Computer Security Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 98,050 reviews, clients rate our Computer Security Consultants 4.9 out of 5 stars.
Hire Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 98,050 reviews, clients rate our Computer Security Consultants 4.9 out of 5 stars.
Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    46 jobs found

    I'm seeking a seasoned Ubuntu system administrator with a strong focus on security. The primary task revolves around configuring the UFW (Uncomplicated Firewall) to bolster my system's defenses. Key Responsibilities: - Oversee and manage the Ubuntu system. - Implement robust firewall configurations using UFW. Ideal Skills: - Extensive experience in Ubuntu system administration. - In-depth knowledge and hands-on experience with UFW. - Strong understanding of firewall configurations and security measures. - Excellent troubleshooting and problem-solving skills.

    $18 / hr Average bid
    $18 / hr Avg Bid
    27 bids

    I'm seeking a seasoned expert in penetration testing who can thoroughly evaluate my website's security. Key Focus Areas: - User Authentication: Assess the security measures in place for user login and registration processes. - Database Security: Investigate potential vulnerabilities in my website's database. Main Objective: The primary goal of this penetration test is to identify any possible security vulnerabilities that could be exploited by malicious entities. Ideal Skills and Experience: - Proven experience in penetration testing, particularly on websites. - Excellent understanding of user authentication systems and database security. - Ability to provide a comprehensive report detailing any identified vulnerabilities and recommended solutions.

    $643 Average bid
    $643 Avg Bid
    13 bids

    I'm seeking an expert for setting up a Data Loss Prevention (DLP) policy in Microsoft Purview for browsers and devices for a group of users

    $16 / hr Average bid
    $16 / hr Avg Bid
    9 bids

    We are seeking an experienced Ethereum Smart Contract Security Analyst to conduct a thorough security assessment of our decentralized finance (DeFi) application. The ideal candidate will possess a deep understanding of Ethereum smart contracts and demonstrate a proven track record in identifying and mitigating vulnerabilities. Key Responsibilities: Perform comprehensive security analysis of smart contracts within the DeFi application. Identify potential vulnerabilities, focusing on reentrancy attacks and access control issues. Evaluate the overall security posture of the application and recommend improvements. Collaborate with the development team to implement security best practices. Document findings and provide detailed reports on vulnerabilities and remediation strategies. Key Requir...

    $44 / hr Average bid
    $44 / hr Avg Bid
    10 bids

    I'm seeking a professional with expertise in network security and machine learning, specifically focused on enhancing intrusion detection systems. Key responsibilities: - Develop a machine learning model to improve our current network intrusion detection system. - Propose strategies for data acquisition and model training. Ideal Skills: - Extensive experience in network security. - Proficiency in machine learning and data science. - Previous experience with intrusion detection systems. - Strong problem-solving and analytical abilities. - Excellent communication skills for explaining complex concepts in simple terms.

    $246 Average bid
    $246 Avg Bid
    4 bids

    I'm in need of a seasoned professional with extensive knowledge and experience in Linux and networking tasks. Key Areas of Expertise: - Proficient in handling various Networking Protocols including TCP/IP, DNS, and HTTP/HTTPS. - Experienced in Security and Firewall Management, with an ability to handle: * Intrusion Detection and Prevention * Firewall Configuration * VPN Setup Ideal candidates should have the ability to troubleshoot and optimize network performance, ensuring robust security measures are in place to protect against potential threats. Experience with Linux server configuration is a plus.

    $21 / hr Average bid
    $21 / hr Avg Bid
    19 bids

    I'm looking for a medium-skilled IT professional based in China, who can test our cloud-based VR system using a VR headset. The primary focus will be on identifying any firewall issues that could impact the user experience. Key Responsibilities: - Access the cloud-based VR system using a VR headset - Conduct tests to identify potential firewall issues - Provide comprehensive feedback on findings Ideal Skills: - Medium-level IT expertise - Access to a VR headset - Based in China - Understanding of cloud-based systems - Ability to conduct thorough testing and provide detailed feedback Please note, the specific aspects of the software that need to be tested have not been outlined. Therefore, the tester will need to use their initiative and IT knowledge to conduct comprehensive testing...

