Hire the best Wireshark developers

Check out Wireshark developers with the skills you need for your next job.
Clients rate Wireshark developers
Rating is 4.7 out of 5.
4.7/5
based on 105 client reviews
  • $45 hourly
    My experience in the VOIP domain has been for 15 years. My customer satisfaction is my goal. I have extensive experience with Asterisk/Kamailio systems, as well as Linux and network administration. I have the ability to do advanced troubleshooting . My expertise on this: * Asterisk, Kamailio, OpenSips, FreePBX, A2billing, SIP, H323, IAX, Webrtc, hylafax, Asterisk-Pannel, iaxmodem, rtpproxy, MediaProxy, WebRTC, SipML5, SMS API, IVR (Interactive Voice Record),Wireshark * IP routing, router configuration (cisco, iptables routing), switch, Vlan, VPN (Ipsec linux, cisco vpn, fortigate, OpenFire). * Fail2ban, Iptables, OpenSwan, Squid, Cisco FirePower, Vmware, Proxmox * Php, Mysql, Postgresql, sqlite, Mongodb, Bash , LUA , Java, AGI, AMI * Roundcube, Zimbra, Zabbix, Smokeping, munin, Nagios, Cisco NetFlow, Voipmonitor * Git, Ansible, bitbuket, atlassian My time is my value. So when you choosing me you can expect that job will be done in short terms and perfect. I don't like to do something that not need be done. @linkedin linkedincom/in/alaeddine-hertelli/ SKYP:alasupcom1
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    OpenSIPS
    FreePBX
    PostgreSQL
    Asterisk
    Session Initiation Protocol
    Kamailio
    Vtiger
    Iptables
    MySQL
    Bash Programming
    PHP
    Network Engineering
    Linux
    VoIP
  • $35 hourly
    Technology Professional with experience in Data Center, Infrastructure and Network management. Specializing in the administration of Windows Server and Linux operating systems; VMWare vSphere and Hyper-V virtualization systems; And extensive knowledge in Networking, Active Directory, GPO, IIS, DNS, Microsoft Exchange, among others
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Security Infrastructure
    Ubiquiti
    Network Equipment
    Network Planning
    Network Security
    Iptables
    Network Design
    Firewall
    LAMP Administration
    Cisco Certified Network Associate
    PfSense
    Wireless Network Implementation
    Microsoft Exchange Server
    Windows Server
  • $20 hourly
    I am an experienced Automation Engineer with over four years of experience in Web Scraping, Process Automation, and API Integration. As a Top-Rated Freelancer on Upwork, I have designed and developed numerous automation solutions tailored to streamline workflows and deliver actionable insights. I am passionate about offering affordable and effective web scraping services, leveraging various tools and technologies such as: Selenium ✅ Requests ✅ Scrapy ✅ BeautifulSoup (bs4) ✅ JSON, CSV ✅ Beyond scraping, I specialize in building and automating workflows using platforms like Retool and n8n, ensuring smooth client process management. Technical Proficiency: I am proficient in multiple programming languages and frameworks: Python (Advanced) ✅ C/C++ ✅ JavaScript, HTML/CSS ✅ Rust (Basic) ✅ SQL, Linux (Intermediate) ✅ Additionally, I have a solid foundation in Object-Oriented Programming and regularly apply these principles in my projects. I have completed internships and certifications that sharpened my skills in cybersecurity and data science. Recently, I’ve worked on projects involving penetration testing and security auditing, adding an extra layer of value to my offerings. Certifications: (ISC)² Certified in Cybersecurity (CC) (2024) Google Cybersecurity Certificate (2023) Upwork Skill Certification - Python Development (2024) I am committed to helping businesses automate their workflows and enhance data extraction processes efficiently. If you're looking for a professional who can deliver high-quality web scraping and automation solutions, feel free to reach out!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Data Extraction
    JavaScript
    ETL
    Splunk
    SQL
    Object-Oriented Programming
    Automation
    Python
    Data Scraping
    Web Scraping
    C++
    HTML
  • $15 hourly
    I have 15 year's experience as a Website/Software Senior QA Manager/Engineer in the I.T. Industries and gained a set of skills specifically for development and Quality Assurance. I already have experience working on a Saas platform, E-commerce, Dynamic website, One-pager, Wordpress, and Mobile application. I can create different test plans and test cases adapting to different kinds of projects. I like working directly with the client so I can easily understand the business workflow and can easily adapt to their existing process and will work with minimal supervision with intact quality in mind. Thank you for taking your time and I am looking forward to working with you. What my skills covers: ● Performance testing. ● Exploratory testing ● Cross-browser testing ● Game Testing ● Software & App Testing ● Manual Testing ● Mobile App Testing ● Accessibility Testing ● Stress and Load Testing ● Functional QA ● Regression testing ● Upgrade and continuity testing ● Issue reproduction
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cryptocurrency
    Automation
    Laravel
    Software QA
    PHP
    Mobile Development Framework
    Figma
    React
    Load Testing
    Black Box Testing
    Business with 10-99 Employees
    Performance Testing
    Regression Testing
  • $100 hourly
    Hello, I am a dedicated professional with extensive experience in Cyber Investigations, Cyber Intelligence, Cyber Operations, Cybersecurity, and Information Security. I excel in implementing effective security strategies and mitigating potential cyber threats. My expertise lies in detecting, investigating, and mitigating cyber threats while providing strategic insights to enhance organizational cyber defense capabilities. My Expertise are; ✅ Dark Web Cyber Threat Intelligence, Fraud Investigation, Criminal Profiling, Company OSINT Investigations ✅ Malware Reverse Engineering and Disassembly ✅ WordPress Malware Removal & Hacked Website Recovery ✅ Digital Forensics (Data Recovery and Analysis, Mobile Device Forensics (iPhone & Android), Network Forensics, Email Header Analysis) ✅ Network Security: Firewall (pfsense,), IDS/IPS (Snort and Suricata), OpenVPN Access Server, SIEM (Wazuh), Web Proxy (Squid) ✅ Cyber Security Articles: Technical Writing, Blog Writing, Article Writing, Research Reports, Scientific Reports, ebooks, and Blogs (Fluent in American or British English) ✅ Pcap File Analysis (Wireshark, Network Miner, Wireedit, Scapy, ParserCap) ✅ Phishing Simulation, Red Team Operations, Exploit Development I currently hold the following certifications: ➡ Certified Ethical Hacking ➡ Certified Penetration Tester and Bug Bounty Hunter ➡ Autopsy Digital Forensics ➡ Cyber Triage Digital Forensics Incidence Response My vision is to safeguard the world against cyber threats by providing innovative and robust cybersecurity solutions.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Snort
