Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
- Establishing secure network infrastructure
- Improving system performance and leveraging encryption
- Developing security frameworks for organizations
- Implementing authentication measures for digital identification
- Evaluating risks of cyber incident exposure
- Researching the latest security regulations for compliance
- Crafting secure policies for employee engagement
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
从102,900个评价中,客户给我们的 Computer Security Consultants 打了4.86,共5星。雇佣 Computer Security Consultants
I am looking for a freelancer who can help me examine the pfsense router configuration backups in order to assess security vulnerabilities. I have a specific security concern in mind, and I am worried about unauthorized access, data leakage, and malware attacks. The ideal candidate for this project should have experience in network security and expertise in PFSense router configuration. or each of the downloaded configuration backup files, review the configuration in the backup to determine if there are unusual settings that may indicate compromise. Some of the kinds of things you should be checking for could include the following: Look for obviously invalid or unusable IP addresses Look for suspicious services configured Look for accounts which are suspicious Look for administrative acces...
I am looking for a freelancer who can help me examine the pfsense router configuration backups in order to assess security vulnerabilities. I have a specific security concern in mind, and I am worried about unauthorized access, data leakage, and malware attacks. The ideal candidate for this project should have experience in network security and expertise in PFSense router configuration. or each of the downloaded configuration backup files, review the configuration in the backup to determine if there are unusual settings that may indicate compromise. Some of the kinds of things you should be checking for could include the following: Look for obviously invalid or unusable IP addresses Look for suspicious services configured Look for accounts which are suspicious Look for administrative acces...
Title: Proxy Expert for Enhanced Online Security and Access Project Description: I am searching for a knowledgeable professional well-versed in the intricacies of proxies to enhance the security and accessibility of our online activities. As our reliance on online platforms grows, I require an expert who can implement and manage proxies effectively for various purposes. Scope of Work: Proxy Setup and Configuration: Configure and set up proxies to ensure secure and anonymous online browsing. Optimize proxy settings for maximum performance and reliability. Security Measures: Implement measures to safeguard against potential security threats and unauthorized access. Provide recommendations for enhancing overall online security using proxies. Geo-Blocking Solutions: Develop strategies ...
YOU MUST HAVE A OSCP CERTIFICATION TO QUALIFY! I am looking for an OSCP certified cybersecurity expert to provide live training sessions for OSCP (Offensive Security Certified Professional) certification. The ideal candidate should have advanced cybersecurity experience and expertise in network security. Specific topics that need to be covered in the training include: - Network security techniques and best practices - Vulnerability scanning and penetration testing - Windows Network Traversal The training sessions are expected to be conducted over 1-3 live sessions, depending on the depth and complexity of the topics covered. Skills and experience required for this project: - Advanced knowledge of network security principles and techniques - Experience in conducting cybersecurity traini...
I need help in designing a theoretical framework as I have survey results. This research related to privacy and HCI.
I am seeking a research assistant with a completed PhD in SDN to assist me with my project on network architecture. The ideal candidate will have expertise in the following areas: - SDN network architecture - Network security and privacy - Performance optimization The desired format for the research outcomes is both a research report and a presentation. The research report will provide a detailed analysis of the findings, while the presentation will allow for a visually engaging overview of the research. Communication with the research assistant will primarily be through email. This will allow for efficient and timely communication, as well as the exchange of research materials and progress updates. If you have the necessary skills and experience in SDN research, please submit your pro...
I am looking for a skilled cryptographer for a personal project that needs to be completed within 1-2 weeks. Requirements: - The freelancer must have past experience and a proven track record in cryptography. - Detailed project proposals are required in the application. Ideal Skills and Experience: - Strong knowledge and expertise in cryptographic algorithms and protocols. - Experience in developing secure communication systems and encryption methods. - Proficiency in programming languages such as Python, C++, or Java. - Familiarity with cryptographic libraries and tools. - Ability to analyze and identify vulnerabilities in cryptographic systems. - Understanding of key management and secure key exchange protocols. Please include your past work and relevant experience in your applicati...
Need someone to run an SDN experiment. I have the guideline ( flow chart ) and design. You need to setup mininer, VM etc and run the experiment. Plot those in a graph and display in the format of a research paper.
The purpose of this activity is to help you enumerate and model the security of your system architecture by looking at it from the point of view of threats. According to the Microsoft Threat Modeling methodology, we treat the word "threat" as a class of exploits. They fall into the following categories (STRIDE): • Spoofing • Tampering • Repudiation • Information Disclosure • Denial of Service • Elevation of Privilege ACTIVITY Today, let's model a cloud-based storage system. Store a file in a folder on your desktop, and it gets immediately uploaded to the server. Users can share folders, allowing other users or the public view the files. The context level diagram of the file sharing system is represented in Figure 1: Context Level Diagram T...
