Mcafee vulnerabilities jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 mcafee vulnerabilities jobs found, pricing in SGD

    ...dashboard to manage product listings, customer accounts, and payments.  Allow administrators to generate reports on sales, revenue, and license usage. Non-functional Requirements: 1. Security:  Implement HTTPS for secure communication.  Apply role-based access controls to restrict unauthorized access to sensitive data.  Regularly update and patch software components to address security vulnerabilities. 2. Performance:  Ensure fast loading times and responsiveness of the website, even under heavy traffic.  Optimize database queries and server-side processing for efficient performance. 3. Scalability:  Design the system to handle a growing number of users and transactions over time.  Employ cloud-based infrastructure to scale resources dynamically as needed. 4. Compati...

    $1821 (Avg Bid)
    $1821 Avg Bid
    165 bids

    ...making Desktop/Mobile responsive websites - Previous experience accurately converting a PSD design to a fully responsive website using MERN stack (or similar stacks) Requirements: Provide daily progress updates Develop the website's frontend and backend with database and admin panel Integrate payment gateways with full nodes for cryptocurrencies Test the website for bugs and security vulnerabilities Launch the website and perform post-launch checks Maintenance and ongoing improvements Monitor the website's performance and user feedback, fix bugs and implement new features based on user demand Must have all components required Must be responsive (work across mobile/desktop/laptop/tablet screens) Must not have any spacing/alignment/responsive/font issues or mi...

    $5188 (Avg Bid)
    $5188 Avg Bid
    44 bids

    ...web-based applications, with the aim to identify and eradicate any potential vulnerabilities. Key Tasks: - Perform Open Source Intelligence (OSINT) - Port scanning - Man-in-the-middle (MiTM) attack simulation - Focus intensively on injection attacks (SQL, XSS) - Authentication and session management puncturing - Cross-Site Scripting (XSS) evaluation The ideal freelancer will have: - Strong experience in cybersecurity and penetration testing - Excellent knowledge and experience with Linux-based systems - Proven experience in web application security testing - Firm understanding of SQL, XSS and authentication vulnerabilities Your final deliverable will be a complete penetration testing report, detailing vulnerabilities found, their potential impact, and recommended...

    $846 (Avg Bid)
    NDA
    $846 Avg Bid
    13 bids

    We are seeking a highly skilled Full-Stack Developer to create a Telegram channels and groups directory website from scratch. ...enhancing the directory’s comprehensiveness. * Promotion and Advertising: Option for users to pay a monthly fee for their channels or groups to be featured at the top of lists for increased visibility. * Mobile Responsiveness: A fully responsive design to ensure seamless usability across all devices. * Security Measures: Implement robust security protocols to protect the platform from common vulnerabilities. * For the design I don't have specific style but something similar to is a good start. For color, we can go with this palette: --text: #01070f; --background: #f8fbfe; --primary: #5d37f6; --secondary: #c887f5; --accent: #e24bf0;

    $1644 (Avg Bid)
    $1644 Avg Bid
    99 bids

    ...will implement a robust user registration and authentication system. This section discusses the importance of secure authentication practices, such as password hashing and the use of access tokens, to prevent unauthorized access. 5. Input Validation and Sanitization: To mitigate the risk of security vulnerabilities, the application will implement strict input validation and sanitization techniques. This section emphasizes the importance of validating user input to prevent common vulnerabilities, such as SQL injection and cross-site scripting (XSS) attacks. 6. Secure Transaction Processing: The application will incorporate secure transaction processing mechanisms to ensure the integrity and confidentiality of financial transactions. This section discusses the implem...

    $390 (Avg Bid)
    $390 Avg Bid
    9 bids

    ...maintainability and scalability, especially with React or Angular. Performance Optimization: Implement code splitting, lazy loading, caching strategies, and image optimization to enhance website loading speed. Accessibility: Ensure website elements comply with WCAG guidelines for optimal usability by users with disabilities. Security Best Practices: Regularly update dependencies to address security vulnerabilities, implement secure coding practices (e.g., input validation, CSRF protection), and consider HTTPS for data encryption. Testing: Establish a robust testing strategy (unit, integration, end-to-end) to ensure code quality and prevent regressions. Content Management System (CMS): Evaluate the benefits of a CMS (e.g., WordPress, Drupal) for easier content management, especial...

