Seguridad informática Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

De 102,726 opiniones, los clientes califican nuestro Computer Security Consultants 4.86 de un total de 5 estrellas.
Contratar a Computer Security Consultants

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    48 trabajados encontrados, precios en USD

    I am urgently in need of malware analysts who specialize in both static and dynamic analysis. The target malware primarily affects Windows and Linux platforms and I need insightful analysis on these as soon as possible. Here's what I'm looking for: Skills and Experience Required: - Extensive experience in malware analysis, specifically for Windows and Linux platforms - Working on Jupyter, a malware variant associated with the SolarMaker family. - Proven track record in both static and dynamic malware analysis - Ability to work under tight schedules - Excellent problem-solving and analytical skills - Sound understanding of malware techniques and exploits - Familiarity with tools such as IDA Pro, Ghidra, and Wireshark - Detailed malware analysis - Code Analysis of the malware...

    $363 (Avg Bid)
    $363 Oferta promedio
    5 ofertas

    I require the expertise of a seasoned computer engineer. Your main priorities will involve tasks associated with hardware design and network infrastructure setup. Your responsibilities for this project will encompass two key aspects: 1. **Hardware Design and Optimization:** - Since specifics weren't indicated for this task, I'll need you to apply a broad skill set that could encompass circuit board design, component selection, and integration or performance optimization. Your creativity and problem-solving abilities in optimizing my existing hardware will be of utmost importance. 2. **Network Infrastructure Setup:** - For the network part, your job will be focussed on setting up wired connections. This will require sound knowledge of modern network architectures and the...

    $50000 (Avg Bid)
    $50000 Oferta promedio
    8 ofertas

    Currently using GoDaddy as my email provider, I am exploring options to enhance the security of my system. I am mainly facing challenges with malware attacks and am interested in identifying a robust solution. While I'm not certain if a cloud-based email security solution suits my needs best, I am open to suggestions. Key aspects for a potential candidate to consider: - Proven experience in handling email security problems, preferably with GoDaddy. - Knowledge of both cloud-based and non-cloud email security solutions. - Skills in diagnosing and resolving malware issues. - Ability to advise on the best course of action based on my individual circumstances. The project's successful conclusion will involve a secure email environment with significantly reduced malware threats. ...

    $27 / hr (Avg Bid)
    $27 / hr Oferta promedio
    29 ofertas

    I am currently in need of an experienced network engineer who can assist in implementing our company's network. It is a medium scale enterprise with a distributed network across several sites, employing the use of Routers, Switches, and Firewalls, in our network infrastructure. We will be introducing Meraki as the primary network device as the project progresses across the various sites. A. Scope of Work * Implementing the network using Routers, Switches, and Firewalls. B. Required Skills and Experience * Proficiency with Routers, Switches, and Firewalls. Experience with Meraki would be advantageous. * Proven experience in network implementation. * Ability to work in a medium-scale network environment. Ideally, we are looking for an individual who can ensure smooth network operati...

    $2619 (Avg Bid)
    $2619 Oferta promedio
    25 ofertas
    PENETRATION TESTING 6 días left
    VERIFICADO

    I need cyber security experts to carry out penetration tests on some IT infrastructures

    $145 (Avg Bid)
    $145 Oferta promedio
    12 ofertas

    I'm looking for an experienced network engineer/admin specializing in wireless networks for maintenance tasks. Key Responsibilities: - Establish a Site to Site Connection between two routers with different ISPs using IPSec, IP Tunnel not use third party VPN. Ideal candidate must have: - Extensive experience in wireless network management and maintenance - Skill in configuring firewalls and site-to-site using IPSec - IP Tunnel. - Knowledge in IPSec protocols - Proven track record of ensuring networks are running smoothly & efficiently. - Both end has Mikrotik (Hex) Routers. - Both end has different ISP's . - Site one has static public address and Site 2 has dynamic public address. - Target to communicate both networks ends so that share the data easily and connect one netw...

    $46 (Avg Bid)
    $46 Oferta promedio
    4 ofertas

    I'm seeking a capable computer forensic analyst with proficiency in handling security issues on Mac OS. Your main responsibilities will include: - Performing an in-depth malware analysis. - Promptly responding to, and managing an alleged hacking incident. - Initiating a comprehensive computer investigation, to understand and mitigate potential breaches. Expansion on the tasks at hand: 1. Malware Analysis: Identify and analyze any malicious software that our Mac OS system may have been exposed to. Your analysis should provide insights into the malware's origin, functionality, and damage. 2. Incident Response: Assist me with managing this potential hacking incident. Implement effective strategies to limit the damage, preempt further attacks, and lead recovery efforts. 3. Compu...

