Computer Security jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    35 jobs found, pricing in USD

    Information collection and processing. We will find the answers you are looking for. One call away.

    $132 (Avg Bid)
    $132 Avg Bid
    3 bids

    I will provide document about project and infor mation give me answers for 2,14 ,15 16 by 8:00PM today and send me remaining and document in 3 days thats fine 2) LAN/WAN UPS not operational 14) Password hasn't been changed in over a year 15)Office left unlocked during lunch/breaks and overnight 16) Retired employee able to login identify Threats that can exploit the Vulnerabilities/Weaknesses add Risks that can generate loss to an Asset (Hardware, Software, Data, Service, etc) add Countermeasures that can mitigate the Risks

    $74 (Avg Bid)
    $74 Avg Bid
    6 bids
    research working 6 days left
    VERIFIED

    wan networks ,cloud ,controllers

    $26 (Avg Bid)
    $26 Avg Bid
    21 bids

    Web development, computer security and online training

    $168 (Avg Bid)
    $168 Avg Bid
    7 bids

    I am searching someone who is CompTIA Network+ 2016 certified and able to help to pass the exam. Course will be in English and a minimum of 850 points is required Time: 90 minutes Remote Access will be provided

    $124 (Avg Bid)
    $124 Avg Bid
    8 bids
    Secure driver read and write 6 days left
    VERIFIED

    About BE security-driven read and write

    $283 / hr (Avg Bid)
    $283 / hr Avg Bid
    11 bids

    Experience in performing Security Incident Response and Forensics evaluation with SIEM Tools. A minimum of three (3) years of experience in conducting static code and dynamic application analysis using code analysis tools such as Fortify, AppScan, Veracode, SonarQube and penetration testing utilities Analyze and define security requirements for Multilevel Security (MLS) issues. Design, develop, engineer, and implement solutions to MLS requirements. Responsible for the implementation and development of the MLS. Gather and organize technical information about security mission, goals and needs, existing security products, and ongoing programs in the MLS arena. Perform risk analyses, which also include risk assessment. Incident Response and Forensics evaluation using security information and event management (SIEM) tools Provide support for audit responses in accordance with organizational requirements. Ensure that the MHBE system security requirements are addressed during all phases of the system development life cycle. Conduct daily/weekly security audit log reviews, and report any suspicious activities. Conduct security impact analysis of controls on proposed system changes. Conduct ongoing security reviews and tests of the MHBE systems to periodically verify that security and operating controls are functional and effective. Review and update systems security documentation and artifacts such as SSP, ISRA, PIA, SSR, CAP and POA&Ms. Create and track POA&M requirements for resolving security findings. Adhere to all security, change control and MHBE Project Management Office (PMO) policies, processes and methodologies.

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    5 bids
    IT writing 5 days left
    VERIFIED

    need help on the IT writing task.

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    35 bids

    Reparación de sistema operativo, Formateo del ordenador, Instalación de driver, instalación de programas, Programas Antivirus, Fallos de conexión a internet, Problemas con navegadores, Problemas con impresoras, Preguntas de ofimática, Preguntas de programas de uso común, como Zip, RAR, Office, etc

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    11 bids

    Hi, I'm looking for IoT Security training for me in Baddi in August

    $28 / hr (Avg Bid)
    $28 / hr Avg Bid
    2 bids

    I require Companies House ( UK ) Annual Accounts Completed. I will not accept tenders from outside the United Kingdom

    $198 (Avg Bid)
    $198 Avg Bid
    5 bids

    need to implement cryptic Secure communication with the help of cryptographic services trust based routing and policy based access control and embed data in a QR code just need report and source code and simulation using cooja simulator

    $171 (Avg Bid)
    $171 Avg Bid
    1 bids

    I need an Android app. I already have a design for it, I just need it to be built.I am a Programmer a JavaScript

    $2310 (Avg Bid)
    $2310 Avg Bid
    13 bids

    A specialist in computer network security is required in CentOS 7 operating systems, to configure an email server (Postfix) in order to prevent reporting of the unwanted email list, and to try to optimize the security and speed of the network. Example: Remove the botnet reported in the following url with the IP [login to view URL]: [login to view URL]

    $137 (Avg Bid)
    $137 Avg Bid
    20 bids

    We need IT specialists, software developers, blockchain hackers, engineers and others, for our project. Possible work in Europe.

