Securitate computer Jobs
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
- Establishing secure network infrastructure
- Improving system performance and leveraging encryption
- Developing security frameworks for organizations
- Implementing authentication measures for digital identification
- Evaluating risks of cyber incident exposure
- Researching the latest security regulations for compliance
- Crafting secure policies for employee engagement
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
Conform celor 102,496 recenzii, clienții îi evaluează pe Computer Security Consultants cu 4.86 din 5 stele.Angajează Computer Security Consultants
You will work hand in hand with me on different projects with different clients, always related to information security and cybersecurity. You will work on vulnerability scans, vulnerability reports, writing Patch Tuesday articles, writing documentation such as information security policies or incident response plans, etc... Each month, you will be billed according to the hours you have worked.
Setting up Home WiFi - I am looking for someone to help me set up my home WiFi network using a cable internet service. - I only need assistance with the initial setup and configuration, no ongoing maintenance is required. - The WiFi network will be used to connect my printer, PC, and phone. - The ideal candidate should have experience in setting up home WiFi networks and be familiar with cable internet services. - Knowledge of configuring devices such as printers and PCs to connect to WiFi is also required.
Project Title: High CPU Load Overview: I am experiencing a very high CPU load on my CentOS system and I am seeking assistance to identify the specific programs or processes causing this issue. Requirements: - Experience in troubleshooting high CPU load issues on CentOS - Strong knowledge of CPU monitoring and analysis tools - Ability to identify and optimize resource-intensive programs or processes - Familiarity with system performance tuning techniques - Proficiency in Linux system administration Deliverables: - Analysis of the current CPU load and identification of potential causes - Recommendations and implementation of optimizations to reduce CPU usage - Documentation of the troubleshooting process and solutions implemented Ideal Skills and Experience: - Proficient in CentOS system...
Project Title: Computer Organization - Assistance with Theoretical Input/Output Systems I am seeking assistance with the specific aspect of computer organization related to Input/Output Systems. The project will be focused on a theoretical understanding of this topic. Skills and Experience Needed: - Strong knowledge of computer organization and architecture - Familiarity with Input/Output Systems and their role in computer operation - Proficiency in theoretical analysis and understanding of computer systems Project Requirements: - Provide a basic overview of Input/Output Systems in computer organization - Explain the principles and concepts behind Input/Output Systems - Discuss the role and importance of Input/Output Systems in computer operation - Provide examples and illustrations to ...
Project Title: Search Engine Ethical Hacker to Secure Business Reviews I am looking for a skilled and experienced ethical hacker who specializes in securing business reviews on the Google search engine. The main concern I have is with fake negative reviews that are affecting my business's reputation. Key Requirements: - Expertise in ethical hacking with a focus on securing online reviews on Google - Proven experience in identifying and mitigating fake negative reviews - In-depth knowledge of Google's review platform and its security measures - Ability to assess and identify vulnerabilities in the review system and implement effective security measures - Strong problem-solving skills and the ability to think creatively to protect against review-related security breaches Previo...
Project Title: Cyber Security Description: I am in need of assistance with network security for my small network of 1-10 devices. I am looking for a one-time solution to improve the security of my network. Specific requirements for the project include: - Conducting a comprehensive network security assessment to identify vulnerabilities and potential risks - Implementing necessary measures and protocols to protect against unauthorized access and data breaches - Setting up firewalls, encryption, and other security measures to safeguard sensitive information - Monitoring and detecting any suspicious activities or potential security breaches - Providing recommendations and best practices for maintaining network security in the future Ideal skills and experience for this project: - Strong ...
Project Description: - I am looking for an expert in implementing data sharing and identity verification using zero knowledge technique and proofs. - The desired outcome of this implementation is increased security. - There is no specific platform or environment in mind for this project. - The expected level of expertise for this project is expert. - The ideal freelancer should have extensive knowledge and experience in zero knowledge techniques and proofs. - They should be able to design and implement a secure data sharing and identity verification system. - The freelancer should also have a strong understanding of security protocols and encryption algorithms. - Attention to detail and the ability to work independently are essential for the successful completion of this project.