    Information Security
    Ethical Hacking
    Network Analysis
    PfSense
    Kali Linux
    Website Security
    Digital Forensics
    Computer Network
    Network Security
    Intrusion Detection System
    Information Technology
    Intrusion Prevention System
    Technical Writing
  • $23 hourly
    I have 12 years experience in the field except my degree on computer engineering. Beside that I have many certification about my field.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Multiprotocol BGP
    NPS
    OSPF
    Kali Linux
    TCP/IP
    Cisco Router
    RADIUS
    Penetration Testing
    Web Testing
    PHP
    Network Engineering
    Computer Network
    Python
    System Administration
  • $51 hourly
    ✅ Top-Rated Cybersecurity Expert 💼 8+ Years in Bug Bounty & Pen-testing 🔐 Recognized by 200+ Organizations 🏆 Top 31 on Bugcrowd 🎯 Specializing in Web, Mobile & API Security Testing ⌚ Supporting All Time Zones Are you seeking a battle-tested cybersecurity expert to fortify your digital assets? With over 8 years of professional experience I have a proven track record in uncovering and reporting vulnerabilities for tech giants such as Apple, Google, Microsoft, The U.S. Department of Defense & The Government of Singapore. As an active Bug Bounty Hunter ranked on platforms like HackerOne and Bugcrowd, I bring a wealth of real-world experience to every engagement. 💬 Why Choose Me? 🔒 Extensive Experience: I've identified and responsibly disclosed hundreds of security flaws across diverse platforms, from startups to Fortune 500 companies. 🔍 Comprehensive Security Services: • Web and Mobile Application Penetration Testing • API Security Assessments • Network Vulnerability Scanning • Bug Bounty Program Consultation • Security Awareness Training • Detailed Reporting with Actionable Remediation Steps 🔑 Personalized Service: Every project is unique. I tailor my approach based on your Application/Network and security requirements. 📞 Clear Communication: From initial scoping to final debriefing, I offer detailed reports, regular meetings, and follow-up services to ensure all your concerns are addressed. Let’s secure your Applications together ---- Reach out for a consultation!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Security Management
    Web App Penetration Testing
    Security Analysis
    Security Engineering
    Website Security
    Information Security Audit
    Web Application Security
    Ethical Hacking
    Network Penetration Testing
    OWASP
    Vulnerability Assessment
    Information Security Consultation
    Penetration Testing
  • $50 hourly
    As a seasoned Penetration Tester, I have a proven track record of conducting and leading successful security audits, web application penetration tests, and red team engagements for a diverse range of clients. My experience ranges from working with multinational corporations with large-scale infrastructures to smaller companies seeking enhanced security measures for competitive advantage. As a security engineer, my day-to-day responsibilities revolve around leveraging my expertise in penetration testing, cyber security, and vulnerability assessment to identify and mitigate potential vulnerabilities. Through these experiences, I have comprehensively understood the prevailing technology stacks employed worldwide, allowing me to discern their security weaknesses with precision. ✅No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined. Working with me, you will: ★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ★ Complete manual testing for your application and immediate notification if any high-impact issues are found. ★ Unlimited retesting for the fixed issues and unlimited revisions ★ Able to find critical bug classes that are often missed by automated pentests. Penetration Testing and Vulnerability Assessment Tools: Manual Testing: Burpsuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), C2 Framework, SQLmap, OWASP ZAP . Automated Testing: Acunetix, Nessus, Netsparker,Invicti Professional etc. Penetration testing service: 1. Penetration Testing Engagement: thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing. Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus. 2. Professional Report and Statistics: A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact. 3. Remediation Advice and Guidance: Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities. 4. Asset Discovery: Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery. 5. Free Retest: Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended. 6. OSINT Reconnaissance: gathering all valuable data about the company available on the internet, including any breached email addresses and related passwords available in cleartext on the internet. 7. Briefing and debriefing: Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required. Calls or meetings are available after the penetration test is completed to discuss the results of the engagement, the main issues and concerns regarding the security of the company, and any further clarification regarding any vulnerability and the associated impact or risk. ✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes: ► Executive Summary ► Assessment Methodology ► Types of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings Each finding listed within the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections. ► Retest for issues (The vulnerabilities will be retested after they're fixed; multiple retests can be done to ensure the issues are remediated.)
