Freelancers Para Contratação
Países
Localização específica
Exames
Remuneração por Hora (Dólares)
Avaliação
On-line
Mostrando 14 resultados
Freelancers Patrocinados
-
|==> Jack of all trade!! <==| Areas Of Expertise: IT Security Audit - ISO 27001:2022, PCI DSS, NIST 800-53, GDPR and several other IT Security Compliance. IT Security and VAPT - Backtrack, Kali Linux, Nmap, Wireshark, Metasploit, Nikto, Burp Suite, OpenVAS, Aircrack-ng, and several other security penetration...|==> Jack of all trade!! <==| Areas Of Expertise: IT Security Audit - ISO 27001:2022, PCI DSS, NIST 800-53, GDPR and several other IT Security Compliance. IT Security and VAPT - Backtrack, Kali Linux, Nmap, Wireshark, Metasploit, Nikto, Burp Suite, OpenVAS, Aircrack-ng, and several other security penetration tools System Administration - VMWare vSphere, vCenter, ESXi (5.x, 6.x, 7.x, 8.x) Redhat Linux Enterprise Linux (5.5, 6, 6.5, 7, 8), CentOS, Ubuntu, Kali/Backtrack,. Windows Server (2019, 2016, 2012), Windows Hypervisor, SCVMM (System Center Virtual Machine Manager), SCCM (system center configuration manager), SCOM (System Center Operations Manager), VMware Networking - Routing, Switching, Cisco Firewalls, router and switches, Packet tracer, Riverbed Opnet Modeler, GNS3 IT Security - Backtrack, Kali Linux, Nmap, Wireshark, Metasploit, Nikto, Burp Suite, OpenVAS, Aircrack-ng, and several other security penetration tools Digital Forensics - Autopsy, EnCase, FTK, Axiom Web Designing - html, css, javascript, xml Web Programming - php, asp, ajax, jsp Database - MySQL, Oracle Writing - Technical Writing, Technical documentation, E-book, Content, Report, Creative writing menos
Contratar rozeny2k
-
Segurança na rede, Segurança de Internet, Segurança de computadores, Teste de Website, Penetration Testing✔️Certified at Windows Security & Forensics ✔️Certified at Ethical Hacking ✔️Certified at WEB APP SECURITY FUNDAMENTALS ✔️Certified at Website Hacking / Penetration Testing Main Skills: Penetration Testing, Web Application Security. Social Engineering, Red team assessment, Ethical Hacking & Countermeasures,...✔️Certified at Windows Security & Forensics ✔️Certified at Ethical Hacking ✔️Certified at WEB APP SECURITY FUNDAMENTALS ✔️Certified at Website Hacking / Penetration Testing Main Skills: Penetration Testing, Web Application Security. Social Engineering, Red team assessment, Ethical Hacking & Countermeasures, Vulnerability Assessment, Malware Analysis and server Security Hardening. My core competency lies in performing black and gray box testing, on the live web applications/networks or in lab environments.I am familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of my work is confidential I can share vulnerability assessment sample. I have experience in vulnerability assessment for PCI & HIPAA Compliance. menos
Contratar srmukul2
-
Segurança de computadores, Certified Information Systems Security Professional (CISSP), Rede de Administração, A+ Certified IT Technician, Amazon Web Services12 years of cross-platform experience in systems administration, including analyzing, designing, installing, and maintaining of software, peripherals, and networks. Specialist in Sophos XG and UTM. Specialist in Nessus scanner and Qualys.12 years of cross-platform experience in systems administration, including analyzing, designing, installing, and maintaining of software, peripherals, and networks. Specialist in Sophos XG and UTM. Specialist in Nessus scanner and Qualys. menos
Contratar G8Bharat
-
My Name is Malaika Shahzadi. I am working as Data Scientist as well as programmer. I have vast working experience as Data Analyst, Model Building using SPSS, SAS, STATA, POWER BI, KNIME, Tableau, Excel, VBA, MS word, Power Point, Project, Visio, Python, R, SAS, SAS Viaya, SAS Analytics, Google analytics, Mahine...My Name is Malaika Shahzadi. I am working as Data Scientist as well as programmer. I have vast working experience as Data Analyst, Model Building using SPSS, SAS, STATA, POWER BI, KNIME, Tableau, Excel, VBA, MS word, Power Point, Project, Visio, Python, R, SAS, SAS Viaya, SAS Analytics, Google analytics, Mahine Learning, Deep Learning, Forecasting, Model Training and Testing, C++, C#, Excel VBA, Excel Functions, Excel Dashboard, Excel Data cleaning, Excel Formula, Financial Models, and all other work related in excel. I have also working experience with publications, Peer Reviewer. I am working as professional researcher in the well reputed institute. menos
