Computer Security Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 104,427 reviews, clients rate our Computer Security Consultants 4.85 out of 5 stars.
Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    59 jobs found, pricing in USD
    Networking Expert 6 days left
    VERIFIED

    I urgently require a networking expert with a versatile skill set. The areas of networking expertise needed are not specified, but a solid understanding of key networking concepts such as routing, switching, network security, and network architecture, is highly desirable. While no specific goals are set for this project, generally, the focus tends to be on improving network performance, enhancing network security, or expanding network capacity. Therefore, any experience in these areas will be highly advantageous. In your application: - Please provide details about your past networking projects - Share any relevant experience you have - Craft a detailed project proposal Looking forward for an expert who can evaluate, innovate and enhance our networking systems.

    $71 (Avg Bid)
    $71 Avg Bid
    6 bids

    My Facebook account has been hacked and subsequently disabled. Despite my attempts at resetting the password, the issue persists. I am looking for a Facebook savvy professional who can help me recover it. Key requirements: - Previous experience in recovering hacked Facebook accounts. - Familiarity and understanding of Facebook's account recovery processes. - Ability to provide steps for enhancing account security post-recovery. Noteworthy information: - I still have access to the email and phone number associated with the account. - Unfortunately, I did not have two-factor authentication enabled on my account. In success, not only will my account be recovered, but future security will be greatly enhanced to prevent similar incidents from happening again. Candidates with a proven tr...

    $153 (Avg Bid)
    $153 Avg Bid
    6 bids

    I'm in need of a skilled professional to help me set up a secret key encryption system on my Ubuntu system. This encryption will be specifically used to protect the software and applications I'm developing. Key Requirements and Specifications: - **Purpose:** The primary aim of this project is to secure my confidential software and applications through the implementation of an effective secret key encryption system on my Ubuntu system. - **Specific Requirements:** I don't have any specific requirements for the system implementation, hence I seek an expert to recommend and configure the most suitable setup. Ideal Skills and Experience: - Proficiency in Ubuntu systems and encryption methods - Experience in implementing encryption systems, particularly for software and appli...

    $77 (Avg Bid)
    $77 Avg Bid
    9 bids

    I need a skilled individual to help me design and configure a network using Cisco Packet Tracer. - Tasks: - Network Design: Creating a structured and efficient network layout. - Configuration: Setting up the routers and switches for optimal performance. - Purpose: - Although the purpose of the network design and configuration wasn't specified, I'm looking to make sure the network is operational and secure. - Requirements: - Extensive experience with Cisco Packet Tracer. - Strong knowledge in network design and configuration. - Ability to ensure the network is optimized for performance and security. Your help in this project would be much appreciated.

    $18 (Avg Bid)
    $18 Avg Bid
    10 bids

    My inbox has been flooded by emails from random strangers ever since I signed up for a website that, unfortunately, currently eludes my memory. This situation leads me to believe my email information was leaked or shared. Despite my efforts to address the issue by checking my email's spam folder and trying to unsubscribe from these mailings, I have had no success. What I mainly want is to get my information removed from whatever website I signed up to, so that no one can email me I am seeking a tech-savvy freelancer with experience in: - Cybersecurity - Email client operations - Investigative ability to trace back spam sources The job entails: - Identifying the root cause of the problem - Teaching me how to block unwanted emails from different senders - Offering reliable methods ...

    $14 (Avg Bid)
    $14 Avg Bid
    13 bids

    I'm looking for someone who can perform a thorough penetration test on my website, funrep.pro. I'm not sure which specific areas of the site need more attention, so I'm looking for a professional who can examine the entire platform and find any potential security vulnerabilities. The ideal candidate should be proficient in security and have extensive experience in performing penetration testing on websites. It would be a bonus if you have experience working on gambling or gaming websites. I expect a comprehensive report on the findings including recommendations on how to improve the site's security.

