Naresh Singh : Freelance Ethical Hacker

Naresh Singh

I am a CEH 7 Certified Ethical Hacker from India with over 5 years of experience. 

I am looking for freelance assignments that I can work on remotely. Let me know if you have any projects for an offshore Ethical Hacker/Penetration Tester. 

My rate is $25-40 per hr. but it all depends upon the type of assignments. I am also open to work on a per project basis. 
My detailed profile is outlined below. 

Overview 

• Performance and security monitoring 
• Security investigations 
• Disaster recovery planning and testing 
• Design and develop an encryption key escrow service 
• Design and develop a log indexing and correlation system 
• Performance and security monitoring 
• AIX and Linux administration 
• Oracle database administration 
• Maintaining central user administration system 
• Develop service and host monitoring system 
• HPUX administration 

Skill Set 

• Visualization. 
• Digital Reconnaissance & Reverse Engineering. 
• Social Engineering. 
• Kali Linux. 
• Offensive Security. 
• Cryptography (Windows/ Linux/ IOS/WiFi/WiMax) – Cracking passwords with • Metasploit/ MITM attack etc... 
• Vulnerability Scanning & Reporting on Servers/ Workstations/ Networks. 
• Installing IDS/IPS. 
• Installing Copper/Fiber/WiFi/ WiMax networks. 
• Setting up Honey Pots for potential hackers. 
• Analysis & reporting data traffic on Servers/Workstations. 
• Analysis & reporting on existing Firewall/Access Points. 
• Web Application vulnerability scanning & patching. 
• Create a virtual test environment for existing staff to evaluate the level of 
awareness on data security. 
• Scanning & reporting for Trojans, Backdoors, Worms, Root Kits, and DoS etc 
• Testing networks for latency & providing preferential treatment to critical data. 

Experience Snapshot: 

Oracle Database Administration 
Create and maintain multiple Oracle databases on Unix systems 
Develop and implement Oracle backup and recovery procedures 
Develop, implement and monitor data load procedures 
Implement multiple Oracle upgrades and migrations. 

Experience with Network Services 
DNS Administration 
Develop Web Based IP/DNS Administration tool 
Renumber an IP Network and install firewalls 
Familiar with IP Network Protocols and Network General Sniffers 
Experience with Ethernet, FDDI, Fiber, WiFi, WiMax and Serial network devices 
Administer Cabletron's Spectrum SNMP management software 

Network Security Profile Overview. 
Investigate network security with Kali Linux. 
Analyze compromised machines to provide explanation of break-in process. 
Perform ethical hacking to demonstrate security vulnerabilities 
Investigate email threats, fraudulent emails and copyright violations 
Research in-progress attacks by use of network sniffers & honeypots. 
Analyze pre-production systems for security vulnerabilities. 
Install and maintain multiple Firewalls. 

Systems Administration on AIX, Linux and HP-UX Systems 
Sendmail, DNS, NFS, Filesystems and User Administration 

Development and Implementation of a Multi-Platform Client/Server User Administration System 
Oracle server utilizing PL/SQL stored procedures and functions 
Clients using Java/JDBC, C, ksh, Perl and VB with Active Directory 
Integrated clients on AIX, NT/Win95/Win2000/XP, LDAP and other systems 
Sendmail, DNS, NFS, Filesystems and User Administration 

Configuring Sendmail and POP services 
Sendmail configurations on AIX and HP-UX 
POP3: Installation, performance analysis and monitoring 
Anit-spam relay solutions in Sendmail 
Developing connection rejection ability to combat mail abuse 
Integrated Dynamic Relay Authentication Control with POP and Sendmail 

Personal Areas of Interest 

Kali Linux. 
Reverse Engineering. 
Cryptography. 

Contact:  nareshceh@gmail.com

LinkedIn:  http://http://ow.ly/OVxvY

 

 

« Next World War - First, Cyberwar. Second, Shooting War
FBI Alert: CryptoWall Ransomware Damage $18 Million »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Watchcom Security Group

Watchcom Security Group

Watchcom is one of Norway's foremost suppliers of information security consultancy services.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Alyne

Alyne

Alyne is a Munich based 2B RegTech offering organisations risk insight capabilities through a Software as a Service.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

Rezonate

Rezonate

Rezonate discovers, profiles, and protects Identities and their entire access journey to cloud infrastructure and critical SaaS applications. Preventing and stopping cyberattacks.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

KnoTra Global

KnoTra Global

KnoTra Global is a next-generation Managed Service provider with a portfolio of services including Cybersecurity Solutions, Network Management, IT Leadership, and Day-to-Day Helpdesk and IT services.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.

Tausight

Tausight

Tausight is an AI-Powered patient data security startup with a mission of reducing healthcare cyber incidents using a more proactive, risk management philosophy.

Early Game Ventures (EGV)

Early Game Ventures (EGV)

Early Game Ventures invests in startups that jumpstart new industries in the emerging markets of Europe.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.

CoGuard

CoGuard

CoGuard is a patented solution that uses AI driven automation to provide fast, cost effective white-box penetration testing, infrastructure audits and infrastructure design services.