Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.De 109077 comentarios, los clientes califican nuestro Computer Security Consultants 4.87 de un total de 5 estrellas.
Cybersecurity Risk Assessment and Remediation Services, End-User Cybersecurity Awareness Training, Cyber-liability and Data Breach Insurance Coverage program, and a Security Incident Response Plan.
Need someone to audit our network setup and provide updates for security, efficiency, speed etc. Full Unify system with Protect, large file transfers and NDI video on our network
We (freelancer.com) have an exciting opportunity for an experienced " Field -Service Delivery Coordinator" to join our team and be part of this amazing project during an amazing growth period -Pay per day - 1300/day -Weekly pay -FULL TIME Freelancing -6 days work week - Location - Vizag Role Title: Scheduler Field Services/Coordinator Roles and Responsibilities: Allocating and managing daily assignment of work orders and field service resources Coordinating the onboarding and training of field service resources Outbound calls to customers to obtain further information and/or to identify customer satisfaction Delivering a high level of customer service through day-to-day interaction with the field team Ensuring performance metrics are met Requirements: Exper...
Need help with giving test scores for IAM/PAM Technologies. You need to select 4 PAM tools (CyberArk,Delinea,Beyond Trust,One Identity) and give test results for each test case.
Hello, I have a specific file from quicken 1999 that I was able to recover for my old hardrive. The file's extension is .q99 It's an old tax return that is needed. I would need someone to help me view the content of this data and generate pdf . I have tried everything online.
Talented cyber/website security needed Right away.
Do you feel like scanners are just to catch the low-hanging fruit and that the real findings are left for the human testers? Have you tested hundreds of networks and still want more? If this describes you, you’re in luck! We are looking for an experienced penetration security testers to join our team of highly skilled penetration testers. If you feel most at home with a scanner and manually following up on those vulnerabilities, this is NOT the kind of job we are offering. Minimum Requirements -Advanced ability to detect, define, exploit, and remediate vulnerabilities without the use of a vulnerability scanner (a browser, a proxy, an editor, and YOU) Develop detailed reports on findings and remediations – Familiarity with Windows Internals – Vulnerability and ...
I need a help for my computer security WordPress vulnerabilities final project
We have a PDF we wish to share with a federal agency but we wish to remove all metadata, including author and source/location. We would also like someone to lock the document so it is secure and unable to be changed or altered in any way.
I am designing an IP Telephony Topology and am having difficulty designing the following elements: 1. Routing Protocols (EIGRP & OSPF). 2. Switchport Security. 3. Configuring IP Telephones. Network System Requirements as per the attached file. I have started designing this but need some assistance as i am hitting some roadblocks so can share the packet tracer file and commands i have used. I have designed this using Cisco Packet Tracer.
I am looking for someone expert in this area. Cyber Security - Dynamic Control Flow Tracing - Reverse Engineering Familiar with GHIDRA
We have a few surveillance cameras in diferent places with Internet acces trough a need is to connect them to a 's posibble to connect them with Microtic VPN solution?In some places we have 2-3 cameras,some places with 1 camera.
Hi im looking for an Expert ethical hacking capable of intercepting any US/Canadian based sms without physical access to the phone We will be using my phone for the project Only apply of you have the skillset for the job
We are looking for a cool, positive person to work with us, our partners and customers. A person who is not afraid of challenges and technology. Duties will include: - contacting clients (also in English) via email, LinkedIn, Facebook and chat - invoicing existing customers - contacting web portals to post articles - assisting in adding advertisements Requirements: - well spoken and written polish and english - experience in sales (preferably online) - proficient computer skills - availability minimum 4h a day Monday to Friday between 8 am and 5 pm. Welcome: - experience in marketing or recruitment - basic knowledge of SEO
Wanted Project Coordinator in CCTV & Security Systems We are one of the leading CCTV & Security Systems Service Provider/ We are looking for Project Coordinator to Coordinate the Installation teams onsite. Job Responsibility Site survey Providing a quality installation team in the most methodical and efficient manner, including the ability to digest detailed scope of works and working drawings Production of high quality commissioning and handover documentation and as fit drawings Maintaining safe work environment at all times and have a good understanding of Health and Safety i.e. Method, Risk assessments, safe working procedures etc. Training and demonstration of systems to explain the systems working and functionality Maintaining MIS Reports Responding to out of hours serv...
Internet security practices.. To provide training of 25 employees
I need help in a real-life ethical hacking project. Have been tasked to see if a RAT can bypass security measures and breach a server. Have a competent understanding of the operating system environment, programming and coding but need the practical help of implementing etc.
Hello, I need someone with packet tracer or wireshark knowledge, who can help me to understand and read data on network. It's a very short project but please bid if you have knowledge of packet tracer or wireshark. I will explain details in private message. Thanks
VPN issue on Windows server. (Firewall is SonicWall) VPN has been fine but suddenly not working after changing IP address from ISP, but I updated it already The remote connection was not made because the attempted VPN tunnels failed. The VPN server might be unreachable. if this connection is attempting to use an L2TP/IPsec tunnel, the security parameters required for IPsec negotiation might not be configured properly.
Hi, I'm looking for an expert in "Introduction to computer communication networks" for helping me in a project I have. If this project will go well, there are plenty more to come as I run a development agency. I attached 5 short questions to check if you have the relevant knowledge for this mission. Please start your message with - "today was a good day" Thanks
Edge computing is much vulnerable to various types of security attacks. Various approaches for detecting security threats in edge computing have been presented. Machine learning has been proposed by various researchers for attack detection. The schemes which have already been proposed have various phases of data preprocessing, feature extraction, and classification. It is analyzed that machine learning algorithms like SVM, KNN, DT, etc. give low accuracy for vulnerability detection. A novel machine learning algorithm is required which increases accuracy for vulnerability detection in edge computing. Note- [ Need new hybrid ML algorithm, not an existing one with GitHub available code.] The main objective of this project is to secure edge devices using a hybrid machine learning algorithm th...