Computer Security jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on and bidding on many computer security related jobs available on the site.

Hire Computer Security Consultants


My recent searches
Filter by:
    Job State
    702 jobs found, pricing in ZAR

    I need a packttracer job to be done. Version 6.2

    R222 / hr (Avg Bid)
    R222 / hr Avg Bid
    4 bids
    CCNA Project 6 days left

    CCNA expert needed for my project

    R263 (Avg Bid)
    R263 Avg Bid
    13 bids

    I am searching network security engineer. You have to scan the vulnerabilities of my sites and fix it. So you can crack my site. If you are possible, we can work for long term.

    R2127 (Avg Bid)
    R2127 Avg Bid
    8 bids
    Cisco packet tracer 6 days left

    I need a packttracer job to be done. Version 6.2

    R222 / hr (Avg Bid)
    R222 / hr Avg Bid
    43 bids

    I need a network expert who has good knowledge of network diagram. VM work station, Routers connection etc I need at low budget. I need this work now.

    R84 / hr (Avg Bid)
    R84 / hr Avg Bid
    18 bids
    Report Writing 6 days left

    I am looking for someone to write me a report based on a research on current trend on Data Security (Preferably Law industry ). The report should include: - Interview some real persons (maybe 3/4 persons) in Law industry to gather information on data security. - Detailed information on what sort of issues companies are facing in relates to data security and security measures are taken or shou...

    R1066 (Avg Bid)
    R1066 Avg Bid
    44 bids

    YOU MUST know how to use an LMC emulator and know what it is obviously. you will need to use assmbly languages to complete a few tasks. this must be completed within 48 hours!

    R1947 (Avg Bid)
    R1947 Avg Bid
    5 bids
    PACKET TRACER 5 days left

    wide arean network for municipality

    R4428 (Avg Bid)
    R4428 Avg Bid
    21 bids

    i want results of parameter [url removed, login to view] drop ratio [url removed, login to view] deliver ratio [url removed, login to view] [url removed, login to view] loss. [url removed, login to view] to end [url removed, login to view] flow overhead. [url removed, login to view] Routing Overhead. case1:- deploy 100 static nodes. implement AODV or DSR protocol. Get values for1,2,3,...

    R1928 (Avg Bid)
    R1928 Avg Bid
    2 bids

    I have many IEEE papers that need editing according to feedbacks. please pid per hour or per two pages Proofreading and LaTex experience are needed

    R240 (Avg Bid)
    R240 Avg Bid
    17 bids

    need a developer who can create a proxy server , that server provide internet to customers , this sever has detailed filters to be selected from the provider , and also costumers can pay a fee for having every single surfed website authorised by a server and that is in relation to there preferences so i could be a broad band provider with this idea for religious peoples who has this e...

    R12977 (Avg Bid)
    R12977 Avg Bid
    13 bids

    necesitamos especialista en mantenimiento servidor dedicado y vos bajo en y centos. También auditor de seguridad y configurar los servidores para evitar hackeos.

    R1959 (Avg Bid)
    R1959 Avg Bid
    13 bids
    Nash Equilibrium report 5 days left

    Report about Ransomeware malware if you are familiar with zero-sum games and Nash Equilibrium please contact me , otherwise please don't.

    R351 (Avg Bid)
    R351 Avg Bid
    10 bids

    Explain the method as well as the interpretation of the results. Quote your answer with uncertainty to within the 95% confidence interval (2-alpha)

    R5395 (Avg Bid)
    R5395 Avg Bid
    23 bids

    Dear all, I have 2 servers, one dedicated for MS Exchange and the other acts as a domain and active directory that serves the MS Exchange server. I need someone who is an expert in security especially with Windows Server and even more specific for MS Exchange environment. Based on the case illustrated earlier, I need to use [url removed, login to view] as its a FREE firewall for MS exchange ser...

    R721 (Avg Bid)
    R721 Avg Bid
    8 bids
    Networking 5 days left

    Create a few networks in cisco PT

    R1310 (Avg Bid)
    R1310 Avg Bid
    39 bids

    computing security ,computing security ,

    R1440 (Avg Bid)
    R1440 Avg Bid
    16 bids

    I need a freelancer who may help in installation of any one VM Workstation( I think, it is easy ), Virtual Box, GNS3, NS2, Mat lab, OmNet++ or UNL ( Any one ) and Help in network map (diagram) it is low budget work

    R60 / hr (Avg Bid)
    R60 / hr Avg Bid
    14 bids
    Peer to peer network 4 days left

    Implementation of a structured peer to peer networks that is organized into a hypercube. more info:: The p2p network contains nodes which are simulated as threads, and the threads will be organized into hypercubes. The threads will organize to form peer to peer network. The threads will communicate via broadcast to share information and data lookups. More of the details of the job is in a p...

    R1522 (Avg Bid)
    R1522 Avg Bid
    8 bids

    In need of an expert that specializes in cyber security. Will need to perform a comprehensive analysis to determine if there has been a data breach, if so, assess the damage, and establish a plan with a set of protocols to optimize security to prevent any potential future intrusions. Potential Breaches include: Email-Google, Yahoo, Workspace Google Drive Mobile Device To name a few.......

    R4073 (Avg Bid)
    R4073 Avg Bid
    11 bids

    Top Computer Security Community Articles