Seguridad informática Jobs
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
- Establishing secure network infrastructure
- Improving system performance and leveraging encryption
- Developing security frameworks for organizations
- Implementing authentication measures for digital identification
- Evaluating risks of cyber incident exposure
- Researching the latest security regulations for compliance
- Crafting secure policies for employee engagement
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!De 93,591 opiniones, los clientes califican nuestro Computer Security Consultants 4.85 de un total de 5 estrellas.
Contratar a Computer Security Consultants
I am in need of a freelancer to install a DrayTek Vigor 2865AC Firewall for network security. I have no experience setting up firewalls, so I am looking for someone with expertise in this area. The installation will cover less than 10 devices, so it is a relatively small project. Ideal skills and experience for the job include: - Expertise in setting up firewalls - Knowledge of DrayTek Vigor 2865AC Firewall - Familiarity with network security protocols and best practices - Ability to troubleshoot and resolve any issues that may arise during installation
network engineer ，router，switch，firewall，
I am looking for a freelancer who can help me access shared files on a cloud-based storage via VPN from Windows computers. The goal is to update the files live via the internet. I am not sure about the VPN setup required, so I need recommendations. The ideal freelancer should have experience in VPN setup and be able to suggest the best one based on my needs. The following skills are required for this project: - VPN setup - Cloud-based storage - Windows OS If you have experience in this area and can provide quality work, please bid on this project.
I am in need of a Security Analyst who specializes in Network Security. The project is urgent and needs to be completed within a week. The ideal freelancer will have extensive experience in Network Security and be able to provide examples of past work in this area. Skills and Experience: - Expertise in Network Security - Strong understanding of security protocols and systems - Experience in vulnerability assessment, penetration testing, and threat analysis - Knowledge of security compliance standards - Ability to provide detailed reports and recommendations for improving network security Timeline: - Urgent, project needs to be completed within a week Please provide your relevant experience in Network Security and how you can help improve our network security in your proposal. Thank you...
I am in need of a skilled network engineer experienced in both wired and wireless networks. The engineer will be responsible for troubleshooting my medium-sized network, consisting of 11-50 devices. The ideal candidate should have prior experience and expertise in networking and technical support. A demonstrated track record of success in designing, implementing, and troubleshooting networks is required. The successful candidate must be detail-oriented and have a proactive approach to problem-solving. They should be prepared to work independently, communicate complex technical concepts in an easy-to-understand manner, and respond quickly to project needs in a timely manner. Overall, I'm looking for a capable network engineer who can support me in the short-term, but provide value over...
We are an Israeli based company, Looking for a Cyber Security lecturer for an online project with Africa. a 2-year experience on lecturing on cyber security is a must. a general lecturing experience in the last year a must. a 2-year hand on experience in cyber security is a must.
1. Cleartext submission of password The page contains a form which is submitted over clear-text HTTP 2. Session ID exposed Session ID is vulnerable to theft and may lead to Session Hijacking, Therefore, Session ID should never be sent over unencrypted transport and should never be cached. The application should be examined to ensure that encrypted communications are both the default and enforced for any transfer of Session IDs. Furthermore, the Session ID should not be visible. 3. Strict transport security not enforced The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption, and use the application as a platform for attack...
I need an expert in computer science to write me a research proposal on The Ethical Implications of Malware Detection in V2X Communications: Ethical review. 3000 words. This is actually needed within 48 hours and you have to demonstrate expertise in this in your proposal. The success of this will lead to you being awarded the research project in itself, which would be around 10-15k words. More details to chosen person. Budget: $30-40
I am looking for high-speed internet services from Miguel Telecom. Specifically, I require fiber optic internet for my business. I am looking for high-speed performance with reliable uptime and excellent customer service. I need a solution with no contract commitments that is easy to set up and maintain. Mongo Telecom's cutting-edge technology and dedicated customer support team have been recommended to me and I'm sure they can provide me with the professional internet service I need.c
Cyber Security Strategy for Hospital with Low Current Level We are looking for a freelancer to help us develop a comprehensive cyber security strategy for our hospital. Our current level of cyber security is low, and we want to ensure that we are taking all necessary precautions to protect our sensitive information. Ideal Skills and Experience: - Proven experience developing cyber security strategies for hospitals or healthcare organizations - Familiarity with relevant regulations and compliance frameworks (e.g. HIPAA) - Key Requirements: - Develop a comprehensive cyber security strategy that addresses our unique needs and challenges Note : I need a strategic plan for managing cyber security in hospitals, in addition to writing policies and procedures for the health sector
My students currently have an advanced knowledge of networking topics. I am looking for someone to provide instruction on the concept and practices of network architecture via online classes. The teaching should be tailored to introduce basic concepts, build on intermediate-level skills, and reinforce advanced network architecture. The candidate must have expertise in this area and the ability to deliver an engaging lesson via online teaching.
