Računalniška varnost Jobs
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
- Establishing secure network infrastructure
- Improving system performance and leveraging encryption
- Developing security frameworks for organizations
- Implementing authentication measures for digital identification
- Evaluating risks of cyber incident exposure
- Researching the latest security regulations for compliance
- Crafting secure policies for employee engagement
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
Od 90,328 ocen, stranke ocenjujejo Computer Security Consultants 4.87 od 5 zvezdic.Najem Computer Security Consultants
I'm looking for someone to create an original, comprehensive, and complete recorded videocourse on the subject of Veeam Backup. The course should cover topics from beginner level to expert level coverage, to carry out, manage and design backup and replication. The course should also contain exercises, quizzes, and challenges that could be used to reinforce the content being taught. The goal is to pack as much information into a simple and easy to understand format that is accessible to everyone from beginner to expert. The minimum total duration of the course is 8 hours. The primary language of the course should be English, although Spanish could be also interesting If you believe you have the ability to create, record and edit such a course, please get in contact with me.
Job Description: We are seeking a skilled and experienced Web Security Specialist to join our team (). As a Web Security Specialist, you will be responsible for protecting our organization's web-based systems and applications from unauthorized access, hacking, and other security threats. You will work closely with our development team and system administrators to identify and resolve vulnerabilities, develop and implement security policies and procedures, and ensure compliance with industry standards and regulations. Responsibilities: • Conduct regular security assessments of web-based systems and applications • Develop and implement security policies and procedures • Monitor web traffic and log files for suspicious activity • Collaborate with developers and sy...
1. Use office 365 to manage windows 10/11 devices 2. Manage a group of users device 3. Restrict these users to only access Outlook, Onedrive, and Sharepoint on managed devices 4. Restrict the user devices to access external shared drives e.g. google drives, dropbox, etc, to upload files externally.
I have one problem. I have some product but i can't send to clients because windows defender. Windows Defender is a built-in security tool in Windows operating systems that helps protect your computer from various types of malware, including viruses, spyware, and other malicious software. It provides real-time protection by constantly monitoring your system for any suspicious activity or behavior and automatically taking action if it detects any threats. I need to avoid windows defender... if you have good method, Please ping me.
Need support for networking and cisco Ftd and fmc and f5 load balancer LTM , APM
Welcome I want to run a test on my site I want to know about security vulnerabilities I also want to know how to solve problems I want to know how to exploit the vulnerabilities
Looking for a talented freelancer to help bring my vision to life! I have a *static* nextJS website, , with a custom Bootstrap theme, published on github pages, that needs some updates. Specifically, I'm looking to add a blog session with markdown posting capabilities, via GIT posts, and a contact form for visitors to easily get in touch with me. NOTE: I already have the site theme (font, palette, graphic elements, logo) and the content for the homepage. But that's just the beginning! Once the site is updated, I need a comprehensive marketing strategy that includes SEO, blog, LinkedIn, email, CRM, and more. This will be an ongoing project with recurring tasks and endless potential for growth. I'm open to creative approaches, but any alternative solutions must clearly ident...
Need consult about options on how to secure my proprietary software app against piracy. The app is installed on windows computers, independently (free standing). Volume: hundreds, prepare for thousands. Some kind of authorization key before activating the installed app on the individual harddrive.
Those who are having very good knowledge & techniques about hacking of Android mobiles & Laptop to train for my students, they can bid.
I am looking for a tutor to help me learn network forensics. In particular, I am interested in learning packet analysis using tools in kali linux. I know that network forensics can be complex and challenging, and I am looking for an experienced tutor who can answer my questions in a timely manner and lead me through the process of learning. If you have experience and a detailed understanding of network forensics and packet analysis techniques, I would be very interested in hearing from you.
I need someone to help with an Active Directory advanced audit logs project. It needs to log user activity and track any changes to the environment. The audit logs need to be retained for more than 6 months. The selected contractor will need to have an in-depth knowledge of Active Directory log management and audit logging capabilities. They will also be responsible for monitoring events relevant to the environment and recommending improvements for security protocols. The contractor should have experience designing and implementing solutions for logging and analysis using tools such as log analytics etc. They should also have experience working with various security frameworks and have a solid understanding of networking principles. I’m looking for someone to deliver a comprehensi...
