Computer Security Jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    37 jobs found, pricing in USD
    Data entry 6 days left

    We are looking forward a hard worker Freelancer or an agency who can assist us with Admin [login to view URL] will provide you images and you have you put that text into Word file.! -- 100 Accuracy is essential This is an ongoing [login to view URL] you completed this as per our requirements we will have more such projects for you in near future. NOTE: Candidate must come from USA

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    17 bids
    cloud computing, IoT, 6 days left
    VERIFIED

    cloud computing, IoT, ,more detailsl via chat

    $89 (Avg Bid)
    $89 Avg Bid
    6 bids
    New World Networks 6 days left
    VERIFIED

    I need a science paper on the design of a High Speed Distributed Virtual Private Network (Node based), functioning on IKEv2/IPsec. This network needs to focus on Security (Encryption/User and Node authentication), Speed (bandwidth and throughput), Auto-reconnect, Stability, and Reliability, as well as Compatibility with most Operating Systems (Win/Linux/Android/iOS) on PC/Laptop/Tablet/Mobile Devi...

    $117 (Avg Bid)
    $117 Avg Bid
    3 bids

    We need to use several computers in many regions remotely and this lasts for many years. It needs high internet speed and computer performance. And you must be male who lives in Europe or NorthAmerica.

    $165 (Avg Bid)
    $165 Avg Bid
    9 bids
    Need a softether expert 6 days left
    VERIFIED

    Hi, i need a softether IPSEC vpn expert

    $46 (Avg Bid)
    $46 Avg Bid
    7 bids

    Hello. We are a digital marketing agency looking to outsource and hire a part time freelancer with the credentials of a cyber security manager. We work with multiple tools and servers including our main which is our application. Please message me for further details. Thank you. PS: Please note this is a part time, fixed monthly salary job posting.

    $553 (Avg Bid)
    $553 Avg Bid
    16 bids
    FORESCOUT - FSCA 6 days left
    VERIFIED

    Need a FORESCOUT SME who can help with the FSCA exam

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    Steps: 1. Analyse the network and create a security policy based on the best practices (Defence in Depth and The Principle of Segregation) for the network infrastructure. In order to achieve this the students need to execute step 2 (covers LO 3.1). 2. Identify the devices which may be secured, the services which are provided by them, their criticality in the network, their vulnerabilities and poss...

    $251 (Avg Bid)
    $251 Avg Bid
    11 bids

    need a expert in high-performance computing cluster

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    3 bids

    Project Description: 1. PenTest to be run via internal/external IP addresses of hosted application. 2. Web application assessment. 3. Best practice compliance analysis 4. Hardening workshop. 5. Post-hardening assessment. 6. Training

    $3776 (Avg Bid)
    $3776 Avg Bid
    19 bids

    On any of the Topcis list below : About 10-20 pages: Adaptive & Self-Organizing Systems Artificial Intelligence Autonomous Systems Computer Networks & Communications Computer Vision Databases Distributed & Parallel Computing Human-Computer Interaction Mobile & Ubiquitous Computing Network Science & Online Social Networks Programming Languages Scientific Computing &...

    $116 (Avg Bid)
    $116 Avg Bid
    75 bids

    I have a local network program : client program and server program , the client program need some updating but the coder is not available , so we want to develop the client program ourselves , when we used wireshark program to know the communication way between the client and server program , we saw the login data we entered seems to be encrypted as attached , the login user was: 65479 and the p...

    $246 (Avg Bid)
    $246 Avg Bid
    11 bids
    Packetfence project 4 days left
    VERIFIED

    One of our customers is undertaking a project to install Packetfence as a NAC solution in their network. We are looking for someone who is expert in Packetfence to do this project. The customer is in Saudi Arabia, Riyadh, and the work has to be onsite. Customer has around 200-300 servers, and more workstations.

    $52 / hr (Avg Bid)
    $52 / hr Avg Bid
    6 bids

    The year 2020 was predicted to be the most effective year for IoT revolution. , we are already witnessing the presence of IoT devices and the increment in their uses for many practical problems. The rapidly increasing number of attacks is posing a huge problem for the IoT community. The IoT devices are deemed attractive by the attackers and vice-versa. They have limited power and memory and comput...

    $457 (Avg Bid)
    $457 Avg Bid
    8 bids
    GRC Consultant- Australia 3 days left
    VERIFIED

    Id like a GRC consultant based in Australia.

    $127 (Avg Bid)
    $127 Avg Bid
    2 bids
    computer forensic plan. 3 days left
    VERIFIED

    It is a computer forensic plan for a given case study. word limit 3500 word long

    $86 (Avg Bid)
    $86 Avg Bid
    38 bids

    We are a start-up company with 4 developers and planning to expand the team to 10. We need suggestions & Methods to Protect our Source Code from theft (new employees copying them to their mails etc ) Work Environment We provide laptops to work & internet is enabled in all the laptops. Employees carry Laptop with them & Do work from Home

    $146 (Avg Bid)
    $146 Avg Bid
    2 bids

    Genuine Research in Information Security, (Please get invited if you have the experience and time for this project).

