Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.

Here's some projects that our expert Network Security Consultants made real:

  • Find the source of cyber threats to enhance security
  • Create secure solutions working with double routers, VPN and firewalls
  • Produce educational materials to spread knowledge in network security field
  • Design secure computer system architectures for clients of varying sizes
  • Utilize sophisticated technologies such as SDN (Soft Defined Networks), SVM (Support Vector Machine), Machine Learning to classify traffic
  • Identify Suspicious behavior in digital data for forensic investigations
  • Enhance network security with cutting edge algorithms and software solutions
  • Test and mitigate potential cyber threats from denial of service attacks.

Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.

Sur 24,157 commentaires, les clients ont évalué nos Network Security Consultants 4.9 sur 5 étoiles.
Embaucher des Network Security Consultants

Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.

Here's some projects that our expert Network Security Consultants made real:

  • Find the source of cyber threats to enhance security
  • Create secure solutions working with double routers, VPN and firewalls
  • Produce educational materials to spread knowledge in network security field
  • Design secure computer system architectures for clients of varying sizes
  • Utilize sophisticated technologies such as SDN (Soft Defined Networks), SVM (Support Vector Machine), Machine Learning to classify traffic
  • Identify Suspicious behavior in digital data for forensic investigations
  • Enhance network security with cutting edge algorithms and software solutions
  • Test and mitigate potential cyber threats from denial of service attacks.

Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.

Sur 24,157 commentaires, les clients ont évalué nos Network Security Consultants 4.9 sur 5 étoiles.
Embaucher des Network Security Consultants

Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    43 missions trouvées

    I’m looking for a seasoned cybersecurity professional who can carry out a full-scale penetration test against my public-facing web application. My priority is threat assessment and mitigation, so the exercise must simulate real-world attack scenarios, uncover exploitable weaknesses, and give me a clear path to harden the platform. Scope You will conduct a comprehensive, OWASP-aligned assessment that includes manual exploitation techniques in addition to automated scans. I expect you to explore authentication, authorization, session management, input validation, business logic, and any server-side misconfigurations. Google platform for email/domain management and primarily cloud based tools. Tool choice is up to you—Burp Suite, OWASP ZAP, Kali Linux utilities, Metasploit, or...

    €17 / hr Average bid
    €17 / hr Offre moyenne
    25 offres

    We are looking for a cybersecurity specialist to support our security assessment and compliance services for small and medium-sized businesses in the Middle East. Role Summary: You will conduct structured security reviews of client environments using industry-standard tools and frameworks, focusing on both technical security and regulatory compliance. Key Responsibilities: 1. Security Assessments: • Run vulnerability scans on networks, servers, and web applications. • Identify security misconfigurations, exposed services, and potential entry points. • Analyze results and validate critical findings. 2. Compliance Reviews: • Map findings against ISO 27001 controls for information security. • Assess client adherence to NIST Cybersecurity Framework (CSF) funct...

    €251 Average bid
    €251 Offre moyenne
    19 offres

    I’m looking for a Network Engineer / Systems Engineer to help with server and infrastructure management. The ideal candidate will have experience with Linux, Dell iDRAC, and EasyDCIM. What you’ll do: You’ll assist with configuring and managing servers, handling tasks like setup, system configuration, and remote management. Whenever I need help with infrastructure, you’ll take care of the technical work and ensure everything runs smoothly. Requirements: Strong experience with Linux server environments Experience with Dell iDRAC for remote server management Familiarity with EasyDCIM Ability to configure and manage servers independently Good troubleshooting and infrastructure management skills This will be on-demand work, meaning you’ll assist whenever server or ...

    €45 / hr Average bid
    €45 / hr Offre moyenne
    24 offres

    I’m currently living behind Iran’s ever-tightening firewall. Virtually every international site or service is unreachable, yet I do have a single VPN profile that still punches through. I don’t know whether it relies on residential IP routing, a stealth transport layer, custom TLS camouflage, or something else entirely—but it works, and I need to understand why so I can keep reliable access going forward. Here’s what I’m hoping you can do for me: • Examine the configuration file and any accompanying certificates or keys I supply, reverse-engineer the protocol or obfuscation technique in use, and clearly document the mechanics in plain language. • Show me how to replicate the same approach on my own infrastructure (VPS or residential tunnel...

