individual, he always is seeking to learn more and writing about what he learns. Co-Author of CWAP-403, CWICP and several industry standards, he is an active part of the community and engages in mentoring at every opportunity. He also enjoys teaching, and actively offers a scholarship for young engineers to take their first cert at a minimum of one individual every quarter. He is a Former Marine and lives in Fort Worth, Texas with his two sons and wife.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Articulate Storyline
    Articulate Rise
    Articulate
    Article Writing
    Tech & IT
    Blog Content
    Cisco Meraki
    WiFi
    Content Writing
    Network Design
    Network Engineering
    Network Administration
    Network Analysis
    Wireless Communication
    Wireless Network Implementation
  • $30 hourly
    As a engineer, solution-oriented and problem-solving professional with 5 years of experience in building and maintaining web applications and server architecture, I possess a unique combination of technical expertise and strong communication and collaboration skills. My experience has taught me the importance of technical documentation, which I have become highly proficient in. I am always eager to learn more and take on new challenges, and I am particularly interested in staying up-to-date with the latest web frameworks and content management systems. I am confident in my ability to develop and implement effective solutions, and I am excited to continue building on my skills and experience in the field
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Liquid
    Shopify
    React
    Ecommerce
    Data Extraction
    Angular
    Web Development
    Web Scraping
    Node.js
    Full-Stack Development
    Automation
    MongoDB
    Back-End Development
    Python
    MySQL
    Website Security
    Security Assessment & Testing
    Vulnerability Assessment
    Kali Linux
    Security Testing
    Database Security
    Penetration Testing
  • $90 hourly
    I have over 30 certifications in the technology industry. My expertise is Small business security and network design. I Provide support for Active directory environments, network troubleshooting issues and communications, Meraki device support, Veeam, Autotask, Datto, and many others. I also provide vulnerability assessment and security audits. Certifications CISSP GCIH CompTIA A+ CompTIA Network + CompTIA Security + ISC2 SSCP ITIL Foundations ITIL Intermediate Service Operations ITIL Intermediate Service Transitions Wireshark Certified Nessus Certified Cisco CCENT Hootsuite Platform Certified Kaseya Certified Administrator Microsoft Certified Tech Specialist in Active Directory Microsoft Certified Professional in Win XP Hubspot Content Marketing Certified Hubspot Inbound Sales Certified Hubspot Inbound Marketing Certified Certified SonicWall Security Administrator
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Office 365
    Firewall
    Veeam
    VMware ESX Server
    Computer Network
    System Administration
    Cisco Meraki
    Nessus
    Data Backup
    Active Directory
    Information Security
    Network Administration
    Windows Server
    ITIL
  • $25 hourly
    ✅ As a CREST/Offensive Security (OSCP) Certified Penetration Tester and Cyber Security Consultant, I have deep knowledge of Security Assessment Methodology to identify vulnerabilities in Network, Cloud, Web, and Mobile Applications. ✅ I have conducted Penetration Test, Vulnerability Assessment and delivered professional reports to companies in the world complying with: ► CREST standards ► Offensive Security (OSCP) standards ► OWASP Top 10 Vulnerability ► OWASP API Security Top 10 Vulnerability ► OWASP Mobile Security Top 10 Vulnerability ► Application Security Verification Standard 4.0 (ASVS 4.0) ► CWE Top 25 Most Dangerous Software Errors ► ISO 27001 Penetration Testing ► Payment Card Industry Data Security Standard (PCI DSS) ► General Data Protection Regulation (GDPR) ► Common Vulnerability Scoring System (CVSS) ► Open Source Security Testing Methodology Manual (OSSTMM) ✅ I have some cybersecurity certifications including: ► CREST Registered Penetration Tester (CRT) ► CREST Practitioner Security Analyst (CPSA) ► Offensive Security Certified Professional (OSCP) ✅ The deliverable will be a professional Penetration Testing/Vulnerability Assessment report which includes: ► Executive Summary ► Assessment Methodology ► Type of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings. Each finding listed within the report will contain CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections. ► Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Netsparker, Metasploit Framework, OpenVAS, Mimikatz, SQLmap, Nikto, Zaproxy, Gobuster, etc.) ✅ Please contact me if you have any question. ✅ Thank you and have a good day!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Website Security
    Security Analysis
    System Security
    Software Testing
    White Box Testing
    Black Box Testing
    Network Penetration Testing
    Website Security
    OWASP
    Web App Penetration Testing
