Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Von 105,175 Bewertungen, bewerten Kunden unsere Computer Security Consultants 4.9 von 5 Sternen.
Computer Security Consultants anheuern

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Von 105,175 Bewertungen, bewerten Kunden unsere Computer Security Consultants 4.9 von 5 Sternen.
Computer Security Consultants anheuern

Filter

Meine letzten Suchanfragen
Filtern nach:
Budget
bis
bis
bis
Typ
Fähigkeiten
Sprachen
    Jobstatus
    16 Jobs gefunden

    I’m looking for an experienced Teleport (Gravitational) engineer to help me set up secure access for servers and databases. Scope of work 1. Teleport Agent & Database Access • Install the Teleport agent on a Linux server that hosts a database • Configure Teleport to allow secure access to the database through Teleport only • Ensure database access is protected using Teleport authentication, certificates, and RBAC • No direct public access to the database (no exposed ports) 2. Teleport tbot Setup (Machine-to-Machine) • Install Teleport tbot on two separate Linux servers • Configure tbot for service-to-service authentication • Allow the two servers to securely connect to each other using Teleport-issued identities • No human SSH lo...

    €151 Average bid
    €151 Gebot i.D.
    5 Angebote

    I’m looking for an experienced Teleport (Gravitational) engineer to help me set up secure access for servers and databases. Scope of work 1. Teleport Agent & Database Access • Install the Teleport agent on a Linux server that hosts a database • Configure Teleport to allow secure access to the database through Teleport only • Ensure database access is protected using Teleport authentication, certificates, and RBAC • No direct public access to the database (no exposed ports) 2. Teleport tbot Setup (Machine-to-Machine) • Install Teleport tbot on two separate Linux servers • Configure tbot for service-to-service authentication • Allow the two servers to securely connect to each other using Teleport-issued identities • No human SSH lo...

    €150 Average bid
    €150 Gebot i.D.
    4 Angebote

    I need an expert to secure my iPhone and MacBook from an ex-husband who has been cyberstalking me for two years. I'm looking for advanced security with complete hardening. Requirements: - Secure both my iPhone and MacBook - Prevent SIM swapping and data penetration - Use of Flipper devices should be blocked - Set up secure communication channels - Provide a detailed security audit post-setup Ideal Skills & Experience: - Proven experience in cybersecurity - Expertise in securing iPhones and MacBooks - Knowledge of anti-SIM swap techniques - Familiarity with Flipper devices and countermeasures - Strong background in privacy protection and threat assessment

    €1754 Average bid
    €1754 Gebot i.D.
    30 Angebote

    Remote NOC Tech for Mikrotik Support We are seeking experienced L2 remote contractor NOC technician(s) for tech support roles and L3 Engineer(s) to remotely manage and support Mikrotik networks. The perfect match will be a remote contractor who has worked with Mikrotik as a factory trained tech support agent or a freelancer who has expert level knowledge of Mikrotik routers and switches serving the ISP or WISP environment. Under a separate post we are also seeking expert Ubiquity wireless ISP NOC techs / engineers. We are only seeking 9/10 and 10/10 knowledge base applicants with prior experience in L2 customer facing roles and L3 support roles. Our goal is to partner with top level experts for long-term remote contractor opportunities on a per hour relationship that may convert ...

    €20 / hr Average bid
    €20 / hr Gebot i.D.
    21 Angebote

    I am working on a research paper in the area of Wireless Sensor Network security and need a simple, runnable simulation model for Hello Flood attack detection. The work involves creating a small WSN simulation (10–50 nodes) using Cooja/Contiki or NS-3, where one or more malicious nodes perform a Hello Flood attack. A basic detection technique (threshold-based , energy-based , etc) should be implemented to identify the attacker. After creating the model, you should also explain and show basic performance metrics such as detection accuracy, precision/false positives (if possible), and energy consumption, so the results can be compared with existing research papers. The focus is on academic experimentation, not a complex or commercial system.

    €66 Average bid
    €66 Gebot i.D.
    1 Angebote

    I'm concerned my personal computer may have been hacked. I've noticed slow performance but haven't installed any new software or updates recently. I'm looking for someone to: - Check for signs of unauthorized access - Analyze and improve system performance - Ensure all security measures are up to date Ideal skills and experience: - Expertise in cybersecurity - Experience with performance optimization - Familiarity with various operating systems Please provide a detailed plan of action and any relevant certifications.

    €123 Average bid
    €123 Gebot i.D.
    31 Angebote

    I want to sit down—virtually—with an experienced IT professional for two focused hours on Saturday and again on Sunday to review every online tool my company relies on. The immediate goal is to tighten cybersecurity, verify that our backups are both complete and retrievable, and make sure we maintain full control over all domains, SaaS logins, cloud drives, and other digital assets. We already have a few security measures in place, but they are patchy. What worries me most right now is user-access control: who can touch what, how passwords are stored, and whether multifactor authentication is enforced everywhere it should be. During our sessions we will log in together, map out each system, and plug any obvious holes. If you spot deeper issues, outline them so we can plan long...

    €19 / hr Average bid
    €19 / hr Gebot i.D.
    42 Angebote

    Education Bachelor’s degree in Engineering or a Bachelor’s/Licentiate degree in Telecommunications, Electronics, or Computer Science. Experience Proven experience in at least three (3) projects involving the design and implementation of network architectures, including: Network segmentation Routing Firewalls Network security Provisioning for large-scale, mission-critical public and private environments, such as financial institutions, hospitals, and industrial facilities. Project Details Location: Asunción, Paraguay Project phase: Duration: 3 months Hybrid modality: partially remote, with some visits on-site in Asunción Implementation phase: Duration: 2 months Fully on-site in Asunción Support phase: Dur...