    €662 Average bid
    €662 Offre moyenne
    19 offres

    I am ready to move our organisation to CMMC Level 1 and need a specialist who can guide the entire process from assessment through remediation and documentation. The scope spans three core areas—network security, data protection, and user access control—across all production servers, employee workstations, and our small fleet of mobile devices. Our environment is a typical Microsoft-centric stack with a mix of on-prem VMware hosts, Office 365, and a few SaaS applications that handle Federal Contract Information. What I need first is a concise gap analysis mapped to CMMC Level 1 requirements (aligned with NIST 800-171 Rev 2). From there, we will prioritise fixes, implement the missing safeguards, and collect artefacts that demonstrate ongoing compliance. I expect clear document...

    €462 Average bid
    €462 Offre moyenne
    23 offres
    ZTE C320 OLT & MikroTik Setup
    5 jours left
    Vérifié

    The ZXA10 C320 is already racked, powered, and reachable over the management network; what I still need is a clean, production-ready configuration and the supporting tools around it. ZTE OLT • Bring the firmware up to the latest stable release. • Build an intuitive, comment-rich start-up config that includes all required VLANs and properly provisioned PON ports so that adding new ONUs is a one-command job. • Document every step so future changes remain “copy-and-paste” simple. NetNumen NetNumen will run on a fresh Windows Server VM. I need full installation and initial setup, role-based user access, and the monitoring / management views tuned for the C320 so alarms, traffic stats, and firmware backups flow automatically. MikroTik Edge Downstream subscribers te...

    €43 Average bid
    €43 Offre moyenne
    7 offres

    I need a focused penetration test on my personal blog to uncover any SQL injection weaknesses. The two areas that matter most to me are the login pages and the built-in search feature, so the engagement revolves around probing those endpoints thoroughly with manual and automated techniques (think Burp Suite, sqlmap, or comparable tools). I will provide staging credentials, database schema snapshots, and any other access details you need once we start. Please exercise safe-testing practices so the live site and its data remain untouched. Deliverables • A concise technical report that lists each discovered SQL injection vector, the exact request/response demonstrating the issue, and the risk level. • Practical, step-by-step remediation advice for every finding. • A reass...

    €154 Average bid
    €154 Offre moyenne
    21 offres

    Job Title: Senior Cloud Network Engineer Duration: 8 Hours Budget: ₹70K – ₹80K Start Date: Immediate Job Description We are seeking an experienced Senior Cloud Network Engineer to support and stabilize a highly cloud-driven infrastructure environment. This role is a critical backfill position, requiring a senior professional who can independently manage and optimize enterprise networking across AWS and Azure platforms. The environment is approximately 98% cloud-based, with the majority of networking operations focused on AWS (60%) and Azure (40%), along with minimal on-premise infrastructure. The engineer will play a key role in maintaining system stability and supporting upcoming infrastructure upgrades. Key Responsibilities Manage and optimize cloud networking infrastructure across...

    €365 Average bid
    €365 Offre moyenne
    18 offres

    This topic is about to show how AI technology enhance business analytic, and how those analytics helps organisation make a better strategy decision and improve overall outcome. 1- Artificial Intelligence (Machine learning, automation) 2- Business analytics ( data analytics, KPI) 3- Strategic decision-making (Long-term planning, competition advantage) 4- Organisation performance ( profitability, efficiency and innovation)

    €16 Average bid
    €16 Offre moyenne
    4 offres

    My RingCentral business line is being marked as “SPAM” when it shows up on customer phones and nothing I have tried has cleared the tag. I have already: • Registered the number with the main analytics services (including Hiya) • Opened several cases with RingCentral support and followed every suggestion they offered—none of them worked. What I need now is someone who has actually removed this label before and can do it again for my number. Success means that calls placed from the line no longer display any spam or scam warning on the major U.S. mobile networks (AT&T, T-Mobile, Verizon, etc.). I will verify this on multiple devices before releasing payment; no partial milestones. Deliverable • Confirmed removal of the spam/scam label on the numbe...

    €313 Average bid
    €313 Offre moyenne
    6 offres

    I need help linking together various web services under an SSL connection. The services include: - APIs - Databases - Web Applications Data transfer will occur in only one direction, and I already possess an SSL certificate. Ideal Skills and Experience: - Strong background in network security and SSL integration - Experience working with APIs, databases, and web applications - Knowledge of data flow management and service integration - Ability to work efficiently and provide clear documentation Please provide a brief overview of your experience and approach. Would require to be onsite in office in Sydney Eastern Suburbs. Project 2-3 days.

