Комп'ютерна безпека Роботи та конкурси

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

Зареєструйтеся та почніть заробляти
Зареєструйтесь, щоб почати заробляти. Ви a Computer Security Consultant? Тоді Ви могли б заробляти, виконуючи ці роботи!

Пошук робіт на Freelancer

Проект/Конкурс Описання Заявки/Роботи Навички Розпочато Закінчується Ціна (USD)
Reverse Engineering Project - open to bidding For a publication library Win32 app, I am looking to extract data from its proprietary and undocumented file format. * It is multilingual and precedes Unicode, most likely compressed. * The individual documents are search indexed (indices in separate files). * They are sorted into a hierarchy: Publication (file-level) > Chapter > Content. * Some publications are magazines, their hierarchy i... 2 Програмування на С, Комп'ютерна безпека, Архітектура ПЗ, Кріптографія, Програмування на C++ Feb 17, 2018 Сьогодні6д. 22г. $652
server penetration testing I am looking for a security expert for a test of penetration and information retrieval, with this : technical report containing issue, issue background/impact , issue severity level remediation and poof of concep minimum OSCP certified CREST CERTIFICATION i need certified test 4 Веб-безпека, Тестування / QA, Комп'ютерна безпека, Тестування ПЗ, Інтернет-безпека Feb 17, 2018 Сьогодні6д. 21г. $311
Ste to site and remote access vpn between cisco ASA, check point and palo alto We are in need of some extra help to complete an internal project. We have 25(+/-) sites where we need a secure VPN tunnel and remote access connection 11 Комп'ютерна безпека, Cisco, Адміністрування мережі Feb 17, 2018 Сьогодні6д. 16г. $26
Malware analysis in Virtual machines You will analyze (statically and dynamically) different types of malware in Virtual machines. There will be other tasks as well. Please contact me asap for more details. Thanks. 8 Linux, Веб-безпека, Комп'ютерна безпека, Адміністрування мережі, Інтернет-безпека Feb 17, 2018 Сьогодні6д. 14г. $158
Go - Security Code Review We have a project in Go that needs a code review with a focus on security. 58k lines of code. It's worth noting that the code has no running instance and cannot be compiled. 4 Веб-безпека, Комп'ютерна безпека, Тестування ПЗ, Golang Feb 17, 2018 Сьогодні6д. 11г. $2774
create network upgrade plan Produce a plan to upgrade the network infrastructure. 22 Системний адміністратор, Комп'ютерна безпека, Cisco, Windows Server, Адміністрування мережі Feb 17, 2018 Сьогодні6д. 5г. $121
virus installation/protection need a person that can thwart virus and guarantee a safe and virus free workforce . also have 25 computers that have been infected by deadly virus and hoping someone can salvage the computers or will have to destroy 19 Linux, Веб-безпека, Комп'ютерна безпека, Адміністрування мережі, Інтернет-безпека Feb 16, 2018 Feb 16, 20185д. 23г. $714
Help me with internet security problems Want someone that is capable in computer security to make sure I am safe and provide me with guidance on some security questions. I got hacked. 27 Системний адміністратор, Веб-безпека, Комп'ютерна безпека, Адміністрування мережі, Інтернет-безпека Feb 16, 2018 Feb 16, 20185д. 23г. $293
Cooja attacks implementations I need some RPL protocol attacks to be implemented in cooja. the person should have deep understanding of the rpl protocol and socket and network programing. most of cooja code is done in C language . if you think you have the skill lets chat and see how it goes . 2 Програмування на С, Java, Комп'ютерна безпека, Архітектура ПЗ, Вбудоване ПЗ Feb 16, 2018 Feb 16, 20185д. 23г. $555
Experienced Ethical Hacker/penetration tester to do audit and security assessment of the website Looking for Ethical hacker for site penetration and securing database for the website . I am looking for an expert that can scan it for vulnerabilities/backdoors and will provide me a report and suggestions for further security upgrades . JOB REQUIREMENT If you are successfully able to penetrate our site then you will be asked to produce the following: - A full report pointing out to all vulnera... 8 Веб-безпека, Комп'ютерна безпека, Розробка технічних документів, Написання звітів, Інтернет-безпека Feb 16, 2018 Feb 16, 20185д. 18г. $206
