Filter

Mine tidligere søk
Filtrer etter:
Budsjett
til
til
til
Skriv
Ferdigheter
Språk
    Jobbstatus
    2,000 threat jobber funnet, priser i USD

    ...penetration testing on our network and system infrastructure. The primary objective of this task is to find potential security vulnerabilities. - Task Details: Your work will involve identifying weaknesses that could possibly be exploited to undermine our security controls and then testing how effective these controls truly are. - Approach: Please prioritize any vulnerabilities found according to threat severity level. I'm looking to focus on the most critical threats before handling the lesser ones. - Necessary Skills: Previous experience in network security, vulnerability assessment, and penetration testing is critical. You need to demonstrate a strong understanding of network and system infrastructure, its vulnerabilities, and security control mechanisms. This t...

    $104 (Avg Bid)
    $104 Snitt bud
    16 bud
    Long-term v2x Security Research 4 dager left
    VERIFISERT

    I'm seeking a v2x security expert to conduct in-depth research on threat detection within the v2x technology landscape. This position is for a 3-year period and will focus on the following areas: - Threat Detection: The primary objective is to identify and analyze potential threats to v2x systems. Specifically, I am concerned about Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. The ideal candidate should have: - A strong background in v2x security research, with a focus on threat detection. - Extensive knowledge and experience in Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. - Experience presenting and publishing research at conferences like USENIX and NDSS. - The ability to produce high-quality research papers and p...

    $1224 (Avg Bid)
    $1224 Snitt bud
    8 bud
    Development of a Splunk App 4 dager left
    VERIFISERT

    ...ensure functionality, reliability, and security. Required Skills and Qualifications Splunk Development: Proven experience in developing Splunk apps and custom SPL commands. API Integration: Experience with RESTful API integration and handling JSON data. Frontend Development: Skills in HTML, CSS, and JavaScript for UI design within Splunk. Cybersecurity Knowledge: Understanding of cybersecurity and threat analysis. Problem Solving: Ability to troubleshoot and resolve issues during development. Communication: Strong communication skills for clear documentation and regular updates. Project Timeline The project is expected to be completed within 2 months from the start date. Application Requirements Proposal: Outline of your approach to the project, including any initial ideas for ...

    $294 (Avg Bid)
    $294 Snitt bud
    34 bud

    I'm looking to create a comprehensive platform specifically designed for pilot training. This platform should be equipped with key features including interactive tests and quizz...specifically designed for pilot training. This platform should be equipped with key features including interactive tests and quizzes, engaging video lessons, and live Q&A sessions. Additionally, an integral part of this platform will be the incorporation of threat assessments such as risk assessment procedures and threat detection. I'm keen on working with developers who have experience in educational platforms particularly with creating interactive tests and content, implementing video/real-time capabilities, and integrating risk/threat assessment protocols. A deep understandin...

    $879 (Avg Bid)
    Taushetspliktsavtale
    $879 Snitt bud
    17 bud

    ...consulting firm dedicated to empowering companies by safeguarding their digital assets from malicious hackers. With a team of expert ethical hackers, strategists, and consultants, we collaborate seamlessly to construct impregnable security frameworks that are virtually impenetrable. We are passionate about providing innovative solutions to our clients and staying ahead of the ever-evolving cyber threat landscape. Position Overview: We are seeking a dynamic and results-driven Digital Marketing & Sales Specialist to join our team. The ideal candidate will have a strong background in digital marketing, lead generation, and sales, with a focus on the cybersecurity industry. They will be responsible for developing and executing digital marketing strategies to drive lead generatio...

    $133 (Avg Bid)
    $133 Snitt bud
    36 bud

    I'm looking for a talented writer to create a 250-word dystopian short story. The plot revolves around a girl who is dissected by scientists after a machine controlling her world marks her as a threat for not following societal rules. - Desired Tone: 'Suspenseful and Thrilling' - Literary Devices: I'd like the story to prominently feature: - Metaphors and Similes - Foreshadowing and Irony - Imagery and Personification - Tripling/Repetition - In media res - Hyperbole - Pathetic Fallacy (optional) The story should be in the third person limited perspective, narrating the events in a way that intensifies the suspense and creates a thrilling experience for the reader. I'm also looking for the story to be written chronologically, ke...

