Browse Penetration Testing job posts for project examples or post your job on Upwork for free!

Penetration Testing Job Cost Overview

Typical total cost of Upwork Penetration Testing projects based on completed and fixed-price jobs.

Upwork Penetration Testing Jobs Completed Quarterly

On average, 11 Penetration Testing projects are completed every quarter on Upwork.

11

Time to Complete Upwork Penetration Testing Jobs

Time needed to complete a Penetration Testing project on Upwork.

Average Penetration Testing Freelancer Feedback Score

Penetration Testing Upwork freelancers typically receive a client rating of 4.29.

4.29
Last updated: September 1, 2015
Clear all filters
  1. Reem Bayoumi

    cloud computing admin

    Estonia - Tests: 1

    I'm currently working at University of Tartu in cloud computing field OpenStack, and i was working previously as Linux / window system admin, i have experience in technical support as freelancer since 2002.have knowledge in Database, SQL. Also my study was Computer Engineering so I know in Electrical/Electronic Engineering. I was designing implementing electronic circuits. I also took technical course in PLC design. I was studying embedded system last semester I was using AT&T and Arduino boards to write software for driving stepper motor.

    $22.22 /hr
    0 hours
    0.00
  2. Maxim Tsoy

    Maxim Tsoy

    Experienced Python Developer and Security Researcher

    Russia - Tests: 7 - Portfolio: 2

    1. Python development: Rich experience in distributed Python applications and web applications development using Django, Pyramid, and Celery. Released several mobile Python applications (kivy). 2. Security Assessment: I have a huge experience in vulnerability research and security assessment (currently this is my main occupation). Reached the top in many hacking contests, including DEF CON CTF. I usually specialize in web application security, however, I am experienced in network, database, cryptography and other security areas. Disclosed security advisories for many vendors including: - Cisco - Citrix - Yandex (Entered Bug Bounty Hall of Fame) - SAP - Qiwi 3. Game Development: Have an experience in game design and development using Game Maker Studio.

    $75.00 /hr
    249 hours
    0.00
  3. Greg Molnar

    Greg Molnar

    Ruby Developer / Penetration tester

    United Kingdom - Tests: 2 - Portfolio: 4

    I am Greg, a UK based independent developer/consultant. I focus on Ruby and Ruby on Rails but occasionally I work with other technologies too. I usually help businesses and organisations to reduce costs by automating repetitive processes and to turn ideas into a working product. I love open source and I try to contribute to open source projects as much as I can. I am a Rails contributor(https://github.com/rails/rails/commits?author=gregmolnar) and I also contributed to the following projects: Rack Mini Profiler
 Textacular Mongoid the Ruby MongoDB ORM
 Yii PHP MVC framework

    $100.00 /hr
    0 hours
    0.00
  4. Adam Bedard

    Adam Bedard

    Certified Ethical Hacker

    United States - Tests: 1

    I'm currently looking for vulnerability assessment projects. Here is a list of attack vectors I can conduct assessments on: 1) Information reconnaissance 2) Port scanning - finding vulnerable ports and services 3) Zone transfer testing 4) Directory listing - finding sensitive information that shouldn't be leaked 5) Xss injections 6) Sql injections 7) Web application testing 8) etc. If you don't see an area of concern on this list, contact me.

    $22.22 /hr
    0 hours
    0.00
  5. Ivan K.

    Ivan K.

    Software engineer, sysadmin and security consultant

    Australia - Tests: 4

    Over 10+ years of experience in software engineering, systems administration and security consultation. 1. Software: Full stack web development in: PHP - codeigniter, zend, symfony and wordpress Perl - mason Javascript - backbone, jQuery, underscore CSS - CSS3, SASS Developed desktop and mobile responsive HTML5 websites/web applications. Can code to spec or iterate designs with clients. 2. Systems administration: Full environment setup including: AWS - S3, EC2, EBS, ELB and route53 Mysql, apache, nginx, memcache, couchbase, postresgl (SQL databases and NoSQL) Specialising in RHEL/CentOS and Debian/Ubuntu. 3. Security consulting: Pentests, vulnerability assessments, and blackbox/white testing for common web exploits: csrf, xss, sql injection, dom injection, credential mismanagement etc.

