Internet Security Jobs
Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.
Here's some projects that our expert Internet Security Experts made real:
- Developing security protocols for actors in online communications
- Implementing technical solutions to protect company email addresses against malicious entities
- Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
- Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
- Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
- Troubleshooting WordPress security issues to safeguard companies from hackers
- Cleaning up any threats of malware and safeguarding websites against future infections.
As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!
From 60,946 reviews, clients rate our Internet Security Experts 4.81 out of 5 stars.Hire Internet Security Experts
I am looking for a Cyber Security and IT Assistant to help with ongoing vulnerability tests, Cyber Service and IT Solutions for personal and businesses. The ideal candidate will have experience in network security, as well as the ability to troubleshoot IT issues. We are a small company that provides services to small businesses / personal, a small growing company, you have the chance to become apart of the success and grow with us. Tasks: - Conduct regular vulnerability assessments to identify potential security risks - Provide recommendations for improving network security - Assist with troubleshooting IT issues as they arise - Provide Service to personals and small businesses - General Assistance in the company Skills and Experience: - Strong knowledge of network security and vulner...
I am looking for a skilled and reliable IT support professional to assist me with various tasks. The ideal candidate should have experience in cybersecurity, IT support, and general administrative tasks. Specific tasks that need assistance include: - Addressing specific IT issues that may arise - Providing ongoing IT support for other business which the company provides service to. - Personal clients who might need support and assistance. - When there is no project minimum 8 hours a week of general tasks, out reaches, training and more. The estimated workload per week is less than 15 hours but might become part time/full time job. Key skills and experience required for this role include: - Proficiency in cybersecurity measures and protocols - Strong troubleshooting skills for resolving...
Project Title: Ethical Hacking for Specific Target Description: I am looking for an experienced ethical hacker to conduct a penetration testing and security audit on a specific system or network. The ideal candidate should have expertise in ethical hacking and be able to provide a high-level summary of potential vulnerabilities. Requirements: - Expertise in ethical hacking and penetration testing - Experience conducting security audits on specific targets - Ability to provide a high-level summary of potential vulnerabilities Skills and Experience: - Proficient in various hacking techniques and tools - Strong knowledge of network and system security - Familiarity with industry best practices and standards - Excellent analytical and problem-solving skills Note: Please provide examples of...
I am in need of a security expert who specializes in network security. The project involves ongoing security management for a medium-sized network comprising 11-100 devices. Skills and Experience Required: - Expertise in network security, with a focus on protecting against potential threats and vulnerabilities - Experience in conducting regular security assessments and implementing necessary measures to ensure network security - Proficiency in configuring and monitoring network devices, such as firewalls, routers, and switches - Knowledge of industry best practices and standards for network security - Ability to identify and respond to security incidents promptly - Familiarity with network protocols and their potential security risks - Strong problem-solving and analytical skills to tro...
I have a Mern project that will be hosted on aws, i would like a security consultation and possible follow up work. Your focus will be on proactivley suggesting security provisions and grading those suggestions as, essential, conventional, reccomended, optional and good to consider when you have a 1,000,000 users etc. lol
Send me message firstly please to discuss the details. I am seeking an ethical hacker with expertise in web application security. The project entails both assessment and solution implementation. I am open to any programming languages and tools that the freelancer is proficient in. The ideal candidate should have a strong understanding of web application security and be able to effectively identify vulnerabilities and provide solutions to mitigate risks. Experience in network security and wireless security is a plus.
Project Description: remove the ip from the blacklist called UCEPROTECTL3
We suffer under attacks because of competitors who attack you ads budgets and waste them so that we dont get form submissions.
