Hire the best Wireshark Developers in India
Check out Wireshark Developers in India with the skills you need for your next job.
- $20 hourly
- 5.0/5
- (7 jobs)
Senior Quality Analyst with full system development lifecycle experience, including designing, developing and implementing test plans, test cases and test processes fueling swift corrective actions, significant cost savings and fault-free audits. Backed by more than 8 years of strong industry proficiency including high profile software version releases, advanced command of various testing suites, Agile methodologies; cross-functional skills in Business Analysis and Product Management. Conducted formal and informal product design reviews throughout the software development lifecycle to provide input on functional requirements, product designs, schedules and potential issues. Leveraged developer relationship background to communicate effectively with software design team, quickly gaining their respect and becoming a valued, “go-to” team member on challenging test cases. QA Automation Skills -------------------------- 1. Web App Automation using Selenium Web Driver and Cypress 2. Mobile App Automation using Appium. 3. API Automation using Postman and Rest Assured. 4. Load and Performance testing using JMeter and K6. 5. CI/CD using Gitlab and Jenkins. 6. New Relic for application performance management. Manual QA Skills -------------------------- 1. Test Plan Creation 2. Test Strategies and Coverage 3. Regression and Ad Hoc Testing 4. UI and Compatibility Testing 5. Agile Methodologies 6. Cross Browser Testing using BrowserStack and LambdaTest 7. Web Page Performance using Google Page Speed and YSlow 8. Web Debugging Proxy using Fiddler and Charles ProxyWiresharkCucumberSelenium WebDriverTest AutomationCypressRest AssuredCI/CDApache JMeterCharles ProxyNew RelicBrowserStackFiddlerAppiumPostmanGitLab - $50 hourly
- 5.0/5
- (11 jobs)
I specialize in writing Network Automation Infrastructure code, Network applications and System software for Linux and "Unix-like" OS's. The tools of my trade are Ansible, Python, C and C++. My Perl and shell-scripting skills aren't too bad either. I worked for more than 18 years at Cisco Systems, where I wrote software applications for IOS and IOS-XE switches and routers. In the process, I developed a deep understanding of how packets move, and about the boxes that make packets move. Outside of Networking, my areas of expertise include Linux and Embedded systems. I have hands-on experience with OpenStack and Docker. I have an understanding of Cloud Networking in the context of OpenStack Neutron. I possess decent writing skills, and a couple of my technical articles on the web register a few dozen hits every day. I take pains to document my work and explain them to my clients. I have received feedback telling me that I should have been a teacher. I have the ability to explain whatever I know in a clear manner free of jargon. I have 25+ years' overall experience in the software industry as a hands-on programmer. I've never been a people manager: all I've done for 25+ years is write, test, debug, deploy and support code. People familiar with my working style would describe me as "careful, methodical, systematic and logical" rather than "brilliant", "flamboyant" or "genius". Portfolio: ********** I divide my time between building solutions for my clients, creating open-source projects and writing the occasional article on programming network applications. My client projects include: - a set of Ansible playbooks (about 300 tasks in all) to install and configure an OpenStack instance on a single computer. The playbooks were embedded inside a Docker container, and running the container would start the ansible-playbook runs. The use-case was an IoT Edge installation, where the OpenStack instance would house VMs to run analytics on data coming from sensors. - an Ansible playbook to deploy and configure VyOS routers in an VmWare ESXi environment. Involved creating the router instances, creating VRFs and other related configuration. - a "domain name catcher" for Nominet in C: the work involved studying packet capture (PCAP) files using Python, running analysis using NumPy and matplotlib on the packet data, and using the insights thus obtained to tweak the behaviour of the C program. - use of profiling techniques to dramatically improve the performance of a C++ desktop network application: my client had a program that would scale poorly as the number of network hosts increased, which I was able to fix after studying the profiling results and