ExternalFreelancerRemote$1500–$12500 USD

Ethical Hacker for Vulnerability Assessment

Summary

Freelancer Client is hiring: Ethical Hacker for Vulnerability Assessment.

Location: Remote

I need a seasoned ethical hacker to uncover and clearly document every security weakness lurking in our mobile applications and the underlying network infrastructure. You will have formal authorisation to test, but there are a few boundaries: production customer data is off-limits and any denial-of-service style traffic must be kept to agreed-upon off-peak windows. Everything else inside the defined scope is fair game.

During the engagement you are free to use the tools you prefer—Burp Suite, OWASP ZAP, Metasploit, Wireshark, custom scripts—so long as the final results are reproducible.

A concise executive summary followed by a detailed technical report for both the mobile apps and network layers.

Proof-of-concept evidence (screenshots, request/response logs, exploit code where relevant).

Risk ratings that map to CVSS or a similar industry scale, plus clear remediation steps.

Skills: Web Security, Computer Security, Network Administration, Internet Security, Penetration Testing, Network Security, Risk Assessment, Data Protection

Budget: $1500–$12500 USD


Source: Freelancer Client via Remote / Online. Apply on the source website.

Original

I need a seasoned ethical hacker to uncover and clearly document every security weakness lurking in our mobile applications and the underlying network infrastructure. You will have formal authorisation to test, but there are a few boundaries: production customer data is off-limits and any denial-of-service style traffic must be kept to agreed-upon off-peak windows. Everything else inside the defined scope is fair game.

During the engagement you are free to use the tools you prefer—Burp Suite, OWASP ZAP, Metasploit, Wireshark, custom scripts—so long as the final results are reproducible.

Deliverables
• A concise executive summary followed by a detailed technical report for both the mobile apps and network layers.
• Proof-of-concept evidence (screenshots, request/response logs, exploit code where relevant).
• Risk ratings that map to CVSS or a similar industry scale, plus clear remediation steps.
• A short hand-over call to walk my dev and ops teams through the findings.

If you thrive on rooting out hidden flaws while respecting strict legal and operational boundaries, let’s get started.

Location & Details

SourceFreelancer
Budget$1500–$12500 USD
LocationRemote
Posted2026-05-19 14:29:57
Web SecurityComputer SecurityNetwork AdministrationInternet SecurityPenetration TestingNetwork SecurityRisk AssessmentData Protection
Apply on source →

About this listing

This remote opportunity was imported from Freelancer and is shown here for discovery. To apply, follow the link to the original posting.

Skills mentioned:
Web SecurityComputer SecurityNetwork AdministrationInternet SecurityPenetration TestingNetwork SecurityRisk AssessmentData Protection