Hire the best Wireshark developers
Check out Wireshark developers with the skills you need for your next job.
- $45 hourly
- 5.0/5
- (22 jobs)
My experience in the VOIP domain has been for 15 years. My customer satisfaction is my goal. I have extensive experience with Asterisk/Kamailio systems, as well as Linux and network administration. I have the ability to do advanced troubleshooting . My expertise on this: * Asterisk, Kamailio, OpenSips, FreePBX, A2billing, SIP, H323, IAX, Webrtc, hylafax, Asterisk-Pannel, iaxmodem, rtpproxy, MediaProxy, WebRTC, SipML5, SMS API, IVR (Interactive Voice Record),Wireshark * IP routing, router configuration (cisco, iptables routing), switch, Vlan, VPN (Ipsec linux, cisco vpn, fortigate, OpenFire). * Fail2ban, Iptables, OpenSwan, Squid, Cisco FirePower, Vmware, Proxmox * Php, Mysql, Postgresql, sqlite, Mongodb, Bash , LUA , Java, AGI, AMI * Roundcube, Zimbra, Zabbix, Smokeping, munin, Nagios, Cisco NetFlow, Voipmonitor * Git, Ansible, bitbuket, atlassian My time is my value. So when you choosing me you can expect that job will be done in short terms and perfect. I don't like to do something that not need be done. @linkedin linkedincom/in/alaeddine-hertelli/ SKYP:alasupcom1WiresharkOpenSIPSFreePBXPostgreSQLAsteriskSession Initiation ProtocolKamailioVtigerIptablesMySQLBash ProgrammingPHPNetwork EngineeringLinuxVoIP - $35 hourly
- 4.8/5
- (71 jobs)
Technology Professional with experience in Data Center, Infrastructure and Network management. Specializing in the administration of Windows Server and Linux operating systems; VMWare vSphere and Hyper-V virtualization systems; And extensive knowledge in Networking, Active Directory, GPO, IIS, DNS, Microsoft Exchange, among othersWiresharkSecurity InfrastructureUbiquitiNetwork EquipmentNetwork PlanningNetwork SecurityIptablesNetwork DesignFirewallLAMP AdministrationCisco Certified Network AssociatePfSenseWireless Network ImplementationMicrosoft Exchange ServerWindows Server - $20 hourly
- 5.0/5
- (29 jobs)
I am an experienced Automation Engineer with over four years of experience in Web Scraping, Process Automation, and API Integration. As a Top-Rated Freelancer on Upwork, I have designed and developed numerous automation solutions tailored to streamline workflows and deliver actionable insights. I am passionate about offering affordable and effective web scraping services, leveraging various tools and technologies such as: Selenium ✅ Requests ✅ Scrapy ✅ BeautifulSoup (bs4) ✅ JSON, CSV ✅ Beyond scraping, I specialize in building and automating workflows using platforms like Retool and n8n, ensuring smooth client process management. Technical Proficiency: I am proficient in multiple programming languages and frameworks: Python (Advanced) ✅ C/C++ ✅ JavaScript, HTML/CSS ✅ Rust (Basic) ✅ SQL, Linux (Intermediate) ✅ Additionally, I have a solid foundation in Object-Oriented Programming and regularly apply these principles in my projects. I have completed internships and certifications that sharpened my skills in cybersecurity and data science. Recently, I’ve worked on projects involving penetration testing and security auditing, adding an extra layer of value to my offerings. Certifications: (ISC)² Certified in Cybersecurity (CC) (2024) Google Cybersecurity Certificate (2023) Upwork Skill Certification - Python Development (2024) I am committed to helping businesses automate their workflows and enhance data extraction processes efficiently. If you're looking for a professional who can deliver high-quality web scraping and automation solutions, feel free to reach out!WiresharkData ExtractionJavaScriptETLSplunkSQLObject-Oriented ProgrammingAutomationPythonData ScrapingWeb ScrapingC++HTML - $15 hourly
- 4.4/5
- (94 jobs)
I have 15 year's experience as a Website/Software Senior QA Manager/Engineer in the I.T. Industries and gained a set of skills specifically for development and Quality Assurance. I already have experience working on a Saas platform, E-commerce, Dynamic website, One-pager, Wordpress, and Mobile application. I can create different test plans and test cases adapting to different kinds of projects. I like working directly with the client so I can easily understand the business workflow and can easily adapt to their existing process and will work with minimal supervision with intact quality in mind. Thank you for taking your time and I am looking forward to working with you. What my skills covers: ● Performance testing. ● Exploratory testing ● Cross-browser testing ● Game Testing ● Software & App Testing ● Manual Testing ● Mobile App Testing ● Accessibility Testing ● Stress and Load Testing ● Functional QA ● Regression testing ● Upgrade and continuity testing ● Issue reproductionWiresharkCryptocurrencyAutomationLaravelSoftware QAPHPMobile Development FrameworkFigmaReactLoad TestingBlack Box TestingBusiness with 10-99 EmployeesPerformance TestingRegression Testing - $100 hourly
- 4.7/5
- (143 jobs)
