Filter

Mine tidligere søk
Filtrer etter:
Budsjett
til
til
til
Skriv
Ferdigheter
Språk
    Jobbstatus
    2,000 Threat intrusion jobber funnet, priser i USD

    at "" I'm seeking a professional who can provide Marketing and sales for my Cloud and Cybersecurity Architecture services Ideal Skills: - Proven experience in Cloud Infrastructure design and Cybersecurity. - Proficiency in Cyber Threat Intelligence Analysis. - Demonstrated success in developing effective Security Strategies. - Previous experience working with small organizations is a plus. Please provide relevant samples of your previous work and outline your approach to addressing our unique needs.

    $19 / hr (Avg Bid)
    $19 / hr Snitt bud
    6 bud

    I'm currently facing a few issues with my Magento 2.4 website that need immediate attention. I'm looking for a skilled and experienced Magento developer to handle the following: - Google tag isn't connecting p...process, I'll provide you with developer platform access. As for the environment, I'd prefer these fixes to be addressed on a development/staging environment. Ideal Skills: The ideal candidate for this project should have: - Proven experience with Magento 2.4, including troubleshooting and patching - Strong understanding of Google Tag Manager and URL rewriting - Experience in malware and security threat removal - Ability to work with a developer platform I value efficiency and professionalism, so if you're confident in your ability to tackle ...

    $20 / hr (Avg Bid)
    $20 / hr Snitt bud
    70 bud
    Full Stack Developer (MERN) 4 dager left
    VERIFISERT

    ...of experience in agile development of scalable SaaS apps in the cybersecurity area: Improve our app (URL Risk assessment) Improve our app (Domain Typosquatting) Improve our project (Darknet Monitoring) Create an app "hackerview" for passive attack surfave enumeration Create an app for detecting spoofed social media profiles Create an app to scrape ransomware threat actor website and maitain stats about those sites Improve an existing app to monitor paste sites Mininmal Tech Experience: MERN, REST API (JWT), Django, Python, Github, CI/CD, Celery, Redis, Linux, Postgress, Kubernetes, Docker, Nginx, JS, HTML5, Protocols (DNS, SMTP, SSL, HTTP..).Detailed app specifications will be shared at a later stage. |--------------------------------------------------

    $53 / hr (Avg Bid)
    $53 / hr Snitt bud
    71 bud

    ...data ->Database, disk, backup data, email, file system....., etc. ->Use LUKS, etc... -Transport layer security -Connecting domains -Setting up and activating servers -Installing the control panel -Installing the Server Management Panel -Setting Up a Firewall -Harden SSH security -Install fail2ban and -Install log monitoring and analysis tools -Manage file and directory permissions -Install an intrusion detection system (IDS) -Manage encryption keys and set their complexity -Setting up iptables/rate limiting -Automatic security patching -rootkit hunter/clam av/lynis -open vas/nmap/modsecurity -bastellie linux/chkrootkit/linux audit -aws waf -netdata/cockpit/glances -anything else to boost server performance and security ...

    $23 (Avg Bid)
    $23 Snitt bud
    34 bud
    Cyber Security and IT Team 3 dager left
    VERIFISERT

    ...day-to-day IT services, and ensuring we have the latest software installed and updated. - Secure Environment Expectations: - I expect our overall environment to be top-notch in terms of security. This will involve implementing effective intrusion detection, utilizing strong data encryption practices, and managing access control. Your service should also extend to addressing day-to-day IT issues promptly. Ideal candidates should have: - Proven experience in Cyber Security and IT services - Strong background in security management, including Intrusion Detection and Data Encryption - Expertise in handling IT service requests efficiently - Previous experience in managing firewall and conducting vulnerability assessments - Ability to handle Penetration Testing and V...

