Internet Security Jobs

Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

From 67,027 reviews, clients rate our Internet Security Experts 4.82 out of 5 stars.
Hire Internet Security Experts

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    48 jobs found, pricing in USD
    Website Penetration Test 6 days left
    VERIFIED

    I am looking for a skilled professional to conduct a comprehensive penetration test on my website. Key Objectives: - Identify vulnerabilities: I need to ensure that no exploitable weaknesses exist that could compromise the security of my website. - Assess compliance with security standards: My website must meet industry security standards to ensure data protection and user privacy. - Evaluate potential impact of a breach: It's crucial to understand the possible consequences of a successful security breach. - Bug identification: I would also like any bugs found to be highlighted so that they can be fixed. I have not conducted security testing on the website before, so this will be the first time and it's important that the expert I hire is thorough and experienced. Ideal skil...

    $12 (Avg Bid)
    $12 Avg Bid
    3 bids

    I'm on the for someone with knowledge of web security to produce a detailed analysis report on selected CVE vulnerabilities associated with WordPress. This report is specifically for an academic project. Here are the particular CVEs for review: 1. CVE-2023-32243 2. CVE-2023-0084 I can provide the older versions of those plugins with bugs you just need to execute and create output on docker environment and add screenshots of execution showing how it exploits security and then the share the proposed mitigations in the report. You must have to cover the below mentioned points in the reports: briefly describe the architecture of the web application/framework describe the type(s) of vulnerability that is considered describe the vulnerabilities in detail describe how to exploit the vu...

    $44 (Avg Bid)
    $44 Avg Bid
    17 bids

    I'm seeking the expertise of an experienced Ethical Hacker. Your primary task would be: - Conduct a comprehensive vulnerability assessment of a mobile application Here's what you'll need for this role: - Proven understanding and experience with Local Area Network (LAN) systems - Expertise in conducting vulnerability assessments - Solid comprehension of mobile application structures and their potential security weak points. Your mission will be to identify loopholes and vulnerabilities that may exist, in order to uphold our commitment to providing a secure mobile application for our userbase. Your keen insight and detailed feedback on any potential weak points found will be instrumental to our ongoing development and fortification efforts.

    $98 (Avg Bid)
    $98 Avg Bid
    9 bids

    I have a Network Forensics work that requires me to do the following: 1. Apply a research-based approach to forensic analysis. 2. Analyse and interpret digital evidence from a variety of sources. 3. Present findings to both executive and technical audiences. I will share more details and files. Ideal Skills and Experiences: • Extensive knowledge of network forensics • Proficient in vulnerability assessment • Experience handling both real-time and historical network data • Great adaptability in their investigative approach Objectives: • Identify potential vulnerabilities in our network • Offer actionable steps to improve network security • Provide a detailed report with findings and recommendations Your thorough understanding of network forensics ...

    $434 (Avg Bid)
    $434 Avg Bid
    10 bids

    Position: Experienced Cybersecurity Professional Seeking an experienced cybersecurity professional for mentoring and guiding a student through various cybersecurity courses and projects. Requirements: - Experienced cybersecurity professional with preferable certifications such as Security+, CISSP, GSEC, SSCP, etc. - Outstanding communication skills and proficiency in English. - Strong teaching and mentoring experience. - Advanced knowledge in Network Security, Cryptography, and Ethical Hacking - Cybersecurity certification as mentioned below. - Outstanding communication abilities. - Teaching or training experience preferred but not essential - Ability to break down complex cyber security concepts. Experience: Minimum of 10 years' practical experience...

    $11 - $18 / hr
    Featured Sealed
    $11 - $18 / hr
    8 bids

    We require an ethical hacker with expertise in mobile game security. Focused specifically on player data handling, our project aims to identify vulnerabilities in our system, test the effectiveness of our security measures, and improve the overall security of our network. The ideal freelancer for this job should have: - Experience with ethical hacking. - In-depth knowledge of player data security measures. - A proven track record on mobile game security. Your duty will be to run exhaustive checks and tests to identify weaknesses and areas for improvement within our mobile game security system to ensure utmost data protection for our players.