Hello, I am a dedicated professional with extensive experience in Cyber Investigations, Cyber Intelligence, Cyber Operations, Cybersecurity, and Information Security. I excel in implementing effective security strategies and mitigating potential cyber threats. My expertise lies in detecting, investigating, and mitigating cyber threats while providing strategic insights to enhance organizational cyber defense capabilities. My Expertise are; ✅ Dark Web Cyber Threat Intelligence, Fraud Investigation, Criminal Profiling, Company OSINT Investigations ✅ Malware Reverse Engineering and Disassembly ✅ WordPress Malware Removal & Hacked Website Recovery ✅ Digital Forensics (Data Recovery and Analysis, Mobile Device Forensics (iPhone & Android), Network Forensics, Email Header Analysis) ✅ Network Security: Firewall (pfsense,), IDS/IPS (Snort and Suricata), OpenVPN Access Server, SIEM (Wazuh), Web Proxy (Squid) ✅ Cyber Security Articles: Technical Writing, Blog Writing, Article Writing, Research Reports, Scientific Reports, ebooks, and Blogs (Fluent in American or British English) ✅ Pcap File Analysis (Wireshark, Network Miner, Wireedit, Scapy, ParserCap) ✅ Phishing Simulation, Red Team Operations, Exploit Development I currently hold the following certifications: ➡ Certified Ethical Hacking ➡ Certified Penetration Tester and Bug Bounty Hunter ➡ Autopsy Digital Forensics ➡ Cyber Triage Digital Forensics Incidence Response My vision is to safeguard the world against cyber threats by providing innovative and robust cybersecurity solutions.WiresharkSnortInformation SecurityEthical HackingNetwork AnalysisPfSenseKali LinuxWebsite SecurityDigital ForensicsComputer NetworkNetwork SecurityIntrusion Detection SystemInformation TechnologyIntrusion Prevention SystemTechnical Writing - $23 hourly
- 5.0/5
- (27 jobs)
I have 12 years experience in the field except my degree on computer engineering. Beside that I have many certification about my field.WiresharkMultiprotocol BGPNPSOSPFKali LinuxTCP/IPCisco RouterRADIUSPenetration TestingWeb TestingPHPNetwork EngineeringComputer NetworkPythonSystem Administration - $51 hourly
- 5.0/5
- (9 jobs)
✅ Top-Rated Cybersecurity Expert 💼 8+ Years in Bug Bounty & Pen-testing 🔐 Recognized by 200+ Organizations 🏆 Top 31 on Bugcrowd 🎯 Specializing in Web, Mobile & API Security Testing ⌚ Supporting All Time Zones Are you seeking a battle-tested cybersecurity expert to fortify your digital assets? With over 8 years of professional experience I have a proven track record in uncovering and reporting vulnerabilities for tech giants such as Apple, Google, Microsoft, The U.S. Department of Defense & The Government of Singapore. As an active Bug Bounty Hunter ranked on platforms like HackerOne and Bugcrowd, I bring a wealth of real-world experience to every engagement. 💬 Why Choose Me? 🔒 Extensive Experience: I've identified and responsibly disclosed hundreds of security flaws across diverse platforms, from startups to Fortune 500 companies. 🔍 Comprehensive Security Services: • Web and Mobile Application Penetration Testing • API Security Assessments • Network Vulnerability Scanning • Bug Bounty Program Consultation • Security Awareness Training • Detailed Reporting with Actionable Remediation Steps 🔑 Personalized Service: Every project is unique. I tailor my approach based on your Application/Network and security requirements. 📞 Clear Communication: From initial scoping to final debriefing, I offer detailed reports, regular meetings, and follow-up services to ensure all your concerns are addressed. Let’s secure your Applications together ---- Reach out for a consultation!WiresharkSecurity ManagementWeb App Penetration TestingSecurity AnalysisSecurity EngineeringWebsite SecurityInformation Security AuditWeb Application SecurityEthical HackingNetwork Penetration TestingOWASPVulnerability AssessmentInformation Security ConsultationPenetration Testing - $50 hourly
- 5.0/5
- (21 jobs)
As a seasoned Penetration Tester, I have a proven track record of conducting and leading successful security audits, web application penetration tests, and red team engagements for a diverse range of clients. My experience ranges from working with multinational corporations with large-scale infrastructures to smaller companies seeking enhanced security measures for competitive advantage. As a security engineer, my day-to-day responsibilities revolve around leveraging my expertise in penetration testing, cyber security, and vulnerability assessment to identify and mitigate potential vulnerabilities. Through these experiences, I have comprehensively understood the prevailing technology stacks employed worldwide, allowing me to discern their security weaknesses with precision. ✅No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined. Working with me, you will: ★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ★ Complete manual testing for your application and immediate notification if any high-impact issues are found. ★ Unlimited retesting for the fixed issues and unlimited revisions ★ Able to find critical bug classes that are often missed by automated pentests. Penetration Testing and Vulnerability Assessment Tools: Manual Testing: Burpsuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), C2 Framework, SQLmap, OWASP ZAP . Automated Testing: Acunetix, Nessus, Netsparker,Invicti Professional etc. Penetration testing service: 1. Penetration Testing Engagement: thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing. Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus. 2. Professional Report and Statistics: A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact. 3. Remediation Advice and Guidance: Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities. 4. Asset Discovery: Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery. 5. Free Retest: Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended. 6. OSINT Reconnaissance: gathering all valuable data about the company available on the internet, including any breached email addresses and related passwords available in cleartext on the internet. 