Computer Security Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 106,155 reviews, clients rate our Computer Security Consultants 4.85 out of 5 stars.
Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    58 jobs found, pricing in USD

    I'm in need of a professional who can help in checking some files on my NAS server. - My issue revolves around the sudden appearance of odd and inaccessible folders named things like "RQCZN6~C". - The folders affected contain a mixture of files, mainly documents. You're ideal for this contract if you have expertise in: - NAS server file restoration and management - Document recovery and troubleshooting Preferably, you will have worked with diverse file formats and encountered similar issues before. Your problem-solving skills will truly shine in this project. Let's restore order to my documents.

    $144 (Avg Bid)
    $144 Avg Bid
    8 bids
    Need penetration testing done 6 days left
    VERIFIED

    I need a technical FLwho is conversant with intricate details of cybersecurity, with a specific focus on sensor network and penetration testing, The aim of this project is to explain the principles, intricacies, vulnerabilities, and mitigation strategies of sensor networks in cybersecurity. However, the twist here is, the information needs to be broken down to a level that non-technical decision-makers can understand. More details about time frame and milestones will be discussed in the chat window. - The freelancer should have: - Deep knowledge and understanding of cybersecurity and sensor networks. - Strong technical writing skills, with proven ability to simplify complex concepts. - Experience in communicating technical ideas to non-technical audience. - The report sh...

    $14 / hr (Avg Bid)
    $14 / hr Avg Bid
    2 bids

    I'm in need of a professional who can address an issue with my digital xray setup. The expert must have experience with DRX Evolution xray. The console is unable to see the generator. Key requirements: - Diagnosing the problem: Investigating and identifying the root cause of the connection issues. - Providing a solution: Implementing a more stable and reliable connection between the console and the generator. - Testing and validation: Ensuring that the new connection resolves the issue and doesn't compromise image quality. Ideal skills and experience: - Proven expertise in xray equipment connectivity, particularly between consoles and generators. - Strong understanding of serial cable connections. - Troubleshooting skills to identify and resolve connectivity issues. - Ability...

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    1 bids

    READ CAREFULLY PLEASE need an opnsense expert. and i mean expert. 1:1 forwarder, later configure firewall. round about 100 rules. COMPLEX ENVIRONMENT, ONLY FiREWALL GURUS NEEDED, YOU WORK ON MY TERMINAL, 1 server with hyper-v, 2 opnsense, 1 external vswitch, 2 internal vswitche on hyper-v. one for the entry rules, second manage the vms traffic Job takes around 5 to 7 hours. start immediately DONT BID AND ASK LATER FOR DIFFERENT PRICE

    $159 (Avg Bid)
    $159 Avg Bid
    7 bids

    I need a skilled h a c k e r to help recover funds that are currently inaccessible on a website. The specific details of the situation will be shared upon hiring. The successful freelancer for this job should ideally possess: - Proven experience in ethical h a c k ing or similar - Strong understanding of website security - Excellent problem-solving skills - Ability to maintain confidentiality Please apply if you have the necessary skills and experience for this task.

    $134 (Avg Bid)
    $134 Avg Bid
    3 bids

    I'm looking for an ethical hacker to carry out a comprehensive digital security sweep on my laptop, phone, Roku TV, and vehicle. The ultimate goal is to identify and eliminate any malicious software or tracking mechanisms that may have been surreptitiously installed on these devices. Key objectives are to: - Identify and eliminate any unauthorized access to my devices, which have been ongoing for more than a month. - Identify and eliminate any tracking mechanisms placed on my laptop, phone, Roku TV, and vehicle. - Diagnose and repair any unusual device behavior or performance issues that may be attributable to hacking or tracking. The ideal candidate should have: - Proven experience and expertise in cybersecurity, digital forensics, and ethical hacking. - Up-to-date knowledge of the...

