Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
- Establishing secure network infrastructure
- Improving system performance and leveraging encryption
- Developing security frameworks for organizations
- Implementing authentication measures for digital identification
- Evaluating risks of cyber incident exposure
- Researching the latest security regulations for compliance
- Crafting secure policies for employee engagement
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!Asiakkaamme antoivat 93,513 arvostelussa keskimääräisen arvosanan Computer Security Consultants 4.85 / 5 tähteä.
Palkkaa Computer Security Consultants
I am seeking assistance from a skilled freelancer to develop a network simulation project using either NS2 or NS3. The objective of this project is to implement a written simulation code based on a research paper and enhance it by incorporating ECDSA (Elliptic Curve Digital Signature Algorithm) encryption. The freelancer is expected to provide sufficient documentation and explanation, enabling me to understand the functionality of the code. Project Requirements: Replicate the results of the main research paper (link provided below) using NS2 or NS3. The research paper serves as the basis for this project. Integrate ECDSA encryption into the simulation code. ECDSA is preferred due to its strong cryptographic properties and suitability for resource-constrained networks. Thoroughly document...
We currently own a /22 block of live IPs. Listed below is an example of what we own - not actual IPs - just an example - 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206 For this description of the work, I am using the IP of 220.127.116.11 as the IP for our Internet provider. The Main Firewall config - not the actual IPs - just an example - that the other Firewalls below would connect to is - Lan IP 18.104.22.168 WAN 22.214.171.124 WAN Gateway 126.96.36.199 I am looking for someone to configure an HP 1930 48 port switch that other firewalls will be connected to. For this example, the setup would be similar to this. Firewall 1 IP 188.8.131.52 Firewall 2 IP 184.108.40.206 Firewall 3 IP 220.127.116.11 Firewall 4 IP 18.104.22.168 Firewall 5 IP 22.214.171.124 Firewall 6 IP 126.96.36.199 Firewall 7 IP 188.8.131.52 Firewall 8 IP 184.108.40.206 GW 220.127.116.11 Subnet I want VLANS c...
My project is centered around the design and setup of a computer network. The purpose of this network is to share files and resources across multiple sites, providing internet connectivity and remote access to different devices. I want to employ a mesh network topology for my network with speeds of 1 Gbps. This will ensure that the speed of the network is high enough to support internet and remote access activities while being reliable and secured. The network will also need to be designed with an expandable infrastructure as our business grows.
My company is in need of a thorough vulnerability testing for our Lotus-based email accounts. Our goal is to improve our overall security and we have conducted vulnerability testing in the past. We need this work completed in one week in order to meet our deadlines. If you are a qualified professional with experience in this area, we would love to have you aboard. We expect you to be knowledgeable in the most up-to-date security techniques and be able to identify any potential weaknesses that exist within our system. We rely on our email accounts heavily as they are the lifeblood of our business, so we need this done quickly and correctly. If you think you have the skills and qualifications to get the job done, please consider applying for this project. Thank you!
As an Android Device Penetration Tester, you will play a crucial role in evaluating the security posture of Android devices and identifying vulnerabilities and weaknesses in their design, configuration, and implementation. Responsibilities: Conduct comprehensive penetration testing on Android devices, including smartphones, tablets, and IoT devices. Develop and execute test plans and methodologies to identify vulnerabilities and potential attack vectors in Android devices. Perform reverse engineering and analysis of Android applications and firmware to uncover security flaws and weaknesses. Utilize various testing tools and techniques to simulate real-world attacks and assess the resilience of Android devices against different threat scenarios. Collaborate with cross-functional teams, in...
I am looking for an experienced ethical hacker to perform penetration testing for my existing business. The successful freelancer should have ample experience in conducting similar projects, and should be able to provide references for their work. The primary security concern that needs to be addressed is penetration testing, with a focus on identifying vulnerabilities in our systems and networks. The ideal candidate should be well-versed in various penetration testing techniques, and should be able to provide a detailed report outlining any potential security risks and recommended solutions.
En Information Insurance buscamos a un experto de seguridad informatica profesional que quiera participar de nuestro proyecto, comprometido al trabajo y dispuesto a ayudar en el objetivo. Pagos por comision.