Architecture overview, how the system interaction with external systems puts it at risk. Variation of the boundaries of the system vary from deployment In your opinion, are there locations in the architecture where too many assets reside? Analysis of your threat Model. More explanation about boundaries of the system. The purpose of this deliverable is to come up with the architecture and design of your product Your deliverable must include: ● Architecture Overview. Describe the architecture of the system. Please answer the following questions: o What are the subsystems? What does each subsystem do? o Are there subsystems that are expressly security features? (e.g. encryption, authentication) Describe these in more depth. o Consider the cost of developer mistakes in terms of subsystems...
I have 2 computers at my home office that I would like to be able to connect to share files. These are connected by way of an ethernet cable thru a Netgear GS305 switch. Note these 2 computer were previously connected to my office network and so the previous setup will be to be removed.
Project Title: Fix the website being redflagged by antivirus for users Description: I am looking for a skilled developer to fix the issue of our website being flagged by Mcafee antivirus for users. We need to ensure that our website is safe and accessible for all users without any threat detection. Ideal Skills and Experience: - Experience in website security and fixing issues related to antivirus flagging - Proficiency in Mcafee antivirus software and understanding its threat detection mechanisms - Strong knowledge of web development and coding languages - Ability to analyze and troubleshoot website code and content to identify potential threats - Familiarity with website hosting and server configurations - Excellent communication skills to understand and address any concerns or quest...
Architecture overview, how the system interaction with external systems puts it at risk. Variation of the boundaries of the system vary from deployment In your opinion, are there locations in the architecture where too many assets reside? Analysis of your threat Model. More explanation about boundaries of the system. The purpose of this deliverable is to come up with the architecture and design of your product. Your deliverable must include: ● Architecture Overview. Describe the architecture of the system. Please answer the following questions: o What are the subsystems? What does each subsystem do? o Are there subsystems that are expressly security features? (e.g. encryption, authentication) Describe these in more depth. o Consider the cost of developer mistakes in terms of subsystems...
this activity is to help you enumerate and model the security of your system architecture by looking at it from the point of view of threats. According to the Microsoft Threat Modeling methodology, we treat the word "threat" as a class of exploits. They fall into the following categories (STRIDE). a cloud-based storage system. Store a file in a folder on your desktop, and it gets immediately uploaded to the server. Users can share folders, allowing other users or the public view the files. The aim of this activity is to Identify Threats based on the STRIDE threat modeling using Microsoft Threat Modeling Tool (TMT).
I am looking for an experienced freelancer who can help me protect my website from DDoS attacks. The purpose of this project is to enhance the security measures and ensure the website is well-protected. Skills and Experience: - In-depth knowledge of DDoS attack prevention and mitigation techniques. - Experience implementing Cloudflare security measures to protect websites. - Ability to create and implement effective security policies for Pleask servers. - Familiarity with the latest security best practices and emerging threats. The current security measures in place need improvement, so the freelancer should be able to assess the existing setup and make necessary enhancements. This project requires immediate attention, as the website is at risk of DDoS attacks. Should work with Remote...
I am looking for a computer science researcher to write a research paper on the topic of cybersecurity. The paper should be approximately 10-20 pages in length. I have a specific topic or question in mind that I would like the paper to address. Ideal skills and experience for this job include: - Strong knowledge and understanding of cybersecurity concepts and principles - Proficiency in conducting research and analyzing data in the field of cybersecurity - Ability to write clear and concise academic papers - Familiarity with relevant research methodologies and citation styles
Project Title: Ethical hacker I am looking for an ethical hacker who can assist me with penetration testing, vulnerability assessment, and social engineering for my Instagram account. Skills and Experience: - Extensive knowledge and experience in ethical hacking and cybersecurity - Proven track record of successful past work in similar projects - Ability to provide detailed project proposals outlining the approach and methodology - Familiarity with Instagram's security features and vulnerabilities - Strong problem-solving and analytical skills Access Level: The freelancer should be able to gain access independently without any provided access credentials. Please include your past work and experience in your application.
I am looking for an ethical hacker who can assist me with my cybersecurity needs, specifically in the area of social media security. Specific goals have been set for this project, and I am seeking an experienced hacker who can help me achieve them. The timeline for this project is immediate, and I would like to have it completed within a week. Ideal skills and experience for this job include: - Proficiency in network security and web application security - Experience with social engineering techniques - Knowledge of social media platforms and their security vulnerabilities - Ability to identify and mitigate potential risks and threats in the social media environment If you have the necessary skills and experience in these areas, please reach out to me with your proposal. Thank you.
