The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
Od 98,894 ocen, stranke ocenjujejo Computer Security Consultants 4.9 od 5 zvezdic.Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
Od 98,894 ocen, stranke ocenjujejo Computer Security Consultants 4.9 od 5 zvezdic.I need to update my security system with a new Ubiquiti DVR. Requirements: - Integrate 9 or more existing cameras with the new Ubiquiti DVR. - Full configuration assistance is needed for cameras on the DVR. Ideal Skills and Experience: - Experience with Ubiquiti security systems - Proficiency in DVR setup and camera integration - Strong technical skills in security system configuration Looking for a freelancer who can ensure a smooth and secure setup.
Our BGMI (Battlegrounds Mobile India) infrastructure occasionally freezes when traffic surges. I want to put a permanent stop to that by building a preventive DDOS shield that covers every critical touch-point—login, in-game communication, and matchmaking. You will begin with a quick audit of the existing network layout and traffic patterns, then design and deploy a solution that blocks volumetric and application-layer attacks before they can overwhelm the servers. I expect minimal additional latency for legitimate players, clean documentation of every rule or service introduced, and a repeatable playbook I can apply to new nodes as we scale. Deliverables • Security architecture diagram and written rollout plan • Hardened configurations applied to the login, game, a...
I’m ready to bring full IP transit and external peering to my Mikrotik router so I can increase bandwidth across my ASN. I dont have the upstream contracts and ASN yet in place; what I need now is a clean BGP configuration, route filtering, and safety checks that will let me announce my prefixes confidently and start exchanging traffic. I need advice about increasing bandwith What methods are best way to get more capiciyety and blackholiny option mitigation ddos Here’s what I expect: • Review of my current Mikrotik configuration and hardware capabilities. • Step-by-step BGP setup for both transit and public peering, including prefix-lists, filters, and route policies. • Guidance on IRR/RPKI updates so my announcements remain valid. • Testing plan t...
I need a seasoned ethical hacker to carry out a full-scope security assessment of my environment. The end goal is simple: uncover any vulnerabilities before malicious actors can exploit them, then give me clear, actionable steps to fix them. Please outline your relevant experience when you reply—real-world projects, certifications (e.g., OSCP, CEH), and any notable results will help me understand how you approach engagements like this. Scope • Reconnaissance and vulnerability discovery • Exploitation and privilege escalation (within agreed boundaries) • Post-exploitation risk analysis • Clean, well-structured reporting that ranks issues by severity and urgency Deliverables 1. Executive-level summary (non-technical) 2. Detailed technical report...
We are looking for an experienced technical recruiter to help source and screen high-quality engineers for ongoing projects. Roles we are hiring for include: - AI / Machine Learning Engineers - Data Scientists - Data Engineers - Backend Engineers (Java, Go, Rust, C#) Responsibilities: - Source qualified candidates (LinkedIn, networks, communities, etc.) - Pre-screen candidates (technical fit, communication, experience) - Present a shortlist of high-quality candidates - Coordinate initial introductions/interviews Requirements: - Proven experience recruiting for technical roles (AI/ML or backend preferred) - Strong understanding of engineering profiles and tech stacks - Ability to identify high-quality candidates (not mass submissions) - Good communication and responsiveness Nice to have...
I am seeking a cybersecurity specialist to support my company’s security efforts by performing the following tasks: Analyze Splunk vulnerabilities that I will provide; Document these vulnerabilities thoroughly, including identifying any related case studies, previously documented examples (e.g., academic articles or CVEs), and all possible remediation strategies;
Our campus network runs on a Fortinet stack—FortiGate firewalls at the core and FortiAP access points across three buildings. I need an experienced Fortinet administrator to tighten security, build out VPN connectivity, and tune ongoing visibility. Scope of work • FortiGate Firewall – create or refine security policies that segment users, servers, and guest traffic while following best-practice hardening. • FortiGate Firewall – set up site-to-site and remote-access VPNs, test fail-over, and document the steps so I can replicate them. • FortiGate & FortiAP – enable and verify logging to our existing syslog/SIEM, ensuring alerts surface the right information without noise. • FortiAP – confirm wireless profiles and VLAN assignment...