reworking the data structures used in the program - a Perl interface to access Google Analytics - post-parsers in Python to process Google Vision API JSON outputs I am the author of several open-source projects, including: - an Ansible role that configures AAA, Layer-2, Layer-3, QoS and Netflow on a Cisco Catalyst switch. This makes extensive use of Jinja2 templates to generate the IOS configuration based on variables stored in YAML - a lookup plugin for Ansible that expands strings of the form "Gi3/1-4,Gi4/1-4" and generates a list of full individual interface names. This is extremely handy when writing Network Automation playbooks, for applying a configuration on a set of interfaces. - a Python PCAP to CSV converter (extracts fields from a PCAP file and populates the rows of a CSV document) - a Network Automation demo repository, where I have code to perform a particular network configuration task (creating a VLAN, its associated Layer 3 interfaces, IPv4 subnets and OSPF networks) using multiple approaches: Python (using the netmiko module), NETCONF/YANG, Chef, Puppet and Ansible I have a couple of fairly popular technical articles online: an article on Network Automation using various approaches, and one on using Python programming techniques to analyze packet capture (PCAP) files. Some examples of what I can do for you: ********************************************** - write/test/debug/deploy network automation code (Ansible playbooks, Python scripts etc.) - write/test/debug/deploy network applications, tools and utility scripts (in C, C++ and Python - Perl and bash/Bourne shell as well) - use standard GNU tools like gcc, gdb, gprof, gcov and make to build system software in C and C++ - create technical articles, blog posts, training material etc. on Networking and Network Automation - port open-source C/C++ projects to your platformWiresharkSNMPComputer NetworkNetwork EngineeringIptablesCisco RouterCSocket ProgrammingKernelNetwork SoftwareNetwork AdministrationLinux System AdministrationOpenVPNAnsibleLinux - $25 hourly
- 5.0/5
- (3 jobs)
I am a self-motivated and result-oriented networking and security professional with 6 years of overall experience with design, implementation, and troubleshooting. Expertise in the below Products / Technologies:- NGFW: FortiGate, Check Point, Juniper SRX, Sophos XGS, Cisco ASA, and SonicWall NSa. ADC: F5 LTM. Proxy: Cisco WSA & Zscaler. Routing: Cisco ISR & Juniper MX. Switching: Cisco Catalyst, Meraki MS, Juniper EX, and Aruba. Access Points: Cisco, Meraki, Cambium, and Ruckus. Linux: Ubuntu & RHEL. Cloud: AWS, Azure, GCP & OCI. What I bring to the table: - Years of implementation and troubleshooting experience. - High-quality work. - Multi OEM certifications. - Soft skills. Specialty: - Configuring and troubleshooting site-to-site VPNs. - Fine-tuning and hardening firewall configuration. - Configuring and troubleshooting BGP. - Analyzing TCPDUMP. - Troubleshooting coverage and speed related WiFi issues. I look forward to working with you!WiresharkJuniperDNSIPv6Network DesignOSPFCheck PointAmazon Web ServicesTCP/IPFortiGate FirewallCisco IOSCisco ASANetwork SecurityVPN - $40 hourly
- 5.0/5
- (1 job)
I am a cybersecurity Engineer. I have done projects on cryptography and Web development. I have also written research papers on cybersecurity. I can help with front end development, project management, cybersecurity tools and procedures and research & development. My tech-stack includes - HTML, CSS, Python, Bootstrap, Web Analytics, Penetration testing tools, Information security, Research and Development and others. Interpersonal Skills - Communications, Management, Presentation, Team Building. Others - CV writing, Documentation development, Presentation.WiresharkComputing & NetworkingOffice 365CManagement SkillsCybersecurity ToolComputer NetworkPythonNetwork EngineeringProject DeliveryResearch & DevelopmentCommunication SkillsCryptographyInformation SecurityFirewall - $25 hourly
- 4.9/5
- (3 jobs)