    $111 (Avg Bid)
    $111 Avg Bid
    20 bids

    I want to have a program that indent individual person using ECG signal. I need a special expert in studying and managing ECG authentication or bio-security.

    $1021 (Avg Bid)
    $1021 Avg Bid
    8 bids

    It is necessary to develop on a microchip microcontroller, the consumption of an api in Json format with aws 4 authentication and api key through a simcom sim800 modem

    $560 (Avg Bid)
    $560 Avg Bid
    11 bids
    growth hacking 2 days left

    Looking for a growth hacker to pay monthly to manage social media & other media channels of our business.

    $652 (Avg Bid)
    $652 Avg Bid
    6 bids
    i need app that 2 days left
    VERIFIED

    can catch user typing , and can do print screen if 2 words and up are being typed

    $136 (Avg Bid)
    $136 Avg Bid
    21 bids

    I have a network architecture designed. I need routing to be done on the architeture to enable connection between routers and devices.

    $445 (Avg Bid)
    $445 Avg Bid
    27 bids

    I need security certificates added to two websites

    $94 (Avg Bid)
    $94 Avg Bid
    21 bids

    Create a presentation to propose a solution for a company to improve security around their network, this includes securing their data at transit and at rest, supporting relevant pci compliance, protecting their users/devices/systems from attacks and enables meaningful reporting on user/network activity. The solution will cover products in network security, cloud, LAN, WAN, and voice.

    $565 (Avg Bid)
    $565 Avg Bid
    11 bids
    IT security Kali Linux URGENT 2 days left
    VERIFIED

    need urgent help with a technical report in IT security Kali Linux need to report on one vulnerability testing tools of Kali Linux:  Hydra  Maltego  NMap  Zed Attack Proxy  SqlMap  Metasploit Framework  Burp Suite

    $21 (Avg Bid)
    $21 Avg Bid
    14 bids

    Field support engineers and technicians give on-the-scene support for network connections and for police work flaws associated with hardware, networking, software, configuration, and inconsistent power provide. The engineers and technicians should support the installation tasks, together with testing, documentation, and setup. Field support specialists additionally participate in conferences and a...

    $29 / hr (Avg Bid)
    $29 / hr Avg Bid
    10 bids

    Field support engineers and technicians give on-the-scene support for network connections and for police work flaws associated with hardware, networking, software, configuration, and inconsistent power provide. The engineers and technicians should support the installation tasks, together with testing, documentation, and setup. Field support specialists additionally participate in conferences and a...

    $33 / hr (Avg Bid)
    $33 / hr Avg Bid
    6 bids

    Dear User: First of all I would like to know our experience or study or something that garantee me our profesional work... Show me by examples how easy is taking the control of the Android Device with the last techniques of hacking... How to found cero days mistakes of apps to keep control of other devices also with antiviruses... Then how to stay update to avoid new techniques against me abou...

    $128 (Avg Bid)
    $128 Avg Bid
    4 bids

    Dear User: First of all I would like to know our experience or study or something that garantee me our profesional work... Show me by examples how easy is taking the control of the Android Device with the last techniques of hacking... How to found cero days mistakes of apps to keep control of other devices also with antiviruses... Then how to stay update to avoid new techniques against me abou...

    $533 (Avg Bid)
    $533 Avg Bid
    12 bids
    Formal Automata theory 2 days left
    VERIFIED

    Computer automata theory and formal languages

    $42 (Avg Bid)
    $42 Avg Bid
    6 bids

    Needed a female candidate, who has experience in networking ipv4 and ipv6 work.

    $127 (Avg Bid)
    $127 Avg Bid
    2 bids

    wifi installation in team members accommodation, full solution

    $57 / hr (Avg Bid)
    $57 / hr Avg Bid
    17 bids

    We have Fortinet Switches, Wireless AP and Firewall we need some configuration​ support on site in Scunthorpe

    $1425 (Avg Bid)
    Local
    $1425 Avg Bid
    4 bids

    This job description will be discussed with potential applicants only after strict vetting and background checks have been completed. Previous experience in [login to view URL] intelligence, counter/surveillance, encryption/decryption, anti denial of service protection protocols etc. Are highly recommended

    $54 / hr (Avg Bid)
    $54 / hr Avg Bid
    14 bids

    I am looking for someone can help me to find hackers who can do white and black hat jobs. We need minimum three hackers to do a great number of jobs. Your payment can be negotiated. But suggested way would be on project basis as we have a great number of project going on here. Alternatively we can pay you a one off introducing fee once the first project is completed.

    $516 (Avg Bid)
    $516 Avg Bid
    17 bids

    Implementación de Sistema de Gestión de Seguridad de la Información con base en la Norma ISO 27001:2017 (2013) en CDMX, Duración: 5 meses. Giro: Call center. Requiere trabajo presencial al 50%

    $4106 (Avg Bid)
    $4106 Avg Bid
    6 bids

    Top Computer Security Community Articles