Computer Security jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    678 jobs found, pricing in USD
    project in python using ASLR 6 days left
    VERIFIED

    hi, need to modify my project based on my attachment file

    $101 (Avg Bid)
    $101 Avg Bid
    3 bids
    networking 1 6 days left
    VERIFIED

    basic principles and operations of Local Area Networks (LAN's). Such topics include basic data communications, the OSI model, protocols and topologies. experience with the installation, administration, and operating characteristics of such networking systems as Netware 3.12, Windows 2008, and Linux

    $35 (Avg Bid)
    $35 Avg Bid
    10 bids

    I would like someone to create a realistic looking email purporting to be the administrator of an organization. I am giving a presentation this week regarding cybercrime awareness. As part of this we are showing how credential harvesting works. We will provide the name of the organization and the website you should link to. The email needs to look like it is coming from this organization and s...

    $26 (Avg Bid)
    $26 Avg Bid
    4 bids
    Ethical Hacking Project 6 days left
    VERIFIED

    Requirements For the practical part of this assignment, you will have to build three Virtual Machines (VM): 1. A Linux Server o You could use CentOS or Ubuntu Server o Minimum configuration required  DNS  An additional service of your own choice (e.g. DHCP, FTP, SMTP, SNMP etc) 2. A Client o Could be either Windows (Visa, 7, 8, 10 etc) or Linux (Fedora, Ubuntu etc) o You could create multiple co...

    $786 (Avg Bid)
    $786 Avg Bid
    5 bids
    Java Ransomware 6 days left
    VERIFIED

    One windows 10 computer with 4-5 hard drives got infected recently with ransomware ([url removed, login to view]) all it says in the notepad file is files encrypted email mr_nicee@[url removed, login to view] if you Know or think there is a chance of getting rid of this ransomware and restoring thr files plz bid

    $396 (Avg Bid)
    $396 Avg Bid
    14 bids

    i have a package capture by wireshark and need someone that knows wireshark and can find me the live video stream url in it and extra it so i can play in in vlc or any other player.....

    $127 (Avg Bid)
    $127 Avg Bid
    23 bids

    I need help with creating a cisco packet trace project, I have created a packet tracer design, but it needs improvement. The instructions are attached to the zip file. If you prefer to create your own design in packet tracer, that is fine. However, I will need the commands you used to implement the project in a word document.

    $114 (Avg Bid)
    $114 Avg Bid
    6 bids

    For a publication library Win32 app, I am looking to extract data from its proprietary and undocumented file format. * It is multilingual and precedes Unicode, most likely compressed. * The individual documents are search indexed (indices in separate files). * They are sorted into a hierarchy: Publication (file-level) > Chapter > Content. * Some publications are magazines, their hierarchy i...

    $492 (Avg Bid)
    $492 Avg Bid
    4 bids
    server penetration testing 5 days left
    VERIFIED

    I am looking for a security expert for a test of penetration and information retrieval, with this : technical report containing issue, issue background/impact , issue severity level remediation and poof of concep minimum OSCP certified CREST CERTIFICATION i need certified test

    $262 (Avg Bid)
    $262 Avg Bid
    10 bids

    You will analyze (statically and dynamically) different types of malware in Virtual machines. There will be other tasks as well. Please contact me asap for more details. Thanks.

    $161 (Avg Bid)
    $161 Avg Bid
    9 bids
    create network upgrade plan 5 days left
    VERIFIED

    Produce a plan to upgrade the network infrastructure.

    $124 (Avg Bid)
    $124 Avg Bid
    26 bids

    need a person that can thwart virus and guarantee a safe and virus free workforce . also have 25 computers that have been infected by deadly virus and hoping someone can salvage the computers or will have to destroy

    $696 (Avg Bid)
    $696 Avg Bid
    21 bids

    Want someone that is capable in computer security to make sure I am safe and provide me with guidance on some security questions. I got hacked.

    $316 (Avg Bid)
    $316 Avg Bid
    31 bids
    Cooja attacks implementations 4 days left
    VERIFIED

    I need some RPL protocol attacks to be implemented in cooja. the person should have deep understanding of the rpl protocol and socket and network programing. most of cooja code is done in C language . if you think you have the skill lets chat and see how it goes .

    $555 (Avg Bid)
    Featured NDA
    $555 Avg Bid
    4 bids
    crypto exchange 4 days left

    we need a crypto exchange like binance or poloniex bitfinex.

    $4818 (Avg Bid)
    $4818 Avg Bid
    22 bids

    Need idea for feature extraction of dynamically executed malware samples

    $20 (Avg Bid)
    $20 Avg Bid
    2 bids

    Duties entail but are not limited to: Plan, implement and upgrade security measures and controls Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction Maintain data and monitor security access Perform vulnerability testing, risk analyses and security assessments Conduct internal and external security audit...

    $541 (Avg Bid)
    $541 Avg Bid
    14 bids

    i need of a project in C/C++ kernel driver that can remove a determinated folders and all your subfolders that are keep protected by rootkit without reboot computer. Exists some anti rootkits softwares that are able of do this eg: PC Hunter ([url removed, login to view]) ([url removed, login to view]). I'm search a professioanal with large experience with kernel driver programming and C/C...

    $542 (Avg Bid)
    $542 Avg Bid
    8 bids
    Mikrotik Router IT 3 days left
    VERIFIED

    Hello, I need help to set up an ipsec tunnel to a firewall of mine on a Mikrotik RB1100. Please apply only if you know Mirkotik routers good and if you can do immediatly. Teamviewer will be provided

    $108 (Avg Bid)
    $108 Avg Bid
    11 bids

    We recently installed a Mickrotic router of 7 ports with OS RouterOS v6.39.2 (stable). We have set up 2 networks [url removed, login to view] (public) and [url removed, login to view] (administrative) with a firewall preventing access from network 4 to 5. We get internet from 2 ISP connected on ports 2 and 3. Unfortunately we have not being able to set up load balancing between the 2 ISP ...

    $120 (Avg Bid)
    $120 Avg Bid
    14 bids

    Top Computer Security Community Articles