Ddos cyber attack jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 ddos cyber attack jobs found

    ...distribution ✅ Configure Auto-scaling to support 200,000 concurrent transactions (TPS) ✅ Optimize database and caching (PostgreSQL, Redis, etc.) for high-speed performance ✅ Ensure fault tolerance and failover mechanisms to prevent downtime ✅ Set up monitoring & logging (Prometheus, Grafana, ELK Stack, etc.) ✅ Deploy the solution on a Cloud Provider (AWS, GCP, or DigitalOcean) ✅ Secure the system with SSL, DDoS protection, and best security practices Preferred Skills: ✔ Kubernetes (K8s) ✔ Docker & Containerization ✔ Load Balancing & Scaling ✔ Cloud Networking & Security ✔ Hyperswitch Payment Gateway Integration ✔ PostgreSQL / Redis Performance Optimization Expected Deliverables: 1️⃣ Fully functional Hyperswitch payment system on Kubernetes 2️⃣ Load Balancer setu...

    $629 Average bid
    $629 Avg Bid
    12 bids

    Following a hacking incident, I've lost access to both my Cpanel and webmail. Unfortunately, my email was compromised as well, which has complicated matters with support. They don't believe my situation due to my inability to reach them via my email. I'm seeking a professional who can help me regain access by cracking the passwords for either of these accounts. Skills required: - Ethical Hacking - Cyber Security - Password Recovery Time is of the essence. Your prompt response and assistance will be greatly appreciated.

    $130 Average bid
    $130 Avg Bid
    11 bids

    I'm looking for a Python developer to create a Bluetooth remote access trojan (RAT) for la...Proficient in Python with prior experience in developing RATs. - Cross-platform compatibility knowledge is a must. - Understanding of Bluetooth and Wi-Fi communication protocols. again, the listed price is for Bluetooth RATs (must be documented and demonstratable) and note that the price doubles if the software is able to gain root access. This is for white hat research in response to a major attack I witnessed however I am also a software engineer and looking for some in-the-know people to potentially assist us with this project. BlueDucky does not count and Blue Born might depending on demonstration or changes made note****I require a small message chat before offering the projec...

    $561 Average bid
    Featured
    $561 Avg Bid
    29 bids

    I'm looking for a skilled web developer to create a 3D website for my cybersecurity firm. The site should showcase our services, which include penetration testing, security audits, and incident response, in a captivating and interactive manner. Key Requirements: - Experience in creating 3D websites - Expertise in web development and design - Understanding of cybersecurity services to effectively showcase them - Ability to create a website with a futuristic and high-tech visual style - Knowledge of UX/UI principles to ensure the site is both effective and useful Please ensure your proposal includes examples of similar projects you've completed.

    $1062 Average bid
    $1062 Avg Bid
    100 bids

    I am seeking a seasoned cyber security consultant to assist with the implementation of critical security measures. Key Responsibilities: - Implementing a robust firewall setup to safeguard our network - Applying data encryption techniques to ensure our information is secure Ideal candidates should have extensive experience in network security and data protection. Please provide evidence of previous projects in your proposal.

    $311 Average bid
    $311 Avg Bid
    18 bids

    I'm seeking a freelancer who can help me create a cyber security catalog that showcases our services, a modern and sleek logo, and a presentation that includes our service offerings, customer testimonials, and case studies. - Cyber Security Catalog: This catalog should effectively showcase our cyber security services in a clear and engaging manner. - Logo Design: The logo should be modern and sleek, reflecting the contemporary and cutting-edge nature of our services. - Presentation: This should cover our service offerings, include customer testimonials to build trust and credibility, and feature case studies to demonstrate our success and expertise in the field. The ideal freelancer for this project should have experience in service catalog creation, logo desig...