Protective Measures against Phishing Attacks Project Overview: - I am seeking a skilled professional to assist me in safeguarding my online presence against potential phishing attacks. - I am unsure if I have clicked on any suspicious links recently and have noticed any unusual activities on my devices or accounts. - I primarily use both desktop/laptop and mobile devices, making it essential to secure both platforms. Project Requirements: 1. Phishing Detection and Prevention: - Conduct a thorough analysis of my devices, accounts, and internet browsing history to identify any potential phishing attempts. - Implement robust measures to detect and prevent phishing attacks on both desktop and mobile devices. - Provide recommendations for security software or browser extensions that ...
I am looking for a freelancer who can assist me in setting up a VPN in my network switch with a public IP address. The project details are as follows: Network Switch: - The network switch I am using is Cisco. Public IP Address: - I already have a public IP address for the network switch. VPN Purpose: - The primary purpose of the VPN setup is for remote access. with 2 Scanario . 1) Cisco Switch which has Statistic Public Ip to assign a Remote Public Ip to another Cisco Switch 2) From the Same Cisco Switch we should be able to get other Laptops COnnected with out without Dynedns ( i have done this but needs improvement) Skills and Experience: - Experience in setting up VPNs in Cisco network switches. - Knowledge of configuring public IP addresses. - Understanding of remote access VP...
I am looking for a Windows Administrator who can assist me on files and folder data sync between Primary Active Directory management and Secondary Active Directory controller on a one-time basis. Specific Tasks: 1) Only one task needs to be completed i.e. syncing the files and folders from the Active directory server to Secondary Active directory controller and work in failover. If primary AD server goes down then all the users should get their data folders access from the secondary ADC server. Timeline: - The tasks need to be completed within a week. Skills and Experience: - Strong knowledge of Windows administration - Experience with Active Directory management - Proficiency in server maintenance and troubleshooting - Familiarity with network security monitoring tools If you have ...
Good interpersonal skills as role involve working with multiple business units. Good knowledge of Citrix and associate technologies Good knowledge in updating Citrix images. Deep knowledge in troubleshooting application and OS issues Working knowledge on GPO Working knowledge on ESX or other hypervisors Must be details oriented and ability to work on multiple deadlines.
Expert knowledge of Citrix Virtual Apps and Desktop (DaaS) and associate technologies Expert experience in updating Citrix Gold images Expert understanding on vulnerabilities around Citrix platform and best-practice to remediate vulnerabilities Good Windows 10/11 and Server knowledge Working knowledge on GPO Working knowledge on ESX or other hypervisors Deep knowledge in troubleshooting application and OS issues
Project Title: Find my stolen laptop I am looking for a skilled professional to help me locate my stolen Windows laptop that was last seen in a public place. Unfortunately, I do not have any specific details or unique identifiers for the laptop such as serial numbers or unique markings. I have 1 serial number it may belong to this laptop. Skills and Experience: - Experience in laptop recovery and tracking - Knowledge of local law enforcement procedures and reporting - Familiarity with software and techniques used to track stolen laptops - Excellent communication and problem-solving skills
I am looking for a freelancer who is experienced in configuring port forwarding on a Fortinet FortiGate 60E firewall. Project Requirements: - Configure port forwarding on the FortiGate 60E firewall - The purpose of the port forwarding is to allow remote access to a specific server - Only TCP traffic should be allowed through the forwarded port Ideal Skills and Experience: - Strong knowledge and experience with Fortinet firewalls, specifically the FortiGate 60E model - Experience in configuring port forwarding and remote access on Fortinet firewalls - Understanding of TCP traffic and its configuration on firewalls Please note that the specific details of the port forwarding and server will be provided upon acceptance of the project.
I am looking for a skilled professional to conduct security testing for my web application. The ideal candidate should possess the following skills and experience: - Strong knowledge of web application security testing - Familiarity with java based applications and their potential vulnerabilities - Experience in identifying and addressing security concerns - Expertise in providing recommendations and advice for enhancing security measures If you have the necessary skills and expertise in web application security testing, DB & application penetration test please submit your proposal.
I need a technical marketing engineer to develop contents for DnS Security datasheet. A knowledge in tech and dns security industry is a must.
SonicWALL Port Forwarding - NSA Series I am looking for a freelancer who is experienced in configuring port forwarding on SonicWALL NSA Series devices. The main purpose of the port forwarding is to enable remote access to a shared folder. Skills and Experience: - Proficiency in configuring and managing SonicWALL NSA Series devices - Strong understanding of port forwarding and network security - Prior experience in setting up remote access to shared folders - Familiarity with file sharing protocols and permissions - Knowledge of TCP/IP networking and routing If you have the necessary skills and experience to successfully configure port forwarding on a SonicWALL NSA Series device and enable remote access to a shared folder, please submit your proposal.
