Naresh Singh : Freelance Ethical Hacker

Naresh Singh

I am a CEH 7 Certified Ethical Hacker from India with over 5 years of experience. 

I am looking for freelance assignments that I can work on remotely. Let me know if you have any projects for an offshore Ethical Hacker/Penetration Tester. 

My rate is $25-40 per hr. but it all depends upon the type of assignments. I am also open to work on a per project basis. 
My detailed profile is outlined below. 

Overview 

• Performance and security monitoring 
• Security investigations 
• Disaster recovery planning and testing 
• Design and develop an encryption key escrow service 
• Design and develop a log indexing and correlation system 
• Performance and security monitoring 
• AIX and Linux administration 
• Oracle database administration 
• Maintaining central user administration system 
• Develop service and host monitoring system 
• HPUX administration 

Skill Set 

• Visualization. 
• Digital Reconnaissance & Reverse Engineering. 
• Social Engineering. 
• Kali Linux. 
• Offensive Security. 
• Cryptography (Windows/ Linux/ IOS/WiFi/WiMax) – Cracking passwords with • Metasploit/ MITM attack etc... 
• Vulnerability Scanning & Reporting on Servers/ Workstations/ Networks. 
• Installing IDS/IPS. 
• Installing Copper/Fiber/WiFi/ WiMax networks. 
• Setting up Honey Pots for potential hackers. 
• Analysis & reporting data traffic on Servers/Workstations. 
• Analysis & reporting on existing Firewall/Access Points. 
• Web Application vulnerability scanning & patching. 
• Create a virtual test environment for existing staff to evaluate the level of 
awareness on data security. 
• Scanning & reporting for Trojans, Backdoors, Worms, Root Kits, and DoS etc 
• Testing networks for latency & providing preferential treatment to critical data. 

Experience Snapshot: 

Oracle Database Administration 
Create and maintain multiple Oracle databases on Unix systems 
Develop and implement Oracle backup and recovery procedures 
Develop, implement and monitor data load procedures 
Implement multiple Oracle upgrades and migrations. 

Experience with Network Services 
DNS Administration 
Develop Web Based IP/DNS Administration tool 
Renumber an IP Network and install firewalls 
Familiar with IP Network Protocols and Network General Sniffers 
Experience with Ethernet, FDDI, Fiber, WiFi, WiMax and Serial network devices 
Administer Cabletron's Spectrum SNMP management software 

Network Security Profile Overview. 
Investigate network security with Kali Linux. 
Analyze compromised machines to provide explanation of break-in process. 
Perform ethical hacking to demonstrate security vulnerabilities 
Investigate email threats, fraudulent emails and copyright violations 
Research in-progress attacks by use of network sniffers & honeypots. 
Analyze pre-production systems for security vulnerabilities. 
Install and maintain multiple Firewalls. 

Systems Administration on AIX, Linux and HP-UX Systems 
Sendmail, DNS, NFS, Filesystems and User Administration 

Development and Implementation of a Multi-Platform Client/Server User Administration System 
Oracle server utilizing PL/SQL stored procedures and functions 
Clients using Java/JDBC, C, ksh, Perl and VB with Active Directory 
Integrated clients on AIX, NT/Win95/Win2000/XP, LDAP and other systems 
Sendmail, DNS, NFS, Filesystems and User Administration 

Configuring Sendmail and POP services 
Sendmail configurations on AIX and HP-UX 
POP3: Installation, performance analysis and monitoring 
Anit-spam relay solutions in Sendmail 
Developing connection rejection ability to combat mail abuse 
Integrated Dynamic Relay Authentication Control with POP and Sendmail 

Personal Areas of Interest 

Kali Linux. 
Reverse Engineering. 
Cryptography. 

Contact:  nareshceh@gmail.com

LinkedIn:  http://http://ow.ly/OVxvY

 

 

« Next World War - First, Cyberwar. Second, Shooting War
FBI Alert: CryptoWall Ransomware Damage $18 Million »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

SANS CyberStart

SANS CyberStart

SANS CyberStart is a unique and innovative suite of tools and games designed to introduce children and young adults to the field of cyber security.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.

New Relic

New Relic

After inventing application performance monitoring (APM), New Relic stands at the forefront of observability with the most advanced platform for eliminating digital interruptions.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.