Internet Security Jobs

Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

From 66,495 reviews, clients rate our Internet Security Experts 4.84 out of 5 stars.
Hire Internet Security Experts

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    43 jobs found, pricing in USD

    As a small-scale business owner, I need a proficient cybersecurity expert to address three crucial areas of cybersecurity within my organization: network security, data protection, and threat detection. Additionally, expertise in penetration testing will be of added value. Key responsibilities will include: - Setting up and managing a secure network infrastructure to ensure protection against possible network threats. - Implementing solutions for data protection to safeguard sensitive data and reduce the risk of data breaches. - Establishing reliable threat detection mechanisms to identify and combat cyber threats before they impair our systems. - Conducting penetration testing to identify any potential vulnerabilities and strengthen our security posture. Further, to navigate our specifi...

    $15 (Avg Bid)
    $15 Avg Bid
    4 bids

    As a thriving business, maintaining the health and security of our office's IT infrastructure is critical. We're seeking an experienced IT Auditor to perform a comprehensive health check of our current setup. Key facets of the project include: - Analyzing network security: We need a professional understanding of our potential vulnerabilities and the advisable improvements to ensure optimal security. - IT infrastructure: The focus should be on our existing Local Area Network (LAN) and Wireless Network. Familiarity with these infrastructures is thus key. - Access Control: The review should delve into our implemented security measures – primarily access control. Recommendations for enhancing our current setup are expected. In-depth knowledge of LAN, Wireless networks, and a...

    $611 (Avg Bid)
    $611 Avg Bid
    18 bids

    I have a small server infrastructure and I am looking for a System Administrator who has a strong knowledge of Linux and can handle Apache Logs. This role would primarily involve: - Monitoring system performance. - Troubleshooting issues. - Ensuring security of the servers. Skills and Experience Required: - Proficiency in Linux system administration. - Experience in handling Apache Logs. - Strong troubleshooting and problem-solving skills. - Knowledge of security best practices for server infrastructure.

    $138 (Avg Bid)
    $138 Avg Bid
    20 bids

    I'm looking for a skilled ethical hacker who can evaluate the security of a website, specifically focusing on a public Wi-Fi network. Key Requirements: - Identify any vulnerabilities in the system - Conduct a thorough test on the website's security protocols - Provide a detailed report of any weaknesses found Please note that this project requires you to have permission from the administrator of the public Wi-Fi network in question. Your ethical hacking certification and previous experience will be valuable assets in this project.

    $103 (Avg Bid)
    $103 Avg Bid
    5 bids

    I am looking for an experienced hacker who would help me modify games scores or currency in an online gaming site called "Rockingplay". This project is partly for personal gain, but also partly to expose potential vulnerabilities within the system. Key Tasks: - Unauthorized access into Rockingplay to modify game scores or currency - Extend the time allowance for bets Essential skills: - Expertise in ethical hacking - Experience with online gaming sites is a must. - Strong understanding of online betting system mechanics. - Excellent problem identification and security vulnerability detection abilities. This project requires a balance of discretion and transparency, your guiding principle should be ethical hacking.

    $83 (Avg Bid)
    $83 Avg Bid
    5 bids

    I'm urgently looking for a security expert in Office 365 to help me with a few issues I have been experiencing. I am having issues where my domain is nopt opening on a clients side I assume to very strong restrictions. The message comes from defender office 365 endpoint I assume. I have taken some steps but right now I need someone that can replicate this from, his side as it opens fine everywhere else. The ideal candidate should have experience in: - Data loss prevention in Office 365 - Threat protection and access controls - Experienced with solutions for domain security issues. Your work should ensure that: - The domain is secure and free from any potential threats. - Any issues or potential vulnerabilities are addressed before they become a problem. YOU MUST BE ABLE ...

    $29 (Avg Bid)
    $29 Avg Bid
    16 bids

    I'm currently seeking a competent IT Systems Administrator to join our large team. You'll primarily be responsible for network administration, server management, and software installation and updates. Key responsibilities will include, but are not limited to: - Managing and maintaining our network and server infrastructure - Implementing necessary software updates and installations Ideal candidates will have proven experience in a similar role, with a strong understanding of IT support services. They should be comfortable working in a team of more than five and collaborating with existing IT support members. The successful IT Systems Administrator will need to be proactive, responsible, and effective at communicating with non-technical team members. Demonstrated skills in ...

