Computer Security jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    824 jobs found, pricing in USD

    Hi, I need someone who can help me migrate my emails, emails accounts and domain to a new g suite account.

    $151 (Avg Bid)
    $151 Avg Bid
    3 bids
    ML Palindrome Checker 6 days left
    VERIFIED

    Background A palindrome is a sequence that reads the same forwards and backwards. For example “1234321” is a number palindrome, but “123456” is not. Examples of word palindromes include “wow” and “Hannah”. Phrases are generally considered palindromes when punctuation and spacing is ignored, such as “Madam, I’m Adam”, “A man, a plan, a canal – Panama!” and “Able was I ere I saw Elba.” +++++ Overview: Write an ML program that determines if a string is a palindrome. Specifics: 1. The only predefined ML functions that you are allowed to use are explode, chr, and ord. Otherwise, you need to write your own functions. 2. You may not use ML iterative functions such as for or while. (You may use @, ::, if-the-else and recursive function calls.) 3. You are required to write a function named is_palindrome that takes a string as the argument and returns Boolean true if the string is a palindrome, and false if it is not. The user can include any spacing, capitalization, and punctuation they wish – your program just analyzes whether the alphabetic characters constitute a palindrome. For example, give the function call is_palindrome “A man, a plan, a canal – Panama!” your function should evaluate to true. For the function call is_palindrome “ML is the best language!” your function should evaluate to false. 4. Please see the tips below for suggestions. Style: For full credit, you must follow the programming style requirements for this class: • Include a header comment containing your name, the date, the name of the program, and the purpose of the program. • Comment sections of your code in enough detail for another programmer to understand what you are doing. (Generally, commenting what each separate task is doing is sufficient.) • Comment each function, describing the purpose of the function. This usually means that you will describe each argument of a function, and what the function evaluates to. • There should be no “match non-exhaustive” warnings, except in really special cases where it does not make logical sense to make exhaustive matches (ask me if you are uncertain). A Poly Equal warning is acceptable, but no other warnings are allowed. • In addition, for recursive functions you need to include a comment pointing out which is the base case and which is the recursive case. Tips: 1. At the beginning of your file, it may be useful to define some variables that contain lists and strings. You can then use them for testing your various functions. 2. I recommend that you start out by writing helper functions to perform useful tasks (but these are not required -- you can solve this in a different way if you wish, within the problem constraints): a. my_reverse: reverses a list (without using the built-in ML function reverse). The function call my_reverse [#”a”, #”b”, #”c”] should evaluate to [#”c”, #”b”, #”a”] b. removeNonAlphabetic: given a list of characters, this function returns a list where all non-letter characters have been removed. In other words, it deletes spaces, commas, other punctuation marks, and numbers. The function call removeNonAlphabetic [#”A”, #” “, #”b”, #”!”] should return [#”A”, #”b”]. Note that this is equivalent to the function call removeNonAlphabetic(explode “A b!”). c. changeToLowercase: given a list of characters, this function returns a list where all uppercase letters have been converted to lowercase letters. Hint: The ML functions ord and chr could be useful here, as would the knowledge of the ASCII values for A and a. The function call changeToLowercase [#”a”, #”A”] should return [#”a”, #”a”] d. getLast: given a list, this function returns the last item in the list. A function call getLast [1,2,3,4] should return 4 e. removeLast: given a list, this function returns a list with the last item removed. A function call removeLast [1,2,3,4] should return [1,2,3]

    $28 (Avg Bid)
    $28 Avg Bid
    4 bids

    I need to identify limited level of access for each user in HikVision DVR

    $107 (Avg Bid)
    $107 Avg Bid
    9 bids

    We have 2 desktop and 4 laptops in our office we need to get all connected.

    $26 (Avg Bid)
    $26 Avg Bid
    28 bids

    Section 1: Presumptive testing of JJ/2 This section must include: more information will be given Section 2: Quantification of Alcohol in JJ/3 This section must include: more information will be given

    $132 (Avg Bid)
    $132 Avg Bid
    16 bids

    hello need ethical hackers and programming experts for my ongoing projects. the person should be well versed with all the points of the networking and coding. there will be one small demo anf if you pass that there will be bounty of projects to work on. please not I AM NOT PAYING for the demo project. thank you.

