27 Best Freelance Hackers For Hire In November 2020 - Upwork™

Hire the best
Hackers
Upwork is how.
verified

Upwork has the largest pool of proven, remote Hackers. Don’t believe us? Check out some of our top rated Hackers below.

Get Started
Client reviews Clients rate Hackers

4.8 / 5

based on 1,197 clients reviews

Md A.
$55/hr
Hacking
Secure SDLC
Network Security
Security Analysis
Network Pentesting
Penetration Testing
Security Engineering
Application Security
Security Infrastructure
Vulnerability Assessment

EC- Council Security Analyst Certified Software Security Engineer with a larger focus on Security testing. Able to do vulnerability assessments, penetration testing, threat modeling, OWASP top 10 vulnerability assessment, cryptography, Network Security Testing, code analytics etc. as far as system and software system security is the concern. Security Tool Expertise - Tenable IO, Nessus cloud, Acunetix, Vega, OWASP ZAP, Burp Suite, Havij, KALI Linux (OS), App Vigil, Sentinel, Sqlmap, CodeDx, Kiuwan, Spiderfoot, Arachni, Social Engineering Toolkit, Metasploit, Armitage, Cobalt Strike, Netcat, Wireshark. Datasploit plus many more. Expert In...

Dorian D.
$125/hr
Hacking
Network Security
Security Analysis
Internet Security
Penetration Testing
Security Infrastructure
Web Application Security

Over 20 years of security experience, the last of which were spent leading a penetration testing team for a large internet provider. I'm interested mostly in penetration testing and vulnerability analysis, but am always open to other interesting opportunities in the security field. Penetration tests and vulnerability assessments are ways to see what your site looks like to an attacker. A vulnerability assessment typically involves more reliance on automated tools and the manual portion of the assessment is spent verifying the more important findings. A penetration test includes the vulnerability assessment but much more manual effort is...

Salman R.
$40/hr
Hacking
Odoo
Python
Tutoring
Excel VBA
SQLAlchemy
Telegram API
Backup & Migration
Penetration Testing
Chatbot Development
Bash Shell Scripting

I am a Software Engineer and Developer with more than 15 years worth of experience. I have designed and built website back-ends, developed and supported several software applications, custom built and integrated chat bots, planned and conducted training for many teams involving various deployments, conducted software security testing and much, much more. On every project that I have worked on so far, I have ensured extensibility, efficiency and most importantly User/Client satisfaction. I am open to all kinds of challenges, big and small. Invite me now to augment your team. Rates will be negotiable and fair. Here's a list of my top...

Md. S.
$40/hr
Hacking
CSS
HTML
Research
Kali Linux
JavaScript
Content Writing
Security Testing
Technical Writing
Technical Support
Penetration Testing

Greetings, my name is Romeo. I have a background in cyber security, software development and research writing. I have been working in the tech industry since 2017 as a Technical Assistant and Front-end Web developer. I graduated with a Hons. Degree in Information Technology with specialization in Information System Security, currently pursuing Master's degree in Cybersecurity. My education background gave me proper tools and skills to satisfy my client's demands with outmost quality. My skills ranges from various programming languages to information security, with a focus on Cybersecurity related skills. Originality in my work is...

James K.
$45/hr
Hacking
Office 365
Windows Server
Exchange Server
Microsoft Azure
Network Security
Network Pentesting
System Administration
Network Administration

Currently working in a full time position at a company that brings Fortune 500 solutions to small & medium size businesses. Experienced in network and system setups with specialization in network penetration testing.

Mariusz Z.
$65/hr
Hacking
C
Fuzzing
Security Analysis
WebApp Pentesting
Penetration Testing
Security Engineering
Security Infrastructure
Vulnerability Assessment
Web Application Security
Certified Information Systems Security Professional (CISSP)

Since 2014 I work professionally as a Pen Tester/Security Researcher. Between 2008-2013, prior switching full time to info sec, I've worked as a Programmer (C/C++, PHP, Java, node.js) and DevOps (AWS-based environments). Currently I work under my own brand (Z-Labs) delivering Penetration Testing / Adversary Simulation Exercises services to clients around the globe. I pride myself for: 1. Offering high quality penetration testing services conducted in safe and controlled manner by certified Security Expert (Since 2014 I'm CISSP, since 2016 I'm OSCP and since 2017 I hold SANS GXPN certification). 2. Putting emphasis on advanced manual...

