Cyber coders jobs
Hello, this is my website: how can i stop being cyber squatting?
Actoprecon abbreviates Active Operation Recon, which is a platform for website penetration testers (white hat hackers) and bug bounty hunters that find vulnerabilities on websites ethically to help companies protect their websites and infrastructure from the bad guys. We provide a platform where our clients can scan their client's websites t...our start-up, it needs to be clean, descriptive and user friendly. I will also be asking to have a look at some of your previous designs, so we can determine if you are suitable for this role. Our budget is strictly no more than $30AUD unless you display exceptional work, upon completion we will give you the opportunity for us to recommended you to other people. I hope you consider helping our cyber security startup, looking forward to wo...
Hi GOAT CODERS PVT. LTD., I noticed your profile and would like to offer you my project. We can discuss any details over chat. are you available on Monday?
I need someone to help my post Latest News snippets available online. Work would involve to pick the top news in Cyber security domain and create news of around 150-250 words/5 Posts per week on our WordPress website. Please share your past work in the chat if you are interested so that it will help to further discuss about the project.
Looking for native English speaking technical writer who can create good and verbose technical documents, understanding of cyber security is must, should be able to take a minimum brief and then research and expand into verbose technical document.
We have a large amount of cyber security related information in a variety of locations, we would like to create reports based on this information to show risks, responses, remediations, and the users and systems effected.
I am looking for a content writer to produce content for blogs and social networks for a software company. We can start with 5 to 20 copies and add more later on. Topics to research and write are: - Retail - Artificial Intelligence - Cyber Security - Project Management I can share more details after hiring.
Hello, I have 2 tables.I will provide you table attributes and some sample data. I would like someone to create 2-3 different ways to do the following: For all employees in the Person table where employee is non exempt (IS_REMOVED = FALSE from LM_PER_TRANSCRIPTS_F_V table) get the most recent completition date for the following LOTITLE: LOTITLE LIKE "Cyber Shield" LOTITLE LIKE "Phishing" LOTITLE LIKE "Foresight" and if most recent completition date is null then mark as NA
Hello fellow coders, I need a simple trailing stop added to my NT8 (NinjaTrader) strategy. The concept is simple: when in profit of X points, the trailing stop start: move the stoploss +Y points and repeat it each X points move each X points, the stoploss move favourable of its current level +Y points Should work for long and short orders. The code will be attached upon discussion. Thanks.
Expert in Tehcnical writer for an urgent task
I am looking for an experienced coder on the above job description, able to code simple strategies to run on auto mode on IB Brokers TWS platform AND developing back testing, walk forward/ periodic optimization. This is a straightforward, small project. Will take short time/few hours for someone well versed in Futures Mar...above job description, able to code simple strategies to run on auto mode on IB Brokers TWS platform AND developing back testing, walk forward/ periodic optimization. This is a straightforward, small project. Will take short time/few hours for someone well versed in Futures Markets and the use of IBKR platform. Pls DO NOT apply if you don't have any previous experience on the above. Only coders ready to start immediately and offer solutions in less ...
Need a presentation ppt on the topic of cyber security. *It should be within 8-13 slides. *Easily understandable *Attractive presentation design *not copied from google/youtube
A telegram bot is to be created for verification systems in telegram group. I need coders that are fast and experienced to work on my project. You should be familiar with databases and telegram bot functions.
A telegram bot is to be created for verification systems in telegram group. I need coders that are fast and experienced to work on my project. You should be familiar with databases and telegram bot functions.
Currently a cyber security major and want to build a Crypter for runtime, need to develop it in C languages and good clean and easy to use GUI please text me if you can do this!
Hi we will add a couple updates to my EA. I will pay hourly for this work. I do a lot of ongoing projects and I am always looking for quality coders. Thanks!
Hi Cyber Afinity., I noticed your profile and would like to offer you my project. We can discuss any details over chat.
Using the tool Elastic Dump after importing data and following the steps which will be given upon signing a contract. Further steps would be analysing and identifying cyber attacks using cyber kill chain and MITRE attack.
We need to create a minting contract for the nfts attached. There are 2465 and they need to be deployed on the Fantom Chain. There are different rarities as outlined here: We need a button added on the front page of and then an additional minting page which has a button to mint, the price, some basic info about the nfts, and highlights the 5 rarest nft's
It should be a 6 slide (excluding one cover slide) MS PowerPoint presentation. Case: Analyze the Cyber Security market in US Government space: Cover the following 1. Spend Trend by the government in cyber security space 2. Competitive analysis of top 3 competitors 3. Major Programs run by government
Hi coders, Please read below and view the screenshot before bidding. This program will run at all times, and starts running when the computer boots. Stays active in the system tray. It will send and retrieve data from an MYSQL database. The program edits batch files based on the database fields. It will then run the batch file and display the Command Prompt output in a new window. There is the option to set a time to have the batch files run and ended at certain hours. Setup packaging is also needed to install and set up software on Windows machines. Can set timers to run and stop batch files. What's needed: Edits batch file and updates text based on database fields ability to set schedule for batch file exectution Runs batch file and embeds cmd output in a window Pa...
