Internet Security Jobs

Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

From 67,970 reviews, clients rate our Internet Security Experts 4.83 out of 5 stars.
Hire Internet Security Experts

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    43 jobs found, pricing in CAD

    As an enterprise-grade network user, I'm seeking a professional with a minimum certification of NSE4 from Fortinet to manage tasks related to Network Security and Firewall Configuration. Given the sophistication of our network - a highly complex one with numerous systems and interconnections - your role will require extensive knowledge and experience in similar setups. Tasks will include: - Implementing network security across all systems - Configuring and managing the firewall for optimal safety I anticipate these tasks to be completed within a month's time. To ensure a successful implementation, your technical skills should be backed by experience in troubleshooting and resolving network issues. Only apply if you can handle the complexity and interdependencies of our system...

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    4 bids

    I am looking for an experienced computer networking expert who can assist me in enhancing my understanding of network protocols, routing and switching, and network security. I am going to have an online at home test at 3pm EST(Eastern Standard Time) to 5pm on April 18th so I need just two hours of your time. The lecture notes and material will be based off Computer Networking: A Top Down Approach Featuring the Internet, 8th edition (2021) by James Kurose and Keith Ross. I will post both too you. I will also post previous tests give you a general idea of how the test questions will look like. The following what will be tested on: >> Introduction Chapter 1. from the textbook. - Please look at section 1.4, i.e. Delay, Loss and Throughput in Packet Switched Networks >>...

    $139 (Avg Bid)
    $139 Avg Bid
    10 bids

    I'm in need of a professional to monitor a set of CCTV cameras that will be installed both indoors and outdoors. This role can be performed from the comfort of your own home, making it a flexible working arrangement. The installation location for these cameras is not specified to be at an office. This job requires you to professionally monitor these cameras, ensuring security and safety. Your primary responsibility will be to keep an eye on the activities captured by the cameras. This will include: - Detecting and reporting any signs of theft or suspicious behavior. - Ensuring that safety measures are being followed and compliance with regulations is maintained. It's important that you're able to manage monitoring 1-5 cameras simultaneously. Ideal skills and experience ...

    $2834 (Avg Bid)
    $2834 Avg Bid
    7 bids

    I'm seeking a professional proficient in hacking for a project aiming at thorough manipulation of a website for experimental purposes. Your primary responsibility will be altering items including, but not limited to, text content, images, metadata, as well as database entries. Key responsibilities: - Security testing to locate potential vulnerabilities - Ethical hacking and altering of designated data - Verification of data changes and appropriate saving Ideal Experience and Skills: - Extensive experience in data alteration and ethical hacking - High attention to detail with the ability to rapidly identify and resolve issues - Ability to deliver within a demanding timeline (ASAP) - Exceptional ethics and understanding of legalities pertaining to this challenge Please note that thi...

    $37 (Avg Bid)
    $37 Avg Bid
    32 bids

    Description: We are looking for an experienced cybersecurity professional to conduct a comprehensive penetration test for our Magento 2 website hosted on AWS. The objective is to identify and address any vulnerabilities that may compromise the security of our e-commerce platform. Project Scope: Conduct a thorough penetration test on our Magento 2 website hosted on AWS infrastructure. Identify and exploit potential vulnerabilities in the web application and AWS environment. Provide a detailed report outlining all identified vulnerabilities, severity levels, and recommended remediation measures. Collaborate with our development team to prioritize and address security issues. Requirements: Proven experience in penetration testing for Magento 2 websites and AWS environments. Proficiency in ...

    $234 (Avg Bid)
    $234 Avg Bid
    12 bids

    I am looking for a freelancer who can help me with virus and malware removal from my WordPress website. The website is currently experiencing unexpected pop-ups or redirects, which is causing a disruption to the user experience. Skills and Experience: - Expertise in WordPress security and malware removal - Knowledge of common virus removal techniques for WordPress websites - Familiarity with plugins and customizations that may be affected by the virus removal process Requirements: - Ability to identify and remove malware from the website - Implement security measures to prevent future infections - Ensure that the customizations and plugins on the website are not affected during the virus removal process If you have experience in virus and malware removal for WordPress websites and ca...

