You will get a Penetration Test of your application or network

Nick G.
Nick G. Nick G.
5.0
Rising Talent

Let a pro handle the details

Buy Assessments & Penetration Testing services from Nick, priced and ready to go.

You will get a Penetration Test of your application or network

Nick G.
Nick G. Nick G.
5.0
Rising Talent

Select service tier

  • Delivery Time 7 days
    • Application Audit
7 days delivery — Oct 11, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Nick gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Nick, priced and ready to go.

Project details

You will receive a Penetration Test Report for an application or network of your choosing. The test is conducted by a certified security expert (CISSP, CISM) based in the United States.

Starter Edition: PenTest of a single web application or external network with five or fewer static IP addresses in the scope of the test.

Standard Edition: Pentest of a single web application, authenticated testing with user accounts for privilege escalation and permission issues. A vulnerability scan of your external network. Includes up to fifteen static IP addresses.

Advanced Edition: Pentest of multiple web applications, vulnerability scanning for up to 25 static IP addresses.

Types of Pentests:
•Web Application Pentest
•API Pentest
•External Network Pentest
•AWS & Azure Pentest

What you can expect from a Penetration Test (PenTest):

•Detailed description and proof of concept for each finding
•Actionable remediation plan and real-time feedback
•Risk severity mappings and insight into the level of effort needed to remediate the findings
•Positive findings that call out what security controls you have that are effective
•Descriptions, screenshots, and suggested fixes for vulnerabilities
Cybersecurity Expertise
Data Protection, Audit, Risk Assessment
Technology Type
Firewall, IaaS, Computer Network, Data Center, Database, Operating System, SaaS, Web Application, CRM, Email System, ERP, Mobile Device
Cybersecurity Regulation
GDPR, ISO, PCI DSS, SOC 2
What's included
Service Tiers Starter
$2,500
Standard
$4,200
Advanced
$12,500
Delivery Time 7 days 10 days 14 days
Application Audit
Project Plan
-
-
Cost Estimation
-

Frequently asked questions

5.0
3 reviews
100% Complete
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
Rating breakdown
Availability
5.0
Deadlines
5.0
Skills
5.0
Quality
5.0
Cooperation
5.0
Communication
5.0

LR

Luke R.
5.00
Apr 13, 2021
Risk Compliance Engineer - focused on Automating SOC2 using Jira Nick Gibson was fantastic and had an invaluable contribution to our SOC 2 efforts. We plan to continue working with him and his consultancy on future projects. I highly recommend him for any compliance, InfoSec or IT projects.

RW

Richard W.
5.00
Feb 4, 2021
Career Coach Nick did an excellent job as a career coach. Nick went above and beyond to give me advice, insight, reviewing my resume and LinkedIn, and more. Nick was very responsive and knowledgeable. I would highly recommend Nick for other jobs.

BL

Bobby L.
5.00
May 6, 2020
HR IS Cyber security company policy. Developer needed to create handbook re Excel doc provided Nick was great to work with. Understood exactly what we were looking for, did a scope of service call, started immediately, and ended 3 days ahead of schedule and under budget. Couldn't be more satisfied. Look forward to working with him again as our cyber security needs evolve.
Nick G.

About Nick

Nick G.
Information Security & Compliance Expert
100% Job Success
5.0  (3 reviews)
Boise, United States - 6:59 am local time
Solution-oriented, CISSP and CISM certified, information security leader, leveraging 20 years of high-level information security compliance experience.

Fifteen years experience as Chief Information Security Officer in a healthcare / financial services company.

Security Frameworks:
ISO 27001 • SOC2 • HITRUST • NIST CSF • CMMC

Regulations:
GDPR • HIPAA • PCI DSS • NIST 800-171

Education:
Drexel University - Bachelor of Science in Computer Science
Delaware County Community College - Computer Science, Associate in Science

Certifications:
CISM - Certified Information security manager
CISSP - Certified Information systems security Professional
CMMC-RP - Cybersecurity Maturity Model Certification Registered Practioner

Steps for completing your project

After purchasing the project, send requirements so Nick can start the project.

Delivery time starts when Nick receives requirements from you.

Nick works on your project following the steps below.

Revisions may occur after the delivery date.

Requirements Gathering

The client provides details regarding the type of Penetration Test to be conducted. (External network test, Web Application Test, API Test, Social Engineering)

Scheduling

The PenTest is scheduled and IP Address or Addresses that will be used for the test are provided to the client prior to beginning testing.

Review the work, release payment, and leave feedback to Nick.