Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

Sur 60,431 commentaires, les clients ont évalué nos Internet Security Experts 4.9 sur 5 étoiles.
Embaucher des Internet Security Experts

Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

Sur 60,431 commentaires, les clients ont évalué nos Internet Security Experts 4.9 sur 5 étoiles.
Embaucher des Internet Security Experts

Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    16 missions trouvées
    Recover Hacked Discord Account
    17 heures left
    Vérifié

    I'm seeking a skilled professional to help me regain access to my compromised Discord account. A hacker has taken control and is demanding payment for its return. Requirements: - Experience with account recovery, especially for Discord - Ability to negotiate or handle situations with hackers - Should be discreet and maintain confidentiality - Must provide a step-by-step report of actions taken Proof of ownership: I have emails and screenshots as evidence. Ideal skills and experience: - Cybersecurity knowledge - Previous experience in handling similar recovery tasks - Strong communication skills

    €381 Average bid
    Urgent
    €381 Offre moyenne
    55 offres

    We have privacy-preserving smart contracts built on Inco Network (FHE-enabled blockchain) and need a thorough independent review before mainnet deployment. The main priorities are uncovering security vulnerabilities specific to encrypted state handling and verifying correct implementation of confidential computing patterns; gas optimization is secondary. Here is what we need from you: • Manual and automated analysis of Solidity source code using tools such as Slither, Foundry test suites, or similar — adapted for privacy-focused contract logic. • Testing of edge cases related to encrypted variables, access control for confidential data, and proper handling of FHE operations. • Verification that sensitive data remains encrypted throughout contract execution and cann...

    €3327 Average bid
    €3327 Offre moyenne
    45 offres

    I run a WordPress site that relies on Wordfence for protection, and I want peace of mind that everything in the security layer is set up exactly as it should be. The focus of this engagement is a thorough quality check of all active plugins—with special attention to Wordfence configurations and any security-related interactions they may have with the rest of the stack. Here’s what I need from you: • A hands-on audit of Wordfence settings, firewall rules, malware scan schedules, and login security options, confirming each item follows current best practice and does not conflict with core WordPress functions or other plugins. • A scan of every installed plugin for known vulnerabilities, abandoned code, or permission issues that could open an attack vector. &bul...

    €106 Average bid
    €106 Offre moyenne
    18 offres

    I need a certified ethical hacker to run a full-cycle social-engineering engagement focused exclusively on phishing simulation. The objective is to gauge how many employees interact with malicious-looking emails, identify patterns behind unsafe clicks or credential submissions, and turn those findings into actionable security awareness improvements. The work involves designing realistic phishing scenarios aligned with our business context, sending the campaign through a managed platform (GoPhish, King Phisher, or similar), silently harvesting the metrics, and then compiling a thorough post-test report. No destructive payloads or system exploitation are allowed—this is a people-centric test only. Deliverables • Campaign design document outlining themes, targets, schedule, and...

    €8 / hr Average bid
    €8 / hr Offre moyenne
    4 offres

    I need a certified ethical hacker to run a full-cycle social-engineering engagement focused exclusively on phishing simulation. The objective is to gauge how many employees interact with malicious-looking emails, identify patterns behind unsafe clicks or credential submissions, and turn those findings into actionable security awareness improvements. The work involves designing realistic phishing scenarios aligned with our business context, sending the campaign through a managed platform (GoPhish, King Phisher, or similar), silently harvesting the metrics, and then compiling a thorough post-test report. No destructive payloads or system exploitation are allowed—this is a people-centric test only. Deliverables • Campaign design document outlining themes, targets, schedule, and...

    €8 / hr Average bid
    €8 / hr Offre moyenne
    3 offres

    I need an experienced cyber-investigator to zero-in on malware that has recently infiltrated several personal computers in my office. The priority is to detect, isolate, and document every malicious component so we can move straight to containment and clean-up. I need someone to access a Blackmailing correspondence I had with a person on Telegram. I need the archives from this account and we must do this legally via Telegram? You will start with a remote sweep (or on-site if you are nearby), capture volatile data, analyse suspicious processes, services, registry changes and network traffic, then supply a concise report that identifies the malware family, infection vectors, and any persistence mechanisms you uncover. I will handle the actual remediation once I have your find...

    €6 Average bid
    €6
    4 propositions

    I need an experienced cybersecurity professional who can guide our food-manufacturing plant through the next stage of its Governance, Risk & Compliance journey. You will be the point person for building and fine-tuning our Information Security Management System with ISO 27001 as the primary framework. Day-to-day you will draw on at least four years of GRC work—ideally gained in industrial or OT-heavy settings—and a solid technical foundation in infrastructure or security operations. What matters most is deep, practical knowledge of ISO 27001. Familiarity with ISO 27005 and the NIST frameworks is important because we want our risk management and control mapping to stand up to external scrutiny. Certifications such as ISO 27001 Implementer, ISO 27005 Risk Manager and any I...

    €92 / hr Average bid
    €92 / hr Offre moyenne
    22 offres

    I need an experienced cyber-security professional who can move straight past theory and actually put the right protections in place. My environment is already running, but the current safeguards are piecemeal. Your task will be to evaluate what is there, decide what is missing, and implement the controls that close those gaps—whether that involves configuring firewalls, hardening servers, enforcing least-privilege access, deploying endpoint protection, or setting up logging and alerting in a SIEM. I’m looking for measurable improvements, not just a written report. Once the new measures are live, I’ll need clear documentation of every change plus a brief hand-over session so my in-house team can maintain what you install. Deliverables • Security controls fully dep...

