Browse Vulnerability assessment job posts for project examples or post your job on Upwork for free!

Vulnerability assessment Job Cost Overview

Typical total cost of Upwork Vulnerability assessment projects based on completed and fixed-price jobs.

Upwork Vulnerability assessment Jobs Completed Quarterly

On average, 3 Vulnerability assessment projects are completed every quarter on Upwork.

3

Time to Complete Upwork Vulnerability assessment Jobs

Time needed to complete a Vulnerability assessment project on Upwork.

Average Vulnerability assessment Freelancer Feedback Score

Vulnerability assessment Upwork freelancers typically receive a client rating of 4.30.

4.30
Last updated: August 1, 2015
Clear all filters
  1. Vivek Chauhan

    Vivek Chauhan

    Server Administrator || Vulnerability assessment | Penetration testing

    India - Last active: 12/04/2014

    I work as Linux Server Administrator, As of now I have worked 8 years for IT industry with almost sphere of computers starting from networking, VOIP, Server Security, Linux Security, WHM, Cpanel, Firewall and the list goes on Have a good knowledge and hands on experience in Apache, Iptables, Openvpn, Sendmail, Postfix, Mysql, FTP, Samba, SVN, Asterisk, Elastix, Mysql replication, WHM, Cpanel, WordPress installation and security, ESXI Virtualization etc. I keep interest in server security field, I found Vulnerability in meany world big comp like google, microsoft, twitter, ICANN.org, HTC Mobile, i am rewarded by microsoft and twitter https://about.twitter.com/company/security http://technet.microsoft.com/en-in/security/cc308575#1113

    $28.88 /hr
    0 hours
    0.00
  2. Panayotis Tsiamis

    Panayotis Tsiamis

    Senior Systems and Software Engineer

    Greece - Last active: 5 days ago - Tests: 7 - Portfolio: 14

    Systems and Services Engineer, with 12+ years of working experience. Interested in researching, administrating, debugging, tuning and developing platforms running on UNIX like Operating Systems. Able to troubleshoot, identify and solve problems in software, network or kernel layer. Always willing to learn and experiment new technologies for creating high availliability platforms, that could described as "state of the art" or "cutting edge" technology. Specialties: • Unix Like Operating Systems Specialist (Solaris / Linux ). • TCP/IP Network technology • Very deep level of knowledge on Machines hardware and OS Kernels internals. • Troubleshoot/Tune/Debug; System Services, Operating Systems • Mail Services Expert, Qmail-Ldap Specialist. • Network: Cacti/MRTG, Nagios, Cisco Netflow • Databases: PostgreSQL / MySQL / Oracle / LDAP. • Programming: Perl, Ansi C, bash, awk, sed, php etc • Internet Services: mail, http, radius, ftp, ssh, irc etc.

    $30.00 /hr
    412 hours
    0.00
  3. Oleg Boytsev

    Oleg Boytsev

    Information Security Engineer/Malware Analyst/Reverse Engineer

    Belarus - Last active: 15 days ago - Tests: 1 - Portfolio: 1

    5 years of experience in IT Security field. Highly motivated to solve interesting tasks. Core Qualifications and abilities: High skills in *nix systems administration and information security; Computer network attack/defense; Deep experience in web application security testing (according to OWASP guideline); Strong background in malware analysis and reverse engineering; Responsive, organization skills and the ability to work with minimal supervision; Ability to learn and apply new technologies effectively. Technical skills: Standards/Practices: OWASP standards, ISO 17799 Operating Systems: Windows, Linux, FreeBSD; Networking: TCP/IP, LANs, VPNs, Firewalls; Software: Ollydbg, IDA Pro, GDB, Nmap, Metasploit framework, Burp Suite, Sqlmap, Wireshark, Tcpdump. Programming languages: x86 Assembly, Python Network & System Security: implementing different kinds of tools for network (ModSecurity) and system security Vulnerability Assessments: have a strong background in web application security testing, buffer overflows, format string vulnerabilities Malware Analysis: familiar with tools and techniques that allow to analyse and describe an evil sample according to the best practices. Unpacking, disassembling, binary Debugging/patching, dynamic (behavior) analysis. Reverse Engineering: familiar with Ollydbg, IDA Pro and GDB. System administration: LAMP, DNS, iptables, etc.., know how to solve a vast majority of issues.

