Device protection through physical and software means. Security examples include software encryption, keys, and secure protocols for data transfer

Hire Security Engineers

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    6 jobs found, pricing in USD
    5th Dimension 6 days left

    To create a platform where funds can be raised for individual projects on a global scale on the blockchain. Contracts can be commissioned and completed on the blockchain. The rights will solely belong to the creator of the project, however transparency and security will be key for the protection of I.P and monitoring how the funds raised are spent. A DAO and treasury to be implemented. Token and...

    $50 / hr (Avg Bid)
    $50 / hr Avg Bid
    2 bids

    We are looking for a trainer who can give training to our USA client on both platforms of Juniper (JNCIA & JNCIE)

    $784 (Avg Bid)
    $784 Avg Bid
    2 bids

    We need a security+ trainer for our USA client. You need to train our client through zoom meeting who is IT professional. Trainer should have Good comm skills and should be comfortable with USA timings.

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    1 bids

    I am looking for an experienced Network security Engineer who can help me support in tools such as Firewalls such as Fortigate, Palo Alto, F5, IPS, Email Gateway, WAF, Proof point and Barracuda.

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    16 bids

    We have digitalocean k8s cluster. There are only 2 services running one is UI and another one is backend. I need someone to help me to install cert-manager, certificate issuer and then add certificates. So we can make my services tls enabled. Kubernetes is working perfectly. My environment is deployed in digitalocean and so please follow this tutorial ([login to view URL]) to install certificate....

    $33 (Avg Bid)
    $33 Avg Bid
    5 bids

    Using ORAM technique trying to achieve metadata while accessing data by the user at the storage node. Access control, Obliviousness, Privacy of data should be preserver through the proposed technique. Better performance , scalability should be achieved as compared to existing techniques with practical use.

    $1077 (Avg Bid)
    $1077 Avg Bid
    3 bids

    Top Security Community Articles