    $420 (Avg Bid)
    $420 Avg Bid
    15 bids

    Objectives 1) Providing data communication security through hybrid protocol for multiple WBANs working at same time. This security protocol should consume low energy & also low memory space . 2) Prioritizing data/node based on critical physiological value sensed by sensors..(Data can be classified as critical data & non-critical data & accordingly prioritization should be done). Need to decide at which tier data prioritization should be done. 3) Handling node failures in all the 3 tiers as the WBAN consists of 3 tiers . >> At sensor level/tier 1--Cluster head failure where data aggregation will be done, >> tier-2-Personal server failure >> tier 3-Medical server failure Related to this point also deciding suitable network structure, topology & data routing mechanism ( algorithm) whether it should be ADHOC network or Infrastructure based network along with pros, cons of each & justification for deciding the chosen network structure.

    $155 (Avg Bid)
    $155 Avg Bid
    2 bids
    $37 Avg Bid
    17 bids

    We are seeking a Penetration Tester who is seeking to work with us long term on many projects.

    $1113 (Avg Bid)
    $1113 Avg Bid
    30 bids

    Hi Muhammad Hamid A., I noticed your profile and would like to offer you my project. We can discuss any details over chat.

    $262 (Avg Bid)
    $262 Avg Bid
    3 bids

    I have to pcap file that need to be scanned by snort to detect attack, alerts etc.... If you can run it on your computer,take screen shots, put the results in a notepad that would be perfect!

    $35 (Avg Bid)
    $35 Avg Bid
    4 bids

    This project is about accessing the desktop or device remotely by using VNC through mobile or another device.

    $26 (Avg Bid)
    $26 Avg Bid
    11 bids

    We have game for android platform available on play store...live servers with many players already. We need someone to investigate our security holes. Namely is it possible to receive by our players free in game credits....as it has happened before.

    $154 (Avg Bid)
    $154 Avg Bid
    8 bids
    forensic report 4 days left
    VERIFIED

    i want forensic report see the pic >>> and i want same idea of the word file

    $36 (Avg Bid)
    $36 Avg Bid
    24 bids
    Security project 4 days left
    VERIFIED

    protocol analysis and explanation

    $117 (Avg Bid)
    $117 Avg Bid
    23 bids

    Need help to solve a PGP signature validation issue and fast. our counter partner can not validate our signature. Need someone really understand the PGP framework and in&outs. Need to be good at c++, C# to help build the code.

    $817 (Avg Bid)
    $817 Avg Bid
    9 bids

    I'm looking for someone who can build ms office silent doc builder (or one build) or refud exist one take for references CVE-2017 8570, 2017-8759, 2017-11882, 2017-0199 consider that the generated file (Output) should be 100% FUD not UD, and can bypass protection view The doc exploit must be SILENT type (Not Macro). The word document when opened must silently and automatically execute the provided file/URL/script The exploit should work by download and execute method as opposed to embedding the file/URL/script(js,vbs,powershell) within the document The output word document when downloaded from the internet should be able to run with protected view enabled without the victim having to enable editing. N.B: THE PROJECT IS FOR PENTEST PURPOSE FOR A SPECIFIC PENTEST AGREEMENT NO ILLEGAL USAGE IS INVOLVED

    $155 (Avg Bid)
    $155 Avg Bid
    1 bids
    Data Encryption 3 days left
    VERIFIED

    1. Secure data and encrypt using private keys as Read only, no delete, update or edit. 2. Source of origin, Date&Time stamp. 3. decrypt data with using the specific keys, add user.

    $892 (Avg Bid)
    $892 Avg Bid
    7 bids

    I need programming and scripting language experts for my ongoing job. The person should also be able to tweak errors in networking,vapt as well. Initially you will be given a demo project for free and you will start the earning when you complete it.

    $531 (Avg Bid)
    $531 Avg Bid
    9 bids

    Hi, this is a simple socket programming project. We already have the connection and everything set up, you just have to help us send a HMAC to the server, the server would decrypt it if it is correct or else it would reject it. Text me up, if you wanna talk in detail!

    $34 (Avg Bid)
    $34 Avg Bid
    7 bids

    Top Computer Security Community Articles