    $1300 (Avg Bid)
    $1300 Avg Bid
    22 bids
    Process Guide Creation 5 days left
    VERIFIED

    I'm seeking a skilled technical writer to develop a comprehensive process user guide.

    $103 (Avg Bid)
    $103 Avg Bid
    39 bids

    I am developing a secret key encryption system on Ubuntu. The primary goal is to safeguard sensitive data and enable secure communication. The encryption mechanism should provide a standard level of protection, not too basic yet not overly complex. The system will undergo frequency analysis against monoalphabetic substitution cipher, which requires a certain level of encryption strength to be effective. Key Requirements: - Implementation of a secret key encryption system on Ubuntu - Encryption strength must be set at medium level - Must be able to prevent unauthorized access through frequency analysis against monoalphabetic substitution cipher. -encryption using different cipher and modes -encryption mode - ecb vs cbc -padding, initial vector and error propagation -programming using the...

    $27 (Avg Bid)
    $27 Avg Bid
    4 bids

    I'm currently facing multiple challenges with my electronics which require immediate assistance. Firstly, my Windows laptop is operating slower than usual, frequently displaying a rotating blue circle which suggests to me that the system is always busy. On top of this issue, I cannot successfully load free antivirus software on it as the installation process continuously fails. I need someone proficient with Windows systems who can troubleshoot and resolve these problems. Secondly, I have purchased two security cameras and a video doorbell which need to be set up. I'm looking for assistance on both their installation and configuration to ensure they function perfectly and provide the intended security. The ideal freelancer for this project should have: - A strong understandin...

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    14 bids

    I'm seeking a senior-level Data Loss Prevention (DLP) expert with 8+ years of experience in the field to improve our data security. Your primary tasks will be to: - Design and implement DLP policies - Configure and monitor DLP solutions - Conduct risk assessments and provide recommendations for improvement The primary objectives of this role are to protect sensitive data from unauthorized access, monitor for potential data leaks, and ensure we’re compliant with relevant data security regulations. It's essential you're well-versed in the latest industry standards and technologies, can effectively communicate complex concepts to various stakeholders, and possess sharp analytical skills. Proven experience leading similar projects will be highly valued. REQUIREMENTS: ...

    $125 (Avg Bid)
    $125 Avg Bid
    5 bids

    I am seeking immediate technical assistance to resolve an ongoing issue with the installation of a driver for my TP-Link USB Archer T600U Nano adapter. Despite following the standard installation procedures and attempting various troubleshooting steps, I continue to face an error that prevents the driver from being installed correctly on my Windows Details:The device repeatedly shows Error Code 56 in the Device Manager after attempting to install the at updating and reinstalling the driver manually have been network troubleshooting steps have been taken without Wi-Fi option is not visible in my network settings, indicating that the adapter is not being recognized correctly by the Goals:Diagnose and resolve the driver installation the TP-Link USB adapter is recognized by the system an...

    $11 (Avg Bid)
    $11 Avg Bid
    9 bids

    I'm in need of a comprehensive monitoring system that can track the performance, security, and usage of our network. Performance Monitoring: - Keep an eye on the system's response time - Monitor the server load - Track the resource utilization Security Monitoring: - Implement Intrusion detection - Keep track of authentication logs The ideal freelancer should have: - Extensive experience in network monitoring and management - In-depth knowledge of performance, security, and usage monitoring tools - Strong understanding of security measures like intrusion detection and authentication log monitoring

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    8 bids

    I am currently dealing with the aftermath of a trolling incident. I am looking for an expert in email forensics and cybersecurity to help me identify the person who's been flooding my inbox with troll messages. Even though I successfully blocked the sender, I am confident that I know this individual personally. Hence, I need to uncover their identity. The ideal candidate for this job will have: - A solid background in email forensics - Proven experience in channel tracing and identification - Knowledge of IP tracing would be a massive plus - An ability to maintain utmost confidentiality - Excellent problem-solving abilities. Please note that this is a sensitive issue and only serious, professional freelancers are requested to bid for this project.