    €22 / hr Average bid
    €22 / hr Offre moyenne
    91 offres

    Title: Cybersecurity Architect Needed to Secure Proprietary Trading System (Immediate Start) Project Overview We are currently building a proprietary automated trading infrastructure using Python and a brokerage API. We are hiring a developer tonight to begin building Phase 1 of the system, and we need a cybersecurity specialist to establish security controls and oversee the architecture before development progresses. The system will run on cloud infrastructure and connect to a brokerage API for live market data and order execution. Because this is proprietary technology, protecting our intellectual property and preventing backdoors or data exfiltration is critical. We are looking for someone experienced in cloud security, DevSecOps, and secure software architecture who can help esta...

    €285 Average bid
    €285 Offre moyenne
    39 offres

    The project is related to Service-Oriented Architecture (SOA) and web-service environments, with a focus on protecting service performance and availability using a QoS-aware intrusion detection framework. The work involves detecting malicious traffic that affects service quality, such as denial-of-service, brute-force, and other intrusion behaviors, using machine learning and flow-based network analysis. And for the freelancer, write this: What I need in the technical person: I need a technical freelancer who has strong knowledge in: • Service-Oriented Architecture (SOA) or web-service systems • Network security and intrusion detection • Machine learning / anomaly detection • Python and scientific implementation • Data preprocessing, feature engineering, a...

    €465 Average bid
    €465 Offre moyenne
    59 offres

    I need a solid, full-scope “cyber” penetration test on my web platform with a single objective: uncover every web-based vulnerability before launch. You will have access to a dedicated staging environment plus test credentials so you can attack the application exactly as an external threat actor would. Scope • End-to-end testing of all public and authenticated areas, APIs, and server configuration • Combination of automated scans (e.g., OWASP ZAP, Nikto) and manual exploitation with Burp Suite, Kali Linux toolset, Metasploit, etc. • No social-engineering or mobile testing is required—focus purely on web weaknesses. Deliverables (acceptance criteria) 1. Executive summary for non-technical stakeholders. 2. Detailed technical report listing each f...

    €154 Average bid
    €154 Offre moyenne
    37 offres

    I’m looking for a Europe-based freelance IT engineer who can design, install, and maintain a reliable Local Area Network focused on routers and switches. The cabling is already in place, so I need someone who can come in, assess the existing environment, recommend any additional hardware if required, configure everything for optimal performance, and make sure the network scales easily as our headcount grows. Once the core is live I’d like occasional proactive maintenance and rapid, on-call troubleshooting when issues pop up. Familiarity with the major enterprise switch and router vendors is essential, and I’m happy to work with you on firmware standards, VLAN segmentation, and best-practice documentation. Deliverables I expect: • Detailed implementation plan (inclu...

    €667 Average bid
    €667 Offre moyenne
    13 offres

    I’m rolling out a new Local Area Network in several European offices and need the Wi-Fi layer deployed end-to-end. The scope centres on network setup and ongoing maintenance, with a focus on installing, configuring, and optimising access points so every workspace enjoys seamless coverage. You will start with a short remote planning call where I provide floor plans and current cable routes. From there, you’ll advise on access-point counts, placement, channel planning, and any controller requirements, then be hands-on on site (or coordinate local hands) to mount, patch, and bring the APs online. I’m happy to work with whichever enterprise hardware you’re most comfortable with—Cisco, Aruba, Ubiquiti UniFi, or similar—as long as the final network meets roam...

    €22 / hr Average bid
    €22 / hr Offre moyenne
    6 offres

    We are seeking an experienced cybersecurity professional to develop a high-quality, advanced-level practical ethical hacking video course built around a realistic simulated enterprise attack environment. This course must focus heavily on hands-on execution and demonstrate a structured multi-step attack workflow inside a controlled lab network. The final deliverable must contain approximately 10–12 hours of fully edited, polished video content (final runtime after editing). Budget: 40,000 INR (Maximum) Timeline: 30–60 days Core Course Requirements The course must: Be advanced-level practical content Be structured around a connected simulated company environment Include multiple interconnected attack scenarios Demonstrate complete attack chains Include reconnaissance, e...