    $548 (Avg Bid)
    $548 Snitt bud
    41 bud

    Preferred Commnications and Wi-Fi, Inc. is looking for Watchguard firewall techs for both firewall and endpoint security pre-Install config. and support. Requirements: - In-depth knowl...and Wi-Fi, Inc. is looking for Watchguard firewall techs for both firewall and endpoint security pre-Install config. and support. Requirements: - In-depth knowledge of hardware firewalls and their functionalities. - Expertise in intrusion detection systems. - Experience with high-risk threat detection and response. - Capable of optimizing firewall settings for maximum security. I am looking for a professional with a sterling track record in enhancing hardware firewall intrusion detection capabilities. If you are up to the task and confident with high-risk threat management,...

    $67 / hr (Avg Bid)
    $67 / hr Snitt bud
    6 bud

    As a small-scale business owner, I need a proficient cybersecurity expert to address three crucial areas of cybersecurity within my organization: network security, data protection, and threat detection. Additionally, expertise in penetration testing will be of added value. Key responsibilities will include: - Setting up and managing a secure network infrastructure to ensure protection against possible network threats. - Implementing solutions for data protection to safeguard sensitive data and reduce the risk of data breaches. - Establishing reliable threat detection mechanisms to identify and combat cyber threats before they impair our systems. - Conducting penetration testing to identify any potential vulnerabilities and strengthen our security posture. Further, to naviga...

    $966 (Avg Bid)
    $966 Snitt bud
    7 bud

    ...Attitudes, Conservative and Liberal Ideologies. I have put two starter refernces we must put in this report, but also you must find four to five references to include in this essay. Those are the report that canbe usuful: - Not All Ideologies are Created Equal: Epistemic, Existential, and Relational Needs Predict System Justifying Attitudes - Motivated Closed-Mindedness Mediates the Effect of Threat on Political Conservatism H. Thórisdóttir, J. Jost - The Politics of Fear: Is There an Ideological Asymmetry in Existential Motivation? J. Jost, Chadly Stern, Nicholas O. Rule, Joanna Sterling An attempt to clarify the link between cognitive style and political ideology: A non-western replication and extension Onurcan Yilmaz, S. A. Saribay Reflective liberals an...

    $254 (Avg Bid)
    $254 Snitt bud
    52 bud

    As your client, I need a proficient AutoCAD expert who will assist in designing a comprehensive security system that ensures both protection and compliance with local regulations. This project entails working on three main system types: CCTV, Access control, and Alarm, plus an Intrusion System. The key aspects for this job include: * A deep understanding of these system types and their working principles. * Earlier experience with AutoCAD designing of security systems. * Strong attention to the necessary design details, specifically, ensuring the CCTV systems feature high-resolution cameras. * General knowledge on security system standards is necessary, especially emphasis on local regulatory standards. Your ability to efficiently translate complex security system terms into cle...

    $3914 (Avg Bid)
    $3914 Snitt bud
    10 bud

    I am looking to develop an AIOPS system that primarily focuses on user behavior logs for proactive monitoring. Here's a brief outline of my requirements: - The main objective is automated incident management, efficient anomaly detection, active threat detection and generating tailored training programs to teach the solution. - The system should exclusively work with user behavior logs. Ideal candidates will have a proven track record in implementing similar systems and should have extensive experience working with AIOPS systems, threat detection, and manual neutralization strategies. Knowledge and experience with user behavior logs will be a significant advantage.

    $2078 (Avg Bid)
    $2078 Snitt bud
    36 bud

    ...email could be a legit email, ould be spam or a real phish. The email is sent directly from the user's email client yo our admin consol. Then, the emails gets deleted from the user's inbox. - User notification: A pop-up window should appear to confirm the report. Additional Features: - An email template should open for the user to provide additional details. This can help in further analyzing the threat and improve our phishing prevention systems. - The add-in must be published and available in the Office Store so that Office administrators can easily install it. - The add-in must work in both desktop (Windows y MacOS) and mobile environments (Android and iOS). Ideal Skills: - Proficiency in Microsoft Outlook and Office 365 add-in development. - Experience in API int...