We believe we have a good handle on our customer but we are lacking some knowledge into the acquisition of our customers. Some areas that we hope to analyze include, but are not limited to, sales cycle length, average sale price, average ROI/customer, buying behaviours, lead generation etc.
I am looking for experienced professionals to help me with my Ewptxv2 exam preparation. The topics covered in the exam include web pentesting and web security. The project involves assistance with both physical exam preparation and time management strategies when taking the exam. I need someone who has had prior experience preparing for this type of exam and knows the best strategies to help me to achieve success. Experience in networking, programming, and database design will also be beneficial. If you think you have the necessary skills to help me with this project, please reach out. Thank you.
Looking for assistance with external web authentication(centralized) for guest network to be used in multiple sites connected via VPN
I have reason to believe my computer or network is being or has been monitored by my former employer. Recently my computer started acting up like it did when I worked for them and they were actively monitoring it. I texted myself calling them out, thinking they would see it on my screen. When the text came though I see that a board member was added to the text, along with a woman I don’t even have in my contacts- we’ve only exchanged one or two emails and are strangers otherwise. After that I tried to text myself again and again it populated with that group. As soon as I started my name “Bonnie” then the board member and the woman would populate. “Bonnie” is not in my contacts. It always, regardless of iCloud, yahoo (my apple email) or whatever hone numb...
My account has been hacked. I've tried removing and blocking the person who did this. Can you help me, and if not, would you kindly suggest someone who can? Thanking you in advance. Bob
I will share 3 malicious Android APKs, I will need your quick analysis result reports. Presentation, Methodology, Result, Insight.
More details will be shared with the preferred Freelancer . Please don't waste time only EXPERTS are allowed to bid . THANK YOU !
As a result of multiple attacks through exchange, we need someone to Identify Security Threat(s) and create a best practices for our Microsoft 365 account. Microsoft 365 Microsoft Defender Microsoft Sentinel Exchange
I recently had my Facebook account hacked by a malicious actor, Lily Collins. After assessing the situation, I've determined that I require assistance to gain back control of my account and secure it from future attacks. To do this, I need the expertise of a professional who can help me gain back my account. Once the service is completed, I do not need any additional security measures, as the existing ones should be sufficient for my needs.
I need help in IT Networking and Communication related Project. Experts please apply
I'm looking for online ethical hacking services to keep my systems secure and make sure they are free of vulnerabilities. I'd like someone to conduct a penetration test to identify any potential weaknesses in my systems. Additionally, I'm open to ideas for developing new systems that need to be tested from the start. My ideal timeline for these services is 1 week.
I'm looking to hire an expert to provide a beginner class in configuring Firewall systems on Palo Alto PA500 devices. This class will be conducted in a virtual environment and will cover the basics of configuration and deployment. The instructor should have hands-on experience working with PA500 systems, and should be able to teach on the use of command-line tools and web-based graphical interfaces. The instructor should also be able to provide guidance on common use cases for deploying and managing PA500 systems. The instructor should have a thorough understanding of network security technologies, including virtual LANs and tunneling protocols, and should be able to provide best practices for implementing secure configurations. The class should also provide insight into system ...
We are looking for a professional freelancer to help us with our Palo Alto PA500 School Project. The project will involve setting up and troubleshooting our PA500 firewall with remote access solution, as well as creating documentation and providing training on use of the firewall. We have experience with IT infrastructures but need assistance with this particular project. Our goal is to ensure successful deployment of our firewall and make sure that everyone on staff is knowledgeable about the system. We are hoping to find a dedicated and knowledgeable freelancer to help us with the project.
Kali linux expert and pentester well versed in pentesting and red team activities. Can check for vulnerabilities on web servers and write malware and patch code.
Networks are critical infrastructure that must remain functional even under various types of attacks and failures. However, the increasing frequency and complexity of attacks and failures pose significant challenges to network resilience. The problem addressed by this research is to investigate the corresponding network resilience under different types of attacks and failures and identify potential vulnerabilities and solutions to enhance network resilience.