    $137 (Avg Bid)
    $137 Avg Bid
    8 bids

    I am in need of a proficient professional to handle the security concerns surrounding my website. Primary purpose revolves around enhancing and maintaining my site's safety. Key areas of concern are: - Safeguarding against potential malware and hacking attempts - Ensuring secure data encryption and storage - Setting up routine security audits and vulnerability assessments While the nature of the site was not specified, the main objective is to secure the site's functionality without any incident. Ideal candidates should have strong knowledge in cyber security methods, data encryption standards, and ability to conduct systematic security audits and vulnerability testing. Having experience in securing sites of multiple types is a plus.

    $357 (Avg Bid)
    $357 Avg Bid
    45 bids

    I'm seeking a highly skilled freelancer to assist with in-depth Android application security assessment. Skills in the following areas are required: Static Application Analysis: Understanding of tools like PEView, Dependency Walker (for analyzing dependencies in a Windows environment), APKTool, Androguard, or similar. Dynamic Application Analysis: Experience with tools like Process Explorer/Monitor (for analyzing processes in a Windows environment), Wireshark, or comparable tools. Code Analysis & Reverse Engineering: Proficiency in Ghidra, SMALI/BAKSMALI, dex2jar, and similar disassemblers/decompilers for Android code. Key Requirements: Proficiency in Volatility, APKTool, and Ghidra Intermediate level of experience in Android application security assessment. Ideal Skills and Ex...

    $267 (Avg Bid)
    $267 Avg Bid
    6 bids

    I'm looking for an ethical hacker with specialization in network security, web application security, and social engineering attacks to protect vital medical records online. The Job's Purpose: - Scrutinize medical records to identify errors or discrepancies - Make crucial edits and effectively remove them from a specific website Why? Simply put, it’s about maintaining utmost confidentiality. Here are the ideal skills the job requires; Key Skills: - Substantial experience in cybersecurity; network and web application security in particular - Familiarity with social engineering attacks is a plus - Feeled capcacity to review, edit and ethically hack medical records online - Sharp eye to detect discrepancies in such records If you possess the aforementioned capabilities, I ...

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    23 bids

    I am looking for an expert who can use Cisco Packet Tracer to perform a variety of tasks including network simulation, network design, and troubleshooting. Although the type of network to be simulated or designed was not specified, the project will involve the inclusion of switches and routers. Ideal candidates should be familiar with these devices and possess the necessary skills to integrate them into a comprehensive network design. Your expertise in network simulation and troubleshooting will be critical in ensuring the success of this project.

    $89 (Avg Bid)
    $89 Avg Bid
    16 bids

    I am seeking a skilled Network Administrator to convert my computer into a gaming server. My interest lies in hosting multiplayer strategy games, therefore, the professional should have a strong understanding of server setup specific to these game types. Important considerations for this project are: - Support for multiple game sessions running concurrently. - Capable of handling a maximum of 50 concurrent players. The ideal candidate will demonstrate proven experience in similar projects and possess detailed knowledge in network administration, particularly in gaming server setups. Please express your expertise in your bid proposal.

    $6 - $19
    Sealed
    $6 - $19
    6 bids

    We are seeking an experienced freelancer with expertise in networking and cybersecurity to help us find a robust solution for IP masking. Our goal is to ensure that our requests are processed successfully at the other end without being flagged as PROXY IP users. Currently, we utilize web proxies, primarily residential proxies, for various purposes. However, we encounter frequent failures when the receiving system identifies our requests as originating from PROXY IPs. Challenges: 1. IP Score Impact: We’ve observed that IP scores play a significant role in request success. While requests from CLEAN or LOW Spam Score IP addresses often pass, those from HIGH SPAM score IPs face rejection. 2. Recognition as PROXY IP: Our solution must not only allow requests to pass but also prevent them ...

