Naresh Singh : Freelance Ethical Hacker

Naresh Singh

I am a CEH 7 Certified Ethical Hacker from India with over 5 years of experience. 

I am looking for freelance assignments that I can work on remotely. Let me know if you have any projects for an offshore Ethical Hacker/Penetration Tester. 

My rate is $25-40 per hr. but it all depends upon the type of assignments. I am also open to work on a per project basis. 
My detailed profile is outlined below. 

Overview 

• Performance and security monitoring 
• Security investigations 
• Disaster recovery planning and testing 
• Design and develop an encryption key escrow service 
• Design and develop a log indexing and correlation system 
• Performance and security monitoring 
• AIX and Linux administration 
• Oracle database administration 
• Maintaining central user administration system 
• Develop service and host monitoring system 
• HPUX administration 

Skill Set 

• Visualization. 
• Digital Reconnaissance & Reverse Engineering. 
• Social Engineering. 
• Kali Linux. 
• Offensive Security. 
• Cryptography (Windows/ Linux/ IOS/WiFi/WiMax) – Cracking passwords with • Metasploit/ MITM attack etc... 
• Vulnerability Scanning & Reporting on Servers/ Workstations/ Networks. 
• Installing IDS/IPS. 
• Installing Copper/Fiber/WiFi/ WiMax networks. 
• Setting up Honey Pots for potential hackers. 
• Analysis & reporting data traffic on Servers/Workstations. 
• Analysis & reporting on existing Firewall/Access Points. 
• Web Application vulnerability scanning & patching. 
• Create a virtual test environment for existing staff to evaluate the level of 
awareness on data security. 
• Scanning & reporting for Trojans, Backdoors, Worms, Root Kits, and DoS etc 
• Testing networks for latency & providing preferential treatment to critical data. 

Experience Snapshot: 

Oracle Database Administration 
Create and maintain multiple Oracle databases on Unix systems 
Develop and implement Oracle backup and recovery procedures 
Develop, implement and monitor data load procedures 
Implement multiple Oracle upgrades and migrations. 

Experience with Network Services 
DNS Administration 
Develop Web Based IP/DNS Administration tool 
Renumber an IP Network and install firewalls 
Familiar with IP Network Protocols and Network General Sniffers 
Experience with Ethernet, FDDI, Fiber, WiFi, WiMax and Serial network devices 
Administer Cabletron's Spectrum SNMP management software 

Network Security Profile Overview. 
Investigate network security with Kali Linux. 
Analyze compromised machines to provide explanation of break-in process. 
Perform ethical hacking to demonstrate security vulnerabilities 
Investigate email threats, fraudulent emails and copyright violations 
Research in-progress attacks by use of network sniffers & honeypots. 
Analyze pre-production systems for security vulnerabilities. 
Install and maintain multiple Firewalls. 

Systems Administration on AIX, Linux and HP-UX Systems 
Sendmail, DNS, NFS, Filesystems and User Administration 

Development and Implementation of a Multi-Platform Client/Server User Administration System 
Oracle server utilizing PL/SQL stored procedures and functions 
Clients using Java/JDBC, C, ksh, Perl and VB with Active Directory 
Integrated clients on AIX, NT/Win95/Win2000/XP, LDAP and other systems 
Sendmail, DNS, NFS, Filesystems and User Administration 

Configuring Sendmail and POP services 
Sendmail configurations on AIX and HP-UX 
POP3: Installation, performance analysis and monitoring 
Anit-spam relay solutions in Sendmail 
Developing connection rejection ability to combat mail abuse 
Integrated Dynamic Relay Authentication Control with POP and Sendmail 

Personal Areas of Interest 

Kali Linux. 
Reverse Engineering. 
Cryptography. 

Contact:  nareshceh@gmail.com

LinkedIn:  http://http://ow.ly/OVxvY

 

 

« Next World War - First, Cyberwar. Second, Shooting War
FBI Alert: CryptoWall Ransomware Damage $18 Million »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

Coalfire

Coalfire

Coalfire specialises in cyber risk management and compliance. Our services span the cybersecurity lifecycle from advisory and compliance, to testing and engineering, monitoring and optimization.

Radisys

Radisys

Radisys offers software, products, integrated systems, and professional services for communication service providers and telecom solution vendors.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Mantix4

Mantix4

Mantix4’s M4 Cyber Threat Hunting Platform actively defends against cyber threats.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

Police Digital Security Centre (PDSC)

Police Digital Security Centre (PDSC)

PDSC is a not-for-profit organisation, owned by the police, that works across the UK in partnership with industry, government, academia and law enforcement.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.

RELIANOID

RELIANOID

RELIANOID is an application delivery controller and load balancing system that ensures high performance and security of IT services on a massive scale.

Instil Software

Instil Software

Instil helps technology brands transform, innovate and disrupt their markets with category-defining software products that challenge us to think, feel and act in new ways.

Virtual Cyber Labs

Virtual Cyber Labs

Virtual Cyber Labs is a 21st generation Cybersecurity Edu-Tech company that offers an all-in-one hub including custom syllabus and labs.