Ethical Hacker for Vulnerability Assessment
Краткое
Freelancer Client is hiring: Ethical Hacker for Vulnerability Assessment.
Location: Remote
I need a seasoned ethical hacker to uncover and clearly document every security weakness lurking in our mobile applications and the underlying network infrastructure. You will have formal authorisation to test, but there are a few boundaries: production customer data is off-limits and any denial-of-service style traffic must be kept to agreed-upon off-peak windows. Everything else inside the defined scope is fair game.
During the engagement you are free to use the tools you prefer—Burp Suite, OWASP ZAP, Metasploit, Wireshark, custom scripts—so long as the final results are reproducible.
A concise executive summary followed by a detailed technical report for both the mobile apps and network layers.
Proof-of-concept evidence (screenshots, request/response logs, exploit code where relevant).
Risk ratings that map to CVSS or a similar industry scale, plus clear remediation steps.
Skills: Web Security, Computer Security, Network Administration, Internet Security, Penetration Testing, Network Security, Risk Assessment, Data Protection
Budget: $1500–$12500 USD
Source: Freelancer Client via Remote / Online. Apply on the source website.
Оригинал
I need a seasoned ethical hacker to uncover and clearly document every security weakness lurking in our mobile applications and the underlying network infrastructure. You will have formal authorisation to test, but there are a few boundaries: production customer data is off-limits and any denial-of-service style traffic must be kept to agreed-upon off-peak windows. Everything else inside the defined scope is fair game.
During the engagement you are free to use the tools you prefer—Burp Suite, OWASP ZAP, Metasploit, Wireshark, custom scripts—so long as the final results are reproducible.
Deliverables
• A concise executive summary followed by a detailed technical report for both the mobile apps and network layers.
• Proof-of-concept evidence (screenshots, request/response logs, exploit code where relevant).
• Risk ratings that map to CVSS or a similar industry scale, plus clear remediation steps.
• A short hand-over call to walk my dev and ops teams through the findings.
If you thrive on rooting out hidden flaws while respecting strict legal and operational boundaries, let’s get started.
Локация & Details
Перейти к источнику →About this listing
This remote opportunity was imported from Freelancer and is shown here for discovery. To apply, follow the link to the original posting.