Computer Security Jobs
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
- Establishing secure network infrastructure
- Improving system performance and leveraging encryption
- Developing security frameworks for organizations
- Implementing authentication measures for digital identification
- Evaluating risks of cyber incident exposure
- Researching the latest security regulations for compliance
- Crafting secure policies for employee engagement
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
From 92,804 reviews, clients rate our Computer Security Consultants 4.84 out of 5 stars.Hire Computer Security Consultants
I am looking for an ethical hacker to conduct a website penetration testing for our website. The purpose of the testing is to carry out a security assessment. We specifically want to focus on the database and server security. After the testing is complete, we require a detailed report with recommendations. Ideal skills and experience: - Experience in conducting website penetration testing - Knowledge of database and server security - Ability to provide detailed reports with recommendations for improving security.
I am looking for a data recovery expert to help me retrieve inaccessible data from my hard drive. The ideal freelancer should have experience in recovering data from hard drives and be familiar with the latest data recovery tools and techniques. The project will involve the following: - Retrieving inaccessible data from a hard drive - Diagnosing the cause of the data loss - Providing recommendations and solutions to prevent future data loss The ideal freelancer should have the following skills and experience: - Expertise in data recovery from hard drives - Familiarity with the latest data recovery tools and techniques - Knowledge of different file systems, such as NTFS and FAT - Experience in diagnosing the cause of data loss, whether it be accidental deletion, hardware failure, or viru...
Looking for a skilled penetration tester to conduct testing on our systems. The scope of the testing includes the internal network, external network, and web application. Access to specific systems will be provided, with limitations in place. We require a detailed report with recommendations for remediation steps. Ideal skills for this project include experience in penetration testing, network security, and web application security. The ability to provide a comprehensive report with clear and concise recommendations is a must.
I am seeking assistance from a skilled freelancer to develop a network simulation project using either NS2 or NS3. The objective of this project is to implement a written simulation code based on a research paper and enhance it by incorporating ECDSA (Elliptic Curve Digital Signature Algorithm) encryption. The freelancer is expected to provide sufficient documentation and explanation, enabling me to understand the functionality of the code. Project Requirements: Replicate the results of the main research paper (link provided below) using NS2 or NS3. The research paper serves as the basis for this project. Integrate ECDSA encryption into the simulation code. ECDSA is preferred due to its strong cryptographic properties and suitability for resource-constrained networks. Thoroughly document...
Hi, This job is about a UK based competition related to cyyber securety. I need someone who is proficient with these jobs. There are program rules, and expected eligibility. Program Rules TESTING POLICY AND RESPONSIBLE DISCLOSURE Please adhere to the following rules while performing research on this program: Denial of service (DoS) attacks on Ooredoo QPSC applications, servers, networks or infrastructure are strictly forbidden. Avoid tests that could cause degradation or interruption of our services. Do not use automated scanners or tools that generate large amount of network traffic. Do not leak, manipulate, or destroy any user data or files in any of our applications/servers. Do not copy any files from our applications/servers or disclose them. No vulnerability disclosure, full, partia...
I am looking for a freelancer who can help me set up my TP-Link CPE210 for a point-to-point connection. I have an existing network infrastructure in place and the distance between the two points I want to connect is less than 1km. Ideal skills and experience: - Experience in setting up and configuring TP-Link CPE210 devices - Knowledge of point-to-point networking - Familiarity with networking protocols and technologies - Strong problem-solving skills to troubleshoot any issues that may arise during setup and configuration.
I need someone who can troubleshoot my palo alto network urgently, within 24 hours. I require documentation for the implementation process as well. The ideal candidate should have experience with palo alto networks and should be able to diagnose and resolve issues quickly.
We currently own a /22 block of live IPs. Listed below is an example of what we own - not actual IPs - just an example - 1.1.2.0 1.1.3.0 1.1.4.0 1.1.5.0 For this description of the work, I am using the IP of 2.1.0.1 as the IP for our Internet provider. The Main Firewall config - not the actual IPs - just an example - that the other Firewalls below would connect to is - Lan IP 1.1.5.1 WAN 2.1.0.1 WAN Gateway 2.1.0.250 I am looking for someone to configure an HP 1930 48 port switch that other firewalls will be connected to. For this example, the setup would be similar to this. Firewall 1 IP 1.1.5.2 Firewall 2 IP 1.1.5.3 Firewall 3 IP 1.1.5.4 Firewall 4 IP 1.1.5.5 Firewall 5 IP 1.1.5.6 Firewall 6 IP 1.1.5.7 Firewall 7 IP 1.1.5.8 Firewall 8 IP 1.1.5.9 GW 1.1.5.1 Subnet I want VLANS c...