    $474 (Avg Bid)
    $474 Snitt bud
    53 bud

    My project aims to develop an advanced cybersecurity resilience solution ensuring enhanced threat detection, streamlined incident response, data protection, and secured critical infrastructure. Primary Outcomes: - Create a system capable of detecting threats in an advanced and sophisticated manner - Develop smooth and efficient incident responses to mitigate risks as soon as they are detected - Incorporate layers of security for the comprehensive protection of data - Deeply integrate security processes to protect crucial infrastructure Key Focus Areas: This project will prioritize: - Enhancing threat detection - Streamlining the process of incident response - Protection of critical data - Secure the critical infrastructure Target Audience: This solution is initially targe...

    $364 (Avg Bid)
    $364 Snitt bud
    13 bud

    I am seeking to acquire a comprehensive list of 10,000 fake domains associated specifically Saudi Arabia with phishing scams. This list will primarily serve the purpose of security testing. The focus of this task will be on the accumulation of domains, with no requirement for a detailed description of each domain's potential threat level. The ideal freelancer for this job would have a strong background in cyber security and a profound understanding of Web Scraping, phishing scams.

    $290 (Avg Bid)
    $290 Snitt bud
    21 bud

    I'm in need of a highly-skilled professional who specializes in Azure Security Engineering and ForgeRock Training. Key tasks include: - Azure security configuration - Conducting vulnerability assessments - Undertaking threat hunting exercises Additionally, expertise in ForgeRock training covering the following topics will greatly benefit my team: - Identity and Access Management (IAM) - Single Sign-On (SSO) - User Provisioning The ideal candidate is required to hold an 'Azure Security Engineer Certification'. This certification will give me confidence in your capabilities to successfully execute the necessary tasks. Your adeptness in handling Azure security coupled with your ability to impart crucial knowledge in ForgeRock makes you an integral team player for ...

    $6 / hr (Avg Bid)
    $6 / hr Snitt bud
    3 bud

    I am looking for a comp...create a demo page similar to ''. The functionalities of this page should include: - Website vulnerability scanning - Threat analysis and security grading The critical aspect that the demo page should highlight is the threat analysis and security grading of website vulnerability scanning. As for the presentation of penetration testing results, they should be displayed in a textual format. Candidates should have strong skills and experience in web development, security grading, and vulnerability scanning. A thorough understanding of threat analysis is also crucial for this project. Your ability to effectively transform complex data into understandable textual narratives will be highly valued.

    $168 (Avg Bid)
    $168 Snitt bud
    17 bud
    Trophy icon flyer program Avsluttet left

    ...to the living continues in new and powerful ways. Lesson 3 The Mourning After What is the Jewish grieving process and what is the significance of its various traditions? This lesson provides a meaningful Jewish perspective on grief itself, as well as practical shiva etiquette both for mourners and for those who wish to comfort them. Lesson 4 Where We Go The promise of heaven and the threat of hell have driven humankind for centuries. Discover what Jews believe about where every soul goes and how Kaddish is just one method that aids a soul in reaching true peace. Lesson 5 Where We Go Again Reincarnation: more than a fascinating topic, Judaism provides a practical way to imagine this mystical process, and explains why it is important both to departed souls and ...

    $75 (Avg Bid)
    Garantert
    $75
    134 bidrag

    I need a PowerPoint presentation that encapsulates my scientific research talk on 'Threat Modeling for Mobile Health Systems'. This presentation should be a concise 15 slides with an emphasis on a design that's not just appealing, but professional and fitting to the subject matter. The color scheme I'm looking for should be aligned with computer science aesthetics. Key elements of this project: - Translate my detailed research talk into a 15-slide PowerPoint presentation - Design the slides in a manner that's professional and visually appealing - Utilize a color scheme that fits the subject matter and is aligned with computer science aesthetics The ideal freelancer for this job would: - Have experience in designing professional and engaging PowerPoint pres...

