Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Od 101,154 ocen, stranke ocenjujejo Computer Security Consultants 4.9 od 5 zvezdic.
Najem Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Od 101,154 ocen, stranke ocenjujejo Computer Security Consultants 4.9 od 5 zvezdic.
Najem Computer Security Consultants

Filtriraj

Moja nedavna iskanja
Filtriraj po:
Proračun
do
do
do
Vrsta
Znanja
Jeziki
    Delovno mesto
    17 najdena dela

    This project is a Safe Life awareness website designed to educate people about the importance of safety in daily life. The website provides useful information about personal safety, online safety, and basic precautions that people should follow to live a safe and healthy life. The website is built using HTML and CSS with a simple and user-friendly design so that anyone can easily understand the safety guidelines. The goal of this project is to spread awareness and help people make better and safer decisions in their daily activities. Tags: safe life, safety awareness, html, css, web design, responsive website Industry: Education / Public Safety

    €6 - €14
    €6 - €14
    0 ponudb

    I am ready to move our organisation to CMMC Level 1 and need a specialist who can guide the entire process from assessment through remediation and documentation. The scope spans three core areas—network security, data protection, and user access control—across all production servers, employee workstations, and our small fleet of mobile devices. Our environment is a typical Microsoft-centric stack with a mix of on-prem VMware hosts, Office 365, and a few SaaS applications that handle Federal Contract Information. What I need first is a concise gap analysis mapped to CMMC Level 1 requirements (aligned with NIST 800-171 Rev 2). From there, we will prioritise fixes, implement the missing safeguards, and collect artefacts that demonstrate ongoing compliance. I expect clear document...

    €461 Average bid
    €461 Povprečna ponudba
    14 ponudb

    The project is related to Service-Oriented Architecture (SOA) and web-service environments, with a focus on protecting service performance and availability using a QoS-aware intrusion detection framework. The work involves detecting malicious traffic that affects service quality, such as denial-of-service, brute-force, and other intrusion behaviors, using machine learning and flow-based network analysis. And for the freelancer, write this: What I need in the technical person: I need a technical freelancer who has strong knowledge in: • Service-Oriented Architecture (SOA) or web-service systems • Network security and intrusion detection • Machine learning / anomaly detection • Python and scientific implementation • Data preprocessing, feature engineering, a...

    €465 Average bid
    €465 Povprečna ponudba
    59 ponudb

    I need a reliable partner who can jump in as first-line support for my staff and keep everyone productive. The focus is on everyday desktop and laptop issues—anything from random hardware glitches to blue screens or slow performance. On the software side you’ll be handling operating system troubleshooting, rolling out application installs and updates, and resolving antivirus or other security alerts before they spread. Network hiccups are another pain point. Expect tickets about dropped internet connections and Wi-Fi dead zones; you’ll diagnose, reconfigure, or escalate as needed so users aren’t offline for long. Although servers and other infrastructure sit in the background, smooth collaboration with my existing IT team is essential when a problem touches their...

    €419 Average bid
    €419 Povprečna ponudba
    51 ponudb

    I’m ready to have my website professionally stress-tested so I can patch every weak spot before it becomes a problem. The engagement centres on two critical areas that hold our most sensitive logic and data—the Login System and the User Data Storage modules. Within those components I want you to probe specifically for SQL Injection, Cross-Site Scripting (XSS) and Broken Authentication issues, emulating real-world attack scenarios while staying fully within ethical boundaries. Industry-standard tooling such as Burp Suite, OWASP ZAP, sqlmap, or their equivalents is expected so results are reproducible and mapped against OWASP Top 10. All findings must be compiled in a comprehensive, developer-friendly document that not only confirms each vulnerability but explains impact, suppli...

    €205 Average bid
    €205 Povprečna ponudba
    40 ponudb

    I’m ready to have my website professionally stress-tested so I can patch every weak spot before it becomes a problem. The engagement centres on two critical areas that hold our most sensitive logic and data—the Login System and the User Data Storage modules. Within those components I want you to probe specifically for SQL Injection, Cross-Site Scripting (XSS) and Broken Authentication issues, emulating real-world attack scenarios while staying fully within ethical boundaries. Industry-standard tooling such as Burp Suite, OWASP ZAP, sqlmap, or their equivalents is expected so results are reproducible and mapped against OWASP Top 10. All findings must be compiled in a comprehensive, developer-friendly document that not only confirms each vulnerability but explains impact, suppli...