    Information Security
    Vulnerability Assessment
    Security Testing
    Penetration Testing
  • $999 hourly
    Computer Science Engineer/Ethical Hacker/Cyber Security Expert who has been providing security for corporate and individuals. ✌Cyber Security/Ethical Hacking - Securing mobile & Pc, running tests for vulnerabilities & server-side security (11+ experience) ✌Web development - JavaScript , Php (10+ experience) ✌App development - java , Cross-platform (7+ experience) ✌App/ Backend Development: Golang, Clojure, Scala, Ruby on Rails (5+ Experience) ✌CMS - Joomla, WordPress, Drupal (8+ experience) ✌Databases/Caches: Postgres, Redis I usually develop cross-platform and Android apps and build dynamic websites. I can develop the product very quickly and with high accuracy. I believe in customer satisfaction. U say it I develop it any language any software you need and if you want to secure your self from attacks I am always available. My work is fast and secure. *Price will vary on the complexity of the project Happy new year 2023 !!!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Information Security
    Security Engineering
    Ripple
    Bitcoin
    Internet Security
    Android App Development
    XML
    Ethical Hacking
    Cryptocurrency
    Digital Marketing
    PHP
    JavaScript
  • $35 hourly
    A cyber security enthusiast with 8 years' experience in the technology and security industry and highly skilled in python programming, technical writing and penetration testing. - I'm experienced in web application testing and security assesments - Fully versed in Python programming, Bash scripting and penetration testing
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Virtual Machine
    Malware
    Intrusion Detection System
    Ubuntu
    Python
    Microsoft Active Directory
    Bash Programming
    Linux
    Security Operation Center
    Bash
    Penetration Testing
    Technical Writing
    Kali Linux
  • $75 hourly
    ✅ Top Rated Expert ✅ 3000+ Hours ✅ Professional Penetration Tester Security researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform. For deliverables, professional reports are created,that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors. Core competency is performing black and gray box testing on live web applications/networks or lab environments. Familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of the work is confidential sample vulnerability report can be provided. Service Description 1)Web Application Penetration Testing based on OWASP TOP 10 2)Network Penetration Testing 3)Security Hardening Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python framework
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Web Application Security
    JavaScript
    Reverse Engineering
    Black Box Testing
    Security Testing
    Ethical Hacking
    Network Penetration Testing
    Network Security
    Malware
    Vulnerability Assessment
    Web App Penetration Testing
    Internet Security
    Penetration Testing
  • $75 hourly
    Current Certifications: * CCENT ( Cisco Certified Network Technician ) * CCNA (Cisco Certified Network Admin (Routing & Switching)) * CCNP (Cisco Certified Network Professional (Routing & Switching)) * CCNA-SECURITY (Cisco Certified Network Security Admin) * SECURITY+ CE (CompTIA Certified SECURITY) * CEH (Certified Ethical Hacker) I am a Sr. Network and Security Engineer (SME) with expertise in Cisco Network Engineering and Cyber Security Engineering with year of I.T. experience managing private and government enterprise networks and Cyber security Network environments for large and small businesses . I have over 18+ years total experience as a lead Sr. network engineering SME as my foundation , and 9 yrs experience in Cyber Network Security infrastructure , design, configurations, troubleshooting, Cyber threat hunting. Also upgrading enterprise networks and security infrastructures for private companies , government organizations , including large and small business Networks and information systems. These skills include SME experience in Cisco Routing and Switching, ASA Firewalls, Palo Alto, Pfsense , VPNs, F5 Load balancer, WLAN, VoIP, and Cyber Security tools and SIEMS and Network Scanning, Windows Server, and WiFi networks.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cisco CallManager
    System Configuration
    VMWare
    Firewall
    VoIP
    VPN
    Email Technical Support
    Ethical Hacking
    Cisco Certified Network Professional
    Cisco Certified Network Associate
    Cisco Router
    Cisco ASA
  • $40 hourly
    ✅ Amongst the Top 1000 hackers worldwide Web Pentesting | Mobile App Pentesting | API Pentesting | Vulnerability Assessment | Python & Bash Automation I work with companies to make their digital assets secure and provide solutions to enhance their security parameters. I create cybersecurity content on hackingloops.com explaining the practicalities and how-tos of the vulnerability and exploitation Part-time bug bounty hunter at Bugcrowd & Intigriti. Feel free to contact me for your queries and security-related issues.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Network Penetration Testing