Hi there!!! ✅Have an issue with your SSL, DNS, or Networks? ✅Want to migrate your servers to Cloud or troubleshoot them? ✅Want to recover your lost accounts? ✅Want an Vulnerability assessment done? I'm Rohith, here to help ☝YOU with all of these. As an IBM certified cyber security analyst, I ensure the highest level of IT infrastructure security and with my experience in SYSTEM ADMINISTRATION, LINUX and NETWORKING, I would provide the best, optimal solution for your problems. Here's what sets me apart: Expertise in: Linux administration Network analysis System administration Cyber security System security Data security Frontend development with React, Node.js, and Bootstrap Technical support Effective communication skills, allowing me to understand and fulfill client requirements Quick learner with a proactive attitude, adapting to new technologies and staying ahead in the fast-paced industry Exceptional problem-solving abilities, meticulously analyzing challenges and devising innovative solutions Proven success in implementing robust security measures, managing complex systems, delivering seamless user experiences through responsive web development, and providing technical support Passionate cyber security enthusiast, constantly staying updated with the latest trends and advancements in the field Collaborative team player, adept at meeting deadlines while maintaining a high standard of work Dedicated to client satisfaction, evident through positive feedback and testimonials If you're seeking a talented professional with technical expertise, strong communication skills, reliable technical support, and a true passion for cyber security, let's discuss your project requirements and create something remarkable together!WiresharkEncryptionVulnerability AssessmentMongoDBTCP/IPCryptographyDigital ForensicsSQLMalware RemovalServer AdministrationPenetration TestingCyber Threat IntelligenceLinux System AdministrationVirtualizationNetwork Security - $50 hourly
- 0.0/5
- (0 jobs)
Projects _____________________________________________________________________ * DNS over DTLS: Created a PoC DNS Client-Server that uses DTLS in transport layer for better security, than plaintext DNS. * Oauth2 PoC : Implemented small subset of RFC6749, for learning Oauth2 authorization frameworkWiresharkSystem SecurityPython ScriptAPIAPI DevelopmentSecurity EngineeringGitHubGolangApplication SecurityDNSPython - $50 hourly
- 0.0/5
- (0 jobs)
A young, energetic and a result oriented professional with excellent academic and technical skills in Networks. Possesses good knowledge in networking concepts, Azure cloud services, Firewalls and Load Balancers, also possesses the knowledge of commands to configure and verify the configurations in Cisco, Juniper, F5(LTM), Checkpoint, Cisco ASA and Ciena Devices. A dedicated professional with hands on and brief knowledge on F5 SLB devices, Firewalls, Cisco Switches, LLBs and Routes. Excellent in troubleshooting and analyzing the problem and finding a solution out of it. Adroit at analyzing the organizational requirements, highly ethical, sincere, and trustworthy. Currently enhancing the skills on automation of network devices using PythonWiresharkFirewallCloud ComputingMicrosoft ExcelAgile Project ManagementCisco IOSPresentationsCisco ASAAutomationLoad BalancingLeadership SkillsIBM CloudMicrosoft Azure - $35 hourly
- 0.0/5
- (0 jobs)
Highly skilled and experienced Firewall Engineer with 10 years of expertise in designing, implementing, and managing network security solutions. Experienced in Palo Alto Networks and Check Point firewall technologies, AWS security configurations, Sumo Logic SIEM, and Python scripting. Committed to ensuring the utmost protection of organizational networks and data by leveraging advanced security measures and industry best practices. Key Skills: Firewall Support engineer Checkpoint firewall Palo Alto Firewall ITIL Framework Change Management Incident Management Cloudflare Python Over the years, I have performed the below activities in different environments Deploy new firewalls(Checkpoint and Palo alto) in Datacenter and cloud. Manage and configure firewalls using Panorama. Migrate firewall rule base from checkpoint to Palo alto. Work for the BPA activity to convert port based rules to APP based rule. Identify and tag unused, duplicate objects using python. Configure firewalls in Device groups and Templates. Deploy bulk address objects and rules using python. Implement advanced Palo Alto features like Zone protection, DNS sinkholing. Upgraded pan-os 9 to Panos-10 for firewalls and Panorama. Implement new vpn connections to Palo Alto and migrate old ones from checkpoint to Palo Alto. Investigate slowness issues for accessing the applications.WiresharkCheck PointPythonPalo Alto FirewallsTCP/IPVPN - $35 hourly
- 0.0/5
- (0 jobs)
Objective Gain hands-on experience in red teaming through real-world exercises to develop practical skills in ethical hacking. Continuously learn and adapt within the cybersecurity landscape by mastering cutting-edge tools and contributing innovative security strategies for the company. Write and present information in a way that is easy to understand for the target audience. Focus on using strong sentence structure, avoiding jargon, and adhering to proper grammar.WiresharkMicrosoft ExcelNetwork MapperMarketingProblem SolvingPresentationsWritingCommunicationsLinuxInformation Security - $100 hourly
