Banner Image

All Services

Other

Penetration Tester/Security Consultant

$15/hr Starting at $100

Hi there! Welcome to my page. I'm a Cyber Security Consultant, Penetration Tester, and certified Ethical Hacker. Achievement: Offensive Key Skills: Why hire me?: 1. Doing both Manual as well as Automated testing 2. Use both open source as well as commercial tools during test 3. During test I will going through a check list and that check list will be submitted with final report. Bellow is the Number of vulnerability that will check through out the test (a.Web application- 150 b.Web Services - 45 c.Android Application-50 ) 4.The Check list is included Authentication, Authorization, Input Validation, Session management, File Uploading, Server Configuration etc test cases 5. Final report having vulnerability name, summery, POC, screenshot/video, Remedies, severity, CVE Number, Owasp/Sans number and reference link 6. Giving a Written POC where you can reproduce the vulnerability very easily 7. Privacy is the top most priority, Data will be confidential between me and Project Owner 8. We will be delivering reports on committed day /time 9. Can have a video call conference if your developer have any query with reports and findings. 10. Will do Retest after fixing bugs 11. We have some extra configuration for security protection while testing that can be only discussed internally.

About

$15/hr Ongoing

Download Resume

Hi there! Welcome to my page. I'm a Cyber Security Consultant, Penetration Tester, and certified Ethical Hacker. Achievement: Offensive Key Skills: Why hire me?: 1. Doing both Manual as well as Automated testing 2. Use both open source as well as commercial tools during test 3. During test I will going through a check list and that check list will be submitted with final report. Bellow is the Number of vulnerability that will check through out the test (a.Web application- 150 b.Web Services - 45 c.Android Application-50 ) 4.The Check list is included Authentication, Authorization, Input Validation, Session management, File Uploading, Server Configuration etc test cases 5. Final report having vulnerability name, summery, POC, screenshot/video, Remedies, severity, CVE Number, Owasp/Sans number and reference link 6. Giving a Written POC where you can reproduce the vulnerability very easily 7. Privacy is the top most priority, Data will be confidential between me and Project Owner 8. We will be delivering reports on committed day /time 9. Can have a video call conference if your developer have any query with reports and findings. 10. Will do Retest after fixing bugs 11. We have some extra configuration for security protection while testing that can be only discussed internally.

Skills & Expertise

API TestingCyber SecurityEthical HackingPenetration TestingSecurity ConsultingVulnerability AssessmentWeb Application Security

0 Reviews

This Freelancer has not received any feedback.