    $4833 (Avg Bid)
    $4833 Avg Bid
    35 bids
    cyber security 3 days left

    Part 1 • Input – A given text file for plaintext or ciphertext (assume only 26 letters, no special characters, numbers and punctuations) – 3 substitution ciphers, M1,M2,M3 • M1 – left shift 3 letters • M2 – Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher: D K V Q F I B J W P E S C X H T M Y A U O L R G Z N • M3 – right shift 5 letters – cycling pattern • n=3: M1,M3,M2,M3; M1,M3,M2,M3; • Output – Encrypted ciphertext or decrypted plaintext Part 2 • Input – A given text file for plaintext or ciphertext – A given depth of rail fence • Output – Encrypted ciphertext or decrypted plaintext

    $39 (Avg Bid)
    $39 Avg Bid
    15 bids

    Read Carefully before bidding !!!!!! Only Expert CPP just bid , if you are not expert on CPP don't bid please or your bid will be ignored. need a coder HTTP Controller will be coded with C++/Cwith PHP admin panel to control the client's machines. it should work from Windows XP to Windows 10 x64. More details will be sent via text file about the panel and the executable file. Requirements: have experience with this: obfuscation Watchdog techniques Code injection. Direct memory write Application initialization registry key Windows Hook Winlogon notification packages Permission modification. File locking Object access control lists Account privileges Rootkit techniques Usermode. Kernel mode'

    $2287 (Avg Bid)
    $2287 Avg Bid
    11 bids

    i need to reconfigure our damaged OS on HP ilo 3 server

    $111 (Avg Bid)
    $111 Avg Bid
    11 bids

    Want a networking engineer to take command and do networking (CAT6 cable run in PVC Conduit in wall) with the help of other person, punching, crimping, rack mounting and dressing

    $395 (Avg Bid)
    $395 Avg Bid
    20 bids
    Virus Disinfection tool 2 days left
    VERIFIED

    Hi, [login to view URL] are looking for custom development solution, related to injector cleaning virus . [login to view URL] will be providing virus sample for your analyses. 3. Detection speed should be reasonable - desirable under 200 milliseconds for single file. This may require to change method from disassembler to static analysis. [login to view URL] detection and disinfection ratio for samples, which we provide Example tool link below [login to view URL]

    $510 (Avg Bid)
    $510 Avg Bid
    5 bids

    We want to configure Palo Alto Firewall in our Lab.

    $1099 (Avg Bid)
    $1099 Avg Bid
    34 bids

    GcPro Key is a GSM Professional Dongle, i want to share this usb key online, i tried every usb share software you will imagine nothing work the problem when GcPro software installed if it detect any usb share software it will close the application i even tried to share it using Remote Desktop Connection but can't detect dongle drivers so can't share it to another computer

    $10 - $30
    $10 - $30
    0 bids

    I am opening a new computer shop and would like to find someone who could help me with computer repairs than can be done remotely. Mostly virus/malware removal

