Ss7 vulnerability 2018 jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 ss7 vulnerability 2018 jobs found, pricing in USD

    I am in urgent need of a knowledgeable and exper...critical problem-solving skills would be an asset. - Expertise: As the project requires a high level of complexity, I prefer a freelancer with advanced knowledge and experience relevant to Google Play Console and app reinstatement process. - Knowledge: It would be beneficial if you have a strong background in resolving Terms of Service infringements and dealing with copyright or security vulnerability issues, answering why the app might have been terminated. - Application Requirement: Along with your proposal, please provide information about your Experience handling such scenarios or dealing with Google support, including successful app reinstatement cases. Looking forward to the expertise you can bring to my situation. ...

    $277 (Avg Bid)
    $277 Avg Bid
    4 bids

    I purchased a particular model for dolibarr years ago and upgraded from 4.0.0 to 7.0.1 on 14 jun 2018 ....now i need to upgrade again to Dolibarr 17.0.4... The problem is that when i want to generate the propal-pdf, the screen turns white and does nothing...but one pdf that has already been generated with Dolibarr 7.0.1 is shown correct. I can send you the model and you should install it in your own Dollibar installation. I WILL NOT SEND access to my real database.

    PHP
    $50 (Avg Bid)
    $50 Avg Bid
    3 bids

    I am in need of an ethical hacker who is capable of identifying vulnerabilities in my system, assessing security risks, and providing recommendations for enhancing security. In addition, this individual must have experience conducting thorough background verifications including university-level education checks, criminal record assessments, and social media screening. A solid background in information security, forensic computing, or a related field is a must; as well as relevant certifications such as Certified Ethical Hacker (CEH) or Certified Information Systems Security Professional (CISSP). Your role will be crucial in improving our system's integrity and ensuring any potential applicant's background aligns with our organization's values.

    $94 (Avg Bid)
    $94 Avg Bid
    7 bids

    ...elsewhere. - The system must have options to pay via PayPal, Apple Pay, or Google Pay.- For card payments, the preference is to use PayPal as who I am working for already has a PayPal account. - A confirmation email must be sent once payment is made successfully. - The booking must be added to Google Calendar once payment is made successfully. - The payment must be secure and compliant with GDPR (2018). The font should be Helvetica. The colour scheme includes 3 colours: Dark is HSL(0, 0%, 11%), Light is HSL(0, 0%, 96%), and Accent is HSL(27, 8%, 55%). The colours can be changed, while it remains consistent and continues to fit a camouflage theme and militaristic style. Some other websites you could take inspiration from for this website include: -

    $329 (Avg Bid)
    $329 Avg Bid
    55 bids

    I am experiencing a comprehensive security crisis with my website and urgently require the support of an expert. I suspect malware infection, website hacking, and data breaches. So, I'm most concerned about data encryption, vulnerability scanning, and firewall protection. Key symptoms include: - Redirection of contact pages - Receipt of fake contact requests The ideal freelancer should possess: - Expertise in data encryption techniques - Mastery in vulnerability scanning - Experience with firewall protection - Decisive problem-solving skills - The ability to act immediately Having experience with cases of similar complexity would be strongly preferred.

    $36 / hr (Avg Bid)
    $36 / hr Avg Bid
    73 bids

    I am in need of a proficient professional to handle the security concerns surrounding my website. Primary purpose revolves around enhancing and maintaining my s...purpose revolves around enhancing and maintaining my site's safety. Key areas of concern are: - Safeguarding against potential malware and hacking attempts - Ensuring secure data encryption and storage - Setting up routine security audits and vulnerability assessments While the nature of the site was not specified, the main objective is to secure the site's functionality without any incident. Ideal candidates should have strong knowledge in cyber security methods, data encryption standards, and ability to conduct systematic security audits and vulnerability testing. Having experience in securing sites o...

    $359 (Avg Bid)
    $359 Avg Bid
    43 bids

    ...comparable tools. Code Analysis & Reverse Engineering: Proficiency in Ghidra, SMALI/BAKSMALI, dex2jar, and similar disassemblers/decompilers for Android code. Key Requirements: Proficiency in Volatility, APKTool, and Ghidra Intermediate level of experience in Android application security assessment. Ideal Skills and Experience: Demonstrated experience in Android application security assessment, vulnerability identification, and mitigation advice. Specific expertise with Volatility, APKTool, and Ghidra. Ability to provide comprehensive project proposals including the following structure: Table of Contents Abstract Abbreviations List of Figures Introduction Conclusion References Note: I have an existing codebase for analysis and will provide it as a sample. Please include y...

