Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

De 105,331 opiniones, los clientes califican nuestro Computer Security Consultants 4.9 de un total de 5 estrellas.
Contratar a Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

De 105,331 opiniones, los clientes califican nuestro Computer Security Consultants 4.9 de un total de 5 estrellas.
Contratar a Computer Security Consultants

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    24 trabajos encontrados

    ​"In a Zero-Trust DePIN environment, how do you ensure the 'Integrity of Result' from an untrusted provider? If the computation happens inside an AMD SEV-SNP enclave, how do you architect a 'Remote Attestation' flow that proves to the client the data was processed by the correct binary without exposing the client's raw input to the provider's OS?"

    €151 Average bid
    €151 Oferta promedio
    37 ofertas
    Recover Hacked Discord Account
    20 horas left
    Verificado

    I'm seeking a skilled professional to help me regain access to my compromised Discord account. A hacker has taken control and is demanding payment for its return. Requirements: - Experience with account recovery, especially for Discord - Ability to negotiate or handle situations with hackers - Should be discreet and maintain confidentiality - Must provide a step-by-step report of actions taken Proof of ownership: I have emails and screenshots as evidence. Ideal skills and experience: - Cybersecurity knowledge - Previous experience in handling similar recovery tasks - Strong communication skills

    €384 Average bid
    Urgente
    €384 Oferta promedio
    53 ofertas

    I want to land a contract-based System Administrator position with a New Zealand employer already listed as “accredited” for work visas. To make that happen, I need a freelancer who knows the NZ tech job market, understands immigration accreditation requirements, and can actively source suitable openings rather than simply sending generic links. Here’s what I expect you to handle from start to finish: • Identify and verify accredited companies currently recruiting System Administrators on a contract basis. • Tailor my existing CV and cover letter to each role, aligning them with NZ hiring standards and any visa-related wording employers like to see. • Submit applications on my behalf (or prepare everything for my direct submission when required) and k...

    €35 Average bid
    €35 Oferta promedio
    3 ofertas

    We have privacy-preserving smart contracts built on Inco Network (FHE-enabled blockchain) and need a thorough independent review before mainnet deployment. The main priorities are uncovering security vulnerabilities specific to encrypted state handling and verifying correct implementation of confidential computing patterns; gas optimization is secondary. Here is what we need from you: • Manual and automated analysis of Solidity source code using tools such as Slither, Foundry test suites, or similar — adapted for privacy-focused contract logic. • Testing of edge cases related to encrypted variables, access control for confidential data, and proper handling of FHE operations. • Verification that sensitive data remains encrypted throughout contract execution and cann...

    €3309 Average bid
    €3309 Oferta promedio
    44 ofertas

    I need a clear, professionally-written blueprint that I can hand straight to my developers so they can begin building a cyber-security application. The document must spell out scope, objectives, high-level architecture and phased milestones while keeping two pillars front-and-centre: network security and data security. Key modules to be covered in the scope are user authentication, real-time threat detection and automated vulnerability scanning. For each of these I expect you to describe functionality, recommended technology stacks, integration points, basic data flows and any compliance considerations (e.g. NIST CSF, ISO 27001, OWASP). Diagrams—UML, context or sequence—are important where they add clarity. Please base the structure on industry best-practice documents: exec...

    €149 Average bid
    €149 Oferta promedio
    34 ofertas

    I need a certified ethical hacker to run a full-cycle social-engineering engagement focused exclusively on phishing simulation. The objective is to gauge how many employees interact with malicious-looking emails, identify patterns behind unsafe clicks or credential submissions, and turn those findings into actionable security awareness improvements. The work involves designing realistic phishing scenarios aligned with our business context, sending the campaign through a managed platform (GoPhish, King Phisher, or similar), silently harvesting the metrics, and then compiling a thorough post-test report. No destructive payloads or system exploitation are allowed—this is a people-centric test only. Deliverables • Campaign design document outlining themes, targets, schedule, and...

