Computer Security Jobs and Contests

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Sign up and start earning
Signup to start earning Are you a Computer Security Consultant? You could be earning money working on these jobs!

Browse Jobs on Freelancer

Project/Contest Description Bids/Entries Skills Started Ends Price (AUD)
Design & Develop Software -- 2 To Build and complete Software for Directory, online scheduling , data, client & employee management, and Payment Gateway. Please submit bid for further discussion of project. 37 PHP, Computer Security, Software Architecture, HTML5, Programming Feb 22, 2017 Today6d 20h $625
application based memory forensics topic: Application Based Memory Forensics security related forensics by using volatility.. need to create a tool for detecting the attacks from application 5 Python, Linux, Web Security, Computer Security Feb 21, 2017 Today6d 12h $88
Blog posts related to IT Security Need 600 word articles to be written for a blog on the following topics. 1. Threat Modeling 2. DDoS (brief intro) and rise in DDoS Attacks 3. Next Gen Firewalls 4. Reverse Engineering Malware 23 Computer Security, Blog, Technical Writing, Articles, Internet Security Feb 21, 2017 Today6d 1h $29
NAT/PAT configuration on ASA firewall I want NAT/PAT configuration on my new Cisco ASA firewall. 15 Computer Security, Cisco, Network Administration Feb 21, 2017 Feb 21, 20175d 20h $147
NAT/PAT configuration on ASA firewall I want NAT/PAT configuration on my new Cisco ASA firewall. 32 Computer Security, Cisco, Network Administration Feb 20, 2017 Feb 20, 20175d $139
Malware Removal Security Expert Needed 2-20-17 Fixed Budget - $75 We have a website that is written in PHP and MySQL that has been hacked. I need an internet security expert to go in and: 1) remove the malware 2) figure out how the hackers got in and close those weaknesses 3) fix / restore / reconstruct the website. 4) close security loopholes to prevent future attacks To apply for this job you must: 1) be willing to sign a notarized non discl... 23 PHP, Web Security, Computer Security, MySQL, Internet Security Feb 19, 2017 Feb 19, 20174d 5h $159
identifying a malicious node in wireless sensor network using cryptographic technques this project is about securing aggregation wireless sensor network by detecting a malicious nose and try to maintain the network after detection. the wireless sensor network must be in a tree topology. to detect the malicious node cryptographic techniques need to be used; and to simulate this network, NS2 is to be used 6 Wireless, Computer Security, Algorithm, Cryptography, C++ Programming Feb 19, 2017 Feb 19, 20174d $261
IBM Security QRadar SIEM 7.2 Administration and Configuration Training I need a tutor to train me on Siem tool i.e. IBM Security QRadar SIEM 7.2 Administration and Configuration along with basics such as IT infrastructure IT security fundamentals Linux Windows TCP/IP networking Syslogs 3 Web Security, Training, Computer Security Feb 19, 2017 Feb 19, 20173d 22h $541
Move software and data from old server to new server. Move software and data from old server to new server. 10 System Admin, Data Entry, Computer Security, Network Administration, Computer Help Feb 18, 2017 Feb 18, 20173d 6h $407
Spy on LINE Messenger and facebook messenger Getting into spouse's line messenger and various mobile messengers 2 Web Security, Mobile Phone, Computer Security Feb 18, 2017 Feb 18, 20173d 5h $839
Internet And Website Security Expert Needed 2-17-17 We have a website that is written in PHP and MySQL that has been hacked. I need an internet security expert to go in and: 1) remove the malware 2) figure out how the hackers got in and close those weakneses 3) fix / restore / reconstruct the website. To apply for this job you must: 1) be willing to sign a notarized non disclosure agreement 2) be a highly experienced expert in compu... 13 PHP, Web Security, Computer Security, MySQL, Internet Security Feb 17, 2017 Feb 17, 20172d 13h $136
Computer Forensics Will do forensics analysis on a given virtual machine image. Report findings. This is a practical scenario. 28 Linux, Computer Security, Report Writing, UNIX Feb 17, 2017 Feb 17, 20172d 12h $699
Mobile Phone, Android, Computer Security, Cryptography, Internet Security Feb 17, 2017 Feb 17, 20172d 11h
computertechniques.com [url removed, login to view] and configure system and network 2.set-up computer network 3.set-up computer server [url removed, login to view] and repair computer system 6 Computer Security, Computer Help Feb 17, 2017 Feb 17, 20172d 5h $556