ESXI Networking issue I am currently experiencing connectivity issues with my ESXI 6.7 networking. Although no error messages are being displayed, I am unable to establish proper network connections. Skills and experience required: - Strong knowledge and experience with ESXI 6.7 networking - Expertise in troubleshooting connectivity issues - Familiarity with virtual networking and network configuration - Ability to diagnose and resolve networking problems efficiently
I am looking for an entry-level technician who can help me with the installation of an sdwan system at multiple local locations. The specific tasks I expect from the technician include installation only. Ideal skills and experience for the job: - Basic understanding of networking and computer systems - Familiarity with sdwan technology and installation processes - Ability to work independently and follow instructions accurately - Strong problem-solving and troubleshooting skills Please note that this is a part-time position, and the technician will be required to travel to multiple local locations for the installations.
Network Design: Develop and design comprehensive network solutions that align with the organization's business goals and requirements. Create detailed network architecture diagrams, documentation, and specifications. Protocols and Technologies: Stay updated on the latest networking technologies, protocols, and industry trends. Evaluate and recommend hardware, software, and communication protocols to support the organization's network infrastructure. Security: Implement security measures to protect the network from unauthorized access, attacks, and vulnerabilities. Design and integrate security features such as firewalls, VPNs, and intrusion detection systems. Capacity Planning: Analyse network traffic and performance to determine capacity requirements and scalability. Plan fo...
Need Help Setting Up Residential Proxies for Anonymity Skills and Experience Required: - Experience in setting up residential proxies - Knowledge of proxy server configurations - Familiarity with network security protocols Project Details: - I am looking for someone who can assist me in setting up residential proxies for anonymity purposes. - The ideal candidate should have experience in configuring proxy servers and ensuring secure connections. - The project involves setting up 1-5 residential proxies. - The proxies will be used to enhance online privacy and maintain anonymity. - The candidate should have knowledge of network security protocols to ensure the proxies are secure and reliable. - Familiarity with accessing geo-restricted content through proxies is a plus. - The project requ...
I am looking for someone who can provide me with PAM DEFENDER exam dumps I prefer the dumps to be in PDF format. I am particularly interested in studying the general overview of PAM DEFENDER and its practical applications. Skills and experience needed: - In-depth knowledge of PAM DEFENDER - Experience in creating exam dumps in PDF format - Familiarity with the general overview and practical applications of PAM DEFENDER
I am seeking assistance in protecting my phones and laptops from potential harm caused by individuals with strong hacking tools. Skills and Experience: - Proficiency in cybersecurity protection, including antivirus software and firewalls - Knowledge and experience in providing cybersecurity solutions for both phones and laptops - Ability to explain and implement cybersecurity measures in a beginner-friendly manner
Project Title: Qubes OS Security Enhancement Overview: We are seeking a skilled professional to enhance the security of our Qubes OS. Our operating system has recently experienced a minor compromise, and we are looking to implement new security measures to prevent future breaches. Specific Requirements: - Expertise in Qubes OS and its operating system component - In-depth knowledge of virtualization technologies and security architecture - Familiarity with the specific aspect of the Qubes OS operating system that was compromised (Operating System) - Ability to assess the severity of the compromise and determine appropriate security measures - Experience in implementing new security measures to strengthen the overall system Deliverables: 1. Comprehensive analysis of the compromised aspe...
Project Title: Qubes OS Compromise Investigation and Mitigation Assistance I am seeking a skilled professional to assist me in investigating a compromise in my Qubes OS. As a beginner in terms of technical expertise, I require an expert who can guide me through the process and provide necessary assistance in implementing the solutions. Specific Requirements: - Identification of the Attacker: The main objective is to identify the individual or group responsible for compromising my Qubes OS. The expert should possess deep knowledge and experience in forensic analysis and be able to trace the attacker's activities. - Details of the Attack: I need a thorough analysis of the attack, including the methods used, entry points exploited, and any potential vulnerabilities in my system. The ...
I am looking for a skilled professional to conduct a vulnerability assessment and penetration testing for my systems and applications. Specifics: - I will provide a list of systems and applications to prioritize for testing. - The testing should be completed within a month. - I require a detailed report after the testing, including recommended solutions. Ideal skills and experience: - Proficiency in conducting vulnerability assessments and penetration testing. - Knowledge of various systems and applications. - Ability to provide detailed reports with recommended solutions. Please provide your portfolio and relevant experience when submitting a proposal. Thank you.