- 0.0/5
- (0 jobs)
PROFILE SUMMARY A performance-driven IT and Support professional offering Experience of More than 10 Years in CCTV and Video Surveillance and overall IT Experience of more than 15 years. My professional experience as a Sr. Technical Support Engineer (APAC- EMEA) included providing first-level technical support to CCTV, VMS, Video Analytics for Verint VMS and SMC users/Partners and customers, by resolving their technical problems, both over the phone and Technical Support desk.WiresharkSQLTechnical Support - $70 hourly
- 0.0/5
- (0 jobs)
CAREER PROFILE I have over 13 years of experience in testing and cloud technologies. My background includes comprehensive testing across various industries to ensure the quality and reliability of software applications. Able to work independently and as part of a team. I am a strategic thinker with strong leadership skills, proficient at driving successful testing initiatives and cloud solutions. CAREER HIGHLIGHT * Hands on experience in all kinds of performance testing like scalability , reliability and spike testing. * Hands on experience in container-based technologies Kubernetes, Docker. * Led end-to-end performance/Load testing activities for complex software applications across multiple domains, ensuring adherence to quality standards and project timelines. * Implemented automated Load testing solutions using different tools, significantly reducing testing cycle times and improving test coverage.WiresharkVirtualizationDockerReliability TestingPythonBash ProgrammingSQLLinuxLoad TestingGrafanaSplunkMicrosoft AzureApache JMeterLoadRunnerQA Testing - $25 hourly
- 4.7/5
- (7 jobs)
Having more than 10 Years of experience in cyber security domain with proven practical experience in Threat Hunting, Google Dorking, Open-Source Intelligence, threat modelling, security code review, Penetration Testing(Web/Mobile) and implementing cyber security best practices into the organizations. Proficient in threat hunting using MITRE ATT&CK, STRIDE, PASTA, OWASP Threat Dragon frameworks for conducting Threat Modelling framework, TTP’s and develop a heatmap. Experience in using Python Boto3, AWS responder, libcloudforensics, AWS Security - Step Functions, AWS Lambda, CSP header verification using Python Scripts, AWS Step Functions and Canary tokens. Hands-on experience in malware analysis through sandboxing techniques. Experienced in analyzing registry keys, event codes, and network telemetry logs. Capable of network traffic dumping and pcap analysis with tcpdump and network miner. Hands-On experience in malware analysis, specializing Android(Java) malware, reverse engineering, code obfuscation and static analysis. Familiar with fileless malware detection and other persistence techniques. Proficient in browser extension and double file extension analysis. Utilize threat analysis reports from Red Canary, CrowdStrike, and Palo Alto Networks for reconnaissance. Proficient with CTI methodologies including analysis through frameworks such as the Pyramid of Pain, Diamond Model, and Cyber Kill Chain. Capable of ensuring strong emphasis on security across web, thick client, API, mobile (iOS & Android), Kubernetes, containers, and cloud hosted services (AWS/AZURE). Experienced in handling F5 products (BIGIP-Next, F5OS, SPK), BIGIP, NGINX core and NGINX Plus. Strong technical experience in implementing cybersecurity methodologies such as NIST, OSSTMM, M(ASVS), SANS, MITRE ATT&CK and NIST & OWASP standards, with expertise in identifying application weaknesses, attack vectors, exploitation techniques, and countermeasures. Well versed with TCP/IP, packet analysis(pcap), protocol analysis, web sockets, Endpoint analysis, network forensics, OAUTH 2.0, OpenID Connect and SAML identity protocols. Implemented secure coding practices, reducing vulnerabilities and proficient in tools like Fortify and SecureCodeBox. Extensive experience in using fuzzing tools like DirBuster, FFUF tools. Hands-on programming skills using Java, JavaScript and Python Areas of Expertise– Digital Forensics, Threat Hunting, Automation by Python Scripting. Certified GIAC-Mobile Device Security and Ethical Hacker (GMOB). Certified EC-Secure Programmer (ECSP) and Certified Ethical Hacker (CEH). Successfully completed the "Advanced Infrastructure Security Assessment" course