    €290 Average bid
    €290 Offre moyenne
    5 offres

    I’m a complete beginner in wireless security and want to build solid, practical skills in penetration testing for Wi-Fi networks. Over a series of one-on-one sessions, I’d like you to walk me through fundamentals, tools (Kali Linux, Aircrack-ng, Wireshark, etc.), attack simulations, and safe lab setup so I can eventually plan and execute my own wireless assessments responsibly. Please share examples of past work that prove you’ve carried out real-world wireless engagements or successfully mentored others in this niche. Concrete demonstrations—screenshots, anonymised reports, short video clips—help me judge fit quickly. We’ll meet online, screen-share, and practice live. Each session should end with actionable homework and clear checkpoints so I can tra...

    €10 Average bid
    €10 Offre moyenne
    3 offres

    Freelance IT positon based on the below SOW: The technician shall support deployment, maintenance, evolution (Wi-Fi coverage extensions, commissioning of phone lines, etc) and site dismounting. ●will maintain, install, and extend wired and WiFi IP networks. This will mainly consist in: ● Participating site surveys (checking materials localization in various place in the camp) ● installing WiFi access points ● installing new switches or routers ● installing and plugging RJ45 wires ● installing and repairing Optical Fibber ● Implementation of the planned network structure ● Attaching APs and setting up a radio connection ● PRC support and implementation

    €22 / hr Average bid
    €22 / hr Offre moyenne
    5 offres

    I need an experienced installer to set up a Starlink network at our RV park near Montgomery City, MO, primarily for business operations and guest internet access. This project is urgent and needs to be done ASAP. Key Requirements: - Check current Starlink equipment and other equipment currently used on site. - Configure network for reliable guest access - Ensure coverage throughout the park Ideal Skills and Experience: - Proven experience with Starlink installations in RV parks - Strong networking and configuration skills - Ability to provide past work documentation and experience Please include past work examples and project proposals in your application. Looking forward to your bids!

    €351 Average bid
    Local
    €351 Offre moyenne
    2 offres

    SOW: The technician shall support deployment, maintenance, evolution (Wi-Fi coverage extensions, commissioning of phone lines, etc) and site dismounting. ●will maintain, install, and extend wired and WiFi IP networks. This will mainly consist in: ● Participating site surveys (checking materials localization in various place in the camp) ● installing WiFi access points ● installing new switches or routers ● installing and plugging RJ45 wires ● installing and repairing Optical Fibber ● Implementation of the planned network structure ● Attaching APs and setting up a radio connection ● PRC support and implementation

    €17 / hr Average bid
    €17 / hr Offre moyenne
    7 offres

    The technician shall support deployment, maintenance, evolution (Wi-Fi coverage extensions, commissioning of phone lines, etc) and site dismounting. ●will maintain, install, and extend wired and WiFi IP networks. This will mainly consist in: ● Participating site surveys (checking materials localization in various place in the camp) ● installing WiFi access points ● installing new switches or routers ● installing and plugging RJ45 wires ● installing and repairing Optical Fibber ● Implementation of the planned network structure ● Attaching APs and setting up a radio connection ● PRC support and implementation

    €4 / hr Average bid
    €4 / hr Offre moyenne
    1 offres

    I need Grok talking fluently to our dedicated Microsoft SQL Server so that business users can run natural-language, read-only queries through Grok’s interface. The task breaks down into two core pieces of work: • Implement the xAI Grok API on our side and map its request / response cycle to T-SQL. • Establish a rock-solid SSL/TLS-encrypted connection to the database using SQL Server Authentication. The server is already isolated behind our corporate firewall; your job is to add the secure transport layer, handle credential storage safely, and make sure Grok can reach the database without exposing write or admin rights. Acceptance criteria 1. A small PoC script (language of your choice) that accepts a Grok prompt and returns the matching result set from SQL Server. ...

