IT Security Consultant providing Consistent, Timely, and Cost-Effective IT Security Services. "email@example.com" ### Professional Security Services ### # Web Application/SaaS Security Testing and Defense (sql injection, cross site scripting) # Penetration Testing & Ethical Hacking # Vulnerability Assessment & Network Auditing # Implementation and auditing of various security compliance(ISO 27001, NIST, PCI-DSS) # Protection of hacked websites and servers, cloud security. # Security Testing Mobile Apps, Chrome Apps, Salesforce AppExchange Business Apps , RESTful Applications and APIs # Security Awareness - On Demand Phishing for Organizations. ### Value Added Services ### # Debrief with the client at the conclusion of each engagement. # Research and provide recommendations for continuous improvement. # Knowledge sharing. ### Certifications ### CISM,CISSP,Certified Ethical Hacker, ISO27001, Security+ ### Hands on Experience ### Web applications :- Wordpress, Joomla, Drupal, Network :- Cisco, Linksys, Netgear, TP-Link, E-Commerce Security - OScommerce, prestashop, Magento Forums - MyBB, phpBB cPanel, WHMCS Linux, Windows, Ubuntu, CentOS etc. ### Tools ### Manual SQL Injection Testing, Business Logic vulnerability testing, Kali Linux, Burp Suite, Metasploit Pro
Penetration Testing Job Cost Overview
Typical total cost of oDesk Penetration Testing projects based on completed and fixed-price jobs.
oDesk Penetration Testing Jobs Completed Quarterly
On average, 12 Penetration Testing projects are completed every quarter on oDesk.
Time to Complete oDesk Penetration Testing Jobs
Time needed to complete a Penetration Testing project on oDesk.
Average Penetration Testing Freelancer Feedback Score
Penetration Testing oDesk freelancers typically receive a client rating of 4.43.
Experienced IT Consultant and Project Manager with over 8 years of technical experience in cross-platform environments including designing and maintaining various software solutions. For the last 4 years I have been working as a Project manager in different international companies. I specialize in PMI project management method. I managed complex multimillion projects: Deployment of Automated Identity and Access management system based on IBM Tivoli Identity Manager; Implementation of Remote Access Service based on Juniper Junos devices, Lotus Messaging Service Queue applications transition; also various projects related to the HW delivery, extension or replacement and software upgrades with data migrations. I offer high quality IT Services(operating system administration, network design, support and troubleshooting, users training and customer support) and full scope of project management starting from initiation and going through planning, executing, controlling and closing. Maintenance of Project Control book with all project specific documents.
Since 2001, I have been dedicatedly working with Linux Operating Systems & Open Source. Services Provided ::- Deployment, Configuration, Security, Hardening, Monitoring, Performance Tuning, Troubleshooting of Linux Server Roles AWS – Amazon Web Services Migration of Servers Hosting Panels like WHM/CPanel, Plesk etc Asterisk Dialers, VOIP and Call Center Solutions Customization of Linux Kernel & Distro with Rebranding Faculty of Post-Graduate Degree in Computer Sciences. Firewalls & Gateways Linux HPC - High Preformance Clusters Remote Server Support & Troubleshooting L3/L4 Security Auditing of Servers & Websites Cloud & Virtualization Technical Writing VPN - Site-to-Site, Road-warrior Vulnerability Assessment & Penetration Testing Kayako
I am certified, experienced and seasoned IT professional. Over the past 14 years, I have accumulated a vast range of experience which entails me to tackle most IT situations I encounter quite easily and efficiently. If you want the work done related to IT, I am the guy to hire. If still skeptical, have a look below at my achievements. Progressive experience with administration, and directing a broad range of Corporate IT initiatives & business focused solutions using leading ICT technologies with industry best practices and standards. Specialties: IT Security and Infrastructure development (CISSP - Certified Information Security Professional - Member ID 302621) ITIL Foundation, COBIT 5 BI Tools - Tableau / QlikView Business Continuity & Disaster Recovery Planning Network Administration and Database Management CISCO Networking Virtual/Cloud Computing Network security and Server Administration Technical Writings SEO/WordPress/WHMCS LinkedIn profile: http://pk.linkedin.com/in/shahzadrana/
Over the last 13 years i have worked as network administrator. Allways trying to improve my networking skills. I have implemented various solutions for the company i work in , like - Active Driectory - Exchange Server - Network Antivirus solutions - Wireless Networks. - Web Server - Internal / External DNS.... - Gateway - DFS-R File Server In the last 3 years i have oriented myself in the security / penetration testing area. I have achived 2 certifications in security : Offensive Security Wireless Proffesional , and Certified Ethical Hacker My site regarding penetration tests can be found at the following link: https://sites.google.com/site/be4hacked
I have over 8 years experience in software testing and systems administration. I'm skilled in Linux application testing, white/black box testing, penetration testing, mobile app testing (Android & iOS) and load testing. All test cases, steps and reports are fully documented for client review. I have tested web applications for the top 3 technology companies in Silicon Valley. Current available test rig: OSX 10.9.2, Win 8, Win7, Win Vista, Win XP, IPhone 7.1.1, Fedora, PCLinuxOS, CentOS, Ubuntu, Samsung Galaxy Tab, IPad, IPad mini
To work in a variety of possible fields ranging from graphics designing to developing applications. I have an experience of web development, graphics designing and various computer programming languages too. I am an expert in Adobe Photoshop and like to edit pictures and design creative posters. I am also good in HTML/xHTML , PHP, MYSQL , ASP.NET.
Digital Transformation Consultant 7+ years of experience in social media, online advertising and Content Strategy, with a documented record of success in increasing online presence and brand awareness MA and BA in Marketing | Social Media | Inbound Marketing Certification. Expertise in multiple digital marketing disciplines, including social, content, email marketing, analytics and Optimization. Proven success in driving results through social media, community engagement, and Content Marketing. Results have included triple-digit sales growth and massive leaps in audience engagement. Extremely passionate and knowledgeable about digital media.
For the past seven years, I have been learning about the information security world, working as an CEH (Certified Ethical Hacker). With some of my co-workers, i have participated in a lot of projects, strictly focused on Information Security. Also, as we evolve and grow in this area, we have trained ourselves in Forensics Sciences, attending clients who need to know what happened after a contingency. I consider myself a self-taught person that likes to grow and that is not afraid of challenges or difficult cases. At this moment my priority is to teach and so much to share the little knowledge I have gained over the years, as well as learn from those who have traveled a different path and with this keep on growing.
My primary expertise and passion is in computer and data security. I have a strong system administration background and am comfortable working with Linux, Windows and OSX. Additionally, I have a background in graphic and web design. Other skills include server migration, wordpress installation and configuration, wordpress template design and customization, other CMS configuration/setup, database setup and maintenance, php customization for websites and back-end data, data manipulation and general scripting with python. I like to work fast and efficiently and believe in communication and documentation. It's important to complete work quickly and completely and provide others with the information they need to take over once my portion of the work is complete.