at the Null conference in 2022. Successfully completed the "Breaking and Owning Applications and Servers on AWS and Azure" course at the Null conference in 2019 Developed security policies, ensuring compliance and smooth application delivery. Good at using governance tools like JIRA, Confluence etc. Web & Mobile Application: CheckMarx, Fortify, SecureCodeBox, SonarQube, Burp Suite (Pro & Free), Fiddler, OWASP Zap Proxy, Paros Proxy, W3af, Echo Mirage, Snallygaster, PenCrawler, Hackbox, Galileo, FFUF, InfectionMonkey, Drozer, MobSF, Jadx, JD-GUI, Santoku, AndroidTamer, Adhrit, Reverse APK, Clutch, Rp++, Frida/Objection, Needle Framework, iFunbox, RastiCrac, Otool, Class-dump, iLEAPP, ALEAPP. Threat Hunting and Telemetry Analysis: Tcpdump, Wireshark, ATT&CK MITRE(TTP’s), Mimikatz, Scapy, PyShark, Network Miner, Zeek, Splunk, Sysmon, Snort, Wazuh, ElasticSearch(ELK), Suricata. Web Services & Network Assessment: WSSAT 2.0, Astra, Postman, SoapUI, API Fuzzer, Nmap, Nessus, Kali Linux, Metasploit, Crunch, Cain Cloud & Containers, Threat Modelling AWS Inspect, S3 Inspect, Bucket Finder, Guard, Clair, Anchore, Trivy, STRIDE, DREAD, Microsoft Threat Modelling Tool, Client satisfaction and quality of work are my top priorities. I'm a problem solver and I'm glad to help you with any task you have on your website. Regards, Sandeep TWiresharkSecurity TestingVulnerability AssessmentInformation SecurityPenetration TestingKali LinuxWebsite SecurityCryptographyMobile App TestingWeb App Penetration TestingNetwork Penetration TestingCode ReviewNetwork SecurityEncryption - $25 hourly
- 0.0/5
- (0 jobs)
Hi there, I am Harishankar Kumar (M, 21), A software engineer from India working hard to bootstrap an LLM-based startup. I started programming at a very young age, and since my first exposure to HTML/PHP, I have coded in a plethora of tech stacks/languages; with years and years of coding, I have developed this knack for visualizing software development steps that are needed to create any product. Tell me if it's an Android app or a React web page, and I will tell you precisely what libraries/languages you need to use for your problem! My expertise lies in communication and making all the complicated technical problems disappear (or look easy!) For consulting, I do not charge anything and would love to help you find your solution! However, if you like my plan/ideas, You can always commission me for any extra dedicated time/effort required, I believe myself to have good programming skills, and more than anything the framework to learn anything new if required for the job, if needed I can always connect you to friends in industries specializing at their crafts. ------ Here are the things I have worked on (ordered with respect to recency) ------ - OpenAI ChatGPT API, RAGs, Prompt Engineering (LLMs) - Python, FastAPI, Docker, Docker Compose (Backend) - Elasticsearch, RabbitMQ, Azure SQL, MongoDB, Scrapy, Azure AD B2C (Services) - ReactJS, Typescript, Redux, MaterialUI, Webpack (Frontend) - Java, Android Studio, Flutter (Mobile Development) - Yacc, Lex, pylex (Compilers) - C++/C, Virtual Machines (GSoC, ScummVM) - Powershell, CMD Batch, Shell Scripts (Scripting) - Fiddler, Wireshark, Winpcap, Windivert (Network Debugging and Proxy, MITM) - SDL2, Blender, Unity (Game Development) - WordPress (Oh I love blogging XD) - PHP, Silverlight, C Sharp (Windows/Windows Phone/Web backend development (legacy)) ------ Non-technical (I am a Hooman) ------ - Good communicator, has empathy and has lots of friends. - Very social, good technical/nontech contacts (In case help is needed) - Books lover, read many fiction/non-fiction books, viz. Atomic Habits, How to win friends and influence people, Alter Ego effect, Man's search for meaning, etc.! - Anime/Manga huge fan! - Loves playing badminton and being healthy! I am looking forward working with you, I promise it will be fun!WiresharkTechnical Project ManagementFiddlerGameUnityBlenderSolidityComputer ScienceAndroidAndroid App DevelopmentPythonC++C#JavaJavaScript - $15 hourly
- 0.0/5
- (0 jobs)
I'm a QA professional with overall 16 years of experience across STLC, Test management, SQA and 5 years of extensive experience in Project Management includes planning, resourcing, quality metrics, risk analysis, coordinating and implementing projects within the decided-upon budget, timeline, and scope.WiresharkMicrosoft ProjectManagement SkillsGitMicrosoft Power BITestingAgile Project ManagementMicrosoft VisioBug ReportsSprint PlanningBugzillaJiraTest Results & AnalysisPerformance TestingStatic Testing - $20 hourly