    $875 (Avg Bid)
    $875 Avg Bid
    25 bids

    ...some admin issues with my existing website. I need to clean up some back-end issues and resolve some admin tasks to improve SEO. Key Tasks: - Fixing broken links: The website has a number of broken links that need to be identified and rectified. - Optimizing database performance: I need help in ensuring that the database is running efficiently. - Resolving security vulnerabilities: The website has some security vulnerabilities that need to be addressed immediately. - Resolving toxic backlinks: I need help in identifying and disavowing toxic backlinks that could be harming the website's SEO. The ideal candidate for this project will have good references and is able to work in our custom CMS system this is not Wordpress. If you are confident in your SEO skills and ...

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    99 bids

    I am in search of a cybersecurity professional who can provide specialized assistance in the area of Network Security and Zero Trust Network Access. Your responsibilities will entail: - Securing my network against any potential threats and vulnerabilities - Implementing an effective Zero Trust Network Access system The ideal freelancer for this project would have: - Strong experience and expertise in network security and Zero Trust Network Access - Understanding of cybersecurity best practices - Demonstrable experience in protecting sensitive information and preventing cyber threats. Please note, familiarity and experience with any specific cybersecurity framework (NIST, ISO 27001, or CIS) is not necessary for this project. Your primary task will be to safeguard the network a...

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    20 bids

    The website is compromised, that needs to be fixed. Also I want a more updated 2024 look and feel for the website. Following needs to be fixed: - Identify and resolve website security vulnerabilities. - Repairing any damage done to the site, ensuring it loads reliably. - Identifying and addressing any other vulnerabilities exposed by the hack - Thorough cleanup needed to remove malicious content/links (to casinos) - There are Google Search Console owners added, they needs to be removed incl. HTML verification file. - Other issues in Google Search Console needs to be fixed and all pages needs to be indexed. - Update all plugins and WordPress to latest versions. Remove unnecessary plugins. - Ensure HTTPS functions correctly on all pages. - Measures firewall protection, regular...

    $75 (Avg Bid)
    $75 Avg Bid
    30 bids

    We are seeking an experienced penetration tester to join our team. As a penetration tester, you will be responsible for identifying and exploiting vulnerabilities in our systems to ensure they are secure. Your main tasks will include conducting vulnerability assessments, performing penetration testing, and providing recommendations for remediation. To excel in this role, you should have a strong understanding of various testing methodologies, possess analytical skills to interpret test results, and be familiar with a wide range of penetration testing tools and techniques. Skills required: - Penetration testing - Vulnerability assessment - Ethical hacking - Knowledge of network protocols - Familiarity with security frameworks - Strong problem-solving skills This is a medium-sized ...

    $671 (Avg Bid)
    $671 Avg Bid
    34 bids

    ...and system infrastructure. The primary objective of this task is to find potential security vulnerabilities. - Task Details: Your work will involve identifying weaknesses that could possibly be exploited to undermine our security controls and then testing how effective these controls truly are. - Approach: Please prioritize any vulnerabilities found according to threat severity level. I'm looking to focus on the most critical threats before handling the lesser ones. - Necessary Skills: Previous experience in network security, vulnerability assessment, and penetration testing is critical. You need to demonstrate a strong understanding of network and system infrastructure, its vulnerabilities, and security control mechanisms. This task requires a lot of...

    $144 (Avg Bid)
    $144 Avg Bid
    17 bids

    I've devised a dummy website primary for understanding log analysis which is a major concern in today's advanced technology world. To test its vulnerabilities, I require a well-rounded professional equipped with proficiency in PHP and Node.js. - Focus Area: Your tasks will encompass SQL injection techniques over my website's user login systems, data retrieving systems, and contact forms. - Skill Set: An experience with SQL injection tests is crucial. Knowledge of web technologies such as PHP and Node.js is essential. Understanding of website log analysis will also be advantageous. Your comprehensive reports on the performed tests and findings will enhance the robustness of my website and will aid in my understanding of the log analysis for future development and t...

    $48 (Avg Bid)
    $48 Avg Bid
    14 bids

    ...development skills using Node.js, Python, or PHP ~Mobile app development expertise (Android Studio, Swift, Kotlin) ~Database management (MySQL, MongoDB) ~Experience with e-commerce platforms (e.g., WooCommerce, Shopify) is a plus ~Familiarity with POS systems and integration techniques Additional Requirements: >The developer must provide ongoing support for bug fixing and addressing any security vulnerabilities related to payment gateways or other aspects of the platform. >The website should be optimized for performance to ensure fast loading times, even during high traffic periods. >Comprehensive testing must be conducted to identify and resolve any security or performance issues before deployment. Timeline and Deliverables: <>Detailed project plan and timeline ...

