Computer Security Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 97,859 reviews, clients rate our Computer Security Consultants 4.9 out of 5 stars.
Hire Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 97,859 reviews, clients rate our Computer Security Consultants 4.9 out of 5 stars.
Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    26 jobs found

    I'm seeking an experienced network specialist to design a robust home network. The primary use will be for working from home, and it needs to support more than 10 devices. Key Requirements: - High-speed and reliable connectivity - Create a supply list - Ability to handle multiple devices without lag Ideal Skills: - Proven experience in designing home networks - Strong knowledge of security protocols - Ability to create a scalable network solution Please include your past work and relevant experience in your application.

    $471 Average bid
    $471 Avg Bid
    21 bids

    More details: Which specific areas do you need mentorship in? Configuration issues, Security policies, Traffic management What kind of configuration issues are you facing? This question was skipped by the user Which specific security policies do you need help with? This question was skipped by the user

    $108 Average bid
    $108 Avg Bid
    6 bids

    We are a startup working on a highly confidential and private internal project. Due to the sensitive nature of this initiative, we require a highly experienced Cybersecurity Specialist with strong expertise in advanced security testing and simulation techniques. This is not a basic vulnerability scanning or standard assessment role. We need an expert capable of performing comprehensive, advanced-level security testing against robust environments while maintaining complete confidentiality. Project Duration: 2 to 3 months (possible extension based on project needs) Compensation: ₹3,00,000 per month (premium budget for the right expert with proven advanced skills) Key Requirements: 5+ years of hands-on experience in advanced cybersecurity testing and security operations Must hold advance...

    $2393 Average bid
    $2393 Avg Bid
    4 bids

    We are looking for a highly experienced Kubernetes/Linux engineer to test a confidential technical environment involving Kubernetes ingress and production-style troubleshooting. You must be very comfortable with Linux, Kubernetes, kubectl, and understand what realistic command outputs, remediation paths, and incident workflows should look like inside a large engineering organisation. We are specifically looking for someone who has worked in real production environments and has previous on-call or incident-response experience. This is not an implementation or support role. Your job will be to act as an experienced engineer, work through a technical setup, and give direct feedback on and whether the workflow reflects how things are actually handled. We especially want someone confident eno...

    $11 / hr Average bid
    $11 / hr Avg Bid
    11 bids

    أبحث عن مهندس أمن شبكات محترف (Senior) لديه خبرة عملية قوية، ليقدم تدريب فردي (1-on-1) عن بُعد عبر Zoom، بحيث يرافقني خطوة بخطوة في سيناريوهات واقعية على مستوى Enterprise، حتى أصل إلى مستوى احترافي في Palo Alto (مستوى PCNSE)، مع بناء أساس قوي في Routing بمستوى CCNP. مستواي الحالي CCNA مع خبرة عملية في الـ Firewall، لذلك لن نركز على الأساسيات النظرية، بل سنبدأ مباشرة بالتطبيق العملي. سيتم تنفيذ جميع الأعمال داخل بيئة EVE-NG، حيث نقوم ببناء Lab متكامل وتطويره تدريجيًا، بدءًا من تصميم بسيط (HQ / Branch / ISP)، وصولاً إلى بيئة Production كاملة تشمل Firewalls، Routing باستخدام BGP، VPN بأنواعه (IPSec و SSL)، بالإضافة إلى سيناريوهات Prisma Access. المحاور الرئيسية: إعدادات Palo Alto المتقدمة (Policies, NAT, Threat Prevention, Log Analysis) مهارات Troubleshooting بشكل متقدم، خصوصًا تحليل Pac...

    $543 Average bid
    $543 Avg Bid
    11 bids
    SIM Procurement in Cambodia
    5 days left
    Verified

    Job Title SIM Card Procurement Specialist (Cambodia – Smart Network, Security Testing) Project Overview We are looking for a reliable freelancer based in Cambodia to support us with Smart network SIM card procurement for mobile network security and antifraud testing. This is a procurement-only project with potential for future collaboration if needed. Scope of Work: Procure Smart (Cambodia) SIM cards only Ensure SIMs are: Properly registered and activated Able to receive SMS and voice Confirm that SIM cards are functioning correctly on the Smart network Share required SIM details and confirm readiness for testing Important Usage Note: The SIM cards will be used strictly for mobile network testing purposes, focused on: Security analysis Antifraud testing OTP/SMS delivery validati...

