Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Sur 107,427 commentaires, les clients ont évalué nos Computer Security Consultants 4.9 sur 5 étoiles.
Embaucher des Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Sur 107,427 commentaires, les clients ont évalué nos Computer Security Consultants 4.9 sur 5 étoiles.
Embaucher des Computer Security Consultants

Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    15 missions trouvées

    I need focused, reliable technical support for my Windows-based machines. This isn’t an administrative or creative assignment—the job is purely about getting Windows to run smoothly and solving the nagging issues I’m facing right now. If you have deep, hands-on experience with Windows 10 and 11—whether that means taming driver conflicts, removing stubborn malware, repairing corrupted system files, or troubleshooting software that refuses to install—then you’re the person I want to collaborate with. You should be comfortable working remotely via tools such as TeamViewer, AnyDesk, or similar, and be able to walk me through anything that requires local action on my side. Solid knowledge of PowerShell, Windows Event Viewer, and common diagnostic utilities w...

    €16 / hr Average bid
    €16 / hr Offre moyenne
    24 offres

    Hello, I need someone to complete a small networking project for me. Please read the details carefully. PROJECT TITLE: DDoS Traffic Simulation and Wireshark Analysis (hping3 + Wireshark) WHAT YOU NEED TO DO: Set up two devices or two virtual machines and perform the following: Run normal traffic tests Run a SYN flood using hping3 Run a UDP flood using hping3 Run an ICMP flood using hping3 Capture all traffic in Wireshark I need clean, high-quality results. PERSONALIZATION REQUIREMENTS (IMPORTANT): All screenshots, filenames, terminal prompts, and labels must use the name: skerdi.340 Please follow these rules: The Linux username must be: skerdi.340 Example terminal prompt: skerdi.340@linux:~$ All screenshot filenames must start with: skerdi.340_ Examples: Any notes ins...

    €125 Average bid
    €125 Offre moyenne
    15 offres

    I need help configuring networking options for Dante. Essential tasks include: - Set up routing settings - Configure firewall rules - Manage bandwidth Ideal skills and experience: - Strong knowledge of Dante - Networking expertise - Experience with routing, firewall, and bandwidth management

    €422 Average bid
    €422 Offre moyenne
    23 offres

    I need help gathering proof of email malware to report to the authorities. Requirements: - Use of antivirus software and netstat - iOS expertise - Experience with malware verification and documentation Ideal Skills: - Proficient in Microsoft Defender - Familiar with iOS security and malware symptoms - Able to provide clear, actionable evidence for authorities

    €67 Average bid
    €67 Offre moyenne
    10 offres
    Cisco DNAC Rogue Detection Setup
    4 jours left
    Vérifié

    I have a Cisco Catalyst Center (DNA Center) deployment running and I want to turn on—and fine-tune—“rogue-on-wire” detection only. The hardware is already online; what I’m missing is the exact configuration inside DNAC that will reliably flag any unauthorized device that plugs into my wired infrastructure and then surface those events in the dashboard and in e-mail alerts. Here’s what I need from you: • A live or recorded walkthrough inside Catalyst Center showing the menus, policy settings, and thresholds you adjust to enable rogue-on-wire detection. • Written step-by-step instructions so I can reproduce the setup in other sites. • Verification guidance—how to generate test events and confirm that DNAC is catching them (CLI co...

    €173 Average bid
    €173 Offre moyenne
    19 offres

    I am seeking a creative and relentless Offensive Security Operator to join my team. You will conduct full-spectrum penetration testing, adversary simulations, and exploit development to uncover weaknesses in high-value environments. You’ll work with a small, highly skilled team that embraces unconventional thinking and pushes technological limits to reveal the truth about system vulnerabilities. Key Responsibilities: - Perform penetration testing on networks, cloud systems, and applications - Develop and execute custom exploit chains and attack paths - Conduct reconnaissance, privilege escalation, and lateral movement - Create detailed reports outlining vulnerabilities and proof-of-concept exploits - Simulate realistic adversary behavior during red-team engagements - Collaborate wit...

    €204 / hr Average bid
    €204 / hr Offre moyenne
    38 offres
    Cybersecurity Audit and Testing
    4 jours left
    Vérifié

    About the Role: We are seeking a disciplined and analytical Cyber Defense Analyst to join our research-driven operations unit. In this role, you will monitor, detect, and respond to cybersecurity threats using advanced tools, defensive engineering practices, and proprietary intelligence frameworks. You will work alongside our security research group to analyze incidents, strengthen system resilience, and help our clients build long-term, stable security postures. Responsibilities: Monitor security systems, SIEM alerts, and network telemetry Analyze threats and conduct deep-dive investigations Support incident response operations and containment efforts Collaborate with research engineers on detections and defensive improvements Develop documentation, playbooks, and repeatable processes I...

    €25 / hr Average bid
    €25 / hr Offre moyenne
    49 offres

    I’m looking for a seasoned systems administrator who can take full ownership of our server environment. My immediate priority is professional, round-the-clock server monitoring and maintenance coupled with timely security updates to keep every instance hardened and compliant. Day to day, you will watch over performance metrics, act on alerts before they affect uptime, and roll out patches or configuration tweaks without disrupting service. Clear documentation of all actions and a concise weekly health summary are essential so I can track what’s been done and why. To be considered, focus your bid on the depth of your experience with similar always-on production setups—mention the operating systems, monitoring stacks, and security frameworks you know best. I’m less ...

