Sicurezza Informatica Jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

Assumi Computer Security Consultants

Filtro

Le mie ultime ricerche
Filtra per:
Budget
a
a
a
Tipo
Competenze
Lingue
    Stato del lavoro
    34 lavori trovati, prezzi in EUR

    I need to look back on my search history over a specific period, but have deleted the history, and the activity log from my Google account. I'm hoping there will be another way to recover this search history. I'm also looking to improve the overall security of my laptop as I have concerns that I have been hacked.

    €203 (Avg Bid)
    €203 Offerta Media
    10 offerte

    Ok for this project you’ve been given several codes that you need to try and decode. You’ll need to research some of the most common encoding schemes used to try and break each of the codes. An experienced security expert can spot most encoding schemes very quickly, the trick is to check the character set used in the encoded message and the length of the encoded message, these will poi...

    €24 (Avg Bid)
    €24 Offerta Media
    2 offerte

    We need to simulate sinkhole or sybil attack using cooja simulator in RPL. Thus, we need to modify the source code of objective function that handles rank calculation. All this must be done in contiki OS 2.7

    €179 (Avg Bid)
    €179 Offerta Media
    2 offerte

    Mixed method data analysis quantitative using SPSS (simple statistics) then using MAXQDA for interview coding ) phd level then discussion

    €442 (Avg Bid)
    €442 Offerta Media
    18 offerte

    Show me my network and device vulnerabilities.

    €150 (Avg Bid)
    €150 Offerta Media
    22 offerte

    Looking for help setting up a Synology Diskstation with SSL and a private domain name, access through my router (the diskstation has an internal static IP) setting up tight security policies and firewall rules, and implementing best practices for data security, virus protection and automated backup.

    €36 / hr (Avg Bid)
    €36 / hr Offerta Media
    19 offerte
    Cisco Network Engineer 4 giorni left
    VERIFICATO

    Location of the Job: NEW YORK (USA) Type of the job: On-Site Duration: 1 to 2 Days Max Hi, We need a Cisco Field Engineer to do a LAN MAINTENANCE IN NEW YORK estimated job is one day. please see attached document for the job description let me know if you have questions.

    €28 / hr (Avg Bid)
    €28 / hr Offerta Media
    12 offerte

    Hi, I am working on a mini project on the topic, "Security analysis of RPL network protocol in IOT systems". I would like to simulate Blackhole attack against RPL using Contiki cooja simulator and analyse the performance of RPL under blackhole attack (power consumption with and without malicious motes). The requirements are as follows: 1. Setup a simulated environment capable of gat...

    €423 (Avg Bid)
    €423 Offerta Media
    1 offerte
    encryption 4 giorni left

    latest image encryption techniques

    €78 (Avg Bid)
    €78 Offerta Media
    8 offerte
    Task on network analysis 4 giorni left
    VERIFICATO

    Small task on network analysis. Deadline 24 hours Amount usd 20

    €18 (Avg Bid)
    €18 Offerta Media
    14 offerte
    Suspicious user identification 4 giorni left
    VERIFICATO

    There is requirement to identify suspicious users from web server log file. Definition of suspicious users - Suspicious users are the users other than attack users. They are suspicious because they don't have any particular aim to visit a web application. They neither do hacking activities. But they even not normal users. They do other than normal activities without any purpose. For example,...

    €129 (Avg Bid)
    €129 Offerta Media
    13 offerte
    smalicode, repackaging 4 giorni left
    VERIFICATO

    for learning purposes i need someone who know how to write smali language code or java code that can be further converted to smali. and some help in repackaging.

    €22 (Avg Bid)
    €22 Offerta Media
    4 offerte

    Looking for someone who can teach me penetration testing and other topic of cyber security.

    €11 / hr (Avg Bid)
    €11 / hr Offerta Media
    24 offerte
    Recovery Help 3 giorni left

    I am need of help in writing a grant to expand my non-profit recovery ministry.

    €380 (Avg Bid)
    €380 Offerta Media
    17 offerte

    Hello, Looking for someone who is expert about Bring Your own device policy to help me with writing something.

    €33 (Avg Bid)
    €33 Offerta Media
    10 offerte

    I need someone to run Distributed machine learning algorithms to improve IoT security.

    €46 (Avg Bid)
    €46 Offerta Media
    4 offerte

    I am a penetration tester researcher for a corporate firm and I am looking for a well-detailed technical analysis on post-exploitation analysis.

