Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Ajiri Computer Security Consultants
We need to implement the Open SOurse Identity and Access Management solution.
Our organisation have three IOS applications out of which one is on app store and other two are under development, we want pen testing service for our under development apps and vulnerability assessment for our app store application.
Online job-no door to door. Looking for 16 team worker. We are currently looking for a few gals and gents to join our team! Starting rate is $35/Hr and you will be getting paid weekly ,5 days a week Temporary and permanent positions available. Immediate start. If you have a laptop or phone I have a position for you.?? Work your own hours and get paid weekly. No cv required..Pm me please
Looking for a cyber security expert to do : 1- review a new DC design in terms of cyber security devices. 2- advice about best practices of systems and hardware implementation. 3- advice about best brand of security Hardware and software in the new DC. 4- consultation about Cyber Security
Must be near North Dakota - 4 to 5 days a month. We are looking for someone to provide T1 and T2 onsite desktop support and some management consulting for the purpose of delivering IT services to customers on time, on budget and with the required quality. JOB DESCRIPTION: Our client is seeking a talented IT Field Service Technician. This IT Field Service Technician opportunity will contribute to t...
Our organisation have three IOS applications out of which one is on app store and other two are under development, we want pen testing service for our under development apps and vulnerability assessment for our app store application. Report will be required
I need to hire an expert on cyber security to help me to check my app
I want you to upgrade my slim 3 website to slim 4 latest ver, with all latest updated libraries. Requirements: 1. Upgrade from Slim 3 to Slim 4 Framework 2. Update All Plugins for Slim 4 3. Bugs are not allowed after upgrade is completed Max Budget is 100$ for this project.
I need a full time cyber security expert working full time alongside me for $500 a month. Must be willing to work full time UK hours between the hours of 10am to 7pm UK hours. If you cannot work full time do not apply. If you cannot work for $500 full time do not apply. If you do not have experience in cyber security do not apply If you cannot read do not apply. also mention this in your ...
Inviting skilled developers to build a tailored Network Intrusion Detection System (NIDS) using existing best-of-breed projects in open-source community. The NIDS will need to be tailored for use in industrial environments that are not connected to the Internet. Key Capabilities required: 1. Use of ML/AI for reducing false positives and accurate anomaly detection. 2. Deep-packet-inspection of i...
We have several internet security protocols that we would like to write using SPAN-AVISPA tool and verify using the tool that the proposed protocol is secure. The tool can be found in Ubuntu Virtual Machine installed from AVISPA website. The requirement is an HLPSL file. We have verified the protocols using different tools and we would like the final verification to be done in SPAN/AVISPA Skills R...
Hello, we need to have some information on spam filtering. we use haraka as MTA and we want to improve the antispam filtering. but we have many small server and we want to have a centralized spam solution. that's why we think to go with rspamd but we need to clarify some information with a call or 2
Hello, We are going to build a simple Hyperledger Fabric network. It is not for commercial purpose, a sort of test running. Hope you can also build the frontend part as well. We would only work with an candidate who has extensive experience in building and handling HLF.
For a customer of mine i need to conduct a test phishing campaign, i am in need of a tool hosted on a private owned server, need assistance in setting up such a server, Hardware is already in place. also on the same server i would need some basic pentest tools
I need someone who can work with following tools and can create the following solutions: As a working place I will hand you the virtual machine where all the programs to be tested are Tools you have to work with: Adress Sanitizer LLVM Clang Analyzer GCC 10 Static Analyzer Facebook Infer KLEE symbolic execution engine honggfuzz (fuzzer) Programs to be tested: and a simple program in C One Real-Wo...
we are looking for someone who can check security of 2 websites and webapps from all aspects of vulnerability like DDOS, Bruteforce, SQL Injection, Man in the Middle , phishing and others
Need someone who has 10+ years of experience in cybersecurity and security testing to write 50 Multiple choice questions and answers based on real world questions. Can't be copy from other places. It must be unique or something you have come across in your career. Each question needs to have 4 answers of which one answer is correct one and the rest 3 are incorrect answers. So there will be to...
Hello, I have a company called Grill Rescue. We have had the infringements under control and we have found there are less than 20-30 infringement companies per month across multiple platforms such as Amazon, Google, and Alibaba, eBay, and stand-alone sites. We are looking for an employee on a monthly basis ($300-$400) to make sure these are all removed. This job will need need to be completed on a...
hi looking for someone to install kali on my laptop preferably in person and I would love to take hour or two of your time to learn basics and run [ingia ili uone URL] a program or two plz disregard amount$ wasnt sure so yeah plz disregard
i purchase a car from iaai salvauge vehicle and i need to remove the car photos from googgle and other websites salwv2sv5ja801589 whitte range rover sport 2018 i upload a one of the photos it is also available in other websites [ingia ili uone URL] [ingia ili uone URL] [ingia ili uone URL] [ingia ili uone URL]
i´m just need the last configuration to make work the vulnerabilities scan on Greenbone Security Manager