Data Protection is all about safeguarding and managing, as well as controlling access to all data in order to maximize its security, integrity and availability. A Data Protection Expert is an invaluable professional who specializes in protecting this sensitive data from any form of malicious attack, enabling companies and organizations to protect their valuable information.

A Data Protection Expert is highly skilled and knowledgeable about the constant changing landscape of cyber-security technologies, frameworks and best practices. They mainly focus on using the most comprehensive security solutions to accurately identify any vulnerabilities within a system and look for possible cybercrime threats. Data Protection Experts offer their clients the expertise, skills and tailored advice to ensure the highest grade of data security, compliance and privacy.

Here's some projects that our expert Data Protection Experts made real:

  • Collecting economic development data
  • Data verification and background checks
  • Auditing in-person locations worldwide
  • Exam assistance on various topics
  • Store items data collection

With our experienced professionals of Freelancer.com, clients are sure to find the right expert who can help them secure and protect any kind of sensitive data and achieve their desired results. Our experts specialize in the aforementioned project categories among many other areas where their expertise can be valuable for your business or organization.

We invite you to post your own project on Freelancer.com and hire a Data Protection Expert today! Our community of highly skilled professionals are available to assist you with your unique challenges to ensure your success in fulfilling all objectives related with safeguarding your valuable data assets.

Baseret på 6,450 bedømmelser, giver vores klienter os Data Protection Experts 4.9 ud af 5 stjerner.
Ansæt Data Protection Experts

Data Protection is all about safeguarding and managing, as well as controlling access to all data in order to maximize its security, integrity and availability. A Data Protection Expert is an invaluable professional who specializes in protecting this sensitive data from any form of malicious attack, enabling companies and organizations to protect their valuable information.

A Data Protection Expert is highly skilled and knowledgeable about the constant changing landscape of cyber-security technologies, frameworks and best practices. They mainly focus on using the most comprehensive security solutions to accurately identify any vulnerabilities within a system and look for possible cybercrime threats. Data Protection Experts offer their clients the expertise, skills and tailored advice to ensure the highest grade of data security, compliance and privacy.

Here's some projects that our expert Data Protection Experts made real:

  • Collecting economic development data
  • Data verification and background checks
  • Auditing in-person locations worldwide
  • Exam assistance on various topics
  • Store items data collection

With our experienced professionals of Freelancer.com, clients are sure to find the right expert who can help them secure and protect any kind of sensitive data and achieve their desired results. Our experts specialize in the aforementioned project categories among many other areas where their expertise can be valuable for your business or organization.

We invite you to post your own project on Freelancer.com and hire a Data Protection Expert today! Our community of highly skilled professionals are available to assist you with your unique challenges to ensure your success in fulfilling all objectives related with safeguarding your valuable data assets.

Baseret på 6,450 bedømmelser, giver vores klienter os Data Protection Experts 4.9 ud af 5 stjerner.
Ansæt Data Protection Experts

Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Færdigheder
Sprog
    Job-status
    23 jobs fundet

    I have a standalone hard drive that once held business-critical documents and personal archives. The data is no longer accessible, and I now need an experienced, fully legal/ethical security professional to retrieve as much of it as possible. Scope • Focus only on recovering the lost information from the drive itself. • This is not a penetration-testing or broad security assessment request; simply a forensic-grade data recovery task performed in a lawful, confidential manner. Deliverables 1. A copy of every file you are able to restore, kept in its original folder structure when possible. 2. A brief technical report (tool versions, steps taken, integrity checksums) so I understand how the recovery was achieved and can verify data completeness. The drive is available fo...

    €14 Average bid
    €14 Gns Bud
    4 bud

    ​"In a Zero-Trust DePIN environment, how do you ensure the 'Integrity of Result' from an untrusted provider? If the computation happens inside an AMD SEV-SNP enclave, how do you architect a 'Remote Attestation' flow that proves to the client the data was processed by the correct binary without exposing the client's raw input to the provider's OS?"

