Computer Security Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 104,459 reviews, clients rate our Computer Security Consultants 4.85 out of 5 stars.
Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    57 jobs found, pricing in AUD

    I am on the lookout for an enthusiastic and dedicated entry-level Cyber Security Analyst. As part of your role, you would be responsible for: - Monitoring and analyzing potential security threats - Executing vulnerability assessments and penetration testing - Creating and enforcing security policies and procedures While no specific systems or applications have been outlined for you to monitor, you can expect a variety of challenges to tackle. This is a fantastic opportunity to leverage and expand your basic knowledge in cybersecurity, paving the way for a solid foundation in your burgeoning career within this exciting field. Effective problem-solving abilities, a keen eye for detail, and a robust understanding of cybersecurity principles will be your crucial assets for this job. Are yo...

    $1703 (Avg Bid)
    $1703 Avg Bid
    19 bids

    I am looking for someone experienced with Ubiquiti Unifi devices to troubleshoot and solve an internet connection issue with my home network gateway. Unifi USG 3P, Cloud Key Gen 2 plus with Protect camera system, multiple switches. Home network works fine including cameras. ATT ISP is working fine, the internet isn’t getting through the gateway. I did a firmware update last night and it froze up and I tried to reset the system. Everything came back up properly except for the internet. Key Details: * The network consists of a router, an access point, and a switch. * Despite power cycling the gateway, it refuses to connect to the internet. * Error: "No internet connection". Ideal Skills and Experience: * Proficiency in networking and router configurations. * Prior experien...

    $58 / hr (Avg Bid)
    Urgent
    $58 / hr Avg Bid
    12 bids

    Location: Noida, Sector 62 Date: 26th February 2024 I am in need of a professional to deliver efficient network configuration services, specifically concerning firewall configurations. I have a setup of computers that are linked in a LAN. The main tasks would include: - TP-Link ER605 and TP-Link TL-SG1024D Setup & Firewall configuration for a computer-only LAN A strong understanding of LAN, experience in IT network support, and proficiency in firewall configuration are crucial for this project. Your expertise will ensure the secure and smooth running of our network. The ideal professional is expected to have excellent communication skills to effectively help enhance the network settings. Please provide evidence of previous similar work and qualifications. Skills required: - IT...

    $151 (Avg Bid)
    $151 Avg Bid
    4 bids

    In this project, I expect my freelancer to employ Sigploit to delve into and exploit telecommunication vulnerabilities. As someone who has prior working experience with Sigploit, it's important they understand the tool's application in exploiting vulnerabilities, with emphasis on telecom vulnerabilities. Key Expectations: - Extensive experience with Sigploit and HackRF One - Demonstrated knowledge in telecommunication vulnerabilities - Tactical approach to vulnerability exploitation Ideal Experience: - Proficient in telecommunication systems - Solid background in cyber security - Proven experience in exploiting system vulnerabilities. Your expertise in these areas will enable articulate understanding of the task at hand and, ultimately, project success. Looking forward to w...

    $43 / hr (Avg Bid)
    $43 / hr Avg Bid
    11 bids

    Overview: I am experiencing difficulties accessing a particular website, we are seeking a skilled freelance web developer or network specialist to assist in diagnosing and resolving the issues. The problem seems to stem from varying response times and loading problems based on IP addresses. We need someone proficient in troubleshooting web access issues to identify the underlying causes and implement solutions to ensure consistent and reliable access to the website. Responsibilities: understand the specific access issues encountered, including response times and loading problems. Analyze network configurations and settings to identify any potential issues affecting access based on IP addresses. Conduct tests and simulations to replicate the reported problems and gather additional data fo...

    $146 (Avg Bid)
    $146 Avg Bid
    2 bids
    Cybersecurity Infographics 6 days left
    VERIFIED

    Cybersecurity Infographics

    $180 (Avg Bid)
    $180 Avg Bid
    31 bids

    Small onsite + remote job in Katupally Chennai. Only nearby experts may connect me. I require a networking professional to implement GRE tunnelling configurations in my existing Catalyst 9300 Series L3 Cisco switches. These switches are deployed within a single site network topology. The core features required from the GRE tunnelling are: - Traffic encryption - Tunnel endpoints - IPv4 support The ideal candidate for this project will have: - A strong understanding and practical experience in configuring GRE tunnels - Proficiency in working with Cisco Catalyst 9300 Series switches - Familiarity with single site network topology configurations - In-depth knowledge of IPv4 support and traffic encryption.

