Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

На підставі 104,316 відгуків клієнтів, рейтинг Computer Security Consultants становить 4.9 із 5 зірочок.
Найняти Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

На підставі 104,316 відгуків клієнтів, рейтинг Computer Security Consultants становить 4.9 із 5 зірочок.
Найняти Computer Security Consultants

Фільтрувати

Мої недавні пошуки
Фільтрувати по:
Бюджет
до
до
до
Тип
Навички
Мови
    Статус роботи
    25 знайдені роботи

    I’m looking for a detail-driven remote operator who can execute routine online tasks with exceptional accuracy and consistency. You’ll connect to my systems through a secure VPN, follow clearly documented steps, and submit a concise end-of-shift report so I can verify progress at a glance. Reliability, quick comprehension of written instructions, and an eye for anomalies matter more to me than specific industry experience; the workflow itself is well structured and easy to learn for someone who truly cares about precision. To succeed here you’ll need: • A stable high-speed internet connection and quiet workspace. • The ability to stay focused for extended periods without drifting from the checklist. • Fluent written English for status updates and occ...

    $31 / hr Average bid
    $31 / hr Сер. заявка
    47 заявки
    Strategic Consultation for Cybersecurity Application
    5 дні(-в) left
    Верифіковано

    We are a stealth-mode Deep Tech startup developing a computational engine designed to solve massive-scale problems. While our current applications focus on logistics and finance, we are looking to explore the strategic implications of our technology within the Cybersecurity and Cryptography sectors. We are NOT looking for a developer or a technical writer. We are seeking a Strategic Consultant or Business Development Expert with a deep, pre-existing network in the cyber-intelligence and cryptographic security communities. Your Role: • Provide high-level market insights on current bottlenecks in cryptographic analysis and network security. • Identify key stakeholders and strategic entry points for a novel computational approach in these sectors. • Facilitate initial high-le...

    $104394 Average bid
    $104394 Сер. заявка
    29 заявки

    I need a cyber-security professional who specialises in application security to review and harden a production-ready mobile app that runs on both iOS and Android. The codebase has already passed functional QA; now I want to be certain it stands up to real-world attacks. Scope • Perform a full security assessment that covers the OWASP Mobile Top 10. • Include static code analysis, dynamic runtime testing and API endpoint verification. • Highlight insecure data storage, improper authentication flows, weak cryptography and any third-party library risks. • Provide clear, reproducible proofs of concept for every confirmed vulnerability. Deliverables 1. Written penetration-test report detailing findings, risk ratings and recommended fixes. 2. A prioritised remed...

    $11 Average bid
    $11 Сер. заявка
    4 заявки

    We are currently looking for an experienced Freelance Network & OT Cybersecurity Engineer (10+ years of experience) to support a network architecture redesign and cybersecurity implementation for an industrial environment. Scope of Work 1. Network Architecture The current infrastructure consists of a flat network. We are looking to redesign the architecture into a structured and segmented network. The proposed design should include: • A hierarchical network architecture (Core / Distribution / Access layers) per site • Segmentation between sites while allowing controlled sharing of selected networks • Design and placement of industrial firewalls • Secure interconnection between the sites • Migration plan for existing switches (reuse where possible and replace...

    $27 / hr Average bid
    $27 / hr Сер. заявка
    19 заявки

    I need a comprehensive Wireshark portfolio to showcase my technical proficiency to university teachers. The portfolio should include: - Captured Packet Analysis - Network Troubleshooting Examples - Protocol Dissection Examples Ideal Skills and Experience: - Expertise in Wireshark - Strong understanding of network protocols - Experience in network troubleshooting - Ability to present information clearly and professionally Please provide detailed and well-organized examples for each category.

    $335 Average bid
    $335 Сер. заявка
    18 заявки

    I need a thorough, professional penetration test that zeroes in on database security. The work will involve actively probing our live environment for misconfigurations, permission-escalation paths, injection points, improper encryption, and any other weakness that a determined attacker might exploit. Scope • Assess the entire database layer—from connection strings and authentication flows to stored procedures and backup endpoints—without disrupting business operations. • Document every finding with reproducible steps, risk ratings, and clear remediation guidance. • Validate fixes with a follow-up retest so we can close the loop confidently. Deliverables 1. Methodology outline (tools, test phases, compliance references). 2. Vulnerability assessment...

