ExternalFreelancerRemote$250–$750 USD

Comprehensive Ethical Hacking Assessment

Summary

Freelancer Client is hiring: Comprehensive Ethical Hacking Assessment.

Location: Remote

I need a thorough, legally-compliant security assessment carried out on my digital environment. The exact scope—whether web applications, mobile apps, network infrastructure, or a mix—will be finalised once we have an NDA in place, so please come prepared to advise on the areas you feel will yield the most value.

You are free to employ black-box, white-box, or grey-box techniques; I welcome your professional recommendation on the approach that suits our situation best. Whichever method we settle on, the engagement must follow recognised standards (OWASP, NIST, or equivalent) and remain fully within the bounds of responsible disclosure.

Written engagement plan outlining agreed scope, methodology, and test schedule

Hands-on exploitation and verification of vulnerabilities (not just automated scans)

A clear report that ranks findings by severity, includes reproducible proof-of-concepts, and offers practical remediation steps

Skills: Computer Security, Technical Writing, Research Writing, Compliance, Internet Security, Penetration Testing, Network Security, Risk Assessment

Budget: $250–$750 USD


Source: Freelancer Client via Remote / Online. Apply on the source website.

Original

I need a thorough, legally-compliant security assessment carried out on my digital environment. The exact scope—whether web applications, mobile apps, network infrastructure, or a mix—will be finalised once we have an NDA in place, so please come prepared to advise on the areas you feel will yield the most value.

You are free to employ black-box, white-box, or grey-box techniques; I welcome your professional recommendation on the approach that suits our situation best. Whichever method we settle on, the engagement must follow recognised standards (OWASP, NIST, or equivalent) and remain fully within the bounds of responsible disclosure.

Deliverables expected:
• Written engagement plan outlining agreed scope, methodology, and test schedule
• Hands-on exploitation and verification of vulnerabilities (not just automated scans)
• A clear report that ranks findings by severity, includes reproducible proof-of-concepts, and offers practical remediation steps
• A brief follow-up retest to confirm that high-risk issues have been resolved

Please indicate any specialised tools or frameworks you rely on (Burp Suite, Metasploit, Wireshark, etc.) and the estimated timeframe you need once access is granted. Concise, evidence-based reporting and strict confidentiality are critical to the success of this project.

Location & Details

SourceFreelancer
Budget$250–$750 USD
LocationRemote
Posted2026-05-18 03:37:35
Computer SecurityTechnical WritingResearch WritingComplianceInternet SecurityPenetration TestingNetwork SecurityRisk Assessment
Apply on source →

About this listing

This remote opportunity was imported from Freelancer and is shown here for discovery. To apply, follow the link to the original posting.

Skills mentioned:
Computer SecurityTechnical WritingResearch WritingComplianceInternet SecurityPenetration TestingNetwork SecurityRisk Assessment