7. Briefing and debriefing: Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required. Calls or meetings are available after the penetration test is completed to discuss the results of the engagement, the main issues and concerns regarding the security of the company, and any further clarification regarding any vulnerability and the associated impact or risk. ✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes: ► Executive Summary ► Assessment Methodology ► Types of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings Each finding listed within the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections. ► Retest for issues (The vulnerabilities will be retested after they're fixed; multiple retests can be done to ensure the issues are remediated.)WiresharkSecurity ManagementMobile App TestingNetwork Penetration TestingEthical HackingWeb App Penetration TestingSecurity TestingNessusPenetration TestingSecurity Assessment & TestingDatabase SecurityVulnerability AssessmentApplication SecurityMetasploit - $20 hourly
- 5.0/5
- (57 jobs)
Cybersecurity Specialist with more than 2 years experience in SOC services, incident response, and threat intelligence. My expertise spans across various SIEM platforms, including Microsoft Sentinel and LogRhythm, as well as EDR solutions like CrowdStrike and Microsoft Defender for Endpoint and Cloud. I also have a keen interest in website security and development, whether it is advising on how to improve security or performing a penetration test. I have experience with SOC, Incident Response, SOAR, EDR, XDR, DLP, Threat Intelligence, Vulnerability Assessment and Cloudsecurity. Utilising Microsoft Sentinel, LogRyhthm, SentinelOne, Defender for Endpoint. I have experience in investigating phishing emails, conducting phishing campaigns using GoPhish, and performing OSINT (Open-source intelligence) on domains and individuals, utilising different OSINT tools and techniques. Utilizing sandbox environments to analyze and investigate suspicious attachments and URLs. I also hold certifications in 3 Microsoft Certification which are active: - Microsoft Certified: Azure Security Engineer Associate - Microsoft Certified: Security Operations Analyst Associate - Microsoft 365 Certified: Security Administrator Associate Currently learning automation and setting up SIEM services for clients who want to monitor their infrastructure using Sentinel.WiresharkOffice 365Microsoft AzureCisco Certified Network AssociateISO 27001PythonPenetration TestingSecurity AnalysisData ProtectionInformation Security AuditLinuxComputer NetworkNetwork SecurityTechnical WritingInformation Technology - $39 hourly
- 5.0/5
- (29 jobs)
I am OSCP and CRTO Certified with 8 years of professional experience in different pentesting and red teaming trade crafts. Challenges make me work more efficiently. What is a better challenge than doing penetration testing in which knowledge and experience are the main factors to successfully finding a way inside Targets? - Manual testing approaches with real-impact vulnerabilities - Exposure to multinational companies and Swiss banks - Industry-renowned certifications (OSCP - CRTO - eWPTXv2 - CMSE - CPTE - CEI - CCNA) - "Find my way in" mentality therefore 80% of projects end up in successful breaches Key Skills for Pentesting Jobs ---------------------------------- Web Applications Pentesting Network Pentesting REST API/SOAP Pentesting Mobile Applications Pentesting Desktop Applications Pentesting Source Code Reviews Active Directory Assessment Key Skills for Offensive Jobs --------------------------------- Email Phishing (Maldoc or stats based) Social Engineering Assume Breach Scenarios MITRE ATT&CK framework Simulations Tactics, Techniques, and Procedures Testing against patched Infra Malware DevelopmentWiresharkBlack Box TestingInformation SecurityVulnerability AssessmentSystem SecurityApplication SecurityNetwork SecurityInformation Security ConsultationCloud SecurityPenetration TestingWeb App Penetration TestingNetwork Penetration TestingWeb Application SecurityEthical HackingSecurity TestingMobile App Testing - $30 hourly
- 5.0/5
- (22 jobs)
With hands-on experience in penetration testing, I specialize in network, systems, mobile applications, APIs, and web application security. My focus is on identifying and mitigating vulnerabilities to ensure robust and secure systems. Beyond my professional work, I actively explore malware analysis and digital forensics, staying updated on the latest techniques used by APT groups. I’m also passionate about CTF events, where I’ve earned top positions in national and international competitions. If you’re looking for expert advice on securing your systems or want a thorough security assessment based on the best industry practices, I’m here to help. Let’s work together to make the internet a safer place!WiresharkMalware RemovalWeb App Penetration TestingInformation SecurityNessusMetasploitNetwork SecurityPenetration TestingKali LinuxPythonInternet SecurityNetwork Penetration TestingLinuxVulnerability AssessmentDigital Forensics - $27 hourly
- 5.0/5
- (27 jobs)
