Web Security Jobs
PHP is a widely-used, open-source scripting language that is specifically designed for web development. PHP Developers can create dynamic websites and applications, integrate various APIs, optimize your site, and much more. By hiring a PHP Developer on Freelancer.com, you will gain access to skilled professionals who can help bring your web-based project to life. Here's some projects that our expert PHP Developers made real:
- Development of customized WordPress websites and themes
- Creation of bespoke web applications and software
- Designing high-converting landing pages
- Building interactive quiz apps for various purposes
- Implementing marketing funnels and e-commerce platforms
- Integrating iframe content into websites seamlessly
As you can see, our experienced PHP developer pool has made clients' dreams into reality by tailoring their skillset to a wide range of web development projects. PHP developers can turn your idea into a functional, user-friendly website or web application that will leave a lasting impression on your customers.
To take advantage of the expertise offered by our network of talented PHP developers on Freelancer.com, simply post your project and connect with skilled professionals from around the world. Don't wait any longer - let our expert PHP developers turn your ideas into tangible web solutions!
From 186,308 reviews, clients rate our Web Security Experts 4.88 out of 5 stars.Hire Web Security Experts
Project Description: I am looking for a skilled freelancer to clean my infected website and remove the virus that is showing on Virus Total. The website is built on HTML and PHP. Requirements: - Expertise in website security and malware removal - Experience with cleaning infected websites and removing viruses - Knowledge of HTML and PHP - Familiarity with Virus Total and its scanning tools Additional Information: - I have a backup of my website, so the freelancer can work on cleaning the infected site without worrying about data loss. - I have access to my hosting provider, which will facilitate the process of removing the virus and implementing security measures.
I am in need of a security expert who specializes in network security. The project involves ongoing security management for a medium-sized network comprising 11-100 devices. Skills and Experience Required: - Expertise in network security, with a focus on protecting against potential threats and vulnerabilities - Experience in conducting regular security assessments and implementing necessary measures to ensure network security - Proficiency in configuring and monitoring network devices, such as firewalls, routers, and switches - Knowledge of industry best practices and standards for network security - Ability to identify and respond to security incidents promptly - Familiarity with network protocols and their potential security risks - Strong problem-solving and analytical skills to tro...
I am looking for a developer who can host my website on a Hostinger VPS server. Here are the project requirements: Hosting Platform: Hostinger - The developer should have experience with Hostinger and be able to set up the website on their VPS server. Domain Name: Yes, I have a registered domain name. - The developer should be able to connect the domain name to the Hostinger server. Additional Services: Yes, I require site maintenance, security, and SEO optimization. - The developer should have knowledge and experience in providing these services to ensure the website is well-maintained, secure, and optimized for search engines. Skills and Experience: - Experience with and hosting websites on Hostinger VPS server. - Ability to connect a domain name to the hosting server. - Knowledge ...
I have a Mern project that will be hosted on aws, i would like a security consultation and possible follow up work. Your focus will be on proactivley suggesting security provisions and grading those suggestions as, essential, conventional, reccomended, optional and good to consider when you have a 1,000,000 users etc. lol
I hate this one above I have asked for it to fixed and many occasions. I want it to look like this one need to add links to new page WebPicID Member Services Welcome rayRayray222 Your Pay Code is : AA008 Services Utilities Employment Opportunities Family Protection Account Statement Act as an Agent IDTFLR Identity Theft Fraud Loss Reduction Fee Structure Pre Registration Payment options Notification Refer an organization Safe Purchase Paycode Sign Up an organization with WebPicID Secure Message Profile Share WebPicID with an organization VIDOTN Verified Identity Over The Net Transaction Security
Hi, we developed a new web portal and need to test it's security, so we need to: - Perform a VA (Vulnerability Assessment) and generate a report containing the list of vulnerabilities found and the raccomended actions to fix them; - Perform a Penetration Test and generate a report containing the list of issues found and the raccomended actions to fix them. This is the list of common tests that must be executed (at least theese, but you can perform more tests): Fingerprint web server software Analyze HTTP headers for security misconfiguration Check the security of HTTP cookies Check the SSL certificate of the server Check if the server software is affected by known vulnerabilities Analyze for interesting URLs Check whether a client access file exists, and if it contains a wildcard e...