    $391 (Avg Bid)
    $391 Avg Bid
    10 bids

    I'm looking for an experienced network engineer/admin specializing in wireless networks for maintenance tasks. Key Responsibilities: - Establish a Site to Site Connection between two routers with different ISPs using IPSec, IP Tunnel not use VPN. Ideal candidate must have: - Extensive experience in wireless network management and maintenance - Skill in configuring firewalls and site-to-site using IPSec - IP Tunnel. - Knowledge in IPSec protocols - Proven track record of ensuring networks are running smoothly & efficiently. - Both end has Mikrotik (Hex) Routers. - Both end has different ISP's . - Site one has static public address and Site 2 has dynamic public address. - Target to communicate both networks ends so that share the data easily and connect one network to another...

    $43 (Avg Bid)
    $43 Avg Bid
    9 bids

    I require a proficient digital forensic expert to extract and analyze key pieces of evidence from a computer's hard disk to support a legal case. The job primarily involves: - Extraction of a forensic copy of the hard disk - Identification and analysis of the source of a security breach - Verification of suspicious activities, particularly modifications to the admin password on the server The desired freelancer should possess a strong understanding of digital forensic investigation, security breaches, and indicators of compromise. They should be highly skilled and experienced in working with various digital evidence types, particularly within a legal context. Experience in disclosing unauthorized access attempts and addressing malware infections would be a plus.

    $1875 (Avg Bid)
    $1875 Avg Bid
    23 bids

    I'm currently facing an undisclosed problem with my Remote Desktop Protocol (RDP) that I'm using through a Windows operating system. The exact issue remains undefined, requiring an expert in this field to effectively analyze and resolve it. Ideal skills and experience: - Robust knowledge and experience in Windows RDP. - Exceptional troubleshooting abilities. - Ability to identify and resolve undefined issues. While applying, freelancers should include the following: - An account of their past work related to RDP troubleshooting and resolution. - Detailed project proposal outlining their planned approach to identifying and resolving my issue. - Their general experience with working on similar issues. The goal is to restore the effective functionality of my RDP, with mini...

    $9 / hr (Avg Bid)
    $9 / hr Avg Bid
    8 bids

    I need a tech-savvy professional to make an installation of Netnumen U31 for my ZTE OLT. - Current Setup: Understand my current fiber optic network. - Main Objective: Will use the Netnumen U31 for network monitoring; therefore, knowledge and experience in network monitoring systems is crucial. - Desired functionalities: The installed system should provide Performance Monitoring and Node monitoring features. Ideal candidates would have experience with NetNumen U31, ZTE OLT, and fiber optic networks. Proficiency in managing network monitoring systems and ensuring their optimal performance is a must-have.

    $49 (Avg Bid)
    Guaranteed
    $49
    1 entries

    I am in urgent need of an Intellectual Property (IP) professional with expertise in Drafting and Filing European Patents. This expert will be tasked with the critical duty of reviewing my existing patent project, revising it with professional terminologies and ensuring a higher level of protection for my cybersecurity invention. Key Duties: - Review existing patent - Draft and Rewrite patent using professional wordlines - Develop a more robust structure for better protection - Preparation of documentation in OEB/EPO XML/PDF format ready for filing The ideal candidate should have a deep understanding of cybersecurity technologies as the invention is technically based in this field. Mandatory Skills/Experience: - Profound knowledge and experience in IP legal drafting and filing - Pro...

    $172 (Avg Bid)
    $172 Avg Bid
    13 bids

    I'm seeking a highly skilled cybersecurity specialist equipped to perform vulnerability assessments. Your primary areas of focus will be: • Network Security • Application Security A keen eye for identifying potential risks and implementing corrective measures is required to prevent and mitigate threats. Offered success will be reliant on the following certifications: • Certified Information Systems Security Professional (CISSP) • Certified Ethical Hacker (CEH) Significant experience in these mentioned domains is anticipated. Let's secure our digital environment together.

