Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.

Here's some projects that our expert Network Security Consultants made real:

  • Find the source of cyber threats to enhance security
  • Create secure solutions working with double routers, VPN and firewalls
  • Produce educational materials to spread knowledge in network security field
  • Design secure computer system architectures for clients of varying sizes
  • Utilize sophisticated technologies such as SDN (Soft Defined Networks), SVM (Support Vector Machine), Machine Learning to classify traffic
  • Identify Suspicious behavior in digital data for forensic investigations
  • Enhance network security with cutting edge algorithms and software solutions
  • Test and mitigate potential cyber threats from denial of service attacks.

Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.

Od 21,907 ocen, stranke ocenjujejo Network Security Consultants 4.9 od 5 zvezdic.
Najem Network Security Consultants

Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.

Here's some projects that our expert Network Security Consultants made real:

  • Find the source of cyber threats to enhance security
  • Create secure solutions working with double routers, VPN and firewalls
  • Produce educational materials to spread knowledge in network security field
  • Design secure computer system architectures for clients of varying sizes
  • Utilize sophisticated technologies such as SDN (Soft Defined Networks), SVM (Support Vector Machine), Machine Learning to classify traffic
  • Identify Suspicious behavior in digital data for forensic investigations
  • Enhance network security with cutting edge algorithms and software solutions
  • Test and mitigate potential cyber threats from denial of service attacks.

Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.

Od 21,907 ocen, stranke ocenjujejo Network Security Consultants 4.9 od 5 zvezdic.
Najem Network Security Consultants

Filtriraj

Moja nedavna iskanja
Filtriraj po:
Proračun
do
do
do
Vrsta
Znanja
Jeziki
    Delovno mesto
    43 najdena dela

    We are seeking an experienced cybersecurity professional to develop a high-quality, advanced-level practical ethical hacking video course built around a realistic simulated enterprise attack environment. This course must focus heavily on hands-on execution and demonstrate a structured multi-step attack workflow inside a controlled lab network. The final deliverable must contain approximately 10–12 hours of fully edited, polished video content (final runtime after editing). Budget: 40,000 INR (Maximum) Timeline: 30–60 days Core Course Requirements The course must: Be advanced-level practical content Be structured around a connected simulated company environment Include multiple interconnected attack scenarios Demonstrate complete attack chains Include reconnaissance, e...

    €247 Average bid
    €247 Povprečna ponudba
    2 ponudb

    I’m a complete beginner in wireless security and want to build solid, practical skills in penetration testing for Wi-Fi networks. Over a series of one-on-one sessions, I’d like you to walk me through fundamentals, tools (Kali Linux, Aircrack-ng, Wireshark, etc.), attack simulations, and safe lab setup so I can eventually plan and execute my own wireless assessments responsibly. Please share examples of past work that prove you’ve carried out real-world wireless engagements or successfully mentored others in this niche. Concrete demonstrations—screenshots, anonymised reports, short video clips—help me judge fit quickly. We’ll meet online, screen-share, and practice live. Each session should end with actionable homework and clear checkpoints so I can tra...

    €10 Average bid
    €10 Povprečna ponudba
    1 ponudb

    Freelance IT positon based on the below SOW: The technician shall support deployment, maintenance, evolution (Wi-Fi coverage extensions, commissioning of phone lines, etc) and site dismounting. ●will maintain, install, and extend wired and WiFi IP networks. This will mainly consist in: ● Participating site surveys (checking materials localization in various place in the camp) ● installing WiFi access points ● installing new switches or routers ● installing and plugging RJ45 wires ● installing and repairing Optical Fibber ● Implementation of the planned network structure ● Attaching APs and setting up a radio connection ● PRC support and implementation

    €23 / hr Average bid
    €23 / hr Povprečna ponudba
    4 ponudb

    I need an experienced installer to set up a Starlink network at our RV park near Montgomery City, MO, primarily for business operations and guest internet access. This project is urgent and needs to be done ASAP. Key Requirements: - Check current Starlink equipment and other equipment currently used on site. - Configure network for reliable guest access - Ensure coverage throughout the park Ideal Skills and Experience: - Proven experience with Starlink installations in RV parks - Strong networking and configuration skills - Ability to provide past work documentation and experience Please include past work examples and project proposals in your application. Looking forward to your bids!

