Hardening database security jobs
I'm looking for a skilled WordPress programmer to upgrade my existing site to AWS. The primary goal of this upgrade is to enhance the site's security. Key Responsibilities: - Implementing a firewall setup - Setting up SSL/TLS encryption In addition to the security upgrades, I will need minor tweaks made to the site's current functionality. Ideal Candidate: The ideal freelancer for this project should have extensive experience in WordPress and AWS, with a deep understanding of web security measures. Previous work with implementing firewall setups and SSL/TLS encryption on WordPress sites would be a significant advantage.
...Functionality: - Implement basic connectivity with a PAX terminal using the POSLink SDK. - Using Android Studio's Kotlin/Java - Process a test transaction (e.g., sale or refund) with a user-defined amount. - Display the transaction result (e.g., success or error) on the app’s UI. Code Quality: - Ensure modular, maintainable, and well-documented code. - Use best practices for error handling and logging. Security: - Adhere to PCI-DSS compliance guidelines for handling sensitive data. - Ensure secure communication with the terminal (e.g., SSL/TLS if applicable). Integration Details: - Use the .aar library provided by the POSLink SDK for Android. - Configure communication settings (e.g., IP, port, timeout) dynamically through the app. Testing & Validation: - Includ...
I'm seek...professional consultation on the ESP32-S3 SIM7670G 4G Development Board. The primary application for this project is remote monitoring of security and surveillance data via analog cameras. Key Responsibilities: - Provide expert guidance on the optimal use of the ESP32-S3 SIM7670G 4G Development Board for remote security monitoring. - Assist in the integration of analog cameras with the board for effective surveillance. - Recommend best practices for data collection and transmission. Ideal Skills: - Extensive experience with the ESP32-S3 SIM7670G 4G Development Board. - Proficiency in IoT and remote monitoring systems. - Strong understanding of security and surveillance systems, particularly with analog cameras. - Excellent communication skills for cl...
I'm looking for a professional Android app developer to create a discreet voice recording application for me. The app needs to: - Operate stealthily: The app should run unnoticed in the background, recording surrounding sounds and voices. - Upload recordings to cloud storage: The app sh... - Operate stealthily: The app should run unnoticed in the background, recording surrounding sounds and voices. - Upload recordings to cloud storage: The app should securely upload the recorded audio files to a cloud storage service. Ideal candidates will have previous experience in developing similar applications and a strong understanding of Android OS. Expertise in cloud integration, data security and stealth technology in apps will be beneficial. Please note, this app is intended for per...
...create intuitive and impactful applications. Optimize application performance and ensure security and compliance standards are met. Monitor and troubleshoot Kubernetes clusters and deploy applications. Contribute to architectural decisions for AI service integration and application design. Backend: , MongoDB, AWS S3 Frontend: , TypeScript, Yarn Admin Panel: 13, OCR integrations (Python-based) Skills Required is a privacy-first AI chatbot platform leveraging multiple LLMs (Large Language Models) to provide secure and efficient AI-powered solutions for various industries. The platform's modular architecture includes: • Backend: Built using for scalability, security, and performance. • Frontend: Developed with for responsive user interactions
Website maintenance to keep my professional site running smoothly and ensuring a great user experience. I’m looking for: 1. **Regular Updates**: This includes updating the website’s content, software, plugins, and themes to keep everything current and secure. 2. **Security Checks**: FINDING the best security that regularly scans for malware, fixing vulnerabilities, and implementing security measures to protect against hacking and data breaches. 3. **Backup**: Ensuring that there are regular backups of your website's data, so you can restore it if something goes wrong. 4. **Performance Optimization**: Improving site speed and performance by optimizing images, minifying code, and using caching adding meta tags. 5. **Broken Links and Errors**: Check...
