Internetsicherheit Jobs
Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.
Here's some projects that our expert Internet Security Experts made real:
- Developing security protocols for actors in online communications
- Implementing technical solutions to protect company email addresses against malicious entities
- Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
- Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
- Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
- Troubleshooting WordPress security issues to safeguard companies from hackers
- Cleaning up any threats of malware and safeguarding websites against future infections.
As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!
Von 60,405 Bewertungen, bewerten Kunden unsere Internet Security Experts 4.82 von 5 Sternen.Internet Security Experts anheuern
I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify and addre...
I am seeking assistance with setting up an intrusion detection system for my Wide Area Network (WAN) to enhance network security and protect against trojans. Specific requirements for the project include: - Configuration of the intrusion detection system - Testing and fine-tuning of the system - Implementation of necessary security measures to detect and prevent trojan attacks Ideal skills and experience for the job: - Strong knowledge of network security and trojan protection - Experience in setting up and configuring intrusion detection systems - Familiarity with WAN networks Preferred method of communication during the project is via email.
I am looking for a skilled professional to help me find and treat a trojan on my WordPress website. Platform: WordPress - The website is built on the WordPress platform. Origin of Trojan: Most likely free plugins - I suspect that the trojan may have originated from a specific plugin or theme, most likely a free plugin. Timeline: Within 3 days - I need the trojan to be treated within 3 days. Ideal Skills and Experience: - Experience in WordPress security and malware removal - Familiarity with identifying and resolving issues related to free plugins - Knowledge of best practices for website security and prevention of future infections
I am looking for Computer Networks experts who have experience in Network Design and Architecture. Specific requirements for the project include: - Designing and implementing a computer network infrastructure - Creating network diagrams and documentation - Configuring routers, switches, and firewalls Given an IP datagram with the fragmentation offset of 00000010110102, HLEN of 516 and the total length of 007A16, find the numbers of the first byte and the last byte of data - Troubleshooting network issues and ensuring network performance and security The ideal freelancer for this project should have: - Strong knowledge and experience in computer networks - Proficiency in network design and architecture - Familiarity with network security protocols and best practices - Ability to troubl...
I am looking for a website security tester for my organization. Specific Type of Security Testing: Vulnerability Assessment - I need someone who can conduct a thorough vulnerability assessment of my website. Report Requirement: Yes, detailed report - I would like a comprehensive report on the findings of the assessment. Ideal Skills and Experience: - Strong knowledge and experience in website security testing - Familiarity with various vulnerability assessment tools and techniques - Ability to identify and assess vulnerabilities in different areas of a website - Proficiency in generating detailed reports that highlight vulnerabilities and potential risks Note: The client did not provide any specific areas or features of concern in their website.
I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify and addre...
Need help with checking to see if has been compromised (if thats possible) by a hacker.
Facebook Security Login - Ideal Skills and Experience: - Knowledge of login search result that displays a phone number to more than one account. To have those accounts removed except the primary. Note: The client did not need assistance with any other aspect of their Facebook account.
I am looking for a skilled professional to assist me with my cyber security project. Specific Aspect: Website security and hacks Specific Security Requirement: Preventing data breaches Ideal Skills and Experience: - Expertise in network security - Strong knowledge of data encryption - Experience in security policy development Additional Information: - I have specific security requirements and concerns - The main concern is preventing data breaches - Compliance with industry regulations is also important - Securing sensitive customer data is a priority If you have the necessary skills and experience in network security, data encryption, and security policy development, I would be interested in discussing this project further with you.
PC Expert I am looking for a PC expert who can assist me with software troubleshooting. Skills and Experience: - Strong knowledge and experience in troubleshooting various software issues on PCs - Familiarity with different operating systems and software applications - Ability to identify and resolve software conflicts and compatibility issues - Experience in diagnosing and fixing software errors, crashes, and viruses Assistance Required: - Remote assistance: The expert should be able to provide remote support to troubleshoot software issues on my PC. - Onsite assistance: If necessary, the expert should be available to visit my location and provide hands-on support for more complex software problems. Communication: - Preferred method of communication is WhatsApp, as it allows for quick...
