Internet Security Jobs
Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.
Here's some projects that our expert Internet Security Experts made real:
- Developing security protocols for actors in online communications
- Implementing technical solutions to protect company email addresses against malicious entities
- Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
- Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
- Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
- Troubleshooting WordPress security issues to safeguard companies from hackers
- Cleaning up any threats of malware and safeguarding websites against future infections.
As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!
From 60,680 reviews, clients rate our Internet Security Experts 4.82 out of 5 stars.Hire Internet Security Experts
Project Title: Network Engineer Description: I am in need of a network engineer to assist with the design and implementation of a medium-sized network consisting of 10-50 devices. The ideal candidate will have experience in network design and implementation, as well as the following skills: - Network troubleshooting: The ability to identify and resolve any network issues that may arise during the implementation process. - Network security: Knowledge of best practices for securing the network and ensuring data protection. - Strong understanding of network protocols and technologies. - Familiarity with network hardware and software. - Excellent communication and problem-solving skills. As there is no existing network infrastructure, the engineer will need to start from scratch and create ...
Upgrade Ontario Drivers License I am looking for a change of class for my Ontario drivers license. I am not sure if I need assistance with the entire process or specific aspects only. I do not require any additional services like exam preparation or vehicle rental for the test. Ideal Skills and Experience: - Knowledge of the Ontario drivers license system and regulations - Experience in assisting with license upgrades and changes of class - Ability to provide guidance and support throughout the process
I am looking for a Certified Ethical Hacker with the CEH and/or CompTIA PenTest+ certification. The primary goal of this project is to conduct an onsite grey hat Vulnerability Assessment of a web based application in Atlanta, GA and provide a report including findings and remediation recommendations. The customer requires that the testing be done on-site. An NDA with the customer will also be required. Please provide a resume, copy of certification(s), hourly/daily/weekly rates and references if interested. Once received and reviewed, more details of the project will be provided directly.
I am in need of assistance as one of my sites has recently been attacked by malware and now rendered the other sites on the same hosting package offline. Security Measures: I have not taken any steps to secure my website after the attack, so the ideal candidate should be able to implement necessary security measures to prevent future attacks. The below has come from my hosting company. ********************************************************************************* (A) Disinfecting or deleting the malicious files 1. Open the indicated link in your browser and use the access data for your primary SFTP user for authentication. Alternatively, you may also use an FTP client (such as FileZilla) to open the file in the ./logs/forensic/ directory. 2. The log file will contain additional inf...
I am looking for a skilled professional who can conduct a penetration testing on a Metasploitable VM using a Kali VM. Purpose of the attack: - The main objective of this project is to perform penetration testing to identify vulnerabilities and weaknesses in the system. Report detail: - A detailed report is required after the attack, including step-by-step documentation and screenshots of the process. Number of vulnerabilities: - The focus will be on targeting 1-3 vulnerabilities in the system. Skills and experience required: - In-depth knowledge and experience in penetration testing and ethical hacking. - Proficiency in working with Metasploitable VM and Kali VM. - Strong understanding of different attack vectors and techniques. - Ability to document findings and create detailed repor...
I am looking for a freelancer who can help me examine the pfsense router configuration backups in order to assess security vulnerabilities. I have a specific security concern in mind, and I am worried about unauthorized access, data leakage, and malware attacks. The ideal candidate for this project should have experience in network security and expertise in PFSense router configuration. or each of the downloaded configuration backup files, review the configuration in the backup to determine if there are unusual settings that may indicate compromise. Some of the kinds of things you should be checking for could include the following: Look for obviously invalid or unusable IP addresses Look for suspicious services configured Look for accounts which are suspicious Look for administrative acces...
Title: Proxy Expert for Enhanced Online Security and Access Project Description: I am searching for a knowledgeable professional well-versed in the intricacies of proxies to enhance the security and accessibility of our online activities. As our reliance on online platforms grows, I require an expert who can implement and manage proxies effectively for various purposes. Scope of Work: Proxy Setup and Configuration: Configure and set up proxies to ensure secure and anonymous online browsing. Optimize proxy settings for maximum performance and reliability. Security Measures: Implement measures to safeguard against potential security threats and unauthorized access. Provide recommendations for enhancing overall online security using proxies. Geo-Blocking Solutions: Develop strategies t...
Title: Proxy Expert for Enhanced Online Security and Access Project Description: I am searching for a knowledgeable professional well-versed in the intricacies of proxies to enhance the security and accessibility of our online activities. As our reliance on online platforms grows, I require an expert who can implement and manage proxies effectively for various purposes. Scope of Work: Proxy Setup and Configuration: Configure and set up proxies to ensure secure and anonymous online browsing. Optimize proxy settings for maximum performance and reliability. Security Measures: Implement measures to safeguard against potential security threats and unauthorized access. Provide recommendations for enhancing overall online security using proxies. Geo-Blocking Solutions: Develop strategies ...
