Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Din 103566 recenzii, clienții ne evaluează Computer Security Consultants cu 4.86 din 5 stele.
Află mai multe
Hi, need assistance with an iasme gold audit by accredited (must be iasme gold accredited assessor). my company is going through an iasme gold audit and as part we audit another company. Although I have completed the audit report I need some guidance on the report from an accredited assessor I've had feedback on the current report from an auditor, so will need someone to rewrite the report and follow the guidance. But its important they have iasme gold experience to understand the requirements.
building IDS for IoT networks using supervised machine learning algorithms. software and hardware.
Network Security (Intrusion Detection, DDoS attack detection, Malware Detection, Feature Selection, Cloud Computing and allied topics), AI/Machine/Deep Learning, Data Analytics, Nature Inspired Optimization Techniques
Recently experienced a cyberattack. Now wanting to make sure the wifi is secure, vulnerabilities are minimized, there is no malicious behavior happening, and ultimately looking for peace of mind so I never have to worry about this again.
Email notification setup Monitor Browser history and keywords searched Monitor removable devices & external drives for file integrity Log when Copy / Paste / Cut are carried out ctrl+c / ctrl+v & ctrl+x Monitor running processes and alert if anything changed
Looking for anyone who can support with basic to advance cybersecurity knowledge. Please let me know anyone who can support on call daily basis based on need. Must have technical expertise on any of the below Firewall Email gateway Antivirus SIEM tools DLP Data Classification Servers Red teaming and Pentesting Cyber Security Consultation FreePBX Firewall Configuration My FreePBX Server is having issues with call deployment due to the firewall and fail2ban. I need someone who has hands on knowledge of configuring it all way to make it work. I am myself ...
We are a growing MSP that is partnered with Fortinet and under contract to support a large scale Fortinet network for a major ISP. This huge core network requires a Fortinet NSE4 or 7 with an NSE5 (FortiManager / FortiAnalyzer) specialty to assist us with both scoping and providing support, configuring the equipment per the client's spec and troubleshooting both the old and the new infrastructure as needed. This network is 100% managed via FortiManager. There will also be other assignments available to support other large Fortinet client networks & projects. Possible Contract to Hire Opportunity for someone looking at Charlotte, NC as a potential place to build a tech career. We have many other network projects and client networks to manage and support to offer as well.
Introduction to computing and information technology 1 This is the first of two OU level one modules that introduce you to key concepts in computing and information technology (IT), such as digital technologies, programming and networking. This module will equip you with a comprehensive toolbox of relevant knowledge, understanding and skills and introduce you to issues encountered in computing and IT, including the profound social and ethical challenges posed by these technologies. You will also develop your key skills including communication, numeracy and digital and information literacy (DIL). This will give you a firm basis for further study, especially Introduction to computing and information technology 2 (TM112
Wanted: Experience with TrueNAS CORE (free edition) current version Needs: 1. Configure test TrueNAS Core (already installed on hardware) to interface with Windows domain for a. User and group security (username, password, group membership) b. Setting up and configuring SMB shares to work properly in a Windows domain environment c. Permissions (ACL) connecting multiple SMB shares to multiple Windows users/groups d. General system security and tone 2. Training for administrator at the company for a. Setting up production system b. Administering production system c. Basic troubleshooting d. Basic cybersecurity BID: Project based (fixed price). Must be able to be paid by bank transfer (1099 or W9/W8BEN required).
We're looking for cybersecurity professional, preferably someone local (Seattle) or at least in the US. Looking for knowledgeable data security expert to examine our data storage and security for vulnerabilities, especially our usage of Synology NAS and Norton 360 with Lifelock. Must have experience: - Setting up Synology NAS local and remote with backup and security; - Setting up Norton 360 with LifeLock; - Network security for family and small-business assets. Thank you!