    $77 (Avg Bid)
    $77 Snitt bud
    36 bud

    ...skilled cybersecurity analyst to conduct an in-depth comparative analysis of various threat intelligence platforms. The primary goal of this project is to evaluate and document the distinct strengths and weaknesses of each platform, focusing on their data sources, collection methods, and analysis/reporting capabilities. Platforms for Analysis: The analysis should cover the following threat intelligence platforms: 1. IBM QRadar 2. Recorded Future 3. Microsoft Azure Sentinel 4. Crowdstrike 5. AlienVault 6. Trend Micro 7. VirusTotal 8. Kaspersky Key Areas of Focus: - Data Sources and Collection Methods: Understand and evaluate how each platform gathers and utilizes data for threat intelligence. - Analysis and Reporting Capabi...

    $281 (Avg Bid)
    $281 Snitt bud
    21 bud

    I'm seeking a designer who can design five image-based posts for Facebook. The focus will be on raising awareness about threats to Amazon Brand Stores. (Key responsibilities: - Develop five relevant, eye-catching images. - Ensure each image encapsulates the specified threats. - Design posts that effectively raise awareness about these challenges. Ideal Skills: - Strong graphic design and image editing. - Familiar with Facebook posting guidelines. - Understands Amazon Brand Store challenges. - Content creation with an education and awareness focus.)

    $35 (Avg Bid)
    $35 Snitt bud
    18 bud

    ...create a captivating cover for a fantasy book, embodying a unique juxtaposition of ethereal elegance and mysterious menace. The cover should prominently feature angels and vampires, rendered in a complimentary mix of grace and foreboding. Key requirements: - An enchanting portrayal of angels, embodying elegance and ethereal beauty. - A menacing depiction of vampires, preserving the mystery and threat they represent. - The composition should masterfully meld both entities, showcasing their contrasting natures but also their potential harmony. - Utilisation of vibrant colors and dramatic shadows to enhance the cover appeal. Ideal skills: - Expertise in digital illustration or painting, with a body of work showcasing ability to create detailed, engaging fantasy characters. - Pre...

    $105 (Avg Bid)
    $105 Snitt bud
    50 bud

    I need a 10-20 page research paper on Cyber Threat Intelligence (CTI) that will be submitted for publication in an IEEE journal. The paper must be written in an academic style and be suitable for a readership of fellow researchers in the field. Requirements: - Expertise in Cyber Threat Intelligence: You should have a solid understanding of the theory and practice of CTI, including its applications and methodologies. - Academic Writing Skills: Ability to write in an engaging, clear, and academically rigorous style. - IEEE Publication Experience: Preferably, you should have previous experience with IEEE publications and be familiar with their submission requirements. Please submit a proposal detailing your relevant experience in this field, along with a timeline for completi...

    $130 (Avg Bid)
    $130 Snitt bud
    27 bud

    I'm specifically targeting BandCamp for an online sales drive of my two albums. My strategy involves a triple-threat approach, using social media promotion, an email marketing campaign, and other innovative strategies that can boost my visibility and sales. Ideal Skills and Experience: - Expertise in BandCamp album promotions - Proficiency in social media marketing, particularly in relation to music promotion. - Strong background in email marketing - Ability to suggest and implement additional effective promotional strategies. - Prior experience in the music industry would be a plus. Tasks Include: - Driving album sales through BandCamp - Organizing and managing a social media campaign - Creating and executing an email marketing strategy - Proposing and implementi...

    $94 (Avg Bid)
    $94 Snitt bud
    12 bud

    I need IEEE format paper and PPT related to A secure and Robust framework with threat modeling in a Mobile-government.

    $60 (Avg Bid)
    $60 Snitt bud
    1 bud

    ...table with key insights ⚡ Fast, expert research & delivery Order now & unlock cybersecurity knowledge! Tags: cybersecurity, research, CIA, IEEE, analysis, comparison - Identifying potential vulnerabilities in multiple IoT in smart city systems - Analyzing existing cybersecurity measures - Proposing enhanced security solutions The ideal candidate will understand A secure and Robust framework with threat modeling in a Mobile-government, their potential vulnerabilities, and possible solutions. Your role would also involve aiding in comparison and assessment of different cybersecurity measures. specific area of this topic: you will need to find it out of the 5 articles after you get them out of the internet. share them with first and we will agree on them. Research foc...