We are seeking an expert in cybersecurity, psychology, law enforcement, or private investigation for a brief, paid consultancy on cyber safety. The ideal candidate will have a strong understanding of their respective field, whether it be cybersecurity, psychology, law enforcement, or private investigation, and how it applies to cyber safety. The consultant will be responsible for providing input through expert analysis and feedback on a set of pre-prepared recommendations, aiming to enhance their effectiveness in the context of cyber safety. We would also like to feature your professional insights, along with your name and qualifications, on our social media channels. This provides a unique opportunity for professional exposure and acknowledges your collaboration in our mission. Note: Th...
You will work hand in hand with me on different projects with different clients, always related to information security and cybersecurity. You will work on vulnerability scans, vulnerability reports, writing Patch Tuesday articles, writing documentation such as information security policies or incident response plans, etc... Each month, you will be billed according to the hours you have worked.
I need a security expert for Apache vulnerabilities. CVE-2002-0392 CVE-2022-22720 CVE-2022-31813 CVE-2021-39275 CVE-2021-44790 CVE-2019-11358 CVE-2020-11022 CVE-2020-11023 CVE-2015-9251 I am finding a senior developer to solve this issues perfectly.
I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify and addre...
I am looking for a skilled professional who can fix my custom-built website that has been hacked. The ideal candidate should have experience with custom-built websites and be familiar with resolving unknown issues caused by hacks. Additionally, it is important that the candidate is proficient in website security to ensure that the issue does not occur again in the future. It is also necessary for the candidate to have experience in website backups and restoration as I have a backup of the website that needs to be restored.
Project Title: Cyber Security Description: I am in need of assistance with network security for my small network of 1-10 devices. I am looking for a one-time solution to improve the security of my network. Specific requirements for the project include: - Conducting a comprehensive network security assessment to identify vulnerabilities and potential risks - Implementing necessary measures and protocols to protect against unauthorized access and data breaches - Setting up firewalls, encryption, and other security measures to safeguard sensitive information - Monitoring and detecting any suspicious activities or potential security breaches - Providing recommendations and best practices for maintaining network security in the future Ideal skills and experience for this project: - Strong ...
Project Description: I am in need of a skilled professional to secure our WordPress website that is currently under attack. The ideal candidate should have experience in website security and be proficient in WordPress. Security Measures Taken: - Changed all passwords Type of Attacks: - Malware infections Backup: - Yes, we have a backup of our website Skills and Experience Required: - Extensive knowledge and experience in website security - Proficiency in WordPress - Familiarity with malware infections and how to prevent and remove them - Ability to identify and mitigate different types of attacks - Experience in securing websites under attack - Strong problem-solving skills and attention to detail
I am looking for an entry-level technician who can help me with the installation of an sdwan system at multiple local locations. The specific tasks I expect from the technician include installation only. Ideal skills and experience for the job: - Basic understanding of networking and computer systems - Familiarity with sdwan technology and installation processes - Ability to work independently and follow instructions accurately - Strong problem-solving and troubleshooting skills Please note that this is a part-time position, and the technician will be required to travel to multiple local locations for the installations.
Project Description: Remove Malware from my shared server running Wordpress Websites I am in need of a skilled professional who can help me remove malware from my shared server that is running multiple Wordpress websites. Here are the details of the project: Access to server and website files: - I have access to the server and website files, so you will be able to work directly on the server. Backup of website files before malware infection: - Unfortunately, I do not have a backup of the website files before the malware infection. Therefore, it is crucial to handle the removal process with caution to avoid any data loss. Implementing security measures after malware removal: - After the malware is removed, I would like to implement security measures to prevent future incidents. This may...