I am looking to hire a Network Engineer to develop a hybrid wired and wireless network solution for increased security for a medium-sized network of 11-50 devices. The Network Engineer will be responsible for setting up the network, maintaining and troubleshooting the network, and ensuring optimized performance of the network. They should be knowledgeable in the installation, configuration, and performance optimization of network devices and services. The candidate should have a wide range of experience dealing with different types of network hardware and software configuration. They should also possess great problem-solving skills to proactively identify and address network security threats. In addition, they must have in-depth understanding of network troubleshooting methods and have str...
I am looking for a skilled freelancer to create a complete VPN solution that can link our two offices in Cameroon and the USA. We require a high-speed connection of over 50 Mbps and need a complete solution as we do not have an existing VPN infrastructure in place. The project needs to be completed ASAP. The ideal freelancer should have expertise in VPN concentrators and networking equipment. Specific skills and experience required include: - Experience in setting up VPN concentrators for large-scale networks - Knowledge of network equipment and security protocols - Ability to troubleshoot and resolve technical issues - Strong communication skills to ensure smooth collaboration between our teams in Cameroon and the USA.
Good day, We are looking for a network and systems engineer to work overnight's in the Eastern USA time zone for a small ISP. You should be skilled in the following: WAN / BPG / VPLS / MPLS Mikrotik and Cisco switches routers Windows Server / hyper-v / active directory. The ideal candidate will be self starting, taking initiative and filing detailed reports in our ticketing system for both internal and external issues. Hours of work are flexible but generally between 8pm to 6am EST.
I am in need of assistance setting up a Wifi Bridge, and I have the necessary login credentials. I am considered a beginner when it comes to technical knowledge, so I am looking for someone with experience to help me out. The project will involve setting up a wireless bridge connection between two devices, allowing them to communicate over a secure connection. The ideal freelancer for this project should have previous experience setting up and troubleshooting Unifi Wifi bridge connections, a working knowledge of networking principles and protocols, and the ability to explain technical concepts to a novice in an easy-to-understand manner. I have two 2 x Ubiquiti Unifi UAP-AC-M-PRO Outdoor 1750Mbps access points with PoE adapters; the internet is via Starlink, both end points have electri...
My organization is looking for an experienced professional to conduct a full security audit of our network infrastructure and applications. Our current state is somewhat secure, with minor vulnerabilities. We want to accurately identify any weak points and vulnerabilities that could become a security risk. The audit should be comprehensive and provide detailed outcomes of potential security threats. We expect a high level of expertise in establishing a secure network as well as knowledge on up-to-date protocols and technologies. We are open to suggestions and advice on other security measures to maintain a secure and safe network.
Failed to power on virtual machine - .vmdk was not found gettting issues on vmware mechine any one know the issues and fix on remote then ping me Note: Check screenshort for batter clarification
I will attach the full project description in a word document but to keep it simple, I require a Report, Feasibility Study, COCOMO II Estimation for implementing security measures such as Firewall, Encryption, Authentication etc. It is important to explain the Advanced Analysis and Design when it comes to implementing the Security Features. I will also attach the template for the feasibility study and COCOMO II estimation spreadsheet.
I am looking for an experienced IT professional to provide ongoing support. Specifically, I need someone with expertise in software, networking and connectivity. This person will serve as a trusted and reliable partner to ensure that my network remains properly configured, secure and connected. The ideal candidate should have excellent problem-solving abilities to quickly diagnose and resolve any and all issues that may arise. They must have broad knowledge of different types of networking hardware and software as well as a strong understanding of current IT trends and industry best practices. Experience with cloud-based platforms would be a great plus. I seek an individual or team with integrity, a can-do attitude and dedication to delivering quality results. This ongoing partnership sh...
I am looking for someone to create 30 pages of handwritten content for professional use, with both content provided and creation needed. The style of handwriting I prefer is English simple. I am seeking a freelancer with experience in handwriting and attention to detail. Ideal skills for this job include excellent handwriting skills, creativity, and the ability to follow specific guidelines for content. The project will require clear communication and the ability to meet deadlines.
Microtek Setup Configuration and Ongoing Maintenance for Medium-Sized Network I'm looking for a freelancer who can help me with the configuration of my Microtek setup for my medium-sized network of 11-50 devices. The specific service I need is configuration, including setting up the necessary software and hardware to optimize the performance of my network. Additionally, I require ongoing maintenance and support to ensure that my network runs smoothly and any issues are resolved promptly. The ideal freelancer should have experience in Microtek setup configuration and maintenance for medium-sized networks. Skills and Experience: - Microtek setup configuration - Network maintenance and support - Experience with medium-sized networks - Troubleshooting skills - Strong communication sk...
