Computer Security Jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    45 jobs found, pricing in USD
    Mobile network 6 days left
    VERIFIED

    Consist of a mobile user, a home server and a foreign server. Mobile user, who is subscribed to home server, is in a foreign network administered by foreign server. There is direct link between Mobile user and foreign server, there is direct link between home server and foreign server. However, there is no link between mobile user and home server. In order to obtain the services provided by foreig...

    $16 (Avg Bid)
    $16 Avg Bid
    2 bids

    Details will be shared in chat box directly

    $8 - $20
    $8 - $20
    0 bids

    Setup remote desktop on our windows pro 10 computers and set the network security options so the code will not be stolen

    $63 (Avg Bid)
    $63 Avg Bid
    10 bids

    I have cyber security monitoring requirements and I need to develop a run book for each of the process I want to develop a run books/ work flows for security analysts to follow. The person must be a cyber security analyst and understand how to follow a cyber security run book/ work book /play book

    $117 (Avg Bid)
    $117 Avg Bid
    5 bids

    Hi, Please do refer to the attached .pdf specs for more details. Feel free to ask for any clarification that might be required. Thank you for your time! Premysl

    $18 (Avg Bid)
    $18 Avg Bid
    2 bids
    Ethical Hacking 6 days left

    We need certified ethical hacking person to secure our site.

    $125 (Avg Bid)
    $125 Avg Bid
    5 bids

    Below are some example projects. . For each project, we will be applying a real attack, then we will detect it, and we will demonstrate how to mitigate these attacks. First, you will be proposing a team and a proposal paragraph on your project where you will be explaining which environment you are targeting, what kind of attacks you will be applying, how you are planning to detect and also mitig...

    $15 (Avg Bid)
    $15 Avg Bid
    3 bids

    Below are some example projects. . For each project, we will be applying a real attack, then we will detect it, and we will demonstrate how to mitigate these attacks. First, you will be proposing a team and a proposal paragraph on your project where you will be explaining which environment you are targeting, what kind of attacks you will be applying, how you are planning to detect and also mitig...

    $14 (Avg Bid)
    $14 Avg Bid
    1 bids

    Needs advice on how to improve network security scenario including firewall and command lines

    $206 (Avg Bid)
    $206 Avg Bid
    14 bids

    Decrypt 4-5 encrypted string which i will share and explain the encryption and decryption process using PHP. NOTE :- Only expertise shall bid.

    $133 (Avg Bid)
    $133 Avg Bid
    2 bids

    The database design process for NoSQL databases is different from one for relational (SQL) databases. As we learned NoSQL database does not require the use of a predefined structure, except for creating a list of databases and the list of collections. Some of the NoSQL databases (like MongoDB) allow us to define what the structure should be for certain rules that will define what should be the st...

    $291 (Avg Bid)
    $291 Avg Bid
    2 bids
    Network security writer 5 days left
    VERIFIED

    professional explanation in network

    $23 (Avg Bid)
    $23 Avg Bid
    25 bids

    I need a Cyber Security Expert to help me in my project.

    $26 (Avg Bid)
    $26 Avg Bid
    3 bids

    I need a hardware ID spoofer that will change serial numbers, model and manufacture with user friendly instructions. Applications that request hardware data should not receive real data, but those that will be emulated by your application. The real data about the hardware of the computer for application should be hidden. I need it to spoof serial numbers, model and Manufacturer: Obigious condit...

    $30 - $250
    $30 - $250
    0 bids
    make a case study on word 5 days left
    VERIFIED

    Developing an app to block Denial Of Service attacks on a machine

    $10 (Avg Bid)
    $10 Avg Bid
    1 bids

    Write a security report on the basis of notes that we have found ourselves that may become a vulnerability if we do not manage everything carefully. The security report must be written in English and should not become a book but a short easy to read security report about our notes. Budget 500

    $386 (Avg Bid)
    $386 Avg Bid
    41 bids

    Hello I need an expert in Computer Networking in a few hours. Please reply if you have the required expertise.

    $77 (Avg Bid)
    $77 Avg Bid
    21 bids
    External Security Advisories 4 days left
    VERIFIED

    For our mobile platform we require one security engineer who can advise us regarding security, quick overview if we are on the right track as an third party reviewing other persons work. Budget is about 250 - 300

    $121 (Avg Bid)
    $121 Avg Bid
    6 bids

    It a sort of software that actually monitors kid’s activities on tablets/smart phone/desktops/laptops and restricts access to applications or websites defined and allow to certain. It must include but not limited to the followings: 1- Software that can be installed in android and windows (tablets and laptops, desktop). 2- Should give a full report of what has been done in the device. 3- The ...

    $750 (Avg Bid)
    NDA
    $750 Avg Bid
    1 bids

    Need someone good with security and operating system

    $27 (Avg Bid)
    $27 Avg Bid
    6 bids
    Cyber security expert 4 days left
    VERIFIED

    Cyber security expert to fully secure a payments system (implement the end to end security). The front is in react.js and back in Java (spring boot).

    $2379 (Avg Bid)
    $2379 Avg Bid
    22 bids

    Need gamified web content related to Cyber Security, please message to ask for more details. Please reach out only if you have recognizable security certifications like CISSP and CEH.

    $71 (Avg Bid)
    $71 Avg Bid
    3 bids
    Kali Linux project 3 days left
    VERIFIED

    hi i need someone expert professional at forencis tool use cases and then report the findings &a presentation. The study must cover major features for software through benchmark forensics data like as computer Forensic Reference Sets (CSReDS) thank you

    $71 (Avg Bid)
    $71 Avg Bid
    6 bids

    I need just need a cybersecurity plan, with all details about possible risks and how to avoid them as much as possible. This is for a high school and we aim to protect teenagers when using our platform and emails. We have the virtual campus with moodle and this is storaged in moodle cloud. The institutional mail is with gmail. Also, it sould include recommendations for the hosting for the website ...