    €426 Average bid
    €426 Offre moyenne
    128 offres
    Bug Bounty Program Setup
    3 jours left
    Vérifié

    My customer-facing web applications need a fully-fledged bug bounty program that starts with a professional security assessment. The focus is pure CyberSecurity: map the current attack surface, uncover vulnerabilities, and shape a disclosure workflow that rewards researchers responsibly. You will first perform a thorough security assessment on the live web apps, documenting every finding with severity, reproducible steps, and clear remediation advice. From those results, design the bounty structure (scope wording, reward tiers, triage flow, and response SLAs) so it can be published on platforms such as HackerOne or Bugcrowd. Deliverables • Comprehensive assessment report (OWASP Top 10 coverage, business-logic flaws, misconfigurations, etc.) • Drafted public program brief, inc...

    €152 Average bid
    €152 Offre moyenne
    10 offres

    I want my new AWS account configured to host a USA-based SIP trunk through Amazon Chime. The job includes creating or hardening the AWS environment, provisioning an Amazon Chime Voice Connector, assigning U.S. numbers, and enabling both inbound and outbound calling. The trunk has to register cleanly with our existing on-premise PBX and soft-phone apps, so please allow for SIP signaling tweaks, codec selection, and basic security (TLS, SRTP, firewall rules). Once the link is live, I’ll need brief documentation of the key settings so we can maintain it internally. Deliverables • AWS account prepared with least-privilege IAM roles • Amazon Chime Voice Connector fully configured and licensed for U.S. PSTN access • SIP trunk integrated and test calls completed (in...

    €16 Average bid
    €16 Offre moyenne
    9 offres

    Project Description Highlights The Mission: We are building "QuantumShield," a high-performance, user-friendly desktop application that protects sensitive SMB data against "Harvest Now, Decrypt Later" threats using standardized Post-Quantum Cryptography. Key Technical Focus: This is not a standard encryption project. We require implementation of ML-KEM (Kyber) and ML-DSA (Dilithium) within a Hybrid Cryptographic Scheme (PQC + Classical AES-256). The Deliverable: A functional MVP for Windows/macOS featuring a "One-Click Shield" drag-and-drop interface and a "Quantum Health Dashboard" that monitors file vulnerability status. Required Tech Stack: High-performance systems programming (e.g., Rust, C++, or Go) with direct experience usi...

    €5488 Average bid
    €5488 Offre moyenne
    72 offres

    I need an experienced CyberArk-savvy engineer to help me eliminate a persistent 403 Forbidden error that appears when Remote Access (formerly Alero) tries to reach the “/guac/direct” endpoint on a PAM-registered server. The environment runs on Windows and the block is clearly coming from the Remote Access component itself—PVWA and PSM are working until Remote Access refuses the session. So far I have followed CyberArk’s own documentation step-by-step, but the problem remains. The logs point to trust-validation trouble with the self-signed certificates used between Remote Access, PVWA and PSM; when the containers spin up, Docker reports: INFO: Adding certificate in file /opt/trust/import/ to the OpenSSL trusted certificate authorities. INFO: Symbolic link to cert...

    €97 Average bid
    €97 Offre moyenne
    27 offres

    Our office needs hands-on help with our networking gear. I want an experienced technician to come on-site, isolate the cause of several recurring connectivity drops, and complete a clean switch installation and configuration while you are here. No desktop or server work is required—this assignment is strictly about the network hardware. Scope of work • Troubleshoot the existing cabling and switch stack to stop packet loss and random outages. • Install and configure the replacement/added switches, making sure VLANs, trunk ports, and access ports match our current design. • Verify stable connectivity for every connected device once the changes are in place. • Document the final configuration and any changes you made so the next round of maintenance is straigh...

    €92 Average bid
    €92 Offre moyenne
    2 offres

    Over the past few days I have noticed a sharp, unexplained spike in direct traffic on my corporate website. The pattern is the same worldwide—thousands of repeated page views hitting the same endpoints every few minutes—yet no genuine engagement follows. Because I have no firewall, captcha, or other security layer in place, I suspect an automated script or bot is hammering the site and inflating my analytics. I need a security-minded developer to: • Analyse server logs, analytics data, and DNS records to confirm the source, volume, and behaviour of the suspicious requests. • Pinpoint whether the traffic originates from a compromised script inside the site, a third-party resource, or external botnets. • Recommend and implement practical counter-measures such...