    $100 (Avg Bid)
    $100 Snitt bud
    32 bud

    I'm currently in need of a script writer for my youtube video who has the talent for turning data and objectives into a compelling infographic script. This script will focus on storytelling and should cater towards imparting educational content. Topic - NEURALINK: The Biggest Threat to Humanity! Ideal Candidate: - Excellent writing skills - An understanding of data visualization - Experience with infographic script writing - Background in crafting educational stories Responsibilities: - Develop a script for an infographic - Use storytelling to present an educational narrative - Ensure script visually translates into an infographic effectivel - attach your work experience in on script writing The goal is to use engaging storytelling to present an academic theme in an eng...

    $12 (Avg Bid)
    $12 Snitt bud
    17 bud

    ...Most of the employees agreed that AvantPharm was a great place to work. The company paid well, treated employees with respect, and had high standards for quality assurance and customer service. Over the last several years, however, rumors began to spread among various departments that Mark’s philosophy of running financially “lean” with regard to staffing and critical project initiatives was a threat to the stability of the organization. The manager of IT, Jane Smith, was one of the first people to voice her concerns. In each of the last 4 years, Jane’s IT budget was reduced in order to redirect additional funding to Research & Development. As a result of these cuts, the IT department had not increased headcount in the last 2 years, nor was there any m...

    $19 (Avg Bid)
    $19 Snitt bud
    95 bud

    I am looking for a professionals and experienced cybersecurity sales freelancer to help me expand my client base. My company specializes in providing threat intelligence and table top exercises services. Key Responsibilities: - Research and identify potential clients in the technology sector - Reach out to these clients and pitch our cybersecurity services - Conduct sales meetings independently with minimal guidance Ideal Candidate: - Proven experience in cybersecurity sales, especially in the technology sector - Strong understanding of threat intelligence and table top exercises - Ability to communicate complex technical concepts in a clear and concise manner - Self-driven and able to work independently - Familiarity with intermediate level of cybersecurity expertise - Ex...

    $9 / hr (Avg Bid)
    $9 / hr Snitt bud
    9 bud
    Cryptocurrency Avsluttet left

    ...Features: To enhance the trading experience and meet the needs of both novice and experienced traders, the platform will incorporate advanced trading features such as limit orders, market orders, stop-loss orders, and margin trading. These features will empower users to execute trades with precision and flexibility. Security and Compliance: Security is paramount in the cryptocurrency space, where the threat of hacking and theft is ever-present. Our platform will implement industry-leading security measures, including encryption, two-factor authentication (2FA), and cold storage for storing user funds. Additionally, we will ensure compliance with regulatory requirements, including anti-money laundering (AML) and know your customer (KYC) regulations, to mitigate legal and reputati...

    $20 / hr (Avg Bid)
    $20 / hr Snitt bud
    23 bud

    Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application’s integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses H...

    $140 (Avg Bid)
    $140 Snitt bud
    8 bud
    error message Avsluttet left

    Hi Indra P., for some reasons I am not able to message you. i got this error "not allow to send message to this threat. " and not want you to think I ignore you. but not sure how to communicate with you. please email me if you need me. thanks

    $20 (Avg Bid)
    $20 Snitt bud
    1 bud

    ...of available information from Wi-Fi networks to which you are not connected surprise you? Scroll back to the first column of information. Under SSID, is there a service set identifier for each network? Why would an SSID not appear? Does disabling the broadcast of the SSID name give any enhanced level of security? Why or why not? Note the value under the column MAC Address. How could a threat actor use this information? Under RSSI, the signal strength is displayed. (Lower numbers indicate a stronger signal.) The Frequency column displays the frequency on which the network is transmitting, and the Channel column gives the corresponding channel. Click Channel to sort the channels. Is there any channel overlap? How could this be a problem? Double-click the Wi-Fi networ...

    $16 (Avg Bid)
    $16 Snitt bud
    6 bud

    ...cloud platforms such as AWS, Azure, and Google Cloud, as well as private and hybrid cloud environments. Managed cloud services may include migration assistance, security management, performance optimization, and cost optimization. Security Services: Managed security service providers (MSSPs) specialize in protecting organizations from cyber threats by offering a range of security services such as threat monitoring and detection, vulnerability assessments, incident response, and compliance management. MSSPs help businesses strengthen their security posture and mitigate the risk of data breaches and other security incidents. Backup and Disaster Recovery: Managed backup and disaster recovery services provide businesses with reliable and comprehensive solutions for protecting their...