    €160 Average bid
    €160 Povprečna ponudba
    41 ponudb

    We are seeking an experienced cybersecurity professional to develop a high-quality, advanced-level practical ethical hacking video course built around a realistic simulated enterprise attack environment. This course must focus heavily on hands-on execution and demonstrate a structured multi-step attack workflow inside a controlled lab network. The final deliverable must contain approximately 10–12 hours of fully edited, polished video content (final runtime after editing). Budget: 40,000 INR (Maximum) Timeline: 30–60 days Core Course Requirements The course must: Be advanced-level practical content Be structured around a connected simulated company environment Include multiple interconnected attack scenarios Demonstrate complete attack chains Include reconnaissance, e...

    €290 Average bid
    €290 Povprečna ponudba
    5 ponudb

    I’m a complete beginner in wireless security and want to build solid, practical skills in penetration testing for Wi-Fi networks. Over a series of one-on-one sessions, I’d like you to walk me through fundamentals, tools (Kali Linux, Aircrack-ng, Wireshark, etc.), attack simulations, and safe lab setup so I can eventually plan and execute my own wireless assessments responsibly. Please share examples of past work that prove you’ve carried out real-world wireless engagements or successfully mentored others in this niche. Concrete demonstrations—screenshots, anonymised reports, short video clips—help me judge fit quickly. We’ll meet online, screen-share, and practice live. Each session should end with actionable homework and clear checkpoints so I can tra...

    €10 Average bid
    €10 Povprečna ponudba
    3 ponudb

    The latest patch wiped out every pointer offset my companion app relies on, so most of its memory reads now return garbage and several packet handlers no longer align with the game’s updated structures. I need an expert who can jump straight into the new build, reverse the changed layouts, and hand back corrected offsets (and any packet-structure tweaks you discover) so the tool is fully functional again. Here’s what success looks like for me: • A clean list of updated base addresses, dynamic offsets, and any changed pointer chains tested on the current live client. • Confirmation that each fix restores the original in-game features of my app without crashes or desync. • A brief summary of any packet format adjustments you uncover while tracing traffic so I ...

    €449 Average bid
    €449 Povprečna ponudba
    46 ponudb

    My wired Ethernet network has stopped working, and I need a skilled technician to get it back online quickly. I’ve already ruled out basic cable swaps, so I’m looking for someone who can: • Diagnose the root cause of the outage (switch, patch panel, NIC, or configuration). • Walk me through any testing steps I should perform on-site (ping, traceroute, link-light checks). • Provide clear, step-by-step instructions or remote-session support to restore connectivity. • Verify that all connected devices regain stable internet and LAN access once the fix is applied. • Offer a brief preventive checklist so I can avoid the same issue in the future. I can share photos of the rack layout, current IP scheme, and error messages from the router and switch interfac...

    €87233 Average bid
    €87233 Povprečna ponudba
    5 ponudb

    I have a small office network—fewer than twenty endpoints—that I want thoroughly examined for weaknesses. The immediate focus is a vulnerability assessment combined with a full network-security audit. Pen-testing isn’t required right now, but I would like the audit to be detailed enough that we could progress smoothly to active exploitation tests later if needed. Scope – Map every device and service, then scan using industry-standard tools such as Nmap, Nessus or OpenVAS. – Analyse configurations (firewall rules, router settings, shared resources, OS hardening) and identify misconfigurations or outdated software. – Provide a clear, prioritized remediation plan. Critical issues first, followed by medium and low-risk findings. – Conclude wit...

    €19 / hr Average bid
    €19 / hr Povprečna ponudba
    31 ponudb

    Job Title: Cyber Security Engineer (Checkpoint Firewall & Akamai WAF) Duration: 2 Hours per Day Budget: ₹30,000 per Month Start Date: Immediate About the Role We are looking for a skilled Cyber Security Engineer with expertise in Checkpoint Firewall and Akamai WAF to support our network security infrastructure. The ideal candidate will be responsible for managing firewall configurations, monitoring network security policies, and assisting in the implementation of web application firewall protections to safeguard enterprise systems. Key Responsibilities Configure, manage, and optimize Checkpoint Firewall environments (policy management, rule configuration, and troubleshooting). Implement and maintain Akamai Web Application Firewall (WAF) rules to protect web applications from security t...