I need help setting up OVH’s native DDoS Protection on my servers so they stay online during traffic spikes and malicious floods. I alreadu have 13 rules but when atrack is coming its mitigating server Scope • Audit my current OVH hosting configuration and identify exposed points. • Enable and correctly tune OVH DDoS Protection profiles (VAC). • Verify that legitimate traffic is not blocked while common attack vectors are filtered. • Provide a short step-by-step guide so I can adjust the rules myself in the future. Success criteria • Service remains reachable while you simulate typical Layer 3/4 floods. • No noticeable latency increase for normal users after the changes. Experience with OVH Manager, VAC, and network security best pr...
I have a Windows-only desktop program for personal use. The original supplier is no longer available, and every launch now stops at a login screen that asks for an authorization code I can’t retrieve. I still have lawful access to the software and simply need to keep using it on my own PC. What I need • Analyse the executable and locate the routine that validates or fetches the authorization code. • Produce either a patched binary or a small loader that cleanly bypasses that check so the software starts normally. • Preserve all existing features and stability; nothing else in the workflow should break. • Provide a short, step-by-step note on how the modification was done so I can replicate it after system reinstalls. Helpful skills Experience with Windows ...
More details: What specific features do you want included in the cheat? Aimbot, ESP (Extra Sensory Perception) How do you want the cheat to be activated on the USB stick? Whatever method that is the least detectable What level of user control do you want over the cheat settings? The cheats has to be configured so it looks legit and only gives a little edge
My PC gaming sessions in Dubai are being plagued by high ping, random connection drops, packet loss, and a range of other performance hiccups. I’m on a cable line right now, but it clearly isn’t tuned for competitive play. I’d like an expert who can visit my apartment, run proper diagnostics on-site, and leave me with a rock-solid, low-latency connection. Here’s the flow I have in mind: • On-site assessment of the current cable setup (modem, router, internal wiring, NIC settings). • Immediate optimisation or replacement of any mis-configured hardware or cabling you find. • Clear before-and-after metrics—ping, jitter, and packet-loss reports—so I can see the improvement. If additional gear or an ISP plan change is advisable, walk m...
I need an experienced cybersecurity engineer who knows how to secure manufacturing OT environments from the ground up. Our plant floor runs a mix of SCADA, PLC and DCS systems on VMware / ESXi virtual infrastructure, and I’m kicking off a project that tightens every layer—from the hypervisor to the operator workstation—while staying fully aligned with ISA/IEC 62443 and NIST guidelines. Scope of work • Assess the present security posture, map risks to ISA/IEC 62443 zones & conduits, and deliver a concise risk report. • Recommend and implement security improvements that will not disrupt production or existing integrations. • Verify every change through functional testing and validation before sign-off. Core technical tasks • Deploy and tune...
I need a certified ethical hacker to put my production web application through a thorough vulnerability assessment. The assignment is strictly white-hat: you will have full, written authorization to probe the app so long as no customer data is altered or deleted. My sole objective is to identify every exploitable weakness you can find—misconfigurations, logic flaws, injection points, broken authentication, anything that could be abused in the real world. Tools such as Burp Suite, OWASP ZAP, Nikto, or custom scripts are welcome as long as the methodology is reproducible and aligns with current OWASP Top 10 practices. Deliverables • A clear, well-structured report that lists each vulnerability, proof-of-concept evidence, severity ranking, and recommended remediation steps....
I need an experienced network engineer to keep an existing Wide Area Network running smoothly through regular maintenance and timely updates. The environment already functions well; my priority is to prevent surprises, apply security patches, review configurations, and quickly resolve any performance drift before end-users notice. Here’s what I will expect from you: • A clear maintenance schedule that covers firmware/software updates for routers, firewalls, and edge switches. • Proactive monitoring suggestions and the tools you prefer for alerts and reporting. • Thorough change-control notes each time you touch the network so I can track what was updated, why, and how to roll back if needed. • A short weekly health summary highlighting bandwidth trends, l...
