Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

103,016 értékelés alapján az ügyfelek 4.9 / 5 csillagot adtak Computer Security Consultants szabadúszónknak.
Alkalmazza Computer Security Consultants szabadúszót

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

103,016 értékelés alapján az ügyfelek 4.9 / 5 csillagot adtak Computer Security Consultants szabadúszónknak.
Alkalmazza Computer Security Consultants szabadúszót

Szűrő

Legutóbbi kereséseim
Szűrés erre:
Költségvetés
eddig:
eddig:
eddig:
Típus
Készségek
Nyelvek
    Munka státusza
    18 munkát találtunk

    The project is related to Service-Oriented Architecture (SOA) and web-service environments, with a focus on protecting service performance and availability using a QoS-aware intrusion detection framework. The work involves detecting malicious traffic that affects service quality, such as denial-of-service, brute-force, and other intrusion behaviors, using machine learning and flow-based network analysis. And for the freelancer, write this: What I need in the technical person: I need a technical freelancer who has strong knowledge in: • Service-Oriented Architecture (SOA) or web-service systems • Network security and intrusion detection • Machine learning / anomaly detection • Python and scientific implementation • Data preprocessing, feature engineering, a...

    €459 Average bid
    €459 licitátlag
    51 árajánlat

    I need a reliable partner who can jump in as first-line support for my staff and keep everyone productive. The focus is on everyday desktop and laptop issues—anything from random hardware glitches to blue screens or slow performance. On the software side you’ll be handling operating system troubleshooting, rolling out application installs and updates, and resolving antivirus or other security alerts before they spread. Network hiccups are another pain point. Expect tickets about dropped internet connections and Wi-Fi dead zones; you’ll diagnose, reconfigure, or escalate as needed so users aren’t offline for long. Although servers and other infrastructure sit in the background, smooth collaboration with my existing IT team is essential when a problem touches their...

    €400 Average bid
    €400 licitátlag
    50 árajánlat

    I’m ready to have my website professionally stress-tested so I can patch every weak spot before it becomes a problem. The engagement centres on two critical areas that hold our most sensitive logic and data—the Login System and the User Data Storage modules. Within those components I want you to probe specifically for SQL Injection, Cross-Site Scripting (XSS) and Broken Authentication issues, emulating real-world attack scenarios while staying fully within ethical boundaries. Industry-standard tooling such as Burp Suite, OWASP ZAP, sqlmap, or their equivalents is expected so results are reproducible and mapped against OWASP Top 10. All findings must be compiled in a comprehensive, developer-friendly document that not only confirms each vulnerability but explains impact, suppli...

    €205 Average bid
    €205 licitátlag
    40 árajánlat

    I’m ready to have my website professionally stress-tested so I can patch every weak spot before it becomes a problem. The engagement centres on two critical areas that hold our most sensitive logic and data—the Login System and the User Data Storage modules. Within those components I want you to probe specifically for SQL Injection, Cross-Site Scripting (XSS) and Broken Authentication issues, emulating real-world attack scenarios while staying fully within ethical boundaries. Industry-standard tooling such as Burp Suite, OWASP ZAP, sqlmap, or their equivalents is expected so results are reproducible and mapped against OWASP Top 10. All findings must be compiled in a comprehensive, developer-friendly document that not only confirms each vulnerability but explains impact, suppli...

    €160 Average bid
    €160 licitátlag
    41 árajánlat

    We are seeking an experienced cybersecurity professional to develop a high-quality, advanced-level practical ethical hacking video course built around a realistic simulated enterprise attack environment. This course must focus heavily on hands-on execution and demonstrate a structured multi-step attack workflow inside a controlled lab network. The final deliverable must contain approximately 10–12 hours of fully edited, polished video content (final runtime after editing). Budget: 40,000 INR (Maximum) Timeline: 30–60 days Core Course Requirements The course must: Be advanced-level practical content Be structured around a connected simulated company environment Include multiple interconnected attack scenarios Demonstrate complete attack chains Include reconnaissance, e...

    €281 Average bid
    €281 licitátlag
    4 árajánlat

    I’m a complete beginner in wireless security and want to build solid, practical skills in penetration testing for Wi-Fi networks. Over a series of one-on-one sessions, I’d like you to walk me through fundamentals, tools (Kali Linux, Aircrack-ng, Wireshark, etc.), attack simulations, and safe lab setup so I can eventually plan and execute my own wireless assessments responsibly. Please share examples of past work that prove you’ve carried out real-world wireless engagements or successfully mentored others in this niche. Concrete demonstrations—screenshots, anonymised reports, short video clips—help me judge fit quickly. We’ll meet online, screen-share, and practice live. Each session should end with actionable homework and clear checkpoints so I can tra...