    $382 (Avg Bid)
    $382 Avg Bid
    43 bids

    I'm seeking a skilled developer to improve the performance of my cryptocurrency platform. The current system is utilizing cloud services like AWS and Google Cloud. The immediate focus is on enhancing transaction speed, scalability, and security. Key Requirements: - Improve Transaction Speed: The current transaction speed of the platform is suboptimal. The goal is to enhance it significantly. - Scale Up: The platform is intended to accommodate a larger user base. Enhancements in scalability are required to ensure it can manage more users efficiently. - Enhance Security: Security is a top priority. The selected developer should be able to implement robust security measures to protect the platform and its users. Experience and Skills: - Proven track record in improving the performance...

    $689 (Avg Bid)
    $689 Avg Bid
    75 bids

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    $189 (Avg Bid)
    $189 Avg Bid
    13 bids

    I need an experienced cybersecurity professional to perform a penetration test on my Python system. Your primary goal is to identify any vulnerabilities that could be exploited by hackers. Key Responsibilities: - Conduct an in-depth analysis of my Python code to uncover potential flaws. - Assess all possible entry points and security measures put in place. - Provide a detailed report outlining the identified vulnerabilities and recommended fixes. - Ensure that the system meets industry standards for security. Skills and Experience: - Proven experience in conducting penetration tests, specifically on Python systems. - Extensive knowledge of cybersecurity and different attack vectors. - Ability to think creatively and anticipate potential security threats. - Excellent communication ...

    $19 (Avg Bid)
    $19 Avg Bid
    20 bids

    I'm urgently looking for a skilled professional to help me secure my website against DDoS attacks, specifically focusing on DNS amplification. work over any disk only must be now !

    $61 (Avg Bid)
    $61 Avg Bid
    49 bids

    I'm in need of a skilled professional in digital forensics to help me investigate a cybercrime. You are a digital forensic analyst, working for a law enforcement agency in the UK and have been assigned to an investigation, working in partnership with an international agency. A member of the investigation team has been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as par...

    $145 (Avg Bid)
    $145 Avg Bid
    26 bids

    I'm in need of a skilled professional in digital forensics to help me investigate a cybercrime. You are a digital forensic analyst, working for a law enforcement agency in the UK and have been assigned to an investigation, working in partnership with an international agency. A member of the investigation team has been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as par...

    $29 / hr (Avg Bid)
    $29 / hr Avg Bid
    17 bids

    I'm in need of a skilled individual who can set up and manage Cloud Storage on Google Cloud Platform (GCP) for the purpose of test automation. This role involves setting up and managing GCP Cloud Storage and integrating it with automated testing, particularly for integration testing and end-to-end testing. Key responsibilities include: - Configuring Cloud Storage on GCP - Developing strategies for managing test data and results within the Cloud Storage - Integrating the Cloud Storage with automation scripts for efficient and reliable testing - Ensuring data security and appropriate access controls The ideal candidate for this project would have: - Extensive experience with Google Cloud Platform services, specifically Cloud Storage - Proven track record in implementing and managing t...

    $32 / hr (Avg Bid)
    $32 / hr Avg Bid
    34 bids

    I am urgently in need of assistance for my packet tracer assignment. Specifically, my challenges are centered around the VLAN setup and routing protocols. Key Responsibilities: - Building VLAN configurations. This requires a good understanding of VLAN concepts, the ability to identify and resolve VLAN issues, and the ability to configure VLANs on network devices effectively. - Implementing routing protocols. This requires knowledge of different routing protocols, how they work, and how to apply them properly in a network setting. Skill Requirements: - Strong familiarity with packet tracer - Expert knowledge in VLAN configuration and routing protocols - Excellent problem-solving skills - Ability to work under tight deadlines Please note that while it's not necessary, including an...

