Computer Security Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 106,175 reviews, clients rate our Computer Security Consultants 4.85 out of 5 stars.
Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    64 jobs found, pricing in USD

    I'm seeking professional aid to recover my hacked Facebook account and investigate the incident. My main goal is to regain access to my account as well as understand the extent of the data compromised. • Assistance Required: Help me in thoroughly investigating the hacking incident and provide discoveries. I'm interested in finding out the specific types of data the hacker acquired. • Ideal Candidate: I'm seeking a professional with experience in cybersecurity, digital forensics or a related field. Proven experience in similar cases, strong understanding of Facebook's security systems and knowledge about data privacy will be significant. Familiarity with Facebook's data types would be a huge advantage. Understanding the scope of this breach is signif...

    $115 (Avg Bid)
    $115 Avg Bid
    2 bids

    I urgently require a professional ethical hacker, specifically to probe a certain website and identify any lurking vulnerabilities. The ideal candidate should possess the following: - Proven experience in ethical hacking and cybersecurity. - A knack for identifying system vulnerabilities and gleaning potential threats. - Quick response time due to the urgencies of the project. Your main assignment will be aimed at testing the security of a specific website and reporting back on any potential weaknesses discovered. Availability for immediate start would be beneficial.

    $1038 (Avg Bid)
    $1038 Avg Bid
    28 bids

    As a Wordpress site owner, I'm interested in conducting security testing with the primary aim of testing penetration resistance. I'm specifically looking to uncover any instances of ineffective firewalls, Denial Of Service attack possibilities in the security system of the website built with Elementor and WooCommerce plugins. Skills and Experience: • Expert in Wordpress security and firewall systems • Comprehensive understanding of penetration testing • Solid background in ethical hacking • Experience with Elementor and Woocommerce platforms • Ability to produce detailed reports Deliverables: • A thorough report on identified vulnerabilities, specifically related to firewalls • Recommendations for improvements in website security • Proo...

    $1994 (Avg Bid)
    $1994 Avg Bid
    35 bids
    Need penetration testing done 6 days left
    VERIFIED

    I need a technical FLwho is conversant with intricate details of cybersecurity, with a specific focus on sensor network and penetration testing, The aim of this project is to explain the principles, intricacies, vulnerabilities, and mitigation strategies of sensor networks in cybersecurity. However, the twist here is, the information needs to be broken down to a level that non-technical decision-makers can understand. More details about time frame and milestones will be discussed in the chat window. - The freelancer should have: - Deep knowledge and understanding of cybersecurity and sensor networks. - Strong technical writing skills, with proven ability to simplify complex concepts. - Experience in communicating technical ideas to non-technical audience. - The report sh...

    $14 / hr (Avg Bid)
    $14 / hr Avg Bid
    2 bids

    I have 10 MikroTik routers set up, but unfortunately, 2 of them are currently facing some issues. I need an expert in MikroTik devices to examine these two routers, verify their configurations, and correct any misconfigurations that may be causing the following problems: - No Internet Connectivity - Load Balancing not functioning properly - Packet-mark bandwidth merge issue The routers are set up with an ECMP (Equal Cost Multi-Path) load balancing method. I'll provide direct access to these routers for your convenience during the troubleshooting process. Ideal Freelancer Skills: - MikroTik Certified Expert - Proficient in ECMP load balancing - Experienced in troubleshooting MikroTik routers - Strong understanding of packet-mark bandwidth management.

    $55 / hr (Avg Bid)
    $55 / hr Avg Bid
    12 bids

    To all proficient developers with a knack for security enhancement, your expertise is required! I have an ongoing spam issue affecting various areas (registration page, comments section, contact forms) of my website - an issue I encounter daily. Here's what I already have in place: - CAPTCHA However, this hasn't been effective enough in curbing the pesky robot registrations. Looking to Work With: - An expert web developer with extensive knowledge of anti-spam technologies and website security. - Someone with prior experience in implementing Honeypot and IP blocking techniques. - Quick response rate would highly be appreciated given the frequency I'm encountering this problem. Your job will focus on: 1. Reviewing and enhancing the current CAPTCHA system. 2. Setting u...