    $2223 (Avg Bid)
    $2223 Avg Bid
    41 bids

    ...**Track the Unauthorized User**: Additionally, the freelancer should track the person who has taken over my account. It is essential to identify this user for legal and security reasons. I have already taken steps to secure my phone number by enabling a two-step verification process. Nonetheless, I need a professional who can help me regain access to my account and ensure that any potential vulnerabilities are addressed. The ideal candidate would have experience in: - Domain account recovery - Cybersecurity and hacking expertise - User tracking and identification techniques - Strong communication skills for coordinating with the domain provider's customer support Please note that this project is time-sensitive, and I am looking for a freelancer who can swiftly and efficie...

    $31 (Avg Bid)
    $31 Avg Bid
    6 bids

    : logo with display menu: select option: Subdomains 2.F...xss -L /Desktop/ -o /Desktop/ This tool checks parameters regardless of whether they are filtered or unfiltered. 5- Testing SQL: This tool automatically injects payloads into every input field on the selected website. For instance, if I select , the tool systematically scans all inputs on the website, injecting payloads to determine if SQL injection vulnerabilities exist. only these options I need: -u --url Options: -u, --url: Specify the target URL. -o, --output: Specify the output file path. -L, --list: Specify the URL list. -h, --help: Display help information. example: SqlInjection -L /Desktop/ -u -o /Desktop/

    $226 (Avg Bid)
    $226 Avg Bid
    30 bids

    ...smooth operation of the app. - Remote access: Create secure remote access policies to enable staff to work remotely without compromising the app's security. - Network security: Implement network security policies to protect the app from cyber threats and ensure data integrity. - Secure software development: I need you to incorporate best practices in secure software development to prevent vulnerabilities and ensure a robust app. Key Skills and Experience: - Proven experience in policy development within the IT sector. - Strong understanding of safety, customer service, and data privacy policies. - Knowledge of risk management, remote access, and network security practices. - Expertise in secure software development and capacity management. - Experience in anti-malware, back...

    $188 (Avg Bid)
    $188 Avg Bid
    20 bids

    Are...investigate and fix any issues with your WordPress Errors: From 404 errors to white screens of death, I'll identify the root cause of any site errors and implement fixes to restore Optimization: Slow loading times? I'll analyze your site's performance and make necessary optimizations to improve speed and Concerns: Worried about security vulnerabilities? I'll conduct security audits and implement measures to protect your site from 't let WordPress issues hold you back. Let me take care of them so you can focus on what you do best – running your business. Contact me today to get started!Note: Please message me with details about your specific issue before placing an order to ensure I can provide the assistance you need.

    $67 (Avg Bid)
    $67 Avg Bid
    1 bids

    I need assistance in evaluating current vulnerabilities and implementing necessary security measures. Ideal Candidate: - Robust experience in Cybersecurity, specifically in assessing and managing security vulnerabilities - Well-versed in small network management - Proficient in understanding and implementing effective security protocols and measures.

    $261 (Avg Bid)
    $261 Avg Bid
    29 bids

    ...seeking an experienced professional with proficiency in Node.js ( Framework) to comprehensively review my backend code. Key Responsibilities: - Inspect and evaluate the data handling and database management of my application. Any proposed modifications should aim at promoting the efficiency and performance of data flow within it. - Scrutinize the security implementation for potential vulnerabilities. Recommendations for enhancements should be accompanying any identified weak points. - Critically assess the performance and efficiency of the present code and propose changes that will render the backend of my application more effectively. Ideal Skills and Experience: - Extensive experience in backend code review is an absolute necessity, particularly in the context of Microser...

    $42 / hr (Avg Bid)
    $42 / hr Avg Bid
    15 bids

    In this project, I'm looking for someone knowledgeable in website security to guide me and others through hacking a basic blog. This is purely for educational purposes, aimed at raising awareness about potential security vulnerabilities that can be mitigated. Here's what you need: - Extensive knowledge of website vulnerabilities and how to exploit them ethically. - A clear understanding of blogging platforms - WordPress, Blogger, Tumblr, or custom-built sites. - The ability to develop a simple website for demonstration. - Excellent communication skills to explain complex techniques simply. Remember, this is not for malicious intent, but to educate on enhancing blog security.