Dear job posters, I am highly skilled mobile core network architecture and testing engineer with proven experience working with several highly ranked companies in this domain (like Microsoft, Nokia, Siemens, ...). I have been working in designing 4G and 5G networks, creating the network diagrams and LAB environments, testing and troubleshooting end-to-end communication. Have experience with root cause analysis with the tool like Wireshark. I like to teach others to the new technologies (like 5G), as I worked as technical trainer and online course developer with Articulate tool. My experience with Azure cloud is at sufficient level to help in your journey with different Azure products. I am fast learner and ready to accept new challenges and expand my knowledge further. That for sure will not cost you, but will be counting as my personal development. In networking domain, I am dealing with router configuration and troubleshooting, many different appliances and virtual network functions running on virtual infrastructure, analysing the protocols like TCP/IP, GTP, Diameter (Gx/Gy), Radius, ... and network elements: SGSN, GGSN, MME, SGW, PGW, PCRF, DNS, PCEF/DPI, PCRF, load balancers, firewalls, proxy servers, routers, L2/L3 switches I use Microsoft tools in my daily work: Visio for network diagrams creation, Word for documentation or Excel for different calculations. I can support you also in Data entries jobs or many different virtual assistant roles at professional level. Microservices, Kubernetes, Cloud Native and Service Based Architecture are additional domains of my interest. I am also flexible to get involved in other interesting opportunities on this platform, which I believe that are suitable for my profile. So do not be surprised if I apply for the jobs which do not fit completely with my background but are doable considering my experience. Do not hesitate to reach me if you have a need for my expertise. I hope there will be projects soon which I can publish in my profile. Stay tuned.WiresharkNetwork SecuritySerbianTeachingCourse CreationManual TestingMicrosoft OfficeVirtual AssistanceNetwork AdministrationData EntryTech & ITCloud ArchitectureKubernetesComputing & NetworkingMicrosoft Azure - $98 hourly
- 4.8/5
- (83 jobs)
Current Certifications: * CCENT ( Cisco Certified Network Technician ) * CCNA (Cisco Certified Network Admin (Routing & Switching)) * CCNP (Cisco Certified Network Professional (Routing & Switching)) * CCNA-SECURITY (Cisco Certified Network Security Admin) * SECURITY+ CE (CompTIA Certified SECURITY) * CEH (Certified Ethical Hacker) I am a Sr. Network and Security Engineer (SME) with expertise in Cisco Network Engineering and Cyber Security Engineering with year of I.T. experience managing private and government enterprise networks and Cyber security Network environments for large and small businesses . I have over 18+ years total experience as a lead Sr. network engineering SME as my foundation , and 9 yrs experience in Cyber Network Security infrastructure , design, configurations, troubleshooting, Cyber threat hunting. Also upgrading enterprise networks and security infrastructures for private companies , government organizations , including large and small business Networks and information systems. These skills include SME experience in Cisco Routing and Switching, ASA Firewalls, Palo Alto, Pfsense , VPNs, F5 Load balancer, WLAN, VoIP, and Cyber Security tools and SIEMS and Network Scanning, Windows Server, and WiFi networks.WiresharkVMWareCisco CallManagerSystem ConfigurationVoIPEthical HackingCisco Certified Network ProfessionalCisco Certified Network AssociateCisco RouterCisco ASAVPNFirewall - $40 hourly
- 5.0/5
- (39 jobs)
✅ Amongst the Top 1000 hackers worldwide Web Pentesting | Mobile App Pentesting | API Pentesting | Vulnerability Assessment | Python & Bash Automation I work with companies to make their digital assets secure and provide solutions to enhance their security parameters. I create cybersecurity content on hackingloops.com explaining the practicalities and how-tos of the vulnerability and exploitation Part-time bug bounty hunter at Bugcrowd & Intigriti. Feel free to contact me for your queries and security-related issues.WiresharkCode ReviewPythonSecurity AnalysisWebsite SecurityMobile App TestingSecurity EngineeringCloud SecurityNetwork SecurityPenetration TestingSecurity Assessment & TestingCybersecurity ManagementMalware RemovalInformation SecurityVulnerability AssessmentInformation Security Consultation - $75 hourly
- 5.0/5
- (222 jobs)
✅ Top Rated Plus Expert ✅ 3000+ Hours ✅ Professional Penetration Tester Cybersecurity researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform. For deliverables, professional reports are created, that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors. Core competency is performing black and gray box testing on live web applications/networks or lab environments. Familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of the work is confidential sample vulnerability report can be provided. Service Description 1)Web Application Penetration Testing based on OWASP TOP 10 2)Network Penetration Testing 3)Security Hardening Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket python frameworkWiresharkWeb Application SecurityJavaScriptReverse EngineeringBlack Box TestingEthical HackingWeb App Penetration TestingNetwork Penetration TestingInternet SecuritySecurity TestingNetwork SecurityPenetration TestingVulnerability Assessment - $30 hourly
- 5.0/5
- (140 jobs)
