Computer Security Jobs
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
- Establishing secure network infrastructure
- Improving system performance and leveraging encryption
- Developing security frameworks for organizations
- Implementing authentication measures for digital identification
- Evaluating risks of cyber incident exposure
- Researching the latest security regulations for compliance
- Crafting secure policies for employee engagement
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
From 92,701 reviews, clients rate our Computer Security Consultants 4.86 out of 5 stars.Hire Computer Security Consultants
Make assignment of critical vulnerability analysis module about threat modelling exercise.
We are seeking experienced Network Engineers to join our team in Dublin, Ireland at an entry level of proficiency. Our ideal candidate will possess strong knowledge of network configuration, computer security, and troubleshooting skills. This is an onsite position and applicants from remote locations will not be considered. The candidate must have the ability to find solutions quickly, perform duties with minimum supervision, and show attention to detail when resolving issues. A technical background in installation, maintenance and support-related functions is required, as is prior experience on multiple networks. The successful applicant will demonstrate effective communication within a team environment, as well as being able to provide high-level customer service. If you believe ...
In this unit, students explore various options available to organisations to investigate problems and attacks on their computer systems. It enables students to develop knowledge of laws governing the IT domain and apply approaches to investigating cyber-crime using digital forensic techniques. A range of computer forensic frameworks will be discussed to systematically assist organisations in identifying, analysing, and reporting cyber security issues. In addition, students will study exploitation techniques and use system log files, domain authentication and registry mechanisms to acquire digital evidence. The key focus of the unit is on the identification, preservation, analysis and presentation of digital evidence related to misuse or intrusion into an enterprise-level system.
I think my computer has been compromised please check it it may have keyloggers, listeners, etc. I need a good programmer to find out if this computer is hacked.
Please Sign Up or Login to see details.
For this project I'm looking for a VERY competent consultant on Windows systems and (maybe) on ethical hacking. Standard approach is not useful! My customer has outsourced the management of his network and now there are relationship difficulties. Security client management (in my opinion) was handled very-very-very well but now my customer has no grant to do nothing. The customer client is Windows 10 Enterprise 21H2 - Experience Pack 120.2212 Actual landscape: - His windows user is not local machine Administrator. - The local disk is encrypted via BitLocker (booting from the outside therefore does not allow reading the data) - BIOS has a password, not known by my customer. - You cannot install unauthorized applications, not inserted into "Software Center". - If you try to ...
We are seeking a skilled and experienced security engineer with expertise in CIS Benchmark Level 1 for our ongoing projects. As a security engineer, you will be responsible for ensuring the security of our systems, networks, and infrastructure. Responsibilities: -Develop and implement security protocols and procedures -Conduct security audits and vulnerability assessments -Monitor network traffic for unusual activity and security breaches -Maintain up-to-date knowledge of security threats and trends -Collaborate with other team members to identify and address security concerns Requirements: -At least 3 years of experience in security engineering -Expertise in CIS Benchmark Level 1 -Strong knowledge of security protocols, encryption technologies, and network security -Excellent analytical...
I have few more queries regarding my task would help me In this assignment, you will use Java Cryptographic Architecture (JCA) to create a useful application requiring the following functions: 1) Public Key Generation 2) Symmetric Key Encryption (Use appropriate encryption modes) 3) Cryptographic Hashes 4) Digital Signatures 5) Base64 Encoding More information on Java Cryptography Architecture (JCA) is here: Submit the following: 1) A brief write up about the application (upto 3 pages). What does the application do? How is it unique? How is it useful? How did you integrate symmetric cryptography, asymmetric key cryptography, hashing, and digital signatures into the application. 2) Your .java code
For this project I'm looking for a VERY competent consultant on Windows systems and (maybe) on ethical hacking. Standard approach is not useful! My customer has outsourced the management of his network and now there are relationship difficulties. Security client management (in my opinion) was handled very-very-very well but now my customer has no grant to do nothing. The customer client is Windows 10 Enterprise 21H2 - Experience Pack 120.2212 Actual landscape: - His windows user is not local machine Administrator. - The local disk is encrypted via BitLocker (booting from the outside therefore does not allow reading the data) - BIOS has a password, not known by my customer. - no boot his laptop via USB - You cannot install unauthorized applications, not inserted into "Software C...