    $158 (Avg Bid)
    $158 Avg Bid
    61 bids

    I'm in need of a highly-skilled professional who specializes in Azure Security Engineering and ForgeRock Training. Key tasks include: - Azure security configuration - Conducting vulnerability assessments - Undertaking threat hunting exercises Additionally, expertise in ForgeRock training covering the following topics will greatly benefit my team: - Identity and Access Management (IAM) - Single Sign-On (SSO) - User Provisioning The ideal candidate is required to hold an 'Azure Security Engineer Certification'. This certification will give me confidence in your capabilities to successfully execute the necessary tasks. Your adeptness in handling Azure security coupled with your ability to impart crucial knowledge in ForgeRock makes you an integral team player for my proj...

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    1 bids

    The project involves identifying, researching, and addressing a security vulnerability in a critical system/software that cannot be immediately upgraded or patched. Students must propose a topic, describe the vulnerability, and outline detection and mitigation strategies. The project spans three phases: topic proposal, vulnerability description and proposed solutions, and implementation and demonstration. Need to select a vulnerability with significant impact (5.0 or higher CVSS rating) from 2020 or newer, affecting popular OS/applications/devices. The proposal should include CVE number, vulnerability description, and proposed detection/mitigation approaches.

    $124 (Avg Bid)
    $124 Avg Bid
    13 bids

    I'm looking for a professional in ethical hacking to assist with my coursework, which specifically focuses on the area of penetration testing. Key Requirements: - Expertise in Ethical Hacking: Someone who has a strong background in ethical hacking is essential. - Familiarity with Penetration Testing: Previous experience in penetration testing will be highly valued. - Strong Communication: The ability to communicate complex technical information in a clear and concise way is crucial. The ideal candidate should not only be well versed in ethical hacking and penetration testing but also capable of explaining these concepts in a manner suitable for a coursework assignment. Previous experience in coursework assistance or academic writing could be advantageous.

    $112 (Avg Bid)
    $112 Avg Bid
    19 bids

    I'm looking for a skilled cyber security professional who can assist with ensuring the integrity and safety of our systems. The ideal candidate should have expertise in network security, application security, and data security. Key project components include: - Conducting a thorough vulnerability assessment to identify potential weaknesses in our current systems. - Performing penetration testing to simulate cyber-attacks and evaluate the effectiveness of our security measures. - Executing a comprehensive security audit to ensure that our systems are aligned with industry best practices and compliant with HIPAA, GDPR, and PCI DSS. Your role will be crucial in ensuring our organization is not only secure from cyber threats, but also in compliance with relevant regulations. Experience...

    $15 / hr (Avg Bid)
    $15 / hr Avg Bid
    4 bids

    I'm in need of a professional who can help in checking some files on my NAS server. - My issue revolves around the sudden appearance of odd and inaccessible folders named things like "RQCZN6~C". - The folders affected contain a mixture of files, mainly documents. You're ideal for this contract if you have expertise in: - NAS server file restoration and management - Document recovery and troubleshooting Preferably, you will have worked with diverse file formats and encountered similar issues before. Your problem-solving skills will truly shine in this project. Let's restore order to my documents.

    $147 (Avg Bid)
    $147 Avg Bid
    14 bids

    I'm in need of a professional who can address an issue with my digital xray setup. The expert must have experience with DRX Evolution xray. The console is unable to see the generator. Key requirements: - Diagnosing the problem: Investigating and identifying the root cause of the connection issues. - Providing a solution: Implementing a more stable and reliable connection between the console and the generator. - Testing and validation: Ensuring that the new connection resolves the issue and doesn't compromise image quality. Ideal skills and experience: - Proven expertise in xray equipment connectivity, particularly between consoles and generators. - Strong understanding of serial cable connections. - Troubleshooting skills to identify and resolve connectivity issues. - Ability...

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    1 bids

    I need a skilled h a c k e r to help recover funds that are currently inaccessible on a website. The specific details of the situation will be shared upon hiring. The successful freelancer for this job should ideally possess: - Proven experience in ethical h a c k ing or similar - Strong understanding of website security - Excellent problem-solving skills - Ability to maintain confidentiality Please apply if you have the necessary skills and experience for this task.