    $565 (Avg Bid)
    $565 Oferta promedio
    20 ofertas

    I’m in need of an expert in ethical hacking to help identify any possible security vulnerabilities within my mobile application. The aim of this project is to test our system defenses and improve overall security, ensuring we're well-insulated from any cyber threats. Key Responsibilities: - Conduct a thorough vulnerability assessment of our mobile application - Conduct penetration testing to determine our system's resilience - Provide actionable recommendations to improve overall security The ideal freelancer should: - Have significant experience in ethical hacking and cyber security - Be proficient in mobile application security - Provide a detailed project proposal outlining how they plan to assess and improve our mobile application's security Please include you...

    $381 (Avg Bid)
    $381 Oferta promedio
    7 ofertas
    Versatile CTF Hacker Needed 5 días left
    VERIFICADO

    As an enthusiast in the field of ethical hacking, I'm in serious search of a capable and experienced hacker who can crack the code on both web-based, network-based, and binary-based Capture The Flag (CTF) challenges. What I Need: - An expert who can proactively tackle and unveil the hidden information concealed behind these challenges. The ideal candidate should have: - Profound knowledge and experience in Vulnerability Assessment - Solid skills in Penetration Testing - Extensive understanding of Web App Security. Don't forget, your application must include details of your previous work related to CTF hacking. If you've got the right skills and experience, don't hesitate to apply. Looking forward to seeing your impressive accomplishments.

    $27 / hr (Avg Bid)
    $27 / hr Oferta promedio
    11 ofertas

    Need a cyber security specialist to decrypt an AES-CTR encryption for a CTF flag. provided information : pcapng file for wireshark and the encryption method written in python

    $23 (Avg Bid)
    $23 Oferta promedio
    8 ofertas

    Hello prospective bidders, I am in need of a crypto expert that can assist me in implementing encryption, decryption, and hashing principles to my project. About the Project: - Specific cryptographic services required include Encryption, Decryption, and Hashing. - I believe understanding the balance between security and performance is vital, as we wouldn't want to sacrifice one for the other. - The main platforms for applying these services need to run on HackerRank. Requirements: - Demonstrable knowledge on encryption, decryption and hashing principles. - Prior experience in implementing cryptographic services on web-based platforms and HackerRank. - Medium to high understanding of cyber security principles. - Good communication and problem-solving skills. - Ability to complete...

    $15 (Avg Bid)
    $15 Oferta promedio
    2 ofertas

    In the current situation, my computer has been severely compromised. It has fallen victim to a .faust virus attack, which has resulted in a number of difficulties such as all files in inaccessible.. I'm hopeful to connect with a professional who can restore my computer to its original condition. Required Skills & Expertise: - The freelancer should be an Expect in the area of virus removal. - The potential candidate must possess an excellent understanding of various types of viruses, specifically the .faust virus - randsome. - The freelancer should provide proof of their relevant and successful past work experiences relating to virus removal. The perfect freelancer for this job would be someone who not only removes the virus but also ensures it does not re-infect my system. I loo...

    $813 (Avg Bid)
    $813 Oferta promedio
    10 ofertas

    I'm urgently looking for a cybersecurity professional to help safeguard my online presence. Several concerns have emerged prompting me to take action right away. Your responsibilities will involve: - Scrutinizing my online ecosystem for potential threats and vulnerabilities. - Developing robust security measures to fend off potential intrusions. Given the nature of this project, someone with a background in cybersecurity, understanding of system vulnerabilities, and experience in white-hat hacking practices would fit this role perfectly. A sense of urgency to complete the task is equally important. Please note, no tasks related to password recovery are required for this project.

    $39 / hr (Avg Bid)
    $39 / hr Oferta promedio
    12 ofertas

    I'm currently facing a frustrating issue related to my Windows network. I'm unable to connect to a specific computer on my network despite numerous attempts. Specifically, when attempting a connection, I encounter an "Access Denied" error message. As for the often recommended test - executing a ping command to the unreachable machine's IP address - I must confess, I'm uncertain about how to perform it or interpret the results, hence assistance with that would also be of immense value. For this work, I require a freelancer with a sharp understanding of windows networks, who can ideally guide me through the troubleshooting process to rectify this hitch. In-depth knowledge of network protocols, IP addressing and solid experience in network troubleshooting are ...