    Python
    Security Analysis
    Malware
    Website Security
    Mobile App Testing
    Security Engineering
    WordPress
    Cloud Security
    Network Security
    Penetration Testing
    Security Assessment & Testing
    Cybersecurity Management
    Malware Removal
    Firewall
    Information Security
    Vulnerability Assessment
    Information Security Consultation
  • $39 hourly
    I am OSCP Certified with 6+ years of professional experience in different trade crafts of pentesting and red teaming. Challenges make me work more efficiently and what is a better challenge than doing penetration testing in which knowledge and experience is the main factor to successfully finding a way inside Targets. - Manual testing approaches with real-impact vulnerabilities - Exposure to multinational companies and Swiss banks - Industry-renowned certifications (OSCP - eWPTXv2 - CEH - CPTE - CEI - CCNA) - "Find my way in" mentality therefore 80% of projects ends up in successful breaches Key Skills for Pentesting Jobs ---------------------------------- Web Applications Pentesting Network Pentesting REST API/SOAP Pentesting Mobile Applications Pentesting Desktop Applications Pentesting Source Code Reviews Active Directory Assessment Key Skills for Offensive Jobs --------------------------------- Email Phishing (Maldoc or stats based) Social Engineering Assume Breach Scenarios MITRE ATT&CK framework Simulations Tactics, Techniques, and Procedures Testing against patched Infra Malware Development
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Black Box Testing
    Information Security
    Vulnerability Assessment
    System Security
    Application Security
    Network Security
    Information Security Consultation
    Cloud Security
    Penetration Testing
    Web App Penetration Testing
    Network Penetration Testing
    Web Application Security
    Ethical Hacking
    Security Testing
    Mobile App Testing
  • $35 hourly
    A motivated Cloud Engineer and cyber-security professional with diversified expertise and 4+ years of work experience in Information security, capable of quickly adapting of advance environments, 🌟AZURE Cloud Skills Set: • Implementation of role-based access control (RBAC) for Azure resources. • Integration of Azure Active Directory with on-premises directories. • Utilization of Azure AD Privileged Identity Management (PIM). • Configuration of Azure Security Center for threat detection and response. • Utilization of security policies, recommendations, and threat intelligence. • Deployment and configuration of Azure Sentinel for advanced threat detection and analysis. • Integration of data sources and creation of custom alerts and dashboards. • Understanding and utilization of threat intelligence feeds and sources. • Incorporation of threat intelligence into security practices for proactive defense. • Implementation of network security groups (NSGs) for network traffic filtering. • Utilization of Azure Firewall for application-layer protection. • Configuration of Azure DDoS Protection to safeguard against distributed denial-of-service attacks. • Configuration of Azure Disk Encryption for data at rest. • Use of Azure Key Vault for key and secret management. • Implementation of Azure Policy for governance and compliance. • Enforcement of security baselines using Azure Policy. • Setup and configuration of Azure Monitor for security logging and auditing. • Integration of Azure Monitor with Security Information and Event Management (SIEM) solutions. • Implementation of Azure MFA to enhance authentication security. • Utilization of Azure Advanced Threat Protection for detecting and investigating advanced threats. • Establishment of security incident response plans and procedures. • Utilization of Azure Security Center for incident investigation and response. • Implementation of compliance standards using Azure Blueprints. • Utilization of Azure Policy for ensuring compliance with security requirements. • Conducting threat modeling exercises to identify potential vulnerabilities. • Performing risk assessments for Azure environments and applications. • Utilization of Azure Security Center and Azure Sentinel for continuous security monitoring. • Proactive identification of security threats and vulnerabilities. • Adherence to Azure security best practices and guidelines. • Stay updated with the latest security features and improvements in Azure. 