Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Na podstawie 109938 ocen klienci oceniają Computer Security Consultants 4.86 nas na 5 gwiazdek.
Dowiedz się więcej
Problem Solving related to computing: Scenario: You work for a Software Development Company as a software engineer (or any other type of computing related company), where you are asked to develop an application or design a solution for a specific problem, where the solution of this problem is related to computing. you need to do the following tasks: ‐ Identify an application/ a specific problem and describe its requirements. ‐ Design and identify the solution for this problem/ the problem solution could be developing a software that addresses the issue using Java for example or the solution could be a combination of hardware and software. ‐ How can you Test and validate your proposed solution/ it would be great if you can implement part of your solution. ‐ Document your work. The repor...
College computer networks project: Need to implement an SDN with implementing a security concept that defends the man in the middle attack
1) Need to protect files inside application /opt folder in centos/ubuntu 2) Completed otp authentication, Need to protect password inside the google authenticator file in ubuntu/centos
I want someone to clean up my website and boost visibility. At presents it seems like: Sophos phishing and fraud Phishing. Can anyone clean and make it more visbile on google?
We are hiring a new penetration tester to participate in projects with us, who has solid hacking skills mostly in web applications, written in JS and its frameworks, PHP and Mobile applications. You should be able to write a complete vulnerability assessment report and present your findings to CTO.
I need a Computer Science or Cybersecurity graduate to help with a few assignments from my professor, I have 8 modules I need to answer, each module has 4 -5 questions. I will provide all the questions and the book.
I think the topic of the virus is quite interesting. I put a lot of time and effort into this project. I am anticipating your a result of the increase in global temperature, glaciers and permafrost are melting, releasing bacteria and viruses that have been trapped under the ice for years. The Zombie Virus is one such amoeba virus that researchers were able to recover from melted ice.
Project consists to organize a red teaming exercise against a company of medium size to test end-to-end their security. Goal of the red teaming is to be able to take control of their infrastructure (AD domain admin). Delivery is a document which explained the way of working, what has been blocked by security measures and concrete advises how to improve the security. Organization mainly on-prem, using some azure (like office 365), Windows 10, some web applications. We are only looking for experimented person. Give a small description of your way of working and we will have a chat. Please reply with the keyword "RED" in your reply (to avoid considering automated response).
Need entire ISMS/ ISO27001 related documentation templates. ISMS Manual Disaster Recovery Plan Business Continuity Plan ISMS RACI Matrix Acceptable Use Policy Mobile Device and teleworking Policy Information Security Risk Register Internal audit plan Information Asset Register BYOD Disposal and destruction policy Information classification policy Information transfer Password policy Asset management ISMS policy Data recovery and backup policy Security incident management Logging and monitoring Cloud computing policy Risk Management ISMS Statement of applicability Patch and vulnerability management Access Control Policy Document and Record Control Procedure Cryptographic Policy ISO27001 requirements checklist
We are looking for cyber security expert that can help us find vulnerabilities on our websites.
Cybersecurity Risk Assessment and Remediation Services, End-User Cybersecurity Awareness Training, Cyber-liability and Data Breach Insurance Coverage program, and a Security Incident Response Plan.
We (freelancer.com) have an exciting opportunity for an experienced " Field -Service Delivery Coordinator" to join our team and be part of this amazing project during an amazing growth period -Pay per day - 1300/day -Weekly pay -FULL TIME Freelancing -6 days work week - Location - Vizag Role Title: Scheduler Field Services/Coordinator Roles and Responsibilities: Allocating and managing daily assignment of work orders and field service resources Coordinating the onboarding and training of field service resources Outbound calls to customers to obtain further information and/or to identify customer satisfaction Delivering a high level of customer service through day-to-day interaction with the field team Ensuring performance metrics are met Requirements: Exper...
Talented cyber/website security needed Right away.
Do you feel like scanners are just to catch the low-hanging fruit and that the real findings are left for the human testers? Have you tested hundreds of networks and still want more? If this describes you, you’re in luck! We are looking for an experienced penetration security testers to join our team of highly skilled penetration testers. If you feel most at home with a scanner and manually following up on those vulnerabilities, this is NOT the kind of job we are offering. Minimum Requirements -Advanced ability to detect, define, exploit, and remediate vulnerabilities without the use of a vulnerability scanner (a browser, a proxy, an editor, and YOU) Develop detailed reports on findings and remediations – Familiarity with Windows Internals – Vulnerability and ...