    $34 / hr (Avg Bid)
    $34 / hr Avg Bid
    13 bids

    I'm looking for a professional who can conduct a comprehensive basic vulnerability scan on my mobile application, as well as set up continuous real-time monitoring. The project involves: - **Basic Vulnerability Scan**: The task at hand is to thoroughly investigate and identify any potential vulnerabilities in the mobile application. This requires expertise in mobile application security and penetration testing. - **Continuous Real-time Monitoring**: Following the vulnerability scan, the security expert will be responsible for setting up a real-time monitoring system. This will help in the prompt detection and mitigation of any future security threats or breaches. The ideal candidate should have: - Proven experience in cyber security, with a specific focus on mobile application sec...

    $2751 (Avg Bid)
    NDA
    $2751 Avg Bid
    14 bids

    I'm looking for a skilled ethical hacker to help with security testing on my Instagram account. I'm particularly interested in identifying any security vulnerabilities and testing the existing security measures in place. Key Requirements: - Experience in ethical hacking and security testing - Familiarity with Instagram's security protocol and common vulnerabilities - Ability to work with test accounts with limited permissions Ideally, you will provide a detailed report on the security of the account, with any vulnerabilities highlighted, recommended improvements, and confirmation of the effectiveness of current security measures. Your work will be instrumental in ensuring the safety and privacy of this account.

    $11 (Avg Bid)
    $11 Avg Bid
    4 bids

    I'm looking for a skilled penetration tester to evaluate the security of my website. - Tasks: - Perform a comprehensive security test to ensure my website is protected from potential threats. - Identify any vulnerabilities that may exist on the site. - Analyze the risks associated with the security of the website. - Key Requirements: - Expertise in website penetration testing. - Proficient in identifying and dealing with website vulnerabilities. - Able to provide a detailed report outlining the risks and necessary actions to enhance the security of the site. - Site Details: - The website is built on a Content Management System (CMS) like WordPress, Joomla, or Drupal. - The focus is primarily on identifying the admin username and password. I'm looking for some...

    $1905 (Avg Bid)
    $1905 Avg Bid
    16 bids

    I am in need of a professional that can set up a Site-to-Site EoIP tunnel using Mikrotik devices. About the Project: - The primary goal is to extend the current office network to another location. This will involve creating a secure, Site-to-Site connection. - High-level encryption is a crucial requirement for this project to ensure the security of data passing through the tunnel. Key Skills and Experience: - Profound understanding and experience in setting up network connections, especially Site-to-Site connections. - Expertise in Mikrotik devices and a proven track record in configuring EoIP tunnels. - In-depth knowledge of encryption protocols and practices, with an emphasis on high-level encryption. Note: Experience in handling similar projects will be a significant advantage and ...

    $15 / hr (Avg Bid)
    $15 / hr Avg Bid
    8 bids

    I'm in need of a highly qualified and certified network and security engineer. Ideally, you should have certifications from Cisco, F5, Symantec, HP, HPE, Dell, Huawei, Avaya, Fortinet, and Juniper. Key Responsibilities and Tasks: - Network design and configuration - Firewall management - Network troubleshooting - Telecommunication system setup - Network security audits - Hardware installation and maintenance - System integration - Vendor selection and management - Providing ongoing support Your background should demonstrate extensive experience with all the above functions. I'm particularly interested in freelancers who have successfully handled similar tasks in the past. Your success will hinge on your ability to improve our overall network and security infrastructure. Looking...

    $160 (Avg Bid)
    $160 Avg Bid
    13 bids

    I am looking for a skilled professional who can precisely configure my ISP connectivity on my MikroTik router. The ideal candidate for this task will have extensive knowledge and experience dealing with IPv6 connectivity, specifically with the Global Unicast addressing scheme. As the desired end result of this project is a seamlessly functioning and effectively configured ISP connectivity, expertise in MikroTik is crucial. This is an excellent project for a freelancer who understands the importance of configuring IPC6 to ensure smooth operation and secure internet connectivity. Skills and Experience: - MikroTik router configuration - Expert in IPv6 configuration using Global Unicast addressing scheme - Understanding of ISP connectivity settings and requirements

    $156 (Avg Bid)
    $156 Avg Bid
    13 bids

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    $360 (Avg Bid)
    $360 Avg Bid
    13 bids

    I am urgently in need of a network engineer for my project. You will preferably have: - Experience in network design. - Ability to set up a new network. - Handle network security and firewall configuration. Experience is important for this job. Applicants should have undertaken similar network projects in the past. Kindly include these details in your application for consideration. I look forward to your proposals.

