Usalama wa Kompyuta Jobs
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
- Establishing secure network infrastructure
- Improving system performance and leveraging encryption
- Developing security frameworks for organizations
- Implementing authentication measures for digital identification
- Evaluating risks of cyber incident exposure
- Researching the latest security regulations for compliance
- Crafting secure policies for employee engagement
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
Kutoka kwa kaguzi 90,431 , wateja wanakadiria yetu Computer Security Consultants 4.87 kati ya nyota 5.Ajiri Computer Security Consultants
I have Kali Linux on Virtual Box and need someone to install Security Onion onto the Virtual Box (File provided) also. Once Security Onion is done I need you to ping the Kali Linux and Security Onion together. Will provide a document with required setting
Mid-sized Managed IT Services Company, based in New York City, USA. Need to hire a Director of IT who has command of our supported facets of technology (cloud, networking, infrastructure, security, collab) and can organize and manage the related technical support services relative to the company's client accounts (Managed Services Agreements). Our candidate should be located in the NYC area and able to attend meetings in the company's office in Manhattan.
Mid-sized Managed IT Services Company, based in New York City, USA. Need to hire a Director of IT who has command of our supported facets of technology (cloud, networking, infrastructure, security, collab) and can organize and manage the related technical support services relative to the company's client accounts (Managed Services Agreements). Our candidate should be located in the NYC area and able to attend meetings in the company's office in Manhattan.
It is a reserach paper on Nat Turner's rebellion. My thesis is question is, did Nat Turner's rebellion have a significant effect on slavery. The essay should explain the insurrection and how it happened and the outcome. Then the effects that the insurrection had on slavery.
I'm looking for someone to create an original, comprehensive, and complete recorded videocourse on the subject of Veeam Backup. The course should cover topics from beginner level to expert level coverage, to carry out, manage and design backup and replication. The course should also contain exercises, quizzes, and challenges that could be used to reinforce the content being taught. The goal is to pack as much information into a simple and easy to understand format that is accessible to everyone from beginner to expert. The minimum total duration of the course is 8 hours. The primary language of the course should be English, although Spanish could be also interesting If you believe you have the ability to create, record and edit such a course, please get in contact with me.
1. Use office 365 to manage windows 10/11 devices 2. Manage a group of users device 3. Restrict these users to only access Outlook, Onedrive, and Sharepoint on managed devices 4. Restrict the user devices to access external shared drives e.g. google drives, dropbox, etc, to upload files externally.
I have one problem. I have some product but i can't send to clients because windows defender. Windows Defender is a built-in security tool in Windows operating systems that helps protect your computer from various types of malware, including viruses, spyware, and other malicious software. It provides real-time protection by constantly monitoring your system for any suspicious activity or behavior and automatically taking action if it detects any threats. I need to avoid windows defender... if you have good method, Please ping me.
Need support for networking and cisco Ftd and fmc and f5 load balancer LTM , APM
Welcome I want to run a test on my site I want to know about security vulnerabilities I also want to know how to solve problems I want to know how to exploit the vulnerabilities
Looking for a talented freelancer to help bring my vision to life! I have a *static* nextJS website, , with a custom Bootstrap theme, published on github pages, that needs some updates. Specifically, I'm looking to add a blog session with markdown posting capabilities, via GIT posts, and a contact form for visitors to easily get in touch with me. NOTE: I already have the site theme (font, palette, graphic elements, logo) and the content for the homepage. But that's just the beginning! Once the site is updated, I need a comprehensive marketing strategy that includes SEO, blog, LinkedIn, email, CRM, and more. This will be an ongoing project with recurring tasks and endless potential for growth. I'm open to creative approaches, but any alternative solutions must clearly ident...
Need consult about options on how to secure my proprietary software app against piracy. The app is installed on windows computers, independently (free standing). Volume: hundreds, prepare for thousands. Some kind of authorization key before activating the installed app on the individual harddrive.
Those who are having very good knowledge & techniques about hacking of Android mobiles & Laptop to train for my students, they can bid.