crypto exchange we need a crypto exchange like binance or poloniex bitfinex. 22 Програмування на С, Комп'ютерна безпека, Архітектура ПЗ, Кріптографія, Біткойн Feb 16, 2018 Feb 16, 20185д. 12г. $4818
Penetration Test by Ethical Hacker Require an ethical hacker to conduct a penetration test on my laptop and provide a report detailing how to tighten the security. I should be able to run about 5000-15000 Concurrent users at a time and the deep URL access should also be possible. Also, while doing so, how to harvest proxies or how to find it, you should be able to tell me. If you are a newbie , I am not going to work with... 7 Веб-безпека, Комп'ютерна безпека, Інтернет-безпека Feb 16, 2018 Feb 16, 20185д. 10г. $207
Feature extraction executed malware samples Need idea for feature extraction of dynamically executed malware samples 2 Комп'ютерна безпека, Машинне навчання Feb 16, 2018 Feb 16, 20185д. 8г. $20
Looking for a security research analyst Duties entail but are not limited to: Plan, implement and upgrade security measures and controls Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction Maintain data and monitor security access Perform vulnerability testing, risk analyses and security assessments Conduct internal and external security audit... 13 Веб-безпека, Комп'ютерна безпека, Розробка технічних документів, Написання дослідницьких робіт, Інтернет-безпека Feb 16, 2018 Feb 16, 20185д. 4г. $556
C/C++ kernel driver i need of a project in C/C++ kernel driver that can remove a determinated folders and all your subfolders that are keep protected by rootkit without reboot computer. Exists some anti rootkits softwares that are able of do this eg: PC Hunter ([url видалений, увійдіть для перегляду] ) ([url видалений, увійдіть для перегляду] ). I'm search a professioanal with large experience with kernel dr... 7 Програмування на С, Комп'ютерна безпека, Програмування на C#, Архітектура ПЗ, Програмування на C++ Feb 15, 2018 Feb 15, 20184д. 16г. $571
Mikrotik Router IT Hello, I need help to set up an ipsec tunnel to a firewall of mine on a Mikrotik RB1100. Please apply only if you know Mirkotik routers good and if you can do immediatly. Teamviewer will be provided 11 Системний адміністратор, Linux, Комп'ютерна безпека, Cisco, Адміністрування мережі Feb 15, 2018 Feb 15, 20184д. 14г. $108
Remotely improve the configuration of my router Mickrotic OS RouterOS v6.39 We recently installed a Mickrotic router of 7 ports with OS RouterOS v6.39.2 (stable). We have set up 2 networks [url видалений, увійдіть для перегляду] (public) and [url видалений, увійдіть для перегляду] (administrative) with a firewall preventing access from network 4 to 5. We get internet from 2 ISP connected on ports 2 and 3. Unfortunately we have not being able to set up load bala... 13 Системний адміністратор, Linux, Комп'ютерна безпека, Cisco, Адміністрування мережі Feb 15, 2018 Feb 15, 20184д. 11г. $121
Dynamic malware analysis using machine learning algorithm Full project 7 Комп'ютерна безпека, Машинне навчання Feb 15, 2018 Feb 15, 20184д. 5г. $131
Take articles down from the web / search engine Hi. As said.. I need someone that could take about 10 articles down from the web or at least off the search engine first few pages. The articles are about a long due cases in which we had won. It existence in internet now is just a defamation. Probably need a hacker. I have had several people trying to take the articles down by 1) contacting the webmaster 2) research and report on google fil... 1 Веб-безпека, Комп'ютерна безпека, Інтернет-безпека Feb 14, 2018 Feb 14, 20184д. 1г. $1850
Dropbox concurrency - 14/02/2018 13:27 EST Dropbox and concurrency problems 16 Програмування на С, Java, Техніка, Комп'ютерна безпека, Алгоритм Feb 14, 2018 Feb 14, 20183д. 17г. $200
