Seguridad en Internet Jobs

Internet security involve training and/or experience in the design, assessment and configuration of measures to protect both IT systems exposed to the Internet as well as the consumers of those systems. The field of internet security is highly volatile as new threats and measures develop on a daily basis, necessitating anyone tasked with it to constantly keep their skill up to date to remain effective.

This is a skill carrying high responsibility, as data compromises of either company data or personal data can incur significant reputational or financial damage. Given these risks, this skill is mandatory for any organization with an Internet presence to secure, either through their own recruitment or vetting of their suppliers.

Contratar a Internet Security Experts

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    16 trabajados encontrados, precios en USD

    I am preparing documentation of some work. I need a person having web security, ethical hacking knowledge and experienced knowledge to check my documentation, suggest proper changes, can suggest new innovative things...etc. Min Checking Cost Per Chapter - 600/- Rs Max Checking Cost Per Chapter - 1000/- Rs (Indian Rupees) (Maximum 7 Chapters are there) Note - No emergency, No such time limit. Bu...

    $93 (Avg Bid)
    $93 Oferta Promedio
    3 ofertas
    Hacking service 6 días left

    For website security.. Which i need some one to do

    $16 / hr (Avg Bid)
    $16 / hr Oferta Promedio
    7 ofertas

    I need to Implement project using NS2 Simulation, the project is ready on paper, after that i will modify it. if someone professional with NS2. please support The project about MANET.

    $92 (Avg Bid)
    $92 Oferta Promedio
    2 ofertas

    need a long term developer how is familiar with python coding, I want someone to train me on python and teach me from basics. I am planning to have a full course and complete it in at least 5-6 full weeks. ( I prefer classes on Monday / Tuesday / Wednesday / Friday ).

    $8 / hr (Avg Bid)
    $8 / hr Oferta Promedio
    15 ofertas

    I need to look back on my search history over a specific period, but have deleted the history, and the activity log from my Google account. I'm hoping there will be another way to recover this search history. I'm also looking to improve the overall security of my laptop as I have concerns that I have been hacked.

    $215 (Avg Bid)
    $215 Oferta Promedio
    14 ofertas

    Ok for this project you’ve been given several codes that you need to try and decode. You’ll need to research some of the most common encoding schemes used to try and break each of the codes. An experienced security expert can spot most encoding schemes very quickly, the trick is to check the character set used in the encoded message and the length of the encoded message, these will poi...

    $25 (Avg Bid)
    $25 Oferta Promedio
    3 ofertas

    We need to simulate sinkhole or sybil attack using cooja simulator in RPL. Thus, we need to modify the source code of objective function that handles rank calculation. All this must be done in contiki OS 2.7

    $250 (Avg Bid)
    $250 Oferta Promedio
    1 ofertas
    Wireshark Expert 4 días left
    VERIFICADO

    I need an expert to help me with wireshark case.

    $30 (Avg Bid)
    $30 Oferta Promedio
    15 ofertas

    Protecting my website from crawler and scraper (30$). Hello! Thank you for having interest in this topic. As you know, Crawling and scraping have been always generalized. Even if you don't have very deep knowledge about it, you can make your own crawling tool just following a few steps in a tutorial that you could easily see in online. But still, there seem to be a way have a shield, cont...

    $78 (Avg Bid)
    $78 Oferta Promedio
    8 ofertas

    Show me my network and device vulnerabilities.

    $165 (Avg Bid)
    $165 Oferta Promedio
    23 ofertas
    Suspicious user identification 2 días left
    VERIFICADO

    There is requirement to identify suspicious users from web server log file. Definition of suspicious users - Suspicious users are the users other than attack users. They are suspicious because they don't have any particular aim to visit a web application. They neither do hacking activities. But they even not normal users. They do other than normal activities without any purpose. For example,...

    $143 (Avg Bid)
    $143 Oferta Promedio
    12 ofertas

    My server hosted on a2hosting's database is being constantly dropped by someone or a script. Need someone to look into this for me and find out whats causing it, whether its SQL injection or something else.

    $138 (Avg Bid)
    $138 Oferta Promedio
    27 ofertas

    Looking for someone who can teach me penetration testing and other topic of cyber security.

    $13 / hr (Avg Bid)
    $13 / hr Oferta Promedio
    27 ofertas

    I am using cloud flares and aws. My original ip is under attack. I changed ip several times using "private IP" provided by aws, but I was attacked. So I will only allow cloudflare ip on aws. want to set all security for IP impressions. I am looking for a professional to set this up. looking for professionals who can provide detailed manuals in steps.

    $357 (Avg Bid)
    $357 Oferta Promedio
    19 ofertas

    Need Ethical hacker with knowledge in Blockchain and Crypto from Chennai, India who can work at the office space provided by us at flexible timing.

    $471 (Avg Bid)
    $471 Oferta Promedio
    5 ofertas

    PLEASE APPLY ONLY IF YOU ARE QUALIFIED - THIS JOB IS FOR GENIUS ONLY I want to test the level of security for my website. I need you to hack my own website and check if you can steal my own email database. If you manage to do this, help me find secure the website. The job interview will be done in skype video call only.

    $14694 (Avg Bid)
    $14694 Oferta Promedio
    23 ofertas