    $221 (Avg Bid)
    $221 Avg Bid
    7 bids

    I'm seeking the expertise of a professional ethical hacker who specializes in: - Network security - Web application security - Wireless security Unfortunately, I forgot to mention whether I need penetration testing, vulnerability assessment, or both. I also didn't specify the exact purpose of this ethical hacking project. Ideally, you should possess a strong ability to uncover any underlying vulnerabilities and offer strategic direction on how to heighten security measures across different platforms. Your approach should not only identify these weaknesses but also provide solutions on how to rectify them. While it's not specified, it'd be beneficial if you could also assess the effectiveness of existing security measures and provide recommendations for impro...

    $308 (Avg Bid)
    $308 Avg Bid
    14 bids

    I'm l...issues identified - Perform a comprehensive port scan and service enumeration on my network - Provide recommendations for improving network security based on the findings - Ensure no sensitive data is exposed in the process Ideal candidates for this project should have: - Proficiency in using network analysis tools such as Netcat and Wireshark - Strong experience in network security testing and vulnerability assessment - Excellent troubleshooting skills - Ability to provide detailed reports and recommendations for network improvement - A strong commitment to data privacy and security Your expertise in this area will be crucial to the success of this project. I'm looking forward to working with a professional who can help me secure my local network and ensure its ...

    $177 (Avg Bid)
    $177 Avg Bid
    20 bids

    ...the older versions of those plugins with bugs you just need to execute and create output on docker environment and add screenshots of execution showing how it exploits security and then the share the proposed mitigations in the report. You must have to cover the below mentioned points in the reports: briefly describe the architecture of the web application/framework describe the type(s) of vulnerability that is considered describe the vulnerabilities in detail describe how to exploit the vulnerabilities describe how the vulnerabilities were patched by the community describe (and provide with the report) a docker environment that is able to reproduce the vulnerabilities The perfect candidate will have: - Understanding of cybersecurity and, preferably, experience in crafting...

    $45 (Avg Bid)
    $45 Avg Bid
    19 bids

    I'm seeking the expertise of an experienced Ethical Hacker. Your primary task would be: - Conduct a comprehensive vulnerability assessment of a mobile application Here's what you'll need for this role: - Proven understanding and experience with Local Area Network (LAN) systems - Expertise in conducting vulnerability assessments - Solid comprehension of mobile application structures and their potential security weak points. Your mission will be to identify loopholes and vulnerabilities that may exist, in order to uphold our commitment to providing a secure mobile application for our userbase. Your keen insight and detailed feedback on any potential weak points found will be instrumental to our ongoing development and fortification efforts.

    $100 (Avg Bid)
    $100 Avg Bid
    9 bids

    I have a Network Forensics work that requires me to do the following: 1. Apply a research-based approach to forensic analysis. 2. Analyse and interpret digital evidence from a variety of sources. 3. Present findings to both executive and technical audiences. I will share more details and files. Ideal Skills and Experiences: • Extensive knowledge of network forensics • Proficient in vulnerability assessment • Experience handling both real-time and historical network data • Great adaptability in their investigative approach Objectives: • Identify potential vulnerabilities in our network • Offer actionable steps to improve network security • Provide a detailed report with findings and recommendations Your thorough understanding of network for...

    $382 (Avg Bid)
    $382 Avg Bid
    12 bids

    ...basic vulnerability scan on my mobile application, as well as set up continuous real-time monitoring. The project involves: - **Basic Vulnerability Scan**: The task at hand is to thoroughly investigate and identify any potential vulnerabilities in the mobile application. This requires expertise in mobile application security and penetration testing. - **Continuous Real-time Monitoring**: Following the vulnerability scan, the security expert will be responsible for setting up a real-time monitoring system. This will help in the prompt detection and mitigation of any future security threats or breaches. The ideal candidate should have: - Proven experience in cyber security, with a specific focus on mobile application security. - Extensive experience in conducting ...