    €349 Average bid
    Lokalno
    €349 Povprečna ponudba
    2 ponudb

    SOW: The technician shall support deployment, maintenance, evolution (Wi-Fi coverage extensions, commissioning of phone lines, etc) and site dismounting. ●will maintain, install, and extend wired and WiFi IP networks. This will mainly consist in: ● Participating site surveys (checking materials localization in various place in the camp) ● installing WiFi access points ● installing new switches or routers ● installing and plugging RJ45 wires ● installing and repairing Optical Fibber ● Implementation of the planned network structure ● Attaching APs and setting up a radio connection ● PRC support and implementation

    €17 / hr Average bid
    €17 / hr Povprečna ponudba
    4 ponudb

    The technician shall support deployment, maintenance, evolution (Wi-Fi coverage extensions, commissioning of phone lines, etc) and site dismounting. ●will maintain, install, and extend wired and WiFi IP networks. This will mainly consist in: ● Participating site surveys (checking materials localization in various place in the camp) ● installing WiFi access points ● installing new switches or routers ● installing and plugging RJ45 wires ● installing and repairing Optical Fibber ● Implementation of the planned network structure ● Attaching APs and setting up a radio connection ● PRC support and implementation

    €2 - €7 / hr
    €2 - €7 / hr
    0 ponudb

    I need Grok talking fluently to our dedicated Microsoft SQL Server so that business users can run natural-language, read-only queries through Grok’s interface. The task breaks down into two core pieces of work: • Implement the xAI Grok API on our side and map its request / response cycle to T-SQL. • Establish a rock-solid SSL/TLS-encrypted connection to the database using SQL Server Authentication. The server is already isolated behind our corporate firewall; your job is to add the secure transport layer, handle credential storage safely, and make sure Grok can reach the database without exposing write or admin rights. Acceptance criteria 1. A small PoC script (language of your choice) that accepts a Grok prompt and returns the matching result set from SQL Server. ...

    €418 Average bid
    €418 Povprečna ponudba
    123 ponudb
    Bug Bounty Program Setup
    5 dni left
    Verificirano

    My customer-facing web applications need a fully-fledged bug bounty program that starts with a professional security assessment. The focus is pure CyberSecurity: map the current attack surface, uncover vulnerabilities, and shape a disclosure workflow that rewards researchers responsibly. You will first perform a thorough security assessment on the live web apps, documenting every finding with severity, reproducible steps, and clear remediation advice. From those results, design the bounty structure (scope wording, reward tiers, triage flow, and response SLAs) so it can be published on platforms such as HackerOne or Bugcrowd. Deliverables • Comprehensive assessment report (OWASP Top 10 coverage, business-logic flaws, misconfigurations, etc.) • Drafted public program brief, inc...

    €141 Average bid
    €141 Povprečna ponudba
    8 ponudb

    I want my new AWS account configured to host a USA-based SIP trunk through Amazon Chime. The job includes creating or hardening the AWS environment, provisioning an Amazon Chime Voice Connector, assigning U.S. numbers, and enabling both inbound and outbound calling. The trunk has to register cleanly with our existing on-premise PBX and soft-phone apps, so please allow for SIP signaling tweaks, codec selection, and basic security (TLS, SRTP, firewall rules). Once the link is live, I’ll need brief documentation of the key settings so we can maintain it internally. Deliverables • AWS account prepared with least-privilege IAM roles • Amazon Chime Voice Connector fully configured and licensed for U.S. PSTN access • SIP trunk integrated and test calls completed (in...