    $16 / hr (Avg Bid)
    Taushetspliktsavtale
    $16 / hr Snitt bud
    37 bud

    As a firm highly invested in our online security, we're seeking a skilled cyber security professional to undertake a one-off project centered around the analysis of our firewall logs. Primary tasks will include: - Detailed analysis of our firewall logs - Identification of potential threats within these logs - Ge...analysis of our firewall logs - Identification of potential threats within these logs - Generation of comprehensive reports on any security incidents discovered We require these reports to be delivered, conveniently and in an easily navigable format, via Excel spreadsheets. Ideal candidates will possess experience in cyber security, specifically with a focus on firewall log interpretation and threat detection, alongside robust knowledge of Excel for report produ...

    $19 (Avg Bid)
    $19 Snitt bud
    23 bud

    ...conducted by an unknown company. While living an ordinary life in a city filled with technology, she is suddenly abducted by a group of agents working for Neocron. Forced to work for Neocron to develop an advanced threat system capable of disabling and destroying any new technologies produced by a rival company known as "Cyberdyn," Evangeline initially refuses but finds herself trapped in an isolated environment within a secret laboratory. Amidst this, Evangeline discovers her ability to control electrical energy and manipulate electronic devices with a mere touch, making her a threat and terror to the lab personnel. She manages to escape with the help of an unexpected ally, a scientist working within the company who opposes its policies. Led by the former all...

    $27 / hr (Avg Bid)
    $27 / hr Snitt bud
    13 bud

    ...governance and compliance processes with Purview can lead to operational efficiencies and cost savings. Microsoft Purview in Action: Use Cases Regulatory Compliance: How organizations use Purview for GDPR, HIPAA, CCPA, and other regulatory compliances. Data Discovery and Classification: Real-world examples of how businesses leverage Purview to discover, classify, and protect sensitive data. Insider Threat Detection: Case studies on detecting and mitigating insider threats using Purview. Cross-platform Data Governance: Examples of Purview managing data across cloud and on-premises environments, including third-party cloud services. Getting Started with Microsoft Purview Step-by-Step Guide: A basic guide on how to start using Microsoft Purview, including setup and configuration...

    $27 (Avg Bid)
    $27 Snitt bud
    24 bud

    I'm looking for a capable PHP developer who can enhance my existing Acelle mail application with new features. The main agenda for this projec...application with new features. The main agenda for this project is to bolster user experience as a cold mail outreach. Therefore, a significant experience in improving software's intuitiveness and usability would be a boon. Knowledge on Acelle Mail's workings, email marketing, and customer-centric design is desired. What I am looking for - a sequence feature which will go to the user as a threat or chain not as a completely new email - AI integration for email first-line creation. . A demonstrated experience in driving customer-centric software projects will be a plus point. Let's improve the user experience of ...

    $70 (Avg Bid)
    $70 Snitt bud
    10 bud

    A personal existing instance MISP virtual machine running on TrueNAS Core at home. To be configured remotely via SHH over an OpenVPN connection, over via screen sharing. You must possess extensive knowledge in both MISP and Virus Total API and ideally have previous experience with similar integrations. The successful freelancer shou...via screen sharing. You must possess extensive knowledge in both MISP and Virus Total API and ideally have previous experience with similar integrations. The successful freelancer should be capable enough to carry out this integration seamlessly using an existing API key. Please ensure you fully understand the specified requirements prior to bidding for the project. Demonstrated experience in threat intelligence platforms or cybersecurity would be a ...

    $38 (Avg Bid)
    $38 Snitt bud
    9 bud

    I'm on the lookout for a seasoned professional who possesses a high level of expertise in c...Assessment and improvement of network security - Implementation of secure protocols, with a specific focus on http3 - Thorough analysis and counteracting of cyber security threats - Network traffic analysis under attack conditions Ideal Skills and Experience: - Profound knowledge in network security and cyber security - An adept understanding and experience in http3 - Proven experience in security threat mitigation - Prior experience handling network traffic analysis under attack conditions Please note that only candidates with expert-level experience in the above-mentioned fields will be considered. This project demands the highest level of proficiency and professional acumen in com...