    $575 (Avg Bid)
    $575 Avg Bid
    10 bids

    I'm in need of a cybersecurity expert who can delve into the source of a family cyberattacker's activities. The attacker has been visiting multiple internet platforms and spreading slanderous content targeting my family. It's a sensitive situation, and I need to uncover the identity of this cyberattacker. Key Requirements: - **Investigation**: You will be tasked with identifying the origin of the slanderous content and false accusations. This will require a thorough examination of our internet activity, identifying any unusual patterns or sources of information. - **Expertise in VPNs and Proxies**: The cyberattacker is potentially using VPNs or proxies to hide their identity. You should have experience in hacking into these services to identify the true IP address or locati...

    $473 (Avg Bid)
    $473 Avg Bid
    21 bids

    I've had a hacking attack in the past and now need to regain my peace of mind by having an ethical hacker check my devices for security. The devices to be checked are my Windows computer and Android Smartphone. Desired Skills and Experience: - Proficient ethical hacker with experience in computer and smartphone security. - Knowledge of Windows and Android operating systems. - Ability to conduct a thorough security check and provide a detailed report of the findings.

    $124 (Avg Bid)
    $124 Avg Bid
    6 bids

    I urgently need a comprehensive security check on my network and servers. In particular, the focus areas should be: - Firewall and network infrastructure - Operating systems and software - User access and permissions - Internal server coding and potential backdoors Even though I didn't specify any compliance standards for you to follow, a good understanding of common ones like PCI DSS, HIPAA, and GDPR would be beneficial. Skills and Experience: - Expertise in network infrastructure and firewall setup - Thorough understanding of different operating systems and their vulnerabilities - Experience with user access management and permission settings - Knowledge in server coding and identifying backdoors I can't stress enough the urgency of this project, it needs to be completed...

    $171 (Avg Bid)
    $171 Avg Bid
    18 bids

    I am experiencing issues with Active Directory 2016 replication in a topology that includes 10-50 domain controllers. The tasks that need to be performed include: - Diagnosing current replication problems. - Providing solutions to rectify replication issues. - Implementing troubleshooting practices to avoid future issues. The ideal freelancer for this task will have expert knowledge and experience in Microsoft Active Directory, specifically the 2016 version, and a deep understanding of domain controller topologies. They will be proficient in diagnosing and fixing replication issues and optimizing directory performance. A solid background in IT system administration is also essential for this job.

    $148 (Avg Bid)
    $148 Avg Bid
    21 bids
    Trophy icon Basic Subnetting Tutorial 2 days left

    Answer the attached question correctly, and briefly explain. using principles of subnetting. I'm looking for an expert in networking who can provide correct answer and clear and concise explanation of the attached question. Answer the attached questions, the provide table of the subnets Accepted file format Excel or Word

    $14 (Avg Bid)
    Guaranteed
    $14
    5 entries

    Project Requirements A. Implement Hatchetman attack in Contiki 3.0 B. Implement Resolution of Hatchetman attack using 2ACK scheme. C. Evaluate the solution with standard RPL (RFC 6550) under Hatchetman attack D. Detailed documentation of the steps so that it could be replicated. Details are provided in the attached PDF.

    $40 (Avg Bid)
    $40 Avg Bid
    3 bids

    We are seeking experienced Network Administrators to work on an undefined project. The specific tasks, operating systems and size of our network infrastructure has not been disclosed. If you have broad experience spanning several areas of network administration such as configuring routers, switches, troubleshooting network connectivity issues, implementing network security measures across various operating systems (Windows, Linux, MacOS) and network sizes, you might be the right fit. Please send us your proposals showcasing your comprehensive skills and versatility.

    $548 (Avg Bid)
    $548 Avg Bid
    18 bids

    I'm in need of a seasoned professional who can assist me in improving APT detection through the development of a sophisticated AI model. Additionally, your expertise will be essential in analyzing Provenance Graphs to unearth suspicious activities. Key Tasks: - APT Detection: The successful candidate should be able to enhance the current APT detection mechanisms in place through their expertise in cybersecurity and GNN. - AI Model Development: We are looking to create an advanced AI model specifically tailored for APT detection. Your experience in this area is crucial. - Provenance Graph Analysis: Your ability to analyze Provenance Graphs and identify anomalies, potentially suspicious activities, is paramount. Ideal Skill Set and Experience: - Proficiency in cybersecurity a...

