Hire the best Wireshark Developers in India

Check out Wireshark Developers in India with the skills you need for your next job.
  • $20 hourly
    Senior Quality Analyst with full system development lifecycle experience, including designing, developing and implementing test plans, test cases and test processes fueling swift corrective actions, significant cost savings and fault-free audits. Backed by more than 8 years of strong industry proficiency including high profile software version releases, advanced command of various testing suites, Agile methodologies; cross-functional skills in Business Analysis and Product Management. Conducted formal and informal product design reviews throughout the software development lifecycle to provide input on functional requirements, product designs, schedules and potential issues. Leveraged developer relationship background to communicate effectively with software design team, quickly gaining their respect and becoming a valued, “go-to” team member on challenging test cases. QA Automation Skills -------------------------- 1. Web App Automation using Selenium Web Driver and Cypress 2. Mobile App Automation using Appium. 3. API Automation using Postman and Rest Assured. 4. Load and Performance testing using JMeter and K6. 5. CI/CD using Gitlab and Jenkins. 6. New Relic for application performance management. Manual QA Skills -------------------------- 1. Test Plan Creation 2. Test Strategies and Coverage 3. Regression and Ad Hoc Testing 4. UI and Compatibility Testing 5. Agile Methodologies 6. Cross Browser Testing using BrowserStack and LambdaTest 7. Web Page Performance using Google Page Speed and YSlow 8. Web Debugging Proxy using Fiddler and Charles Proxy
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cucumber
    Selenium WebDriver
    Test Automation
    Cypress
    Rest Assured
    CI/CD
    Apache JMeter
    Charles Proxy
    New Relic
    BrowserStack
    Fiddler
    Appium
    Postman
    GitLab
  • $50 hourly
    I specialize in writing Network Automation Infrastructure code, Network applications and System software for Linux and "Unix-like" OS's. The tools of my trade are Ansible, Python, C and C++. My Perl and shell-scripting skills aren't too bad either. I worked for more than 18 years at Cisco Systems, where I wrote software applications for IOS and IOS-XE switches and routers. In the process, I developed a deep understanding of how packets move, and about the boxes that make packets move. Outside of Networking, my areas of expertise include Linux and Embedded systems. I have hands-on experience with OpenStack and Docker. I have an understanding of Cloud Networking in the context of OpenStack Neutron. I possess decent writing skills, and a couple of my technical articles on the web register a few dozen hits every day. I take pains to document my work and explain them to my clients. I have received feedback telling me that I should have been a teacher. I have the ability to explain whatever I know in a clear manner free of jargon. I have 25+ years' overall experience in the software industry as a hands-on programmer. I've never been a people manager: all I've done for 25+ years is write, test, debug, deploy and support code. People familiar with my working style would describe me as "careful, methodical, systematic and logical" rather than "brilliant", "flamboyant" or "genius". Portfolio: ********** I divide my time between building solutions for my clients, creating open-source projects and writing the occasional article on programming network applications. My client projects include: - a set of Ansible playbooks (about 300 tasks in all) to install and configure an OpenStack instance on a single computer. The playbooks were embedded inside a Docker container, and running the container would start the ansible-playbook runs. The use-case was an IoT Edge installation, where the OpenStack instance would house VMs to run analytics on data coming from sensors. - an Ansible playbook to deploy and configure VyOS routers in an VmWare ESXi environment. Involved creating the router instances, creating VRFs and other related configuration. - a "domain name catcher" for Nominet in C: the work involved studying packet capture (PCAP) files using Python, running analysis using NumPy and matplotlib on the packet data, and using the insights thus obtained to tweak the behaviour of the C program. - use of profiling techniques to dramatically improve the performance of a C++ desktop network application: my client had a program that would scale poorly as the number of network hosts increased, which I was able to fix after studying the profiling results and reworking the data structures used in the program - a Perl interface to access Google Analytics - post-parsers in Python to process Google Vision API JSON outputs I am the author of several open-source projects, including: - an Ansible role that configures AAA, Layer-2, Layer-3, QoS and Netflow on a Cisco Catalyst switch. This makes extensive use of Jinja2 templates to generate the IOS configuration based on variables stored