    $32 (Avg Bid)
    $32 Avg Bid
    14 bids

    I'm currently experiencing some trouble with my Tron wallet - both on desktop and mobile versions. An unauthorized permission has been mysteriously placed on my wallet, using the multi-signature option, restricting my ability to fully control the movement of my funds. I am not certain how this occurred, as there have not been any noticeable suspicious activities on either device, nor do I recall accessing a dubious link or downloading a potentially harmful app. This being said, I am looking for a highly experienced developer who can: - Investigatively determine the potential source of this breach - Successfully remove this unauthorized permission from my wallet Ideal Skills and Experience: - Previous proven experience with Tron wallets - Understanding of multi-signature permissions...

    $784 (Avg Bid)
    $784 Avg Bid
    31 bids

    As a business with 10-50 devices connected to our network, we need a proficient expert in network administration to tackle various tasks in our Windows and Linux environments. These areas include, but are not limited to: - Network Troubleshooting: Apply systematic approaches to quickly detect, diagnose, and rectify network errors or issues. - Network Security: Implement robust security measures to prevent unauthorized access, data leakages, and potential cyber threats. - Network Configuration: Perform optimal setups, adjustments, and management of network components for efficient operation. IDEAL CANDIDATE: We are seeking a resourceful network administrator who is well-versed in Windows and Linux operating systems. Your skills and experience should reflect your ability to manage and secu...

    $247 (Avg Bid)
    $247 Avg Bid
    19 bids

    I'm deeply troubled by my ubiquity network that's dropping and requiring me to readopt equipment multiple times every day. The primary concern involves the switch that's experiencing this inconsistency. I've attempted simple cable checks to fix the issue, but the network keeps dropping. I am in need of an expert who can diagnose the problem and guide me towards the most suitable solution. Someone suggested it could be a Spanning Tree Protocol issue, so if you have proficiency in that regard, I am particularly interested. Skills required include: - Troubleshooting network connectivity issues - Expertise with Ubiquity network equipment - Knowledge of Spanning Tree Protocol - Patience and diligence in diagnosing repetitive problems Potential tasks may include equipmen...

    $224 (Avg Bid)
    $224 Avg Bid
    22 bids

    I'm in need of an experienced cybersecurity specialist with a strong background in Android phone systems. The primary purpose of this endeavor is data extraction which will involve location tracking, message interception, and call recording. The ideal candidate should be proficient with: - Phone hacking for data extraction using authorized techniques. - Location tracking mechanisms. - Ability to intercept and decode messages. - Proficient with Call recording retrieval. Please note this project strictly adheres to legal and ethical guidelines. Only legitimate, legal techniques are to be applied to test the security of the system and no unauthorized access is permitted. Previous experience in ethical hacking would be beneficial.

    $166 (Avg Bid)
    $166 Avg Bid
    5 bids

    My project revolves around ensuring enhanced security measures through the lawfully permitted interception of SMS messages via the SS7 network. The main objectives I am targeting include: • Observing suspicious activities: I am aiming to identify and monitor any unusual or suspicious activities in a legal and ethical manner. • Monitoring specific data: The primary data I am interested in include text messages. Your task will involve setting up a system that enables efficient and secure monitoring of this information. • Flagging messages: I prefer that the intercepted messages be flagged for immediate attention. Therefore, this system must be designed with an urgent notification feature on detection of any suspicious activity. Ideal candidates for this project should have...

    $153 (Avg Bid)
    $153 Avg Bid
    15 bids
    Pentest Marketplace 4 days left
    VERIFIED

    We're in search of a skilled pentester to assess and fortify the security of our upcoming web3-based marketplace. If you're experienced in identifying vulnerabilities and adept at conducting thorough penetration testing, we invite you to join us in safeguarding the integrity and trustworthiness of our marketplace.

