Computer Security Jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    57 jobs found, pricing in AUD

    There are solutions provided to the penetration test exercises. Need someone to understand and explain solutions regarding the lab penetration testing exercises to me. I am applying to become an ethical [login to view URL] for once or twice per week of lessons, each lesson 2 hours each on ethical hacking.

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    1 bids

    We are about to start a small business lending operation and need a hand with the compliance and security procedure and policy drafting for the following: - Information security policy, including media classification policy and incident response plan - A formal process for engaging with new service providers - Data Security and Privacy Awareness Training, including GDPR - AML, CTF & ABC train...

    $766 (Avg Bid)
    $766 Avg Bid
    4 bids

    We are looking for the creation of an FTP to share protect material with some clients. The structure will be gherarchical, associate with a single mail with power of download and download.

    $5066 (Avg Bid)
    $5066 Avg Bid
    10 bids
    I need program -- 2 6 days left
    VERIFIED

    a program that locks your PC and encrypts the hard drive

    $13 - $48
    $13 - $48
    0 bids

    My project more too security area. Need to do anti screen capture by using virtual keyboard. once using virtual keyboard, the hardware keyboard cannot use anymore. And the virtual keyboard cannot screen capture and cannot copy and paste. In addition the keyboard also can be shuffle and and have colour code that user can remember. Its mean once user active the virtual keyboard. User use virtual key...

    $1031 (Avg Bid)
    $1031 Avg Bid
    4 bids

    Its like 3rd party keyboard. if people use this virtual keyboard, hardware keyboard cannot be use anymore, its like been lock. So this project must use virtual keyboard And Virtual keyboard do not have function copy paste & screen capture

    $251 (Avg Bid)
    $251 Avg Bid
    7 bids
    Trophy icon Web content - 27/07/2021 20:39 EDT 4 days left

    We need a content writer for a website, some writing skeleton was already done but something more professional and appealing is needed as the same will be used in presentations and marketing [login to view URL] slogan is “Using Cybersecurity To Empower The Evolution Of Technology.” The point is that the website is has a lot of content we need to make lively, attractive and modern. The ...

    $82 (Avg Bid)
    Guaranteed
    $82
    4 entries
    Malware Analysis -- 3 6 days left
    VERIFIED

    Malware analysis / research paper

    $206 (Avg Bid)
    $206 Avg Bid
    8 bids

    Hi, I just want to learn the necessary steps and some details. I need to discuss with somebody with solid similar experience.

    $68 (Avg Bid)
    $68 Avg Bid
    1 bids
    system security porject 5 days left
    VERIFIED

    it is a project that i need to be done in 48 hours and I will share the files in chat

    $34 (Avg Bid)
    $34 Avg Bid
    10 bids

    Write paper in computer science and publish it in journal

    $104 (Avg Bid)
    $104 Avg Bid
    20 bids

    Need a certified Microsoft security expert with experience implementing Zero Trust, MFA, Conditional Access, Azure Security and Microsoft Security Best Practices for ongoing consulting and assistance implementing a zero trust Microsof5 365 environment.

    $68 / hr (Avg Bid)
    $68 / hr Avg Bid
    1 bids
    $74 Avg Bid
    16 bids
    REMOTE NETWORK INSTALLATION 5 days left
    VERIFIED

    I have a new office with 5 computers that need to be connected by internet with my primary office network.

    $1428 (Avg Bid)
    Local
    $1428 Avg Bid
    13 bids

    Need help in computer networking management Dm indian people

    $91 (Avg Bid)
    $91 Avg Bid
    11 bids
    ethical hacker needed 5 days left
    VERIFIED

    Recently we were hacked. WE are going over our security. We want an ethical hacker who will be able to report our security weaknesses to us and recommend what we should do. Need someone as soon as possible.

    $53 / hr (Avg Bid)
    Local
    $53 / hr Avg Bid
    6 bids

    conduct penetration on a windows machine.