Need Computer Network Research Paper Writer There are 3 papers needed 1: In 1st paper there will be comparisons of different IOT communication protocols it should be 10 pages cost $50 2: In 2nd paper you have to write on new protocol which i design should be 5 pages cost $30 11 Бездротові технології, Комп'ютерна безпека, Розробка технічних документів, Написання дослідницьких робіт, Адміністрування мережі Feb 14, 2018 Feb 14, 20183д. 15г. $312
NS3 Correction I already have NS3 simulation, but needs to enhance more to hybrid protocol (ZRP). Also needs to increase more parameters. Protocols: Dynamic State Routing (DSR) Destination Sequence Distance Vector (DSDV) On-Demand Distance Vector (AODV) Optimized Link State Routing (OLSR) ZRP The simulation area of 1500 x 1500 m, random way mobility model, MAC type 802.11. TCP or CBR traffic 3... 2 Системний адміністратор, Linux, Комп'ютерна безпека, Cisco, Адміністрування мережі Feb 14, 2018 Feb 14, 20183д. 14г. $15
need a coder i need an freelance expert that can code for me. know about exploit, crypter etc 17 Програмування на С, Java, Комп'ютерна безпека, Архітектура ПЗ, Програмування на C++ Feb 13, 2018 Feb 13, 20183д. 2г. $1661
CIS Top 20 Controls, 3200words for 8 questions Question for each control [url видалений, увійдіть для перегляду] is the objective of the control? [url видалений, увійдіть для перегляду] types of technical controls are included and what do they manage? [url видалений, увійдіть для перегляду] do you think this control is important?  How does this control contribute to a comprehensive security program? Select three controls from co... 4 Системний адміністратор, Веб-безпека, Комп'ютерна безпека, Адміністрування мережі, Інтернет-безпека Feb 13, 2018 Feb 13, 20182д. 21г. $169
Make money just by answering knowledge questions Make money by answering questions based on topics pertaining to networking, bash scripting, and Linux. So you'll need sufficient knowledge in networking, bash scripting, and Linux. $1 per question answered. This will go on until one of us decides it's time to end it. in your proposal, summarize to me what you expect from this job and your educational and work background. 5 Linux, Комп'ютерна безпека, Адміністрування мережі, Bash Scripting Feb 13, 2018 Feb 13, 20182д. 21г. $22
Ethical Hackers Required Looking for Ethical hackers for site penetration and securing database 17 PHP, Веб-безпека, Комп'ютерна безпека, MySQL, Інтернет-безпека Feb 13, 2018 Feb 13, 20182д. 17г. $176
Simple C++ Intrusion detection system I am looking for someone who has some experience/knowledge about system security. I will like to design a simple Intrusion detection system program that is coded in C++ or Java. 20 Програмування на С, Java, Комп'ютерна безпека, Архітектура ПЗ, Програмування на C++ Feb 13, 2018 Feb 13, 20182д. 17г. $106
Mikrotik Expert I have to configure i vpn in ipsec on a mikrotik 450. I alreadi did this job but somthing i don't know goes wrong. I need expert to configure good parameters. 13 Системний адміністратор, Linux, Комп'ютерна безпека, Cisco, Адміністрування мережі Feb 13, 2018 Feb 13, 20182д. 14г. $45
I am looking for Computer engineer I need some one's help in computer science. 10 Комп'ютерна безпека, Підтримка настільних систем, Веб-хостинг, Інтернет-безпека, Computer Science Feb 13, 2018 Feb 13, 20182д. 13г. $90
Hack my PC - ethernal blue Hack my PC - i need someone help me havk my pc to learn details and my risks. I am thinking about ethernal blue tools, or any other tool. 9 Веб-безпека, Комп'ютерна безпека, Інтернет-безпека, Growth Hacking, Penetration Testing Feb 13, 2018 Feb 13, 20182д. 8г. $149
Problem statement in Network Security and its solution Need the problem statement in computer network security and its solution, also simulation of the problems statement based on one of the simulator like opnet, ns3, packet tracer or using programming language to simulate the problem statement, problem statement should be done based on an already published article and must reference that article. 11 Комп'ютерна безпека, Адміністрування мережі, Інтернет-безпека Feb 13, 2018 Feb 13, 20182д. 7г. $362