I am in need of an ethical hacker who can perform a vulnerability assessment on my mobile application. The ideal candidate should have experience in mobile application security and be able to provide both high-level and technical details in the vulnerability assessment report. Skills and Experience: - Experience with mobile application security - Knowledge of common mobile application vulnerabilities - Ability to perform a thorough vulnerability assessment - Experience with both high-level and technical report writing.
I am looking for a technical support specialist to help me with a specific issue. I need an ethical hacker to troubleshoot, install, configure, and set up hardware and networks. The ideal freelancer should have relevant past work experience and include a detailed project proposal. Time is of the essence with this issue, so I need the work completed within a week.
Need to track exact location of an IP address. Link locator
I am looking for a freelancer who can help me implement Virtual SonicWall NSv 470 in KVM Hypervisor VM. The project requires someone with experience in cloud-based environments and advanced sonicwall security. My current network setup is cloud-based, and I require advanced sonicwall security features such as Intrusion Prevention System (IPS), Content Filtering, and Advanced Threat Protection (ATP). The desired bandwidth for the network is between 100 Mbps and 500 Mbps. Ideal skills and experience for the job include: - Experience in implementing Virtual SonicWall NSv 470 in KVM Hypervisor VM - Knowledge of cloud-based environments and security features - Familiarity with Intrusion Prevention System (IPS), Content Filtering, and Advanced Threat Protection (ATP) - Ability to ...
I am looking for a freelancer to implement a wireless networking system for my small network of 1-10 devices. The ideal candidate should have experience in wireless network implementation and configuration. The project will focus on the following areas: - Wireless Network Implementation: The freelancer will be responsible for setting up and configuring the wireless network for my small network of devices. - Network Security: The freelancer should have a good understanding of network security and should be able to implement appropriate security protocols to ensure the network is secure. - Troubleshooting: The freelancer should also be able to troubleshoot any issues that may arise during the implementation process. Skills and experience required: - Experience in wireless network implemen...
Hello I am looking for security engineer who is good at BeyondTrust You must be familiar with BeyondTrust I have some technical questions regarding this Let me know
I am looking for a freelancer who can help me resolve my CentOS network connectivity issues. Currently, I am experiencing lost connection on live only access through rescue mode. I have made recent changes to my network configuration or server settings, specifically, I have changed my network hardware. Ideal skills and experience for this job include: - Proficiency in CentOS network configuration and troubleshooting - Experience with network hardware - Knowledge of server settings and firewall configuration The freelancer should be able to identify and resolve the issue quickly to ensure smooth network connectivity.
Our organization is looking for an experienced professional to conduct a network penetration test on our IT infrastructure. We are looking for comprehensive testing that will include probing and evaluating our network security defenses. Our IT infrastructure is relatively small, with less than 50 devices. It is essential that we have this testing completed as soon as possible. If you are confident in your skills and have experience in conducting penetration testing, then we'd love to hear from you. We're seeking a capable and diligent individual who has a thorough understanding of networks and web applications, as they will be responsible for uncovering and analyzing any security flaws present in our system. Ideally, the chosen candidate would have knowledge in areas such as codi...
I will attach the full project description in a word document but to keep it simple, I require a Report, Feasibility Study, COCOMO II Estimation, Application of security measures within a docker container such as Firewall, Encryption, Authentication etc as well as a video tutorial of how to deploy the docker container application. The most important part of the project is the Report, Feasibility Study and COCOMO II Estimation as it is important to explain the Advanced Analysis and Design when it comes to implementing the Security Features. I will also attach the template for the feasibility study and COCOMO II estimation spreadsheet.
Need a windows OS and servers hardening checklist for my organisation
I'm looking for a freelancer to assess and enhance my current Windows Server and Active Directory setup. I am currently running Windows Server 2019 and have no specific issues with my system; I am mainly looking for improvements to optimize my setup. In regards to backup and disaster recovery, I am open to any method though I do not currently have a preference. I am looking for expert insight in assessing and enhancing my existing setup to ensure the best performance and security possible.
I am looking for a Network Design freelancer to work on a big project that involves both LAN and WAN. The ideal candidate should be experienced in designing complex networks and should have a good understanding of network security. Scope of the project: - The project involves designing a network that connects more than 100 locations. Required skills: - Extensive knowledge of LAN and WAN - Experience in designing complex networks - Strong understanding of network security - Knowledge of network devices such as switches, routers, and firewalls - Lots of more Deliverables: - A detailed network design that includes all necessary devices and configurations - Implementation plan for the network - Network documentation and diagrams If you are an experienced Network Design freelancer with the...