Please find the attached document below. You need to have network security knowledge to complete this report. If you think you can do it, let me know your price and the time you need. My budget is low. I'm preferably looking for a single person to complete this report urgently. Do not hesitate to contact me for more info.
I'm looking for someone to help me setup up two of the same MUNBYN model printers. I need to connect them both to the same computer and I don't need any assistance with any other peripheral devices (scanners, etc.). I'm looking for someone who is experienced with setting up printers, configuring networks, and troubleshooting printer issues. If you have the necessary printing capabilities and the expertise to help me out, please let me know. Thanks!
WAN CONNECTION THROUGH STATIC IP & port forwarding
Linux VAPT within network . Educational purpose and understanding
I would like to contact a freelancer who has good knowledge and experience on Security topics. I would like you to test our website for security vulnerabilities.
I need help removing a duplicate Instagram account that makes bad my image by posting bad stuff using my name and photos. I don't know why someone doing this. But I need to shut down that bad account immediately. I have reported from my original account more than 20 timers but does not work. That is why I need a security guy to remove the account. Thanks
We are looking for someone to help us create a feature that can prevent any kind of screenshots or recordings being taken in our Flutter application. To do this, we require the utmost security and protection so that the data in our app remains secure and confidential for our users. The feature should be able to integrate with flutter application and support in ios and android mobile application.
I need a pall alto security expert I need just a freelancer whom can get a look at a document and tell me what is missing for the paleo alto security rules and what need to be added in two sites
I need someone with experiance that can set up on my mikrotik QOS for traffic priority. So i need to mark my traffic and set first priority to 1 specific IP adress and everything alse comes behind. Some QOS with DSCP. If you think you can do this contact me. DONT CONTACT ME IF YOU WILL LIMIT MY INTERNET TRAFFIC AND JUST USE LET SOME FREE SPACE FOR THIS SPECIFIC IP !!
Design and develop a mobile app or desktop application with a ppt and a working tutorial video for the detection and prevention of Fileless Malware (a type of malicious software that uses legitimate programs to infect a computer).
Looking to test a set of endpoints where you will be provided with endpoints, temporary credentials and request data structure inside a postman collection. Testing direction (in terms of priority): 1. Load 2. Stress 3. Performance 4. Security (tbd)
We are seeking an experienced software developer and web developer to create a comprehensive computer cleaner or antivirus software for Windows operating systems, inspired by the functionality and user experience offered by or www.advancedpccleanup.com. The software should be user-friendly, efficient, and reliable, providing users with a single solution to optimize, maintain, and protect their computers. In addition, we require a professional and responsive website to showcase and distribute the software to users. Key Features: System optimization: The software should analyze and optimize various aspects of the system, such as registry cleaning, system startup, and background processes. It should provide options for safe and automatic cleanup or allow users to review and choose whic...
i need bulid system to behivor detection of malware analysis using deeplearnig Designing a dynamic analysis system for malware detection: Create a system that uses AI to analyze malware behavior
Hi, I am looking to develop Remote Monitoring and Management Software, which should capable of monitoring all major OS including android etc. Also, patch management, security alerts, device control, network policy management etc.... Please reply to me if you have done any project similar to this only.
I would like to contact a freelancer who has good knowledge and experience on Security topics, to organize an on-line session on 3/4 hours (even if not continuous) preferably on Windows operating system and with portable tools... or.... VM, about: - Anonymity - Learn how to intercept data in networks - Network Scanning - Sniffing - Session Hijacking - Denial Of Service Attack - Monitor transmitted data - Detect intrusions - See whats going on in your network - ...... real examples
Do not want a basic PID and VID change, after a full spoof a DMA device, Something that will flag windows to want to do an update to that device
I require an expert with immediately availability for a case review. Estimated time is 3 Hours. The goal of this project is to complete a case project review report. Knowledge required is : 1. Computer security and Malware Analysis 2. Network Security, Dos Attack and botnets, firewalls defence and intrusion detection system system security, Windows, Linux, Android and containerisation , RSA , private and public key protocols and others, key management, 5. blockchain protocols 6. security models
Utilising Deep Learning Techniques for Effective Attack Detection (Experiments part)
Interested in a quote to monitor/back door a brand new MacBook; potentially the following. Email security Many other possible requests
find for me the email and mobile number linked to my instagram account The Username is = Zrg_naq
Trying to connect gaming console via ethernet cable, but running into problems. Also cannot connect to router IP: err_connection_refused. Just looking to maximize speed and reduce ping for online gaming.