in YAML - a lookup plugin for Ansible that expands strings of the form "Gi3/1-4,Gi4/1-4" and generates a list of full individual interface names. This is extremely handy when writing Network Automation playbooks, for applying a configuration on a set of interfaces. - a Python PCAP to CSV converter (extracts fields from a PCAP file and populates the rows of a CSV document) - a Network Automation demo repository, where I have code to perform a particular network configuration task (creating a VLAN, its associated Layer 3 interfaces, IPv4 subnets and OSPF networks) using multiple approaches: Python (using the netmiko module), NETCONF/YANG, Chef, Puppet and Ansible I have a couple of fairly popular technical articles online: an article on Network Automation using various approaches, and one on using Python programming techniques to analyze packet capture (PCAP) files. Some examples of what I can do for you: ********************************************** - write/test/debug/deploy network automation code (Ansible playbooks, Python scripts etc.) - write/test/debug/deploy network applications, tools and utility scripts (in C, C++ and Python - Perl and bash/Bourne shell as well) - use standard GNU tools like gcc, gdb, gprof, gcov and make to build system software in C and C++ - create technical articles, blog posts, training material etc. on Networking and Network Automation - port open-source C/C++ projects to your platform
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    SNMP
    Computer Network
    Network Engineering
    Iptables
    Cisco Router
    C
    Socket Programming
    Kernel
    Network Software
    Network Administration
    Linux System Administration
    OpenVPN
    Ansible
    Linux
  • $25 hourly
    I am a self-motivated and result-oriented networking and security professional with 6 years of overall experience with design, implementation, and troubleshooting. Expertise in the below Products / Technologies:- NGFW: FortiGate, Check Point, Juniper SRX, Sophos XGS, Cisco ASA, and SonicWall NSa. ADC: F5 LTM. Proxy: Cisco WSA & Zscaler. Routing: Cisco ISR & Juniper MX. Switching: Cisco Catalyst, Meraki MS, Juniper EX, and Aruba. Access Points: Cisco, Meraki, Cambium, and Ruckus. Linux: Ubuntu & RHEL. Cloud: AWS, Azure, GCP & OCI. What I bring to the table: - Years of implementation and troubleshooting experience. - High-quality work. - Multi OEM certifications. - Soft skills. Specialty: - Configuring and troubleshooting site-to-site VPNs. - Fine-tuning and hardening firewall configuration. - Configuring and troubleshooting BGP. - Analyzing TCPDUMP. - Troubleshooting coverage and speed related WiFi issues. I look forward to working with you!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Juniper
    DNS
    IPv6
    Network Design
    OSPF
    Check Point
    Amazon Web Services
    TCP/IP
    FortiGate Firewall
    Cisco IOS
    Cisco ASA
    Network Security
    VPN
  • $40 hourly
    I am a cybersecurity Engineer. I have done projects on cryptography and Web development. I have also written research papers on cybersecurity. I can help with front end development, project management, cybersecurity tools and procedures and research & development. My tech-stack includes - HTML, CSS, Python, Bootstrap, Web Analytics, Penetration testing tools, Information security, Research and Development and others. Interpersonal Skills - Communications, Management, Presentation, Team Building. Others - CV writing, Documentation development, Presentation.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Computing & Networking
    Office 365
    C
    Management Skills
    Cybersecurity Tool
    Computer Network
    Python
    Network Engineering
    Project Delivery
    Research & Development
    Communication Skills
    Cryptography
    Information Security
    Firewall
  • $25 hourly
    Hi there!!! ✅Have an issue with your SSL, DNS, or Networks? ✅Want to migrate your servers to Cloud or troubleshoot them? ✅Want to recover your lost accounts? ✅Want an Vulnerability assessment done? I'm Rohith, here to help ☝YOU with all of these. As an IBM certified cyber security analyst, I ensure the highest level of IT infrastructure security and with my experience in SYSTEM ADMINISTRATION, LINUX and NETWORKING, I would provide the best, optimal solution for your problems. Here's what sets me apart: Expertise in: Linux administration Network analysis System administration Cyber security System security Data security Frontend development with React, Node.js, and Bootstrap Technical support Effective communication skills, allowing me to understand and fulfill client requirements Quick learner with a proactive attitude, adapting to new technologies and staying ahead in the fast-paced industry Exceptional problem-solving abilities, meticulously analyzing challenges and devising innovative solutions Proven success in implementing robust security measures, managing complex systems, delivering seamless user experiences through responsive web development, and providing technical support Passionate cyber security enthusiast, constantly staying updated with the latest trends and advancements in the field Collaborative team player, adept at meeting deadlines while maintaining a high standard of work Dedicated to client satisfaction, evident through positive feedback and testimonials If you're seeking a talented professional with technical expertise, strong communication skills, reliable technical support, and a true passion for cyber security, let's discuss your project requirements and create something remarkable together!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Encryption