Key Requirements: UI Conversion: Convert the existing chatbot UI to a WordPress plugin, ensuring a seamless integration with the WordPress platform. Token based Authorization and Authentication: When users install and activate the plugin, they will be prompted to enter the provided token and their registered email. Verify the authenticity of the provided token and email to control access to the chatbot functionality. The chatbot UI will be displayed only if the entered token and email match the records. WordPress Integration: Ensure compatibility with the latest WordPress version. Integrate the plugin into the WordPress dashboard for easy configuration. Scalability: Design the plugin in a scalable manner to accommodate future updates and feature enhancements. Documentation: Provide...
Send me message firstly please to discuss the details. I am seeking an ethical hacker with expertise in web application security. The project entails both assessment and solution implementation. I am open to any programming languages and tools that the freelancer is proficient in. The ideal candidate should have a strong understanding of web application security and be able to effectively identify vulnerabilities and provide solutions to mitigate risks. Experience in network security and wireless security is a plus.
Project Description: remove the ip from the blacklist called UCEPROTECTL3
We suffer under attacks because of competitors who attack you ads budgets and waste them so that we dont get form submissions.
Project Title: Delete a fake website Project Description: As a client, I am in need of assistance to delete a fake website named that has been causing harm to many authors around the world by pretending its a scopus indexed but its a fake one or posing a threat. I have answered a few questions regarding the project to provide a clear understanding of the requirements. Backend Access: No Unfortunately, I do not have access to the website's backend, making it necessary for a skilled professional to handle the deletion process. Hosting Provider Knowledge: No I am not aware of the hosting provider for the website. Therefore, expertise in identifying and dealing with different hosting providers is crucial. Reported Issue to Law Enforcement: Yes I have already reported this issue...
Secure client facing AWS environment I am looking for a skilled AWS developer to design and build a secure client facing environment template which must accept and manage business confidential information to support a SaaS analytics tool. We anticipate using the following AWS services: - EC2 - S3 - RDS The project requires advanced security measures to ensure the highest level of security compliance. The project needs to be completed within 2 months.
Project Description: I am looking for a freelancer who can create a WIFI URL link that will provide internet access to more than 100 users with standard security measures in place. Purpose of the WIFI URL link: - The primary purpose of the WIFI URL link is to provide internet access to users. Expected user load on the WIFI link: - The WIFI link should be able to handle more than 100 users simultaneously. Security requirements for the WIFI link: - The WIFI link should have standard security measures in place to ensure the safety of the network and user data. Ideal skills and experience for the job: - Experience in creating and configuring WIFI networks - Proficiency in network security protocols - Knowledge of managing high user loads on a WIFI network - Familiarity with setting up...
I am in need of an Outlook365 Security Expert who can help me secure my environment. The ideal candidate should have expertise in implementing specific security measures such as Data Loss Prevention (DLP) policies and Microsoft Defender. I've made a thorough report on all the features we need to add. We will be working closely together to get these features implemented and this project will be longterm. Skills and Experience: - Proficient in implementing Microsoft Defender and DLP policies - Familiarity with securing Outlook365 environment - Experience working with small-scale environments (1-50 users) - In-depth knowledge of existing security infrastructures and ability to modify them as needed The project requires working with an existing infrastructure, so the ideal candidate sh...
