You will get a thorough security assessment of your Web App or Cloud Architecture

Fotios B.
Fotios B. Fotios B.
Top Rated

Let a pro handle the details

Buy Assessments & Penetration Testing services from Fotios, priced and ready to go.

You will get a thorough security assessment of your Web App or Cloud Architecture

Fotios B.
Fotios B. Fotios B.
Top Rated

Select service tier

  • Delivery Time 1 day
    • Application Audit
1 day delivery — Apr 18, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Fotios gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Fotios, priced and ready to go.

Project details

You will get is an original and well thought out IT Security consultation, that will fully leverage my skills and experience while being tailored around your particular requirements. It will be delivered in a professionally written Word Document (in both doc and pdf format).

I am an IT Security specialist with 15+ years of hands on design and development experience in real world systems (both Linux and Windows platforms) as well as in PoCs created as part of Cybersecurity related academic research projects. The breadth and depth of skills and expertise I possess is very significant and can help me discover not just the specific issues with a particular solution or technology but also have a better grasp of the big picture and the long term effects of certain architectural and solution deployment choices. I have good experience with all three major cloud service providers: GCP, AWS and Azure and I have developed and deployed real world solutions on all of them, some even involving HSM services (AWS)

Please also note that I am recommended by the head of Privacy Engineering @ Android on my LinkedIn page (check my Upwork profiel here to find it).
Cybersecurity Expertise
Audit, Cyber Threat Intelligence, Risk Assessment
Technology Type
Firewall, IaaS, Computer Network, Database, Operating System, Web Application, Email System
Cybersecurity Regulation
What's included
Service Tiers Starter
Delivery Time 1 day 3 days 5 days
Application Audit
Project Plan
Cost Estimation
69 reviews
94% Complete
6% Complete
1% Complete
1% Complete
1% Complete
Rating breakdown


Adley D.
Apr 13, 2024
Marketing Auto Alex is a hardworking, driven, focused and most importantly, an honest man. We have been blessed to work with him and I will highly recommend him.


Adley D.
Mar 3, 2024
Marketing Auto Alex has been a great asset for us. Incredible knowledge and reliable. I will rehire him.


Arne K.
Nov 29, 2023
Various explanations of the stealth_checker script. Excellent work. Very nice and competent communication. Gladly again.


Jeremy B.
Nov 22, 2023
30 minute consultation Always a pleasure.


Malcolm S.
Mar 12, 2023
Azure Platform - Community Solar upgrade Very versatile and a good communicator to non-technical types. Broadly capable and competent. Our project's priority ebbed and flowed, so the availability is partly our fault. Highly recommend!
Fotios B.

About Fotios

Fotios B.
IT Commando
100% Job Success
4.9  (69 reviews)
Blumenau, Brazil - 6:25 am local time
Do you have a demanding IT project? A project that is probably not a good fit for the average developer? Do you need someone with a solid formal education in computer science whose breadth of IT knowledge and experience can bridge systems and technologies and make it all work?

My IQ is 146 (see page bottom), I hold an MSc in Computer Science from a top UK technical university and have 15 years of hands on experience in the industry, successfully leading the development and delivery of projects as important as the European Root Certification Authority for EU's Digital Tachograph:

Here is a list of my skills as well as technologies I have significant experience in:

JAX-RS/RESTEasy RESTful web services
Word, Excel, PowerPoint Development (Add-Ins & Macros)
Microsoft Office & Sharepoint development
COM, VSTO, Javascript, TypeScript Office Add-Ins
Office Store deployed Add-Ins
Web front-end development (HTML, CSS, JavaScript, jQuery, BootStrap, Angular, React)
Microsoft Azure AD, Cognitive and Web Services development
Azure Active Directory
Google Custom Search
Google Analytics
Google AdWords
Google AdSense
Google Maps
Amazon AWS
Amazon CloudHSM and KMS
Amazon EC2
Amazon S3
Amazon Lambda
Amazon DynamoDB
Amazon RDS
Windows Services
Windows Drivers
Windows Internals
Windows System Development
Hacking & Cracking
POS (Point of Sale) Device Integration
Payment Systems and Back-ends
Video Processing and Streaming (ffmpeg, H.264, MPEG, custom codecs, RTMP, RTSP, HLS)
IT Security
HSM (Hardware Security Modules)
Embedded Development
RDBMS (PostgreSQL. MySQL, SQL Server)
NoSQL (MongoDB)
Adobe PDF & Acrobat development
Programmatic PDF generation & modification
PDFBox, wkhtmltopdf, showdown, Zend PDF creation and editing
LibreOffice Development (front end and integration of it as backend service)
Online Electronic Signature (e-signature) Applications
Adobe Flash, Adobe Flash Builder, Adobe AIR & Apache Flex development
Google AdSense
Click bots
Scrape bots
Presence bots
Headless Browser Scraping
Browser Extensions/Add-Ins (Chrome & Firefox)
Digital Rights Management (DRM)
JSON & XML REST & SOAP web services
OpenID, SAML, OAuth, OIDC (OpenID Connect) authentication & authorization
UML & SysML Modelling
ER Modelling
Cyber Security Expert (Cybersecurity)
Custom Tor, SOCKS and Transparent Proxies
Code Injecting Proxy/Proxies
Custom Rotating Proxy Engines
Reverse Proxy/Proxies (SOCKS or other)
Custom (C++), AutoIt, VBScript and JavaScript Windows Automation
Scripted (Emulated) Windows user interaction
Browser Automation and Browser Click Bots
Windows desktop software as a web service. Make any Windows desktop application functionality accessible via a web site or web service (REST or SOAP)
OTT and Streaming media protocols expert: DIAL, Google Cast, SSDP, mDNS, AirPlay, Fling, Amazon Device Messaging (ADM)
OTT devices expert: Roku, Google Chromecast, Amazon Fire TV, Apple TV
Packet analysis, wireless & wire protocol and network analysis expert: tcpdump, Wireshark, aircrack-ng, nmap, netcat, PuTTY, Nessus
ShareLaTeX modifications and cloning
Anon - Anonymizing services for all purposes (web, email, anon socks proxies, etc.)
OpenWrt development for custom WiFi Router firmware
Customized Alfresco based online collaboration systems
UAC Bypass for all Windows versions including the latest Windows 10
Electron Builder
NSIS Installer
VPN Development & TAP Drivers (OpenVPN)
Static Code Analysis (Insider, Security Code Scan, et al)
Linux & Windows Server Security Assessment and Vulnerability Mitigation
Website hosting and domain migration work
Vindi (Brazil Online & Recurring Payments Platform)
Puppeteer based headless Chrome automation including logging in and automating Google & Gmail tasks

I can help you!

Steps for completing your project

After purchasing the project, send requirements so Fotios can start the project.

Delivery time starts when Fotios receives requirements from you.

Fotios works on your project following the steps below.

Revisions may occur after the delivery date.

Requirements refinement

I interact with the client in several ways until the requirements are well fleshed out and with enough technical insight added to them.

Security Assessment & Penetration Testing

I will review the architecture, software components, and source code of your solution, and in the case of web apps or servers being security assessed, I will also perform penetration testing using several tools. I will interact with you as needed.

Review the work, release payment, and leave feedback to Fotios.