    Vulnerability Assessment
    MongoDB
    TCP/IP
    Cryptography
    Digital Forensics
    SQL
    Malware Removal
    Server Administration
    Penetration Testing
    Cyber Threat Intelligence
    Linux System Administration
    Virtualization
    Network Security
  • $50 hourly
    Projects _____________________________________________________________________ * DNS over DTLS: Created a PoC DNS Client-Server that uses DTLS in transport layer for better security, than plaintext DNS. * Oauth2 PoC : Implemented small subset of RFC6749, for learning Oauth2 authorization framework
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    System Security
    Python Script
    API
    API Development
    Security Engineering
    GitHub
    Golang
    Application Security
    DNS
    Python
  • $50 hourly
    A young, energetic and a result oriented professional with excellent academic and technical skills in Networks. Possesses good knowledge in networking concepts, Azure cloud services, Firewalls and Load Balancers, also possesses the knowledge of commands to configure and verify the configurations in Cisco, Juniper, F5(LTM), Checkpoint, Cisco ASA and Ciena Devices. A dedicated professional with hands on and brief knowledge on F5 SLB devices, Firewalls, Cisco Switches, LLBs and Routes. Excellent in troubleshooting and analyzing the problem and finding a solution out of it. Adroit at analyzing the organizational requirements, highly ethical, sincere, and trustworthy. Currently enhancing the skills on automation of network devices using Python
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Firewall
    Cloud Computing
    Microsoft Excel
    Agile Project Management
    Cisco IOS
    Presentations
    Cisco ASA
    Automation
    Load Balancing
    Leadership Skills
    IBM Cloud
    Microsoft Azure
  • $35 hourly
    Highly skilled and experienced Firewall Engineer with 10 years of expertise in designing, implementing, and managing network security solutions. Experienced in Palo Alto Networks and Check Point firewall technologies, AWS security configurations, Sumo Logic SIEM, and Python scripting. Committed to ensuring the utmost protection of organizational networks and data by leveraging advanced security measures and industry best practices. Key Skills: Firewall Support engineer Checkpoint firewall Palo Alto Firewall ITIL Framework Change Management Incident Management Cloudflare Python Over the years, I have performed the below activities in different environments Deploy new firewalls(Checkpoint and Palo alto) in Datacenter and cloud. Manage and configure firewalls using Panorama. Migrate firewall rule base from checkpoint to Palo alto. Work for the BPA activity to convert port based rules to APP based rule. Identify and tag unused, duplicate objects using python. Configure firewalls in Device groups and Templates. Deploy bulk address objects and rules using python. Implement advanced Palo Alto features like Zone protection, DNS sinkholing. Upgraded pan-os 9 to Panos-10 for firewalls and Panorama. Implement new vpn connections to Palo Alto and migrate old ones from checkpoint to Palo Alto. Investigate slowness issues for accessing the applications.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Check Point
    Python
    Palo Alto Firewalls
    TCP/IP
    VPN
  • $35 hourly
    Objective Gain hands-on experience in red teaming through real-world exercises to develop practical skills in ethical hacking. Continuously learn and adapt within the cybersecurity landscape by mastering cutting-edge tools and contributing innovative security strategies for the company. Write and present information in a way that is easy to understand for the target audience. Focus on using strong sentence structure, avoiding jargon, and adhering to proper grammar.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Microsoft Excel
    Network Mapper
    Marketing
    Problem Solving
    Presentations
    Writing
    Communications
    Linux
    Information Security
  • $100 hourly
    PROFILE SUMMARY A performance-driven IT and Support professional offering Experience of More than 10 Years in CCTV and Video Surveillance and overall IT Experience of more than 15 years. My professional experience as a Sr. Technical Support Engineer (APAC- EMEA) included providing first-level technical support to CCTV, VMS, Video Analytics for Verint VMS and SMC users/Partners and customers, by resolving their technical problems, both over the phone and Technical Support desk.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    SQL
