Computer Security Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 102,433 reviews, clients rate our Computer Security Consultants 4.86 out of 5 stars.
Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    66 jobs found, pricing in USD

    I am currently in need of a freelancer proficient in Omnet++ VEINS network simulator. The backbone of the project is Artificial Intelligence (AI), with a specific interest in: - Network Protocols Simulation - IoT Devices Interconnection - Performance Analysis I am also in need of simulation for specific network protocols: - TCP/IP - UDP Whilst applicants should be experienced in network simulators, a strong background in Omnet++ and AI is a must. It is paramount that the freelancer can effectively integrate AI into the simulation, and that they are capable of interconnecting IoT devices. Studies or experience in computer networking would be advantageous.

    $511 (Avg Bid)
    $511 Avg Bid
    18 bids

    Seeking immediate assistance from a capable Cyber Security expert to address my current needs. My project revolves around two main components: 1. Network Security: I am in the pursuit of a specialized professional who understands the principles of network security and can help me gain access to a system in an ethical manner. This requires a deep understanding of network infrastructure and protocols, as well as the skills to spot and mitigate vulnerabilities. 2. Data Encryption and Secure Coding: You will need to exercise knowledge of data encryption standards and secure coding practices to ensure that the integrity of the system is maintained, while the necessary tasks are performed. Skills and Experience: - Proficient in ethical hacking - Solid experience with network security - Robust...

    $50 / hr (Avg Bid)
    $50 / hr Avg Bid
    7 bids

    I'm seeking urgent improvements for my MailEnable (v.10.48) email server. The project involves making the system both faster and more secure. Key Responsibilities: - Enhancing the system's performance for optimal speed and efficiency - Implementing security upgrades to ensure the entire system is robust and secure Task - install certificate into mailserver, - allow mail-client to use it which all protocols (POP/IMAP/SMTP), - server security (local fw) - SPF (Sender Policy Framework) - timeout of webmail access (it seems that now a session is unlimited) - customization of webmail: if the mail server is configured to answer to more than one domain, how is possible to adopt a different login page? Experience and Skills: - Proven track record in email server optimization, prefe...

    $201 (Avg Bid)
    $201 Avg Bid
    6 bids

    I need an expert to plan, scale, and execute the setup of a Windows Terminal Server to accommodate 50-70 users. The task is expected to be completed within 1 - 3 months. Key Responsibilities: - Plan and execute the setup of a Windows Terminal Server for 50-70 users. - Ensure the server is scalable for potential future growth - Implement best practices to guarantee system performance and security - Provide guidance on user access and permission management Ideal Skills and Experience: - Prior experience in setting up Windows Terminal Servers for medium to large user bases - Strong understanding of Windows Server and Terminal Services - Proficiency in planning and executing Windows Server setups - Ability to optimize system performance and scalability - Familiarity with security best pract...

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    13 bids

    Hi there, We have already done the analysis and collected evidences and looking for someone to create a report of every task we have performed during analysis and about avidences. We only get 4 hours left for the submission and looking for someone who is good enough with Cyber security, Digital Forensics using Autopsy, Encase and familiar with contenmporary notes. The following report structure is expected: Title page – Include module code, assignment title and student ID number. Introduction - Include a discussion of case management. Evidence analysis. Findings and Conclusions - Include critical discussion of the investigation. References. Appendix – Include contemporaneous notes. 2 hours left! Thank you

    $28 / hr (Avg Bid)
    $28 / hr Avg Bid
    15 bids

    I'm looking for an expert in Synology Nas Management for utilizing various applications including synology mailplus, file sharing, virtual machines, optimizations, dhcp server, dns server, active directory server model ds 1621xs+ also trying to add more synology nas for better performance. The ideal consultant should have: - Proficiency in Synology NAS systems - Expertise in setting up and optimizing file storage and sharing on a Synology NAS. - Good communication skills to explain complex technical ideas in an understandable way. If you have experience with similar projects, please let me know.