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Security Management
    Mobile App Testing
    Network Penetration Testing
    Ethical Hacking
    Web App Penetration Testing
    Security Testing
    Nessus
    Penetration Testing
    Security Assessment & Testing
    Database Security
    Vulnerability Assessment
    Application Security
    Metasploit
  • $20 hourly
    Cybersecurity Specialist with more than 2 years experience in SOC services, incident response, and threat intelligence. My expertise spans across various SIEM platforms, including Microsoft Sentinel and LogRhythm, as well as EDR solutions like CrowdStrike and Microsoft Defender for Endpoint and Cloud. I also have a keen interest in website security and development, whether it is advising on how to improve security or performing a penetration test. I have experience with SOC, Incident Response, SOAR, EDR, XDR, DLP, Threat Intelligence, Vulnerability Assessment and Cloudsecurity. Utilising Microsoft Sentinel, LogRyhthm, SentinelOne, Defender for Endpoint. I have experience in investigating phishing emails, conducting phishing campaigns using GoPhish, and performing OSINT (Open-source intelligence) on domains and individuals, utilising different OSINT tools and techniques. Utilizing sandbox environments to analyze and investigate suspicious attachments and URLs. I also hold certifications in 3 Microsoft Certification which are active: - Microsoft Certified: Azure Security Engineer Associate - Microsoft Certified: Security Operations Analyst Associate - Microsoft 365 Certified: Security Administrator Associate Currently learning automation and setting up SIEM services for clients who want to monitor their infrastructure using Sentinel.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Office 365
    Microsoft Azure
    Cisco Certified Network Associate
    ISO 27001
    Python
    Penetration Testing
    Security Analysis
    Data Protection
    Information Security Audit
    Linux
    Computer Network
    Network Security
    Technical Writing
    Information Technology
  • $39 hourly
    I am OSCP and CRTO Certified with 8 years of professional experience in different pentesting and red teaming trade crafts. Challenges make me work more efficiently. What is a better challenge than doing penetration testing in which knowledge and experience are the main factors to successfully finding a way inside Targets? - Manual testing approaches with real-impact vulnerabilities - Exposure to multinational companies and Swiss banks - Industry-renowned certifications (OSCP - CRTO - eWPTXv2 - CMSE - CPTE - CEI - CCNA) - "Find my way in" mentality therefore 80% of projects end up in successful breaches Key Skills for Pentesting Jobs ---------------------------------- Web Applications Pentesting Network Pentesting REST API/SOAP Pentesting Mobile Applications Pentesting Desktop Applications Pentesting Source Code Reviews Active Directory Assessment Key Skills for Offensive Jobs --------------------------------- Email Phishing (Maldoc or stats based) Social Engineering Assume Breach Scenarios MITRE ATT&CK framework Simulations Tactics, Techniques, and Procedures Testing against patched Infra Malware Development
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Black Box Testing
    Information Security
    Vulnerability Assessment
    System Security
    Application Security
    Network Security
    Information Security Consultation
    Cloud Security
    Penetration Testing
    Web App Penetration Testing
    Network Penetration Testing
    Web Application Security
    Ethical Hacking
    Security Testing
    Mobile App Testing
  • $30 hourly
    With hands-on experience in penetration testing, I specialize in network, systems, mobile applications, APIs, and web application security. My focus is on identifying and mitigating vulnerabilities to ensure robust and secure systems. Beyond my professional work, I actively explore malware analysis and digital forensics, staying updated on the latest techniques used by APT groups. I’m also passionate about CTF events, where I’ve earned top positions in national and international competitions. If you’re looking for expert advice on securing your systems or want a thorough security assessment based on the best industry practices, I’m here to help. Let’s work together to make the internet a safer place!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Malware Removal
    Web App Penetration Testing
    Information Security
    Nessus
    Metasploit
    Network Security
    Penetration Testing
    Kali Linux
    Python
    Internet Security
    Network Penetration Testing
    Linux
    Vulnerability Assessment
    Digital Forensics
  • $27 hourly
    Dear job posters, I am highly skilled mobile core network architecture and testing engineer with proven experience working with several highly ranked companies in this domain (like Microsoft, Nokia, Siemens, ...). I have been working in designing 4G and 5G networks, creating the network diagrams and LAB environments, testing and troubleshooting end-to-end communication. Have experience with root cause analysis with the tool like Wireshark. I like to teach others to the new technologies (like 5G), as I worked as technical trainer and online course developer with Articulate tool. My experience with Azure cloud is at sufficient level to help in your journey with different Azure products. I am fast learner and ready to accept new challenges and expand my knowledge further. That for sure will not cost you, but will be counting as my personal