Sicurezza Informatica Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Da 101,436 valutazioni, i clienti danno una valutazione ai nostri Computer Security Consultants di 4.9 stelle su 5
Assumi Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Da 101,436 valutazioni, i clienti danno una valutazione ai nostri Computer Security Consultants di 4.9 stelle su 5
Assumi Computer Security Consultants

Filtro

Le mie ultime ricerche
Filtra per:
Budget
a
a
a
Tipo
Competenze
Lingue
    Stato del lavoro
    18 lavori trovati

    Objective # 1: I have hard signs that my ex-wife hijacked my Experian account from Nov 24’ to Sept 25’ and have reason to believe my personal identification info (PII) was leaked online after she ran 45 credit reports without my knowledge. Specifically, the Experian login screen showed her e-mail address and phone number tied to my online profile, preventing me from rightfully reclaiming my account. I’ve already spoken with Experian and finally was able to reclaim my account. Yet I still lack conclusive, court-ready evidence of how the breach occurred, who breached my account(s), where my data travelled, and whether she profited from it or intentionally leaked my PII. She likely used one of her PC/devices to take over my account. Objective # 2: Also, I’m seeking t...

    €37 / hr Average bid
    €37 / hr Offerta media
    11 offerte

    I have a single malware command that was executed on my Windows machine before I wiped the system. I now need that same command run inside a fully isolated virtual machine so every stage can be captured, unpacked, and reviewed without risking any real hardware. I am primarily worried about credentials and logins, browser sessions and cookies, files and documents—really anything the attacker might have reached for. To answer that, I’m asking for a full hybrid analysis that blends static inspection of the PowerShell and Python payloads with live dynamic monitoring. Please instrument the VM, let the malware phone home if it must, watch the network traffic, intercept any staged downloads, and document each indicator of compromise. Deliverables: • A concise written report, in...

    €137 Average bid
    €137 Offerta media
    60 offerte

    I’m looking for a seasoned cybersecurity professional who can carry out a full-scale penetration test against my public-facing web application. My priority is threat assessment and mitigation, so the exercise must simulate real-world attack scenarios, uncover exploitable weaknesses, and give me a clear path to harden the platform. Scope You will conduct a comprehensive, OWASP-aligned assessment that includes manual exploitation techniques in addition to automated scans. I expect you to explore authentication, authorization, session management, input validation, business logic, and any server-side misconfigurations. Google platform for email/domain management and primarily cloud based tools. Tool choice is up to you—Burp Suite, OWASP ZAP, Kali Linux utilities, Metasploit, or...

    €18 / hr Average bid
    €18 / hr Offerta media
    51 offerte

    We are looking for a cybersecurity specialist to support our security assessment and compliance services for small and medium-sized businesses in the Middle East. Role Summary: You will conduct structured security reviews of client environments using industry-standard tools and frameworks, focusing on both technical security and regulatory compliance. Key Responsibilities: 1. Security Assessments: • Run vulnerability scans on networks, servers, and web applications. • Identify security misconfigurations, exposed services, and potential entry points. • Analyze results and validate critical findings. 2. Compliance Reviews: • Map findings against ISO 27001 controls for information security. • Assess client adherence to NIST Cybersecurity Framework (CSF) funct...

    €231 Average bid
    €231 Offerta media
    26 offerte

    This project is a Safe Life awareness website designed to educate people about the importance of safety in daily life. The website provides useful information about personal safety, online safety, and basic precautions that people should follow to live a safe and healthy life. The website is built using HTML and CSS with a simple and user-friendly design so that anyone can easily understand the safety guidelines. The goal of this project is to spread awareness and help people make better and safer decisions in their daily activities. Tags: safe life, safety awareness, html, css, web design, responsive website Industry: Education / Public Safety

    €9 Average bid
    €9 Offerta media
    16 offerte

    I am ready to move our organisation to CMMC Level 1 and need a specialist who can guide the entire process from assessment through remediation and documentation. The scope spans three core areas—network security, data protection, and user access control—across all production servers, employee workstations, and our small fleet of mobile devices. Our environment is a typical Microsoft-centric stack with a mix of on-prem VMware hosts, Office 365, and a few SaaS applications that handle Federal Contract Information. What I need first is a concise gap analysis mapped to CMMC Level 1 requirements (aligned with NIST 800-171 Rev 2). From there, we will prioritise fixes, implement the missing safeguards, and collect artefacts that demonstrate ongoing compliance. I expect clear document...