    $111 (Avg Bid)
    $111 Avg Bid
    11 bids

    I'm looking for an expert in Synology Nas Management for utilizing various applications including synology mailplus, file sharing, virtual machines, optimizations, dhcp server, dns server, active directory server model ds 1621xs+ also trying to add more synology nas for better performance. The ideal consultant should have: - Proficiency in Synology NAS systems - Expertise in setting up and optimizing file storage and sharing on a Synology NAS. - Good communication skills to explain complex technical ideas in an understandable way. If you have experience with similar projects, please let me know.

    $58 (Avg Bid)
    $58 Avg Bid
    11 bids

    I am seeking a professional who can provide specific assistance with a sensitive email situation. Here's an overview of the requirements: - I need the contents of a previously sent email edited or deleted from the recipient's mailbox. This is due to the email containing mistaken content. - I currently have no access to the recipient's email system. The successful freelancer will need to gain unauthorized access to the system, locate the email in question, and carry out the necessary action. Ideal skills for this project include: - Proficiency in email security and hacking techniques - Strong ethical and confidentiality standards - Excellent communication skills for reporting progress and seeking necessary info or permissions - Previous experience with similar email securit...

    $632 (Avg Bid)
    NDA
    $632 Avg Bid
    8 bids

    Hi there, We have already done the analysis and collected evidences and looking for someone to create a report of every task we have performed during analysis and about avidences. We only get 4 hours left for the submission and looking for someone who is good enough with Cyber security, Digital Forensics using Autopsy, Encase and familiar with contenmporary notes. Thank you

    $26 / hr (Avg Bid)
    $26 / hr Avg Bid
    17 bids

    My domain is facing issues with DNS configuration, causing the website to be completely inaccessible. I'm looking for an expert in this area to help resolve the problem. Key Responsibilities: - Analyze and troubleshoot the DNS configuration of my domain. - Identify the root cause of the issue leading to the website unavailability. - Propose and implement the necessary changes to fix the problem. Ideal Candidate: - Proven experience in DNS management and troubleshooting. - Familiarity with common DNS issues, their symptoms, and resolution techniques. - Excellent problem-solving skills and the ability to work in a fast-paced environment. - Strong communication skills to explain the issues and solutions effectively.

    $68 (Avg Bid)
    $68 Avg Bid
    27 bids

    I'm seeking a professional who can assist me in configuring DevStack on Linux-based virtual machines. The main aspects of the project are as follows: - Complete Configuration: I need the DevStack configuration to be set up comprehensively. This includes ensuring that all components are correctly configured and working as intended. - Remote Access: The virtual machines should be set up in a manner that allows me to have remote access to them. This is a crucial requirement for the project as I will need to work on them from different locations. Ideal candidates for this project should have a strong background in: - DevStack: Proficiency in configuring and setting up DevStack is a must. Previous experience in implementing DevStack on Linux-based systems will be highly valued. - Virt...

    $125 (Avg Bid)
    $125 Avg Bid
    13 bids

    As a business highly concerned with network security, I am seeking assistance from a knowledgeable Cyber Security consultant to fortify our network infrastructure. Skills and Experience Required: • Deep understanding of network security measures • Proficient in employing and improving Firewalls and VPNs • Familiar with Intrusion Detection Systems • Capability to assess and mitigate risk of unauthorized access and data breaches Key Responsibilities: • Analyse our existing security measures • Identify vulnerabilities and recommend enhancements • Implement improved security protocols preventing unauthorized access and data breaches • Provide continuous monitoring and regular updates.

    $43 / hr (Avg Bid)
    $43 / hr Avg Bid
    28 bids

    I'm in need of a skilled and experienced network engineer to assist with setting up a robust distributed network. The network will support both IPv4 and IPv6 and will be announced to various providers with BGP. This is a live network - 2x IPv4 /24's will be announced and various IPv6 blocks. I would like the following setup, using bird 2.x: - Routers that will announce the addresses to the public internet via providers (I already have the BGP sessions setup with the providers) - An internal network setup using Wireguard between routers - Ability to internally announce single IPs/smaller subnets (than a /24, for example) to route them to different places. For example, if the /24 is announced at provider A on router A, I want router B to be able to connect to router A and router A...