    €16 Average bid
    €16 Povprečna ponudba
    9 ponudb

    Project Description Highlights The Mission: We are building "QuantumShield," a high-performance, user-friendly desktop application that protects sensitive SMB data against "Harvest Now, Decrypt Later" threats using standardized Post-Quantum Cryptography. Key Technical Focus: This is not a standard encryption project. We require implementation of ML-KEM (Kyber) and ML-DSA (Dilithium) within a Hybrid Cryptographic Scheme (PQC + Classical AES-256). The Deliverable: A functional MVP for Windows/macOS featuring a "One-Click Shield" drag-and-drop interface and a "Quantum Health Dashboard" that monitors file vulnerability status. Required Tech Stack: High-performance systems programming (e.g., Rust, C++, or Go) with direct experience usi...

    €5434 Average bid
    €5434 Povprečna ponudba
    69 ponudb

    I need an experienced CyberArk-savvy engineer to help me eliminate a persistent 403 Forbidden error that appears when Remote Access (formerly Alero) tries to reach the “/guac/direct” endpoint on a PAM-registered server. The environment runs on Windows and the block is clearly coming from the Remote Access component itself—PVWA and PSM are working until Remote Access refuses the session. So far I have followed CyberArk’s own documentation step-by-step, but the problem remains. The logs point to trust-validation trouble with the self-signed certificates used between Remote Access, PVWA and PSM; when the containers spin up, Docker reports: INFO: Adding certificate in file /opt/trust/import/ to the OpenSSL trusted certificate authorities. INFO: Symbolic link to cert...

    €96 Average bid
    €96 Povprečna ponudba
    27 ponudb

    Our office needs hands-on help with our networking gear. I want an experienced technician to come on-site, isolate the cause of several recurring connectivity drops, and complete a clean switch installation and configuration while you are here. No desktop or server work is required—this assignment is strictly about the network hardware. Scope of work • Troubleshoot the existing cabling and switch stack to stop packet loss and random outages. • Install and configure the replacement/added switches, making sure VLANs, trunk ports, and access ports match our current design. • Verify stable connectivity for every connected device once the changes are in place. • Document the final configuration and any changes you made so the next round of maintenance is straigh...

    €91 Average bid
    €91 Povprečna ponudba
    2 ponudb
    Investigate and Block Bot Traffic
    5 dni left
    Verificirano

    Over the past few days I have noticed a sharp, unexplained spike in direct traffic on my corporate website. The pattern is the same worldwide—thousands of repeated page views hitting the same endpoints every few minutes—yet no genuine engagement follows. Because I have no firewall, captcha, or other security layer in place, I suspect an automated script or bot is hammering the site and inflating my analytics. I need a security-minded developer to: • Analyse server logs, analytics data, and DNS records to confirm the source, volume, and behaviour of the suspicious requests. • Pinpoint whether the traffic originates from a compromised script inside the site, a third-party resource, or external botnets. • Recommend and implement practical counter-measures such...

    €10 Average bid
    €10 Povprečna ponudba
    13 ponudb

    I’m looking for a hands-on network technician who can take charge of every stage of our camp-wide connectivity: from the first walkthrough to the final site dismount. The work happens entirely in an outdoor site/camp environment, so you’ll need to be comfortable moving between containers, masts, and rough terrain while keeping cables tidy and hardware protected. The immediate priority is expanding and fine-tuning WiFi coverage. We have not locked in any specific access-point brand yet, so I’ll rely on your recommendations for rugged, field-proven models that integrate cleanly with standard switches and routers. Scope of work • Conduct physical site surveys to map optimal equipment locations and check existing material placement. • Install, align, and commi...