My project is centered around the design and setup of a computer network. The purpose of this network is to share files and resources across multiple sites, providing internet connectivity and remote access to different devices. I want to employ a mesh network topology for my network with speeds of 1 Gbps. This will ensure that the speed of the network is high enough to support internet and remote access activities while being reliable and secured. The network will also need to be designed with an expandable infrastructure as our business grows.
My company is in need of a thorough vulnerability testing for our Lotus-based email accounts. Our goal is to improve our overall security and we have conducted vulnerability testing in the past. We need this work completed in one week in order to meet our deadlines. If you are a qualified professional with experience in this area, we would love to have you aboard. We expect you to be knowledgeable in the most up-to-date security techniques and be able to identify any potential weaknesses that exist within our system. We rely on our email accounts heavily as they are the lifeblood of our business, so we need this done quickly and correctly. If you think you have the skills and qualifications to get the job done, please consider applying for this project. Thank you!
As an Android Device Penetration Tester, you will play a crucial role in evaluating the security posture of Android devices and identifying vulnerabilities and weaknesses in their design, configuration, and implementation. Responsibilities: Conduct comprehensive penetration testing on Android devices, including smartphones, tablets, and IoT devices. Develop and execute test plans and methodologies to identify vulnerabilities and potential attack vectors in Android devices. Perform reverse engineering and analysis of Android applications and firmware to uncover security flaws and weaknesses. Utilize various testing tools and techniques to simulate real-world attacks and assess the resilience of Android devices against different threat scenarios. Collaborate with cross-functional teams, in...
I am looking to hire a Network Engineer to develop a hybrid wired and wireless network solution for increased security for a medium-sized network of 11-50 devices. The Network Engineer will be responsible for setting up the network, maintaining and troubleshooting the network, and ensuring optimized performance of the network. They should be knowledgeable in the installation, configuration, and performance optimization of network devices and services. The candidate should have a wide range of experience dealing with different types of network hardware and software configuration. They should also possess great problem-solving skills to proactively identify and address network security threats. In addition, they must have in-depth understanding of network troubleshooting methods and have str...
I am looking for a skilled freelancer to create a complete VPN solution that can link our two offices in Cameroon and the USA. We require a high-speed connection of over 50 Mbps and need a complete solution as we do not have an existing VPN infrastructure in place. The project needs to be completed ASAP. The ideal freelancer should have expertise in VPN concentrators and networking equipment. Specific skills and experience required include: - Experience in setting up VPN concentrators for large-scale networks - Knowledge of network equipment and security protocols - Ability to troubleshoot and resolve technical issues - Strong communication skills to ensure smooth collaboration between our teams in Cameroon and the USA.
Good day, We are looking for a network and systems engineer to work overnight's in the Eastern USA time zone for a small ISP. You should be skilled in the following: WAN / BPG / VPLS / MPLS Mikrotik and Cisco switches routers Windows Server / hyper-v / active directory. The ideal candidate will be self starting, taking initiative and filing detailed reports in our ticketing system for both internal and external issues. Hours of work are flexible but generally between 8pm to 6am EST.
I am in need of assistance setting up a Wifi Bridge, and I have the necessary login credentials. I am considered a beginner when it comes to technical knowledge, so I am looking for someone with experience to help me out. The project will involve setting up a wireless bridge connection between two devices, allowing them to communicate over a secure connection. The ideal freelancer for this project should have previous experience setting up and troubleshooting Unifi Wifi bridge connections, a working knowledge of networking principles and protocols, and the ability to explain technical concepts to a novice in an easy-to-understand manner. I have two 2 x Ubiquiti Unifi UAP-AC-M-PRO Outdoor 1750Mbps access points with PoE adapters; the internet is via Starlink, both end points have electri...
My organization is looking for an experienced professional to conduct a full security audit of our network infrastructure and applications. Our current state is somewhat secure, with minor vulnerabilities. We want to accurately identify any weak points and vulnerabilities that could become a security risk. The audit should be comprehensive and provide detailed outcomes of potential security threats. We expect a high level of expertise in establishing a secure network as well as knowledge on up-to-date protocols and technologies. We are open to suggestions and advice on other security measures to maintain a secure and safe network.