Noman R.
$50/hr
Hacking
PHP
CPanel
WordPress
Network Security
Security Analysis
Internet Security
Internet Security
Penetration Testing
Vulnerability Assessment

The most trusted and Top-Rated Developer on Upwork having 10 years experience in the field of Ethical Hacking and Internet Security. During this time I have secured thousands of sites infected with malwares, backdoors/trojans, adwares, pharma hacks, JS file insertion and base64 encode etc. I can also do Penetration Testing and Vulnerability assessment on any of your Web Application, Mobile Application and Network as well. One of my research got featured in Popular UK Newspaper (The Register) www[.]theregister[.]com/2020/02/17/wordpress_profile_builder_v3_1_0_vuln/ Technical Writeup by WPScan...

Alex D.
$50/hr
Hacking
C#
Java
Splunk
Elasticsearch
Penetration Testing
Security Engineering
Application Security
Vulnerability Assessment
Web Application Security

My specializations: 1. Penetration testing or both network and web applications. Ethical hacking. 2. Cloud (AWS, Azure ) infrastructure complete vulnerability assessment, security & penetration testing with the recommendation for remediation 3. Malware, Phishing, Breach, data leakage detection. 4. Splunk/ElasticSearch for statistical analysis, dashboard creation & administration as well. 5. NET technology stack: C# ,ASP.NET MVC, WCF, WPF and WinForms. 6. Web projects on Python, Django, JS 7. Data security standards (HIPPA/HITRUST, PCI DSS, NIST, CSF) 6. Wordpress security enhancement Security Tool Expertise - Nessus cloud, Acunetix, OWASP...

Prasanna P.
$40/hr
Hacking
Python
Malware
Blockchain
Oracle PLSQL
SQL Programming
Technical Writing
Penetration Testing
Database Programming
Vulnerability Assessment

Key qualifications: * Information Security * Kali Linux * Metasploit and Wireshark * Penetration Testing using Kali * Internet of Things and Go * Programming, development and design Oracle sql, pl/sql * Database modeling and design * Oracle Database Administration 8i,9i,10g,11g * Oracle RAC 9i,10g,11g * Oracle Data Guard (installation and configuration) * Oracle Standby * Oracle ODI * Oracle OWB * Oracle Forms/Reports All Versions * Oracle data warehousing design, and implementation * Oracle Business Intelligence 10g, 11g * Weblogic * Kali Linux * Oracle Discoverer * Oracle Apex design and development * C, C++ * PHP * MYSQL * php,...

Luca F.
$50/hr
Hacking
Network Security
Security Analysis
Penetration Testing
Application Security
Security Infrastructure
Vulnerability Assessment
Web Application Security
Information Security Audit
Linux System Administration

Hi all, I am an experienced IT security specialist with over 5 years of experience and I am Certified Ethical Hacker (CEHv9). My core competency is Security Assessment and Penetration Test. My job is to increase the security of all your IT resources and help you to find corrective solutions to protect your business. My specialties are: - Web application Penetration testing - Mobile Application Penetration testing - Network Penetration Testing - Security Audit - Vulnerability Assessment - Dynamic code analysis If you are looking for a Cyber Security Enthusiast feel free to click the green "Invite" or "Hire now" button at the top of the...

Mark W.
$75/hr
Hacking
Policy Writing
Microsoft Azure
Security Analysis
Policy Development
Penetration Testing
Amazon Web Services
Vulnerability Assessment
Cloud Security Framework
Web Application Security

Hello, my name is Mark and if you are reading this, you are reading the profile of the highest qualified Cyber Security Consultant and Penetration Tester who is also a native English speaker on UpWork.com. Trust me on this, I've done the SWOT Analysis. What am I selling and what are you buying? The answer is simple, Credibility. If you want to be able to demonstrate that your company has credible IT Security, you need Me to supply it to you. The main servcices I provide are an IT Security Policy creation service and Web Application Security Testing and Reporting. Now would be a good time to advise you to look at the most suitable...

Robert H.
$120/hr
Hacking
Network Security
Wireless Security
Penetration Testing
Amazon Web Services
Certified Information Systems Security Professional (CISSP)

I have 5 years experience performing information security services for U.S. Government entities and numerous Fortune 100 companies. This experience ranges from Full-Stack Software Development, Information Assurance, and Penetration Testing. I posess multiple industry-leading certifications such as the Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), and Ceritifed Information Systems Security Professional (CISSP). I can provide clients a range of penetration testing services that include, but are not limited to: Web Applications, Perimeter Network Environments, Internal Network Environments, and Source Code...