we would like to comply to have a NIST certificate
The process for IAM sanitization includes the following steps: 1. Identify all users and their roles in your AWS environment. 2. Remove any unused users and roles. 3. Re-assign roles to ensure that users have the least privilege possible. 4. Monitor user activity to detect any suspicious activity. 5. Establish an audit process to ensure compliance with security policies. 6. Regularly review and update user privileges and access. 7. Keep track of all changes made to your IAM environment. 8. Implement multi-factor authentication for all users.
We have 12 ‘Magic’ SVI security cameras around the shopping center. Some are not functioning. We need them repaired or possible the entire system replaced with an NVR and ip camera system. The location is Anahrim, Ca
Hello I need someone with expertise in Network Simulation who can create a small simulation for me of any router in Kathara or any other open source software. Do not copy paste cover letters
Job Title: Cohesity Storage Administrator (Person from United Kingdom will be preffered) Duration 3-6 months – Possibly longer(Onsite job) Contract type full time freelance Job Summary: We are seeking a highly skilled and experienced Cohesity Storage Administrator with expertise in managing storage systems and domains, as well as experience with Office 365 and a broad range of IT technologies. The successful candidate will be responsible for managing and maintaining our Cohesity storage environment, ensuring it is highly available, reliable, and performing optimally. This role requires someone with strong communication skills and the ability to work effectively with both technical and non-technical stakeholders. Key Responsibilities: • Manage and maintain o...
We (freelancer.com) have an exciting opportunity for an experienced Laptop service engineer to join our team and be part of this amazing project during an amazing growth period. Want to work for one of the world's biggest technology companies? ++++++++++++++++++++++Are you located Rio Rancho, USA? ++++++++++++++++++++++ If you thrive on taking a customer centric based approach and have break/fix/repair skills for notebooks/laptops and printers, then we want to hear from you We are looking for Hardware Repair candidates in Delhi! Duties and Responsibilities Replace/Repair - System board , Display assembly, Webcam , Speaker, Fan, Bezel, Heatsink ,Touchpad , Specific Keyboard ,HDD ,Top cover, Controller board ,PCB,I/O board. Some responsibilities may include but are ...
We (freelancer.com) have an exciting opportunity for an experienced Laptop service engineer to join our team and be part of this amazing project during an amazing growth period. Want to work for one of the world's biggest technology companies? ++++++++++++++++++++++Are you located Reading, USA? ++++++++++++++++++++++ If you thrive on taking a customer centric based approach and have break/fix/repair skills for notebooks/laptops and printers, then we want to hear from you We are looking for Hardware Repair candidates in Delhi! Duties and Responsibilities Replace/Repair - System board , Display assembly, Webcam , Speaker, Fan, Bezel, Heatsink ,Touchpad , Specific Keyboard ,HDD ,Top cover, Controller board ,PCB,I/O board. Some responsibilities may include but are no...
We (freelancer.com) have an exciting opportunity for an experienced Laptop service engineer to join our team and be part of this amazing project during an amazing growth period. Want to work for one of the world's biggest technology companies? ++++++++++++++++++++++Are you located Nashville, USA? ++++++++++++++++++++++ If you thrive on taking a customer centric based approach and have break/fix/repair skills for notebooks/laptops and printers, then we want to hear from you We are looking for Hardware Repair candidates in Delhi! Duties and Responsibilities Replace/Repair - System board , Display assembly, Webcam , Speaker, Fan, Bezel, Heatsink ,Touchpad , Specific Keyboard ,HDD ,Top cover, Controller board ,PCB,I/O board. Some responsibilities may include but are ...
Endian no deja actualizar modulos y firmas de eset antivirus