I am a passionate professional computer security.Since 2005 I launched careers in the area of information security in companies, in the community and in person. I am working in security research and university teaching, which has been taking part in the very development of new technologies and understanding of phenomena of very recent appearance affecting security. I specialize in computers safety and service, research, training and hostage management for third party service of medium-sized and large national and international companies. I involved with prevention, protection and solution of incidents taking place in companies computer resources and face our commitment through constant update, over-training and detailed system analysis. I work with international prototypes which guide service performance. We pursue long term commercial relationships with our customers providing quality and support. I have wide experience in business and academic fields as we had the opportunity of being part of university training and research projects, new technology development and the possibility of learning about new phenomena affecting computers safety.
Penetration Testing Job Cost Overview
Typical total cost of oDesk Penetration Testing projects based on completed and fixed-price jobs.
oDesk Penetration Testing Jobs Completed Quarterly
On average, 12 Penetration Testing projects are completed every quarter on oDesk.
Time to Complete oDesk Penetration Testing Jobs
Time needed to complete a Penetration Testing project on oDesk.
Average Penetration Testing Freelancer Feedback Score
Penetration Testing oDesk freelancers typically receive a client rating of 4.43.
I am a professional penetration tester / ethical hacker / IT Security Expert & over the past 7 years, I have been performing vulnerability assessment and penetration testing for local / international clients from around the world delivering according to the current industry standards and best methodologies (OWASP TOP 10, SANS TOP 25, CWE, OSSTMM, PTES etc.) Hire me to test or work on your Server or Network administration projects. I have great experience with Amazon cloud AWS EC2, Linux, Windows, MYSQL, VPN, VMware, Hyper-V, Shell script, Apache and Web and have been working with them for many years. I also have experience with Web Hosting and DNS servers. I’m ready to start working on your projects.
Independent Information Security Consultant, with great passion for delivering services that will add value to your organisation. With over 6 years of experience to leverage, and hundrends of projects completed in various business sectors, my clients receive high quality and objective reports, yielded by conducting on their behalf, realistic assessments (threat simulations).
I specialize in information security, and also possess formal experience with systems and network administration. I am certified under the Offensive Security Certified Professional (OSCP) program, the Cisco Certified Network Associate (CCNA) program, and the CompTIA Security+ program. I have performed formal penetration tests as well as consulted for the design and deployment of scalable infrastructures. I am very comfortable writing thorough documentation and reports. Platforms I am experienced with, listed from most proficient to least proficient: Linux, Cisco IOS, Citrix XenServer, Windows, JunOS, OS X, FreeBSD, Android, Solaris Programming languages, from most fluent to least fluent: C/C++, Bash scripting, Perl, PHP, SQL, Python, Assembly language, Java, Ruby Concepts: Network Infrastructure, Routing and Switching, Information Security, Physical Security, Penetration Testing, Cloud Computing, Systems Architecture, Operating Systems, Virtualization, High Availability, Load Balancing, Data Loss Prevention, Business Continuity Planning, Disaster Recovery, Recovery Time Objective, Access Control, Chain of Custody, Key Escrow, Risk Assessment and Management, Change Management, Regulatory Compliance, Service Level Agreement, Reporting
I am the primary consultant and founder of Nightside Security, an infosec firm that specializes in penetration testing, vulnerability audits, and network security monitoring with IDS/IPS frameworks like Snort and Bro. I help clients develop resilient, dynamic and scalable security solutions in order to identify, understand, and mitigate threats before they are exploited. I have been working on my own for over two years now, and I have over four years of experience within the IT security industry prior to this. I have extensive experience with server administration, website development and design, and I am proficient in Python (which allows me to write my own pentesting tools should the situation call for them). With regards to lower-level languages, I know C and I am currently teaching myself assembly. I am also skilled in system administration and server configuration, especially within the Unix ecosystem. For more information, please refer to my company website: https://nightside.sx/ or my profile on Elance: https://www.elance.com/s/tyler-w/
I am currently securing many ecommerce, cloud hosting and other hosting websites and not just limited to it.I also provide with ethical hacking training classes.I am also goof at pentesting the intranets and college networks.Many of my clients are in top 250 of ALEXA ranking and are kept as secret as part of non disclosure agreements.
Jonathan Suldo Agency Contractor
Certifications/Experience: I have 5 years of professional work experience in Cyber Security.I have certifications in/as Certified Ethical Hacker, Security+,compliance auditor,Business Continuity Planning, Risk Assessment(BIA), Incident Response,Security+,Python Scripting expert, and malware analysis. Hands on Experience: GSA Contracting(cyber security),Enterprise Web applications, Network Management,Government/Private Sector Compliance Auditing- Financial Security Compliance Solutions, Healthcare Security and Compliance Solutions,Government Security and Compliance Solutions,Education Security and Compliance Solutions, Law Firm Network Security Solutions,Utilities and Energy Industry Cyber Security Solution.-GLBA, PCI, SOX, HIPAA, FISMA, NERC CIP and ISO 27001/27002. Incident Response: CSIRP Gap Analysis Customer Information Disclosure Planning Logging Configuration Review Compliance Integration Incident Response Retainer Services Experience utilizing Penetration testing tool: Application Testing-OWASP Testing Framework,Testing in-depth Penetration testing frameworks-Penetration Testing Framework 0.59, Expert level knowledge using the Baseline Kali Linux distro Penetration Testing Tool-sets.
Astute and accomplished information security professional equipped with a demonstrated background in leading all domains of complex information security. Consistently ensures that all Information Security objectives are established and/or met and tackles/resolves key issues information security. Remain abreast of ever-changing technologies and industry trends. Exhibits superior communication skills while coordinating with teams in all organizational levels.
I spent the better part of my life "hacking" for knowledge and out of complete boredom.When I grew up i realized the damage i had done to people i had never met.From then on I decided to dedicate my skills and talents to helping people better secure the technology they use.I was not trained in a traditional accredited setting rather i was trained by various members of the "black hat/white hat" communities.My approach to Penetration Testing and Security audits are unique in the fact that i give you the view from the average "hacker". I do not tell you how an MIT graduate would break into your systems as the odds of such are remote at best.My contributions can be seen by everyone when they visit their favorite search engine or social media sites.