Adam M.
$125/hr
Hacking
Python
Network Security
Software Testing
Computer Science
Security Analysis
Internet Security
Network Pentesting
Penetration Testing
Vulnerability Assessment
Certified Information Systems Security Professional (CISSP)

A fifteen year cyber security professional, with network and analytical experience in the public and private sector, both foreign and U.S. domestic. An experienced team leader with experience managing highly skilled and technical teams of up to 25 individuals in fast paced and demanding environments. A confident public speaker with numerous high level presentations given to large groups, civilian senior leadership, and high-ranking military officials. Has Masters of Science in Information Technology and an emphasis in Software Engineering, a bachelor's degree in Computer Science, and OSCP and CISSP certifications.

Lukas W.
$220/hr
Hacking
OWASP
Network Security
Internet Security
WebApp Pentesting
Black Box Testing
Network Pentesting
Penetration Testing
Security Engineering

As an expert penetration tester and cybersecurity researcher, I have a deep understanding of the end-to-end security process to ensure all vulnerabilities are identified. My experience testing web applications, databases, systems, and networks come from my background as a Penetration Tester for Cisco Systems, the world’s leading network, and IT provider, and founding Pensive Security, a cybersecurity advising firm. I hold several cybersecurity certifications including: ► Offensive Security Certified Expert (OSCE) ► Offensive Security Certified Professional (OSCP) ► Certified Cloud Security Professional Associate (CCSP) In addition to...

Shahid M.
$40/hr
Hacking
ISO 27001
Risk Assessment
Risk Management
Network Security
Digital Forensics
Penetration Testing
Cyber Risk Management
Information Security Audit
Certified Information Systems Security Professional (CISSP)

I have more than 5-years of work experience in Cyber Security with an MS-degree in Information Security. I have worked in different roles and responsibilities during my career. My diverse work experience provided me an opportunity to become proficient in a wide range of skills and technologies. I have the ability to execute multiple projects simultaneously, allowing me to treat your project, either big or small, as a priority. I can deliver accurate and on-time results. I do provide services with expertise in the following areas: 1. Vulnerability Assessment & Penetration Testing (Website/Network) 2. Risk Management 3. Digital Forensics...

Marcus J.
$100/hr
Hacking
Ethical Hacking
WebApp Pentesting
Network Pentesting
Project Management
Penetration Testing
Vulnerability Assessment
Certified Information Systems Security Professional (CISSP)

NotTheFed is an IT security consulting company specializing in penetration testing. We also perform mobile app security testing, red team projects, phishing, and ethical hacking. NTF is a U.S. based company with 100% native English speakers. * Technical Lead / Lead Pentester: Bill Breen, CISSP ENCE CEH IAM CPT * Project Manager / Phishing Expert: Marcus Johnson, PMP CSM ITILv4 * Mobile Security Expert / iOS and Android: Rus Nesse We are seasoned and experienced security professionals, and look forward to working with you! We are a HIPAA Certified organization.

Yoan M.
$65/hr
Hacking
Ruby
Python
Network Security
Internet Security
WebApp Pentesting
Network Pentesting
Penetration Testing
Application Security
Information Security Audit

I discovered cybersecurity when I started my studies and it became a passion. I rapidly started learning stuff about cybersecurity by myself. I decided to pursue my studies in this area and I successfully obtained my master degree in 2018. At the time of this writing, I've been working as a professional consultant in penetration testing for a French company (Conix) for almost two years. I had the opportunity to work on real life penetration tests for various clients. I also spent a year within AXA France security team. My role was to plan their 2019 penetration test campaign. It involved, planning and doing many penetration tests as well...

Toma C.
$5/hr
Hacking
Security Analysis
Penetration Testing
Vulnerability Assessment

- Strong Nessus/Qualys vulnerability scanning knowledge - Good detail observation skills - Cryptocurrency enthusiast - Strong Microsoft Office knowledge(Excel best) - Ticketing managements in different tools - Solid IT infrastructure background - Strong network administration knowledge(VLAN/ACL/CIsco switches and routers) - Kali Linux proficient - Good knowledge of Linux operation system - Strong Cyber Security Knowledge

Damjan C.
$15/hr
Hacking
PHP
AngularJS
Web Application
Network Security
Website Security
Penetration Testing
Vulnerability Assessment

OSCP - Offensive Security Certified Professional VHL Advanced + Web application penetration testing Ethical hacking Penetration testing in general Network pentesting Vulnerability exploitation Writting a professional risk assessment report for IT organisations based on their website, system or network security SQL and NoSQL databases pentesting What I offer is fast and detailed security report for any web related software, or any application in general as well as suggesting protection. Most of the time I work with automated tools and security testing by hand. I usually use at minimum the OWASP top 10 list applied to organizations...