Looking for a penetration test? We'll give you access to our next-generation penetration testing solution. By combining the power of manual and automated penetration tests, we deliver the real-time insights companies need to remediate risk quickly. Through our Pentest as a Service (PTaaS) platform our clients receive comprehensive assessments. Our methodology follows the National Institute of Standards and Technology Special Publication (NIST SP 800-115), along with the latest techniques, tactics and tools used by hackers to compromise systems and applications. Providing real-time findings and unlimited retests to ensure gaps are closed is our key differentiator. Please check my Upwork work history and client feedbacks. I look forward to hearing from you!WiresharkWebsite SecurityOWASPWeb Application SecurityInformation Security AuditCertified Information Systems Security ProfessionalInformation SecurityVulnerability AssessmentSecurity TestingNetwork SecurityPenetration Testing - $30 hourly
- 4.9/5
- (33 jobs)
Do You Know Where You’re Vulnerable? Cyber threats evolve daily—are your defenses keeping up? As a Certified Penetration Testing Specialist (CPTS) with 4+ years of experience, I’ve helped businesses uncover hidden vulnerabilities before attackers could. Using industry-standard tools like Burp Suite Pro, Metasploit, OWASP ZAP, Nessus, and Wireshark, I go beyond surface-level assessments to deliver in-depth security insights. My approach aligns with frameworks like OWASP, CVSS, and NIST, ensuring compliance while strengthening your systems against sophisticated attacks. Your Security Questions, Answered ☞ Could hidden vulnerabilities expose your business to costly breaches? ☞ Is your API, cloud, or web application security ready for today’s threats? ☞ Are your defenses built to adapt as cyber threats evolve? My Specialized Services: ✨ Penetration Testing: Black Box, Gray Box, White Box ✨ API Security Testing: REST, SOAP, GraphQL ✨ Web Application Security: OWASP Compliance & Beyond ✨ Cloud Security: AWS, Azure, GCP ✨ Social Engineering Simulations: Phishing Awareness Training ✨ Mobile Security Testing: iOS, Android ✨ Network & Wireless Testing ✨ Source Code Reviews: Secure Development Practices ✨ CI/CD Pipeline Security: DevSecOps Integration What Sets Me Apart? ✅ Certified Expertise: CPTS-certified and skilled in finding vulnerabilities most overlook. ✅ Advanced Tools & Methods: Proficient with Burp Suite Pro, Nessus, Wireshark, Metasploit, and more. ✅ Proven Success: Delivered 32+ international penetration tests with a consistent 5-star satisfaction rate. ✅ Long-Term Assurance: Includes 90 days of free retesting to ensure your defenses remain strong. What You’ll Receive: ✅ Actionable Reports: Comprehensive findings with practical remediation steps. ✅ Future-Ready Security: Defenses tailored to combat emerging threats. ✅ Responsive Support: Fast, direct communication for all your needs. Click “Hire Me ✅” now to protect your business, uncover vulnerabilities, and achieve peace of mind. Let’s build a safer future for your digital assets!WiresharkCyber Threat IntelligenceEthical HackingNessusOWASPKali LinuxSecurity Assessment & TestingCloud SecurityApplication SecurityWeb App Penetration TestingWeb Application SecuritySecurity TestingInformation SecurityNetwork SecurityVulnerability AssessmentPenetration Testing - $25 hourly
- 5.0/5
- (2 jobs)
I have a big passion in IT Infrastructure and IT Security, I certified with QRadar Administration, Cyber Threat Intelligence Analyst and Incident Handling, I was L3 Threat Analyst and SIEM Admin in Security Operation Center of my Project and I also lead competency Cyber Security at multinational company. I was handling Incident Response for some of another Project when there is threat attacker such like phishing or malware, and do Security Awareness after that. Right now, I was handling the development of process and procedure for my new project in my new company. I'm certified with : AWS Cloud Practitioner Credential ID : 371898230 CEH v10 Credential ID : ECC7498650312 EC Council Certified Incident Handler (ECIH) Credential ID : ECC0159827346 EC Council Cyber Threat Intelligence Analyst Credential ID : ECC3710568294 Cisco Certified Network Associate Routing & Switching Credential ID : 433454169301IMAIWiresharkSecurity AnalysisIncident Response Plan - $59 hourly
- 4.4/5
- (321 jobs)
🏆 8,000+ 𝗛𝗢𝗨𝗥𝗦 𝗪𝗢𝗥𝗞𝗘𝗗 | 🏆 500+ 𝗝𝗢𝗕𝗦 𝗖𝗢𝗠𝗣𝗟𝗘𝗧𝗘𝗗 Experienced Network Engineer. Proficient in Cisco, Fortinet, HPE ,Meraki, AWS, Azure, Juniper, Sonicwall, Sophos, Draytek, Palo Alto etc. Highly motivated and always eager to learn and master new technologies Proven performance in fast-paced and high-stress working environments. Strong analytical skills with exceptional attention to detail. Experience Highlights: • Network Administration: VLAN, VPN, Wireless networks, Network equipment (HP, Cisco, Huawei, Juniper), Deep network architecture expertise • Wireless Technologies: Aruba (WLC, Clearpass), Fortinet, Aerohive, Cisco (WLC), Meraki • Routing Protocols: BGP, OSPF, EIGRP, IS-IS, RIP, Static routing • High Availability: Active-passive clusters (HSRP, VRRP, JRRP), Load-balancing • Security: Firewalls (ASA, FWSM, Fortigate, Juniper SSG, SonicWall, pfSense), PKI, IDS/IPS, Antivirus, Antispam techniques, RADIUS (Windows / FreeRadius) • Voice & Video Conferencing: Polycom, Skype, Cisco (VCS, CCM, CUCM, Unity, IMP), Nortel, Asterix (TrixBox, Elastix) • Digital Marketing: Facebook Ads, Google Ads, Appsflyer, TikTok Ads, Retargeting, Event Tracking, Audience Management • Network Management Systems: Cisco Prime, Cacti, PRTG, Zabbix, NAGIOSWiresharkSophos Sophos UTMNetwork AnalysisWiFiCybersecurity ToolNetwork DesignAWS LambdaGoogle Cloud PlatformMicrosoft AzurePfSenseCheck PointPalo Alto FirewallsCisco ASACiscoArubaFortinet - $30 hourly