    $635 (Avg Bid)
    $635 Avg Bid
    16 bids

    I'm in need of a highly skilled networking professional. The ideal candidate should be proficient in a variety of networking areas, such as design, security, and troubleshooting. Key Skills and Experience: - Proven expertise in network design, implementation, and management. - Deep understanding of network security, including firewalls, VPNs, and intrusion detection systems. - Capable of identifying and resolving complex network issues efficiently. Please note that the exact requirement and the scale of the network will be discussed further once the project is underway.

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    23 bids

    I am in need of assistance with the Network+ exam preparation. The main goal of this project is to help me successfully pass the Network+ exam. The successful freelancer should be knowledgeable in various networking concepts, including: - Network technologies and tools - Installation and configuration - Media and topologies - Management and security - Troubleshooting The ideal candidate should have demonstrated experience in network administration and certification exam preparation. A structured, thorough and engaging approach to exam preparation would be highly valuable. Your application should reflect your experience and approach to assisting with this specific certification.

    $115 (Avg Bid)
    $115 Avg Bid
    30 bids

    University Assignment: Flask Web Application for Secure Authentication System ONLY BID IF YOU CAN DO IT. Go to Template Folder to see the code and use Docker to run it. It should take 2-3 hours to do it. Need it ASAP. Project Overview: I will give you a zip file with , and other files. Help me enhance a Flask-based html website by improving its authentication system. This involves the creation of a new and the enhancement of existing features to meet specified security standards and user experience improvements. Core Requirements: User Interface Development: - Develop with forms for username, password, and password confirmation. - Ensure forms are user-friendly and adhere to modern web standards. Password Requirements: - Enforce a password length of 8-64 characters. - Support a...

    $23 (Avg Bid)
    $23 Avg Bid
    40 bids

    I'm in need of a highly skilled networking professional. The ideal candidate should be proficient in a variety of networking areas, such as design, security, and troubleshooting. Key Skills and Experience: - Proven expertise in network design, implementation, and management. - Deep understanding of network security, including firewalls, VPNs, and intrusion detection systems. - Capable of identifying and resolving complex network issues efficiently. Please note that the exact requirement and the scale of the network will be discussed further once the project is underway.

    $143 (Avg Bid)
    $143 Avg Bid
    13 bids
    Pfsense Implementation 5 days left
    VERIFIED

    I am seeking an experienced freelancer to configure PfSense with Open Nebula for a cloud computing project. The goal is to enhance network security while ensuring efficient virtualization across multiple servers. This setup is crucial for the seamless operation and security of our cloud computing environment. **Requirements:** - **Configuration of PfSense:** Implement it alongside Open Nebula to create a robust cloud computing platform. Experience with PfSense is a must. - **Network Security Features:** - **Firewall Rules:** Set up comprehensive firewall rules to protect against unauthorized access and threats. - **VPN Setup:** Establish secure VPN connections for remote access, ensuring that our cloud environment is accessible yet secure. - **Intrusion Detection System (IDS):** Impleme...

    $163 (Avg Bid)
    $163 Avg Bid
    26 bids
    IoT Security Research 4 days left
    VERIFIED

    I'm looking for a skilled researcher to delve into the world of cybersecurity, specifically focusing on Internet of Things (IoT) devices. Key Focus: - Understanding the role of IoT in smart home devices - Investigating the role of network security in IoT - Exploring data encryption methods and their application in IoT - Reviewing current practices in IoT security awareness training The goal of this research is to enhance the security of IoT devices, with a particular focus on smart home devices. Expected Deliverables: - A comprehensive research document outlining the above aspects - Recommendations for improving IoT security in the context of smart home devices Ideal Skills: - Proven experience in cybersecurity research - Experience with IoT devices, particularly smart home devi...

    $22 (Avg Bid)
    $22 Avg Bid
    26 bids

    As an enterprise-grade network user, I'm seeking a professional with a minimum certification of NSE4 from Fortinet to manage tasks related to Network Security and Firewall Configuration. Given the sophistication of our network - a highly complex one with numerous systems and interconnections - your role will require extensive knowledge and experience in similar setups. Tasks will include: - Implementing network security across all systems - Configuring and managing the firewall for optimal safety I anticipate these tasks to be completed within a month's time. To ensure a successful implementation, your technical skills should be backed by experience in troubleshooting and resolving network issues. Only apply if you can handle the complexity and interdependencies of our system...