    €10 Average bid
    €10 licitátlag
    2 árajánlat

    The latest patch wiped out every pointer offset my companion app relies on, so most of its memory reads now return garbage and several packet handlers no longer align with the game’s updated structures. I need an expert who can jump straight into the new build, reverse the changed layouts, and hand back corrected offsets (and any packet-structure tweaks you discover) so the tool is fully functional again. Here’s what success looks like for me: • A clean list of updated base addresses, dynamic offsets, and any changed pointer chains tested on the current live client. • Confirmation that each fix restores the original in-game features of my app without crashes or desync. • A brief summary of any packet format adjustments you uncover while tracing traffic so I ...

    €449 Average bid
    €449 licitátlag
    46 árajánlat

    My wired Ethernet network has stopped working, and I need a skilled technician to get it back online quickly. I’ve already ruled out basic cable swaps, so I’m looking for someone who can: • Diagnose the root cause of the outage (switch, patch panel, NIC, or configuration). • Walk me through any testing steps I should perform on-site (ping, traceroute, link-light checks). • Provide clear, step-by-step instructions or remote-session support to restore connectivity. • Verify that all connected devices regain stable internet and LAN access once the fix is applied. • Offer a brief preventive checklist so I can avoid the same issue in the future. I can share photos of the rack layout, current IP scheme, and error messages from the router and switch interfac...

    €87195 Average bid
    €87195 licitátlag
    5 árajánlat

    I have a small office network—fewer than twenty endpoints—that I want thoroughly examined for weaknesses. The immediate focus is a vulnerability assessment combined with a full network-security audit. Pen-testing isn’t required right now, but I would like the audit to be detailed enough that we could progress smoothly to active exploitation tests later if needed. Scope – Map every device and service, then scan using industry-standard tools such as Nmap, Nessus or OpenVAS. – Analyse configurations (firewall rules, router settings, shared resources, OS hardening) and identify misconfigurations or outdated software. – Provide a clear, prioritized remediation plan. Critical issues first, followed by medium and low-risk findings. – Conclude wit...

    €19 / hr Average bid
    €19 / hr licitátlag
    30 árajánlat

    Job Title: Cyber Security Engineer (Checkpoint Firewall & Akamai WAF) Duration: 2 Hours per Day Budget: ₹30,000 per Month Start Date: Immediate About the Role We are looking for a skilled Cyber Security Engineer with expertise in Checkpoint Firewall and Akamai WAF to support our network security infrastructure. The ideal candidate will be responsible for managing firewall configurations, monitoring network security policies, and assisting in the implementation of web application firewall protections to safeguard enterprise systems. Key Responsibilities Configure, manage, and optimize Checkpoint Firewall environments (policy management, rule configuration, and troubleshooting). Implement and maintain Akamai Web Application Firewall (WAF) rules to protect web applications from security t...

    €9 Average bid
    €9 licitátlag
    8 árajánlat

    Yesterday I noticed that every message and folder in my Hotmail account had vanished after an unauthorized login. I have since taken back control of the mailbox and switched on two-factor authentication, but Microsoft support told me they are unable to restore the data. I still need those emails. I’m after someone who knows the ins and outs of / Microsoft 365 back-end recovery, server-side retention, and forensic mail restoration. If you can locate and reinstate the deleted items—whether through the Recoverable Items folder, legacy PST pulls, or other Microsoft recovery channels—and then harden the account so this can’t happen again, please let me know your approach and an estimated timeline. Acceptance criteria • All recoverable emails and folders resto...

    €119 Average bid
    €119 licitátlag
    5 árajánlat
    Secure Laptop Storage
    2 nap left
    Ellenőrzött

    I need a reliable person located in the United States who can keep my personal laptop safely at their place, plug it in to power, and turn it on once every day. There are no special tasks to run—simply boot it up, confirm it’s online through your regular, stable internet connection, and let it sit for a moment so remote services can sync. After that, you can shut it down again. What matters most is trustworthy, secure storage in a clean, smoke-free environment, and the discipline to power it on daily at roughly the same time. No dedicated network, VPN, or extra equipment is required on your side; a standard home broadband line is sufficient. If you can provide a safe spot, dependable internet, and consistent daily availability, let’s talk about the hand-off logistics an...