    $39 (Avg Bid)
    $39 Avg Bid
    8 bids

    Design and Implementation of an Application and Website Responsive User Interface (UI) Design: Ensure tha...to help users effectively use the platform. Integration with Social Media: Ability to share content across different social media platforms. Login using social media accounts. Data Security and Protection: Implementation of the highest standards of security and data protection to ensure the confidentiality and safety of student and instructor information. Regular updates to address security vulnerabilities and counteract new threats. Customization and Future Development: The ability to expand the platform in the future to accommodate more features and improvements based on user needs and technological advancements. Similar Platforms: Baims Shrooh Educational Duroob Mentor Ma...

    $3926 (Avg Bid)
    $3926 Avg Bid
    200 bids

    I am searching for a skilled ethical hacker to perform a comprehensive "security audit" on an informational website. Responsibilities: - Testing and eliminating any potential security vulnerabilities. The ideal candidate should have: - P assionate - A mbitious - L eading - E xcellent - S mart - T alented - I mpressive - N oble This project is aimed at ensuring the website is safe from any unethical threats, ultimately safeguarding the audience's integrity and users' data.

    $89 (Avg Bid)
    $89 Avg Bid
    15 bids

    ...with OWASP Top 10 standards. Key Requirements: - User Authentication Testing: Verify the strength of our user authentication methods. The chosen freelancer should be able to effectively identify and exploit vulnerabilities in our user login process. - Authorization Controls Testing: We need thorough testing on the authorization controls in place to ensure that only authorized users can access specific resources. - Input Validation Testing: We need someone who can identify any weaknesses in the input validation of our website. This is crucial in preventing common security vulnerabilities like SQL injection and cross-site scripting. Ideal Skills: - Proven experience in ethical hacking and website security testing. - Strong expertise in PHP and web application security - F...

    $167 (Avg Bid)
    $167 Avg Bid
    22 bids

    ...designer with specific expertise in creating intuitive user interfaces and seamless user experiences. The task at hand involves crafting the UI/UX for a cutting-edge platform dedicated to attack surface management. Project Overview: Our goal is to develop a user-friendly platform that enables efficient management of attack surfaces, empowering users to identify, assess, and mitigate potential vulnerabilities effectively. As such, we require a designer who can translate complex functionalities into visually appealing and easy-to-navigate interfaces. Key Requirements: - Strong background in UI/UX design - Experience designing for attack surface management or other cybersecurity platforms - Proficient in creating interactive visualizations, intuitive navigation, and real-time moni...

    $591 (Avg Bid)
    $591 Avg Bid
    92 bids

    I am looking for a proficient cyber security researcher with an emphasis on securing various applications. The scope of work includes web applications, mobile applications, and desktop applications. Key Responsibilities: - Identify and correct various security vulnerabilities specifically: cross-site scripting (XSS), SQL injection, and session hijacking. - Devise strategies to enhance the security of all our applications. - Regularly conduct security checks to identify potential threats. Ideal skills: - Proven experience in securing different application platforms. - In-depth understanding of XSS, SQL injection, and session hi-jacking. - Comprehensive knowledge of network security and data protection. I need someone who is adept in application security to safeguard our digital ...

    $416 (Avg Bid)
    $416 Avg Bid
    11 bids

    For this project, I am looking for a seasoned system developer to build a network application which leverages improved security measures. This application needs to be capable of conducting precise user authentication using usernames...deliver comprehensive network traffic capture Ideal Skills: - Proficiency in Networks and Security, especially with the use of Sockets API - Practical experience in application/network development - Good understanding of Wireshark or similar network traffic analysis tools The captured network traffic will be used to: - Gauge the performance of the network - Identify potential security vulnerabilities - Diagnose and troubleshoot network-related issues Any demonstration of the ability to simplify this complex process in previous work will be highly...

    $129 (Avg Bid)
    $129 Avg Bid
    1 bids

    I'm seeking an expert in Long Language Models (LLM) to develop a model that can detect vulnerabilities using network traffic analysis. Key Requirements: - Experience with Long Language Models (LLM) such as GPT, BERT, etc.. - Previous work and experience in the field of cybersecurity, particularly in vulnerability detection. - Ability to design and implement a model that can accurately identify network traffic patterns associated with vulnerabilities. The successful freelancer should be able to: - Understand the nuances of different LLMs in order to choose the most suitable one for the task at hand. - Develop a robust vulnerability detection model using the chosen LLM. - Demonstrate their experience in cybersecurity and vulnerability detection. Please highlight your ex...