    $134 (Avg Bid)
    $134 Avg Bid
    3 bids

    I'm looking for an ethical hacker to carry out a comprehensive digital security sweep on my laptop, phone, Roku TV, and vehicle. The ultimate goal is to identify and eliminate any malicious software or tracking mechanisms that may have been surreptitiously installed on these devices. Key objectives are to: - Identify and eliminate any unauthorized access to my devices, which have been ongoing for more than a month. - Identify and eliminate any tracking mechanisms placed on my laptop, phone, Roku TV, and vehicle. - Diagnose and repair any unusual device behavior or performance issues that may be attributable to hacking or tracking. The ideal candidate should have: - Proven experience and expertise in cybersecurity, digital forensics, and ethical hacking. - Up-to-date knowledge of the...

    $575 (Avg Bid)
    $575 Avg Bid
    10 bids

    I'm in need of a cybersecurity expert who can delve into the source of a family cyberattacker's activities. The attacker has been visiting multiple internet platforms and spreading slanderous content targeting my family. It's a sensitive situation, and I need to uncover the identity of this cyberattacker. Key Requirements: - **Investigation**: You will be tasked with identifying the origin of the slanderous content and false accusations. This will require a thorough examination of our internet activity, identifying any unusual patterns or sources of information. - **Expertise in VPNs and Proxies**: The cyberattacker is potentially using VPNs or proxies to hide their identity. You should have experience in hacking into these services to identify the true IP address or locati...

    $473 (Avg Bid)
    $473 Avg Bid
    21 bids

    I've had a hacking attack in the past and now need to regain my peace of mind by having an ethical hacker check my devices for security. The devices to be checked are my Windows computer and Android Smartphone. Desired Skills and Experience: - Proficient ethical hacker with experience in computer and smartphone security. - Knowledge of Windows and Android operating systems. - Ability to conduct a thorough security check and provide a detailed report of the findings.

    $124 (Avg Bid)
    $124 Avg Bid
    6 bids

    I urgently need a comprehensive security check on my network and servers. In particular, the focus areas should be: - Firewall and network infrastructure - Operating systems and software - User access and permissions - Internal server coding and potential backdoors Even though I didn't specify any compliance standards for you to follow, a good understanding of common ones like PCI DSS, HIPAA, and GDPR would be beneficial. Skills and Experience: - Expertise in network infrastructure and firewall setup - Thorough understanding of different operating systems and their vulnerabilities - Experience with user access management and permission settings - Knowledge in server coding and identifying backdoors I can't stress enough the urgency of this project, it needs to be completed...

    $171 (Avg Bid)
    $171 Avg Bid
    18 bids

    I am experiencing issues with Active Directory 2016 replication in a topology that includes 10-50 domain controllers. The tasks that need to be performed include: - Diagnosing current replication problems. - Providing solutions to rectify replication issues. - Implementing troubleshooting practices to avoid future issues. The ideal freelancer for this task will have expert knowledge and experience in Microsoft Active Directory, specifically the 2016 version, and a deep understanding of domain controller topologies. They will be proficient in diagnosing and fixing replication issues and optimizing directory performance. A solid background in IT system administration is also essential for this job.

    $147 (Avg Bid)
    $147 Avg Bid
    22 bids
    Trophy icon Basic Subnetting Tutorial 1 day left

    Answer the attached question correctly, and briefly explain. using principles of subnetting. I'm looking for an expert in networking who can provide correct answer and clear and concise explanation of the attached question. Answer the attached questions, the provide table of the subnets Accepted file format Excel or Word

    $14 (Avg Bid)
    Guaranteed
    $14
    6 entries

    Project Requirements A. Implement Hatchetman attack in Contiki 3.0 B. Implement Resolution of Hatchetman attack using 2ACK scheme. C. Evaluate the solution with standard RPL (RFC 6550) under Hatchetman attack D. Detailed documentation of the steps so that it could be replicated. Details are provided in the attached PDF.