I am looking for a tutor to help me learn network forensics. In particular, I am interested in learning packet analysis using tools in kali linux. I know that network forensics can be complex and challenging, and I am looking for an experienced tutor who can answer my questions in a timely manner and lead me through the process of learning. If you have experience and a detailed understanding of network forensics and packet analysis techniques, I would be very interested in hearing from you.
The challenge is to make the host machine with the VMM, ping the VM router and vice versa. The only difference to a previously working network build exactly like this, is the hypervisor/VMM was not KVM/Qemu/Virt manager. My network has: 1 pyhsical router bridged. 2 physical wired NICs for WAN and LAN. 1 host machine Debian based OS, running hypervisor/VMM KVM/Qemu/Virt manager. 1 VM router OPNsense (FreeBSD based). Please see the attachment for the network topology (note the VM router's install default IP address is , I will change this to when I have GUI access to the VM router's settings). The VM router is pinging the Internet and LAN devices. Here's 5 different /etc/network/interfaces configurations I've tried on the host machine, in attempt to connect the host&...
I need someone to help with an Active Directory advanced audit logs project. It needs to log user activity and track any changes to the environment. The audit logs need to be retained for more than 6 months. The selected contractor will need to have an in-depth knowledge of Active Directory log management and audit logging capabilities. They will also be responsible for monitoring events relevant to the environment and recommending improvements for security protocols. The contractor should have experience designing and implementing solutions for logging and analysis using tools such as log analytics etc. They should also have experience working with various security frameworks and have a solid understanding of networking principles. I’m looking for someone to deliver a comprehensi...
We believe we have a good handle on our customer but we are lacking some knowledge into the acquisition of our customers. Some areas that we hope to analyze include, but are not limited to, sales cycle length, average sale price, average ROI/customer, buying behaviours, lead generation etc.
Looking for assistance with external web authentication(centralized) for guest network to be used in multiple sites connected via VPN
I have reason to believe my computer or network is being or has been monitored by my former employer. Recently my computer started acting up like it did when I worked for them and they were actively monitoring it. I texted myself calling them out, thinking they would see it on my screen. When the text came though I see that a board member was added to the text, along with a woman I don’t even have in my contacts- we’ve only exchanged one or two emails and are strangers otherwise. After that I tried to text myself again and again it populated with that group. As soon as I started my name “Bonnie” then the board member and the woman would populate. “Bonnie” is not in my contacts. It always, regardless of iCloud, yahoo (my apple email) or whatever hone numb...
My account has been hacked. I've tried removing and blocking the person who did this. Can you help me, and if not, would you kindly suggest someone who can? Thanking you in advance. Bob
I will share 3 malicious Android APKs, I will need your quick analysis result reports. Presentation, Methodology, Result, Insight.
More details will be shared with the preferred Freelancer . Please don't waste time only EXPERTS are allowed to bid . THANK YOU !
As a result of multiple attacks through exchange, we need someone to Identify Security Threat(s) and create a best practices for our Microsoft 365 account. Microsoft 365 Microsoft Defender Microsoft Sentinel Exchange
I recently had my Facebook account hacked by a malicious actor, Lily Collins. After assessing the situation, I've determined that I require assistance to gain back control of my account and secure it from future attacks. To do this, I need the expertise of a professional who can help me gain back my account. Once the service is completed, I do not need any additional security measures, as the existing ones should be sufficient for my needs.
I need help in IT Networking and Communication related Project. Experts please apply
I'm looking for online ethical hacking services to keep my systems secure and make sure they are free of vulnerabilities. I'd like someone to conduct a penetration test to identify any potential weaknesses in my systems. Additionally, I'm open to ideas for developing new systems that need to be tested from the start. My ideal timeline for these services is 1 week.
I'm looking to hire an expert to provide a beginner class in configuring Firewall systems on Palo Alto PA500 devices. This class will be conducted in a virtual environment and will cover the basics of configuration and deployment. The instructor should have hands-on experience working with PA500 systems, and should be able to teach on the use of command-line tools and web-based graphical interfaces. The instructor should also be able to provide guidance on common use cases for deploying and managing PA500 systems. The instructor should have a thorough understanding of network security technologies, including virtual LANs and tunneling protocols, and should be able to provide best practices for implementing secure configurations. The class should also provide insight into system ...