Byron O.
$13/hr
Hacking
SSH
Python
Scrapy
Selenium
Web Scraper
Data Scraping
Email Handling
API Development
Bash Shell Scripting
Linux System Administration

Automating the Boring Stuff So that You can Focus on The Everything Else That Matters. From Shell Scripting with Bash & Python, to Linux System administration; I Got You covered. I am a Full-time Freelancer, Hence can easily adjust my working Time to sync with Your Work Schedule / Availability. Quality is core; I only Apply on Tasks I know I can Deliver on. Expertise: - Bash Shell Scripting (awk, sed, grep, piping, cut, signals) - Python3+ (API using Flask) - Regular Expressions (RegEx) - Linux Administrations: SSH & SCP, log rotate, troubleshooting, VPN configuration, system hardening. - Web/Data Scraping (Scrapy & Beautiful Soup) - ADB...

Martin V.
$10/hr
Hacking
WordPress
Metasploit
Kali Linux
Ethical Hacking
Network Security
Website Security
Network Pentesting
Penetration Testing
Vulnerability Assessment

- Computer security auditor for financial entities for more than 12 years. - CEH, ISEC +, CCNA. - Pentester - Founder of BackDoorSec - Work done with local police. - OSINT - RPA Developer, Automation Anywhere Advance Ropa Dev, UiPath Expert.

Patrick M.
$65/hr
Hacking
IT Operations
Email Security
Network Security
Website Security
Internet Security
Wireless Security
Web Application Security
Information Security Audit
Information Security Awareness

Network penetration tester and experienced IT specialist. Familiar with a wide range of tools and programming languages. Comfortable in Linux(preferred), Windows, and Apple environments. Able to provide well documented vulnerability assessment from initial recon stages through advanced exploitation as required. - Server setup and security for BAMP, WAMP, and LAMP with phpMyAdmin - Proficient with VMWare, Oracle VirtualBox, and other virtualization software. - Comfortable working with multiple MSP ticketing systems. - Knowledge of Software Defined Networking (SDN) theory and practice. - Experience with maintaining and debugging...

Yevhenii M.
$30/hr
Hacking
OWASP
Python
Nessus
Cloud Security
Ethical Hacking
Security Testing
Website Security
Security Analysis
Penetration Testing
Security Infrastructure

Hi! I'm an Professional Penetration Tester. My Certifications issued by EC-Council: -Certified Ethical Hacker (CEH) -Certified Ethical Hacker Practical (CEH Practical) -Certified Ethical Hacker Master (CEH Master) I also found high severity security vulnerabilities and was rewarded by Chess.com, inSided, and others. My main service: -Penetration testing -Vulnerabilities assessment

Michael P.
$38/hr
Hacking
React
Python
Node.js
Scripting
Kali Linux
Metasploit
WebApp Pentesting
Network Pentesting
Amazon Web Services
Vulnerability Assessment

Military veteran and cyber security engineer with more than 11 years of experience in information technology. Passionate self-starter with over 4 years of remote work experience. Proven track record of managing penetration testing, automation, and major development projects in a fast-paced environment, while meeting all project deadlines with minimal supervision. Capable educator and technical writer in security and development. Designed, developed, deployed, and maintained multi-tenant production cloud platform using AWS serverless technology, React, MongoDB, and Node.js.

Whitney J.
$25/hr
Hacking
Python
Data Scraping
Python Script
API Integration
API Development
Bash Shell Scripting

I am a self-taught Python programmer. I use Upwork mainly to find job postings to use as a guide to teach myself more. With that being said, I would love to work with you and program what you are needing programmed at a significant cost reduction to gain more experience. I am not only passionate about programming but also about people. I am willing to negotiate whatever it is that ends up with both of us being satisfied. On a personal note: I am a sophomore in college majoring in engineering physics alongside a pre-med track. I am taking classes year-round with summer 2020 classes beginning June 1st, so programming is currently a side gig....

