Vbulletin 372 hacking jobs
I've lost my Android device and need an ethical hacker to recover my messages and contacts. No backups are available, making this task even more critical. Specific Requirements: - Recovering SMS and email messages from my lost device - Retrieving contacts from the device Ideal Skills: - Expertise in ethical hacking and data recovery - Experience with Android systems - Excellent understanding of mobile device architecture The urgency of this task cannot be overstated. I am in desperate need of recovering this data. Please, only apply if you can deliver results promptly.
I've lost my Android device and need an ethical hacker to recover my messages and contacts. No backups are available, making this task even more critical. Specific Requirements: - Recovering SMS and email messages from my lost device - Retrieving contacts from the device Ideal Skills: - Expertise in ethical hacking and data recovery - Experience with Android systems - Excellent understanding of mobile device architecture The urgency of this task cannot be overstated. I am in desperate need of recovering this data. Please, only apply if you can deliver results promptly.
I'm looking to create a website dedicated to offering penetration testing services specifically catering to small businesses. Key Features: - A professional interface that showcases our expertise in ethical hacking - Clear, detailed descriptions of our penetration testing services - An easy-to-navigate layout that small business owners can easily understand Ideal Skills: - Web development - UX/UI design - Knowledge of cybersecurity and ethical hacking principles would be a plus Please provide examples of similar projects you've completed in your application.
Need an expert with extensive experience in rooting fitness bands, hacking firmware, & customizing them according to specific requirements. Project Details: In a standard fitness band, there is an upper HR limit and a lower HR limit. We can set them in certain bands. The upper HR limit can be set from 120 BPM to 160 BMP, whatever I wish. For example, if I have set 125 BPM. The moment the HR rate crosses the 125, it gives an alarm or vibrates the band. We want to change this basic limit range. We want to set the upper HR limit as low as 80 BPM. It means the moment I start walking fast, it will give me alert and vibrate the band. The candidate should have a past track record and experience of rooting such things and be able to perform root modifications safely and efficientl...
I'm in need of an ethical hacker to perform penetration testing on my wireless network. The main goal is to identify potential vulnerabilities that could be exploited by malicious entities. Key Details: ...mobile devices, IoT devices, and various printers and other peripherals. - The testing should be done in a controlled environment, ensuring minimal disruption to normal operations. Ideal Skills and Experience: - Proven experience in ethical hacking and penetration testing, particularly within a wireless network setup. - Strong understanding of security protocols and ability to identify vulnerabilities across a wide range of devices. - Prior work with servers, PCs, mobile devices, IoT devices, and printers is highly desirable. - Certification in ethical hacking or cy...
I am in urgent need of a seasoned Laravel developer to bolster my website's security against hacking attempts and unauthorized content duplication. My website content is being copied without any direct access to my database or files, and the situation has become critical. Key Requirements: - Content Protection: Implement measures to prevent screen scraping. - Database Security: Secure my database from potential threats. - File Security: Protecting my files from unauthorized access. Experience with Laravel is a must, and familiarity with content protection techniques is highly desirable. I have noticed that these screen scraping attempts occur at specific times, so a proactive approach to security is essential.
I am launching a business with a strong focus on providing ethical hacking, account recovery, and cybersecurity services. For this, I require a freelancer who can help me set up and manage services that adhere to legal standards while offering the feel and tools typically associated with darker aspects of the web, but in a completely legal framework. My goal is to offer white-hat hacking services and legal assistance to ensure that activities like whistleblowing and phishing simulations are done ethically and legally. - Expertise in cybersecurity and ethical hacking - Knowledgeable in legal aspects of cybersecurity and digital privacy - Experience with account recovery and security enhancement - Ability to set up secure hosting and management systems - Strong communic...
Revised version of Project ID: 39145637
My mobile device has been lost and I am in urgent need of recovering messages and contacts from it. I am seeking a professional ethical hacker who can help me with this task.
I am looking for a security expert to remediate my Sun Server NETRA T1AC200. The primary concern is preventing data breaches. Additionally, the server is at risk from both external hacking attempts as well as potential internal misuse. Currently, the only measure in place for system security is access control policies. Ideal Skills and Experience: - Proficient in server security - Experience with Sun Server NETRA T1AC200 - Knowledge of access control policies - Able to implement comprehensive security measures to mitigate risks of data breaches and unauthorized access.
