Penetration Testing Freelancers

Browse Penetration Testing job posts for project examples or post your job on Upwork for free!

Penetration Testing Job Cost Overview

Typical total cost of Upwork Penetration Testing projects based on completed and fixed-price jobs.

Upwork Penetration Testing Jobs Completed Quarterly

On average, 14 Penetration Testing projects are completed every quarter on Upwork.

14

Time to Complete Upwork Penetration Testing Jobs

Time needed to complete a Penetration Testing project on Upwork.

Average Penetration Testing Freelancer Feedback Score

Penetration Testing Upwork freelancers typically receive a client rating of 4.41.

4.41
Last updated: May 1, 2015
More options
Clear all filters
  1. Daniel Harvey

    Daniel Harvey

    Security Architect/Developer/Consultant

    United States - Last active: 1 day ago - Tests: 1

    Over the past 5 years I have specialized in application security. My responsibilities have included designing secure applications, programming fixes for vulnerabilities, educating developers, developing secure development processes(SDLC), and testing applications for security vulnerabilities. I currently work for a large payment processor and have worked for other financial institutions in the past.

    $44.44 /hr
    151 hours
    0.00
  2. Alex K.

    Alex K.

    Expert Systems Engineer

    United States - Last active: 2 months ago - Tests: 3

    I am talented, experienced, tenacious and experienced with many software and hardware platforms. I also have a natural talent for learning new technologies incredibly quickly. I have worked with everything from network installation to server architecture. I have my CCNA, Security+, CISSP and CEH certifications. While my forte is IT Security analysis and Systems Administration, I also have experience in general IT environment administration and support. I would love to leverage my talent for you.

    $20.00 /hr
    0 hours
    0.00
  3. Aleksandre Vardanidze

    Aleksandre Vardanidze

    --admin systems|database|network|security

    Georgia - Last active: 19 days ago - Tests: 2

    --Admin systems Extensive experience with the configuration, hardening, and maintenance of various Linux distributions, including: * Red Hat Enterprise Linux, Fedora, CentOS * Debian, Ubuntu * OpenSuse Able to set up vital Linux infrastructure components including load balancers, DNS servers, proxy, web/application servers, and mail servers. Familiar with os-level security policies as well as server-level security layers like SELinux. --Admin database Skilled in MySQL database administration for standalone servers as well as replicated and clustered environments. I have also worked with postgsql --Admin Network I've been working as a network administrator for 5 years. For now I'm working in a governmental agency as a network administrator and network security specialist. Have experience with almost every cisco and hp network devices, also I design governmental network and our agency network design. I'm certified ccna,ccnp and ccna sec. had trainings in ccnp sec, ccdp, gsec, CEH,ENSA and Microsoft products (server 2003/8, exchange server and etc) Monitoring and diagnosing faults of VPN connections with other organization, Data Exchange Agency IPS/IDS system and sensor setup, operation. Security concept, design, documentation and implementation. --Admin other Here is the incomplete list of technologies and solutions I have used over my 5 years of experience. -Zabbix, Zenoss, Nagios, Munin and Cacti for monitoring purpose  -Configuration management - Puppet, SpaceWalk, Katello  -Web servers - Apache, Ngnix, Lighttpd  -Load Balancing with Haproxy and Barracuda Load Balancer  -Virtualization - Vmware ESXi --Computer Skills, Trainings and Certification Windows; Windows Server (2003/2008/2012); MS Office; Linux; MacOS ; Network Monitoring Tools; Certified Ethical Hacking ( CEH ) - Self-study Course Security Certified Network Specialist - Self-study Course EC-Council Network Security Administrator - Self-study Course Metasploit Framework Expert - Self-study Course CompTIA Security - Self-study Course HISTORY * SpeedLine - Aug 2010 to May 2012 - Linux Engineer, System Administrator * DATA EXCHANGE AGANCY - Jun 2012 to May 2014 -CERT SPECIALIST * Unipay - Jun 2014 to Present -Linux Enginner, Network Administrator

    $20.00 /hr
    0 hours
    0.00
  4. Leandro F.

    Leandro F.

    Computer and Network Security / Researcher

    Argentina - Last active: 1 month ago - Tests: 2 - Portfolio: 1

    I am a passionate professional computer security.Since 2005 I launched careers in the area of ​​information security in companies, in the community and in person. I am working in security research and university teaching, which has been taking part in the very development of new technologies and understanding of phenomena of very recent appearance affecting security. I specialize in computers safety and service, research, training and hostage management for third party service of medium-sized and large national and international companies. I involved with prevention, protection and solution of incidents taking place in companies computer resources and face our commitment through constant update, over-training and detailed system analysis. I work with international prototypes which guide service performance. We pursue long term commercial relationships with our customers providing quality and support. I have wide experience in business and academic fields as we had the opportunity of being part of university training and research projects, new technology development and the possibility of learning about new phenomena affecting computers safety.

    $50.00 /hr
    0 hours
    0.00
  5. Steve H.

    Steve H.