YOU MUST HAVE A OSCP CERTIFICATION TO QUALIFY! I am looking for an OSCP certified cybersecurity expert to provide live training sessions for OSCP (Offensive Security Certified Professional) certification. The ideal candidate should have advanced cybersecurity experience and expertise in network security. Specific topics that need to be covered in the training include: - Network security techniques and best practices - Vulnerability scanning and penetration testing - Windows Network Traversal The training sessions are expected to be conducted over 1-3 live sessions, depending on the depth and complexity of the topics covered. Skills and experience required for this project: - Advanced knowledge of network security principles and techniques - Experience in conducting cybersecurity traini...
Project Title: Website Virus Removal and Page Restoration I am looking for a skilled developer to help me remove a virus on my Laravel website that is causing specific pages to be replaced with another page. Website Type: - The website is built using Laravel framework. Backup: - I have a backup of my website available. Problem Identification: - The virus is replacing specific pages on my website, and I have identified the affected pages. Skills and Experience: - Experience in Laravel development and website security. - Expertise in virus removal and website restoration. - Knowledge of web security best practices. - Familiarity with identifying and resolving vulnerabilities in websites. - Strong problem-solving and troubleshooting skills. If you have the necessary skills and experien...
I have 2 computers at my home office that I would like to be able to connect to share files. These are connected by way of an ethernet cable thru a Netgear GS305 switch. Note these 2 computer were previously connected to my office network and so the previous setup will be to be removed.
Project Title: Fix the website being redflagged by antivirus for users Description: I am looking for a skilled developer to fix the issue of our website being flagged by Mcafee antivirus for users. We need to ensure that our website is safe and accessible for all users without any threat detection. Ideal Skills and Experience: - Experience in website security and fixing issues related to antivirus flagging - Proficiency in Mcafee antivirus software and understanding its threat detection mechanisms - Strong knowledge of web development and coding languages - Ability to analyze and troubleshoot website code and content to identify potential threats - Familiarity with website hosting and server configurations - Excellent communication skills to understand and address any concerns or quest...
Project Title: Host a project in my c-Panel I am looking for a freelancer who can help me host my eCommerce website on my c-Panel. Website Type: - The website is an eCommerce platform. Ready Files: - I have some of the necessary files ready for hosting, but not all of them. Security Level: - I require advanced security measures for my site. Ideal Skills and Experience: - Experience in hosting eCommerce websites. - Familiarity with c-Panel and its functionalities. - Knowledge of advanced security measures for websites. - Ability to troubleshoot and resolve any hosting-related issues. - Strong communication skills to ensure smooth collaboration.
I am looking for an experienced freelancer who can help me protect my website from DDoS attacks. The purpose of this project is to enhance the security measures and ensure the website is well-protected. Skills and Experience: - In-depth knowledge of DDoS attack prevention and mitigation techniques. - Experience implementing Cloudflare security measures to protect websites. - Ability to create and implement effective security policies for Pleask servers. - Familiarity with the latest security best practices and emerging threats. The current security measures in place need improvement, so the freelancer should be able to assess the existing setup and make necessary enhancements. This project requires immediate attention, as the website is at risk of DDoS attacks. Should work with Remote...
Project Title: Ethical hacker I am looking for an ethical hacker who can assist me with penetration testing, vulnerability assessment, and social engineering for my Instagram account. Skills and Experience: - Extensive knowledge and experience in ethical hacking and cybersecurity - Proven track record of successful past work in similar projects - Ability to provide detailed project proposals outlining the approach and methodology - Familiarity with Instagram's security features and vulnerabilities - Strong problem-solving and analytical skills Access Level: The freelancer should be able to gain access independently without any provided access credentials. Please include your past work and experience in your application.
I am looking for an ethical hacker who can assist me with my cybersecurity needs, specifically in the area of social media security. Specific goals have been set for this project, and I am seeking an experienced hacker who can help me achieve them. The timeline for this project is immediate, and I would like to have it completed within a week. Ideal skills and experience for this job include: - Proficiency in network security and web application security - Experience with social engineering techniques - Knowledge of social media platforms and their security vulnerabilities - Ability to identify and mitigate potential risks and threats in the social media environment If you have the necessary skills and experience in these areas, please reach out to me with your proposal. Thank you.
Protective Measures against Phishing Attacks Project Overview: - I am seeking a skilled professional to assist me in safeguarding my online presence against potential phishing attacks. - I am unsure if I have clicked on any suspicious links recently and have noticed any unusual activities on my devices or accounts. - I primarily use both desktop/laptop and mobile devices, making it essential to secure both platforms. Project Requirements: 1. Phishing Detection and Prevention: - Conduct a thorough analysis of my devices, accounts, and internet browsing history to identify any potential phishing attempts. - Implement robust measures to detect and prevent phishing attacks on both desktop and mobile devices. - Provide recommendations for security software or browser extensions that ...
I need someone to conduct vulnerabilities tests against a website and gain admin access to it.
I am looking for a freelancer who can assist me in setting up a VPN in my network switch with a public IP address. The project details are as follows: Network Switch: - The network switch I am using is Cisco. Public IP Address: - I already have a public IP address for the network switch. VPN Purpose: - The primary purpose of the VPN setup is for remote access. with 2 Scanario . 1) Cisco Switch which has Statistic Public Ip to assign a Remote Public Ip to another Cisco Switch 2) From the Same Cisco Switch we should be able to get other Laptops COnnected with out without Dynedns ( i have done this but needs improvement) Skills and Experience: - Experience in setting up VPNs in Cisco network switches. - Knowledge of configuring public IP addresses. - Understanding of remote access VP...
