Computer Security Jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    44 jobs found, pricing in USD

    We need to simulate sinkhole or sybil attack using cooja simulator in RPL. Thus, we need to modify the source code of objective function that handles rank calculation. All this must be done in contiki OS 2.7

    $202 (Avg Bid)
    $202 Avg Bid
    2 bids

    Mixed method data analysis quantitative using SPSS (simple statistics) then using MAXQDA for interview coding ) phd level then discussion

    $439 (Avg Bid)
    $439 Avg Bid
    10 bids

    I have attached a file below kindly have a look at it and let me know if you can do it perfectly. Kindly first have a look and only message me if you can do it and if you understand each part of it. Once you agree to it ill provide you with the answer template on which you have to do it.

    $20 (Avg Bid)
    $20 Avg Bid
    17 bids

    Show me my network and device vulnerabilities.

    $168 (Avg Bid)
    $168 Avg Bid
    17 bids

    Looking for help setting up a Synology Diskstation with SSL and a private domain name, access through my router (the diskstation has an internal static IP) setting up tight security policies and firewall rules, and implementing best practices for data security, virus protection and automated backup.

    $42 / hr (Avg Bid)
    $42 / hr Avg Bid
    17 bids
    Cisco Network Engineer 6 days left
    VERIFIED

    Location of the Job: NEW YORK (USA) Type of the job: On-Site Duration: 1 to 2 Days Max Hi, We need a Cisco Field Engineer to do a LAN MAINTENANCE IN NEW YORK estimated job is one day. please see attached document for the job description let me know if you have questions.

    $31 / hr (Avg Bid)
    $31 / hr Avg Bid
    12 bids

    Hi, I am working on a mini project on the topic, "Security analysis of RPL network protocol in IOT systems". I would like to simulate Blackhole attack against RPL using Contiki cooja simulator and analyse the performance of RPL under blackhole attack (power consumption with and without malicious motes). The requirements are as follows: 1. Setup a simulated environment capable of gat...

    $477 (Avg Bid)
    $477 Avg Bid
    1 bids
    encryption 6 days left

    latest image encryption techniques

    $88 (Avg Bid)
    $88 Avg Bid
    8 bids

    I am looking for an expert programmer in networking

    $107 (Avg Bid)
    $107 Avg Bid
    5 bids

    Hi All I have a Cisco 3945 router, with SEC image. It also has a Zone based firewall. I need someone to provide the configuration to allow me to VPN in using a Samsung Mobile, Apple Mobile and Windows 10 Machine - ie a raft of devices to VPN in. It must be encrypted, so no PPTP etc. Thanks Kris

    $57 (Avg Bid)
    $57 Avg Bid
    20 bids

    There is requirement to identify suspicious users from web server log file. Definition of suspicious users - Suspicious users are the users other than attack users. They are suspicious because they don't have any particular aim to visit a web application. They neither do hacking activities. But they even not normal users. They do other than normal activities without any purpose. For example,...

    $149 (Avg Bid)
    $149 Avg Bid
    12 bids
    smalicode, repackaging 5 days left
    VERIFIED

    for learning purposes i need someone who know how to write smali language code or java code that can be further converted to smali. and some help in repackaging.

    $27 (Avg Bid)
    $27 Avg Bid
    3 bids

    Looking for someone who can teach me penetration testing and other topic of cyber security.

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    17 bids
    Recovery Help 4 days left

    I am need of help in writing a grant to expand my non-profit recovery ministry.

    $419 (Avg Bid)
    $419 Avg Bid
    15 bids

    Hello, Looking for someone who is expert about Bring Your own device policy to help me with writing something.

    $37 (Avg Bid)
    $37 Avg Bid
    10 bids

    I need someone to run Distributed machine learning algorithms to improve IoT security.

    $52 (Avg Bid)
    $52 Avg Bid
    4 bids

    I am a penetration tester researcher for a corporate firm and I am looking for a well-detailed technical analysis on post-exploitation analysis.

    $27 (Avg Bid)
    $27 Avg Bid
    9 bids
    networking 3 days left

    i need people to manage my networking

    $124 (Avg Bid)
    $124 Avg Bid
    18 bids
    IT Technical Writer 3 days left
    VERIFIED

    A content writer with relevant IT experience who can provide all necessary data/reference/explanations etc with regards to the IT security topics given. The main topic are security properties, threats, vulnerabilities, CVE etc.

    $86 (Avg Bid)
    $86 Avg Bid
    38 bids

    Need Ethical hacker with knowledge in Blockchain and Crypto from Chennai, India who can work at the office space provided by us at flexible timing.

    $471 (Avg Bid)
    $471 Avg Bid
    5 bids

    PLEASE APPLY ONLY IF YOU ARE QUALIFIED - THIS JOB IS FOR GENIUS ONLY I want to test the level of security for my website. I need you to hack my own website and check if you can steal my own email database. If you manage to do this, help me find secure the website. The job interview will be done in skype video call only.

    $14839 (Avg Bid)
    $14839 Avg Bid
    23 bids
    find the flag 2 days left
    VERIFIED

    I want to find the flag in small website, this is for first step in my course -cyber security

    $29 (Avg Bid)
    $29 Avg Bid
    19 bids

    I have a windows virtual machine. I want an expert who can do Authentication relay attack on it and document all the steps to do it. This is to be done to check the windows feature "Extended Protection for Authentication". Testing is to be done for IIS and SQL Server 2017.