Network Design: Develop and design comprehensive network solutions that align with the organization's business goals and requirements. Create detailed network architecture diagrams, documentation, and specifications. Protocols and Technologies: Stay updated on the latest networking technologies, protocols, and industry trends. Evaluate and recommend hardware, software, and communication protocols to support the organization's network infrastructure. Security: Implement security measures to protect the network from unauthorized access, attacks, and vulnerabilities. Design and integrate security features such as firewalls, VPNs, and intrusion detection systems. Capacity Planning: Analyse network traffic and performance to determine capacity requirements and scalability. Plan fo...
Project Description: HELP Securing my VPN tunnel server Introduction: I am looking for a skilled professional to help me secure my OpenVPN tunnel server. I am currently experiencing specific security issues and need assistance in resolving them. Requirements: - Expertise in OpenVPN: The ideal candidate should have in-depth knowledge and experience in working with OpenVPN tunnel servers. - Strong understanding of VPN security: It is important that the candidate is well-versed in VPN security practices and protocols. - Troubleshooting skills: The candidate should be able to identify and address any authentication or data leakage issues that may arise. - Problem-solving ability: Since the security issue falls under the "Other" category, the candidate should have exceptional proble...
Need Help Setting Up Residential Proxies for Anonymity Skills and Experience Required: - Experience in setting up residential proxies - Knowledge of proxy server configurations - Familiarity with network security protocols Project Details: - I am looking for someone who can assist me in setting up residential proxies for anonymity purposes. - The ideal candidate should have experience in configuring proxy servers and ensuring secure connections. - The project involves setting up 1-5 residential proxies. - The proxies will be used to enhance online privacy and maintain anonymity. - The candidate should have knowledge of network security protocols to ensure the proxies are secure and reliable. - Familiarity with accessing geo-restricted content through proxies is a plus. - The project requ...
I am currently experiencing issues with my website not loading at all. When I try to access it, I am presented with an error message stating "Your connection is not private". I am looking for a skilled freelancer who can help resolve this privacy issue and get my website back up and running. Ideal skills and experience: - Experience in troubleshooting website loading issues - Knowledge of website hosting and privacy settings - Familiarity with SSL certificates and HTTPS protocols - Ability to diagnose and resolve security-related issues - Excellent communication skills to provide updates and guidance throughout the process.
I am looking for someone who can provide me with PAM DEFENDER exam dumps I prefer the dumps to be in PDF format. I am particularly interested in studying the general overview of PAM DEFENDER and its practical applications. Skills and experience needed: - In-depth knowledge of PAM DEFENDER - Experience in creating exam dumps in PDF format - Familiarity with the general overview and practical applications of PAM DEFENDER
Project Title: Qubes OS Security Enhancement Overview: We are seeking a skilled professional to enhance the security of our Qubes OS. Our operating system has recently experienced a minor compromise, and we are looking to implement new security measures to prevent future breaches. Specific Requirements: - Expertise in Qubes OS and its operating system component - In-depth knowledge of virtualization technologies and security architecture - Familiarity with the specific aspect of the Qubes OS operating system that was compromised (Operating System) - Ability to assess the severity of the compromise and determine appropriate security measures - Experience in implementing new security measures to strengthen the overall system Deliverables: 1. Comprehensive analysis of the compromised aspe...
Project Title: Qubes OS Compromise Investigation and Mitigation Assistance I am seeking a skilled professional to assist me in investigating a compromise in my Qubes OS. As a beginner in terms of technical expertise, I require an expert who can guide me through the process and provide necessary assistance in implementing the solutions. Specific Requirements: - Identification of the Attacker: The main objective is to identify the individual or group responsible for compromising my Qubes OS. The expert should possess deep knowledge and experience in forensic analysis and be able to trace the attacker's activities. - Details of the Attack: I need a thorough analysis of the attack, including the methods used, entry points exploited, and any potential vulnerabilities in my system. The ...