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    11 bids

    I'm in need of a professional to monitor a set of CCTV cameras that will be installed both indoors and outdoors. This role can be performed from the comfort of your own home, making it a flexible working arrangement. The installation location for these cameras is not specified to be at an office. This job requires you to professionally monitor these cameras, ensuring security and safety. Your primary responsibility will be to keep an eye on the activities captured by the cameras. This will include: - Detecting and reporting any signs of theft or suspicious behavior. - Ensuring that safety measures are being followed and compliance with regulations is maintained. It's important that you're able to manage monitoring 1-5 cameras simultaneously. Ideal skills and experience ...

    $2038 (Avg Bid)
    $2038 Avg Bid
    13 bids

    I have a Windows 10 system which is currently blocking ports 9876, 9877, 27015, and 27016. I need to ensure that these ports are accessible for both incoming and outgoing connections. Key Tasks: - Identify the existing issue(s) with the Windows Defender Firewall that is preventing access to these ports. - Fix the existing Configuration on the firewall to allow both incoming and outgoing connections through ports 9876, 9877, 27015, and 27016. Your Experience: - Proficient in Windows 11 firewall configuration - Experienced in troubleshooting port access issues - Familiar with network security and best practices - Skilled in providing secure access to ports while maintaining system integrity

    $16 (Avg Bid)
    $16 Avg Bid
    15 bids

    I'm seeking a skilled developer to improve the performance of my cryptocurrency platform. The current system is utilizing cloud services like AWS and Google Cloud. The immediate focus is on enhancing transaction speed, scalability, and security. Key Requirements: - Improve Transaction Speed: The current transaction speed of the platform is suboptimal. The goal is to enhance it significantly. - Scale Up: The platform is intended to accommodate a larger user base. Enhancements in scalability are required to ensure it can manage more users efficiently. - Enhance Security: Security is a top priority. The selected developer should be able to implement robust security measures to protect the platform and its users. Experience and Skills: - Proven track record in improving the performance...

    $516 (Avg Bid)
    $516 Avg Bid
    77 bids

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    $129 (Avg Bid)
    $129 Avg Bid
    18 bids

    I am looking for a professionals and experienced cybersecurity sales freelancer to help me expand my client base. My company specializes in providing threat intelligence and table top exercises services. Key Responsibilities: - Research and identify potential clients in the technology sector - Reach out to these clients and pitch our cybersecurity services - Conduct sales meetings independently with minimal guidance Ideal Candidate: - Proven experience in cybersecurity sales, especially in the technology sector - Strong understanding of threat intelligence and table top exercises - Ability to communicate complex technical concepts in a clear and concise manner - Self-driven and able to work independently - Familiarity with intermediate level of cybersecurity expertise - Existing network...

    $9 / hr (Avg Bid)
    $9 / hr Avg Bid
    9 bids

    I'm looking for a skilled VPN and Android system programmer who can reliably connect my existing OpenVPN server to devices running Android 9 and above. After successful configuration, these Android devices should gain unhindered access to my private networks. Ideal Skills: - In-depth knowledge of Android system development - Expertise in setting up and configuring OpenVPN servers - Strong understanding of network security and VPN protocols Objectives: - Configure OpenVPN server to work with Android 9 and above - Enable secure access to private networks through the VPN connection - Test and provide documentation explaining how to connect future devices to the VPN server.

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    28 bids

    I'm urgently looking for a skilled professional to help me secure my website against DDoS attacks, specifically focusing on DNS amplification. work over any disk only must be now !