Looking for an advanced certification course in both IT and non-IT fields. I am specifically looking for a course that focuses on a specific certification. Ideal candidates for this project should have experience in providing advanced certification courses in both IT and non-IT fields. The course should be tailored to my specific needs and should provide in-depth knowledge and practical skills.
I am in need of a completely new wireless network set up for personal use. I am looking for someone who can help me set up a reliable and efficient network that will meet my needs. Skills and experience needed: - Expertise in setting up wireless networks - Familiarity with different wireless network protocols and technologies - Ability to integrate new network infrastructure - Knowledge of security measures for wireless networks
Very simple task will take less than 2 hours to complete. I need someone who is familiar with bits main memory data storage. I will provide more detail information once I am contacted.
I am looking for a skilled professional to conduct a comprehensive penetration test on my network within a week. The scope of the test will be focused on the network only. I do not have any specific areas or vulnerabilities that I want to be tested, so I will rely on the expertise of the professional to conduct a thorough examination. Ideal Skills and Experience: - Extensive experience in network security and penetration testing - Knowledge of various network vulnerabilities and exploits - Familiarity with network architecture and protocols - Ability to provide detailed reports and recommendations for remediation - Certification in ethical hacking or related fields is preferred If you are confident in your ability to provide a high-quality and timely service, please submit your prop...
I am looking for an expert in creating intermediate level boot2root machines based on Linux operating systems. As I am open to suggestions, the freelancer can decide on the specific requirements and themes for the machine. The ideal candidate should have experience in creating challenging and engaging machines that test the user's skills in penetration testing and network security. The machine should be designed to simulate real-world scenarios and provide a realistic challenge for users. The freelancer should also have proficiency in Linux operating systems and be able to create a machine that is stable and secure.
Need Cyber Security Expert for small work Need Network Engineer
I am in need of a Mikrotik router specialist who can assist me in adding a VPN to my WiFi network. I have a router (rb941) . I have already purchased a VPN service and my primary goal is to bypass geo-restrictions. Ideal Skills and Experience: - Experience with Mikrotik router configuration and setup - Knowledge of VPN setup and configuration - Familiarity with bypassing geo-restrictions - Excellent communication skills to explain the setup process in a clear and concise manner.
Als IT-Spezialist (m/w/d): Sie sind verantwortlich für die Entwicklung und Implementierung unserer Webseite, das Design und die Benutzererfahrung, die Backend-Entwicklung und Datenbankverwaltung sowie die fachliche Expertise und Überwachung der Künstlichen Intelligenz (KI). Wir sind ein junges, dynamisches Unternehmen, das sich auf die Entwicklung einer digitalen Plattform spezialisiert hat. Zur Unterstützung unseres Teams suchen wir einen engagierten IT Spezialist den wir vertrauen können. Ihr Profil: Sie haben ein abgeschlossenes Studium in Ihrem Fachbereich und mehrjährige Berufserfahrung. Sie verfügen über fundierte Kenntnisse und Fähigkeiten in Ihrem Fachbereich. Sie arbeiten selbstständig, lösungsorientiert und verfügen &...
I am in need of a freelancer to install a DrayTek Vigor 2865AC Firewall for network security. I have no experience setting up firewalls, so I am looking for someone with expertise in this area. The installation will cover less than 10 devices, so it is a relatively small project. Ideal skills and experience for the job include: - Expertise in setting up firewalls - Knowledge of DrayTek Vigor 2865AC Firewall - Familiarity with network security protocols and best practices - Ability to troubleshoot and resolve any issues that may arise during installation
network engineer ，router，switch，firewall，
I am looking for a freelancer who can help me access shared files on a cloud-based storage via VPN from Windows computers. The goal is to update the files live via the internet. I am not sure about the VPN setup required, so I need recommendations. The ideal freelancer should have experience in VPN setup and be able to suggest the best one based on my needs. The following skills are required for this project: - VPN setup - Cloud-based storage - Windows OS If you have experience in this area and can provide quality work, please bid on this project.
I am in need of a Security Analyst who specializes in Network Security. The project is urgent and needs to be completed within a week. The ideal freelancer will have extensive experience in Network Security and be able to provide examples of past work in this area. Skills and Experience: - Expertise in Network Security - Strong understanding of security protocols and systems - Experience in vulnerability assessment, penetration testing, and threat analysis - Knowledge of security compliance standards - Ability to provide detailed reports and recommendations for improving network security Timeline: - Urgent, project needs to be completed within a week Please provide your relevant experience in Network Security and how you can help improve our network security in your proposal. Thank you...