    $32 (Avg Bid)
    $32 Avg Bid
    12 bids

    I'm in need of an experienced network designer who can create a secure file-sharing network for my medium-sized team. Key Requirements: - The network should support sharing of various file types including documents, images, and videos. - The network will be utilized by 10-50 workers, so scalability is a critical consideration. Security: - I require advanced encryption to protect sensitive files. - Access logs should be maintained to monitor file movements and ensure accountability. Skills and Experience: - Proven experience in designing secure file-sharing networks for medium-sized teams. - In-depth knowledge of encryption protocols and security measures. - Proficiency in network scalability. - Past experience with managing access logs would be a plus. Please provide examples o...

    $653 (Avg Bid)
    $653 Avg Bid
    32 bids

    I am looking for an expert network administrator to assist in improving the performance and security of our existing computer network. The key goals of this project are: - Improved network performance - Enhanced network security - Expanded network capacity Our current network infrastructure utilises various network protocols including TCP/IP, UDP, ICMP, and QUIC. The freelancer would ideally have strong experience in these protocols. Specific skill set required: - Proven experience in network administration - Comprehensive knowledge of TCP/IP, UDP, ICMP, and QUIC protocols - Understanding of network performance optimization - Expertise in network security There are no limitations in regards to latency, speed, or security for the network protocols that will be used in this project. I w...

    $67 (Avg Bid)
    $67 Avg Bid
    6 bids

    I'm in need of a thorough encryption of my entire website to protect sensitive user data, ensure secure user communication and align with industry regulations. I am open to using the necessary encryption technologies that will meet these needs such as SSL/TLS, HTTPS, IPSec, or others as recommended. Specifically, I want to encrypt: - User login credentials - Payment information - Personal user data The perfect candidate would have strong experience in various encryption technologies and a keen understanding of strict security protocols for user data. Knowledge of industry regulations regarding encryption and user data security is crucial. Please demonstrate your experience with similar past projects, highlighting your strategy to encrypt various aspects of a website.

    $206 (Avg Bid)
    $206 Avg Bid
    61 bids

    I'm seeking a skilled penetration tester with a focus on web applications. I need you to identify vulnerabilities in a white box (full knowledge) environment. Key responsibilities include: - Conducting in-depth testing on web applications to uncover potential security issues. - Providing detailed reports of vulnerabilities detected, including their potential impacts. Ideal candidates should have: - Extensive experience with penetration testing, particularly focused on web applications. - Strong knowledge of cybersecurity, network security, and ethical hacking. - Ability to work in a white box environment, using full knowledge to simulate real-world threats. Your work will be crucial to ensuring the security and integrity of our web applications.

    $464 (Avg Bid)
    $464 Avg Bid
    25 bids

    Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application’s integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses Heartble...

    $193 (Avg Bid)
    $193 Avg Bid
    8 bids

    I am searching for a technical wizard who can dive deep into my home network data. There are several aspects that I'm curious about: Developer google in my activity when it’s not me and google can’t tell me , lots of account changes * A detailed breakdown of my internet usage across different devices and applications. * An evaluation of my network security, including any weak points and areas for improvement. * An understanding of the devices connected to my network and how they're interacting. I suspect that things are being hidden or configured without my knowledge - I want to unveil any secret activities happening on my WiFi and phone. I primarily use smartphones and laptops, and I've recently noticed the presence of IFTTT and Home Assist on my network. I...

    $450 (Avg Bid)
    $450 Avg Bid
    13 bids

    I am on the lookout for a seasoned cyber security expert to fortify my network and safeguard our personal computers and mobile devices from malware and viruses threats. The specifics of this project include: - Assurance of Network Security: My primary concern lies in the protection of the network from malicious harm. I want a bulletproof network security system capable of warding off potential intruders. - Malware and Virus Mitigation: It's crucial to me that the chosen professional can proactively identify, manage and dispel malware and viruses. - Protection Across Multiple Platforms: Notably, it's not just our PC network that requires protection. Our mobile devices are also in dire need of comprehensive security measures. The ideal candidate will have a strong background ...