    $28 / hr (Avg Bid)
    $28 / hr Snitt bud
    21 bud

    I'm in need of a security expert to properly configure Fail2ban on my Ubuntu server that is dedicated to filter and protect my OpenVPN setup. Your task will be to ensure that Fail2ban effectively mitigates the threat of: - Brute force attacks - DDoS attacks - Unauthorized login attempts Ideal Skills Include: - Strong knowledge of Ubuntu - Experience setting up and configuring Fail2ban - Understanding of NGINX Note: I am running a NGINX service with free openvpn for a local and private tunnel between The Server and many clients from a script.

    $33 (Avg Bid)
    $33 Snitt bud
    10 bud

    I am in need of a scholarly piece focused specifically on detailed architectural models for security threat detection in logistics operation. The main objective of this research paper is not simply a theoretical analysis; the architectural model should be accompanied with a deep learning model for practical implementation. Key features of this assignment: 1. Comprehensive Threat Analysis: This paper will require an in-depth analysis of diverse security threats, according to benchmarks, that could compromise logistics systems. 2. Architectural Model: The crux of this paper will be the proposal of a thorough architectural model designed to detect and mitigate these security threats. 3. Implementation of DL Model: The project will also involve designing and implementing a d...

    $637 (Avg Bid)
    $637 Snitt bud
    33 bud

    I am in need of a skilled cybersecurity professional with specific experience in DDoS threats. The purpose of this project is to capture and analyze DDoS attack traffic from our corporate network. With your help, I aim to: - Identify patterns that indicate a potential DDoS threat - Understand our network's vulnerabilities to these specific attacks - Develop a proactive defense system through learned network behavior Please note, this project requires experience with corporate network environments, analysis of DDoS network traffic, and a deep understanding of network defense systems.

    $224 (Avg Bid)
    $224 Snitt bud
    11 bud

    As your client, I expect a professional freelancer to efficiently take on the critical tasks of network threat analysis, implementing secure network protocols, while also conducting comprehensive security audits. Key tasks will involve: - Network Threat Analysis: To identify potential vulnerabilities and provide proactive action plans. - Secure Network Protocols Implementation: A key step to ensure the safety of our network and reduce potential threats. - Performing Security Audits: To assess the efficacy of the secure protocols implemented and suggest improvements if required. Strong expertise in network security is greatly preferred. Showcase your past work relevant to these tasks to increase your chances in our evaluation process. Your relevant experience in this fi...

    $140 (Avg Bid)
    $140 Snitt bud
    36 bud

    ...through an insurance solution. Here's a snapshot of what I'm looking for: - We'd like the icon to the left of the example attached to be the outline of the State of Michigan - A unique and professional logo encapsulating the strength and security offered by our business insurance program. - The logo should signify our core values and mission, which is to protect businesses from the ever-looming threat of cyber-attacks. Ideal skills and experience for the job would include: - Proven experience in graphic design or similar field. - A strong portfolio demonstrating logo design skills. - Understanding of brand continuity and visual communication. - Knowledge of color psychology and its implementation. If you have a knack for transforming visions into compelling vi...

    $100 (Avg Bid)
    Garantert
    $100
    313 bidrag

    I need a knowledgeable freelancer to create dynamic and engaging info-graphics that bring information security awareness to life. These should focus on, but not restrict to: - Cyber attacks and threat mitigation - Privacy laws and data protection - Safe online habits and phishing The target audience will stretch from employees and students to the general public. All designs must be delivered in PDF format. Ideal candidates should have prior experience in graphic design, a keen attention to detail, and a solid understanding of cybersecurity concepts. Previous experience in creating info-graphics for a similar audience will be appreciated. Your ability to translate complex info into easily digestible and visual formats will be crucial for this role.

    $82 (Avg Bid)
    $82 Snitt bud
    137 bud

    I'm urgently in need of a cyber security expert to guide me through my high-level educational assessments. Key Areas for Assistance: • Authentication • Access Control • Operating System Security • Vulnerabilities • Cryptography • Public Key Infrastructure • Threat Modelling Ideal Candidate Qualifications: • Demonstrated experience in network, information, and application security • Proven track record in dealing with the specified key areas • Ability to provide comprehensive, understandable guidance Please note that the timeline is critical and I need someone who can start immediately. Provide your experience and expertise in these areas. Looking forward to your bids.