    $46 (Avg Bid)
    $46 Avg Bid
    51 bids

    We are urgently looking for very good system admins with many years experience handling linux servers to solve a boot issue where installing Grub is corrupted. A very good Freelancer has been working on it already but even with his very high score and good skills he hasnt been abkle yet to get it done. So, please do not react if you are not very good in solving these kind of things as you need to work with the freelancer who works on it now and he has done already the basic things. So we need someone who can help him. Server is linux/ubuntu and openstack

    $31 / hr (Avg Bid)
    $31 / hr Avg Bid
    31 bids

    I'm in need of a skilled professional in digital forensics to help me investigate a cybercrime. You are a digital forensic analyst, working for a law enforcement agency in the UK and have been assigned to an investigation, working in partnership with an international agency. A member of the investigation team has been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as par...

    $114 (Avg Bid)
    $114 Avg Bid
    27 bids

    I'm in need of a skilled professional in digital forensics to help me investigate a cybercrime. You are a digital forensic analyst, working for a law enforcement agency in the UK and have been assigned to an investigation, working in partnership with an international agency. A member of the investigation team has been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as par...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    17 bids

    I'm in need of a skilled technician to update the firmware on my Checkpoint 1430 router. The requested firmware version is and due to the router being an End of Life (EOL) model purchased used, traditional download options are not available. The upgrade process will need to be executed offline. The key aim of this project is to: - Carry out the upgrade strictly offline - Ensure no loss of current functionality - Improve stability and fix any existing bugs if you could download and send me the file it would me great

    $17 (Avg Bid)
    $17 Avg Bid
    11 bids

    experienced network specialist, well-versed in Cisco ISE and firewall configurations for an enterprise level network. We're currently experiencing network connectivity issues and require assistance with firewall configurations and overall network security.

    $464 (Avg Bid)
    $464 Avg Bid
    28 bids

    I’m looking for someone who can help students with online english proctored exams ( doulingo) remotely I do speaking and he/she helps with the rest, who ever is willing to help contact me ASAP

    $36 / hr (Avg Bid)
    $36 / hr Avg Bid
    42 bids

    I am in need of a proficient security expert to help tackle my final project geared towards creating a low-interactive honeypot. This honeypot is intended to guard real networks by focusing on detection of Brute Force Attacks specifically. The honeypot should be designed for the Linux operating system and created to effectively emulate SSH. I require that you have: 1. the built should be on CML 2. Skill in SSH protocol 3. Experience in creating low-interactive honeypots 4. The ability to focus on detecting Brute Force Attacks 5. Should specific documentation design, developments, and testing : Chapter 4 — Design 4.1 Introduction 4.2 Interface Design 4.3 System Design 4.4 Summary -------------------- Chapter 5 — Development 5.1 Introduction 5.2 Interface Development 5.2....

    $189 (Avg Bid)
    $189 Avg Bid
    4 bids

    I am urgently in need of assistance for my packet tracer assignment. Specifically, my challenges are centered around the VLAN setup and routing protocols. Key Responsibilities: - Building VLAN configurations. This requires a good understanding of VLAN concepts, the ability to identify and resolve VLAN issues, and the ability to configure VLANs on network devices effectively. - Implementing routing protocols. This requires knowledge of different routing protocols, how they work, and how to apply them properly in a network setting. Skill Requirements: - Strong familiarity with packet tracer - Expert knowledge in VLAN configuration and routing protocols - Excellent problem-solving skills - Ability to work under tight deadlines Please note that while it's not necessary, including an...

    $28 (Avg Bid)
    $28 Avg Bid
    15 bids

    I'm looking for a Cybersecurity Trainer with hands-on experience and in-depth knowledge in Checkpoint, Bluecoat, Paloalto, and Zscaler. Key requirements: - Proficient in Checkpoint, Bluecoat, Paloalto, and Zscaler technologies - Previous experience in training or teaching these technologies - Ability to tailor the training to a 15-minute session - Able to deliver a total of 10 training sessions Your role will include: - Conducting interactive training sessions - Providing practical examples and use cases for a better understanding - Answering questions and offering support to trainees Ideal candidates would have a strong understanding of the cybersecurity landscape and have the ability to explain complex concepts in a clear and concise manner.

