Computer Sikkerhed Jobs
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
- Establishing secure network infrastructure
- Improving system performance and leveraging encryption
- Developing security frameworks for organizations
- Implementing authentication measures for digital identification
- Evaluating risks of cyber incident exposure
- Researching the latest security regulations for compliance
- Crafting secure policies for employee engagement
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
Baseret på 102,613 bedømmelser, giver vores klienter os Computer Security Consultants 4.86 ud af 5 stjerner.Ansæt Computer Security Consultants
I need an ethical hacker to recover an email account.
I am seeking assistance with setting up an intrusion detection system for my Wide Area Network (WAN) to enhance network security and protect against trojans. Specific requirements for the project include: - Configuration of the intrusion detection system - Testing and fine-tuning of the system - Implementation of necessary security measures to detect and prevent trojan attacks Ideal skills and experience for the job: - Strong knowledge of network security and trojan protection - Experience in setting up and configuring intrusion detection systems - Familiarity with WAN networks Preferred method of communication during the project is via email.
I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify and addre...
I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify and addre...
I am looking for Computer Networks experts who have experience in Network Design and Architecture. Specific requirements for the project include: - Designing and implementing a computer network infrastructure - Creating network diagrams and documentation - Configuring routers, switches, and firewalls Given an IP datagram with the fragmentation offset of 00000010110102, HLEN of 516 and the total length of 007A16, find the numbers of the first byte and the last byte of data - Troubleshooting network issues and ensuring network performance and security The ideal freelancer for this project should have: - Strong knowledge and experience in computer networks - Proficiency in network design and architecture - Familiarity with network security protocols and best practices - Ability to troubl...
Through this project, you are expected to: to use project management tools to help development, especially git (e.g., Github); security/privacy demand analysis; selection and application of existing security/privacy tools
Hello, We're on the lookout for enthusiastic game testers to assess our PC games (minimum 30 minutes per game) and provide detailed playing experiences (at least 150 words per game). We invite you to offer a price for testing and reviewing 10 games. Please bear in mind that we are operating on a limited budget, so we're seeking individuals who genuinely enjoy playing games rather than those solely driven by financial gains. If you have a passion for gaming and want to be a part of our testing team, we'd love to hear from you!
I am looking for a website security tester for my organization. Specific Type of Security Testing: Vulnerability Assessment - I need someone who can conduct a thorough vulnerability assessment of my website. Report Requirement: Yes, detailed report - I would like a comprehensive report on the findings of the assessment. Ideal Skills and Experience: - Strong knowledge and experience in website security testing - Familiarity with various vulnerability assessment tools and techniques - Ability to identify and assess vulnerabilities in different areas of a website - Proficiency in generating detailed reports that highlight vulnerabilities and potential risks Note: The client did not provide any specific areas or features of concern in their website.
Project Title: Report and Paper presentation on Internet of things in security Description: I am in need of a skilled professional to create a report and paper presentation on the emerging technologies and trends in IoT security. The intended audience for this project is technical professionals. The report and presentation should be in an academic style with references. Requirements: - In-depth research on the latest emerging technologies and trends in IoT security - Clear and concise presentation of the findings - Use of academic style with proper referencing - Thorough understanding of IoT security and its challenges - Ability to present complex information in an easily understandable manner for technical professionals - Strong analytical and writing skills Ideal Skills and Experie...
Need help with checking to see if has been compromised (if thats possible) by a hacker.
I am looking for a Cisco networking expert who can configure my Cisco 800 Router to function as a dual WAN failover system. The primary use of the router is for Internet with VPN connectivity. Details: - Currently the router is being used in production with 1 WAN configured and a VPN Client configured which connects to an off-premise external VPN Server. - When WAN1 is down, i need it to switch to WAN2 and make sure the VPN Client is connected too. Requirements: - Configure the router to have the 2nd WAN, when WAN1 is down, it will automatically switch to WAN2 and reconnect the VPN Client. - Ensure that the failover process has minimum/reasonable downtime. - Provide advice and recommendations on the best configuration for optimal performance. - Please keep in-mind that this needs to ...