    $1073 (Avg Bid)
    NDA
    $1073 Avg Bid
    18 bids

    I'm looking for a skilled penetration tester to evaluate the security of my website. - Tasks: - Perform a comprehensive security test to ensure my website is protected from potential threats. - Identify any vulnerabilities that may exist on the site. - Analyze the risks associated with the security of the website. - Key Requirements: - Expertise in website penetration testing. - Proficient in identifying and dealing with website vulnerabilities. - Able to provide a detailed report outlining the risks and necessary actions to enhance the security of the site. - Site Details: - The website is built on a Content Management System (CMS) like WordPress, Joomla, or Drupal. - The focus is primarily on identifying the admin username and password. I'm looking for some...

    $153 (Avg Bid)
    $153 Avg Bid
    25 bids

    I'm in need of an experienced DevSecOps engineer who can establish a secure coding pipeline for my project. Key Responsibilities: - Creation of a robust DevSecOps pipeline using GitLab CI/CD and Azure DevOps - Incorporating a branch git workflow for code development - Implementation of YAML, Powershell, and Python for pipeline development Specific Security Requirements: - Integrate vulnerability scanning for proactive identification and mitigation of threats - Implement static code analysis to improve code quality and security - Secure secret management to protect sensitive data - Integrate DAST (Dynamic Application Security Testing) for real-time security analysis I require someone who's well-versed in both DevOps and security practices. Experience with the above ment...

    $94 (Avg Bid)
    $94 Avg Bid
    28 bids

    Do the following tasks as far as you can. Even if you get stuck anywhere, document the process in a way that you can present it to us afterwards. 1. Find the OWASP Juice Shop 2. Fork it to your GitHub Account 3. Run the application on your machine 4. Find the Score Board 5. Find any of the vulnerabilities and fix it directly in the app code 6. Open a pull request with this fix and a meaningful description in your repository 7. Enable dependabot updates for the frontend 8. Get a list of all PRs of your repository on the commandline

    $152 (Avg Bid)
    $152 Avg Bid
    12 bids

    ...have to search and share the similar case details and judgment copy for the specific Scenario. Please find attached Mother's share in deceased son's settlement property as per hindu act , Ravi Hindu from tamilnadu deceased without WILL. In 2019 leaving behind the wife, mother , son and daughter . Ravi got few properties as a family settlement in 2011 from his father who was passed away in 2018, As per revenue document shows that gift settlement document. Note that that settlement property purchased by the Ravis father. As per settlement deed ravis father clearly mentioned that this land for ravi benefit only and no rights for himself and his legal heirs Rav’s brother also got few properties as a family settlement in 2010 from his father Some other proper...

    $89 (Avg Bid)
    $89 Avg Bid
    9 bids

    ...are looking for consultants - Consultant preferred from India. 1) Consultant - SRP Experience in working with development/implementation of SCP and SRF. Experience in handling interfaces of SCP SRF like INAP, SIP, Webservices, Websockets WebRTC (in the context of SCF and SRF) ISUP over SS7 Experience in Dialogic API for SS7 and INAP Experience in using JSS7 API from RestComm or it's variant of Mobius JSS7 or any of the varient IVR implementation with Freeswitch on SS7 Knowledge and work experience on YATE SS7 implementation. Anyone with following expereince and skills also may apply Consultant - CRBT worked in CRBT and similar products Having knowledge in the following protocols a) INAP over SIGTRAN/SIP b) SIP/RTP c) ISUP over E1 3) M3UA over SIGTRAN ...

    $298 (Avg Bid)
    $298 Avg Bid
    3 bids

    ...application and AWS environment. Provide a detailed report outlining all identified vulnerabilities, severity levels, and recommended remediation measures. Collaborate with our development team to prioritize and address security issues. Requirements: Proven experience in penetration testing for Magento 2 websites and AWS environments. Proficiency in industry-standard tools and techniques for vulnerability assessment. Strong understanding of web application security principles and common attack vectors. Excellent communication skills. Deliverables: Detailed penetration testing report. Regular progress updates and communication. How to Apply: Please submit your proposal with details of your experience, approach to penetration testing, and proposed timeline and cost estimates. Ad...

    $178 (Avg Bid)
    $178 Avg Bid
    21 bids

    Hello, In your proposal, start by writing ''I am a cybersecurity researcher'' to show that you have read the complete information. I am a cybersecurity researcher and I want to conduct a proof of concept test for vulnerability CVE-2023-2996. This is the report available on WPSCAN. Jetpack < 12.1.1 - Author+ Arbitrary File Manipulation via API CVE-2023-2996 Description The plugin does not validate uploaded files, allowing users with author roles or above to manipulate existing files on the site, deleting arbitrary files, and in rare cases achieve Remote Code Execution via phar deserialization. Proof of Concept curl --json '{ "media": {"tmp_name": "/WP_CONTENT_PATH/", "name": ""} }' Where BLOG_I...