    $60.00 /hr
    0 hours
    0.00
  6. Devin Cox

    Devin Cox

    Project Manager/ Programmer

    United States - Tests: 1

    I have 19 years’ experience in managing complex, enterprise level projects from initiation through closing Especially adept at developing and managing project scope in a manner that mediates the balance between stakeholder expectations and budgetary limits Conducting customer churn analysis, clearly communicating and implementing the results, thereby increasing customer retention Conducting both Qualitative and Quantitative Risk Analysis to increase value and decrease negative risk Introducing security policies and procedures to bring any company from a point of zero compliance to 100% Payment Card Industry (PCI) compliance.

    $56.00 /hr
    0 hours
    0.00
  7. Abdul Rasheed

    Abdul Rasheed

    PHP/Web Developer, Information/Application Security Analyst

    Pakistan - Tests: 7

    Over the last 5 years, I have developed a wide range of websites using HMTL, DHTML, PHP, and MySQL including sites for start-up companies and small businesses. My core competency lies in complete end-end management of a new website development project and managing the security of web applications, and I am seeking opportunities to build websites from the ground up for you or your business. If you need IT Security Services or Web Application and Server Security Assessment, I can also help you. I also have some experience in the following areas: SQL, Ajax, OOP, and software design and testing, Web Application Security Assessment, Information Security Evaluation and Auditing. Disaster Recovery and Business Continuity Planning.

    $12.00 /hr
    19 hours
    0.00
  8. Nishant Chougule

    Nishant Chougule

    Expert Penetration Tester for web applications

    United Kingdom - Tests: 1

    Experience: 1. Penetration testing on a Client’s Website and on Fedora 14 Operating System. • Performed Risk assessment, control design on operating system, database, and the web server and control implementation (Hardening of OS, Database and Web server). • Capture the Flag Situation on the client’s website provided by the university by performing a full website Penetration testing. 2. Penetration testing on Metasploitable Linux virtual machine by using Backtrack5 r3. • Performing Penetration Testing on the target and a detailed report on the PT of functions such as : o Host enumeration, Service enumeration and fingerprinting, vulnerability scanning, vulnerability exploitation, and privilege escalation. 3. Implementing Information Security Management System (ISMS) on the Client provided by the university. • Developing an ISMS Scope, ISMS Policy, implementing Risk Assessment (RA) Methodology, RA report, Risk Treatment Plan, and Security Awareness Training program. 4. Performing Web application vulnerabilities on Webgoat (vulnerable) environment. 5. Performing System security vulnerabilities on vulnerable system provided by the University. 6. Solving Cryptography and PKI challenge provided by the University.

    $7.78 /hr
    0 hours
    0.00
  9. Daniel Stahlnecker

    Daniel Stahlnecker

    IT Security Consultant

    United States

    Experienced with IT industry’s best practices in the security program, project, and risk management areas including NIST Special Publications, Federal Information Processing Standards, Federal Information Security Management Act, NISPOM, DITSCAP, and International Standards for Organization 27001, HIPAA, Disaster Recovery, Business Continuity, GLB, Visa CISP SEC Rules, PCI-DSS, NASD Rules, and NYSE Rules. Including extensive experience in a variety or project management methodologies (PMP BoK, Prince2, Scrum, Agile, Waterfall, etc.) Outstanding leadership and team building skills resulting in effective working relationships and top performance among staff. Extensive project management experience in turning security concepts and ideas into delivered solutions. An excellent communicator between technical and business units who can translate complex information into easily understood terms.

    $33.33 /hr
    3 hours
    0.00