    €2185 Average bid
    €2185 Offre moyenne
    31 offres

    I’m looking for a seasoned systems administrator who can take full ownership of our server environment. My immediate priority is professional, round-the-clock server monitoring and maintenance coupled with timely security updates to keep every instance hardened and compliant. Day to day, you will watch over performance metrics, act on alerts before they affect uptime, and roll out patches or configuration tweaks without disrupting service. Clear documentation of all actions and a concise weekly health summary are essential so I can track what’s been done and why. To be considered, focus your bid on the depth of your experience with similar always-on production setups—mention the operating systems, monitoring stacks, and security frameworks you know best. I’m less ...

    €3186 Average bid
    €3186 Offre moyenne
    24 offres
    Secure Network with Static IP
    3 jours left
    Vérifié

    I want to tighten the overall security of my small-office network and the first step is moving from our current dynamic IP to a properly configured static IP address. Once that stable address is in place I need the surrounding network protection measures—firewall rules, intrusion-prevention tuning, and any router or gateway hardening—to be reviewed and optimised so we reduce attack surface and improve monitoring accuracy. Here is what I am expecting from you: • Coordinate the switch to a static public IP with my ISP (I already have authorisation and credentials). • Configure the router/gateway to use the new address, verify DNS and NAT settings, and confirm all devices are reachable as intended. • Audit existing firewall rules, apply best-practice hardenin...

    €17 / hr Average bid
    €17 / hr Offre moyenne
    49 offres

    Looking for an experienced and neat network technician for a fast, one-day project (6–8 hours max) in Abhur, Jeddah. Exact Scope of Work (everything is already pre-wired): • Mount a 15U wall rack / cabinet • Install only 4 devices inside the rack and connect them properly: • Ruijie (Reyee) Switch • Dahua NVR • FortiGate Firewall • UPS • Run and terminate one single Cat6 cable (3–5 meters) from the main Ruijie (Reyee) Access Point location to the rack/patch panel • Punch down 14 existing, pre-pulled data cables into the patch panel • Neatly connect all devices to the patch panel using short patch cords • Install and configure 2 outdoor Dahua IP cameras + 2 indoor Dahua IP cameras • Install and connect APC smar...

    €19 Average bid
    €19 Offre moyenne
    13 offres

    I am looking for a seasoned security specialist who can run a full-cycle, OWASP Top 10–oriented penetration test on our web application. The engagement must cover information gathering, vulnerability verification, exploitation for risk validation, and finally a polished report. What matters most: • You are genuinely comfortable hunting for SQLi, XSS, CSRF, RCE, SSRF, business-logic flaws and similar issues. • All testing is performed directly by you—no re-outsourcing and no leakage of data, code or credentials. • Burp Suite will be the primary toolbox; if you prefer supplementing it with OWASP ZAP or Nmap, that is fine as long as the results remain consistent. • You can show prior enterprise-grade work or at least a sample report so I can assess d...

    €1023 Average bid
    €1023 Offre moyenne
    22 offres

    Here’s a polished, professional version—clean, direct, and ready to use: I need a dedicated professional to monitor and verify network alerts. This role is critical to maintaining network integrity and ensuring smooth, uninterrupted operations. Key Responsibilities: 24/7 system monitoring using existing tools. Review alerts as they come in, validate them, and notify the appropriate personnel. Monitor security, performance, and connectivity alerts. Resolve, escalate, or document issues based on urgency. Communicate clearly with the team regarding alert status and actions taken. Ideal Skills: Solid networking knowledge Strong communication abilities Effective task prioritization Reliability and attention to detail This position can grow into engineering or support rol...

    €18 / hr Average bid
    €18 / hr Offre moyenne
    38 offres

    I have a 64-bit Windows executable (~14 MB, digitally signed, admin-level) that I am studying for an academic -analysis course. Detect It Easy flags it as “Generic [Strange sections]” with high-entropy compression and the file uses obfuscated section names such as .e{, kvs, .{r34f, .*ApG<K. From an initial inspection I expect a combination of compression, encryption and obfuscation, but I need the exact protection scheme confirmed and fully bypassed. Everything must be handled in a safe, isolated lab so the original signature and any potentially dangerous behaviour remain contained. What I need from you: • A completely unpacked, runnable version of the executable • All extracted payloads, resources and secondary components • A technical report that...

    €81 Average bid
    €81 Offre moyenne
    17 offres
    Working with Driver kernel -- 2
    20 heures left
    Vérifié

    We are developing a Windows kernel-mode driver that supports both AMD and Intel platforms, with a specific focus on IOMMU (Input-Output Memory Management Unit) functionality. A deep understanding of IOMMU memory protection mechanisms is required for this project. Disclaimer from the poster: This project does NOT involve cheating, hacking, or any form of academic dishonesty. The software is exclusively for personal, educational interest and will be used only on my private computer. It is not designed for any destructive or malicious purposes. To scammers: Please do not waste our time. I will NOT release any milestone payments before the project is satisfactorily completed. All communication and work must remain on this platform—I will not move conversations to other messaging apps...

    €170 Average bid
    €170 Offre moyenne
    6 offres

    Articles recommandés juste pour vous