    $35 / hr (Avg Bid)
    $35 / hr Avg Bid
    26 bids

    I'm in need of skilled network professionals to configure a Ubiquiti Dream Machine setup tailored for my small business requirements. Our goal is to ensure the network is both highly secure and capable of high-speed data transmission, supporting connectivity for over 50 devices. This system is critical for our daily operations, providing the foundation for our internal and external communications, data management, and security systems. **Requirements:** - Proficiency with Ubiquiti networking devices, specifically the Dream Machine model. - Experience in deploying networks for small to medium-sized businesses, with the ability to cater to a device connectivity range of more than 50. - Strong background in network security measures to protect against both internal and external threats....

    $76 / hr (Avg Bid)
    $76 / hr Avg Bid
    6 bids

    I'm in need of skilled network professionals to configure a Ubiquiti Dream Machine setup tailored for my small business requirements. Our goal is to ensure the network is both highly secure and capable of high-speed data transmission, supporting connectivity for over 50 devices. This system is critical for our daily operations, providing the foundation for our internal and external communications, data management, and security systems. **Requirements:** - Proficiency with Ubiquiti networking devices, specifically the Dream Machine model. - Experience in deploying networks for small to medium-sized businesses, with the ability to cater to a device connectivity range of more than 50. - Strong background in network security measures to protect against both internal and external threats....

    $76 / hr (Avg Bid)
    $76 / hr Avg Bid
    5 bids

    I am currently seeking a highly skilled and experienced penetration tester who can assist me in identifying potential vulnerabilities across various platforms and create comprehensive reports on the HackerOne platform. The ideal candidate will possess a solid understanding of the HackerOne platform, have extensive experience in vulnerability assessment, and be adept at crafting detailed reports. **Key Skills & Qualifications:** - Profound knowledge of the HackerOne platform. - Proven experience with vulnerability assessment in different environments. - Exceptional ability in creating detailed, clear, and concise reports. **Focus Areas:** - **Web Applications:** To detect and exploit vulnerabilities within our web applications. - **Network Infrastructure:** Assess and recommend impr...

    $320 (Avg Bid)
    $320 Avg Bid
    17 bids

    As a beginner in the cyber security field, I'm looking to build my skill set in finding vulnerabilities across network, web application, and mobile application security domains. I'm seeking a seasoned expert who can guide me through the nuances of each area with a hands-on approach. Here's what I envision for this learning journey: - **Focus Areas**: Thorough practical training in Network Security, Web Application Security, and Mobile Application Security. - **Learning Style**: I believe in learning by doing. Therefore, I'm searching for someone who can provide comprehensive practical hands-on experience rather than just theoretical knowledge. It would be ideal if this includes live examples, real-world problem-solving, and guided vulnerability assessments and explo...

    $154 (Avg Bid)
    $154 Avg Bid
    26 bids

    I am seeking a skilled professional to configure our existing Windows 11 Remote Desktop Protocol (RDP) setup to allow for seamless, simultaneous remote access by more than 10 users, each with full administrative rights. This upgrade is critical for our team's efficiency, as we rely heavily on remote access for our daily operations and collaborative endeavors. **Key Requirements:** - **RDP Configuration:** Implement a solution that enables simultaneous connections for over 10 users without performance degradation. - **Administrative Access:** Each user should be provided with full administrative rights, ensuring they have the ability to perform a wide range of tasks without restrictions. - **Security Measures:** Despite the broad access, it's crucial to implement stringent secur...

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    8 bids

    My primary objective is to thoroughly scrutinize two specific websites to unearth any potential vulnerabilities that might compromise their integrity, performance, or usability. This analysis is pivotal for me, as it aims to ensure the utmost security and efficiency of these online platforms. Here's a succinct overview of my requirements and expectations: - **Objective**: The focus of this analysis lies in detecting any vulnerabilities through an exhaustive evaluation. This encompasses both an active and passive approach to not only pinpoint existing issues but to preempt potential security threats. - **Key Areas of Concern**: - **User Data Security**: Ensuring that user information is safeguarded against breaches. - **Website Functionality and Reliability**: Ascertain that all a...