    $35.00 /hr
    0 hours
    0.00
  4. Robert C.

    Robert C.

    TIBCO Consultant & E-Commerce Architect

    United States - Last active: 1 month ago - Tests: 2 - Portfolio: 2

    Good Day and thank you for taking a moment to read my profile! I started working in IT about four years ago as a technical support representative for Simple Helix, a Magento specialist web hosting company. From there, I had the opportunity to spend a year as a Network Analyst for a local, carrier class, ISP before moving on to a position as a Linux Systems Engineer with a Magento development firm. In the present, I work as an Applications Engineer with a focus on the TIBCO stack, most notably AMX, BusinessWorks, EMS, and SilverFabric. I have a very strong background in Linux/Unix administration and have worked extensively with CentOS, Red Hat, and Debian. I've worked with networks from a physical perspective, as a NOC Technican, as well as logical perspective troubleshooting complex application issues. Over the past few months I've taken the opportunity to learn to code in Java and I've recently attended Red Hat training for JBoss EAP 6. I'm a CPTE (Certified Penetration Testing Engineer) and would happily pursue projects as an E-Commerce Architect, Systems Engineer, TIBCO Engineer, JBoss Administrator, entry-level Programmer, or entry-level Ethical Hacker. I am available for new jobs immediately outside of US business hours.

    $33.33 /hr
    474 hours
    4.86
  5. Bhushan Katariya

    Bhushan Katariya

    Microsoft Windows and Exchange Analyst

    India - Last active: 1 month ago - Tests: 3

    A Highly motivated and result-oriented individual with over 10 years of experience in a professional environment having a great work culture and meticulous attention to detail with emphasis to customer satisfaction. Ability to achieve set targets and goals in a timely manner. Microsoft Certified System Engineer in Windows Server 2003 with Exchange and Technology Specialist in Windows Server 2008. Extensive hands-on experience in configuring, monitoring, upgrading, migrating and maintaining systems running Microsoft Exchange Server suite (2003 to 2013). Extensive hands-on experience in configuring, monitoring, upgrading, migrating and maintaining systems running Microsoft Active Directory Services(2003, 2008). Extensive hands-on experience in configuring, monitoring, and maintaining systems running Microsoft Cluster Services. Extensive hands-on experience in configuring, monitoring, upgrading, migrating and maintaining systems running Microsoft SharePoint Services(MOSS 2007). Troubleshooting Windows Server related issues(AD, DFS, IIS, DHCP, DNS, and WSUS) Projects, Installations, Configurations and Migrations etc. Configuring and troubleshooting on Mailbox, CAS, and Hub and Edge server roles installations. Configuring High availability solutions like Local Continuous Replication/Cluster Continuous Replication/Standby Continuous Replication technologies. Troubleshooting on Mailbox Migration, Public Folder replication, Database Inconsistency, Exchange services, Offline Address Book, Recovery Storage Groups. Implementing Disaster Recovery in exchange servers for recovering exchange information. Configuration and Troubleshooting External Mail flow (Inbound/Outbound), Mail flow between servers, Spam issues, Edge Synchronization. Configuring Anti spam/Transport agents, Application Relay, SMTP/Transport service problems. Analyzing and evaluating issues using various tools and utilities like EXBPA, EXTRA, ExMon, PFDAVAdmin, Exmerge, DCDIAG, NetDiag, NLtest, telnet, Replmon, AD modify, ADMT, MFCMAPI, etc. Installation, Configuration & Monitoring of Trend Micro Internet Messaging Security Suits & Symantec Endpoint Security. Basic Hygiene & Server hardening of all Windows OS, Linux OS & Subsystems likes IIS, ADS, and SQL Server etc. Security Health Check of all Windows & Linux OS. Ensure documentation of all activities & procedures adhering to organization standards.

