Internet Security Jobs

Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

From 58,486 reviews, clients rate our Internet Security Experts 4.9 out of 5 stars.
Hire Internet Security Experts

Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

From 58,486 reviews, clients rate our Internet Security Experts 4.9 out of 5 stars.
Hire Internet Security Experts

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    19 jobs found

    Job Title: Cyber Security Engineer (Checkpoint Firewall & Akamai WAF) Duration: 2 Hours per Day Budget: ₹30,000 per Month Start Date: Immediate About the Role We are looking for a skilled Cyber Security Engineer with expertise in Checkpoint Firewall and Akamai WAF to support our network security infrastructure. The ideal candidate will be responsible for managing firewall configurations, monitoring network security policies, and assisting in the implementation of web application firewall protections to safeguard enterprise systems. Key Responsibilities Configure, manage, and optimize Checkpoint Firewall environments (policy management, rule configuration, and troubleshooting). Implement and maintain Akamai Web Application Firewall (WAF) rules to protect web applications from security t...

    $6 Average bid
    $6 Avg Bid
    1 bids

    Yesterday I noticed that every message and folder in my Hotmail account had vanished after an unauthorized login. I have since taken back control of the mailbox and switched on two-factor authentication, but Microsoft support told me they are unable to restore the data. I still need those emails. I’m after someone who knows the ins and outs of / Microsoft 365 back-end recovery, server-side retention, and forensic mail restoration. If you can locate and reinstate the deleted items—whether through the Recoverable Items folder, legacy PST pulls, or other Microsoft recovery channels—and then harden the account so this can’t happen again, please let me know your approach and an estimated timeline. Acceptance criteria • All recoverable emails and folders resto...

    $127 Average bid
    $127 Avg Bid
    3 bids

    Project Title: Web Security Audit & Penetration Testing for Marketplace Website Description: We are preparing to launch a new online marketplace platform and are looking for an experienced web security specialist to perform a full security review of the site. The goal is to identify any vulnerabilities and ensure the platform is secure before public launch. Scope of work: • Perform a full security audit of the web application • Conduct penetration testing to identify vulnerabilities • Review authentication, API security, and database access • Check for common vulnerabilities (OWASP Top 10) • Identify potential risks in front-end and back-end architecture • Provide a clear report outlining vulnerabilities and recommended fixes Important: • You must hav...

    $526 Average bid
    $526 Avg Bid
    159 bids

    My WordPress site has started redirecting visitors to unknown domains. I have a recent, clean backup in place, so your first step will be a thorough malware scan, followed by complete removal of any malicious code or injected files. Once the cleanup is verified, restore the site from my backup, harden its security, and confirm that every page loads safely with no further redirects. Please show examples of past malware-removal work you’ve handled on WordPress so I can see the depth of your experience. I’m particularly interested in the tools or methods you rely on—whether that’s Wordfence, Sucuri, Imunify, SSH-based searches, or custom scripts—so I know exactly how you’ll protect the site going forward. Deliverables • Comprehensive malware scan rep...

    $23 Average bid
    $23 Avg Bid
    72 bids

    Scenario Background: The scenario assumes that you are working as a security expert for a fictional company, Acme Coffee Company. The company includes several roles, including Bruno (CEO), Spike (Vice President of Sales), Eilik and Eilika (Sales), Loki (System Administrator), and Avery (Marketing). Loki has built a new company server, and Bruno has hired you to conduct a comprehensive security analysis and assessment of that server and submit a complete report. The final report should include your findings, techniques, graphics, and methodology, along with recommendations for improving any security issues identified. Video Overview: The instructor explains that the final project will provide a target machine personally built by the instructor to represent the Acme company environment. Yo...