    €153 Average bid
    €153 Gns Bud
    38 bud
    Recover Hacked Discord Account
    17 timer left
    Godkendt

    I'm seeking a skilled professional to help me regain access to my compromised Discord account. A hacker has taken control and is demanding payment for its return. Requirements: - Experience with account recovery, especially for Discord - Ability to negotiate or handle situations with hackers - Should be discreet and maintain confidentiality - Must provide a step-by-step report of actions taken Proof of ownership: I have emails and screenshots as evidence. Ideal skills and experience: - Cybersecurity knowledge - Previous experience in handling similar recovery tasks - Strong communication skills

    €381 Average bid
    Haster
    €381 Gns Bud
    55 bud

    I need a reliable professional on the ground in Bucaramanga to run a formal background check that focuses exclusively on the candidate’s employment history. The goal is to confirm that every position listed on the CV is genuine, the dates line up, and the job titles and responsibilities are accurate. You will be asked to: • Contact previous employers (those the candidate claims within the requested time frame once I supply the CV). • Confirm start and end dates, positions held, and, where possible, the reason for leaving. • Document each verification with the name, role, and contact details of the person who provided the confirmation, along with the date and method of contact (call, email, written letter). Acceptance criteria • A concise, bilingual (Sp...

    €34 Average bid
    Lokal
    €34 Gns Bud
    1 bud

    Nous avons développé une plateforme de mise en relation entre entreprises et prestataires freelances dans les métiers : sécurité privée, hôtes/hôtesses d’accueil, vente & retail. Le site est déjà entièrement fonctionnel (développé via Lovable), avec un workflow complet incluant : publication d’offres et candidatures, consultation de profils et embauche directe, échanges entre clients et prestataires, envoi de devis/factures, paiement par séquestre, validation de mission et déclenchement du paiement, système de notation. Nous recherchons un(e) professionnel(le) capable d’auditer, corriger et sécuriser l’ensemble. Mission recherchée :...

    €36 Average bid
    €36 Gns Bud
    6 bud

    I need a reliable partner in France who can run a full background check on one candidate I intend to hire, with the emphasis on confirming all academic credentials. The task includes contacting the institutions named on the CV, verifying attendance dates, degrees or certifications earned, and producing clear written proof of each confirmation. The report must be compiled in English, comply with GDPR and French privacy regulations, and be detailed enough that I can share it internally with our HR and legal teams. Deliverables: • A summary report outlining each qualification claimed and the verification outcome • Copies or screenshots of the institution responses (email headers, stamped letters, or official portals) • Your methodology and the date each check was co...

    €19 Average bid
    €19 Gns Bud
    8 bud

    We need someone to structure and set up a smooth base for our running IT system and security settings, moreover like a IT support person. Scope of Work: Structure and manage Google Workspace admin, 2FA enforcement, data management, and security settings End-to-end JumpCloud setup, SSO configuration, and access control framework Streamline tool integrations (Google Workspace, Keka, Slack, etc.) via APIs Build onboarding/offboarding IT access process Create role-based access matrix and security policies Identify gaps and establish a strong, scalable IT security foundation Outcome Expected: Smooth IT operations Secure and controlled access environment Documented processes and structured system setup

    €236 Average bid
    €236 Gns Bud
    18 bud

    I have a batch of high-resolution scans—passports and national ID cards only—that must be vetted quickly and confidently. Your task is twofold: • Authenticity verification: confirm each document’s security features, confirm MRZ consistency, spot any tampering, and generally prove the document is genuine. • Expiry confirmation: record the stated expiry date and flag anything already out of date or expiring within three months. I will send around twenty JPG/PDF files through a secure link and need a brief report for each file showing: pass/fail on authenticity, detected expiry date, and any noteworthy observations (with cropped screenshots where useful). A simple NDA and deletion of all copies after delivery are mandatory to protect personal data. If you are ...

    €8 / hr Average bid
    €8 / hr Gns Bud
    2 bud

    I am running a pre-employment vetting project focused on a candidate based in Trévenans. Your task is to verify the individual’s employment history by directly contacting the stated employers, collecting confirmation of tenure, position held and, where available, any official HR statements about the person’s performance or eligibility for rehire. The process must comply with French privacy and data-protection regulations. You will document every attempted and completed contact, include the name and role of the respondent, and attach any written confirmation you obtain. Deliverable • A concise verification report in PDF format that lists each employer contacted, the outcome of the verification call or email, dates confirmed and any discrepancies found, along w...

    €8 - €38
    Lokal
    €8 - €38
    0 bud

    I need an experienced cybersecurity professional who can guide our food-manufacturing plant through the next stage of its Governance, Risk & Compliance journey. You will be the point person for building and fine-tuning our Information Security Management System with ISO 27001 as the primary framework. Day-to-day you will draw on at least four years of GRC work—ideally gained in industrial or OT-heavy settings—and a solid technical foundation in infrastructure or security operations. What matters most is deep, practical knowledge of ISO 27001. Familiarity with ISO 27005 and the NIST frameworks is important because we want our risk management and control mapping to stand up to external scrutiny. Certifications such as ISO 27001 Implementer, ISO 27005 Risk Manager and any I...

