Computer Security Jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    57 jobs found, pricing in USD

    Need help in computer networking management Dm indian people

    $61 - $81
    $61 - $81
    0 bids
    ethical hacker needed 6 days left
    VERIFIED

    Recently we were hacked. WE are going over our security. We want an ethical hacker who will be able to report our security weaknesses to us and recommend what we should do. Need someone as soon as possible.

    $39 / hr (Avg Bid)
    $39 / hr Avg Bid
    4 bids

    conduct penetration on a windows machine.

    $147 (Avg Bid)
    $147 Avg Bid
    4 bids

    ONLY BID IF YOU CAN COMPLETE WITHIN 1 HOUR. MAX $10 You work for a company that has branches in different cities and you have been tasked to design the network for your organization. Your initial plan is to show a layer three topology diagram and then cascade down to more details. Task: a) Your first diagram is as shown below: Refer to IMG 1 Assuming R1 is for the central site and R2 is for a bra...

    $27 (Avg Bid)
    $27 Avg Bid
    5 bids

    Rasom ware attack. We need someone who did this before to get back the corrupted file.

    $82 (Avg Bid)
    $82 Avg Bid
    4 bids

    Hi Please accept if you are really professional in doing forensic investigation. Im looking for someone who is able to do digital forensic, analyze the image and find evidence using various software such as FTK Imager, Autopsy etc. Thanks

    $31 (Avg Bid)
    $31 Avg Bid
    11 bids
    I need a ethical hacker 6 days left
    VERIFIED

    There is someone on second life threatening to hack into my sisters pc and also get her swatted and Dox'd. I would like to know the persons real name so I can report him to the police.

    $106 (Avg Bid)
    $106 Avg Bid
    9 bids

    Is there someone who can write a good project on criminology and security management in Kenya for underactuated in AU

    $189 (Avg Bid)
    $189 Avg Bid
    21 bids

    Computer ethics - short response writing

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    7 bids
    lost file -IT 6 days left
    VERIFIED

    Dear all, I worked on a design file for one week, accidentally I have saved an empty file over it, can anybody help me recover or find a backup of it please?

    $197 (Avg Bid)
    $197 Avg Bid
    7 bids

    Write about security issues in applications

    $120 (Avg Bid)
    $120 Avg Bid
    25 bids
    files decryption 6 days left
    VERIFIED

    Looking for someone to decrypt my files which were affected by Neer ransom virus.

    $14 (Avg Bid)
    $14 Avg Bid
    1 bids

    Design a distributed intrusion detection and prevention system Using (4) machine of NIDS (snort )that connected to (cisco)switch with QoS. Install Snort in each machine and write in each machine different set of snort rules (based on attacks categories Dos, probe, U2R and R2L). Then will use packets generator to find the to do the experiment and find the results. The purpose of this design...

    $41 / hr (Avg Bid)
    $41 / hr Avg Bid
    3 bids

    Need help in computer networking Dm indian people

    $62 (Avg Bid)
    $62 Avg Bid
    9 bids

    Please those who are best in their field BID

    $673 (Avg Bid)
    $673 Avg Bid
    9 bids
    Datasets for Analysing Code 5 days left
    VERIFIED

    Anyone good with using metric formula to apply on datasets to get results on a piece of java code and see performance using shannon entropy formula for example?

    $457 (Avg Bid)
    $457 Avg Bid
    8 bids

    Hi, I am looking for help in taking proxy for Google Cloud Security Engineer/ Data Engineer with GCP.

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    2 bids

    I am looking for Networking specialist. Who can complete some questions as soon as possible. Requirement: Question is related to Computer Networking. For Example, Topology, Routing etc. 7/8 question will be given. time will be little bit short.

    $134 (Avg Bid)
    $134 Avg Bid
    14 bids

    This project Requires someone who is familiar with VMware Workstation 16 and SamuraiWTF. three reports will need to be written (check PDF).

