Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

Od 61,078 recenzí, klienti hodnotí našeho pracovníka Internet Security Experts 4.9 z 5 hvězd.
Zaměstnat Internet Security Experts

Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

Od 61,078 recenzí, klienti hodnotí našeho pracovníka Internet Security Experts 4.9 z 5 hvězd.
Zaměstnat Internet Security Experts

Filtrovat

Moje poslední hledání
Třídit podle:
Rozpočet
pro
pro
pro
Typ
Dovednosti
Jazyky
    Stav zakázky
    13 Nalezené pracovní možnosti

    I’m looking for a specialist to run a full health-check on my Local Area Network. The priority is to verify that everything works as intended and to pinpoint any performance bottlenecks that might slow users down. Security is being handled separately, so your focus will be strictly on functionality and performance. The job involves testing end-to-end connectivity, measuring throughput and latency at peak and off-peak times, and confirming that current configurations on switches, routers, and access points align with best practices. I expect you to use industry-standard network diagnostic tools—think Wireshark, iPerf, or SolarWinds—but you’re free to bring in any utilities you trust as long as the results are clearly documented. Deliverables • A concise repo...

    €19 / hr Average bid
    €19 / hr Průměr. nabídka
    5 nabídky

    I have already completed the technical investigation of a recent security alert: the endpoint protection platform flagged an executable that tried to tamper with system files and phone home to an external server. I verified the hash, monitored live-system behaviour, confirmed the activity as malicious, quarantined the file and rescanned the host to ensure it is now clean. What I need next is a professionally written incident report that translates those raw findings into a clear narrative for both management and technical stakeholders. The document should outline the timeline of events, the investigation methodology, indicators of compromise, remediation actions taken, and practical recommendations to harden the environment against similar threats. Where helpful, map tactics to MITRE ATT&...

    €8 / hr Average bid
    €8 / hr Průměr. nabídka
    11 nabídky

    You are a senior cybersecurity + machine learning engineer. Build a practical, runnable, end-to-end Transformer-based Web Application Firewall (AI-WAF) prototype suitable for Smart India Hackathon / ISRO SIH demonstration. The system must implement the full pipeline: Log Ingestion → Parsing → Normalization → Tokenization → Transformer Training → Multi-Class Attack Classification → Anomaly Scoring → Real-Time Non-Blocking Inference → Alerting & Logging → Incremental Fine-Tuning ======================================== 1. CORE FUNCTIONAL REQUIREMENTS ======================================== A. Multi-Class Attack Detection The Transformer model must classify HTTP requests into: - BENIGN - SQL_INJECTION - XSS - COMMAND_INJECTION - PATH_TR...

    €50 Average bid
    €50 Průměr. nabídka
    8 nabídky

    I hold written authorization from the system owner and need an experienced ethical-hacking professional to carry out a controlled breach of our production environment. The assignment goes beyond a traditional penetration test: I want you to replicate a real-world, end-to-end intrusion scenario so we can measure how our monitoring, logging and incident-response teams react under pressure. Scope • Obtain initial access using any non-destructive vector you discover (phishing simulation, misconfigurations, credential weakness, etc.). • Laterally move, escalate privileges and demonstrate data access without altering or deleting information. • Leave tamper-proof evidence (flags) in pre-agreed directories so we can verify compromise. • Conclude with a thorough report that det...

    €8 / hr Average bid
    €8 / hr Průměr. nabídka
    9 nabídky
    Wide Area Network Setup Project
    4 dní left
    Ověřený

    I’m ready to move from concept to a fully functioning Wide Area Network and need an experienced networking specialist to guide every step. The job starts with assessing my current sites and bandwidth needs, then designing a scalable WAN topology that keeps latency low and uptime high. From there you’ll source or specify the right hardware, configure routing, implement security policies, test end-to-end connectivity, and leave me with clear documentation so my team can handle routine maintenance. If you’ve rolled out multi-site WANs before and can communicate technical details in plain language, let’s talk timelines and milestones.

    €22 Average bid
    €22 Průměr. nabídka
    12 nabídky

    I’m ready to bring in a security specialist to run a thorough, manual penetration test on my live e-commerce application. Automated scanners aren’t enough for this engagement—I need human-driven testing that uncovers real-world attack paths. Here’s what I’m looking for: • A full manual assessment covering all SQL Injection, Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF),Web Application Penetration Testing , Network Penetration Testing Services External or Internal, Web Services Testing, API Testing • Exploitation-level proof of concept for every confirmed issue, with clear, reproducible steps. • A concise risk-ranked report that separates critical, high, medium and low findings, followed by practical remediation advice writ...