    $20 (Avg Bid)
    $20 Snitt bud
    17 bud

    As a developer of an advanced intrusion detection system, I require a proficient Python coder with experience in data analysis and security systems. The task at hand comprises testing and measuring the accuracy of my existing model using the Nsl-kdd dataset. Your primary responsibilities would include: - Thorough testing of my intrusion detection system, using the provided dataset. - Extracting and predicting the accuracy of intrusions detected by the model. With a significant grasp of Python, data analysis, and an in-depth understanding of testing methodologies, you are an ideal fit for this project. Previous experience with intrusion detection systems would be highly advantageous. The ultimate goal is to evaluate and potentially enhance the efficiency of my model. ...

    $164 (Avg Bid)
    $164 Snitt bud
    42 bud

    ...the dynamics of: -Design, implement, and maintain complex network solutions for our clients, ensuring high levels of performance, security, and reliability. -Configure and optimize network settings to ensure maximum performance and reliability. -Monitor network performance and troubleshoot issues proactively. -Implement and maintain network security protocols, including firewalls, VPNs, and intrusion detection systems. -Collaborate with other IT teams to integrate network systems with existing infrastructure. -Provide technical guidance and mentorship to junior engineers, assisting them in developing their skills and knowledge in network configuration and administration. -Stay abreast of emerging technologies, industry trends, and best practices in network engineering, actively ...

    $8 / hr (Avg Bid)
    $8 / hr Snitt bud
    8 bud

    I am looking for a web security expert, who can solve the reputation and suspicious tag on our web app links. Off recently few customers in US region are getting blocked from accessing our links, they are shown potential threat in the links

    $76 (Avg Bid)
    $76 Snitt bud
    8 bud

    I am in need of a highly experienced network security teacher who is proficient in the following areas: - Ethical hacking - Network intrusion detection - Penetration testing - Boot 2 root I have a project in which i need assistance to complete under the guidance of someone who has this knowledgede as i am struggling. This will include calling and helping me thank you

    $28 / hr (Avg Bid)
    $28 / hr Snitt bud
    21 bud

    ...penetration testing on our network and system infrastructure. The primary objective of this task is to find potential security vulnerabilities. - Task Details: Your work will involve identifying weaknesses that could possibly be exploited to undermine our security controls and then testing how effective these controls truly are. - Approach: Please prioritize any vulnerabilities found according to threat severity level. I'm looking to focus on the most critical threats before handling the lesser ones. - Necessary Skills: Previous experience in network security, vulnerability assessment, and penetration testing is critical. You need to demonstrate a strong understanding of network and system infrastructure, its vulnerabilities, and security control mechanisms. This t...

    $107 (Avg Bid)
    $107 Snitt bud
    17 bud

    I'm seeking a v2x security expert to conduct in-depth research on threat detection within the v2x technology landscape. This position is for a 3-year period and will focus on the following areas: - Threat Detection: The primary objective is to identify and analyze potential threats to v2x systems. Specifically, I am concerned about Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. The ideal candidate should have: - A strong background in v2x security research, with a focus on threat detection. - Extensive knowledge and experience in Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. - Experience presenting and publishing research at conferences like USENIX and NDSS. - The ability to produce high-quality research papers and p...

    $1255 (Avg Bid)
    $1255 Snitt bud
    9 bud

    ...ensure functionality, reliability, and security. Required Skills and Qualifications Splunk Development: Proven experience in developing Splunk apps and custom SPL commands. API Integration: Experience with RESTful API integration and handling JSON data. Frontend Development: Skills in HTML, CSS, and JavaScript for UI design within Splunk. Cybersecurity Knowledge: Understanding of cybersecurity and threat analysis. Problem Solving: Ability to troubleshoot and resolve issues during development. Communication: Strong communication skills for clear documentation and regular updates. Project Timeline The project is expected to be completed within 2 months from the start date. Application Requirements Proposal: Outline of your approach to the project, including any initial ideas for ...

