We are a software startup with a SAAS platform and have a requirement for external penetration testing that must include EITHER the OWASP Top 10 or SANs Top 25. Contractors must be CISSP certified and must have experience producing reports that are consumable by large corporations.
I would like to deepen my IT security knowledge with the help of a seasoned IT Security expert. I am myself experienced on IT security stuff but I see some missing points on my technical knowledge (and I really mean the deep technical knowledge!) and I would like to fill in all those gaps. I am also aware that all the info is available out there but
...user (ideally a pen-tester), can launch the respective malware: Logistics: 1. User enters (on a screen) the website that they wish to test 2. From that, they have a drop down list with the type of malware that they wish to launch (Trojan Horse, AdWare, DDoS, etc.) 3. They can then select the type of attack and then launch it 4. Upon selecting the attack
...specialize in spraying a fluid applied waterproofing membrane on the concrete foundation of new homes which keeps the basement (BELOW GRADE) living area dry from ground water penetration. In addition, we now have a membrane that we spray on the entire house (ABOVE GRADE) before the siding is installed. This completely seals the entire home from from outside
A lot of my websites are Wordpress based and seem to have quite a few frequent attacks. What I would like to resolve is having you trying to attack in to my website and for example, injecting some code into my Wordpress blog. For a test, I will provide a test site for you. If you manage, I would like to work with you on a lot more projects to help
Need to know the rankings of 10 different countries on the below questions based on data available: Digital media spend in market Digital penetration in market Competition/Pricing for Video Offerings Competition/Pricing for Managed Programmatic Competition/Pricing for Rich Media Cost of starting business / Capital requirements Salary costs (Same
Would like to hire penetration tester Cyber security expert for testing my business. We are a company that has 230 employees and 3 different offices and I would like someone to test that out for me. Penetrating in-network email getting some private business information or website panel.
i have a company that work as security advisor with several big internet companies. Most of them depend on our security service. Allot of their users was emailed with p hishing emails and the attackers take user credentials and cookies . I need to find a way to stop this and build a better security for this websites. Essential skill : Bu rp Suite
...therefore causes a partial wash The most dangerous thing about these other soaps is that, sometimes the clothes look clean from the outside, but because its does partial penetration, it leaves residual particles that causes degradation over a short period of time. But Omo contains surfactants that effectively penetrates the layers of the threads in
We are a training and certification services provider, looking for t...training in the Pakistani cities of Karachi, Lahore and Islamabad: 1. Database Security Management 2. Windows Security Management 3. UNIX/Linux Security Management 4. Information Security Risk Assessment 5. Digital Forensics 6. Web Application Penetration Testing ...
Hi I have had a client since Jan 2018, untangle firewall with draytek router. All has been well, we are r...share are encrypted. We have managed to stop the attack and do have backup HOWEVER I need to know how they managed to get in and enforce security policies so it does not happen again. I need the job penetration testing done urgently ASAP. Thanks
Hello, professionally I myself is an ethical hacker and perform web penetration testing. I do have a good understanding of networks, firewall, IDS/IPS, Kali Linux, and related tools etc. So, I am not a newbie and not even at the Intermediate or Mid-level of my career. But due to some personal interests and for some projects, I need Advanced Red Team
...prospects to learn more. Our sales team is ready to jump on a call with the client. (Lead Generation Specialist has to provide complete details to the sales team, highlighting penetration points and points of interest of the client) Essential Functions Reach out to prospects via email to qualify leads using a specified scoring system. The expected activity
...information for designing and creating a mobile application for submitting mileage expense that is able to populate data and feed into A*STAR’s SAP system automatically. The proposer is to design and create a mobile application that can be used on both iOS and Android, for estimated of 1,000 users. The mobile application should be able to capture staff local
We need individual business owners that will primarily function as Local Representative for a global empowerment project. Job Duties & Responsibilities: They are responsible for increasing penetration through strategic awareness creation both online and offline. Requirements: 1. Leadership quality. 2. Quality experience in Business Development and
I have an AI application I would like to test. Please apply with your most recent experience. Thanks.
Your ability determines how much you can earn！！ Web Security and Penetration Test I am looking for a great person to complete my project. you have even penetrated server of a big website, then received Bounty!!! for example facebook、google、Microsoft and so on. This is very important . If you don't have the abilities, don't bid. Thanks. Because it is
...It may help to explain the required input and the desired output: - Input - We would be using the app to log samples recovered during a standard penetration test boring procedure. A standard penetration test is a drilling procedure where we log the encountered soil type, color, consistency and density at each depth we drill. The borings we drill range
Hello! I’m looking for someone to help penetrate test my web app (desktop, App Store, android store). We’re building a Software product for healthcare, I require the data and use information secure. The app is about to run into a pilot and would like to have a penetration test run prior to going live on 19 November. Is this something you can help me
explore and evaluate the vulnerabilities of wireless devices through researching existing literature articles, journals, white papers, and practical experiments with use of screenshots. once experiments complete explore mitigation techniques that can be employed.
Hello Folks, We are information security startup who provide following services 1. Web application penetration testing 2. Mobile application penetration testing 3. Network va pt 4. Thick client penetration testing We follow following methodologies 1. Sans 2. Owasp top 10 we require unique content for our new website.
We would like a penetration test and report (including recommendations) for an installation of our media asset management system on one of our public facing servers. The system manages videos, stills, audio and other files for its customers. Metadata associated with these files is also stored in the system. It would be useful to see if these media
Project Theme/ Project Title: FRAPPE: DETECTING M...such as Facebook, twitter, Instagram etc has however led to the increase in privacy and security concerns. Main Deliverable: Java or Python programming for penetration testing Secondary Deliverable: Theoretical studies of password protection, data & app security and understanding of data encryption
Looking for a professional penetration tester to test my server in order to determine if it's vulnerable to any attack
...looking for someone who can a) Perform penetration testing of our crypto exchange b) Provide long term support & maintenance of the exchange - Regular health checks - Providing assistance and fixing bugs in case of any issues Skills required: Experience with Laravel 5.6, CSS, MySQL 5.7, Web Sockets, PHP & Event sourcing If you are
I am looking for a penetration tester for periodic assessments against company networks. The person should be very familiar with Metasploit CLI interface (MSFConsole). If you are familiar with additional tools that is great. The tests will be performed using MSFConsole over a WebEx for observation and assistance. You must be able to create reports of
I need a brochure (in english and french) for my cyber security company. Company name: Elliptic Cyber website: [login to view URL] email: contact@[login to view URL] Phone: xxxxxxxxxxx Slogan: "Your Digital Shield" (english) "Votre bouclier numerique" (french) Attached is the logo .......................Content (French Version)
... 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following a formal, recognised methodology. Which methodology you choose is up to
We are a software company that have a web app that we need to have some PEN tests carried out on. This is a web only system and we need software testing not server security. We want to arrange an independent test to see if the web software system security is good, bad, or ugly and find weaknesses and vulnerabilities. We can give login name and passwords
...systems especially for financial transactions which require high levels of speed and data integrity. 6. Security: Experience implementing security considerations to protect sensitive user data. Experience with server hardening and penetration testing. If you don't meet at least 4 of the requirements listed above, don't apply. Please don't send a cov...
I need a logo for my cyber security company and a flyer that will outline our services. The name of the company is elliptic Cyber ("Votre assurance en ligne") Website: [login to view URL] Who we are! Elliptic Security is an experienced and talented team of cyber security professionals whose primary mission is to provide our clients with
...given operating system for vulnerabilities. 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Preparation You are given a VMWare virtual machine containing a potentially vulnerable operating system. The coursework is to apply the