Computer Security Consultants For Hire
Showing 118 results
Sponsored Freelancers
-
About me I have worked over 20 years at IT and telecom companies at following positions: it support, system administrator, applications administrator and monitoring administrator expert. I am "System Administration and IT Infrastructure Services" certified. I follow KISS methods. I understand OSI layer. With me is...About me I have worked over 20 years at IT and telecom companies at following positions: it support, system administrator, applications administrator and monitoring administrator expert. I am "System Administration and IT Infrastructure Services" certified. I follow KISS methods. I understand OSI layer. With me is easy to setup systems. I am not picky about what systems to use but i do have experience what to use. I know following operating systems + distros: debian, ubuntu, gentoo, suse, redhat, centos, rocky linux, almalinux and arch linux, freebsd, netbsd, openbsd, sun solaris plus ms windows servers. I also know following systems: Web servers: Apache, Nginx, Lighttpd, Litespeed, Hiawatha. Javascript: nodejs,npm Java web servers: Tomcat, Jrun, Jboss Proxy systems: Haproxy, Varnish, Squid. DB servers: MySQL (and forks, including MariaDB), PostgreSQL Mail systems: Postfix,exim,dovecot.. and implementing: DKIM, SPF, MX, DMARC. Monitoring systems: Nagios, zabbix, cacti, grafana. SMS: SMSC, Kannel DNS: Bind, Djbdns, Dnsmasq. VPS: Vmware, Hyper-v, Proxmox, bhyve, kvm, xen, openstack.. Containers: docker, lxc, jail, kubernetes Cloud providers: AWS, Digitalocean, Azure.. My knowledge does not stop here. I troubleshoot easily. Let's chat Please see my reviews of my previous works.. PS! With my bid you will get one week free support for work done less
Hire servermaster
-
Hi, I'm a Cyber Security Researcher with practical experience gained through playing CTFs (Capture The Flag), engaging in Bug Bounties, and working as a Pentester. What I can do for you: Web/API (OWASP TOP 10) Pentesting: - Web Applications like WordPress, CMS, CRM, LMS, Full stack, etc. ...Hi, I'm a Cyber Security Researcher with practical experience gained through playing CTFs (Capture The Flag), engaging in Bug Bounties, and working as a Pentester. What I can do for you: Web/API (OWASP TOP 10) Pentesting: - Web Applications like WordPress, CMS, CRM, LMS, Full stack, etc. Internal/External Network Pentesting: - Active Directory Security and Hardening. Cloud Security Audit/Pentesting: - AWS, AZURE, and GCP. Malware Removal: - Windows , Androids , MacOs - Web Shells, Backdoors, and SEO spamming removal. Operating System Hardening: - Windows, Linux, and Mac OS. OSINT (Open Source Intelligence): - Background Checks, Social Media Analysis, Investigating People, Criminal History, etc. - Image Analysis, Reverse Image Searches, Facial Recognition. - Business, Brand, and Organizational Intelligence. - Financial/Fraud Intelligence. - Fact-checking and analysis of disinformation and misinformation. - Cyber Threat Intelligence, Sensitive Gangs Profiling. - Investigating cryptocurrency wallets, NFTs, and transactions. - Critical Infrastructure and Industrial Intelligence. - Dark web's Underground marketplaces, shops, and forums. - Transportation Intelligence (cars, boats, planes, trains), etc. Digital Forensics: - Collecting Network Evidence. - Acquiring Host-Based Evidence. - Analyzing Network Evidence. - Analyzing Log Files. Extreme Privacy and Anonymity: - OPSEC 101. - Computers, Mobile, and Social Media Privacy. - Removing traces of your identities on search engines and various platforms. BOTs: - Telegram, Discord, etc. less
Hire muhammadsm7
-
Hello There! As an experienced Cyber Security Analyst, I specialize in safeguarding the confidentiality, integrity, and availability of digital assets. With a profound grasp of industry-recognized cyber security standards and best practices, my expertise extends to cyber threat intelligence, forensic analysis, and...Hello There! As an experienced Cyber Security Analyst, I specialize in safeguarding the confidentiality, integrity, and availability of digital assets. With a profound grasp of industry-recognized cyber security standards and best practices, my expertise extends to cyber threat intelligence, forensic analysis, and deep web exploration. By leveraging tools such as Tor, Maltego, and Shodan, I identify and mitigate hidden cyber threats, crucial for fortifying your cyber security defenses and guiding your decision-making process. As a proficient Ethical Hacker, I employ state-of-the-art methodologies and tools, including Kali Linux, Nessus, Metasploit, and Wireshark, to conduct