🌟AWS Cloud Skills set: • Creation of IAM Users, Groups, Roles, cross-account assume roles, Policies and fine-grained access control • EC2, Bastion Host, and Security Groups • S3 buckets, bucket policies, and triggers, cross-account bucket access • Lambda, serverless computing, lambda packages, and deployment • ECS clusters, tasks definitions, services, ECS fargate • CloudFormation templates, stack creation, and updating • Creation of VPC, Subnets, Routes tables, NACL, NAT gateways, internet gateways, VPC Endpoints, and peering • RDS clusters and instance creation, schema deployment into RDS • CloudWatch metrics, events, rules, and alarms • SNS notifications, topics, and subscription • SQS queues creation and trigger policies • Auto Scaling with simple and step scaling policies • Creation of Elastic, Application, and Network Load Balancers and end-to-end secure communication with SSL certificates • Code Pipeline, Code Commit, Code Build, Code Deploy 🌟Hands on Experience of managing on below SIEM technologies for monitoring, development of use-cases: ✔IBM QRadar, ✔Azure Sentinel ✔ArcSight, ✔Elastic Search ✔Wazuh 🌟 Hands on Experience of managing, Deployment, and monitoring Microsoft XDR technology and identify advance attacks. I specialize in optimizing Microsoft Azure tools: 🌟 Azure Sentinel for advanced SOC management and threat detection 🌟 Azure Security Center for unified security and compliance 🌟 Azure Advanced Threat Protection for targeted attack prevention 🌟 Azure Network Watcher for network traffic monitoring and anomaly detection 🌟 Azure Monitor for advanced security event analytics 🌟 Azure AD Identity Protection for user identity security 🌟 Azure Information Protection for data classification and encryption 🌟Microsoft Defender for Endpoint 🌟Microsoft Defender for Cloud
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Microsoft Azure
    Azure DevOps
    Azure Service Fabric
    Cloud Computing
    Linux
    DevOps
    OpenStack
    Kibana
    Kubernetes
    Penetration Testing
    Elasticsearch
    Technical Support
    Information Security
    Docker
    Network Security
  • $35 hourly
    Certifications that I hold: CEH ( Certified Ethical Hacker) 740 MCSA ( Installation, Storage and Compute with Windows Server 2016) To whom it may concern, In the last years I did more than 400 Penetration Tests and Security Assessments. Most of them on Web and Mobile ( Android and iOS ) applications with Finance Background implemented with various technologies and frameworks, server security testing and hardening. Sample reports can be provided who is interested. ___________________________________________________________ Professional Load and Stress Testing if you are interested for your application ___________________________________________________________ Migration of infrastructure among cloud solutions ( AWS , Azure , Office 365, Google cloud). Many of you struggle to shift your infrastructure from On-premise to Azure , AWS ( amazon) or vice versa , I can do it in a short time frame with zero downtime if there is a possibility. And offer you support as long as you and your team are self reliable on new infrastructure. Regarding Windows Server Services ,I am focused on Microsoft enterprise-driven solutions: Windows Server( Active directory,IIS ,DNS, DHCP ,WDS , Hyper-V, Backup, Exchange, RPD farming) Expert troubleshoot Server Hardening and securing Windows and Linux servers. Monitoring software setup ( PRTG Paesler ,Nagious , Zabbix) Keen on Deadlines, fair on doing business together always ready to negotiate price
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Security Engineering
    Web Application Security
    Internet Security
    NIST SP 800-53
    Windows Server
    OWASP
    Ethical Hacking
    Manual Testing
    Security Infrastructure
    Network Security
    Penetration Testing
    Application Security
    Kali Linux
    Vulnerability Assessment
    Security Assessment & Testing
  • $30 hourly
    Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP​ 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is our key differentiator. Please check my Upwork work history and client feedbacks. I look forward to hearing from you!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Network Security
    Information Security Audit
    Security Testing
    OWASP
    Information Security
    Web Application Security
    Website Security
    Vulnerability Assessment
    Penetration Testing
    Certified Information Systems Security Professional
  • $25 hourly
    I have a big passion in IT Infrastructure and IT Security, I certified with QRadar Administration, Cyber Threat Intelligence Analyst and Incident Handling, I was L3 Threat Analyst and SIEM Admin in Security Operation Center of my Project and I also lead competency Cyber Security at multinational company. I was handling Incident Response for some of another Project when there is threat attacker such like phishing or malware, and do Security Awareness after that. Right now, I was handling the development of process and procedure for my new project in my new company. I'm certified with : AWS Cloud Practitioner Credential ID : 371898230 CEH v10 Credential ID : ECC7498650312 EC Council Certified Incident Handler (ECIH) Credential ID : ECC0159827346 EC Council Cyber Threat Intelligence Analyst Credential ID : ECC3710568294 Cisco Certified Network Associate Routing & Switching Credential ID : 433454169301IMAI
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Incident Response Plan
    Security Analysis
  • $40 hourly