I am seeking assistance with Application Security in the field of cyber security. I require both consultation and implementation services for this project. I am open to suggestions and do not have a preferred software or technology in mind. Ideal Skills and Experience: - Strong expertise in application security and cyber security - Experience in providing consultation and implementing security measures - Knowledge of different software and technologies used in application security - Ability to assess vulnerabilities and implement effective security solutions - Strong problem-solving and analytical skills in the field of cyber security
Cyber Security Expert Needed Immediately - Specific aspect of cyber security: Network Security - Current level of organization's cyber security measures: Highly Secure - Assistance needed: Immediately - Ideal skills and experience: - Strong knowledge and experience in network security protocols and technologies - Proficient in identifying and mitigating potential network vulnerabilities - Familiarity with industry best practices and compliance standards - Ability to conduct thorough network security assessments and audits - Experience in developing and implementing robust network security strategies and policies - Proven track record in handling network security incidents and responding to cyber threats promptly - Excellent communication and problem-solving skill...
Project Title: SSL Certificate Installation for Custom-Built Website Overview: I am looking for a skilled professional who can assist me in installing an SSL certificate on my custom-built website. The SSL certificate type required is Domain Validation (DV). Requirements: - Expertise in SSL certificate installation and configuration - Familiarity with custom-built websites - Proficiency in ensuring a secure and seamless SSL certificate installation process - Attention to detail to ensure the SSL certificate is properly implemented - Ability to troubleshoot and resolve any issues that may arise during installation Skills and Experience: - Proven experience in installing SSL certificates, specifically for custom-built websites - Strong knowledge of SSL certificate types, specifically Dom...
I am looking for an experienced professional to prepare a report for ISO 27001 internal audits. These are typically performed internally but I cannot as I am a one man company. The scope of the audit will focus on ensuring compliance with the ISO 27001 standard. The primary recipient of the audit report will be the ISO 27001 assessor. The report looks to see if our settings are configured correctly, I can run through these with you in a screen share if you like. The timeline for the completion of the audit report is less than 1 month. This will be a quick job which will not take long, we have a previous audit report to work off. Skills and experience needed for this project include: - Strong understanding of ISO 27001 regulations - Experience conducting internal audits and preparin...
I am looking for an experienced professional to prepare a report for ISO 27001 internal audits. These are typically performed internally but I cannot as I am a one man company. The scope of the audit will focus on ensuring compliance with the ISO 27001 standard. The primary recipient of the audit report will be the ISO 27001 assessor. The report looks to see if our settings are configured correctly, I can run through these with you in a screen share if you like. The timeline for the completion of the audit report is less than 1 month. This will be a quick job which will not take long, we have a previous audit report to work off. Skills and experience needed for this project include: - Strong understanding of ISO 27001 regulations - Experience conducting internal audits and preparin...
Project Title: Proxy service Description: I am looking for a skilled freelancer to create a high-security HTTP proxy service with a specific location. The ideal candidate for this project should have experience in developing proxy services and be familiar with HTTP protocols and security measures. Requirements: - Develop a custom HTTP proxy service with high-level security - The proxy service should have a specific location as requested by the client - Ensure the proxy service provides secure and encrypted connections - Implement measures to prevent unauthorized access and protect user privacy Skills and Experience: - Strong knowledge and experience in developing HTTP proxy services - Familiarity with HTTP protocols and security measures - Experience in implementing encryption and secu...
Title: Ethical Hacking and Cybersecurity Expert needed for Personal Project - Project Overview: - This project is for personal use and involves exploring the field of ethical hacking and cybersecurity. - I am aware that scamming is illegal and against community guidelines, and I want to emphasize that this project is focused on ethical hacking and cybersecurity practices only. - I am open to revising my project to ensure it complies with the community guidelines. - Ideal Skills and Experience: - A background in ethical hacking and cybersecurity is essential. - Knowledge of various hacking techniques and methodologies. - Proficiency in identifying vulnerabilities and implementing effective security measures. - Experience with penetration testing and vulnerability asse...
Project Description: I am looking for a freelancer who can help me obtain the real visitor IP behind Cloudflare proxy for my website. The purpose of this is to enhance the security of my website. Skills and Experience: - Experience working with Cloudflare and understanding of its proxy setup - Proficient in PHP programming language - Familiarity with obtaining visitor IP using HTTP headers - Knowledge of security best practices for web applications - Ability to troubleshoot server issues related to Cloudflare proxy setup Project Deliverables: - A solution that accurately obtains the real visitor IP behind Cloudflare proxy - Implementation of the solution in PHP - Documentation on how the solution works and how to maintain it Note: The client has no preference for the method of obtain...