    $261 Average bid
    $261 Сер. заявка
    10 заявки
    Personal Computer Security Overhaul
    4 дні(-в) left
    Верифіковано

    I'm seeking urgent cyber security assistance for my personal computer and android. I need a professional to secure my device and protect my data. Key Requirements: Virus removal Malware removal Penetrating testing Network security Ideal Skills and Experience: - Proven expertise in cyber security - Experience with personal computers - Ability to work quickly and efficiently - Strong knowledge of virus removal and data protection measures Please provide a detailed plan of action and estimated timeline.

    $33 / hr Average bid
    Місцевий Обраний
    $33 / hr Сер. заявка
    24 заявки

    I run a custom web application on an Ubuntu droplet at DigitalOcean. Although every obvious door is locked—UFW rules are strict, all unnecessary ports are closed, Fail2ban is active, and SSH keys have been rotated—crypto-miners keep finding a way in and even wiping my authorized_keys file. and they also remove the logs. I need a specialist who can dig deeper than the basics, trace exactly how the breaches occur, close those vectors for good, and leave the box fully hardened. Think kernel-level auditing, service isolation, intrusion-detection tooling, automated patching, and any other best practices you know work on Ubuntu in a cloud-VM context. Deliverables I must see before sign-off: • A concise report pinpointing the original compromise path(s) and the corrective...

    $66 Average bid
    $66 Сер. заявка
    13 заявки
    WiFi Device Blocking Setup
    4 дні(-в) left

    I need a solution to permanently block certain devices from accessing my WiFi network. The devices to be blocked include smartphones, IoT devices, and any unknown devices. Requirements: - Ability to block devices permanently - Identification of devices to be blocked by MAC address Ideal Skills and Experience: - Experience with network configuration and security - Familiarity with MAC address filtering - Knowledge of WiFi routers and access points Please provide a detailed approach to achieving this, along with any required tools or software.

    $27 Average bid
    $27 Сер. заявка
    22 заявки

    Enterprise Network & Security Architect (Mentor-Based) Virtual Enterprise Home Lab Design & Guided Implementation Project Overview I am an IT student in Germany building a fully virtual enterprise-style home lab for hands-on learning. This lab will simulate a small-to-mid enterprise network using virtualization technologies. The objective is not just implementation, but deep architectural understanding and guided learning. I am looking for an experienced Network & Security Engineer who can: • Design the full enterprise-style architecture • Guide me step-by-step through implementation • Explain design decisions and security reasoning • Review my configurations • Provide structured documentation templates • Conduct live knowledge-transfer sessio...

    $604 Average bid
    $604 Сер. заявка
    21 заявки

    We are looking for a freelance Network Engineer for a single-day onsite visit at our client’s office. The primary responsibility will be the physical deployment of network hardware, including routers, switches, and wireless access points. Rack and mount network equipment Connect power and data cables Patch copper and fiber connections according to the provided diagrams Label all cabling properly Verify console access to each device so our NOC team can complete remote configuration No configuration work is required onsite — this is strictly physical installation and verification. Scope of Work: Rack, stack, and cable routers, switches, and WAPs Connect and verify power to all devices Patch and label copper/fiber connections per diagrams Confirm console connectivity for remot...

    $40 / hr Average bid
    $40 / hr Сер. заявка
    9 заявки

    I am preparing for the CompTIA Security+ certification and want targeted, exam-style tutoring that zeroes in on Network Security—specifically firewalls and VPNs. The goal is to master the current exam objectives, clear up any conceptual gaps, and build enough confidence to score well on test day. Sessions should be live, interactive, and paced to my schedule. I learn best when theory is tied directly to hands-on examples, so walking through real-world firewall rules, VPN configurations, and related packet-flow scenarios is essential. Explanations must stay aligned with the Security+ wording and depth so I recognize the phrasing when it appears on the exam. Deliverables: • A structured lesson plan broken into manageable milestones • Live tutoring sessions with screen-sha...

    $135 Average bid
    $135 Сер. заявка
    2 заявки

    My personal blog runs on a standard LAMP stack and I want a clear, ethical snapshot of its current security posture. The focus is on preventing data breaches and blocking any avenue for unauthorized access; malware checks are welcome but secondary. Scope You will carry out a legally authorised vulnerability assessment that covers: • A surface scan of the domain and sub-domains, mapping open ports and exposed services. • Manual and automated testing against the OWASP Top 10, using tools such as Burp Suite Community/Pro, OWASP ZAP, Nikto, or similar. • SSL/TLS configuration review, confirming protocol versions, cipher strength, and certificate chain integrity. • Inspection of server and application misconfigurations that could lead to privilege escalation, credenti...