    $304 (Avg Bid)
    $304 Snitt bud
    33 bud

    ...urgently require a professional to help enhance my digital security to combat hacking attempts. I am faced with a serious breach that involves invasion and violation of my personal and financial information as well as photos, videos, and IP addresses. The specifications necessary for this task include: - Antivirus Software: Implementation of effective antivirus software to detect and prevent intrusion. - Firewalls: Configuration of a strong firewall to filter incoming data and block threats. - VPN Service: Setting up a secure VPN to protect my IP address and data transmission. I'm looking for someone experienced in digital security, specifically in antivirus software, firewalls, and VPNs. The nature of this task demands fast response and attention to detail. Previous ex...

    $31 / hr (Avg Bid)
    Viktig
    $31 / hr Snitt bud
    13 bud

    I'm seeking an expert writer to craft a cogent research paper concerning a deep learning model for IoT intrusion detection, with a core focus on network traffic monitoring. This work should be comprehensive, encompassing both theoretical foundation and practical applications of deep learning in securing an IoT network. Ideal Skills and Experience: - Deep learning methodologies - Familiarity with IoT and intrusion detection systems - Strong understanding of network traffic monitoring - Proficient in academic research and scientific writing. I have the code ready and literature review you can use this is the requirement: Abstract Introduction: Problem Statement, Solution, Objectives • Background Review and Related Work • Proposed Solution: Model / Methodo...

    $358 (Avg Bid)
    $358 Snitt bud
    31 bud

    ...expertly interconnected. Each Global Enterprises office will have its own Local Area Network (LAN) designed to provide network connectivity for all devices within that location. These LANs will be interconnected to form a Wide Area Network Key Features you will implement: - Firewall Configuration - VLAN Setup - VPN Configuration - Routing Protocol Configuration - DHCP Server Integration - Intrusion Detection and Prevention Systems (IDS/IPS) For monitoring and management purposes, it is crucial that a successful ping request can be made. Furthermore, it's necessary to assign suitable IP addresses within the networks. Ideal candidate should have a strong background in network architecture design with a proven track record in implementing security protocols for globa...

    $22 (Avg Bid)
    $22 Snitt bud
    5 bud

    I'm in dire need of someone who can swiftly develop a graph for me, with the focus on my intrusion detection model. The type of graph I'm looking at is somewhat unique - it's not one of those common line, bar, or pie charts. Having a deep understanding of various kinds of graphs, and knowing how to implement them creatively, will come in handy for this task. The graph will be used to explain the methodology behind my model. Unfortunately, there aren't any further details I can provide on whether it is a trend, comparison or distribution graph. Crucially, I need this task completed within the next 3 hours. Therefore, prompt response and efficient work are essential. I do have an example to guide you, but thinking on your feet might also be necessary. Experience...

    $28 / hr (Avg Bid)
    $28 / hr Snitt bud
    19 bud

    I'm looking to create a comprehensive platform specifically designed for pilot training. This platform should be equipped with key features including interactive tests and quizz...specifically designed for pilot training. This platform should be equipped with key features including interactive tests and quizzes, engaging video lessons, and live Q&A sessions. Additionally, an integral part of this platform will be the incorporation of threat assessments such as risk assessment procedures and threat detection. I'm keen on working with developers who have experience in educational platforms particularly with creating interactive tests and content, implementing video/real-time capabilities, and integrating risk/threat assessment protocols. A deep understandin...

    $879 (Avg Bid)
    Taushetspliktsavtale
    $879 Snitt bud
    17 bud

    ...the steps in audio I'm looking for a seasoned network professional with experience in Zeek intrusion detection system. The main goal of this project is to monitor network traffic effectively and provide real-time alerts. Key Responsibilities: - Set up and configure the Zeek intrusion detection system on a virtual network. - Based on the project goal, the emphasis is on monitoring network traffic efficiently. - The type of network traffic to be monitored was not specified, thus a capability to monitor both LAN and WAN traffic would be ideal. Required Skills & Experience: - Proficiency in network monitoring and security. - Extensive experience with setting up and configuring the Zeek intrusion detection system. - Solid knowledge of virtual networks. - W...

