Penetration Testing Job Cost Overview
Typical total cost of oDesk Penetration Testing projects based on completed and fixed-price jobs.
oDesk Penetration Testing Jobs Completed Quarterly
On average, 12 Penetration Testing projects are completed every quarter on oDesk.
Time to Complete oDesk Penetration Testing Jobs
Time needed to complete a Penetration Testing project on oDesk.
Average Penetration Testing Freelancer Feedback Score
Penetration Testing oDesk freelancers typically receive a client rating of 4.43.
I am a certified security tester with 2 years experience in Penetration testing. I have tested and maintained the websites of many official organizations. I can find the vulnerabilities in websites or applications and fix them so that they can't be exploited by hackers. I have the knowledge of latest security testing tools Main Projects worked upon : - Provided security solutions to University ERP System - Currently working with an Australian Bank as a consultant for security. I have also developed LINUX shell utilities and Python Networking scripts. Other skills: Android App Developer, JAVA, TCP/IP
Work as a technical adviser in area of information technology with a concentration on network security and risk. Security Related Experience: • Attack and Penetration • Network Security • Wireless Network Infrastructure Security • Social Engineering and Physical Security Assessments • Web Application Security Assessments • Application Security Project Development • Switch and Router Configuration: Cisco all models • Security Training Department of Defense Top Secret clearance (inactive) Public Trust (inactive) Specialties: Designed security strategy for integrating security into the development process. Developed processes to decrease time to remediate security vulnerabilities. Implemented several development strategies to increase code quality. Advised upper management on the impact of vulnerabilities identified internally and externally. Penetration testing specializing in internet, intranet, wireless, social engineering, incident response, VOiP, VMWare, mobile, and web applications.
* Have 6 years’ conducting security penetration testing (Ethical hacking) and risk assessment. * Infrastructure and web application expert penetration tester. * Advance in discovering sophisticated vulnerabilities. * Advance in Metasploit, Nessus, Nexpose, Burp Suite (as a proxy and scanner). Also, I’m familiar with different programming languages such as Python, Java, C#, Ruby, Visual Basic, PHP and many different CMSs. *Have different certificates and trainings: - CEH (certified ethical hacking) - Ethical hacking from infosec institute - OSCP (Offensive Security Certified Professional) - eWPT (Web application Penetration tester) - ISO 27001 Lead implementer-ISMS Protect what matters by applying offensive penetration testing to your infrastructure and applications and also see if your response team detects the attack.
I am the primary consultant and founder of Nightside Security, an infosec firm that specializes in penetration testing, vulnerability audits, and network security monitoring with IDS/IPS frameworks like Snort and Bro. I help clients develop resilient, dynamic and scalable security solutions in order to identify, understand, and mitigate threats before they are exploited. I have been working on my own for over two years now, and I have over four years of experience within the IT security industry prior to this. I have extensive experience with server administration, website development and design, and I am proficient in Python (which allows me to write my own pentesting tools should the situation call for them). With regards to lower-level languages, I know C and I am currently teaching myself assembly. I am also skilled in system administration and server configuration, especially within the Unix ecosystem. For more information, please refer to my company website: https://nightside.sx/ or my profile on Elance: https://www.elance.com/s/tyler-w/
I am one of the managing partners and founders of Secure Network Management. , Secure Network Management LLC is an information security company founded in 2012 by professional penetration testers. I specialize in network, wireless, and web application penetration testing and providing accurate and actionable reports to clients. Analysis of each vulnerability is done based on the unique criteria of the client. We are experienced in HIPAA/HITECH, PCI-DSS, FIPS-199, and SOX. My background includes penetration testing for government, payroll processing, commercial, internet and medical facilities. I currently hold CISSP, CEH, ECSA, and Security+ along with other more specialized training.
I've more than 5 years of experience in server administration highload projects and solve common problems. My main skills are in systems administration Linux (Ubuntu/Debian/CentOS), Oracle Solaris as well as Penetration testing (Kali Linux, Web (SQLi, XSS etc), Social engineering) Installation and configuring, backup organization and rescue, data transfer from one server to another, troubleshooting, shell scripting are in my competencies. Mail Server Settings (Exchange, postfix+Dovecot), Databases (MySQL, PostgreSQL, MS SQL) Active Directory (MS AD, SAMBA+LDAP), Shared-Hosting (nginx/apache, php-fpm) Using virtualization (VMware ESXi, MS Hyper-V, KVM) Server monitoring (zabbix) I'll be happy to answer all your questions during and after the project, and I'll keep working with you until the job is done completely to your satisfaction I use skype or mail for communication and i am available about 15 hours a day to update you.
1. Python development: Rich experience in distributed Python applications and web applications development using Django, Pyramid, and Celery. Released several mobile Python applications (kivy). 2. Security Assessment: I have a huge experience in vulnerability research and security assessment (currently this is my main occupation). Reached the top in many hacking contests, including DEF CON CTF. I usually specialize in web application security, however, I am experienced in network, database, cryptography and other security areas. Disclosed security advisories for many vendors including: - Cisco - Citrix - Yandex (Entered Bug Bounty Hall of Fame) - SAP - Qiwi 3. Game Development: Have an experience in game design and development using Game Maker Studio.