    $40 (Avg Bid)
    $40 Avg Bid
    3 bids

    We are seeking experienced Network Administrators to work on an undefined project. The specific tasks, operating systems and size of our network infrastructure has not been disclosed. If you have broad experience spanning several areas of network administration such as configuring routers, switches, troubleshooting network connectivity issues, implementing network security measures across various operating systems (Windows, Linux, MacOS) and network sizes, you might be the right fit. Please send us your proposals showcasing your comprehensive skills and versatility.

    $544 (Avg Bid)
    $544 Avg Bid
    21 bids

    I'm in need of a seasoned professional who can assist me in improving APT detection through the development of a sophisticated AI model. Additionally, your expertise will be essential in analyzing Provenance Graphs to unearth suspicious activities. Key Tasks: - APT Detection: The successful candidate should be able to enhance the current APT detection mechanisms in place through their expertise in cybersecurity and GNN. - AI Model Development: We are looking to create an advanced AI model specifically tailored for APT detection. Your experience in this area is crucial. - Provenance Graph Analysis: Your ability to analyze Provenance Graphs and identify anomalies, potentially suspicious activities, is paramount. Ideal Skill Set and Experience: - Proficiency in cybersecurity a...

    $474 (Avg Bid)
    $474 Avg Bid
    34 bids

    I need a skilled individual to assist me in completing Task 12 of the TryHackMe Windows Privilege Escalation arena. The task involves understanding the vulnerabilities and exploiting them to escalate privileges. Key requirements include: - Experience with Windows operating systems, particularly in the context of penetration testing. - Prior knowledge or experience with TryHackMe or similar platforms for cybersecurity challenges. - Proficiency in identifying and exploiting vulnerabilities, especially those related to access control, file permissions, or services. Please note that this task needs to be completed as soon as possible. It's a fairly urgent project, so quick and efficient work is crucial.

    $60 (Avg Bid)
    $60 Avg Bid
    7 bids

    I'm seeking a skilled developer with experience in Linux and networking to help create a custom openmptcprouter. The primary goal of this project is to aggregate multiple internet connections into one cohesive, high-speed network. Key Project Details: - Operating System: Linux - Primary Goal: Aggregating multiple internet connections - Types of Connections: DSL, Cable, Mobile Network Ideal Skills and Experience: - Proficiency in Linux operating system - Strong background in networking and internet connection management - Familiarity with openmptcprouter or similar technologies is a plus - Prior experience in aggregating multiple internet connections - Ability to deliver a stable, high-performance solution If you have the expertise and experience in Linux, networking, and internet ...

    $150 (Avg Bid)
    $150 Avg Bid
    16 bids

    I'm currently facing potential malware attacks causing unexpected slowdowns, particularly affecting my website load times. Hence, I'm in urgent need of a knowledgeable cyber security professional who can identify and rectify issues within my server files. Key Responsibilities: - Investigate the root cause for the slowdown of the website load times - Pinpoint potential malware in server files - Advance and fortify the security system to prevent future occurrences Ideal Skills: - Proficiency in cybersecurity - Solid understanding of server operations, particularly SQL - Experience in malware detection and prevention Your task: Use your expertise to bring back operational efficiency and bolster my domains server's security. If you can catch the malware predator and resto...

    $111 (Avg Bid)
    $111 Avg Bid
    8 bids

    I'm in need of an experienced Network Engineer to assist us in designing, implementing, and maintaining our network infrastructure. The primary goal is to ensure smooth operations and security of our network. Key Responsibilities: - Design and implement network solutions, with a particular focus on VPN (Virtual Private Network) setup. - Regularly maintain and optimize network infrastructure to ensure it meets our operational and security standards. - Troubleshoot and resolve network issues as they arise. Ideal Skills and Experience: - Proven experience as a Network Engineer, with a strong background in designing and maintaining network infrastructure. - Specific experience with VPN (Virtual Private Network) setup is highly desirable. - Deep understanding of networking protocols, TCP...