...Android). Web app version (for users and restaurants). Tech Stack (suggestions): Frontend: React Native for mobile apps (cross-platform development). React.js for web platform. Backend: Node.js with Express or Django for RESTful APIs. MongoDB or PostgreSQL for database management. Payment Integration: Razorpay for secure payment processing. Map & Location Integration: Google Maps API for restaurant locations and user geolocation. Hosting & Deployment: AWS or DigitalOcean for cloud hosting and storage. Docker for containerization. Security: SSL encryption for secure communication. OAuth 2.0 for social logins. Two-factor authentication (2FA) for sensitive actions. Design Requirements: UI/UX Design: Modern and clean interface with easy navigation. Mobile-first...
... developer, guru! Our last guru is no longer available, and we are looking for replacement. This is a small project to see if we can continue using your services as his replacement. Develop a custom Report Phish Outlook XML Add-in and Back-end management UI for configuration as needed. We currently use Infosec Institutes - Infosec IQ platform for security awareness and phishing simulation. We also use Checkpoint Avanan for email security. We need a custom report phish button that will do the following when pushed: Phishing Simulation Emails - Display a message telling the user they successfully identified a phishing simulation - Report the detection to an API endpoint from Infosec - Move the email to Deleted Items - Auto close the displayed message in 10 seconds if ...
...users to deposit their in-game items into a bot account (linked to the platform) and automatically withdraw their items from the bot account back to their ROBLOX account when requested. 2: Transaction Automation: Ensure that the bot performs all actions without requiring manual intervention, including item verification, deposit confirmation, and item withdrawal. 3: Security & Anti-Scam Measures: Implement anti-fraud and security mechanisms to prevent exploits, scams, or unauthorized access to users' items and accounts. 4: User Notifications: Ensure that users receive real-time notifications (through the website or via a connected ROBLOX message system) about the status of their deposits, withdrawals, and any potential issues. Key Features to Implement: 1: Seamles...
I'm seeking a networking expert to help me add a static IP address to my Windows 10 PC. The primary purpose for this is for network configuration. Key Tasks: - Configure the PC with a static IP - Provide guidance on whether this IP should be local only or accessible from the internet - Ensure...internet - Ensure the setup is secure and efficient Ideal Skills: - Extensive experience with Windows 10 - Strong networking and cybersecurity knowledge - Ability to explain technical concepts in simple terms I am not entirely sure if the static IP should be local only or accessible from the internet. Therefore, part of the job will be to assess my needs and provide suitable recommendations. Security is paramount, so the expert must ensure that the setup does not expose my PC to unn...
I am seeking an experienced professional for integrating Tableau with OneLogin for Single Sign-On (SSO) using SAML. The objective is...secure and seamless user login experiences coupled with automated user provisioning. Key Requirements: - Expertise in Tableau and OneLogin - Proficiency in SAML for SSO - Experience with implementing automated user provisioning Skills in API integration and Directory sync would be beneficial but are not the primary focus of this project. Your role will be crucial in enhancing our system's security and user accessibility. We are looking for someone who is able to do Teams call and troubleshoot the issue with me. When you reply please state if you can work in a remote Teams environment. If you don't mention this then your application wil...
I'm looking for a skilled designer to convert a database of social media ads into editable Canva templates. There are around 1,400 ads that need to be converted, and more will be added to the database over time. As such, there is a big chunk of work up front, and then on-going work when new ads are added to the database. Key Requirements: - Experience with Canva and graphic design - Ability to create user-friendly templates - Familiarity with social media post design The templates should allow for easy customization of: - Text - Images - Colors - Icons The ideal freelancer will have a keen understanding of social media aesthetics and brand consistency.
Please Sign Up or Login to see details.
I've been facing a sudden surge of registrations on my WordPress website, almost every two minutes. This seems abnormal and I suspect it's a bot issue. I've temporarily deactivated the registration page, but the flow of registrations c...Identify the source of the spam registrations - Implement measures to stop these registrations - Fix the issue so I can safely re-enable the registration page Ideal Qualifications: - Extensive experience with WordPress - Proficient in identifying and mitigating spam/bot issues - Familiarity with security and anti-spam plugins for WordPress - Able to provide long-term solutions to prevent recurrence Your expertise is urgently needed to help restore my site's integrity. Please note that I have several security plugins inst...
