Penetration Testing Freelancers

Browse Penetration Testing job posts for project examples or post your job on Upwork for free!

Penetration Testing Job Cost Overview

Typical total cost of Upwork Penetration Testing projects based on completed and fixed-price jobs.

Upwork Penetration Testing Jobs Completed Quarterly

On average, 15 Penetration Testing projects are completed every quarter on Upwork.

15

Time to Complete Upwork Penetration Testing Jobs

Time needed to complete a Penetration Testing project on Upwork.

Average Penetration Testing Freelancer Feedback Score

Penetration Testing Upwork freelancers typically receive a client rating of 4.44.

4.44
Last updated: June 1, 2015
More options
Clear all filters
  1. Daniel Harvey

    Daniel Harvey

    Security Architect/Developer/Consultant

    United States - Last active: 23 hours ago - Tests: 1

    Over the past 5 years I have specialized in application security. My responsibilities have included designing secure applications, programming fixes for vulnerabilities, educating developers, developing secure development processes(SDLC), and testing applications for security vulnerabilities. I currently work for a large payment processor and have worked for other financial institutions in the past.

    $44.44 /hr
    151 hours
    0.00
  2. Aleksandre Vardanidze

    Aleksandre Vardanidze

    --admin systems|database|network|security

    Georgia - Last active: 23 days ago - Tests: 2

    --Admin systems Extensive experience with the configuration, hardening, and maintenance of various Linux distributions, including: * Red Hat Enterprise Linux, Fedora, CentOS * Debian, Ubuntu * OpenSuse Able to set up vital Linux infrastructure components including load balancers, DNS servers, proxy, web/application servers, and mail servers. Familiar with os-level security policies as well as server-level security layers like SELinux. --Admin database Skilled in MySQL database administration for standalone servers as well as replicated and clustered environments. I have also worked with postgsql --Admin Network I've been working as a network administrator for 5 years. For now I'm working in a governmental agency as a network administrator and network security specialist. Have experience with almost every cisco and hp network devices, also I design governmental network and our agency network design. I'm certified ccna,ccnp and ccna sec. had trainings in ccnp sec, ccdp, gsec, CEH,ENSA and Microsoft products (server 2003/8, exchange server and etc) Monitoring and diagnosing faults of VPN connections with other organization, Data Exchange Agency IPS/IDS system and sensor setup, operation. Security concept, design, documentation and implementation. --Admin other Here is the incomplete list of technologies and solutions I have used over my 5 years of experience. -Zabbix, Zenoss, Nagios, Munin and Cacti for monitoring purpose  -Configuration management - Puppet, SpaceWalk, Katello  -Web servers - Apache, Ngnix, Lighttpd  -Load Balancing with Haproxy and Barracuda Load Balancer  -Virtualization - Vmware ESXi --Computer Skills, Trainings and Certification Windows; Windows Server (2003/2008/2012); MS Office; Linux; MacOS ; Network Monitoring Tools; Certified Ethical Hacking ( CEH ) - Self-study Course Security Certified Network Specialist - Self-study Course EC-Council Network Security Administrator - Self-study Course Metasploit Framework Expert - Self-study Course CompTIA Security - Self-study Course HISTORY * SpeedLine - Aug 2010 to May 2012 - Linux Engineer, System Administrator * DATA EXCHANGE AGANCY - Jun 2012 to May 2014 -CERT SPECIALIST * Unipay - Jun 2014 to Present -Linux Enginner, Network Administrator

    $20.00 /hr
    0 hours
    0.00
  3. Steve H.

    Steve H.

    Security Consultant / Linux System Administrator

    United States - Last active: 1 month ago - Tests: 10

    SECURITY CONSULTANT - 10 years provided IT security services for large Fortune 500 companies in the Energy, Healthcare, and Education sectors. Provided services in firewall and IDS management, vulnerability assessment, and penetration testing. Skills and tools include: CheckPoint, Juniper, Cisco, Nessus, Core Impact, BurpSuite, MetaSploit, and many others. SYSTEMS ADMINISTRATOR - Secured and maintained hundreds of Linux and *NIX based systems in corporate, university, and small business environments. Specializing in LAMP/LEMP configuration management and daily operations. Excellent in automation of routine processes via shell/Perl scripts. 21 years experience in providing administration in varying capacities. Skills include: Apache, Nginx, MySQL, Memcached, Varnish WEB DEVELOPER - PHP application developer. Provide programming and maintenance for two actively used applications. One provides access to DNS configuration management for thousands of customers daily and includes a full RESTful API for programmatic use. The other application provides data import, data analysis, and reporting capabilities for security consulting experts to streamline the reporting process when combining the output of multiple security tool data. Skills include: PHP, Perl, shell scripting, HTML, jQuery

    $45.00 /hr
    0 hours
    0.00
  4. Leandro F.

    Leandro F.

    Computer and Network Security / Researcher

    Argentina - Last active: 1 month ago - Tests: 2 - Portfolio: 1

    I am a passionate professional computer security.Since 2005 I launched careers in the area of ​​information security in companies, in the community and in person. I am working in security research and university teaching, which has been taking part in the very development of new technologies and understanding of phenomena of very recent appearance affecting security. I specialize in computers safety and service, research, training and hostage management for third party service of medium-sized and large national and international companies. I involved with prevention, protection and solution of incidents taking place in companies computer resources and face our commitment through constant update, over-training and detailed system analysis. I work with international prototypes which guide service performance. We pursue long term commercial relationships with our customers providing quality and support. I have wide experience in business and academic fields as we had the opportunity of being part of university training and research projects, new technology development and the possibility of learning about new phenomena affecting computers safety.