    €453 Average bid
    €453 Offerta media
    22 offerte

    The project is related to Service-Oriented Architecture (SOA) and web-service environments, with a focus on protecting service performance and availability using a QoS-aware intrusion detection framework. The work involves detecting malicious traffic that affects service quality, such as denial-of-service, brute-force, and other intrusion behaviors, using machine learning and flow-based network analysis. And for the freelancer, write this: What I need in the technical person: I need a technical freelancer who has strong knowledge in: • Service-Oriented Architecture (SOA) or web-service systems • Network security and intrusion detection • Machine learning / anomaly detection • Python and scientific implementation • Data preprocessing, feature engineering, a...

    €464 Average bid
    €464 Offerta media
    59 offerte

    I need a reliable partner who can jump in as first-line support for my staff and keep everyone productive. The focus is on everyday desktop and laptop issues—anything from random hardware glitches to blue screens or slow performance. On the software side you’ll be handling operating system troubleshooting, rolling out application installs and updates, and resolving antivirus or other security alerts before they spread. Network hiccups are another pain point. Expect tickets about dropped internet connections and Wi-Fi dead zones; you’ll diagnose, reconfigure, or escalate as needed so users aren’t offline for long. Although servers and other infrastructure sit in the background, smooth collaboration with my existing IT team is essential when a problem touches their...

    €426 Average bid
    €426 Offerta media
    53 offerte

    I’m ready to have my website professionally stress-tested so I can patch every weak spot before it becomes a problem. The engagement centres on two critical areas that hold our most sensitive logic and data—the Login System and the User Data Storage modules. Within those components I want you to probe specifically for SQL Injection, Cross-Site Scripting (XSS) and Broken Authentication issues, emulating real-world attack scenarios while staying fully within ethical boundaries. Industry-standard tooling such as Burp Suite, OWASP ZAP, sqlmap, or their equivalents is expected so results are reproducible and mapped against OWASP Top 10. All findings must be compiled in a comprehensive, developer-friendly document that not only confirms each vulnerability but explains impact, suppli...

    €205 Average bid
    €205 Offerta media
    40 offerte

    I’m ready to have my website professionally stress-tested so I can patch every weak spot before it becomes a problem. The engagement centres on two critical areas that hold our most sensitive logic and data—the Login System and the User Data Storage modules. Within those components I want you to probe specifically for SQL Injection, Cross-Site Scripting (XSS) and Broken Authentication issues, emulating real-world attack scenarios while staying fully within ethical boundaries. Industry-standard tooling such as Burp Suite, OWASP ZAP, sqlmap, or their equivalents is expected so results are reproducible and mapped against OWASP Top 10. All findings must be compiled in a comprehensive, developer-friendly document that not only confirms each vulnerability but explains impact, suppli...

    €159 Average bid
    €159 Offerta media
    41 offerte

    We are seeking an experienced cybersecurity professional to develop a high-quality, advanced-level practical ethical hacking video course built around a realistic simulated enterprise attack environment. This course must focus heavily on hands-on execution and demonstrate a structured multi-step attack workflow inside a controlled lab network. The final deliverable must contain approximately 10–12 hours of fully edited, polished video content (final runtime after editing). Budget: 40,000 INR (Maximum) Timeline: 30–60 days Core Course Requirements The course must: Be advanced-level practical content Be structured around a connected simulated company environment Include multiple interconnected attack scenarios Demonstrate complete attack chains Include reconnaissance, e...

    €290 Average bid
    €290 Offerta media
    5 offerte

    I’m a complete beginner in wireless security and want to build solid, practical skills in penetration testing for Wi-Fi networks. Over a series of one-on-one sessions, I’d like you to walk me through fundamentals, tools (Kali Linux, Aircrack-ng, Wireshark, etc.), attack simulations, and safe lab setup so I can eventually plan and execute my own wireless assessments responsibly. Please share examples of past work that prove you’ve carried out real-world wireless engagements or successfully mentored others in this niche. Concrete demonstrations—screenshots, anonymised reports, short video clips—help me judge fit quickly. We’ll meet online, screen-share, and practice live. Each session should end with actionable homework and clear checkpoints so I can tra...