Hi Cyber Afinity., I noticed your profile and would like to offer you my project. We can discuss any details over chat.
I want one good Cyber security project with in the topics of operating system security, hypervisors, Keylogger Systems, SQL injection virtualization security, storage security, hardware security modules, crypto processors, cloud and IoT security My Budget is $100-$150. We shall discuss it .
Szukamy developerów do naszego teamu White Label Coders to grupa inżynierów, specjalistów IT, projektantów i kierowników projektów doÅ›wiadczonych w projektowaniu i tworzeniu zaawansowanych aplikacji internetowych. Realizujemy projekty dla klientów z firmami z USA, Kanady, Wielkiej Brytanii, Holandii, Australii, Singapuru, czy Polski. Obecnie rozwijamy dwa zespoÅ‚y. Jeden z nich bÄ™dzie tworzyć rozwiÄ…zania informatyczne we wspóÅ‚pracy z partnerem z Singapuru, drugi dla partnera z UK. Nasz ZespóÅ‚ obecnie jest jednym z najprężniej rozwijajÄ…cych siÄ™ w Polsce. Dążymy, aby byÅ‚ topowy. ZresztÄ… widniejemy na 23 miejscu w Clutch 100 co moim zdaniem mówi samo za siebie.
I have list of data which need to fetch live with the help of API. Python coders will be given first preference. My budjet is 10$ to 50$.
The websites purpose is to serve as a resource for my cyber sec study. It is meant to be an Instagram copy, that is already written and stylized and will serve as a practice ground for my Phising module showcase. - The website is not live. - The website will not be used in any illegal activities. Task: - Make the website responsive for mobile devices.
Looking for a talented pixel artist with great experience in designing and drawing cyberpunk style arts for website. Need a creative artist with rich experience in cyberpunk field. Can be long-term cooperation. Please add cyber to the first line of your proposal for checking if you read carefully. Thanks.
I have installed centos7 on hardware and configured static IP Now This will be my requirement 1. Custom Nameserver + Custome Hostname 2. When we add a nameserver on the domain and create an account on the cyber panel then it should auto-setup the mail setting 3. Migration of 1 WordPress website + Help us if other migrations face any issue 4. PHP versions should be available from 5.6 to the latest on the cyber panel 5. Free SSL Certificate Installation 6. 1 Click WordPress Installation config 7. Email configuration including PTR 8. Custom Server Root Login URL + SSL installed on it
...implementations that could be used to provide protection against a tangible threat in the domain of cybersecurity. Describe a use-case scenario where your implementation is usable; it should provide a step-by-step implementation and usage guide. Choose from the following: 1. Wireless Security. In this topic, you will have to implement a defensive mechanism that will be applied on wireless infrastructure. 2. Cloud Security. Implement a defensive mechanism for an open-source cloud solution, such as Devstack ( ). 3. Information Security. Take the necessary measures in protecting information by using a combination of physical and electronic/cyber tools, ensuring authorized access and GDPR policies. 4. Resource Provisioning . This topic evaluates
Hello, I would need the assistance of a skilled cyber expert to help me in resolving a current issue. Looking forward to your reply
Hi GOAT CODERS PVT. LTD., I noticed your profile and would like to offer you my project. We can discuss any details over chat.
I need someone to do a review and update specs for a project requiring NIST 800 must have experience working with the government familiar with NIST 800 and other government requirements. Deliverables. Updated Specs Guidelines to bidders on equipment requirements to meet cyber security requirements. Answer questions at 90% comments and 100% comments. May be required to attend 2 meetings. Via teams. Must be a US Citizen
Hello everyone, We are a cyber security and intelligence company. We want to hire a content developer and want to work with him/her continuously. We have some expectations from candidates and you can find them below. - Every month we will create 16 different blog posts ( 4 content per week ) - All blog posts should be SEO compatible - All blog posts should have min 1000 keywords - All blog posts should have a table of content - All blog posts should have a minimum 2 illustrations or compatible image - Every month we will discuss the topics and agree on it If we find the best person, we can work together full time in our company. Some example topics are below: Top 5 Black Markets in Dark web Top 5 TOR Browsers What is Malware as a Service? What is Ransomware as a Service? Last ...