development. In networking domain, I am dealing with router configuration and troubleshooting, many different appliances and virtual network functions running on virtual infrastructure, analysing the protocols like TCP/IP, GTP, Diameter (Gx/Gy), Radius, ... and network elements: SGSN, GGSN, MME, SGW, PGW, PCRF, DNS, PCEF/DPI, PCRF, load balancers, firewalls, proxy servers, routers, L2/L3 switches I use Microsoft tools in my daily work: Visio for network diagrams creation, Word for documentation or Excel for different calculations. I can support you also in Data entries jobs or many different virtual assistant roles at professional level. Microservices, Kubernetes, Cloud Native and Service Based Architecture are additional domains of my interest. I am also flexible to get involved in other interesting opportunities on this platform, which I believe that are suitable for my profile. So do not be surprised if I apply for the jobs which do not fit completely with my background but are doable considering my experience. Do not hesitate to reach me if you have a need for my expertise. I hope there will be projects soon which I can publish in my profile. Stay tuned.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Network Security
    Serbian
    Teaching
    Course Creation
    Manual Testing
    Microsoft Office
    Virtual Assistance
    Network Administration
    Data Entry
    Tech & IT
    Cloud Architecture
    Kubernetes
    Computing & Networking
    Microsoft Azure
  • $98 hourly
    Current Certifications: * CCENT ( Cisco Certified Network Technician ) * CCNA (Cisco Certified Network Admin (Routing & Switching)) * CCNP (Cisco Certified Network Professional (Routing & Switching)) * CCNA-SECURITY (Cisco Certified Network Security Admin) * SECURITY+ CE (CompTIA Certified SECURITY) * CEH (Certified Ethical Hacker) I am a Sr. Network and Security Engineer (SME) with expertise in Cisco Network Engineering and Cyber Security Engineering with year of I.T. experience managing private and government enterprise networks and Cyber security Network environments for large and small businesses . I have over 18+ years total experience as a lead Sr. network engineering SME as my foundation , and 9 yrs experience in Cyber Network Security infrastructure , design, configurations, troubleshooting, Cyber threat hunting. Also upgrading enterprise networks and security infrastructures for private companies , government organizations , including large and small business Networks and information systems. These skills include SME experience in Cisco Routing and Switching, ASA Firewalls, Palo Alto, Pfsense , VPNs, F5 Load balancer, WLAN, VoIP, and Cyber Security tools and SIEMS and Network Scanning, Windows Server, and WiFi networks.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    VMWare
    Cisco CallManager
    System Configuration
    VoIP
    Ethical Hacking
    Cisco Certified Network Professional
    Cisco Certified Network Associate
    Cisco Router
    Cisco ASA
    VPN
    Firewall
  • $40 hourly
    ✅ Amongst the Top 1000 hackers worldwide Web Pentesting | Mobile App Pentesting | API Pentesting | Vulnerability Assessment | Python & Bash Automation I work with companies to make their digital assets secure and provide solutions to enhance their security parameters. I create cybersecurity content on hackingloops.com explaining the practicalities and how-tos of the vulnerability and exploitation Part-time bug bounty hunter at Bugcrowd & Intigriti. Feel free to contact me for your queries and security-related issues.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Code Review
    Python
    Security Analysis
    Website Security
    Mobile App Testing
    Security Engineering
    Cloud Security
    Network Security
    Penetration Testing
    Security Assessment & Testing
    Cybersecurity Management
    Malware Removal
    Information Security
    Vulnerability Assessment
    Information Security Consultation
  • $75 hourly
    ✅ Top Rated Plus Expert ✅ 3000+ Hours ✅ Professional Penetration Tester Cybersecurity researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform. For deliverables, professional reports are created, that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors. Core competency is performing black and gray box testing on live web applications/networks or lab environments. Familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of the work is confidential sample vulnerability report can be provided. Service Description 1)Web Application Penetration Testing based on OWASP TOP 10 2)Network Penetration Testing 3)Security Hardening Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python framework
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Web Application Security
    JavaScript
    Reverse Engineering
    Black Box Testing
    Ethical Hacking
    Web App Penetration Testing
    Network Penetration Testing
    Internet Security
    Security Testing
    Network Security
    Penetration Testing
    Vulnerability Assessment
  • $30 hourly
    Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP​ 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is our key differentiator. Please check my Upwork work history and client feedbacks. I look forward to hearing from you!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Website Security
    OWASP
    Web Application Security
    Information Security Audit
    Certified Information Systems Security Professional
    Information Security
    Vulnerability Assessment
    Security Testing
    Network Security