...goal is to have an Online Promotional Directory for Members where users can view information and only edit their information after a successful log-in process. 1. Code and Database Management: 1.1. Connect or disconnect multiple databases if required. 1.2. Full access to code. 1.3. Modify color and frame contents. 1.4. Manage/update the platform. 1.5. Receive and fix bugs as per service requests. 1.6. Well-documented and easy for traceability. 2. ADMIN Accounts & Permissions: 2.1. Access to the directory or view user information. 2.2. Add/Enable/Disable/Delete additional columns and fields in a database. 2.3. Edit frame colo...
NOTE I'm looking for an expert in AWS and web hosting. I will be going live on a platform and i need to to navigate Amazon AWS, setting, developer permissions, security, etc... Key Requirements: - Extensive knowledge of Amazon AWS services, particularly EC2 instances, S3 storage, and RDS database. - Proficiency in setting up and managing a hosting application on AWS. - Prior experience in website hosting projects is a plus. - Ability to provide a scalable and reliable hosting solution. Please note, there's no specific Content Management System (CMS) for this project as of now. Your recommendations based on the project's needs will be appreciated.
...robustness scores Result Validation: Verify if detection rates are realistic for financial systems Confirm if cryptographic timing aligns with expected ranges Ensure privacy metrics meet industry standards Validate if ensemble improvement is statistically significant Required Skills: Strong debugging experience in PyTorch/Python Ability to validate ML model results Understanding of financial security metrics Experience with cryptographic systems Experience with LSTM and Isolation Forest Note: All code implementation is complete - this is purely a debugging and validation role. The expert will be working with existing codebase to ensure proper functionality and result validation. Work to strict and rapidly approaching deadline. Thanks for reading...
...Solidity smart contract to manage Ethereum donations. 2. Record transactions on-chain, including donor address, amount, and timestamp. 3. Ensure token compatibility by accepting only ETH and rejecting other tokens. 4. Implement security measures such as reentrancy guards and input validation. 5. Conduct testing on a testnet to verify functionality and security. 6. Provide thorough documentation for deployment and maintenance. Timeline 1. Week 1-2: Contract development and unit testing. 2. Week 3-4: Testnet deployment and integration testing. 3. Week 5-6: Final security checks and mainnet deployment. Important Notes - The focus is solely on Solidity contract development. - Collaboration will occur via shared updates and communication with the team. Why Work Wit...
...delivery seamlessly. Project Scope: Data Collection Automation: Build systems to gather and organize client data effectively. Client Communication Workflow: Automate email outreach and client interactions using predefined templates and workflows. Creative Process Automation: Integrate tools for content generation, text-to-speech, and media creation, tailored to our project needs. File Sharing and Security: Implement secure systems for sharing files with clients while restricting downloads. Payment and Invoicing Integration: Automate invoicing and payment tracking processes, including follow-ups and confirmations. Website Development: Design and build a professional, user-friendly website that: Highlights our services. Provides a portal for clients to input information or u...
Hi there! I am looking for a cybersecurity specialist or an experienced developer to audit an API that uses JSON Web Tokens (JWT) and identify any potential vulnerabilities. The goal is to ensure that the API is secure and protected against attacks. Requirements: - Proven experience in auditing and testing the security of APIs. - Strong understanding of JWT implementation and security best practices. - Ability to identify common vulnerabilities such as: - Token forgery attacks; - Missing or improper signature verification; - Misconfigured algorithms (e.g., HS256 vs RS256); - Exposure of sensitive data in the token payload. - Ability to recommend solutions for any identified vulnerabilities. If you have the skills and expertise to help secure my API, I’d love to hear...