I'm looking for a professional ethical hacker who can help me test the security of an Android mobile phone. Key Tasks: - Gain access to the device to evaluate its security - Identify any potential vulnerabilities - Provide a comprehensive report on findings Ideal Skills and Experience: - Proven experience in ethical hacking, particularly with Android devices - Comprehensive knowledge of mobile security - Ability to deliver clear and concise reports
...techniques, and reporting strategies that may assist in the potential retrieval of assets through lawful means. Requirements: - Extensive experience in ethical hacking, digital forensics, and cyber incident response. - Proven track record in analyzing security breaches and guiding clients on financial cybercrime esponses. - Familiarity with blockchain analytics tools and cryptocurrency transaction tracking. - Ability to provide recommendations for law enforcement reporting and compliance with cybersecurity regulations. Important Notes: ** This project strictly adheres to legal and ethical standards. We are not seeking unauthorized access, hacking, or any activities that violate local or international laws. ** We prioritize security hardening and forensic analysis to un...
I'm in need of an ethical hacker with game development experience, specifically in Unity, to conduct security testing on my PC game. Key Responsibilities: - Conduct thorough security testing on the game - Identify potential vulnerabilities and security loopholes - Provide recommendations for enhancing game security Ideal Skills and Experience: - Proven experience in ethical hacking - Strong background in game development, particularly in Unity - Expertise in identifying and mitigating security risks in PC games - Ability to provide clear and actionable security recommendations
...C-Level professionals. Key Requirements: Professional and polished design tailored for an executive audience. Incorporate an animated logo for a dynamic and engaging introduction. Use a consistent color scheme of blue and white, reflecting trust and security. Futuristic visual elements related to cybersecurity, artificial intelligence, and innovation (avoiding any references to cybercriminals or hacking stereotypes). Crisp, easy-to-read fonts and well-structured content layout for clarity. Charts, graphs, and data visualizations to effectively illustrate key insights. Subtle animations and multimedia elements to enhance engagement without overwhelming the audience. Ideal Skills and Experience: Strong experience in designing presentations for executive and corporate audiences. C...
...disaster recovery plans to ensure the safety of business data. • Performance Optimization: Implement caching, CDN (Content Delivery Network), and other performance-enhancing techniques to ensure fast loading times. 4. Security Features: • SSL Encryption: Secure the website with SSL certificates to protect data during transmission. • Firewall Protection: Integrate security measures to prevent hacking attempts and malware infections. • User Data Privacy: Ensure customer data is encrypted and stored securely, complying with privacy laws and regulations such as GDPR. 5. Testing and Quality Assurance: • Conduct rigorous testing, including functional testing, security audits, performance testing, and user acceptance testing (UAT) to ensure the website is...
...tailoring your outreach to address their specific pain points. Example: • “Struggling with Podium’s slow support? FuguTech offers the same power, better service, and lower cost. Let’s chat!” • Personalize every message—show them you’ve done your research. • Track your progress—record who you’ve contacted, responses received, and conversions. Who You Are: • Experienced in lead generation, growth hacking, or customer outreach. • Skilled in online research and competitive intelligence. • Persuasive communicator who can craft compelling, personalized messages. • Comfortable reaching out directly via social media, forums, and email. • Organized and results-driven—able to track and me...
I am looking for an authentic content writer for my blog about the routines of top performers, bio-hacking, supplements and anti-aging. I will pay you $30 per article, flat. No word count or SEO BS. This initial pay will eventually increase once we build a rapport and you and I like working together. You'll be your own boss, work on your own pace, and will have complete freedom. All I want is your best effort for my content. I am looking for long-term partners, who will treat this as their own project, so please don't apply if you are not passionate about the subjects above. I am not looking for general authors.
...down due to an SSL certificate and private key mismatch. The website is a vBulletin Forum 4 running on Apache with CWP 7 and Cloudflare. I need immediate assistance to get my site back online. - Issue: Apache won't start due to SSL mismatch - Current Situation: Website down, encountering Cloudflare 520 errors - Immediate Needs: Fix the SSL issue and restart Apache Please note, the SSL certificate was issued by my server support and I have already attempted to restart Apache without success. I am unsure of the type of SSL certificate currently in use. Ideal skills for this job include: - Deep understanding of SSL certificates and private keys - Proficiency in Apache server configuration - Experience with vBulletin Forums and CWP 7 - Familiarity with Cloudflare sett...