    $106 Average bid
    $106 Avg Bid
    67 bids

    I'm seeking a freelancer who can help me create a cyber security catalog that showcases our services, a modern and sleek logo, and a presentation that includes our service offerings, customer testimonials, and case studies. - Cyber Security Catalog: This catalog should effectively showcase our cyber security services in a clear and engaging manner. - Logo Design: The logo should be modern and sleek, reflecting the contemporary and cutting-edge nature of our services. - Presentation: This should cover our service offerings, include customer testimonials to build trust and credibility, and feature case studies to demonstrate our success and expertise in the field. The ideal freelancer for this project should have experience in service catalog creation, logo desig...

    $330 Average bid
    $330 Avg Bid
    91 bids

    ... • Bidding Your bid is my budget. If you deliberately put in a low bid to attract me to speak to you, you either revise your bid, or I will ignore you. • Delivery We need the source code and will integrate your program into a much larger one. You will be paid once you finish all the work and it works on my machine. We will also attack your program, as it has to be secure and reliable without loopholes. It has to be bug-free. • Platform Your code has to work on Windows. • Workplace You will be working online remotely. • Experience Please show us your detailed related work experience and portfolio. Without similar experience, you are unlikely to be awarded, as you may not finish the project anyway. • IP The intellectual property

    $197 Average bid
    $197 Avg Bid
    41 bids

    OpenCart Technical Tasks Checklist: 1. Critical System Review Fix basket functionality: a) Product addition errors b) Basket update issues c) Debug checkout process d) Review and resolve PHP error logs a) Test core system functions 2. Security Implementation a) Install and configure Captcha at checkout b) Research and implement robust firewall solution c) Configure security parameters d) Set up attack prevention measures e) Monitor security logs 3. Opencart 3.0.3.8 Optimization a) Verify system integrity after upgrade done from OpenCart 2 to 3.0.38 b) Check database performance c) Validate template compatibility d) Review error logs and resolve issues e) Test all core functionalities 4. Product Display Features Install/Update product corner labels: sale, new, sale Configure filt...

    $168 Average bid
    $168 Avg Bid
    71 bids
    Trophy icon E-Commerce Web Design Contest
    13 days left

    ...Playset** 38. **Play-Doh Kitchen Creations Burger Set** 39. **LeapFrog LeapStart Interactive Learning System** 40. **Lego Friends Heartlake City** 41. **Disney Princess Royal Castle** 42. **Galt Toys Wooden Railway Set** 43. **Tiny Love 3-in-1 Rocker Napper** 44. **Fisher-Price Thomas and Friends Trackmaster** 45. **Barbie Mermaid Doll** 46. **Play-Doh Sweet Shoppe Cake Playset** 47. **Hot Wheels Shark Attack Track Set** 48. **Nerf Zombie Strike Hammershot Blaster** 49. **Little Tikes Easy Score Basketball Set** 50. **VTech 3-in-1 Sports Center** 51. **Hasbro Twister Game** 52. **Bigjigs Toys Wooden Pirate Ship** 53. **Fisher-Price Imaginext Batcave** 54. **LeapFrog Musical Rainbow Tea Party** 55. **Peppa Pig Playhouse** 56. **Chicco First Baby Blocks** 57. **Tiny Love Super Mat ...

    $69 Average bid
    Guaranteed
    $69
    62 entries

    ...specific bank account 4. Send payment (GBP and EUR) to a third party. • Bidding Your bid is my budget. If you deliberately put in a low bid to attract me to speak to you, you either revise your bid, or I will ignore you. • Delivery We need the source code and will integrate your program into a much larger one. You will be paid once you finish all the work and it works on my machine. We will also attack your program, as it has to be secure and reliable without loopholes. It has to be bug-free. • Platform Your code has to work on Windows. • Workplace You will be working online remotely. • Experience Please show us your detailed related work experience and portfolio. Without similar experience, you are unlikely to be awarded, as you may not fini...