    Technical Support
  • $70 hourly
    CAREER PROFILE I have over 13 years of experience in testing and cloud technologies. My background includes comprehensive testing across various industries to ensure the quality and reliability of software applications. Able to work independently and as part of a team. I am a strategic thinker with strong leadership skills, proficient at driving successful testing initiatives and cloud solutions. CAREER HIGHLIGHT * Hands on experience in all kinds of performance testing like scalability , reliability and spike testing. * Hands on experience in container-based technologies Kubernetes, Docker. * Led end-to-end performance/Load testing activities for complex software applications across multiple domains, ensuring adherence to quality standards and project timelines. * Implemented automated Load testing solutions using different tools, significantly reducing testing cycle times and improving test coverage.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Virtualization
    Docker
    Reliability Testing
    Python
    Bash Programming
    SQL
    Linux
    Load Testing
    Grafana
    Splunk
    Microsoft Azure
    Apache JMeter
    LoadRunner
    QA Testing
  • $25 hourly
    Having more than 10 Years of experience in cyber security domain with proven practical experience in Threat Hunting, Google Dorking, Open-Source Intelligence, threat modelling, security code review, Penetration Testing(Web/Mobile) and implementing cyber security best practices into the organizations. Proficient in threat hunting using MITRE ATT&CK, STRIDE, PASTA, OWASP Threat Dragon frameworks for conducting Threat Modelling framework, TTP’s and develop a heatmap. Experience in using Python Boto3, AWS responder, libcloudforensics, AWS Security - Step Functions, AWS Lambda, CSP header verification using Python Scripts, AWS Step Functions and Canary tokens. Hands-on experience in malware analysis through sandboxing techniques. Experienced in analyzing registry keys, event codes, and network telemetry logs. Capable of network traffic dumping and pcap analysis with tcpdump and network miner. Hands-On experience in malware analysis, specializing Android(Java) malware, reverse engineering, code obfuscation and static analysis. Familiar with fileless malware detection and other persistence techniques. Proficient in browser extension and double file extension analysis. Utilize threat analysis reports from Red Canary, CrowdStrike, and Palo Alto Networks for reconnaissance. Proficient with CTI methodologies including analysis through frameworks such as the Pyramid of Pain, Diamond Model, and Cyber Kill Chain. Capable of ensuring strong emphasis on security across web, thick client, API, mobile (iOS & Android), Kubernetes, containers, and cloud hosted services (AWS/AZURE). Experienced in handling F5 products (BIGIP-Next, F5OS, SPK), BIGIP, NGINX core and NGINX Plus. Strong technical experience in implementing cybersecurity methodologies such as NIST, OSSTMM, M(ASVS), SANS, MITRE ATT&CK and NIST & OWASP standards, with expertise in identifying application weaknesses, attack vectors, exploitation techniques, and countermeasures. Well versed with TCP/IP, packet analysis(pcap), protocol analysis, web sockets, Endpoint analysis, network forensics, OAUTH 2.0, OpenID Connect and SAML identity protocols. Implemented secure coding practices, reducing vulnerabilities and proficient in tools like Fortify and SecureCodeBox. Extensive experience in using fuzzing tools like DirBuster, FFUF tools. Hands-on programming skills using Java, JavaScript and Python Areas of Expertise– Digital Forensics, Threat Hunting, Automation by Python Scripting. Certified GIAC-Mobile Device Security and Ethical Hacker (GMOB). Certified EC-Secure Programmer (ECSP) and Certified Ethical Hacker (CEH). Successfully completed the "Advanced Infrastructure Security Assessment" course at the Null conference in 2022. Successfully completed the "Breaking and Owning Applications and Servers on AWS and Azure" course at the Null conference in 2019 Developed security policies, ensuring compliance and smooth application delivery. Good at using governance tools like JIRA, Confluence etc. Web & Mobile Application: CheckMarx, Fortify, SecureCodeBox, SonarQube, Burp Suite (Pro & Free), Fiddler, OWASP Zap Proxy, Paros Proxy, W3af, Echo Mirage, Snallygaster, PenCrawler, Hackbox, Galileo, FFUF, InfectionMonkey, Drozer, MobSF, Jadx, JD-GUI, Santoku, AndroidTamer, Adhrit, Reverse APK, Clutch, Rp++, Frida/Objection, Needle Framework, iFunbox, RastiCrac, Otool, Class-dump, iLEAPP, ALEAPP. Threat Hunting and Telemetry Analysis: Tcpdump, Wireshark, ATT&CK MITRE(TTP’s), Mimikatz, Scapy, PyShark, Network Miner, Zeek, Splunk, Sysmon, Snort, Wazuh, ElasticSearch(ELK), Suricata. Web Services & Network Assessment: WSSAT 2.0, Astra, Postman, SoapUI, API Fuzzer, Nmap, Nessus, Kali Linux, Metasploit, Crunch, Cain Cloud & Containers, Threat Modelling AWS Inspect, S3 Inspect, Bucket Finder, Guard, Clair, Anchore, Trivy, STRIDE, DREAD, Microsoft Threat Modelling Tool, Client satisfaction and quality of work are my top priorities. I'm a problem solver and I'm glad to help you with any task you have on your website. Regards, Sandeep T