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    4 bids

    I'm in need of an expert in network security to focus on defending against unauthorized intrusions in my business operation. Network security is the crucial area to address and has a significant part in my project. I want a professional who can ideally: - Implement a robust network security system that fends off unauthorized intrusions - Prioritize security for our remote embedded systems Experience in dealing with remote embedded system's security, and a proven track record in successfully defending against intrusion, is highly desirable for this project. Your proposal should highlight your relevant skills and past experiences in network security. Please provide information on your approach and estimated timeline for the project.

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    5 bids

    I'm searching for an expert to help me set up a honeypot in Cisco Modelling Labs (v2.6.0). The primary purpose is to monitor network traffic, identify, and capture any malicious activities that happen within the network. It can be a low or low-medium interaction honeypot. As a beginner, I require an individual with skills and experience to navigate these systems. Mastery of Linux server for implementing the honeypot is essential due to its build on a Linux system. Need it completed before the end of April. Key Competencies: - Expertise in Cisco Modelling Labs - Proficiency in with Linux - Understanding of network monitoring and security principles - Ability to train a beginner on how to run the honeypot with documentation (pictures) of how the honeypot was created.

    $241 (Avg Bid)
    $241 Avg Bid
    9 bids
    Networking Expert Needed 4 days left
    VERIFIED

    I'm in need of a highly skilled networking professional. The ideal candidate should be proficient in a variety of networking areas, such as design, security, and troubleshooting. Key Skills and Experience: - Proven expertise in network design, implementation, and management. - Deep understanding of network security, including firewalls, VPNs, and intrusion detection systems. - Capable of identifying and resolving complex network issues efficiently. Please note that the exact requirement and the scale of the network will be discussed further once the project is underway.

    $117 (Avg Bid)
    $117 Avg Bid
    11 bids

    I'm currently facing a pervasive issue with my fiber optic Internet service. Despite the router showing green light and wifi connection, the speed is frustratingly slow. This is affecting every device connected to the router, leading to choppy video playback, and slow webpage loading. I'm not simply looking for a quick fix to the slow speed – I need a solution that will offer enduring high-speed Internet. Either a significant boost to my existing service or an entire Internet setup replacement will be considered. Either way, the end goal is faster, more reliable internet service. Applicants for this project should: - Possess strong familiarity with Fiber optic Internet setup and troubleshooting - Have outstanding problem-solving skills - Be experienced in optimizing rout...

    $225 (Avg Bid)
    $225 Avg Bid
    18 bids

    I'm in urgent need of an expert to enhance the data security of my web application and AWS server. My web application manages personal user data and currently stands at a medium level of security. The specific areas that need addressing are: - User Authentication: Improve the login system to ensure only authorized individuals can access the application. - Encryption of Sensitive Data: Properly securing the personal user data handled by the app. - Firewall Configuration: Ensure the server firewall is correctly set up to reject unauthorized access. Ideal candidates will demonstrate extensive knowledge in data security, particularly in AWS, user authentication methods, encryption techniques and firewall configuration. If you understand the importance of data privacy and can execute t...

    $703 (Avg Bid)
    $703 Avg Bid
    64 bids

    As a striving small business, our organisation is urgently seeking a professional with vast knowledge in system protection and ethical hacking. Key Roles: • We primarily aim to implement robust Firewall measures, Intrusion Detection Systems and efficient Antivirus Software to guard our vital business data. • The appointed specialist will design systems particularly focused on preventing unauthorized access, swiftly detecting and responding to any security breaches, and protecting our systems against malware and viruses. Ideal Skills: • Extensive experience in setting up firewalls and antivirus software • Proficiency in detecting possible breaches via intrusion detection systems • Expertise in ethical hacking to identify potential vulnerabilities • Pre...

    $178 (Avg Bid)
    $178 Avg Bid
    25 bids

    I'm seeking a highly qualified professional to audit the physical cybersecurity in my Bogotá offices. This will primarily focus on access control systems and intrusion detection systems. Ideal Skills and Certifications: - Certified Information Systems Auditor (CISA) is a must - Extensive knowledge and experience in auditing access control systems - Thorough understanding of intrusion detection systems Tasks: - Comprehensive audit of our existing access control systems - Detailed evaluation of our intrusion detection systems You’re encouraged to suggest recommendations for improvements post audit. Strong analytical skills and attention to detail are a necessity. This is your chance to help enhance the cybersecurity of our offices.