    $108 Average bid
    $108 Avg Bid
    4 bids

    I am seeking a professional US-Based consultation to evaluate and potentially challenge a significant failure in Information Security governance and Incident Response (IR) at a major R1 university. I am currently navigating a situation involving a persistent, log-evasive intrusion where the institution has leveraged the significant power asymmetry inherent in large bureaucracies to circumvent accountability. I am looking for CISO-level expertise to dismantle a "no record found" defense that was manufactured through intentional administrative delay. **The core pillars of this case include:** * **Failure of Notice:** The institution was provided with explicit, immediate notice of a breach and data loss on 11/27. Despite this "on-notice" status, they remained unresponsive ...

    $51 / hr Average bid
    $51 / hr Avg Bid
    10 bids

    My personal profile was taken over: I can no longer log in, profile details were altered, the interface language switched, and friends have seen suspicious activity coming from the account. I exhausted Facebook’s self-service recovery steps and still have not reached a human at Meta, so this is my last resort. I need someone who truly understands Facebook’s security workflows, identity-verification channels, and escalation paths. Your mission is to pursue every legitimate option to restore my access. If that proves impossible, I expect a clear explanation of why, backed by evidence of each avenue you tried. Deliverables • Full restoration of the account, or • A concise report detailing all steps taken, Meta responses, and the definitive reason recovery fai...

    $187 Average bid
    $187 Avg Bid
    8 bids

    I need an experienced security specialist to bring my Microsoft 365 Business Premium environment (fewer than ten users) into full alignment with ISO 27001. The key areas I'm looking to cover are: 1 Clear Desk & Clear Screen Policy 2 Acceptable Use Of IT Assest Policy 3 Procedure Of User Access Management 4 Procudure Of Third Party Security 5 Vulnerability Management Process 6 Password Policy 7 Management Review Process 8 Mobile Usage & Electronic Media Policy 9 Teleworking Policy 10 Archival, Retention and Disposal Policy 11 Data Protection Policy 12 Information Continuity and Application Security Measure 13 System Configuration Standard IT Procudure Documents 1 Approved Software List 2 Asset Inventory 3 Deploying Anti Virus for Desktop 4 Workstation End ...

    $271 Average bid
    $271 Avg Bid
    23 bids

    We are looking for a highly experienced Kubernetes/Linux engineer to test a confidential technical environment involving Kubernetes ingress and production-style troubleshooting. You must be very comfortable with Linux, Kubernetes, kubectl, and understand what realistic command outputs, remediation paths, and incident workflows should look like inside a large engineering organisation. We are specifically looking for someone who has worked in real production environments and has previous on-call or incident-response experience. This is not an implementation or support role. Your job will be to act as an experienced engineer, work through a technical setup, and give direct feedback on and whether the workflow reflects how things are actually handled. We especially want someone confident eno...

    $237 Average bid
    $237 Avg Bid
    37 bids

    My Android phone may be compromised. I'm seeing strange apps or messages. Key requirements: - Identify and remove any hacks - Ensure phone security - Provide a report on findings Ideal skills and experience: - Experience with Android security - Familiarity with malware removal - Strong troubleshooting skills

    $155 Average bid
    $155 Avg Bid
    24 bids

    I need an experienced security specialist to carry out a thorough review of our bank system’s defences, with the spotlight on the core database and the overall security architecture that surrounds it. This is not a simple camera-or-alarm health check; instead, I want the underlying structure, data flows, and access logic examined for weaknesses that could compromise customer information or interrupt critical services. Scope of work • Map the current database design, supporting servers, and connected services. • Perform vulnerability assessments and penetration tests against these elements, documenting every finding with clear evidence. • Evaluate encryption, key management, privileged-user policies, and change-management procedures to be sure they align with m...

    $1288 Average bid
    $1288 Avg Bid
    11 bids

    We are a growing startup working on a highly private and confidential internal project. Due to the sensitive nature of this initiative, we require an experienced Cybersecurity Expert with strong background in advanced security operations, threat intelligence, and secure information handling Key Requirements: Proven expertise in cybersecurity, network security, and information protection Advanced skills in online research, deep investigation, and gathering intelligence from various web sources Experience with secure data collection, analysis, and management techniques Ability to work with complex security tools and environments while maintaining complete confidentiality Strong knowledge of anonymity practices, secure communication, and protective measures in challenging online scenarios...

