You will get a professional penetration testing report based on OWASP Top 10

Mohammad M.
Mohammad M.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Mohammad, priced and ready to go.

You will get a professional penetration testing report based on OWASP Top 10

Mohammad M.
Mohammad M.

Select service tier

  • Delivery Time 10 days
    • Application Audit
    • Project Plan
10 days delivery — Jul 4, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Mohammad gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Mohammad, priced and ready to go.

Project details

I will test your infrastructure (Website, SAAS applications, mobile applications, network, databases) whether IT or OT and try to break through it. Most of the work is done manually, but I use some automated techniques as well. At the end of the project I will provide you with a detailed penetration test report stating how secure your infrastructure is , Description of the vulnerability , Proof of Concept , and Remediation .
Cybersecurity Expertise
Cyber Threat Intelligence, Risk Assessment
Technology Type
Firewall, IaaS, Computer Network, Data Center, Database, Operating System, SaaS, Web Application, CRM, Email System, ERP, Mobile Device
What's included
Service Tiers Starter
Delivery Time 10 days 20 days 30 days
Application Audit
Project Plan
Cost Estimation
12 reviews
100% Complete
1% Complete
1% Complete
1% Complete
1% Complete
Rating breakdown


Alesha P.
Aug 19, 2022
PCI Compliance Expert Needed Moe was really responsive and gave a thorough analysis of the project needs!


Ross M.
Jun 2, 2022
Information Security Documentation Toolkits Excellent communication. Fair pricing. High quality work.


Matthew M.
May 24, 2022
Implementing NIST standard Mohammad was extremely knowledgeable, punctual, and delivered beyond expectation. Would highly recommend him and will definitely be engaging him for future projects.


Mousa A.
Apr 21, 2022
Cybersecurity (CS) Standard (SACS-002) Great freelancer! Good work, quick turnaround time and work was top quality.
I enjoyed working with Mohammad and will likely have additional jobs for him in the future.


Vince H.
Apr 13, 2022
Cybersecurity Awareness Training Mohammed did an excellent job completing the job I requested. Not only was the quality outstanding but it was completed in an expeditious manner, with no degradation in content. Awesome freelancer.
Mohammad M.

About Mohammad

Mohammad M.
Cyber Security Consultant
5.0  (12 reviews)
Dubai, United Arab Emirates - 5:23 am local time
Welcome to my profile !

Securing your business, achieving a security certification for your company, or answering a security questionnaire should not be cumbersome and painful exercises.

A certified senior Governance, Risk, and Compliance consultant and a virtual CISO, specialized in consulting for the implementation and operation of security frameworks ISO 27001, PCI-DSS, SOC2, IEC 62443, NCA, CST, and NIST CSF with a proven record of successful certification projects, as well as solid experience and expertise in data privacy laws (GDPR, HIPAA, CCPA).

I am fluent in English (graduate of an American university) and Arabic.

Some facts to support your decision:

✅ Constant Top-Rated status
✅ Many completed projects
✅ Supporting all time zones (USA, Europe, Middle East, Australia)
✅ Long-term engagements
✅ 17 years of experience
✅ Professional certifications (ISO 27001:2013 Lead Implementer, ISO 27005 Risk Manager, as well as CISSP, CISA, PMP, ITILv3, and DPO)

Some of the services I offer:
✅ Information security management strategy, assessments, action plan,
✅ Participating in calls during client or vendor engagements, representing the company's Security team,
✅ Security framework implementation and certification readiness (ISO 27001, SOC 2, NIST CSF, PCI-DSS)
✅ Industrial Cyber Security standards audit and assessment and readiness (IEC 62443)
✅ Data privacy assessments and readiness (GDPR, ISO 27701, CCPA)
✅ Part-time DPO
✅ Risk assessment, management, treatment plan, remediation tracking
✅ Answering and filling security assessment questionnaires
✅ Information security policy and procedure creation/update/review
✅ Cyber Security plans and roadmaps
✅ Unique, company-specific tasks
✅ Internal IT and Cyber Security audit, gap assessments
✅ Filling security and compliance questionnaires
✅ Consulting

Thank you for checking my profile!

Ps: Silicon Valley and US-based references are available upon request.

Steps for completing your project

After purchasing the project, send requirements so Mohammad can start the project.

Delivery time starts when Mohammad receives requirements from you.

Mohammad works on your project following the steps below.

Revisions may occur after the delivery date.

Planning and reconnaisance

It is the stage where information and data on your target are gathered to exploit the cyber-attack.

Scanning and footprinting

This stage scans the vulnerabilities. It can be either static or dynamic scanning.

Review the work, release payment, and leave feedback to Mohammad.