    $891 (Avg Bid)
    $891 Avg Bid
    4 bids

    I'm in need of a highly skilled computer network security specialist with an emphasis on the implementation of preventative security measures. Brief Overview: - Your primary task will be installing and configuring a comprehensive set of security protocols to minimize susceptibility to potential intrusions. Key Responsibilities: - Tailor security measures to our network - Implement security protocols and preventative measures Key Skills Required: - Expertise in computer network security - Strong experience in the implementation of security measures, specifically prevention-focused. I'm looking for a specialist with a keen eye for detail and dedication to ensuring my network’s safety. If this sounds like your expertise, I look forward to your proposal.

    $263 (Avg Bid)
    $263 Avg Bid
    13 bids

    I'm in urgent need of an expert to enhance the data security of my web application and AWS server. My web application manages personal user data and currently stands at a medium level of security. The specific areas that need addressing are: - User Authentication: Improve the login system to ensure only authorized individuals can access the application. - Encryption of Sensitive Data: Properly securing the personal user data handled by the app. - Firewall Configuration: Ensure the server firewall is correctly set up to reject unauthorized access. Ideal candidates will demonstrate extensive knowledge in data security, particularly in AWS, user authentication methods, encryption techniques and firewall configuration. If you understand the importance of data privacy and can execute t...

    $668 (Avg Bid)
    $668 Avg Bid
    109 bids

    I am in search of a certified ethical hacker to intensively focus on improving the security of my external network. You should possess the following qualifications: - Certified Ethical Hacker (CEH) - Offensive Security Certified Professional (OSCP) - CompTIA Security+ Your main tasks will include: - Identifying current vulnerabilities - Testing the existing network security measures - Providing recommendations for comprehensive improvements My goal for this project is to rectify any potential security issues within the system. I am looking for a highly skilled professional with prior experience in this field who can effectively fix the issue

    $660 (Avg Bid)
    $660 Avg Bid
    49 bids
    Proxy setup cybersecurity 2 days left
    VERIFIED

    Provide me tutoring to set up proxy server for my course.

    $37 / hr (Avg Bid)
    $37 / hr Avg Bid
    9 bids

    I'm in urgent need of an expert to enhance the data security of my web application and AWS server. My web application manages personal user data and currently stands at a medium level of security. The specific areas that need addressing are: - User Authentication: Improve the login system to ensure only authorized individuals can access the application. - Encryption of Sensitive Data: Properly securing the personal user data handled by the app. - Firewall Configuration: Ensure the server firewall is correctly set up to reject unauthorized access. Ideal candidates will demonstrate extensive knowledge in data security, particularly in AWS, user authentication methods, encryption techniques and firewall configuration. If you understand the importance of data privacy and can execute t...

    $696 (Avg Bid)
    $696 Avg Bid
    102 bids

    I am seeking a capable web developer who can construct a portfolio website with specific functionalities and top-notch security measures. The website task demands: - Implementation of anti-fraud and website security measures. This includes prohibition of Proxy/VPN usage, banning anonymous web browsing, and blocking Ad Block users. - Design of a robust and secure site that doesn't compromise on usability or aesthetic appeal. Ideal Skills and Experience: - Proficiency in web development and design. - Excellent understanding of website security principles. - Extensive experience in developing secure and engaging portfolio websites. - Knowledge of anti-fraud and authentication measures. - Expertise in handling proxy, VPN, anonymous web browsing, and Ad Block security issues.

    $152 (Avg Bid)
    $152 Avg Bid
    28 bids

    I am experiencing a multitude of problems relating to my desktop and networking systems, which make it difficult for me to undertake my daily activities efficiently. To make a successful bid, you should have a strong understanding of and experience with the following: - Slow internet connection troubleshooting - Network printer connectivity issues - Fixing system crashes and frequent freezes - Knowledge of various hardware issues - Networking, including WiFi, and email troubleshooting The specific devices that need attention are my desktop, laptop, printer, and server. An in-depth comprehension of how these devices interconnect will assist in identifying possible solutions faster. You should have relevant experience in server administration, printer installation, and understanding o...