Failed to power on virtual machine - .vmdk was not found gettting issues on vmware mechine any one know the issues and fix on remote then ping me Note: Check screenshort for batter clarification
For this project I require the implementation of Security measures within a Docker container such as Firewall, Encryption, Authentication, one time password etc as well as a video tutorial of how to deploy the docker container application. I would also like some evidence of testing of these features as well as some diagrams to show how it works. Submit all files in a single main folder. The zipped file must have the following structure: SRC: containing project files. Specify what IDE was used and how to open the project. BUILD: containing relevant binary files (e.g., *.py). Programming Languages, Tools and frameworks Suggested Programming Languages: Python, C#, C++, JAVA, JavaScript Suggested Git repository: Project must be set to private Suggested DBMS: SQL/No-SQL Suggested Testing...
I will attach the full project description in a word document but to keep it simple, I require a Report, Feasibility Study, COCOMO II Estimation for implementing security measures such as Firewall, Encryption, Authentication etc. It is important to explain the Advanced Analysis and Design when it comes to implementing the Security Features. I will also attach the template for the feasibility study and COCOMO II estimation spreadsheet.
I am looking for an experienced IT professional to provide ongoing support. Specifically, I need someone with expertise in software, networking and connectivity. This person will serve as a trusted and reliable partner to ensure that my network remains properly configured, secure and connected. The ideal candidate should have excellent problem-solving abilities to quickly diagnose and resolve any and all issues that may arise. They must have broad knowledge of different types of networking hardware and software as well as a strong understanding of current IT trends and industry best practices. Experience with cloud-based platforms would be a great plus. I seek an individual or team with integrity, a can-do attitude and dedication to delivering quality results. This ongoing partnership sh...
I am looking for someone to create 30 pages of handwritten content for professional use, with both content provided and creation needed. The style of handwriting I prefer is English simple. I am seeking a freelancer with experience in handwriting and attention to detail. Ideal skills for this job include excellent handwriting skills, creativity, and the ability to follow specific guidelines for content. The project will require clear communication and the ability to meet deadlines.
Microtek Setup Configuration and Ongoing Maintenance for Medium-Sized Network I'm looking for a freelancer who can help me with the configuration of my Microtek setup for my medium-sized network of 11-50 devices. The specific service I need is configuration, including setting up the necessary software and hardware to optimize the performance of my network. Additionally, I require ongoing maintenance and support to ensure that my network runs smoothly and any issues are resolved promptly. The ideal freelancer should have experience in Microtek setup configuration and maintenance for medium-sized networks. Skills and Experience: - Microtek setup configuration - Network maintenance and support - Experience with medium-sized networks - Troubleshooting skills - Strong communication sk...
Looking for an advanced certification course in both IT and non-IT fields. I am specifically looking for a course that focuses on a specific certification. Ideal candidates for this project should have experience in providing advanced certification courses in both IT and non-IT fields. The course should be tailored to my specific needs and should provide in-depth knowledge and practical skills.
I am in need of a completely new wireless network set up for personal use. I am looking for someone who can help me set up a reliable and efficient network that will meet my needs. Skills and experience needed: - Expertise in setting up wireless networks - Familiarity with different wireless network protocols and technologies - Ability to integrate new network infrastructure - Knowledge of security measures for wireless networks
Very simple task will take less than 2 hours to complete. I need someone who is familiar with bits main memory data storage. I will provide more detail information once I am contacted.
I am looking for a skilled professional to conduct a comprehensive penetration test on my network within a week. The scope of the test will be focused on the network only. I do not have any specific areas or vulnerabilities that I want to be tested, so I will rely on the expertise of the professional to conduct a thorough examination. Ideal Skills and Experience: - Extensive experience in network security and penetration testing - Knowledge of various network vulnerabilities and exploits - Familiarity with network architecture and protocols - Ability to provide detailed reports and recommendations for remediation - Certification in ethical hacking or related fields is preferred If you are confident in your ability to provide a high-quality and timely service, please submit your prop...
I am looking for an expert in creating intermediate level boot2root machines based on Linux operating systems. As I am open to suggestions, the freelancer can decide on the specific requirements and themes for the machine. The ideal candidate should have experience in creating challenging and engaging machines that test the user's skills in penetration testing and network security. The machine should be designed to simulate real-world scenarios and provide a realistic challenge for users. The freelancer should also have proficiency in Linux operating systems and be able to create a machine that is stable and secure.
Need Cyber Security Expert for small work Need Network Engineer
I am in need of a Mikrotik router specialist who can assist me in adding a VPN to my WiFi network. I have a router (rb941) . I have already purchased a VPN service and my primary goal is to bypass geo-restrictions. Ideal Skills and Experience: - Experience with Mikrotik router configuration and setup - Knowledge of VPN setup and configuration - Familiarity with bypassing geo-restrictions - Excellent communication skills to explain the setup process in a clear and concise manner.