    $165 Average bid
    Urgent
    $165 Avg Bid
    12 bids

    NOTE: Please read WELL the entire project description carefully before submitting any offers or applying for the position. Only candidates who meet all the outlined requirements will be considered. We are seeking an experienced freelance security expert proficient in Kali Linux or equivalent security software to collaborate on a critical project focused on comprehensive security testing and hardening of our systems. The candidate should be skilled in conducting a variety of security assessments, including penetration tests, stress tests, and other relevant security measures. KEY RESPONABILITY: --Security and Penetration Testing: Conduct extensive security assessments of our network and systems to identify potential vulnerabilities, misconfigurations, and weaknesses. --Stress Testing: P...

    $2 - $8 / hr
    Sealed
    $2 - $8 / hr
    6 bids

    I'm experiencing weak wifi signals in certain areas of my house. - Current Setup: I have a single router - Problem Areas: Upstairs rooms, the backyard, and a granny flat I'm looking for an expert who can help enhance my home wifi coverage. Ideally, the professional should have experience with setting up routers, extenders, or even a mesh network if required.

    $283 Average bid
    $283 Avg Bid
    20 bids

    I am seeking a professional to assist with the installation and setup of a hybrid (wired and wireless) telecommunications network in a residential area. Ideal candidates should have: - Extensive experience in network installation and setup - Knowledge and skills in both wired and wireless network systems - Previous work in residential area network setup - Ability to deliver high-quality telecommunication services and support The project will primarily focus on the following: - Installing and setting up a robust hybrid network that can serve a residential area efficiently - Ensuring the network is reliable, secure, and capable of meeting the demands of a typical household - Providing post-installation support and service as required Please provide evidence of your previous work and rel...

    $28 Average bid
    $28 Avg Bid
    14 bids

    We are seeking a skilled Ethical Hacker or Cybersecurity Specialist to assess the security of our email systems. Your role will be to identify vulnerabilities and help improve the system’s defenses to protect sensitive data. Responsibilities: Perform penetration testing on email systems to identify weaknesses. Simulate cyberattacks like phishing or malware to test security. Provide a detailed report of vulnerabilities and solutions. Requirements: Proven experience in ethical hacking or penetration testing. Strong knowledge of email security protocols (SMTP, IMAP, POP3). Familiarity with security tools (e.g., Metasploit, Wireshark). Certifications like CEH or Security+ are a plus.

    $285 Average bid
    $285 Avg Bid
    9 bids

    I'm looking for a skilled cybersecurity professional to help me enhance my Linux server's security. My server is currently protected by a firewall, but I've been facing several threats including DDoS attacks, brute force attempts, and SQL injection attempts. The ideal freelancer for this project should have: - Proficient knowledge in Linux server management - Extensive experience in cybersecurity, specifically in defending against DDoS attacks, brute force attacks, and SQL injection attacks - Skills in configuring and optimizing firewalls - Experience in implementing additional security measures beyond a basic firewall The goal of this project is to effectively block any attempts to timeout my server and to secure it against potential future attacks. Please provide your ...

    $31 Average bid
    $31 Avg Bid
    16 bids

    I'm transitioning from a Fortigate to a Ubiquiti firewall for my small business and need assistance. Candidate must be in the Washington, D.C. area. This will require an on-site visit. - Primary Purpose: The router's primary use will be for a small business, so it should be capable of handling the typical traffic and demands of a small company. - Specific Functions: The main function of the new Ubiquiti firewall will be to replace my current Fortigate firewall. This includes setting up the network and ensuring all configurations are suitable for a small business environment. - Critical Features: One of the key features I need replicated from the Fortigate firewall is the Intrusion Detection/Prevention system. It's crucial for the security of my business that we can moni...