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    24 bids

    I'm seeking an experienced cyber security professional who can help draft a comprehensive cyber security assessment proposal for our organization. Key Requirements: - Proven experience in cyber security assessment and proposal drafting. - Knowledge and experience in the following areas: Network security, Data protection, and Incident response. - Experience with compliance standards, specifically NIST Cybersecurity Framework. - Skill in tailoring a proposal to the specific needs of a small network. The ideal candidate should have a strong background in cyber security, and a proven track record of drafting and implementing comprehensive security proposals. They should be familiar with NIST Cybersecurity Framework and have an acute understanding of network security, data protection, a...

    $141 (Avg Bid)
    $141 Avg Bid
    17 bids

    I'm seeking a proficient content creator for designing informative content explicitly targeting business professionals on my website. The content needs to be engaging and should effectively convey the intended information to this demographic. - The main task includes developing website content for various pages. - The content should be informational and aimed towards business professionals. the pages that need creating have to be specifically relevant to us. but they need to include. IT Support Services. Cyber Security Specialist CCTV and Security Creative Design and Ecommerce Solutions IT support services should have sub pages for Microsoft Cloud Services. Wifi and Remote Internet. Remote Monitoring and Patch Management, Voip telephones systems, Hardware and Network Services. ...

    $2407 (Avg Bid)
    $2407 Avg Bid
    78 bids

    I'm seeking an expert in industrial security to help develop a comprehensive course for security guards and industrial workers. Requirements: - Knowledge of security protocols - Experience in industrial security - Familiarity with surveillance systems - Excellent communication and conflict management skills - Ability to cover topics such as security systems & operation functions, security supervisory skills, and physical fitness & self-defence

    $1074 (Avg Bid)
    $1074 Avg Bid
    29 bids

    I'm seeking a competent Wazuh professional who can provide assistance in several key areas. This requires a deep understanding of Wazuh, as well as other security systems that it can interact with. Key Responsibilities: - Installing and configuring Wazuh on my network. - Integrating Wazuh with my existing SIEM, IDS, and Log Management systems. - Developing custom rules in Wazuh as needed for my specific requirements. The ideal candidate is expected to be proactive, responsive to emails and also have a keen eye for security issues that may need custom rules to be created. Previous experience with Wazuh is important, as is a strong familiarity with the systems Wazuh is likely to interact with. This includes SIEM, IDS, and Log Management systems. Your ability to work independently an...

    $146 (Avg Bid)
    $146 Avg Bid
    24 bids

    We are looking for Hyderabad Freelancers only. As a bustling business that utilizes both Windows Server and macOS Server, I am in need of a seasoned System Administrator adept in troubleshooting a multitude of server issues. Included specifically in our needs are support in managing our network infrastructure, implementing bulletproof security measures, and effective assistance with our server configuration requirements. Key areas of expertise include: - Proficiency with Windows Server and macOS Server - Troubleshooting diverse server issues - Network infrastructure management - Security measures implementation - Experience with Active Directory setup - Knowledge in DNS configuration - Skilled in Firewall setup Deep technical understanding and rigorous attention to detail will be instr...

    $15 (Avg Bid)
    $15 Avg Bid
    5 bids

    I'm in need of seasoned Red Hat Certified & Licensed Trainers to conduct training on Linux Administration, Networking and Security. The ideal candidate would have a depth of knowledge in these areas and be able to effectively deliver this information to a diverse group of learners. Key responsibilities will include: - Structuring and delivering engaging, interactive training sessions on Linux Administration, Networking and Security. - Conducting practical exercises to reinforce learning and ensure understanding of the concepts. - Providing clear and concise explanations of complex technical information. - Adapting the course content to suit a hybrid (Combination of In-person and Online) delivery format. Skills and Experience required: - Red Hat Certified Engineer (RHCE) status ...

    $34 / hr (Avg Bid)
    $34 / hr Avg Bid
    4 bids
    Stop DDOS Attack 5 days left
    VERIFIED

    There appears to be a ddos attack on one of my servers, I have cloudflare active on all sites, and even with under attack mode on some sites, the ddos attack continues Ubuntu/Nginx server, no web panel

    $151 (Avg Bid)
    $151 Avg Bid
    22 bids

    I'm looking for a knowledgeable and experienced individual to review my technical project, specifically focusing on network security, cyber attacks, and comprehensive testing. Key Requirements: - In-depth knowledge of network security, cyber attacks, and testing methodologies - Proven experience in identifying vulnerabilities and protecting against cyber attacks - Ability to conduct comprehensive testing and provide detailed reports - Experience working with Raspberry Pi and understanding its security concerns The ideal candidate will have a strong background in cyber security and will be able to provide insights and recommendations to enhance the security of the project.