    $474 (Avg Bid)
    $474 Avg Bid
    34 bids

    I need a skilled individual to assist me in completing Task 12 of the TryHackMe Windows Privilege Escalation arena. The task involves understanding the vulnerabilities and exploiting them to escalate privileges. Key requirements include: - Experience with Windows operating systems, particularly in the context of penetration testing. - Prior knowledge or experience with TryHackMe or similar platforms for cybersecurity challenges. - Proficiency in identifying and exploiting vulnerabilities, especially those related to access control, file permissions, or services. Please note that this task needs to be completed as soon as possible. It's a fairly urgent project, so quick and efficient work is crucial.

    $60 (Avg Bid)
    $60 Avg Bid
    7 bids

    I'm seeking a skilled developer with experience in Linux and networking to help create a custom openmptcprouter. The primary goal of this project is to aggregate multiple internet connections into one cohesive, high-speed network. Key Project Details: - Operating System: Linux - Primary Goal: Aggregating multiple internet connections - Types of Connections: DSL, Cable, Mobile Network Ideal Skills and Experience: - Proficiency in Linux operating system - Strong background in networking and internet connection management - Familiarity with openmptcprouter or similar technologies is a plus - Prior experience in aggregating multiple internet connections - Ability to deliver a stable, high-performance solution If you have the expertise and experience in Linux, networking, and internet ...

    $150 (Avg Bid)
    $150 Avg Bid
    16 bids

    I'm currently facing potential malware attacks causing unexpected slowdowns, particularly affecting my website load times. Hence, I'm in urgent need of a knowledgeable cyber security professional who can identify and rectify issues within my server files. Key Responsibilities: - Investigate the root cause for the slowdown of the website load times - Pinpoint potential malware in server files - Advance and fortify the security system to prevent future occurrences Ideal Skills: - Proficiency in cybersecurity - Solid understanding of server operations, particularly SQL - Experience in malware detection and prevention Your task: Use your expertise to bring back operational efficiency and bolster my domains server's security. If you can catch the malware predator and resto...

    $111 (Avg Bid)
    $111 Avg Bid
    8 bids

    I'm in need of an experienced Network Engineer to assist us in designing, implementing, and maintaining our network infrastructure. The primary goal is to ensure smooth operations and security of our network. Key Responsibilities: - Design and implement network solutions, with a particular focus on VPN (Virtual Private Network) setup. - Regularly maintain and optimize network infrastructure to ensure it meets our operational and security standards. - Troubleshoot and resolve network issues as they arise. Ideal Skills and Experience: - Proven experience as a Network Engineer, with a strong background in designing and maintaining network infrastructure. - Specific experience with VPN (Virtual Private Network) setup is highly desirable. - Deep understanding of networking protocols, TCP...

    $29 (Avg Bid)
    $29 Avg Bid
    12 bids

    I am looking for a web security expert, who can solve the reputation and suspicious tag on our web app links. Off recently few customers in US region are getting blocked from accessing our links, they are shown potential threat in the links

    $71 (Avg Bid)
    $71 Avg Bid
    7 bids
    Themida v2 DLL File Unpacking 4 days left
    VERIFIED

    I'm seeking a proficient freelancer with experience in unpacking Themida v2-protected DLL files. The unpacked file is intended for analysis and research, and there's no need for detailed documentation. Key requirements: - Proficiency in unpacking Themida v2-protected files - Previous experience working with DLL files - Ability to efficiently provide the unpacked file Your primary task will be to successfully unpack the DLL file, providing me with the unpacked version for further analysis. Your expertise in this area is crucial. Please note that detailed documentation on the unpacking process is not required, only the unpacked file itself.