    $24 (Avg Bid)
    $24 Avg Bid
    31 bids

    Hello, I am a cybersecurity researcher and I want to conduct a proof of concept test for vulnerability CVE-2023-2996. This is the report available on WPSCAN. Jetpack < 12.1.1 - Author+ Arbitrary File Manipulation via API CVE-2023-2996 Description The plugin does not validate uploaded files, allowing users with author roles or above to manipulate existing files on the site, deleting arbitrary files, and in rare cases achieve Remote Code Execution via phar deserialization. Proof of Concept curl --json '{ "media": {"tmp_name": "/WP_CONTENT_PATH/", "name": ""} }' Where BLOG_ID is the site Jetpack blog id. I cannot perform this POC because I don't have a public WordPress test site. To apply to this

    $23 (Avg Bid)
    $23 Avg Bid
    31 bids

    ...compatible and mobile friendly * Maintaining system security and integrity through best practices * Providing information support for the administration team as needed * Participating in team efforts toward efficient and successful project planning including weekly virtual team meetings Job Requirements * 5+ Years Experience in backend or full stack development * Knowledge in ColdFusion (2018 or newer), Python, PHP, CFC, Javascript, SQL, MySSQL, Database Design, Server Management * Experience in front end user interface development,
HTML, and CSS * Knowledgeable in APls, both SOAP and REST * Knowledgeable in Windows server management * Strong problem solving skills * Forward thinking in all development * Strong time management skills * Self-starter * Det...

    $641 (Avg Bid)
    $641 Avg Bid
    120 bids

    ...do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses Heartbleed vulnerability. SSPoS protocol is successfully verified using Burrows–Abadi–Needham (BAN) logic, so it ensures all the security properties. SSPoS is threat modeled and implemented successfully...

    $140 (Avg Bid)
    $140 Avg Bid
    8 bids

    I'm seeking a lead generation expert, specialized in the technology and software industry to drive leads for my cybersecurity services notably in vulnerability assessment, penetration testing, and cybersecurity audits. Requirements: - Experience in lead generation strategies, specifically catered to the technology and software domain. - Mastery in generating self-led initiatives. - Background in cybersecurity services would be a major advantage. - We require leads on an international scale. - Our focus is on business-to-business (B2B) interactions. - Specifically, we're seeking leads primarily within the realm of international B2B connections. Your primary focus will be to fuel my sales pipeline with quality leads using your own lead generation methods. This role d...

    $13 (Avg Bid)
    $13 Avg Bid
    5 bids

    I'm seeking a qualified individual or a team with expertise in AI and cybersecurity to conduct a red team and blue team simulation. This simulation should primarily focus on: - Testing the effectiveness of my existing firewall configurations - Uncovering any possible weaknesses with the highest accuracy Proficiency in AI simulation and blockchain security is a key requirement ...project. Alongside, hands-on experience with firewall testing and strong attention to detail will be crucial. The simulation's purpose is to push my defenses to the limit and reveal the slightest vulnerabilities that could potentially be exploited. So, a prior exposure to intricate simulations will be a significant add-on. The decisive factor here is not speed, but the depth and precision of vulnerab...

    $105 (Avg Bid)
    $105 Avg Bid
    3 bids

    ...are looking for consultants - Consultant preferred from India. 1) Consultant - SRP Experience in working with development/implementation of SCP and SRF. Experience in handling interfaces of SCP SRF like INAP, SIP, Webservices, Websockets WebRTC (in the context of SCF and SRF) ISUP over SS7 Experience in Dialogic API for SS7 and INAP Experience in using JSS7 API from RestComm or it's variant of Mobius JSS7 or any of the varient IVR implementation with Freeswitch on SS7 Knowledge and work experience on YATE SS7 implementation. Anyone with following expereince and skills also may apply Consultant - CRBT worked in CRBT and similar products Having knowledge in the following protocols a) INAP over SIGTRAN/SIP b) SIP/RTP c) ISUP over E1 3) M3UA over SIGTRAN ...