    $158 (Avg Bid)
    $158 Avg Bid
    18 bids

    I am on the hunt for an ambitious, entry level Cybersecurity Analyst to secure the digital assets and ensure the integrity of the Windows systems utilized by SecureGuard Solutions. Key responsibilities include: - Monitoring network traffic continuously - Conducting vulnerability assessments regularly - Implementing robust security measures promptly The ideal candidate must demonstrate a solid understanding of Windows systems and an unwavering dedication to cybersecurity. This entry level position is a unique opportunity for the right individual to contribute to our enterprise's wider cybersecurity strategy by detecting and preventing threats before they materialize.

    $516 (Avg Bid)
    $516 Avg Bid
    19 bids
    AI Development cyber security 4 days left
    VERIFIED

    I am looking for an artificial intelligence developer to develop a cybersecurity module using the famous vulnerability logging site CVE As the model is trained on all web vulnerabilities and server vulnerabilities presented, then we provide it, for example, with our website, so it searches for gaps or security problems. Then it gives us reports with the severity rating of the vulnerability, whether inside the server or on the site itself This is a CVE database that the freelancer choosing for this topic might benefit from The model must be highly developed and highly trained

    $190 (Avg Bid)
    $190 Avg Bid
    34 bids

    We are in urgent need of an OVH Server Security Specialist to address recurring security issues with our server. Our server has been frequently compromised by viruses, resulting in the creation of malicious files and folders across directories. Additionally, these viruses have been generating .htaccess files that block access to internal pages of our websites. We are seeking an experienced professional who specializes in OVH server security to configure and implement optimal security measures. The ideal candidate will have a proven track record of effectively securing OVH servers against various threats and vulnerabilities. Key Responsibilities: 1- Conduct a comprehensive audit of our OVH server to identify existing security vulnerabilities and compromised areas. 2- Develop and implement...

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    9 bids

    The project involves identifying, researching, and addressing a security vulnerability in a critical system/software that cannot be immediately upgraded or patched. Students must propose a topic, describe the vulnerability, and outline detection and mitigation strategies. The project spans three phases: topic proposal, vulnerability description and proposed solutions, and implementation and demonstration. Need to select a vulnerability with significant impact (5.0 or higher CVSS rating) from 2020 or newer, affecting popular OS/applications/devices. The proposal should include CVE number, vulnerability description, and proposed detection/mitigation approaches. Need Proposal report and final exploitation and Mitigation report as well!!

    $124 (Avg Bid)
    $124 Avg Bid
    14 bids

    I'm looking for an experienced and skilled professional to help with the expansion of a container port in Myanmar. The primary objective for this project is to enhance the security of the port, and to increase its overall capacity. Key Tasks: - The main task for this project is to add additional docking bays to the port. The new bays should be designed to accommodate containers of different sizes, and be easily accessible for cargo ships. - The existing security systems and procedures will need to be reviewed and upgraded to ensure they are in line with international standards. Skills and Experience: - A background in civil engineering or port development would be highly beneficial for this role. - Experience with port security systems, and a strong understanding of the necessary...

    $16 (Avg Bid)
    $16 Avg Bid
    8 bids

    I'm searching for a skilled ethical hacker that can support my project via intensive penetration testing. Our focus revolves around user accounts, specifically customer accounts. Skills and Experience: - Ethical hacking - Proven experience in penetration testing - Detailed understanding of user accounts on diverse systems Tasks: - Undertake intensive penetration testing - Identify and document vulnerabilities - Suggest security enhancements The aim is to bolster the security of our customer accounts, providing peace of mind for our users and ourselves.

    $76 / hr (Avg Bid)
    $76 / hr Avg Bid
    17 bids

    I'm currently experiencing several issues that strongly suggest a malware issue on my apache server. My website's performance has seriously declined, and much to my disturbance, Google has flagged my site as dangerous. I haven't taken any steps yet to resolve these issues so now I'm seeking professional help. To be successful in this project, you will need: - Expert knowledge of Apache servers - Strong experience in malware removal techniques - Excellent understanding of domain whitelisting - Safety assurance to recover my domain status on Google I'm looking forward to making my website perform faster and being flagged safe on Google and other antivirus platforms.