    $13.33 /hr
    316 hours
    4.83
  6. Tanya S.

    Tanya S.

    Java Software Engineer

    Bulgaria - Last active: 12/05/2013 - Tests: 7

    Over the last 4 years I have been implementing and supporting various server infrastructure components - Portlet 2.0 Container, Web Server, etc. - and have taken care for the security of those components - that includes compliance checking, designing and implementing security patches. I have solid Java programming experience (more than 7 years) and a very extensive security related knowledge - both in application security and session management security. I am seeking opportunities to use my experience in design and implementation of stable and secure applications and in improvement of the security level of existing code. Prior to that I have 2 years experience as a team lead of Quality Management team so I am familiar with the best software testing strategies and I am capable of managing small teams. I also have some experience in the following areas: Linux/Unix administration, shell scripting - Bash and Korn shell, Informatica, Perl, Python, C#, software design and testing.

    $16.67 /hr
    0 hours
    5.00
  7. Maxim Tsoy

    Maxim Tsoy

    Experienced Python Developer and Security Researcher

    Russia - Last active: 5 months ago - Tests: 7 - Portfolio: 2

    1. Python development: Rich experience in distributed Python applications and web applications development using Django, Pyramid, and Celery. Released several mobile Python applications (kivy). 2. Security Assessment: I have a huge experience in vulnerability research and security assessment (currently this is my main occupation). Reached the top in many hacking contests, including DEF CON CTF. I usually specialize in web application security, however, I am experienced in network, database, cryptography and other security areas. Disclosed security advisories for many vendors including: - Cisco - Citrix - Yandex (Entered Bug Bounty Hall of Fame) - SAP - Qiwi 3. Game Development: Have an experience in game design and development using Game Maker Studio.

    $22.22 /hr
    249 hours
    0.00
  8. Katsumoto L.

    Katsumoto L.

    Penetration tester and security Expert, ITIL, OSCP certified

    Tunisia - Last active: 2 days ago - Tests: 3

    Since many years I have worked for a big International Financial group as Programmer and Penetration-Tester. I used to work as a Security Analyst for a French Security CERT (Computer Emergency Response Team). The last years I did a lot of Security Assessments of Web Applications. Based on my daily work I am experienced with all common attack vectors and mitigation techniques. I am very interested in Computer Security and ethical hacking. I have conducted Penetration-testing for a lot of clients (including Banque de France, AXA group, Quanthouse, cibtp paris, youdrive.fr etc..) . I have also managed Linux Server for years. I am a confirmed Programmer mastering scripting and advanced programming language (C,C++,python,Bash scripting, Ruby on Rails, Java,etc...).

    $23.00 /hr
    32 hours
    5.00
  9. Abdul Rasheed

    Abdul Rasheed

    PHP/Web Developer, Information/Application Security Analyst

    Pakistan - Last active: 1 month ago - Tests: 7

    Over the last 5 years, I have developed a wide range of websites using HMTL, DHTML, PHP, and MySQL including sites for start-up companies and small businesses. My core competency lies in complete end-end management of a new website development project and managing the security of web applications, and I am seeking opportunities to build websites from the ground up for you or your business. If you need IT Security Services or Web Application and Server Security Assessment, I can also help you. I also have some experience in the following areas: SQL, Ajax, OOP, and software design and testing, Web Application Security Assessment, Information Security Evaluation and Auditing. Disaster Recovery and Business Continuity Planning.

    $12.00 /hr
    19 hours
    0.00
  10. Muhammad Bilal Khawar

    Muhammad Bilal Khawar

    Malware Research Engineer

    Pakistan - Last active: 3 months ago

    I have been working as "Malware Research Engineer" for a Year now and my responsibilities includes the following: - Analysing the system architect of the product - Finding malwares that can exploit the product - Making test cases that can hurt products vulnerability - Executing test cases and reporting events generated by them - Research on the events generated by the product during execution of the test cases - Assuring quality of the product by making them non-vulnerable

    $10.00 /hr
    0 hours
    0.00