    $71 / hr (Avg Bid)
    $71 / hr Avg Bid
    17 bids

    I'm in search of an Expert Ethical Hacker to assist me with my project. This role requires someone with extensive experience in the field, ideally as a penetration tester or similar. The ideal candidate should be able to perform network penetration testing, effectively test web applications and conduct vulnerability assessments. I'm looking for someone who can think like a hacker in order to uncover and fix security vulnerabilities in my systems. Please include a detailed overview of your experience in your application.

    $310 (Avg Bid)
    $310 Avg Bid
    16 bids

    I'm looking to integrate C# code for RSA encryption within the framework of the Ayushman Bharat Digital Mission. Key specifications include: - The encryption is needed for text data - It requires RSA Encryption - Key size requirement for the encryption is not provided, but guidance can be found at this helpful link: The ideal candidate for this project has a strong knowledge of C# and experience in implementing RSA encryption. They should be able to handle sensitive data and ensure maximum security standards.

    $75 (Avg Bid)
    $75 Avg Bid
    14 bids

    My system has been compromised by hackers who have networked my devices through Azure. They are using my cameras and microphones to stream me and my family to the internet, and stealing information. As a result, I have no control over my devices at this point. I am seeking an experienced professional who can assist me in removing the hackers from my systems and ensuring that my personal data is secured. Your primary focus must be on removing these hackers from the system. Key tasks include: - Investigating the extent of the hack and identifying vulnerabilities - Removing the hackers from the system entirely - Securing my personal data - Ensuring control over cameras and microphones is restored Ideal Skills and Experience: - Proven experience in cybersecurity and network security, part...

    $41 / hr (Avg Bid)
    $41 / hr Avg Bid
    7 bids

    I'm looking for a computer engineer with strong expertise in Google technologies. Key Requirements: - Proficiency in Operating Systems and Technical Skills: You should be well-versed in various Operating Systems and technical aspects to tackle the challenges of the project. - Google Technology Proficiency: You must have a deep understanding and hands-on experience with Google technologies, products, and services. Ideal Skills and Experience: - Previous experience in software development, network security, or hardware design would be a plus. - Strong understanding and experience in using multiple operating systems, particularly Windows, Linux, and macOS. - Excellent problem-solving skills and the ability to work independently and in a team. - A proactive approach to learning and ada...

    $105 (Avg Bid)
    $105 Avg Bid
    16 bids

    As an organization, we aim to significantly boost our network security. Thus, we're seeking a skilled professional capable of: - Configuring firewall - Implementing an effective Intrusion Detection System - Establishing secure remote access Unfortunately, we skipped out on specifying our preferred secured remote access service and the size of our network infrastructure during the initial stages. However, we encourage applicants to be fully versatile with VPN, SSH, RDP, and to be equipped to handle infrastructure of various sizes. Prior experience with these areas will be advantageous. Do you have what it takes to help us execute a thorough network security overhaul? If so, we want to hear from you!

    $552 (Avg Bid)
    $552 Avg Bid
    22 bids

    Project Description: We are seeking a highly skilled High-Performance Computing (HPC) Engineer with expertise in shell scripting and workflow automation to assist in the evaluation and enhancement of the Parallel Works platform. The successful candidate will need to execute various tasks involving cloud cluster management, running pre-installed workflows, and handling both basic and advanced system integrations. Experience with MPI (Message Passing Interface), Singularity containers, and batch scripting is crucial.

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    4 bids

    Project Description: We are seeking a highly skilled High-Performance Computing (HPC) Engineer with expertise in shell scripting and workflow automation to assist in the evaluation and enhancement of the Parallel Works platform. The successful candidate will need to execute various tasks involving cloud cluster management, running pre-installed workflows, and handling both basic and advanced system integrations. Experience with MPI (Message Passing Interface), Singularity containers, and batch scripting is crucial.