    €19 / hr Average bid
    €19 / hr licitátlag
    22 árajánlat

    Scenario Background: The scenario assumes that you are working as a security expert for a fictional company, Acme Coffee Company. The company includes several roles, including Bruno (CEO), Spike (Vice President of Sales), Eilik and Eilika (Sales), Loki (System Administrator), and Avery (Marketing). Loki has built a new company server, and Bruno has hired you to conduct a comprehensive security analysis and assessment of that server and submit a complete report. The final report should include your findings, techniques, graphics, and methodology, along with recommendations for improving any security issues identified. Video Overview: The instructor explains that the final project will provide a target machine personally built by the instructor to represent the Acme company environment. Yo...

    €127 Average bid
    €127 licitátlag
    13 árajánlat

    Se requiere especialista en ciberseguridad / redes / seguridad informática para desarrollar la parte práctica de un trabajo personal. El proyecto consiste en la implementación y validación técnica de una arquitectura Zero Trust en un entorno virtualizado, comparándola con una arquitectura tradicional basada en VPN. ALCANCE DEL TRABAJO El freelancer deberá: 1. Construir laboratorio virtual Crear entorno simulado de red empresarial. Implementar: Servidor de autenticación (IAM o similar). Servidor de aplicaciones. Segmentación de red. Endpoint remoto. Gateway o firewall. Puede utilizar herramientas como: VMware, VirtualBox, GNS3, Proxmox, Azure Lab, AWS Lab u otra propuesta técnicamente viable. 2. Implementar arquite...

    €18 / hr Average bid
    €18 / hr licitátlag
    9 árajánlat
    White-Box Web App Penetration
    1 nap left
    Ellenőrzött

    I am ready to put my in-house web application through a thorough white-box penetration test and need a seasoned ethical hacker to run point. Because I can supply source code, architecture docs, and admin-level credentials, you will have full visibility to explore logic flaws, insecure configurations, and anything else that could turn into a real-world exploit. A key requirement is prior experience registering newly discovered vulnerabilities in official government vulnerability databases or repositories; I will rely on you not only to uncover issues but also to craft the correct disclosure package so the finding can be submitted and tracked according to policy. Scope • Inspect the entire codebase, APIs, and third-party integrations. • Execute manual and automated testing us...

    €173 Average bid
    Titkos
    €173 licitátlag
    21 árajánlat

    Looking for a CCNA certified expert Strong hands-on experience with lab-based questions in live practice test Proven ability to solve simulation-based scenarios in real time Capable of providing accurate and reliable solutions on the spot Good analytical and problem-solving skills

    €5 / hr Average bid
    €5 / hr licitátlag
    10 árajánlat

    My phone and Mac-based computer were recently compromised and I am seeing clear signs of unauthorized access, suspicious background activity, and some missing files. I need an experienced ethical hacker or cybersecurity specialist who can remotely examine both devices, identify every backdoor or malicious profile, recover any lost data where possible, and lock everything back down so I am fully in control again. Your work will involve a forensic sweep of macOS (and the companion phone, likely iOS) to trace how the intruder got in, remove any malware or configuration profiles they left behind, and then hard-harden the system—ensuring strong authentication, updated firmware, and airtight network settings. Please be comfortable using common incident-response tooling such as Wireshark, ...

    €144 Average bid
    €144 licitátlag
    18 árajánlat

    Project Overview Designed and implemented an intelligent DDoS detection and mitigation framework for Software-Defined Networking (SDN) based Vehicular Ad-hoc Networks (VANETs) to ensure secure, reliable, and low-latency vehicle-to-infrastructure (V2I) communication. The system leverages SDN’s centralized control to dynamically monitor network traffic and mitigate DDoS attacks in real time, ensuring uninterrupted safety-critical vehicular services. Key Innovations: SDN-Based Centralized Security Control OpenFlow-enabled SDN controller Global view of VANET traffic behavior Intelligent DDoS Detection Flow-level traffic analysis Anomaly detection using ML / Deep Learning (LSTM Autoencoder / Hybrid model) Real-Time Mitigation Strategy Malicious vehicle flow isolation Dynamic ru...

    €74 Average bid
    €74 licitátlag
    10 árajánlat

    Ajánlott Cikkek Kifejezetten Önnek