The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
На підставі 104,316 відгуків клієнтів, рейтинг Computer Security Consultants становить 4.9 із 5 зірочок.Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
На підставі 104,316 відгуків клієнтів, рейтинг Computer Security Consultants становить 4.9 із 5 зірочок.I’m looking for a detail-driven remote operator who can execute routine online tasks with exceptional accuracy and consistency. You’ll connect to my systems through a secure VPN, follow clearly documented steps, and submit a concise end-of-shift report so I can verify progress at a glance. Reliability, quick comprehension of written instructions, and an eye for anomalies matter more to me than specific industry experience; the workflow itself is well structured and easy to learn for someone who truly cares about precision. To succeed here you’ll need: • A stable high-speed internet connection and quiet workspace. • The ability to stay focused for extended periods without drifting from the checklist. • Fluent written English for status updates and occ...
We are a stealth-mode Deep Tech startup developing a computational engine designed to solve massive-scale problems. While our current applications focus on logistics and finance, we are looking to explore the strategic implications of our technology within the Cybersecurity and Cryptography sectors. We are NOT looking for a developer or a technical writer. We are seeking a Strategic Consultant or Business Development Expert with a deep, pre-existing network in the cyber-intelligence and cryptographic security communities. Your Role: • Provide high-level market insights on current bottlenecks in cryptographic analysis and network security. • Identify key stakeholders and strategic entry points for a novel computational approach in these sectors. • Facilitate initial high-le...
I need a cyber-security professional who specialises in application security to review and harden a production-ready mobile app that runs on both iOS and Android. The codebase has already passed functional QA; now I want to be certain it stands up to real-world attacks. Scope • Perform a full security assessment that covers the OWASP Mobile Top 10. • Include static code analysis, dynamic runtime testing and API endpoint verification. • Highlight insecure data storage, improper authentication flows, weak cryptography and any third-party library risks. • Provide clear, reproducible proofs of concept for every confirmed vulnerability. Deliverables 1. Written penetration-test report detailing findings, risk ratings and recommended fixes. 2. A prioritised remed...
We are currently looking for an experienced Freelance Network & OT Cybersecurity Engineer (10+ years of experience) to support a network architecture redesign and cybersecurity implementation for an industrial environment. Scope of Work 1. Network Architecture The current infrastructure consists of a flat network. We are looking to redesign the architecture into a structured and segmented network. The proposed design should include: • A hierarchical network architecture (Core / Distribution / Access layers) per site • Segmentation between sites while allowing controlled sharing of selected networks • Design and placement of industrial firewalls • Secure interconnection between the sites • Migration plan for existing switches (reuse where possible and replace...
I need a comprehensive Wireshark portfolio to showcase my technical proficiency to university teachers. The portfolio should include: - Captured Packet Analysis - Network Troubleshooting Examples - Protocol Dissection Examples Ideal Skills and Experience: - Expertise in Wireshark - Strong understanding of network protocols - Experience in network troubleshooting - Ability to present information clearly and professionally Please provide detailed and well-organized examples for each category.
I need a thorough, professional penetration test that zeroes in on database security. The work will involve actively probing our live environment for misconfigurations, permission-escalation paths, injection points, improper encryption, and any other weakness that a determined attacker might exploit. Scope • Assess the entire database layer—from connection strings and authentication flows to stored procedures and backup endpoints—without disrupting business operations. • Document every finding with reproducible steps, risk ratings, and clear remediation guidance. • Validate fixes with a follow-up retest so we can close the loop confidently. Deliverables 1. Methodology outline (tools, test phases, compliance references). 2. Vulnerability assessment...
I'm seeking urgent cyber security assistance for my personal computer and android. I need a professional to secure my device and protect my data. Key Requirements: Virus removal Malware removal Penetrating testing Network security Ideal Skills and Experience: - Proven expertise in cyber security - Experience with personal computers - Ability to work quickly and efficiently - Strong knowledge of virus removal and data protection measures Please provide a detailed plan of action and estimated timeline.
I run a custom web application on an Ubuntu droplet at DigitalOcean. Although every obvious door is locked—UFW rules are strict, all unnecessary ports are closed, Fail2ban is active, and SSH keys have been rotated—crypto-miners keep finding a way in and even wiping my authorized_keys file. and they also remove the logs. I need a specialist who can dig deeper than the basics, trace exactly how the breaches occur, close those vectors for good, and leave the box fully hardened. Think kernel-level auditing, service isolation, intrusion-detection tooling, automated patching, and any other best practices you know work on Ubuntu in a cloud-VM context. Deliverables I must see before sign-off: • A concise report pinpointing the original compromise path(s) and the corrective...
I need a solution to permanently block certain devices from accessing my WiFi network. The devices to be blocked include smartphones, IoT devices, and any unknown devices. Requirements: - Ability to block devices permanently - Identification of devices to be blocked by MAC address Ideal Skills and Experience: - Experience with network configuration and security - Familiarity with MAC address filtering - Knowledge of WiFi routers and access points Please provide a detailed approach to achieving this, along with any required tools or software.