    $29 / hr (Avg Bid)
    $29 / hr Avg Bid
    22 bids

    For this crucial project, I’m searching for a seasoned AWS developer experienced in setting up advanced server security. Key Responsibilities: - As I've got an EC2 server in place, I am seeking to fortify the security measures associated with it. - Although I've not finalized the specific measures, your expertise and suggestions in IAM, Security Groups, or Network Access Control Lists (NACLs) would be greatly appreciated. - Emphasis on ‘Advanced Security Setup’ – a step beyond basic security – to comprehensively protect server's integrity. Ideal Skills: - Proven experience in AWS server security, specifically EC2. - Proficiency with IAM, Security Groups, NACLs. - In-depth AWS server security acumen. I'm excited to collaborate with a se...

    $19 (Avg Bid)
    $19 Avg Bid
    12 bids

    I'm in need of a knowledgeable specialist to improve the security measures of my moderately sensitive business data. The expert I'm looking for should have extensive experience in: - Data Encryption: The creation of a secure encoded version of our business data that can only be accessed with a key. - Firewall Protection: Setting up reliable prevention systems that filter network traffic and block unauthorized access. - Two-Factor Authentication: Integration of this additional layer of security that requires a second verification step before data access is granted. To accomplish this task, the specialist should have structured problem-solving skills, a keen eye for detail, and a deep understanding of modern data protection measures. Proven experience in successfully securing ...

    $83 (Avg Bid)
    $83 Avg Bid
    1 bids

    I am seeking a penetration tester to conduct comprehensive testing focused on network security, specifically on my servers and technology. The ideal candidate should possess the following skills: - A deep understanding of penetration testing methodologies - Proven experience conducting network security testing particularly on servers and technology - Proficiency in identifying vulnerabilities and devising strategies to address them Please specify your approach to penetration testing, including the tools and methodologies you will use, in your proposal. Your keenness for detail and efficacy in reporting security threats will be pivotal for this project. With your help, I aim to reinforce the security of my network, minimize threats, and maintain the integrity and performance of my servers...

    $14 (Avg Bid)
    $14 Avg Bid
    10 bids

    I am in need of a seasoned security expert, with particular skills in the realm of data and web security. My custom-coded website needs an upgrade in the following areas: - Network Security: I need a professional who can take care of safeguarding the usability and integrity of my network and data. - Application Security: Involving the measures taken to prevent exceptions in the security policy of an application or the underlying system. - Data Encryption: I need protection of my data, particularly data at rest, with a strong encryption method. As I'm unsure of whether a security audit has been conducted before, the freelancer will need to start from scratch and assess the current strengths and weaknesses of my system. Strong knowledge in overseeing security audits is an absolu...

    $46 (Avg Bid)
    $46 Avg Bid
    6 bids

    I'm in need of a thorough audit for my Windows PC. - I need someone to investigate and report on a variety of details. This includes checking for file content changes, access times, and potential unauthorized actions. - This audit will focus on two specific areas - my email and communication tools, as well as personal or sensitive information. - The audit report should be detailed and insightful, as it will be crucial in understanding the breadth of potential data breaches or unauthorized access. Ideal Freelancer Should: - Have proven experience in conducting comprehensive Windows PC audits. - Possess a deep understanding of data security principles and practices. - Be proficient in creating thorough and detailed audit reports. - Have good communication skills for discussing ...