    €92 / hr Average bid
    €92 / hr Gns Bud
    22 bud

    I need an experienced cyber-security professional who can move straight past theory and actually put the right protections in place. My environment is already running, but the current safeguards are piecemeal. Your task will be to evaluate what is there, decide what is missing, and implement the controls that close those gaps—whether that involves configuring firewalls, hardening servers, enforcing least-privilege access, deploying endpoint protection, or setting up logging and alerting in a SIEM. I’m looking for measurable improvements, not just a written report. Once the new measures are live, I’ll need clear documentation of every change plus a brief hand-over session so my in-house team can maintain what you install. Deliverables • Security controls fully dep...

    €243 Average bid
    €243 Gns Bud
    16 bud

    I'm seeking a professional to recover lost photos and videos from a computer. The recovery is for personal use, and there's no rush on the timeline. Ideal Skills and Experience: - Expertise in data recovery, specifically for photos and videos - Experience with recovery tools and software - Ability to handle various file formats and systems - Attention to detail and reliability Please share your recovery process and any relevant experience. Disk 1 Unknown not initialized

    €11 Average bid
    €11 Gns Bud
    15 bud

    I represent DataFlow Group, a worldwide leader in Primary Source Verification. As part of our ongoing expansion, I am looking to build a long-term relationship with a specialist who can execute high-volume background checks to our exacting standards. Scope of work • Verification types: Education, Employment and Criminal record checks form the core of the assignment. • Geographic reach: requests will arrive from every region; your operation must be able to handle global coverage without jurisdictional gaps. • Methodology: you will rely primarily on direct outreach to issuing bodies and on accredited third-party services where they enhance speed or reliability. What I expect – Documented proof direct from the source (e.g., sealed transcripts, HR letters, poli...

    €164 Average bid
    €164 Gns Bud
    5 bud

    I need a thorough pre-employment background check that focuses exclusively on the candidate’s work history. The task is to verify every position the applicant has held, from their very first job right up to the present day. What I expect from you: • Direct confirmation of job titles, start- and end-dates, and employment status for each employer found. • Clarification of any unexplained gaps you uncover. • A concise, well-structured report that includes contact details for each source, time-stamped notes of your outreach (phone, email, or written), and copies or screen captures of any written confirmations received. Please follow all local privacy and data-protection regulations while conducting your checks. If an employer cannot be reached, let me know the ...

    €34 Average bid
    Lokal
    €34 Gns Bud
    1 bud

    I hold written authorization from the system owner and need an experienced ethical-hacking professional to carry out a controlled breach of our production environment. The assignment goes beyond a traditional penetration test: I want you to replicate a real-world, end-to-end intrusion scenario so we can measure how our monitoring, logging and incident-response teams react under pressure. Scope • Obtain initial access using any non-destructive vector you discover (phishing simulation, misconfigurations, credential weakness, etc.). • Laterally move, escalate privileges and demonstrate data access without altering or deleting information. • Leave tamper-proof evidence (flags) in pre-agreed directories so we can verify compromise. • Conclude with a thorough report that det...

    €11 / hr Average bid
    €11 / hr Gns Bud
    11 bud

    Preciso de um arquivo, em Excel ou Google drive, que reúna toda a rotina financeira que eu possa colocar os gastos fixo do mes os gastos nao fixo, valores de boleto em aberto saldo que foi recebido e o saldo de debito, valor recebido em cadas conta da empresa, ser adicionado também uma aba de valores a pagar, que posso colocar os boletos e parcelas em aberto Planilha de vendas, que possa projetar a quantidade que foi vendida no mes o valor total o bairro que mais contratou, onde o cliente viu nossa empresa Planilha a receber e a pagar nessa planilha gostaria de adicionar notas fiscais que foram emitidas e que falta pagamento para ter o melhor controle de cobrança, quando for pago adicionar que foi pago, de forma mensal e da mesma forma a pagar, das notas emitidas foi p...

    €36 Average bid
    €36 Gns Bud
    11 bud

    I run a small online grocery store that ships nationwide and I need three clear, consumer-friendly documents I can paste straight onto my website: • Privacy Policy that spells out our data-collection practices, the protection measures we take, and the rights and choices customers have over their information. • Terms & Conditions covering user responsibilities on the site, purchase terms for grocery orders, and simple rules for account creation and management. • Return & Refund Policy with step-by-step guidance on eligibility windows, perishable-item exceptions, and the exact process customers follow to obtain replacements or credits. Please write each policy in plain English, structured for easy web formatting (H2/H3 ready, no legalese walls of text), and ensur...