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Security Testing
    Vulnerability Assessment
    Information Security
    Penetration Testing
    Kali Linux
    Website Security
    Cryptography
    Mobile App Testing
    Web App Penetration Testing
    Network Penetration Testing
    Code Review
    Network Security
    Encryption
  • $25 hourly
    Hi there, I am Harishankar Kumar (M, 21), A software engineer from India working hard to bootstrap an LLM-based startup. I started programming at a very young age, and since my first exposure to HTML/PHP, I have coded in a plethora of tech stacks/languages; with years and years of coding, I have developed this knack for visualizing software development steps that are needed to create any product. Tell me if it's an Android app or a React web page, and I will tell you precisely what libraries/languages you need to use for your problem! My expertise lies in communication and making all the complicated technical problems disappear (or look easy!) For consulting, I do not charge anything and would love to help you find your solution! However, if you like my plan/ideas, You can always commission me for any extra dedicated time/effort required, I believe myself to have good programming skills, and more than anything the framework to learn anything new if required for the job, if needed I can always connect you to friends in industries specializing at their crafts. ------ Here are the things I have worked on (ordered with respect to recency) ------ - OpenAI ChatGPT API, RAGs, Prompt Engineering (LLMs) - Python, FastAPI, Docker, Docker Compose (Backend) - Elasticsearch, RabbitMQ, Azure SQL, MongoDB, Scrapy, Azure AD B2C (Services) - ReactJS, Typescript, Redux, MaterialUI, Webpack (Frontend) - Java, Android Studio, Flutter (Mobile Development) - Yacc, Lex, pylex (Compilers) - C++/C, Virtual Machines (GSoC, ScummVM) - Powershell, CMD Batch, Shell Scripts (Scripting) - Fiddler, Wireshark, Winpcap, Windivert (Network Debugging and Proxy, MITM) - SDL2, Blender, Unity (Game Development) - WordPress (Oh I love blogging XD) - PHP, Silverlight, C Sharp (Windows/Windows Phone/Web backend development (legacy)) ------ Non-technical (I am a Hooman) ------ - Good communicator, has empathy and has lots of friends. - Very social, good technical/nontech contacts (In case help is needed) - Books lover, read many fiction/non-fiction books, viz. Atomic Habits, How to win friends and influence people, Alter Ego effect, Man's search for meaning, etc.! - Anime/Manga huge fan! - Loves playing badminton and being healthy! I am looking forward working with you, I promise it will be fun!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Technical Project Management
    Fiddler
    Game
    Unity
    Blender
    Solidity
    Computer Science
    Android
    Android App Development
    Python
    C++
    C#
    Java
    JavaScript
  • $15 hourly
    I'm a QA professional with overall 16 years of experience across STLC, Test management, SQA and 5 years of extensive experience in Project Management includes planning, resourcing, quality metrics, risk analysis, coordinating and implementing projects within the decided-upon budget, timeline, and scope.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Microsoft Project
    Management Skills
    Git
    Microsoft Power BI
    Testing
    Agile Project Management
    Microsoft Visio
    Bug Reports
    Sprint Planning
    Bugzilla
    Jira
    Test Results & Analysis
    Performance Testing
    Static Testing
  • $20 hourly
    Objectives : As an Engineering Student and hands-on experience on cisco routers, cisco switches, real network has help me lot in networking field. I am looking forward to work with companies where I can learn, work and grow Professionally and Personally. An Inspiring IT Student with interest in Cybersecurity seeking a Full-time Internship for summer 2024.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    C Shell
    C
    C++
    OSPF
    Cisco
    Computer Network
    Network Engineering
    Administrate
    Cisco Router
    Router
    Python
    DNS
    System Administration
  • $8 hourly
    PROJECTS I did project in my masters 1. Organ Donation System Front-end: HTML, CSS, Java scripts Back-end: Python Framework Django Database: MySQL 2. Courier Management System Front-end: HTML, CSS, Java scripts, java Back-end: PHP Database: MySQL 3. Online Voting Android App SECURITY SKILLS * Find out the web vulnerability and make it sure. * In The Part of VAPT, I did the host-based testing, Machine based testing, Network Based Testing. * I have hand-on experience with following tools Nmap Nessus Wireshark Burp Suite Hydra Tool Shell Scripting * Worked with Nessus security solution. * For the website Security I worked with Nmap, Webanalyzzer, OWASP Zap, Directory buster. * Perform security audit of RCE in Windows System. * CVE Testing for the Vulnerability.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Scripting