    $78 (Avg Bid)
    $78 Avg Bid
    19 bids

    I'm looking for an experienced and skilled professional to help with the expansion of a container port in Myanmar. The primary objective for this project is to enhance the security of the port, and to increase its overall capacity. Key Tasks: - The main task for this project is to add additional docking bays to the port. The new bays should be designed to accommodate containers of different sizes, and be easily accessible for cargo ships. - The existing security systems and procedures will need to be reviewed and upgraded to ensure they are in line with international standards. Skills and Experience: - A background in civil engineering or port development would be highly beneficial for this role. - Experience with port security systems, and a strong understanding of the necessary...

    $462 (Avg Bid)
    $462 Avg Bid
    14 bids

    I'm a cybersecurity beginner looking to upskill in Network, Application, and Cloud security. I'm seeking a skilled freelancer to guide me through hands-on projects in these areas and help me post my work on GitHub. Key Project Details: - Hands-on Guidance: I'm not looking for theoretical knowledge alone. I need you to walk me through practical applications within the realms of Network, Application, and Cloud security. - GitHub Posting: It's crucial that the projects we work on together are shared on GitHub. You'll need to assist me in this process. Ideal Candidate: - Strong in Network, Application, and Cloud security: You should be well-versed in all three areas and able to pass on this knowledge. - Teaching Experience: I'm a beginner, so you should be able...

    $160 (Avg Bid)
    $160 Avg Bid
    11 bids

    I have a hosting on Bluehost that is infected with malware, on this hosting I have around more than 50 websites, but I want to focus on 3 specific websites, I want these sites to be cleaned and migrated to a VPS that I have with another provider , we look for efficient methods that guarantee 100% security that no malware will be transferred to the vps, we seek to be aware of the process and know the methodologies applied, therefore we hope that these 3 websites are completely free of malware at the time they arrive at the new VPS, both the cleaning and the migration is what we are looking for the job.

    $96 (Avg Bid)
    $96 Avg Bid
    38 bids

    I am in need of a certified Google Cloud engineer to help with multiple tasks namely, Cloud migration, Infrastructure setup, and Application deployment on the Google Cloud Platform. Your key responsibilities would be: - Google Cloud Platform migration and set-up - Application deployment on Google Cloud A clear understanding and broad experience of Google Cloud is critical for this project. Ideally, you hold Google Cloud Certifications which showcase your expertise and finesse with this platform. Given the sensitive nature of the information we will be dealing with, it is paramount that you have an understanding of Google's cloud security standards and certifications. Whether you have worked on similar tasks before or hold pertinent certifications, I'd love to hear about it. ...

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    16 bids

    As a Wordpress site owner, I'm interested in conducting security testing with the primary aim of testing penetration resistance. I'm specifically looking to uncover any instances of ineffective firewalls, Denial Of Service attack possibilities in the security system of the website built with Elementor and WooCommerce plugins. Skills and Experience: • Expert in Wordpress security and firewall systems • Comprehensive understanding of penetration testing • Solid background in ethical hacking • Experience with Elementor and Woocommerce platforms • Ability to produce detailed reports Deliverables: • A thorough report on identified vulnerabilities, specifically related to firewalls • Recommendations for improvements in website security • Proo...

    $2047 (Avg Bid)
    $2047 Avg Bid
    46 bids

    I am seeking to acquire a comprehensive list of 10,000 fake domains associated specifically Saudi Arabia with phishing scams. This list will primarily serve the purpose of security testing. The focus of this task will be on the accumulation of domains, with no requirement for a detailed description of each domain's potential threat level. The ideal freelancer for this job would have a strong background in cyber security and a profound understanding of Web Scraping, phishing scams.

    $288 (Avg Bid)
    $288 Avg Bid
    22 bids

    To all proficient developers with a knack for security enhancement, your expertise is required! I have an ongoing spam issue affecting various areas (registration page, comments section, contact forms) of my website - an issue I encounter daily. Here's what I already have in place: - CAPTCHA However, this hasn't been effective enough in curbing the pesky robot registrations. Looking to Work With: - An expert web developer with extensive knowledge of anti-spam technologies and website security. - Someone with prior experience in implementing Honeypot and IP blocking techniques. - Quick response rate would highly be appreciated given the frequency I'm encountering this problem. Your job will focus on: 1. Reviewing and enhancing the current CAPTCHA system. 2. Setting u...