    $141 (Avg Bid)
    $141 Avg Bid
    12 bids

    I'm looking for a professional in cybersecurity auditing, with a focus on web applications. Key Requirements: - Conduct a thorough cybersecurity audit specifically for our web applications. - The primary goal of this audit is to improve our existing security measures. Ideal Skills and Experience: - Extensive experience in cybersecurity auditing, particularly of web applications. - Proven track record in identifying vulnerabilities and enhancing security measures. - Strong understanding of the latest cybersecurity trends and threats. - Any relevant certifications, such as Certified Ethical Hacker (CEH) or Certified Information Systems Security Professional (CISSP), would be a definite plus.

    $499 (Avg Bid)
    $499 Avg Bid
    41 bids

    Seeking immediate assistance from a capable Cyber Security expert to address my current needs. My project revolves around two main components: 1. Network Security: I am in the pursuit of a specialized professional who understands the principles of network security and can help me gain access to a system in an ethical manner. This requires a deep understanding of network infrastructure and protocols, as well as the skills to spot and mitigate vulnerabilities. 2. Data Encryption and Secure Coding: You will need to exercise knowledge of data encryption standards and secure coding practices to ensure that the integrity of the system is maintained, while the necessary tasks are performed. Skills and Experience: - Proficient in ethical hacking - Solid experience with network security - Robust...

    $50 / hr (Avg Bid)
    $50 / hr Avg Bid
    9 bids

    I'm seeking urgent improvements for my MailEnable (v.10.48) email server. The project involves making the system both faster and more secure. Key Responsibilities: - Enhancing the system's performance for optimal speed and efficiency - Implementing security upgrades to ensure the entire system is robust and secure Task - install certificate into mailserver, - allow mail-client to use it which all protocols (POP/IMAP/SMTP), - server security (local fw) - SPF (Sender Policy Framework) - timeout of webmail access (it seems that now a session is unlimited) - customization of webmail: if the mail server is configured to answer to more than one domain, how is possible to adopt a different login page? Experience and Skills: - Proven track record in email server optimization, prefe...

    $169 (Avg Bid)
    $169 Avg Bid
    10 bids

    I am seeking an ethical hacker with in-depth knowledge and experience in hacking operating systems, databases, and networks. This task requires robust technical expertise, problem-solving abilities, and an innovative mindset to explore these systems. Key Requirements: - Profound understanding and experience in systems infrastructure - Solid experience manipulating operating systems, databases, and networks - Ability to penetrate systems with user-level access authentically and legally - Goals and Objectives: - The hack is for educational purposes only. Thus, the acquired knowledge will be used to further my understanding of the systems and will not be utilized for any unauthorized means. To the potential freelancer, your formal education or certifications in ethical hacking or a re...

    $27 / hr (Avg Bid)
    $27 / hr Avg Bid
    16 bids

    As a business entity 53 users size requirements, I am in need of a company to facilitate the implementation of a SIEM solution that may inhabit a single or multiple locations. Ideally, the candidate will have a strong understanding of: - Network Security Events Monitoring - Log Security Events Monitoring - Database Security Events Monitoring the solution will encompass User and Entity Behavior Analytics (UBA) and Security Orchestration, Automation, and Response (SOAR). Expertise in, and experience with, these areas will be highly advantageous and preferred. I am expecting assistance at each stage to ensure an effective, seamless integration into our current systems. An understanding of different SIEM solution scales is a must.

    $571 (Avg Bid)
    $571 Avg Bid
    15 bids

    I'm in a hurry to set up a dedicated hosting service for my crypto project, and I need a skilled professional to assist me. Key Requirements: - **Dedicated Hosting:** I've chosen this option for its high performance and security. - **Security Measures:** I'm aware of the importance of robust security in the cryptocurrency space. I'm open to professional recommendations on necessary security features. - **Urgent Deadline:** Time is of the essence for me. I need this project to be completed ASAP. Ideal Skills and Experience: - **Hosting Expertise:** Proven experience with setting up hosting services, particularly dedicated hosting. - **Cybersecurity Knowledge:** A good understanding of essential security measures for crypto projects. - **Efficiency:** Punctuality and th...