    €8 / hr Average bid
    €8 / hr Oferta promedio
    4 ofertas

    I need a certified ethical hacker to run a full-cycle social-engineering engagement focused exclusively on phishing simulation. The objective is to gauge how many employees interact with malicious-looking emails, identify patterns behind unsafe clicks or credential submissions, and turn those findings into actionable security awareness improvements. The work involves designing realistic phishing scenarios aligned with our business context, sending the campaign through a managed platform (GoPhish, King Phisher, or similar), silently harvesting the metrics, and then compiling a thorough post-test report. No destructive payloads or system exploitation are allowed—this is a people-centric test only. Deliverables • Campaign design document outlining themes, targets, schedule, and...

    €8 / hr Average bid
    €8 / hr Oferta promedio
    3 ofertas

    I need an experienced cyber-investigator to zero-in on malware that has recently infiltrated several personal computers in my office. The priority is to detect, isolate, and document every malicious component so we can move straight to containment and clean-up. I need someone to access a Blackmailing correspondence I had with a person on Telegram. I need the archives from this account and we must do this legally via Telegram? You will start with a remote sweep (or on-site if you are nearby), capture volatile data, analyse suspicious processes, services, registry changes and network traffic, then supply a concise report that identifies the malware family, infection vectors, and any persistence mechanisms you uncover. I will handle the actual remediation once I have your find...

    €6 Average bid
    €6
    4 participaciones

    I need an experienced cybersecurity professional who can guide our food-manufacturing plant through the next stage of its Governance, Risk & Compliance journey. You will be the point person for building and fine-tuning our Information Security Management System with ISO 27001 as the primary framework. Day-to-day you will draw on at least four years of GRC work—ideally gained in industrial or OT-heavy settings—and a solid technical foundation in infrastructure or security operations. What matters most is deep, practical knowledge of ISO 27001. Familiarity with ISO 27005 and the NIST frameworks is important because we want our risk management and control mapping to stand up to external scrutiny. Certifications such as ISO 27001 Implementer, ISO 27005 Risk Manager and any I...

    €92 / hr Average bid
    €92 / hr Oferta promedio
    22 ofertas

    I need an experienced cyber-security professional who can move straight past theory and actually put the right protections in place. My environment is already running, but the current safeguards are piecemeal. Your task will be to evaluate what is there, decide what is missing, and implement the controls that close those gaps—whether that involves configuring firewalls, hardening servers, enforcing least-privilege access, deploying endpoint protection, or setting up logging and alerting in a SIEM. I’m looking for measurable improvements, not just a written report. Once the new measures are live, I’ll need clear documentation of every change plus a brief hand-over session so my in-house team can maintain what you install. Deliverables • Security controls fully dep...

    €243 Average bid
    €243 Oferta promedio
    16 ofertas

    I need a skilled network engineer to spend one full day at my client’s office acting as our hands-on field resource while my remote team drives the configuration work. Your focus will be the physical layer: • Rack and securely mount the new servers, switches, and firewalls exactly as outlined in our build guide. • Dress network and power cabling so everything is neat, labeled, and easy to trace. • Power up each device, connect the console or management interfaces, and confirm our remote team can reach them. • Run quick health checks—simple pings, basic connectivity tests, and a printer test page—to verify the environment is live. • Make sure every desktop and laptop joins the network without issues and that all printers can produce a clea...

    €36 / hr Average bid
    €36 / hr Oferta promedio
    10 ofertas

    I need a reliable, experienced Network Engineer to be my hands on the ground for a full working day at our client’s office. My remote team will handle all configuration; your role is purely physical deployment, basic testing, and real-time feedback so we can finish the build in one visit. You will arrive with the step-by-step build guide already in hand, rack and mount the servers, switches, and firewalls, dress the power and network cabling neatly, attach console or management leads, then power everything up so we can start configuring from afar. While we work remotely, you will run quick ping and connectivity checks, confirm that each desktop or laptop grabs an IP and reaches the internet, and send a printer test page to be sure the print queue is alive. Deliverables (end of day)...