I'm seeking an ethical hacker with experience in testing WhatsApp's security. The primary focus will be on identifying security vulnerabilities. Ideal skills and experience: - Strong background in ethical hacking - Proven experience with WhatsApp security, facebook and instagram - Excellent problem-solving skills - Ability to provide comprehensive security reports
...professional, particularly an ethical hacker, to assist in recovering stolen images and videos from my personal smartphone. Your expertise in the following areas will be crucial: - Data Recovery: Your ability to retrieve lost or stolen content will be put to the test. - Digital Forensics: I need someone who can meticulously analyze the situation and track down the compromised content. - Ethical Hacking Techniques: Your skills in this area will be vital in executing strategies to recover the stolen images and videos. I am unsure of the smartphone's operating system, which adds an additional layer of complexity to this task. Therefore, versatility and adaptability are key. Experience with both iOS and Android systems is a plus. Please note that the content was stolen from...
I'm experiencing severe resource load issues on my cPanel VPS server at Vultr. All of my websites are going down and I'm receiving a high volume of hacking attempts. I need an expert to investigate the cause of the high resource usage and to assess the security of my websites against possible malware infections. - Server Resource Optimization: The primary goal is to identify what is causing the high resource usage on my server and making all my websites go down. - Website Security: I am particularly concerned about potential malware infections, given the frequency of hacking attempts I'm experiencing. - Recent Scans: I have recently scanned my server for malware using cPanel tools, but I suspect that more in-depth investigation is needed. Ideal candidates f...
...creation.** ✔️ Strong understanding of **AI-generated models & AI-assisted content** (preferred but not required). ✔️ Knowledge of **affiliate marketing, paid ads, and lead generation** to maximize revenue. ✔️ Ability to **hire and manage a team** of content creators, chat operators, and engagement specialists. ✔️ Experience with **automation tools, AI chatbot integration, and engagement hacking.** ✔️ **Proficiency in analytics & KPI tracking** to optimize engagement and revenue. ✔️ Creative mindset with a deep understanding of social media trends & psychology. ✔️ Ability to **scale an agency to $30K/month+ in revenue.** ### **? Compensation:** ? **Competitive salary + commission-based bonuses** tied to revenue growth. ? How to Apply:** If you...
I'm in need of a skilled ethical hacker and bug tester for my website. The primary goal of this project is to identify any potential vulnerabilities that could be e...and bug tester for my website. The primary goal of this project is to identify any potential vulnerabilities that could be exploited by malicious actors. The scope of this project includes testing the document upload functionality for vulnerabilities. This is a key part of the website that needs to be secure. Ideal skills and experience for this job include: - Proven experience in ethical hacking and bug testing - Proficiency in identifying vulnerabilities in web applications - Familiarity with testing document upload functionalities - Ability to provide a comprehensive report on findings and recommendations f...
...(deposits, withdrawals, transaction tracking). Dashboard with analytics, reports, and user activity tracking. 4. Payment Gateway Integration Secure integration of multiple payment gateways (UPI, Paytm, Razorpay, Crypto, etc.). Fast deposit and withdrawal processing. Transaction logs accessible via the admin panel. 5. Security & Compliance Secure user authentication and data encryption. Prevention of hacking, cheating, or fraudulent activities Technology Stack Preferences: API Integration: Betting API for IPL Cricket Payment Gateways: UPI, Paytm, Razorpay, Project Budget & Timeline: Estimated Budget: ₹60,000 - ₹70,000 INR Expected Completion: Within 2 weeks Required Freelancer Skills: Prior experience in casino game development or betting websites. Expertise in ...
...and Denial of Service (DoS) attacks. Key Requirements: - Extensive experience in penetration testing - Proficiency in identifying and mitigating SQL Injection vulnerabilities - Expertise in spotting Cross-Site Scripting (XSS) weaknesses - Skills in assessing the site’s resilience against Denial of Service (DoS) attacks - Familiarity with creating comprehensive security audit reports - Ethical hacking certification would be a plus Please note that this project does not have specific compliance requirements, however, understanding of GDPR and HIPAA could be beneficial. The main goal of this assessment is to identify potential vulnerabilities and provide solutions to reinforce the site’s security. Your role will be crucial in ensuring the safety and integrity of my we...
...and Denial of Service (DoS) attacks. Key Requirements: - Extensive experience in penetration testing - Proficiency in identifying and mitigating SQL Injection vulnerabilities - Expertise in spotting Cross-Site Scripting (XSS) weaknesses - Skills in assessing the site’s resilience against Denial of Service (DoS) attacks - Familiarity with creating comprehensive security audit reports - Ethical hacking certification would be a plus Please note that this project does not have specific compliance requirements, however, understanding of GDPR and HIPAA could be beneficial. The main goal of this assessment is to identify potential vulnerabilities and provide solutions to reinforce the site’s security. Your role will be crucial in ensuring the safety and integrity of my w...