    Penetration Testing
  • $30 hourly
    Do You Know Where You’re Vulnerable? Cyber threats evolve daily—are your defenses keeping up? As a Certified Penetration Testing Specialist (CPTS) with 4+ years of experience, I’ve helped businesses uncover hidden vulnerabilities before attackers could. Using industry-standard tools like Burp Suite Pro, Metasploit, OWASP ZAP, Nessus, and Wireshark, I go beyond surface-level assessments to deliver in-depth security insights. My approach aligns with frameworks like OWASP, CVSS, and NIST, ensuring compliance while strengthening your systems against sophisticated attacks. Your Security Questions, Answered ☞ Could hidden vulnerabilities expose your business to costly breaches? ☞ Is your API, cloud, or web application security ready for today’s threats? ☞ Are your defenses built to adapt as cyber threats evolve? My Specialized Services: ✨ Penetration Testing: Black Box, Gray Box, White Box ✨ API Security Testing: REST, SOAP, GraphQL ✨ Web Application Security: OWASP Compliance & Beyond ✨ Cloud Security: AWS, Azure, GCP ✨ Social Engineering Simulations: Phishing Awareness Training ✨ Mobile Security Testing: iOS, Android ✨ Network & Wireless Testing ✨ Source Code Reviews: Secure Development Practices ✨ CI/CD Pipeline Security: DevSecOps Integration What Sets Me Apart? ✅ Certified Expertise: CPTS-certified and skilled in finding vulnerabilities most overlook. ✅ Advanced Tools & Methods: Proficient with Burp Suite Pro, Nessus, Wireshark, Metasploit, and more. ✅ Proven Success: Delivered 32+ international penetration tests with a consistent 5-star satisfaction rate. ✅ Long-Term Assurance: Includes 90 days of free retesting to ensure your defenses remain strong. What You’ll Receive: ✅ Actionable Reports: Comprehensive findings with practical remediation steps. ✅ Future-Ready Security: Defenses tailored to combat emerging threats. ✅ Responsive Support: Fast, direct communication for all your needs. Click “Hire Me ✅” now to protect your business, uncover vulnerabilities, and achieve peace of mind. Let’s build a safer future for your digital assets!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cyber Threat Intelligence
    Ethical Hacking
    Nessus
    OWASP
    Kali Linux
    Security Assessment & Testing
    Cloud Security
    Application Security
    Web App Penetration Testing
    Web Application Security
    Security Testing
    Information Security
    Network Security
    Vulnerability Assessment
    Penetration Testing
  • $25 hourly
    I have a big passion in IT Infrastructure and IT Security, I certified with QRadar Administration, Cyber Threat Intelligence Analyst and Incident Handling, I was L3 Threat Analyst and SIEM Admin in Security Operation Center of my Project and I also lead competency Cyber Security at multinational company. I was handling Incident Response for some of another Project when there is threat attacker such like phishing or malware, and do Security Awareness after that. Right now, I was handling the development of process and procedure for my new project in my new company. I'm certified with : AWS Cloud Practitioner Credential ID : 371898230 CEH v10 Credential ID : ECC7498650312 EC Council Certified Incident Handler (ECIH) Credential ID : ECC0159827346 EC Council Cyber Threat Intelligence Analyst Credential ID : ECC3710568294 Cisco Certified Network Associate Routing & Switching Credential ID : 433454169301IMAI
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Security Analysis
    Incident Response Plan
  • $59 hourly
    🏆 8,000+ 𝗛𝗢𝗨𝗥𝗦 𝗪𝗢𝗥𝗞𝗘𝗗 | 🏆 500+ 𝗝𝗢𝗕𝗦 𝗖𝗢𝗠𝗣𝗟𝗘𝗧𝗘𝗗 Experienced Network Engineer. Proficient in Cisco, Fortinet, HPE ,Meraki, AWS, Azure, Juniper, Sonicwall, Sophos, Draytek, Palo Alto etc. Highly motivated and always eager to learn and master new technologies Proven performance in fast-paced and high-stress working environments. Strong analytical skills with exceptional attention to detail. Experience Highlights: • Network Administration: VLAN, VPN, Wireless networks, Network equipment (HP, Cisco, Huawei, Juniper), Deep network architecture expertise • Wireless Technologies: Aruba (WLC, Clearpass), Fortinet, Aerohive, Cisco (WLC), Meraki • Routing Protocols: BGP, OSPF, EIGRP, IS-IS, RIP, Static routing • High Availability: Active-passive clusters (HSRP, VRRP, JRRP), Load-balancing • Security: Firewalls (ASA, FWSM, Fortigate, Juniper SSG, SonicWall, pfSense), PKI, IDS/IPS, Antivirus, Antispam techniques, RADIUS (Windows / FreeRadius) • Voice & Video Conferencing: Polycom, Skype, Cisco (VCS, CCM, CUCM, Unity, IMP), Nortel, Asterix (TrixBox, Elastix) • Digital Marketing: Facebook Ads, Google Ads, Appsflyer, TikTok Ads, Retargeting, Event Tracking, Audience Management • Network Management Systems: Cisco Prime, Cacti, PRTG, Zabbix, NAGIOS
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Sophos Sophos UTM
    Network Analysis
    WiFi
    Cybersecurity Tool
    Network Design
    AWS Lambda
    Google Cloud Platform
    Microsoft Azure
    PfSense
    Check Point
    Palo Alto Firewalls
    Cisco ASA
    Cisco
    Aruba
    Fortinet
  • $30 hourly