    €33 / hr Average bid
    €33 / hr Oferta promedio
    8 ofertas
    Cybersecurity Breach Investigation
    4 días left
    Verificado

    I need help to find a hacker who compromised my computer over wifi. Requirements: - Analyze the breach and identify the hacker. - Use existing antivirus info for insights. - Provide a detailed report of findings. Ideal Skills: - Experience in cybersecurity and hacking investigations. - Proficient in analyzing antivirus data. - Strong problem-solving skills and attention to detail. Please include past work, experience, and a detailed project proposal in your application.

    €285 Average bid
    €285 Oferta promedio
    32 ofertas

    **Title:** Mitsubishi CNC M80 Password Recovery - Encrypted DAT File **Category:** Electrical Engineering > Industrial Automation **Budget:** $150-$500 (willing to pay more for fast solution) **Description:** I have a Mitsubishi Electric M80 CNC machine that is password locked and I need urgent help to regain access. **Background:** The previous operator set a system password and it was never documented. The machine is currently locked and preventing us from accessing critical functions, causing production delays. **Technical Details:** - Machine: Mitsubishi M80 CNC - Model: FCA80LH-4 - Serial Number: M30147623YN - Unit: FCU8-MU515 - Controller Version: WN769 F (Ver.4.02) - NC OS: BND-2000W001-F7 - PLC: BND-2023W003-A0B **What I Have:** - Encrypted file (65 bytes) - Photos of ma...

    €370 Average bid
    €370 Oferta promedio
    16 ofertas

    I'm looking for someone who understands how to configure a GL-iNet GL-MT6000 (Flip 2) router to connect to and work through a foreign VPN. I need to understand what settings to use, which provider/hosting provider to use, and which package to choose to connect the VPN to the router. I also need to understand how to resolve potential leaks, stress testing, and so on. After connecting the router and installing the VPN, I need to make sure there are no issues that could reveal my current location, and that everything works reliably.

    €24 Average bid
    €24 Oferta promedio
    10 ofertas

    I’m looking for a specialist to run a full health-check on my Local Area Network. The priority is to verify that everything works as intended and to pinpoint any performance bottlenecks that might slow users down. Security is being handled separately, so your focus will be strictly on functionality and performance. The job involves testing end-to-end connectivity, measuring throughput and latency at peak and off-peak times, and confirming that current configurations on switches, routers, and access points align with best practices. I expect you to use industry-standard network diagnostic tools—think Wireshark, iPerf, or SolarWinds—but you’re free to bring in any utilities you trust as long as the results are clearly documented. Deliverables • A concise repo...

    €15 / hr Average bid
    €15 / hr Oferta promedio
    11 ofertas

    I have already completed the technical investigation of a recent security alert: the endpoint protection platform flagged an executable that tried to tamper with system files and phone home to an external server. I verified the hash, monitored live-system behaviour, confirmed the activity as malicious, quarantined the file and rescanned the host to ensure it is now clean. What I need next is a professionally written incident report that translates those raw findings into a clear narrative for both management and technical stakeholders. The document should outline the timeline of events, the investigation methodology, indicators of compromise, remediation actions taken, and practical recommendations to harden the environment against similar threats. Where helpful, map tactics to MITRE ATT&...

    €8 / hr Average bid
    €8 / hr Oferta promedio
    12 ofertas

    You are a senior cybersecurity + machine learning engineer. Build a practical, runnable, end-to-end Transformer-based Web Application Firewall (AI-WAF) prototype suitable for Smart India Hackathon / ISRO SIH demonstration. The system must implement the full pipeline: Log Ingestion → Parsing → Normalization → Tokenization → Transformer Training → Multi-Class Attack Classification → Anomaly Scoring → Real-Time Non-Blocking Inference → Alerting & Logging → Incremental Fine-Tuning ======================================== 1. CORE FUNCTIONAL REQUIREMENTS ======================================== A. Multi-Class Attack Detection The Transformer model must classify HTTP requests into: - BENIGN - SQL_INJECTION - XSS - COMMAND_INJECTION - PATH_TR...