    $354 (Avg Bid)
    $354 Avg Bid
    14 bids

    Hello we have our web app at clients use it with their subdomain like Some clients are getting blocked to access this website, however its fine fine by myside. Need someone to solve this issue, i think mainly its happending in US region

    $95 (Avg Bid)
    $95 Avg Bid
    9 bids

    Hello we have our web app at clients use it with their subdomain like Some clients are getting blocked to access this website, however its fine fine by myside. Need someone to solve this issue, i think mainly its happending in US region

    $12 (Avg Bid)
    $12 Avg Bid
    4 bids

    can you help me with pass ookla host-tester PFA

    $18 (Avg Bid)
    $18 Avg Bid
    6 bids
    C# Program Hashing Fix Needed 4 days left
    VERIFIED

    I need a C# program that hashes text strings using SHA-256 hashing algorithm. The current program I have was designed to hash data, but I've noticed it does so in a different order than PowerShell. This is problematic for my workflow, as I need the two to hash data in the same order for consistency. Key Requirements: - Make the C# program hash data in the same order as PowerShell using SHA-256 - Ensure the program is efficient and secure - Document the changes made for future reference Ideal Skills: - Proficient in C# programming - Expertise in working with hashing algorithms, especially SHA-256 - Prior experience with data consistency issues - Strong understanding of security protocols and best practices Please include your relevant experience and approach in your bid.

    $46 (Avg Bid)
    $46 Avg Bid
    19 bids
    Secure Email Account Creation 4 days left
    VERIFIED

    I want to create a secure email account predominantly for sending and receiving emails. Requirements: - Capable of sending and receiving emails. - Needs a two-step verification process to enhance security. Ideal Candidate: The best fit for this project would be a developer well-versed in online security measures in addition to email systems.

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    7 bids

    As a cybersecurity officer, I'm seeking to significantly enhance the security measures of my server and cloud-based systems. Here are the project's requirements: - Implementing a zero trust network access on both system types to reduce the possibility of unauthorized access. - Proven experience on similar projects would be highly valued. - A particular focus is to be placed on uptime and reliability, as these systems are mission-critical. Ideal Skills & Experience: - Experienced cyber security professional - Deep understanding of zero trust network access - Proven track record with server and cloud-based systems - Excellent problem-solving capabilities in cybersecurity.

    $50 / hr (Avg Bid)
    $50 / hr Avg Bid
    2 bids

    I am seeking the services of a VPN expert with the knowledge and expertise to aid in accessing legal sports betting sites, which are currently inaccessible due to restrictions put in place by internet service providers. The purpose of this engagement is to enable unrestricted access to reputable legal sports betting sites, while ensuring the highest standards of online privacy and security are maintained. The ideal VPN expert will possess a deep understanding of the nuances involved in accessing geo-restricted content and possess the requisite technical proficiency to provide reliable, fast and secure VPN services. Additional bonus when freelancer has installed sucessful system.

    $292 (Avg Bid)
    $292 Avg Bid
    18 bids

    I'm looking for a highly skilled network engineer with extensive experience with Cisco Packet Tracer, specifically in implementing complex network security measures such as network routing, VLAN configuration, firewall setup, VPN, assigning IP addresses and implementing network-based firewalls. The ability to successfully ping is crucial. The right candidate must also be well versed in the Open Shortest Path First (OSPF) for routing protocols. Your role will involve: - Designing and implementing complex network models - Configuring OSPF as the routing protocol - Assigning IP addresses across all devices - Installing and setting up firewalls to protect the network - Configuring VLANs to segment network traffic - Ensuring successful ping across all devices - Setting up VPN for secure...

    $41 (Avg Bid)
    $41 Avg Bid
    11 bids

    I am in need of a highly experienced network security teacher who is proficient in the following areas: - Ethical hacking - Network intrusion detection - Penetration testing - Boot 2 root I have a project in which i need assistance to complete under the guidance of someone who has this knowledgede as i am struggling. This will include calling and helping me thank you

    $29 / hr (Avg Bid)
    $29 / hr Avg Bid
    20 bids

    I am in search of a cybersecurity professional who can provide specialized assistance in the area of Network Security and Zero Trust Network Access. Your responsibilities will entail: - Securing my network against any potential threats and vulnerabilities - Implementing an effective Zero Trust Network Access system The ideal freelancer for this project would have: - Strong experience and expertise in network security and Zero Trust Network Access - Understanding of cybersecurity best practices - Demonstrable experience in protecting sensitive information and preventing cyber threats. Please note, familiarity and experience with any specific cybersecurity framework (NIST, ISO 27001, or CIS) is not necessary for this project. Your primary task will be to safeguard the network and impl...

