You will get a penetration test report showcasing all your vulns. and their fixes

5.0

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Usman, priced and ready to go.

You will get a penetration test report showcasing all your vulns. and their fixes

5.0

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Usman, priced and ready to go.

Project details

A security penetration test is a simulated cyber-attack on a computer system or network. The goal of this test is to identify and exploit vulnerabilities in the system to assess the system’s security posture which can help organizations identify and fix vulnerabilities before they are exploited by attackers.
A Detailed vulnerability assessment and penetration testing reports will be provided with a debriefing meeting as well.

The report consists of the all the loopholes/vulnerabilities found and ways to fix them.
Cybersecurity Expertise
Data Protection, Configuration Management, Audit
Technology Type
Computer Network, Operating System, Web Application
Cybersecurity Regulation
GDPR, ISO, NIST Cybersecurity Framework, PCI DSS, SOC 2
What's included
Service Tiers Starter
$100
Standard
$300
Advanced
$700
Delivery Time 14 days 28 days 42 days
Small Company Size
Medium Company Size
-
Large Company Size
-
5.0
1 review
100% Complete
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
Rating breakdown
Availability
5.0
Deadlines
5.0
Skills
5.0
Quality
5.0
Cooperation
5.0
Communication
5.0

PG

Pallavi G.
5.00
May 6, 2023
Penetration Testing project for large customer Usman was great at helping us uncover some major issues in our network and systems. Highly recommended!
Usman S.

About Usman

Usman S.
Cyber Security Consultant/Penetration Tester
5.0  (1 review)
Bengaluru, India - 8:32 am local time
New here so rates are low!

I am a Cyber security consultant and I conduct security audits, penetration testing, and red team engagements for a variety of medium to large companies

Daily activities include, but are not limited to:

- Penetration testing against web applications, Mobile applications, network infrastructure and AD.
- Security assessment of network devices such as routers, switches, firewall, intrusion prevention systems, endpoint protection systems
- Security Hardening assessment of servers and network equipment

Previously I was responsible for infrastructure and web application security management for an enterprise-level company where I was leading a team of many security professionals, handling their whole SOC for all their sites [40+], actively involved in host/network-based incident response, conducting various security audits, OS Hardening, vulnerability assessments and penetration tests.
Deliverables include weekly meetings, weekly and quarterly security posture improvement reports, RCA/POC Reports, SOP/Playbooks etc.

Certificates owned:
[+] ICSI-CNSS: Certified Network Security Specialist from International Cybersecurity Institute, UK
[+] EC-Council CEH: Certified Ethical Hacker from EC-Council
[+] Offsec OSCP: Offensive Security Certified Professional from Offsec
[+] Fortinet NSE4: Network Security Expert 4 from Fortinet
[+] Offensive Pentesting from TryHackMe
[+] Cisco SCOR: Cisco Certified Specialist - Security Core

Volunteering/Other Engagements:
[+] Active Member on TryHackMe - Top 1%
[+] Active Member on HackTheBox
[+] Active Member on BugCrowd and Hackerone
[+] Active Member on Proving Grounds by Offsec - 70%+ boxes hacked
[+] Developing my own blog site - providing walkthroughs, explaining RFCs, and other cyber security concepts - Still under Development. (hackershares.com)

During my free time I conduct seminars and webinars for topics related to red teaming and cyber security in general, bug bounty programs, capture-the-flag hacking competitions and personal security research projects.

I do believe that my education, experience and dedication to the field makes me a prime candidate for all your cyber/network security related requirements.

Steps for completing your project

After purchasing the project, send requirements so Usman can start the project.

Delivery time starts when Usman receives requirements from you.

Usman works on your project following the steps below.

Revisions may occur after the delivery date.

The client purchases the project and sends requirements.

A SOW meeting is set to discuss the project in detail and the deliverables.

Review the work, release payment, and leave feedback to Usman.