The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Cloud Security is the process of securing and protecting information within the cloud by employing a combination of different technological and physical mechanisms. A Cloud Security Expert understands how to work with these mechanisms to ensure that the cloud-hosted data of a client remains secure, accurate, and protected from intentional or accidental access.
Hiring a Cloud Security Expert is beneficial for businesses that rely on keeping their data secure. A Cloud Security Expert can provide many lines of defence to secure a client's data, such as creating security protocols, providing surveillance capabilities with intrusion detection systems, or using encryption/decryption techniques to protect data during transit.
Here's some projects that our expert Cloud Security Experts made real:
Authorizing an expert Cloud Security Professional to put in place all these level of defences will help clients' businesses feel comfortable knowing their data is secure in the cloud.
It isn't just about having these security measures in place. It's also about having an expert who understands how each measure works together in harmony to create a near impenetrable fortress surrounding a business's sensitive data. That's why hiring a Cloud Security Expert in Freelancer.com makes sense for anyone looking for an extra layer of protection for their sensitive data stored in the cloud.
If you're looking for an additional way to enhance the security of your cloud network, open up a project today on Freelancer.com and you'll be connected with one of our trustworthy Cloud Security Experts right away.
From 12,341 reviews, clients rate our Cloud Security Experts 4.9 out of 5 stars.Cloud Security is the process of securing and protecting information within the cloud by employing a combination of different technological and physical mechanisms. A Cloud Security Expert understands how to work with these mechanisms to ensure that the cloud-hosted data of a client remains secure, accurate, and protected from intentional or accidental access.
Hiring a Cloud Security Expert is beneficial for businesses that rely on keeping their data secure. A Cloud Security Expert can provide many lines of defence to secure a client's data, such as creating security protocols, providing surveillance capabilities with intrusion detection systems, or using encryption/decryption techniques to protect data during transit.
Here's some projects that our expert Cloud Security Experts made real:
Authorizing an expert Cloud Security Professional to put in place all these level of defences will help clients' businesses feel comfortable knowing their data is secure in the cloud.
It isn't just about having these security measures in place. It's also about having an expert who understands how each measure works together in harmony to create a near impenetrable fortress surrounding a business's sensitive data. That's why hiring a Cloud Security Expert in Freelancer.com makes sense for anyone looking for an extra layer of protection for their sensitive data stored in the cloud.
If you're looking for an additional way to enhance the security of your cloud network, open up a project today on Freelancer.com and you'll be connected with one of our trustworthy Cloud Security Experts right away.
From 12,341 reviews, clients rate our Cloud Security Experts 4.9 out of 5 stars.My site already runs through Cloudflare and basic protection is in place, yet I know the platform can do much more for security. I want a seasoned Cloudflare specialist to go through my current setup, tighten every loose end, and leave me with a hardened configuration I can trust. Scope of work • Firewall rules – Review what I have, remove redundancies, and add precise allow/deny rules and rate limits that match real-world traffic patterns without blocking legitimate users. • SSL/TLS – Move the zone to the most secure Full (Strict) mode, renew or generate any required origin certificates, enforce HSTS and secure ciphers, and confirm end-to-end encryption is flawless. • Bot management – Configure Bot Fight Mode and related features so genuine traffic ...
We are looking for an experienced IT Systems Administrator who specializes in: Microsoft Intune (endpoint security, device compliance, configuration profiles) Microsoft 365 administration (Exchange Online, Teams, SharePoint, OneDrive, Entra ID / Azure AD) Windows device onboarding, security baselines, BitLocker, Defender, and software deployment Scope of work includes: Setting up and enforcing endpoint security and compliance policies for laptops Creating and managing Intune configuration profiles and app deployments Hardening devices with Defender, BitLocker, and other M365 security tools Supporting user onboarding, access control, and general M365 administration Providing documentation for setup and ongoing maintenance Requirements: Proven experience with Intune and Microsoft ...
I run a custom web application on an Ubuntu droplet at DigitalOcean. Although every obvious door is locked—UFW rules are strict, all unnecessary ports are closed, Fail2ban is active, and SSH keys have been rotated—crypto-miners keep finding a way in and even wiping my authorized_keys file. and they also remove the logs. I need a specialist who can dig deeper than the basics, trace exactly how the breaches occur, close those vectors for good, and leave the box fully hardened. Think kernel-level auditing, service isolation, intrusion-detection tooling, automated patching, and any other best practices you know work on Ubuntu in a cloud-VM context. Deliverables I must see before sign-off: • A concise report pinpointing the original compromise path(s) and the corrective...
I am an entry-level cybersecurity professional transitioning into GRC and security roles. I am building high-quality, real projects for my resume and GitHub and I want to understand every decision, not just receive finished documents. This is not a copy-paste or template job. I am looking for someone who can both build and teach. I will provide detailed project READMEs that describe the scenarios and expectations. Your role is to implement them properly and explain the reasoning behind each decision until I clearly understand it. Scope of Work You will work on one or more of the following projects (starting with one, expanding if the quality is good): ISO 27001:2022 Statement of Applicability with justified exclusions Writing a defensible security risk acceptance document Designing an...