- 0.0/5
- (0 jobs)
Objectives : As an Engineering Student and hands-on experience on cisco routers, cisco switches, real network has help me lot in networking field. I am looking forward to work with companies where I can learn, work and grow Professionally and Personally. An Inspiring IT Student with interest in Cybersecurity seeking a Full-time Internship for summer 2024.WiresharkC ShellCC++OSPFCiscoComputer NetworkNetwork EngineeringAdministrateCisco RouterRouterPythonDNSSystem Administration - $8 hourly
- 0.0/5
- (0 jobs)
PROJECTS I did project in my masters 1. Organ Donation System Front-end: HTML, CSS, Java scripts Back-end: Python Framework Django Database: MySQL 2. Courier Management System Front-end: HTML, CSS, Java scripts, java Back-end: PHP Database: MySQL 3. Online Voting Android App SECURITY SKILLS * Find out the web vulnerability and make it sure. * In The Part of VAPT, I did the host-based testing, Machine based testing, Network Based Testing. * I have hand-on experience with following tools Nmap Nessus Wireshark Burp Suite Hydra Tool Shell Scripting * Worked with Nessus security solution. * For the website Security I worked with Nmap, Webanalyzzer, OWASP Zap, Directory buster. * Perform security audit of RCE in Windows System. * CVE Testing for the Vulnerability.WiresharkScriptingPythonEthical HackingNessus - $10 hourly
- 0.0/5
- (0 jobs)
👨💻 Web Developer: Crafting user-friendly websites and applications. 🔒 Cybersecurity Enthusiast: Protecting digital assets and ensuring safe online experiences. 🚀 DevOps Advocate: Automating software delivery pipelines for efficiency. 🌐 Tech Content Creator: Sharing knowledge on YouTube. Full project management from start to finish. Regular communication is important to me, so let’s keep in touch.WiresharkPrivate CloudSystem AutomationCloud ComputingAutomationAI ChatbotJavaScriptBashAnsibleKali LinuxAWS DevelopmentDevOpsSOC 1DockerPython Script - $6 hourly
- 0.0/5
- (0 jobs)
SUMMARY Passionate cybersecurity specialist with a proven track record in identifying vulnerabilities, managing risks, and implementing robust security measures. Equipped with hands-on experience in threat detection, incident response, and network defense, I am eager to apply my skills to safeguard the emerging cyber threats and enhance overall security posture. Committed to leveraging my expertise to deliver innovative solutions and contribute to a secure digital environment.WiresharkEthical HackingCryptographyOWASPPenetration TestingNetwork AnalysisWeb Application SecurityMalware DetectionVulnerability AssessmentSOC 1Information SecuritySplunkMetasploitCybersecurity ManagementCyber Threat Intelligence - $5 hourly
- 0.0/5
- (0 jobs)
I'm a dedicated cybersecurity professional with a passion for ethical hacking and digital defense. With a strong foundation in network security, vulnerability assessment, and penetration testing, I'm consistently demonstrated the ability to safeguard sensitive information and protect organizations from cyber threats. Beyond technical skills, I'm committed to staying updated with the latest cybersecurity trends and continuously improving their knowledge through ongoing education and practical experience. As a proactive and analytical thinker, I'm passionate about creating a safer digital environment and is always ready to tackle new challenges in the ever-evolving field of cybersecurity.WiresharkSecurity TestingSecurity ManagementVulnerability AssessmentSecurity AnalysisNessusCybersecurity ToolCybersecurity MonitoringCybersecurity ManagementEthical HackingCyber Threat Intelligence - $200 hourly
- 0.0/5
- (0 jobs)
PROFESSIONAL SUMMARY Motivated cyber security professional with expertise in Ethical Hacking. Skilled in utilizing tools like Nessus, Burpsuit and Nmap to identify vulnerabilities. Seeking an opportunity to leverage my potential and contribute to the growth of the organization. SKILLS 1. Penetration Testing: Specializes in identifying and exploiting system vulnerabilities to enhance security. Demonstrates a keen interest and advanced skills in privilege escalation techniques, ensuring thorough security assessments. 2. Ethical Hacking: Proficient in conducting comprehensive security assessments using ethical hacking techniques. Adept at simulating real-world cyber attacks to identify weaknesses, ensuring robust protection against unauthorized access and potential threats. 3. Linux Operating System: Navigating the system's directories Manipulating files in the LinuxWiresharkCybersecurity ToolInformation SecurityNessusAdobe InDesignAdobe PhotoshopCorelDRAWFigmaGraphic DesignPenetration TestingEthical Hacking - $30 hourly