Peter S.
$65/hr
Hacking
Network Security
Database Testing
Penetration Testing
Web Application Security

cyber security engineer who can : -Perform infrastructure and application penetration tests, as well as physical security review and social engineering tests for our global clients -Perform application penetration tests across public and private networks -Perform assessments of security awareness training using social engineering

M. T.
$18/hr
Hacking
Kali Linux
Ethical Hacking
Website Security
Internet Security
Network Pentesting
Penetration Testing
Programming Languages
Vulnerability Assessment
Wordpress Malware Removal

I'm EXPECTED IN WEBSITE AND WEB APP pen-testing. -IN MY SPARE TIME. I'm WORK ON HACKERONE.COM ON MANY BUG BOUNTY PROJECT'S I'M EFFICENT IN LINUX,PYTHON,BASH AND C++.. MY SKILL'S INCLUDE - Website Penetration (Bug Reporting and Exploiting) - Web App Pentesting (SQLI, XSS, RFI/LFI, OWASP TOP 10 ETC) - Threat Hunting, Vulnerability Assessment/Validation - Malware Removed (From Any Website) - hacked account recovery, - password recovery. - security analysis. I Have Good Analytical Skill's AND I CAN GIVE BEST RESULT IN GIVEN TIME AND STRICT DEADLINES.

Want to browse more
freelancers?
Sign Up

How it works

1. Post a job (it’s free)

Tell us about your project. Upwork connects you with top talent around the world, or near you.

Tell us what you need. Upwork connects you with top talent around the world, or near you.

2. Freelancers come to you

Get qualified proposals within 24 hours. Compare bids, reviews, and prior work. Interview favorites and hire the best fit.

Get qualified proposals within 24 hours. Compare bids, reviews, and prior work. Interview and hire.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project milestones from your desktop or mobile.

Use Upwork to chat or video call, share files, and track project milestones from your desktop or mobile.

4. Payment simplified

Pay hourly or fixed-price and receive invoices through Upwork. Pay for work you authorize.

Pay hourly or fixed-price and receive invoices through Upwork. Pay for work you authorize.

Trusted by 5M+ businesses

Hackers Hiring FAQs

What is a hacker?

dividuals skilled in using computers to circumvent cybersecurity measures and gain unauthorized access to data. In the professional world, businesses hire ethical hackers to find vulnerabilities in their systems so that they can patch them before they are exploited by a malicious third party. 

How do you hire a hacker?

You can source hacking talent on Upwork by following these three steps:

  • Write a project description. You’ll want to determine your scope of work and the skills and requirements you are looking for in a hacker.
  • Post it on Upwork. Once you’ve written a project description, post it to Upwork. Simply follow the prompts to help you input the information you collected to scope out your project.
  • Shortlist and interview hackers. Once the proposals start coming in, create a shortlist of the professionals you want to interview. 

Of these three steps, your project description is where you will determine your scope of work and the specific type of hacker you need to complete your project. 

How much does it cost to hire a hacker?

Rates can vary due to many factors, including expertise and experience, location, and market conditions.

  • An experienced hacker may command higher fees but also work faster, have more-specialized areas of expertise, and deliver higher-quality work.
  • A contractor who is still in the process of building a client base may price their hacking services more competitively. 

Which one is right for you will depend on the specifics of your project. 

How do you write a hacker job post?

Your job post is your chance to describe your project scope, budget, and talent needs. Although you don’t need a full job description as you would when hiring an employee, aim to provide enough detail for a contractor to know if they’re the right fit for the project.

Job post title

Create a simple title that describes exactly what you’re looking for. The idea is to target the keywords that your ideal candidate is likely to type into a job search bar to find your project. Here are some sample hacker job post titles:

  • Need a Certified Ethical Hacker (CEH) to security-test a Cisco network
  • Seeking a hacker to harden our systems against ransomware attacks
  • Need a hacker to penetration-test our AWS cloud network

Project description

An effective hacker job post should include: 

  • Scope of work: From penetration testing to vulnerability scanning, list all the deliverables you’ll need. 
  • Project length: Your job post should indicate whether this is a smaller or larger project. 
  • Background: If you prefer experience with certain technologies or developer tools, mention this here. 
  • Budget: Set a budget and note your preference for hourly rates vs. fixed-price contracts.

Hacker job responsibilities

Here are some examples of hacker job responsibilities:

  • Scan company networks for system vulnerabilities
  • Design and perform penetration tests 
  • Conduct cybersecurity audits
  • Break encryption protocols on locked files
  • Offer recommendations for improvements to cybersecurity

Hacker job requirements and qualifications

Be sure to include any requirements and qualifications you’re looking for in a hacker. Here are some examples:

  • Cybersecurity, network security, and engineering
  • Penetration testing and other cybersecurity testing methods
  • Computer programming
  • IT infrastructure
  • Ethical hacking certifications (e.g., CEH, GIAC Penetration Tester, OSCP)
View less
Request a Demo