Profile cover photo
You're now following
Error following user.
This user does not allow users to follow them.
You are already following this user.
Your membership plan only allows 0 follows. Upgrade here.
Successfully unfollowed
Error unfollowing user.
You have successfully recommended
Error recommending user.
Something went wrong. Please refresh the page and try again.
Email successfully verified.
User Avatar
$40 USD / hour
Flag of BANGLADESH
kishoreganj, bangladesh
$40 USD / hour
It's currently 9:52 PM here
Joined April 22, 2012
1 Recommendation

Delwar A.

@delwaralam

monthly-level-two.svg
verified.svg
4.8 (14 reviews)
5.2
5.2
89%
89%
$40 USD / hour
Flag of BANGLADESH
kishoreganj, bangladesh
$40 USD / hour
86%
Jobs Completed
96%
On Budget
92%
On Time
8%
Repeat Hire Rate

Cyber Security and Penetration Testing Expert

I am a Cyber and information security expert. I invest my time and skills to help people protect their business from Cybercriminals. Specialties/ 10-years experience: Information Security and Assurance, Vulnerability Assessment, Cyber Security, Penetration Testing, IT security, Cyber Security Consultant, API Security, Mobile Application Security, Source Code Audit, Web Server Pen-testing. I started my journey in the information security domain in 2010. I have a team to collaborate with on different Cyber Security projects. My base programming skills are in PHP and Python. I am a highly-skilled framework of PHP especially Laravel, Codeigniter, and vastly experienced in Django. As a developer, I have both experienced in frontend and backend. I can manage Database MySql and MongoDB. I have worked as System Admin/ Network Administration so many years.

Contact Delwar A. about your job

Log in to discuss any details over chat.

Portfolio

5129297
5129290
5129279
5129251
5129243
5129297
5129290
5129279
5129251
5129243

Reviews

Changes saved
Showing 1 - 5 out of 14 reviews
Filter reviews by:
5.0
$270.00 USD
One of the best freelancers over here. Will continue working with him. Thanks!!
Linux
Web Security
Penetration Testing
Network Security
+1 more
A
Flag of Ankit S.
@ankitsureka2012
•
2 years ago
0.0
₹1,300.00 INR
The project is not completed according to the dispute
Web Security
Computer Security
Software Testing
Network Administration
User Avatar
Flag of Sudheer K.
@sudheerkumar90
•
2 years ago
5.0
$1,375.00 USD
Great work. Will hire him again
Web Security
Computer Security
Research Writing
Network Administration
Internet Security
A
Flag of Ankit S.
@ankitsureka2012
•
2 years ago
5.0
€90.00 EUR
Excellent work done by the seller. I nevertheless found him to be extremely responsive, highly professional, and immensely intelligent in the field of IT and cyber security. He provided excellent 5-star service and delivered an excellent report. Very smooth experience and good communication. He is highly recommended and you should not hesitate to use his 1st class service.
Banner Design
Blog
Blackberry
Article Writing
Blog Design
+1 more
F
Flag of Md.Fakrul Abedin B.
@fakrulabedin79
•
2 years ago
2.0
$150.00 CAD
Although Delwar did some of the things I asked he didn't do all of them. I even had to google some examples to send to him so he understood what I wanted done. He told me during the review process that he was an expert in security. An expert would know what needs to be done to secure a form from hackers and spammers without help from me. He also told me he had a good grasp of the English language yet he stated he didn't understand what I wanted numerous times. I will now have to seek more help
N
Closed User
@nootkan
•
3 years ago

Experience

Cyber Security Specialist

BugsBD limited
Aug 2016 - Present
Cyber Security research, Pentester

Education

BSc in software engineering

Daffodil International University, Bangladesh 2010 - 2014
(4 years)

Qualifications

CISM (Certified Information Security Manager)

ISACA
2022
CISM (Certified Information Security Manager)

Certified Information Systems Auditor® (CISA®)

ISACA
2022
Certified Information Systems Auditor® (CISA®)

Certified Ethical Hacker

EC-Council
2019
Certified Ethical Hacker is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems

Publications

Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF

2016 Sixth International Conference on Digital Information and Communication Technology and its
In a sophisticated and coordinated cyber-attack $100 million has been stolen from Bangladesh's account. At­tackers introduced malicious code remotely into the Bangladesh Bank's server, which allowed them to process and authorize the transactions. Advanced attack techniques poses threats to all web application systems. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF)

A Study of the Effects of Heartbleed Vulnerability in Bangladesh

The Fourth International Conference on Computer Science
One of the most critical and talked about Open Secure Socket Layer (SSL) and Transport Layer Security (TLS) threats is Heartbleed vulnerability. This vulnerability affects the " Heartbeat protocol " of the open SSL library. HeartBleed manipulates the Heartbeat protocol to get access and read the memory of the vulnerable web servers. OpenSSL is used in HTTPS for internet security.

Study of the Dirty Copy On Write, A Linux Kernel Memory Allocation Vulnerability

EasyChair for CEEIT 2017
Dirty Copy On Write also known as Dirty COW is a Linux based server vulnerability. This vulnerability allows attackers to escalate the file system protection of Linux Kernel, get root privilege and thus compromise the whole system. Linux kernel version 2.6.22 and higher are affected by this vulnerability. The patch for this vulnerability has been released very recently.

Study of Race Condition: A Privilege Escalation Vulnerability

WMSCI 2017 Secretariat
The Race condition is a privilege vulnerability that manipulates the small window of time between appliance of a security control and use of services in a system. This vulnerability is a result of interferences caused by multiple threads running in the system and sharing the same resources. These processes might include trusted process such as operating system files and un-trusted processes.

Contact Delwar A. about your job

Log in to discuss any details over chat.

Verifications

Preferred Freelancer
Identity Verified
Payment Verified
Phone Verified
Email Verified
Facebook Connected

Certifications

preferredfreelancer-1.png Preferred Freelancer Program SLA 1 89%
us_eng_1.png US English 1 77%
Previous User Next User
Invite sent successfully!
Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.