    $285 (Avg Bid)
    $285 Avg Bid
    9 bids

    As a business highly concerned with network security, I am seeking assistance from a knowledgeable Cyber Security consultant to fortify our network infrastructure. Skills and Experience Required: • Deep understanding of network security measures • Proficient in employing and improving Firewalls and VPNs • Familiar with Intrusion Detection Systems • Capability to assess and mitigate risk of unauthorized access and data breaches Key Responsibilities: • Analyse our existing security measures • Identify vulnerabilities and recommend enhancements • Implement improved security protocols preventing unauthorized access and data breaches • Provide continuous monitoring and regular updates.

    $43 / hr (Avg Bid)
    $43 / hr Avg Bid
    30 bids

    I'm in need of a highly skilled networking professional. The ideal candidate should be proficient in a variety of networking areas, such as design, security, and troubleshooting. Key Skills and Experience: - Proven expertise in network design, implementation, and management. - Deep understanding of network security, including firewalls, VPNs, and intrusion detection systems. - Capable of identifying and resolving complex network issues efficiently. Please note that the exact requirement and the scale of the network will be discussed further once the project is underway.

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    28 bids

    Do the following tasks as far as you can. Even if you get stuck anywhere, document the process in a way that you can present it to us afterwards. 1. Find the OWASP Juice Shop 2. Fork it to your GitHub Account 3. Run the application on your machine 4. Find the Score Board 5. Find any of the vulnerabilities and fix it directly in the app code 6. Open a pull request with this fix and a meaningful description in your repository 7. Enable dependabot updates for the frontend 8. Get a list of all PRs of your repository on the commandline

    $152 (Avg Bid)
    $152 Avg Bid
    12 bids

    I'm in need of a highly skilled networking professional. The ideal candidate should be proficient in a variety of networking areas, such as design, security, and troubleshooting. Key Skills and Experience: - Proven expertise in network design, implementation, and management. - Deep understanding of network security, including firewalls, VPNs, and intrusion detection systems. - Capable of identifying and resolving complex network issues efficiently. Please note that the exact requirement and the scale of the network will be discussed further once the project is underway.

    $136 (Avg Bid)
    $136 Avg Bid
    15 bids

    As an enterprise-grade network user, I'm seeking a professional with a minimum certification of NSE4 from Fortinet to manage tasks related to Network Security and Firewall Configuration. Given the sophistication of our network - a highly complex one with numerous systems and interconnections - your role will require extensive knowledge and experience in similar setups. Tasks will include: - Implementing network security across all systems - Configuring and managing the firewall for optimal safety I anticipate these tasks to be completed within a month's time. To ensure a successful implementation, your technical skills should be backed by experience in troubleshooting and resolving network issues. Only apply if you can handle the complexity and interdependencies of our system...

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    13 bids

    I'm in need of a professional to monitor a set of CCTV cameras that will be installed both indoors and outdoors. This role can be performed from the comfort of your own home, making it a flexible working arrangement. The installation location for these cameras is not specified to be at an office. This job requires you to professionally monitor these cameras, ensuring security and safety. Your primary responsibility will be to keep an eye on the activities captured by the cameras. This will include: - Detecting and reporting any signs of theft or suspicious behavior. - Ensuring that safety measures are being followed and compliance with regulations is maintained. It's important that you're able to manage monitoring 1-5 cameras simultaneously. Ideal skills and experience ...

    $2066 (Avg Bid)
    $2066 Avg Bid
    15 bids

    I'm seeking a professional proficient in hacking for a project aiming at thorough manipulation of a website for experimental purposes. Your primary responsibility will be altering items including, but not limited to, text content, images, metadata, as well as database entries. Key responsibilities: - Security testing to locate potential vulnerabilities - Ethical hacking and altering of designated data - Verification of data changes and appropriate saving Ideal Experience and Skills: - Extensive experience in data alteration and ethical hacking - High attention to detail with the ability to rapidly identify and resolve issues - Ability to deliver within a demanding timeline (ASAP) - Exceptional ethics and understanding of legalities pertaining to this challenge Please note that thi...