I am in need of a skilled network engineer experienced in both wired and wireless networks. The engineer will be responsible for troubleshooting my medium-sized network, consisting of 11-50 devices. The ideal candidate should have prior experience and expertise in networking and technical support. A demonstrated track record of success in designing, implementing, and troubleshooting networks is required. The successful candidate must be detail-oriented and have a proactive approach to problem-solving. They should be prepared to work independently, communicate complex technical concepts in an easy-to-understand manner, and respond quickly to project needs in a timely manner. Overall, I'm looking for a capable network engineer who can support me in the short-term, but provide value over...
We are an Israeli based company, Looking for a Cyber Security lecturer for an online project with Africa. a 2-year experience on lecturing on cyber security is a must. a general lecturing experience in the last year a must. a 2-year hand on experience in cyber security is a must.
1. Cleartext submission of password The page contains a form which is submitted over clear-text HTTP 2. Session ID exposed Session ID is vulnerable to theft and may lead to Session Hijacking, Therefore, Session ID should never be sent over unencrypted transport and should never be cached. The application should be examined to ensure that encrypted communications are both the default and enforced for any transfer of Session IDs. Furthermore, the Session ID should not be visible. 3. Strict transport security not enforced The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption, and use the application as a platform for attack...
I need an expert in computer science to write me a research proposal on The Ethical Implications of Malware Detection in V2X Communications: Ethical review. 3000 words. This is actually needed within 48 hours and you have to demonstrate expertise in this in your proposal. The success of this will lead to you being awarded the research project in itself, which would be around 10-15k words. More details to chosen person. Budget: $30-40
I am looking for high-speed internet services from Miguel Telecom. Specifically, I require fiber optic internet for my business. I am looking for high-speed performance with reliable uptime and excellent customer service. I need a solution with no contract commitments that is easy to set up and maintain. Mongo Telecom's cutting-edge technology and dedicated customer support team have been recommended to me and I'm sure they can provide me with the professional internet service I need.c
Cyber Security Strategy for Hospital with Low Current Level We are looking for a freelancer to help us develop a comprehensive cyber security strategy for our hospital. Our current level of cyber security is low, and we want to ensure that we are taking all necessary precautions to protect our sensitive information. Ideal Skills and Experience: - Proven experience developing cyber security strategies for hospitals or healthcare organizations - Familiarity with relevant regulations and compliance frameworks (e.g. HIPAA) - Key Requirements: - Develop a comprehensive cyber security strategy that addresses our unique needs and challenges Note : I need a strategic plan for managing cyber security in hospitals, in addition to writing policies and procedures for the health sector
My students currently have an advanced knowledge of networking topics. I am looking for someone to provide instruction on the concept and practices of network architecture via online classes. The teaching should be tailored to introduce basic concepts, build on intermediate-level skills, and reinforce advanced network architecture. The candidate must have expertise in this area and the ability to deliver an engaging lesson via online teaching.
I am in need of an ethical hacker who can perform a vulnerability assessment on my mobile application. The ideal candidate should have experience in mobile application security and be able to provide both high-level and technical details in the vulnerability assessment report. Skills and Experience: - Experience with mobile application security - Knowledge of common mobile application vulnerabilities - Ability to perform a thorough vulnerability assessment - Experience with both high-level and technical report writing.
I am looking for a technical support specialist to help me with a specific issue. I need an ethical hacker to troubleshoot, install, configure, and set up hardware and networks. The ideal freelancer should have relevant past work experience and include a detailed project proposal. Time is of the essence with this issue, so I need the work completed within a week.
Need to track exact location of an IP address. Link locator
I am looking for a freelancer who can help me implement Virtual SonicWall NSv 470 in KVM Hypervisor VM. The project requires someone with experience in cloud-based environments and advanced sonicwall security. My current network setup is cloud-based, and I require advanced sonicwall security features such as Intrusion Prevention System (IPS), Content Filtering, and Advanced Threat Protection (ATP). The desired bandwidth for the network is between 100 Mbps and 500 Mbps. Ideal skills and experience for the job include: - Experience in implementing Virtual SonicWall NSv 470 in KVM Hypervisor VM - Knowledge of cloud-based environments and security features - Familiarity with Intrusion Prevention System (IPS), Content Filtering, and Advanced Threat Protection (ATP) - Ability to ...