Troubleshooting a VPN Tunnel There is a VPN tunnel established between two Sites. I am able to ping only from on site to another. It is not possible to ping from the other site. A>>>B pingable B>>>A is not pingable The A Firewall is a Sonicwall and B is a PfSense firewall. Need a quick troubleshooting using Teamviewer. If you are familiar with the Firewall rules and routing on both Firewalls please... 15 Системний адміністратор, Linux, Комп'ютерна безпека, Cisco, Адміністрування мережі Feb 13, 2018 Feb 13, 20182д. 5г. $36
Fix My Computer I have a 64 bit Windows 10 deskop computer and today I couldn't load Microsoft Office Programs, and when they did load, they took 20 minutes. I use Office 10 hours a day and need to get this fixed fast. I have uninstalled and reinstalled Office, did updates, ran malware and virus scans and none of it has worked. 42 Системний адміністратор, Веб-безпека, Комп'ютерна безпека, Windows Server, Адміністрування мережі Feb 13, 2018 Feb 13, 20182д. 5г. $23
Телемаркетинг, Продажі, Комп'ютерна безпека Feb 12, 2018 Feb 12, 20182д. 1г.
looking for proxy interview call on cyber security HI, I am looking for the help to take proxy interview call on cyber security, risk GRC etc. 2 Веб-безпека, Комп'ютерна безпека, Cisco, Адміністрування мережі, Інтернет-безпека Feb 12, 2018 Feb 12, 20181д. 22г. $22
Technical writing- Security and Privacy I have a scenario and i need to re-write as Introduction (Scenario/use case, problem, and summary of proposed solution) 27 Комп'ютерна безпека, Розробка технічних документів, Написання дослідницьких робіт Feb 12, 2018 Feb 12, 20181д. 19г. $13
SonicWall Firewall Operating Procedures Create a standard operating procedure as part of continuous monitoring on a day to day basis as a cyber security analyst. I have a sample template attached. Here's the link for the admin guide below: [url видалений, увійдіть для перегляду] This specific SOP should cover the following: 1. Daily review of the Firewall report a. Write what we are looking for in each area of the r... 9 Системний адміністратор, Комп'ютерна безпека, Розробка технічних документів, Cisco, Адміністрування мережі Feb 12, 2018 Feb 12, 20181д. 15г. $115
we want the detection of the ip addresses of the load balancers made impossible by the third parties. I need good expert, specialist on streaming and load balancers. We have got our streaming service and we use Xtream Codes IPTV panel. We do not want our load balancers ips to be detected by the third parties in any way. In short : the people download the m3u file locally, ok? and then they use external programmes to detect the ip of the load balancer by using the .ts streaming link. i... 3 Linux, Веб-безпека, Комп'ютерна безпека, Адміністрування мережі, Інтернет-безпека Feb 12, 2018 Feb 12, 20181д. 11г. $225
Network Connectivity tests I need someone that can go to various beautiful locations in Honduras and help us with testing the internet connectivity with his cellular phone and laptop 13 Системний адміністратор, Бездротові технології, Комп'ютерна безпека, Cisco, Адміністрування мережі Feb 12, 2018 Feb 12, 20181д. 7г. $144
Crytocurrency - Infrastructure Expert. We are going to launch our own cryptocurrency. This will be built on AWS. Looking for Network infrastructure expert with proven ICO development history. 10 Java, Linux, Комп'ютерна безпека, Веб-служби Amazon, Адміністрування мережі Feb 12, 2018 Feb 12, 20181д. 7г. $14
Looking for a Chief Technology Officer (CTO) to monitor Blockchain Technology development I am looking for a Chief Technology Officer (CTO) to monitor our Blockchain Technology and Digital Bank softwares development and oversee my team. QUALIFICATIONS: - You must be highly knowledgeable about all coding and modern programming languages - You must be very proficient in Blockchain Technology and Cryptocurrency system - You must be a team leader - You must be available almost roun... 16 Комп'ютерна безпека, Хмарні обчислення, Кріптографія, Біткойн, Blockchain Feb 12, 2018 Feb 12, 20181д. 5г. $581