    High-Quality Delivery on Time and Budget. If you are looking for а bug-free app - you’re on the right way! ⬇️ ⭐️ 7+ years proven track record (Manual and Automation testing) ⭐️ Solid experience with web, mobile (iOS & Android) and desktop applications testing for wholesale platforms, B2B transportation systems, activity control systems based on the location, WiFi monitors, apps for builders, tables reservation apps, desktop apps, business educational web & mobile apps, printers management admin portals, travel websites ⭐️ Testing tools: Hiptest and TestRail, Database: JetBrains gatagrip, phpMyAdmin, pgadmin, firebug,form filler,Chrome Developer Tool, Avocode, pixelperfect, Genymotion, litmus, JMeter, browserstack, redux devtools, API automation testing using Swagger, Postman, Mobile testing: Xcode, android studio ⭐️ Segments: FinTech, Logistics, ERP, Social Media, Travel ⭐️ I’ll find and prioritize all bugs and your clients won’t face any issues after the release Proud of delivering 20+ projects, which stood out for discernible achievements: 📍 Blockchain crypto banking with 50,000 active users 📍 SaaS platform that powering intranets for over 47% of UK Government Civil Servants (90,000 users) 📍 Traders platform - cloud based platform that uses blockchain technology and Machine Learning; co-founded by the Horizon 2020 programme of the EU 📍 Juices delivery apps with 70K monthly visitors
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    React
    MongoDB
    REST
    Meteor
    React Native
    Google Chrome Extension
    Node.js
    Ionic Framework
    JavaScript
    AngularJS
  • $125 hourly
    AWS architecture and implementation, DevSec(Ops), SDN, Windows/Linux systems administration, ESXi/VMware builds/upgrades, root-cause analysis on infrastructure including networks, enterprise endpoint product test and eval, test case builds. Selective experience working through NIST/CMMC security controls and documentation. Throughout my 15 years I've seen and touched almost everything. Very efficient, communicative and thorough.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cybersecurity Management
    Solution Architecture
    Cloud Engineering Consultation
    Systems Engineering
    Network Design
    Network Security
    Infrastructure Management
    Information Security
    VMware Administration
    Security Engineering
    DNS
    Microsoft Azure
    Server Virtualization
    Amazon Web Services
    Microsoft Active Directory
  • $125 hourly
    Unconventional Solutions, Uncommon Results. A study from the National Cybersecurity Alliance shows that 20% of businesses with less than 100 employees will experience a cyber attack each year and that 60% of those businesses fail within 6 months of the attack. Preparation is key, identify your critical assets, secure those assets, monitor/alert/and respond to incidents when they occur, including having a response plan. Chances are if it hasn't happened to you, it will or it already has happened and you just don't know. My goal is to bring the experience and skills acquired over 23 years working for large organizations to the entrepreneur community in an attempt to reduce the statistics above at a price point that is approachable to those impacted businesses. Common Services: Malicious Email/File/URL analysis - Did you get a phishing email with a link or attachment and not sure if it is legitimate, then this service is what you want. Surprisingly, this is my most often requested service. This service includes analyzing files(exe, office files, zip files, or pdf), email, or URLs to determine if it is malicious and what happens if the file is run or the url is visited. The service includes executing the file/url in a sandbox, review OSINT on the file using tools like virustotal, as well as use reversing techniques on the file. Email headers will be reviewed to determine origin and intent. If you clicked the link or opened the attachment, then you might need the next level of service, Incident Response. Website Malicious Content Removal - Once an attacker finds a vulnerability and exploits that to gain access to your website they sometimes deface your website, sometimes gain access to the data, put malicious code in your pages to impact your users, but always give themselves a way back in. Our job is to not only find and remove the malicious content but determine how it got there and how to prevent it from reoccurring. Security Consulting - Make sure you have the proper controls in place, including logging, to reduce the risk but also make sure you can detect and recover from an incident in a timely manner. Get some peace of mind on questions like are my backups safe in the event of a ransomware attack. Has my system already been breached? How would I know if my system is breached? A vulnerability assessment is a rather quick process to identify known security issues like missing patches or common misconfigurations. These are identified through an automated scan, but the most notable point of a vulnerability assessment is that the vulnerabilities are not verified, it is assumed that if the system is missing the patch, it is at risk. This type of test is usually quicker