Computer Security Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 106,053 reviews, clients rate our Computer Security Consultants 4.85 out of 5 stars.
Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    62 jobs found, pricing in USD

    I'm in need of an intermediate level -senior incident response/digital forensics specialist /Linux sysadmin familiar with triage, mitigation/containment , remediation and report writing. To do a on the job walk through of challenging tasks. So I can shadow watch ad take notes, for my thesis and upcoming internship. • Skills and Experience: - Incident response - Linux sysadmin - SOC Analysis with Sentinel, Splunk, Crowdstrike etc - Digital forensics - Report writing We are looking to record step by step actions taken on any job of your choice, preferably something you are already working on , company names will be changed . This project is to support my thesis and also to help improve skills and speed with incidents Looking for an affordable cost and a pa...

    $69 (Avg Bid)
    $69 Avg Bid
    16 bids

    Access Points setup. Provision (x3 Test Devices) for now using the Software Management Tool. License/Registration only. Possible SSID, Security Settings, Guest/Staff SSIDs and other Wireless parameters if we need anything. The main thing is get them configured locally with the most basic setup and a Client Connection before we proceed to next steps on more devices. Omada Controller and Licenses available to manage the devices. Please only get in touch if you've set these up before. Unfortunately, I don't have enough time to start interviewing people. If you're confident enough then please get in touch. Immediate start.

    $88 (Avg Bid)
    $88 Avg Bid
    5 bids

    I'm seeking an experienced cybersecurity professional who can assist me in creating a Remote Access Trojan (RAT) for iOS, with the goal of monitoring text messages, call logs, and WhatsApp on another device. Key Requirements: - The RAT must be able to access text messages, call logs, and WhatsApp on an iOS device - The primary purpose of this software will be for parental monitoring Ideal Skills: - Strong cybersecurity background - Proficiency with RAT creation and deployment - Extensive experience with iOS systems and security - Ethical hacker certification would be a plus The successful candidate must have a proven track record in creating secure and effective RATs, and understand the sensitive nature of this project. Please provide samples of similar projects you have worked on...

    $8 / hr (Avg Bid)
    $8 / hr Avg Bid
    4 bids
    ethical hacker -- 2 1 day left
    VERIFIED

    I am in need of an ethical hacker to assist me in safeguarding my business. The project is of high priority and requires immediate attention. I have a list of objectives which I would like the freelancer to complete. These objectives include, but are not limited to, performing penetration tests, conducting a thorough network security assessment, and carrying out social engineering techniques to evaluate any possible security gaps or weaknesses. The successful freelancer will manage the entire project from start to finish and ensure that objectives are met and that all security concerns have been resolved.

    $14 (Avg Bid)
    $14 Avg Bid
    7 bids

    I need help of internet security expert to help me in few tasks. I will provide details to eligible bidder.

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    20 bids

    I am in need of a proficient professional to set up Firewall Endpoint Security on our Linux operating system. Expertise in dealing with Virtual Private Networks (VPN) setups is vital, as our endpoint runs on such a configuration. The standout requirement for this job entails the implementation of a web filtering system as a specific firewall feature. The goal is to bolster our network's security and ensure operational efficiency. A proficient understanding of: - Firewall setups on Linux platforms - VPN configurations - Web filtering mechanisms is needed for this software-oriented task. Previous experience in similar projects would also be highly beneficial.

    $29 (Avg Bid)
    $29 Avg Bid
    16 bids
    Long-term v2x Security Research 14 hours left
    VERIFIED

    I'm seeking a v2x security expert to conduct in-depth research on threat detection within the v2x technology landscape. This position is for a 3-year period and will focus on the following areas: - Threat Detection: The primary objective is to identify and analyze potential threats to v2x systems. Specifically, I am concerned about Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. The ideal candidate should have: - A strong background in v2x security research, with a focus on threat detection. - Extensive knowledge and experience in Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. - Experience presenting and publishing research at conferences like USENIX and NDSS. - The ability to produce high-quality research papers and practical solutions. -...

    $1224 (Avg Bid)
    $1224 Avg Bid
    8 bids

    I'm looking to have an Automator workflow created that will work with a Safari page. The function of this workflow should be to take the current open web page (which I am viewing in Reader view) and save it as a pdf to the Finder, specifically, to a set folder on my device. Here's what I'm looking for: 1. **Compatibility:** The Automator workflow should be compatible with macOS Mojave. 2. **Naming the PDF:** The saved PDF needs to be automatically titled with the Date in a yyyy-mm-dd format at the beginning of the file name. The website always provides the remainder of the file name, which I want to keep. 3. **Additional Functionality:** No additional functions are required beyond saving the web page as named PDF to a specific folder. The ideal candidate for thi...

    $138 (Avg Bid)
    $138 Avg Bid
    3 bids

    YOU NEED TO BE BASED IN VANCOUVER _ ITS ON ON-SITE TASK I am seeking assistance in setting up my printer and installing a hardware firewall at a physical location in downtown Vancouver. The task needs to be performed onsite by a reliable professional with demonstrable experience. Key elements of the project include: - Installing a printer (Laser, Inkjet or All-in-one Printer). I already have the necessary drivers and software. - Installing a hardware firewall for enhanced network security. The ideal freelancer for this job should have: - Proven experience in printer installation and setup. - A solid understanding of hardware firewall setup and configuration. - Good communication skills, as I may need clear explanations of how to maintain the installed systems. - Onsite availability in ...

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    13 bids

    I'm looking for a professional who can assist me in analyzing PCAPNG files. The two main aspects I'm interested in are network traffic analysis and packet filtering. Key Responsibilities: - **Network Traffic Analysis:** The professional will need to thoroughly analyze the network traffic recorded in the PCAPNG files. This analysis should be aimed at optimizing the network performance. - **Packet Filtering:** Additionally, the expert will be required to implement packet filtering on the network traffic in the PCAPNG files. The purpose of this filtering is to enhance network security and troubleshoot any network-related issues. Ideal Skills: - Deep understanding of network protocols and packet structures - Hands-on experience with PCAPNG file analysis - Proficiency in network tr...

    $35 (Avg Bid)
    $35 Avg Bid
    10 bids

    I recently lost access to my domain purchase account, which I believe has been compromised by an unauthorized user. Despite contacting the domain provider's customer support, I couldn't recover the account. This issue has arisen as my email and phone number linked to the account were altered. The primary goals of this project are: - **Recover Access to Domain Account**: I need a hacking expert to help me regain control over my domain purchase account. This includes resetting the account's email ID and phone number to the original ones. - **Track the Unauthorized User**: Additionally, the freelancer should track the person who has taken over my account. It is essential to identify this user for legal and security reasons. I have already taken steps to secure my phone number...

    $23 (Avg Bid)
    $23 Avg Bid
    6 bids

    I require an experienced programmer with strong knowledge in USB dongles and Windows operating systems. The freelancer will need to provide a driver solution which avoids the need for deactivation of core isolation. While the security details have not been outlined, it is essential to assume a high level of security measures in the course of your work. Desired Skills & Experience: • In-depth Windows operating system know-how. • Highly proficient in coding and software configuration for USB dongles. • Understanding of Windows security protocols will be beneficial. • Proven background in delivering secure and effective driver solutions. Rest assured, your expertise and attention to detail would be much appreciated on this project.

    $567 (Avg Bid)
    $567 Avg Bid
    18 bids

    Recommended Articles Just for You

    If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
    11 MIN READ
    Learn how to find and work with a top-rated Google Chrome Developer for your project today!
    15 MIN READ
    Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.
    15 MIN READ