...emulators. * Test the app on various devices and OS versions to ensure compatibility and performance. * Address glitches and technical issues and document resolutions. * Submit the latest builds to the Apple and Google app stores. * Record all work, including bugs identified, fixes applied, and changes made. Export and share emulator reports daily. * Securely store offline copies of the app and its database. * Conduct regular updates, code reviews, and performance optimizations. * Collaborate on updates using GitHub with detailed documentation. Requirements * Fluency in English and Chinese/Mandarin. * Proven expertise in app development and maintenance. * Proficiency in Node.js and Express (web admin panel optimization). * Expertise in React Native (front-end responsiveness and ...
...must have dedicated VPN IPs and be able to communicate directly with each other over the VPN. Allow secure and seamless data exchange within the virtual private network. Scalability & Documentation: Provide a scalable solution for adding future clients/devices. Include detailed documentation for managing the VPN, including setup, adding/removing devices, and troubleshooting. Security & Performance: Implement robust security measures, including encryption and user authentication. Optimize performance for a reliable and fast connection. Preferred Technologies: Solutions that utilize built-in VPN capabilities on Windows, macOS, and iOS devices are preferred. Protocols like OpenVPN, WireGuard, or other secure and reliable VPN options can be considered. Testing: Tes...
I'm looking for a professional to help with the monthly maintenance of my three WordPress sites: , www.Rock...WordPress sites: , , and www.Gianfrancesca.Com. Key Responsibilities: - Regular plugin updates to ensure optimal performance - Comprehensive security monitoring to safeguard against potential threats - Monthly backups of all three sites Additional Info: - I use Elementor for editing, so no complex content updates are needed. - Communication can be through email or phone, feel free to reach out to me at for any urgent matters. Ideal Skills and Experience: - Proven experience in WordPress site maintenance - Familiarity with Elementor - Strong understanding of website security protocols - Excellent communication skills
...file sizes without compromising quality. Plugin Optimization: Review all installed plugins (both active and inactive). Remove any unnecessary or unused plugins. Update and optimize the remaining plugins to ensure peak performance. Website and Content Optimization: Improve overall site speed and performance, including database optimization. Remove redundant or unnecessary content/files that may slow down the website. Ensure all pages and content are running efficiently. Security and Stability: Ensure the site is secure after optimizations, with no vulnerabilities caused by the cleanup process. Additional Notes: The website is built on WordPress and has various plugins and media files that need careful review and handling. I need the optimization to improve both user expe...
...should include all the collected personal data in separate columns (e.g., Full Name, Date of Birth, Blood Type, Allergies, etc.). Uploaded documents (e.g., Passport or ID copies) should also be exportable or downloadable. Additional Notes: The solution must integrate seamlessly with WooCommerce's existing checkout process. The form and its functionality should be user-friendly and error-free. Security is essential for handling personal and sensitive data. Please ensure compliance with privacy and data protection regulations. If you have experience in WooCommerce development, particularly with custom forms and export functionalities, I would love to hear from you. Please provide examples of similar projects you’ve worked on and an estimated timeline for completion....
I'm facing an issue with my security camera and its associated iOS app. This problem has persisted despite my attempts to troubleshoot it. The app simply isn't loading the camera feed. Troubleshooting Steps Taken: - Restarted the app - Checked internet connection - Reinstalled the app Ideal Skills and Experience: - Proficiency in troubleshooting iOS applications - Experience with security camera systems - Knowledge in network connectivity issues - iOS app development experience is a plus
Hi Nick Please find my quote below. Thank you.
Project Description The goal is to transform an existing script that uses Google Documents AI to extract invoice data into a complete system that manages the data in a relational database and provides an interactive web interface for managing and viewing this data. Additionally, the system should allow user management with specific functionalities for assigning and managing invoices. Project Requirements 1. Data Migration Modify the current Python script to insert data directly into a relational database (e.g., PostgreSQL or MySQL) instead of exporting it to a CSV file. 2. Database Design a database to store: Invoice Data: Invoice number, date, amount, client, supplier, details, etc. Users: Name, email, password (encrypted), roles (admin/user), and assigned r...