comprehensive security evaluations. My approach to ISO 27001 Penetration Testing and assessments against the OWASP Top 10 Vulnerabilities ensures thorough identification of security weaknesses and the formulation of effective remediation strategies. With expertise in data forensics using EnCase and FTK, I offer insights that empower you to make strategic, data-informed decisions. I empower clients to strengthen their digital environments against cyber threats through the implementation of advanced security measures, including Firewalls, Intrusion Detection/Prevention Systems (IDS/IPS), and robust encryption protocols. My knowledge of CASA Tier 2 standards enhances the resilience of cyber security solutions. Offering Specialized Services In: Comprehensive Incident Response Planning and Cyber Security Risk Analysis aligned with the OWASP Top 10 framework. Advanced Threat Modelling utilizing tools such as Microsoft Threat Modeling Tool and OWASP Threat Dragon, With comprehensive DREAD & STRIDE Analysis. Detailed Cyber Security Audits, leveraging industry-leading tools like Qualys and SolarWinds Penetration Testing and Vulnerability Discovery, employing Burp Suite and OWASP ZAP for in-depth analysis Advanced Cyber Defense Mechanism Deployment, meeting CASA Tier 2 and ISO 27001 standards Strategic Cyber Security Enhancement Recommendations, tailored to the latest industry trends and standards Collaborating with me guarantees prompt responses, transparent communication, and a commitment to a 24-hour turnaround time. ⏱️ Let's elevate your cyber security together. Reach out to discuss how I can customize my services to meet your specific needs. Thank you for considering my profile :) less
Hire RomanSattar
-
With over a decade of specialized experience in IT security, I bring distinguished expertise in managing firewalls, routers, and network security. Adept at leveraging advanced tools and methodologies to perform thorough vulnerability assessments and devising robust remediation strategies to fortify security in Windows...With over a decade of specialized experience in IT security, I bring distinguished expertise in managing firewalls, routers, and network security. Adept at leveraging advanced tools and methodologies to perform thorough vulnerability assessments and devising robust remediation strategies to fortify security in Windows and Linux ecosystems. My comprehensive knowledge extends to Sophos XG/UTM and a variety of other Sophos products, ensuring robust and adaptive security solutions. I am an expert in Ubiquiti firewalls and switches, implementing and managing these devices to create secure and efficient network infrastructures. Additionally, I have extensive experience in monitoring systems such as Zabbix, Nagios, and PRTG for private cloud environments, enabling proactive monitoring and swift response to any potential issues. My proficiency extends to Proxmox server configuration, ensuring seamless virtualized server management and high availability. I am well-versed in configuring Windows server roles such as Network Policy Server (NPS) and Remote Desktop Protocol (RDP) with Multi-Factor Authentication (MFA), enhancing security and access control measures. Moreover, I have a proven track record in creating excellent physical and logical network diagrams, facilitating clear communication and efficient planning. I am also an expert in vulnerability assessment tools like Nessus and Qualys, allowing for thorough security evaluations and the implementation of effective remediation strategies. I have experience with security cameras from Hikvision, Dahua, and Axis, and I am skilled with all types of NVRs, DVRs, and XDRs. Additionally, I am an expert in RTSP protocol for live feeds over the internet via router port forwarding. I have experience in Omada controller (Tp-Link). I have experience with the installation and configuration of Moodle on Windows servers. less
Hire G8Bharat
-
carlitanjuguna05 carlitanjuguna05