    $279 (Avg Bid)
    $279 Avg Bid
    3 bids

    ...mean comparison. - Conduct precise cluster identification. - All analysis is to be done using SPSS. Prior experience and expertise in SPSS is a must. Objective of the research: identify whether the performance of banks differs with the level of digital maturity. Three levels of digital maturity: digital beginners, digital followers and digital leaders Data covers 8 banks on a 5-year period: 2018-2022 Banks should be allocated to one of the 3 clusters using k-means algorithm depending on their performance on certain ratios. K-means should be repeated for every year to see if cluster composition changes. Example: in 1 year bank A is in the digital beginners clusers, then in the next it switches to digital followers. For each year, analyze whether there is significant differe...

    $123 (Avg Bid)
    $123 Avg Bid
    32 bids

    ...e-12-best-about-us-about-mepage-examples/#Dan_Joe_an_example_of_the_about_page Please note: The project needs to be completed within 35 hours. Serious, dedicated, and prompt freelancers only. Thanks for your understanding and I look forward to collaborating with you....

    $47 (Avg Bid)
    $47 Avg Bid
    18 bids

    ...e-12-best-about-us-about-mepage-examples/#Dan_Joe_an_example_of_the_about_page

    $83 (Avg Bid)
    $83 Avg Bid
    49 bids

    I run a cybersecurity firm seeking to generate leads among small businesses, medium-sized businesses, and large enterprises. We specialize in three primary areas: - Network security - Data protection - Vulnerability assessments In terms of lead generation, we are particularly interested in the following strategies: - Email marketing - Content marketing Ideal freelancers will have extensive experience in these forms of marketing, with a proven track record of generating leads for similar firms. Additionally, a deep understanding of the cybersecurity industry and the unique needs of clients across various sizes of businesses is important.

    $2097 (Avg Bid)
    $2097 Avg Bid
    4 bids

    ...are looking for consultants - Consultant preferred from India. 1) Consultant - SRP Experience in working with development/implementation of SCP and SRF. Experience in handling interfaces of SCP SRF like INAP, SIP, Webservices, Websockets WebRTC (in the context of SCF and SRF) ISUP over SS7 Experience in Dialogic API for SS7 and INAP Experience in using JSS7 API from RestComm or it's variant of Mobius JSS7 or any of the varient IVR implementation with Freeswitch on SS7 Knowledge and work experience on YATE SS7 implementation. Anyone with following expereince and skills also may apply Consultant - CRBT worked in CRBT and similar products Having knowledge in the following protocols a) INAP over SIGTRAN/SIP b) SIP/RTP c) ISUP over E1 3) M3UA over SIGTRAN ...

    $379 (Avg Bid)
    $379 Avg Bid
    3 bids

    I need someone that can help my server become PCI compliant. The biggest obstacle that I am facing is TLS 1.0 and TL 1.1 connections. I am on Windows Server 2016, SQL Server 2016 and Cold Fusion Server 2018. Each seems to be able to connect using TLS 1.2, but if I turn off 1.0 and 1.1 using , I cannot access my sites with a browser. It seems that there is some application or service that is using the depreciated editions of TLS, but I can't find what is causing the problem. Can you?

    $494 (Avg Bid)
    $494 Avg Bid
    14 bids

    ...need of an hacker to perform a thorough black-box penetration testing on a WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are cruc...

    $94 (Avg Bid)
    $94 Avg Bid
    29 bids

    ...need of an hacker to perform a thorough black-box penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are cru...

    $325 (Avg Bid)
    $325 Avg Bid
    23 bids

    I am looking for an experienced ethical hacker to assess the vulnerability of my Windows server. The tasks will involve network scanning, password cracking, and running a comprehensive vulnerability assessment. Key Responsibilities: - Conduct network scanning to identify potential security issues. - Perform password cracking to ensure that the server is secure. - Conduct a thorough vulnerability assessment to identify and report any vulnerabilities. The ideal candidate for this job should have: - Proven experience in ethical hacking and server security. - Extensive experience in conducting network scanning, password cracking, and vulnerability assessment. - Knowledge of Windows server security best practices. - Strong communication skills to clearly report on ...

    $18 (Avg Bid)
    $18 Avg Bid
    6 bids

    As an educator, I'm looking to showcase the security vulnerabilities inherent in a WordPress site for both illustrative purposes and to help formulate a proof of concept for a security system. The features I require are: - A custom login page - The ability to track user activity - Integration with other platforms The project will also involve demonstrating a successful XSS hacking. To accompany this, I'll need detailed documentation created to outline the steps taken and the vulnerabilities exploited. Following the hack, I expect to have full administrative access to the WordPress site. Ideal candidates for this project have a deep understanding of WordPress, its vulnerabilities, and security concepts in general, coupled with experience in XSS hacking and documentation wri...