    $43 Average bid
    $43 Сер. заявка
    19 заявки
    IT/OT System Cybersecurity Penetration Test
    4 дні(-в) left
    Верифіковано

    Penetration Test of the IT/OT System of a Photovoltaic Power Plant and Battery Energy Storage System 1. Subject of the Contract The subject of this contract is the execution of a comprehensive penetration test of the IT/OT infrastructure of a photovoltaic power plant and battery energy storage system to assess its resilience against cyberattacks and unauthorized remote control. The test must simulate real-world cyberattack scenarios, focusing on the possibility of: Unauthorized remote access Takeover of device control Manipulation of energy production or storage Disruption of system availability Exploitation of communication interfaces Leakage of sensitive data 2. Scope of Testing The test shall include: 2.1 External Testing Simulation of attacks from the public internet Analy...

    $1524 Average bid
    $1524 Сер. заявка
    14 заявки

    This project covers the end-to-end creation of a brand-new Local Area Network for our premises. The environment will serve daily operations for both computers and servers as well as our shared printers and scanners, so stability, speed, and clean segmentation matter. The scope begins with planning: assessing the floor layout, sizing the switch stack, deciding on cable runs, and selecting hardware that fits future growth. Layer-2 and Layer-3 configuration must follow best practices—think VLAN separation for user groups, QoS where printing traffic needs it, and a security baseline that shuts unused ports, enforces 802.1X, and applies sensible ACLs at the edge. During implementation, I expect neat rack work, labelled cabling, and documented configurations (Cisco-style CLI or equivalen...

    $22 / hr Average bid
    $22 / hr Сер. заявка
    18 заявки

    Prepare the Cyber Essentials Plus evidence pack, readiness checklist, and required policy updates. Audit coordination is not required. You must be UK‑based and able to invoice us as a self‑employed contractor or registered business. You will be working as part of a small team during an intensive 2‑week delivery sprint. Deliverables: CE+ evidence pack CE+ readiness checklist Policy updates Submission preparation

    $1378 Average bid
    $1378 Сер. заявка
    65 заявки

    Implement logging, monitoring, secure coding standards, admin access controls, and produce DTAC C3 security evidence. You must be UK‑based and able to invoice us as a self‑employed contractor or registered business. You will be working as part of a small team during an intensive 2‑week delivery sprint. Deliverables: Logging and monitoring setup Secure development policy Access management documentation DTAC C3 evidence pack

    $1349 Average bid
    $1349 Сер. заявка
    84 заявки

    I have several Cisco-based lab and production environments that need hands-on attention from someone who already feels at home with CCNA-level work. Over the next few weeks I’ll be refining network configuration, tightening security, and—most importantly—sorting out a few stubborn routing-protocol issues that keep popping up. Here’s the situation: • Network configuration needs polishing on a mix of Catalyst switches and ISR routers, including VLAN planning, trunking, and interface tuning. • Day-to-day troubleshooting consumes far too much time; I want clear root-cause analysis when links flap, routes disappear, or access lists misbehave. • Security hardening is overdue—standard ACLs are in place, but I need smarter filtering and a quick r...

    $70 Average bid
    $70 Сер. заявка
    9 заявки

    I need help installing routers for a series of small communication-network rollouts. Each day’s route will be planned in advance, and the actual on-site work rarely exceeds one to two hours. Your role is straightforward: pick up the assigned router, travel to the client location, mount the unit, connect it to the existing cabling, confirm internet connectivity, then send me a quick photo and speed-test screenshot before leaving. The schedule is flexible as long as the job is finished on the agreed day; I issue payment weekly, starting at 25 000 ₽, and increase it for consistently smooth, on-time work. What matters most to me is punctuality—I’d rather reschedule than keep a client waiting—and complete honesty about any delays or technical issues you encounter. Basi...

