Naresh Singh : Freelance Ethical Hacker

Naresh Singh

I am a CEH 7 Certified Ethical Hacker from India with over 5 years of experience. 

I am looking for freelance assignments that I can work on remotely. Let me know if you have any projects for an offshore Ethical Hacker/Penetration Tester. 

My rate is $25-40 per hr. but it all depends upon the type of assignments. I am also open to work on a per project basis. 
My detailed profile is outlined below. 

Overview 

• Performance and security monitoring 
• Security investigations 
• Disaster recovery planning and testing 
• Design and develop an encryption key escrow service 
• Design and develop a log indexing and correlation system 
• Performance and security monitoring 
• AIX and Linux administration 
• Oracle database administration 
• Maintaining central user administration system 
• Develop service and host monitoring system 
• HPUX administration 

Skill Set 

• Visualization. 
• Digital Reconnaissance & Reverse Engineering. 
• Social Engineering. 
• Kali Linux. 
• Offensive Security. 
• Cryptography (Windows/ Linux/ IOS/WiFi/WiMax) – Cracking passwords with • Metasploit/ MITM attack etc... 
• Vulnerability Scanning & Reporting on Servers/ Workstations/ Networks. 
• Installing IDS/IPS. 
• Installing Copper/Fiber/WiFi/ WiMax networks. 
• Setting up Honey Pots for potential hackers. 
• Analysis & reporting data traffic on Servers/Workstations. 
• Analysis & reporting on existing Firewall/Access Points. 
• Web Application vulnerability scanning & patching. 
• Create a virtual test environment for existing staff to evaluate the level of 
awareness on data security. 
• Scanning & reporting for Trojans, Backdoors, Worms, Root Kits, and DoS etc 
• Testing networks for latency & providing preferential treatment to critical data. 

Experience Snapshot: 

Oracle Database Administration 
Create and maintain multiple Oracle databases on Unix systems 
Develop and implement Oracle backup and recovery procedures 
Develop, implement and monitor data load procedures 
Implement multiple Oracle upgrades and migrations. 

Experience with Network Services 
DNS Administration 
Develop Web Based IP/DNS Administration tool 
Renumber an IP Network and install firewalls 
Familiar with IP Network Protocols and Network General Sniffers 
Experience with Ethernet, FDDI, Fiber, WiFi, WiMax and Serial network devices 
Administer Cabletron's Spectrum SNMP management software 

Network Security Profile Overview. 
Investigate network security with Kali Linux. 
Analyze compromised machines to provide explanation of break-in process. 
Perform ethical hacking to demonstrate security vulnerabilities 
Investigate email threats, fraudulent emails and copyright violations 
Research in-progress attacks by use of network sniffers & honeypots. 
Analyze pre-production systems for security vulnerabilities. 
Install and maintain multiple Firewalls. 

Systems Administration on AIX, Linux and HP-UX Systems 
Sendmail, DNS, NFS, Filesystems and User Administration 

Development and Implementation of a Multi-Platform Client/Server User Administration System 
Oracle server utilizing PL/SQL stored procedures and functions 
Clients using Java/JDBC, C, ksh, Perl and VB with Active Directory 
Integrated clients on AIX, NT/Win95/Win2000/XP, LDAP and other systems 
Sendmail, DNS, NFS, Filesystems and User Administration 

Configuring Sendmail and POP services 
Sendmail configurations on AIX and HP-UX 
POP3: Installation, performance analysis and monitoring 
Anit-spam relay solutions in Sendmail 
Developing connection rejection ability to combat mail abuse 
Integrated Dynamic Relay Authentication Control with POP and Sendmail 

Personal Areas of Interest 

Kali Linux. 
Reverse Engineering. 
Cryptography. 

Contact:  nareshceh@gmail.com

LinkedIn:  http://http://ow.ly/OVxvY

 

 

« Next World War - First, Cyberwar. Second, Shooting War
FBI Alert: CryptoWall Ransomware Damage $18 Million »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Nullcon

Nullcon

Nullcon provides an integrated platform for exchanging information on the latest attack vectors, zero-day vulnerabilities and unknown threats.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Pioneer Search

Pioneer Search

Pioneer Search is a UK based Technology & Change, Electronics Engineering, Cyber Security & Cloud and Data & Analytics Employment Agency.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

Illuma Labs

Illuma Labs

Illuma Labs delivers real-time voice authentication and fraud prevention solutions.

FDD Center on Cyber and Technology Innovation (CCTI)

FDD Center on Cyber and Technology Innovation (CCTI)

The Foundation for Defense of Democracies is a nonprofit research institute focusing on foreign policy and national security. Ares of focus include cyber security and technology innovation.

Seadot Cybersecurity

Seadot Cybersecurity

Seadot offer cybersecurity services to organizations with a high demand for regulatory compliance and security.

Tactic Labs

Tactic Labs

Tactic Labs (part of the Avnon Group) delivers a holistic Cyber-Security Management Platform which provides military-grade protection, safeguarding critical infrastructures and mission-critical data.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Cyberplc

Cyberplc

Cyberplc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.