Informatikai biztonság Jobs
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
- Establishing secure network infrastructure
- Improving system performance and leveraging encryption
- Developing security frameworks for organizations
- Implementing authentication measures for digital identification
- Evaluating risks of cyber incident exposure
- Researching the latest security regulations for compliance
- Crafting secure policies for employee engagement
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
92,586 értékelés alapján az ügyfelek 4.85 / 5 csillagot adtak Computer Security Consultants szabadúszónknak.Alkalmazza Computer Security Consultants szabadúszót
Please note I have been trying to connect back my Jenkins and Vault - did have it working and now trying to get it back - the video that I have been watching is here: Please note I can share my desktop and we can look at these servers that I have running on my computers at home as a Jenkins VM and Vault VM. Proving that I can again get my credentials from Vault in my jobs that worked proves it is working and is the goal hopping to reach. There is hope you can give your “best” price; unemployed, and have cancer with bills backing up, $10 possible? Please note $10 is the max total that I can handle for this. Will leave a Glowing paragraph of feedback 5 stars My funds are low but will pay quick and leave 5 stars. Please give your best possible for your bid ? (somethin...
I am in need of an ethical hacker who can perform a vulnerability assessment on my mobile application. The ideal candidate should have experience in mobile application security and be able to provide both high-level and technical details in the vulnerability assessment report. Skills and Experience: - Experience with mobile application security - Knowledge of common mobile application vulnerabilities - Ability to perform a thorough vulnerability assessment - Experience with both high-level and technical report writing.
I am looking for a technical support specialist to help me with a specific issue. I need an ethical hacker to troubleshoot, install, configure, and set up hardware and networks. The ideal freelancer should have relevant past work experience and include a detailed project proposal. Time is of the essence with this issue, so I need the work completed within a week.
Need to track exact location of an IP address. Link locator
I am looking for a freelancer who can help me implement Virtual SonicWall NSv 470 in KVM Hypervisor VM. The project requires someone with experience in cloud-based environments and advanced sonicwall security. My current network setup is cloud-based, and I require advanced sonicwall security features such as Intrusion Prevention System (IPS), Content Filtering, and Advanced Threat Protection (ATP). The desired bandwidth for the network is between 100 Mbps and 500 Mbps. Ideal skills and experience for the job include: - Experience in implementing Virtual SonicWall NSv 470 in KVM Hypervisor VM - Knowledge of cloud-based environments and security features - Familiarity with Intrusion Prevention System (IPS), Content Filtering, and Advanced Threat Protection (ATP) - Ability to ...
I am looking for a freelancer to implement a wireless networking system for my small network of 1-10 devices. The ideal candidate should have experience in wireless network implementation and configuration. The project will focus on the following areas: - Wireless Network Implementation: The freelancer will be responsible for setting up and configuring the wireless network for my small network of devices. - Network Security: The freelancer should have a good understanding of network security and should be able to implement appropriate security protocols to ensure the network is secure. - Troubleshooting: The freelancer should also be able to troubleshoot any issues that may arise during the implementation process. Skills and experience required: - Experience in wireless network implemen...
Hello I am looking for security engineer who is good at BeyondTrust You must be familiar with BeyondTrust I have some technical questions regarding this Let me know
I am looking for a freelancer who can help me resolve my CentOS network connectivity issues. Currently, I am experiencing lost connection on live only access through rescue mode. I have made recent changes to my network configuration or server settings, specifically, I have changed my network hardware. Ideal skills and experience for this job include: - Proficiency in CentOS network configuration and troubleshooting - Experience with network hardware - Knowledge of server settings and firewall configuration The freelancer should be able to identify and resolve the issue quickly to ensure smooth network connectivity.
Our organization is looking for an experienced professional to conduct a network penetration test on our IT infrastructure. We are looking for comprehensive testing that will include probing and evaluating our network security defenses. Our IT infrastructure is relatively small, with less than 50 devices. It is essential that we have this testing completed as soon as possible. If you are confident in your skills and have experience in conducting penetration testing, then we'd love to hear from you. We're seeking a capable and diligent individual who has a thorough understanding of networks and web applications, as they will be responsible for uncovering and analyzing any security flaws present in our system. Ideally, the chosen candidate would have knowledge in areas such as codi...
I will attach the full project description in a word document but to keep it simple, I require a Report, Feasibility Study, COCOMO II Estimation, Application of security measures within a docker container such as Firewall, Encryption, Authentication etc as well as a video tutorial of how to deploy the docker container application. The most important part of the project is the Report, Feasibility Study and COCOMO II Estimation as it is important to explain the Advanced Analysis and Design when it comes to implementing the Security Features. I will also attach the template for the feasibility study and COCOMO II estimation spreadsheet.