    $538 (Avg Bid)
    $538 Avg Bid
    29 bids

    I'm seeking a professional PHP dev...Meta Tags Customization: The CMS should allow clients to customize meta tags, including title tags, meta descriptions, and keywords for each page. - XML Sitemap Generation: The CMS should automatically generate and update an XML sitemap, making it easier for search engines to crawl and index the site. Security Features: - Vulnerability Protection: Ensure the CMS is robust against common web vulnerabilities like SQL injection and XSS attacks. Skills and Experience: - Strong PHP and CMS development background. - Proficiency in implementing SEO best practices. - Experience in web security and vulnerability protection. - Excellent communication skills and ability to understand and incorporate client requirements effectively. Budget is not mo...

    $714 (Avg Bid)
    $714 Avg Bid
    60 bids

    ...currently has a number of bugs that need to be identified and fixed. While I have a list, it's not detailed so it will require some exploration on your part. - **Security Enhancements**: Beyond the bugs, I also need you to conduct a security audit to identify potential vulnerabilities and implement necessary fixes to ensure that user data is well protected. Ideal Experience: - Extensive experience in web development and bug fixing - Proven track record of improving website security - Familiarity with common security vulnerabilities and methods to mitigate them - Strong communication skills to explain the issues and the solutions clearly Please provide a portfolio of similar projects you've worked on, along with your proposed approach to solving the bugs and enh...

    $111 (Avg Bid)
    $111 Avg Bid
    29 bids

    We've created a web-based HTML game but are facing issues with unusually high scores by some players. We suspect that there might be loopholes in the game's mechanics which are being exploited. Key Points for Freelancers: - We need an expert in HTML5-based game development. - The role is purely for auditing the game for security vulnerabilities, not for any development work. - Your application should primarily focus on your past work, especially in auditing and fixing security issues in HTML5 games. Communication: For updates and feedback, I prefer to communicate via email.

    $28 (Avg Bid)
    $28 Avg Bid
    12 bids

    I need a professional, skilled in crafting modern and minimalistic aesthetics. You will be required to: - Build a user authentication system via email and password - Design and implement a comprehensive workflow we need a simple online laundry website to showcase some vulnerabilities and some ways to mitigate those vulnerabilities. Main features : Roles: Admin ( already exists ). washer ( need to be created ). customer ( already exist as a user role ). Actions: Admin: need to be able to control the app ( already exist ). Washer: need to see the new orders comes from the customers ( with all details ) and approve them + add the delivery date. Customer: need to sign up login + create a new order + see hisher own order history + see the pricing list page + track orders +...

    $290 (Avg Bid)
    $290 Avg Bid
    14 bids

    I need a professional, skilled in crafting modern and minimalistic aesthetics. You will be required to: - Build a user authentication system via email and password - Design and implement a comprehensive workflow we need a simple online laundry website to showcase some vulnerabilities and some ways to mitigate those vulnerabilities. Main features : Roles: Admin ( already exists ). washer ( need to be created ). customer ( already exist as a user role ). Actions: Admin: need to be able to control the app ( already exist ). Washer: need to see the new orders comes from the customers ( with all details ) and approve them + add the delivery date. Customer: need to sign up login + create a new order + see hisher own order history + see the pricing list page + track orders +...

    $230 (Avg Bid)
    Urgent
    $230 Avg Bid
    19 bids

    I'm looking for an expert in game vulnerabilities and hacking to help me find weaknesses in an action game for Android. The end goal is to create a cheat that provides infinite currency in the game. Key Requirements: - Proficient in game hacking and security testing. - Experience with creating cheats for Android games. - Strong understanding of game mechanics. Your responsibilities will include: - Identifying vulnerabilities in the game. - Creating a cheat that provides unlimited currency. - Ensuring the cheat is compatible with the Android platform.

    $272 (Avg Bid)
    $272 Avg Bid
    9 bids

    I need a skilled developer to review the code of an existing PHP product. I'd like you to provide an in-depth analysis of how well the code is structured, and to what extent it supports security, performance, and scalability. Key focus areas for the review: - Security: Ensure the codebase is resilient to common vulnerabilities and threats. - Performance: Identify any bottlenecks or inefficiencies in the code that could be impacting performance. - Scalability: Assess how well the current codebase can accommodate future growth and expansion. I'm looking for the following in the ideal candidate: - Proficient in PHP with proven experience in code review and analysis. - Strong understanding of security best practices. - Experience in optimizing code for performance. - Knowle...