Enterprise Network & Security Architect (Mentor-Based) Virtual Enterprise Home Lab Design & Guided Implementation Project Overview I am an IT student in Germany building a fully virtual enterprise-style home lab for hands-on learning. This lab will simulate a small-to-mid enterprise network using virtualization technologies. The objective is not just implementation, but deep architectural understanding and guided learning. I am looking for an experienced Network & Security Engineer who can: • Design the full enterprise-style architecture • Guide me step-by-step through implementation • Explain design decisions and security reasoning • Review my configurations • Provide structured documentation templates • Conduct live knowledge-transfer sessio...
We are looking for a freelance Network Engineer for a single-day onsite visit at our client’s office. The primary responsibility will be the physical deployment of network hardware, including routers, switches, and wireless access points. Rack and mount network equipment Connect power and data cables Patch copper and fiber connections according to the provided diagrams Label all cabling properly Verify console access to each device so our NOC team can complete remote configuration No configuration work is required onsite — this is strictly physical installation and verification. Scope of Work: Rack, stack, and cable routers, switches, and WAPs Connect and verify power to all devices Patch and label copper/fiber connections per diagrams Confirm console connectivity for remot...
I am preparing for the CompTIA Security+ certification and want targeted, exam-style tutoring that zeroes in on Network Security—specifically firewalls and VPNs. The goal is to master the current exam objectives, clear up any conceptual gaps, and build enough confidence to score well on test day. Sessions should be live, interactive, and paced to my schedule. I learn best when theory is tied directly to hands-on examples, so walking through real-world firewall rules, VPN configurations, and related packet-flow scenarios is essential. Explanations must stay aligned with the Security+ wording and depth so I recognize the phrasing when it appears on the exam. Deliverables: • A structured lesson plan broken into manageable milestones • Live tutoring sessions with screen-sha...
My personal blog runs on a standard LAMP stack and I want a clear, ethical snapshot of its current security posture. The focus is on preventing data breaches and blocking any avenue for unauthorized access; malware checks are welcome but secondary. Scope You will carry out a legally authorised vulnerability assessment that covers: • A surface scan of the domain and sub-domains, mapping open ports and exposed services. • Manual and automated testing against the OWASP Top 10, using tools such as Burp Suite Community/Pro, OWASP ZAP, Nikto, or similar. • SSL/TLS configuration review, confirming protocol versions, cipher strength, and certificate chain integrity. • Inspection of server and application misconfigurations that could lead to privilege escalation, credenti...
Penetration Test of the IT/OT System of a Photovoltaic Power Plant and Battery Energy Storage System 1. Subject of the Contract The subject of this contract is the execution of a comprehensive penetration test of the IT/OT infrastructure of a photovoltaic power plant and battery energy storage system to assess its resilience against cyberattacks and unauthorized remote control. The test must simulate real-world cyberattack scenarios, focusing on the possibility of: Unauthorized remote access Takeover of device control Manipulation of energy production or storage Disruption of system availability Exploitation of communication interfaces Leakage of sensitive data 2. Scope of Testing The test shall include: 2.1 External Testing Simulation of attacks from the public internet Analy...
This project covers the end-to-end creation of a brand-new Local Area Network for our premises. The environment will serve daily operations for both computers and servers as well as our shared printers and scanners, so stability, speed, and clean segmentation matter. The scope begins with planning: assessing the floor layout, sizing the switch stack, deciding on cable runs, and selecting hardware that fits future growth. Layer-2 and Layer-3 configuration must follow best practices—think VLAN separation for user groups, QoS where printing traffic needs it, and a security baseline that shuts unused ports, enforces 802.1X, and applies sensible ACLs at the edge. During implementation, I expect neat rack work, labelled cabling, and documented configurations (Cisco-style CLI or equivalen...
Prepare the Cyber Essentials Plus evidence pack, readiness checklist, and required policy updates. Audit coordination is not required. You must be UK‑based and able to invoice us as a self‑employed contractor or registered business. You will be working as part of a small team during an intensive 2‑week delivery sprint. Deliverables: CE+ evidence pack CE+ readiness checklist Policy updates Submission preparation
Implement logging, monitoring, secure coding standards, admin access controls, and produce DTAC C3 security evidence. You must be UK‑based and able to invoice us as a self‑employed contractor or registered business. You will be working as part of a small team during an intensive 2‑week delivery sprint. Deliverables: Logging and monitoring setup Secure development policy Access management documentation DTAC C3 evidence pack
I have several Cisco-based lab and production environments that need hands-on attention from someone who already feels at home with CCNA-level work. Over the next few weeks I’ll be refining network configuration, tightening security, and—most importantly—sorting out a few stubborn routing-protocol issues that keep popping up. Here’s the situation: • Network configuration needs polishing on a mix of Catalyst switches and ISR routers, including VLAN planning, trunking, and interface tuning. • Day-to-day troubleshooting consumes far too much time; I want clear root-cause analysis when links flap, routes disappear, or access lists misbehave. • Security hardening is overdue—standard ACLs are in place, but I need smarter filtering and a quick r...