VMware virtualization Expert in NSX solutions 1. Port filtering of the servers. 2. Activation of the filtered policies during the customer's preferred downtimes. 3. Preparation and submission of a UAT (User Acceptance Testing) checklist for customer approval. 4. Implementation of any necessary corrections or amendments to configurations based on UAT feedback. 5. Final testing to verify the success of any failed or amended UAT checklist items. 6. Creation of as-built documentation. 7. Knowledge transfer (KT) sessions for the customer's team. 8. Acquisition of the Work Completion Report (WCR) from the customer for NSX. 9. Regarding the port filtering SHC had a communication matrix taken from the firewall. However, due to the installation of new servers, client doe...
We’re having hard time to book VFS appointment for our clients in India due to the issues on their anyone could help ,we would be happy to work with them for our clients have lots of clients looking for appointment. Please let us know. Thank you.
I am looking for a freelancer who can assist me with an OPNET project. Specific Goal: - The specific goal of this project is network design and optimization. Software and Models: - I have a specific software/model that I would like to use for this project. Timeline: - The project needs to be completed within 1 week. Ideal Skills and Experience: - Experience in OPNET simulation and optimization. - Knowledge of network design and performance analysis. - Proficiency in the specific software/model that will be used. If you have the necessary skills and can meet the tight deadline, please submit your proposal.
I am looking for a freelancer to create a script for setting up a MikroTik router VPN using SSTP and OpenVPN protocols. Requirements: - Experience with MikroTik routers and VPN configuration - Proficiency in scripting languages - Knowledge of SSTP and OpenVPN protocols Scope of work: - Develop a script for the entire setup of the MikroTik router VPN - Provide assistance with the VPN configuration Please note that I require help with the entire setup, so expertise in MikroTik routers and VPN configuration is essential.
I am looking for a skilled professional to assist me with my cyber security project. Specific Aspect: Website security and hacks Specific Security Requirement: Preventing data breaches Ideal Skills and Experience: - Expertise in network security - Strong knowledge of data encryption - Experience in security policy development Additional Information: - I have specific security requirements and concerns - The main concern is preventing data breaches - Compliance with industry regulations is also important - Securing sensitive customer data is a priority If you have the necessary skills and experience in network security, data encryption, and security policy development, I would be interested in discussing this project further with you.
PC Expert I am looking for a PC expert who can assist me with software troubleshooting. Skills and Experience: - Strong knowledge and experience in troubleshooting various software issues on PCs - Familiarity with different operating systems and software applications - Ability to identify and resolve software conflicts and compatibility issues - Experience in diagnosing and fixing software errors, crashes, and viruses Assistance Required: - Remote assistance: The expert should be able to provide remote support to troubleshoot software issues on my PC. - Onsite assistance: If necessary, the expert should be available to visit my location and provide hands-on support for more complex software problems. Communication: - Preferred method of communication is WhatsApp, as it allows for quick...
You will work hand in hand with me on different projects with different clients, always related to information security and cybersecurity. You will work on vulnerability scans, vulnerability reports, writing Patch Tuesday articles, writing documentation such as information security policies or incident response plans, etc... Each month, you will be billed according to the hours you have worked.
Setting up Home WiFi - I am looking for someone to help me set up my home WiFi network using a cable internet service. - I only need assistance with the initial setup and configuration, no ongoing maintenance is required. - The WiFi network will be used to connect my printer, PC, and phone. - The ideal candidate should have experience in setting up home WiFi networks and be familiar with cable internet services. - Knowledge of configuring devices such as printers and PCs to connect to WiFi is also required.
I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify and addre...
Project Title: High CPU Load Overview: I am experiencing a very high CPU load on my CentOS system and I am seeking assistance to identify the specific programs or processes causing this issue. Requirements: - Experience in troubleshooting high CPU load issues on CentOS - Strong knowledge of CPU monitoring and analysis tools - Ability to identify and optimize resource-intensive programs or processes - Familiarity with system performance tuning techniques - Proficiency in Linux system administration Deliverables: - Analysis of the current CPU load and identification of potential causes - Recommendations and implementation of optimizations to reduce CPU usage - Documentation of the troubleshooting process and solutions implemented Ideal Skills and Experience: - Proficient in CentOS system...