I’m working on TMA 01 for the Open University’s TM129 “Technologies in Practice” module and the entire assignment centres on networking and communications. I already have the brief, word-count limits and marking scheme; what I’m missing is a clear, well-structured explanation that blends a concise introduction with deeper technical analysis so the assessor can see both breadth and depth. Here’s what I need from you: • A draft that walks through the core networking concepts highlighted by TM129, starts with a plain-language overview, then drills down into key protocols, topologies, and real-world use cases exactly where the brief calls for more technical detail. • Wherever the task requires evidence or reflection, incorporate properly refe...
I need my new FortiGate 80F installed and fully integrated into the existing LAN so that the whole environment benefits from stronger security without sacrificing speed. The key outcome is a balance of protection and performance: traffic must be scanned, filtered, and shaped while keeping latency low for everyday business applications. Configuration requirements • Security posture – enable intrusion-prevention, anti-virus, and web filtering profiles that block known threats and unwanted content. • Internet use control – create policies that (a) block or allow specific websites, (b) throttle bandwidth for heavy-use categories like streaming, and (c) log user activity for later review. • Performance tuning – apply best-practice SD-WAN and bandwidth all...
I am currently working on a cybersecurity-focused project and am seeking an experienced professional or company to collaborate with. The ideal partner should have strong expertise in penetration testing (pentesting) and the ability to provide and/or develop cybersecurity software solutions. Scope of Work: Perform penetration testing on systems and applications Identify vulnerabilities and provide detailed security reports Develop or integrate cybersecurity tools and software Support the design and development of secure applications Recommend best practices for strengthening overall security posture Requirements: Proven experience in penetration testing and vulnerability assessment Strong background in cybersecurity tools and frameworks Experience in developing cybersecurity application...
I'm seeking assistance to fix a connectivity issue with my Brother multifunction model 8710-DW scanner, which is connected to a network router. Currently, the scanner is not recognized on the network. Ideal Skills and Experience: - Experience with networked devices and routers - Familiarity with Brother multifunction printers and scanners - Strong troubleshooting skills for network connectivity issues Please provide a detailed plan and timeline for the repair.
I need a static, dedicated IPv4 address that geolocates to Altoona, Pennsylvania so I can log into my company’s Cato Networks VPN while I’m working from Medellín, Colombia. The goal is simple: when I connect, all company systems must see me as if I’m physically in Altoona, enabling full remote-work access with no compliance flags or location warnings. Because Cato Networks sits between the endpoint and the corporate network, the solution has to play nicely with their client or socket. If you’ve done custom routing or IP whitelisting with Cato before, that experience will help a lot, but solid networking skills and an understanding of how to present a clean residential or business-class IP to geolocation services are what really matter. I’m not complet...
I am looking for an expert to create a demo showcasing an AI-driven autonomous security platform using the Microsoft stack. The demo should highlight how the platform detects threats, investigates incidents using AI, protects sensitive data with Microsoft Purview, and automatically responds to attacks in real time—reducing SOC response time from hours to minutes. Key components to include: - Microsoft Defender for threat detection and endpoint security - Microsoft Sentinel for SIEM and automated incident response - Microsoft Fabric for security analytics - Microsoft Purview for sensitive data protection - AI Agents for automated investigation and response Deliverable: A fully functional demo that demonstrates these capabilities effectively.
I’m upgrading the network in our office building and need a specialist to supply, install, and configure three to five wireless routers. The job covers everything from mounting the hardware and running any necessary cabling to optimising the settings so staff on every floor enjoy a stable, secure connection. You’ll start with a quick walkthrough of the premises to confirm ideal router placement, then handle the physical installation (wall or ceiling mounts, power, and data connections). Once the units are up, I’ll need you to configure SSIDs, security, VLANs, and QoS so the network is ready for immediate use. Please finish with signal-strength testing in each workspace and provide a concise hand-over document that lists router login details, final channel maps, and any r...
Description I am looking for a Hikvision specialist with real DeepinMind experience to help configure and optimize an existing system remotely. System: Hikvision 32-channel 2U 8K DeepinMind NVR (iDS-9632NXIM8/X) This is not a basic install job. I need someone who understands Hikvision AI features at a technical level. Work will be done via remote session (screen share). Scope 1. Camera Placement Strategy Review layout (restaurant environment) Recommend placement for: accurate face recognition entry/exit tracking staff movement tracking Advise on: height, angle, distance choke points vs wide coverage lighting for AI accuracy 2. DeepinMind Configuration Face recognition: face library setup matching thresholds capture tuning Smart events: line crossing intrusion detection region rules AI opti...