    Security Consultant / Linux System Administrator

    United States - Last active: 1 month ago - Tests: 10

    SECURITY CONSULTANT - 10 years provided IT security services for large Fortune 500 companies in the Energy, Healthcare, and Education sectors. Provided services in firewall and IDS management, vulnerability assessment, and penetration testing. Skills and tools include: CheckPoint, Juniper, Cisco, Nessus, Core Impact, BurpSuite, MetaSploit, and many others. SYSTEMS ADMINISTRATOR - Secured and maintained hundreds of Linux and *NIX based systems in corporate, university, and small business environments. Specializing in LAMP/LEMP configuration management and daily operations. Excellent in automation of routine processes via shell/Perl scripts. 21 years experience in providing administration in varying capacities. Skills include: Apache, Nginx, MySQL, Memcached, Varnish WEB DEVELOPER - PHP application developer. Provide programming and maintenance for two actively used applications. One provides access to DNS configuration management for thousands of customers daily and includes a full RESTful API for programmatic use. The other application provides data import, data analysis, and reporting capabilities for security consulting experts to streamline the reporting process when combining the output of multiple security tool data. Skills include: PHP, Perl, shell scripting, HTML, jQuery

    $45.00 /hr
    0 hours
    0.00
  6. Maxim Tsoy

    Maxim Tsoy

    Experienced Python Developer and Security Researcher

    Russia - Last active: 3 months ago - Tests: 7 - Portfolio: 2

    1. Python development: Rich experience in distributed Python applications and web applications development using Django, Pyramid, and Celery. Released several mobile Python applications (kivy). 2. Security Assessment: I have a huge experience in vulnerability research and security assessment (currently this is my main occupation). Reached the top in many hacking contests, including DEF CON CTF. I usually specialize in web application security, however, I am experienced in network, database, cryptography and other security areas. Disclosed security advisories for many vendors including: - Cisco - Citrix - Yandex (Entered Bug Bounty Hall of Fame) - SAP - Qiwi 3. Game Development: Have an experience in game design and development using Game Maker Studio.

    $22.22 /hr
    249 hours
    0.00
  7. Jonas Scherer

    Jonas Scherer

    Information Security Analyst

    Brazil - Last active: 04/24/2014

    Graduated on Information Systems. Responsible for maintenance of Internet Security equipments of a Baking corporation. Pen-tester and Firewall deployment in many companies from Brazil. • CCSA – Checkpoint Certified Security Associate Course • CCNA - 640-801 – Cisco Certifield Networking Asssociate • Cisco Internetwok Troubleshooting 5.2 Course • BCPAA – Blue Coat Proxy Certified Associate • CCNA - Routing and Switching - Cisco Network Academy Course • CCNP – Cisco Certified Network Professional - Routing Course • BCPAA – Blue Coat Proxy Associate Course

    $33.33 /hr
    0 hours
    0.00
  8. Bryan O.

    Bryan O.

    Ethical hacker

    Netherlands - Last active: 12/15/2014 - Tests: 3

    Current work for Sogeti Netherlands where I function as an ethical hacker. At Sogeti I have done penetration tests for many organisations, including governmental applications, healthcare organisations, banks and many more. Experienced in both web application penetration testing and regular network vulnerability assessment. In addition to pentesting I am internally responsible for writing reports, developing hacking tools (programmed in Java, python, javascript, ...) and developing sound testing methodologies.

    $50.00 /hr
    0 hours
    0.00
  9. Sidney W.

    Sidney W.

    Certified Network and Security Engineer

    United States - Last active: 02/01/2013 - Tests: 2

    I specialize in information security, and also possess formal experience with systems and network administration. I am certified under the Offensive Security Certified Professional (OSCP) program, the Cisco Certified Network Associate (CCNA) program, and the CompTIA Security+ program. I have performed formal penetration tests as well as consulted for the design and deployment of scalable infrastructures. I am very comfortable writing thorough documentation and reports. Platforms I am experienced with, listed from most proficient to least proficient: Linux, Cisco IOS, Citrix XenServer, Windows, JunOS, OS X, FreeBSD, Android, Solaris Programming languages, from most fluent to least fluent: C/C++, Bash scripting, Perl, PHP, SQL, Python, Assembly language, Java, Ruby Concepts: Network Infrastructure, Routing and Switching, Information Security, Physical Security, Penetration Testing, Cloud Computing, Systems Architecture, Operating Systems, Virtualization, High Availability, Load Balancing, Data Loss Prevention, Business Continuity Planning, Disaster Recovery, Recovery Time Objective, Access Control, Chain of Custody, Key Escrow, Risk Assessment and Management, Change Management, Regulatory Compliance, Service Level Agreement, Reporting

    $20.00 /hr
    0 hours
    0.00
  10. Maxime ALAY-EDDINE

    Maxime ALAY-EDDINE

    Software and Hardware Security Consultant

    France - Last active: 06/24/2014 - Tests: 2 - Portfolio: 4

    I'm a Security Consultant with both Software & Hardware experience. I have a deep understanding of Industrial needs and constraints, thanks to very sensitive missions with large responsibilities in the Military Embedded System field and SASS companies with payments' security issues. My clients are Industrial groups & Consulting companies that want to secure their assets and business. I provide a complete offer of services such as: - Software Auditing (with code review and architecture analysis) - Penetration Testing (black, grey and white boxes) - Analysis of Hardware vulnerabilities (PCB & Embedded Systems) - Training of employees (technical or not) - Monitoring and maintenance against new IT vulnerabilities - Writing & Deployment of Safety Policies A typical mission is as following: 1. Study of the client's needs 2. Timed and Priced proposal 3. Kickoff meeting 4. Execution of the mission 5. Control of the results 6. Validation & Closing meeting

    $80.00 /hr
    0 hours
    0.00