    $18 / hr (Avg Bid)
    $18 / hr Oferta promedio
    20 ofertas

    I am in need of a proficient UK-based IT support engineer who can effectively handle hardware, software, and network support on behalf of our clients. Responsibilities include: - Working with a range of equipment, this includes desktop computers, servers, and networking devices. - Providing solid troubleshooting for both hardware and software issues. - Taking charge of network configuration and maintenance, ensuring our clients' systems remain up and running. - Installation, setup & administration of Microsoft software. - Server administration. Skills and experience preferred: - Well rounded IT skillset, with knowledge and experience in hardware, software, and network support. - Previous experience installing and setting up Microsoft software is a must. - Demonstrated experienc...

    $31 / hr (Avg Bid)
    $31 / hr Oferta promedio
    25 ofertas

    I am seeking a skilled professional to build an IPv6 proxy server compatible with the Linux operating system. The primary purpose of this proxy server will be to provide anonymity and privacy. Required Features: - Compatibility with Linux OS - Support for less than 100 concurrent connections Ideal Skills and Experience: - Proficiency in Linux - Experience in building proxy servers - Strong understanding of IPv6, specifically concerning privacy settings - Proven ability to optimize proxy servers for performance and stability Do note that while the server only needs to support less than 100 concurrent connections, I require it to be robust and stable under that level of load. Your task will be deemed successful once the server is operational, stable, and meets the requirements specif...

    $56 (Avg Bid)
    $56 Oferta promedio
    15 ofertas

    I am in need of a VMware expert who can help me access my VmHost 5 which is displaying an "invalid credential" error. Ideally, the expert should have: • A strong background in troubleshooting VMware issues. • Understanding of different authentication methods, specifically username and password method, as I am using that. • Ability to work with specific device issues because the error is only showing up on one particular device. Here's a little more about what's going on: - I haven't recently changed my username or password, so I am sure there's no error from my side. - The problem appears to be device-specific as I'm not encountering this issue on other devices. I am expecting someone who can diagnose and fix this issue. Your help is mu...

    $44 (Avg Bid)
    $44 Oferta promedio
    5 ofertas

    Having allocated a new IPv6 block to my Google VM, I seek a proficient freelance network administrator to set up Squid to enable its availability for up to 100 IPv6 proxies. I expect this individual to bring their expertise to bear, configuring the overall operation of these proxies for optimal functionality. Key Parameters: * The operating system for the VM is Linux-based. * The proxies should follow a universal setting - just a single setting that applies to all of them. Required Skills: * The ideal freelancer should have demonstrable experience in setting up and managing IPv6 proxy servers. * Proficiency in Squid is a must. * A deep understanding of Linux OS and networking is necessary. * Knowledge about Google VM will give you a great advantage. Your role involves ensuring that...

    $21 / hr (Avg Bid)
    $21 / hr Oferta promedio
    12 ofertas

    I am seeking a cybersecurity expert with a focus on mobile applications. Your key responsibility in this project will be to ensure protection against malware and viruses. Key Responsibilities: - Recognize the security challenges of the mobile application and implement strategies to address them. - Establish and monitor protective measures against malware and viruses. - Analyze potential security threats and apply preventive measures to minimize risk. Skills & Experience: - Proven experience in network security, web application security, and data protection. - Demonstrated expertise in Mobile application's cybersecurity. - Familiarity with common malware and viruses targeting mobile applications, and a successful track record of resolving such issues. - Strong analytical skill...

    $335 (Avg Bid)
    $335 Oferta promedio
    9 ofertas

    I'm seeking a seasoned Application Security Engineer Team Lead capable of remotely leading and managing a diverse team of security engineers. As the team leader, you will be primarily responsible for: - Deliberately designing and implementing robust security policies and procedures. - Comprehensively conducting vulnerability assessments along with penetration testing. Qualified candidates should have broad experience in Python, Java, and C# programming languages and associated frameworks. Although detailed specifics of the security measures have not been provided, a successful candidate should be prepared for: - Implementing secure coding practices. - Conducting frequent security audits and risk assessment. - Efficiently managing incident response. This substantial role within Ma...