We are looking for a professional freelancer to help us with our Palo Alto PA500 School Project. The project will involve setting up and troubleshooting our PA500 firewall with remote access solution, as well as creating documentation and providing training on use of the firewall. We have experience with IT infrastructures but need assistance with this particular project. Our goal is to ensure successful deployment of our firewall and make sure that everyone on staff is knowledgeable about the system. We are hoping to find a dedicated and knowledgeable freelancer to help us with the project.
Kali linux expert and pentester well versed in pentesting and red team activities. Can check for vulnerabilities on web servers and write malware and patch code.
Networks are critical infrastructure that must remain functional even under various types of attacks and failures. However, the increasing frequency and complexity of attacks and failures pose significant challenges to network resilience. The problem addressed by this research is to investigate the corresponding network resilience under different types of attacks and failures and identify potential vulnerabilities and solutions to enhance network resilience.
Define ports and inbound rules with relevant IP's
I am looking for an experienced freelancer to help me with my network and virtualization project. I have an existing server setup and I am looking for someone to design and maintain the network. I am not sure if I need to migrate the existing servers, so I am looking for someone to advise me on the best way forward. It may also be necessary to invest in additional hardware for the project, so I am open to suggestions and recommendations. The ideal freelancer for this project should have a proven track record in designing and maintaining networks, helping with a server migration, and selection of additional hardware, if needed. Currently, we are having issues with the speed of the remote desktop speed, and looking for suggestions for the best software to set up or develop a new solution to ...
My computer was hacked. I need an ethical hacker to evaluate my computer to identify the person that hacked my computer. I need this information in order to file a police report. They remotely added 10 download keys, that are not mine, & also a hackers email address was posted on my computer.
1. Fictional Back Story The University’s new student finance system is about to be launched! Just before giving a demonstration to the University President, one of our team logged in to the system from their laptop. All they did was log in and then log back out, but somehow someone was able to change their financial details, apply for a grant and steal the money! This shouldn’t be possible as it uses a 2 factor authentication. Thankfully the network team managed to record the traffic going to and from the attacker’s machine. You have been asked to work out how they stole the money. 2. Tasks • Download the relevant file (.pcapng file) from Moodle and open it in Wireshark (either in the virtual machine image or on your own computer). • Using your knowledge of n...
I need Cost modelling and Resource allocation for projects that i m assigned to I work in Cybersecurity and i need help with this i can explain more
Hi I need to do the certificate for ifs supply chain practitioner. Need your help if you can. I am sending you the sample questions. If you think you can work on this let me know. You just need to know how use the ifs application.
Dears, We have Linux ubuntu machine, need an exploitation within network using open ports and known ip. We know the target ip and ports etc. Important: This is only for education and learning purpose and its in our own network and i need to achieve it as a student.
Tafadhali Jisajili ama Ingia ili kuona maelezo.
We (freelancer.com) have an exciting opportunity for an experienced Laptop service engineer to join our team and be part of this amazing project during an amazing growth period. Want to work for one of the world's biggest technology companies? ++++++++++++++++++++++Are you located Davenport, USA? ++++++++++++++++++++++ If you thrive on taking a customer centric based approach and have break/fix/repair skills for notebooks/laptops and printers, then we want to hear from you We are looking for Hardware Repair candidates in Delhi! Duties and Responsibilities Replace/Repair - System board , Display assembly, Webcam , Speaker, Fan, Bezel, Heatsink ,Touchpad , Specific Keyboard ,HDD ,Top cover, Controller board ,PCB,I/O board. Some responsibilities may include but are...
The Brief This assignment is where you demonstrate practical cyber security skills. You will demonstrate your understanding of different methods of vulnerability identification and report findings to decision makers. You will demonstrate application of defensive techniques to illustrate methods of organization's response to cyber incidents.
The Brief This assignment is where you demonstrate practical cyber security skills. You will demonstrate your understanding of different methods of vulnerability identification and report findings to decision makers. You will demonstrate application of defensive techniques to illustrate methods of organization's response to cyber incidents.