    $495 Average bid
    $495 Avg Bid
    21 bids

    I'm seeking a professional to help set up a small network and a secure, efficient Remote Access VPN for my small business operations. The VPN needs to adhere to enterprise-grade security measures, ensuring all our sensitive data is well protected. Ideal Skills and Experience: - Extensive knowledge in network setup and management - Proven experience with configuring Remote Access VPNs - Expertise in implementing enterprise-grade security measures - Familiarity with multi-factor authentication systems - Strong understanding of encryption methods and protocols

    $244 Average bid
    $244 Avg Bid
    18 bids

    I'm seeking a professional with experience in penetration testing and real-time system monitoring, specifically focused on various social media platforms. The primary objective of this project is to monitor systems in real-time, with a specific focus on the following platforms: - Facebook - Instagram - Whatsapp - Snapchat - Tiktok The ideal freelancer for this project should possess: - Expertise in penetration testing - Experience in real-time system monitoring - Familiarity with the social media platforms listed above Please include relevant past project examples in your bid.

    $130 Average bid
    $130 Avg Bid
    6 bids
    Trophy icon security services company sketch
    16 days left

    I need a shoulder patch for a security services company. The idea is a security officer on the lower foreground of the patch with a city scape view behind him with blue skys. In the sky between the buildings is an owl facing forward flying above the officer. In a circle around the top outside edges of the patch reads, Reliable Security Plus, at the bottom reads *License C20318 *

    $20 Average bid
    Guaranteed
    $20
    9 entries

    We have an immediate need for a temporary assignment requiring an experienced network engineer for on-site assistance in Tempe, AZ. The selected freelancer will be responsible for the diagnosis and remediation of Cisco routers, switches, and Meraki cloud-managed devices. The engineer will also troubleshoot and maintain the network to ensure smooth operations. You will be working as a sub-contractor to an MSP/MSSP based in NJ. Ideal skills and experience include: - Proficiency in Cisco and Meraki products - Strong troubleshooting and maintenance skills - Previous experience with network setup and configuration - Ability to work on-site in Tempe, AZ.

    $50 / hr Average bid
    $50 / hr Avg Bid
    4 bids
    email + website security
    4 days left
    Verified

    for a client looking for a complete security setup regarding website and mailing and other things if necessary

    $19 / hr Average bid
    $19 / hr Avg Bid
    25 bids

    I require a thorough computer forensics investigation and report. The investigation should be conducted on both Linux and Windows operating systems. The report should be structured in clear steps and main points, including: - partition preparation - Acquire Data using DD tool - Acquire Data using DCFLDD tool The primary goal of this investigation is to produce a comprehensive report. The level of detail required in the report is a step-by-step guide. Ideal candidates for this project should have: - Extensive experience in computer forensics and investigations. - Proficiency in both Linux and Windows operating systems. - Expertise in using DD and DCFLDD tools. - Excellent report writing skills, particularly in creating step-by-step guides.

    $97 Average bid
    $97 Avg Bid
    22 bids

    Due to frequent high traffic spikes, I need an experienced GCP specialist who can help manage my servers to ensure smooth operation. The primary service in use is Google Compute Engine. Key Responsibilities: - Implement auto-scaling configurations to handle traffic spikes efficiently - Set up performance monitoring and alerts to track server health and performance in real-time Ideal Skills and Experience: - Extensive knowledge and experience with Google Cloud Platform, specifically Google Compute Engine - Proven expertise in configuring auto-scaling and performance monitoring systems - Strong problem-solving skills to address server load issues proactively I am looking for a professional who can ensure seamless server management during peak traffic times.

    $91 Average bid
    $91 Avg Bid
    5 bids

    I require a thorough computer forensics investigation and report. The investigation should be conducted on both Linux and Windows operating systems. The report should be structured in clear steps and main points, including: - partition preparation - Acquire Data using DD tool - Acquire Data using DCFLDD tool The primary goal of this investigation is to produce a comprehensive report. The level of detail required in the report is a step-by-step guide. Ideal candidates for this project should have: - Extensive experience in computer forensics and investigations. - Proficiency in both Linux and Windows operating systems. - Expertise in using DD and DCFLDD tools. - Excellent report writing skills, particularly in creating step-by-step guides.

    $113 Average bid
    $113 Avg Bid
    24 bids

    I need a professional to establish a new network for our multi-building church. The network's primary purpose is to provide Internet access for our staff and visitors. Key Requirements: - Connecting 4-6 buildings - Ensuring network accessibility for various devices: computers, laptops, mobile devices, and printers. Ideal skills and experience for the job: - Proven experience in setting up multi-building networks - Strong knowledge about network connectivity for different types of devices - Excellent troubleshooting skills. Please provide a detailed plan on how you would approach this task.