    $14 / hr (Avg Bid)
    $14 / hr Avg Bid
    5 bids

    I'm seeking the expertise of a professional ethical hacker who specializes in: - Network security - Web application security - Wireless security Unfortunately, I forgot to mention whether I need penetration testing, vulnerability assessment, or both. I also didn't specify the exact purpose of this ethical hacking project. Ideally, you should possess a strong ability to uncover any underlying vulnerabilities and offer strategic direction on how to heighten security measures across different platforms. Your approach should not only identify these weaknesses but also provide solutions on how to rectify them. While it's not specified, it'd be beneficial if you could also assess the effectiveness of existing security measures and provide recommendations for improvements...

    $308 (Avg Bid)
    $308 Avg Bid
    14 bids

    I'm searching for an expert in web hacking and network penetration. The core task will involve identifying potential vulnerabilities within a website and working towards fixing these loopholes, while focusing on protecting and securing a database ID and password. A successful candidate should possess the following skills and experience: - Proficient understanding of web hacking and ethical hacking - Experience in network penetration testing to identify vulnerabilities - Knowledge of password recovery techniques - Proven record in enhancing website security The ultimate goal of this project is to strengthen the current security measures on my website, and to protect sensitive data. Your work will majorly revolve around securing the database ID and password. Please, come prepared to ...

    $305 (Avg Bid)
    $305 Avg Bid
    14 bids

    I'm looking for help in enhancing the security of our project, particularly through the modification of /phpmyadmin routes. Key Requirements: - Security Enhancement: I'm looking to change specific routes in /phpmyadmin to boost the overall security of our project. - Expertise in phpMyAdmin: As an essential part of this task, you should be well-versed in phpMyAdmin and comfortable navigating its routing system. Ideal Skills and Experience: - Proficient in phpMyAdmin: Expertise in working with phpMyAdmin is a must, as you'll be modifying routing within this platform. - Security-Focused: A strong understanding of security principles, particularly when it comes to web application security, would be highly beneficial. - Communication: Clear communication skills are essential,...

    $19 (Avg Bid)
    $19 Avg Bid
    8 bids

    I need a MikroTik GRE tunnel set up urgently to enable remote network connectivity. The project involves creating a secure tunnel that links our main network to a remote location. The ideal candidate should have experience with MikroTik devices and proficiency in configuring GRE tunnels. Key requirements: - Establish a GRE tunnel between the main network and the remote location - Ensure the connection is secure and stable - Troubleshoot any issues that may arise The project has a high priority, so prompt and efficient completion is crucial. If you have the right skills and experience, please apply.

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    8 bids

    I'm looking for a skilled professional to assist me in conducting network analysis and troubleshooting, as well as port scanning and service enumeration on my local network using Netcat and Wireshark. As a part of this project, I expect the freelancer to: - Conduct a thorough analysis of my network using Netcat and Wireshark - Implement solutions for any network troubleshooting issues identified - Perform a comprehensive port scan and service enumeration on my network - Provide recommendations for improving network security based on the findings - Ensure no sensitive data is exposed in the process Ideal candidates for this project should have: - Proficiency in using network analysis tools such as Netcat and Wireshark - Strong experience in network security testing and vulnerability ...

    $177 (Avg Bid)
    $177 Avg Bid
    20 bids

    I am seeking support from a highly experienced cybersecurity(CIA) freelancer to assist in my research paper. Key objectives are: Optimal candidates should possess: - Strong writing and editing skills - A knack for structuring information effectively - The ability to create engaging and clear content however, no Chatgpt , no google Bard/Gemini, or any other AI tool. Cybersecurity CIA Analysis (2019-Present) Need in-depth analysis of CIA triad in recent research? 5 IEEE papers (2019-present) Comparative table with key insights ⚡ Fast, expert research & delivery Order now & unlock cybersecurity knowledge! Tags: cybersecurity, research, CIA, IEEE, analysis, comparison - Identifying potential vulnerabilities in multiple IoT in smart city systems - Analyzing existing cybersecur...

