You will get a professional network pen test and web apps vulnerability assessment
Peter C.
You will get a professional network pen test and web apps vulnerability assessment
Peter C.
Basic security assessment
Basic network and web apps security penetration testing using automated tools
- Delivery Time 1 day
- Application Audit
- Project Plan
- Cost Estimation
1 day
delivery —
Oct 5, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Peter gets paid once you are satisfied with the work.
Project details
You will get the best web application security vulnerability assessment in order to mitigate modern-day cyber security threats. I will not leave any endpoint not tested. You will get a detailed security assessment report and mitigation solutions to protect your assets from hackers or cyber criminals. I submit timely reports that are clear to understand. I test web applications against XXS, business logic vulnerabilities, SQL injections, SSRF attacks, CSRF attacks, broken authentication, security misconfiguration, and social engineering attacks among other security vulnerabilities. I do network penetration testing on computer networks, searching for flaws in wireless configurations, network server configurations, and routing protocols. I provide security threat mitigation solutions and post-cyber attack solutions. I follow industry network penetration testing and web application vulnerability assessment standards such as ISO27001, OWASP, and NIST framework.
Cybersecurity Assessment Type
Penetration TestingCybersecurity Expertise
Audit, Cyber Threat Intelligence, Risk AssessmentTechnology Type
Firewall, Web ApplicationCybersecurity Regulation
ISO, HIPAA, NIST Cybersecurity Framework, PCI DSS, SOC 2What's included
Service Tiers |
Starter
$100
|
Standard
$550
|
Advanced
$1,000
|
---|---|---|---|
Delivery Time | 1 day | 5 days | 10 days |
Application Audit | |||
Project Plan | |||
Cost Estimation |
About Peter
Cybersecurity Analyst | DevOps| AWS| Huawei Cloud & Content Writer
Harare, Zimbabwe - 5:14 pm local time
A Cyber Security Analyst with 3+ years of experience in information systems security, and web application penetration testing. I do application continuous integration and deployment(CI/CD) and I do web application vulnerability assessment and Web Application Firewall bypass security testing. An InformationTechnology Technician with over 10 years of experience supporting IT systems for universities, schools, and private organizations. I conduct network penetration testing on LANS, network infrastructure, firewall bypass, and wireless network cracking., I have experience with network design, computer servicing, Linux and Windows server configuration, and administration. I have worked with various college instructors to develop cybersecurity and network course content. I have trained dozens of students in Germany and Zimbabwe in courses ranging from Cyber Security and Digital Forensics, Linux Server Administration, Cisco Router and Switch configuration, and Network design. I do proofreading and help to collect data for research projects and presentations. I have a deep understanding of cybersecurity standards such as ISO27001, ISO27002, NIST Cybersecurity Framework, HIPPA, and OWASP.
Key InformationTechnology and Cybersecurity Expertise:
-Web application security penetration testing.
-Network penetration testing.
-Automated security vulnerability scanning using Burpsuite, CURL, Nmap, SQLMap, Nessus, Qualys, Metasploit, etc.
-Application integration and deployment.
-I have experience with Git, Docker, AWS Cloud, Huawei Cloud
-Data encryption and privacy.
-Design and install computer LAN infrastructure.
-Computer Servicing and Maintenance.
-Configure Linux servers and Windows Servers.
-Configure network firewall.
-Configure web application firewall.
-Information systems security auditing and assurance.
-Cybersecurity threat hunting and attack surface management.
I have deep experience with tools such as Burpsuite, CURL, NMap, SQLMap, CyberChef, Kali Linux,Metasploit, TCPDump,Nikto,Splunk etc.
I have a CEH Practical Certificate, CCNA CyberOp Certificate, CCNA Security, CCNP Routing and Switching, AWS, Huawei Cloud Engineer certificate, and a Higher National Diploma in Information Technology.
Steps for completing your project
After purchasing the project, send requirements so Peter can start the project.
Delivery time starts when Peter receives requirements from you.
Peter works on your project following the steps below.
Revisions may occur after the delivery date.
Step 1
Provide a general cyber security problem statement. e.g "We have finished developing our company website and we would like to have it tested for security vulnerabilities"
Step 2
The client provides expected project delivery time frames.