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    23 bids

    Network Intrusion Detection System using Machine Learning (Reinforcement algorithm) To detect these intrusions our proposed approach would be using Deep Reinforcement Learning and Q Learning which improves the stability and performance of the system. We want to detect DDoS attack: DDoS: Distributed Denial of Service attack is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. These attacks are one of the most dangerous security threats, in which attackers aim to break down the victim’s computer network or cyber system and interrupt their services. MEC systems are especially vulnerable to distributed DoS attacks, in which some distributed edge devices that are not well protected by security protocols can be easily compromised and then used to attack other edge nodes. Some attackers also aim to prevent the collaborative caching users from accessing the caching data. Jamming can be viewed as a special type of DoS attack. The simplest approach could be to examine the logs of the web server and to identify whether the query relates to the DoS/DDoS attack or not. Collect the good and bad queries, label them (either bot or not). The tricky part will be to extract features. As features you can use: HTTP request method HTTP status code URL File name ([login to view URL]) Useragent IP address Geolocation of the IP address Train and test machine learning model. The drawback of the proposed approach is that the requests are treated as single objects and not as a part of the attack. Our proposed method consists of first by using a supervised learning model the Support Vector Machines (SVM), which captures network traffic, filters HTTP headers, normalizes the data on the basis of the operational variables: rate of false positives, rate of false negatives, rate of classification and then sends the information to corresponding SVM’s training and testing sets. then, we use Deep Q learning to attain the best possible reward. We are using CICIDS 2017 dataset for intrusion detection which has the latest attributes with new types of attacks. In this section we have analyzed various types of publicly available dataset which we have used for training our neural network. CICIDS2017: Generating the realistic background traffic is one of the highest priorities of this work. For this dataset, we used our proposed B-Profile system (Sharafaldin et al., 2017), which is responsible for profiling the abstract behavior of human interactions and generate a naturalistic benign background traffic. Our B-Profile for this dataset extracts the abstract behavior of 25 users based on the HTTP, HTTPS, FTP, SSH, and email protocols. It also includes the results of the network traffic analysis using CICFlowMeter with labeled flows based on the time stamp, source and destination IPs, source and destination ports, protocols and attack (CSV files).

    $520 (Avg Bid)
    $520 Avg Bid
    14 bids

    Hello I am my name is Siddhanth and i am an freelancer although i am planning on making new company related to cyber-security & Technology. In order to do so i am hiring an team who can spare their time to work with each other and earn more profit and some respect.I am stating the requirements below:- Requirements: [login to view URL] member must be living in mumbai and must have proper understanding with us on the pay [login to view URL] member must have atleast intermediate Cyber-Security and Penetration Testing Experience [login to view URL] provide proper identity proof & shall give us proper resume or info on your previous achievements. Thanks for paying attention we await you response.

    $9 / hr (Avg Bid)
    $9 / hr Avg Bid
    8 bids

    We are looking to build some stable solution for screen sharing or parental control of peers Laptops (aproxx 50) using local network/LAN without using Internet.

    $308 (Avg Bid)
    $308 Avg Bid
    11 bids

    There is an Instagram account which hasn't been used since 2011, very few followers and only 2 pictures uploaded. Is it possible to delete the account (for an anonymous user) which hasnt been used for 7 years and reactivate it as a new user which is me?

    $169 (Avg Bid)
    $169 Avg Bid
    5 bids
    Malware Analysis 20h left
    VERIFIED

    Many ways to analyze malware, a little de-obfuscation and network activity.

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    18 bids

    Hello, I am looking for someone to edit the technical document in terms of drawing flowchart with any tools and writing few paragraphs in the report. Note: 1. Due in next 33 hrs 2. The writer should have an experience in Network and Security domain 3. Good command on the language

    $40 (Avg Bid)
    $40 Avg Bid
    31 bids

    this project is based on online book [login to view URL] content on this site is written by me which is based on latest updates of googe based on Artificial Intellegence. you can have a glance at www.picasoprint.com.

    $93 (Avg Bid)
    $93 Avg Bid
    9 bids

    I need a VISIO Expert who has good skills in making Diagrams of Class Diagram, etc of Computer Sciences. I need a serious and hard working person

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    4 bids

    Need freelancers on network security CITRIX experience in Germay for 195 days on per day basis. Check the file and bid only if you have CITRIX experience. Happy bidding.

    $5941 (Avg Bid)
    $5941 Avg Bid
    4 bids

    It's a security automation tool, if you have a good knowledge in C and in Computer Security, this one is a perfect project for you to work on. Including worm concepts, exploiting systems and more.

    $429 (Avg Bid)
    $429 Avg Bid
    8 bids

    Top Computer Security Community Articles