You will get SAP Application Pentesting and Report

4.7

You will get SAP Application Pentesting and Report

4.7

Select service tier

  • Delivery Time21 days
    • Application Audit

21 days delivery — Dec 22, 2022
Revisions may occur after this date.
Upwork Payment Protection

Fund the project upfront. Vincent gets paid once you are satisfied with the work.

Project details

My name is Vincent,nice to meet you.

Am certified in cyber security specialist and am generally skilled in various Cyber security domains ,Am proficient in both SAP Penetration testing Cloud security and Security Compliance , my skill set is complimentary diverse ,With 3 years of experience in Cyber security, i will be able to complete your projects in a timely and responsible manner ,You can set a quick call if working with me is something you would love and let as kick off.
Regards
Vincent Kwasi
 
Cybersecurity Expertise Audit, Cyber Threat Intelligence, Risk Assessment
Technology Type IaaS, Computer Network, Data Center, Operating System, SaaS, Web Application, ERP
What's included
Service Tiers
Starter
$1,400
Standard
$2,400
Advanced
$3,600
Delivery Time
21 days
36 days
42 days
Application Audit
Project Plan
-
Cost Estimation
-
-
Optional add-ons You can add these on the next page.
For Hourly contract (+ 5 Days)
+$100

Frequently asked questions

4.7
8 reviews
75% Complete
25% Complete
3 stars
1% Complete
(0)
2 stars
1% Complete
(0)
1 star
1% Complete
(0)
Rating breakdown
Availability
4.6
Deadlines
4.9
Skills
4.8
Cooperation
4.9
Quality
4.6
Communication
4.6

AS

Ann Ming S.
4.35
May 25, 2022
Testers needed - security and devsecops engineers wanted! Vincent offered valuable insight for our user testing interviews. He has solid knowledge in the DevOps space and his perspective was much appreciated. He was happy to coordinate meeting times over Upwork and email, which we appreciated. Thank you for your time Vincent!  

LN

Lorenzo N.
5.00
Nov 22, 2021
General Security Advice Interviews Vincent completed all necessary tasks at an exceptional level and was very professional all throughout the job duration. He provided great communication and was easy to work with. He clearly showed his expertise for the job and provided excellent information for our team. I enjoyed working with Vincent and would highly recommend others hire him in the future.  

DC

Darren C.
3.60
Nov 7, 2021
Cybersecurity 101 Course Design and Materials

JK

Joe K.
4.85
Oct 13, 2021
NIST SP 800-115 Sop for Network Penetration Testing

BB

Busi B.
5.00
Oct 6, 2021
Consultant to provide answers to software development security practices Expert in information security  

About Vincent

Vincent  O.
DevSecOps | Penetration tester | Blockchain Security and Researcher
74% Job Success
Vernon Lake, Canada - 9:37 am local time
✅ Development Operations ✅ Security Operations ✅ DevSecOps

I have a diverse set of expertise and abilities, with a focus on cyber security and software development, with a strong expertise in cybersecurity as a result of several hours spent on vulnerability assessment and penetration testing operations.

Developing native apps and incorporating security into the development life cycle.
I am familiar with testing automation technologies and their integration.


My current tech stack of choice is React, Javascript, and Node.
js

Proficiency in:

Smart Contract Audit
Ethereum network
Vulnerability management as follows:

1. Develop penetration testing methodology for different infrastructures.
2. Execute and manage an extensive Vulnerability assessment.
3.Implement new Cybersecurity strategies providing you with visibility and monetization
4.Bench-marking your Cybersecurity standpoint.
 

Steps for completing your project

After purchasing the project, send requirements so Vincent can start the project.

Delivery time starts when Vincent receives requirements from you.

Vincent works on your project following the steps below.

Revisions may occur after the delivery date.

Discovery phase

Defining operational Boundaries of the System. Checking for valuable assets withing the system and sensitive information

Scanning Phase

Identifying possible risk and threat source within the system

Review the work, release payment, and leave feedback to Vincent.