    €17 / hr Average bid
    €17 / hr Povprečna ponudba
    3 ponudb
    Ubuntu OpenVPN Remote Access Setup
    5 dni left
    Verificirano

    I want my Ubuntu server configured as an OpenVPN host that lets me and a small team (fewer than ten users) connect securely from anywhere. The goal is straightforward: reliable, encrypted remote access without having to worry about manual key generation, firewall tweaks, or routing issues each time we add a new device. Here’s what I expect at the end of the job: • OpenVPN installed and running on my existing Ubuntu server (latest LTS). • User-friendly client configuration files or .ovpn bundles for up to ten devices, plus a quick guide so I can generate more later if needed. • Firewall and IP forwarding rules adjusted so traffic is tunneled safely while the rest of the server’s services keep working as they do now. • Basic security best practices ap...

    €17 Average bid
    €17 Povprečna ponudba
    19 ponudb

    I’m looking to have IP cloning / masking configured on my VoIP servers so we can distribute traffic evenly and keep call quality high. Load balancing is the sole objective here—this isn’t about anonymity or region-hopping, just making sure each incoming SIP session finds the least-loaded endpoint without exposing multiple public addresses. The environment is already up and running; what I need is the networking magic that presents one or more virtual IPs while the real servers sit safely behind them. If you normally work with tools such as iptables, nftables, HAProxy, IPVS, BGP anycast, or cloud firewalls, that’s perfect—use whatever combination you trust so long as it’s stable and keeps latency low. Because the phone queues are busy, I need this done ...

    €8 Average bid
    €8 Povprečna ponudba
    4 ponudb

    My wired Ethernet network has stopped working, and I need a skilled technician to get it back online quickly. I’ve already ruled out basic cable swaps, so I’m looking for someone who can: • Diagnose the root cause of the outage (switch, patch panel, NIC, or configuration). • Walk me through any testing steps I should perform on-site (ping, traceroute, link-light checks). • Provide clear, step-by-step instructions or remote-session support to restore connectivity. • Verify that all connected devices regain stable internet and LAN access once the fix is applied. • Offer a brief preventive checklist so I can avoid the same issue in the future. I can share photos of the rack layout, current IP scheme, and error messages from the router and switch interfac...

    €86801 Average bid
    €86801 Povprečna ponudba
    5 ponudb

    I need a seasoned network and CCTV specialist to configure and oversee a real-time incident-reporting setup. My top priority is catching and reporting any unauthorized access the moment it happens, specifically at all building entrances and exits. Here’s what I’m looking for: • Audit our current camera and network layout, confirm coverage at every door, and flag blind spots. • Configure live monitoring software that can push instant notifications (email, SMS, or app-based) whenever an access breach is detected. • Fine-tune motion and analytics settings to limit false positives while still spotting genuine threats. • Set up a central dashboard so I can review live feeds, recorded clips, and incident logs in one place. • Write a concise hando...

    €489 Average bid
    €489 Povprečna ponudba
    17 ponudb

    I have a small office network—fewer than twenty endpoints—that I want thoroughly examined for weaknesses. The immediate focus is a vulnerability assessment combined with a full network-security audit. Pen-testing isn’t required right now, but I would like the audit to be detailed enough that we could progress smoothly to active exploitation tests later if needed. Scope – Map every device and service, then scan using industry-standard tools such as Nmap, Nessus or OpenVAS. – Analyse configurations (firewall rules, router settings, shared resources, OS hardening) and identify misconfigurations or outdated software. – Provide a clear, prioritized remediation plan. Critical issues first, followed by medium and low-risk findings. – Conclude wit...

    €19 / hr Average bid
    €19 / hr Povprečna ponudba
    27 ponudb
    Account Takeover Mobile Forensics
    4 dni left
    Verificirano

    I need a digital-forensics professional who can dig into a persistent, ongoing account-takeover problem that has affected both my Android and iOS devices. The attackers appear to be using SIM-swap tactics and other identity-theft angles to gain repeated access. My priority is twofold: first, trace and document the technical footprint well enough to identify the individual or group behind the breaches; second, harden every vulnerable point so the intrusions stop for good. You will have full, lawful access to my handsets, carrier logs, and any cloud backups necessary for a thorough examination. I expect you to employ industry-standard toolsets too extract, preserve, and analyze artifacts without compromising evidentiary integrity. Please keep chain-of-custody records meticulous; I may forwa...