Project Description: I am looking for a freelancer who can help me obtain the real visitor IP behind Cloudflare proxy for my website. The purpose of this is to enhance the security of my website. Skills and Experience: - Experience working with Cloudflare and understanding of its proxy setup - Proficient in PHP programming language - Familiarity with obtaining visitor IP using HTTP headers - Knowledge of security best practices for web applications - Ability to troubleshoot server issues related to Cloudflare proxy setup Project Deliverables: - A solution that accurately obtains the real visitor IP behind Cloudflare proxy - Implementation of the solution in PHP - Documentation on how the solution works and how to maintain it Note: The client has no preference for the method of obtain...
I need a UK based IT specialist to look at a document that rebuts allegations that I willingly looked at inappropriate material on a computer. I need the person to look at the document and make learned comments about the validity of my rebuttals. The document is 7 pages long and I would need a 1-page statement from yourself to (hopefully) reinforce my position that any inappropriate content was accessed inadvertently.
I am looking for an OT Cybersecurity Expert to secure our power grid system within a timeframe of less than a month. We require both cybersecurity assessment and implementation for this project. Specific requirements for this project include: - Securing the power grid system against cyber threats and vulnerabilities - Conducting a thorough cybersecurity assessment to identify potential risks and weaknesses - Developing and implementing effective security measures and protocols to protect the power grid system - Ensuring compliance with industry standards and regulations in the field of OT cybersecurity Ideal skills and experience for this job: - Strong knowledge and expertise in OT systems and cybersecurity - Experience in securing power grid systems or similar critical infrastructure ...
Project Title: Application Security Improvement I am in need of assistance with improving the application security measures for my organization. Specific Requirements: - The focus of this project is on application security, including the identification and mitigation of vulnerabilities within our applications. - I already have existing security measures in place, but they require improvement to ensure better protection against potential threats. - The implementation of the improved security measures should be completed within 1 month. Ideal Skills and Experience: - Strong knowledge and experience in application security, including familiarity with common vulnerabilities and attack vectors. - Proficiency in conducting security assessments and identifying vulnerabilities in applications....
I am looking for a skilled and experienced Server Admin who is very familiar with Linux, Nginx, PHP-FPM, CPU, and MEMORY. Tasks: - Troubleshooting and debugging server issues - Optimizing server performance Requirements: - Strong knowledge and experience in Linux, Nginx, PHP-FPM, CPU, and MEMORY - Ability to troubleshoot and debug server issues efficiently - Experience in optimizing server performance Maintenance: - Regular server maintenance is required Communication: - Preferred method of communication for discussing server-related issues is chat messaging.
I am looking for a Certified Ethical Hacker with the CEH and/or CompTIA PenTest+ certification. The primary goal of this project is to conduct an onsite grey hat Vulnerability Assessment of a web based application in Atlanta, GA and provide a report including findings and remediation recommendations. The customer requires that the testing be done on-site. An NDA with the customer will also be required. Please provide a resume, copy of certification(s), hourly/daily/weekly rates and references if interested. Once received and reviewed, more details of the project will be provided directly.
I am in need of assistance as one of my sites has recently been attacked by malware and now rendered the other sites on the same hosting package offline. Security Measures: I have not taken any steps to secure my website after the attack, so the ideal candidate should be able to implement necessary security measures to prevent future attacks. The below has come from my hosting company. ********************************************************************************* (A) Disinfecting or deleting the malicious files 1. Open the indicated link in your browser and use the access data for your primary SFTP user for authentication. Alternatively, you may also use an FTP client (such as FileZilla) to open the file in the ./logs/forensic/ directory. 2. The log file will contain additional inf...