Need a windows OS and servers hardening checklist for my organisation
I'm looking for a freelancer to assess and enhance my current Windows Server and Active Directory setup. I am currently running Windows Server 2019 and have no specific issues with my system; I am mainly looking for improvements to optimize my setup. In regards to backup and disaster recovery, I am open to any method though I do not currently have a preference. I am looking for expert insight in assessing and enhancing my existing setup to ensure the best performance and security possible.
I am looking for a proficient in machine learning, to help me to find the perfect dataset to detect malicious SSL certificates using a supervised learning algorithm.
I am looking for a Network Design freelancer to work on a big project that involves both LAN and WAN. The ideal candidate should be experienced in designing complex networks and should have a good understanding of network security. Scope of the project: - The project involves designing a network that connects more than 100 locations. Required skills: - Extensive knowledge of LAN and WAN - Experience in designing complex networks - Strong understanding of network security - Knowledge of network devices such as switches, routers, and firewalls - Lots of more Deliverables: - A detailed network design that includes all necessary devices and configurations - Implementation plan for the network - Network documentation and diagrams If you are an experienced Network Design freelancer with the...
I am in need of an expert in Linux security to perform a one-time setup of intrusion detection and prevention measures on my system. Currently, basic security measures are in place, but I am looking to enhance the overall security of my system. The ideal candidate should have experience with the following: - Intrusion Detection and Prevention - Firewall Configuration - Encryption - Linux security best practices The project requires a one-time setup of the above measures and does not involve ongoing monitoring and maintenance.
Hello, I am needing to consult on a security platform or software for my windows server 2019, I want to be alerted everytime someone is logging in(there are 5 users via RDS on the local network) that can also collect event logs and create a portal to view security activity on the server, and network to I suppose. Thank you.
We are seeking a skilled and experienced assembler Specialist with expertise in HASP dongles to assist with a specific project. The ideal candidate will have a strong understanding of software and hardware systems, along with the ability to analyze and reverse engineer the functionality of HASP dongles. Responsibilities: Analyze and understand the functionality and security mechanisms of HASP dongles. Reverse engineer the firmware or software associated with the HASP dongles. Identify and document the communication protocols and encryption algorithms used by the dongles. Develop or modify software tools and utilities to assist in the reverse engineering process. Collaborate with the development team to provide insights and recommendations based on reverse engineering findings. Ensure com...
I am looking for a skilled freelancer who can help me solve my HTTP Flood DDoS attack. I currently have DDoS protection in place, but I need someone with experience in solving this type of attack. Ideal Skills and Experience: - Knowledge and experience with solving HTTP Flood DDoS attacks - Familiarity with cloud hosting environments - Ability to work with existing DDoS protection solutions - Strong communication skills to keep me updated on progress and any necessary actions that need to be taken.
My project is to create a Discord server for a gaming experience. I need a server that is versatile enough to accommodate a wide range of users and provide a great gaming experience. I don't have a specific list of channels and features that I require for the server, but I'd welcome suggestions from any potential freelancers who are interested in the project. Security is of utmost importance, so advanced moderation and security measures need to be implemented to ensure the safety of both the users and the server itself.
Task 1: Penetration Testing are essential for the security of organizations. It examines whether an organization's security policies, procedures and controls are genuinely effective or not. The penetration testing report provides a complete overview of the uncovered vulnerabilities with a POC (Proof of Concept) and recommendations to fix those vulnerabilities with priority details. The article “” includes a penetration testing against the security controls within their information environment. It provides a practical demonstration on the effectiveness of the security controls and their susceptibility to be exploited. Analyse any five vulnerabilities that were identified in the report by studying the tools used to detect them and their risks. Critically evaluate any...
I am looking for an ethical hacker to help me secure my Android phone from unauthorized access. I think my current company that has hired me is hacking my phone. Specifically, I am concerned about the security of my data, socal apps and need a complete solution to ensure its safety. Currently, I am not sure if I have any security measures in place and would like to upgrade them if I do. My preferred method for securing my phone is by setting up device encryption. I can pay you 1000 Rs for this Ideal skills and experience: - Experience in ethical hacking and mobile security - Knowledge of Android security measures and best practices - Experience with setting up device encryption - Familiarity with security apps and custom security measures
I am looking for a highly skilled L1 network engineer for one of our customers in Germany (welgen-im-allgau)and take on a long-term position in enterprise environment. The engineer will be responsible for monitoring the networks as well as troubleshooting any issues that arise and configuring our system to ensure that everything runs smoothly or basic L1 support, This project is expected to run for three years, engineer required to be onsite for two days a week only on Tuesday and Thursday (9am to 5pm)so the ideal candidate must be committed to the long term. As well as great technical and communication skills, the engineer should also possess strong problem-solving abilities and a comprehensive understanding of various network technologies. The engineer should also be able to work efficie...