    €929 Average bid
    €929 Povprečna ponudba
    12 ponudb

    Job Title: Cyber Security Engineer (Checkpoint Firewall & Akamai WAF) Duration: 2 Hours per Day Budget: ₹30,000 per Month Start Date: Immediate About the Role We are looking for a skilled Cyber Security Engineer with expertise in Checkpoint Firewall and Akamai WAF to support our network security infrastructure. The ideal candidate will be responsible for managing firewall configurations, monitoring network security policies, and assisting in the implementation of web application firewall protections to safeguard enterprise systems. Key Responsibilities Configure, manage, and optimize Checkpoint Firewall environments (policy management, rule configuration, and troubleshooting). Implement and maintain Akamai Web Application Firewall (WAF) rules to protect web applications from security t...

    €8 Average bid
    €8 Povprečna ponudba
    7 ponudb

    Project Title: Web Security Audit & Penetration Testing for Marketplace Website Description: We are preparing to launch a new online marketplace platform and are looking for an experienced web security specialist to perform a full security review of the site. The goal is to identify any vulnerabilities and ensure the platform is secure before public launch. Scope of work: • Perform a full security audit of the web application • Conduct penetration testing to identify vulnerabilities • Review authentication, API security, and database access • Check for common vulnerabilities (OWASP Top 10) • Identify potential risks in front-end and back-end architecture • Provide a clear report outlining vulnerabilities and recommended fixes Important: • You must hav...

    €454 Average bid
    €454 Povprečna ponudba
    160 ponudb

    I need an expert to configure FreeRADIUS to act as a proxy. Requirements: - Support for PAP/CHAP authentication protocols. - Proxy to an LDAP backend for authentication. - Handle username and password user information. Ideal Skills and Experience: - Proficient in FreeRADIUS configuration. - Experience with LDAP integration. - Knowledge of PAP/CHAP protocols.

    €130 Average bid
    €130 Povprečna ponudba
    20 ponudb

    I’m ready to launch a production-grade web application on AWS and need the underlying infrastructure designed and built with security and high availability at its core. The workload will run on EC2, and general-purpose instances are fine; the focus is on a rock-solid architecture, not exotic hardware profiles. Here’s what I have in mind: a VPC with public and private subnets spread across at least two Availability Zones, an Application Load Balancer in front, Auto Scaling groups to keep capacity healthy, and tight security groups plus IAM roles that follow least-privilege rules. Logging to S3, monitoring and alerts through CloudWatch, and encrypted traffic everywhere (ACM certificates, HTTPS, TLS-enabled internal hops) are all must-haves. Wherever possible, I’d like the ...

    €171 Average bid
    €171 Povprečna ponudba
    32 ponudb

    I need Microsoft Intune fully configured so that both Windows and macOS devices can be enrolled smoothly and kept secure. The scope covers initial setup of enrollment profiles, creation of security and compliance policies, and Azure AD Conditional Access rules that gate company resources and SaaS apps behind device-health checks. Everything must support a BYOD model without exposing corporate data. Key points I want addressed • Autopilot/Company Portal enrollment flows for Windows and macOS • Baseline compliance settings (password, encryption, OS update cadence) and security baselines tuned to our environment • Conditional Access policies that tie sign-in to device compliance status • Application protection policies so corporate data stays within managed containe...

    €352 Average bid
    €352 Povprečna ponudba
    31 ponudb

    Scenario Background: The scenario assumes that you are working as a security expert for a fictional company, Acme Coffee Company. The company includes several roles, including Bruno (CEO), Spike (Vice President of Sales), Eilik and Eilika (Sales), Loki (System Administrator), and Avery (Marketing). Loki has built a new company server, and Bruno has hired you to conduct a comprehensive security analysis and assessment of that server and submit a complete report. The final report should include your findings, techniques, graphics, and methodology, along with recommendations for improving any security issues identified. Video Overview: The instructor explains that the final project will provide a target machine personally built by the instructor to represent the Acme company environment. Yo...