- 0.0/5
- (0 jobs)
Do you want to know how a passion for networking transforms into real-world solutions? Explore my journey in the ever-evolving tech landscape! Drawing from 5+ years in network and systems engineering, I specialize in seamlessly weaving complex technical solutions into everyday business needs. As a Senior Network Engineer at APSFL, I've thrived in highpressure environments, ensuring network reliability for widespread infrastructure across multiple districts. My toolkit is rich with handson experience in configuring, troubleshooting, and optimizing Cisco routers and switches to foster enhanced connectivity and security. My technical prowess is complemented by a thorough academic grounding with a PGDBM from Osmania University and a B.Tech in ECE. Adding to that, I hold Cisco Certifications (CCNP ENCOR, CCNA R&S), which keep me at the cutting edge of network engineering technologies. I believe in proactive problem-solving and have effectively ledWiresharkCisco ACITCP/IPCisco RouterNetwork DesignMultiprotocol BGPOSPFNetwork ArchitectureVPNNetwork EngineeringCisco Certified Network ProfessionalCisco Certified Network AssociateComputer Network - $10 hourly
- 0.0/5
- (0 jobs)
experienced wireless software developer with c/c++/python, embedded, rtos ,5g, matlab ,3gpp, github, github, linux skillsWiresharkBitbucketJiraGitHubLinuxEmbedded CWireless Communication5GPythonMATLABC++C - $20 hourly
- 0.0/5
- (0 jobs)
SR. QA ENGINEER Career Objective Dedicated and disciplined professional seeking the position to contribute to the company's growth and in turn ensuring personal growth within the Organisation. Detail oriented and experienced Software Tester with a stellar record of corporate client satisfaction. Proven achievement in bringing projects to completion. RELEVANT SKILLS DevOps - Kubernetes, Docker, Jenkins. AWS Automation /Man ual Testin g Fun ction al/Non - Functional Testing TESTING/TICKET TOOLS Postman Selen ium Jmeter Testrail Jira Wiresh ark Zen deskWireshark5GDiameterApache JMeterJenkinsDockerKubernetesQuality AssuranceTest Results & AnalysisSoftware Testing - $10 hourly
- 0.0/5
- (0 jobs)
SUMMARY* Dedicated and detail-oriented cybersecurity professional with a strong foundation in computer science and a focus on offensive and defensive security measures. Proficient in Python programming, with hands-on experience in developing security tools, conducting malware analysis, and performing blockchain network security audits. Accomplished in completing over 40 rooms in TryHackMe and engaging with Hack The Box (HTB) challenges, demonstrating a commitment to continuous learning and skill enhancement. Eager to apply technical expertise and analytical skills to protect digital assets and mitigate security risks in a dynamic and challenging environment.WiresharkJavaScriptCSSHTMLdBaseSQL Injection MitigationPythonJava - $10 hourly
- 0.0/5
- (0 jobs)
I am a Certified Penetration Tester with expertise in web and network security. I specialize in identifying and mitigating vulnerabilities through comprehensive security assessments for both applications and infrastructure. My skills include: Web Application Security: Proficient in OWASP Top 10 vulnerabilities like SQL Injection, Cross-Site Scripting (XSS), and more. Network Security: Expertise in scanning and securing networks using tools like Nmap, Nessus, and Wireshark. Ethical Hacking & Penetration Testing: Hands-on experience using Burp Suite, Metasploit, and Kali Linux to test and strengthen security defenses. Malware Analysis & Incident Response: Skilled in identifying, analyzing, and responding to potential cyber threats. With certifications such as the IBM Cybersecurity Analyst and experience in ethical hacking, I am committed to delivering top-notch security solutions that protect your digital assets. Let's collaborate to fortify your system and safeguard your data!WiresharkPythonTCP/IPOWASPInformation SecuritySystem AdministrationNetwork AdministrationMetasploitNetwork Penetration TestingWeb App Penetration TestingPenetration TestingVulnerability Assessment - $45 hourly
- 0.0/5
- (1 job)