I am in need of a freelancer to install a DrayTek Vigor 2865AC Firewall for network security. I have no experience setting up firewalls, so I am looking for someone with expertise in this area. The installation will cover less than 10 devices, so it is a relatively small project. Ideal skills and experience for the job include: - Expertise in setting up firewalls - Knowledge of DrayTek Vigor 2865AC Firewall - Familiarity with network security protocols and best practices - Ability to troubleshoot and resolve any issues that may arise during installation
network engineer ,router,switch,firewall,
I am looking for a freelancer who can help me access shared files on a cloud-based storage via VPN from Windows computers. The goal is to update the files live via the internet. I am not sure about the VPN setup required, so I need recommendations. The ideal freelancer should have experience in VPN setup and be able to suggest the best one based on my needs. The following skills are required for this project: - VPN setup - Cloud-based storage - Windows OS If you have experience in this area and can provide quality work, please bid on this project.
I am in need of a Security Analyst who specializes in Network Security. The project is urgent and needs to be completed within a week. The ideal freelancer will have extensive experience in Network Security and be able to provide examples of past work in this area. Skills and Experience: - Expertise in Network Security - Strong understanding of security protocols and systems - Experience in vulnerability assessment, penetration testing, and threat analysis - Knowledge of security compliance standards - Ability to provide detailed reports and recommendations for improving network security Timeline: - Urgent, project needs to be completed within a week Please provide your relevant experience in Network Security and how you can help improve our network security in your proposal. Thank you...
I am in need of a skilled network engineer experienced in both wired and wireless networks. The engineer will be responsible for troubleshooting my medium-sized network, consisting of 11-50 devices. The ideal candidate should have prior experience and expertise in networking and technical support. A demonstrated track record of success in designing, implementing, and troubleshooting networks is required. The successful candidate must be detail-oriented and have a proactive approach to problem-solving. They should be prepared to work independently, communicate complex technical concepts in an easy-to-understand manner, and respond quickly to project needs in a timely manner. Overall, I'm looking for a capable network engineer who can support me in the short-term, but provide value over...
1. Cleartext submission of password The page contains a form which is submitted over clear-text HTTP 2. Session ID exposed Session ID is vulnerable to theft and may lead to Session Hijacking, Therefore, Session ID should never be sent over unencrypted transport and should never be cached. The application should be examined to ensure that encrypted communications are both the default and enforced for any transfer of Session IDs. Furthermore, the Session ID should not be visible. 3. Strict transport security not enforced The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption, and use the application as a platform for attack...
I need an expert in computer science to write me a research proposal on The Ethical Implications of Malware Detection in V2X Communications: Ethical review. 3000 words. This is actually needed within 48 hours and you have to demonstrate expertise in this in your proposal. The success of this will lead to you being awarded the research project in itself, which would be around 10-15k words. More details to chosen person. Budget: $30-40
I am looking for high-speed internet services from Miguel Telecom. Specifically, I require fiber optic internet for my business. I am looking for high-speed performance with reliable uptime and excellent customer service. I need a solution with no contract commitments that is easy to set up and maintain. Mongo Telecom's cutting-edge technology and dedicated customer support team have been recommended to me and I'm sure they can provide me with the professional internet service I need.c
En Information Insurance buscamos a un experto de seguridad informatica profesional que quiera participar de nuestro proyecto, comprometido al trabajo y dispuesto a ayudar en el objetivo. Pagos por comision.
Als IT-Spezialist (m/w/d): Sie sind verantwortlich für die Entwicklung und Implementierung unserer Webseite, das Design und die Benutzererfahrung, die Backend-Entwicklung und Datenbankverwaltung sowie die fachliche Expertise und Überwachung der Künstlichen Intelligenz (KI). Wir sind ein junges, dynamisches Unternehmen, das sich auf die Entwicklung einer digitalen Plattform spezialisiert hat. Zur Unterstützung unseres Teams suchen wir einen engagierten IT Spezialist den wir vertrauen können. Ihr Profil: Sie haben ein abgeschlossenes Studium in Ihrem Fachbereich und mehrjährige Berufserfahrung. Sie verfügen über fundierte Kenntnisse und Fähigkeiten in Ihrem Fachbereich. Sie arbeiten selbstständig, lösungsorientiert und verfügen &...