    $29 (Avg Bid)
    $29 Avg Bid
    29 bids

    I am looking for a freelancer who can help me with virus and malware removal from my WordPress website. The website is currently experiencing unexpected pop-ups or redirects, which is causing a disruption to the user experience. Skills and Experience: - Expertise in WordPress security and malware removal - Knowledge of common virus removal techniques for WordPress websites - Familiarity with plugins and customizations that may be affected by the virus removal process Requirements: - Ability to identify and remove malware from the website - Implement security measures to prevent future infections - Ensure that the customizations and plugins on the website are not affected during the virus removal process If you have experience in virus and malware removal for WordPress websites and ca...

    $276 (Avg Bid)
    $276 Avg Bid
    50 bids

    I'm seeking a skilled developer to improve the performance of my cryptocurrency platform. The current system is utilizing cloud services like AWS and Google Cloud. The immediate focus is on enhancing transaction speed, scalability, and security. Key Requirements: - Improve Transaction Speed: The current transaction speed of the platform is suboptimal. The goal is to enhance it significantly. - Scale Up: The platform is intended to accommodate a larger user base. Enhancements in scalability are required to ensure it can manage more users efficiently. - Enhance Security: Security is a top priority. The selected developer should be able to implement robust security measures to protect the platform and its users. Experience and Skills: - Proven track record in improving the performance...

    $509 (Avg Bid)
    $509 Avg Bid
    71 bids

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    $127 (Avg Bid)
    $127 Avg Bid
    20 bids

    I need an experienced cybersecurity professional to perform a penetration test on my Python system. Your primary goal is to identify any vulnerabilities that could be exploited by hackers. Key Responsibilities: - Conduct an in-depth analysis of my Python code to uncover potential flaws. - Assess all possible entry points and security measures put in place. - Provide a detailed report outlining the identified vulnerabilities and recommended fixes. - Ensure that the system meets industry standards for security. Skills and Experience: - Proven experience in conducting penetration tests, specifically on Python systems. - Extensive knowledge of cybersecurity and different attack vectors. - Ability to think creatively and anticipate potential security threats. - Excellent communication ...

    $20 (Avg Bid)
    $20 Avg Bid
    22 bids

    I'm urgently looking for a skilled professional to help me secure my website against DDoS attacks, specifically focusing on DNS amplification. work over any disk only must be now !

    $47 (Avg Bid)
    $47 Avg Bid
    49 bids

    I'm in need of a skilled professional in digital forensics to help me investigate a cybercrime. You are a digital forensic analyst, working for a law enforcement agency in the UK and have been assigned to an investigation, working in partnership with an international agency. A member of the investigation team has been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as par...

    $115 (Avg Bid)
    $115 Avg Bid
    26 bids

    I'm in need of a skilled professional in digital forensics to help me investigate a cybercrime. You are a digital forensic analyst, working for a law enforcement agency in the UK and have been assigned to an investigation, working in partnership with an international agency. A member of the investigation team has been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as par...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    17 bids

    I'm in need of a skilled individual who can set up and manage Cloud Storage on Google Cloud Platform (GCP) for the purpose of test automation. This role involves setting up and managing GCP Cloud Storage and integrating it with automated testing, particularly for integration testing and end-to-end testing. Key responsibilities include: - Configuring Cloud Storage on GCP - Developing strategies for managing test data and results within the Cloud Storage - Integrating the Cloud Storage with automation scripts for efficient and reliable testing - Ensuring data security and appropriate access controls The ideal candidate for this project would have: - Extensive experience with Google Cloud Platform services, specifically Cloud Storage - Proven track record in implementing and managing t...

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    38 bids

    I am urgently in need of assistance for my packet tracer assignment. Specifically, my challenges are centered around the VLAN setup and routing protocols. Key Responsibilities: - Building VLAN configurations. This requires a good understanding of VLAN concepts, the ability to identify and resolve VLAN issues, and the ability to configure VLANs on network devices effectively. - Implementing routing protocols. This requires knowledge of different routing protocols, how they work, and how to apply them properly in a network setting. Skill Requirements: - Strong familiarity with packet tracer - Expert knowledge in VLAN configuration and routing protocols - Excellent problem-solving skills - Ability to work under tight deadlines Please note that while it's not necessary, including an...