I'm looking for a talented designer to create a captivating book cover for my non-fiction security educational book. Key Requirements: - Experience in designing non-fiction book covers, particularly in the educational and security genre. - Ability to create a bold and eye-catching design that stands out. - Strong portfolio showcasing modern and sleek designs. Title: First Responder Ready Subtitle: Training Security Guards for Active Response and First Responder Leadership Author: Scott Hill, CPP, PSP, MSI
Storecheckers are a Global Market Research and Mystery Shopping company. We undertake worldwide mystery shopping visits and audits. This assignment is an audit of an Examination Centre, checking that the security standards are being met. You MUST HAVE fluent English skills, and you must be able to communicate in a professional manner and be smart and well-presented, as you will be representing us during the audit. As an auditor, you will arrive at the test center an hour before the start of the exam, give your ID, show a letter of authorization, which we will provide for you beforehand, and tell them what you are there to do. You will then sit with the TCA or the manager and ask a series of questions, and ask to see various things. The audit itself is very simple and easy, as we ...
Storecheckers are a Global Market Research and Mystery Shopping company. We undertake worldwide mystery shopping visits and audits. This assignment is an audit of an Examination Centre, checking that the security standards are being met. You MUST HAVE fluent English skills, and you must be able to communicate in a professional manner and be smart and well-presented, as you will be representing us during the audit. As an auditor, you will arrive at the test center an hour before the start of the exam, give your ID, show a letter of authorization, which we will provide for you beforehand, and tell them what you are there to do. You will then sit with the TCA or the manager and ask a series of questions, and ask to see various things. The audit itself is very simple and easy, as we ...
Storecheckers are a Global Market Research and Mystery Shopping company. We undertake worldwide mystery shopping visits and audits. This assignment is an audit of an Examination Centre, checking that the security standards are being met. You MUST HAVE fluent English skills, and you must be able to communicate in a professional manner and be smart and well-presented, as you will be representing us during the audit. As an auditor, you will arrive at the test center an hour before the start of the exam, give your ID, show a letter of authorization, which we will provide for you beforehand, and tell them what you are there to do. You will then sit with the TCA or the manager and ask a series of questions, and ask to see various things. The audit itself is very simple and easy, as we ...
I'm encountering a persistent database error within my blood management system. This issue arises when I attempt to modify a request after logging into the blood bank. Specifically, the error message reads 'Database error' and occurs when sending a request. Key Issues: - Error message displayed when modifying request - Database error encountered when sending request The ideal freelancer for this project should have: - Extensive experience in database management and troubleshooting - Expertise in managing system errors and bugs - Ability to implement effective solutions to ensure smooth operation of the system.
JOB DESCRIPTION: ESS Security & Infrastructure Operations team, this senior level IT Security will support the team by leading major security initiatives, implementations, and integrations. Additionally, the resource will drive application and infrastructure security within multiple platforms to minimize application vulnerabilities and application risk: •Safeguard software applications from potential threats and breaches •Bridge between security and development, ensuring that applications are designed, developed, and deployed in a secure manner •Identifying and fixing security vulnerabilities •Proactively identifying potential security risks, developing mitigation strategies, and ensuring that security measures...
Storecheckers are a Market Research and Mystery Shopping company. We undertake worldwide mystery shopping visits. This visit is to an Examination Centre, checking that the security standards are being met, in order to ensure that there is no possibility of cheating at any stage. The exam content and result are irrelevant to this exercise. You will need to be observant and discreet in order to undertake this visit. You need to remain in the test centre and complete the exam as if you were a genuine entrant. We have full guidance notes to assist you, which give a very clear background of the environment. The actions that you need to take are actions that test takers attempt, so do not be worried about carrying them out. After the visit there is a report to complete, it is not lengt...
Storecheckers are a Market Research and Mystery Shopping company. We undertake worldwide mystery shopping visits. This visit is to an Examination Centre, checking that the security standards are being met, in order to ensure that there is no possibility of cheating at any stage. The exam content and result are irrelevant to this exercise. You will need to be observant and discreet in order to undertake this visit. You need to remain in the test centre and complete the exam as if you were a genuine entrant. We have full guidance notes to assist you, which give a very clear background of the environment. The actions that you need to take are actions that test takers attempt, so do not be worried about carrying them out. After the visit there is a report to complete, it is not lengt...