    $122 Average bid
    $122 Avg Bid
    7 bids

    Cloudflare Zero Trust & Starlink CGNAT Home Network – Project Summary This project involves designing a secure home SASE-style network using Starlink Gen 3 (CGNAT) and Cloudflare Zero Trust to protect internal infrastructure while enabling secure remote access. Because Starlink operates behind CGNAT, traditional port forwarding cannot be used. Instead, Cloudflare Tunnel will create encrypted outbound connections to securely expose internal services without opening inbound ports. The network includes NAS storage, Home Assistant, IoT devices, PTZ/NVR security cameras, UPS monitoring systems, and smart-home integrations (Google Home, Alexa, Apple Home). The architecture must provide secure remote administration while maintaining normal automation functionality. Security will rely...

    $18 / hr Average bid
    $18 / hr Avg Bid
    16 bids

    My website has suddenly started throwing the message, “Error: Server Error – The service you requested is not available yet. Please try again in 30 seconds.” The outage appeared only recently and was not preceded by any obvious code or configuration changes on my side. I need someone to trace the root cause and restore normal operation. You’ll be working directly on the live site, so a careful, backup-first approach is essential. Once you locate the issue—whether it points to a misconfigured server, an unhandled 500-level condition, or a resource-limit problem—I expect a clear explanation of what happened and the corrective steps you took. Deliverables: • Diagnosis report outlining the exact failure point • Implementation of the fix and con...

    $58 Average bid
    $58 Avg Bid
    43 bids

    I need a skilled professional to rebuild an AV, TV, and Internet control panel in my custom home in Springboro, Ohio. The panel should manage: - Audio/Video systems - Television - Internet/Networking Ideal skills and experience: - Expertise in home automation - Knowledge of AV systems and networking - Experience with custom control panel design and installation Please provide a portfolio of similar projects.

    $805 Average bid
    Local
    $805 Avg Bid
    5 bids

    Looking for a CCNA certified expert Strong hands-on experience with lab-based questions in live practice test Proven ability to solve simulation-based scenarios in real time Capable of providing accurate and reliable solutions on the spot Good analytical and problem-solving skills

    $6 / hr Average bid
    $6 / hr Avg Bid
    8 bids

    My phone and Mac-based computer were recently compromised and I am seeing clear signs of unauthorized access, suspicious background activity, and some missing files. I need an experienced ethical hacker or cybersecurity specialist who can remotely examine both devices, identify every backdoor or malicious profile, recover any lost data where possible, and lock everything back down so I am fully in control again. Your work will involve a forensic sweep of macOS (and the companion phone, likely iOS) to trace how the intruder got in, remove any malware or configuration profiles they left behind, and then hard-harden the system—ensuring strong authentication, updated firmware, and airtight network settings. Please be comfortable using common incident-response tooling such as Wireshark, ...

    $165 Average bid
    $165 Avg Bid
    18 bids

    I need some well-experienced engineers, project managers, and sales representatives who can quickly build a pipeline of qualified candidates for several open positions at ReliaQuest. The most urgent vacancies are • Software Engineers skilled in Python, JavaScript, React and Node • Cybersecurity Analysts & Security Engineers • DevOps & Cloud Engineers with solid AWS, Azure or GCP exposure • Tech-focused Sales Representatives • Digital Marketers with a data-driven mindset • Project Managers who can bridge business and engineering teams You’ll own the full recruiting cycle: targeted sourcing, first-round screening, interview coordination, and offer management. Success means presenting shortlisted, interview-ready candidates for each pr...

    $34496 Average bid
    $34496 Avg Bid
    21 bids

    I will perform a professional security scan of your website using Kali Linux tools. The service includes a detailed PDF report highlighting vulnerabilities and practical solutions to improve your website security. Fast and reliable service guaranteed. Suitable for WordPress and custom websites. أقوم بإجراء فحص أمني احترافي لموقعك باستخدام أدوات Kali Linux. الخدمة تشمل تقرير PDF مفصل يوضح الثغرات والحلول العملية لتحسين أمان الموقع. خدمة سريعة وموثوقة. مناسبة لمواقع WordPress والمواقع المخصصة

    $49 Average bid
    $49 Avg Bid
    8 bids

    My site is suddenly being flagged with a phishing warning and visitors see a “risky site” message. I haven’t touched the code or added new pages in quite some time, so I need a fresh set of expert eyes to uncover what’s triggering the alert and to get the flag removed. Small task, couple of hours research by someone with the right skills. Current situation • Phishing warning appears on major browsers and link-sharing platforms. • No recent content or code updates on my end. • The site does rely on a few third-party plugins/integrations that could be a vector. What I’m after I want a concise security assessment that pinpoints the root cause—whether it’s injected scripts, compromised plugin files, mixed-content issues, or so...