    $831 (Avg Bid)
    $831 Avg Bid
    3 bids

    To design a novel system architecture for chatting application or wireless lan

    $119 (Avg Bid)
    $119 Avg Bid
    5 bids

    The idea is to do a digital signature but with Encryption, in this case we can retrieve the text and image ( not just hashing). I already have code in Java that do that and android app but I need to convert it to C#

    $177 (Avg Bid)
    $177 Avg Bid
    20 bids

    My computer is being attacked and datas are locked. Looking for someone to help unlock the datas. Below are messages I received when I turned on my computer. ? Your files are encrypted! ? -------------------------------------------------------------------------------- All your important data has been encrypted. To recover data you need decryptor. To get the decryptor you should: Send 1 test image...

    $538 (Avg Bid)
    $538 Avg Bid
    13 bids
    Nand flash rom refreshing 2 days left
    VERIFIED

    Need some ONFI experts to help in accessing rom via Xilinx ISE design Suite or Vivado. I have my own rom, wanting to change the default rom.

    $4925 (Avg Bid)
    $4925 Avg Bid
    7 bids

    We need someone who is good at networking. Need to work from remote. Analyse the network topology of our client and resolve all the issues that is there in their network. Basically there are caching issues in our client's network. Need to view the network topology, scan for any problems and give us the report. Once the report is submitted, based on client approval, need to resolve the issues.

    $139 (Avg Bid)
    $139 Avg Bid
    10 bids

    creating a network for a company

    $289 (Avg Bid)
    $289 Avg Bid
    13 bids
    Article 1500 words 1 day left
    VERIFIED

    Topic IOT security. APA referencing

    $65 (Avg Bid)
    $65 Avg Bid
    52 bids

    i need a report about group management in vehicular social network and how does helps to creates a secure communication .

    $197 (Avg Bid)
    $197 Avg Bid
    2 bids

    Given a vulnerable program, Model the vulnerability (the length of the source of the data is greater than that of the destination data in the sprinf function) by starting with declaring with buf and error as strings. then leverage Z3 (Z3 theorem prover) to generate concrete inputs of buf to trigger this bug/vulnerability. Please mention your experience with cybersecurity, programming, and vulner...

    $90 (Avg Bid)
    $90 Avg Bid
    2 bids

    The idea is to do a digital signature but with Encryption, in this case we can retrieve the text ( not just hashing)

    $21 (Avg Bid)
    $21 Avg Bid
    4 bids
    CISSP training 22 hours left

    CISSP and other related Network Training

    $423 (Avg Bid)
    $423 Avg Bid
    8 bids
    Write_up_10_Pages_Networking 21 hours left
    VERIFIED

    Need to estimate the networking requirements As per office PCs, their locations etc

    $38 (Avg Bid)
    $38 Avg Bid
    10 bids

    Need a Network Administrator for improving the Connectivity in the office.;

    $15 / hr (Avg Bid)
    $15 / hr Avg Bid
    24 bids
    simple packet tracer project 15 hours left
    VERIFIED

    1. Nothing has been preconfigured for you. 2. Make the required physical connections as depicted in the diagram (below). 3. Configure the IP addresses as depicted in the diagram (begin with 192.168). 4. Configure eBGP as follows using the connected physical interfaces as update sources: * R1 to R3 * R1 to R2 * R3 to R4 * R4 to R5 * R2 to R5 5. Add a loopback on R1 and R5 with addresses 1.1.1.1/32 ...

    $31 (Avg Bid)
    $31 Avg Bid
    16 bids

    We are looking to build a new website to market our business that runs marketing campaigns for clients. We need to build a relatively simply Wordpress site with about 5 pages and 3 forms. We will need an faq module. We will also need to integrate a Woocommerce module linked to PayPal or Stripe and list 4 product offerings. The site will also have about six 40 sec mpeg vdos that are just need t...

    $899 (Avg Bid)
    $899 Avg Bid
    140 bids
    HDD decryption 6 hours left

    Dell laptop with pointsec 6.1.0 encryption running Window XP professional. User accidently changed Windows domain to Workgroup and now cannot log back into Windows XP as the system does not recognise his old credentials. At computer boot, he has Pointsec log-in but as soon as windows password screen pops up the system does not recognise his user name or password as it is switch to local. Does not ...

    $165 (Avg Bid)
    $165 Avg Bid
    12 bids

    Please upload your resume Maintaining and administering computer networks and related computing environments including systems software, applications software, hardware, and configurations. Performing disaster recovery operations and data backups when required. Protecting data, software, and hardware by coordinating, planning and implementing network security measures. Troubleshooting, diagnosing...

    $559 (Avg Bid)
    $559 Avg Bid
    28 bids
    retrieve account and security 2 hours left
    VERIFIED

    security my business account on Instagram

    $140 (Avg Bid)
    $140 Avg Bid
    8 bids
    Esports betting prototype 1 hour left
    VERIFIED

    Invention Details: ** BOTH DIGITAL WEB BASED PLATFORM AND PHYSICAL HARDWARE ARE TO WORK SIMULTANEOUSLY*** I am looking to build an esports platform for both admins and end users including: -Login/Sign up page where both gamers and admins may log in and create profiles including bank information associated with sending and receiving money. -"Create event" page where admins can create...

    $3294 (Avg Bid)
    $3294 Avg Bid
    7 bids

    track down public ip and search for vulnerabilities

    $38 / hr (Avg Bid)
    $38 / hr Avg Bid
    21 bids

    I need an admin with VERY strong familiarity with both Amazon Web Services and Linux/Linux Security. The admin hired for this project will be tasked with uploading 4 virtual machines to my Amazon Web Services environment. The virtual machines are virtualbox virtual machines, so they will need to be converted to the OVF format, uploaded to S3, then imported as an EC2 instance in my VPC. OpenVPN AS...

    $442 (Avg Bid)
    $442 Avg Bid
    19 bids

    Top Computer Security Community Articles