    $40 (Avg Bid)
    $40 Avg Bid
    28 bids

    ...are looking for consultants - Consultant preferred from India. 1) Consultant - SRP Experience in working with development/implementation of SCP and SRF. Experience in handling interfaces of SCP SRF like INAP, SIP, Webservices, Websockets WebRTC (in the context of SCF and SRF) ISUP over SS7 Experience in Dialogic API for SS7 and INAP Experience in using JSS7 API from RestComm or it's variant of Mobius JSS7 or any of the varient IVR implementation with Freeswitch on SS7 Knowledge and work experience on YATE SS7 implementation. Anyone with following expereince and skills also may apply Consultant - CRBT worked in CRBT and similar products Having knowledge in the following protocols a) INAP over SIGTRAN/SIP b) SIP/RTP c) ISUP over E1 3) M3UA over SIGTRAN ...

    $269 (Avg Bid)
    $269 Avg Bid
    2 bids

    I am seeking an expert in urban flood engineering focused specifically on assessing current flood assessment for a DA application in Penrith Shire Council. The primary responsibility will be to conduct a assessment of the residential area and identify...vulnerable zones prone to flooding in residential areas. An ideal candidate would have: - Proficient skills in urban flood risk assessment. - A thorough understanding of urban flood mitigation strategies. - Experience in residential flood risk assessment. - Dedication to providing precise and accurate reports. I look forward to working with a professional who can help reduce our local community's vulnerability to urban flooding. This could be a crucial first step in improving our neighborhood's resilience against unfores...

    $624 (Avg Bid)
    $624 Avg Bid
    29 bids

    ...Google Cloud, as well as private and hybrid cloud environments. Managed cloud services may include migration assistance, security management, performance optimization, and cost optimization. Security Services: Managed security service providers (MSSPs) specialize in protecting organizations from cyber threats by offering a range of security services such as threat monitoring and detection, vulnerability assessments, incident response, and compliance management. MSSPs help businesses strengthen their security posture and mitigate the risk of data breaches and other security incidents. Backup and Disaster Recovery: Managed backup and disaster recovery services provide businesses with reliable and comprehensive solutions for protecting their data and ensuring business continuity i...

    $16 / hr (Avg Bid)
    NDA
    $16 / hr Avg Bid
    37 bids

    I am searching for an exceptional web developer, with strong proficiency in developing dynamic, engaging, and user-friendly business websites, primarily centered around information technology services. Key Areas: - Showcase Services: Foremost, the website should beautifully present my key services which are Cybersecurity Managed Solutions ,Vulnerability Assessment and management, disaster recovery as a service, SOC as a service, DDoS mitigation, penetration testing, cloud computing security, and Incident Response. - Lead Generation: A flawless mechanism for capturing leads and inquiries is essential. Thus, effective CTAs, contact forms, and pop-ups, etc., should be correctly integrated. - Website Features: The website must feature video content to grab the attention of the vi...

    $476 (Avg Bid)
    $476 Avg Bid
    115 bids

    I am looking for an experienced security professional to conduct penetration testing and vulnerability scanning on my applications running on Linux-based internal servers. The primary goal is to identify potential security vulnerabilities. The ideal candidate should have: - Deep expertise in cyber security. - Proficiency in penetration testing and vulnerability scanning. - Experience in identifying and addressing security vulnerabilities. The main objectives of the project are: - Conduct an in-depth vulnerability scan on our Linux internal servers. - Deliver a comprehensive report on identified security vulnerabilities. - Suggest potential mitigation strategies to address the identified risks. Your bid will be more favorable if you have previously worked on simi...

    $177 (Avg Bid)
    $177 Avg Bid
    20 bids

    ...Requirements: MSGARCH Model Configuration: The analysis requires the implementation of a MSGARCH model to capture the dynamic volatility of each cryptocurrency. The model must accommodate two distinct regimes: High-Volatility Regime (Regime 1): Characterized by periods surrounding significant market events expected to induce heightened market volatility. Examples include the Coincheck Hack (January 2018), the 2018 Cryptocurrency Market Crash, Black Thursday (March 2020), the 2021 Chinese Cryptocurrency Mining Ban, the Collapse of TerraUSD and LUNA (May 2022), and the FTX Bankruptcy (November 2022). Low-Volatility Regime (Regime 2): Represents periods of relative market stability, with lower volatility not significantly influenced by immediate external shocks. The model s...