    $596 Average bid
    Local NDA
    $596 Avg Bid
    5 bids

    I need a skilled technician to help repair both my desktop computers and laptops. They are experiencing a range of issues across hardware, software and performance. Ideal skills and experience: - Proficiency in diagnosing and repairing hardware issues - Expertise in troubleshooting and fixing software problems - Experience in optimizing performance-related concerns - Knowledge of both desktop computers and laptops - Excellent communication skills to explain issues and solutions

    $309 Average bid
    $309 Avg Bid
    10 bids

    I'm experiencing an issue with my Windows RDP where a virus keeps reappearing after a few hours of being removed. I need an expert who can help fix the automatic removal process. Ideal skills for the job include: - Expertise in Windows RDP - Experience with virus removal and prevention - Knowledge of Windows operating system Please note that the specific antivirus software in use has not been disclosed. Therefore, a broad knowledge of virus management on Windows systems will be beneficial.

    $132 Average bid
    $132 Avg Bid
    13 bids

    I'm looking for someone to help me set up restrictions on my kid's PC/laptop to control their computer usage. Key Requirements: - Internet Access: I want to restrict my child's access to the internet. - Screen Time: I need assistance in setting daily limits on screen time. Ideal Skills: - Experience with parental control software Bark specifically. - Knowledge of PC/laptop and iPad settings and configurations. - Ability to guide me through the process in clear, simple terms.

    $21 / hr Average bid
    $21 / hr Avg Bid
    11 bids

    I'm looking for an expert to integrate multiple open-source security software into a single, comprehensive package. The software to be integrated includes antivirus, firewall, anti-malware, tuning, and network security tools. The package should be capable of blocking suspicious or harmful websites. ClamAV: A well-known antivirus engine that can be integrated into various applications. Fail2ban: A security tool that helps prevent brute-force attacks by blocking IP addresses that attempt to log in unsuccessfully. Snort: An intrusion detection system (IDS) that can monitor network traffic for suspicious activity. Suricata: Another IDS that offers high performance and flexibility. Firestarter: A firewall configuration tool that can create and manage firewall rules. Skills and Experience R...

    $566 Average bid
    $566 Avg Bid
    28 bids

    I am seeking an experienced Network Security Expert to secure our live streaming platform hosted on an Ubuntu server. The ideal candidate will have a proven track record in preventing unauthorized access, mitigating threats, and implementing robust security measures to safeguard our streaming services from potential hacking attempts. IT security expert to carry out the following tasks: - Enable Web Application Firewall (WAF) on our web portals and both internal and external APIs. - Conduct a thorough check on our Linux server to identify open ports and disable any that are not required. - Install ClamAV, our preferred antivirus software, and perform a complete system scan. - Provide cybersecurity awareness training for our employees, focusing on identifying and preventing phishing atta...

    $144 Average bid
    $144 Avg Bid
    25 bids

    I'm seeking a seasoned cybersecurity expert to conduct a thorough security audit of my network, with a specific focus on penetration testing. Key Responsibilities: - Perform a comprehensive security audit of my network. - Conduct penetration testing to identify potential vulnerabilities. Ideal Skills: - Extensive experience in network security. - Proficient in conducting security audits and penetration testing. - Up-to-date with the latest cybersecurity threats and solutions.

    $20 / hr Average bid
    $20 / hr Avg Bid
    16 bids

    I'm looking for a seasoned professional with extensive experience in security testing using Kali Linux. The main focus will be on network scanning and penetration testing. Key Responsibilities: - Conduct comprehensive security assessments using Kali Linux. - Customize and utilize the nslookup tool for specific security tasks. - Perform extensive network scanning and penetration testing. Ideal Skills: - Proficiency in Kali Linux and its security testing tools. - Strong experience in network scanning and penetration testing. - Skill in customizing tools for specific security needs. Your expertise can help enhance the security of our systems and protect against potential threats. Please reach out if you have the relevant experience and skills. DONOT APPLY BEFORE READING THIS BELOW: ...