$20 USD / hourDATA ANALYSIS /EXCEL/SPSS/R/ACCOUNTING/WRITERI am a seasoned freelancer with a proven track record of delivering exceptional results across a diverse range of skills. As a top-rated professional, I specialize in data analysis (,Microsoft Excel, R programming, python, Tableau, Power BI, SQL, MATLAB, SAS, SPSS),research writing, Wikipedia, PowerPoint...I am a seasoned freelancer with a proven track record of delivering exceptional results across a diverse range of skills. As a top-rated professional, I specialize in data analysis (,Microsoft Excel, R programming, python, Tableau, Power BI, SQL, MATLAB, SAS, SPSS),research writing, Wikipedia, PowerPoint presentations, translation, copywriting, proofreading, website design, editing, ghostwriting, advanced academic writing (Dissertation, Thesis), business plans, and technical writing. In accounting, I am adept at preparing balance sheets, income statements, cash flow statements, and other financial reports with great utilization of latest accounting software such as Xero, MYOB, and QuickBooks Skills Overview: DATA ANALYSIS: -Proficient in extracting meaningful insights from complex datasets. -Expertise in using tools : Microsoft Excel, R programming, python, Tableau, Power BI, SQL, MATLAB, SAS, SPSS RESEARCH WRITING: - Experienced in conducting in-depth research across various domains. -Adept at synthesizing information into clear and concise reports. ACCOUNTING -utilizing industry-leading software platforms such as Xero, MYOB, and QuickBooks. - I am adept at preparing balance sheets, income statements, cash flow statements, and other financial reports WIKIPEDIA SKILLS: -Familiarity with Wikipedia's formatting and markup language -Writing and editing as per the Wikipedia rigorous guideline POWERPOINT: -Skilled in creating visually appealing and impactful presentations. -Able to translate complex ideas into compelling slides. COPYWRITING AND PROOFREADING: -Creative copywriting for engaging content. -Thorough proofreading for flawless documents. WEBSITE DESIGN: -Proficient in designing user-friendly and visually appealing websites. -Responsive design for optimal user experience. EDITING AND COPYWRITING: -Meticulous editing for clarity and coherence. -Ghostwriting services for captivating content without compromising your voice. ACADEMIC WRITING: - Specialized in advanced academic writing, including dissertations and theses. - Familiarity with academic formatting and citation styles. BUSINESS PLAN: -Comprehensive business plans tailored to your goals. - Financial projections and market analysis for informed decision-making. TECHNICAL WRITING: -Clear and concise technical documentation. -Manuals, guides, and documentation for diverse audiences. Why Choose Me: o Expertise: With extensive experience in each of my listed skills, I bring a wealth of expertise to every project. o Detail-Oriented: My meticulous attention to detail ensures error-free and polished deliverables. o Innovation: I approach each task with creativity, providing unique solutions tailored to your specific needs. o Deadline Driven: Time is of the essence, and I am committed to delivering high-quality work within agreed-upon timelines. less
Hire carlitanjuguna05
-
I offer comprehensive Software Architecture Services designed to build robust, scalable, and efficient software systems tailored to meet the unique needs of your business. My expertise lies in creating clear, actionable architecture blueprints that serve as a foundation for developing high-performing software...I offer comprehensive Software Architecture Services designed to build robust, scalable, and efficient software systems tailored to meet the unique needs of your business. My expertise lies in creating clear, actionable architecture blueprints that serve as a foundation for developing high-performing software solutions. With a focus on modern architectural patterns, microservices, and cloud-native technologies, I ensure that your software architecture is flexible, resilient, and ready for future growth. I work closely with each client to understand their specific challenges and objectives, providing personalized guidance on technology selection, system design, and best practices for implementation. My goal is to empower your development teams with a solid architectural framework that accelerates development, facilitates maintenance, and reduces overall project risk. Partner with me to transform your vision into a software reality that drives business success and technological innovation. My certifications: - Microsoft – Azure Administrator - Microsoft – Azure Fundamentals - Microsoft – Azure AI Fundamentals - Microsoft – Azure Data Fundamentals - CompTIA CASP+ - CompTIA Security+ - EC Council – CEH Certified Ethical Hacker -eLearnSecurity – eCRE Certified Reverse Engineer - IITAC – Certified Reverse Code Engineering Professional - IACRB – Certified Reverse Engineering Analyst -SmartBear – SOAPUI NG Pro less
Hire qprotex
-
engkarimismail engkarimismail