...frontend-focused, some backend knowledge would be beneficial. Although specifics aren't provided, familiarity with RESTful APIs or GraphQL could be useful for data fetching or integration with external services. Database: Knowledge of SQL or NoSQL databases would be advantageous for handling any database operations if required for new features or data management. Deployment: The site is likely hosted on platforms like Vercel, Netlify, or similar services that support deployments out-of-the-box. Job Responsibilities: Maintenance: Regular updates to keep the site running smoothly, including security patches, library updates, and performance optimizations. Bug Fixes: Address any issues reported by users or found during site monitoring. Feature Development: Imple...
I'm seeking an experienced freelancer to upgrade my e-commerce website from PrestaShop 7.1 to 7.8. This project is crucial for improving my online store's functionality and security. - Current Platform Review: Assess the current PrestaShop 7.1 setup, including all modules and themes. - Upgrade Plan: Create a detailed plan to upgrade to PrestaShop 7.8 without losing any data or custom functionality. - Backup and Security: Ensure a full backup is taken before the upgrade process and implement security best practices. - Testing: Post-upgrade, thoroughly test the website to confirm that all features and modules are working correctly. - Troubleshooting: Resolve any issues arising from the upgrade and ensure the store is running smoothly. - Documentation: Provide...
...minimalist-style logo for me. The logo should use a monochrome color scheme and incorporate both text and an icon. Ideal Skills and Experience: - Proficiency in graphic design software - Strong understanding of minimalist design principles - Experience with logo creation - Ability to merge text and icon seamlessly - Portfolio of monochrome designs. -This is for social media, the focus will be safety and security - We would like the logo to have a strong man, similar to the photo we included pushing into the letter F of ForceEffects. -The F should show the force from the man pushing damaging the letters of the word -I would like to see two versions of the logo, one with the entire word ForceEffects and one with just the FE -I am open to other ideas for colors and inspirations...
...Overview I am developing a feature-rich Property Management Platform that helps landlords, property managers, and staff streamline every aspect of property oversight. This project extends beyond basic property/tenant management, incorporating advanced financial accounting, invoicing, document management, automated notifications, staff/vendor management, analytics, data import/export, and robust security measures. Initially, we’ll focus on a web-based solution using React (front-end) and Node.js + PostgreSQL (back-end). We also plan to future-proof the system for possible expansions to desktop and mobile platforms. If you have experience building complex, secure, and scalable SaaS/web apps, we’d love to see your proposal! Key Features & Modules 1. Property &...
I'm looking for a skilled app developer to create a native Android and OS application for a blockchai...vital. Key Features: - A secure and reliable platform for conducting blockchain transactions - Support for a variety of cryptocurrencies including Bitcoin, Ethereum, and Altcoins Security: - The app needs to incorporate top-notch security features. This includes biometric authentication, two-factor authentication, and encryption of private keys. - A solid background in cybersecurity would be beneficial. Ideal Skills: - Proficiency in Android and OS app development - Extensive experience with blockchain technology - Strong understanding of cryptocurrency mechanics - Expertise in implementing high-level security features in applications - Knowledge and experie...
...Web Domains, Postfix, PHP & MySQL. A malicious hacker seems to have infiltrated through a security loophole and is now using my server to send out spam, severely damaging my mail server's reputation. Your primary tasks will be to: - Analyze net and apache logs to identify the backdoor and trace the malicious code. - Fix the security hole in the system. - Remove any remaining malicious code from the server. I am able to provide you with root access for thorough analysis. The log files that should be prioritized for the analysis include: - Apache access and error logs I have a specific list of virtual web domains hosted on the server, which I can provide separately. Your expertise in server security, log analysis, and experience with Debian systems will b...
