Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Od 102,932 recenzí, klienti hodnotí našeho pracovníka Computer Security Consultants 4.9 z 5 hvězd.
Zaměstnat Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Od 102,932 recenzí, klienti hodnotí našeho pracovníka Computer Security Consultants 4.9 z 5 hvězd.
Zaměstnat Computer Security Consultants

Filtrovat

Moje poslední hledání
Třídit podle:
Rozpočet
pro
pro
pro
Typ
Dovednosti
Jazyky
    Stav zakázky
    22 Nalezené pracovní možnosti

    I have a small office network—fewer than twenty endpoints—that I want thoroughly examined for weaknesses. The immediate focus is a vulnerability assessment combined with a full network-security audit. Pen-testing isn’t required right now, but I would like the audit to be detailed enough that we could progress smoothly to active exploitation tests later if needed. Scope – Map every device and service, then scan using industry-standard tools such as Nmap, Nessus or OpenVAS. – Analyse configurations (firewall rules, router settings, shared resources, OS hardening) and identify misconfigurations or outdated software. – Provide a clear, prioritized remediation plan. Critical issues first, followed by medium and low-risk findings. – Conclude wit...

    €21 / hr Average bid
    €21 / hr Průměr. nabídka
    19 nabídky

    Job Title: Cyber Security Engineer (Checkpoint Firewall & Akamai WAF) Duration: 2 Hours per Day Budget: ₹30,000 per Month Start Date: Immediate About the Role We are looking for a skilled Cyber Security Engineer with expertise in Checkpoint Firewall and Akamai WAF to support our network security infrastructure. The ideal candidate will be responsible for managing firewall configurations, monitoring network security policies, and assisting in the implementation of web application firewall protections to safeguard enterprise systems. Key Responsibilities Configure, manage, and optimize Checkpoint Firewall environments (policy management, rule configuration, and troubleshooting). Implement and maintain Akamai Web Application Firewall (WAF) rules to protect web applications from security t...

    €5 Average bid
    €5 Průměr. nabídka
    2 nabídky

    Yesterday I noticed that every message and folder in my Hotmail account had vanished after an unauthorized login. I have since taken back control of the mailbox and switched on two-factor authentication, but Microsoft support told me they are unable to restore the data. I still need those emails. I’m after someone who knows the ins and outs of / Microsoft 365 back-end recovery, server-side retention, and forensic mail restoration. If you can locate and reinstate the deleted items—whether through the Recoverable Items folder, legacy PST pulls, or other Microsoft recovery channels—and then harden the account so this can’t happen again, please let me know your approach and an estimated timeline. Acceptance criteria • All recoverable emails and folders resto...

    €113 Average bid
    €113 Průměr. nabídka
    4 nabídky
    Secure Laptop Storage
    5 dní left
    Ověřený

    I need a reliable person located in the United States who can keep my personal laptop safely at their place, plug it in to power, and turn it on once every day. There are no special tasks to run—simply boot it up, confirm it’s online through your regular, stable internet connection, and let it sit for a moment so remote services can sync. After that, you can shut it down again. What matters most is trustworthy, secure storage in a clean, smoke-free environment, and the discipline to power it on daily at roughly the same time. No dedicated network, VPN, or extra equipment is required on your side; a standard home broadband line is sufficient. If you can provide a safe spot, dependable internet, and consistent daily availability, let’s talk about the hand-off logistics an...

    €19 / hr Average bid
    €19 / hr Průměr. nabídka
    21 nabídky

    Scenario Background: The scenario assumes that you are working as a security expert for a fictional company, Acme Coffee Company. The company includes several roles, including Bruno (CEO), Spike (Vice President of Sales), Eilik and Eilika (Sales), Loki (System Administrator), and Avery (Marketing). Loki has built a new company server, and Bruno has hired you to conduct a comprehensive security analysis and assessment of that server and submit a complete report. The final report should include your findings, techniques, graphics, and methodology, along with recommendations for improving any security issues identified. Video Overview: The instructor explains that the final project will provide a target machine personally built by the instructor to represent the Acme company environment. Yo...