I oversee a distributed team across the United States that relies on a mixed fleet of Windows laptops and MacBooks. I’d like to hand off day-to-day remote control management so that my staff always has quick, reliable help whenever problems arise. The core need is user support and troubleshooting. When a user is stuck—whether it’s a driver conflict on a Lenovo, a stubborn macOS update, a Wi-Fi profile that won’t save, or an application crash—I want you to jump in remotely, diagnose the issue, fix it, and document what you did so we can learn from each case. A secure, industry-standard remote-access tool such as TeamViewer, AnyDesk, or an RMM platform you already trust is expected. I’ll provide administrator credentials and establish whatever whitelisti...
I want a knowledgeable security professional to look over my personal Gmail account and confirm that everything is locked down properly. Even though I have not noticed any strange emails, log-ins, or settings changes, I would like an independent review of the account’s recent activity, connected apps, and login history to rule out silent or hard-to-spot intrusions. Your job is to walk me through the full audit, examine available Google security logs, highlight any red flags, and then help me apply best-practice countermeasures such as two-step verification, recovery-method hardening, and the removal of risky third-party access. Deliverables • A concise written report (or screen-share summary) outlining findings, suspicious events (if any), and clear next steps. • ...
I need help installing and setting up parental controls on Windows computers/laptops. I also need help to set up anti-virus software on devices Ideal Skills: - Proficient in Windows OS. - Experience with parental control software - Knowledgeable in system setup and configuration
We are looking for a freelance Network Engineer to provide onsite support at a client location for a one-day network activity. You will work as the onsite engineer while a remote team provides guidance and configuration support. Responsibilities Rack, cable, and power on network equipment (switches, routers, firewalls) Patch network cables as per provided diagrams Connect console or management cables for remote access Perform basic network connectivity checks Assist the remote team during troubleshooting or validation Provide a brief end-of-day handover and status update Deliverables Network equipment installed, powered on, and accessible to the remote team Confirmation of basic network connectivity Short summary of work completed and any issues observed Requirements Hands-on ...
I have one password-protected ZIP archive that contains software I previously developed, but the password has been lost. The archive opens with the usual password prompt—no other options—and I no longer have an unprotected copy, so the files inside are inaccessible to me. Your task is straightforward: recover the working password or return an identical, fully-intact version of the archive that opens without a prompt. Any standard approach is fine—brute-force, dictionary, or specialised zip-recovery tools—as long as the software inside remains uncorrupted and confidential. Deliverable • Either the exact password in plain text or an unlocked ZIP containing the original software, ready for me to run. Please outline roughly how long you expect the process to t...
My external USB hard drive was hit by a .MEKA-extension ransomware after I downloaded a file from the web, and every personal document and photo I value is now unreadable. I have no backups—nothing in the cloud, no second drive—and I have not attempted any recovery steps yet. I need a specialist who can: • Examine the exact strain behind the .MEKA encryption and confirm whether any public decryptor or key is already available. • Advise me, with evidence, if decryption is realistically possible or if file-carving and safe restoration approaches are the better path. • Carry out whatever legitimate, professional techniques you deem best—shadow-copy checks, forensic imaging, data-carving, recognized decryptor testing—while keeping the original dri...
Several Cisco ASA firewalls, ISR routers, and Catalyst switches keep our network running, but they have not been touched in a while. I need a thorough tune-up that covers three areas: installing the latest stable software patches, reviewing every running-config for performance tweaks, and hardening the security posture against current threats. Partial documentation exists—mainly topology diagrams and some old configuration notes—so part of the engagement is to validate what is still accurate and fill in the gaps. Scope and expectations • Apply current Cisco software/firmware updates after confirming compatibility. • Analyse and refine interface, routing, VLAN, and policy settings to eliminate inefficiencies. • Conduct a focused security assessment (AAA, V...
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.