Contratar malaikamb2001
-
⚡ Preferred Freelancer | ⚡ 11+ Years Experience I Offer Services in Malware Removal, Virus Removal, Ethical Hacking / Internet Security, WordPress Speed Optimization, Websites Transfer, SSL Installation, WordPress Development, Linux Server Administration and Zen Cart / Drupal / MODX / Moodle / Joomla Upgrade. Over...⚡ Preferred Freelancer | ⚡ 11+ Years Experience I Offer Services in Malware Removal, Virus Removal, Ethical Hacking / Internet Security, WordPress Speed Optimization, Websites Transfer, SSL Installation, WordPress Development, Linux Server Administration and Zen Cart / Drupal / MODX / Moodle / Joomla Upgrade. Over the last 11 years, I Have Worked on 4000+ Websites Security (Cleaning from Malicious Code and Hardening Security), 1000+ Websites Transfer, 200+ WordPress Websites Speed Optimization (Delivered Results As Per Google PageSpeed Insights, GTmetrix) and 500+ SSL Installs (Including HTTP to HTTPS migration). Service Description: 1. Malware / Virus Removal from Websites (Cleaning Hacked Websites) and Servers. ✔100% Malware Cleanup Including Database Clean ✔Japanese Keyword Hack, SEO Spam / Pharma Hack Fix ✔Credit Card Stealers and Ecommerce Malware Fix ✔Google Blacklist Removal (This Site may be Hacked), Google Deceptive Warning Fix ✔McAfee SiteAdvisor, Norton Blacklist or Any VirusTotal Based Blacklist Fix ✔WP-VCD Malware, Backdoor / Malicious Javascript / Conditional Redirects Fix 2. Website Security Maintenance (Implementing Future Security Measures and Guiding How to Maintain Security for the Future). 3. Website Transfer/Migrate to New Host / Domain (Any PHP-based CMS or Custom-coded Website). 4. SSL Install, HTTP to HTTPS Migration with Secure Padlock. 5. WordPress (Websites Development and Troubleshooting Which Includes Fixing Critical Error / Fatal Errors). 6. Linux Server Administration. 7. Optimize and Increase the Speed of WordPress Websites. 8. Zen Cart / Drupal / MODX / Moodle / Joomla Upgrade (Upgrade to the Latest Stable Version). 9. Penetration Testing (Checking Websites for Security Vulnerabilities). menos
Contratar arfharwinder
-
Segurança de computadores, Segurança de Internet, Segurança na rede, Certified Ethical Hacking, Certified Information Systems Security Professional (CISSP)With more than 4.5+ years’ experience as an Information Security Analyst, I am adept in risk assessment, planning, and mitigation strategies. Moreover, my on-the-job experience has afforded me a well-rounded skill set, including first-rate project management and problem-solving abilities.I have deep knowledge of...With more than 4.5+ years’ experience as an Information Security Analyst, I am adept in risk assessment, planning, and mitigation strategies. Moreover, my on-the-job experience has afforded me a well-rounded skill set, including first-rate project management and problem-solving abilities.I have deep knowledge of Security Assessment Methodology to identify vulnerabilities in Network, Cloud, API, Web, and Mobile Applications. - Why did you hire me for this project? ► Hall Of Fame: Google | Microsoft | Apple | Facebook and Many Other Leading Companies ► Completed 500+ Websites and Mobile Application Penetration Testing ► Working with Middle East Government and 5+ Global Clients to Provide Securities. ► Certified Ethical Hacker, Security Researcher, and Bug Bounty Hunter ► Implemented WAF in AWS to Prevent Future Attacks - I have provided Penetration Test, Vulnerability Assessment services, including professional reports for companies in the world complying with: ► CREST standards ► Offensive Security (OSCP) standards ► OWASP Top 10 Vulnerability ► Application Security Verification Standard 4.0 (ASVS 4.0) ► CWE Top 25 Most Dangerous Software Errors ► ISO 27001 Penetration Testing ► Payment Card Industry Data Security Standard (PCI DSS) ► General Data Protection Regulation (GDPR) ► Common Vulnerability Scoring System (CVSS) ► Open Source Security Testing Methodology Manual (OSSTMM) - I have some cybersecurity certifications, including: ► Certified Ethical Hacker (CEH) ► Offensive Security Certified Professional (OSCP) - The deliverable will be a professional Penetration Testing report which includes: ► Executive Summary ► Assessment Methodology ► Type of Test (Blackbox, Greybox, and Whitebox) ► Risk Level Classifications ► Detailed Engagement Data ► Port Scanning Results ► Result Summary ► Table of Findings ► Detailed Findings. Each finding listed within the report will contain CVSS score, Issue Description, Proof of Concept, Remediation, and Reference sections ► Tool List (Acunetix, Nessus, BurpSuite Professional, Nmap, Metasploit Framework, OpenVAS, Netsparker, Mimikatz, SQLmap, Nikto, Zaproxy, Gobuster, etc.) Technical Skills: Vulnerability Assessment and Penetration Testing, Malware Analysis, Reverse Engineering, Automation using Python, Exploit Development, Threat Hunter. Programming Skills: Python, Flask, Yara, Bash, Linux Administration, C, C++. Technical Skills: Vulnerability Assessment and Penetration Testing, Malware Analysis, Reverse Engineering, Automation using Python, Exploit Development, Threat Hunter. Programming Skills: Python, Flask, Yara, Bash, Linux Administration, C, C++. menos
Contratar anguhari
-
Colaninfotech Colaninfotech
$18 Dólares / horaData Science,AI/ML, JAVA,.NET, MERN,MEAN,MobileColan Infotech is an early adopter of the developing Artificial Intelligence, Machine Learning, Data Science, Data Enginnering,Java,.Net.PHP,Testing,Mobility etc. We do Software Development, Website Designing, and Smart-phone apps development. We offer services to large enterprises, Small and Medium-size companies,...Colan Infotech is an early adopter of the developing Artificial Intelligence, Machine Learning, Data Science, Data Enginnering,Java,.Net.PHP,Testing,Mobility etc. We do Software Development, Website Designing, and Smart-phone apps development. We offer services to large enterprises, Small and Medium-size companies, and software product companies. We have a well-experienced team with strong technical background and dedicated team of professionals equipped with all required offshore project development, infrastructure and also we have associated with reputed partners in software products and technology. https://colaninfotech.com/freelancer menos
Contratar Colaninfotech
-
AI (Artificial Intelligence) HW/SW, Amazon Web Services, CentOs, Certified Information Systems Security Professional (CISSP), CiscoPKI, CISSP, CISM, Entrust, AppViewX, HSM, Unix, Oracle, Cisco, Cloud, IT Security, Cryptography, Data protectionPKI, CISSP, CISM, Entrust, AppViewX, HSM, Unix, Oracle, Cisco, Cloud, IT Security, Cryptography, Data protection menos
Contratar pkisme
-
CyberBuddy25 CyberBuddy25
$50 Dólares / horaCyber Security Specialist (M.Sc, CISSP & CEH)Segurança de Internet, Segurança na rede, A+ Certified Professional, Certified Ethical Hacking, Cloud SecurityI'm a cyber security specialist. I have more than 5 years of experience in information technology, cyber security, and risk management, and hold certifications in Certified Information System Security Professional (CISSP), ethical hacking (CEH), CompTIA Cyber Security Analyst (CySA) and cloud computing. My core...I'm a cyber security specialist. I have more than 5 years of experience in information technology, cyber security, and risk management, and hold certifications in Certified Information System Security Professional (CISSP), ethical hacking (CEH), CompTIA Cyber Security Analyst (CySA) and cloud computing. My core competencies include asset security, technical support, cyber security operations, Risk assessment and Vulnerability management, and design and implementation of security policies. At my current company, I am responsible for protecting the company's information systems, web applications, email, and endpoints from cyber threats and incidents. I lead the incident response team, perform vulnerability scans, threat hunting, user investigations, and