Penetration Testing Job Cost Overview
Typical total cost of oDesk Penetration Testing projects based on completed and fixed-price jobs.
oDesk Penetration Testing Jobs Completed Quarterly
On average, 12 Penetration Testing projects are completed every quarter on oDesk.
Time to Complete oDesk Penetration Testing Jobs
Time needed to complete a Penetration Testing project on oDesk.
Average Penetration Testing Freelancer Feedback Score
Penetration Testing oDesk freelancers typically receive a client rating of 4.43.
I am a certified security tester with 2 years experience in Penetration testing. I have tested and maintained the websites of many official organizations. I can find the vulnerabilities in websites or applications and fix them so that they can't be exploited by hackers. I have the knowledge of latest security testing tools Main Projects worked upon : - Provided security solutions to University ERP System - Currently working with an Australian Bank as a consultant for security. I have also developed LINUX shell utilities and Python Networking scripts. Other skills: Android App Developer, JAVA, TCP/IP
Work as a technical adviser in area of information technology with a concentration on network security and risk. Security Related Experience: • Attack and Penetration • Network Security • Wireless Network Infrastructure Security • Social Engineering and Physical Security Assessments • Web Application Security Assessments • Application Security Project Development • Switch and Router Configuration: Cisco all models • Security Training Department of Defense Top Secret clearance (inactive) Public Trust (inactive) Specialties: Designed security strategy for integrating security into the development process. Developed processes to decrease time to remediate security vulnerabilities. Implemented several development strategies to increase code quality. Advised upper management on the impact of vulnerabilities identified internally and externally. Penetration testing specializing in internet, intranet, wireless, social engineering, incident response, VOiP, VMWare, mobile, and web applications.
* Have 6 years’ conducting security penetration testing (Ethical hacking) and risk assessment. * Infrastructure and web application expert penetration tester. * Advance in discovering sophisticated vulnerabilities. * Advance in Metasploit, Nessus, Nexpose, Burp Suite (as a proxy and scanner). Also, I’m familiar with different programming languages such as Python, Java, C#, Ruby, Visual Basic, PHP and many different CMSs. *Have different certificates and trainings: - CEH (certified ethical hacking) - Ethical hacking from infosec institute - OSCP (Offensive Security Certified Professional) - eWPT (Web application Penetration tester) - ISO 27001 Lead implementer-ISMS Protect what matters by applying offensive penetration testing to your infrastructure and applications and also see if your response team detects the attack.
1. Python development: Rich experience in distributed Python applications and web applications development using Django, Pyramid, and Celery. Released several mobile Python applications (kivy). 2. Security Assessment: I have a huge experience in vulnerability research and security assessment (currently this is my main occupation). Reached the top in many hacking contests, including DEF CON CTF. I usually specialize in web application security, however, I am experienced in network, database, cryptography and other security areas. Disclosed security advisories for many vendors including: - Cisco - Citrix - Yandex (Entered Bug Bounty Hall of Fame) - SAP - Qiwi 3. Game Development: Have an experience in game design and development using Game Maker Studio.
My focus is on securing client information systems by providing a full range of cyber security services to global institutions and major corporations while providing a total business focused orientation. I offer a trustworthy, high-quality option to using in-house assets for your cyber security efforts. I can provide expert IT security consultantion with high levels of industry experience, technical certifications and practical know-how
I am a passionate professional computer security.Since 2005 I launched careers in the area of information security in companies, in the community and in person. I am working in security research and university teaching, which has been taking part in the very development of new technologies and understanding of phenomena of very recent appearance affecting security. I specialize in computers safety and service, research, training and hostage management for third party service of medium-sized and large national and international companies. I involved with prevention, protection and solution of incidents taking place in companies computer resources and face our commitment through constant update, over-training and detailed system analysis. I work with international prototypes which guide service performance. We pursue long term commercial relationships with our customers providing quality and support. I have wide experience in business and academic fields as we had the opportunity of being part of university training and research projects, new technology development and the possibility of learning about new phenomena affecting computers safety.
SECURITY CONSULTANT - 10 years provided IT security services for large Fortune 500 companies in the Energy, Healthcare, and Education sectors. Provided services in firewall and IDS management, vulnerability assessment, and penetration testing. Skills and tools include: CheckPoint, Juniper, Cisco, Nessus, Core Impact, BurpSuite, MetaSploit, and many others. SYSTEMS ADMINISTRATOR - Secured and maintained hundreds of Linux and *NIX based systems in corporate, university, and small business environments. Specializing in LAMP/LEMP configuration management and daily operations. Excellent in automation of routine processes via shell/Perl scripts. 21 years experience in providing administration in varying capacities. Skills include: Apache, Nginx, MySQL, Memcached, Varnish WEB DEVELOPER - PHP application developer. Provide programming and maintenance for two actively used applications. One provides access to DNS configuration management for thousands of customers daily and includes a full RESTful API for programmatic use. The other application provides data import, data analysis, and reporting capabilities for security consulting experts to streamline the reporting process when combining the output of multiple security tool data. Skills include: PHP, Perl, shell scripting, HTML, jQuery