    €95 Average bid
    €95 Průměr. nabídka
    26 nabídky

    Job Description: QA Engineer – Cybersecurity Product (Reverse Proxy Server) Position Title: QA Engineer Location: Mumbai, India (Hybrid/Remote options available) Domain: Cybersecurity – Reverse Proxy Server Development and enterprise data security while using the cloud services Framework: Agile/Scrum Role Overview We are seeking a detail-oriented and security-aware QA Engineer to ensure the quality, reliability, and resilience of a cloud-native reverse proxy server. You will be responsible for designing and executing test plans, automating test cases, and validating security features in a fast-paced Agile environment. Your work will directly contribute to the robustness of a critical cybersecurity product. Key Responsibilities • Design, develop, and execute manual...

    €256 Average bid
    €256 Průměr. nabídka
    16 nabídky

    I’ve built a custom web application and it’s almost ready for production. Before the public rollout, I want a rigorous penetration test that will expose any weakness and help tighten every layer of security. The assessment must be hands-on and realistic, covering the full stack rather than a purely theoretical review. Scope My priorities are clear: • Code review – comb through the source for injection points, authentication flaws, insecure dependencies, and logic errors. • Network-level probing – map open ports, misconfigured firewalls, and potential lateral-movement paths. • Server configuration – evaluate patch levels, TLS setup, permissions, and hardening of the underlying OS and web server. Primary Goal The sole purpose is to imp...

    €950 Average bid
    €950 Průměr. nabídka
    24 nabídky

    Cloud Security Specialist – Immediate Infrastructure Hardening (Short Term) Project Overview Duration: 3 to 5 days Location: Remote Start: Immediate A healthcare technology platform requires a Cloud Security Specialist to implement quick security improvements identified in a recent penetration assessment. This is a focused, short-term assignment aimed at reducing immediate attack surface exposure at the infrastructure layer. Scope of Work All listed tasks must be completed. 1. Server Version Disclosure Prevention Remove server and framework version information from HTTP responses. Responsibilities Configure AWS Application Load Balancer to remove server headers Update CloudFront response headers policy Disable X Powered By headers in Customize error responses to prevent ve...

    €116 Average bid
    €116 Průměr. nabídka
    28 nabídky

    Cloud Security Specialist – Immediate Infrastructure Hardening (Short Term) Project Overview Duration: 3 to 5 days Location: Remote Start: Immediate A healthcare technology platform requires a Cloud Security Specialist to implement quick security improvements identified in a recent penetration assessment. This is a focused, short-term assignment aimed at reducing immediate attack surface exposure at the infrastructure layer. Scope of Work All listed tasks must be completed. 1. Server Version Disclosure Prevention Remove server and framework version information from HTTP responses. Responsibilities Configure AWS Application Load Balancer to remove server headers Update CloudFront response headers policy Disable X Powered By headers in Customize error responses to prevent ve...

    €76 Average bid
    €76 Průměr. nabídka
    21 nabídky

    We are seeking a reliable IT team to support our medical centre with comprehensive, end-to-end IT services. This would include setting up, managing, maintaining, and regularly updating all aspects of our IT infrastructure, including networks, servers (on-site and / or cloud-based), workstations, computers, printers, and all connectivity systems. We require ongoing management of firewalls, cybersecurity protections, antivirus and anti-malware systems, data encryption, secure remote access, backups and disaster recovery solutions, and proactive monitoring to prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection re...

    €426 Average bid
    €426 Průměr. nabídka
    23 nabídky

    We are seeking a reliable IT team to support our medical centre with comprehensive, end-to-end IT services. This would include setting up, managing, maintaining, and regularly updating all aspects of our IT infrastructure, including networks, servers (on-site and / or cloud-based), workstations, computers, printers, and all connectivity systems. We require ongoing management of firewalls, cybersecurity protections, antivirus and anti-malware systems, data encryption, secure remote access, backups and disaster recovery solutions, and proactive monitoring to prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection re...

    €402 Average bid
    €402 Průměr. nabídka
    34 nabídky

    I am looking for an experienced Instagram account recovery specialist to help me regain access to my business Instagram account. I currently cannot log in to my account through any method: Password reset is not working Facebook login is not working Instagram recovery page shows “No account found” However, the username and account are still visible when checked from another Instagram account Additional details: This is a business account I still have access to the original email and phone number The issue happened suddenly, likely due to hacking or unauthorized changes What I need: Proper recovery through Instagram / Meta official support Assistance with hacked account appeal and verification No fake tools or scams — only legitimate recovery methods Requireme...

    €63 Average bid
    €63 Průměr. nabídka
    8 nabídky

    Doporučené Články Jen pro Vás