    $50 (Avg Bid)
    $50 Snitt bud
    6 bud

    ...consulting firm dedicated to empowering companies by safeguarding their digital assets from malicious hackers. With a team of expert ethical hackers, strategists, and consultants, we collaborate seamlessly to construct impregnable security frameworks that are virtually impenetrable. We are passionate about providing innovative solutions to our clients and staying ahead of the ever-evolving cyber threat landscape. Position Overview: We are seeking a dynamic and results-driven Digital Marketing & Sales Specialist to join our team. The ideal candidate will have a strong background in digital marketing, lead generation, and sales, with a focus on the cybersecurity industry. They will be responsible for developing and executing digital marketing strategies to drive lead generatio...

    $133 (Avg Bid)
    $133 Snitt bud
    36 bud

    I want someone to help me with the Zeek Intrusion detection system program I want to implement this project shown in the video, but there are problems I currently need assistance to work through a series of problems encountered while trying to implement a project with the Zeek Intrusion Detection System program. Here are some specific issues that require expert attention: - Installation Issues: The struggle includes missing dependencies, installation failure, and multiple error messages. - Configuration Errors: Constant stumbling blocks have been encountered during the configuration phase. - Compatibility Problems: I'm facing compatibility concerns with my current system. This project will benefit from a freelancer well-versed in the implementation

    $25 (Avg Bid)
    $25 Snitt bud
    2 bud

    ...including: - Network status (up/down) - Bandwidth usage - Network latency - Download speed - Upload speed • Device Monitoring: This system should be able to monitor a 4G Router. • Perform specific actions like: - Receiving real-time alerts - Generating reports - Viewing historical data - Receiving intrusion detection This project requires someone with experience in network monitoring, as well as a good understanding of 4G routers. Familiarity with creating real-time alerts, report generation, and intrusion detection mechanisms will be crucial for this role....

    $513 (Avg Bid)
    $513 Snitt bud
    37 bud

    ...metrics to identify areas for optimization and improvement. Implement solutions to enhance network performance, reliability, and availability, including QoS policies, traffic shaping, and network segmentation. Security Implementation: Implement and maintain robust network security measures to protect against unauthorized access, data breaches, and cyber threats. Configure firewall policies, VPNs, intrusion detection/prevention systems, and other security controls to safeguard network infrastructure and data assets. Troubleshooting and Incident Response: Provide advanced troubleshooting support for network-related issues, including connectivity problems, performance degradation, and security incidents. Conduct root cause analysis and implement corrective actions to resolve issues ...

    $668 (Avg Bid)
    $668 Snitt bud
    11 bud

    ...skilled cybersecurity analyst to conduct an in-depth comparative analysis of various threat intelligence platforms. The primary goal of this project is to evaluate and document the distinct strengths and weaknesses of each platform, focusing on their data sources, collection methods, and analysis/reporting capabilities. Platforms for Analysis: The analysis should cover the following threat intelligence platforms: 1. IBM QRadar 2. Recorded Future 3. Microsoft Azure Sentinel 4. Crowdstrike 5. AlienVault 6. Trend Micro 7. VirusTotal 8. Kaspersky Key Areas of Focus: - Data Sources and Collection Methods: Understand and evaluate how each platform gathers and utilizes data for threat intelligence. - Analysis and Reporting Capabi...

    $281 (Avg Bid)
    $281 Snitt bud
    21 bud

    ...documentation and voluminous medical records and tasks while ensuring secure and closed handling of sensitive information. The system should have the following features: - Utilize Natural Language Processing, Image Recognition, Speech Recognition, and Audio capabilities for handling diverse data formats and sources. - Incorporate high-level security measures like encryption of data, access control, and intrusion detection to protect the confidentiality and integrity of the information it processes. - Provide user interaction through text-based chat, voice-based interaction, and graphical user interface (GUI) to ensure ease of use for both customers and legal professionals. The primary goal of this system is to handle tasks like summarizing voluminous medical records, drafting ...