I have a blog that I want to use to highlight a few of my whitepapers and misc cyber security content. I want to add some organization and a good visual framework as I add additional whitepapers and videos. Ill leave it up to you general creativity. My only requirements are: -Easy posting of whitepapers and they automatically appear in navigation bars. (using tags or whatever other strategy you decide) -multilevel navigation bar Logo is already created so, you don't need to worry about that.
...essentially entails rewriting, rephrasing and recreating existing articles based on the structure and guidelines provided by us. 2) The topics, niches & nature of the content you create will never be the same, you could be writing on the '10 Best Gifts For Potterheads' for Buzzfeed in the morning, with a casual narrative and style, while ending the day with 'IIOT For CNC Machines - Dealing With Cyber-Security Threats' for AmericanMachinist. 3) You will be provided with a topic, along with instructions regarding the tone, style, and the overall structure, comprised of various subheaders and subsections. 4) We will also be providing you with resources from where you will be required to analyze relevant information, before reproducing them in your own wo...
Need a Professional who can make a copy of the course using the exiting course outline, overview, objectives, material and give a new update with new graphic, background theme and something creative which is suitable to the logo, add subtitles in English with the lady voice. List of Courses 1. Business Accounting and Taxation 2. Software Testing and Automation 3. Cyber Security 4. Machine Learning 5. Product Management 6. Data Analyst 7. Advance Flutter 8. Advance React Native 9. Ethical Hacking Also, if you have any suggestion/doubt regarding the course please let me know and will discuss it with you.
Hi CYBER TEKI, I noticed your profile and would like to offer you my project. We can discuss any details over chat.
I need a complete website. With 2-3 pages. Employ ReactJs, Bootstrap and NodeJs. Responsiveness and clean code should be a priority. It is all about an online cyber where a client can place an order and I will have a group of employees say 5 who will have the order done and returned to the clients.
We are an IT solution company. I need someone who helps us to get projects and manage the clients. We are currently providing these services. Mobile Apps Development: - -> iOS APPS...eCommerce. -> CMS (CONTENT MANAGEMENT SYSTEM). -> API & BACKEND. -> CUSTOM DEVELOPMENT. Software Development: - ->CUSTOMIZED SOFTWARE DEVELOPMENT. Graphics and Designing: - -> LOGO & BRANDING. -> WIREFRAME. -> UI/UX DESIGN. Digital Marketing: - -> SEARCH ENGINE OPTIMIZATION. -> EMAIL MARKETING. -> CONTENT & BLOG WRITING. -> SOCIAL MEDIA OPTIMIZATION. ->SOCIAL MEDIA PAGE HANDLING. Penetration Testing & Cyber Security: - -> VULNERABILITY ASSESMENT & PENETRATION TESTING. -> NETWORK PENETRATION TESTING. -> MOBILE APPLICATION PENETRATION TE...
We are looking for coders who can do iOS and Android apps plus web
Hi CYBER TEKI, I noticed your profile and would like to offer you my project. We can discuss any details over chat.
Submit the screenshots/samples of your past work. I have a blog as part of this requirement, you are required to set up the best theme. Which blog platform do you recommend me to have (WordPress/Ghost/etc). I already have access to a WordPress host where the blog can be published immediately. Note: 1) Blog is about Technology and Cyber Security etc, Show me the most attractive and creative blog theme. 2) Blog platform should have secure coding practices to avoid any compromise/breach.
Hello We are looking for someone who is team player and can install script into my client domains. we would like the following installed We want it install with Cyberpanel VPS, WE DONT USE CPANEL, we use Cyber Panel
Hi I require your services for an security job test I'm having next week (Thursday April 21, 2022 - 6-9pm Eastern time zone) for a pro it should take 45 minutes to 1:30 hrs. Is this something you are interested in. The job test is an introduction to - Information System Security. The job test has multiple choice questions and a few written answers. We can work here or through whats app, and I will send you the snapshots of the questions. Please let me know. Thank you
Customed DayZ server, primarily focused on fast-paced, hard core PVP & raiding. Looking to hire modders, coders to assist in the ground floor build up of the server. Also looking to hire GFX artists on a continuing commission basis.
Look for cyber security SME to answer questions about startup business for cyber security You must have knowledge about the following : -red team operations -blue team operations -reports -general business -minimum requirement of cyber security company - an overview of providing a service to XYZ company from A to Z -what reports to provide for a client
Hi CYBER TEKI, I noticed your profile and would like to set up a session of 1 hour zoom meeting where we could discuss some of the questions I have regarding ransomware and cloud security. I've done many researches about them and I need a specific IT specialist perspective therefore I wanted to contact you. Would you be comfortable If I share a document of questions I will ask you?