Computer Security Jobs
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
From 107,205 reviews, clients rate our Computer Security Consultants 4.86 out of 5 stars.Hire Computer Security Consultants
Need support for networking and cisco Ftd and fmc
Check if my handphone or email have been hacked.
I need an expert who is good at machine learning
We have an inhouse application and that need to integrate with security features in AWS and implement third party API.
I have discussed terms of this project let me know if interested
Hi there, I want to format my computer and delete files permanently. Please help me find the right solution.
We have an inhouse developed cyber security tool and are looking for someone to write the technical documentation as well as small explainer videos as part of the "tutorials" sections. Need to also include small GIF images (tutorial) as well as video tutorial w/ voiceover (clear English is required). We would likely be a bit ongoing for a few months as we continue to release new modules but the entire project should be done by April.
I need to create my own VPN environment for low-latency gaming between two continents The most suitable VPN protocol for low-latency gaming is likely to be OpenVPN or IKEv2, I need someone who knows how to config both of which are known for their speed and stability We will create dedicated servers in both continents Africa and the USA that will act as the endpoints of your VPN tunnel. These servers should be fast and located close to your target users. We will Install VPN software (such as OpenVPN or StrongSwan) on both dedicated servers. Configure the VPN: Set up the VPN tunnel between the two servers and configure the necessary security settings to ensure that the data transmitted over the VPN is encrypted and secure. Test the VPN connection by using a network speed testing tool and a g...
We are looking for a German speaking ISO 27001 (ISMS) Lead Auditor, to conduct an ISMS audit of our client in Germany.
I need at least 16 pages. The topic should be about preserving privacy in data collection. I have attached 2 sample surveys as a reference. There should be a reference section and a related work section. A survey requires you to read a lot of references on the related topic and summarize them into a paper. Pretending you are a consultant, you are supposed to provide a analysis of your readings not entirely a summary. Feel free to use these conferences paper because most of them are free and can be found online. IEEE S&P ACM CCS This is my motivation to start this survey: Many successful businesses are now data-dependent. It helps businesses to plan strategies, understand trends and customers as well as manage resources, those are just a mention but a few. Our data are heavily colle...
I got a Public IP VM exposed to 0.0.0.0, but I want to allow traffic from specific IP Ranges and deny all other traffic. Can you replicate this scenario on your GCP environment ?
Looking for a expert in wordpress security to identify and remove hack from website and database, then provide knowledge to stop it in the future. Must specialize in security and malware. Wordfence scan found about a dozen malicious files and modified files. Noticed some foreign language when googling the website, other than that there is not much visible about the hack on front end. If you are unable to work on the problem right away please do not apply. Please tell me your favorite food
As we are a health Domain Industry, we need to take care of security purposes
Hi, I need someone to guide me to set up an IDS in a Smart Home environment. To be specific, the IDS will monitor and alert me if there is any unsual traffic coming in to my home network environment. Please engage with me for more details.
Without disclosing too much. The following will be required: 1) Developing a data extraction tool used to create embeddings 2) Embeddings will be used to create company specific models for developing proposals. 3) This could end up being very long term Required knowledge: 1) OpenAI working knowlege - this is not a learn as you go scenario 2) OpenAI embeddings 3) Data extraction from (csv, excel, word, and PDF) 4) Model creation based on Open AI
مرحبا اخي اريد برمجة تطبيق مثل هذا التصميم الذي اريده شبيه بهذا التطبيق شبيه وليس مثله تماما ليس كل الامكانيات اريدها في تطبيقي ولكن تقدر تقول نصفها وبالنسبة للداتا ممكن ناخدها من هذا التطبيق اريد تطبيق ليس به مشاكل وفي مدة وجيزة في انتظار اطلاعك علي التطبيق وردك
Hi i have a QNAP NAS, i just bought a new HD and i want assistance to install it as a backup of my 1st HD... all this should be done by TeamViewver I need an expert as i have tons of files i won't want to loose.... i know for somebody who has deal with this is an easy task, i just need to find the right person, thanks
Hi, I'm looking for someone to help me block pornography and certain keyworks etc on my phone and laptop. I would like to block images on social media. Can someone help with this?
I need someone who has experience in programming, website security and hacking for a special project I need a programmer who has experience with payment and money transfer problems And security is cypriani
Position: SQA Engineer (Automation) Experience: 1+ year of experience with Cypress Requirements: Must be familiar with Web applications Testing. Good If have an experience in Automation Testing Have held lead role in an enterprise level application Experience with continuous integration, delivery, unit testing, static analysis, and automated integration tests. Experience with software and networking security Personal Qualities: Must be a finisher and not just a strong starter. Demonstrated ability to 100% complete projects and not leave lose ends. Must be very thorough and detail oriented. This must have come from learning from previous mistakes and can demonstrate detail examples of mistakes from not being careful. Organized, esp. with documentation and asset controls.
I want to make a configuration, in my mikrotik router, I want to manage the bandwidth I have, I want the best security rules for my navigation and protection, I want a good configuration of queues as I have many computers connected wireless through an access point of the same brand, I want to establish that my mikrotik router makes me a good connection to my PBX in the cloud ,
I want to find out my wifi password, for testing purpose only.
1. Download a program called Endless Motivation 2.0 and share with me to download 2. Download a 106GB Folders of Rapidshare and share with me to download
Hi, i want a Penetrationtest of my Application. You will get a isolated environment with credentials for all roles. I want a exact Checklist of whats done, which findings you got and how to fix them.
Written in pyhton, we would like the freelancer to create a web based applcation that simulates social engineering attacs. how the social engineering simulation training program will work: User Registration: Users will be required to register for the training program and provide basic information such as their name, email, and job role. Training Modules: The training program will consist of several modules, each covering a different type of social engineering attack. For example, one module might focus on phishing attacks, while another module might focus on pretexting. Each module will include a series of simulated scenarios that users will be required to complete. Scenario Simulation: Each simulated scenario will be designed to closely resemble a real-life social engineering attack, u...
Hello i want to set up a vpn connection that can allow me share my pc internet connection through vpn to my friends in different areas so that they just start the vpn and they are connected to the internet.
Need a full stack network expert。Proficient in Java, C programming language, WEB security, and various skills, I will describe my project in detail with my partners
Hi, I need a label generator web based which works with api to receive information and edit accordingly. The label contains the following: 2x 128 barcodes = (1 containing tracking number) (2nd containing "420"+zipcode) as for maxicode, much about it is written in this article at fig 5 page 14: Apart from barcodes, It contains shipping address, delivery address, shipper's name & phone, receiver's name & phone, service type, tracking, first 3 digit of zipcode+internal routing code Now, This tool will be provided with "Tracking numbers" & shipping/receiver's information along with weight and service type, the tools job is to generate a perfect label with that data and barcodes filled with correct information. I'll be attaching...
Smoke barrier for an assist living
I'll provide reference books only And chapters guidelines You will search the books to choose the content and add newer content to match the guidelines
I'll provide reference books only And chapters guidelines You will search the books to choose the content and add newer content to match the guidelines
HASH/ENCRYPTION: 07VHSAIZ"PS4-U4FDE47KDFT2NE+G8$$' DW#:JZLP need to know which type it is before you bid. Start bid with type of hash it is, only correct one will be entertained a conversation.