Internet Security Jobs

Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

From 55,024 reviews, clients rate our Internet Security Experts 4.89 out of 5 stars.
Hire Internet Security Experts

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    27 jobs found, pricing in USD

    Need an expert who can support in MDR / EDR: Endpoint detection and response (EDR) - Protecting an endpoint against cyber threats Managed detection and response (MDR) - MDR includes everything that it needs to protect itself against the evolving cyber threat landscape. MFA: Multifactor Authentication & required tools like Authenticator, VIP Access etc Active Directory Hardening and LAPS Active Directory Security Hardening to mitigate various attack techniques within privilege escalation, obtaining remote access, lateral movement and data exfiltration Local Administrator Password Solution (LAPS) provides management of local account passwords of domain joined computers. Passwords are stored in Active Directory (AD) and protected by ACL, so only eligible users can read it or request i...

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    2 bids
    Pen Test Website 6 days left
    VERIFIED

    I am looking to have a professional perform a thorough Penetration Test on my website. The main focus of the testing should be on the publicly-facing services, and to include automated testing. To help keep the website secure. The successful candidate for this project should possess a wide range of knowledge and expertise in the area of webserver and web application security. They should also be able to work with white lists/blacklists, patching, user authentication and other security measures. They must have experience in utilizing automated software penetration testing tools, such as Nmap, Nessus, Nikto, Metasploit and Core Impact. Finally, an ability to interpret the results of the tests and provide detailed reports upon completion is non-negotiable.

    $12 (Avg Bid)
    $12 Avg Bid
    6 bids
    Website getting hacked 6 days left
    VERIFIED

    Our website is getting hacked someone is making a new page on our website, we need the solution for that so that no one is able to hack our website.

    $138 (Avg Bid)
    $138 Avg Bid
    33 bids
    Penetration test 5 days left
    VERIFIED

    Welcome I want to run a test on my site I want to know about security vulnerabilities I also want to know how to solve problems I want to know how to exploit the vulnerabilities

    $58 (Avg Bid)
    $58 Avg Bid
    16 bids

    Those who are having very good knowledge & techniques about hacking of Android mobiles & Laptop to train for my students, they can bid.

    $85 (Avg Bid)
    $85 Avg Bid
    8 bids
    Content Writer -- 3 4 days left
    VERIFIED

    Required skilled content writer

    $30382 (Avg Bid)
    $30382 Avg Bid
    7 bids

    I need an experienced database professional to help me optimize the speed of my queries and configure a high availability setup on a MySQL database. The optimization will focus on the queries being used by default. The high availability setup should cover all aspects of disaster recovery and data protection, with appropriate failover protocols. The ideal candidate has extensive experience in database optimization as well as working with MySQL databases to ensure a successful outcome. If you have experience creating or working with databases using other technologies (NoSQL, for example), that could be beneficial too. The expected result of this project is a database that can run quickly and reliably, providing maximum uptime and eliminating costly downtime from system outages. The perform...

    $171 (Avg Bid)
    $171 Avg Bid
    22 bids
    Facebook hacked 3 days left

    My account has been hacked. I've tried removing and blocking the person who did this. Can you help me, and if not, would you kindly suggest someone who can? Thanking you in advance. Bob

    $222 (Avg Bid)
    $222 Avg Bid
    12 bids

    As a result of multiple attacks through exchange, we need someone to Identify Security Threat(s) and create a best practices for our Microsoft 365 account. Microsoft 365 Microsoft Defender Microsoft Sentinel Exchange

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    19 bids

    I recently had my Facebook account hacked by a malicious actor, Lily Collins. After assessing the situation, I've determined that I require assistance to gain back control of my account and secure it from future attacks. To do this, I need the expertise of a professional who can help me gain back my account. Once the service is completed, I do not need any additional security measures, as the existing ones should be sufficient for my needs.

    $330 (Avg Bid)
    $330 Avg Bid
    10 bids

    Hi , Looking for someone having experience in OCI infra , VCN, MFT, Security , OCI SMTP email, and Cloud Guard experience, It's a short 5-10 hours of work, timing is flexible.

    $195 (Avg Bid)
    $195 Avg Bid
    6 bids
    Ethical hacking 3 days left
    VERIFIED

    I'm looking for online ethical hacking services to keep my systems secure and make sure they are free of vulnerabilities. I'd like someone to conduct a penetration test to identify any potential weaknesses in my systems. Additionally, I'm open to ideas for developing new systems that need to be tested from the start. My ideal timeline for these services is 1 week.

    $88 (Avg Bid)
    $88 Avg Bid
    31 bids

    I'm looking to hire an expert to provide a beginner class in configuring Firewall systems on Palo Alto PA500 devices. This class will be conducted in a virtual environment and will cover the basics of configuration and deployment. The instructor should have hands-on experience working with PA500 systems, and should be able to teach on the use of command-line tools and web-based graphical interfaces. The instructor should also be able to provide guidance on common use cases for deploying and managing PA500 systems. The instructor should have a thorough understanding of network security technologies, including virtual LANs and tunneling protocols, and should be able to provide best practices for implementing secure configurations. The class should also provide insight into system ...

    $34 (Avg Bid)
    $34 Avg Bid
    7 bids
    Penetration tester 2 days left
    VERIFIED

    Kali linux expert and pentester well versed in pentesting and red team activities. Can check for vulnerabilities on web servers and write malware and patch code.

    $52 / hr (Avg Bid)
    $52 / hr Avg Bid
    10 bids

    I need to configure my unifi controller with a guest hotspot but i need clients to connect using email address and phone number

    $48 (Avg Bid)
    $48 Avg Bid
    5 bids

    We are an IT Security company in Kuwait. We have a retail IT Security service including social media account retrieval service for Kuwait Citizen and expats. The service covers platforms such as Facebook, Instagram, Twitter, Pinterest, Google mail, Snapchat and WhatsApp. Please state your abilities in your resume or proposal along with the fee per hours or man-days.