    $150 (Avg Bid)
    $150 Avg Bid
    81 bids

    I'm in need of a highly-skilled professional who specializes in Azure Security Engineering and ForgeRock Training. Key tasks include: - Azure security configuration - Conducting vulnerability assessments - Undertaking threat hunting exercises Additionally, expertise in ForgeRock training covering the following topics will greatly benefit my team: - Identity and Access Management (IAM) - Single Sign-On (SSO) - User Provisioning The ideal candidate is required to hold an 'Azure Security Engineer Certification'. This certification will give me confidence in your capabilities to successfully execute the necessary tasks. Your adeptness in handling Azure security coupled with your ability to impart crucial knowledge in ForgeRock makes you an integral team player for my proj...

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    2 bids

    The project involves identifying, researching, and addressing a security vulnerability in a critical system/software that cannot be immediately upgraded or patched. Students must propose a topic, describe the vulnerability, and outline detection and mitigation strategies. The project spans three phases: topic proposal, vulnerability description and proposed solutions, and implementation and demonstration. Need to select a vulnerability with significant impact (5.0 or higher CVSS rating) from 2020 or newer, affecting popular OS/applications/devices. The proposal should include CVE number, vulnerability description, and proposed detection/mitigation approaches.

    $111 (Avg Bid)
    $111 Avg Bid
    17 bids

    I'm looking for a professional in ethical hacking to assist with my coursework, which specifically focuses on the area of penetration testing. Key Requirements: - Expertise in Ethical Hacking: Someone who has a strong background in ethical hacking is essential. - Familiarity with Penetration Testing: Previous experience in penetration testing will be highly valued. - Strong Communication: The ability to communicate complex technical information in a clear and concise way is crucial. The ideal candidate should not only be well versed in ethical hacking and penetration testing but also capable of explaining these concepts in a manner suitable for a coursework assignment. Previous experience in coursework assistance or academic writing could be advantageous.

    $145 (Avg Bid)
    $145 Avg Bid
    26 bids

    I'm looking for a skilled cyber security professional who can assist with ensuring the integrity and safety of our systems. The ideal candidate should have expertise in network security, application security, and data security. Key project components include: - Conducting a thorough vulnerability assessment to identify potential weaknesses in our current systems. - Performing penetration testing to simulate cyber-attacks and evaluate the effectiveness of our security measures. - Executing a comprehensive security audit to ensure that our systems are aligned with industry best practices and compliant with HIPAA, GDPR, and PCI DSS. Your role will be crucial in ensuring our organization is not only secure from cyber threats, but also in compliance with relevant regulations. Experience...

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    10 bids

    I'm in need of a professional who can address an issue with my digital xray setup. The expert must have experience with DRX Evolution xray. The console is unable to see the generator. Key requirements: - Diagnosing the problem: Investigating and identifying the root cause of the connection issues. - Providing a solution: Implementing a more stable and reliable connection between the console and the generator. - Testing and validation: Ensuring that the new connection resolves the issue and doesn't compromise image quality. Ideal skills and experience: - Proven expertise in xray equipment connectivity, particularly between consoles and generators. - Strong understanding of serial cable connections. - Troubleshooting skills to identify and resolve connectivity issues. - Ability...

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    2 bids

    I am looking for a competent developer who can rapidly create a demo page similar to ''. The functionalities of this page should include: - Website vulnerability scanning - Threat analysis and security grading The critical aspect that the demo page should highlight is the threat analysis and security grading of website vulnerability scanning. As for the presentation of penetration testing results, they should be displayed in a textual format. Candidates should have strong skills and experience in web development, security grading, and vulnerability scanning. A thorough understanding of threat analysis is also crucial for this project. Your ability to effectively transform complex data into understandable textual narratives will be highly valued.

    $174 (Avg Bid)
    $174 Avg Bid
    17 bids

    I'm looking for an ethical hacker to carry out a comprehensive digital security sweep on my laptop, phone, Roku TV, and vehicle. The ultimate goal is to identify and eliminate any malicious software or tracking mechanisms that may have been surreptitiously installed on these devices. Key objectives are to: - Identify and eliminate any unauthorized access to my devices, which have been ongoing for more than a month. - Identify and eliminate any tracking mechanisms placed on my laptop, phone, Roku TV, and vehicle. - Diagnose and repair any unusual device behavior or performance issues that may be attributable to hacking or tracking. The ideal candidate should have: - Proven experience and expertise in cybersecurity, digital forensics, and ethical hacking. - Up-to-date knowledge of the...