    $29 (Avg Bid)
    $29 Avg Bid
    12 bids

    I am looking for a web security expert, who can solve the reputation and suspicious tag on our web app links. Off recently few customers in US region are getting blocked from accessing our links, they are shown potential threat in the links

    $71 (Avg Bid)
    $71 Avg Bid
    7 bids
    Themida v2 DLL File Unpacking 4 days left
    VERIFIED

    I'm seeking a proficient freelancer with experience in unpacking Themida v2-protected DLL files. The unpacked file is intended for analysis and research, and there's no need for detailed documentation. Key requirements: - Proficiency in unpacking Themida v2-protected files - Previous experience working with DLL files - Ability to efficiently provide the unpacked file Your primary task will be to successfully unpack the DLL file, providing me with the unpacked version for further analysis. Your expertise in this area is crucial. Please note that detailed documentation on the unpacking process is not required, only the unpacked file itself.

    $354 (Avg Bid)
    $354 Avg Bid
    14 bids

    Hello we have our web app at clients use it with their subdomain like Some clients are getting blocked to access this website, however its fine fine by myside. Need someone to solve this issue, i think mainly its happending in US region

    $101 (Avg Bid)
    $101 Avg Bid
    10 bids

    Hello we have our web app at clients use it with their subdomain like Some clients are getting blocked to access this website, however its fine fine by myside. Need someone to solve this issue, i think mainly its happending in US region

    $12 (Avg Bid)
    $12 Avg Bid
    4 bids

    can you help me with pass ookla host-tester PFA

    $18 (Avg Bid)
    $18 Avg Bid
    6 bids
    C# Program Hashing Fix Needed 3 days left
    VERIFIED

    I need a C# program that hashes text strings using SHA-256 hashing algorithm. The current program I have was designed to hash data, but I've noticed it does so in a different order than PowerShell. This is problematic for my workflow, as I need the two to hash data in the same order for consistency. Key Requirements: - Make the C# program hash data in the same order as PowerShell using SHA-256 - Ensure the program is efficient and secure - Document the changes made for future reference Ideal Skills: - Proficient in C# programming - Expertise in working with hashing algorithms, especially SHA-256 - Prior experience with data consistency issues - Strong understanding of security protocols and best practices Please include your relevant experience and approach in your bid.

    $46 (Avg Bid)
    $46 Avg Bid
    19 bids
    Secure Email Account Creation 3 days left
    VERIFIED

    I want to create a secure email account predominantly for sending and receiving emails. Requirements: - Capable of sending and receiving emails. - Needs a two-step verification process to enhance security. Ideal Candidate: The best fit for this project would be a developer well-versed in online security measures in addition to email systems.

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    7 bids

    As a cybersecurity officer, I'm seeking to significantly enhance the security measures of my server and cloud-based systems. Here are the project's requirements: - Implementing a zero trust network access on both system types to reduce the possibility of unauthorized access. - Proven experience on similar projects would be highly valued. - A particular focus is to be placed on uptime and reliability, as these systems are mission-critical. Ideal Skills & Experience: - Experienced cyber security professional - Deep understanding of zero trust network access - Proven track record with server and cloud-based systems - Excellent problem-solving capabilities in cybersecurity.

    $50 / hr (Avg Bid)
    $50 / hr Avg Bid
    2 bids

    I am seeking the services of a VPN expert with the knowledge and expertise to aid in accessing legal sports betting sites, which are currently inaccessible due to restrictions put in place by internet service providers. The purpose of this engagement is to enable unrestricted access to reputable legal sports betting sites, while ensuring the highest standards of online privacy and security are maintained. The ideal VPN expert will possess a deep understanding of the nuances involved in accessing geo-restricted content and possess the requisite technical proficiency to provide reliable, fast and secure VPN services. Additional bonus when freelancer has installed sucessful system.

    $292 (Avg Bid)
    $292 Avg Bid
    18 bids

    I'm looking for a highly skilled network engineer with extensive experience with Cisco Packet Tracer, specifically in implementing complex network security measures such as network routing, VLAN configuration, firewall setup, VPN, assigning IP addresses and implementing network-based firewalls. The ability to successfully ping is crucial. The right candidate must also be well versed in the Open Shortest Path First (OSPF) for routing protocols. Your role will involve: - Designing and implementing complex network models - Configuring OSPF as the routing protocol - Assigning IP addresses across all devices - Installing and setting up firewalls to protect the network - Configuring VLANs to segment network traffic - Ensuring successful ping across all devices - Setting up VPN for secure...