I am looking for a highly skilled L1 network engineer for one of our customers in Germany (welgen-im-allgau)and take on a long-term position in enterprise environment. The engineer will be responsible for monitoring the networks as well as troubleshooting any issues that arise and configuring our system to ensure that everything runs smoothly or basic LA support, This project is expected to run for three years, engineer required to be onsite for two days a week only on Tuesday and Thursday (9am to 5pm)so the ideal candidate must be committed to the long term. As well as great technical and communication skills, the engineer should also possess strong problem-solving abilities and a comprehensive understanding of various network technologies. The engineer should also be able to work efficie...
I am seeking a skilled programmer who can perform a source code analysis on a file that contains a trojan. The programming language used is C#. Although the file's current use in a production environment is uncertain, my main purpose for the analysis is to understand the trojan's functionality. Therefore, I require an experienced professional who is capable of identifying security vulnerabilities and comprehending the inner workings of the malicious file. If you possess the necessary skills and expertise, please contact me.
CCTV Technical for Residential Security and Surveillance Project Overview: We are looking for a CCTV Technical expert to install and set up a CCTV system for our residential property. The system should serve both security and surveillance purposes. Remote Access: We are not sure if we require remote access to the CCTV system and would like to discuss this further with the freelancer. Location: The CCTV system will be installed in a residential location. Ideal Skills and Experience: - Proven experience in installing and setting up CCTV systems - Knowledge of the latest CCTV technology and trends - Ability to advise on the best CCTV system for our needs - Knowledge of remote access options - Excellent communication skills to discuss requirements and provide recommendations.
Talio es una empresa que ofrece servicios IT a clientes en distintos entornos, entre ellos Microsoft 365. Estamos buscando un técnico para optimizar y explotar el potencial de Intune y Endpoint Defender en entornos Windows Desktop y Server. Esta persona será responsable de brindar soporte técnico y expertise en la administración y configuración de los servicios de Microsoft Intune y Endpoint Defender en entornos Windows Desktop y Server. Su objetivo principal es revisar y evaluar la configuración y el rendimiento de los tenants de clientes para asegurarse de que estén optimizados y protegidos de manera adecuada y formar a los técnicos de Talio en labores de implementación, administración y optimización de Mi...
My friends have been scammed for champions league finals tickets and the website and scammer are still operating. I need to find the scammers location and ping him
I am seeking a consultant to provide implementation assistance for my MDM solution, as I am currently facing data security concerns. My organization is small, with 1-50 employees. The ideal candidate for this job should have experience in MDM implementation and be able to provide recommendations for improving data security. Other skills that would be beneficial for this project include: - Knowledge of MDM software and best practices - Familiarity with data quality issues and solutions - Ability to provide training and support for MDM implementation
I have multiple ISP providers, I would like to create multiple vlan where each router will be connected, each ISP router is connected to a different Mikrotik and the output of each Mikrotik goes into a separate uplink vlan port of the Huawei OLT (Mikrotik1 output 1 connect to G0, Mikrotik2 output1 connect to G1, Mikrotik3 output 1 connect to G2 etc...) I am not sure if the Line profile or the Service profile of the OLT are being configured correctly. I meant T-CONT, GEM Port index and GEM Port connection index... I would like someone with the knowledge to verify the configuration I have done and tell advise if it is wrong. Huawei OLT MA5608T
Project Title: Unblock Omegle from Computer Access I am looking for someone who can help me unblock Omegle from my Windows operating system. I am not sure if I have any security software or firewall settings that may be blocking access. Ideal Skills and Experience: - Experience in unblocking websites from various operating systems - Knowledge of security software and firewall settings - Familiarity with Windows operating system Tasks: - Identify and diagnose the issue causing the blockage - Provide a solution to unblock Omegle from my Windows computer - Ensure that the solution is safe and secure Deliverables: - A working solution to unblock Omegle from my Windows computer Timeframe: - I would like this project to be completed as soon as possible. Budget: - My budget for this project...