Project Title: Computer Organization - Assistance with Theoretical Input/Output Systems I am seeking assistance with the specific aspect of computer organization related to Input/Output Systems. The project will be focused on a theoretical understanding of this topic. Skills and Experience Needed: - Strong knowledge of computer organization and architecture - Familiarity with Input/Output Systems and their role in computer operation - Proficiency in theoretical analysis and understanding of computer systems Project Requirements: - Provide a basic overview of Input/Output Systems in computer organization - Explain the principles and concepts behind Input/Output Systems - Discuss the role and importance of Input/Output Systems in computer operation - Provide examples and illustrations to ...
Project Title: Search Engine Ethical Hacker to Secure Business Reviews I am looking for a skilled and experienced ethical hacker who specializes in securing business reviews on the Google search engine. The main concern I have is with fake negative reviews that are affecting my business's reputation. Key Requirements: - Expertise in ethical hacking with a focus on securing online reviews on Google - Proven experience in identifying and mitigating fake negative reviews - In-depth knowledge of Google's review platform and its security measures - Ability to assess and identify vulnerabilities in the review system and implement effective security measures - Strong problem-solving skills and the ability to think creatively to protect against review-related security breaches Previo...
Project Title: Cyber Security Description: I am in need of assistance with network security for my small network of 1-10 devices. I am looking for a one-time solution to improve the security of my network. Specific requirements for the project include: - Conducting a comprehensive network security assessment to identify vulnerabilities and potential risks - Implementing necessary measures and protocols to protect against unauthorized access and data breaches - Setting up firewalls, encryption, and other security measures to safeguard sensitive information - Monitoring and detecting any suspicious activities or potential security breaches - Providing recommendations and best practices for maintaining network security in the future Ideal skills and experience for this project: - Strong ...
ESXI Networking issue I am currently experiencing connectivity issues with my ESXI 6.7 networking. Although no error messages are being displayed, I am unable to establish proper network connections. Skills and experience required: - Strong knowledge and experience with ESXI 6.7 networking - Expertise in troubleshooting connectivity issues - Familiarity with virtual networking and network configuration - Ability to diagnose and resolve networking problems efficiently
I am looking for an entry-level technician who can help me with the installation of an sdwan system at multiple local locations. The specific tasks I expect from the technician include installation only. Ideal skills and experience for the job: - Basic understanding of networking and computer systems - Familiarity with sdwan technology and installation processes - Ability to work independently and follow instructions accurately - Strong problem-solving and troubleshooting skills Please note that this is a part-time position, and the technician will be required to travel to multiple local locations for the installations.
Network Design: Develop and design comprehensive network solutions that align with the organization's business goals and requirements. Create detailed network architecture diagrams, documentation, and specifications. Protocols and Technologies: Stay updated on the latest networking technologies, protocols, and industry trends. Evaluate and recommend hardware, software, and communication protocols to support the organization's network infrastructure. Security: Implement security measures to protect the network from unauthorized access, attacks, and vulnerabilities. Design and integrate security features such as firewalls, VPNs, and intrusion detection systems. Capacity Planning: Analyse network traffic and performance to determine capacity requirements and scalability. Plan fo...
Need Help Setting Up Residential Proxies for Anonymity Skills and Experience Required: - Experience in setting up residential proxies - Knowledge of proxy server configurations - Familiarity with network security protocols Project Details: - I am looking for someone who can assist me in setting up residential proxies for anonymity purposes. - The ideal candidate should have experience in configuring proxy servers and ensuring secure connections. - The project involves setting up 1-5 residential proxies. - The proxies will be used to enhance online privacy and maintain anonymity. - The candidate should have knowledge of network security protocols to ensure the proxies are secure and reliable. - Familiarity with accessing geo-restricted content through proxies is a plus. - The project requ...