    $296 Average bid
    $296 Avg Bid
    4 bids

    ...a dating site, with optimal considerations for security. Security Requirements: Must use HTTPS throughout, all data in any database is encryped using AES256, bcrypt/Argon2/PBKDF2 to hash user passwords, OAuth2.0 for secure 3rd party logins, all inputs are validated using input validation to prevent SQL injection, Cross Site scripting and CMD injection, rate limit APIs to prevent brute force/DDos attacks, OAuth for API Authentication. Instead of likes - user send each other "Roses" Messages are controlled, every day 3 credits are placed in a users account - they can send up to those 3 credits, the maximum number of saved credits is 6 - to prevent spammers Information to be collected: User Identity & Basic Info: Captcha to prevent bots Username to be sho...

    $494 Average bid
    $494 Avg Bid
    41 bids

    ...for citation tracking. CrossRef for DOIs. ORCID for author profiles. API Access: Allow external tools to fetch data or integrate services. 13. Accessibility & Compliance WCAG Compliance: Ensure the site is accessible for users with disabilities. Multi-language Support: Offer content in multiple languages. 14. Security HTTPS Encryption. Regular security audits. Protection against spam, bots, and DDoS attacks. Would you like me to create a project brief document or design a basic website prototype for this? Let me know how you'd like to proceed! Website Features: SSRN-Like Platform 1. User Accounts & Authentication User Registration: Allow users to sign up with email or social accounts (Google, LinkedIn). Login & Authentication: Secure login with two-factor authe...

    $147 Average bid
    $147 Avg Bid
    11 bids

    My Apache web server seems to be under a malware/injection attack. It's timing out and I urgently need an expert to help mitigate this situation. Ideal Skills: - Extensive experience with Apache web server - Knowledge of MySQL - Proficiency in identifying and mitigating malware/injection attacks - Strong understanding of server security measures - Ability to work under pressure to restore server functionality Please reach out if you can help.

    $125 Average bid
    $125 Avg Bid
    44 bids

    I need an expert to configure Cyber Panel Enterprise on my VPS running AlmaLinux 9. The primary purpose of this setup is for website hosting, specifically for Joomla sites. Ideal skills and experience: - Deep understanding and experience with Cyber Panel Enterprise - Extensive knowledge of VPS management - Proficient in AlmaLinux 9 - Experience with Joomla site hosting - Website hosting expertise

    $135 Average bid
    $135 Avg Bid
    25 bids

    I am looking for a highly skilled Mobile App Security and Video Streaming Security Expert with expertise in reverse engineering prevention, API security, runtime attack mitigation, and HLS Video Piracy protection to prevent unauthorized video downloads without using DRM. Our project requires security hardening against reverse engineering, API interception, SSL unpinning, MITM attacks, Frida/Xposed-based attacks, HLS Video piracy security and other advanced security threats. The ideal candidate should have deep knowledge of mobile application security, penetration testing, obfuscation techniques, runtime security, anti-debugging strategies, and HLS Video Protection without using DRM. Key Responsibilities: ✅ Reverse Engineering Prevention – Implement security measures to prote...

    $723 Average bid
    $723 Avg Bid
    28 bids

    ...specific bank account 4. Send payment (GBP and EUR) to a third party. • Bidding Your bid is my budget. If you deliberately put in a low bid to attract me to speak to you, you either revise your bid, or I will ignore you. • Delivery We need the source code and will integrate your program into a much larger one. You will be paid once you finish all the work and it works on my machine. We will also attack your program, as it has to be secure and reliable without loopholes. It has to be bug-free. • Platform Your code has to work on Windows. • Workplace You will be working online remotely. • Experience Please show us your detailed related work experience and portfolio. Without similar experience, you are unlikely to be awarded, as you may not fini...

    $287 Average bid
    $287 Avg Bid
    31 bids

    I'm seeking a talented animator to create a wide range of animations for both male and female characters for my game. The animations needed include: - Idle Animations: Various idle states for different scenarios. - Combat Animations: Including attack, defense, and evasive maneuvers. - Walking/Running Animations: Different speeds, terrains and styles. - Jumping Animations: Various heights and styles of jumps. - Dying Animations: Realistic and game-appropriate death sequences. - Interacting with Objects Animations: Picking up, throwing, using objects. - Swimming Animations: Different strokes and speeds for various water scenarios. - Climbing Animations: Scaling different types of surfaces. I'm also looking for a lot more animations to be used in Carrers such as any and all...