My ex's girlfriend has been invading my privacy by hacking into my Gmail, social media accounts, and phone apps. I need a professional who can help me document this activity and collect evidence to support a potential prosecution. Skills and Experience Required: - Cybersecurity expertise - Experience with evidence collection for legal purposes - Familiarity with Gmail's security protocols - Knowledge of social media privacy settings and potential breaches - Ability to document findings in a clear, concise manner
Title: Bug Bounty Program for Vulnerability Detection on Paper Trading Platform Description: We are seeking experienced cybersecurity professionals for a bug bounty program on our paper trading platform. Our website faces frequent attacks such as DDoS and other hacking attempts, and we need experts to identify vulnerabilities and recommend fixes on an authorized basis. Project Details: • Authorized Testing: You will receive a demo account after signing an NDA. • Scope: Assess the website’s security including vulnerability testing, penetration testing, and evaluating resistance to DDoS attacks. • Rewards: Compensation will be based on the number and severity of vulnerabilities discovered. More critical issues will result in higher rewards. • Requirements:...
I'm looking for an ethical hacker who can help me to identify vulnerabilities on my website. The primary focus should be on assessing the integrity and security of our data storage and retrieval systems. The ideal candidate for this project should have: - Extensive experience in conducting vulnerability assessments - Proficiency in ethical hacking techniques - Expertise in various data storage systems, including relational databases, NoSQL databases, and file-based storage. Your task will be to identify potential weaknesses and suggest improvements to bolster our website's security.
I'm looking for someone who will create 2 excel sheets with a lists: 1. 100 ebooks, books (english only) about pentesting, cybersecurity, hacking, red team etc., specially with actual discount. Sheet must have columns: Book title | Author | URL (could be Amazon, Etsy etc.) | Normal price $ | Discount price $ | Very short description 2. 50 courses (english only) about pentesting, cybersecurity, hacking, red team etc., specially with actual discount. Sheet must have columns: Course title | Author | URL (could be Udemy, Coursea etc.) | Normal price $ | Discount price $ | Very short description
I run a paper trading website which has been subjected to repeated hacking attempts. I'm looking for an expert in cyber security to assess and bolster the security of my site. Ideal Skills and Experience: - Comprehensive understanding of website security protocols - Proven experience in preventing hacking attempts - Ability to implement robust security measures - Familiarity with safeguarding paper trading platforms - Excellent problem-solving skills
...creators, and gambling communities to drive engagement. • Social Media Ads – Run and optimize paid Facebook, Instagram, and TikTok ads targeting users in AUS/NZ. • Affiliate Marketing Promotion – Help push our affiliate program, where users can earn money simply by sharing their referral link. • Viral Content & Engagement – Create engaging and persuasive content that drives conversions. • Growth Hacking – Use creative marketing strategies to boost sign-ups and deposits. Who We’re Looking For: • Experienced in social media marketing, influencer outreach, or paid advertising in the gambling niche. • Familiar with crypto and online gambling markets. • Has a network of influencers or access to advertising pl...
I'm in a bit of a bind and need immediate assistance. My company profile on an opinion portal has been targeted with negative reviews. Unfortunately, I do not have access to the account that created the profile, making this situation even more critical. Ideal Skills: - Cybersecurity - Digital Reputation Management - Hacking (Ethical) - Account Recovery - Crisis Management Please note, this is not a job for a regular freelancer. I need someone who can help me rectify this situation urgently.
I'm looking to develop a robust website for my network marketing initiative, primarily focused ...monitor and manage our network growth. Security Features: - Implement top-notch data encryption to protect sensitive information. - Establish a reliable user authentication system to ensure that only approved individuals have access to the site. - Schedule regular security audits to identify and rectify potential vulnerabilities. - Ensure all-rounded security measures are in place to prevent hacking or copying attempts. Ideal candidates for this project should have extensive experience in web development with a specific focus on network marketing sites. They should also possess a strong understanding of cybersecurity, with proven skills in implementing and managing high-level sec...