    €119 Average bid
    €119 Průměr. nabídka
    8 nabídky

    Se requiere especialista en ciberseguridad / redes / seguridad informática para desarrollar la parte práctica de un trabajo personal. El proyecto consiste en la implementación y validación técnica de una arquitectura Zero Trust en un entorno virtualizado, comparándola con una arquitectura tradicional basada en VPN. ALCANCE DEL TRABAJO El freelancer deberá: 1. Construir laboratorio virtual Crear entorno simulado de red empresarial. Implementar: Servidor de autenticación (IAM o similar). Servidor de aplicaciones. Segmentación de red. Endpoint remoto. Gateway o firewall. Puede utilizar herramientas como: VMware, VirtualBox, GNS3, Proxmox, Azure Lab, AWS Lab u otra propuesta técnicamente viable. 2. Implementar arquite...

    €18 / hr Average bid
    €18 / hr Průměr. nabídka
    9 nabídky
    White-Box Web App Penetration
    4 dní left
    Ověřený

    I am ready to put my in-house web application through a thorough white-box penetration test and need a seasoned ethical hacker to run point. Because I can supply source code, architecture docs, and admin-level credentials, you will have full visibility to explore logic flaws, insecure configurations, and anything else that could turn into a real-world exploit. A key requirement is prior experience registering newly discovered vulnerabilities in official government vulnerability databases or repositories; I will rely on you not only to uncover issues but also to craft the correct disclosure package so the finding can be submitted and tracked according to policy. Scope • Inspect the entire codebase, APIs, and third-party integrations. • Execute manual and automated testing us...

    €173 Average bid
    DOM
    €173 Průměr. nabídka
    16 nabídky

    Looking for a CCNA certified expert Strong hands-on experience with lab-based questions in live practice test Proven ability to solve simulation-based scenarios in real time Capable of providing accurate and reliable solutions on the spot Good analytical and problem-solving skills

    €5 / hr Average bid
    €5 / hr Průměr. nabídka
    9 nabídky

    My phone and Mac-based computer were recently compromised and I am seeing clear signs of unauthorized access, suspicious background activity, and some missing files. I need an experienced ethical hacker or cybersecurity specialist who can remotely examine both devices, identify every backdoor or malicious profile, recover any lost data where possible, and lock everything back down so I am fully in control again. Your work will involve a forensic sweep of macOS (and the companion phone, likely iOS) to trace how the intruder got in, remove any malware or configuration profiles they left behind, and then hard-harden the system—ensuring strong authentication, updated firmware, and airtight network settings. Please be comfortable using common incident-response tooling such as Wireshark, ...

    €142 Average bid
    €142 Průměr. nabídka
    18 nabídky

    Project Overview Designed and implemented an intelligent DDoS detection and mitigation framework for Software-Defined Networking (SDN) based Vehicular Ad-hoc Networks (VANETs) to ensure secure, reliable, and low-latency vehicle-to-infrastructure (V2I) communication. The system leverages SDN’s centralized control to dynamically monitor network traffic and mitigate DDoS attacks in real time, ensuring uninterrupted safety-critical vehicular services. Key Innovations: SDN-Based Centralized Security Control OpenFlow-enabled SDN controller Global view of VANET traffic behavior Intelligent DDoS Detection Flow-level traffic analysis Anomaly detection using ML / Deep Learning (LSTM Autoencoder / Hybrid model) Real-Time Mitigation Strategy Malicious vehicle flow isolation Dynamic ru...