    $2595 (Avg Bid)
    $2595 Oferta promedio
    24 ofertas

    I'm on a mission to develop a new, decentralized internet platform, aiming to shift the control and profit of the internet back into the hands of its users. This project, named 'Outternet', aims to pioneer a new internet era. Key features include: 1. Developing a robust and secure user authentication 2. Creating an alternative internet network in a decentralized manner Technical competencies: - Deep understanding of internet protocols and architecture - Experience in developing decentralized networks - Knowledge in cybersecurity, specifically for user authentication In sum, I am looking to break new ground in the world of internet connectivity by creating a decentralized platform. This venture is more than just changing the web; it's about creating a new kind of int...

    $22 (Avg Bid)
    $22 Oferta promedio
    7 ofertas

    I'm in desperate need for an ethical hacker who can skillfully identify vulnerabilities in my systems, help in recovering lost data, and recover a specific g-mail address. Key responsibilities will include: - Uncovering system vulnerabilities that might be detrimental to my business - Recovering business data that was stored in databases but unfortunately lost - Assisting in the recovery of a compromised g-mail address The ideal candidate will have robust expertise in ethical hacking, have an in-depth understanding of data recovery, and be proficient in database management. Experience with email systems, particularly g-mail, will be beneficial. Must adhere to all ethical guidelines. My business relies heavily on the lost data and its recovery is quite urgent. I look forward to wo...

    $130 (Avg Bid)
    $130 Oferta promedio
    19 ofertas

    As an established firm in the industrial space, we are looking for an experienced machine designer to develop a fully automated steel strip slitting and rewinding system. Essential Skills and Experience: - Proven expertise in machine design, particularly in full automation systems. - Focused knowledge of designing hardware structures, with previous work in steel industry being a plus. - Familiarity with industry standards on width, thickness, and rewinding speed is advantageous, though specific requirements will be provided upon project start. Application process: - Describe your relevant experience in machine design. - Provide detailed insight into how you plan to approach this project. - Share past work samples, if available, specifically where you have designed machines for the stee...

    $295 (Avg Bid)
    $295 Oferta promedio
    14 ofertas

    I'm in need of a seasoned professional with a significant understanding of Windows Server 2022 &Windows 11 and its security measures. This role involves: - Customs hardening of my Windows Server 2022 &Windows 11 system as per provided requirements. - Implementing complex security policies to reinforce the safety of the system on Windows Server 2022 &Windows 11. - Establishing specific security policies and configurations, including Firewall settings and User account control. Ideal candidate must showcase expertise in Windows Server 2022 &Windows 11 , its security systems, and how to navigate and utilize these effectively for maximum system protection. Previous experience in similar projects will be a major plus.

    $697 (Avg Bid)
    $697 Oferta promedio
    14 ofertas

    I am seeking a network specialist experienced in configuring network setups and working with access points specifically. Key tasks involve: - Network Configuration: You'll manage the configuration of our network, focusing mainly on access points. Your primary role will be configuring our access point to allow mobile phone connectivity. - Equipment: For this task, you should have experience in working with access points. Furthermore, understanding their functions, operations, and the necessary configuration processes, is crucial. Ideal Skills and Experience: - Deep understanding of network configurations and access point set-ups. - Proven experience in similar roles or jobs. - An understanding of mobile connectivity solutions. - Excellent in problem-solving and has the ability to...

    $19 / hr (Avg Bid)
    $19 / hr Oferta promedio
    21 ofertas

    I am in need of an efficient and reliable solution to regularly backup less than 10 virtual machines (VMs) hosted on my ESXi and Proxmox servers. The backup destination will be an external Buffalo storage device. Although I skipped the question about specific security protocols, a knowledge and understanding of common security protocols is essential. Key Skills sought: - Comprehensive understanding of ESXi and Proxmox virtualization platforms - Experience with VM backup processes - Ability to set up automatic, regular backups - Familiarity with data security and protocols - Knowledge of Buffalo external storage devices. While no specific security protocols have been identified for implementation at this time, the chosen freelancer must be adaptable and able to align with potential secur...

