Naresh Singh : Freelance Ethical Hacker

Naresh Singh

I am a CEH 7 Certified Ethical Hacker from India with over 5 years of experience. 

I am looking for freelance assignments that I can work on remotely. Let me know if you have any projects for an offshore Ethical Hacker/Penetration Tester. 

My rate is $25-40 per hr. but it all depends upon the type of assignments. I am also open to work on a per project basis. 
My detailed profile is outlined below. 

Overview 

• Performance and security monitoring 
• Security investigations 
• Disaster recovery planning and testing 
• Design and develop an encryption key escrow service 
• Design and develop a log indexing and correlation system 
• Performance and security monitoring 
• AIX and Linux administration 
• Oracle database administration 
• Maintaining central user administration system 
• Develop service and host monitoring system 
• HPUX administration 

Skill Set 

• Visualization. 
• Digital Reconnaissance & Reverse Engineering. 
• Social Engineering. 
• Kali Linux. 
• Offensive Security. 
• Cryptography (Windows/ Linux/ IOS/WiFi/WiMax) – Cracking passwords with • Metasploit/ MITM attack etc... 
• Vulnerability Scanning & Reporting on Servers/ Workstations/ Networks. 
• Installing IDS/IPS. 
• Installing Copper/Fiber/WiFi/ WiMax networks. 
• Setting up Honey Pots for potential hackers. 
• Analysis & reporting data traffic on Servers/Workstations. 
• Analysis & reporting on existing Firewall/Access Points. 
• Web Application vulnerability scanning & patching. 
• Create a virtual test environment for existing staff to evaluate the level of 
awareness on data security. 
• Scanning & reporting for Trojans, Backdoors, Worms, Root Kits, and DoS etc 
• Testing networks for latency & providing preferential treatment to critical data. 

Experience Snapshot: 

Oracle Database Administration 
Create and maintain multiple Oracle databases on Unix systems 
Develop and implement Oracle backup and recovery procedures 
Develop, implement and monitor data load procedures 
Implement multiple Oracle upgrades and migrations. 

Experience with Network Services 
DNS Administration 
Develop Web Based IP/DNS Administration tool 
Renumber an IP Network and install firewalls 
Familiar with IP Network Protocols and Network General Sniffers 
Experience with Ethernet, FDDI, Fiber, WiFi, WiMax and Serial network devices 
Administer Cabletron's Spectrum SNMP management software 

Network Security Profile Overview. 
Investigate network security with Kali Linux. 
Analyze compromised machines to provide explanation of break-in process. 
Perform ethical hacking to demonstrate security vulnerabilities 
Investigate email threats, fraudulent emails and copyright violations 
Research in-progress attacks by use of network sniffers & honeypots. 
Analyze pre-production systems for security vulnerabilities. 
Install and maintain multiple Firewalls. 

Systems Administration on AIX, Linux and HP-UX Systems 
Sendmail, DNS, NFS, Filesystems and User Administration 

Development and Implementation of a Multi-Platform Client/Server User Administration System 
Oracle server utilizing PL/SQL stored procedures and functions 
Clients using Java/JDBC, C, ksh, Perl and VB with Active Directory 
Integrated clients on AIX, NT/Win95/Win2000/XP, LDAP and other systems 
Sendmail, DNS, NFS, Filesystems and User Administration 

Configuring Sendmail and POP services 
Sendmail configurations on AIX and HP-UX 
POP3: Installation, performance analysis and monitoring 
Anit-spam relay solutions in Sendmail 
Developing connection rejection ability to combat mail abuse 
Integrated Dynamic Relay Authentication Control with POP and Sendmail 

Personal Areas of Interest 

Kali Linux. 
Reverse Engineering. 
Cryptography. 

Contact:  nareshceh@gmail.com

LinkedIn:  http://http://ow.ly/OVxvY

 

 

« Next World War - First, Cyberwar. Second, Shooting War
FBI Alert: CryptoWall Ransomware Damage $18 Million »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

JLT Specialty

JLT Specialty

JLT Specialty is a leading specialist insurance broker. Services offered include Cyber Risks insurance.

AdNovum Informatik

AdNovum Informatik

AdNovum Informatik provides a full set of IT services, ranging from consulting, the conception and implementation of customized business and security solutions to maintenance and support.

KZ-CERT

KZ-CERT

KZ-CERT is the national Computer Emergency Response Team for Kazakhstan.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

ThreadStone Cyber Security

ThreadStone Cyber Security

ThreadStone Cyber Security offer reliable, practical and affordable cyber security solutions for both large and smaller organizations that we develop and deliver ourselves from Europe.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.