and cheaper and gets 75% of the “low hanging fruit”. A penetration test takes this a bit further beyond just identification but actually tries to exploit the vulnerability to validate risk. A penetration test also goes a bit further as it might also test weaknesses in good configurations, processes, and implementations, items that can not be scanned automatically. A pentest usually also contains a vulnerability scan as part of the process, usually takes longer, and costs a bit more. Application Testing/Fuzzing and 0 day exploit development - The purpose of testing an application using techniques like fuzzing, is to ensure that the application can handle different types and lengths of unexpected input without crashing as well as testing to see if application handles the exceptions properly. If the fuzzing process has identified a crash based on unexpected input, it might be possible to develop an exploit that allows an attacker access to the system or perform some other nefarious activity. An exploit that has not been disclosed publicly but is actively being exploited in the world is known as a 0 day exploit. Having this type of test performed on your applications before release, can go a long way to reducing the risk of an attacker finding it and using it to attack your clients. Web application testing is the process of not just testing the application itself against vulnerabilities like cross site scripting, cross site request forgery, or sql injection among others, but the entire web application infrastructure including the framework used like Rails or Spring MVC, the server OS (Linux/Windows), the web server software (IIS, Apache, Web Logic), the language used (PHP, ASP.Net), any middle tier applications, and the databases on the back end. A vulnerability scan is generally also part of this type of test.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Malware Removal
    Metasploit
    Application Security
    Information Security Consultation
    Security Engineering
    WordPress
    Malware
    Microsoft Office 365
    DNS
    Azure
    Penetration Testing
    Security Analysis
    Active Directory
    Vulnerability Assessment
    Digital Forensics
  • $35 hourly
    AWS Solutions Architect with a profound knowledge in cyber security and networking. Helping you migrate, architect, and/or store your business or personal resources in the AWS cloud securely and efficiently!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cloud Computing
    Amazon EC2
    Linux System Administration
    Firewall
    Network Administration
    Web Hosting
    Cloud Migration
    Cloud Security
    Network Design
    Cloud Architecture
    Technical Support
    Email Deliverability
    VPN
    DNS
    System Administration
  • $25 hourly
    Cyber security / Data Protection / Ethical hacking expert with 18+ years of experience. Certifications include - CISSP, CEH, ECSA, CIPP/E, CIPP/US, CIPT, FIP, ISO27001 LA/LI and many others. Assisted many clients on Penetration testing projects, Wordpress hacks, Vulnerability assessment, Mobile application testing, Data Protection compliance, Privacy audits, PIAs, DPIAs, Privacy policies, Data discovery, ISO 27001, NIST etc. Assisted many clients with Security architecture. Assisted many clients with ISO27001 certification across countries. Expert in Vulnerability assessment and Penetration testing of network, websites and mobile applications. As Director in PwC for over 7 years I have managed large national critical projects and their Vulnerability management. Complexity of clients included upto 10000 devices, 200 applications, more than 20 mobile apps etc. I am very confident of my capabilities and would leverage my 18 years of total experience to provide a great value add to your company.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Data Privacy
    Privacy Law
    Cybersecurity Management
    Cybersecurity Management
    ISO 27001
    Data Protection
    Penetration Testing
    Vulnerability Assessment
    Network Penetration Testing
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job (it’s free)

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Wireshark Developer on Upwork?

You can hire a Wireshark Developer on Upwork in four simple steps:

  • Create a job post tailored to your Wireshark Developer project scope. We’ll walk you through the process step by step.
  • Browse top Wireshark Developer talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Wireshark Developer profiles and interview.
  • Hire the right Wireshark Developer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Wireshark Developer?

Rates charged by Wireshark Developers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Wireshark Developer on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Wireshark Developers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Wireshark Developer team you need to succeed.

Can I hire a Wireshark Developer within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Wireshark Developer proposals within 24 hours of posting a job description.

Schedule a call