    An information security, cyber-security and digital forensics professional with focus in cloud technologies and their security. My aim is to develop a world where everyone feels safe from cyber threats, data breaches, and network exploitation. I have vast experience in information security, information security management, information security auditing and digital forensics. My expertise include: Risk assessment Risk analysis Cryptography Network security Penetration testing Digital forensics Information security management Information security auditing Critical infrastructures Industrial Control Systems (SCADA) Digital evidence collection and analysis Networking Linux security and modules Windows Server Security Active Directory Domain Services Vulnerability scanning ISO 27001 HIPAA compliance SOX 2002 Strategic security policies formation Standards COBIT, ITIL, ISO/IEC 62443 Data recovery Password recovery Forensic investigation Digital investigator Tools expertise: OWASP Wireshark Nmap Metasploit Kali Linux Nessus Cain and Abel John the rapper BurpSuite Splunk Nagios Tor P0f OSSEC Snort Acunetix Autopsy Volatility
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cloud Security Framework
    ISO 27001
    Security Infrastructure
    Technical Writing
    Information Security Governance
    Information Security Audit
    Cyber Threat Intelligence
    Certified Information Systems Security Professional
    Web Application Security
    Cybersecurity Tool
    Palo Alto Firewalls
    Network Security
    Digital Forensics
    Cybersecurity Management
  • $50 hourly
    I am Bohdan from Ukraine. I am here to look for long term project. Thank you. - Desktop, low level driver, Andriod app - Windows Presentation Foundation (aka WPF). - VPN, Proxy, Networking (from raw TCP(UDP)/IP to HTTP web-services, Wifi ), PRTG, CISCO. - Video / Audio streaming over the network using LIBVLC, FFMPEG, GSTREAMER.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Golang
    Rust
    API
    Network Analysis
    TCP/IP
    Network Software
    Kotlin
    Python
    Java
    .NET Framework
    Qt Framework
    Delphi
    C#
    C++
  • $100 hourly
    - Top Rated Network and Cloud Engineer. - Expert Vetted by Upwork - top 1% of Upwork freelancers. - 300+ projects and 7000+ Upwork hours up to date. - Six figures in the past twelve months. - Full-Time Freelancer. - 600k+ earned on Upwork. Networking vendors I have worked with: * Cisco, Mikrotik, Fortigate, Ubiquiti, Vyatta, VyOS, pfSense, Sonicwall, Sophos XG, Watchguard, Brocade, Ruckus, HP, Huawei, HPE, Aruba, Arista, etc. Cloud Skills: Terraform (AWS, Azure, GCP) AWS - VPC, EC2, RAM, R53, LB, S3, IAM/SSO, various NGFWs, Terraform. Azure - AD, AADDS, S2S VPNs, VMs, LB, NGFWs, Azure Hub-Spoke, Terraform. GCP - Cloud Compute, Security, NGFWs, Terraform. Digital Ocean Vultr ...
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    AWS Application
    Fortinet
    Open Networking Operating System
    Cisco ASA
    Network Design
    Ubiquiti
    Cisco Router
    MikroTik RouterOS
    Brocade
    PfSense
    OpenVPN
    Sophos Sophos UTM
    Google Cloud Platform
    Microsoft Azure
  • $35 hourly
    A motivated Cloud Engineer and cyber-security professional with diversified expertise and 4+ years of work experience in Information security, capable of quickly adapting of advance environments, 🌟AZURE Cloud Skills Set: • Implementation of role-based access control (RBAC) for Azure resources. • Integration of Azure Active Directory with on-premises directories. • Utilization of Azure AD Privileged Identity Management (PIM). • Configuration of Azure Security Center for threat detection and response. • Utilization of security policies, recommendations, and threat intelligence. • Deployment and configuration of Azure Sentinel for advanced threat detection and analysis. • Integration of data sources and creation of custom alerts and dashboards. • Understanding and utilization of threat intelligence feeds and sources. • Incorporation of threat intelligence into security practices for proactive defense. • Implementation of network security groups (NSGs) for network traffic filtering. • Utilization of Azure Firewall for application-layer protection. • Configuration of Azure DDoS Protection to safeguard against distributed denial-of-service attacks. • Configuration of Azure Disk Encryption for data at rest. • Use of Azure Key Vault for key and secret management. • Implementation of Azure Policy for governance and compliance. • Enforcement of security baselines using Azure Policy. • Setup and configuration of Azure Monitor for security logging and auditing. • Integration of Azure Monitor with Security Information and Event Management (SIEM) solutions. • Implementation of Azure MFA to enhance authentication security. • Utilization of Azure Advanced Threat Protection for detecting and investigating advanced threats. • Establishment of security incident response plans and procedures. • Utilization of Azure Security Center for incident investigation and response. • Implementation of compliance standards using Azure Blueprints. • Utilization of Azure Policy for ensuring compliance with security requirements. • Conducting threat modeling exercises to identify potential vulnerabilities. • Performing risk assessments for Azure environments and applications. • Utilization of Azure Security Center and Azure Sentinel for continuous security monitoring. • Proactive identification of security threats and vulnerabilities. • Adherence to Azure security best practices and guidelines. • Stay updated with the latest security features and improvements in Azure. 