    €11 Average bid
    €11 Offre moyenne
    12 offres

    I’m looking for a hands-on network technician who can take charge of every stage of our camp-wide connectivity: from the first walkthrough to the final site dismount. The work happens entirely in an outdoor site/camp environment, so you’ll need to be comfortable moving between containers, masts, and rough terrain while keeping cables tidy and hardware protected. The immediate priority is expanding and fine-tuning WiFi coverage. We have not locked in any specific access-point brand yet, so I’ll rely on your recommendations for rugged, field-proven models that integrate cleanly with standard switches and routers. Scope of work • Conduct physical site surveys to map optimal equipment locations and check existing material placement. • Install, align, and commi...

    €17 / hr Average bid
    €17 / hr Offre moyenne
    4 offres

    I want my Ubuntu server configured as an OpenVPN host that lets me and a small team (fewer than ten users) connect securely from anywhere. The goal is straightforward: reliable, encrypted remote access without having to worry about manual key generation, firewall tweaks, or routing issues each time we add a new device. Here’s what I expect at the end of the job: • OpenVPN installed and running on my existing Ubuntu server (latest LTS). • User-friendly client configuration files or .ovpn bundles for up to ten devices, plus a quick guide so I can generate more later if needed. • Firewall and IP forwarding rules adjusted so traffic is tunneled safely while the rest of the server’s services keep working as they do now. • Basic security best practices ap...

    €17 Average bid
    €17 Offre moyenne
    21 offres

    I’m looking to have IP cloning / masking configured on my VoIP servers so we can distribute traffic evenly and keep call quality high. Load balancing is the sole objective here—this isn’t about anonymity or region-hopping, just making sure each incoming SIP session finds the least-loaded endpoint without exposing multiple public addresses. The environment is already up and running; what I need is the networking magic that presents one or more virtual IPs while the real servers sit safely behind them. If you normally work with tools such as iptables, nftables, HAProxy, IPVS, BGP anycast, or cloud firewalls, that’s perfect—use whatever combination you trust so long as it’s stable and keeps latency low. Because the phone queues are busy, I need this done ...

    €9 Average bid
    €9 Offre moyenne
    5 offres

    My wired Ethernet network has stopped working, and I need a skilled technician to get it back online quickly. I’ve already ruled out basic cable swaps, so I’m looking for someone who can: • Diagnose the root cause of the outage (switch, patch panel, NIC, or configuration). • Walk me through any testing steps I should perform on-site (ping, traceroute, link-light checks). • Provide clear, step-by-step instructions or remote-session support to restore connectivity. • Verify that all connected devices regain stable internet and LAN access once the fix is applied. • Offer a brief preventive checklist so I can avoid the same issue in the future. I can share photos of the rack layout, current IP scheme, and error messages from the router and switch interfac...

    €87233 Average bid
    €87233 Offre moyenne
    6 offres

    I need a seasoned network and CCTV specialist to configure and oversee a real-time incident-reporting setup. My top priority is catching and reporting any unauthorized access the moment it happens, specifically at all building entrances and exits. Here’s what I’m looking for: • Audit our current camera and network layout, confirm coverage at every door, and flag blind spots. • Configure live monitoring software that can push instant notifications (email, SMS, or app-based) whenever an access breach is detected. • Fine-tune motion and analytics settings to limit false positives while still spotting genuine threats. • Set up a central dashboard so I can review live feeds, recorded clips, and incident logs in one place. • Write a concise hando...

    €489 Average bid
    €489 Offre moyenne
    19 offres

    I have a small office network—fewer than twenty endpoints—that I want thoroughly examined for weaknesses. The immediate focus is a vulnerability assessment combined with a full network-security audit. Pen-testing isn’t required right now, but I would like the audit to be detailed enough that we could progress smoothly to active exploitation tests later if needed. Scope – Map every device and service, then scan using industry-standard tools such as Nmap, Nessus or OpenVAS. – Analyse configurations (firewall rules, router settings, shared resources, OS hardening) and identify misconfigurations or outdated software. – Provide a clear, prioritized remediation plan. Critical issues first, followed by medium and low-risk findings. – Conclude wit...

    €19 / hr Average bid
    €19 / hr Offre moyenne
    31 offres

    I need a digital-forensics professional who can dig into a persistent, ongoing account-takeover problem that has affected both my Android and iOS devices. The attackers appear to be using SIM-swap tactics and other identity-theft angles to gain repeated access. My priority is twofold: first, trace and document the technical footprint well enough to identify the individual or group behind the breaches; second, harden every vulnerable point so the intrusions stop for good. You will have full, lawful access to my handsets, carrier logs, and any cloud backups necessary for a thorough examination. I expect you to employ industry-standard toolsets too extract, preserve, and analyze artifacts without compromising evidentiary integrity. Please keep chain-of-custody records meticulous; I may forwa...