I am looking for a NODE and MQTT protocol expert who can help me with a project that requires real-time data transmission. The ideal candidate should have experience with cloud-based development platforms and should be able to complete the project within a week. Skills and Experience: - Expertise in NODE and MQTT protocol - Strong understanding of real-time data transmission - Experience with cloud-based development platforms - Knowledge of security and encryption for data transmission - Ability to ensure scalability and performance of the project Timeline: - Urgent (Less than a week) If you have the skills and experience required for this project, please submit your proposal.
I am looking for a freelancer who can assist me with a Wireshark analysis project. The purpose of this analysis is to conduct a security analysis of my network. I have specific protocols and traffic types that I would like to be analyzed. I require a detailed report with recommendations based on the analysis. Skills and Experience: - Strong knowledge of Wireshark and network analysis - Expertise in conducting security analysis - Ability to provide detailed reports with recommendations - Familiarity with various protocols and traffic types for analysis
Implementation of Data Sharing and Identity verification using zero knowledge technique and proofs. if you know you have the skills to implement the above kindly place a bid so that we can discuss extensively about the requirement
I am seeking a freelancer who can help me with implementing Mikrotik Netflow for network monitoring. I have a small network size, consisting of 1-10 devices. As I am new to Mikrotik Netflow, I will need guidance on the setup process. Requirements: - Experience with Mikrotik Netflow implementation - Knowledge of network monitoring tools and techniques - Ability to provide guidance and suggestions for the setup process Ideal Skills and Experience: - Familiarity with Mikrotik routers and their configuration - Proficiency in network monitoring and analysis - Strong understanding of bandwidth management and security analysis If you have the necessary skills and experience, please reach out to discuss further details of the project.
I am looking for a remote assistant who can help me improve the speed of my PC/MAC computer. The current state of my computer's performance is moderately slow. I am specifically interested in software optimization to enhance its speed. In addition, I also need assistance in checking my Google accounts and web security. Overall, just figure out why the computers are running slow and to make sure there is nobody tracking information or stealing information from our business remotely. Make sure no viruses, or remote outside people are acessing. It comes in waves, occasionally the computers are smooth, and we have I.T staff check, but after police visited our store from a recent robbery, the speed increased. but after when its back to normal the speed reduces. i was worrying that staff ...
I am looking for a freelancer who can troubleshoot the Unifi network connectivity issues I am experiencing on my home network. Skills and Experience: - Experience in troubleshooting network connectivity issues - Knowledge of networking protocols and troubleshooting tools - Familiarity with home networks and their configurations - Understanding of IoT devices and their connectivity requirements Specifically, the freelancer should be able to: - Identify and resolve any network connectivity issues affecting my home network - Ensure a stable and reliable internet connection - Troubleshoot any security vulnerabilities that may be present on the network - Provide recommendations for improving the network's performance and security The devices connected to my network include IoT devices ...
I am looking for a proofreader to review and edit my work on chapter 4 and chapter 5. Skills and experience required: - Strong editing and proofreading skills - Attention to detail - Familiarity with academic writing - Knowledge of grammar, punctuation, and syntax rules - citation style as IEEE - Formating as My university formating Please note that specific formatting or citation style requirements were not provided. The deadline for completion is one month
I am looking for someone to assist me with my Cryptography assignment. The specific area of cryptography that my assignment focuses on is Symmetric Key Cryptography. I have detailed instructions for the assignment, which I will provide to the freelancer. The deadline for the completion of this assignment is within a week. Ideal Skills and Experience: - Strong knowledge and understanding of Symmetric Key Cryptography - Experience in completing cryptography assignments - Attention to detail and ability to follow instructions accurately - Ability to meet deadlines and work efficiently
I am looking for a NODE and MQTT protocol expert who can help me with a project that requires real-time data transmission. The ideal candidate should have experience with cloud-based development platforms and should be able to complete the project within a week. Skills and Experience: - Expertise in NODE and MQTT protocol - Strong understanding of real-time data transmission - Experience with cloud-based development platforms - Knowledge of security and encryption for data transmission - Ability to ensure scalability and performance of the project Timeline: - Urgent (Less than a week) If you have the skills and experience required for this project, please submit your proposal.
I need an ethical hacker to recover an email account.