I am looking for a skilled professional to conduct security testing for my web application. The ideal candidate should possess the following skills and experience: - Strong knowledge of web application security testing - Familiarity with java based applications and their potential vulnerabilities - Experience in identifying and addressing security concerns - Expertise in providing recommendations and advice for enhancing security measures If you have the necessary skills and expertise in web application security testing, DB & application penetration test please submit your proposal.
I am looking for a freelancer who can assist me with a Wireshark analysis project. The purpose of this analysis is to conduct a security analysis of my network. I have specific protocols and traffic types that I would like to be analyzed. I require a detailed report with recommendations based on the analysis. Skills and Experience: - Strong knowledge of Wireshark and network analysis - Expertise in conducting security analysis - Ability to provide detailed reports with recommendations - Familiarity with various protocols and traffic types for analysis
I am looking for a freelancer who can troubleshoot the Unifi network connectivity issues I am experiencing on my home network. Skills and Experience: - Experience in troubleshooting network connectivity issues - Knowledge of networking protocols and troubleshooting tools - Familiarity with home networks and their configurations - Understanding of IoT devices and their connectivity requirements Specifically, the freelancer should be able to: - Identify and resolve any network connectivity issues affecting my home network - Ensure a stable and reliable internet connection - Troubleshoot any security vulnerabilities that may be present on the network - Provide recommendations for improving the network's performance and security The devices connected to my network include IoT devices ...
Project Description: VPS Linux Proxy Operating System: Windows Primary Purpose: Anonymity Timeline: Within a month Skills and Experience Required: - Expertise in setting up and configuring VPS on Windows operating system - Strong knowledge of proxy servers and their functionalities - Experience in implementing and managing anonymous proxies - Familiarity with security protocols and techniques to ensure anonymity - Ability to bypass geo-restrictions and ensure seamless browsing experience - Proficiency in troubleshooting and resolving any issues related to proxy setup - Timely delivery of the project within the specified timeline
I am seeking assistance with setting up an intrusion detection system for my Wide Area Network (WAN) to enhance network security and protect against trojans. Specific requirements for the project include: - Configuration of the intrusion detection system - Testing and fine-tuning of the system - Implementation of necessary security measures to detect and prevent trojan attacks Ideal skills and experience for the job: - Strong knowledge of network security and trojan protection - Experience in setting up and configuring intrusion detection systems - Familiarity with WAN networks Preferred method of communication during the project is via email.
I am looking for a skilled professional to help me find and treat a trojan on my WordPress website. Platform: WordPress - The website is built on the WordPress platform. Origin of Trojan: Most likely free plugins - I suspect that the trojan may have originated from a specific plugin or theme, most likely a free plugin. Timeline: Within 3 days - I need the trojan to be treated within 3 days. Ideal Skills and Experience: - Experience in WordPress security and malware removal - Familiarity with identifying and resolving issues related to free plugins - Knowledge of best practices for website security and prevention of future infections
I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify and addre...
I am looking for Computer Networks experts who have experience in Network Design and Architecture. Specific requirements for the project include: - Designing and implementing a computer network infrastructure - Creating network diagrams and documentation - Configuring routers, switches, and firewalls Given an IP datagram with the fragmentation offset of 00000010110102, HLEN of 516 and the total length of 007A16, find the numbers of the first byte and the last byte of data - Troubleshooting network issues and ensuring network performance and security The ideal freelancer for this project should have: - Strong knowledge and experience in computer networks - Proficiency in network design and architecture - Familiarity with network security protocols and best practices - Ability to troubl...
I am looking for a website security tester for my organization. Specific Type of Security Testing: Vulnerability Assessment - I need someone who can conduct a thorough vulnerability assessment of my website. Report Requirement: Yes, detailed report - I would like a comprehensive report on the findings of the assessment. Ideal Skills and Experience: - Strong knowledge and experience in website security testing - Familiarity with various vulnerability assessment tools and techniques - Ability to identify and assess vulnerabilities in different areas of a website - Proficiency in generating detailed reports that highlight vulnerabilities and potential risks Note: The client did not provide any specific areas or features of concern in their website.
I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify and addre...
IAM / Identity Access Management Architect Expert I am in need of an IAM / Identity Access Management Architect Expert who is experienced in working with open source solutions. The ideal candidate will have expertise in the following areas: IAM Solution: Open Source IAM Requirements: - User Provisioning - group Provisioning - Role based access control - delegeted access control ... - department manager shall be able to provide access to his team members ... - project managers shall be able to delegate a set of their permissions to project members Organization Size: Small (1-100) Skills and Experience: - Extensive knowledge and experience in implementing IAM solutions using open source technologies - Strong understanding of user provisioning processes and best practices - Familiarit...
Please Sign Up or Login to see details.