    $3368 Average bid
    $3368 Avg Bid
    28 bids

    ...competent team with a strong background in network security, machine learning, and Splunk to create a DDoS and IP Spoofing detection tool. The primary focus of this tool will be on accurately identifying DDoS attacks. Key Features of the Tool: - Analyze both real-time and historical network traffic data. - Primarily detect volumetric DDoS attacks. - Utilize supervised learning methods through Splunk for detection. - Connect to our company's network via APIs. - Generate a comprehensive incident report that includes potential vulnerabilities identified. Ideal Candidates Should Have: - Proven experience in developing network security tools. - In-depth knowledge of DDoS and IP Spoofing attack patterns. - Proficiency in using Splunk for data analysis...

    $1054 Average bid
    $1054 Avg Bid
    16 bids

    I'm seeking a proficient Cybersecurity Trainer for online sessions in Hindi. The ideal candidate will cover network security, application security, cyber threat intelligence, digital forensic, and VAPT. The target learners are intermediate level professionals. Key Requirements: - Conduct live interactive sessions - Deliver engaging and informative content - Address queries and facilitate discussions - Promote a positive learning atmosphere - Use real-world examples to illustrate complex topics Skills Needed: - Comprehensive knowledge of the mentioned Cybersecurity topics - Excellent communication skills in Hindi - Prior experience in teaching Cybersecurity - Ability to create interactive and engaging training sessions - Strong understanding of intermediate Cybersecurit...

    $6 / hr Average bid
    $6 / hr Avg Bid
    6 bids

    ...consistent design template for all posts, ensuring brand identity. 2. Use Bio Clinic’s logo and approved imagery in all posts. 3. Add engaging elements such as icons, graphs, or symbols (e.g., hearts, stethoscopes). #### **B. Content Development:** 1. Research 12 cardiology-related myths and truths. 2. Write captions that: - Pose a clear question (e.g., "Is chest pain always a sign of a heart attack?"). - Provide educational and concise answers. - Include strong call-to-actions (e.g., "Comment your answer below!"). 3. Tailor stories or reels to complement each post, ensuring variety and engagement. #### **C. Engagement Optimization:** 1. Use hashtags like: - #HeartHealth - #BioClinicCare - #CardiologyMyths 2. Include interactive eleme...

    $100 Average bid
    $100
    25 entries
    roblox game
    2 days left

    ...Each spell can have its own range, effects, and cooldowns. You can create attack spells, healing spells, and defensive spells, similar to how characters in Black Clover use their magic creatively. Magic UI: Build an easy-to-use UI (user interface) for players to select their spells during combat. You can create hotbars, spell selection menus, and cool-down timers. Ultimate Spells: Add powerful, game-changing abilities that players can unlock after reaching certain milestones or levels. These could be signature spells like Asta's Anti-Magic or Yuno’s Wind Magic techniques. 5. Combat and Animation Roblox allows you to create custom animations for characters and combat. Focus on: Attack Animations: Create fluid attack animations for casting spells. These...

    $4889 Average bid
    $4889 Avg Bid
    12 bids

    I am in need of a qualified penetration tester to assist in assessing the security of one of our publicly available, computer-use AI agents developed by Anthropic. The primary focus of this task will be to simulate a harmless prompt injection attack on our test AI agent accessible via an API key that i will provide. Key Details: - The project involves testing a computer-use AI agent. - The primary concern is with potential vulnerabilities related to malicious code injection. - The pentesting should be conducted in our development environment via API. - To run this you will need to setup a docker environment i will provide the docker image. Please note that further information will be provided to the successful freelancer we choose to work with. Ideal candidates should have extensi...

