Network Security Jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    10 jobs found, pricing in AUD
    Seeking AWS experts 6 days left
    VERIFIED

    I have an AWS EC2 instance with SQL DB installed on it. The instance has a several ports open to the internet for the technicians and developers who work throughout the country through POS terminals. And specifically some known ports which are exposed with no Firewall or WAF on it. I have had brute force attacks from different parts of the world as it is open to all internet. I need suggestions on...

    $28 / hr (Avg Bid)
    $28 / hr Avg Bid
    18 bids

    I am working on RPL routing protocol for IoT using Contiki/Cooja simulator. I want to add and modify some code, that is in C language in the simulator files. Also, I want to launch an RPL attack in simulation.

    $14 - $141
    $14 - $141
    0 bids
    $76 Avg Bid
    3 bids
    Product roadmap 2 days left

    Network security product roadmap. You must have experience as a security product manager or relevant experience such as producing a roadmap for targeted audience, e.g., C-Suite, technical engineers, end user.

    $142 (Avg Bid)
    $142 Avg Bid
    8 bids

    Construction of Novel Distributed Network Intrusion Detection System

    $227 (Avg Bid)
    $227 Avg Bid
    6 bids

    Hello I’m looking for someone who can help build a Demo/Prototype ; website and app that send and receives money and also pays via QR code scanning and a digital wallet and with a Point of Sales software that will be compatible with the app and website

    $1323 (Avg Bid)
    $1323 Avg Bid
    13 bids

    I need you to customize Kibana for me. Need to create customized dashboards, Plugin to SQL db and Kibana should update records in elastic based on actions I take. Any experts ?

    $584 (Avg Bid)
    $584 Avg Bid
    4 bids

    Hi, We are looking for an experienced technician who is specialised in SoftHSM. You will install, setup and configure SoftHSM following our logic.

    $161 (Avg Bid)
    $161 Avg Bid
    2 bids

    It will require deploying two virtual machines using Ubuntu as it's an operating system as shown in the attachment. One serving as a firewall and the other serving as a Honeypot. The firewall VM also integrates intrusion detection capabilities, therefore, in addition to filtering network traffic, it should alert any potential intrusion. On the Firewall VM configure the firewall using iptables...

    $237 (Avg Bid)
    $237 Avg Bid
    11 bids
    Computer_scince_networking 7 hours left
    VERIFIED

    1. a) A computer network can be designed following a connectionOriented architecture or a connectionless network architecture. Suppose that in the network layer, routers are subjected to "stressful" conditions that might cause them to fail fairly often. Explain the actions that would need to be taken on such router failure at a high level, and which architecture better suits such a netwo...

    $48 (Avg Bid)
    $48 Avg Bid
    2 bids

    Top Network Security Community Articles