    Python
    Ethical Hacking
    Nessus
  • $10 hourly
    👨‍💻 Web Developer: Crafting user-friendly websites and applications. 🔒 Cybersecurity Enthusiast: Protecting digital assets and ensuring safe online experiences. 🚀 DevOps Advocate: Automating software delivery pipelines for efficiency. 🌐 Tech Content Creator: Sharing knowledge on YouTube. Full project management from start to finish. Regular communication is important to me, so let’s keep in touch.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Private Cloud
    System Automation
    Cloud Computing
    Automation
    AI Chatbot
    JavaScript
    Bash
    Ansible
    Kali Linux
    AWS Development
    DevOps
    SOC 1
    Docker
    Python Script
  • $6 hourly
    SUMMARY Passionate cybersecurity specialist with a proven track record in identifying vulnerabilities, managing risks, and implementing robust security measures. Equipped with hands-on experience in threat detection, incident response, and network defense, I am eager to apply my skills to safeguard the emerging cyber threats and enhance overall security posture. Committed to leveraging my expertise to deliver innovative solutions and contribute to a secure digital environment.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Ethical Hacking
    Cryptography
    OWASP
    Penetration Testing
    Network Analysis
    Web Application Security
    Malware Detection
    Vulnerability Assessment
    SOC 1
    Information Security
    Splunk
    Metasploit
    Cybersecurity Management
    Cyber Threat Intelligence
  • $5 hourly
    I'm a dedicated cybersecurity professional with a passion for ethical hacking and digital defense. With a strong foundation in network security, vulnerability assessment, and penetration testing, I'm consistently demonstrated the ability to safeguard sensitive information and protect organizations from cyber threats. Beyond technical skills, I'm committed to staying updated with the latest cybersecurity trends and continuously improving their knowledge through ongoing education and practical experience. As a proactive and analytical thinker, I'm passionate about creating a safer digital environment and is always ready to tackle new challenges in the ever-evolving field of cybersecurity.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Security Testing
    Security Management
    Vulnerability Assessment
    Security Analysis
    Nessus
    Cybersecurity Tool
    Cybersecurity Monitoring
    Cybersecurity Management
    Ethical Hacking
    Cyber Threat Intelligence
  • $200 hourly
    PROFESSIONAL SUMMARY Motivated cyber security professional with expertise in Ethical Hacking. Skilled in utilizing tools like Nessus, Burpsuit and Nmap to identify vulnerabilities. Seeking an opportunity to leverage my potential and contribute to the growth of the organization. SKILLS 1. Penetration Testing: Specializes in identifying and exploiting system vulnerabilities to enhance security. Demonstrates a keen interest and advanced skills in privilege escalation techniques, ensuring thorough security assessments. 2. Ethical Hacking: Proficient in conducting comprehensive security assessments using ethical hacking techniques. Adept at simulating real-world cyber attacks to identify weaknesses, ensuring robust protection against unauthorized access and potential threats. 3. Linux Operating System: Navigating the system's directories Manipulating files in the Linux
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cybersecurity Tool
    Information Security
    Nessus
    Adobe InDesign
    Adobe Photoshop
    CorelDRAW
    Figma
    Graphic Design
    Penetration Testing
    Ethical Hacking
  • $30 hourly
    Do you want to know how a passion for networking transforms into real-world solutions? Explore my journey in the ever-evolving tech landscape! Drawing from 5+ years in network and systems engineering, I specialize in seamlessly weaving complex technical solutions into everyday business needs. As a Senior Network Engineer at APSFL, I've thrived in highpressure environments, ensuring network reliability for widespread infrastructure across multiple districts. My toolkit is rich with handson experience in configuring, troubleshooting, and optimizing Cisco routers and switches to foster enhanced connectivity and security. My technical prowess is complemented by a thorough academic grounding with a PGDBM from Osmania University and a B.Tech in ECE. Adding to that, I hold Cisco Certifications (CCNP ENCOR, CCNA R&S), which keep me at the cutting edge of network engineering technologies. I believe in proactive problem-solving and have effectively led
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Cisco ACI
    TCP/IP
    Cisco Router
    Network Design
    Multiprotocol BGP
    OSPF
    Network Architecture
    VPN
    Network Engineering
    Cisco Certified Network Professional
    Cisco Certified Network Associate
    Computer Network
  • $10 hourly