    €121 Average bid
    €121 Povprečna ponudba
    12 ponudb

    Se requiere especialista en ciberseguridad / redes / seguridad informática para desarrollar la parte práctica de un trabajo personal. El proyecto consiste en la implementación y validación técnica de una arquitectura Zero Trust en un entorno virtualizado, comparándola con una arquitectura tradicional basada en VPN. ALCANCE DEL TRABAJO El freelancer deberá: 1. Construir laboratorio virtual Crear entorno simulado de red empresarial. Implementar: Servidor de autenticación (IAM o similar). Servidor de aplicaciones. Segmentación de red. Endpoint remoto. Gateway o firewall. Puede utilizar herramientas como: VMware, VirtualBox, GNS3, Proxmox, Azure Lab, AWS Lab u otra propuesta técnicamente viable. 2. Implementar arquite...

    €18 / hr Average bid
    €18 / hr Povprečna ponudba
    9 ponudb
    White-Box Web App Penetration
    2 dni left
    Verificirano

    I am ready to put my in-house web application through a thorough white-box penetration test and need a seasoned ethical hacker to run point. Because I can supply source code, architecture docs, and admin-level credentials, you will have full visibility to explore logic flaws, insecure configurations, and anything else that could turn into a real-world exploit. A key requirement is prior experience registering newly discovered vulnerabilities in official government vulnerability databases or repositories; I will rely on you not only to uncover issues but also to craft the correct disclosure package so the finding can be submitted and tracked according to policy. Scope • Inspect the entire codebase, APIs, and third-party integrations. • Execute manual and automated testing us...

    €178 Average bid
    Pogodba o nerazkritju informacij
    €178 Povprečna ponudba
    20 ponudb

    I’m looking for someone who has already rolled out operating-system hardening at scale—ideally across a thousand endpoints or more—to bring that same discipline to our Windows 10 environment. The goal is to lock down every production workstation without disrupting daily workflows, then document the process so it can be repeated and audited. Scope • Windows 10 on the following device types: – Desktops – Laptops – Tablets What you’ll actually do First, review our current build images and live machines, measure them against the latest CIS Benchmarks and Microsoft security baselines, and identify all gaps. Next, create a hardened baseline that can be enforced through Group Policy, Intune, or a scripted solution—whichever ...

    €208 Average bid
    €208 Povprečna ponudba
    7 ponudb

    I want my iPhone hardened so it stops listening to—or broadcasting—every kind of beacon signal and ignores any future provisioning attempts. The focus is on three specific vectors: Wi-Fi beacons, Bluetooth beacons and location-based beacons. Here’s what I need from you: • A step-by-step configuration (or profile) that disables discovery, advertising and scanning for the three beacon types, while still letting me keep everyday services such as calls, basic data and SMS working. • Clear instructions on blocking carrier or remote-management provisioning without jail-breaking the device, or an alternative secure method if a profile alone cannot achieve this. • A short call or screen-share session so I can replicate the changes on any future iOS update...

    €392 Average bid
    €392 Povprečna ponudba
    64 ponudb

    I need a skilled IT developer to create a robust access control system. The software should integrate the following key features: - Biometric authentication - RFID card access - Remote access capabilities Ideal skills and experience: - Expertise in software development, particularly in security systems - Experience with biometric and RFID technologies - Strong background in developing remote access functionalities - Knowledge of database management for secure data handling - Ability to deliver a user-friendly interface Looking for someone who can ensure high-security standards and is able to work within my budget. Please provide examples of similar projects you've completed.