I am in need of an expert in Linux security to perform a one-time setup of intrusion detection and prevention measures on my system. Currently, basic security measures are in place, but I am looking to enhance the overall security of my system. The ideal candidate should have experience with the following: - Intrusion Detection and Prevention - Firewall Configuration - Encryption - Linux security best practices The project requires a one-time setup of the above measures and does not involve ongoing monitoring and maintenance.
Hello, I am needing to consult on a security platform or software for my windows server 2019, I want to be alerted everytime someone is logging in(there are 5 users via RDS on the local network) that can also collect event logs and create a portal to view security activity on the server, and network to I suppose. Thank you.
We are seeking a skilled and experienced assembler Specialist with expertise in HASP dongles to assist with a specific project. The ideal candidate will have a strong understanding of software and hardware systems, along with the ability to analyze and reverse engineer the functionality of HASP dongles. Responsibilities: Analyze and understand the functionality and security mechanisms of HASP dongles. Reverse engineer the firmware or software associated with the HASP dongles. Identify and document the communication protocols and encryption algorithms used by the dongles. Develop or modify software tools and utilities to assist in the reverse engineering process. Collaborate with the development team to provide insights and recommendations based on reverse engineering findings. Ensure com...
I am looking for a skilled freelancer who can help me solve my HTTP Flood DDoS attack. I currently have DDoS protection in place, but I need someone with experience in solving this type of attack. Ideal Skills and Experience: - Knowledge and experience with solving HTTP Flood DDoS attacks - Familiarity with cloud hosting environments - Ability to work with existing DDoS protection solutions - Strong communication skills to keep me updated on progress and any necessary actions that need to be taken.
My project is to create a Discord server for a gaming experience. I need a server that is versatile enough to accommodate a wide range of users and provide a great gaming experience. I don't have a specific list of channels and features that I require for the server, but I'd welcome suggestions from any potential freelancers who are interested in the project. Security is of utmost importance, so advanced moderation and security measures need to be implemented to ensure the safety of both the users and the server itself.
Task 1: Penetration Testing are essential for the security of organizations. It examines whether an organization's security policies, procedures and controls are genuinely effective or not. The penetration testing report provides a complete overview of the uncovered vulnerabilities with a POC (Proof of Concept) and recommendations to fix those vulnerabilities with priority details. The article “” includes a penetration testing against the security controls within their information environment. It provides a practical demonstration on the effectiveness of the security controls and their susceptibility to be exploited. Analyse any five vulnerabilities that were identified in the report by studying the tools used to detect them and their risks. Critically evaluate any...
I am looking for an ethical hacker to help me secure my Android phone from unauthorized access. I think my current company that has hired me is hacking my phone. Specifically, I am concerned about the security of my data, socal apps and need a complete solution to ensure its safety. Currently, I am not sure if I have any security measures in place and would like to upgrade them if I do. My preferred method for securing my phone is by setting up device encryption. I can pay you 1000 Rs for this Ideal skills and experience: - Experience in ethical hacking and mobile security - Knowledge of Android security measures and best practices - Experience with setting up device encryption - Familiarity with security apps and custom security measures
I am looking for a highly skilled L1 network engineer for one of our customers in Germany (welgen-im-allgau)and take on a long-term position in enterprise environment. The engineer will be responsible for monitoring the networks as well as troubleshooting any issues that arise and configuring our system to ensure that everything runs smoothly or basic L1 support, This project is expected to run for three years, engineer required to be onsite for two days a week only on Tuesday and Thursday (9am to 5pm)so the ideal candidate must be committed to the long term. As well as great technical and communication skills, the engineer should also possess strong problem-solving abilities and a comprehensive understanding of various network technologies. The engineer should also be able to work efficie...
I am looking for a highly skilled L1 network engineer for one of our customers in Germany (welgen-im-allgau)and take on a long-term position in enterprise environment. The engineer will be responsible for monitoring the networks as well as troubleshooting any issues that arise and configuring our system to ensure that everything runs smoothly or basic LA support, This project is expected to run for three years, engineer required to be onsite for two days a week only on Tuesday and Thursday (9am to 5pm)so the ideal candidate must be committed to the long term. As well as great technical and communication skills, the engineer should also possess strong problem-solving abilities and a comprehensive understanding of various network technologies. The engineer should also be able to work efficie...
I am seeking a skilled programmer who can perform a source code analysis on a file that contains a trojan. The programming language used is C#. Although the file's current use in a production environment is uncertain, my main purpose for the analysis is to understand the trojan's functionality. Therefore, I require an experienced professional who is capable of identifying security vulnerabilities and comprehending the inner workings of the malicious file. If you possess the necessary skills and expertise, please contact me.