    $41 (Avg Bid)
    $41 Avg Bid
    21 bids

    I am seeking a highly skilled freelancer with expertise in AI and Cybersecurity to assist in the development of an intellectual property focused on enhancing cybersecurity measures through data protection and intrusion detection. The main objective is to identify and mitigate potential cyber threats, contributing significantly to the research and development within my work domain. **Key Requirements:** - Strong foundation in AI, specifically within the context of cybersecurity. - Profound knowledge in data protection and intrusion detection systems. - Ability to conduct comprehensive security breach analysis. - Experience in developing algorithms or systems that proactively address cyber threats. - Capability to work on a tight deadline, aiming for completion ASAP. **Ideal Skills:** - P...

    $128 (Avg Bid)
    $128 Avg Bid
    5 bids

    I'm seeking a skilled writer to craft a compelling white paper. This document will introduce a groundbreaking technology concept, primarily aimed at industry professionals. Its primary goal is to educate, presenting information that's thorough yet accessible to those within the technological field. The white paper should strike a balance, offering moderate technical depth. This means it should include detailed explanations but remain clear and engaging, avoiding overly complex jargon. It's crucial that the writer can distill complicated ideas into content that's insightful and persuasive to industry insiders. Ideal Skills and Experience: - Proficient in technical writing, with a portfolio demonstrating experience in technology-related topics. - Ability to understand ...

    $314 (Avg Bid)
    $314 Avg Bid
    8 bids

    I urgently require assistance with DNS leaks. Currently utilizing a Linux Operating System, I am experiencing significant privacy concerns as a result. I am looking for a candidate with the following expertise: - Proficient in addressing and resolving DNS leaks - Extensive knowledge of Linux Operating Systems The ideal candidate should be able to pinpoint the cause of the leak and implement a robust, long-term solution to protect privacy. Your assistance could make a real difference to our overall system security. When we connect to the server running openvpn and DNS then it should pass the

    $162 (Avg Bid)
    $162 Avg Bid
    24 bids

    BIDDING ENDS IN 6 DAYS, 23 HOURS I'm currently grappling with a redirection hack on two of my WordPress websites. Visitors are being redirected to unintended pages, likely due to malware infection. The malware's specifics, however, are still unclear to me. I'm seeking a freelancer with expertise in malware removal and website security to address and resolve this issue promptly. Key Requirements: - *Malware Analysis & Removal:* Identify and fully remove all traces of the redirection hack and any other potential threats from both sites. - *WordPress Security Hardening:* Implement measures to enhance the security of my websites, preventing future attacks. - *Website Restoration:* Ensure that my websites return to their original functioning state before the hack, with al...

    $232 (Avg Bid)
    $232 Avg Bid
    75 bids

    I am in immediate need of a highly experienced cybersecurity specialist with a focus on IoT, particularly within the smart home devices realm. My project is located in Meridian, Idaho, and I'm looking for someone with the right mix of skills and experience to ensure our network is impervious to threats. **Key Requirements:** - **Network Security Expertise:** You must be well-versed in safeguarding networks, with a strong emphasis on protecting IoT environments. - **Experience Level:** I am seeking a senior-level specialist - someone with extensive experience in cybersecurity, particularly with a track record of successfully securing smart home devices. - **IoT Focus:** The ideal candidate will be experienced in the nuances of IoT security, especially within smart home ecosyste...

    $1678 (Avg Bid)
    NDA
    $1678 Avg Bid
    5 bids

    I'm in need of a dedicated and experienced Ethical Hacker who can comprehensively provide penetration testing, vulnerability assessment, and social engineering for protection against hacking. Key Responsibilities: - Implementing stringent safety measures for an unidentified type of personal data. Skills and Experience: - Experience in penetration testing. - Proficient in vulnerability assessment. - Expertise in social engineering. - Strong understanding of various hacking techniques and robust counter-measures. Though there isn't a strict timeline for project completion, a systematic and thorough approach to enhancing data safety is a non-negotiable priority.