I am looking for someone who can provide me with PAM DEFENDER exam dumps I prefer the dumps to be in PDF format. I am particularly interested in studying the general overview of PAM DEFENDER and its practical applications. Skills and experience needed: - In-depth knowledge of PAM DEFENDER - Experience in creating exam dumps in PDF format - Familiarity with the general overview and practical applications of PAM DEFENDER
I am seeking assistance in protecting my phones and laptops from potential harm caused by individuals with strong hacking tools. Skills and Experience: - Proficiency in cybersecurity protection, including antivirus software and firewalls - Knowledge and experience in providing cybersecurity solutions for both phones and laptops - Ability to explain and implement cybersecurity measures in a beginner-friendly manner
Project Title: Qubes OS Security Enhancement Overview: We are seeking a skilled professional to enhance the security of our Qubes OS. Our operating system has recently experienced a minor compromise, and we are looking to implement new security measures to prevent future breaches. Specific Requirements: - Expertise in Qubes OS and its operating system component - In-depth knowledge of virtualization technologies and security architecture - Familiarity with the specific aspect of the Qubes OS operating system that was compromised (Operating System) - Ability to assess the severity of the compromise and determine appropriate security measures - Experience in implementing new security measures to strengthen the overall system Deliverables: 1. Comprehensive analysis of the compromised aspe...
Project Title: Qubes OS Compromise Investigation and Mitigation Assistance I am seeking a skilled professional to assist me in investigating a compromise in my Qubes OS. As a beginner in terms of technical expertise, I require an expert who can guide me through the process and provide necessary assistance in implementing the solutions. Specific Requirements: - Identification of the Attacker: The main objective is to identify the individual or group responsible for compromising my Qubes OS. The expert should possess deep knowledge and experience in forensic analysis and be able to trace the attacker's activities. - Details of the Attack: I need a thorough analysis of the attack, including the methods used, entry points exploited, and any potential vulnerabilities in my system. The ...
I am looking for a skilled professional to conduct a vulnerability assessment and penetration testing for my systems and applications. Specifics: - I will provide a list of systems and applications to prioritize for testing. - The testing should be completed within a month. - I require a detailed report after the testing, including recommended solutions. Ideal skills and experience: - Proficiency in conducting vulnerability assessments and penetration testing. - Knowledge of various systems and applications. - Ability to provide detailed reports with recommended solutions. Please provide your portfolio and relevant experience when submitting a proposal. Thank you.
Mobile App Vulnerability Assessment - I am looking for an ethical hacker to conduct a general scan of my mobile app for vulnerabilities. - The specific areas of concern within the mobile app are not known, so a comprehensive scan of the entire app is required. - Ongoing security monitoring is not required after the initial vulnerability assessment. Skills and Experience: - Ethical hacking experience in mobile app security. - Knowledge of common vulnerabilities and techniques used in mobile app hacking. - Ability to conduct thorough scans and identify potential vulnerabilities within the mobile app.
Project Title: PCI DSS Compliance for On-Premises Cardholder Data and Systems Overview: I am seeking a skilled professional to assist me with achieving PCI DSS compliance for my on-premises cardholder data and systems. The project involves ensuring that all necessary security measures are in place to protect sensitive data. The person is required to be fully certified and apply the full assessment and auditing remotely in cooperation with the experienced Cyber security technician onsite
I'm in need of some help with network troubleshooting. Ideally, I'd like to receive remote support so I don't have to wait for someone to come on-site. This isn't an urgent issue, so it can be scheduled within a day. Hopefully I can find the right freelancer to help my business quickly!
I am looking for an embedded telecommunications network specialist with expertise in wireless communication protocols, network security, and IoT connectivity protocols. Troubleshooting of Opticomm embedded network Requirements: - Strong knowledge and experience in embedded fibre network - Ability to design and implement secure and reliable wireless communication protocols - Proficiency in IoT connectivity protocols - Understanding of network security measures The project has specific requirements and the expected timeline is 1-2 weeks. Ideal candidates should be able to work efficiently to meet the deadline.
I Have a Dedicated Server behind a V Switch ad a ip Subnet with /24 - i want to use this IPs on my Cloud as well - also my Dedicated Server have a Firewall installed wich Provides DHCP and VPN so i want to use public ips in cloud i want to use my Dedicated Servers Firewall ( Opnsense) to connect my systems in the cloud.
We are looking for an expert in cyber security to assist us with an urgent task. Specifically, we need help to investigate who is behind an Instagram account. To be considered for this project, freelancers must have experience in the cyber security field and include their past work in their applications. We need a resolution to this case within 24 hours, so time is of the essence. If you think you are the right fit, please apply!
My organization is looking for an experienced ethical hacker to complete a one-time security check, with a basic summary report being generated upon completion. The focus of the security check should be on network security. Our team is eager to find a skilled professional to help ensure the safety of our carefully crafted systems. We remain confident that the selected ethical hacker will have the skills to deliver top-notch results and guarantee that our company stays secure.