    €73 Average bid
    €73 Průměr. nabídka
    10 nabídky

    I’m ready to relocate to New Zealand and step into a mid-level IT Support role with an accredited employer, but I need an experienced consultant to shorten the distance between where I am now and that signed offer letter. You’ll guide me through the entire process—from refining a New Zealand-style CV and cover letter to identifying and approaching companies on the accredited-employer list. I expect tailored coaching on local interview expectations, salary norms, and any immigration-linked paperwork that employers commonly request. Your network inside the NZ tech scene (especially hiring managers and recruiters on platforms like LinkedIn, Seek, and Trade Me Jobs) will be a big advantage. Key deliverables: • A job-market-ready CV and cover letter adapted to NZ ...

    €290 Average bid
    €290 Průměr. nabídka
    6 nabídky

    I’m expanding Eigen Computing’s stealth-mode R&D team and need senior-level talent who can tackle optimisation at scale. We are building a hardware-accelerated probabilistic engine that runs QUBO/Ising workloads for Logistics, Finance, and Cyber-Intelligence, and I’m open to engaging specialists across several tracks: • ML Engineer – craft graph neural networks and matrix-compression pipelines that translate complex optimisation problems into sparse, hardware-friendly representations. • FPGA Engineer – write VHDL/Verilog kernels for AWS F1, pushing the solver to micro-second latency. • Backend Architect – design a high-performance API layer in Go, Rust or Python that orchestrates FPGA instances, manages job queues and exposes RE...

    €16 Average bid
    €16 Průměr. nabídka
    21 nabídky
    TikTok Account Recovery Help
    2 dní left
    Ověřený

    My personal TikTok profile was hijacked and I can no longer log in. I have already opened a ticket with TikTok support, yet weeks have passed with no feedback. I need a specialist who understands TikTok’s internal recovery flow, can prepare the right evidence, word an effective appeal, and chase the correct channels until the account is safely back in my hands. The username, original email, phone number, and proof of prior ownership are all available. Two-factor authentication was enabled, so you may need to guide me through any backup-code or device-verification steps as well. Deliverables • A complete, well-structured appeal (or series of appeals) submitted to the correct TikTok contact points • Real-time guidance on any verification steps TikTok sends my way &bul...

    €196 Average bid
    €196 Průměr. nabídka
    16 nabídky

    I need a technician or team that can fully install a hybrid (wired + wireless) CCTV system comprising roughly 100 cameras across several zones on my premises. The job goes beyond simply mounting devices; I’ll count on you to: • Design a clear layout that blends hard-wired runs where reliability is critical with strategically placed wireless units. • Pull and terminate cabling neatly, configure network switches/NVRs, pair the wireless cameras, and ensure unified remote viewing. • Optimise coverage, conduct final testing, and hand over with all login credentials and a concise user guide. I already have the cameras and recording hardware on-site; you bring tools, consumables, and know-how. Experience with large-scale mixed PoE and Wi-Fi systems, solid cable manageme...

    €569 Average bid
    €569 Průměr. nabídka
    10 nabídky

    We are looking for a freelance Network Engineer to provide onsite support at a client location for a one-day network activity. You will work as the onsite engineer while a remote team provides guidance and configuration support. Responsibilities Rack, cable, and power on network equipment (switches, routers, firewalls) Patch network cables as per provided diagrams Connect console or management cables for remote access Perform basic network connectivity checks Assist the remote team during troubleshooting or validation Provide a brief end-of-day handover and status update Deliverables Network equipment installed, powered on, and accessible to the remote team Confirmation of basic network connectivity Short summary of work completed and any issues observed Requirements Hands-on ...

    €30 / hr Average bid
    €30 / hr Průměr. nabídka
    10 nabídky

    I’m a computer-science student up against a deadline on a small networking assignment and I simply no longer have the hours to finish it properly. The scope is modest—nothing enterprise-level—but I still need a clean, working solution that I can submit with confidence. Here’s what I’ll hand over the moment we start: • The original brief from my instructor (topology requirements, IP addressing rules, and any grading rubrics). • Any partial work I’ve already done. What I need back from you: • A complete, functional design or configuration that satisfies every point in the brief. • A short write-up (plain text or PDF) that explains the choices made so I can discuss them if asked. • All supporting files: diagrams (Visio, PNG,...

