Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Contratar a Computer Security Consultants
Estoy con la necesidad de alguien con experiencia en Cybersecurity para implementación completa de Wazuh El mimso es un analizador de comportamiento open source. Link + documentacion Proyecto en horas y continuidad a futuro para Mejoras
• My PhD research is scientific research in the information and computer security field. • it focused on cybersecurity of control systems of the operation technology field. • The model is trying to solve the problem of insiders of the Industrial control system network. It is focused mainly on detecting unauthorized changes in the monitored file content of the operator and engineering workstation. • files content could be changed by a trusted employee or trusted contractor, or neglected operator. It could be done also by any malicious action. This change could be intentionally or unintentionally. This change could be with malicious intent or without. but in the end, this change could have unwanted consequences. I also built a tool by using python language, which simu...
i have big unifi network. unifi dreammachine pro, switches, ap's. network with approx. 100clients. there are some problems, speed, internet speed, lagging. please check my network and fix it. need specialist!
We are new IT Services company who are looking for a Technical Services Partner. We are looking for a wholesale IT provider who can provide remote IT technical support for the following products and services: The provider must be able to provision, onboard, manage and support Microsoft and Google products along with the technology services below: Cloud Services - Public Cloud - Data Backup - Disaster Recovery Integrated Communications - Soft Telephony systems - MS Teams PBX - Ring Central End User Computing - Device Management - Mobility Solutions - IT Procurement Website Creation and Applications - Website design - Application Maintenance & Support - Software Selection Productivity and Collaboration - Microsoft 365 - Google Workspace - Connectivity (networks) IT Support - IT Suppor...
We are a cyber security agency and looking for 3 ethical hackers who have experience in cyber security, malware detection, IP tracking, phone number tracking, email tracking, and so on. Note: we are looking for a long-term partner not only a one-time project, if you are looking for a regular job this is for you. Please read the requirements before bidding thanks
I need a Cisco Engineer to help redesign my network with the best in class Cisco technology I have an existing network diagram for a company with about 100 end users - its pretty simple. I want to improve it to the best cutting edge technology that is powerfu and secure. I would like your recommendation and a simple network diagram
This project must build as a separate software or plugin for any existing IDEs. This project should be able to detect the source code vulnerabilities at the coding level. Project should be developed using machine learning techniques. I have a proposed methodology in the attached files, or feel free to come up with better solutions we will discuss and conclude the methodology. Project has two main phases. 1. Vulnerable code segment detection and 2. Correct the detected vulnerable code segments / suggest the corrected code. 1. Vulnerable code segment detection These vulnerable code segments should be related to the information security. For example, code segments which helps to make Cross site scripting attacks, Buffer overflows, SQL Injection etc. I have found an existing data set from thi...
Looking for a sailpoint expert for coding work. This is a long term work which is kind of a part-time. Pay is monthly and negotiable. (Please don't bid if you don't have experience with it, it's not gonna work.)
I need assistance in someone creating an IP address and associating a profile/person with it and then being able to add this information to a PowerPoint presentation and also a large phone scan report (170k pages).
I need a PhD proposal that makes Three contributions.. Should be network security and in this case-MANETS… it could be to improve its security,reliability,etc. I also need someone who is good in simulations and more so MATLAB. We will walk a journey together to the very end
I need an OSCP certified who can help me to prepare for the Offensive Security Certified Professional (OSCP).
I need a smart contract auditor with experience on this field. He'll join the team of a top cybersecurity firm. RUST LENGUAGE REQUIRED. You can work on others project, we'll only contract you as a freelancer when audits needed but you'll be in the team only. Various audits done with us could lead to a full employment contract. We need an audit URGENTLY. If you send me a copy & paste experience description you'll not be hired.
I'm gonna create a honeypot for cars. There will be a couple of honeypots for preventing DDOS attacks, An wireless AP and a few more internal networks in a vehicle. The thing is to create a simulation of a network like in a vehicle. Also, if it possible, i need the before and after effects of honeypots. It could be done NS3 or GNS3 I need a simple simulation for a in-vehicle network and an attack simulation results as a reference to how attacks affect the car's internal network. simple simulation followed by an attack simulation for DDoS, replay attacks and some malware-based attack results? you could use any topology. but it should be formed like a in-vehicle network.
The overall objective is to appoint a consultant to perform a full security risk assessment and make appropriate recommendations and to write a report to enhance the currents security systems and policies in accordingly.
We are looking to hire an IT support for our open IT Technical Support based in Jakarta. Your job will be to provide technical support to maintain the organization’s computer systems, both hardware and software and other peripheral equipment to ensure optimal performance so that end users can maintain a high level of productivity. IT Technical Support duties and responsibilities: • Provide technical assistance with computer hardware and software • Resolve issues for staff via phone, in person, or electronically • Perform hardware and software installations, configurations and updates as needed • Resolve technical issues in a timely manner using available resources within the company • Familiar with Active Directory and IT ticketing tools IT Technical Suppo...
LAPTOP REPAIR TECHNICIANS NEEDED! Are you great at repairing PC's and laptops? Want to work for one of the world's biggest technology companies? Are you located in or close to (PUT IN LOCAL AREA HERE)? If you thrive on taking a customer centric based approach and have experience with hardware repairs for notebooks/laptops and printers, then we want to hear from you! A tech giant through Freelancer.com - the world's largest freelancing marketplace - is looking for Field Hardware Engineer candidates! Some responsibilities may include but are not limited to: Perform preventative maintenance and repair services on equipment by analysing system problems, troubleshooting, ordering and gathering components and parts, completing installation and performing tests Replace...