    $34 Average bid
    $34 Avg Bid
    20 bids

    My site already runs through Cloudflare and basic protection is in place, yet I know the platform can do much more for security. I want a seasoned Cloudflare specialist to go through my current setup, tighten every loose end, and leave me with a hardened configuration I can trust. Scope of work • Firewall rules – Review what I have, remove redundancies, and add precise allow/deny rules and rate limits that match real-world traffic patterns without blocking legitimate users. • SSL/TLS – Move the zone to the most secure Full (Strict) mode, renew or generate any required origin certificates, enforce HSTS and secure ciphers, and confirm end-to-end encryption is flawless. • Bot management – Configure Bot Fight Mode and related features so genuine traffic ...

    $51 / hr Average bid
    $51 / hr Avg Bid
    40 bids

    I need Cloudflare configured so my site automatically blocks malicious or nuisance traffic rather than legitimate visitors. The immediate headache is spam-driven form submissions and crawlers hammering the same pages hundreds of times a minute, so the goal is to stop those two behaviours without slowing genuine users. I already have a Cloudflare account in place; what I’m missing are the right firewall rules, bot management settings, and rate-limiting thresholds. You’ll review my current WAF/Bot Management setup, identify the loopholes that allow automated form posts and excessive page requests, then implement Cloudflare features such as Bot Fight Mode, custom WAF rules, Challenge or Turnstile for forms, and sensible request limits. Deliverables • Documented list of ...

    $429 Average bid
    $429 Avg Bid
    139 bids

    I need a thorough, professional penetration test that zeroes in on database security. The work will involve actively probing our live environment for misconfigurations, permission-escalation paths, injection points, improper encryption, and any other weakness that a determined attacker might exploit. Scope • Assess the entire database layer—from connection strings and authentication flows to stored procedures and backup endpoints—without disrupting business operations. • Document every finding with reproducible steps, risk ratings, and clear remediation guidance. • Validate fixes with a follow-up retest so we can close the loop confidently. Deliverables 1. Methodology outline (tools, test phases, compliance references). 2. Vulnerability assessment...

    $263 Average bid
    $263 Avg Bid
    13 bids

    I'm seeking urgent cyber security assistance for my personal computer and android. I need a professional to secure my device and protect my data. Key Requirements: Virus removal Malware removal Penetrating testing Network security Ideal Skills and Experience: - Proven expertise in cyber security - Experience with personal computers - Ability to work quickly and efficiently - Strong knowledge of virus removal and data protection measures Please provide a detailed plan of action and estimated timeline.

    $33 / hr Average bid
    Local Featured
    $33 / hr Avg Bid
    24 bids

    Se requiere especialista en ciberseguridad / redes / seguridad informática para desarrollar la parte práctica de un trabajo personal. El proyecto consiste en la implementación y validación técnica de una arquitectura Zero Trust en un entorno virtualizado, comparándola con una arquitectura tradicional basada en VPN. ALCANCE DEL TRABAJO El freelancer deberá: 1. Construir laboratorio virtual Crear entorno simulado de red empresarial. Implementar: Servidor de autenticación (IAM o similar). Servidor de aplicaciones. Segmentación de red. Endpoint remoto. Gateway o firewall. Puede utilizar herramientas como: VMware, VirtualBox, GNS3, Proxmox, Azure Lab, AWS Lab u otra propuesta técnicamente viable. 2. Implementar arquite...

    $21 / hr Average bid
    $21 / hr Avg Bid
    9 bids

    Recommended Articles Just for You