Storecheckers are a Market Research and Mystery Shopping company. We undertake worldwide mystery shopping visits. This visit is to an Examination Centre, checking that the security standards are being met, in order to ensure that there is no possibility of cheating at any stage. The exam content and result are irrelevant to this exercise. You will need to be observant and discreet in order to undertake this visit. You need to remain in the test centre and complete the exam as if you were a genuine entrant. We have full guidance notes to assist you, which give a very clear background of the environment. The actions that you need to take are actions that test takers attempt, so do not be worried about carrying them out. After the visit there is a report to complete, it is not lengt...
I'm in need of a freelancer with experience in data entry, specifically handling numerical data sourced from online databases. Key Responsibilities: - Accurately input numerical data from various online sources into our system. - Ensure data integrity and consistency throughout the process. Ideal Skills: - Proficient in data entry, with a keen attention to detail. - Familiarity with online databases and able to navigate them efficiently. - Able to work independently and meet deadlines. Please note that familiarity with our internal systems and databases will be beneficial, but not necessary as training will be provided.
...-Resource Library: Offer templates, training and webinars on effective real estate marketing strategies. Technical Requirements -Platform: Develop in modern web technologies (e.g., React, Angular, Vue.js) with a backend in Node.js or Python. -Database: Use a relational (e.g., MySQL) or NoSQL (e.g., MongoDB) database to store user and lead data. -Integrations: Allow integrations with other existing marketing and CRM tools. -Scalability: Develop with a focus on scalability to support a large number of users simultaneously. -Security: Implement robust security measures to protect user data. User Experience -Intuitive interface: Develop a user interface that is easy to use, even for users with no experience of technology. -Onboarding: Offer a smooth onboardin...
I'm looking for an ethical hacker with expertise in social engineering, specifically phishing attacks. Your role will be to assess our vulnerability to these types of attacks and propose effective countermeasures. Ideal Skills: - Proven experience in ethical hacking, particularly social engineering - Expertise in identifying and mitigating phishing attacks - Strong comm...countermeasures. Ideal Skills: - Proven experience in ethical hacking, particularly social engineering - Expertise in identifying and mitigating phishing attacks - Strong communication skills for reporting and advising A thorough understanding of various phishing techniques is crucial. We need someone who can realistically simulate these attacks and provide us with a detailed assessment of our current securit...
Storecheckers are a Market Research and Mystery Shopping company. We undertake worldwide mystery shopping visits. This visit is to an Examination Centre, checking that the security standards are being met, in order to ensure that there is no possibility of cheating at any stage. The exam content and result are irrelevant to this exercise. You will need to be observant and discreet in order to undertake this visit. You need to remain in the test centre and complete the exam as if you were a genuine entrant. We have full guidance notes to assist you, which give a very clear background of the environment. The actions that you need to take are actions that test takers attempt, so do not be worried about carrying them out. After the visit there is a report to complete, it is not lengt...
I have a medium resolution video from a security camera that I need help with. The video is in MP4 format and I need assistance in extracting a car's license plate from it. Ideal freelancers for this project should have: - Proficient video editing and enhancement skills - Experience in license plate recognition - Access to or knowledge of advanced video enhancement tools
I'm looking for a professional to help me create a TRC20 USDT token primarily for payment transactions. Key Requirements: - Deep understanding and experience in TRC20 USDT token creation - Ability to discuss and implement potential additional features (like Smart contract integration, Custom token features, Security audit) based on our conversations - Excellent communication skills to discuss details Please message me to discuss this project further.
...• HIPAA Folder Protection • Some employees need HIPAA compliance for certain folders in SharePoint; ensure access is locked down and logs are recorded appropriately. 2. Personal Devices (BYOD) • Limited Company Data Access • We do not plan to enforce full MDM or MAM policies, but we do want to ensure that when employees access company files or emails, our data remains secure. • App/Email Security • Configure policies (e.g., Conditional Access, if feasible) to protect corporate data in Microsoft 365. • Ensure employees can’t inadvertently sync or download sensitive files (like the HIPAA folder) to unapproved locations. 3. Microsoft Defender & Intune Configuration • Advanced Threat Protection • Enable real-time threat...