I am looking for a skilled professional to conduct a vulnerability assessment and penetration testing for my systems and applications. Specifics: - I will provide a list of systems and applications to prioritize for testing. - The testing should be completed within a month. - I require a detailed report after the testing, including recommended solutions. Ideal skills and experience: - Proficiency in conducting vulnerability assessments and penetration testing. - Knowledge of various systems and applications. - Ability to provide detailed reports with recommended solutions. Please provide your portfolio and relevant experience when submitting a proposal. Thank you.
Project Description: - I am in need of a skilled freelancer who can help me change the SMTP Port 25/tcp in my Linux VPS for security reasons. Our few websites got hacked and outgoing mail server has been blocked because of huge span traffic. - I have root access to my VPS, so the freelancer should be experienced in working with root access. - The main reason for changing the SMTP Port is to enhance the security measures of my server. - The ideal freelancer for this job should have: - Strong knowledge and experience in working with Linux operating systems. - Expertise in managing VPS configurations and settings. - Prior experience in changing SMTP Ports for security purposes. - Familiarity with network security protocols and best practices. - If you have the necessary skills an...
I am looking for a freelancer to build an e-commerce site on the onion Tor network. The ideal candidate should have experience in creating websites in this network and be familiar with its unique security requirements. Skills and experience needed for this project include: - Experience in building e-commerce sites - Knowledge of the onion Tor network and its security features - Ability to implement necessary security measures to ensure user privacy and data protection Specific requirements for this project: - Develop an e-commerce site on the onion Tor network - Implement necessary security features to ensure user privacy and data protection - Follow specific design preferences provided by the client The freelancer should have a good understanding of e-commerce website design princip...
Mobile App Vulnerability Assessment - I am looking for an ethical hacker to conduct a general scan of my mobile app for vulnerabilities. - The specific areas of concern within the mobile app are not known, so a comprehensive scan of the entire app is required. - Ongoing security monitoring is not required after the initial vulnerability assessment. Skills and Experience: - Ethical hacking experience in mobile app security. - Knowledge of common vulnerabilities and techniques used in mobile app hacking. - Ability to conduct thorough scans and identify potential vulnerabilities within the mobile app.
Project Description: AuthenticationException: The remote certificate is invalid according to the validation procedure. I am looking for a skilled developer who can help me resolve the issue of an AuthenticationException with the error message "The remote certificate is invalid according to the validation procedure." I am using C# as the programming language and the target platform is Windows. Requirements: - Strong knowledge and experience in C# programming language - Expertise in handling AuthenticationExceptions and resolving certificate validation issues - Familiarity with Windows platform and its security features - Experience in working with certificates from trusted certificate authorities - Knowledge of SSL/TLS protocols and certificate validation procedures - Troublesh...
I am looking for a penetration vulnerability expert to conduct web application penetration testing for my project. Skills and Experience: - Extensive experience in web application penetration testing - Knowledge of various testing techniques and methodologies - Familiarity with industry-standard tools and frameworks for penetration testing - Ability to identify and exploit vulnerabilities in web applications - Strong understanding of secure coding practices and web application security best practices Scope of the Project: - The project requires full network coverage, with no specific areas of concern identified. - The scope of the penetration testing includes 1-5 devices or applications. Deliverables: - A comprehensive report detailing the vulnerabilities identified, their impact, and ...
We are looking for an expert in cyber security to assist us with an urgent task. Specifically, we need help to investigate who is behind an Instagram account. To be considered for this project, freelancers must have experience in the cyber security field and include their past work in their applications. We need a resolution to this case within 24 hours, so time is of the essence. If you think you are the right fit, please apply!
My organization is looking for an experienced ethical hacker to complete a one-time security check, with a basic summary report being generated upon completion. The focus of the security check should be on network security. Our team is eager to find a skilled professional to help ensure the safety of our carefully crafted systems. We remain confident that the selected ethical hacker will have the skills to deliver top-notch results and guarantee that our company stays secure.