I have a guide to follow. I will share the documentation
I am looking for a skilled professional who can conduct a penetration testing on a Metasploitable VM using a Kali VM. Purpose of the attack: - The main objective of this project is to perform penetration testing to identify vulnerabilities and weaknesses in the system. Report detail: - A detailed report is required after the attack, including step-by-step documentation and screenshots of the process. Number of vulnerabilities: - The focus will be on targeting 1-3 vulnerabilities in the system. Skills and experience required: - In-depth knowledge and experience in penetration testing and ethical hacking. - Proficiency in working with Metasploitable VM and Kali VM. - Strong understanding of different attack vectors and techniques. - Ability to document findings and create detailed repor...
I am looking for a skilled System Administrator/ Website Infrastructure Administrator who has experience with Windows operating system. Tasks to be performed on the system include: - Optimization and Performance Improvement to enhance the website's speed and efficiency. - Troubleshooting and Issue Resolution to identify and resolve any technical issues that may arise. - General Maintenance and Updates to ensure the system is up-to-date and functioning properly. ### **Job Title: Systems Administrator / Web Infrastructure Administrator** **Responsibilities:** 1. **Web Server Management:** - Configure, deploy, and maintain web servers (e.g., Apache, Nginx, Microsoft IIS). - Ensure the availability, performance, and security of web server environments. 2. **Infrastructure Conf...
I am looking for a skilled professional who can help me find and delete a malicious code on my WordPress website. Platform: WordPress Malicious Code Information: I know exactly what the code is and I need it to be completely removed from my website. Backup: I do have a backup of my website, but I would like the code to be found and deleted instead of restoring from the backup. Ideal Skills and Experience: - Strong knowledge and experience with WordPress - Expertise in identifying and removing malicious code - Familiarity with website security measures - Attention to detail and ability to thoroughly search and clean the website code
Upgrade from TLS 1.2 to TLS 1.3 and open SSL for Ubuntu Nginx Server - We are currently using Ubuntu 16.04 - We have an Nginx Server and Python 3 running on it. - Currently we have an application hosted on the server which uses few external libraries. Expectation is that the upgrade should not affect the working of current application. So to keep the application running some external libraries may need to be re-installed. - We have our developer who would be assisting you regarding the dependencies and the server changes will have to be done in her virtual presence. - The timeline for this project is immediate Ideal Skills and Experience: - Strong experience with Ubuntu and Nginx server administration - In-depth knowledge of TLS protocols and security - Ability to troubleshoot and resol...
System Admin - Linux - Server Maintenance We are looking for a skilled system administrator with experience in Linux operating system to assist us with server maintenance tasks. Specifically, we need assistance with: - Regular server updates and patches - Performance monitoring and optimization - Troubleshooting and resolving server issues - Managing server backups and data restoration Ideally, the candidate should have: - Strong knowledge and experience in Linux administration - Proficiency in server security measures and best practices - Familiarity with data management tools and techniques Please note that there are specific software or applications that need to be maintained, and we will provide the necessary details to the chosen candidate. If you are experienced in Linux system...
Hello, so I had bought an script of a blog cms system which is great but it needs some modifications and improvements. The script is this one please check it out before applying for this project: Project requirements: Improve and optimize the system of this blog for best loading speed once all is finished it should be mobile, desktop compatible. Make a logo for the site. Change the design of the website things like colors, positions and etc. More will be explained once you apply to the job and send me a message. What it needs to be added is a giveaway system which should include. Giveaway status which is an option to disable it or enable it, giveaway points per action there will be different actions and each should be having a reward I should be able to set, giveaways: includes image, ti...
I am looking for a freelancer who can help me examine the pfsense router configuration backups in order to assess security vulnerabilities. I have a specific security concern in mind, and I am worried about unauthorized access, data leakage, and malware attacks. The ideal candidate for this project should have experience in network security and expertise in PFSense router configuration. or each of the downloaded configuration backup files, review the configuration in the backup to determine if there are unusual settings that may indicate compromise. Some of the kinds of things you should be checking for could include the following: Look for obviously invalid or unusable IP addresses Look for suspicious services configured Look for accounts which are suspicious Look for administrative acces...