    $17 / hr (Avg Bid)
    $17 / hr Oferta promedio
    16 ofertas

    I am seeking a professional with strong cybersecurity skills to assist with a serious incident that has occurred. I have fallen victim to a cyber attack and require expert assistance to ensure my system is secure and potentially trace the hacker who has infiltrated my system. Key Responsibilities Involved: - Providing real-time monitoring and alerting solutions. - Implementing effective firewall and antivirus protection. - Conducting thorough log analysis and tracking activities. The hacker has compromised various sorts of my personal, financial, and confidential business data. Not only has my name, address, and phone number been accessed, but my financial details, including credit card and bank account information, have also been breached. In addition, confidential business data, inclu...

    $290 (Avg Bid)
    $290 Oferta promedio
    15 ofertas

    I am looking for a skilled hacker with proficiency in detecting and tracking website API, specifically user authentication API. The fundamental requirement for this project is to track the specific API, but please note the specific data to be obtained has not been detailed at this instance. Time is of the essence, so I'm seeking someone who can start immediately and deliver results rapidly. Quick, effective communication and task completion are vital in this job. Prior experience with API tracing and a comprehensive understanding of cybersecurity will be routing factors for selection.

    $362 (Avg Bid)
    $362 Oferta promedio
    5 ofertas

    I'm presently dealing with issues on my Linux system that I suspect could be malware related. My precise symptoms are currently uncertain, as I was unable to provide an informative answer. I need a highly skilled freelancer to gauge the situation and perform an extensive malware assessment and removal. The right fit for this task will be someone who: - Has considerable experience with Linux systems - Specializes in detecting and removing malware, possibly even without distinct symptoms - Can start working on the task immediately as the deadline is undefined If you are confident in handling this project, don't hesitate in bidding. Your expertise in malware analysis can restore sanity to my system.

    $206 (Avg Bid)
    $206 Oferta promedio
    23 ofertas

    As a fast-growing company, I'm looking to employ two dedicated customer care executives only girl’s. Primary Responsibilities: - Fielding and answering phone calls - Responding promptly and professionally to emails - Providing comprehensive assistance with product inquiries Working Hours: The selected individuals will be required to work during specific hours, which will be communicated upon hiring. Skills and Experience: Ideal candidates for this position should possess exceptional communication skills. Experience in customer relation roles would be a plus but is not mandatory. If you're dedicated, personable, and have a knack for making customers feel taken care of, I encourage you to apply.

    $241 (Avg Bid)
    Local
    $241 Oferta promedio
    2 ofertas

    I am in need of an IT expert, particularly someone savvy with network security and data backup protocols, for an in-person audit at our medium-sized pharmaceutical manufacturing facility in Agra. The assessment will involve: - Evaluating our current network security measures and identifying potential vulnerabilities. - Conducting an inventory of our hardware and software to ensure we are utilizing our resources effectively. - Reviewing our data backup and recovery systems to evaluate their effectiveness. Given the nature of our business, fluency in IT within the context of pharmaceutical manufacturing would be advantageous, however, it's not a requirement. Please note, familiarity with data security regulations, although not specific ones, would be beneficial. Looking forward to wor...

    $96 (Avg Bid)
    $96 Oferta promedio
    7 ofertas
    ITOM expert engineer 2 días left
    VERIFICADO

    More details: What specific ITOM (IT Operations Management) technologies or tools do you need expertise in for this project? Opmanager manage engine What specific features or functionalities do you need in OpManager from ManageEngine? Network monitoring, Application monitoring, Server monitoring, Services What specific services do you need to monitor in OpManager from ManageEngine? DNS, HTTP/HTTPS, FTP I am looking for an experienced individual to finalize the OpManager Manage Engine project. Additionally, I need assistance in enhancing the service, presenting screens, and monitoring all new devices added to the network and the work environment automated, to link them in the future with an ITSM software. Your efficiency and work are required for the credibility of project completion. Plea...

    $30 (Avg Bid)
    $30 Oferta promedio
    6 ofertas

    I am looking for someone monitoring and management of security devices and systems. This can include managed firewalls, intrusion detection, and prevention systems, as well as managing security information and event management (SIEM) systems. More details: What specific security challenges are you looking to address with Managed Security Services? Network security, Endpoint security, Data protection What is the size of your organization? Small (1-50 employees) Which type of Managed Security Service would you prefer for your business? Threat monitoring

    $604 (Avg Bid)
    $604 Oferta promedio
    22 ofertas

    I'm in urgent need for a MikroTik support expert, specifically someone who has MikroTik certifications and can offer me around 3 hours of support. The issue on hand involves my medium-sized business network set up. I have been experiencing: - Configuration errors - Routing issues - Network instability These problems are related to VRRP and BGP on my network. Currently, I am using MikroTik RouterOS Version 7.x. so it's crucial that you have experience troubleshooting this version. In your bid, please include: - Your MikroTik certifications - Your experience with RouterOS Version 7.x - Your past experiences resolving such issues Please only bid if you are available at 10pm (GMT-5) 27 Feb 2024 If you're confident you can assist me, I look forward to receiving your bid.