I am currently experiencing an issue with online games and I need help with it. My current internet service provider isn't Comcast or AT&T. I'm using a wired connection, I have 1gbps download and 500mbps upload, I play on my xbox one x, the nat is open, upnp enabled, I use a low response time tv, I see no lag, ping is great, but for some reason, something is not right. I would like help figuring out what exactly is causing this issue. If you are an experienced technician, then I would love to work with you on this project. Please let me know if you can help. Thanks!
Hi, I'm looking to hire an experienced ethical hacker. The goal of this project is to identify and fix any vulnerabilities, in order to improve overall system security measures. The ideal ethical hacker will have experience with android, Web, Internet and have an understanding of best practices for identifying and addressing security vulnerabilities. This person should be knowledgeable about common threats and issues associated with mobile security, as well as familiar with security. This project should result in the identification and repair of any potential security vulnerabilities. If you are an experienced ethical hacker capable of completing this project, please get in touch. Thank you for your consideration.
Responsibilities - Conduct the basic research and collect general information of subject companies - Conduct the basic business verification and schedule the site visits with subject companies - Responsible for quality control and audit information collected by Site Verifiers including providing guidance during site visits - Compile the site visit reports sing information collected by Site Verifiers and from research Benefits: - USD 20/report including phone fees - Performance bonus Requirements: - Self-motivated with ability to work independently and exercise good judgment; - Strong organizational skills and attention to detail with the ability to meet deadlines; - Proficient in English, effective oral and written communication; - Proficiency with personal computer...
I am looking for a freelancer who can enhance the security of my website, with a focus on server and network protection. Specific areas of expertise required for this project include: - Knowledge of server and network security protocols and best practices - Experience in identifying and mitigating specific threats to website security - Familiarity with tools and techniques for enhancing server and network protection The current state of my website's security measures is at a moderate level of protection. I have specific security threats that I am concerned about and would like the freelancer to address. If you have the skills and experience necessary to enhance the security of my website and protect it from specific threats, please submit your proposal.
very strong ddos attack on website cloud flare is set up seems like ip based attack
I am looking for a skilled professional to secure my website against DDoS attacks. The ideal candidate should have experience in website security and be able to implement effective measures to protect against DDoS attacks. Budget: $100 Specific security measures: No, I am open to suggestions Timeline: Immediately Skills and experience required: - Strong knowledge of website security and DDoS attack prevention - Experience in implementing security measures to protect against DDoS attacks - Ability to quickly assess and identify vulnerabilities in the website - Proficiency in configuring firewalls and other security tools to mitigate DDoS attacks - Knowledge of industry best practices for website security If you have the necessary skills and expertise to secure my website against DDoS a...
I am looking for a Microsoft Security Consultant who can provide ongoing support for our company's specific security issue of malware attacks. Skills and Experience: - Strong knowledge and experience in Microsoft security solutions - Proven track record in mitigating and preventing malware attacks - Familiarity with network vulnerabilities and data breaches - Ability to provide ongoing support and consultation - Excellent communication skills and ability to respond within 48 hours The ideal candidate will be able to assess our current security measures, identify vulnerabilities, and develop a comprehensive plan to protect our systems from malware attacks. They will also be available to provide ongoing support and consultation as new threats emerge.
IAM / Identity Access Management Architect Expert I am in need of an IAM / Identity Access Management Architect Expert who is experienced in working with open source solutions. The ideal candidate will have expertise in the following areas: IAM Solution: Open Source IAM Requirements: - User Provisioning - group Provisioning - Role based access control - delegeted access control ... - department manager shall be able to provide access to his team members ... - project managers shall be able to delegate a set of their permissions to project members Organization Size: Small (1-100) Skills and Experience: - Extensive knowledge and experience in implementing IAM solutions using open source technologies - Strong understanding of user provisioning processes and best practices - Familiarit...
Bitte melde dich an oder Loge dich ein um Details zu sehen.