Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Sur 109670 commentaires, les clients évaluent notre Computer Security Consultants à 4.86 sur 5 étoiles.
En savoir plus
We are hiring a new penetration tester to participate in projects with us, who has solid hacking skills mostly in web applications, written in JS and its frameworks, PHP and Mobile applications. You should be able to write a complete vulnerability assessment report and present your findings to CTO.
I need a Computer Science or Cybersecurity graduate to help with a few assignments from my professor, I have 8 modules I need to answer, each module has 4 -5 questions. I will provide all the questions and the book.
I think the topic of the virus is quite interesting. I put a lot of time and effort into this project. I am anticipating your a result of the increase in global temperature, glaciers and permafrost are melting, releasing bacteria and viruses that have been trapped under the ice for years. The Zombie Virus is one such amoeba virus that researchers were able to recover from melted ice.
Project consists to organize a red teaming exercise against a company of medium size to test end-to-end their security. Goal of the red teaming is to be able to take control of their infrastructure (AD domain admin). Delivery is a document which explained the way of working, what has been blocked by security measures and concrete advises how to improve the security. Organization mainly on-prem, using some azure (like office 365), Windows 10, some web applications. We are only looking for experimented person. Give a small description of your way of working and we will have a chat. Please reply with the keyword "RED" in your reply (to avoid considering automated response).
Need entire ISMS/ ISO27001 related documentation templates. ISMS Manual Disaster Recovery Plan Business Continuity Plan ISMS RACI Matrix Acceptable Use Policy Mobile Device and teleworking Policy Information Security Risk Register Internal audit plan Information Asset Register BYOD Disposal and destruction policy Information classification policy Information transfer Password policy Asset management ISMS policy Data recovery and backup policy Security incident management Logging and monitoring Cloud computing policy Risk Management ISMS Statement of applicability Patch and vulnerability management Access Control Policy Document and Record Control Procedure Cryptographic Policy ISO27001 requirements checklist
We are looking for cyber security expert that can help us find vulnerabilities on our websites.
Cybersecurity Risk Assessment and Remediation Services, End-User Cybersecurity Awareness Training, Cyber-liability and Data Breach Insurance Coverage program, and a Security Incident Response Plan.
We (freelancer.com) have an exciting opportunity for an experienced " Field -Service Delivery Coordinator" to join our team and be part of this amazing project during an amazing growth period -Pay per day - 1300/day -Weekly pay -FULL TIME Freelancing -6 days work week - Location - Vizag Role Title: Scheduler Field Services/Coordinator Roles and Responsibilities: Allocating and managing daily assignment of work orders and field service resources Coordinating the onboarding and training of field service resources Outbound calls to customers to obtain further information and/or to identify customer satisfaction Delivering a high level of customer service through day-to-day interaction with the field team Ensuring performance metrics are met Requirements: Exper...
Talented cyber/website security needed Right away.
Do you feel like scanners are just to catch the low-hanging fruit and that the real findings are left for the human testers? Have you tested hundreds of networks and still want more? If this describes you, you’re in luck! We are looking for an experienced penetration security testers to join our team of highly skilled penetration testers. If you feel most at home with a scanner and manually following up on those vulnerabilities, this is NOT the kind of job we are offering. Minimum Requirements -Advanced ability to detect, define, exploit, and remediate vulnerabilities without the use of a vulnerability scanner (a browser, a proxy, an editor, and YOU) Develop detailed reports on findings and remediations – Familiarity with Windows Internals – Vulnerability and ...
I need a help for my computer security WordPress vulnerabilities final project
I am designing an IP Telephony Topology and am having difficulty designing the following elements: 1. Routing Protocols (EIGRP & OSPF). 2. Switchport Security. 3. Configuring IP Telephones. Network System Requirements as per the attached file. I have started designing this but need some assistance as i am hitting some roadblocks so can share the packet tracer file and commands i have used. I have designed this using Cisco Packet Tracer.
We have a few surveillance cameras in diferent places with Internet acces trough a need is to connect them to a 's posibble to connect them with Microtic VPN solution?In some places we have 2-3 cameras,some places with 1 camera.