    $479 (Avg Bid)
    $479 Avg Bid
    5 bids
    Website Security Fix Needed 3 days left
    VERIFIED

    I'm experiencing suspicious activity on my client's website, which has been flagged as malicious by four security vendors on VirusTotal. Even though there are firewalls, regular website scans, and an SSL Certificate in place, the issue persists. I need a highly knowledgeable security specialist to identify and eliminate the cause of this suspicious activity. There's no room for error; my reputation and my client's peace of mind are on the line. Ideal Skills & Experience: - Proven experience in web security - Understanding of firewalls, SSL Certificates and routine website scans - Ability to work with VirusTotal - A successful record in handling similar issues Please note, that there are currently no performance or functionality issues with the website. It is onl...

    $148 (Avg Bid)
    $148 Avg Bid
    101 bids

    As an e-commerce business owner, I am looking for a dedicated cybersecurity expert to beef up the safeguards on my site. I am particularly passionate about the fight against cybercrime, hence the project is not just about technicalities, but the willingness and enthusiasm to build a safer cyber community. Key Requirements: - Implementing comprehensive firewall protection - Ensuring all communications are encrypted - Setting up a reliable intrusion detection system In addition to the cybersecurity upgrades, it would be advantageous if the freelancer could assist in creating an optional user account system. This system requires further discussions and is currently undecided. Desired Skills & Experience: - Extensive knowledge and experience in website cybersecurity features - A hi...

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    42 bids

    As an e-commerce business owner, I am deeply concerned about the security of my website, which handles sensitive customer information. I'm specifically worried about data breaches, malware attacks, and unauthorized access. • **Data Protection**: The website manages a variety of customer data, including credit card information, personal identification information, and user login credentials. Therefore, an effective solution must offer comprehensive data protection to prevent breaches. • **Malware Protection**: The offered system should also be equipped to prevent and quickly combat malware attacks, ensuring minimum downtime and interference with the site's functioning. Freelancers applying should have a solid background in cybersecurity, specifically in securing e-...

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    52 bids

    I'm seeking skilled technical assistance to resolve a hardware ID (HWID) ban on my PC while playing Fortnite. My expertise in handling such issues is limited, and despite my best efforts, I've been unable to overcome this challenge for the past 1-4 weeks. I believe a professional with a deep understanding of PC gaming and security measures can help me regain access to Fortnite. **Background:** - Encountered a HWID ban on my PC while playing Fortnite 1-4 weeks ago. **Efforts Already Made:** - Attempted basic troubleshooting myself, including: - Reinstalling Fortnite - Changing some hardware components - Using various VPN services **Ideal Skills and Experience:** - Proficient in handling and resolving HWID bans for PC games, especially Fortnite. - Familiarity with the intr...

    $245 (Avg Bid)
    $245 Avg Bid
    7 bids
    Fix My RDP Connection 2 days left
    VERIFIED

    I'm experiencing an inability to connect through Remote Desktop from a Windows client to a Windows host. This issue has persisted despite attempts at troubleshooting, and I require expert assistance to resolve it. **Requirements:** - Diagnose the root cause of the Remote Desktop connection failure. - Ensure a stable and reliable RDP connection between the two Windows machines. **Ideal Skills and Experience:** - Proficiency in Windows operating systems, specifically in troubleshooting RDP issues. - Knowledge of Firewall, Network, and Remote Desktop settings and configurations. - Ability to communicate effectively and provide step-by-step guidance for troubleshooting or configuration adjustments. - Experience in network troubleshooting and understanding of underlying protocols used...

    $34 (Avg Bid)
    $34 Avg Bid
    19 bids
    Urgent Server Health Check 2 days left
    VERIFIED

    I'm experiencing significant slow performance with my mission-critical server, which is severely impacting daily operations. I urgently need an expert to investigate and diagnose issues related to the CPU, Memory, and Storage. Access to the server will be provided through Idrac. ### Key Investigation Areas: - **CPU Performance:** Understand if the CPU is being overutilized or if there's a bottleneck causing the slow performance. - **Memory Utilization:** Evaluate the memory usage patterns and determine if there's insufficient memory or memory leaks. - **Storage Health:** Check the storage for any faults, including disk health, I/O performance, and available space. ### Ideal Skills and Experience: - Proficiency in navigating and diagnosing issues via Idrac. - Solid understa...