    $2548 Average bid
    $2548 Avg Bid
    10 bids

    I’m looking for an experienced ethical hacker or cybersecurity professional who can teach me the fundamentals and practical skills. Topics I want to cover: • Basics of cybersecurity & ethical hacking • How VPNs work (proper usage, limitations—not illegal use) • Online privacy & digital footprint protection • Network security fundamentals • OSINT (open-source intelligence) basics • Social media security & account protection • Understanding how attacks happen (phishing, etc.) and how to defend against them I prefer: • 1-on-1 sessions (Zoom/Google Meet) • Practical demonstrations + real-world examples • Step-by-step learning plan Goal: • Learn cybersecurity for personal knowledge and protection Pleas...

    $34 / hr Average bid
    $34 / hr Avg Bid
    21 bids

    I am seeking a professional consultation to evaluate and potentially challenge a significant failure in Information Security governance and Incident Response (IR) at a major R1 university. I am currently navigating a situation involving a persistent, log-evasive intrusion where the institution has leveraged the significant power asymmetry inherent in large bureaucracies to circumvent accountability. I am looking for CISO-level expertise to dismantle a "no record found" defense that was manufactured through intentional administrative delay. **The core pillars of this case include:** * **Failure of Notice:** The institution was provided with explicit, immediate notice of a breach and data loss on 11/27. Despite this "on-notice" status, they remained unresponsive for **15...

    $34 / hr Average bid
    $34 / hr Avg Bid
    6 bids

    I need a an ethical hacker for pen testing and cyber security issues.

    $199 Average bid
    $199 Avg Bid
    43 bids

    I need a thorough code review of my full-stack React application. The code has been generated with Lovable and Claude Code, and reviewed by Sonar. The review should focus on: - Code Efficiency: Optimize performance and reduce complexity. - Security Vulnerabilities: Identify and mitigate potential security risks. - Coding Standards: Ensure adherence to industry best practices and coding standards. Ideal Skills and Experience: - Proficiency in React and full-stack development - Strong background in code review and optimization - Expertise in security best practices for web applications - Familiarity with industry coding standards and best practices Please provide examples of similar work done and your approach to this project.

    $3677 Average bid
    $3677 Avg Bid
    160 bids

    My production server runs on cPanel/WHM and I need a security-focused specialist to take over continuous protection duties. The priority is to keep the box clean, locked down, and fully recoverable at all times, so I’m commissioning an ongoing monitoring and troubleshooting arrangement rather than a one-off audit. Scope of work • Start with a comprehensive security audit: scan for existing malware, review logs, check permissions, and verify that all core services (Apache/Nginx, Exim, MySQL, SSH) follow current best practices. • Implement layered defences aimed at the three concerns I flagged—malware detection & removal, unauthorized-access prevention, and data encryption/protection. Typical tools might include CSF/LFD, ModSecurity rulesets, hardened SSH polic...

    $107 Average bid
    $107 Avg Bid
    17 bids
    Remove Fake Browser Malware
    1 day left
    Verified

    I’m dealing with an unwanted, fake browser that has embedded itself in my Windows machine and keeps hijacking my default settings. There is no antivirus installed at the moment, so I need a clean-up plan that relies on portable or web-downloadable tools (for example, Malwarebytes, Windows Defender Offline, AdwCleaner, or any reputable removal utility you recommend). The job is urgent—I’d like the system back to normal as soon as possible. Once the rogue software is gone, please restore my default browser settings and confirm that no residual processes, registry entries, or scheduled tasks remain. Deliverables • Complete removal of the fake browser and any associated malware • Verification that all browser and system settings are back to their legitimate st...

    $20 Average bid
    $20 Avg Bid
    30 bids

    We are looking for an experienced technical recruiter to help source and screen high-quality engineers for ongoing projects. Roles we are hiring for include: - AI / Machine Learning Engineers - Data Scientists - Data Engineers - Backend Engineers (Java, Go, Rust, C#) Responsibilities: - Source qualified candidates (LinkedIn, networks, communities, etc.) - Pre-screen candidates (technical fit, communication, experience) - Present a shortlist of high-quality candidates - Coordinate initial introductions/interviews Requirements: - Proven experience recruiting for technical roles (AI/ML or backend preferred) - Strong understanding of engineering profiles and tech stacks - Ability to identify high-quality candidates (not mass submissions) - Good communication and responsiveness Nice to have...