    €104 Average bid
    €104 Průměr. nabídka
    29 nabídky

    I will perform a professional security scan of your website using Kali Linux tools. The service includes a detailed PDF report highlighting vulnerabilities and practical solutions to improve your website security. Fast and reliable service guaranteed. Suitable for WordPress and custom websites. أقوم بإجراء فحص أمني احترافي لموقعك باستخدام أدوات Kali Linux. الخدمة تشمل تقرير PDF مفصل يوضح الثغرات والحلول العملية لتحسين أمان الموقع. خدمة سريعة وموثوقة. مناسبة لمواقع WordPress والمواقع المخصصة

    €42 Average bid
    €42 Průměr. nabídka
    8 nabídky

    We are a stealth-mode Deep Tech startup developing a computational engine designed to solve massive-scale problems. While our current applications focus on logistics and finance, we are looking to explore the strategic implications of our technology within the Cybersecurity and Cryptography sectors. We are NOT looking for a developer or a technical writer. We are seeking a Strategic Consultant or Business Development Expert with a deep, pre-existing network in the cyber-intelligence and cryptographic security communities. Your Role: • Provide high-level market insights on current bottlenecks in cryptographic analysis and network security. • Identify key stakeholders and strategic entry points for a novel computational approach in these sectors. • Facilitate initial high-le...

    €96560 Average bid
    €96560 Průměr. nabídka
    27 nabídky

    I need a cyber-security professional who specialises in application security to review and harden a production-ready mobile app that runs on both iOS and Android. The codebase has already passed functional QA; now I want to be certain it stands up to real-world attacks. Scope • Perform a full security assessment that covers the OWASP Mobile Top 10. • Include static code analysis, dynamic runtime testing and API endpoint verification. • Highlight insecure data storage, improper authentication flows, weak cryptography and any third-party library risks. • Provide clear, reproducible proofs of concept for every confirmed vulnerability. Deliverables 1. Written penetration-test report detailing findings, risk ratings and recommended fixes. 2. A prioritised remed...

    €9 Average bid
    €9 Průměr. nabídka
    5 nabídky

    We are currently looking for an experienced Freelance Network & OT Cybersecurity Engineer (10+ years of experience) to support a network architecture redesign and cybersecurity implementation for an industrial environment. Scope of Work 1. Network Architecture The current infrastructure consists of a flat network. We are looking to redesign the architecture into a structured and segmented network. The proposed design should include: • A hierarchical network architecture (Core / Distribution / Access layers) per site • Segmentation between sites while allowing controlled sharing of selected networks • Design and placement of industrial firewalls • Secure interconnection between the sites • Migration plan for existing switches (reuse where possible and replace...

    €22 / hr Average bid
    €22 / hr Průměr. nabídka
    20 nabídky

    I need a comprehensive Wireshark portfolio to showcase my technical proficiency to university teachers. The portfolio should include: - Captured Packet Analysis - Network Troubleshooting Examples - Protocol Dissection Examples Ideal Skills and Experience: - Expertise in Wireshark - Strong understanding of network protocols - Experience in network troubleshooting - Ability to present information clearly and professionally Please provide detailed and well-organized examples for each category.

    €284 Average bid
    €284 Průměr. nabídka
    19 nabídky

    I need a thorough, professional penetration test that zeroes in on database security. The work will involve actively probing our live environment for misconfigurations, permission-escalation paths, injection points, improper encryption, and any other weakness that a determined attacker might exploit. Scope • Assess the entire database layer—from connection strings and authentication flows to stored procedures and backup endpoints—without disrupting business operations. • Document every finding with reproducible steps, risk ratings, and clear remediation guidance. • Validate fixes with a follow-up retest so we can close the loop confidently. Deliverables 1. Methodology outline (tools, test phases, compliance references). 2. Vulnerability assessment...

    €227 Average bid
    €227 Průměr. nabídka
    13 nabídky

    Doporučené Články Jen pro Vás