    $52 (Avg Bid)
    $52 Avg Bid
    22 bids

    I am seeking a professional to formulate robust security and Business Continuity Plan (BCP) policies for my upcoming ISO certification. Key Components: - Security policies should suggest robust measures that could be taken even though I have skipped on specifying. Suggestions on access control, data encryption, incident response, etc. are highly welcomed. - The BCP should cover critical areas like my IT infrastructure and Human Resources. Submission Criteria: Freelancers interested in this project are expected to provide detailed project proposals. Lay out your plan of action, provide insightful suggestions based upon your experience, and demonstrate how you have successfully completed similar tasks in the past. Ideal candidates should have: - Extensive experience in developing sec...

    $244 (Avg Bid)
    $244 Avg Bid
    19 bids

    I am in immediate need for a skilled Ethical Hacker to fortify our digital assets. This project will involve a detailed vulnerability assessment, comprehensive penetration testing, and thorough security auditing. Our primary objective is to unearth and mend vulnerabilities and rigorously test our existing security measures to ensure they're impregnable. Ideal candidates will bring the following skills and experiences: - Proven expertise in ethical hacking, with a portfolio of successful security assessments. - Strong knowledge in both automated and manual penetration testing techniques. - Deep understanding of various security frameworks and compliance standards. - Experience in conducting security audits across diverse platforms and environments. - Certified in relevant fields (e.g....

    $21 (Avg Bid)
    $21 Avg Bid
    6 bids

    I'm seeking a professional thesis writer with expertise in Machine Learning and Cloud Security. Your task will be to write a Ph.D level thesis focusing on the application of Machine Learning techniques in the realm of Cloud Security. Key Topics to Cover: - Anomaly Detection - Intrusion Detection - Predictive Risk Analysis Ideally, you should have the following qualifications: - Strong knowledge in Machine Learning and Cloud Security - Previous experience writing academic theses - Excellent writing and research skills - A clear understanding of Ph.D level academic requirements Let's make an in-depth exploration of how Machine Learning can revolutionize Cloud Security.

    $535 (Avg Bid)
    $535 Avg Bid
    22 bids

    I require a proficient Vulnerability Assessment and Penetration Testing (VAPT) expert to join my team. Your task will involve a comprehensive examination of all our systems. With no less than three years of hands-on experience, you will have; • Extensive knowledge in Network security, Web application security, and Mobile application security. • Demonstrated experience with Nessus, Burp Suite, and Metasploit tools. Your in-depth knowledge and skills in these areas will help my team in strengthening our system's reliability and resilience. If you have a keen eye for identifying system vulnerabilities and setting up strong security measures, I want to hear from you.

    $151 (Avg Bid)
    $151 Avg Bid
    13 bids

    This project aims to establish a secure network connection between a centrally managed Check Point firewall and three branch offices using non-Check Point vendor solutions. The primary goal is to facilitate a secure, encrypted communication channel across these diverse network environments through an IPsec VPN, ensuring seamless interoperability despite the differences in vendor technologies. A key aspect of this project involves implementing certificate-based authentication mechanisms to provide a robust layer of security and identity verification for all connecting entities. By integrating these varied network segments, we will enhance the overall security posture of our organization, enabling secure data exchange and communication across multiple locations while maintaining high standar...

    $56 / hr (Avg Bid)
    $56 / hr Avg Bid
    21 bids

    I'm looking for someone with a dual role experience as both a Director and Coordinator pertaining to the realm of cybersecurity. The role demands an individual with mid-level expertise, capable of contributing significantly to risk management, IT governance, and security audit tasks. Key competencies: - Proficiency in implementing and maintaining ISO 27001 standards - Proven experience in cybersecurity risk management - Ability to perform in-depth security audits - Skilled at establishing and managing IT governance processes Please note, this role requires a delicate balance of technical know-how and leadership qualities. As such, professionals with a background as both a coordinator and director within the sphere of cybersecurity will be given higher consideration.