Write a report on brute force and other illegal hacking tools A hacker has claimed on trial that he broke into a google, a dropbox and a yahoo account using brute force. You will provide a report that explains: a. Exactly what is brute force and how it works b. If it is possible to apply brute force to gmail, yahoo and dropbox c. What other illegal ways are used to break into email and user accounts d. if brute force was possible, how long it would tak... 34 Web Security, Computer Security, Software Architecture, Software Testing, Internet Security Feb 17, 2017 Feb 17, 20172d 2h $181
Cisco and Arista network administrator We're looking for a skilled network administrator that has a background of dealing with Cisco switches/routers, HP switches, Arista, and brocade routers to assist in modifying a few things on our routers and switches. Please do not apply if you do not have any network administrator skills related to this project, there is no need to waste both your time and ours, so please READ THIS FIRST, th... 40 System Admin, Linux, Computer Security, Cisco, Network Administration Feb 17, 2017 Feb 17, 20171d 23h $234
Web Security. Vulnerability finding in a code. Knowledge of hacking penetration tester. Easy task for the right person 23 .NET, Web Security, Computer Security, Report Writing, Internet Security Feb 17, 2017 Feb 17, 20171d 23h $48
Web Security Vulnerability finding in a code. Knowledge of hacking penetration tester. Easy task for the right person 16 Web Security, Computer Security, Report Writing, Website Testing, Internet Security Feb 17, 2017 Feb 17, 20171d 22h $41
help me retrieve my facebook account Someone hacked my facebook account removed my email addresses linked to the profile. Unfortunately I didn't have any phone number linked to my profile. I don't care whether you're ethical hacker or black hat. All I care about is to be able to access my page again. I already contact facebook, so please don't tell me to do that. I am looking for real/actual solution from e... 8 Python, Linux, Web Security, Computer Security, Internet Security Feb 16, 2017 Feb 16, 20171d 16h $261
Write some Software The purpose: I want to be able to define for a given file the number of times it can be copied. A few things to consider: * After the number of times that the file can be copied have been defined, you won't be able to change it as it defies the purpose. * Let's say I'm the owner of the file, and now want to burn it to a CD and sell it, but don't want the buyer to now be able... 16 Engineering, Computer Security, Software Architecture, Software Development Feb 16, 2017 Feb 16, 20171d 8h $728
Help me in sqlmap mysqL UNION query return same value sqlmap is returning the same value every time when using mysqL UNION query [url removed, login to view] 10 Linux, Web Security, Computer Security, MySQL, Internet Security Feb 16, 2017 Feb 16, 20171d 1h $31
Network Administration: Setting up a VPS + migration of WordPress site to it Hi, I am looking for an experienced network administrator who can setup a linux VPS and migrate my existing WordPress website to it. Here’s just some of the criteria that this person would meet: – Speaks, Reads, and Writes good English. – Is willing to communicate via video chat HAS THE FOLLOWING SKILLS: – Installation of webservers op VPS – Linux &n... 53 Linux, Computer Security, VPS, Network Administration Feb 16, 2017 Feb 16, 20171d 1h $164
Summireize sides in information and cyber security field -- 5 Dear I have slides power point and I need to make a summary and analysis for it. Regards, 6 Web Security, Computer Security, Internet Security Feb 15, 2017 Feb 15, 20178h 31m $9
Help me with Marketing -- 2 need to do a mailing to promote my managed services. 23 Data Entry, Computer Security, Facebook Marketing, Marketing, Bulk Marketing Feb 15, 2017 Feb 15, 20178h 16m $367
Summireize sides in information and cyber security field -- 4 Dear I have slides power point and I need to make a summary and analysis for it. Regards, 6 Web Security, Computer Security, Internet Security Feb 15, 2017 Feb 15, 20175h 39m $8
urgent need appfucated file unpacker for software we need expert who able to remove appfucated file security and his able unpack the setup file.. urgently we need expert for .net base project 5 Visual Basic, .NET, Computer Security, Software Architecture, Growth Hacking Feb 15, 2017 Feb 15, 20173h 33m $26
Summireize sides in information and cyber security field -- 3 Dear I have slides power point and I need to make a summary and analysis for it. Regards, 4 Web Security, Computer Security, Internet Security Feb 15, 2017 Feb 15, 20172h 35m $9
Summireize sides in information and cyber security field -- 2 Dear I have slides power point and I need to make a summary and analysis for it. Regards, 6 Web Security, Computer Security, Internet Security Feb 15, 2017 Feb 15, 20171h 30m $12
Showing 1 to 28 of 28 entries
« 1 »