I am looking for a Cyber Security Tutor who specializes in Information Security. As an intermediate level learner, I am seeking someone who can help me deepen my understanding in this area. Specific Requirements: - Strong knowledge and experience in Information Security - Ability to explain complex concepts in a clear and concise manner - Familiarity with current industry practices and trends in Information Security Ideal Skills and Experience: - Professional experience in the field of Information Security - Experience in teaching or tutoring in Cyber Security - Excellent communication and interpersonal skills Tutoring Sessions: - I would like to have tutoring sessions multiple times a week to ensure consistent learning and progress in my understanding of Information Security. If you h...
Hi, I'm looking to hire an experienced ethical hacker. The goal of this project is to identify and fix any vulnerabilities, in order to improve overall system security measures. The ideal ethical hacker will have experience with android, Web, Internet and have an understanding of best practices for identifying and addressing security vulnerabilities. This person should be knowledgeable about common threats and issues associated with mobile security, as well as familiar with security. This project should result in the identification and repair of any potential security vulnerabilities. If you are an experienced ethical hacker capable of completing this project, please get in touch. Thank you for your consideration.
I am looking for a freelancer who can enhance the security of my website, with a focus on server and network protection. Specific areas of expertise required for this project include: - Knowledge of server and network security protocols and best practices - Experience in identifying and mitigating specific threats to website security - Familiarity with tools and techniques for enhancing server and network protection The current state of my website's security measures is at a moderate level of protection. I have specific security threats that I am concerned about and would like the freelancer to address. If you have the skills and experience necessary to enhance the security of my website and protect it from specific threats, please submit your proposal.
very strong ddos attack on website cloud flare is set up seems like ip based attack
I'm in need of some help with network troubleshooting. Ideally, I'd like to receive remote support so I don't have to wait for someone to come on-site. This isn't an urgent issue, so it can be scheduled within a day. Hopefully I can find the right freelancer to help my business quickly!
I am looking for a skilled professional to secure my website against DDoS attacks. The ideal candidate should have experience in website security and be able to implement effective measures to protect against DDoS attacks. Budget: $100 Specific security measures: No, I am open to suggestions Timeline: Immediately Skills and experience required: - Strong knowledge of website security and DDoS attack prevention - Experience in implementing security measures to protect against DDoS attacks - Ability to quickly assess and identify vulnerabilities in the website - Proficiency in configuring firewalls and other security tools to mitigate DDoS attacks - Knowledge of industry best practices for website security If you have the necessary skills and expertise to secure my website against DDoS a...
Right now we have a deployment under GCP with Kubernetes, all pods inside 1 node. All the pods what the ip address 10.x.x.x. Along that we have a VPN where we have a server under 192.168.x.x IP The issue that we have its that we can not communicate from the PODS to the 192.168.x.x IP. If we try from the node a telnet or ping it works, if we try from another instance in GCP I can do a telnet but we can never do it from inside the pod We. have been checking and it seems it has avoid masquerading , , We tried using hostNetwork: true in the deployment for the pods this works but this generates security issues
I am looking for a Microsoft Security Consultant who can provide ongoing support for our company's specific security issue of malware attacks. Skills and Experience: - Strong knowledge and experience in Microsoft security solutions - Proven track record in mitigating and preventing malware attacks - Familiarity with network vulnerabilities and data breaches - Ability to provide ongoing support and consultation - Excellent communication skills and ability to respond within 48 hours The ideal candidate will be able to assess our current security measures, identify vulnerabilities, and develop a comprehensive plan to protect our systems from malware attacks. They will also be available to provide ongoing support and consultation as new threats emerge.
I am looking for assistance with integrating blockchain technology with a VANET (Vehicular Ad Hoc Network). This project requires a research paper with an output due within 1-3 months. The research paper will focus on the benefits and implications of a blockchain implementation to a VANET. Comprehensive research findings and first-hand expertise in blockchain and networks are required. Additionally, the research paper must be RSA encrypted as security is of utmost importance when dealing with network and blockchain technology. All documentation and deliverables need to be completed by the specified deadline, or a mutually-agreed timeline, with high accuracy and attention to detail. Compensation is negotiable.