    €2714 Average bid
    Lokal
    €2714 Gebot i.D.
    3 Angebote

    I need a Check Point firewall engineer to configure between one and three VLANs on an existing appliance so that my Ruckus WIFI - SSID traffic is properly segregated from the rest of the network. The hardware is already racked and running the latest fireware; what’s missing is the VLAN definition, interface tagging, and any associated security policies. Scope of work • Create the required VLAN interfaces on the gateway and assign the correct IP addressing schema I will provide. • Adjust or build the security rules so that only approved inter-VLAN flows are allowed. • Verify reachability to and from the server network and document the final topology (screenshots of SmartConsole and a brief change log are fine). Acceptance criteria • All Ruckus WIFI - SSID...

    €10 / hr Average bid
    €10 / hr Gebot i.D.
    10 Angebote
    Optimize ZeroTier VPN Speed
    2 Tage left
    Verifiziert

    Our ZeroTier network crawls when two client machines talk directly to each other, even though both reach the internet at normal rates. The slowdown is consistent and reproducible between these specific nodes; transfers to or from the central server are fine. I need someone who understands ZeroTier routing, MTU tuning, and peer-to-peer paths to pinpoint what is throttling bandwidth and then implement (or clearly outline) the fix. You will have temporary access to configuration screens and can guide me through any packet captures or command-line checks you require (tcpdump, Wireshark, zerotier-cli, etc.). A quick turnaround is important because this link is part of a production workflow. Deliverables • Clear diagnostic report showing root cause of the slow client-to-client transfer ...

    €99 Average bid
    €99 Gebot i.D.
    24 Angebote

    I’m looking for a savvy IT professional who can take my computer from “almost ready” to fully updated and secure in one sitting. The job is strictly software-related: I need you to install or upgrade the operating system, set up the latest Office suite, and configure a dependable antivirus / security solution. You’ll get remote access credentials (TeamViewer or AnyDesk—whichever you prefer) plus the licence keys for each product. Once connected, I’d like you to: • Bring the OS up to the most recent stable release, complete with patches and driver updates. • Install Office, activate it, and verify that Word, Excel, Outlook and PowerPoint all launch without errors. • Deploy the antivirus package, run an initial scan, and confirm real...

    €18 Average bid
    €18 Gebot i.D.
    6 Angebote

    Technical Report Writing – Ethical Hacking Project (No Practical Work Required) I am looking for a freelancer to professionally formulate and structure an academic report for an ethical hacking/penetration testing project. Note: All practical work has already been completed by me, I will provide: Screenshots of every task Commands used Tools and outputs No hacking, scanning, or lab work is required This is strictly reporting writing and documentation, where even the structure of the report is already formulated Scope of Work The freelancer must organize and write clear, well-structured report sections for the following phases: Footprinting Scanning Enumeration Vulnerability Scanning Gaining Access Maintaining Access Covering Tracks Pentest Report & Security Policy Reporting Re...

    €9 / hr Average bid
    €9 / hr Gebot i.D.
    35 Angebote
    Milan 3-Day CISCO ISE Course
    1 Tag left
    Verifiziert

    I’m setting up a three-day, in-person course in Milan that walks security specialists through the fundamentals of implementing and configuring Cisco Identity Services Engine (ISE). The objective is crystal clear: by the end of the last afternoon every attendee should feel comfortable performing the essential, day-to-day configuration tasks that get ISE up and running in a production environment. Here’s what I need from you: a complete, instructor-ready slide deck that follows a logical flow—from initial deployment and licensing to policy creation, endpoint profiling, and basic troubleshooting tips. The tone has to suit a room of seasoned security professionals who may be new to ISE but are already fluent in networking concepts. Visual clarity, real-world examples, and ...

    €2761 Average bid
    €2761 Gebot i.D.
    17 Angebote

    I'm looking for an experienced network engineer to set up a site-to-site IPSec VPN using a Cisco ASA router and a Ubiquiti Dream Machine Pro (UDM Pro). Requirements: - Use of IPSec as the VPN protocol - AES-256 encryption for high security - Pre-shared key (PSK) for authentication Ideal Skills and Experience: - Strong knowledge of Cisco ASA and UDM Pro - Expertise in configuring IPSec VPNs - Familiarity with AES-256 encryption and PSK authentication The VPN tunnel is established but I am having issues with traffic flowing between the 2 networks Please provide a detailed plan and your credentials. Looking forward to your bids!

    €399 Average bid
    €399 Gebot i.D.
    29 Angebote

    I need assistance setting up a Site-to-Site VPN using a TP-Link ER605 router. I have all the necessary network details for both sites. The preferred authentication method is Pre-shared Key (PSK). Ideal Skills and Experience: - Experience with TP-Link ER605 router configuration - Knowledge of Site-to-Site VPN setup - Familiarity with Pre-shared Key authentication - Networking expertise to ensure secure and efficient connection

    €363 Average bid
    €363 Gebot i.D.
    38 Angebote

    We are looking for someone with deep expertise in ramping up our email efforts. We need ca. 2000 email accounts to reach the desired number of leads for next year. We are looking for someone who has deep experience in working with email accounts and managing that we get a good mail reputation and high deliverability. You will work directly with our founders on getting this up and maintaining it over time. This is not just an email VA job but requires deep knowledge with how to set up email accounts safely for email outbound. To be considered for the role, please copy-paste this to your message and show your respective experience regarding: 1. Worked with Google & Microsoft Accounts [yes / no, pls specify exact experience] 2. Worked with Instantly for connecting email accounts [yes /...

    €13 / hr Average bid
    €13 / hr Gebot i.D.
    15 Angebote

    Empfohlene Artikel nur für Sie