Define ports and inbound rules with relevant IP's
I am looking for an experienced freelancer to help me with my network and virtualization project. I have an existing server setup and I am looking for someone to design and maintain the network. I am not sure if I need to migrate the existing servers, so I am looking for someone to advise me on the best way forward. It may also be necessary to invest in additional hardware for the project, so I am open to suggestions and recommendations. The ideal freelancer for this project should have a proven track record in designing and maintaining networks, helping with a server migration, and selection of additional hardware, if needed. Currently, we are having issues with the speed of the remote desktop speed, and looking for suggestions for the best software to set up or develop a new solution to ...
My computer was hacked. I need an ethical hacker to evaluate my computer to identify the person that hacked my computer. I need this information in order to file a police report. They remotely added 10 download keys, that are not mine, & also a hackers email address was posted on my computer.
1. Fictional Back Story The University’s new student finance system is about to be launched! Just before giving a demonstration to the University President, one of our team logged in to the system from their laptop. All they did was log in and then log back out, but somehow someone was able to change their financial details, apply for a grant and steal the money! This shouldn’t be possible as it uses a 2 factor authentication. Thankfully the network team managed to record the traffic going to and from the attacker’s machine. You have been asked to work out how they stole the money. 2. Tasks • Download the relevant file (.pcapng file) from Moodle and open it in Wireshark (either in the virtual machine image or on your own computer). • Using your knowledge of n...
I need Cost modelling and Resource allocation for projects that i m assigned to I work in Cybersecurity and i need help with this i can explain more
Hi I need to do the certificate for ifs supply chain practitioner. Need your help if you can. I am sending you the sample questions. If you think you can work on this let me know. You just need to know how use the ifs application.
Dears, We have Linux ubuntu machine, need an exploitation within network using open ports and known ip. We know the target ip and ports etc. Important: This is only for education and learning purpose and its in our own network and i need to achieve it as a student.
Prosimo, vpišite se ali se prijavite za več podrobnosti.
We (freelancer.com) have an exciting opportunity for an experienced Laptop service engineer to join our team and be part of this amazing project during an amazing growth period. Want to work for one of the world's biggest technology companies? ++++++++++++++++++++++Are you located Davenport, USA? ++++++++++++++++++++++ If you thrive on taking a customer centric based approach and have break/fix/repair skills for notebooks/laptops and printers, then we want to hear from you We are looking for Hardware Repair candidates in Delhi! Duties and Responsibilities Replace/Repair - System board , Display assembly, Webcam , Speaker, Fan, Bezel, Heatsink ,Touchpad , Specific Keyboard ,HDD ,Top cover, Controller board ,PCB,I/O board. Some responsibilities may include but are...
The Brief This assignment is where you demonstrate practical cyber security skills. You will demonstrate your understanding of different methods of vulnerability identification and report findings to decision makers. You will demonstrate application of defensive techniques to illustrate methods of organization's response to cyber incidents.
The Brief This assignment is where you demonstrate practical cyber security skills. You will demonstrate your understanding of different methods of vulnerability identification and report findings to decision makers. You will demonstrate application of defensive techniques to illustrate methods of organization's response to cyber incidents.
We are seeking a skilled and experienced individual to participate in a Capture the Flag (CTF) competition on our behalf. The ideal candidate should possess a strong background in cybersecurity, with extensive knowledge of cryptography, network security, and exploitation techniques. The scope of this project is to solve a variety of problems and challenges presented in the CTF competition within a specified timeframe. As such, we are offering a compensation package based on hourly rates. The selected candidate will be paid for the time spent on each task, with the potential for bonuses based on successful completion of challenges. The primary responsibilities of the selected candidate will include: Participating in the CTF competition on our behalf. Identifying and exploiting vulnerabil...
Make assignment of critical vulnerability analysis module about threat modelling exercise.
We are seeking experienced Network Engineers to join our team in Dublin, Ireland at an entry level of proficiency. Our ideal candidate will possess strong knowledge of network configuration, computer security, and troubleshooting skills. This is an onsite position and applicants from remote locations will not be considered. The candidate must have the ability to find solutions quickly, perform duties with minimum supervision, and show attention to detail when resolving issues. A technical background in installation, maintenance and support-related functions is required, as is prior experience on multiple networks. The successful applicant will demonstrate effective communication within a team environment, as well as being able to provide high-level customer service. If you believe ...