    €56 Average bid
    €56 Oferta promedio
    9 ofertas

    I hold written authorization from the system owner and need an experienced ethical-hacking professional to carry out a controlled breach of our production environment. The assignment goes beyond a traditional penetration test: I want you to replicate a real-world, end-to-end intrusion scenario so we can measure how our monitoring, logging and incident-response teams react under pressure. Scope • Obtain initial access using any non-destructive vector you discover (phishing simulation, misconfigurations, credential weakness, etc.). • Laterally move, escalate privileges and demonstrate data access without altering or deleting information. • Leave tamper-proof evidence (flags) in pre-agreed directories so we can verify compromise. • Conclude with a thorough report that det...

    €11 / hr Average bid
    €11 / hr Oferta promedio
    11 ofertas
    Literature analysis writing
    2 días left
    Verificado

    I want professional english writing for a phd level dissertation.

    €95 Average bid
    €95 Oferta promedio
    58 ofertas
    Wide Area Network Setup Project
    2 días left
    Verificado

    I’m ready to move from concept to a fully functioning Wide Area Network and need an experienced networking specialist to guide every step. The job starts with assessing my current sites and bandwidth needs, then designing a scalable WAN topology that keeps latency low and uptime high. From there you’ll source or specify the right hardware, configure routing, implement security policies, test end-to-end connectivity, and leave me with clear documentation so my team can handle routine maintenance. If you’ve rolled out multi-site WANs before and can communicate technical details in plain language, let’s talk timelines and milestones.

    €22 Average bid
    €22 Oferta promedio
    13 ofertas

    I’m putting together an in-depth, case study–style report on a real-world data breach that struck the healthcare sector. The goal is to walk readers through the timeline of the incident, the technical and procedural gaps that allowed it to happen, the immediate response, and the long-term remediation steps. Accuracy and authenticity matter: I will provide raw notes, public disclosures, and redacted internal memos once we start, but I’m relying on your cybersecurity and information-management expertise to shape them into a compelling, well-structured narrative. Here’s what I’m after: • A 3,000–4,000-word report formatted for executive readership but detailed enough for security teams. • Clear articulation of attack vectors, compromise indi...

    €104 Average bid
    €104 Oferta promedio
    68 ofertas

    I’m looking for an online tutor based in India who can guide me through intermediate-level administration of both Linux and Windows Server environments. On the Linux side I want practical, session-based coaching in system administration, security and firewall management, and shell scripting. For Windows Server, the focus should be Active Directory management, server configuration and deployment, plus security and patch management. Each topic needs to be demonstrated live, with time for me to replicate the steps on my own lab machines during or immediately after the call. We can meet on Zoom or Google Meet for 2–3 hours a week, preferably evenings or weekends. Deliverables • A structured lesson plan that maps out the sequence of sessions • Recordings or sess...

    €2 / hr Average bid
    €2 / hr Oferta promedio
    7 ofertas

    I’ve built a custom web application and it’s almost ready for production. Before the public rollout, I want a rigorous penetration test that will expose any weakness and help tighten every layer of security. The assessment must be hands-on and realistic, covering the full stack rather than a purely theoretical review. Scope My priorities are clear: • Code review – comb through the source for injection points, authentication flaws, insecure dependencies, and logic errors. • Network-level probing – map open ports, misconfigured firewalls, and potential lateral-movement paths. • Server configuration – evaluate patch levels, TLS setup, permissions, and hardening of the underlying OS and web server. Primary Goal The sole purpose is to imp...

    €974 Average bid
    €974 Oferta promedio
    26 ofertas

    Artículos recomendados solo para ti