- 5.0/5
- (9 jobs)
An information security, cyber-security and digital forensics professional with focus in cloud technologies and their security. My aim is to develop a world where everyone feels safe from cyber threats, data breaches, and network exploitation. I have vast experience in information security, information security management, information security auditing and digital forensics. My expertise include: Risk assessment Risk analysis Cryptography Network security Penetration testing Digital forensics Information security management Information security auditing Critical infrastructures Industrial Control Systems (SCADA) Digital evidence collection and analysis Networking Linux security and modules Windows Server Security Active Directory Domain Services Vulnerability scanning ISO 27001 HIPAA compliance SOX 2002 Strategic security policies formation Standards COBIT, ITIL, ISO/IEC 62443 Data recovery Password recovery Forensic investigation Digital investigator Tools expertise: OWASP Wireshark Nmap Metasploit Kali Linux Nessus Cain and Abel John the rapper BurpSuite Splunk Nagios Tor P0f OSSEC Snort Acunetix Autopsy VolatilityWiresharkCloud Security FrameworkISO 27001Security InfrastructureTechnical WritingInformation Security GovernanceInformation Security AuditCyber Threat IntelligenceCertified Information Systems Security ProfessionalWeb Application SecurityCybersecurity ToolPalo Alto FirewallsNetwork SecurityDigital ForensicsCybersecurity Management - $50 hourly
- 4.6/5
- (4 jobs)
I am Bohdan from Ukraine. I am here to look for long term project. Thank you. - Desktop, low level driver, Andriod app - Windows Presentation Foundation (aka WPF). - VPN, Proxy, Networking (from raw TCP(UDP)/IP to HTTP web-services, Wifi ), PRTG, CISCO. - Video / Audio streaming over the network using LIBVLC, FFMPEG, GSTREAMER.WiresharkGolangRustAPINetwork AnalysisTCP/IPNetwork SoftwareKotlinPythonJava.NET FrameworkQt FrameworkDelphiC#C++ - $100 hourly
- 4.9/5
- (312 jobs)
- Top Rated Network and Cloud Engineer. - Expert Vetted by Upwork - top 1% of Upwork freelancers. - 300+ projects and 7000+ Upwork hours up to date. - Six figures in the past twelve months. - Full-Time Freelancer. - 600k+ earned on Upwork. Networking vendors I have worked with: * Cisco, Mikrotik, Fortigate, Ubiquiti, Vyatta, VyOS, pfSense, Sonicwall, Sophos XG, Watchguard, Brocade, Ruckus, HP, Huawei, HPE, Aruba, Arista, etc. Cloud Skills: Terraform (AWS, Azure, GCP) AWS - VPC, EC2, RAM, R53, LB, S3, IAM/SSO, various NGFWs, Terraform. Azure - AD, AADDS, S2S VPNs, VMs, LB, NGFWs, Azure Hub-Spoke, Terraform. GCP - Cloud Compute, Security, NGFWs, Terraform. Digital Ocean Vultr ...WiresharkAWS ApplicationFortinetOpen Networking Operating SystemCisco ASANetwork DesignUbiquitiCisco RouterMikroTik RouterOSBrocadePfSenseOpenVPNSophos Sophos UTMGoogle Cloud PlatformMicrosoft Azure - $35 hourly
- 4.4/5
- (39 jobs)
A motivated Cloud Engineer and cyber-security professional with diversified expertise and 4+ years of work experience in Information security, capable of quickly adapting of advance environments, 🌟AZURE Cloud Skills Set: • Implementation of role-based access control (RBAC) for Azure resources. • Integration of Azure Active Directory with on-premises directories. • Utilization of Azure AD Privileged Identity Management (PIM). • Configuration of Azure Security Center for threat detection and response. • Utilization of security policies, recommendations, and threat intelligence. • Deployment and configuration of Azure Sentinel for advanced threat detection and analysis. • Integration of data sources and creation of custom alerts and dashboards. • Understanding and utilization of threat intelligence feeds and sources. • Incorporation of threat intelligence into security practices for proactive defense. • Implementation of network security groups (NSGs) for network traffic filtering. • Utilization of Azure Firewall for application-layer protection. • Configuration of Azure DDoS Protection to safeguard against distributed denial-of-service attacks. • Configuration of Azure Disk Encryption for data at rest. • Use of Azure Key Vault for key and secret management. • Implementation of Azure Policy for governance and compliance. • Enforcement of security baselines using Azure Policy. • Setup and configuration of Azure Monitor for security logging and auditing. • Integration of Azure Monitor with Security Information and Event Management (SIEM) solutions. • Implementation of Azure MFA to enhance authentication security. • Utilization of Azure Advanced Threat Protection for detecting and investigating advanced threats. • Establishment of security incident response plans and procedures. • Utilization of Azure Security Center for incident investigation and response. • Implementation of compliance standards using Azure Blueprints. • Utilization of Azure Policy for ensuring compliance with security requirements. • Conducting threat modeling exercises to identify potential vulnerabilities. • Performing risk assessments for Azure environments and applications. • Utilization of Azure Security Center and Azure Sentinel for continuous security monitoring. • Proactive identification of security threats and vulnerabilities. • Adherence to Azure security best practices and guidelines. • Stay updated with the latest security features and improvements in Azure. 