    $27 (Avg Bid)
    $27 Avg Bid
    17 bids

    I'm in need of an experienced network designer who can create a secure file-sharing network for my medium-sized team. Key Requirements: - The network should support sharing of various file types including documents, images, and videos. - The network will be utilized by 10-50 workers, so scalability is a critical consideration. Security: - I require advanced encryption to protect sensitive files. - Access logs should be maintained to monitor file movements and ensure accountability. Skills and Experience: - Proven experience in designing secure file-sharing networks for medium-sized teams. - In-depth knowledge of encryption protocols and security measures. - Proficiency in network scalability. - Past experience with managing access logs would be a plus. Please provide examples o...

    $474 (Avg Bid)
    $474 Avg Bid
    32 bids

    I'm in need of a thorough encryption of my entire website to protect sensitive user data, ensure secure user communication and align with industry regulations. I am open to using the necessary encryption technologies that will meet these needs such as SSL/TLS, HTTPS, IPSec, or others as recommended. Specifically, I want to encrypt: - User login credentials - Payment information - Personal user data The perfect candidate would have strong experience in various encryption technologies and a keen understanding of strict security protocols for user data. Knowledge of industry regulations regarding encryption and user data security is crucial. Please demonstrate your experience with similar past projects, highlighting your strategy to encrypt various aspects of a website.

    $149 (Avg Bid)
    $149 Avg Bid
    60 bids

    I'm seeking a skilled penetration tester with a focus on web applications. I need you to identify vulnerabilities in a white box (full knowledge) environment. Key responsibilities include: - Conducting in-depth testing on web applications to uncover potential security issues. - Providing detailed reports of vulnerabilities detected, including their potential impacts. Ideal candidates should have: - Extensive experience with penetration testing, particularly focused on web applications. - Strong knowledge of cybersecurity, network security, and ethical hacking. - Ability to work in a white box environment, using full knowledge to simulate real-world threats. Your work will be crucial to ensuring the security and integrity of our web applications.

    $339 (Avg Bid)
    $339 Avg Bid
    32 bids

    Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application’s integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses Heartble...

    $140 (Avg Bid)
    $140 Avg Bid
    8 bids

    I am searching for a technical wizard who can dive deep into my home network data. There are several aspects that I'm curious about: Developer google in my activity when it’s not me and google can’t tell me , lots of account changes * A detailed breakdown of my internet usage across different devices and applications. * An evaluation of my network security, including any weak points and areas for improvement. * An understanding of the devices connected to my network and how they're interacting. I suspect that things are being hidden or configured without my knowledge - I want to unveil any secret activities happening on my WiFi and phone. I primarily use smartphones and laptops, and I've recently noticed the presence of IFTTT and Home Assist on my network. I...

    $327 (Avg Bid)
    $327 Avg Bid
    15 bids

    I am on the lookout for a seasoned cyber security expert to fortify my network and safeguard our personal computers and mobile devices from malware and viruses threats. The specifics of this project include: - Assurance of Network Security: My primary concern lies in the protection of the network from malicious harm. I want a bulletproof network security system capable of warding off potential intruders. - Malware and Virus Mitigation: It's crucial to me that the chosen professional can proactively identify, manage and dispel malware and viruses. - Protection Across Multiple Platforms: Notably, it's not just our PC network that requires protection. Our mobile devices are also in dire need of comprehensive security measures. The ideal candidate will have a strong background ...

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    6 bids

    I'm in need of an expert in network security to focus on defending against unauthorized intrusions in my business operation. Network security is the crucial area to address and has a significant part in my project. I want a professional who can ideally: - Implement a robust network security system that fends off unauthorized intrusions - Prioritize security for our remote embedded systems Experience in dealing with remote embedded system's security, and a proven track record in successfully defending against intrusion, is highly desirable for this project. Your proposal should highlight your relevant skills and past experiences in network security. Please provide information on your approach and estimated timeline for the project.

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    5 bids

    Recommended Articles Just for You

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Learn how to find and work with a top-rated Google Chrome Developer for your project today!
    15 MIN READ
    Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.
    15 MIN READ