    $3004 (Avg Bid)
    $3004 Avg Bid
    74 bids

    I'm seeking an expert who can create logs for a synthetic scenario in Splunk. The purpose of this task is to analyze potential security vulnerabilities. Consequently, your focus should be on identifying types of requests made, as well as geographical sources of traffic. Logs should be generated hourly. Ideal Skills: - Extensive experience with Splunk - Solid understanding of network security - Familiarity with traffic analysis Your responsibilities: - Create and manage logs for the purpose of security analysis - Monitor specific traffic patterns, particularly the types of requests and geographical sources - Ensure logs are generated every hour.

    $22 (Avg Bid)
    $22 Avg Bid
    8 bids

    1. Project Overview ● Title: Texas Hold'em Poker Game ● Development Platform: Unity ● Blockchain Integration: Web3 with the integration of the coin token ...the contracts directory. Transaction Flow: Detailed flowcharts for all transaction processes are included in the flowcharts directory. 6. Issues and Challenges Critical Bugs: ● The betting logic has numerous bugs affecting gameplay fairness and must be prioritized. ● Performance Issues: Memory leaks observed during longer gameplay sessions need addressing. ● Security Concerns: Potential vulnerabilities in smart contract code for handling tokens. 7. Future Roadmap Planned Features: Introduction of tournament modes and leaderboards. Suggestions for Improvement: Refactoring the betting engine for better reliability and ...

    $3708 (Avg Bid)
    $3708 Avg Bid
    35 bids

    ...purpose of this feature is to allow users to upload CSV files. You will have to ensure that the system can handle this specific file format. - The feature needs to be integrated into a REST backend and a React frontend. Experience with these technologies is crucial. Additional Information: - You should ensure that the upload process is secure and efficient, safeguarding against any potential vulnerabilities. - The final version of the feature should be user-friendly and easy to navigate. Ideal Skills and Experience: - Proficiency in REST and React is a must. - Experience in building file upload functionalities, specifically handling CSV files would be advantageous. - A good understanding of security principles in web development. - An eye for detail and a knack for creating int...

    $50 (Avg Bid)
    Urgent
    $50 Avg Bid
    12 bids

    I'm in need of an expert in cybersecurity to help us to clarify and clearly explain 61 page of Questions that we have to respond. We need someone 100% fluent in english and who can also speak on the call. you'll help us on the cal...Candidate: - Fluent in English: Clear communication is crucial for this project. - Advanced Level Expertise: I require an expert with deep understanding and experience in cybersecurity. - Previous Experience: Proven track record in improving network security, data protection, and enterprise cybersecurity is a big plus. - Strong Analytical Skills: Must be able to identify potential risks and vulnerabilities and provide effective solutions. - Experience in Enterprise Security: Understanding of the unique challenges of ensuring cybersecurity at ...

    $9 - $17 / hr
    Sealed NDA
    $9 - $17 / hr
    3 bids

    ...ensuring the sites function smoothly. - Performance optimization: The programmer should be able to identify and implement strategies for enhancing the performance of the websites. This might involve streamlining code, improving server response times, and addressing other speed-related issues. - Security enhancements: Security is a top priority for us. The programmer should be able to identify vulnerabilities and implement necessary measures to enhance the security of the websites. - Regular maintenance: We need a programmer who can commit to providing regular maintenance, including bug fixes and updates as necessary. - New Ideas, SEO, Google .... and all necessary legal issues to be solved in regards of the EU Laws (the programmer should minimally know what we need from exis...

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    144 bids

    I'm seeking an expert in software automation, specifically in automated testing for web applications. To be successful in this project, ...applications. To be successful in this project, you should have: - Extensive knowledge and experience in software automation, particularly automated testing. - Demonstrated experience in automating testing procedures for web applications. - A problem-solving mindset to script and develop automated testing scenarios. - An understanding of common web application structures and their potential vulnerabilities. Your main responsibility will be to design and implement efficient testing procedures to ensure flawless operation of our web application. Success in this project will be measured by the effectiveness and reliability of the automated te...