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    18 bids

    We are seeking an experienced penetration tester to join our team. As a penetration tester, you will be responsible for identifying and exploiting vulnerabilities in our systems to ensure they are secure. Your main tasks will include conducting vulnerability assessments, performing penetration testing, and providing recommendations for remediation. To excel in this role, you should have a strong understanding of various testing methodologies, possess analytical skills to interpret test results, and be familiar with a wide range of penetration testing tools and techniques. Skills required: - Penetration testing - Vulnerability assessment - Ethical hacking - Knowledge of network protocols - Familiarity with security frameworks - Strong problem-solving skills This is a medium-sized project...

    $497 (Avg Bid)
    $497 Avg Bid
    32 bids

    In this crucial project, we aim to significantly improve the cybersecurity of data stored on the Google Cloud Platform (GCP), using cutting-edge artificial intelligence methods. Our main goals are as follows: - Use Machine Learning and Deep Learning to detect and mitigate any potential cyber threats before they occur. - Utilize AI to predict and intercept Unauthorized Access, Data Breaches, and Malware Attacks, thereby bolstering our defense mechanisms. The ideal candidate will be proficient in AI, specifically Machine Learning and Deep Learning, and have extensive knowledge of cybersecurity on clouds. Experience with GCP would be a valuable advantage. It's essential for the chosen freelancer to be adept at translating complex AI algorithms into practical cybersecurity solutions. Ac...

    $1191 (Avg Bid)
    $1191 Avg Bid
    49 bids

    I am in search of a freelancer with a solid understanding of networking concepts to help me navigate and comprehend aspects such as IP addressing, subnetting, and topology analysis. I will give a certain scenario and we will answer it af the same time - Task Ramp-up: You will be explaining the basic principles of these topics, providing a high-level overview rather than a complex, in-depth study. - Goal: My target is to establish an intermediate-level understanding of these concepts. The perfect candidate would be someone who: - Has a strong foundation in network computing - Is proficient in explaining IP addressing and subnetting - Possesses an excellent ability to analyze network topologies - Has demonstrable skills in teaching or tutoring on technical concepts. Example as att...

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    14 bids

    As per attached Delivery by the 11th May More direct contract if quality work is delivered. A token will also be provided

    $21 (Avg Bid)
    $21 Avg Bid
    5 bids

    As per attached Delivery by the 11th May More direct contract if quality work is delivered. A token will also be provided

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    12 bids

    I need a skilled professional to perform a comprehensive vulnerability assessment and penetration testing on our network and system infrastructure. The primary objective of this task is to find potential security vulnerabilities. - Task Details: Your work will involve identifying weaknesses that could possibly be exploited to undermine our security controls and then testing how effective these controls truly are. - Approach: Please prioritize any vulnerabilities found according to threat severity level. I'm looking to focus on the most critical threats before handling the lesser ones. - Necessary Skills: Previous experience in network security, vulnerability assessment, and penetration testing is critical. You need to demonstrate a strong understanding of network and system in...

    $107 (Avg Bid)
    $107 Avg Bid
    17 bids

    I need to install a Microsemi 600 NTP server for my network, which is a mix of wired and wireless connections. The primary goal of this installation is to ensure time synchronization across a range of devices, which totals between 10 and 50. Key Tasks: - Installation of Microsemi 600 NTP server - Configuration for both wired and wireless network environments - Synchronization of 10-50 devices Skills/Experience: - Previous experience with NTP server installation and configuration - Expertise in network infrastructure, particularly in mixed wired and wireless setups - Understanding of time synchronization protocols - Proficiency in handling multiple devices for a uniform operation

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    7 bids

    I require a skilled network engineer for setting up and configuration of Ubiquiti UDM/switches for a wifi network. I'm looking for support in the following tasks: - Pre-configuration of UDM/switches - VLAN setup: A total of 3 VLANs need to be configured. Each VLAN will serve a specific function including employee devices connection, guest Wi-Fi access, and security devices connection. - Firewall configuration: You'll also need to configure the firewall for optimal network security. Post installation, remote support may be needed if any issues occur. The ideal candidate would have comprehensive experience with Ubiquiti products and UDM/switch configurations, specifically with VLAN and firewall rules. A solid understanding of network security and quality service settings...