    $600 (Avg Bid)
    $600 Avg Bid
    10 bids

    I am in need of a certified Google Cloud engineer to help with multiple tasks namely, Cloud migration, Infrastructure setup, and Application deployment on the Google Cloud Platform. Your key responsibilities would be: - Google Cloud Platform migration and set-up - Application deployment on Google Cloud A clear understanding and broad experience of Google Cloud is critical for this project. Ideally, you hold Google Cloud Certifications which showcase your expertise and finesse with this platform. Given the sensitive nature of the information we will be dealing with, it is paramount that you have an understanding of Google's cloud security standards and certifications. Whether you have worked on similar tasks before or hold pertinent certifications, I'd love to hear about it. ...

    $28 / hr (Avg Bid)
    $28 / hr Avg Bid
    24 bids

    I've had a hacking attack in the past and now need to regain my peace of mind by having an ethical hacker check my devices for security. The devices to be checked are my Windows computer and Android Smartphone. Desired Skills and Experience: - Proficient ethical hacker with experience in computer and smartphone security. - Knowledge of Windows and Android operating systems. - Ability to conduct a thorough security check and provide a detailed report of the findings.

    $99 (Avg Bid)
    $99 Avg Bid
    8 bids

    I urgently need a comprehensive security check on my network and servers. In particular, the focus areas should be: - Firewall and network infrastructure - Operating systems and software - User access and permissions - Internal server coding and potential backdoors Even though I didn't specify any compliance standards for you to follow, a good understanding of common ones like PCI DSS, HIPAA, and GDPR would be beneficial. Skills and Experience: - Expertise in network infrastructure and firewall setup - Thorough understanding of different operating systems and their vulnerabilities - Experience with user access management and permission settings - Knowledge in server coding and identifying backdoors I can't stress enough the urgency of this project, it needs to be completed...

    $172 (Avg Bid)
    $172 Avg Bid
    19 bids

    I need a skilled h a c k e r to help recover funds that are currently inaccessible on a website. The specific details of the situation will be shared upon hiring. The successful freelancer for this job should ideally possess: - Proven experience in ethical h a c k ing or similar - Strong understanding of website security - Excellent problem-solving skills - Ability to maintain confidentiality Please apply if you have the necessary skills and experience for this task.

    $132 (Avg Bid)
    $132 Avg Bid
    5 bids

    I'm seeking an experienced IT professional to provide support in setting up Office 365 and company email hosting. Requirements: - Domain name already exists. - Set up Office 365 for optimal use of Word, Excel, Outlook, and Teams. - Establish 1-10 professional, fully-functioning email accounts. Ideal Skills: - Previous work with IT setup for startups. - Familiarity with Office 365 and email hosting. - Fast, efficient, and thorough communication skills. A successful outcome would be seamless integration of Office 365 services as well as fully set-up, working email accounts for my company.

    $127 (Avg Bid)
    $127 Avg Bid
    42 bids

    I'm in need of a seasoned professional who can assist me in improving APT detection through the development of a sophisticated AI model. Additionally, your expertise will be essential in analyzing Provenance Graphs to unearth suspicious activities. Key Tasks: - APT Detection: The successful candidate should be able to enhance the current APT detection mechanisms in place through their expertise in cybersecurity and GNN. - AI Model Development: We are looking to create an advanced AI model specifically tailored for APT detection. Your experience in this area is crucial. - Provenance Graph Analysis: Your ability to analyze Provenance Graphs and identify anomalies, potentially suspicious activities, is paramount. Ideal Skill Set and Experience: - Proficiency in cybersecurity a...

    $474 (Avg Bid)
    $474 Avg Bid
    34 bids

    desarrollar una aplicacion para control de fraccionamientos donde se tengan diferentes controles y roles, asi como un aparteado de finanzas donde se reflejen los estados de cuenta para cada ususario y la mesa directiva pueda ver un general, activar tags o tarjetas para el acceso asi como acceso para invitados

    $14540 (Avg Bid)
    $14540 Avg Bid
    47 bids

    Recommended Articles Just for You

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Learn how to find and work with a top-rated Google Chrome Developer for your project today!
    15 MIN READ
    Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.
    15 MIN READ