    $218 (Avg Bid)
    $218 Avg Bid
    14 bids

    I am in need of an ethical hacker who is capable of identifying vulnerabilities in my system, assessing security risks, and providing recommendations for enhancing security. In addition, this individual must have experience conducting thorough background verifications including university-level education checks, criminal record assessments, and social media screening. A solid background in information security, forensic computing, or a related field is a must; as well as relevant certifications such as Certified Ethical Hacker (CEH) or Certified Information Systems Security Professional (CISSP). Your role will be crucial in improving our system's integrity and ensuring any potential applicant's background aligns with our organization's values.

    $127 (Avg Bid)
    $127 Avg Bid
    7 bids

    I'm looking for an ethical hacker to test and secure my web application, focusing on specific vulnerabilities and conduct a thorough background verification. - Web Application Security: - Focus on existing vulnerabilities - Emphasis on Injection attacks, XSS, and other potential weaknesses - Particularly interested in vulnerabilities related to social media integrations - Background Verification: - Criminal records checks - Education and credential verification - Character check Ideal Skills: - Proficient in ethical hacking - Strong experience in web application security - Knowledge of common web vulnerabilities - Competency in conducting background checks - Attention to detail and thoroughness in their work. Please bid if you have the neces...

    $139 (Avg Bid)
    $139 Avg Bid
    8 bids

    We're in need of legal consultation on contract and business law. Our requirements are as follows: - Review and analysis of our contrac...- Review and analysis of our contracts as and when needed. - Expertise expected on both service and lease agreements, involving extensive knowledge of contract law and corporate law - Providing consultancy on diverse legal issues pertaining to business law As an ideal candidate, you should be capable of a thorough review, reading between the lines, and be able to uncover potential legal vulnerabilities and provide advise by one-on-one discussions through calls. We will share the documents in advance and schedule a call for discussions afterwards. Prior experience in contract and business law and law degree is a must-have. Please quote yo...

    $39 / hr (Avg Bid)
    $39 / hr Avg Bid
    18 bids

    Currently seeking a developer skilled in using Ubuntu as a base image for Docker. You will be responsible for the set-up of Docker image in a cloud-based environment. The Docker image will be utilized for a web application, therefore prior experience in this area is preferred. Further, your key task will involve ensuring that these images are published to artifactory without any vulnerabilities. Expertise in Docker, Ubuntu, cloud technologies, and web application development will be highly beneficial to this project.

    $34 (Avg Bid)
    $34 Avg Bid
    2 bids

    I'm seeking an experienced Docker engineer to create a secure, clean Docker image, based on a Linux operating system. This image should be completely free from known vulnerabilities (CVEs). Key Features: - Container Isolation: The Docker image should be designed with efficient container isolation, avoiding potential security breaches. - Software: The Docker image should include Docker software. Skills & Experience Required: - Significant experience in Docker engineering and Linux operating systems. - Mastery in setting up container isolation in Docker. - Track record in designing Docker images free from CVEs. - Understanding of Docker software integration. I am looking for a seasoned professional who can promptly deliver a high-quality Linux-based Docker image meeti...

    $79 (Avg Bid)
    $79 Avg Bid
    9 bids

    Are...investigate and fix any issues with your WordPress Errors: From 404 errors to white screens of death, I'll identify the root cause of any site errors and implement fixes to restore Optimization: Slow loading times? I'll analyze your site's performance and make necessary optimizations to improve speed and Concerns: Worried about security vulnerabilities? I'll conduct security audits and implement measures to protect your site from 't let WordPress issues hold you back. Let me take care of them so you can focus on what you do best – running your business. Contact me today to get started!Note: Please message me with details about your specific issue before placing an order to ensure I can provide the assistance you need.

    $67 (Avg Bid)
    $67 Avg Bid
    1 bids

    I'm looking for a proficient freelancer...should be via ssh keys only. Also provide information on how to set up permissions for individual Laravel projects in /var/www folder. - Database Server: Set up a MySQL database server. Create a database and a user with appropriate permissions and ensure everything is secure. - Security: Implement necessary security measures to harden the servers and ensure the installation is safe from common vulnerabilities. Ideal candidates should have: - Proficiency in Linux server administration, particularly Ubuntu. - Extensive experience setting up Nginx and MySQL. - Strong understanding of web server and database server security. - Good communication skills to ensure clear documentation of the setup process. Please include relevant experien...

    $45 (Avg Bid)
    $45 Avg Bid
    40 bids