    $185 (Avg Bid)
    $185 Avg Bid
    9 bids

    ONLY BID IF YOU CAN COMPLETE WITHIN 1 HOUR. MAX $10 You work for a company that has branches in different cities and you have been tasked to design the network for your organization. Your initial plan is to show a layer three topology diagram and then cascade down to more details. Task: a) Your first diagram is as shown below: Refer to IMG 1 Assuming R1 is for the central site and R2 is for a bra...

    $129 (Avg Bid)
    $129 Avg Bid
    8 bids

    Rasom ware attack. We need someone who did this before to get back the corrupted file.

    $101 (Avg Bid)
    $101 Avg Bid
    3 bids

    Hi Please accept if you are really professional in doing forensic investigation. Im looking for someone who is able to do digital forensic, analyze the image and find evidence using various software such as FTK Imager, Autopsy etc. Thanks

    $48 (Avg Bid)
    $48 Avg Bid
    13 bids
    I need a ethical hacker 4 days left
    VERIFIED

    There is someone on second life threatening to hack into my sisters pc and also get her swatted and Dox'd. I would like to know the persons real name so I can report him to the police.

    $166 (Avg Bid)
    $166 Avg Bid
    11 bids

    Is there someone who can write a good project on criminology and security management in Kenya for underactuated in AU

    $291 (Avg Bid)
    $291 Avg Bid
    23 bids

    Computer ethics - short response writing

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    7 bids
    lost file -IT 4 days left
    VERIFIED

    Dear all, I worked on a design file for one week, accidentally I have saved an empty file over it, can anybody help me recover or find a backup of it please?

    $241 (Avg Bid)
    $241 Avg Bid
    10 bids

    Write about security issues in applications

    $161 (Avg Bid)
    $161 Avg Bid
    28 bids
    files decryption 4 days left
    VERIFIED

    Looking for someone to decrypt my files which were affected by Neer ransom virus.

    $19 (Avg Bid)
    $19 Avg Bid
    3 bids

    Design a distributed intrusion detection and prevention system Using (4) machine of NIDS (snort )that connected to (cisco)switch with QoS. Install Snort in each machine and write in each machine different set of snort rules (based on attacks categories Dos, probe, U2R and R2L). Then will use packets generator to find the to do the experiment and find the results. The purpose of this design...

    $56 / hr (Avg Bid)
    $56 / hr Avg Bid
    3 bids

    Need help in computer networking Dm indian people

    $83 (Avg Bid)
    $83 Avg Bid
    11 bids

    Please those who are best in their field BID

    $914 (Avg Bid)
    $914 Avg Bid
    10 bids
    Datasets for Analysing Code 3 days left
    VERIFIED

    Anyone good with using metric formula to apply on datasets to get results on a piece of java code and see performance using shannon entropy formula for example?

    $623 (Avg Bid)
    $623 Avg Bid
    8 bids

    Hi, I am looking for help in taking proxy for Google Cloud Security Engineer/ Data Engineer with GCP.

    $27 / hr (Avg Bid)
    $27 / hr Avg Bid
    3 bids

    I am looking for Networking specialist. Who can complete some questions as soon as possible. Requirement: Question is related to Computer Networking. For Example, Topology, Routing etc. 7/8 question will be given. time will be little bit short.

    $150 (Avg Bid)
    $150 Avg Bid
    18 bids

    This project Requires someone who is familiar with VMware Workstation 16 and SamuraiWTF. three reports will need to be written (check PDF).

    $373 (Avg Bid)
    $373 Avg Bid
    11 bids

    I need help with multiple questions and I am looking for someone who can help me with this. The questions will mostly be mathematical or Free-writing. Please do text me for more INFO!!

    $148 (Avg Bid)
    $148 Avg Bid
    15 bids

    Cloud Networking & Security Start-up looking for a 90-120 seconds explainer video(s). This video will comprise of multiple section, Problem, Solution and Use-case overview and details. We are looking for someone with good solid experience that has worked on technology enterprise explainer videos. Please send us some samples of technology related videos. We have created a simple story line. ...