    $259 (Avg Bid)
    $259 Avg Bid
    11 bids

    I'm in need of an experienced network designer who can create a secure file-sharing network for my medium-sized team. Key Requirements: - The network should support sharing of various file types including documents, images, and videos. - The network will be utilized by 10-50 workers, so scalability is a critical consideration. Security: - I require advanced encryption to protect sensitive files. - Access logs should be maintained to monitor file movements and ensure accountability. Skills and Experience: - Proven experience in designing secure file-sharing networks for medium-sized teams. - In-depth knowledge of encryption protocols and security measures. - Proficiency in network scalability. - Past experience with managing access logs would be a plus. Please provide examples o...

    $474 (Avg Bid)
    $474 Avg Bid
    32 bids

    I am looking for an expert network administrator to assist in improving the performance and security of our existing computer network. The key goals of this project are: - Improved network performance - Enhanced network security - Expanded network capacity Our current network infrastructure utilises various network protocols including TCP/IP, UDP, ICMP, and QUIC. The freelancer would ideally have strong experience in these protocols. Specific skill set required: - Proven experience in network administration - Comprehensive knowledge of TCP/IP, UDP, ICMP, and QUIC protocols - Understanding of network performance optimization - Expertise in network security There are no limitations in regards to latency, speed, or security for the network protocols that will be used in this project. I w...

    $43 (Avg Bid)
    $43 Avg Bid
    7 bids

    I'm in need of a thorough encryption of my entire website to protect sensitive user data, ensure secure user communication and align with industry regulations. I am open to using the necessary encryption technologies that will meet these needs such as SSL/TLS, HTTPS, IPSec, or others as recommended. Specifically, I want to encrypt: - User login credentials - Payment information - Personal user data The perfect candidate would have strong experience in various encryption technologies and a keen understanding of strict security protocols for user data. Knowledge of industry regulations regarding encryption and user data security is crucial. Please demonstrate your experience with similar past projects, highlighting your strategy to encrypt various aspects of a website.

    $150 (Avg Bid)
    $150 Avg Bid
    59 bids

    I'm seeking a skilled penetration tester with a focus on web applications. I need you to identify vulnerabilities in a white box (full knowledge) environment. Key responsibilities include: - Conducting in-depth testing on web applications to uncover potential security issues. - Providing detailed reports of vulnerabilities detected, including their potential impacts. Ideal candidates should have: - Extensive experience with penetration testing, particularly focused on web applications. - Strong knowledge of cybersecurity, network security, and ethical hacking. - Ability to work in a white box environment, using full knowledge to simulate real-world threats. Your work will be crucial to ensuring the security and integrity of our web applications.

    $332 (Avg Bid)
    $332 Avg Bid
    31 bids

    Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application’s integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses Heartble...

    $140 (Avg Bid)
    $140 Avg Bid
    8 bids
    Mikrotik VPN Setup for macOS 2 days left
    VERIFIED

    I am seeking for an experienced network engineer capable of setting up a Client-to-Site VPN on a Mikrotik router. The successful configuration needs to comply with the following: - Security protocol: The VPN should be secured using the OpenVPN protocol. - Client Devices: The VPN configuration should allow connection from macOS devices. The ideal candidate should have demonstrated experience in: - OpenVPN and Mikrotik router configurations. - Familiarity with macOS operating systems. - Network security and VPN configuration. Looking forward for a professional who can deliver an effective and secure solution making remote work safer and more efficient.

    $119 (Avg Bid)
    $119 Avg Bid
    22 bids

    I'm seeking an adept professional experienced in various areas of cyber security and digital forensics. The focus of the project will be on case forensics with an emphasis on: - Computer forensics - Mobile device forensics - Network forensics The scope of the project involves in-depth work with the following operating systems: - Windows - macOS In addition, the ideal candidate should possess: - Proficiency in malware analysis - Expertise in incident response - Proven experience with network security This extensive project requires comprehensive knowledge and experience, lending to efficient and methodical work. Your ability to provide detailed reports and reliable solutions to any potential issues will be highly prized. Please connect if your skills align with these requireme...