    $132 (Avg Bid)
    $132 Avg Bid
    12 bids

    *Some of these settings are hidden or managed by your organization this message is above in red and I don't know why but it cant be removed, I tried a lot of solution to this problem white the help of google and youtube but it just can't be removed. Help me please

    $19 (Avg Bid)
    $19 Avg Bid
    2 bids
    Cyber security 3 days left
    VERIFIED

    Need Cyber security pro for a quick project. Will discuss. Bid only if you are expert in Cyber security

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    9 bids

    I have recently upgraded to Ubiquiti access points and switches and the UDM-PRO Dream Machine. I'm unfamiliar with it's firewall settings, etc and was looking for some help. I want to configure a solid firewall and secure home network. I am prepared to sacrifice some network speed for greater security. This person would have to be proficient with Ubiquiti (Unifi) products and the UDM...

    $154 (Avg Bid)
    $154 Avg Bid
    8 bids
    Need Cyber security pro 3 days left
    VERIFIED

    Need Cyber security pro for a quick project. Will discuss. Bid only if you are expert in Cyber security

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    5 bids

    I need some network related expert person who has good experience of Linux Environment , Eclipse, OpenFlow Libraries. I have some basic level tasks I need work at Low budget

    $8 / hr (Avg Bid)
    $8 / hr Avg Bid
    6 bids
    Cyber Security project 2 days left
    VERIFIED

    Hello, I would like to build a security orchestration, automation, and response(SOAR) product. The term is used to describe three software capabilities – threat and vulnerability management, security incident response and security operations automation. SOAR allows companies to collect threat-related data from a range of sources and automate responses to low-level threats. I want only se...

    $9017 (Avg Bid)
    $9017 Avg Bid
    5 bids

    Written:- Specify, justify and plan a project to enable the implementation of a substantial product or service of a form appropriate to the student’s subject area / award set. Undertake detailed academic and practical research in an area appropriate to the student’s chosen project. Presentation and supporting material:- Apply research, methodology and skills to design, build, test an...

    $143 (Avg Bid)
    $143 Avg Bid
    8 bids
    Human Computer Interaction 2 days left
    VERIFIED

    LO1Demonstrate a critical understanding of current techniques of task analysis, design approaches and user interface implementation within specific human-computer environments. LO2Critically appraise methods and guidelines for HCI evaluation, and conduct an evaluation using proposed evaluation techniques and evaluative criteria. LO3Assess the various trends towards more sophisticated interfaces ...

    $20 (Avg Bid)
    $20 Avg Bid
    9 bids
    Setting Up A Secured VPN. 2 days left
    VERIFIED

    Need custom iso made with VPN requirements in side of it.

    $460 (Avg Bid)
    $460 Avg Bid
    11 bids

    Looking for someone who is great with theories in Cyber Security

    $22 (Avg Bid)
    $22 Avg Bid
    21 bids

    Synology DiskStation 2 storages in office my requirement is this 2 storages data need to replicate at home which is public network. Every day

    $20 (Avg Bid)
    $20 Avg Bid
    2 bids
    Penetration testing 1 day left
    VERIFIED

    Hi, I'd like someone to perform penetration testing on my network and provide a detailed report of vulnerabilities and then fix those vulnerabilities. I have a small network with only a couple of publicly facing IP's and open ports. I run everything else on a private network but it also needs to be considered for breach containment.

    $193 (Avg Bid)
    $193 Avg Bid
    19 bids

    I am looking for an Expert in Network Topology (network monitoring and IPS)

    $352 (Avg Bid)
    $352 Avg Bid
    10 bids

    I am issuing a company phone and need to have some sort of monitoring system installed on the phone. I want it to be controlled via Kali

    $454 (Avg Bid)
    $454 Avg Bid
    7 bids
    forensics tool 1 day left
    VERIFIED

    hi i need someone expert at forensics tool use cases & write report the findings & presentation. study muxt cover major features software tool through use it at benchmark forensics data like Computer Forensic Reference Data Sets (CFREDS) thank you

    $10 (Avg Bid)
    $10 Avg Bid
    7 bids
    Cyber security 1 day left

    Need Cyber security ..consulting ..guidance

    $88 (Avg Bid)
    $88 Avg Bid
    30 bids
    White hat hacker 18 hours left
    VERIFIED

    Need to find a creative and flexible minded it security pentesting expert for my company. Main jobs will be web application security testing, finding vulnerabilities, loop holes, password cracking, priviledge escalating and such.

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    14 bids
    Proxy related work 12 hours left
    VERIFIED

    Need help learning how to create datacenter proxies and internet service provider (ISP) proxies. Looking for someone who know about proxy creation, subnet creation, and someone who is proficient at creating scripts. Process needs to be replicable as I may need 1000's of different proxies at one time. Please message me if you can help. These ips need to be able to be used on specific websites.

    $700 (Avg Bid)
    $700 Avg Bid
    2 bids
    IP generation task 12 hours left
    VERIFIED

    Need help learning how to create datacenter proxies and internet service provider (ISP) proxies. Looking for someone who know about proxy creation, subnet creation, and someone who is proficient at creating scripts. Process needs to be replicable as I may need 1000's of different proxies at one time. Please message me if you can help. These ips need to be able to be used on specific websites.

    $402 (Avg Bid)
    $402 Avg Bid
    3 bids

    we are looking for a person who can solve our webite malware problems.

    $19 (Avg Bid)
    $19 Avg Bid
    11 bids

    Top Computer Security Community Articles