    $138 (Avg Bid)
    $138 Avg Bid
    18 bids

    ...Requirements: MSGARCH Model Configuration: The analysis requires the implementation of a MSGARCH model to capture the dynamic volatility of each cryptocurrency. The model must accommodate two distinct regimes: High-Volatility Regime (Regime 1): Characterized by periods surrounding significant market events expected to induce heightened market volatility. Examples include the Coincheck Hack (January 2018), the 2018 Cryptocurrency Market Crash, Black Thursday (March 2020), the 2021 Chinese Cryptocurrency Mining Ban, the Collapse of TerraUSD and LUNA (May 2022), and the FTX Bankruptcy (November 2022). Low-Volatility Regime (Regime 2): Represents periods of relative market stability, with lower volatility not significantly influenced by immediate external shocks. The model s...

    $594 (Avg Bid)
    $594 Avg Bid
    33 bids

    As per your requirements, I will perform a comprehensive latest bugs vulnerability analysis on word press as mentioned in the CVE website for 2024. Based on that overall project cost will be 115 Euro. 50% Advance Payment 50% After the completion of the project Overall project submitted by 25th April 2024. I will provide 2 documents at the end as a deliverable. 1. Comprehensive document as required for the job similar to the sample shared. 2. Configuration steps. Regards, Bhashit Pandya

    $124 (Avg Bid)
    $124 Avg Bid
    1 bids

    I'm in need of an experienced product security engineer to assist me with daily tasks. These tasks include, but are not limited to, network security assessments, source code reviews, and vulnerability scanning. - Network Security Assessment: Provide regular analysis of my network operations to highlight vulnerability points and propose solutions. - Source Code Review: Utilizing Java and Python programming languages, you should be able to review and suggest improvements to our product's source code to enhance security. - Vulnerability Scanning: Perform routine checks to identify and rectify potential security vulnerabilities. Please note, the scope of the product was not specified, so the suitable candidate should be versatile enough to handle varying d...

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    65 bids

    IMPORTANT: No ai generated content. Also it should only take up the lower part of the doors like in the inspiration pictures attached. Read the description please, dont just paste it into ai generator. I am seeking a talented and creative graphic designer to create a unique and eye-catching vinyl design for the sides of a 2018 4Runner, specifically designed to promote our board game company and our flagship game, Hexaquest. The design will be applied across the two doors at the bottom of the vehicle, with a possibility of extending towards the rear fender. Please see reference images. Inspiration and Theme: Our game Hexaquest features hexagonal pieces, and we would love to incorporate this into the vinyl design. Imagine a hexagonal pattern spreading across the doors, possibly u...

    $165 (Avg Bid)
    Featured Guaranteed
    $165
    701 entries

    I'm looking for an experienced IT professional to assist with a VMWare EMC MnR project. This project involves data backup and recove...an efficient VMWare data backup and recovery solution that ensures high availability. Network Security Monitoring: - Install and set up an Intrusion detection system. - Implement traffic analysis tools to monitor network traffic. - Carry out a vulnerability assessment of our current network to identify potential security risks. Ideal Skills: - Extensive knowledge of VMWare EMC MnR solutions. - Experience in setting up and managing infrastructure. - Proficiency in network security, including intrusion detection, traffic analysis, and vulnerability assessment. Looking forward to a reliable, proficient, and anticpative professional fo...

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    5 bids

    ...Key Features: 1. HIPAA-Compliant Security Measures: - Encryption of data at rest and in transit using industry-standard protocols (e.g., SSL/TLS). - Role-based access control (RBAC) to restrict access to PHI based on user roles and permissions. - Implementation of strong password policies and multi-factor authentication (MFA) for user authentication. - Regular security audits and vulnerability assessments to ensure compliance with HIPAA regulations. 2. Sample Tracking: - Barcode or RFID-based tracking of samples with safeguards to protect patient identity. - Access controls to limit access to sample information to authorized personnel only. - Audit trails to track sample movements and access history for compliance purposes. 3. Secure Reporting: - Genera...

    $15433 (Avg Bid)
    Urgent
    $15433 Avg Bid
    143 bids