You will get a Professional Network Pentesting
YOUSEF H.
Top Rated
You will get a Professional Network Pentesting
YOUSEF H.
Top Rated
Project details
You'll get a Professional Network Penetration testing on your scope. I'll have an assessment for your servers/printers/PCs and whatever in your scope, then I'll create a professional report for you with the findings/vulnerabilities and how to resolve it (will be management/technical report).
Very looking forward to work with you :)
Please contact me if you have any questions + to know more about the project tiers (Very Important!!).
Best Regards,
Yousef H.
Very looking forward to work with you :)
Please contact me if you have any questions + to know more about the project tiers (Very Important!!).
Best Regards,
Yousef H.
Cybersecurity Expertise
Configuration Management, Audit, Risk AssessmentTechnology Type
Firewall, Computer Network, Data Center, Database, Operating System, Web ApplicationCybersecurity Regulation
PCI DSS, SOC 2What's included
Service Tiers |
Starter
$100
|
Standard
$350
|
Advanced
$600
|
---|---|---|---|
Delivery Time | 1 day | 3 days | 7 days |
Application Audit | - | - | - |
Project Plan | - | - | - |
Cost Estimation | - | - | - |
Frequently asked questions
28 reviews
(24)
(3)
(0)
(1)
(0)
This project doesn't have any reviews.
AL
Agosta L.
Jul 7, 2024
Splunk Enterprise Security
HM
Henry M.
Jun 14, 2024
Splunk Support
SD
Samuel D.
Jan 20, 2024
Install and configure Splunk ES
CT
Cris T.
Apr 20, 2023
Splunk Enterprise Security
PP
Prajwal P.
Feb 27, 2023
EDR Expert for SentinelOne, Crowdstrike and Trend Micro
About YOUSEF
Splunk | Sentinel | XDR | SOAR | SOC Expert
100%
Job Success
Abu Dhabi, United Arab Emirates - 2:15 pm local time
Key Areas of Expertise:
🛡️ SOC Consultations:
Expert in assessing, designing, and optimizing SOC processes to ensure robust security monitoring, incident response, and threat management.
🔍 Penetration Testing & Vulnerability Assessments:
Expert in identifying and mitigating security vulnerabilities through thorough penetration testing and comprehensive vulnerability assessments.
📊 Splunk:
Proficient in leveraging Splunk for SIEM, data analysis, and threat detection, enabling proactive cyber defense.
🖥️ Wazuh:
Skilled in deploying and managing Wazuh for intrusion detection, log analysis, and compliance auditing.
☁️ Azure & Sentinel:
Expertise in implementing and managing Azure Sentinel for security analytics, threat intelligence, and automated incident response.
⚙️ xSOAR:
Proficient in automating security operations and incident response with Cortex XSOAR, enhancing workflow efficiency.
🛡️ Microsoft Defender:
Skilled in deploying and configuring Microsoft Defender for endpoint protection, threat intelligence, and automated remediation.
🚀 CrowdStrike:
Experienced with CrowdStrike’s Falcon platform for endpoint protection, threat intelligence, and proactive threat hunting.
I also have great experience in many other solutions like TrendMicro VisionOne, SentinelOne, and Threat Intelligence Platforms like Group-IB & MISP.
What I Offer:
🎯 Customized Security Solutions:
Tailored security strategies and implementations to meet specific organizational needs and compliance requirements.
🔍 Proactive Threat Management:
Advanced threat detection, analysis, and response to mitigate risks and protect critical assets.
🔧 Optimized Security Operations:
Enhancements to SOC workflows, incident response protocols, and security monitoring tools for improved efficiency and effectiveness.
📝 Comprehensive Security Audits:
In-depth security assessments and audits to identify vulnerabilities and recommend actionable improvements.
📜Official Certifications :
- Splunk Core Certified Power User.
- CompTIA Security + Certified.
- EC-Council Certified SOC Analyst.
- CrowdStrike Certified Falcon Responder (CCFR).
- CrowdStrike Certified Falcon Hunter (CCFH).
- Splunk Cyber Defense Analyst (SPLK-5001)
- Microsoft Cyber Security SC-200
- Microsoft Azure Security AZ-500
- Microsoft Cyber Security SC-400
Let's work together to fortify your security infrastructure and defend against emerging cyber threats! 🚀
Steps for completing your project
After purchasing the project, send requirements so YOUSEF can start the project.
Delivery time starts when YOUSEF receives requirements from you.
YOUSEF works on your project following the steps below.
Revisions may occur after the delivery date.
Scope & Access
You'll provide me the Subnets/IP Addresses scope + Access to the scope to generate the pentesting.
Assessment
I'll work on all the scope to find the weaknesses and the vulnerabilities.