    $100 (Avg Bid)
    $100 Avg Bid
    32 bids

    I'm looking for a skilled network engineer who can assist in setting up a GRE tunnel on my MikroTik router. Key Requirements: - The main intent of this setup is to expand my network, so you should have a good understanding of network expansion principles. - You should be able to properly configure the GRE tunnel on MikroTik using best practices and ensure the network's optimal functionality post-setup. The ideal freelancer for this job should have experience in setting up GRE tunnels on MikroTik routers and a good understanding of network expansion strategies. A certification in networking would be a plus, but not mandatory. Look forward to receiving bids from suitable candidates.

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    5 bids
    Website Penetration Test 1 day left
    VERIFIED

    I am looking for a skilled professional to conduct a comprehensive penetration test on my website. Key Objectives: - Identify vulnerabilities: I need to ensure that no exploitable weaknesses exist that could compromise the security of my website. - Assess compliance with security standards: My website must meet industry security standards to ensure data protection and user privacy. - Evaluate potential impact of a breach: It's crucial to understand the possible consequences of a successful security breach. - Bug identification: I would also like any bugs found to be highlighted so that they can be fixed. I have not conducted security testing on the website before, so this will be the first time and it's important that the expert I hire is thorough and experienced. Ideal skil...

    $22 (Avg Bid)
    $22 Avg Bid
    14 bids

    I'm on the for someone with knowledge of web security to produce a detailed analysis report on selected CVE vulnerabilities associated with WordPress. This report is specifically for an academic project. Here are the particular CVEs for review: 1. CVE-2023-32243 2. CVE-2023-0084 I can provide the older versions of those plugins with bugs you just need to execute and create output on docker environment and add screenshots of execution showing how it exploits security and then the share the proposed mitigations in the report. You must have to cover the below mentioned points in the reports: briefly describe the architecture of the web application/framework describe the type(s) of vulnerability that is considered describe the vulnerabilities in detail describe how to exploit the vu...

    $45 (Avg Bid)
    $45 Avg Bid
    19 bids

    I'm seeking an experienced OMNET++ specialist to develop a security simulation model for Intelligent Transport Systems. Key Qualifications: - Extensive experience with OMNET++ simulations, INET, Veins, and SUMO. - Knowledge of Machine Learning and Blockchain. A deep understanding of network analysis and protocols is also necessary. - Proficient in network modeling and event simulation. Bring your knowledge of OMNET++ to create a top-notch wireless network simulation model. This is your chance to showcase your deep understanding of the complex framework of Intelligent Transport Systems. The more detailed the model, the better!

    $102 (Avg Bid)
    $102 Avg Bid
    22 bids
    LinkedIn Profile 1 day left
    VERIFIED

    I need an experienced professional to develop and optimize my LinkedIn profile. This includes: - Showcasing my skills in sales, project management and handling sales team as team leader in computer hardware - Incorporating past work within the profile. I emphasize the relevancy of showcasing my previously completed professions towards this role. - Ensuring a basic overview of my skills and experience is clear and concise. A brief yet detailed presentation is the goal here. Ideal candidates should have proven success in LinkedIn profile optimization and personal branding. Your understanding of the tech industry, especially in computer hardware sales, project management and leading sales team. Please include past work examples in your application.

    $106 (Avg Bid)
    $106 Avg Bid
    23 bids

    I am actively seeking an experienced and certified CCNA instructor to deliver an online course for me that covers networking fundamentals, routing and switching, and network security. Key tasks and responsibilities will include: - Developing and conducting online training sessions - Preparing for CCNA certification exam The ideal person must have: - Certificate in CCNA - Proven record in teaching networking - Experience with exam preparation Being an online course, punctuality and consistency in delivering scheduled sessions is highly important to me.

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    18 bids

    I'm seeking the expertise of an experienced Ethical Hacker. Your primary task would be: - Conduct a comprehensive vulnerability assessment of a mobile application Here's what you'll need for this role: - Proven understanding and experience with Local Area Network (LAN) systems - Expertise in conducting vulnerability assessments - Solid comprehension of mobile application structures and their potential security weak points. Your mission will be to identify loopholes and vulnerabilities that may exist, in order to uphold our commitment to providing a secure mobile application for our userbase. Your keen insight and detailed feedback on any potential weak points found will be instrumental to our ongoing development and fortification efforts.