    $614 (Avg Bid)
    $614 Avg Bid
    40 bids

    Looking for cryptography expert to decode an [login to view URL] following number (in decimal): 0134265827 can be found in the following data (in hexadecimal): 04BA1F88 C094FE7C C9275C5B Thank you in [login to view URL] discuss more if you need

    $522 (Avg Bid)
    $522 Avg Bid
    6 bids

    Is there someone who can write a good project on criminology and security management in Kenya for underactuated in Kenya

    $33 (Avg Bid)
    $33 Avg Bid
    20 bids

    fix 503 error, timeout, configer server security

    $87 (Avg Bid)
    $87 Avg Bid
    26 bids

    Need an experience tutor who can teach me basics and beginning level of hacking. It will be like online meeting based on session. There is no problem with the budget. I wanted it to be divided into 7 sessions and each session being of around an hour or whatever is comfortable with you. What I will require is kind of index of content for the 7 Sessions that you will be covering. Please make it kin...

    $46 / hr (Avg Bid)
    $46 / hr Avg Bid
    5 bids
    networking project 2 days left
    VERIFIED

    need someone who has deep knowledge about computer networking......i have a networking exam so i would need someone to help me answer some questions. the test is 45 minutes long and there are all mcq questions

    $34 (Avg Bid)
    $34 Avg Bid
    15 bids
    PhD Proposal 2 days left

    I am looking for a good writer to write a PhD proposal as given below: End User Privacy friendly- for IOT development Internet of Things (IoT) applications development and design process is more complicated than others, such as the one for desktop, web, or mobile. That’s because IoT applications need both software and hardware to cooperate across multiple nodes with different capabilities. ...

    $173 (Avg Bid)
    $173 Avg Bid
    48 bids

    The past few years have witnessed a wide deployment of software defined networks facilitating a separation of the control plane from the forwarding plane. However, the work on the control plane largely relies on a manual process in configuring forwarding strategies. To address this issue, this paper presents NetworkAI, an intelligent architecture for self-learning control strategies in SDN network...

    $178 (Avg Bid)
    $178 Avg Bid
    7 bids

    I need you to design and build my online store.

    $289 (Avg Bid)
    $289 Avg Bid
    2 bids

    I need a solution. I have a router that broadcasts over a 1km range. I want to charge people for connecting to it. how would I go about this? I want to charge according to data transferred. for example they can buy 1GB for 1 dollar. after that they have to buy another bundle to continue browsing. Will i need to use mac address to know data transferred to a user or what exactly will i use. or maybe...

    $199 (Avg Bid)
    $199 Avg Bid
    5 bids

    on policies and governance for IT security

    $37 (Avg Bid)
    $37 Avg Bid
    28 bids
    The academic report 2 days left
    VERIFIED

    i need academic report for one of the topics in cyber security. required: Table of Contents - The report contains 20 to 30 pages - Pictures and chart topic will be shared.

    $101 (Avg Bid)
    $101 Avg Bid
    69 bids

    As a penetration tester and cybersecurity researcher, I have a deep understanding of the end-to-end security process to ensure all vulnerabilities are identified. My experience in testing a web application, database, system, and network comes from my background as a Penetration Tester. Skills: Perform automated and manual vulnerability analysis Demonstrate the application of penetration testing ...

    $203 (Avg Bid)
    $203 Avg Bid
    1 bids

    I need a script so that I use to stress test my website for Denial of service attack. I have about 10 websites running.

    $23 (Avg Bid)
    $23 Avg Bid
    3 bids
    Sales Expert 1 day left

    Sales expert required to be in live chat with a customer looking to buy a security product for their small business.

    $59 (Avg Bid)
    $59 Avg Bid
    10 bids

    I want someone who can complete a mini project. There will be five tasks 1. Buffer Overflow 2. Web AOacks 3. Password AOacks 4. Metasploit Framework

    $102 (Avg Bid)
    $102 Avg Bid
    7 bids

    Top Computer Security Community Articles