    $261 (Avg Bid)
    $261 Avg Bid
    9 bids

    I need help with multiple questions and I am looking for someone who can help me with this. The questions will mostly be mathematical or Free-writing. Please do text me for more INFO!!

    $109 (Avg Bid)
    $109 Avg Bid
    15 bids

    Cloud Networking & Security Start-up looking for a 90-120 seconds explainer video(s). This video will comprise of multiple section, Problem, Solution and Use-case overview and details. We are looking for someone with good solid experience that has worked on technology enterprise explainer videos. Please send us some samples of technology related videos. We have created a simple story line. ...

    $452 (Avg Bid)
    $452 Avg Bid
    39 bids

    Looking for cryptography expert to decode an [login to view URL] following number (in decimal): 0134265827 can be found in the following data (in hexadecimal): 04BA1F88 C094FE7C C9275C5B Thank you in [login to view URL] discuss more if you need

    $383 (Avg Bid)
    $383 Avg Bid
    6 bids

    Is there someone who can write a good project on criminology and security management in Kenya for underactuated in Kenya

    $24 (Avg Bid)
    $24 Avg Bid
    20 bids

    fix 503 error, timeout, configer server security

    $64 (Avg Bid)
    $64 Avg Bid
    26 bids

    Need an experience tutor who can teach me basics and beginning level of hacking. It will be like online meeting based on session. There is no problem with the budget. I wanted it to be divided into 7 sessions and each session being of around an hour or whatever is comfortable with you. What I will require is kind of index of content for the 7 Sessions that you will be covering. Please make it kin...

    $34 / hr (Avg Bid)
    $34 / hr Avg Bid
    4 bids
    networking project 4 days left
    VERIFIED

    need someone who has deep knowledge about computer networking......i have a networking exam so i would need someone to help me answer some questions. the test is 45 minutes long and there are all mcq questions

    $26 (Avg Bid)
    $26 Avg Bid
    14 bids
    PhD Proposal 4 days left

    I am looking for a good writer to write a PhD proposal as given below: End User Privacy friendly- for IOT development Internet of Things (IoT) applications development and design process is more complicated than others, such as the one for desktop, web, or mobile. That’s because IoT applications need both software and hardware to cooperate across multiple nodes with different capabilities. ...

    $128 (Avg Bid)
    $128 Avg Bid
    49 bids

    The past few years have witnessed a wide deployment of software defined networks facilitating a separation of the control plane from the forwarding plane. However, the work on the control plane largely relies on a manual process in configuring forwarding strategies. To address this issue, this paper presents NetworkAI, an intelligent architecture for self-learning control strategies in SDN network...

    $137 (Avg Bid)
    $137 Avg Bid
    6 bids

    I need you to design and build my online store.

    $212 (Avg Bid)
    $212 Avg Bid
    2 bids
    network design 4 days left
    VERIFIED

    need to redesign network using packet tracer

    $69 (Avg Bid)
    $69 Avg Bid
    26 bids

    I need a solution. I have a router that broadcasts over a 1km range. I want to charge people for connecting to it. how would I go about this? I want to charge according to data transferred. for example they can buy 1GB for 1 dollar. after that they have to buy another bundle to continue browsing. Will i need to use mac address to know data transferred to a user or what exactly will i use. or maybe...

    $146 (Avg Bid)
    $146 Avg Bid
    5 bids

    on policies and governance for IT security

    $27 (Avg Bid)
    $27 Avg Bid
    28 bids
    The academic report 4 days left
    VERIFIED

    i need academic report for one of the topics in cyber security. required: Table of Contents - The report contains 20 to 30 pages - Pictures and chart topic will be shared.

    $76 (Avg Bid)
    $76 Avg Bid
    71 bids

    As a penetration tester and cybersecurity researcher, I have a deep understanding of the end-to-end security process to ensure all vulnerabilities are identified. My experience in testing a web application, database, system, and network comes from my background as a Penetration Tester. Skills: Perform automated and manual vulnerability analysis Demonstrate the application of penetration testing ...