    $100 (Avg Bid)
    $100 Avg Bid
    9 bids

    I'm in need of an experienced network technician that can help me identify and resolve a specific issue with my MikroTik network. The problem I'm facing is that all the computers on the network, regardless of whether they're new or old, are unable to download Windows updates. Here are some key details that can help you understand the situation better: - **Specific Issue**: The issue is specific to Windows updates. When a computer is connected to the MikroTik network, it fails to download updates. However, when the same computer is connected to a different network (like a hotspot), the updates download without any issue. - **Nature of Issue**: The problem doesn't seem to be with the individual computers, but with the MikroTik router itself. - **Recent Changes**: Whi...

    $63 (Avg Bid)
    $63 Avg Bid
    14 bids

    I have a Network Forensics work that requires me to do the following: 1. Apply a research-based approach to forensic analysis. 2. Analyse and interpret digital evidence from a variety of sources. 3. Present findings to both executive and technical audiences. I will share more details and files. Ideal Skills and Experiences: • Extensive knowledge of network forensics • Proficient in vulnerability assessment • Experience handling both real-time and historical network data • Great adaptability in their investigative approach Objectives: • Identify potential vulnerabilities in our network • Offer actionable steps to improve network security • Provide a detailed report with findings and recommendations Your thorough understanding of network forensics ...

    $356 (Avg Bid)
    $356 Avg Bid
    13 bids

    Position: Experienced Cybersecurity Professional Seeking an experienced cybersecurity professional for mentoring and guiding a student through various cybersecurity courses and projects. Requirements: - Experienced cybersecurity professional with preferable certifications such as Security+, CISSP, GSEC, SSCP, etc. - Outstanding communication skills and proficiency in English. - Strong teaching and mentoring experience. - Advanced knowledge in Network Security, Cryptography, and Ethical Hacking - Cybersecurity certification as mentioned below. - Outstanding communication abilities. - Teaching or training experience preferred but not essential - Ability to break down complex cyber security concepts. Experience: Minimum of 10 years' practical experience...

    $11 - $18 / hr
    Featured Sealed
    $11 - $18 / hr
    9 bids

    We require an ethical hacker with expertise in mobile game security. Focused specifically on player data handling, our project aims to identify vulnerabilities in our system, test the effectiveness of our security measures, and improve the overall security of our network. The ideal freelancer for this job should have: - Experience with ethical hacking. - In-depth knowledge of player data security measures. - A proven track record on mobile game security. Your duty will be to run exhaustive checks and tests to identify weaknesses and areas for improvement within our mobile game security system to ensure utmost data protection for our players.

    $36 / hr (Avg Bid)
    $36 / hr Avg Bid
    15 bids

    I'm looking for a professional who can conduct a comprehensive basic vulnerability scan on my mobile application, as well as set up continuous real-time monitoring. The project involves: - **Basic Vulnerability Scan**: The task at hand is to thoroughly investigate and identify any potential vulnerabilities in the mobile application. This requires expertise in mobile application security and penetration testing. - **Continuous Real-time Monitoring**: Following the vulnerability scan, the security expert will be responsible for setting up a real-time monitoring system. This will help in the prompt detection and mitigation of any future security threats or breaches. The ideal candidate should have: - Proven experience in cyber security, with a specific focus on mobile application sec...

    $1069 (Avg Bid)
    NDA
    $1069 Avg Bid
    18 bids

    I'm looking for a skilled penetration tester to evaluate the security of my website. - Tasks: - Perform a comprehensive security test to ensure my website is protected from potential threats. - Identify any vulnerabilities that may exist on the site. - Analyze the risks associated with the security of the website. - Key Requirements: - Expertise in website penetration testing. - Proficient in identifying and dealing with website vulnerabilities. - Able to provide a detailed report outlining the risks and necessary actions to enhance the security of the site. - Site Details: - The website is built on a Content Management System (CMS) like WordPress, Joomla, or Drupal. - The focus is primarily on identifying the admin username and password. I'm looking for some...

