Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Sur 104,895 commentaires, les clients ont évalué nos Computer Security Consultants 4.9 sur 5 étoiles.
Embaucher des Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Sur 104,895 commentaires, les clients ont évalué nos Computer Security Consultants 4.9 sur 5 étoiles.
Embaucher des Computer Security Consultants

Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    15 missions trouvées

    I’m looking for a specialist to run a full health-check on my Local Area Network. The priority is to verify that everything works as intended and to pinpoint any performance bottlenecks that might slow users down. Security is being handled separately, so your focus will be strictly on functionality and performance. The job involves testing end-to-end connectivity, measuring throughput and latency at peak and off-peak times, and confirming that current configurations on switches, routers, and access points align with best practices. I expect you to use industry-standard network diagnostic tools—think Wireshark, iPerf, or SolarWinds—but you’re free to bring in any utilities you trust as long as the results are clearly documented. Deliverables • A concise repo...

    €17 / hr Average bid
    €17 / hr Offre moyenne
    8 offres

    I have already completed the technical investigation of a recent security alert: the endpoint protection platform flagged an executable that tried to tamper with system files and phone home to an external server. I verified the hash, monitored live-system behaviour, confirmed the activity as malicious, quarantined the file and rescanned the host to ensure it is now clean. What I need next is a professionally written incident report that translates those raw findings into a clear narrative for both management and technical stakeholders. The document should outline the timeline of events, the investigation methodology, indicators of compromise, remediation actions taken, and practical recommendations to harden the environment against similar threats. Where helpful, map tactics to MITRE ATT&...

    €8 / hr Average bid
    €8 / hr Offre moyenne
    12 offres

    You are a senior cybersecurity + machine learning engineer. Build a practical, runnable, end-to-end Transformer-based Web Application Firewall (AI-WAF) prototype suitable for Smart India Hackathon / ISRO SIH demonstration. The system must implement the full pipeline: Log Ingestion → Parsing → Normalization → Tokenization → Transformer Training → Multi-Class Attack Classification → Anomaly Scoring → Real-Time Non-Blocking Inference → Alerting & Logging → Incremental Fine-Tuning ======================================== 1. CORE FUNCTIONAL REQUIREMENTS ======================================== A. Multi-Class Attack Detection The Transformer model must classify HTTP requests into: - BENIGN - SQL_INJECTION - XSS - COMMAND_INJECTION - PATH_TR...

    €50 Average bid
    €50 Offre moyenne
    8 offres

    I hold written authorization from the system owner and need an experienced ethical-hacking professional to carry out a controlled breach of our production environment. The assignment goes beyond a traditional penetration test: I want you to replicate a real-world, end-to-end intrusion scenario so we can measure how our monitoring, logging and incident-response teams react under pressure. Scope • Obtain initial access using any non-destructive vector you discover (phishing simulation, misconfigurations, credential weakness, etc.). • Laterally move, escalate privileges and demonstrate data access without altering or deleting information. • Leave tamper-proof evidence (flags) in pre-agreed directories so we can verify compromise. • Conclude with a thorough report that det...

    €8 / hr Average bid
    €8 / hr Offre moyenne
    9 offres
    Literature analysis writing
    4 jours left
    Vérifié

    I want professional english writing for a phd level dissertation.

    €94 Average bid
    €94 Offre moyenne
    61 offres
    Wide Area Network Setup Project
    4 jours left
    Vérifié

    I’m ready to move from concept to a fully functioning Wide Area Network and need an experienced networking specialist to guide every step. The job starts with assessing my current sites and bandwidth needs, then designing a scalable WAN topology that keeps latency low and uptime high. From there you’ll source or specify the right hardware, configure routing, implement security policies, test end-to-end connectivity, and leave me with clear documentation so my team can handle routine maintenance. If you’ve rolled out multi-site WANs before and can communicate technical details in plain language, let’s talk timelines and milestones.

    €22 Average bid
    €22 Offre moyenne
    13 offres

    I’m putting together an in-depth, case study–style report on a real-world data breach that struck the healthcare sector. The goal is to walk readers through the timeline of the incident, the technical and procedural gaps that allowed it to happen, the immediate response, and the long-term remediation steps. Accuracy and authenticity matter: I will provide raw notes, public disclosures, and redacted internal memos once we start, but I’m relying on your cybersecurity and information-management expertise to shape them into a compelling, well-structured narrative. Here’s what I’m after: • A 3,000–4,000-word report formatted for executive readership but detailed enough for security teams. • Clear articulation of attack vectors, compromise indi...

    €105 Average bid
    €105 Offre moyenne
    69 offres

    I’m looking for an online tutor based in India who can guide me through intermediate-level administration of both Linux and Windows Server environments. On the Linux side I want practical, session-based coaching in system administration, security and firewall management, and shell scripting. For Windows Server, the focus should be Active Directory management, server configuration and deployment, plus security and patch management. Each topic needs to be demonstrated live, with time for me to replicate the steps on my own lab machines during or immediately after the call. We can meet on Zoom or Google Meet for 2–3 hours a week, preferably evenings or weekends. Deliverables • A structured lesson plan that maps out the sequence of sessions • Recordings or sess...