    $63 / hr Average bid
    $63 / hr Avg Bid
    12 bids

    I am in need of profiles for personnel specializing in Information Security, IT Security, and Cybersecurity. Ideal skills and experience for the job: - Deep understanding of IT Security principles - Expertise in Information Security protocols - Proficiency in Cybersecurity measures and tactics Specific skills required for the Cybersecurity profiles: - Vulnerability Analysis - Network Monitoring - Incident Response - Cybersecurity Management There is no immediate deadline for this project, allowing for thorough and thoughtful profile development.

    $1819 Average bid
    $1819 Avg Bid
    27 bids

    I'm looking for a seasoned professional specializing in cyber security, particularly in penetration testing and OSINT, with a primary focus on social media analysis. Your tasks will include: - Conducting penetration tests to identify potential vulnerabilities and exploits - Using OSINT methodologies to analyze social media and gather relevant intelligence Ideal candidates should have extensive experience in cyber security and OSINT, with a proven track record in penetration testing. You should be adept at social media analysis and capable of identifying potential security threats. Strong analytical skills and attention to detail are crucial for this role.

    $99 Average bid
    $99 Avg Bid
    16 bids

    ...trades through a sophisticated sandwich attack algorithm. This project entails: - Crafting a hybrid execution strategy: The MEV contract should allow for both automatic and manual execution, with the latter requiring prior approval. This will necessitate an intuitive and user-friendly interface for monitoring and intervening in trade executions. - Implementing an advanced sandwich attack algorithm: The algorithm's complexity should be at an advanced level, capable of outsmarting competitors and capitalizing on profitable trading opportunities. Ideal candidates for this project should have: - In-depth knowledge and experience with Solana and MEV contracts. - Proven track record of developing complex trading algorithms, specifically sandwich attack algorithms...

    $81 Average bid
    $81 Avg Bid
    1 bids

    I have developed about half of my game project and now I need an experienced game developer to add enemy AI and...and convert the game for Android. The AI will have patrolling and attacking behaviors, so knowledge of implementing this type of AI is crucial. Key Requirements: - Implementing enemy AI with patrolling and attacking behaviors - Converting the game for Android - Creating UI and UX elements tailored for mobile For the Android version, I need specific UI buttons including: - Action, jump, and attack buttons As for UX, the focus should be on: - Ensuring smooth controls - Facilitating easy navigation Ideal Skills: - Game development experience, particularly with Android - Proficient in AI implementation - Strong UI/UX design skills - Understanding of mobile game control...

    $90 Average bid
    $90 Avg Bid
    11 bids

    ...directly to the CTO (me) - an old school linux system administrator. We should have daily meetings to evaluate: - any technical decisions that need to be done - any roadblock you might encounter - I can help you find an elegant solution - the progress of the project - I will also do some testing and bug reporting - We require light code and secure code: avoiding unnecessary dependencies and limiting attack surface! (Though I am not a coder, I also work actively on all those projects and communication is key to getting things in order) We estimate that with the existing basis, it is possible to complete the project in +- 23 days of work with 10hrs/day. Please let us know if you are interested by this project, we are keen on having a meeting, discuss the details and start work as...

    $23 / hr Average bid
    $23 / hr Avg Bid
    13 bids

    ...Control Systems Integrated Automation Systems (IAS) Role of IAS in monitoring and controlling propulsion, cargo, and auxiliary systems. Programmable Logic Controllers (PLCs) Programming, troubleshooting, and optimization of PLC-based systems. SCADA Systems Supervisory control in real-time operations and data logging. Cybersecurity for Automation Systems Securing PLCs, IAS, and SCADA systems from cyber threats. 5. Advanced Navigation and Communication Systems Electronic Navigation Systems Modern ECDIS, GPS, GNSS, and autonomous navigation technologies. Radar and AIS Systems Latest developments in radar and Automatic Identification Systems. Maritime Communication Satellite communication (VSAT, Inmarsat) and GMDSS updates. Autonomous Vessels and ETO Role Managing electronic systems ...