    €181 Average bid
    €181 Gns Bud
    25 bud

    I’m putting together an in-depth, case study–style report on a real-world data breach that struck the healthcare sector. The goal is to walk readers through the timeline of the incident, the technical and procedural gaps that allowed it to happen, the immediate response, and the long-term remediation steps. Accuracy and authenticity matter: I will provide raw notes, public disclosures, and redacted internal memos once we start, but I’m relying on your cybersecurity and information-management expertise to shape them into a compelling, well-structured narrative. Here’s what I’m after: • A 3,000–4,000-word report formatted for executive readership but detailed enough for security teams. • Clear articulation of attack vectors, compromise indi...

    €104 Average bid
    €104 Gns Bud
    68 bud

    I’m ready to bring in a security specialist to run a thorough, manual penetration test on my live e-commerce application. Automated scanners aren’t enough for this engagement—I need human-driven testing that uncovers real-world attack paths. Here’s what I’m looking for: • A full manual assessment covering all SQL Injection, Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF),Web Application Penetration Testing , Network Penetration Testing Services External or Internal, Web Services Testing, API Testing • Exploitation-level proof of concept for every confirmed issue, with clear, reproducible steps. • A concise risk-ranked report that separates critical, high, medium and low findings, followed by practical remediation advice writ...

    €93 Average bid
    €93 Gns Bud
    29 bud
    Draft Ecommerce Policies Suite
    21 timer left
    Godkendt

    I run a small online grocery store that ships nationwide and I need three clear, consumer-friendly documents I can paste straight onto my website: • Privacy Policy that spells out our data-collection practices, the protection measures we take, and the rights and choices customers have over their information. • Terms & Conditions covering user responsibilities on the site, purchase terms for grocery orders, and simple rules for account creation and management. • Return & Refund Policy with step-by-step guidance on eligibility windows, perishable-item exceptions, and the exact process customers follow to obtain replacements or credits. Please write each policy in plain English, structured for easy web formatting (H2/H3 ready, no legalese walls of text), and ensur...

    €334 Average bid
    €334 Gns Bud
    101 bud

    Necesito implementar encriptación de datos en un servidor Linux para proteger exclusivamente archivos y documentos. Mi objetivo es contar con una solución sencilla y funcional que deje los ficheros cifrados en reposo sin complicar el resto del sistema. Lo que espero recibir: • Revisión rápida del entorno (distro y versión) y selección de la herramienta adecuada — por ejemplo LUKS, GPG o eCryptfs. • Guía paso a paso (o script básico) para instalarla, configurarla y probarla. • Instrucciones claras para añadir nuevos archivos al volumen/contenedor cifrado y para realizar copias de seguridad igualmente protegidas. • Documento breve con comandos clave y cómo revertir cambios si fuera ne...

    €176 Average bid
    Lokal
    €176 Gns Bud
    6 bud

    Preciso redigir, do zero, o Termo de Uso e a Política de Privacidade da minha nova plataforma educacional voltada a adultos. O ambiente oferece essencialmente avaliações com questões de múltipla escolha, portanto coleta dados de cadastro, progresso e resultados de aprendizagem dos usuários. Quero documentos claros, juridicamente sólidos e totalmente alinhados à Lei Geral de Proteção de Dados (LGPD). Além da redação em português, espero que você verifique todos os fluxos de dados da plataforma, identifique eventuais lacunas de compliance e proponha as cláusulas adequadas para tratamento, armazenamento, base legal, direitos do titular, retenção e medidas de seguran&c...

    €98 Average bid
    €98 Gns Bud
    6 bud

    Project Description: I am looking for a Cybersecurity Specialist to perform a comprehensive security audit on a newly developed desktop application. The goal is to evaluate the robustness of the authentication framework and provide a risk assessment report. Scope of Work: Conduct a Vulnerability Assessment on the application's login and validation protocols. Test the integrity of the software's validation logic against unauthorized access. Evaluate the effectiveness of current obfuscation and anti-tamper measures. Provide a detailed report with recommendations for hardening the software and improving data protection. Requirements: Proven experience in Application Security Testing and OWASP standards. Strong background in binary analysis and software protection mechanisms...

    €520 Average bid
    €520 Gns Bud
    33 bud

    Anbefalede artikler specielt til dig