    $27 / hr Average bid
    Місцевий
    $27 / hr Сер. заявка
    1 заявки
    Security Consultant for IT Environments
    2 дні(-в) left
    Верифіковано

    I am looking for an experienced Security Consultant to work on an ad hoc or fixed monthly basis to oversee and strengthen multiple IT environments. The role is focused purely on security, monitoring, hardening, and continuous improvement. This is not general IT support. I need someone who can take ownership of reviewing systems daily, identifying risks, closing security gaps, and ensuring everything remains properly configured and secure. Systems and Platforms in Scope • N-able N-central • Cove Data Protection • SentinelOne EDR • Site24x7 monitoring • Windows Server environments • Microsoft 365 and Office 365 security • Routers, firewalls and managed switches • Patch management systems • Backup monitoring and recovery testing Key Responsibil...

    $37 / hr Average bid
    $37 / hr Сер. заявка
    33 заявки

    My Mikrotik-based network has started dropping connections throughout the day. Speeds are fine when the link is up, but users complain about frequent disconnections that force them to reconnect to services. I need an expert who already works comfortably with RouterOS, WinBox and basic CLI to dive in, locate the root cause and tune the configuration for consistent performance. Scope of work • Analyse current RouterOS settings (queues, bridges, firewall, wireless, CAPsMAN if present) • Isolate the trigger behind the disconnections—whether it is interface flapping, DHCP lease issues, NAT rules, routing loops, or CPU/RAM spikes • Optimise performance parameters without disrupting existing production traffic • Provide a brief hand-over note summarising the cha...

    $72 Average bid
    $72 Сер. заявка
    6 заявки

    My Mikrotik-based network has started dropping connections throughout the day. Speeds are fine when the link is up, but users complain about frequent disconnections that force them to reconnect to services. I need an expert who already works comfortably with RouterOS, WinBox and basic CLI to dive in, locate the root cause and tune the configuration for consistent performance. Scope of work • Analyse current RouterOS settings (queues, bridges, firewall, wireless, CAPsMAN if present) • Isolate the trigger behind the disconnections—whether it is interface flapping, DHCP lease issues, NAT rules, routing loops, or CPU/RAM spikes • Optimise performance parameters without disrupting existing production traffic • Provide a brief hand-over note summarising the cha...

    $75 Average bid
    $75 Сер. заявка
    6 заявки

    Ethiopia (alone): turn power-sharing into rules, not war What’s actually blocking democracy Politics shaped by security crises and conflict legacies Deep center–region tensions and identity-based mobilization Low trust in institutions as neutral referees (courts, electoral bodies, media) Elections risk becoming a “winner-take-all” trigger The AU + IGAD should do Democracy under conflict reality: prioritize sequenced democracy: stabilize local security and civic space first then credible elections region by region if needed Civic space guarantees: AU should monitor and publicly report on: media freedom opposition participation arbitrary detention patterns Constitutional “rules of the game” mediation: not just peace talks—AU-backed technical mediatio...

    $553 Average bid
    $553 Сер. заявка
    37 заявки
    Website Security Audit & Repair
    17 годин(-и) left

    I need an experienced ethical-hacker who can take a close look at my site, show me exactly where it is vulnerable, and then help me close those gaps. The scope is open at this point because I have not yet pinpointed whether the main priority will be penetration testing, a full clean-up, or even regaining access to an account; I’m happy to clarify once you have reviewed the site and outlined the risks you see. Here is what I will be expecting: • A concise vulnerability report written in plain language that highlights each issue, how it was found, and the potential impact. • A step-by-step remediation plan with clear explanations (no jargon walls). • Implementation of the agreed fixes, followed by proof that the holes are truly closed—re-testing after patch...

    $99 Average bid
    $99 Сер. заявка
    26 заявки
    Fix Proxmox EVE-NG IP Issue
    11 годин(-и) left
    Верифіковано

    My EVE-NG lab, running inside Proxmox, suddenly stopped receiving addresses from my internal router’s DHCP pool. The VM is attached to a bridged interface and previously picked up an IP in the correct range without problems. Nothing in the network layout has changed and I have already restarted the Proxmox host, double-checked the EVE-NG adapter settings, and reviewed the router configuration, yet the bridge no longer passes DHCP traffic. And also Nexus /BigIP and others switch not coming up I want the environment back to the point where EVE-NG instances reliably obtain an IP from the router and are reachable on the LAN. Diagnosis should cover the Proxmox bridge, the underlying Linux network stack, and any EVE-NG specifics (vrf, cloud interfaces, tap devices, etc.). If the fix invo...

    $13 / hr Average bid
    $13 / hr Сер. заявка
    20 заявки

    Рекомендовані для вас статті