    $41 (Avg Bid)
    $41 Avg Bid
    11 bids

    I am in need of a highly experienced network security teacher who is proficient in the following areas: - Ethical hacking - Network intrusion detection - Penetration testing - Boot 2 root I have a project in which i need assistance to complete under the guidance of someone who has this knowledgede as i am struggling. This will include calling and helping me thank you

    $29 / hr (Avg Bid)
    $29 / hr Avg Bid
    20 bids

    I am in search of a cybersecurity professional who can provide specialized assistance in the area of Network Security and Zero Trust Network Access. Your responsibilities will entail: - Securing my network against any potential threats and vulnerabilities - Implementing an effective Zero Trust Network Access system The ideal freelancer for this project would have: - Strong experience and expertise in network security and Zero Trust Network Access - Understanding of cybersecurity best practices - Demonstrable experience in protecting sensitive information and preventing cyber threats. Please note, familiarity and experience with any specific cybersecurity framework (NIST, ISO 27001, or CIS) is not necessary for this project. Your primary task will be to safeguard the network and impl...

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    18 bids

    We are seeking an experienced penetration tester to join our team. As a penetration tester, you will be responsible for identifying and exploiting vulnerabilities in our systems to ensure they are secure. Your main tasks will include conducting vulnerability assessments, performing penetration testing, and providing recommendations for remediation. To excel in this role, you should have a strong understanding of various testing methodologies, possess analytical skills to interpret test results, and be familiar with a wide range of penetration testing tools and techniques. Skills required: - Penetration testing - Vulnerability assessment - Ethical hacking - Knowledge of network protocols - Familiarity with security frameworks - Strong problem-solving skills This is a medium-sized project...

    $497 (Avg Bid)
    $497 Avg Bid
    32 bids

    In this crucial project, we aim to significantly improve the cybersecurity of data stored on the Google Cloud Platform (GCP), using cutting-edge artificial intelligence methods. Our main goals are as follows: - Use Machine Learning and Deep Learning to detect and mitigate any potential cyber threats before they occur. - Utilize AI to predict and intercept Unauthorized Access, Data Breaches, and Malware Attacks, thereby bolstering our defense mechanisms. The ideal candidate will be proficient in AI, specifically Machine Learning and Deep Learning, and have extensive knowledge of cybersecurity on clouds. Experience with GCP would be a valuable advantage. It's essential for the chosen freelancer to be adept at translating complex AI algorithms into practical cybersecurity solutions. Ac...

    $1191 (Avg Bid)
    $1191 Avg Bid
    49 bids

    I am in search of a freelancer with a solid understanding of networking concepts to help me navigate and comprehend aspects such as IP addressing, subnetting, and topology analysis. I will give a certain scenario and we will answer it af the same time - Task Ramp-up: You will be explaining the basic principles of these topics, providing a high-level overview rather than a complex, in-depth study. - Goal: My target is to establish an intermediate-level understanding of these concepts. The perfect candidate would be someone who: - Has a strong foundation in network computing - Is proficient in explaining IP addressing and subnetting - Possesses an excellent ability to analyze network topologies - Has demonstrable skills in teaching or tutoring on technical concepts. Example as att...

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    14 bids

    As per attached Delivery by the 11th May More direct contract if quality work is delivered. A token will also be provided

    $21 (Avg Bid)
    $21 Avg Bid
    5 bids

    As per attached Delivery by the 11th May More direct contract if quality work is delivered. A token will also be provided

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    12 bids

    I need a skilled professional to perform a comprehensive vulnerability assessment and penetration testing on our network and system infrastructure. The primary objective of this task is to find potential security vulnerabilities. - Task Details: Your work will involve identifying weaknesses that could possibly be exploited to undermine our security controls and then testing how effective these controls truly are. - Approach: Please prioritize any vulnerabilities found according to threat severity level. I'm looking to focus on the most critical threats before handling the lesser ones. - Necessary Skills: Previous experience in network security, vulnerability assessment, and penetration testing is critical. You need to demonstrate a strong understanding of network and system in...