    $120 (Avg Bid)
    $120 Avg Bid
    2 bids

    My computer was hacked. I need an ethical hacker to evaluate my computer to identify the person that hacked my computer. I need this information in order to file a police report. They remotely added 10 download keys, that are not mine, & also a hackers email address was posted on my computer.

    $26 / hr (Avg Bid)
    Local
    $26 / hr Avg Bid
    11 bids

    I need Cost modelling and Resource allocation for projects that i m assigned to I work in Cybersecurity and i need help with this i can explain more

    $165 (Avg Bid)
    $165 Avg Bid
    16 bids
    threat modelling exercise -- 2 20 hours left
    VERIFIED

    The Brief This assignment is where you demonstrate practical cyber security skills. You will demonstrate your understanding of different methods of vulnerability identification and report findings to decision makers. You will demonstrate application of defensive techniques to illustrate methods of organization's response to cyber incidents.

    $99 (Avg Bid)
    $99 Avg Bid
    9 bids
    threat modelling exercise 20 hours left
    VERIFIED

    The Brief This assignment is where you demonstrate practical cyber security skills. You will demonstrate your understanding of different methods of vulnerability identification and report findings to decision makers. You will demonstrate application of defensive techniques to illustrate methods of organization's response to cyber incidents.

    $24 (Avg Bid)
    $24 Avg Bid
    8 bids
    Capture The Flag 18 hours left

    We are seeking a skilled and experienced individual to participate in a Capture the Flag (CTF) competition on our behalf. The ideal candidate should possess a strong background in cybersecurity, with extensive knowledge of cryptography, network security, and exploitation techniques. The scope of this project is to solve a variety of problems and challenges presented in the CTF competition within a specified timeframe. As such, we are offering a compensation package based on hourly rates. The selected candidate will be paid for the time spent on each task, with the potential for bonuses based on successful completion of challenges. The primary responsibilities of the selected candidate will include: Participating in the CTF competition on our behalf. Identifying and exploiting vulnerabil...

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    13 bids
    Cyber security 9 hours left

    Make assignment of critical vulnerability analysis module about threat modelling exercise.

    $49 (Avg Bid)
    $49 Avg Bid
    42 bids

    My WordPress website has been hacked a couple of times and the hacker has contacted me telling me the issue is with my theme and he keeps dropping my site. I need someone to try hack my site and fix this vulnerability.

    $56 (Avg Bid)
    $56 Avg Bid
    35 bids

    We're looking for Network Engineer level1 in Dublin, Ireland. This is an onsite job and person must be there in Dublin Duration: 1 year l, full time Start: ASAP Languages Required: English Valid work permit and CCNA certificate is required. Key Responsibilities: • To liaise with customers to troubleshoot and resolve faults, and act as an internal point of escalation for technical issues • Pro actively handle customer queries by keeping them fully informed of progress, ensuring that requests are answered/fulfilled to the customer's complete satisfaction in each and every instance • Act as an interface with service suppliers, ensuring that incidents which need to be passed to them for resolution are done so professionally with a view to rapid response a...

    $1928 - $2143
    Local
    $1928 - $2143
    0 bids

    We are seeking experienced Network Engineers to join our team in Dublin, Ireland at an entry level of proficiency. Our ideal candidate will possess strong knowledge of network configuration, computer security, and troubleshooting skills. This is an onsite position and applicants from remote locations will not be considered. The candidate must have the ability to find solutions quickly, perform duties with minimum supervision, and show attention to detail when resolving issues. A technical background in installation, maintenance and support-related functions is required, as is prior experience on multiple networks. The successful applicant will demonstrate effective communication within a team environment, as well as being able to provide high-level customer service. If you believe ...

    $2035 (Avg Bid)
    Local
    $2035 Avg Bid
    2 bids

    flagship smartphone, the Oppo Find X6 series, on Wednesday, March 21, 2023, in China. The phone in question comes in two models: Oppo Find X6 "regular" and Oppo Find X6 Pro. From the model that is often used, Oppo Find X6 Pro is positioned as a dangerous model because to its more extreme specifications. The one and only benchmark that exists in photography is a camera system with a Sony-made camera with a large sensor and Hasselblad lenses. Oppo Find X6 Pro debuts with three cameras that are named in a large, bezel-mounted lingkaran module. This camera module differs from the asimetrist Oppo Find X5 in several ways. Oppo declares that the Find X6 Pro lacks a primary camera. Despite this, the camera's focus is on the top.

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    2 bids

    In this unit, students explore various options available to organisations to investigate problems and attacks on their computer systems. It enables students to develop knowledge of laws governing the IT domain and apply approaches to investigating cyber-crime using digital forensic techniques. A range of computer forensic frameworks will be discussed to systematically assist organisations in identifying, analysing, and reporting cyber security issues. In addition, students will study exploitation techniques and use system log files, domain authentication and registry mechanisms to acquire digital evidence. The key focus of the unit is on the identification, preservation, analysis and presentation of digital evidence related to misuse or intrusion into an enterprise-level system.

    $80 (Avg Bid)
    $80 Avg Bid
    29 bids

    Recommended Articles Just for You

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Python runs some of the biggest websites on the net. Here’s how to create a website using Python, one of the easiest programming languages around.
    8 MIN READ
    You can build a stunning website on the Wordpress platform. Here is a collection of 10 sensational Wordpress designs to ignite your creativity.
    7 MIN READ