    $1500 - $3000
    Forseglet
    $1500 - $3000
    105 bud

    I'm seeking a designer who can design five image-based posts for Facebook. The focus will be on raising awareness about threats to Amazon Brand Stores. (Key responsibilities: - Develop five relevant, eye-catching images. - Ensure each image encapsulates the specified threats. - Design posts that effectively raise awareness about these challenges. Ideal Skills: - Strong graphic design and image editing. - Familiar with Facebook posting guidelines. - Understands Amazon Brand Store challenges. - Content creation with an education and awareness focus.)

    $35 (Avg Bid)
    $35 Snitt bud
    18 bud

    ...create a captivating cover for a fantasy book, embodying a unique juxtaposition of ethereal elegance and mysterious menace. The cover should prominently feature angels and vampires, rendered in a complimentary mix of grace and foreboding. Key requirements: - An enchanting portrayal of angels, embodying elegance and ethereal beauty. - A menacing depiction of vampires, preserving the mystery and threat they represent. - The composition should masterfully meld both entities, showcasing their contrasting natures but also their potential harmony. - Utilisation of vibrant colors and dramatic shadows to enhance the cover appeal. Ideal skills: - Expertise in digital illustration or painting, with a body of work showcasing ability to create detailed, engaging fantasy characters. - Pre...

    $105 (Avg Bid)
    $105 Snitt bud
    50 bud

    I need a 10-20 page research paper on Cyber Threat Intelligence (CTI) that will be submitted for publication in an IEEE journal. The paper must be written in an academic style and be suitable for a readership of fellow researchers in the field. Requirements: - Expertise in Cyber Threat Intelligence: You should have a solid understanding of the theory and practice of CTI, including its applications and methodologies. - Academic Writing Skills: Ability to write in an engaging, clear, and academically rigorous style. - IEEE Publication Experience: Preferably, you should have previous experience with IEEE publications and be familiar with their submission requirements. Please submit a proposal detailing your relevant experience in this field, along with a timeline for completi...

    $130 (Avg Bid)
    $130 Snitt bud
    27 bud

    I'm in need of a comprehensive monitoring system that can track the performance, security, and usage of our network. Performance Monitoring: - Keep an eye on the system's response time - Monitor the server load...comprehensive monitoring system that can track the performance, security, and usage of our network. Performance Monitoring: - Keep an eye on the system's response time - Monitor the server load - Track the resource utilization Security Monitoring: - Implement Intrusion detection - Keep track of authentication logs The ideal freelancer should have: - Extensive experience in network monitoring and management - In-depth knowledge of performance, security, and usage monitoring tools - Strong understanding of security measures like intrusion detection a...

    $15 / hr (Avg Bid)
    $15 / hr Snitt bud
    12 bud

    ...the websites. Candidates have to send in identification and sign NDA. Key Responsibilities: Systems Administration: CPanel management, database administration (PHP), FTP, firewalls. WordPress Maintenance: Plugin updates, theme management, basic frontend/backend operations. Security Focus: WordPress hardening, malware/infection remediation, firewall configuration, virus scanning, intrusion prevention. SEO: Basic on-site/off-site optimization, Google Search Console, Google Analytics, Google Webmaster Tools, Google ReCaptcha, cookie consent implementation. The Ideal Candidate: Demonstrated WordPress administration expertise Strong security background with experience in infection cleanup. Proven ability to manage multiple websites simultaneously. ...