🌟AWS Cloud Skills set: • Creation of IAM Users, Groups, Roles, cross-account assume roles, Policies and fine-grained access control • EC2, Bastion Host, and Security Groups • S3 buckets, bucket policies, and triggers, cross-account bucket access • Lambda, serverless computing, lambda packages, and deployment • ECS clusters, tasks definitions, services, ECS fargate • CloudFormation templates, stack creation, and updating • Creation of VPC, Subnets, Routes tables, NACL, NAT gateways, internet gateways, VPC Endpoints, and peering • RDS clusters and instance creation, schema deployment into RDS • CloudWatch metrics, events, rules, and alarms • SNS notifications, topics, and subscription • SQS queues creation and trigger policies • Auto Scaling with simple and step scaling policies • Creation of Elastic, Application, and Network Load Balancers and end-to-end secure communication with SSL certificates • Code Pipeline, Code Commit, Code Build, Code Deploy 🌟Hands on Experience of managing on below SIEM technologies for monitoring, development of use-cases: ✔IBM QRadar, ✔Azure Sentinel ✔ArcSight, ✔Elastic Search ✔Wazuh 🌟 Hands on Experience of managing, Deployment, and monitoring Microsoft XDR technology and identify advance attacks. I specialize in optimizing Microsoft Azure tools: 🌟 Azure Sentinel for advanced SOC management and threat detection 🌟 Azure Security Center for unified security and compliance 🌟 Azure Advanced Threat Protection for targeted attack prevention 🌟 Azure Network Watcher for network traffic monitoring and anomaly detection 🌟 Azure Monitor for advanced security event analytics 🌟 Azure AD Identity Protection for user identity security 🌟 Azure Information Protection for data classification and encryption 🌟Microsoft Defender for Endpoint 🌟Microsoft Defender for CloudWiresharkCloud SecurityAWS FargateAWS LambdaAzure DevOps ServerMicrosoft AzureAzure DevOpsCloud ComputingLinuxDevOpsKibanaKubernetesElasticsearchInformation SecurityDockerNetwork Security - $25 hourly
- 5.0/5
- (19 jobs)
As an experienced Penetration Tester, I've conducted and led successful security audits, web application penetration testing, and red team engagements for a wide range of companies. My experience varies from working with global enterprises with large-scale infrastructures to smaller businesses looking to improve security measures for a competitive edge. I have worked with organizations like - HackerRank - World Bank - HDFC Bank - RBLBank - Kotak Mahindra Bank - Ganpat University - GTU University - BookMyShow - MakeMyTrip Certifications: CEH, eJPT, OSCP, Certified Metaverse Security Consultant. As a security engineer, my daily tasks include identifying and mitigating potential vulnerabilities by applying my knowledge of penetration testing, cyber security, and vulnerability assessment. Through these experiences, I have completely studied the prevailing technology stacks used globally, allowing me to determine their security vulnerabilities with precision. 🚫No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined. Working with me, you will: ★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible. ★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality. ★ Complete manual testing for your application and immediate notification if any high-impact issues are found. ★ Unlimited retesting for the fixed issues and unlimited revisions ★ Able to find critical bug classes that are often missed by automated pentests. 🔢 My stats are: ✅ Top-rated in information security and IT compliance categories ✅ Saved tens of thousands of dollars for clients by identifying critical vulnerabilities ✅ Ranked in the Top 50 at multiple bug bounty programs ✅ Supporting all time zones ✅ Long-term engagements ✅ Professional certifications (OSCP, CREST CPSA, OSEP, OSWP, CEH) Penetration Testing and Vulnerability Assessment Tools: Manual Testing: Burpsuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), Metasploit Framework, SQLmap, OWASP ZAP Automated Testing: Acunetix, Nessus, Netsparker, etc. Penetration testing service: 1. Penetration Testing Engagement: Thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing. Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus. 2. Professional Report and Statistics: A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact. 3. Remediation Advice and Guidance: Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities. 4. Asset Discovery: Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery. 5. Free Retest: Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended. 6. OSINT Reconnaissance: Gather all valuable data about the company on the internet, including any breached email addresses and related passwords. 7. Briefing and debriefing: Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required. Calls or meetings are available after the penetration test is completed to discuss the engagement results, the main issues and concerns regarding the company's security, and any further clarification regarding any vulnerability and the associated impact or risk. ✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes: ► Executive Summary ► Assessment Methodology ► Types of Tests ► Risk Level Classifications ► Result Summary ► Table of Findings ► Detailed Findings: Each finding in the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections. ► Retest for issues My Expertise: ★ Web Application Security Testing ★ API security testing ★ Penetration Testing ★ Internal Active Directory and External Network Pentest ★ Vulnerability Assessment. ★ Thick Client Pentest (Windows Desktop App Testing) ★ OSINT AssessementWiresharkOpenVASApplication SecurityPenetration TestingVulnerability AssessmentNIST SP 800-53Web Application SecurityEthical HackingSecurity AnalysisCloud SecurityOWASPNetwork Penetration Testing - $40 hourly