    $50.00 /hr
    0 hours
    0.00
  5. Maxim Tsoy

    Maxim Tsoy

    Experienced Python Developer and Security Researcher

    Russia - Last active: 3 months ago - Tests: 7 - Portfolio: 2

    1. Python development: Rich experience in distributed Python applications and web applications development using Django, Pyramid, and Celery. Released several mobile Python applications (kivy). 2. Security Assessment: I have a huge experience in vulnerability research and security assessment (currently this is my main occupation). Reached the top in many hacking contests, including DEF CON CTF. I usually specialize in web application security, however, I am experienced in network, database, cryptography and other security areas. Disclosed security advisories for many vendors including: - Cisco - Citrix - Yandex (Entered Bug Bounty Hall of Fame) - SAP - Qiwi 3. Game Development: Have an experience in game design and development using Game Maker Studio.

    $22.22 /hr
    249 hours
    0.00
  6. Adrian R.

    Adrian R.

    Technically Proficient Strategic Thinker and Creative Force

    United States - Last active: 11/03/2014 - Tests: 2 - Portfolio: 1

    My main strength is the ability to understand, design, and create systems. These systems can be anything from a business process to an information security system. Technology is a passion of mine. Ultimately I try to leverage my creative abilities in the development of any solution. You give me problems, I figure out how to make it work. Contact me to find out what I'm talking about for yourself.

    $50.00 /hr
    0 hours
    0.00
  7. Alejandro Iacobelli

    Alejandro Iacobelli

    Software Engineer specialised in offensive security

    Argentina - Last active: 09/09/2014 - Tests: 6 - Portfolio: 1

    Advanced: Web security. I have been working with all kind of web application scenarios and i’ve learn how to comprehensively exploit and fix at least the 88 most common vulnerabilities according to Owasp. Internal Network Security. I’ve performed several internal penetration tests from different perspectives. The two most common are: Starting the security test with an external computer inside a private network and with the help of detection, sniffing and offensive techniques try to gain access to a user machine or corporative router to fully exploit the enterprise. This usually includes tools like Wireshark, sslstrip, nmap , metasploit among others. Compromise the enterprise starting the security test with a regular end-user pc that is part of the Windows Domain. This includes Priv. scalation, HashDump and use of techniques like “pcexec” to gain acces to other network stations. Intermediate: Cryptography: I’ve take the Stanford Cryptography I course in which i’ve learned the difference between stream ciphers and block ciphers, PKI, Web Certificates, what constitute a secure PRG, among other cryptography basics, ciphers history and how to break them. Security perspective code review: Mostly Java and Php. Debian Hardening. Os encryption, iptables, users restrictions, security patches , unnecessary processes mitigation, SSH security policies, backup policies, etc. SQL Hardening. VoIP intrusion test. Basic: Exploiting (Intel 32bits). ( WinDBG , OLLYDBg) Cracking. Bypass simple restrictions and packers.

    $50.00 /hr
    0 hours
    0.00
  8. Christos Sapounas

    Christos Sapounas

    InfoSec Consultant

    Greece - Last active: 07/25/2014 - Tests: 2

    Independent Information Security Consultant, with great passion for delivering services that will add value to your organisation. With over 6 years of experience to leverage, and hundrends of projects completed in various business sectors, my clients receive high quality and objective reports, yielded by conducting on their behalf, realistic assessments (threat simulations).

    $22.22 /hr
    0 hours
    0.00
  9. Timothy C.

    Timothy C.

    Seasoned UNIX/Linux Server Manager with MBA and BS in IT Security

    United States - Last active: 3 months ago - Tests: 1 - Portfolio: 2

    I am a well experienced and educated IT Professional interested in providing IT consulting services to businesses from small to enterprise. My BS degree is in Information Security and Forensics. While earning my MBA, I became particularly interested in business process improvement which led me to connect with and become familiar with a certified OpenSpan developer and reseller. My published pay rate is a reference average only. I will adjust my rate based on the type of service performed between $35/hr and $145/hr.

    $85.00 /hr
    0 hours
    0.00
  10. Sidney W.

    Sidney W.

    Certified Network and Security Engineer

    United States - Last active: 02/01/2013 - Tests: 2

    I specialize in information security, and also possess formal experience with systems and network administration. I am certified under the Offensive Security Certified Professional (OSCP) program, the Cisco Certified Network Associate (CCNA) program, and the CompTIA Security+ program. I have performed formal penetration tests as well as consulted for the design and deployment of scalable infrastructures. I am very comfortable writing thorough documentation and reports. Platforms I am experienced with, listed from most proficient to least proficient: Linux, Cisco IOS, Citrix XenServer, Windows, JunOS, OS X, FreeBSD, Android, Solaris Programming languages, from most fluent to least fluent: C/C++, Bash scripting, Perl, PHP, SQL, Python, Assembly language, Java, Ruby Concepts: Network Infrastructure, Routing and Switching, Information Security, Physical Security, Penetration Testing, Cloud Computing, Systems Architecture, Operating Systems, Virtualization, High Availability, Load Balancing, Data Loss Prevention, Business Continuity Planning, Disaster Recovery, Recovery Time Objective, Access Control, Chain of Custody, Key Escrow, Risk Assessment and Management, Change Management, Regulatory Compliance, Service Level Agreement, Reporting

    $20.00 /hr
    0 hours
    0.00