Browse Penetration Testing job posts for project examples or post your job on Upwork for free!

Penetration Testing Job Cost Overview

Typical total cost of Upwork Penetration Testing projects based on completed and fixed-price jobs.

Upwork Penetration Testing Jobs Completed Quarterly

On average, 19 Penetration Testing projects are completed every quarter on Upwork.


Time to Complete Upwork Penetration Testing Jobs

Time needed to complete a Penetration Testing project on Upwork.

Average Penetration Testing Freelancer Feedback Score

Penetration Testing Upwork freelancers typically receive a client rating of 4.36.

Last updated: August 1, 2015
Clear all filters
  1. Ivan K.

    Ivan K.

    Software engineer, sysadmin and security consultant

    Australia - Tests: 4

    Over 10+ years of experience in software engineering, systems administration and security consultation. 1. Software: Full stack web development in: PHP - codeigniter, zend, symfony and wordpress Perl - mason Javascript - backbone, jQuery, underscore CSS - CSS3, SASS Developed desktop and mobile responsive HTML5 websites/web applications. Can code to spec or iterate designs with clients. 2. Systems administration: Full environment setup including: AWS - S3, EC2, EBS, ELB and route53 Mysql, apache, nginx, memcache, couchbase, postresgl (SQL databases and NoSQL) Specialising in RHEL/CentOS and Debian/Ubuntu. 3. Security consulting: Pentests, vulnerability assessments, and blackbox/white testing for common web exploits: csrf, xss, sql injection, dom injection, credential mismanagement etc.

    $60.00 /hr
    0 hours
  2. Balmohan Kshirsagar Agency Contractor

    Penetration Testing Expert

    India - Tests: 3

    Expert In Penetration Testing and Vulnerability Scanning,Deep Knowledge Of Kali Linux one of best Penetration testing Platform.already Spend more than 3 years In cyber security.Given 10s of seminars and trainings in institute. Skills In Web security with Good Knowledge of Open Web Application Security. Network scanning and Reconfiguring. Detecting critical loopholes in complex Systems.

    Associated with: Innotune Software Solutions

    $11.11 /hr
    0 hours
  3. Andrew Aurand

    Andrew Aurand

    Security Consultant/Linux Admin

    United States - Tests: 4 - Portfolio: 2

    SKILLS & COMPETENCIES • Exceptional problem-solving skills to identify issues and implement solutions • Advanced experience with Linux in regards to server administration, configuration, and teaching • Utilizing Skype video and voice chat to provide technical support assistance • Adept in remote access solutions (virus removal and technical support) INFORMATION TECHNOLOGY & SOFTWARE EXPERTISE Software & Mobile Platforms • Windows 95, XP, Vista, 7, 8, Windows Server 2008 • Linux/Unix: Ubuntu, Fedora, Debian, Backbox, Backtrack, Arch, Kali, PC-BSD • Android, iOS, BlackBerry OS 6 • Microsoft Office XP, 2003, 2010, OpenOffice, LibreOffice Security & Networking • Threat Assessment/Risk Analysis, Business Continuity & Disaster Recovery Planning • Wireless Penetration Testing & Open Source Intelligence Gathering (OSINT) • Port Forwarding, Firewalls, General Troubleshooting Virtualization • Virtual OSE (built and cloned) • Windows and Linux Virtual Machines Programming • Exposure to Python 2.xx and 3.xx

    $11.11 /hr
    75 hours
  4. Kamaljeet Kumar Sharma

    Kamaljeet Kumar Sharma

    Network Administrator, Penetration Tester, Web Developer

    India - Tests: 1

    +++++++++++++++++++++Networking Tasks++++++++++++++++++++++++ - Troubleshoots computer's software and hardware problems, installation of windows and other pc software. - Troubleshoot LAN networking. - Configure Routing Protocols e.g. RIP, RIP v1 & v2, RIPng ,OSPF, EIGRP, etc - Configure Redundacy Protocols e.g. Parallel Redundancy Protocol ` (PRP), GLBP, STP, VRRP, etc - CCNA & CCNP Training ++++++++++++++Ethical HAcking And Penetration Testing+++++++++++++ - Web Application/Network Penetration Testing - Ethical Hacking' - Security Consulting - Thick client application security - Ethical Hacking Training - Pentesting Training,Excellent VAPT report writing skills - Vulnerability Assessment of Network Devices/Databases/Web Server/Application Server - Penetration Testing: Nmap, Metasploit Framework, Nessus, Backtrack 5 etc. - Programming languages: Java, J2EE, C, C++, XML, PHP - Web Technologies: Spring, JSP, Servlet, Ibatis, Hibernate,Swing , JSF, ASP.NET, Web Services, CSS, HTML, jQuery, Joomla, Wordpress - Internet Technologies:JavaScript, GWT, AJAX, HTML, XHTML, JSP, SmartGWT, NSIS - Databases: SQL Server, MySQL, Oracle, DB2 - Applications Servers: Apache, jBoss, IIS, Tomcat - Protection of hacked websites and servers, cloud security. - Wireless Security - Certified Ethical Hacker (CEH) +++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ### Hands on Experience ### - Web applications :- Wordpress, Joomla, Drupal, - Network :- Cisco, Linksys, Netgear, TP-Link, - E-Commerce Security - OScommerce, prestashop, Magento - Forums - MyBB, phpBB - cPanel, WHMCS - Linux, Windows, Ubuntu, CentOS etc. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Author Of E-Book "Symlinking Part-3" published on Manual SQL Injection Testing, Business Logic vulnerability testing, Kali Linux, Burp Suite, Metasploit Pro +++++++++++++++++++++++++++++++++++++++++++++++++++++++++