    $153 (Avg Bid)
    $153 Avg Bid
    25 bids
    MikroTik EoIP Tunnel Setup 1 day left
    VERIFIED

    I need assistance in setting up an EoIP tunnel between two remote networks, both of which utilize MikroTik routers. Key Points: - The primary purpose of this EoIP tunnel is to connect the two remote networks - The current equipment being used at both ends of the tunnel are MikroTik routers - Encryption needs were skipped, hence, this tunnel may or may not require encryption depending on your expertise I'm looking for a professional who is well-versed in MikroTik routers and has experience in configuring and setting up EoIP tunnels. The ideal candidate will have: - Proficiency in configuring MikroTik routers - Experience with EoIP tunnel setup - Strong understanding of network protocols and remote network connections - Ability to troubleshoot and resolve connectivity issues If you...

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    8 bids

    I am seeking a knowledgeable freelancer to deliver a well structured and robust report on Malware, Phishing, and Ransomware cyber attacks that occur prominently in Australia. This report is aimed at the general public and should therefore be written in a comprehensible and digestible manner. The goal is to provide a surveillant scan of key issues, impacts, and potential precautions, giving readers a thoughtful understanding of these cyber threats. To accomplish this project optimally, the required skills and experience include: - Proficiency in Cybersecurity and related topics - Extensive knowledge about Malware, Phishing, and Ransomware attacks - Strong research skills, with a keen focus on Australia - Excellent writing and communication skills, with experience in making technical co...

    $20 (Avg Bid)
    $20 Avg Bid
    36 bids

    Looking for a cybersecurity expert experienced with Windows operating systems. Currently struggling with serious device cloning and hacking issues that have brought operations to a standstill. My personal data has been tampered with significantly. - The freelancer should ideally be skilled in: * Advanced Cybersecurity * Windows OS * Data Protection and Recovery - The project extends beyond just solving the problem, but also educating me on the best practices to maintain optimal PC security and prevent data alteration and unauthorized access in the future. Only individuals with robust experience in dealing with hacking and data theft situations should apply. Quick turnaround time is highly appreciated, given the severity of the issues faced.

    $144 (Avg Bid)
    $144 Avg Bid
    13 bids

    I am in need of a professional that can set up a Site-to-Site EoIP tunnel using Mikrotik devices. About the Project: - The primary goal is to extend the current office network to another location. This will involve creating a secure, Site-to-Site connection. - High-level encryption is a crucial requirement for this project to ensure the security of data passing through the tunnel. Key Skills and Experience: - Profound understanding and experience in setting up network connections, especially Site-to-Site connections. - Expertise in Mikrotik devices and a proven track record in configuring EoIP tunnels. - In-depth knowledge of encryption protocols and practices, with an emphasis on high-level encryption. Note: Experience in handling similar projects will be a significant advantage and ...

    $15 / hr (Avg Bid)
    $15 / hr Avg Bid
    8 bids

    I'm seeking someone with excellent networking skills to set up a windows network for my small business. We have between 10 and 50 devices which include desktop computers and printers. Here are the specifics I need addressed: - Configuring the network to support desktop computers and printers impeccably. - Ensuring reliable internet connectivity across all devices. - Set-up should prioritize print and scan capabilities. Ideal skills and experience: - Extensive experience in setting up and troubleshooting windows networks. - Proven knowledge in managing networks with 10-50 devices, specifically desktop computers and printers. - Experience in optimizing print and scan capabilities in a network system. - Demonstrated ability in ensuring robust internet connectivity on a network.

    $26 / hr (Avg Bid)
    $26 / hr Avg Bid
    26 bids

    Recommended Articles Just for You

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Learn how to find and work with a top-rated Google Chrome Developer for your project today!
    15 MIN READ
    Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.
    15 MIN READ