I am a seasoned IT professional with extensive expertise in AWS cloud networking and security services coupled with in-depth knowledge of Palo Alto Next-Generation Firewalls (NGFWs) With a strong focus on creating secure, scalable, and resilient cloud infrastructures, I help businesses safeguard their digital assets while optimizing network performance. Key Skills & Expertise: AWS Cloud Networking:VPC design, Subnetting, Route Tables, NAT Gateways, Transit Gateway, Direct Connect, VPN configurations, and Elastic Load Balancing. AWS Security Services: IAM (Identity and Access Management), Security Groups, NACLs, WAF (Web Application Firewall), GuardDuty, CloudTrail, and Security Hub. Palo Alto Networks NGFW:Firewall rule management, Threat Prevention, SSL Decryption, User-ID, App-ID, VPN configurations, and integration with AWS. Network Security: Implementing and managing robust security architectures, intrusion detection and prevention systems (IDS/IPS), and securing hybrid cloud environments. Automation & Scripting:Using Python and Bash for automating network tasks, policy enforcement, and security auditing. Why Choose Me? Proven Track Record: I have successfully designed and implemented secure AWS environments for various clients, ensuring seamless integration with on-premises networks and third-party services. End-to-End Solutions:From initial assessment and design to deployment and ongoing management, I offer comprehensive solutions tailored to your specific needs. Continuous Learning: I stay up-to-date with the latest advancements in cloud security and networking to provide cutting-edge solutions that meet the evolving needs of the industry. Let's Connect I am committed to helping you achieve your goals by delivering top-notch services that exceed your expectations. Whether you need assistance with a new project or ongoing support, let's connect and discuss how I can contribute to your success.WiresharkWeb Application FirewallAWS Systems ManagerAWS PrivateLinkTroubleshootingNetwork AnalysisAmazon Web ServicesFiddlerMultiprotocol BGPAWS CloudTrailPalo Alto FirewallsNetwork SecurityVPNInternet Protocol SecurityFirewall - $25 hourly
- 5.0/5
- (10 jobs)
With 7+ years of experience as a Senior Embedded Firmware Developer, I excel in IoT product development, Home Automation & Control, Firmware design and development for Arduino, ESP32 microcontrollers, Nordic semiconductors SoCs, and many more. 🚀 Technical Expertise ---------------------------- ✔ [Programming Language] : [ Embedded C/C++ | Python ] ✔ [ RF/Wireless protocol ] : [ BLE | Bluetooth | WiFi | Zigbee | Z-Wave | Thread | Matter ] ✔ [ Operating System ] : [ FreeRTOS | Zephyr RTOS | BareMetal | Linux | Yocto | Kernel ] ✔ [ Version Control Tool ] : [ Git | JIRA | Bitbucket ] ✔ [ Serial protocol ] : [ UART | I2C | SPI | CAN ] ✔ [ Communications (PLC) ] : [ MQTT | CoAP | HTTP ] ✔ [ Debugging Tools ] : [ Oscilloscope | Logic Analyzer | Wireshark | Ubiqua Protocol Analyzer | JTAG | Power Profiler ] ✔ [ Framework ] : [ Visual Studio | Beyond Studio | MCUXpresso | ESP-IDF | Arduino IDE | Segger Embedded Studio | STM32CubeMX | Keil | Vim ] ✔[ Platform ] : [ ESP32 | ESP32 Cam | Arduino | SIM800/SIM900 GSM Module | Nordic Semiconductor ( nRF9160, nRF51 and nRF52 series ) | NXP I.MX6 and I.MX8 series | STM32 | JN5169 | Raspberry Pi4 ] ✔ Firmware OTA over WiFi and BLE 🚀 What can I do for you? ------------------------------- [ Firmware Design & Development ] : - Designing and developing wireless solutions for IoT applications. - Integration of wireless protocols and communication modules into existing systems. - Troubleshooting and debugging critical issues, optimizations, collaborative problem-solving, and product enhancement. - I can architect and develop your firmware from the ground up. I prioritize delivering high-quality work, ensuring customer satisfaction, and meeting deadlines without compromising on the quality of work. My strong analytical and problem-solving skills enable me to maintain effective communication with clients, providing regular updates and fostering a collaborative and transparent work environment. 🔺Rate Determination --------------------------- The rate I provided is an average figure. Depending on the project’s complexity, it may vary slightly—either up or down. Rest assured that my rate reflects my experience and expertise. I won’t bill you for idle hours or time spent to learn anything required for a project. My invoicing will strictly cover the hours I dedicate to advancing the project in a meaningful way. 🔺Keywords ----------------- Embedded C | Embedded System | Firmware | Microcontroller Programming | Microprocessor Programming | IoT | ESP32 | Arduino | Nordic | nRF52 | BLE | WiFi | Bluetooth | Zephyr | FreeRTOS | ESP-IDF | Espressif | Yocto | Kernel | CameraWiresharkZephyrUARTBluetooth LECAN BusZigbeeFreeRTOSLinuxEmbedded ApplicationEmbedded Operating SystemEmbedded LinuxEmbedded C Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.