We are a Cyber Security Services Firm looking for a software development consultant to help us define the technologies that we can use to develop a product. The product is described as below: An application that allows organisation to scan their environment for sensitive information storage. Sensitive information is any information (eg. credit card
Content writer for B2B cyber security We currently serve the needs of 1000's of consumers concerned about internet security and support however are new to B2B. Our technical expertise and client commitment is first rate however our people are poor at writing which you'll see in our content ([url removed, login to view]). We need someone who can write great artic...
Hi Gustavo D., I noticed your profile and would like to offer you my project. The project details are: I want to recreate my clients PPTX template. They're a cyber security consultation firm. There's a good chance after this project to hand on a bigger project such as rebrand the whole company or create a visual guideline. God bless you.
Dears We Want to design customize tradition and business icons to our start up cyber security company. Please find our logo along with our name in the attached file . Could you please provide us the RFP. Thanks
Needed attractive unique logo design. Description: IT security, Cyber security, Data security, Ethical hacking (these are the developing ideas) Domain: [url removed, login to view] (this will be the domain name) No need for lots of color combination, we want simple and unique attractive design
We have a training online project, and we would like to promote our course" Cyber Security and risks" using a cartoon video. Duration 20 - 40 seconds More information about course. [url removed, login to view] The audio has to be in Spanish
I'm the leader of Cyber Security Club at Effat University for hackers. I founded the 1st Cyber Security Club at Effat University, run by women for women who are passionate about creating an environment for students to succeed in cyber security. The club's main purpose is to provide students who are interested in Cyber Security...
Create a Master Level Cyber Security CV and need help to build high end Linkdn Profile
Hello Looking for Male Voice Artist for Motion Graphic Video. The voice over will be used in a motion graphic video and the topic is related to Cyber Security. Please attached your voice sample into proposal Thanks
We are looking for a male voice artist for a small project. The voice over will be used in a motion graphic video (40s - 1m20s) and the topic is related to Cyber Security. Our content writers are still working on the piece that'll be used in the video but it won't be over 1m20s. We have a preference for British Accents but that doesn't mean we
HI, I am looking for the help to take proxy interview call on cyber security, risk GRC etc.
Create a standard operating procedure as part of continuous monitoring on a day to day basis as a cyber security analyst. I have a sample template attached. Here's the link for the admin guide below: [url removed, login to view] This specific SOP should cover the following: 1.
...system. • Referral Program • Android – iOS Apps and Update support • Security Aspects – CloudFlare – to mitigate DDoS attacks • Blog • Notification Ticker • Day and Light UI mode • Data Center Requirements and Deployment support. • It should be noted that - since Security aspect of the exchange is our number 1 prior...
...Apps and Update support • Security Aspects – CloudFlare – to mitigate DDoS attacks • Blog • Notification Ticker • Day and Light UI mode • Data Center Requirements and Deployment support. • Fee structure options using Electra Coin or % of trades - Ask for Details • It should be noted that - since Security aspect of...
...bid to get the banks backing, the banks are asking me to write a proposal, starting why they must back me up. Also that in the write up, i must include the following: 1. Cyber security 2. liabilities to the banks(e.g what do they owe the customers in case of any issues, conflict resolution, if the transactions will be from every phone or only phones
By the combination of RSA algorithm and HASH functions it is possible to gain security.. DATA integrity is produced.
...Johnson Space Center of NASA for over a year, over three years for State of Oregon DHS as programmer, as a contractor programmer for America's honorable Air National Guard cyber forces. I felt proud of being truly an American while serving in building one of NASA JSC, or serving in the plain looked concrete building at McChord Air Force base. I was