    €10 Average bid
    €10 Offerta media
    4 offerte

    The latest patch wiped out every pointer offset my companion app relies on, so most of its memory reads now return garbage and several packet handlers no longer align with the game’s updated structures. I need an expert who can jump straight into the new build, reverse the changed layouts, and hand back corrected offsets (and any packet-structure tweaks you discover) so the tool is fully functional again. Here’s what success looks like for me: • A clean list of updated base addresses, dynamic offsets, and any changed pointer chains tested on the current live client. • Confirmation that each fix restores the original in-game features of my app without crashes or desync. • A brief summary of any packet format adjustments you uncover while tracing traffic so I ...

    €449 Average bid
    €449 Offerta media
    45 offerte

    My wired Ethernet network has stopped working, and I need a skilled technician to get it back online quickly. I’ve already ruled out basic cable swaps, so I’m looking for someone who can: • Diagnose the root cause of the outage (switch, patch panel, NIC, or configuration). • Walk me through any testing steps I should perform on-site (ping, traceroute, link-light checks). • Provide clear, step-by-step instructions or remote-session support to restore connectivity. • Verify that all connected devices regain stable internet and LAN access once the fix is applied. • Offer a brief preventive checklist so I can avoid the same issue in the future. I can share photos of the rack layout, current IP scheme, and error messages from the router and switch interfac...

    €87092 Average bid
    €87092 Offerta media
    6 offerte

    I have a small office network—fewer than twenty endpoints—that I want thoroughly examined for weaknesses. The immediate focus is a vulnerability assessment combined with a full network-security audit. Pen-testing isn’t required right now, but I would like the audit to be detailed enough that we could progress smoothly to active exploitation tests later if needed. Scope – Map every device and service, then scan using industry-standard tools such as Nmap, Nessus or OpenVAS. – Analyse configurations (firewall rules, router settings, shared resources, OS hardening) and identify misconfigurations or outdated software. – Provide a clear, prioritized remediation plan. Critical issues first, followed by medium and low-risk findings. – Conclude wit...

    €19 / hr Average bid
    €19 / hr Offerta media
    30 offerte

    Job Title: Cyber Security Engineer (Checkpoint Firewall & Akamai WAF) Duration: 2 Hours per Day Budget: ₹30,000 per Month Start Date: Immediate About the Role We are looking for a skilled Cyber Security Engineer with expertise in Checkpoint Firewall and Akamai WAF to support our network security infrastructure. The ideal candidate will be responsible for managing firewall configurations, monitoring network security policies, and assisting in the implementation of web application firewall protections to safeguard enterprise systems. Key Responsibilities Configure, manage, and optimize Checkpoint Firewall environments (policy management, rule configuration, and troubleshooting). Implement and maintain Akamai Web Application Firewall (WAF) rules to protect web applications from security t...

    €9 Average bid
    €9 Offerta media
    9 offerte

    Yesterday I noticed that every message and folder in my Hotmail account had vanished after an unauthorized login. I have since taken back control of the mailbox and switched on two-factor authentication, but Microsoft support told me they are unable to restore the data. I still need those emails. I’m after someone who knows the ins and outs of / Microsoft 365 back-end recovery, server-side retention, and forensic mail restoration. If you can locate and reinstate the deleted items—whether through the Recoverable Items folder, legacy PST pulls, or other Microsoft recovery channels—and then harden the account so this can’t happen again, please let me know your approach and an estimated timeline. Acceptance criteria • All recoverable emails and folders resto...

    €118 Average bid
    €118 Offerta media
    5 offerte
    Secure Laptop Storage
    6 ore left
    Verificato

    I need a reliable person located in the United States who can keep my personal laptop safely at their place, plug it in to power, and turn it on once every day. There are no special tasks to run—simply boot it up, confirm it’s online through your regular, stable internet connection, and let it sit for a moment so remote services can sync. After that, you can shut it down again. What matters most is trustworthy, secure storage in a clean, smoke-free environment, and the discipline to power it on daily at roughly the same time. No dedicated network, VPN, or extra equipment is required on your side; a standard home broadband line is sufficient. If you can provide a safe spot, dependable internet, and consistent daily availability, let’s talk about the hand-off logistics an...

    €19 / hr Average bid
    €19 / hr Offerta media
    23 offerte

    Articoli consigliati per te