Foto de capa do perfil
Você está agora seguindo
Erro seguindo usuário.
Esse usuários não permite que o sigam.
Você já está seguindo esse usuário.
Seu plano permite apenas 0 seguidas. Aprimore-o aqui.
Deixou de seguir com sucesso
Ocorreu um erro ao deixar de seguir o usuário.
Você recomendou com sucesso
Ocorreu um erro ao recomendar o usuário.
Algo deu errado. Por favor, atualize a página e tente novamente.
E-mail verificado com sucesso
Avatar do Usuário
$40 USD / hora
Bandeira do(a) BANGLADESH
kishoreganj, bangladesh
$40 USD / hora
Atualmente, está 6:54 PM aqui
Ingressou em abril 22, 2012
1 Recomendação

Delwar A.

@delwaralam

monthly-level-two.svg
verified.svg
4,8 (14 avaliações)
5,2
5,2
89%
89%
$40 USD / hora
Bandeira do(a) BANGLADESH
kishoreganj, bangladesh
$40 USD / hora
86%
Trabalhos Concluídos
96%
Dentro do Orçamento
92%
No Prazo
8%
Taxa de Recontratação

Cyber Security and Penetration Testing Expert

I am a Cyber and information security expert. I invest my time and skills to help people protect their business from Cybercriminals. Specialties/ 10-years experience: Information Security and Assurance, Vulnerability Assessment, Cyber Security, Penetration Testing, IT security, Cyber Security Consultant, API Security, Mobile Application Security, Source Code Audit, Web Server Pen-testing. I started my journey in the information security domain in 2010. I have a team to collaborate with on different Cyber Security projects. My base programming skills are in PHP and Python. I am a highly-skilled framework of PHP especially Laravel, Codeigniter, and vastly experienced in Django. As a developer, I have both experienced in frontend and backend. I can manage Database MySql and MongoDB. I have worked as System Admin/ Network Administration so many years.

Contate Delwar A. sobre seu trabalho

Faça login para discutir quaisquer detalhes via chat.

Portfólio

5129297
5129290
5129279
5129251
5129243
5129297
5129290
5129279
5129251
5129243

Avaliações

Mudanças salvas
Mostrando 1 - 5 de 14 avaliações
Filtrar avaliações por:
5,0
$270,00 USD
One of the best freelancers over here. Will continue working with him. Thanks!!
Linux
Web Security
Penetration Testing
Network Security
+1 mais
A
Bandeira do(a) Ankit S.
@ankitsureka2012
•
há 2 anos
0,0
₹1.300,00 INR
The project is not completed according to the dispute
Web Security
Computer Security
Software Testing
Network Administration
Avatar do Usuário
Bandeira do(a) Sudheer K.
@sudheerkumar90
•
há 2 anos
5,0
$1.375,00 USD
Great work. Will hire him again
Web Security
Computer Security
Research Writing
Network Administration
Internet Security
A
Bandeira do(a) Ankit S.
@ankitsureka2012
•
há 2 anos
5,0
€90,00 EUR
Excellent work done by the seller. I nevertheless found him to be extremely responsive, highly professional, and immensely intelligent in the field of IT and cyber security. He provided excellent 5-star service and delivered an excellent report. Very smooth experience and good communication. He is highly recommended and you should not hesitate to use his 1st class service.
Banner Design
Blog
Blackberry
Article Writing
Blog Design
+1 mais
F
Bandeira do(a) Md.Fakrul Abedin B.
@fakrulabedin79
•
há 2 anos
2,0
$150,00 CAD
Although Delwar did some of the things I asked he didn't do all of them. I even had to google some examples to send to him so he understood what I wanted done. He told me during the review process that he was an expert in security. An expert would know what needs to be done to secure a form from hackers and spammers without help from me. He also told me he had a good grasp of the English language yet he stated he didn't understand what I wanted numerous times. I will now have to seek more help
N
Closed User
@nootkan
•
há 3 anos

Experiência

Cyber Security Specialist

BugsBD limited
ago. 2016 - Atual
Cyber Security research, Pentester

Educação

BSc in software engineering

Daffodil International University, Bangladesh 2010 - 2014
(4 anos)

Qualificações

CISM (Certified Information Security Manager)

ISACA
2022
CISM (Certified Information Security Manager)

Certified Information Systems Auditor® (CISA®)

ISACA
2022
Certified Information Systems Auditor® (CISA®)

Certified Ethical Hacker

EC-Council
2019
Certified Ethical Hacker is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems

Publicações

Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF

2016 Sixth International Conference on Digital Information and Communication Technology and its
In a sophisticated and coordinated cyber-attack $100 million has been stolen from Bangladesh's account. At­tackers introduced malicious code remotely into the Bangladesh Bank's server, which allowed them to process and authorize the transactions. Advanced attack techniques poses threats to all web application systems. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF)

A Study of the Effects of Heartbleed Vulnerability in Bangladesh

The Fourth International Conference on Computer Science
One of the most critical and talked about Open Secure Socket Layer (SSL) and Transport Layer Security (TLS) threats is Heartbleed vulnerability. This vulnerability affects the " Heartbeat protocol " of the open SSL library. HeartBleed manipulates the Heartbeat protocol to get access and read the memory of the vulnerable web servers. OpenSSL is used in HTTPS for internet security.

Study of the Dirty Copy On Write, A Linux Kernel Memory Allocation Vulnerability

EasyChair for CEEIT 2017
Dirty Copy On Write also known as Dirty COW is a Linux based server vulnerability. This vulnerability allows attackers to escalate the file system protection of Linux Kernel, get root privilege and thus compromise the whole system. Linux kernel version 2.6.22 and higher are affected by this vulnerability. The patch for this vulnerability has been released very recently.

Study of Race Condition: A Privilege Escalation Vulnerability

WMSCI 2017 Secretariat
The Race condition is a privilege vulnerability that manipulates the small window of time between appliance of a security control and use of services in a system. This vulnerability is a result of interferences caused by multiple threads running in the system and sharing the same resources. These processes might include trusted process such as operating system files and un-trusted processes.

Contate Delwar A. sobre seu trabalho

Faça login para discutir quaisquer detalhes via chat.

Verificações

Freelancer Preferencial
Identidade Verificada
Pagamento Verificado
Telefone Verificado
E-mail Verificado
Conectado ao Facebook

Certificações

preferredfreelancer-1.png Preferred Freelancer Program SLA 1 89%
us_eng_1.png US English 1 77%
Usuário Anterior Usuário Seguinte
Convite enviado com sucesso!
Obrigado! Te enviamos um link por e-mail para que você possa reivindicar seu crédito gratuito.
Algo deu errado ao enviar seu e-mail. Por favor, tente novamente.
Usuários Registrados Total de Trabalhos Publicados
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Carregando pré-visualização
Permissão concedida para Geolocalização.
Sua sessão expirou e você foi desconectado. Por favor, faça login novamente.