    $39 / hr (Avg Bid)
    $39 / hr Oferta promedio
    8 ofertas

    I'm looking for a capable freelancer with robust experience in managing, optimizing, and securing Linux-based web servers. My project involves: - Server security optimization to reduce possible vulnerabilities and enhance stability. - Ongoing server monitoring and maintenance to assure its optimal performance and quickly resolve potential issues. A sound understanding of Linux web server management and an ability to respond promptly to issues are paramount. Having certifications related to Linux and server security will be considered a plus. If you have a proven track record in this field, please don't hesitate to apply.

    $20 / hr (Avg Bid)
    $20 / hr Oferta promedio
    43 ofertas

    I'm seeking an experienced network engineer who has 7+ years of experience and to overhaul our company's Local Area Network (LAN), Wide Area Network (WAN), and Wireless Network. - **Goals and Challenges:** The primary goals are to improve network speed and performance, enhance network security, and expand network coverage. The optimal candidate will have proven experience in achieving these outcomes in past projects. - **Devices Connectivity:** On average, there will be less than 50 devices connected to the networks. Therefore, understanding how to optimize a network for this amount of devices will be crucial. - **Skills & Experience:** A strong background in LAN, WAN, and Wireless Network setup and management is essential. Network security expertise and experience im...

    $10 / hr (Avg Bid)
    $10 / hr Oferta promedio
    8 ofertas

    I am developing a flutter application that has a bit of machine learning. I want you to use work on TFLITE models. Please check the file for details and I can provide the dataset for the training. My budget is not more than 80 euros so please bid if you want to work immidiately and agree with the amount. Please check the file before bidding.

    $11 (Avg Bid)
    $11 Oferta promedio
    5 ofertas

    As someone who places a premium on privacy, I'm looking for a tech-savvy professional who can build a VPN network specially designed for anonymous browsing/geo restrictions and other means. You'll spearhead this project from scratch, as such, you will: - Design and develop a robust, secure VPN service that prioritizes user anonymity. - Implement cutting-edge methods to protect the VPN user's privacy. While it isn't a deal-breaker if you have not fully interfaced with every operating system, familiarity with different substrates would be a considerable advantage. This project is open-ended, so we don't have to rush things. We can focus on creating a quality product that achieves my objective of anonymous browsing. For this role, the ideal candidate will have/ b...

    $725 (Avg Bid)
    $725 Oferta promedio
    14 ofertas

    I am seeking support from a highly experienced cybersecurity(CIA) freelancer to assist in my research paper. Key objectives are: Cybersecurity CIA Analysis (2019-Present) Need in-depth analysis of CIA triad in recent research? 5 IEEE papers (2019-present) Comparative table with key insights ⚡ Fast, expert research & delivery Order now & unlock cybersecurity knowledge! Tags: cybersecurity, research, CIA, IEEE, analysis, comparison - Identifying potential vulnerabilities in multiple SCADA systems - Analyzing existing cybersecurity measures - Proposing enhanced security solutions The ideal candidate will understand SCADA system, their potential vulnerabilities, and possible solutions. Your role would also involve aiding in comparison and assessment of different cybersecurity me...

    $123 (Avg Bid)
    $123 Oferta promedio
    39 ofertas

    Currently seeking a tech-savvy freelancer with a wealth of experience in dealing with cable internet connections. My system is experiencing some problems which need immediate attention: - The main crux of the matter is that my cloudkey and various other amplifiers aren't functioning as they should. - This is resulting in an absence of internet on the upper levels of my house. Your wealth of experience should aid in troubleshooting and efficiently resolving these issues. Therefore, you should incorporate this within your application. A background in working with similar types of network connectivity issues will be considered an advantage.