I am seeking assistance with setting up an intrusion detection system for my Wide Area Network (WAN) to enhance network security and protect against trojans. Specific requirements for the project include: - Configuration of the intrusion detection system - Testing and fine-tuning of the system - Implementation of necessary security measures to detect and prevent trojan attacks Ideal skills and experience for the job: - Strong knowledge of network security and trojan protection - Experience in setting up and configuring intrusion detection systems - Familiarity with WAN networks Preferred method of communication during the project is via email.
I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify and addre...
I am looking for Computer Networks experts who have experience in Network Design and Architecture. Specific requirements for the project include: - Designing and implementing a computer network infrastructure - Creating network diagrams and documentation - Configuring routers, switches, and firewalls Given an IP datagram with the fragmentation offset of 00000010110102, HLEN of 516 and the total length of 007A16, find the numbers of the first byte and the last byte of data - Troubleshooting network issues and ensuring network performance and security The ideal freelancer for this project should have: - Strong knowledge and experience in computer networks - Proficiency in network design and architecture - Familiarity with network security protocols and best practices - Ability to troubl...
Through this project, you are expected to: to use project management tools to help development, especially git (e.g., Github); security/privacy demand analysis; selection and application of existing security/privacy tools
Hello, We're on the lookout for enthusiastic game testers to assess our PC games (minimum 30 minutes per game) and provide detailed playing experiences (at least 150 words per game). We invite you to offer a price for testing and reviewing 10 games. Please bear in mind that we are operating on a limited budget, so we're seeking individuals who genuinely enjoy playing games rather than those solely driven by financial gains. If you have a passion for gaming and want to be a part of our testing team, we'd love to hear from you!
I am looking for a website security tester for my organization. Specific Type of Security Testing: Vulnerability Assessment - I need someone who can conduct a thorough vulnerability assessment of my website. Report Requirement: Yes, detailed report - I would like a comprehensive report on the findings of the assessment. Ideal Skills and Experience: - Strong knowledge and experience in website security testing - Familiarity with various vulnerability assessment tools and techniques - Ability to identify and assess vulnerabilities in different areas of a website - Proficiency in generating detailed reports that highlight vulnerabilities and potential risks Note: The client did not provide any specific areas or features of concern in their website.
I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify and addre...
I am looking for a Cisco networking expert who can configure my Cisco 800 Router to function as a dual WAN failover system. The primary use of the router is for Internet with VPN connectivity. Details: - Currently the router is being used in production with 1 WAN configured and a VPN Client configured which connects to an off-premise external VPN Server. - When WAN1 is down, i need it to switch to WAN2 and make sure the VPN Client is connected too. Requirements: - Configure the router to have the 2nd WAN, when WAN1 is down, it will automatically switch to WAN2 and reconnect the VPN Client. - Ensure that the failover process has minimum/reasonable downtime. - Provide advice and recommendations on the best configuration for optimal performance. - Please keep in-mind that this needs to ...
VMware virtualization Expert in NSX solutions 1. Port filtering of the servers. 2. Activation of the filtered policies during the customer's preferred downtimes. 3. Preparation and submission of a UAT (User Acceptance Testing) checklist for customer approval. 4. Implementation of any necessary corrections or amendments to configurations based on UAT feedback. 5. Final testing to verify the success of any failed or amended UAT checklist items. 6. Creation of as-built documentation. 7. Knowledge transfer (KT) sessions for the customer's team. 8. Acquisition of the Work Completion Report (WCR) from the customer for NSX. 9. Regarding the port filtering SHC had a communication matrix taken from the firewall. However, due to the installation of new servers, client doe...
We’re having hard time to book VFS appointment for our clients in India due to the issues on their anyone could help ,we would be happy to work with them for our clients have lots of clients looking for appointment. Please let us know. Thank you.
I am looking for a freelancer who can assist me with an OPNET project. Specific Goal: - The specific goal of this project is network design and optimization. Software and Models: - I have a specific software/model that I would like to use for this project. Timeline: - The project needs to be completed within 1 week. Ideal Skills and Experience: - Experience in OPNET simulation and optimization. - Knowledge of network design and performance analysis. - Proficiency in the specific software/model that will be used. If you have the necessary skills and can meet the tight deadline, please submit your proposal.
I am looking for a freelancer to create a script for setting up a MikroTik router VPN using SSTP and OpenVPN protocols. Requirements: - Experience with MikroTik routers and VPN configuration - Proficiency in scripting languages - Knowledge of SSTP and OpenVPN protocols Scope of work: - Develop a script for the entire setup of the MikroTik router VPN - Provide assistance with the VPN configuration Please note that I require help with the entire setup, so expertise in MikroTik routers and VPN configuration is essential.