Profile image of bradhaas
Member since January 12, 2011
2 Recommendations


Online Offline
Computer and network defense is my passion. I've spent most of the last decade studying and working in information security, including work in development, strategic cyber threat analysis, and data security operations. I have both formal education / certification (see below), and real-world experience. I am based in the US (timezone UTC-6/-5). I speak and write English fluently. My expertise lies mainly in incident response and in reverse engineering / malware analysis. This means I can go in nearly blind and still quickly determine the source of an intrusion and how to fix the vulnerability. I can analyze a malicious artifact to determine its purpose. I can apply my strategic experience to assess future threats, and I document everything in a well-written report. This is my normal work cycle for incident response clients: - get access information and begin investigating the server - perform triage / rapid removal of malicious and compromised files - keep track of all actions performed, and conduct live chat to inform clients of my progress (timezone permitting) - submit a complete final report with all investigation details, actions taken, future threat assessment, and remediation recommendations - work with clients to keep monitoring for future hack attempts for the coming weeks and if possible, find/patch the vulnerability that allows the hack I will not accept payment if I can't finish a job to a client's satisfaction. I check on clients again at one and three weeks to make sure everything is still fine. My passion is for fighting malware and cyber criminals, not for taking money for quick and temporary solutions to a problem. I have never failed to complete an incident response project. I have successfully eradicated malware and secured the following platforms: - OsCommerce - Cre Loaded - CS-Cart - PrestaShop - Magenta - Wordpress - Joomla - custom content management systems - PHPBB - vBulletin I can work with the following languages: - C / C++ / C# - PHP - Python - Perl - IA32 assembly - VB - shell scripting languages
$50 USD/hr
121 reviews
  • 80%Jobs Completed
  • 97%On Budget
  • 93%On Time
  • 10%Repeat Hire Rate


Recent Reviews

  • image of timfl2448 Project for bradhaas $60.00 USD

    “Superb work. Fast and reliable. Highly recommended”

  • image of timfl2448 Copy NextGen data to remote database $20.00 USD

    “Excellent work. I will definitely hire again.”

  • image of timfl2448 Wordpress hack $50.00 USD

    “Terrific job! Will definitely hire again.”

  • image of lucas111 Remove virus/malware from web hosting account (WordPress) $179.00 USD

    “Top notch service! I highly recommend Brad: 10/10!!!”

  • image of EnzoBac Security scan for website $140.00 USD

    “Usual top-notch work from Brad on another security issue -- fast, good communications, flexible, etc. Highly recommended.”

  • image of newrival website security $135.00 USD

    “Provided the exact service he promised. Communication wasn't the absolute fastest, but it was adequate and the job did not suffer in any way. Brad did an exemplary job by all standards. thanks!”



2004 - 2009 (5 years)


2004 - 2009 (5 years)


Associate of (ISC)² - Certified Information Systems Security Professional (2009)

International Information Systems Security Certification Consortium

Demonstrates competence in the ten CISSP knowledge domains: • Access Control • Application Development Security • Business Continuity and Disaster Recovery Planning • Cryptography • Information Security Governance and Risk Management • Legal, Regulations, Investigations and Compliance • Operations Security • Physical (Environmental) Security • Security Architecture and Design • Telecommunications and Network Security

GIAC Certified Incident Handler (2011)

Global Information Assurance Certification

GIAC Certified Incident Handlers (GCIHs) have the knowledge, skills, and abilities to manage incidents; to understand common attack techniques and tools; and to defend against and/or respond to such attacks when they occur.


  • Computer Security


  • Facebook Connected
  • Preferred Freelancer
  • Payment Verified
  • Phone Verified
  • Identity Verified
  • Email Verified

My Top Skills

Browse Similar Freelancers