    $87 (Avg Bid)
    $87 Snitt bud
    28 bud

    I'm in need of a server manager with intermediate-level cybersecurity and Linux experience to effectively monitor the security of my server. Key responsibilities include: - Ongoing security monitoring of the server and Wordpress websites - Threat identification and mitigation - Advise on potential security upgrades - Ensure the safety of sensitive information It is essential for potential freelancers to understand the Linux operating system thoroughly, and have a sound understanding of server cpanel and Vesta Cp. The ideal candidate should bring a proactive approach to identify and fix security weaknesses, offering consistent updates and reports on server security status. Be patient honest and always willing to go an extra mile for longterm work relationship

    $52 (Avg Bid)
    $52 Snitt bud
    19 bud

    I am on a quest for an innovative and inventive mind who masters the art of graphic design, logo design, and website design. Your mission, if you choose to accept it, will be to help me in my brand-building journey. Key Responsibilities: - Crafting of an impactful, unique logo that stands out - Graphic designing that's aimed at engaging a specific demographic - Web design that truly shines my brand's unique personality The ultimate goal of this project is branding. Ideal Skills and Experience: - Proven experience in graphic, logo and website design - Ability to understand target audiences and translate insights into designs - Experience in creating designs for specific demographics - Strong branding understanding. I expect from you to provide a structured timeline of the pro...

    $65 (Avg Bid)
    $65 Snitt bud
    51 bud

    I am currently seeking an experienced landscaper who specializes in riverfront areas. I need assistance with various aspects of landscaping, including: -Erosion Control: This is a fundamental concern, as soil erosion is posing a threat to river banks. I require an expert who can successfully mitigate these effects. -Shoreline Stabilization: Given the location of the property, addressing the risk of floods is crucial. The ideal landscaper for this project will have a thorough understanding of flood risk management and shoreline stabilization techniques with riparian buffer development and aquatic fringe vegetation. -Planting and Vegetation Management: I want to improve the aesthetics and the biodiversity of riverfront space. A specialist skilled in native plant selection and mainten...

    $10491 (Avg Bid)
    $10491 Snitt bud
    2 bud

    I'm in need of a certified cybersecurity professional who will focus primarily on network security. Your tasks will encompass: ...primarily on network security. Your tasks will encompass: - Continuous oversight and management to guarantee network security. - Timely identification and mitigation of potential threats. - Comprehensive and consistent reporting with proactive suggestions on improvements and updates. The ideal candidate should possess a profound understanding of network security principles and exhibit excellent threat detection and management skills. Previous experience with cybersecurity is crucial, and any relevant certifications are highly appreciated. Reliability, attention to detail, and strong analytical capabilities are indispensable to efficiently perform o...

    $310 (Avg Bid)
    $310 Snitt bud
    9 bud
    Trophy icon Startup Logo Design Avsluttet left

    I need a professional logo designer who can encapsulate the essence of my cybersecurity startup, Vigile. The ideal candidate will be a designer who can evoke feelings of trust and professionalism in a visual form. Vigile, is an AI-Powered Cyber Threat intelligence platform. The logo should communicate to our audience that we are trustworthy and professionally competent. I prefer name based logo.

    $20 (Avg Bid)
    Garantert
    $20
    356 bidrag

    I am looking for a skilled freelancer to develop an AI-based interface for cyber threat intelligence. The primary goal of this interface is to detect, analyze, and prevent cyber threats, providing users with access to all data such as malware hashes, threat actors, data breaches etc Requirements and Features: - The interface should provide access to intelligence information and act as an open source intelligence (OSINT) tool. - It should have the capability to handle both all kinds of intelligence - The freelancer should have expertise in artificial intelligence and cybersecurity to ensure the development of an effective and efficient interface. If you have any specific suggestions or requirements regarding the AI-based interface, please let me know. I am open to suggestio...

    $1913 (Avg Bid)
    Taushetspliktsavtale
    $1913 Snitt bud
    32 bud

    ...firefighter in action during a building fire. The primary focus will be on the aspect of fire extinguishing, demonstrating the valor and expertise required within this role. Key Features: - Emphasis on the firefighter using a fire hose, exemplifying the courage and skill of tackling a blazing building fire. - The illustrations to vividly render the intensity of the situation and the immediate threat of the fire. - Graphics should ideally impart a sense of urgency but also the professional precision involved in handling such incidents. Skills and Experience: - Graphic artists with experience in action-oriented illustrations. - Familiarity with firefighting techniques and equipment, particularly fire hoses. - Ability to create drama and tension visually while maintaining realism....