risk assessments, and implement security policies and controls. I also supervise a security operations administrator who focuses on vulnerability management and risk mitigation. I am passionate about customer satisfaction, communication, and problem-solving, and strive to ensure the company's compliance with internal and external security standards and regulations. You can review my LinkedIn profile for further details: https://www.linkedin.com/in/zahid-m-824249137/ ---------------------------------------------- Key Competencies ------------------------------------------ • Offering comprehensive security solutions to clients. • Possessing a solid grasp of security, system, and network technologies. • Demonstrating successful collaboration with large organizations. • Articulating technical requirements in business terms effectively. • Familiarity with SDLC, encompassing waterfall and Agile methodologies. • Sound understanding of the "Defense in Depth" layered security architecture model. • Proficiency in operational security and its real-world implications. • Competence in conducting vulnerability analysis on web applications, network, infrastructure, and operating systems. • Prioritizing customer satisfaction and delivering projects that bring tangible value to clients. • Displaying eagerness to delve into technical inquiries from various perspectives. • Exhibiting enthusiasm and adaptability in tackling challenges. • Possessing strong analytical and diagnostic skills. • Keeping up to date with prevalent web vulnerabilities. • Maintaining knowledge of contemporary standards, practices, procedures, and methods. • Excellent presentation and communication skills • Clearly articulating complex concepts both in written and verbal form. • Demonstrating active listening skills, particularly when engaging with customers. menos
Contratar CyberBuddy25
-
Exiverlabs is widely recognised for its proficiency in web and cloud technologies. Our team prioritises multi-technology development and microservice deployment to deliver high-quality solutions that not only meet but also beyond customer expectations. Our methodology: Kickoff discussion: At the start of every...Exiverlabs is widely recognised for its proficiency in web and cloud technologies. Our team prioritises multi-technology development and microservice deployment to deliver high-quality solutions that not only meet but also beyond customer expectations. Our methodology: Kickoff discussion: At the start of every project, we conduct a comprehensive discussion to establish a common understanding of the expected outcomes and timeframes, guaranteeing clear communication from the beginning. Effective Communication: Implementing open and honest communication channels and a strong system for providing regular updates guarantees that you are consistently kept informed about the development of the project. Throughout the duration of the project: Proactive Engagement: We take pleasure in our ability to be proactive and responsive throughout the whole project lifetime, guaranteeing that deadlines are not only met but surpassed. Feedback Loop: Our consistent solicitation of feedback on finished jobs showcases our dedication to integrating your input and guaranteeing your contentment. Conclusion of Project: Client Satisfaction: We are committed to delivering the finished product only when you are completely satisfied, guaranteeing that it matches your expectations. Post-Project Support: We are committed to providing ongoing assistance and are enthusiastic about cultivating a long-term business partnership based on trust and shared achievements. Acquired Proficiencies: Backend technologies include Python, Django, Django Rest Framework, Flask, and Celery with Redis/RabbitMQ. Frontend Technologies: React, Redux, ES6, HTML5, and JavaScript. Database Management: PostgreSQL, MongoDB, and SQLite. Proficiency in deployment: Docker, Docker Compose, Swarm mode, Heroku, AWS, DigitalOcean. We eagerly anticipate the chance to work together with you and provide outstanding outcomes that are specifically customized to meet your distinct needs. menos
Contratar exiver