    $3500 (Avg Bid)
    $3500 Avg Bid
    28 bids

    I'm in need of a skilled Sigploit live mode expert to focus primarily on IoT device vulnerabilities for a cutting-edge research and development project. My objective is to utilize Sigploit's capabilities in live mode simulations and exploit development specifically targeted towards enhancing our understanding and mitigation methodologies for IoT-related vulnerabilities. **Key Requirements:** - Proficiency in Sigploit with a strong emphasis on live mode simulations and exploit creation. - Proven experience in identifying and analyzing vulnerabilities within IoT devices. - Ability to conduct thorough vulnerability scanning and suggest remediation steps. - A sharp eye for detail and a persistent approach to research and development. **Ideal Skills and Experience:** - Deep understa...

    $246 (Avg Bid)
    $246 Avg Bid
    9 bids

    I'm looking for an experienced network specialist to configure a secure VPN for remote access using the MikroTik router with ikev2 protocol. The VPN will serve up to 10 clients, ensuring confidential and secure communications for our office operations. The ideal candidate will have strong expertise in network security, MikroTik routers, and VPN configurations. **Requirements:** - Set up a VPN on a MikroTik router using the ikev2 protocol. - Ensure compatibility for up to 10 concurrent clients. - Focus on secure remote access for office staff. - Optimize for performance and security. - send email notification to client who is connected with vpn. -send OTP for verifying to client each to establish connection. **Skills and Experience:** - Proficiency in MikroTik RouterOS confi...

    $130 (Avg Bid)
    $130 Avg Bid
    10 bids

    i have a webisite and i want to protect my website

    $215 (Avg Bid)
    $215 Avg Bid
    32 bids
    Cloud Computing Report Rush 1 day left
    VERIFIED

    I urgently need a detailed report on Cloud Computing for my BSc course, focusing on architecture analysis, security evaluation, research review, and a discussion on the pros and cons for SMEs. This assignment is critical for my course (CO3721), and I’m looking for a freelancer who can deliver high-quality work under a tight deadline. **Deadline:** 5 days from the hiring date. **Format Required:** The report must be formatted according to the Harvard citation style. It’s crucial to strictly follow these guidelines to meet the academic requirements. **Details of the Report:** - **Architecture Analysis:** Provide a comprehensive analysis of different cloud computing architectures, highlighting their strengths and weaknesses. - **Security Evaluation:** Evaluate the security aspe...

    $152 (Avg Bid)
    $152 Avg Bid
    27 bids

    I'm seeking a professional to identify and install the best WiFi mesh system for my large home, compatible with a 5G SIM router (Virgin media). The system will primarily be used for entertainment and gaming, ensuring consistent connectivity and minimal lag. I prefer a managed service, where the expert will handle all facets of the setup and communicate effectively with me about the process. Currently I am using an oppo 5g WiFi 6 router that accepts 5g SIM card and I have 1 tp link deco ax3000 connected via Ethernet to act as a booster. I am considering buying another - I also have express VPN that I want to be configured to the routers however I do not have the time to do the research and investigate best options etc. I am willing to change the full set up so far but ideally would lik...

    $267 (Avg Bid)
    $267 Avg Bid
    17 bids

    Cyber security and cyber vulnerability writing. 4 Further direction is in the attached document.

    $157 (Avg Bid)
    $157 Avg Bid
    56 bids

    I am seeking an experienced freelancer to configure PfSense with Open Nebula for a cloud computing project. The goal is to enhance network security while ensuring efficient virtualization across multiple servers. This setup is crucial for the seamless operation and security of our cloud computing environment. **Requirements:** - **Configuration of PfSense:** Implement it alongside Open Nebula to create a robust cloud computing platform. Experience with PfSense is a must. - **Network Security Features:** - **Firewall Rules:** Set up comprehensive firewall rules to protect against unauthorized access and threats. - **VPN Setup:** Establish secure VPN connections for remote access, ensuring that our cloud environment is accessible yet secure. - **Intrusion Detection System (IDS...

    $34 / hr (Avg Bid)
    $34 / hr Avg Bid
    21 bids

    Recommended Articles Just for You

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Learn how to find and work with a top-rated Google Chrome Developer for your project today!
    15 MIN READ
    Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.
    15 MIN READ