$30 USD / hour✅ Senior Network & System Administrator | Security✅ About Me I am an experienced IT professional with expertise in server administration, networking, virtualization, and security. My skill set spans managing server operating systems, configuring directory services, implementing DNS/DHCP solutions, and deploying virtualization platforms. I have a strong background in...✅ About Me I am an experienced IT professional with expertise in server administration, networking, virtualization, and security. My skill set spans managing server operating systems, configuring directory services, implementing DNS/DHCP solutions, and deploying virtualization platforms. I have a strong background in firewalls, scripting, containerization, and database management. Additionally, I specialize in mail servers, backup systems, and cloud technologies. With advanced networking skills, including Cisco routing, VLAN management, VoIP/IP telephony, and penetration testing, I am well-equipped to handle complex IT infrastructures. I am dedicated to delivering reliable solutions, ensuring data integrity, and enhancing system performance. ✅Send me now 24/7 Availability Unlimited Revisions Fast Response ✅ Server Operating Systems Windows Server (2003 to 2024) | Ubuntu | CentOS | Debian | RHEL ✅ Directory Services Active Directory | OpenLDAP ✅ DNS and DHCP Windows Server DNS | DHCP | Linux DNS | DHCP ✅ Virtualization Microsoft Hyper-V | VMware ESXi | vCenter | Proxmox VE ✅ File Servers IIS FTP | proftpd | FileZilla | FTP Server | Samba ✅ Web Servers Apache | NGINX | Microsoft IIS ✅ Scripting and Automation PowerShell scripting | Bash scripting ✅ Containers Docker | Windows Subsystem for Linux (WSL) ✅ Backup Systems Veeam Backup | Iperius Backup | UrBackup ✅ Mail Servers Mailcow | Microsoft Exchange (2000–2019) | MailWizz | Postfix | EXIM ✅ Database Servers MySQL | PostgreSQL | MariaDB ✅ Firewalls and Security MikroTik | PFSense | Cisco Firewalls ✅ Networking Skills Cisco Routing and Switching | VLANS | OSPF | VoIP and IP Telephony | Network Penetration Testing Access Control Lists (ACLs) Security (MITM Attack Mitigation) ✅ Recovery Services Password recovery for accounts and routers | Disaster recovery planning less
Hire engkarimismail
-
بسم الله الرحمن الرحيم Programmer at day.. Ethical hacker at night.. What I do : @Cyber Security: Web Applications Security, Penetration Testing, API Security, Mobile Applications Security, Software Security, Malware Removal, Systems Hardening, Server Security, Digital Forensics, NGFW solutions(FortiNet,...بسم الله الرحمن الرحيم Programmer at day.. Ethical hacker at night.. What I do : @Cyber Security: Web Applications Security, Penetration Testing, API Security, Mobile Applications Security, Software Security, Malware Removal, Systems Hardening, Server Security, Digital Forensics, NGFW solutions(FortiNet, pfSense,Palo Alto), Physical Security Consultancy @System Administration: Linux/Unix-like systems, MS Windows servers, Performance Optimization @Web Development: WordPress, Joomla, Drupal, Shopify. @Virtualization/Containerization: VMWare, Xen, VirtualBox, Docker. @Web Scraping/Automation: BeautifulSoup, Selenium. @Programming/Scripting: Python,Perl,Bash,Batch,PowerShell,VBA,AutoHotkey. @Other Services: Data Recovery, Speed Optimization, and SEO. @Trading: Deriv/Binary Bot Development. I DO NOT PROVIDE BLACK HAT SERVICES. ما شاء الله لا قوة إلا بالله less
Hire AhmadSameer
-
Hi I'm Ahmed, I'm Redhat certified administrator. I have more than 8 years of experience in Linux Systems, VMware (Virtualization). Web applications, databases. Security, Deployment, Backup and lot of skills. let's have a quick chat. Looking forward working with you.Hi I'm Ahmed, I'm Redhat certified administrator. I have more than 8 years of experience in Linux Systems, VMware (Virtualization). Web applications, databases. Security, Deployment, Backup and lot of skills. let's have a quick chat. Looking forward working with you. less
Hire Ahmedi89
-
How can I help you: ⚡ ⚒️ Server maintenance. Configuring. Optimization. Installation. Cleaning; ⚔️ Antiviral works. Malware detection and cleaning. Server protection and securing; ⛴️ Migration. From server to server. From hosting to hosting; ♒ Monitoring. I'm providing really professional monthly-basis monitoring...How can I help you: ⚡ ⚒️ Server maintenance. Configuring. Optimization. Installation. Cleaning; ⚔️ Antiviral works. Malware detection and cleaning. Server protection and securing; ⛴️ Migration. From server to server. From hosting to hosting; ♒ Monitoring. I'm providing really professional monthly-basis monitoring using my own monitoring tools which allow me see server health 24 hours a day and receive notifications if server or website is bad. Additionally, my tool can perform malware scanning almost in realtime, and warn me if malware is found. Refer to my portfolio to see how it looks. ❤️ Reputation - above of all ❤️ less
Hire wmtoolsnet