I need help installing routers for a series of small communication-network rollouts. Each day’s route will be planned in advance, and the actual on-site work rarely exceeds one to two hours. Your role is straightforward: pick up the assigned router, travel to the client location, mount the unit, connect it to the existing cabling, confirm internet connectivity, then send me a quick photo and speed-test screenshot before leaving. The schedule is flexible as long as the job is finished on the agreed day; I issue payment weekly, starting at 25 000 ₽, and increase it for consistently smooth, on-time work. What matters most to me is punctuality—I’d rather reschedule than keep a client waiting—and complete honesty about any delays or technical issues you encounter. Basi...
I am looking for an experienced Security Consultant to work on an ad hoc or fixed monthly basis to oversee and strengthen multiple IT environments. The role is focused purely on security, monitoring, hardening, and continuous improvement. This is not general IT support. I need someone who can take ownership of reviewing systems daily, identifying risks, closing security gaps, and ensuring everything remains properly configured and secure. Systems and Platforms in Scope • N-able N-central • Cove Data Protection • SentinelOne EDR • Site24x7 monitoring • Windows Server environments • Microsoft 365 and Office 365 security • Routers, firewalls and managed switches • Patch management systems • Backup monitoring and recovery testing Key Responsibil...
My Mikrotik-based network has started dropping connections throughout the day. Speeds are fine when the link is up, but users complain about frequent disconnections that force them to reconnect to services. I need an expert who already works comfortably with RouterOS, WinBox and basic CLI to dive in, locate the root cause and tune the configuration for consistent performance. Scope of work • Analyse current RouterOS settings (queues, bridges, firewall, wireless, CAPsMAN if present) • Isolate the trigger behind the disconnections—whether it is interface flapping, DHCP lease issues, NAT rules, routing loops, or CPU/RAM spikes • Optimise performance parameters without disrupting existing production traffic • Provide a brief hand-over note summarising the cha...
My Mikrotik-based network has started dropping connections throughout the day. Speeds are fine when the link is up, but users complain about frequent disconnections that force them to reconnect to services. I need an expert who already works comfortably with RouterOS, WinBox and basic CLI to dive in, locate the root cause and tune the configuration for consistent performance. Scope of work • Analyse current RouterOS settings (queues, bridges, firewall, wireless, CAPsMAN if present) • Isolate the trigger behind the disconnections—whether it is interface flapping, DHCP lease issues, NAT rules, routing loops, or CPU/RAM spikes • Optimise performance parameters without disrupting existing production traffic • Provide a brief hand-over note summarising the cha...
Ethiopia (alone): turn power-sharing into rules, not war What’s actually blocking democracy Politics shaped by security crises and conflict legacies Deep center–region tensions and identity-based mobilization Low trust in institutions as neutral referees (courts, electoral bodies, media) Elections risk becoming a “winner-take-all” trigger The AU + IGAD should do Democracy under conflict reality: prioritize sequenced democracy: stabilize local security and civic space first then credible elections region by region if needed Civic space guarantees: AU should monitor and publicly report on: media freedom opposition participation arbitrary detention patterns Constitutional “rules of the game” mediation: not just peace talks—AU-backed technical mediatio...
I need an experienced ethical-hacker who can take a close look at my site, show me exactly where it is vulnerable, and then help me close those gaps. The scope is open at this point because I have not yet pinpointed whether the main priority will be penetration testing, a full clean-up, or even regaining access to an account; I’m happy to clarify once you have reviewed the site and outlined the risks you see. Here is what I will be expecting: • A concise vulnerability report written in plain language that highlights each issue, how it was found, and the potential impact. • A step-by-step remediation plan with clear explanations (no jargon walls). • Implementation of the agreed fixes, followed by proof that the holes are truly closed—re-testing after patch...
My EVE-NG lab, running inside Proxmox, suddenly stopped receiving addresses from my internal router’s DHCP pool. The VM is attached to a bridged interface and previously picked up an IP in the correct range without problems. Nothing in the network layout has changed and I have already restarted the Proxmox host, double-checked the EVE-NG adapter settings, and reviewed the router configuration, yet the bridge no longer passes DHCP traffic. And also Nexus /BigIP and others switch not coming up I want the environment back to the point where EVE-NG instances reliably obtain an IP from the router and are reachable on the LAN. Diagnosis should cover the Proxmox bridge, the underlying Linux network stack, and any EVE-NG specifics (vrf, cloud interfaces, tap devices, etc.). If the fix invo...
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.