    $135 Average bid
    $135 Avg Bid
    27 bids

    I need an experienced pixel artist to create 32-bit pixel art animations from a picture I've provided. The animations will be for a game and include an idle animation and a generic attack/action animation. The character in the picture is a human. The attack/action animations can be generic, but should be adaptable for different scenarios. Ideal Skills: - 32-bit pixel art - Animation creation - Game design understanding Experience: - Previous work with human character animations - Portfolio of 32-bit pixel art Please provide your portfolio demonstrating your experience with 32-bit pixel art and human character animations.

    $77 Average bid
    $77 Avg Bid
    45 bids

    My website, , is currently unprotected against DDoS attacks. Given that I'm particularly worried about volumetric attacks, I need a skilled professional to implement robust protection measures. Key Requirements: - Set up traffic filtering: This should help in identifying and mitigating malicious traffic before it reaches my server. - Implement rate limiting: This feature should control the amount of incoming traffic, ensuring that my site remains accessible even under heavy load. - Establish an IP blacklisting system: This will block known malicious IPs from accessing my site. Ideal Skills & Experience: - Proven experience in implementing DDoS protection measures, particularly against volumetric attacks. - Familiarity with traffic filtering, rate limiting, and IP ...

    $134 Average bid
    $134 Avg Bid
    34 bids

    I am seeking a professional with expertise in lead generation, specifically targeting the Hitech startup sector in Israel. Your role will be to identify and generate potential sales leads in the cyber domain. Ideal Skills and Experience: - Proven track record in sales lead generation, specifically within the Hitech industry - Deep understanding of the cyber domain - Network within Israeli startups - Proficient in utilizing digital sales tools and platforms - Excellent communication and negotiation skills

    $2595 Average bid
    $2595 Avg Bid
    11 bids

    I'm starting a scooter rental service and need a fully functional, modern and sleek app and website for it. The platforms for the app should be both iOS...functional, modern and sleek app and website for it. The platforms for the app should be both iOS and Android. Key Features: - Booking System: A seamless and intuitive booking experience is essential. - App should have both customer and admin interface - Automatic Document Verification - Payment Integration: A secure, reliable and user-friendly payment system is a must. - Gps Tracking - Should be DDos and Firewall protected Ideal Skills & Experience: - Proven experience in developing cross-platform mobile apps and websites. - Expertise in integrating secure payment systems. - A portfolio showcasing modern and sleek desi...

    $818 Average bid
    $818 Avg Bid
    67 bids

    Just clean this up so it looks pretty etc.....

    $40 Average bid
    $40 Avg Bid
    1 bids

    I need to write 10000 words paper as discussed.

    $31 Average bid
    $31 Avg Bid
    1 bids

    ...of the game. softwares would be blender and unity. the characters are not rigged. the animations will be for 7 characters. key points regarding the animation: 1. They need to be available for both the first person view and third person view. 2. upper body and lower body should be separated, meaning, while lower body may be walking or running the upper body might be playing idle animation or attack animation etc. 3. there are multiple clothes which needs to be weight painted and adjusted as well 4. player and all the other characters should share the same rig and should share the same animation the animations for the demo include: ( idle, running in 8 direction, jumping, slashing with sword in 3 direction, thrust, blocking in 4 direction, damage, dying)...

    $391 Average bid
    $391 Avg Bid
    19 bids

    We're an MSP and offer CyberSecurity services. We are looking to build a simulated phishing tool so we can test our clients and their end users regular...this would not initially be fully integrated with AI and or other automation - platform hosting for evolving IPs would need to be considered (if the system was blacklisted through spam, which is likely then it would stop working). A system design to help users improve their knowledge of cybersecurity getting blocked can't be blocked You would need a deep understanding of - email clients - cyber security - phishing - webbased platforms - spam lists, spam scores - black lists of emails and IPs Responses to this project would need to offer thoughts and insights to be sure there was a good understanding of the tas...

    $206 Average bid
    $206 Avg Bid
    12 bids

    I'm seeking a professional who can help fortify my e-commerce website against DDoS attacks. Key Requirements: - Implement rate limiting measures to control incoming traffic and prevent potential overload. - Conduct thorough DDoS attack tests to ensure the website's resilience against such threats. Skills and Experience Required: - Proven experience in DDoS protection for websites, particularly e-commerce sites. - Strong background in implementing rate limiting measures. - Proficient in conducting DDoS attack tests. - Knowledgeable in web security best practices. Please reach out if you can assist with this urgent matter.