🌟AWS Cloud Skills set: • Creation of IAM Users, Groups, Roles, cross-account assume roles, Policies and fine-grained access control • EC2, Bastion Host, and Security Groups • S3 buckets, bucket policies, and triggers, cross-account bucket access • Lambda, serverless computing, lambda packages, and deployment • ECS clusters, tasks definitions, services, ECS fargate • CloudFormation templates, stack creation, and updating • Creation of VPC, Subnets, Routes tables, NACL, NAT gateways, internet gateways, VPC Endpoints, and peering • RDS clusters and instance creation, schema deployment into RDS • CloudWatch metrics, events, rules, and alarms • SNS notifications, topics, and subscription • SQS queues creation and trigger policies • Auto Scaling with simple and step scaling policies • Creation of Elastic, Application, and Network Load Balancers and end-to-end secure communication with SSL certificates • Code Pipeline, Code Commit, Code Build, Code Deploy 🌟Hands on Experience of managing on below SIEM technologies for monitoring, development of use-cases: ✔IBM QRadar, ✔Azure Sentinel ✔ArcSight, ✔Elastic Search ✔Wazuh 🌟 Hands on Experience of managing, Deployment, and monitoring Microsoft XDR technology and identify advance attacks. I specialize in optimizing Microsoft Azure tools: 🌟 Azure Sentinel for advanced SOC management and threat detection 🌟 Azure Security Center for unified security and compliance 🌟 Azure Advanced Threat Protection for targeted attack prevention 🌟 Azure Network Watcher for network traffic monitoring and anomaly detection 🌟 Azure Monitor for advanced security event analytics 🌟 Azure AD Identity Protection for user identity security 🌟 Azure Information Protection for data classification and encryption 🌟Microsoft Defender for Endpoint 🌟Microsoft Defender for Cloud
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cloud Security
    AWS Fargate
    AWS Lambda
    Azure DevOps Server
    Microsoft Azure
    Azure DevOps
    Cloud Computing
    Linux
    DevOps
    Kibana
    Kubernetes
    Elasticsearch
    Information Security
    Docker
    Network Security
  • $25 hourly
    As an experienced Penetration Tester, I've conducted and led successful security audits, web application penetration testing, and red team engagements for a wide range of companies. My experience varies from working with global enterprises with large-scale infrastructures to smaller businesses looking to improve security measures for a competitive edge. I have worked with organizations like - HackerRank - World Bank - HDFC Bank - RBLBank - Kotak Mahindra Bank - Ganpat University - GTU University - BookMyShow - MakeMyTrip Certifications: CEH, eJPT, OSCP, Certified Metaverse Security Consultant. As a security engineer, my daily tasks include identifying and mitigating potential vulnerabilities by applying my knowledge of penetration testing, cyber security, and vulnerability assessment. Through these experiences, I have completely studied the prevailing technology stacks used globally, allowing me to determine their security vulnerabilities with precision. 🚫No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined. Working with me, you will: ★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ★ Complete manual testing for your application and immediate notification if any high-impact issues are found. ★ Unlimited retesting for the fixed issues and unlimited revisions ★ Able to find critical bug classes that are often missed by automated pentests. 🔢 My stats are: ✅ Top-rated in information security and IT compliance categories ✅ Saved tens of thousands of dollars for clients by identifying critical vulnerabilities ✅ Ranked in the Top 50 at multiple bug bounty programs ✅ Supporting all time zones ✅ Long-term engagements ✅ Professional certifications (OSCP, CREST CPSA, OSEP, OSWP, CEH) Penetration Testing and Vulnerability Assessment Tools: Manual Testing: Burpsuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), Metasploit Framework, SQLmap, OWASP ZAP Automated Testing: Acunetix, Nessus, Netsparker, etc. Penetration testing service: 1. Penetration Testing Engagement: Thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing. Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus. 2. Professional Report and Statistics: A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact. 3. Remediation Advice and Guidance: Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities. 4. Asset Discovery: Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery. 5. Free Retest: Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended. 6. OSINT Reconnaissance: Gather all valuable data about the company on the internet, including any breached email addresses and related passwords. 7. Briefing and debriefing: Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required. Calls or meetings are available after the penetration test is completed to discuss the engagement results, the main issues and concerns regarding the company's security, and any further clarification regarding any vulnerability and the associated impact or risk. ✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes: ► Executive Summary ► Assessment Methodology ► Types of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings: Each finding in the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections. ► Retest for issues My Expertise: ★ Web Application Security Testing ★ API security testing ★ Penetration Testing ★ Internal Active Directory and External Network Pentest ★ Vulnerability Assessment. ★ Thick Client Pentest (Windows Desktop App Testing) ★ OSINT Assessement
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    OpenVAS
    Application Security
    Penetration Testing
    Vulnerability Assessment
    NIST SP 800-53
    Web Application Security
    Ethical Hacking
    Security Analysis
    Cloud Security
    OWASP
    Network Penetration Testing
  • $40 hourly