    €2 / hr Average bid
    €2 / hr Offre moyenne
    6 offres

    I’ve built a custom web application and it’s almost ready for production. Before the public rollout, I want a rigorous penetration test that will expose any weakness and help tighten every layer of security. The assessment must be hands-on and realistic, covering the full stack rather than a purely theoretical review. Scope My priorities are clear: • Code review – comb through the source for injection points, authentication flaws, insecure dependencies, and logic errors. • Network-level probing – map open ports, misconfigured firewalls, and potential lateral-movement paths. • Server configuration – evaluate patch levels, TLS setup, permissions, and hardening of the underlying OS and web server. Primary Goal The sole purpose is to imp...

    €950 Average bid
    €950 Offre moyenne
    24 offres

    We are seeking a reliable IT team to support our medical centre with comprehensive, end-to-end IT services. This would include setting up, managing, maintaining, and regularly updating all aspects of our IT infrastructure, including networks, servers (on-site and / or cloud-based), workstations, computers, printers, and all connectivity systems. We require ongoing management of firewalls, cybersecurity protections, antivirus and anti-malware systems, data encryption, secure remote access, backups and disaster recovery solutions, and proactive monitoring to prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection re...

    €426 Average bid
    €426 Offre moyenne
    23 offres

    We are seeking a reliable IT team to support our medical centre with comprehensive, end-to-end IT services. This would include setting up, managing, maintaining, and regularly updating all aspects of our IT infrastructure, including networks, servers (on-site and / or cloud-based), workstations, computers, printers, and all connectivity systems. We require ongoing management of firewalls, cybersecurity protections, antivirus and anti-malware systems, data encryption, secure remote access, backups and disaster recovery solutions, and proactive monitoring to prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection re...

    €402 Average bid
    €402 Offre moyenne
    34 offres

    I need a MeshCentral/Windows systems engineer to optimize a Windows 11 lab remote-support setup. When Secure Exam Browser (SEB) enters protected mode, remote desktop may go black (expected). I need a compliant solution: stable agent deployment, correct permissions/consent, TLS/relay configuration, and a documented pre-exam support workflow + troubleshooting checklist. No bypass of SEB protections. Deliverables: working MeshCentral config, agent install package/script, and step-by-step documentation.” I am looking for a Windows Systems Engineer to help configure a MeshCentral server for advanced remote support. We are experiencing an issue where the remote screen goes blank when the client system switches to an isolated/secure desktop session (such as UAC prompts or custom secure shel...

    €462 Average bid
    €462 Offre moyenne
    6 offres

    I need help tracing harassment issues related to cyberstalking. I suspect my LinkedIn account has been compromised, and I'm receiving harassment on email and other online platforms. Key tasks include: - Investigating unauthorized logins and profile changes on my LinkedIn. - Identifying sources of harassment on email and other platforms. - Providing a report of findings and recommendations to secure my accounts. Ideal skills and experience: - Experience with cybersecurity - Familiarity with LinkedIn security protocols - Strong investigative skills - Ability to provide clear, actionable reports

    €21 / hr Average bid
    €21 / hr Offre moyenne
    28 offres

    My network edge relies on a Sophos XG appliance and a Fortinet FortiGate unit. Both devices are in production, but their current configuration is a mix of legacy rules and quick fixes that now interfere with performance and security. I want a seasoned firewall engineer to step in, examine every setting, correct what is wrong, and design a clean, least-privilege rule base. Scope of work • Configuration – back up the existing setups, remove or refine redundant rules, and align all interfaces, NAT, VPN, IPS and logging options with best-practice guidelines for Sophos SFOS and FortiOS. • Troubleshooting – identify and eliminate the intermittent drops we see on site-to-site VPN and outbound web traffic. Validation must include live traffic tests and log review. &bul...

    €141 Average bid
    €141 Offre moyenne
    18 offres

    I operate a cluster of Windows Server 2019 machines and need an experienced set of hands to keep everything running smoothly. Your focus will be three-fold: maintaining the servers themselves, getting our Veeam Backup & Replication environment dialled-in, and stepping in whenever a network hiccup or whitelist request appears. On the Veeam side I already have repositories in place; what’s missing is a clean, reliable backup configuration and the regular monitoring that guarantees every job finishes without warning bells. Restoration testing and documented recovery steps will be part of the routine so we can prove our RPO/RTO targets at any moment. Networking support centres on troubleshooting issues as they arise and processing whitelist updates for partners and applications tha...

    €206 Average bid
    €206 Offre moyenne
    49 offres

    Articles recommandés juste pour vous