Browse Vulnerability assessment job posts for project examples or post your job on Upwork for free!

Vulnerability assessment Job Cost Overview

Typical total cost of Upwork Vulnerability assessment projects based on completed and fixed-price jobs.

Upwork Vulnerability assessment Jobs Completed Quarterly

On average, 3 Vulnerability assessment projects are completed every quarter on Upwork.

3

Time to Complete Upwork Vulnerability assessment Jobs

Time needed to complete a Vulnerability assessment project on Upwork.

Average Vulnerability assessment Freelancer Feedback Score

Vulnerability assessment Upwork freelancers typically receive a client rating of 4.14.

4.14
Last updated: September 1, 2015
Clear all filters
  1. Panayotis Tsiamis

    Panayotis Tsiamis

    Senior Systems and Software Engineer

    Greece - Tests: 7 - Portfolio: 14

    Systems and Services Engineer, with 12+ years of working experience. Interested in researching, administrating, debugging, tuning and developing platforms running on UNIX like Operating Systems. Able to troubleshoot, identify and solve problems in software, network or kernel layer. Always willing to learn and experiment new technologies for creating high availliability platforms, that could described as "state of the art" or "cutting edge" technology. Specialties: • Unix Like Operating Systems Specialist (Solaris / Linux ). • TCP/IP Network technology • Very deep level of knowledge on Machines hardware and OS Kernels internals. • Troubleshoot/Tune/Debug; System Services, Operating Systems • Mail Services Expert, Qmail-Ldap Specialist. • Network: Cacti/MRTG, Nagios, Cisco Netflow • Databases: PostgreSQL / MySQL / Oracle / LDAP. • Programming: Perl, Ansi C, bash, awk, sed, php etc • Internet Services: mail, http, radius, ftp, ssh, irc etc.

    $30.00 /hr
    439 hours
    0.00
  2. Reem Bayoumi

    cloud computing admin

    Estonia - Tests: 1

    I'm currently working at University of Tartu in cloud computing field OpenStack, and i was working previously as Linux / window system admin, i have experience in technical support as freelancer since 2002.have knowledge in Database, SQL. Also my study was Computer Engineering so I know in Electrical/Electronic Engineering. I was designing implementing electronic circuits. I also took technical course in PLC design. I was studying embedded system last semester I was using AT&T and Arduino boards to write software for driving stepper motor.

    $22.22 /hr
    0 hours
    0.00
  3. Robert C.

    Robert C.

    TIBCO Consultant & E-Commerce Architect

    United States - Tests: 2 - Portfolio: 2

    Good Day and thank you for taking a moment to read my profile! I started working in IT about four years ago as a technical support representative for Simple Helix, a Magento specialist web hosting company. From there, I had the opportunity to spend a year as a Network Analyst for a local, carrier class, ISP before moving on to a position as a Linux Systems Engineer with a Magento development firm. In the present, I work as an Applications Engineer with a focus on the TIBCO stack, most notably AMX, BusinessWorks, EMS, and SilverFabric. I have a very strong background in Linux/Unix administration and have worked extensively with CentOS, Red Hat, and Debian. I've worked with networks from a physical perspective, as a NOC Technican, as well as logical perspective troubleshooting complex application issues. Over the past few months I've taken the opportunity to learn to code in Java and I've recently attended Red Hat training for JBoss EAP 6. I'm a CPTE (Certified Penetration Testing Engineer) and would happily pursue projects as an E-Commerce Architect, Systems Engineer, TIBCO Engineer, JBoss Administrator, entry-level Programmer, or entry-level Ethical Hacker. I am available for new jobs immediately outside of US business hours.

    $33.33 /hr
    474 hours
    4.86
  4. Tanya S.

    Tanya S.

