Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Hire Computer Security Consultants
Create a secure system to mitigate security vulnerabilities
Looking for someone (preferably in Malaysia, Singapore) to create a Technical Reference: Cybersecurity Labelling Scheme for Consumer IoT Security. You will need to actively coordinate with Subject-Matter experts (via messenger/skype) to come out with a Technical Reference. Kindly provide a sample if you have created it in past.
Provide reports and certification after performing Penetration testing, Vulnerability assessment on SaaS application
Need help with topics for: Threats and Adversaries BAN Logic Protocol Correctness Identification, Authentication, Authorisation Reputation Management Authentication Mechanisms Answers have to be justified well, not generic that apply to any but based on specific scenarios as per task.
I have downloaded this game before but it almost killed my PC. Can anyone help me install it safely without risk of viruses or harm to my desktop computer that I need for work? I don't want it for the mature stuff. Only for the character customization and kind of killing roulette the characters do to stream on my Twitch. You must speak English fluently, and be 18+. Please also include your Di...
I have a company and I give a cellphone / computer to employees and they use these devices to contact clients, we want to secure the client information. Goal: Prevent hackers from accessing the information, call, email, etc...
As the title states, I am looking to lease several residential ips from an ISP and attach them to a dedicated server! If you are able to help and guide I would be very interested in talking with you!
We are a security operation center seeking advise on structuring a better solution. Seasoned cyber security expert is required to define some key elements like tooling, user trainnings, use cases and runbooks. Major security operation soc processes need to be defined as well.
We need to check my mob. Security as well as mobile protection protocol because we can having some sucure data so we to identify no one hacker can hack my mobile and it just testing purpos any person has hacked my mob. Are not
Need an urgent Ethical Hacker/Cyber Security Expert. Proof/certification/CV/Resume need to be dropped in the personal chat box. Freshers are appreciated and invited for Internship. Expected practical proofs from earlier experienced persons. If you are a Ethical Hacker then you must prove yourself or else you will be checked and recommended without interview.
Need a cyber security website [login to view URL] CYBER SECURITY & HACKING COURSES courses available in all indian languages including english [login to view URL] provides for all SMES,CORPORATES AND OTHER PRIVATE SECTORS [login to view URL] business risk from cyber security attacks. [login to view URL] Assessments
I will ensure that the viewers gets fully satisfied with what i make out of my productivity. I have joined this project not just to make money but also to test my own caliber. The more i write the more it's benefitial for the self assessment part of mine. The dealers should make sure that the correct information reaches to the receiver.
Hi Guys, this is a University Lab with several themes such as network address translation, practical network security, and remote code execution. On each Theme there are 2-3 Practice Questions. I can say here that with the help of Putty and linux command we access to server and start the work. If someone is interested in being able to help me that it is signaled we could agree on the sum to b...
Need someone good expert in IT , networking and CCNA
Scope and objectives The overall goal for the proposed work aims to have an overall security measure for IoV by proposing an adaptable and dynamic BC-based security framework for multi-element authentication. The authentication must consider the limitations of powered IoV devices, network modeling, and the existing communication between various parties. Also, the delay introduced by the proposed ...
Integration of Individual Smart Services using BPM(Business Process Modeling) 3000 words
-Online English Conversation Teacher -be punctual, happy, trustful teacher who like to talk with studetns - Korean English Bilingual preferred (if it's possible , otherwise it's fine to communicate in English) -having class through internet with web cam -able to communicate managing team --be punctual, passion , friendly with teaching and talking with school students -have experience...
I would like to hire a cybersecurity specialist to help me documenting and planning several several tasks (example is attached ). My organization must comply with these requirements and I need it all proffisijnally documented. read the list carefully and lets start working.
Our site [login to view URL] is a Malta based sports betting website. We need an ethical hacker who will conduct advanced penetration tests on our website and identify any breaches or weaknesses in the security setup. The tests you need to conduct include but not limited to- * nmap * nikto * uniscan * zenmap * WPScan * Metasploit and Exploit-DB Exploits [along with CVE Details vulnerability datab...
I need someone who can solve intrusion detection problem, using federated learning and online learning approaches (mandatory).
Hi All , Looking for expert in below skillset Cyber security, splunk support, web applicationssecurity, security and compliance Must worked on Splunk tool Ping me if any one available
Inside Sales – Casual Looking for an experienced IT professional who is interested in doing some occasional work calling into existing customers to assess their experience using a given vendor’s product and then assessing the opportunity to upsell. You will need experience in speaking to all business roles within a customer base, whether it be procurement or C level. You will need to ...
Your task will be to configure a whole network, with IPv4, IPv6 addressing, static or dynamic routing, and DHCP or DHCPv6. it's for an exam on Monday (17th may). you will get 1.5 hrs for the test. i can show you some examples.
Safeguards information system assets by identifying and solving potential and actual security problems. Our personal and professional lives are interconnected by technology in ways that were unimaginable just a few decades ago. The cloud, mobility, and the powerful devices most of us have in our pockets enable a culture of convenience, and the ability to collaborate and be more productive. While t...