    $120 (Avg Bid)
    $120 Avg Bid
    29 bids

    I need a solutions sales engineer who specializes in selling networking equipment. You will be instrumental in taking our product to the small business market, advocating our solutions, and securing new clients. This is an ongoing engagement with 20 -30 hours of availability during the US time zone EST weekdays. Key responsibilities: - Present and sell networking solutions to businesses - Act as a technical sales representative for our brand - Understand client needs and provide tailored solutions The ideal candidate will possess: -Experience in Fortinet & F5 - Extensive sales experience, specifically in hardware solutions - An in-depth understanding of networking equipment - Strong ability to build relationships with business owners. Your role will be fundamental to our succe...

    $43 / hr (Avg Bid)
    $43 / hr Avg Bid
    7 bids

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with significant ex...

    $88 (Avg Bid)
    $88 Avg Bid
    15 bids

    I am seeking a skilled freelancer to help me create a data collection tool for an intrusion detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key tasks include: - Designing a new normal and attack dataset using Mininet WiFi - The focus is on detecting Denial of Service (DoS) and Man-in-the-Middle (MitM) attacks Ideal candidates should have experience: - Building intrusion detection systems - Working with Mininet WiFi - Handling network traffic data - Familiarity with DoS and MitM attacks This tool will greatly aid in identifying and preventing future network attacks by providing structured data for our analysis team.

    $482 (Avg Bid)
    $482 Avg Bid
    3 bids

    I am looking for a skilled ethical hacker who specializes in penetration testing of network systems. The main goal of this project is to identify potential security vulnerabilities in my network infrastructure. Key Requirements: - Expertise in network penetration testing - Understanding of various network security systems - Previous experience with black box testing - Ability to provide a comprehensive report on identified vulnerabilities I will provide you with no prior access to the network during the testing. Please include in your proposal your previous experience in similar projects, and any relevant certifications.

    $18 (Avg Bid)
    $18 Avg Bid
    8 bids

    I'm in need of an hacker to perform a thorough black-box penetration testing on a WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial f...

    $132 (Avg Bid)
    $132 Avg Bid
    28 bids

    I'm in need of an hacker to perform a thorough black-box penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial ...

    $459 (Avg Bid)
    $459 Avg Bid
    22 bids

    I am looking for an experienced ethical hacker to assess the vulnerability of my Windows server. The tasks will involve network scanning, password cracking, and running a comprehensive vulnerability assessment. Key Responsibilities: - Conduct network scanning to identify potential security issues. - Perform password cracking to ensure that the server is secure. - Conduct a thorough vulnerability assessment to identify and report any vulnerabilities. The ideal candidate for this job should have: - Proven experience in ethical hacking and server security. - Extensive experience in conducting network scanning, password cracking, and vulnerability assessment. - Knowledge of Windows server security best practices. - Strong communication skills to clearly report on any identified vulnerabiliti...

    $25 (Avg Bid)
    $25 Avg Bid
    6 bids

    Quisiera hacer una aplicación llamada Bunny books, que sea una empresa, pero a la vez sea un lugar, un marketplace, para compra-venta de libros. Todo comienza en Bunny books, que compra libros físicos e e-books, y los almacena y digitaliza. En el caso de los libros físicos, se toma un scan, desempastando el libro, y haciendo el scan hoja por hoja. El libro final tendrá la parte PDF y la parte e-book hecha por Bunny books. Los e-books simplemente se los sube a la plataforma, para asegurar que no se usen dos veces, ni se repliquen dos veces, sino simplemente sea un objeto digitalizado y inutilizable en la vida real. Se mantendrán desempastados los libros, y se pintarán palabras del 70% del libro al azar, y se hará un almacenamiento de libros f...

    $1536 (Avg Bid)
    $1536 Avg Bid
    63 bids

    Recommended Articles Just for You

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Learn how to find and work with a top-rated Google Chrome Developer for your project today!
    15 MIN READ
    Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.
    15 MIN READ