...Player-run black markets, AI-powered police investigations. ### **Sci-Fi Enhancements** - Cybernetic body modifications. - AI-driven street gangs. - Black-market cybernetic implants. ### **Fortnite-Inspired Events** - Personalized in-game concerts. - Real-time world changes based on community participation. ### **In-Game Mobile Phone** - Call contacts, organize heists, enter cheat codes. - Dynamic hacking mechanics. - Cryptocurrency and digital economy. --- ## **Phase 9: Final Integration & Polishing** - AI-based bug detection & automated testing. - AI-assisted player retention system. - Community & modding support. - AI-powered in-game mod tutorials. - AI-generated documentation. --- ## **Milestones & Deliverables** - **Milestone 1:** Core mechanics, terra...
I need a cybersecurity expert to investigate my smart devices which I suspect have been compromised. The hacking seems to be happening through Bluetooth. It appears all of my smart devices are affected. Key Responsibilities: - Identify any breaches in my devices. - Recover any compromised information. - Provide evidence of the hacking to prove my innocence. Skills and Experience: - Proven experience in cybersecurity, specifically with smart devices. - Proficient in data recovery. - Able to provide clear evidence of findings. Be careful opening please I’m not trying to spread it please help me call it’s a lot It’s not allowing me to attach certain files please I’m begging you help clear and save my kids and I please The files I have screenshot...
...Specific Issue: I have detected unrecognized devices or locations accessing my account, which raises suspicion of hacking attempts. - Actions Taken: I have taken several steps to secure my account including changing my password, enabling two-factor authentication and reviewing all my security settings. - Required Access: I need to grant you full access to my Gmail account, including all email and settings. - Would like to identify what device conintues to gain access to my accounts and what they have done/accessed in my gmail account and drive. Ideal Skills and Experience: - Expertise in cybersecurity, particularly with Gmail. - Proven track record of identifying and resolving hacking attempts. - Ability to enhance security measures and prevent future breaches. - Excelle...
We’re seeking an expert to complete a technical **assessment** involving Large Language Models (LLMs), API integration, and cybersecurity analysis. The project includes 8 components requiring Python scripting, creative prompt engineering, and ethical hacking strategies. Scope of Work 1. Environment Configuration: Set up a cloud VM (Google Cloud) or local LLM (e.g., Ollama). 2. Poetry Generation: Develop a Python script using LLM APIs to generate a Knoxville-themed haiku, including parameter tuning (e.g., temperature, top-k). 3. LLM Analysis: Investigate model training data, architecture, and image preprocessing for multi-modal models. 4. Step-by-Step Reasoning: Use chain-of-thought prompting to geolocate an image via LLM analysis. 5. Security Bypass & Email Craf...
I'm seeking help with an assignment focused on API security. The tasks involve working with Swagger, manipulating JWTs, exploiting security vulnerabilities, and retrieving specific flags. Key tasks include: - Interacting with API endpoints (specific ones not disclosed) - Analyzing and modifying JWT tokens - Exploi...JWTs, exploiting security vulnerabilities, and retrieving specific flags. Key tasks include: - Interacting with API endpoints (specific ones not disclosed) - Analyzing and modifying JWT tokens - Exploiting security flaws - Bypassing security - Retrieving specific flags The testing will be conducted in a VM environment. Ideal skills for this project: - Proficiency in API security and ethical hacking - Familiarity with Postman, , and API testing - Basic scripti...
...Process- With Fix Payout) Nature Of work: - Response to queries of the USA based customer. Chats Center will get an admin portal where they can chat with the customer. PC Required: 6 Contract period: 11 Months Working Day: 28 Days Shift: 9 Hour as per USA time Zone Submission: Daily Pay Out: $11 / hour/Per Agent Billing: - $11 x 9 hours x 6 Heads Example:- If a USD Rate is 69.00 (INR) (372 INR ) x 9Hrs x 6 Heads = 297600 Per day If center runs 26 days in a month then - 29760*26 = 773760/- Approx Payment: After Invoice within 10 working Days Payment Cycle: 20 Day PAY CHANNEL: SWIFT Transfer Advance Billing: Available from Client after days of going Live Sign up with: - End client based in the USA and sign up will be at vendor’s office in India Training: Tra...
...in need of a skilled digital forensics expert to help me uncover the source of malicious activity affecting our Google reviews on Google My Business. The ideal candidate for this project should have: - Proven experience in digital forensics, particularly in tracking online activity and uncovering the identity of individuals or businesses engaging in harmful behavior - Strong skills in ethical hacking and IT security analysis - Proficient knowledge of Google My Business and its review system - Excellent problem-solving skills and attention to detail Your primary task will be to determine who is responsible for reporting and causing the deletion of our reviews, with a focus on discovering the identity of the culprit. I want to understand the person or business behind this malici...