Project Description: I am looking for a freelancer who can create a WIFI URL link that will provide internet access to more than 100 users with standard security measures in place. Purpose of the WIFI URL link: - The primary purpose of the WIFI URL link is to provide internet access to users. Expected user load on the WIFI link: - The WIFI link should be able to handle more than 100 users simultaneously. Security requirements for the WIFI link: - The WIFI link should have standard security measures in place to ensure the safety of the network and user data. Ideal skills and experience for the job: - Experience in creating and configuring WIFI networks - Proficiency in network security protocols - Knowledge of managing high user loads on a WIFI network - Familiarity with setting up...
I am seeking a skilled freelancer to conduct blackbox penetration testing for our 10 Postman APIs. The purpose of this testing is to ensure compliance with security standards, specifically PCI DSS. Key requirements and responsibilities for this project include: - Identifying vulnerabilities in the APIs and assessing their security - Focusing on the authentication process within the APIs - Conducting thorough testing of data transmission - Providing detailed reports on any vulnerabilities or security issues discovered during the testing process Ideal skills and experience for this job: - Extensive experience in blackbox penetration testing and assessing the security of APIs - Strong knowledge and understanding of PCI DSS compliance requirements - Proficiency in using tools and technique...
I am in need of an Outlook365 Security Expert who can help me secure my environment. The ideal candidate should have expertise in implementing specific security measures such as Data Loss Prevention (DLP) policies and Microsoft Defender. I've made a thorough report on all the features we need to add. We will be working closely together to get these features implemented and this project will be longterm. Skills and Experience: - Proficient in implementing Microsoft Defender and DLP policies - Familiarity with securing Outlook365 environment - Experience working with small-scale environments (1-50 users) - In-depth knowledge of existing security infrastructures and ability to modify them as needed The project requires working with an existing infrastructure, so the ideal candidate sh...
Cyber Security Expert Needed Immediately - Specific aspect of cyber security: Network Security - Current level of organization's cyber security measures: Highly Secure - Assistance needed: Immediately - Ideal skills and experience: - Strong knowledge and experience in network security protocols and technologies - Proficient in identifying and mitigating potential network vulnerabilities - Familiarity with industry best practices and compliance standards - Ability to conduct thorough network security assessments and audits - Experience in developing and implementing robust network security strategies and policies - Proven track record in handling network security incidents and responding to cyber threats promptly - Excellent communication and problem-solving skill...
Title: Ethical Hacking and Cybersecurity Expert needed for Personal Project - Project Overview: - This project is for personal use and involves exploring the field of ethical hacking and cybersecurity. - I am aware that scamming is illegal and against community guidelines, and I want to emphasize that this project is focused on ethical hacking and cybersecurity practices only. - I am open to revising my project to ensure it complies with the community guidelines. - Ideal Skills and Experience: - A background in ethical hacking and cybersecurity is essential. - Knowledge of various hacking techniques and methodologies. - Proficiency in identifying vulnerabilities and implementing effective security measures. - Experience with penetration testing and vulnerability asse...
Project Description: I am looking for a freelancer who can help me obtain the real visitor IP behind Cloudflare proxy for my website. The purpose of this is to enhance the security of my website. Skills and Experience: - Experience working with Cloudflare and understanding of its proxy setup - Proficient in PHP programming language - Familiarity with obtaining visitor IP using HTTP headers - Knowledge of security best practices for web applications - Ability to troubleshoot server issues related to Cloudflare proxy setup Project Deliverables: - A solution that accurately obtains the real visitor IP behind Cloudflare proxy - Implementation of the solution in PHP - Documentation on how the solution works and how to maintain it Note: The client has no preference for the method of obtain...
Project Description: I am looking for a freelancer who can help me obtain the real visitor IP behind Cloudflare proxy for my website. The purpose of this is to enhance the security of my website. Skills and Experience: - Experience working with Cloudflare and understanding of its proxy setup - Proficient in PHP programming language - Familiarity with obtaining visitor IP using HTTP headers - Knowledge of security best practices for web applications - Ability to troubleshoot server issues related to Cloudflare proxy setup Project Deliverables: - A solution that accurately obtains the real visitor IP behind Cloudflare proxy - Implementation of the solution in PHP - Documentation on how the solution works and how to maintain it Note: The client has no preference for the method of obtain...