We are seeking a skilled and experienced individual to participate in a Capture the Flag (CTF) competition on our behalf. The ideal candidate should possess a strong background in cybersecurity, with extensive knowledge of cryptography, network security, and exploitation techniques. The scope of this project is to solve a variety of problems and challenges presented in the CTF competition within a specified timeframe. As such, we are offering a compensation package based on hourly rates. The selected candidate will be paid for the time spent on each task, with the potential for bonuses based on successful completion of challenges. The primary responsibilities of the selected candidate will include: Participating in the CTF competition on our behalf. Identifying and exploiting vulnerabil...
Make assignment of critical vulnerability analysis module about threat modelling exercise.
We are seeking experienced Network Engineers to join our team in Dublin, Ireland at an entry level of proficiency. Our ideal candidate will possess strong knowledge of network configuration, computer security, and troubleshooting skills. This is an onsite position and applicants from remote locations will not be considered. The candidate must have the ability to find solutions quickly, perform duties with minimum supervision, and show attention to detail when resolving issues. A technical background in installation, maintenance and support-related functions is required, as is prior experience on multiple networks. The successful applicant will demonstrate effective communication within a team environment, as well as being able to provide high-level customer service. If you believe ...
Job Title: Cohesity Storage Administrator (Person from United Kingdom will be preffered) Duration 3-6 months – Possibly longer(Onsite job) Contract type full time freelance Job Summary: We are seeking a highly skilled and experienced Cohesity Storage Administrator with expertise in managing storage systems and domains, as well as experience with Office 365 and a broad range of IT technologies. The successful candidate will be responsible for managing and maintaining our Cohesity storage environment, ensuring it is highly available, reliable, and performing optimally. This role requires someone with strong communication skills and the ability to work effectively with both technical and non-technical stakeholders. Key Responsibilities: • Manage and maintain o...
We (freelancer.com) have an exciting opportunity for an experienced Laptop service engineer to join our team and be part of this amazing project during an amazing growth period. Want to work for one of the world's biggest technology companies? ++++++++++++++++++++++Are you located Rio Rancho, USA? ++++++++++++++++++++++ If you thrive on taking a customer centric based approach and have break/fix/repair skills for notebooks/laptops and printers, then we want to hear from you We are looking for Hardware Repair candidates in Delhi! Duties and Responsibilities Replace/Repair - System board , Display assembly, Webcam , Speaker, Fan, Bezel, Heatsink ,Touchpad , Specific Keyboard ,HDD ,Top cover, Controller board ,PCB,I/O board. Some responsibilities may include but are ...
We (freelancer.com) have an exciting opportunity for an experienced Laptop service engineer to join our team and be part of this amazing project during an amazing growth period. Want to work for one of the world's biggest technology companies? ++++++++++++++++++++++Are you located Reading, USA? ++++++++++++++++++++++ If you thrive on taking a customer centric based approach and have break/fix/repair skills for notebooks/laptops and printers, then we want to hear from you We are looking for Hardware Repair candidates in Delhi! Duties and Responsibilities Replace/Repair - System board , Display assembly, Webcam , Speaker, Fan, Bezel, Heatsink ,Touchpad , Specific Keyboard ,HDD ,Top cover, Controller board ,PCB,I/O board. Some responsibilities may include but are no...
We (freelancer.com) have an exciting opportunity for an experienced Laptop service engineer to join our team and be part of this amazing project during an amazing growth period. Want to work for one of the world's biggest technology companies? ++++++++++++++++++++++Are you located Nashville, USA? ++++++++++++++++++++++ If you thrive on taking a customer centric based approach and have break/fix/repair skills for notebooks/laptops and printers, then we want to hear from you We are looking for Hardware Repair candidates in Delhi! Duties and Responsibilities Replace/Repair - System board , Display assembly, Webcam , Speaker, Fan, Bezel, Heatsink ,Touchpad , Specific Keyboard ,HDD ,Top cover, Controller board ,PCB,I/O board. Some responsibilities may include but are ...