I'm seeking a seasoned professional with ethical hacking skills to conduct a comprehensive security assessment on my application. The primary goal is to identify any potential vulnerabilities that could be exploited by malicious entities. Key Requirements: - Expertise in penetration testing and vulnerability assessment - Proficient in application security testing - Ability to provide a detailed report on findings and recommendations for mitigation
...art business. - Content: Create a content calendar that reflects my brand and appeals to a global audience. - Analytics: Use social media analytics to track progress and adjust strategies as needed. The ideal candidate will have experience with: - Social media management and strategy for artists or creative businesses. - Engaging content creation that resonates with diverse audiences. - Growth hacking techniques to organically increase social media reach. - Knowledge of current social media trends and how they can be leveraged for art promotion. I am starting from scratch with an emphasis on authenticity and creativity. I'm looking for someone who is not only skilled in social media marketing but also has an appreciation for art and understands how to communicate with an a...
I need a comprehensive security upgrade for my CCTV system to combat various threats including unauthorized access, data tampering, and privacy issues. Key Requirements: - Assess and fortify the current security measures in place (a firewall is currently in use). - Implement robust anti-hacking solutions tailored for an analog, digital IP, and hybrid CCTV system. - Address potential vulnerabilities related to unauthorized access, data tampering, and privacy breaches. Ideal Skills and Experience: - Extensive experience with CCTV systems: both analog and digital IP. - Proven track record in cybersecurity, particularly in fortifying surveillance systems. - Familiarity with privacy protection measures in the context of CCTV.
Remote - GHOST developer A high-stakes experiment is underway to PROVE that Replit and Flutter can power a world-class app—and we’re looking for one insanely talented "GHOST" developer to make it happen. The Challenge: You will single-handedly build, deploy, and test a cutting-edge app that merges social media, livestreaming, video, audio, DeFi, ethical hacking, and crypto payments—entirely in the cloud. This is not just another mobile app. It involves real-time geofencing, blockchain-based rewards, penetration testing, and advanced cryptographic integrations that push the limits of high-performance cloud-based development. Due to low-latency requirements and potential top-secret elements, this opportunity is only open to developers in the UK, USA, Pu...
I'm looking for a skilled web developer to create a sophisticated e-commerce site dedicated to Bio Hacking Beauty Aesthetic. The primary goal of this webpage is to sell high-quality skincare products, supplements, and beauty devices. Key Features Needed: - Luxurious and elegant design: The site should reflect a high-end aesthetic, appealing to a target market interested in luxury beauty and wellness products. - User-friendly E-commerce functionality: The site should include seamless shopping cart, payment gateway, and customer service features. - Product showcase: High-quality images and descriptions for skincare products, supplements, and beauty devices are essential. - Should be able to connect some sort of tracking, statistics cheking. - Also connect some recomended to use...
...Process- With Fix Payout) Nature Of work: - Response to queries of the USA based customer. Chats Center will get an admin portal where they can chat with the customer. PC Required: 6 Contract period: 11 Months Working Day: 28 Days Shift: 9 Hour as per USA time Zone Submission: Daily Pay Out: $11 / hour/Per Agent Billing: - $11 x 9 hours x 6 Heads Example:- If a USD Rate is 69.00 (INR) (372 INR ) x 9Hrs x 6 Heads = 297600 Per day If center runs 26 days in a month then - 29760*26 = 773760/- Approx Payment: After Invoice within 10 working Days Payment Cycle: 20 Day PAY CHANNEL: SWIFT Transfer Advance Billing: Available from Client after days of going Live Sign up with: - End client based in the USA and sign up will be at vendor’s office in India Training: Tra...
...Process- With Fix Payout) Nature Of work: - Response to queries of the USA based customer. Chats Center will get an admin portal where they can chat with the customer. PC Required: 6 Contract period: 11 Months Working Day: 28 Days Shift: 9 Hour as per USA time Zone Submission: Daily Pay Out: $11 / hour/Per Agent Billing: - $11 x 9 hours x 6 Heads Example:- If a USD Rate is 69.00 (INR) (372 INR ) x 9Hrs x 6 Heads = 297600 Per day If center runs 26 days in a month then - 29760*26 = 773760/- Approx Payment: After Invoice within 10 working Days Payment Cycle: 20 Day PAY CHANNEL: SWIFT Transfer Advance Billing: Available from Client after days of going Live Sign up with: - End client based in the USA and sign up will be at vendor’s office in India Training: Tra...