Mobile App Vulnerability Assessment - I am looking for an ethical hacker to conduct a general scan of my mobile app for vulnerabilities. - The specific areas of concern within the mobile app are not known, so a comprehensive scan of the entire app is required. - Ongoing security monitoring is not required after the initial vulnerability assessment. Skills and Experience: - Ethical hacking experience in mobile app security. - Knowledge of common vulnerabilities and techniques used in mobile app hacking. - Ability to conduct thorough scans and identify potential vulnerabilities within the mobile app.
Project Title: PCI DSS Compliance for On-Premises Cardholder Data and Systems Overview: I am seeking a skilled professional to assist me with achieving PCI DSS compliance for my on-premises cardholder data and systems. The project involves ensuring that all necessary security measures are in place to protect sensitive data. The person is required to be fully certified and apply the full assessment and auditing remotely in cooperation with the experienced Cyber security technician onsite
I'm in need of some help with network troubleshooting. Ideally, I'd like to receive remote support so I don't have to wait for someone to come on-site. This isn't an urgent issue, so it can be scheduled within a day. Hopefully I can find the right freelancer to help my business quickly!
I am looking for an embedded telecommunications network specialist with expertise in wireless communication protocols, network security, and IoT connectivity protocols. Troubleshooting of Opticomm embedded network Requirements: - Strong knowledge and experience in embedded fibre network - Ability to design and implement secure and reliable wireless communication protocols - Proficiency in IoT connectivity protocols - Understanding of network security measures The project has specific requirements and the expected timeline is 1-2 weeks. Ideal candidates should be able to work efficiently to meet the deadline.
I Have a Dedicated Server behind a V Switch ad a ip Subnet with /24 - i want to use this IPs on my Cloud as well - also my Dedicated Server have a Firewall installed wich Provides DHCP and VPN so i want to use public ips in cloud i want to use my Dedicated Servers Firewall ( Opnsense) to connect my systems in the cloud.
We are looking for an expert in cyber security to assist us with an urgent task. Specifically, we need help to investigate who is behind an Instagram account. To be considered for this project, freelancers must have experience in the cyber security field and include their past work in their applications. We need a resolution to this case within 24 hours, so time is of the essence. If you think you are the right fit, please apply!
My organization is looking for an experienced ethical hacker to complete a one-time security check, with a basic summary report being generated upon completion. The focus of the security check should be on network security. Our team is eager to find a skilled professional to help ensure the safety of our carefully crafted systems. We remain confident that the selected ethical hacker will have the skills to deliver top-notch results and guarantee that our company stays secure.
I am looking for a Cyber Security Tutor who specializes in Information Security. As an intermediate level learner, I am seeking someone who can help me deepen my understanding in this area. Specific Requirements: - Strong knowledge and experience in Information Security - Ability to explain complex concepts in a clear and concise manner - Familiarity with current industry practices and trends in Information Security Ideal Skills and Experience: - Professional experience in the field of Information Security - Experience in teaching or tutoring in Cyber Security - Excellent communication and interpersonal skills Tutoring Sessions: - I would like to have tutoring sessions multiple times a week to ensure consistent learning and progress in my understanding of Information Security. If you h...
Hi, I'm looking to hire an experienced ethical hacker. The goal of this project is to identify and fix any vulnerabilities, in order to improve overall system security measures. The ideal ethical hacker will have experience with android, Web, Internet and have an understanding of best practices for identifying and addressing security vulnerabilities. This person should be knowledgeable about common threats and issues associated with mobile security, as well as familiar with security. This project should result in the identification and repair of any potential security vulnerabilities. If you are an experienced ethical hacker capable of completing this project, please get in touch. Thank you for your consideration.
I am looking for a freelancer who can enhance the security of my website, with a focus on server and network protection. Specific areas of expertise required for this project include: - Knowledge of server and network security protocols and best practices - Experience in identifying and mitigating specific threats to website security - Familiarity with tools and techniques for enhancing server and network protection The current state of my website's security measures is at a moderate level of protection. I have specific security threats that I am concerned about and would like the freelancer to address. If you have the skills and experience necessary to enhance the security of my website and protect it from specific threats, please submit your proposal.
very strong ddos attack on website cloud flare is set up seems like ip based attack
I'm in need of some help with network troubleshooting. Ideally, I'd like to receive remote support so I don't have to wait for someone to come on-site. This isn't an urgent issue, so it can be scheduled within a day. Hopefully I can find the right freelancer to help my business quickly!