    experienced wireless software developer with c/c++/python, embedded, rtos ,5g, matlab ,3gpp, github, github, linux skills
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Bitbucket
    Jira
    GitHub
    Linux
    Embedded C
    Wireless Communication
    5G
    Python
    MATLAB
    C++
    C
  • $20 hourly
    SR. QA ENGINEER Career Objective Dedicated and disciplined professional seeking the position to contribute to the company's growth and in turn ensuring personal growth within the Organisation. Detail oriented and experienced Software Tester with a stellar record of corporate client satisfaction. Proven achievement in bringing projects to completion. RELEVANT SKILLS DevOps - Kubernetes, Docker, Jenkins. AWS Automation /Man ual Testin g Fun ction al/Non - Functional Testing TESTING/TICKET TOOLS Postman Selen ium Jmeter Testrail Jira Wiresh ark Zen desk
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    5G
    Diameter
    Apache JMeter
    Jenkins
    Docker
    Kubernetes
    Quality Assurance
    Test Results & Analysis
    Software Testing
  • $10 hourly
    SUMMARY* Dedicated and detail-oriented cybersecurity professional with a strong foundation in computer science and a focus on offensive and defensive security measures. Proficient in Python programming, with hands-on experience in developing security tools, conducting malware analysis, and performing blockchain network security audits. Accomplished in completing over 40 rooms in TryHackMe and engaging with Hack The Box (HTB) challenges, demonstrating a commitment to continuous learning and skill enhancement. Eager to apply technical expertise and analytical skills to protect digital assets and mitigate security risks in a dynamic and challenging environment.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    JavaScript
    CSS
    HTML
    dBase
    SQL Injection Mitigation
    Python
    Java
  • $10 hourly
    I am a Certified Penetration Tester with expertise in web and network security. I specialize in identifying and mitigating vulnerabilities through comprehensive security assessments for both applications and infrastructure. My skills include: Web Application Security: Proficient in OWASP Top 10 vulnerabilities like SQL Injection, Cross-Site Scripting (XSS), and more. Network Security: Expertise in scanning and securing networks using tools like Nmap, Nessus, and Wireshark. Ethical Hacking & Penetration Testing: Hands-on experience using Burp Suite, Metasploit, and Kali Linux to test and strengthen security defenses. Malware Analysis & Incident Response: Skilled in identifying, analyzing, and responding to potential cyber threats. With certifications such as the IBM Cybersecurity Analyst and experience in ethical hacking, I am committed to delivering top-notch security solutions that protect your digital assets. Let's collaborate to fortify your system and safeguard your data!
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Python
    TCP/IP
    OWASP
    Information Security
    System Administration
    Network Administration
    Metasploit
    Network Penetration Testing
    Web App Penetration Testing
    Penetration Testing
    Vulnerability Assessment
  • $45 hourly
    I am a seasoned IT professional with extensive expertise in AWS cloud networking and security services coupled with in-depth knowledge of Palo Alto Next-Generation Firewalls (NGFWs) With a strong focus on creating secure, scalable, and resilient cloud infrastructures, I help businesses safeguard their digital assets while optimizing network performance. Key Skills & Expertise: AWS Cloud Networking:VPC design, Subnetting, Route Tables, NAT Gateways, Transit Gateway, Direct Connect, VPN configurations, and Elastic Load Balancing. AWS Security Services: IAM (Identity and Access Management), Security Groups, NACLs, WAF (Web Application Firewall), GuardDuty, CloudTrail, and Security Hub. Palo Alto Networks NGFW:Firewall rule management, Threat Prevention, SSL Decryption, User-ID, App-ID, VPN configurations, and integration with AWS. Network Security: Implementing and managing robust security architectures, intrusion detection and prevention systems (IDS/IPS), and securing hybrid cloud environments. Automation & Scripting:Using Python and Bash for automating network tasks, policy enforcement, and security auditing. Why Choose Me? Proven Track Record: I have successfully designed and implemented secure AWS environments for various clients, ensuring seamless integration with on-premises networks and third-party services. End-to-End Solutions:From initial assessment and design to deployment and ongoing management, I offer comprehensive solutions tailored to your specific needs. Continuous Learning: I stay up-to-date with the latest advancements in cloud security and networking to provide cutting-edge solutions that meet the evolving needs of the industry. Let's Connect I am committed to helping you achieve your goals by delivering top-notch services that exceed your expectations. Whether you need assistance with a new project or ongoing support, let's connect and discuss how I can contribute to your success.