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    15 bids

    I'm in need of an intermediate level -senior incident response/digital forensics specialist /Linux sysadmin familiar with triage, mitigation/containment , remediation and report writing. To do a on the job walk through of challenging tasks. So I can shadow watch ad take notes, for my thesis and upcoming internship. • Skills and Experience: - Incident response - Linux sysadmin - SOC Analysis with Sentinel, Splunk, Crowdstrike etc - Digital forensics - Report writing We are looking to record step by step actions taken on any job of your choice, preferably something you are already working on , company names will be changed . This project is to support my thesis and also to help improve skills and speed with incidents Looking for an affordable cost and a pa...

    $69 (Avg Bid)
    $69 Avg Bid
    16 bids

    Access Points setup. Provision (x3 Test Devices) for now using the Software Management Tool. License/Registration only. Possible SSID, Security Settings, Guest/Staff SSIDs and other Wireless parameters if we need anything. The main thing is get them configured locally with the most basic setup and a Client Connection before we proceed to next steps on more devices. Omada Controller and Licenses available to manage the devices. Please only get in touch if you've set these up before. Unfortunately, I don't have enough time to start interviewing people. If you're confident enough then please get in touch. Immediate start.

    $89 (Avg Bid)
    $89 Avg Bid
    4 bids

    I'm seeking an experienced cybersecurity professional who can assist me in creating a Remote Access Trojan (RAT) for iOS, with the goal of monitoring text messages, call logs, and WhatsApp on another device. Key Requirements: - The RAT must be able to access text messages, call logs, and WhatsApp on an iOS device - The primary purpose of this software will be for parental monitoring Ideal Skills: - Strong cybersecurity background - Proficiency with RAT creation and deployment - Extensive experience with iOS systems and security - Ethical hacker certification would be a plus The successful candidate must have a proven track record in creating secure and effective RATs, and understand the sensitive nature of this project. Please provide samples of similar projects you have worked on...

    $8 / hr (Avg Bid)
    $8 / hr Avg Bid
    4 bids
    ethical hacker -- 2 2 days left
    VERIFIED

    I am in need of an ethical hacker to assist me in safeguarding my business. The project is of high priority and requires immediate attention. I have a list of objectives which I would like the freelancer to complete. These objectives include, but are not limited to, performing penetration tests, conducting a thorough network security assessment, and carrying out social engineering techniques to evaluate any possible security gaps or weaknesses. The successful freelancer will manage the entire project from start to finish and ensure that objectives are met and that all security concerns have been resolved.

    $14 (Avg Bid)
    $14 Avg Bid
    7 bids

    I need help of internet security expert to help me in few tasks. I will provide details to eligible bidder.

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    19 bids

    I am in need of a proficient professional to set up Firewall Endpoint Security on our Linux operating system. Expertise in dealing with Virtual Private Networks (VPN) setups is vital, as our endpoint runs on such a configuration. The standout requirement for this job entails the implementation of a web filtering system as a specific firewall feature. The goal is to bolster our network's security and ensure operational efficiency. A proficient understanding of: - Firewall setups on Linux platforms - VPN configurations - Web filtering mechanisms is needed for this software-oriented task. Previous experience in similar projects would also be highly beneficial.