    $107 (Avg Bid)
    $107 Avg Bid
    17 bids

    I need to install a Microsemi 600 NTP server for my network, which is a mix of wired and wireless connections. The primary goal of this installation is to ensure time synchronization across a range of devices, which totals between 10 and 50. Key Tasks: - Installation of Microsemi 600 NTP server - Configuration for both wired and wireless network environments - Synchronization of 10-50 devices Skills/Experience: - Previous experience with NTP server installation and configuration - Expertise in network infrastructure, particularly in mixed wired and wireless setups - Understanding of time synchronization protocols - Proficiency in handling multiple devices for a uniform operation

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    7 bids

    I require a skilled network engineer for setting up and configuration of Ubiquiti UDM/switches for a wifi network. I'm looking for support in the following tasks: - Pre-configuration of UDM/switches - VLAN setup: A total of 3 VLANs need to be configured. Each VLAN will serve a specific function including employee devices connection, guest Wi-Fi access, and security devices connection. - Firewall configuration: You'll also need to configure the firewall for optimal network security. Post installation, remote support may be needed if any issues occur. The ideal candidate would have comprehensive experience with Ubiquiti products and UDM/switch configurations, specifically with VLAN and firewall rules. A solid understanding of network security and quality service settings...

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    15 bids

    I'm in need of an intermediate level -senior incident response/digital forensics specialist /Linux sysadmin familiar with triage, mitigation/containment , remediation and report writing. To do a on the job walk through of challenging tasks. So I can shadow watch ad take notes, for my thesis and upcoming internship. • Skills and Experience: - Incident response - Linux sysadmin - SOC Analysis with Sentinel, Splunk, Crowdstrike etc - Digital forensics - Report writing We are looking to record step by step actions taken on any job of your choice, preferably something you are already working on , company names will be changed . This project is to support my thesis and also to help improve skills and speed with incidents Looking for an affordable cost and a pa...

    $69 (Avg Bid)
    $69 Avg Bid
    16 bids

    Access Points setup. Provision (x3 Test Devices) for now using the Software Management Tool. License/Registration only. Possible SSID, Security Settings, Guest/Staff SSIDs and other Wireless parameters if we need anything. The main thing is get them configured locally with the most basic setup and a Client Connection before we proceed to next steps on more devices. Omada Controller and Licenses available to manage the devices. Please only get in touch if you've set these up before. Unfortunately, I don't have enough time to start interviewing people. If you're confident enough then please get in touch. Immediate start.

    $89 (Avg Bid)
    $89 Avg Bid
    4 bids

    I'm seeking an experienced cybersecurity professional who can assist me in creating a Remote Access Trojan (RAT) for iOS, with the goal of monitoring text messages, call logs, and WhatsApp on another device. Key Requirements: - The RAT must be able to access text messages, call logs, and WhatsApp on an iOS device - The primary purpose of this software will be for parental monitoring Ideal Skills: - Strong cybersecurity background - Proficiency with RAT creation and deployment - Extensive experience with iOS systems and security - Ethical hacker certification would be a plus The successful candidate must have a proven track record in creating secure and effective RATs, and understand the sensitive nature of this project. Please provide samples of similar projects you have worked on...

    $8 / hr (Avg Bid)
    $8 / hr Avg Bid
    4 bids
    ethical hacker -- 2 2 days left
    VERIFIED

    I am in need of an ethical hacker to assist me in safeguarding my business. The project is of high priority and requires immediate attention. I have a list of objectives which I would like the freelancer to complete. These objectives include, but are not limited to, performing penetration tests, conducting a thorough network security assessment, and carrying out social engineering techniques to evaluate any possible security gaps or weaknesses. The successful freelancer will manage the entire project from start to finish and ensure that objectives are met and that all security concerns have been resolved.

    $14 (Avg Bid)
    $14 Avg Bid
    7 bids

    Recommended Articles Just for You

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Learn how to find and work with a top-rated Google Chrome Developer for your project today!
    15 MIN READ
    Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.
    15 MIN READ