Title: Proxy Expert for Enhanced Online Security and Access Project Description: I am searching for a knowledgeable professional well-versed in the intricacies of proxies to enhance the security and accessibility of our online activities. As our reliance on online platforms grows, I require an expert who can implement and manage proxies effectively for various purposes. Scope of Work: Proxy Setup and Configuration: Configure and set up proxies to ensure secure and anonymous online browsing. Optimize proxy settings for maximum performance and reliability. Security Measures: Implement measures to safeguard against potential security threats and unauthorized access. Provide recommendations for enhancing overall online security using proxies. Geo-Blocking Solutions: Develop strategies ...
YOU MUST HAVE A OSCP CERTIFICATION TO QUALIFY! I am looking for an OSCP certified cybersecurity expert to provide live training sessions for OSCP (Offensive Security Certified Professional) certification. The ideal candidate should have advanced cybersecurity experience and expertise in network security. Specific topics that need to be covered in the training include: - Network security techniques and best practices - Vulnerability scanning and penetration testing - Windows Network Traversal The training sessions are expected to be conducted over 1-3 live sessions, depending on the depth and complexity of the topics covered. Skills and experience required for this project: - Advanced knowledge of network security principles and techniques - Experience in conducting cybersecurity traini...
Project Title: Website Virus Removal and Page Restoration I am looking for a skilled developer to help me remove a virus on my Laravel website that is causing specific pages to be replaced with another page. Website Type: - The website is built using Laravel framework. Backup: - I have a backup of my website available. Problem Identification: - The virus is replacing specific pages on my website, and I have identified the affected pages. Skills and Experience: - Experience in Laravel development and website security. - Expertise in virus removal and website restoration. - Knowledge of web security best practices. - Familiarity with identifying and resolving vulnerabilities in websites. - Strong problem-solving and troubleshooting skills. If you have the necessary skills and experien...
I am looking for a freelancer who can help me resolve the server issue with my AWS Lightsail-based website. The specific problem I am facing is that the website is not loading and I receive an error message "ERR_TIMED_OUT" when I try to access it. Ideal skills and experience for this job include: - Strong knowledge of AWS Lightsail and server management - Experience in troubleshooting website loading issues - Familiarity with error message analysis and debugging - Ability to identify and resolve server-related issues efficiently If you have the necessary skills and experience, please reach out to me to discuss the project further. Thank you.
Architecture overview, how the system interaction with external systems puts it at risk. Variation of the boundaries of the system vary from deployment In your opinion, are there locations in the architecture where too many assets reside? Analysis of your threat Model. More explanation about boundaries of the system. The purpose of this deliverable is to come up with the architecture and design of your product Your deliverable must include: ● Architecture Overview. Describe the architecture of the system. Please answer the following questions: o What are the subsystems? What does each subsystem do? o Are there subsystems that are expressly security features? (e.g. encryption, authentication) Describe these in more depth. o Consider the cost of developer mistakes in terms of subsystems...
Please Sign Up or Login to see details.
Necesito ayuda para recuperar mis datos de un ataque de ransomware
Right now, I need a application/ web extension that can classify and view the decrypted content of cookie values. It should show what information it is collecting from the website. Additionally, it needs to categorize cookies. The application/ web extension should collect cookies, view the content of cookies, see what the current website is gathering, based on Vietnamese standards, and assess if there are any violations
Me gustaría un videocurso de programación RUST, al principio con los conceptos más básicos (desde cero, desde el "hola mundo") y aumentando el nivel con cada clase, comenzando a principiantes y terminando con un dominio profesional del tema, para aprender y entender completamente cómo programar RUST nivel avanzado. La duración mínima total del curso con todas las clases debe ser de al menos 8 horas. Necesito buena calidad en la grabación y la edición del curso. Además, el contenido tiene que ser original, para poder usarlo sin restricciones. Firmaremos un contrato de cesión de derechos de autor antes de finalizar el proyecto. Obligatorio idioma ESPAÑOL