    $29 (Avg Bid)
    $29 Avg Bid
    16 bids

    I'm seeking a v2x security expert to conduct in-depth research on threat detection within the v2x technology landscape. This position is for a 3-year period and will focus on the following areas: - Threat Detection: The primary objective is to identify and analyze potential threats to v2x systems. Specifically, I am concerned about Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. The ideal candidate should have: - A strong background in v2x security research, with a focus on threat detection. - Extensive knowledge and experience in Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. - Experience presenting and publishing research at conferences like USENIX and NDSS. - The ability to produce high-quality research papers and practical solutions. -...

    $1224 (Avg Bid)
    $1224 Avg Bid
    8 bids

    I'm looking to have an Automator workflow created that will work with a Safari page. The function of this workflow should be to take the current open web page (which I am viewing in Reader view) and save it as a pdf to the Finder, specifically, to a set folder on my device. Here's what I'm looking for: 1. **Compatibility:** The Automator workflow should be compatible with macOS Mojave. 2. **Naming the PDF:** The saved PDF needs to be automatically titled with the Date in a yyyy-mm-dd format at the beginning of the file name. The website always provides the remainder of the file name, which I want to keep. 3. **Additional Functionality:** No additional functions are required beyond saving the web page as named PDF to a specific folder. The ideal candidate for thi...

    $138 (Avg Bid)
    $138 Avg Bid
    3 bids

    YOU NEED TO BE BASED IN VANCOUVER _ ITS ON ON-SITE TASK I am seeking assistance in setting up my printer and installing a hardware firewall at a physical location in downtown Vancouver. The task needs to be performed onsite by a reliable professional with demonstrable experience. Key elements of the project include: - Installing a printer (Laser, Inkjet or All-in-one Printer). I already have the necessary drivers and software. - Installing a hardware firewall for enhanced network security. The ideal freelancer for this job should have: - Proven experience in printer installation and setup. - A solid understanding of hardware firewall setup and configuration. - Good communication skills, as I may need clear explanations of how to maintain the installed systems. - Onsite availability in ...

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    13 bids

    I'm looking for a professional who can assist me in analyzing PCAPNG files. The two main aspects I'm interested in are network traffic analysis and packet filtering. Key Responsibilities: - **Network Traffic Analysis:** The professional will need to thoroughly analyze the network traffic recorded in the PCAPNG files. This analysis should be aimed at optimizing the network performance. - **Packet Filtering:** Additionally, the expert will be required to implement packet filtering on the network traffic in the PCAPNG files. The purpose of this filtering is to enhance network security and troubleshoot any network-related issues. Ideal Skills: - Deep understanding of network protocols and packet structures - Hands-on experience with PCAPNG file analysis - Proficiency in network tr...

    $35 (Avg Bid)
    $35 Avg Bid
    10 bids

    I recently lost access to my domain purchase account, which I believe has been compromised by an unauthorized user. Despite contacting the domain provider's customer support, I couldn't recover the account. This issue has arisen as my email and phone number linked to the account were altered. The primary goals of this project are: - **Recover Access to Domain Account**: I need a hacking expert to help me regain control over my domain purchase account. This includes resetting the account's email ID and phone number to the original ones. - **Track the Unauthorized User**: Additionally, the freelancer should track the person who has taken over my account. It is essential to identify this user for legal and security reasons. I have already taken steps to secure my phone number...

    $24 (Avg Bid)
    $24 Avg Bid
    5 bids

    I'm seeking an expert who can quickly create an interactive script intended for macOS Sonoma. This script should: - Ensure compliance with CIS (Centre for Internet Security) benchmarks, particularly focusing on system and information integrity. - Be capable of automating system configurations based on CIS benchmark suggestions, all of which are outlined in a comprehensive PDF I will provide. Ideal candidates will have: - Extensive experience in macOS, scripting, and automation. - Familiarity with CIS benchmarks, especially related to system and information integrity. - Ability to deliver the project ASAP, given its urgent nature. This is a great opportunity for freelancers with a solid background in security configurations and script automation, especially within a macOS environ...

    $125 (Avg Bid)
    $125 Avg Bid
    17 bids

    Recommended Articles Just for You

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Learn how to find and work with a top-rated Google Chrome Developer for your project today!
    15 MIN READ
    Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.
    15 MIN READ