    €9 Average bid
    €9 Povprečna ponudba
    8 ponudb

    Yesterday I noticed that every message and folder in my Hotmail account had vanished after an unauthorized login. I have since taken back control of the mailbox and switched on two-factor authentication, but Microsoft support told me they are unable to restore the data. I still need those emails. I’m after someone who knows the ins and outs of / Microsoft 365 back-end recovery, server-side retention, and forensic mail restoration. If you can locate and reinstate the deleted items—whether through the Recoverable Items folder, legacy PST pulls, or other Microsoft recovery channels—and then harden the account so this can’t happen again, please let me know your approach and an estimated timeline. Acceptance criteria • All recoverable emails and folders resto...

    €119 Average bid
    €119 Povprečna ponudba
    5 ponudb
    Secure Laptop Storage
    1 dan left
    Verificirano

    I need a reliable person located in the United States who can keep my personal laptop safely at their place, plug it in to power, and turn it on once every day. There are no special tasks to run—simply boot it up, confirm it’s online through your regular, stable internet connection, and let it sit for a moment so remote services can sync. After that, you can shut it down again. What matters most is trustworthy, secure storage in a clean, smoke-free environment, and the discipline to power it on daily at roughly the same time. No dedicated network, VPN, or extra equipment is required on your side; a standard home broadband line is sufficient. If you can provide a safe spot, dependable internet, and consistent daily availability, let’s talk about the hand-off logistics an...

    €19 / hr Average bid
    €19 / hr Povprečna ponudba
    23 ponudb

    Scenario Background: The scenario assumes that you are working as a security expert for a fictional company, Acme Coffee Company. The company includes several roles, including Bruno (CEO), Spike (Vice President of Sales), Eilik and Eilika (Sales), Loki (System Administrator), and Avery (Marketing). Loki has built a new company server, and Bruno has hired you to conduct a comprehensive security analysis and assessment of that server and submit a complete report. The final report should include your findings, techniques, graphics, and methodology, along with recommendations for improving any security issues identified. Video Overview: The instructor explains that the final project will provide a target machine personally built by the instructor to represent the Acme company environment. Yo...

    €127 Average bid
    €127 Povprečna ponudba
    13 ponudb

    Se requiere especialista en ciberseguridad / redes / seguridad informática para desarrollar la parte práctica de un trabajo personal. El proyecto consiste en la implementación y validación técnica de una arquitectura Zero Trust en un entorno virtualizado, comparándola con una arquitectura tradicional basada en VPN. ALCANCE DEL TRABAJO El freelancer deberá: 1. Construir laboratorio virtual Crear entorno simulado de red empresarial. Implementar: Servidor de autenticación (IAM o similar). Servidor de aplicaciones. Segmentación de red. Endpoint remoto. Gateway o firewall. Puede utilizar herramientas como: VMware, VirtualBox, GNS3, Proxmox, Azure Lab, AWS Lab u otra propuesta técnicamente viable. 2. Implementar arquite...

    €18 / hr Average bid
    €18 / hr Povprečna ponudba
    9 ponudb
    White-Box Web App Penetration
    19 ur left
    Verificirano

    I am ready to put my in-house web application through a thorough white-box penetration test and need a seasoned ethical hacker to run point. Because I can supply source code, architecture docs, and admin-level credentials, you will have full visibility to explore logic flaws, insecure configurations, and anything else that could turn into a real-world exploit. A key requirement is prior experience registering newly discovered vulnerabilities in official government vulnerability databases or repositories; I will rely on you not only to uncover issues but also to craft the correct disclosure package so the finding can be submitted and tracked according to policy. Scope • Inspect the entire codebase, APIs, and third-party integrations. • Execute manual and automated testing us...

    €173 Average bid
    Pogodba o nerazkritju informacij
    €173 Povprečna ponudba
    21 ponudb

    Priporočeni članki samo za vas