{"id":52,"date":"2016-06-29T17:29:40","date_gmt":"2016-06-29T17:29:40","guid":{"rendered":"https:\/\/securit.ie\/blog\/?p=52"},"modified":"2017-09-26T00:39:50","modified_gmt":"2017-09-26T00:39:50","slug":"freelance-security-consulting","status":"publish","type":"post","link":"https:\/\/securit.ie\/blog\/?p=52","title":{"rendered":"Freelance Security Consulting!"},"content":{"rendered":"<div id=\"attachment_53\" style=\"width: 770px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/securit.ie\/blog\/wp-content\/uploads\/2016\/06\/PornhubHax.jpeg\"><img aria-describedby=\"caption-attachment-53\" loading=\"lazy\" class=\"size-large wp-image-53\" src=\"https:\/\/securit.ie\/blog\/wp-content\/uploads\/2016\/06\/PornhubHax-1024x427.jpeg\" alt=\"Illustrations by Dave van Patten\" width=\"760\" height=\"317\" srcset=\"https:\/\/securit.ie\/blog\/wp-content\/uploads\/2016\/06\/PornhubHax-1024x427.jpeg 1024w, https:\/\/securit.ie\/blog\/wp-content\/uploads\/2016\/06\/PornhubHax-300x125.jpeg 300w, https:\/\/securit.ie\/blog\/wp-content\/uploads\/2016\/06\/PornhubHax-768x320.jpeg 768w, https:\/\/securit.ie\/blog\/wp-content\/uploads\/2016\/06\/PornhubHax.jpeg 1440w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><\/a><p id=\"caption-attachment-53\" class=\"wp-caption-text\">Illustrations by Dave van Patten<br \/>https:\/\/melmagazine.com\/i-get-paid-to-hack-pornhub-674463411fc9<\/p><\/div>\n<p>I recently did an interview for a Magazine about <a href=\"https:\/\/melmagazine.com\/i-get-paid-to-hack-pornhub-674463411fc9#.n2jh7r1yt\">bug bounties and\u00a0hacking Pornhub<\/a>. When I&#8217;m not targeting large multi-million dollar organisations directly through bug bounty programs, I\u00a0perform security assessments on behalf of small to medium size enterprises.<\/p>\n<p>Contracts take up a larger amount of my time, as a freelance consultant\u00a0it\u00a0can be\u00a0hard to advertise this work given that I keep my clients and the work I do strictly confidential. I use responsible disclosure and bug bounty programs as a means of advertising my skill-set and hopefully as a means of getting attention for the regular consulting\u00a0services I provide. I&#8217;m available for\u00a0short term contracts, no\u00a0shorter\u00a0than a day and no longer\u00a0than a month.<\/p>\n<p>My rates are quite cheap in comparison with\u00a0standard prices one usually expects to pay for security consulting or penetration testing. The reason for this is to make my services more attractive to smaller companies or websites (they need protection too and often can&#8217;t afford it).<\/p>\n<p>I&#8217;m also still running a special cheap rate for customers based in Ireland. My <a href=\"https:\/\/securit.ie\/blog\/?p=1\">slightly\u00a0alternative Penetration Test<\/a>\u00a0is essentially a more old-school style, 2 week, multifaceted penetration test. This type of testing is harder to come by these days.<\/p>\n<p>The aim of this testing is to identify the most likely security issues to be exploited by a\u00a0malicious\u00a0attacker to ruin or damage your business, looking at your business as a whole. This includes taking a look at all your online assets and also includes performing controlled malware or phishing campaigns. \u00a0The goal here is to determine what the most likely attacks\u00a0facing your particular business model are and to help you resolve or mitigate them. It can help identify issues your staff also need to be aware of. Often organisations\u00a0don&#8217;t realize how much information about their assets or internal company structure\u00a0an attacker can gleam from public resources. This testing\u00a0gives a very good overview of where your primary security risks are and can help you to prioritize your efforts.<\/p>\n<p><strong>Alternative 2 week Penetration Test: \u00a0 \u00a0 \u00a0\u00a0\u20ac4000<\/strong><br \/>\n<strong>Daily Consulting Rate: \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u20ac650-850<\/strong><\/p>\n<p>My prices are generally cheaper for smaller businesses and if I don&#8217;t find severe issues.<br \/>\nContact <a href=\"mailto:info@securit.ie\">info@securit.ie<\/a>\u00a0with any questions, it costs nothing to be curious!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recently did an interview for a Magazine about bug bounties and\u00a0hacking Pornhub. When I&#8217;m not targeting large multi-million dollar organisations directly through bug bounty programs, I\u00a0perform security assessments on behalf of small to medium size enterprises. Contracts&#8230; <a class=\"read-more\" href=\"https:\/\/securit.ie\/blog\/?p=52\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[30,6,33,8,35,32,34,2,31],"_links":{"self":[{"href":"https:\/\/securit.ie\/blog\/index.php?rest_route=\/wp\/v2\/posts\/52"}],"collection":[{"href":"https:\/\/securit.ie\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securit.ie\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securit.ie\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securit.ie\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=52"}],"version-history":[{"count":13,"href":"https:\/\/securit.ie\/blog\/index.php?rest_route=\/wp\/v2\/posts\/52\/revisions"}],"predecessor-version":[{"id":81,"href":"https:\/\/securit.ie\/blog\/index.php?rest_route=\/wp\/v2\/posts\/52\/revisions\/81"}],"wp:attachment":[{"href":"https:\/\/securit.ie\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=52"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securit.ie\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=52"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securit.ie\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=52"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}