- 4.8/5
- (11 jobs)
High-Quality Delivery on Time and Budget. If you are looking for а bug-free app - you’re on the right way! ⬇️ ⭐️ 7+ years proven track record (Manual and Automation testing) ⭐️ Solid experience with web, mobile (iOS & Android) and desktop applications testing for wholesale platforms, B2B transportation systems, activity control systems based on the location, WiFi monitors, apps for builders, tables reservation apps, desktop apps, business educational web & mobile apps, printers management admin portals, travel websites ⭐️ Testing tools: Hiptest and TestRail, Database: JetBrains gatagrip, phpMyAdmin, pgadmin, firebug,form filler,Chrome Developer Tool, Avocode, pixelperfect, Genymotion, litmus, JMeter, browserstack, redux devtools, API automation testing using Swagger, Postman, Mobile testing: Xcode, android studio ⭐️ Segments: FinTech, Logistics, ERP, Social Media, Travel ⭐️ I’ll find and prioritize all bugs and your clients won’t face any issues after the release Proud of delivering 20+ projects, which stood out for discernible achievements: 📍 Blockchain crypto banking with 50,000 active users 📍 SaaS platform that powering intranets for over 47% of UK Government Civil Servants (90,000 users) 📍 Traders platform - cloud based platform that uses blockchain technology and Machine Learning; co-founded by the Horizon 2020 programme of the EU 📍 Juices delivery apps with 70K monthly visitorsWiresharkMeteorJSRESTful ArchitectureIonic FrameworkReactReact NativeNode.jsGoogle Chrome ExtensionAngularJSJavaScriptMongoDB - $100 hourly
- 5.0/5
- (33 jobs)
I am an experienced and certified SOC Analyst mainly focused on Incident Response, Digital Forensics, Malware Analysis, detection engineering, etc.WiresharkInternet SecurityCybersecurity ToolCyber Threat IntelligenceCybersecurity MonitoringProgramming Bug FixIncident ManagementIncident Response PlanMalware RemovalNetwork SecurityDigital Forensics - $50 hourly
- 5.0/5
- (41 jobs)
With a rich background spanning over 5+ years in designing and executing robust cybersecurity solutions, I am a Cybersecurity Specialist Consultant dedicated to safeguarding digital landscapes. My journey has taken me from the foundational steps of security analysis to spearheading roles as a Co-Founder and CTO, alongside pivotal positions in cybersecurity engineering and ethical hacking across global landscapes from Jakarta to Dallas, and Sydney to the Netherlands. My expertise lies in a deep understanding of cyber threats and vulnerabilities, backed by a Bachelor's degree in Cybersecurity from Deakin University and certified mastery in Blockchain Security, Advanced Penetration Testing, and Fuzzing and Crash Analysis. I've successfully led comprehensive security initiatives, including developing XDR and SIEM solutions, managing multi-layered security systems, and pioneering full-scale cybersecurity startups. My approach is rooted in innovation and efficiency, aiming to protect organizational assets against ever-evolving cyber threats with customized security strategies. At the heart of my service is a commitment to operational excellence and a proactive stance on cybersecurity, ensuring I'm always ready to counteract cyber threats swiftly. Through Encripti, my cybersecurity startup, and various contractor roles, I've honed my skills in vulnerability assessments, red/blue team engagements, and crafting defensive architectures against complex cyber attacks. My portfolio is a testament to my ability to communicate complex security concepts effectively and to collaborate towards enhancing cybersecurity resilience in dynamic environments. In seeking new opportunities on Upwork, I aim to bring my wealth of experience and a proactive approach to cybersecurity to organizations looking to fortify their defenses. Whether through strategic consulting, hands-on penetration testing, or crafting comprehensive security frameworks, my goal is to deliver unparalleled value and security assurance to my clients.WiresharkBlockchain SecurityAPI TestingCyber Threat IntelligenceCybersecurity MonitoringRisk AnalysisVirus RemovalWeb Application SecurityData AnalyticsSmart ContractMalware RemovalSecurity TestingVulnerability AssessmentApplication SecurityCybersecurity ManagementPenetration TestingDigital Forensics Want to browse more freelancers?
Sign up
How it works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Wireshark Developer on Upwork?
You can hire a Wireshark Developer on Upwork in four simple steps:
- Create a job post tailored to your Wireshark Developer project scope. We’ll walk you through the process step by step.
- Browse top Wireshark Developer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Wireshark Developer profiles and interview.
- Hire the right Wireshark Developer for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Wireshark Developer?
Rates charged by Wireshark Developers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Wireshark Developer on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Wireshark Developers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Wireshark Developer team you need to succeed.
Can I hire a Wireshark Developer within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Wireshark Developer proposals within 24 hours of posting a job description.