    $14 / hr Average bid
    $14 / hr Avg Bid
    16 bids

    I'm seeking a skilled blockchain developer to assist in the development of a utility governance token project on the Polygon network. The project is currently in the development phase and requires expertise in the following areas: Smart Contract Coding: Develop robust and secure smart contracts for the token. Token Distribution Mechanism: Design and implement a fair and efficient token distribution mechanism. Security Audit: Conduct a comprehensive security audit to identify and mitigate potential vulnerabilities. Ideal Skills and Experience: - Proficiency in Solidity and experience with the Polygon network - Strong background in blockchain security and smart contract audits - Experience in designing tokenomics and distribution models Your expertise will be crucial in ensuring a ...

    $924 Average bid
    $924 Avg Bid
    25 bids

    I'm seeking a skilled blockchain developer to assist in the development of a utility governance token project on the Polygon network. The project is currently in the development phase and requires expertise in the following areas: Smart Contract Coding: Develop robust and secure smart contracts for the token. Token Distribution Mechanism: Design and implement a fair and efficient token distribution mechanism. Security Audit: Conduct a comprehensive security audit to identify and mitigate potential vulnerabilities. Ideal Skills and Experience: - Proficiency in Solidity and experience with the Polygon network - Strong background in blockchain security and smart contract audits - Experience in designing tokenomics and distribution models Your expertise will be crucial in ensuring a ...

    $874 Average bid
    $874 Avg Bid
    18 bids

    Our BGMI (Battlegrounds Mobile India) infrastructure occasionally freezes when traffic surges. I want to put a permanent stop to that by building a preventive DDOS shield that covers every critical touch-point—login, in-game communication, and matchmaking. You will begin with a quick audit of the existing network layout and traffic patterns, then design and deploy a solution that blocks volumetric and application-layer attacks before they can overwhelm the servers. I expect minimal additional latency for legitimate players, clean documentation of every rule or service introduced, and a repeatable playbook I can apply to new nodes as we scale. Deliverables • Security architecture diagram and written rollout plan • Hardened configurations applied to the login, game, a...

    $1 - $5 / hr
    $1 - $5 / hr
    0 bids

    I need a seasoned ethical hacker to carry out a full-scope security assessment of my environment. The end goal is simple: uncover any vulnerabilities before malicious actors can exploit them, then give me clear, actionable steps to fix them. Please outline your relevant experience when you reply—real-world projects, certifications (e.g., OSCP, CEH), and any notable results will help me understand how you approach engagements like this. Scope • Reconnaissance and vulnerability discovery • Exploitation and privilege escalation (within agreed boundaries) • Post-exploitation risk analysis • Clean, well-structured reporting that ranks issues by severity and urgency Deliverables 1. Executive-level summary (non-technical) 2. Detailed technical report...

    $335 Average bid
    $335 Avg Bid
    15 bids

    We are looking for an experienced technical recruiter to help source and screen high-quality engineers for ongoing projects. Roles we are hiring for include: - AI / Machine Learning Engineers - Data Scientists - Data Engineers - Backend Engineers (Java, Go, Rust, C#) Responsibilities: - Source qualified candidates (LinkedIn, networks, communities, etc.) - Pre-screen candidates (technical fit, communication, experience) - Present a shortlist of high-quality candidates - Coordinate initial introductions/interviews Requirements: - Proven experience recruiting for technical roles (AI/ML or backend preferred) - Strong understanding of engineering profiles and tech stacks - Ability to identify high-quality candidates (not mass submissions) - Good communication and responsiveness Nice to have...

    $135 Average bid
    $135 Avg Bid
    25 bids

    Saya mencari seorang profesional pemasaran digital berpengalaman untuk meningkatkan keterlibatan akun Twitter brand kami. Target utamanya adalah menghidupkan percakapan, memperluas jangkauan organik, dan membuat audiens rutin berinteraksi melalui konten teks dan thread yang relevan serta memikat. Lingkup kerja: • Audit cepat atas performa Twitter saat ini, termasuk tone of voice dan postingan paling efektif. • Perancangan kalender konten satu bulan penuh berisi thread, polling, dan cuitan singkat pendukung. • Penulisan dan optimasi ±10–15 thread bermutu tinggi setiap bulan, lengkap dengan hook, CTA, dan penggunaan hashtag strategis. • Monitoring metrik keterlibatan harian, analisis mingguan di Google Analytics & Twitter Analytics, lalu laporan ri...

    $22 / hr Average bid
    $22 / hr Avg Bid
    7 bids

    Recommended Articles Just for You