    $32 / hr (Avg Bid)
    Local
    $32 / hr Oferta promedio
    6 ofertas

    Overview: I am experiencing difficulties accessing a particular website, we are seeking a skilled freelance web developer or network specialist to assist in diagnosing and resolving the issues. The problem seems to stem from varying response times and loading problems based on IP addresses. We need someone proficient in troubleshooting web access issues to identify the underlying causes and implement solutions to ensure consistent and reliable access to the website. Responsibilities: understand the specific access issues encountered, including response times and loading problems. Analyze network configurations and settings to identify any potential issues affecting access based on IP addresses. Conduct tests and simulations to replicate the reported problems and gather additional data fo...

    $7 / hr (Avg Bid)
    $7 / hr Oferta promedio
    9 ofertas

    As the operations of my server are currently unbeknownst, I'm urgently seeking an expert who can quickly analyze why my Linux server is performing slowly. - **Understanding of my Server's Operations:** Since I skipped the question that pertains to the typical operations that run on my server, I need you to explore, understand, and explain to me what's causing the slowdown. - **Methodical Server Check:** I expect a full sanity check of my server focusing on any potential issues that might be contributing to the slow performance. - **Quick Turnaround:** My project is quite urgent, so I would appreciate if you could complete the check as fast as possible, providing guidance on how to rectify any identified issues. The ideal freelancer for this task would have extensive expe...

    $15 / hr (Avg Bid)
    $15 / hr Oferta promedio
    16 ofertas

    I am in need of an efficient and reliable solution to regularly backup less than 10 virtual machines (VMs) hosted on my ESXi and Proxmox servers. The backup destination will be an external Buffalo storage device. Although I skipped the question about specific security protocols, a knowledge and understanding of common security protocols is essential. Key Skills sought: - Comprehensive understanding of ESXi and Proxmox virtualization platforms - Experience with VM backup processes - Ability to set up automatic, regular backups - Familiarity with data security and protocols - Knowledge of Buffalo external storage devices. While no specific security protocols have been identified for implementation at this time, the chosen freelancer must be adaptable and able to align with potential secur...

    $406 (Avg Bid)
    $406 Oferta promedio
    22 ofertas

    I urgently need an adept network specialist who has extensive experience setting up networks on VirtualBox using pfSense. The project requires: - Deep understanding of pfSense on VirtualBox for network setup - Implementing network simulation functionalities using GNS3 - The ability to work quickly and efficiently, as I need this completed as soon as possible. An ideal candidate will have substantial experience in all these areas. The outcome should be a well-simulated and robustly configured network ready for immediate use.

    $34 (Avg Bid)
    $34 Oferta promedio
    13 ofertas
    Openvpn issue 10 horas left
    VERIFICADO

    I have router omada er605. I have created openvpn file and i have connection to network. I can not access to device on network by IP adress

    $27 (Avg Bid)
    $27 Oferta promedio
    16 ofertas

    I'm looking for a cybersecurity expert to help develop and implement an effective strategy for a large energy firm. The strategy should aim for a 360° overview of the company's needs, covering all potential threats and offering pro-active solutions. Key Goals: 1. Preventing data breaches 2. Protecting the critical infrastructure 3. Ensuring regulatory compliance Asset Protection and Risk Management Framework Alignment and Compliance Defense in Depth Incident Response and Recovery Continuous Monitoring and Threat Detection Education and Awareness Information Sharing and Collaboration Technology and Process Innovation Legal and Regulatory Compliance Assets to Protect: - IT systems - Industrial control systems - Intellectual property - Customer data Potential Threats/Risks:...

    $630 (Avg Bid)
    $630 Oferta promedio
    14 ofertas
    Cisco Network Netacad Project Final left
    VERIFICADO

    I'm seeking an experienced professional to assist in improving the performance, enhancing the security, and optimizing the infrastructure of a Cisco Netacad project. Key tasks will involve: - Network Troubleshooting: There are areas within the network configuration that need to be analyzed and resolved. You should bring a thorough understanding of problem-solving network issues. - Configuration Setup: I need you to establish robust configurations that support the overall wellbeing of the network. Your experience with setting up structured and well-organized configurations will be crucial. - Security Implementation: Effective and dependable security setups must be designed and implemented aiming for enhanced network security. - Specific Topics: Your capacity to handle intricacies r...

    $28 (Avg Bid)
    $28 Oferta promedio
    10 ofertas

    Artículos recomendados solo para ti

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Learn how to find and work with a top-rated Google Chrome Developer for your project today!
    15 MIN READ
    Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.
    15 MIN READ