    €61082 Average bid
    €61082 Povprečna ponudba
    117 ponudb

    TÉRMINOS DE REFERENCIA Servicio de Análisis de Vulnerabilidades y Pruebas de Intrusión para Infraestructura Tecnológica 1. OBJETIVO DE LA CONTRATACIÓN Contratar un servicio especializado de Análisis de Vulnerabilidades y Pruebas de Intrusión que permita evaluar el nivel de seguridad en: • Defensa perimetral • Redes internas • Sistemas operativos • Aplicaciones web publicadas • Aplicaciones móviles • Sistemas de información y equipos de comunicación 2. PLAZO DE PRESTACIÓN DEL SERVICIO El servicio deberá ejecutarse en un plazo máximo de 45 días calendario. 3. DESCRIPCIÓN DEL SERVICIO Actividades • Evaluar el nivel de seguridad en aplicaciones web, activo...

    €1283 Average bid
    €1283 Povprečna ponudba
    11 ponudb

    Looking for a CCNA certified expert Strong hands-on experience with lab-based questions in live practice test Proven ability to solve simulation-based scenarios in real time Capable of providing accurate and reliable solutions on the spot Good analytical and problem-solving skills

    €5 / hr Average bid
    €5 / hr Povprečna ponudba
    10 ponudb

    My phone and Mac-based computer were recently compromised and I am seeing clear signs of unauthorized access, suspicious background activity, and some missing files. I need an experienced ethical hacker or cybersecurity specialist who can remotely examine both devices, identify every backdoor or malicious profile, recover any lost data where possible, and lock everything back down so I am fully in control again. Your work will involve a forensic sweep of macOS (and the companion phone, likely iOS) to trace how the intruder got in, remove any malware or configuration profiles they left behind, and then hard-harden the system—ensuring strong authentication, updated firmware, and airtight network settings. Please be comfortable using common incident-response tooling such as Wireshark, ...

    €143 Average bid
    €143 Povprečna ponudba
    18 ponudb

    We need a new junior-level developer with good experience in wireshark, GNS3 and other network installations We need work at low budget and for long term

    €3 / hr Average bid
    €3 / hr Povprečna ponudba
    22 ponudb
    ISSABEL VOIP
    1 dan left
    Verificirano

    Project Title: Full Issabel 5 PBX Deployment: Installation, Trunks & Extensions Project Overview I am seeking a VoIP specialist to perform a complete installation of Issabel 5 on an AlmaLinux 8 cloud instance. Beyond the base installation, the freelancer will configure the initial telephony architecture, including SIP trunks for external connectivity and internal extensions for users. Detailed Scope of Work 1. Server Installation & Hardening Perform a clean installation of Issabel 5 on AlmaLinux 8 using the official net-install script. Configure Fail2ban and firewall rules to block unauthorized SIP and SSH attempts. Set secure passwords for the Linux root, MariaDB, and Issabel web admin. 2. SIP Trunk Configuration Connect the PBX to my chosen VoIP provider using a SIP trunk....

    €36 Average bid
    €36 Povprečna ponudba
    13 ponudb

    Project Overview Designed and implemented an intelligent DDoS detection and mitigation framework for Software-Defined Networking (SDN) based Vehicular Ad-hoc Networks (VANETs) to ensure secure, reliable, and low-latency vehicle-to-infrastructure (V2I) communication. The system leverages SDN’s centralized control to dynamically monitor network traffic and mitigate DDoS attacks in real time, ensuring uninterrupted safety-critical vehicular services. Key Innovations: SDN-Based Centralized Security Control OpenFlow-enabled SDN controller Global view of VANET traffic behavior Intelligent DDoS Detection Flow-level traffic analysis Anomaly detection using ML / Deep Learning (LSTM Autoencoder / Hybrid model) Real-Time Mitigation Strategy Malicious vehicle flow isolation Dynamic ru...

    €74 Average bid
    €74 Povprečna ponudba
    10 ponudb

    I need an expert to configure Citrix Netscaler for load balancing. The primary goal is to ensure high availability for my applications. Key Requirements: - Experience with Citrix Netscaler - Expertise in configuring load balancing for high availability - Knowledge of both on-premise and cloud deployments Ideal Skills: - Networking and infrastructure knowledge - Experience with web applications, database servers, or email servers - Problem-solving skills for optimizing performance and uptime Please provide relevant experience and approach. Must be located in the US.