    $149 (Avg Bid)
    $149 Avg Bid
    1 bids

    I need a script so that I use to stress test my website for Denial of service attack. I have about 10 websites running.

    $17 (Avg Bid)
    $17 Avg Bid
    3 bids
    cyber security 3 days left

    how cybersecurity is relevant to Biometrics or Organizational Management during times of crisis. or Failures of Knowledge Management Systems. or Successes of Knowledge Management Systems. or Social networking in the 21th Century. or Web sports or Search Engine Optimization or Robotics and what needs be done to optimize security of [login to view URL] a research paper done on the topic provided abo...

    $92 (Avg Bid)
    $92 Avg Bid
    31 bids
    Sales Expert 3 days left

    Sales expert required to be in live chat with a customer looking to buy a security product for their small business.

    $45 (Avg Bid)
    $45 Avg Bid
    9 bids
    Expert in Cyber Security -- 2 2 days left
    VERIFIED

    I want someone who can complete a mini project. There will be five tasks 1. Buffer Overflow 2. Web AOacks 3. Password AOacks 4. Metasploit Framework

    $82 (Avg Bid)
    $82 Avg Bid
    6 bids
    Communication 2 days left

    I have a home security system Which has 4 camera and 1 sensor each one has a different IP number so total 5 IP All connected by Ethernet cable to a 4G router TP link Archer M200 then to relay all Data to my home computer

    $129 (Avg Bid)
    $129 Avg Bid
    10 bids

    Any Helium miner experts? I have a few miners where i need to forward the ports - but for some reason i cant do it on any of my routers I need the following done remotely Change your NAT settings to OPEN Port Forwarding 44158 in your router Enable UPnP and delete Port Forwarding

    $92 (Avg Bid)
    $92 Avg Bid
    10 bids

    Setting up a Dell laptop. Need help setting up windows 10 and how to properly apply the correct product key.

    $33 / hr (Avg Bid)
    $33 / hr Avg Bid
    31 bids
    $28 Avg Bid
    42 bids

    We are looking for an Network/Information Security Engineer on a contract basis to help us with FedRAMP certification. This role will be full-time for at least 3-6 months. To be a successful candidate, you will need to have a proficient understanding of network infrastructure and network hardware and FedRAMP as well. You will also need to be able to implement, administer, and troubleshoot network...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    10 bids

    I need a highly technician to help me with qubes os. I need to run VMs in purposes .

    $133 (Avg Bid)
    $133 Avg Bid
    4 bids
    networking projectt 1 day left
    VERIFIED

    it is a computer networking project related to ODL flow manager I can provide the file in the messages

    $17 (Avg Bid)
    $17 Avg Bid
    2 bids
    networking projectt 1 day left
    VERIFIED

    it is a computer networking project

    $20 (Avg Bid)
    $20 Avg Bid
    2 bids

    Combining both DNS and DMARC to reduce spam mails receiving to end user.

    $243 (Avg Bid)
    $243 Avg Bid
    11 bids

    Objective • Study and evaluate anti forensic attacks committed by criminals • Identify the prevention and mitigation methods for anti-forensics. • Investigate anti-forensic tools for data hiding, artifact wiping, and trail obfuscation. • Propose detection or mitigation methods for each subcategory of anti-forensics

    $51 (Avg Bid)
    $51 Avg Bid
    7 bids

    Need Java developer for creating DOS attack functionality in LTE vehicular network project and resolving the attack for Handover scenario

    $110 (Avg Bid)
    $110 Avg Bid
    4 bids

    Need an expert who has good knowledge in defensing mechanisms to protect applications, systems and networks from hackers

    $45 (Avg Bid)
    $45 Avg Bid
    7 bids

    Top Computer Security Community Articles