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Web Application Firewall
    AWS Systems Manager
    AWS PrivateLink
    Troubleshooting
    Network Analysis
    Amazon Web Services
    Fiddler
    Multiprotocol BGP
    AWS CloudTrail
    Palo Alto Firewalls
    Network Security
    VPN
    Internet Protocol Security
    Firewall
  • $25 hourly
    With 7+ years of experience as a Senior Embedded Firmware Developer, I excel in IoT product development, Home Automation & Control, Firmware design and development for Arduino, ESP32 microcontrollers, Nordic semiconductors SoCs, and many more. 🚀 Technical Expertise ---------------------------- ✔ [Programming Language] : [ Embedded C/C++ | Python ] ✔ [ RF/Wireless protocol ] : [ BLE | Bluetooth | WiFi | Zigbee | Z-Wave | Thread | Matter ] ✔ [ Operating System ] : [ FreeRTOS | Zephyr RTOS | BareMetal | Linux | Yocto | Kernel ] ✔ [ Version Control Tool ] : [ Git | JIRA | Bitbucket ] ✔ [ Serial protocol ] : [ UART | I2C | SPI | CAN ] ✔ [ Communications (PLC) ] : [ MQTT | CoAP | HTTP ] ✔ [ Debugging Tools ] : [ Oscilloscope | Logic Analyzer | Wireshark | Ubiqua Protocol Analyzer | JTAG | Power Profiler ] ✔ [ Framework ] : [ Visual Studio | Beyond Studio | MCUXpresso | ESP-IDF | Arduino IDE | Segger Embedded Studio | STM32CubeMX | Keil | Vim ] ✔[ Platform ] : [ ESP32 | ESP32 Cam | Arduino | SIM800/SIM900 GSM Module | Nordic Semiconductor ( nRF9160, nRF51 and nRF52 series ) | NXP I.MX6 and I.MX8 series | STM32 | JN5169 | Raspberry Pi4 ] ✔ Firmware OTA over WiFi and BLE 🚀 What can I do for you? ------------------------------- [ Firmware Design & Development ] : - Designing and developing wireless solutions for IoT applications. - Integration of wireless protocols and communication modules into existing systems. - Troubleshooting and debugging critical issues, optimizations, collaborative problem-solving, and product enhancement. - I can architect and develop your firmware from the ground up. I prioritize delivering high-quality work, ensuring customer satisfaction, and meeting deadlines without compromising on the quality of work. My strong analytical and problem-solving skills enable me to maintain effective communication with clients, providing regular updates and fostering a collaborative and transparent work environment. 🔺Rate Determination --------------------------- The rate I provided is an average figure. Depending on the project’s complexity, it may vary slightly—either up or down. Rest assured that my rate reflects my experience and expertise. I won’t bill you for idle hours or time spent to learn anything required for a project. My invoicing will strictly cover the hours I dedicate to advancing the project in a meaningful way. 🔺Keywords ----------------- Embedded C | Embedded System | Firmware | Microcontroller Programming | Microprocessor Programming | IoT | ESP32 | Arduino | Nordic | nRF52 | BLE | WiFi | Bluetooth | Zephyr | FreeRTOS | ESP-IDF | Espressif | Yocto | Kernel | Camera
    vsuc_fltilesrefresh_TrophyIcon Wireshark
    Zephyr
    UART
    Bluetooth LE
    CAN Bus
    Zigbee
    FreeRTOS
    Linux
    Embedded Application
    Embedded Operating System
    Embedded Linux
    Embedded C
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.