    Java Software Engineer

    Bulgaria - Tests: 7

    Over the last 4 years I have been implementing and supporting various server infrastructure components - Portlet 2.0 Container, Web Server, etc. - and have taken care for the security of those components - that includes compliance checking, designing and implementing security patches. I have solid Java programming experience (more than 7 years) and a very extensive security related knowledge - both in application security and session management security. I am seeking opportunities to use my experience in design and implementation of stable and secure applications and in improvement of the security level of existing code. Prior to that I have 2 years experience as a team lead of Quality Management team so I am familiar with the best software testing strategies and I am capable of managing small teams. I also have some experience in the following areas: Linux/Unix administration, shell scripting - Bash and Korn shell, Informatica, Perl, Python, C#, software design and testing.

    $16.67 /hr
    0 hours
    5.00
  5. Maxim Tsoy

    Maxim Tsoy

    Experienced Python Developer and Security Researcher

    Russia - Tests: 7 - Portfolio: 2

    1. Python development: Rich experience in distributed Python applications and web applications development using Django, Pyramid, and Celery. Released several mobile Python applications (kivy). 2. Security Assessment: I have a huge experience in vulnerability research and security assessment (currently this is my main occupation). Reached the top in many hacking contests, including DEF CON CTF. I usually specialize in web application security, however, I am experienced in network, database, cryptography and other security areas. Disclosed security advisories for many vendors including: - Cisco - Citrix - Yandex (Entered Bug Bounty Hall of Fame) - SAP - Qiwi 3. Game Development: Have an experience in game design and development using Game Maker Studio.

    $75.00 /hr
    249 hours
    0.00
  6. Adam Bedard

    Adam Bedard

    Certified Ethical Hacker

    United States - Tests: 1

    I'm currently looking for vulnerability assessment projects. Here is a list of attack vectors I can conduct assessments on: 1) Information reconnaissance 2) Port scanning - finding vulnerable ports and services 3) Zone transfer testing 4) Directory listing - finding sensitive information that shouldn't be leaked 5) Xss injections 6) Sql injections 7) Web application testing 8) etc. If you don't see an area of concern on this list, contact me.

    $22.22 /hr
    0 hours
    0.00
  7. Lessis O.

    Lessis O.

    Penetration tester and security Expert, ITIL, OSCP certified

    Tunisia - Tests: 3

    Since many years I have worked for a big International Financial group as Programmer and Penetration-Tester. I used to work as a Security Analyst for a French Security CERT (Computer Emergency Response Team). The last years I did a lot of Security Assessments of Web Applications. Based on my daily work I am experienced with all common attack vectors and mitigation techniques. I am very interested in Computer Security and ethical hacking. I have conducted Penetration-testing for a lot of clients (including Banque de France, AXA group, Quanthouse, cibtp paris, youdrive.fr etc..) . I have also managed Linux Server for years. I am a confirmed Programmer mastering scripting and advanced programming language (C,C++,python,Bash scripting, Ruby on Rails, Java,etc...).

    $23.00 /hr
    32 hours
    5.00
  8. Abdul Rasheed

    Abdul Rasheed

    PHP/Web Developer, Information/Application Security Analyst

    Pakistan - Tests: 7

    Over the last 5 years, I have developed a wide range of websites using HMTL, DHTML, PHP, and MySQL including sites for start-up companies and small businesses. My core competency lies in complete end-end management of a new website development project and managing the security of web applications, and I am seeking opportunities to build websites from the ground up for you or your business. If you need IT Security Services or Web Application and Server Security Assessment, I can also help you. I also have some experience in the following areas: SQL, Ajax, OOP, and software design and testing, Web Application Security Assessment, Information Security Evaluation and Auditing. Disaster Recovery and Business Continuity Planning.

    $12.00 /hr
    19 hours
    0.00
  9. Muhammad Bilal Khawar

    Muhammad Bilal Khawar

    Malware Research Engineer

    Pakistan

    I have been working as "Malware Research Engineer" for a Year now and my responsibilities includes the following: - Analysing the system architect of the product - Finding malwares that can exploit the product - Making test cases that can hurt products vulnerability - Executing test cases and reporting events generated by them - Research on the events generated by the product during execution of the test cases - Assuring quality of the product by making them non-vulnerable

    $10.00 /hr
    0 hours
    0.00