I’m seeking a seasoned Pre-Sales Cybersecurity Engineer who can jump in part-time and strengthen our sales motion with large-enterprise prospects. You’ll own the technical conversation from first discovery through contract signature, translating complex security capabilities into clear business value. Your day-to-day will revolve around three core outcomes: • Technical presentations that engage executive and engineering audiences, highlighting our strengths across Network Security, Endpoint Security, and Cloud Security. • Accurate, persuasive responses to RFPs and RFIs, complete with architecture diagrams, deployment options, and measurable ROI statements. • Robust demo and lab environments you build, tune, and maintain so prospects can test drive features ...
Penetration Test of the IT/OT System of a Photovoltaic Power Plant and Battery Energy Storage System 1. Subject of the Contract The subject of this contract is the execution of a comprehensive penetration test of the IT/OT infrastructure of a photovoltaic power plant and battery energy storage system to assess its resilience against cyberattacks and unauthorized remote control. The test must simulate real-world cyberattack scenarios, focusing on the possibility of: Unauthorized remote access Takeover of device control Manipulation of energy production or storage Disruption of system availability Exploitation of communication interfaces Leakage of sensitive data 2. Scope of Testing The test shall include: 2.1 External Testing Simulation of attacks from the public internet Analy...
Conduct a CREST‑approved penetration test covering OWASP Top 10, infrastructure, and API endpoints. Provide a full report and remediation guidance. You must be UK‑based and able to invoice us as a self‑employed contractor or registered business. You will be working as part of a small team during an intensive 2‑week delivery sprint. Deliverables: Pen test plan Full CREST report Remediation list Optional retest (if included in your service)
Backend for a my app using FastAPI, WebSockets/WebRTC, and modern AI services (Whisper STT, LLaMA-style LLMs, Kokoro/Coqui/Piper TTS, Wav2Lip for avatar video). The system powers realtime speech transcription, AI-assisted text polishing, and interactive avatar-based conversations. Responsibilities Backend ownership: Design, maintain, and extend FastAPI HTTP + WebSocket/WebRTC endpoints. AI integration: Connect and optimize Whisper STT, LLMs, and TTS services for low latency and high reliability. Audio/video pipelines: Handle streaming audio (buffering, resampling, normalization). Integrate avatar video generation with Wav2Lip and related tools. Data & performance Work with MongoDB (and/or relational databases) for schemas, indexing, and efficient queries. Implement caching and backg...
We are a new SaaS startup looking for a rigorous security specialist to perform a **comprehensive end-to-end security audit**. Our mobile app (iOS & Android) is our core product and requires deep-dive scrutiny, while our landing pages and staff admin panel need a focused vulnerability assessment to ensure total ecosystem integrity. ### **The Scope of Work** We need more than a generic automated scan; we require a blend of manual penetration testing and structured configuration review. * **Mobile App (Deep Dive):** Comprehensive testing based on the **OWASP Mobile Application Security (MAS)** framework. This includes binary analysis, session management, local data storage security, and API communication. * **Web & Admin Panel:** Vulnerability assessment of the staff-facing das...
We are a small software development team looking for an experienced Azure Administrator (AZ-104 certified) who can support us on a low-hours monthly retainer basis. The primary requirement is to associate your active AZ-104 certification with our Microsoft Partner tenant and be available for occasional architecture and infrastructure questions. You should be comfortable working in a mostly advisory role, where some months might be quiet and other months we may reach out with a few days’ notice for help. Responsibilities: Associate your current AZ-104 (Azure Administrator Associate) certification with our Microsoft Partner tenant Provide ad-hoc guidance on: Azure RBAC, permissions, and access control Virtual networks, subnets, NSGs, private endpoints, and related networking Bes...
I need a secure healthcare system built on AWS RDS. It should include: - Patient registration - EHR storage - Claim submission with automated validation - Rule-based fraud detection - Role-based dashboards for doctors and patients - Encrypted, API-driven interoperability Ideal skills and experience: - Cloud database management (AWS RDS) - Data encryption knowledge (preferably AES 256-bit) - API development and integration - Experience in building secure healthcare applications Please provide a portfolio showcasing similar projects.
I need help resolving a configuration error on my storage server, specifically related to permissions. This issue is preventing me from accessing an Amazon S3 remote server. Users can't download files because contacting Amazon S3 not working. See error attached. Key requirements: - Diagnose and fix server (Contabo) issues - Ensure proper access to Amazon S3 so files download on platform - (local files work, ones on Amazon S3 can't be downloaded). Ideal skills and experience: - Expertise in storage server configuration - Familiarity with Amazon S3 and permissions settings - Problem-solving skills for configuration errors
I need help resolving a configuration error on my storage server, specifically related to permissions. This issue is preventing me from accessing an Amazon S3 remote server. Users can't download files because contacting Amazon S3 not working. See error attached. Key requirements: - Diagnose and fix permissions issues - Ensure proper access to Amazon S3 Ideal skills and experience: - Expertise in storage server configuration - Familiarity with Amazon S3 and permissions settings - Problem-solving skills for configuration errors
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.