    $5.00 /hr
    0 hours
  5. Mehulkumar Patel

    Mehulkumar Patel

    Software Testing, Quality Assurance professional with 11+ years of exp

    India - Tests: 2 - Portfolio: 2

    An ambitious professional with 11+ years of experience in Software Testing, Quality Assurance. I have very good experience in Team Management and QA Process implementation. Have extensive experience in different kinds of testing like Smoke Testing, Functional testing, Regression Testing, Integration testing, Compatibility Testing, Database Testing, Security Testing, Localization and Internationalization testing. I have very good experience in testing of web based application, mobile application, Sitecore CMS, ERP, Desktop application. I have done Sitecore Certification. I have worked on Agile methodology, V-Model. My core competency lies in involvement in the application from start of the lifecycle with Peer review to the end of releasing the application to make sure that defects are identified at early stage of the application to reduce cost at later stage.

    $11.11 /hr
    0 hours
  6. Aleksandar Palauzov

    Aleksandar Palauzov

    Information Assurance Officer

    United Arab Emirates - Tests: 6

    Highly technical, fast learner, experience in UNIX, Windows, OS X, Cisco devices. Great penetration testing and vulnerability assessment skills, experience with Tenable products - Security Center Continuous View, Nessus, PVS, LCE, as well as Rapid7 tools Nexpose, Metasploit. Experienced in Digital Forensics with tools like EnCase and FTK, as well as open-sorced Digital Forensic Framework, volatility, carver, etc. Extensive experience and knowledge in system administration and networking. Projects include Vulnerability Assessments for Qatar Telecom, Emirates Aluminium, Dubai Aluminium; Web application Load tests for EMAAR; Implemenatation of Dell Digital Forensic Solution for UAE Ministry of Interior; Design and implementation of TrustAE solution for UAE's Telecomunicatons Regulation Authority; Currently part of Enterprise Security of Emirates Global Aluminium.

    $33.33 /hr
    0 hours
  7. Travis Howe

    Travis Howe

    Security Professional

    United States - Tests: 1

    20 Years of IT Security expertise in a wide range of Information and Physical Security tools, technologies, process, procedures and compliance. Assisting small to medium sized businesses evaluate their security posture from a technical and/or policy perspective. Perform vulnerability management, application assessments and penetration testing. *Former cyber security program manager for the U.S. Department of Energy (DOE) responsible for security of the western third of the nation’s power grid. *Lead security architect for the design of the nation's next generation 911 infrastructure. *Built and designed classified networks for the US Space Command. *Consulting and leadership of multiple security and compliance engagements across 16 countries. *US Navy Cryptologist. A solid reputation for security, thought leadership, and exceptionally innovative thinking and strategies. Saved >$1M in project and operational expenses throughout Intrado tenure while protecting the nation’s 911 infrastructure. Awarded for providing extensive company-wide leadership and cross-departmental strategies to secure the only DOE network not compromised by professional penetration professionals hired by the DOE. Vision & Strategy: Successful in partnering with peers & executive management to scale organizations through the use of technological resources. Develop and publish information and physical security strategies consistent with the leadership agenda. Technology Expertise: Extremely versed in a multitude of IT and security specific technologies. Known to have the ability to rapidly understand and leverage new technology. Information Risk Management: Maintain key skills in the development and maintenance of information security risk–management processes to identify, quantify, and remedy information risks across an enterprise. Leadership: Understand the need to be visible as a business leader within organizations as an active participant in business meetings and other activities. Establish and nurture relationships with peers in other businesses, appropriate industry organizations, and relevant IT vendors. Certifications: CISSP | CISM | QDSP | CCNP | CCSE | CITRMS Technology

    $38.89 /hr
    0 hours