    $11 / hr Average bid
    $11 / hr Avg Bid
    15 bids

    I need a digital token that can control both physical and digital access, with top-tier AES encryption for security. The token will play a crucial role in ensuring secure entry to buildings as well as software and data access. Key Requirements: - Development of a digital token - Implementation of AES encryption - Incorporation of both physical and digital access control features Ideal Skills and Experience: - Expertise in encryption technologies, particularly AES - Experience in developing secure access control systems - Previous work with digital token creation

    $719 Average bid
    $719 Avg Bid
    9 bids

    I need a file scanning tool for my website, similar to VirusTotal. This tool will allow users to upload files which will be scanned by 10 different antivirus engines. The engines to be used are McAfee, Bitdefender, Norton, Kaspersky, Avast, AVG, Sophos, Trend Micro, ESET, and Windows Defender. maybe more Key Features: - Detailed Reporting: The scan results will be displayed in a comprehensive, detailed report. - File Size Management: The system will reject any files that are too large to scan. The ideal candidate for this project should have a strong background in web development and cybersecurity. Experience with developing file scanning software or similar systems is highly desirable. Please include examples of relevant work

    $431 Average bid
    $431 Avg Bid
    90 bids

    Note: Project is already in progress and need help in completing it. Can provide current working documents. I'm in need of an expert who can help me complete the first draft of a project covering various aspects of vehicular networks and their vulnerabilities to cyber attacks, as well as the benefits of GenAI in this context. The project should be comprehensive and include detailed discussions on algorithms, experiments comparing machine learning to GenAI, and a solid conclusion with references. project is already in progress and need help in completing it. Can provide current work documents Key points to cover: -Background of Vehicular Networks -Cyber attacks on Vehicular Networks -Current solutions and challenges on cyber attacks of Vehicular Networks -Background of GenAI -How ca...

    $128 Average bid
    $128 Avg Bid
    33 bids

    I'm looking to hire ethical hackers to identify vulnerabilities in my web applications. The primary goal is to ensure the security of my systems against potential threats. Key Requirements: - Expert in identifying vulnerabilities in web applications - Proficient in testing for SQL injection, Cross-site scripting (XSS), and Broken authentication Ideal Skills: - Ethical hacking certification - Experience in web security - Proficiency in penetration testing tools - Strong knowledge of cybersecurity best practices

    $537 Average bid
    $537 Avg Bid
    34 bids

    I'm in need of a certified forensic examiner to pull specific documents from a point of sale software. The primary purpose of this examination is for a criminal case to prove authenticity verification. Ideal candidates for this project must: - Be certified forensic examiner - Be able to provide verification of document authenticity from point of sale software - Be available for the slight chance needed to testify in court via zoom

    $19 / hr Average bid
    $19 / hr Avg Bid
    26 bids

    I've faced multiple security breaches recently and need a professional to secure my home network and devices. Devices requiring security: - Computers - Smartphones/Tablets - Router Essential Security Features: - Firewall protection - Antivirus software - Intrusion detection Ideal Skills and Experience: - Proven experience in home network security - Proficient in setting up firewall protection and antivirus software - Expertise in intrusion detection systems - Ability to provide preventative solutions against potential future breaches.

    $18 / hr Average bid
    $18 / hr Avg Bid
    20 bids

    I'm looking for an expert in Ethereum smart contracts security to analyze overall DeFi application for vulnerabilities. Key Requirements: - Comprehensive analysis of the smart contract with a focus on identifying reentrancy attacks and access control issues - Expertise in Ethereum smart contract - Experience in DeFi applications - Proven track record of identifying and resolving smart contract vulnerabilities

    $534 Average bid
    $534 Avg Bid
    9 bids

    I'm looking for a professional to assist in the setup and configuration of a Local Area Network (LAN). The network should be able to connect: - Computers and laptops - Printers and scanners - Network storage devices Ideal candidates for this project should have robust experience in network setup and configuration. Please include any relevant certifications or experiences in your bid.

    $88 Average bid
    $88 Avg Bid
    21 bids

    I need a professional with extensive experience in Windows EFS encryption to secure my files and folders. The project should include: - Setting up encryption on Windows to protect specific files and folders. - Ensuring that the encryption includes automatic backup of encrypted files. - Configuring the system for multi-user access while maintaining security. Ideal candidates should have proven skills in data protection, Windows systems, and experience with EFS. Please provide examples of similar projects you've completed.