    $39 / hr (Avg Bid)
    $39 / hr Snitt bud
    95 bud

    I'm specifically targeting BandCamp for an online sales drive of my two albums. My strategy involves a triple-threat approach, using social media promotion, an email marketing campaign, and other innovative strategies that can boost my visibility and sales. Ideal Skills and Experience: - Expertise in BandCamp album promotions - Proficiency in social media marketing, particularly in relation to music promotion. - Strong background in email marketing - Ability to suggest and implement additional effective promotional strategies. - Prior experience in the music industry would be a plus. Tasks Include: - Driving album sales through BandCamp - Organizing and managing a social media campaign - Creating and executing an email marketing strategy - Proposing and implementi...

    $94 (Avg Bid)
    $94 Snitt bud
    12 bud

    As an organization, we aim to significantly boost our network security. Thus, we're seeking a skilled professional capable of: - Configuring firewall - Implementing an effective Intrusion Detection System - Establishing secure remote access Unfortunately, we skipped out on specifying our preferred secured remote access service and the size of our network infrastructure during the initial stages. However, we encourage applicants to be fully versatile with VPN, SSH, RDP, and to be equipped to handle infrastructure of various sizes. Prior experience with these areas will be advantageous. Do you have what it takes to help us execute a thorough network security overhaul? If so, we want to hear from you!

    $547 (Avg Bid)
    $547 Snitt bud
    24 bud

    ...skilled Python developer to create a security application with robust intrusion detection capabilities. Key Features: - Intrusion Detection: The application must be able to detect and alert me about any potential security breaches. - Log Gathering: I'll need the app to effectively and securely gather logs from IoT devices. - Access Control Management: It should have the ability to manage and control access to the security system. Logging Mechanism: - The application should be able to log activities from sensors and smart home devices effectively. Ideal skills and experience: - Strong Python programming skills, coupled with experience in security applications. - Proficiency in designing and implementing robust intrusion detection systems. - Prior work on I...

    $333 (Avg Bid)
    $333 Snitt bud
    9 bud

    I need IEEE format paper and PPT related to A secure and Robust framework with threat modeling in a Mobile-government.

    $60 (Avg Bid)
    $60 Snitt bud
    1 bud

    ...table with key insights ⚡ Fast, expert research & delivery Order now & unlock cybersecurity knowledge! Tags: cybersecurity, research, CIA, IEEE, analysis, comparison - Identifying potential vulnerabilities in multiple IoT in smart city systems - Analyzing existing cybersecurity measures - Proposing enhanced security solutions The ideal candidate will understand A secure and Robust framework with threat modeling in a Mobile-government, their potential vulnerabilities, and possible solutions. Your role would also involve aiding in comparison and assessment of different cybersecurity measures. specific area of this topic: you will need to find it out of the 5 articles after you get them out of the internet. share them with first and we will agree on them. Research foc...

    $100 (Avg Bid)
    $100 Snitt bud
    32 bud

    I am in need of a Packet Tracer expert to architect a small project that includes a firewall, DMZ, and DHCP server. Desired Firewall Abilities: - It must have intrusion detection capabilities. - VPN support is also essential. Firewall Connectivity: - The solution will be tailored for less than 10 devices. DMZ Serving Capabilities: - A web server will be hosted within the DMZ. Ideal Candidate: - Skilled in network design using Packet Tracer. - Knowledgeable about firewalls, specifically features like intrusion detection and VPN support. - Experience in setup and maintenance of DMZ hosting web servers.

    $34 (Avg Bid)
    $34 Snitt bud
    20 bud

    As a business highly concerned with network security, I am seeking assistance from a knowledgeable Cyber Security consultant to fortify our network infrastructure. Skills and Experience Required: • Deep understanding of network security measures • Proficient in employing and improving Firewalls and VPNs • Familiar with Intrusion Detection Systems • Capability to assess and mitigate risk of unauthorized access and data breaches Key Responsibilities: • Analyse our existing security measures • Identify vulnerabilities and recommend enhancements • Implement improved security protocols preventing unauthorized access and data breaches • Provide continuous monitoring and regular updates.

    $42 / hr (Avg Bid)
    $42 / hr Snitt bud
    34 bud