    $110 Average bid
    $110 Avg Bid
    27 bids

    I'm in need of a freelancer who can craft engaging and informative 'how-to' guides focused on Network Security, aimed at intermediate users. If you have a knack for simplifying complex topics without diluting their importance, then you're the right fit for this project. Key Requirements: - Expertise in Network Security - Proven experience in techn...for simplifying complex topics without diluting their importance, then you're the right fit for this project. Key Requirements: - Expertise in Network Security - Proven experience in technical blogging - Ability to create 'how-to' guides - Understanding of the needs and knowledge level of intermediate users - Excellent writing skills Please include links to your latest blogs in your proposal. Cyber ...

    $2 / hr Average bid
    $2 / hr Avg Bid
    25 bids

    As a press reporter, public group moderator, and volunteer based out of Bhopal, I'm looking for a cyber security expert who can help me with incident response related to cyber banking fraud. Key Responsibilities: - Assess and respond to incidents related to cyber banking fraud - Provide proactive measures to prevent such incidents - Help in understanding and interpreting these incidents for a journalistic perspective Ideal Candidate: - Extensive experience in cyber security, particularly in incident response - Prior experience dealing with cyber banking fraud - Ability to communicate complex cyber incidents in a simple manner - A knack for journalism would be a plus

    $13 / hr Average bid
    $13 / hr Avg Bid
    8 bids

    Greeting from Freelancer.com One of our client is looking for a Microsoft Sentinel Security Consultant with bilingual proficiency in German and English. The ideal candidate will design, implement, and manage Microsoft Sentinel environments to ensure robust security monitoring and incident response capabilities, strong communication skills in both languages, and the ability to support technical bid preparation for cybersecurity projects. This role requires a combination of technical acumen, bid management experience, and customer-facing skills to help deliver successful proposals and solutions. Key Responsibilities 1. Microsoft Expertise o Design, implement, and optimize Microsoft Sentinel solutions for enterprise clients. o Configure Sentinel data connectors, analytics rules, and au...

    $39 / hr Average bid
    $39 / hr Avg Bid
    19 bids

    ...which is pushing organizations to improve their cybersecurity. These attacks are usually carefully planned and financially motivated. Cybercriminals specialize in different types of attacks like phishing, scams, malware, ransomware, and hacking, each using their own methods. To protect against these growing threats, companies need to strengthen their cybersecurity. In June 2017, the Australian Cyber Security Centre (ACSC) introduced the "Essential Eight" strategies to help businesses improve their security. However, companies should not rely only on these strategies and should add extra layers of protection. ### The Essential Eight Techniques The Essential Eight is a set of eight key strategies designed to reduce cybersecurity risks. These strategies focus on prevent...

    $19 Average bid
    $19 Avg Bid
    15 bids

    I'm looking for an experienced cybersecurity professional to assist with my final project. The task involves analyzing a website, identifying vulnerabilities, and ultimately finding the flag on the demo site. The project has reached the stage of an LFI (Local File Inclusion) attack, and I need someone to take over from there. Your responsibilities will include: - Conducting a detailed vulnerability analysis with a focus on Cross-Site Scripting (XSS), Local File Inclusion (LFI), and using other hacking tools. - Preparing a report on your findings. - Completing the project with a high level of quality and speed. Ideal candidates will have: - Extensive experience in information security and website analysis. - Advanced knowledge of LFI attacks and additional security techniques....

    $131 Average bid
    $131 Avg Bid
    32 bids

    ...tests. Scripting Skills: Being able to write scripts in languages like Python, Bash, or PowerShell can automate tasks and enhance your capabilities. Understanding of Operating Systems: Familiarity with Linux and Windows operating systems is essential for exploiting vulnerabilities and administering systems. Knowledge of Security Concepts: Understanding different types of attacks (e.g., phishing, DDoS, man-in-the-middle) and security practices (e.g., firewalls, encryption) is important. Certifications: Consider pursuing certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or CompTIA Security+. Useful Tools in Kali Linux: Nmap: A powerful network scanning tool used for discovering hosts and services on a network. Metasploit F...