    €46 / hr Average bid
    €46 / hr Povprečna ponudba
    16 ponudb

    I need a skilled professional to install Windows Server 2025 and configure RDP and VPN. The VPN should allow multiple user connections. Requirements: - Install Windows Server 2025 - Configure Remote Desktop Protocol (RDP) - Set up VPN for multiple user connections Ideal Skills & Experience: - Extensive experience with Windows Server installations, especially 2025 - Strong knowledge of RDP and VPN configurations - Networking expertise to ensure secure and efficient multiple user connections

    €77 Average bid
    €77 Povprečna ponudba
    25 ponudb

    RDP Server Migration & VPN Configuration Summary 1. Current State Currently uses: A dedicated RDP server in Azure Installed with Mocha TN3270 for Windows 10/11 To access a State-hosted IBM Mainframe system Through a State-managed VPN connection That RDP server exists for a single purpose: To allow users to run the TN3270 client and access the State IBM mainframe. Current Network Path Workstation → RDP to Azure server → pfSense firewall in Azure → State VPN → IBM Mainframe Azure contains: A virtual network A pfSense firewall A VPN tunnel from pfSense to the State network The RDP server routes traffic through pfSense, which then routes to the State VPN. This introduces: Unnecessary infrastructure (RDP server) Additional attack surface Additional management ov...

    €509 Average bid
    €509 Povprečna ponudba
    29 ponudb
    Ricoh Scan-to-Folder Setup
    12 ur left
    Verificirano

    I need someone to walk me through, or remotely handle, the full configuration of Scan-to-Folder on a Ricoh multifunction printer so that every scan lands in a shared network folder on my Windows 10 machine. The target folder already sits on a network drive, so the job includes: • Confirming folder sharing & NTFS permissions over SMB • Entering the correct path, user credentials, and port settings in the Ricoh web interface or on-panel menu • Testing with a live scan to prove that files arrive without errors or authentication prompts Please bring prior experience with Ricoh devices (model-specific quirks, TLS/SMB v1 vs v2 issues, etc.) and be comfortable using remote-access tools if needed. The task is considered complete once a PDF shows up in the specified folde...

    €32 Average bid
    €32 Povprečna ponudba
    9 ponudb

    I’m expanding Eigen Computing’s stealth-mode R&D team and need senior-level talent who can tackle optimisation at scale. We are building a hardware-accelerated probabilistic engine that runs QUBO/Ising workloads for Logistics, Finance, and Cyber-Intelligence, and I’m open to engaging specialists across several tracks: • ML Engineer – craft graph neural networks and matrix-compression pipelines that translate complex optimisation problems into sparse, hardware-friendly representations. • FPGA Engineer – write VHDL/Verilog kernels for AWS F1, pushing the solver to micro-second latency. • Backend Architect – design a high-performance API layer in Go, Rust or Python that orchestrates FPGA instances, manages job queues and exposes RE...

    €16 Average bid
    €16 Povprečna ponudba
    21 ponudb

    I’m a computer-science student up against a deadline on a small networking assignment and I simply no longer have the hours to finish it properly. The scope is modest—nothing enterprise-level—but I still need a clean, working solution that I can submit with confidence. Here’s what I’ll hand over the moment we start: • The original brief from my instructor (topology requirements, IP addressing rules, and any grading rubrics). • Any partial work I’ve already done. What I need back from you: • A complete, functional design or configuration that satisfies every point in the brief. • A short write-up (plain text or PDF) that explains the choices made so I can discuss them if asked. • All supporting files: diagrams (Visio, PNG,...

    €108 Average bid
    €108 Povprečna ponudba
    30 ponudb

    Priporočeni članki samo za vas