In this unit, students explore various options available to organisations to investigate problems and attacks on their computer systems. It enables students to develop knowledge of laws governing the IT domain and apply approaches to investigating cyber-crime using digital forensic techniques. A range of computer forensic frameworks will be discussed to systematically assist organisations in identifying, analysing, and reporting cyber security issues. In addition, students will study exploitation techniques and use system log files, domain authentication and registry mechanisms to acquire digital evidence. The key focus of the unit is on the identification, preservation, analysis and presentation of digital evidence related to misuse or intrusion into an enterprise-level system.
I think my computer has been compromised please check it it may have keyloggers, listeners, etc. I need a good programmer to find out if this computer is hacked.
Prosimo, vpišite se ali se prijavite za več podrobnosti.
We are seeking a skilled and experienced security engineer with expertise in CIS Benchmark Level 1 for our ongoing projects. As a security engineer, you will be responsible for ensuring the security of our systems, networks, and infrastructure. Responsibilities: -Develop and implement security protocols and procedures -Conduct security audits and vulnerability assessments -Monitor network traffic for unusual activity and security breaches -Maintain up-to-date knowledge of security threats and trends -Collaborate with other team members to identify and address security concerns Requirements: -At least 3 years of experience in security engineering -Expertise in CIS Benchmark Level 1 -Strong knowledge of security protocols, encryption technologies, and network security -Excellent analytical...
I have few more queries regarding my task would help me In this assignment, you will use Java Cryptographic Architecture (JCA) to create a useful application requiring the following functions: 1) Public Key Generation 2) Symmetric Key Encryption (Use appropriate encryption modes) 3) Cryptographic Hashes 4) Digital Signatures 5) Base64 Encoding More information on Java Cryptography Architecture (JCA) is here: Submit the following: 1) A brief write up about the application (upto 3 pages). What does the application do? How is it unique? How is it useful? How did you integrate symmetric cryptography, asymmetric key cryptography, hashing, and digital signatures into the application. 2) Your .java code
For this project I'm looking for a VERY competent consultant on Windows systems and (maybe) on ethical hacking. Standard approach is not useful! My customer has outsourced the management of his network and now there are relationship difficulties. Security client management (in my opinion) was handled very-very-very well but now my customer has no grant to do nothing. The customer client is Windows 10 Enterprise 21H2 - Experience Pack 120.2212 Actual landscape: - His windows user is not local machine Administrator. - The local disk is encrypted via BitLocker (booting from the outside therefore does not allow reading the data) - BIOS has a password, not known by my customer. - no boot his laptop via USB - You cannot install unauthorized applications, not inserted into "Software C...
Please find the attached document below. You need to have network security knowledge to complete this report. If you think you can do it, let me know your price and the time you need. My budget is low. I'm preferably looking for a single person to complete this report urgently. Do not hesitate to contact me for more info.
Job Title: Cohesity Storage Administrator (Person from United Kingdom will be preffered) Duration 3-6 months – Possibly longer(Onsite job) Contract type full time freelance Job Summary: We are seeking a highly skilled and experienced Cohesity Storage Administrator with expertise in managing storage systems and domains, as well as experience with Office 365 and a broad range of IT technologies. The successful candidate will be responsible for managing and maintaining our Cohesity storage environment, ensuring it is highly available, reliable, and performing optimally. This role requires someone with strong communication skills and the ability to work effectively with both technical and non-technical stakeholders. Key Responsibilities: • Manage and maintain o...
We (freelancer.com) have an exciting opportunity for an experienced Laptop service engineer to join our team and be part of this amazing project during an amazing growth period. Want to work for one of the world's biggest technology companies? ++++++++++++++++++++++Are you located Rio Rancho, USA? ++++++++++++++++++++++ If you thrive on taking a customer centric based approach and have break/fix/repair skills for notebooks/laptops and printers, then we want to hear from you We are looking for Hardware Repair candidates in Delhi! Duties and Responsibilities Replace/Repair - System board , Display assembly, Webcam , Speaker, Fan, Bezel, Heatsink ,Touchpad , Specific Keyboard ,HDD ,Top cover, Controller board ,PCB,I/O board. Some responsibilities may include but are ...