    $649 Average bid
    NDA
    $649 Avg Bid
    21 bids

    I need an ethical hacker to investigate a security breach. The specifics of the systems affected are currently unclear, but we suspect it could involve our website, internal network, or cloud services. The ideal candidate for this project should have: - Extensive experience in cyber security and ethical hacking. - Proven track record of investigating security breaches. - Ability to analyze and interpret complex data logs. - Excellent problem solving and critical thinking skills. Please note that I do not have detailed logs or evidence related to the breach. Your expertise will be crucial in identifying the source of the problem and preventing future incidents.

    $42 / hr Average bid
    $42 / hr Avg Bid
    15 bids

    I'm in need of a professional who understands proxy servers and has experience in DDoS mitigation. My server is a PvP MMORPG and is in need of comprehensive protection against potential DDoS attacks. Requirements: - Implement all types of DDoS protection: Cloud-based, Hardware firewalls and Web application firewalls (WAF). - Intermediate level of experience with DDoS mitigation is a must.

    $174 Average bid
    $174 Avg Bid
    11 bids
    Opnsense modem reboot
    14 hours left
    Verified

    Hello. I am looking for a person who is knowledgeable about opnsense I want to talk a little bit about the project I want to change the modem ip address even if it is opnsense in seconds someone contact me please thanks

    $122 Average bid
    $122 Avg Bid
    14 bids

    I'm looking for a seasoned cybersecurity expert to create a comprehensive cyber range for research and development purposes. This range should incorporate a variety of attack simulation labs using prominent open-source tools. Key Responsibilities: - Develop a cyber range tailored for research and development. - Integrate various attack simulations, specifically phishing attacks, DDoS attacks, malware infections, and ransomware. - Utilize open-source tools like Metasploit, OWASP ZAP, Wireshark, and Burp Suite for the simulations. Ideal Skills: - Extensive experience in cybersecurity and cyber range development. - Proficiency with open-source cybersecurity tools. - Ability to design and implement diverse attack simulations. Duration: 10Days

    $153 Average bid
    $153 Avg Bid
    6 bids

    As an AppDynamics Specialist, you will play a vital role in managing and optimizing our application performance monitoring tools. Your tasks will include: - Real-time monitoring: Keeping an eye on our application performance in real-time. - Troubleshooting performance issues: Identifying and resolving performance problems swiftly and efficiently. - Optimizing resource usage: Ensuring our resources are used in the most efficient way possible. - Configuring and managing AppDynamics agents: Setting up and overseeing our AppDynamics agents for optimal performance. - Integrating AppDynamics into CI/CD pipelines: Implementing AppDynamics into our continuous integration and continuous delivery pipelines. - Conducting root-cause analysis of application performance issues: Investigating and identi...

    $319 Average bid
    $319 Avg Bid
    9 bids

    I'm seeking an expert in Kubernetes with a strong background in Azure Kubernetes Service (AKS) to help me understand and navigate specific aspects of AKS. I need assistance with the following: - Cluster Deployment and Management: This includes setting up and configuring clusters, monitoring and logging applications, and upgrading and maintaining clusters. - Networking and Security: I want to understand network policies and firewalls, Service Mesh and ingress controllers, as well as security best practices and compliance. - Application Logging: Assistance with understanding application logging in the context of AKS. Ideal candidates would have: - Extensive experience with Kubernetes and AKS - Strong understanding of networking and security within AKS - Proficiency in cluster deploy...

    $35 Average bid
    Guaranteed
    $35
    6 entries
    Einrichtung Microsoft Office
    15 hours left
    Verified

    Ich brauche jemand, der mich dabei unterstützt, Microsoft Office 365 ein Domäne durch die DNS Einstellungen über Siteground hinzuzufügen.

    $31 / hr Average bid
    $31 / hr Avg Bid
    3 bids

    Consultor experto en Hikvision Configurar 2 Porteros 8 citofonos DS-KD8002 - KH8300T DS-K1T502 - DS-KH6320 REQUIMIENTOS : Hablar español

    $196 Average bid
    $196 Avg Bid
    5 bids

    Recommended Articles Just for You