    €912 Average bid
    €912 Offre moyenne
    13 offres

    Job Title: Cyber Security Engineer (Checkpoint Firewall & Akamai WAF) Duration: 2 Hours per Day Budget: ₹30,000 per Month Start Date: Immediate About the Role We are looking for a skilled Cyber Security Engineer with expertise in Checkpoint Firewall and Akamai WAF to support our network security infrastructure. The ideal candidate will be responsible for managing firewall configurations, monitoring network security policies, and assisting in the implementation of web application firewall protections to safeguard enterprise systems. Key Responsibilities Configure, manage, and optimize Checkpoint Firewall environments (policy management, rule configuration, and troubleshooting). Implement and maintain Akamai Web Application Firewall (WAF) rules to protect web applications from security t...

    €9 Average bid
    €9 Offre moyenne
    9 offres

    Project Title: Web Security Audit & Penetration Testing for Marketplace Website Description: We are preparing to launch a new online marketplace platform and are looking for an experienced web security specialist to perform a full security review of the site. The goal is to identify any vulnerabilities and ensure the platform is secure before public launch. Scope of work: • Perform a full security audit of the web application • Conduct penetration testing to identify vulnerabilities • Review authentication, API security, and database access • Check for common vulnerabilities (OWASP Top 10) • Identify potential risks in front-end and back-end architecture • Provide a clear report outlining vulnerabilities and recommended fixes Important: • You must hav...

    €457 Average bid
    €457 Offre moyenne
    160 offres

    I need an expert to configure FreeRADIUS to act as a proxy. Requirements: - Support for PAP/CHAP authentication protocols. - Proxy to an LDAP backend for authentication. - Handle username and password user information. Ideal Skills and Experience: - Proficient in FreeRADIUS configuration. - Experience with LDAP integration. - Knowledge of PAP/CHAP protocols.

    €131 Average bid
    €131 Offre moyenne
    20 offres

    I’m ready to launch a production-grade web application on AWS and need the underlying infrastructure designed and built with security and high availability at its core. The workload will run on EC2, and general-purpose instances are fine; the focus is on a rock-solid architecture, not exotic hardware profiles. Here’s what I have in mind: a VPC with public and private subnets spread across at least two Availability Zones, an Application Load Balancer in front, Auto Scaling groups to keep capacity healthy, and tight security groups plus IAM roles that follow least-privilege rules. Logging to S3, monitoring and alerts through CloudWatch, and encrypted traffic everywhere (ACM certificates, HTTPS, TLS-enabled internal hops) are all must-haves. Wherever possible, I’d like the ...

    €174 Average bid
    €174 Offre moyenne
    37 offres

    I need Microsoft Intune fully configured so that both Windows and macOS devices can be enrolled smoothly and kept secure. The scope covers initial setup of enrollment profiles, creation of security and compliance policies, and Azure AD Conditional Access rules that gate company resources and SaaS apps behind device-health checks. Everything must support a BYOD model without exposing corporate data. Key points I want addressed • Autopilot/Company Portal enrollment flows for Windows and macOS • Baseline compliance settings (password, encryption, OS update cadence) and security baselines tuned to our environment • Conditional Access policies that tie sign-in to device compliance status • Application protection policies so corporate data stays within managed containe...

    €331 Average bid
    €331 Offre moyenne
    36 offres

    Scenario Background: The scenario assumes that you are working as a security expert for a fictional company, Acme Coffee Company. The company includes several roles, including Bruno (CEO), Spike (Vice President of Sales), Eilik and Eilika (Sales), Loki (System Administrator), and Avery (Marketing). Loki has built a new company server, and Bruno has hired you to conduct a comprehensive security analysis and assessment of that server and submit a complete report. The final report should include your findings, techniques, graphics, and methodology, along with recommendations for improving any security issues identified. Video Overview: The instructor explains that the final project will provide a target machine personally built by the instructor to represent the Acme company environment. Yo...

    €127 Average bid
    €127 Offre moyenne
    13 offres

    Articles recommandés juste pour vous