    $260 Average bid
    $260 Avg Bid
    16 bids

    ...tests. Scripting Skills: Being able to write scripts in languages like Python, Bash, or PowerShell can automate tasks and enhance your capabilities. Understanding of Operating Systems: Familiarity with Linux and Windows operating systems is essential for exploiting vulnerabilities and administering systems. Knowledge of Security Concepts: Understanding different types of attacks (e.g., phishing, DDoS, man-in-the-middle) and security practices (e.g., firewalls, encryption) is important. Certifications: Consider pursuing certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or CompTIA Security+. Useful Tools in Kali Linux: Nmap: A powerful network scanning tool used for discovering hosts and services on a network. Metasploit F...

    $12 / hr Average bid
    $12 / hr Avg Bid
    14 bids

    ...Goku’s Spirit Bomb or Luffy’s Gear Fourth attack. Visual Effects: High-quality particle effects and animations to make combat visually appealing. 3. Anime Characters and Abilities Character Unlocks: Players unlock characters by completing quests, defeating bosses, or using the gacha system. Ability Customization: Players can mix and match skills from different characters to create unique playstyles. Example: Pairing a teleportation move with a heavy attack. Skill Progression: Introduce skill trees for each character, allowing players to unlock new moves, power-ups, or transformations as they level up. 4. Boss Battles Unique Mechanics: Bosses should have multi-phase fights with unique mechanics. Example: A boss that becomes enraged at 50% HP, changing attack...

    $4720 Average bid
    $4720 Avg Bid
    21 bids

    I'm seeking a Cyber Security Professional to develop a comprehensive online course focused on Penetration Testing and Ethical Hacking. Course Specifications: - Duration: Over 10 hours (final edited output) - Target Audience: Intermediate learners - Key Topics: - Network Security - Web Application Security - Mobile Hacking and Security - System Hacking and Security - Windows 11 Hacks - Learning Methods: Primarily hands-on labs, incorporating practical exercises over theoretical content The course needs to be in English, with all audio and video content being noise-free and in full HD quality. Ownership rights for the entire course are required. Budget: Fixed Timeline: 20-40 days Ideal Skills & Experience: - Extensive knowledge and experience in Cyber...

    $286 Average bid
    $286 Avg Bid
    5 bids

    I'm seeking a skilled cyber security expert to assess vulnerabilities on my website, specifically focusing on SQL injection threats. Preferably, I would like to hire someone from Pakistan with substantial expertise in the field. Key Requirements: - Expertise in vulnerability assessment - Deep understanding of SQL injection threats - Preferably based in Pakistan - Excellent track record in cybersecurity - Use of industry-standard tools and methods Please note that while I have a specific focus, I am open to the expert's recommendations on the best tools and methods to use for the assessment. I am looking for a professional who can provide a thorough security audit and suggest necessary improvements.

    $87 Average bid
    $87 Avg Bid
    13 bids

    ...Sport Cars 3) Modified Cars 4) Drift Cars 5) Classic Cars 6) Motorcycles (i.e., Harley Davidson & Sport Bikes) During the registration Process we will, everyone will provide us with all their information and depending on whether they want to participate or showcase their cars or bikes. MOST IMPORTANTLY - Jumha Prayer at "Dirab Park) after the "CrewZ" from "Tala Mall" at 9:30 AM  Drifting Time Attack Drag Racing (Roll Racing) Off Roading   Phase 2 MARKETING: It comes without saying that “Dirab Park” has a reach beyond Riyadh & the “Kingdom of Saudi Arabia” & with the reach of “CrewZNatioN”, we are confident that with both our entities we will be able to attract thousands of spectators who, as per...

    $158 Average bid
    $158 Avg Bid
    75 bids