I am looking for a skilled professional to secure my website against DDoS attacks. The ideal candidate should have experience in website security and be able to implement effective measures to protect against DDoS attacks. Budget: $100 Specific security measures: No, I am open to suggestions Timeline: Immediately Skills and experience required: - Strong knowledge of website security and DDoS attack prevention - Experience in implementing security measures to protect against DDoS attacks - Ability to quickly assess and identify vulnerabilities in the website - Proficiency in configuring firewalls and other security tools to mitigate DDoS attacks - Knowledge of industry best practices for website security If you have the necessary skills and expertise to secure my website against DDoS a...
Right now we have a deployment under GCP with Kubernetes, all pods inside 1 node. All the pods what the ip address 10.x.x.x. Along that we have a VPN where we have a server under 192.168.x.x IP The issue that we have its that we can not communicate from the PODS to the 192.168.x.x IP. If we try from the node a telnet or ping it works, if we try from another instance in GCP I can do a telnet but we can never do it from inside the pod We. have been checking and it seems it has avoid masquerading , , We tried using hostNetwork: true in the deployment for the pods this works but this generates security issues
I am looking for a Microsoft Security Consultant who can provide ongoing support for our company's specific security issue of malware attacks. Skills and Experience: - Strong knowledge and experience in Microsoft security solutions - Proven track record in mitigating and preventing malware attacks - Familiarity with network vulnerabilities and data breaches - Ability to provide ongoing support and consultation - Excellent communication skills and ability to respond within 48 hours The ideal candidate will be able to assess our current security measures, identify vulnerabilities, and develop a comprehensive plan to protect our systems from malware attacks. They will also be available to provide ongoing support and consultation as new threats emerge.
I am looking for assistance with integrating blockchain technology with a VANET (Vehicular Ad Hoc Network). This project requires a research paper with an output due within 1-3 months. The research paper will focus on the benefits and implications of a blockchain implementation to a VANET. Comprehensive research findings and first-hand expertise in blockchain and networks are required. Additionally, the research paper must be RSA encrypted as security is of utmost importance when dealing with network and blockchain technology. All documentation and deliverables need to be completed by the specified deadline, or a mutually-agreed timeline, with high accuracy and attention to detail. Compensation is negotiable.
Required the ability to use a front end ui to request data to be scraped from a specific link, store in database and have analytics on the front end that can be filtered etc.
I have an network topology which i want to create in GNS3
I am in need of a freelancer who can help me with the formation of an IEEE conference paper in the field of Computer Science. I have some research data but additional research is required to complete the paper. The desired length of the paper is between 6-10 pages. The topic is AI-Powered Intrusion Detection Systems Skills and Experience: - Strong background in Computer Science and familiarity with IEEE conference paper format - Ability to conduct thorough research to supplement existing data - Excellent writing skills to effectively communicate the research findings in a concise and clear manner - Experience in academic writing and publishing - Attention to detail to ensure the paper meets the formatting and style requirements of the conference
I am looking for a computer scientist with experience in cybersecurity and servers to work on a project. Skills Required: - Network security expertise - Knowledge of application security - Incident response and management capabilities Project Goal: - The main goal of this project is to ensure the cybersecurity of our existing systems. Preferred Experience: - Ideally, the candidate should have 3-5 years of experience in cybersecurity and servers.
I need an ethical hacker who can create or evaluate the possibility of a program for personal use. The main aim of the project is to test the security of a system. The program should be developed specifically for Windows. Ideal skills and experience: - Experience in ethical hacking - Knowledge of system security testing - Proficiency in programming for the Windows platform - Program or plugin developed for Youtube.
I am looking for a forensic investigator to assist me with a project related to criminal activities at the National Gallery DC. The specific aspect of focus will be the theft of artwork. Scope of the investigation will involve analyzing both specific incidents and general trends over time. I require both a detailed report and a summary of the findings. Ideal Skills and Experience: - Experience in forensic investigation related to criminal activities - Expertise in art theft and recovery - Proficiency in analyzing data and identifying patterns - Strong report writing skills - Knowledge of the National Gallery DC and its security systems