Project Title: Application Security Improvement I am in need of assistance with improving the application security measures for my organization. Specific Requirements: - The focus of this project is on application security, including the identification and mitigation of vulnerabilities within our applications. - I already have existing security measures in place, but they require improvement to ensure better protection against potential threats. - The implementation of the improved security measures should be completed within 1 month. Ideal Skills and Experience: - Strong knowledge and experience in application security, including familiarity with common vulnerabilities and attack vectors. - Proficiency in conducting security assessments and identifying vulnerabilities in applications....
Project Title: Network Engineer Description: I am in need of a network engineer to assist with the design and implementation of a medium-sized network consisting of 10-50 devices. The ideal candidate will have experience in network design and implementation, as well as the following skills: - Network troubleshooting: The ability to identify and resolve any network issues that may arise during the implementation process. - Network security: Knowledge of best practices for securing the network and ensuring data protection. - Strong understanding of network protocols and technologies. - Familiarity with network hardware and software. - Excellent communication and problem-solving skills. As there is no existing network infrastructure, the engineer will need to start from scratch and create ...
Upgrade Ontario Drivers License I am looking for a change of class for my Ontario drivers license. I am not sure if I need assistance with the entire process or specific aspects only. I do not require any additional services like exam preparation or vehicle rental for the test. Ideal Skills and Experience: - Knowledge of the Ontario drivers license system and regulations - Experience in assisting with license upgrades and changes of class - Ability to provide guidance and support throughout the process
I am looking for a Certified Ethical Hacker with the CEH and/or CompTIA PenTest+ certification. The primary goal of this project is to conduct an onsite grey hat Vulnerability Assessment of a web based application in Atlanta, GA and provide a report including findings and remediation recommendations. The customer requires that the testing be done on-site. An NDA with the customer will also be required. Please provide a resume, copy of certification(s), hourly/daily/weekly rates and references if interested. Once received and reviewed, more details of the project will be provided directly.
I am in need of assistance as one of my sites has recently been attacked by malware and now rendered the other sites on the same hosting package offline. Security Measures: I have not taken any steps to secure my website after the attack, so the ideal candidate should be able to implement necessary security measures to prevent future attacks. The below has come from my hosting company. ********************************************************************************* (A) Disinfecting or deleting the malicious files 1. Open the indicated link in your browser and use the access data for your primary SFTP user for authentication. Alternatively, you may also use an FTP client (such as FileZilla) to open the file in the ./logs/forensic/ directory. 2. The log file will contain additional inf...
I am looking for a skilled professional who can conduct a penetration testing on a Metasploitable VM using a Kali VM. Purpose of the attack: - The main objective of this project is to perform penetration testing to identify vulnerabilities and weaknesses in the system. Report detail: - A detailed report is required after the attack, including step-by-step documentation and screenshots of the process. Number of vulnerabilities: - The focus will be on targeting 1-3 vulnerabilities in the system. Skills and experience required: - In-depth knowledge and experience in penetration testing and ethical hacking. - Proficiency in working with Metasploitable VM and Kali VM. - Strong understanding of different attack vectors and techniques. - Ability to document findings and create detailed repor...
IAM / Identity Access Management Architect Expert I am in need of an IAM / Identity Access Management Architect Expert who is experienced in working with open source solutions. The ideal candidate will have expertise in the following areas: IAM Solution: Open Source IAM Requirements: - User Provisioning - group Provisioning - Role based access control - delegeted access control ... - department manager shall be able to provide access to his team members ... - project managers shall be able to delegate a set of their permissions to project members Organization Size: Small (1-100) Skills and Experience: - Extensive knowledge and experience in implementing IAM solutions using open source technologies - Strong understanding of user provisioning processes and best practices - Familiarit...
Please Sign Up or Login to see details.