    High-Quality Delivery on Time and Budget. If you are looking for а bug-free app - you’re on the right way! ⬇️ ⭐️ 7+ years proven track record (Manual and Automation testing) ⭐️ Solid experience with web, mobile (iOS & Android) and desktop applications testing for wholesale platforms, B2B transportation systems, activity control systems based on the location, WiFi monitors, apps for builders, tables reservation apps, desktop apps, business educational web & mobile apps, printers management admin portals, travel websites ⭐️ Testing tools: Hiptest and TestRail, Database: JetBrains gatagrip, phpMyAdmin, pgadmin, firebug,form filler,Chrome Developer Tool, Avocode, pixelperfect, Genymotion, litmus, JMeter, browserstack, redux devtools, API automation testing using Swagger, Postman, Mobile testing: Xcode, android studio ⭐️ Segments: FinTech, Logistics, ERP, Social Media, Travel ⭐️ I’ll find and prioritize all bugs and your clients won’t face any issues after the release Proud of delivering 20+ projects, which stood out for discernible achievements: 📍 Blockchain crypto banking with 50,000 active users 📍 SaaS platform that powering intranets for over 47% of UK Government Civil Servants (90,000 users) 📍 Traders platform - cloud based platform that uses blockchain technology and Machine Learning; co-founded by the Horizon 2020 programme of the EU 📍 Juices delivery apps with 70K monthly visitors
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    MeteorJS
    RESTful Architecture
    Ionic Framework
    React
    React Native
    Node.js
    Google Chrome Extension
    AngularJS
    JavaScript
    MongoDB
  • $100 hourly
    I am an experienced and certified SOC Analyst mainly focused on Incident Response, Digital Forensics, Malware Analysis, detection engineering, etc.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Internet Security
    Cybersecurity Tool
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Programming Bug Fix
    Incident Management
    Incident Response Plan
    Malware Removal
    Network Security
    Digital Forensics
  • $50 hourly
    With a rich background spanning over 5+ years in designing and executing robust cybersecurity solutions, I am a Cybersecurity Specialist Consultant dedicated to safeguarding digital landscapes. My journey has taken me from the foundational steps of security analysis to spearheading roles as a Co-Founder and CTO, alongside pivotal positions in cybersecurity engineering and ethical hacking across global landscapes from Jakarta to Dallas, and Sydney to the Netherlands. My expertise lies in a deep understanding of cyber threats and vulnerabilities, backed by a Bachelor's degree in Cybersecurity from Deakin University and certified mastery in Blockchain Security, Advanced Penetration Testing, and Fuzzing and Crash Analysis. I've successfully led comprehensive security initiatives, including developing XDR and SIEM solutions, managing multi-layered security systems, and pioneering full-scale cybersecurity startups. My approach is rooted in innovation and efficiency, aiming to protect organizational assets against ever-evolving cyber threats with customized security strategies. At the heart of my service is a commitment to operational excellence and a proactive stance on cybersecurity, ensuring I'm always ready to counteract cyber threats swiftly. Through Encripti, my cybersecurity startup, and various contractor roles, I've honed my skills in vulnerability assessments, red/blue team engagements, and crafting defensive architectures against complex cyber attacks. My portfolio is a testament to my ability to communicate complex security concepts effectively and to collaborate towards enhancing cybersecurity resilience in dynamic environments. In seeking new opportunities on Upwork, I aim to bring my wealth of experience and a proactive approach to cybersecurity to organizations looking to fortify their defenses. Whether through strategic consulting, hands-on penetration testing, or crafting comprehensive security frameworks, my goal is to deliver unparalleled value and security assurance to my clients.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Blockchain Security
    API Testing
    Cyber Threat Intelligence
    Cybersecurity Monitoring
    Risk Analysis
    Virus Removal
    Web Application Security
    Data Analytics
    Smart Contract
    Malware Removal
    Security Testing
    Vulnerability Assessment
    Application Security
    Cybersecurity Management
    Penetration Testing
    Digital Forensics
  • Want to browse more freelancers?
    Sign up

How it works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Wireshark Developer on Upwork?

You can hire a Wireshark Developer on Upwork in four simple steps:

  • Create a job post tailored to your Wireshark Developer project scope. We’ll walk you through the process step by step.
  • Browse top Wireshark Developer talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Wireshark Developer profiles and interview.
  • Hire the right Wireshark Developer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Wireshark Developer?

Rates charged by Wireshark Developers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Wireshark Developer on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Wireshark Developers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Wireshark Developer team you need to succeed.

Can I hire a Wireshark Developer within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Wireshark Developer proposals within 24 hours of posting a job description.

Schedule a call