    $130 (Avg Bid)
    $130 Avg Bid
    28 bids

    Hi, I am resetting SSH pw right now and it seems there might be another step or two. I can't have client down for more than a few min, so need someone available right now in case

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    31 bids

    I am searching for a technical wizard who can dive deep into my home network data. There are several aspects that I'm curious about: Developer google in my activity when it’s not me and google can’t tell me , lots of account changes * A detailed breakdown of my internet usage across different devices and applications. * An evaluation of my network security, including any weak points and areas for improvement. * An understanding of the devices connected to my network and how they're interacting. I suspect that things are being hidden or configured without my knowledge - I want to unveil any secret activities happening on my WiFi and phone. I primarily use smartphones and laptops, and I've recently noticed the presence of IFTTT and Home Assist on my network. I...

    $322 (Avg Bid)
    $322 Avg Bid
    14 bids

    I am on the lookout for a seasoned cyber security expert to fortify my network and safeguard our personal computers and mobile devices from malware and viruses threats. The specifics of this project include: - Assurance of Network Security: My primary concern lies in the protection of the network from malicious harm. I want a bulletproof network security system capable of warding off potential intruders. - Malware and Virus Mitigation: It's crucial to me that the chosen professional can proactively identify, manage and dispel malware and viruses. - Protection Across Multiple Platforms: Notably, it's not just our PC network that requires protection. Our mobile devices are also in dire need of comprehensive security measures. The ideal candidate will have a strong background ...

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    5 bids

    I'm in need of an expert in network security to focus on defending against unauthorized intrusions in my business operation. Network security is the crucial area to address and has a significant part in my project. I want a professional who can ideally: - Implement a robust network security system that fends off unauthorized intrusions - Prioritize security for our remote embedded systems Experience in dealing with remote embedded system's security, and a proven track record in successfully defending against intrusion, is highly desirable for this project. Your proposal should highlight your relevant skills and past experiences in network security. Please provide information on your approach and estimated timeline for the project.

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    5 bids

    I am seeking a skilled network administrator to help me with a specific firewall configuration on my Asus Dr 68-R router. This configuration includes the following specific requirements: - Set up a firewall rule that blocks all incoming DNS requests except for those from the Cloudflare DNS servers. This is to ensure that my internet filtering remains effective, despite efforts by my kids to bypass it by changing their DNS servers. - Implement content filtering in the configuration to ensure that the internet access is still secure and appropriate for my children. These configurations need to be implemented at the router level, as this is where the issue is originating. The ideal candidate for this job will have: - Profound experience in working with Asus routers, particularly the Dr 68-...

    $119 (Avg Bid)
    $119 Avg Bid
    19 bids

    Are you a seasoned freelancer with expertise in resolving connectivity issues and a solid background in drone building? If so, I need your help! I'm currently working on a drone project that involves integrating Siyi cameras with the Herelink V1.1 system to enable live streaming. However, I've encountered persistent connectivity issues when attempting to connect via Ethernet cable. Despite my best efforts, I haven't been able to establish a stable connection. I'm seeking an expert who possesses a deep understanding of networking protocols, camera systems, and drone technology. Your task will be to troubleshoot the connectivity issue and devise a solution that ensures seamless live streaming from the Siyi cameras to the Herelink V1.1 system. Key Requirements: Profici...

    $75071 (Avg Bid)
    $75071 Avg Bid
    2 bids

    I need a skilful Technology Marketing person who has a deep understanding of IT Managed-Services companies. Your role includes: * Daily social media postings on LinkedIn, Google Local, Facebook, and Twitter. The content should focus on engaging and interesting topics such as industry news, product updates, customer testimonials, thought leadership, and Security / Risk. * Organising/marketing webinars to appeal to our audience. * Posting and updating Wordpress pages with fresh, relevant content. * Create how-tos posts for existing clients * Regularly contact our sales, project, support, and account management teams to determine new marketing ideas Ideal Skills and Experience: * Comprehensive knowledge in IT managed services. * Proficiency in English and strong copywriting skills. * Solid...

    $15 / hr (Avg Bid)
    $15 / hr Avg Bid
    42 bids

    Recommended Articles Just for You

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Learn how to find and work with a top-rated Google Chrome Developer for your project today!
    15 MIN READ
    Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.
    15 MIN READ