Crytocurrency - Infrastructure Expert. We are going to launch our own cryptocurrency. This will be built on AWS. Looking for Network infrastructure expert with proven ICO development history. 10 Java, Linux, Комп'ютерна безпека, Веб-служби Amazon, Адміністрування мережі Feb 12, 2018 Feb 12, 20181д. 5г. $100
Crytocurrency Infrastructure expert. We are going to launch our own cryptocurrency. This will be built on AWS. Looking for Network infrastructure expert with proven ICO development history. 4 Java, Linux, Комп'ютерна безпека, Веб-служби Amazon, Адміністрування мережі Feb 11, 2018 Feb 11, 201821г. 57х. $121
Ethical Hacking I need someone would can teach me how to remote desktop through IP only! that means no payload. I want to access my laptop through my desktop, so if that means vulnerabilities or nessus scanner. Highest im willing to pay is 25. ill add an extra 5 for the fee. will not get released until im satisfied with work. 8 Linux, Веб-безпека, Комп'ютерна безпека, Адміністрування мережі, Інтернет-безпека Feb 11, 2018 Feb 11, 201820г. 29х. $51
Setup NG Firewall gateway by Untangled I'm in need of setting up a gateway firewall OS on a pc for a travel agency wanting to be PCI compliant. The software is made by untangled and the tech would need to have extensive knowledge so they can set it up in accordance to the PCI compliance document provided. 10 Системний адміністратор, Комп'ютерна безпека, Адміністрування мережі Feb 11, 2018 Feb 11, 201817г. 26х. $184
Networking I need someone to come and sort out my home networking as follows; - Wired Network - WiFi I have the RJ5 cable already routed, the person will have to; - Install the connectors and plugs, - Program the access points (1 outdoor and Indoor), - Program the IP cameras (2) You're more than welcomed to quote only for what you can do above. The house is in Glenvista, Johannesburg. 7 Системний адміністратор, Бездротові технології, Комп'ютерна безпека, Cisco, Адміністрування мережі Feb 11, 2018 Feb 11, 201816г. 56х. $133
Ethical hacking with kali linux im trying to kick people off my LAN or connect to my own computer with just the IP to remote desktop. If anyone knows how to do i guess "hack" thats what im looking for. 20 Системний адміністратор, Linux, Комп'ютерна безпека, Адміністрування мережі, Інтернет-безпека Feb 11, 2018 Feb 11, 20188г. 40х. $147
IT Technical & Security support I need a IT technician for security advice and remote IT support I have four computers connected via a network windonws in a small office and need a certified technician 30 Веб-безпека, Комп'ютерна безпека, Розробка технічних документів, Cisco, Адміністрування мережі Feb 10, 2018 Feb 10, 2018Закінчився $32
Professional crypto analysist for proposed Simplified AES-3 I have proposed a Simplified AES that is tested experimentally and compared against multiple cipher. I wish to extend the analysis by providing additional analysis based using the following techniques. - Differential and linear cryptanalysis - Algebraic attacks - Key schedule attacks - Etc .. This will include writing the text that describe each in details. 4 Комп'ютерна безпека, Кріптографія, Математика Feb 10, 2018 Feb 10, 2018Закінчився $102
Run and deeply analyze a program for potential virus/malware/keylogger/backdoor. What makes you qualified for this job? Contact me with this answer first. Project requirements: I have a closed source cryptocurrency wallet in form of an executable file. I have a doubt that it may contain virus/keylogger/backdoor or potential provision to secretly update and add any a backdoor. Can you do it? .. Let me know if so. I need a full report of all activities that program d... 3 Програмування на С, Комп'ютерна безпека, Тестування ПЗ, Інтернет-безпека, Програмування Feb 10, 2018 Feb 10, 2018Закінчився $48
Showing 1 to 50 of 635 entries
« 1 2 3 4 5 »