    €24 (Avg Bid)
    €24 Offerta Media
    11 offerte
    networking 2 giorni left

    i need people to manage my networking

    €110 (Avg Bid)
    €110 Offerta Media
    19 offerte
    IT Technical Writer 2 giorni left
    VERIFICATO

    A content writer with relevant IT experience who can provide all necessary data/reference/explanations etc with regards to the IT security topics given. The main topic are security properties, threats, vulnerabilities, CVE etc.

    €76 (Avg Bid)
    €76 Offerta Media
    38 offerte
    Need Ethical Hacker 1 giorno left

    Need Ethical hacker with knowledge in Blockchain and Crypto from Chennai, India who can work at the office space provided by us at flexible timing.

    €418 (Avg Bid)
    €418 Offerta Media
    5 offerte

    PLEASE APPLY ONLY IF YOU ARE QUALIFIED - THIS JOB IS FOR GENIUS ONLY I want to test the level of security for my website. I need you to hack my own website and check if you can steal my own email database. If you manage to do this, help me find secure the website. The job interview will be done in skype video call only.

    €13251 (Avg Bid)
    €13251 Offerta Media
    24 offerte
    find the flag 1 giorno left
    VERIFICATO

    I want to find the flag in small website, this is for first step in my course -cyber security

    €26 (Avg Bid)
    €26 Offerta Media
    19 offerte

    I have a windows virtual machine. I want an expert who can do Authentication relay attack on it and document all the steps to do it. This is to be done to check the windows feature "Extended Protection for Authentication". Testing is to be done for IIS and SQL Server 2017.

    €739 (Avg Bid)
    €739 Offerta Media
    3 offerte

    To design a novel system architecture for chatting application or wireless lan

    €106 (Avg Bid)
    €106 Offerta Media
    5 offerte

    The idea is to do a digital signature but with Encryption, in this case we can retrieve the text and image ( not just hashing). I already have code in Java that do that and android app but I need to convert it to C#

    €157 (Avg Bid)
    €157 Offerta Media
    20 offerte

    My computer is being attacked and datas are locked. Looking for someone to help unlock the datas. Below are messages I received when I turned on my computer. ? Your files are encrypted! ? -------------------------------------------------------------------------------- All your important data has been encrypted. To recover data you need decryptor. To get the decryptor you should: Send 1 test image...

    €478 (Avg Bid)
    €478 Offerta Media
    13 offerte
    Nand flash rom refreshing 23 ore left
    VERIFICATO

    Need some ONFI experts to help in accessing rom via Xilinx ISE design Suite or Vivado. I have my own rom, wanting to change the default rom.

    €4376 (Avg Bid)
    €4376 Offerta Media
    7 offerte
    Need a good networking expert 20 ore left
    VERIFICATO

    We need someone who is good at networking. Need to work from remote. Analyse the network topology of our client and resolve all the issues that is there in their network. Basically there are caching issues in our client's network. Need to view the network topology, scan for any problems and give us the report. Once the report is submitted, based on client approval, need to resolve the issues.

    €122 (Avg Bid)
    €122 Offerta Media
    12 offerte

    creating a network for a company

    €256 (Avg Bid)
    €256 Offerta Media
    13 offerte
    Article 1500 words 11 ore left
    VERIFICATO

    Topic IOT security. APA referencing

    €58 (Avg Bid)
    €58 Offerta Media
    52 offerte

    i need a report about group management in vehicular social network and how does helps to creates a secure communication .

    €175 (Avg Bid)
    €175 Offerta Media
    2 offerte

    Given a vulnerable program, Model the vulnerability (the length of the source of the data is greater than that of the destination data in the sprinf function) by starting with declaring with buf and error as strings. then leverage Z3 (Z3 theorem prover) to generate concrete inputs of buf to trigger this bug/vulnerability. Please mention your experience with cybersecurity, programming, and vulner...

    €80 (Avg Bid)
    €80 Offerta Media
    2 offerte

    The idea is to do a digital signature but with Encryption, in this case we can retrieve the text ( not just hashing)

    €19 (Avg Bid)
    €19 Offerta Media
    4 offerte

    I need an admin with VERY strong familiarity with both Amazon Web Services and Linux/Linux Security. The admin hired for this project will be tasked with uploading 4 virtual machines to my Amazon Web Services environment. The virtual machines are virtualbox virtual machines, so they will need to be converted to the OVF format, uploaded to S3, then imported as an EC2 instance in my VPC. OpenVPN AS...

    €393 (Avg Bid)
    €393 Offerta Media
    19 offerte