    €243 Average bid
    €243 Offre moyenne
    16 offres

    I need help to find a hacker who compromised my computer over wifi. Requirements: - Analyze the breach and identify the hacker. - Use existing antivirus info for insights. - Provide a detailed report of findings. Ideal Skills: - Experience in cybersecurity and hacking investigations. - Proficient in analyzing antivirus data. - Strong problem-solving skills and attention to detail. Please include past work, experience, and a detailed project proposal in your application.

    €285 Average bid
    €285 Offre moyenne
    32 offres

    I’m looking for a specialist to run a full health-check on my Local Area Network. The priority is to verify that everything works as intended and to pinpoint any performance bottlenecks that might slow users down. Security is being handled separately, so your focus will be strictly on functionality and performance. The job involves testing end-to-end connectivity, measuring throughput and latency at peak and off-peak times, and confirming that current configurations on switches, routers, and access points align with best practices. I expect you to use industry-standard network diagnostic tools—think Wireshark, iPerf, or SolarWinds—but you’re free to bring in any utilities you trust as long as the results are clearly documented. Deliverables • A concise repo...

    €15 / hr Average bid
    €15 / hr Offre moyenne
    11 offres

    I have already completed the technical investigation of a recent security alert: the endpoint protection platform flagged an executable that tried to tamper with system files and phone home to an external server. I verified the hash, monitored live-system behaviour, confirmed the activity as malicious, quarantined the file and rescanned the host to ensure it is now clean. What I need next is a professionally written incident report that translates those raw findings into a clear narrative for both management and technical stakeholders. The document should outline the timeline of events, the investigation methodology, indicators of compromise, remediation actions taken, and practical recommendations to harden the environment against similar threats. Where helpful, map tactics to MITRE ATT&...

    €8 / hr Average bid
    €8 / hr Offre moyenne
    12 offres

    You are a senior cybersecurity + machine learning engineer. Build a practical, runnable, end-to-end Transformer-based Web Application Firewall (AI-WAF) prototype suitable for Smart India Hackathon / ISRO SIH demonstration. The system must implement the full pipeline: Log Ingestion → Parsing → Normalization → Tokenization → Transformer Training → Multi-Class Attack Classification → Anomaly Scoring → Real-Time Non-Blocking Inference → Alerting & Logging → Incremental Fine-Tuning ======================================== 1. CORE FUNCTIONAL REQUIREMENTS ======================================== A. Multi-Class Attack Detection The Transformer model must classify HTTP requests into: - BENIGN - SQL_INJECTION - XSS - COMMAND_INJECTION - PATH_TR...

    €56 Average bid
    €56 Offre moyenne
    9 offres

    I hold written authorization from the system owner and need an experienced ethical-hacking professional to carry out a controlled breach of our production environment. The assignment goes beyond a traditional penetration test: I want you to replicate a real-world, end-to-end intrusion scenario so we can measure how our monitoring, logging and incident-response teams react under pressure. Scope • Obtain initial access using any non-destructive vector you discover (phishing simulation, misconfigurations, credential weakness, etc.). • Laterally move, escalate privileges and demonstrate data access without altering or deleting information. • Leave tamper-proof evidence (flags) in pre-agreed directories so we can verify compromise. • Conclude with a thorough report that det...

    €11 / hr Average bid
    €11 / hr Offre moyenne
    11 offres
    Wide Area Network Setup Project
    2 jours left
    Vérifié

    I’m ready to move from concept to a fully functioning Wide Area Network and need an experienced networking specialist to guide every step. The job starts with assessing my current sites and bandwidth needs, then designing a scalable WAN topology that keeps latency low and uptime high. From there you’ll source or specify the right hardware, configure routing, implement security policies, test end-to-end connectivity, and leave me with clear documentation so my team can handle routine maintenance. If you’ve rolled out multi-site WANs before and can communicate technical details in plain language, let’s talk timelines and milestones.

    €22 Average bid
    €22 Offre moyenne
    13 offres

    I’m ready to bring in a security specialist to run a thorough, manual penetration test on my live e-commerce application. Automated scanners aren’t enough for this engagement—I need human-driven testing that uncovers real-world attack paths. Here’s what I’m looking for: • A full manual assessment covering all SQL Injection, Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF),Web Application Penetration Testing , Network Penetration Testing Services External or Internal, Web Services Testing, API Testing • Exploitation-level proof of concept for every confirmed issue, with clear, reproducible steps. • A concise risk-ranked report that separates critical, high, medium and low findings, followed by practical remediation advice writ...

    €93 Average bid
    €93 Offre moyenne
    29 offres

    Job Description: QA Engineer – Cybersecurity Product (Reverse Proxy Server) Position Title: QA Engineer Location: Mumbai, India (Hybrid/Remote options available) Domain: Cybersecurity – Reverse Proxy Server Development and enterprise data security while using the cloud services Framework: Agile/Scrum Role Overview We are seeking a detail-oriented and security-aware QA Engineer to ensure the quality, reliability, and resilience of a cloud-native reverse proxy server. You will be responsible for designing and executing test plans, automating test cases, and validating security features in a fast-paced Agile environment. Your work will directly contribute to the robustness of a critical cybersecurity product. Key Responsibilities • Design, develop, and execute manual...

    €258 Average bid
    €258 Offre moyenne
    16 offres

    Articles recommandés juste pour vous