    $1090 (Avg Bid)
    $1090 Snitt bud
    32 bud

    I'm in need of an expert Linux server admin to assist with my project. I'm uncertain if there have been unauthorized access or security breaches, which is why I need someone to closely inspect and remove possible...which is why I need someone to closely inspect and remove possible threats. you will access my pc by anydisck and use my machine to access the shh server Key tasks will include: - Detection and removal of potential hacker presence - Server security hardening to protect against future breaches You should be experienced with: - Linux server setup and configuration - Advanced server security and threat removal - Implementation of regular backup solutions If you possess these skills and are ready to help troubleshoot, detect, and protect my server. I would lo...

    $32 (Avg Bid)
    $32 Snitt bud
    15 bud

    Create an excel sheet where I can score my columns based on categories and sub-categories. There are Two major groups. Likelihood & Impact. The end goal is to get a final Likelihood and Impact score for a bunch of risks. the max allowed score is 9 for both these groups. ...Encryption Type b. Compliance with Encryption Standards c. Encryption Key Management and Controls 5. Configuration Complexity and Commonality of Misconfiguration Occurrence a. Complexity of Service Settings b. Common Configuration Errors c. Configuration Default Settings 6. Alignment with Pre-Exploitation Phases of MITRE ATT&CK and Cloud Threat Attribution a. Initial Access and Execution Risks b. Privilege Escalation and Defense Evasion c. Threat Actor Profiles and Attack Vector Analysis Tota...

    $30 (Avg Bid)
    $30 Snitt bud
    8 bud

    ...currently in Excel format, contains relevant data on threat, vulnerabilities, existing controls, likelihood, and impact. In this project, you would be responsible for: - Cleaning the dataset to ensure accuracy and relevance - Normalizing the data for consistent, efficient analysis - Employing machine learning techniques to train on cleaned and normalized data - The input should be the Threat, Vulnerability, Existing control and the Model should predict the liklihood and Impact Ideal skills and experience for this project would involve: - Extensive experience with machine learning algorithms and processes - Strong attention to detail for effective data cleaning - Proficiency in handling Excel formatted datasets - Familiarity with threat and vulnerabil...

    $489 (Avg Bid)
    $489 Snitt bud
    11 bud

    Vennligst Registrer deg eller Logg inn for å se detaljer.

    Forseglet Taushetspliktsavtale
    Landing Page Writing Avsluttet left

    ...conditions with the least stress possible. Our Water Damage Restoration Process We are an IICRC Certified Firm so every employee within our company is trained by the highest accredited water damage training board in North America. Our water damage restoration team follows a proven process to mitigate and reverse the effects of the water damage while eliminating secondary damage and the potential threat of mold. We will: Identify the source and insure it has been stopped. Assess the extent of the damage and begin the documentation process. Extract all of the water using both suction and compression techniques. Remove damaged building materials, contents and furniture. Begin the structural drying process with fans and dehumidifiers. Apply antimicrobials depending on level and r...

    $71 (Avg Bid)
    $71 Snitt bud
    48 bud

    I require the assistance of an AI expert with proven experience in developing advanced STRIDE threat models. The main features that need to be included are: - Threat detection - Threat analysis - Threat mitigation - The ability to read and understand complex data flow diagrams - Ability to output an advanced threat model These skills are paramount for project success. The individual will need to possess an expert-level understanding of STRIDE threat models, with a strong portfolio of past work to showcase their proficiency. Additionally, the final output of the model should be delivered in a detailed report format that effectively communicates the threats and potential mitigations. Your expertise in this field will be greatly relied upon to en...

    $18 / hr (Avg Bid)
    $18 / hr Snitt bud
    12 bud

    ...this section into clear subcategories for clarity and ease of navigation. Cybersecurity • Bootcamps and Training Programs: • Consulting Services: Describe how we can assist government entities in strengthening their cybersecurity posture, including risk assessment, strategy development, and implementation support. • Incident Response and Threat Intelligence: Outline our capabilities in responding to cybersecurity incidents and providing ongoing threat intelligence and monitoring. Artificial Intelligence • Educational Programs: Similar to cybersecurity, detail our AI bootcamps, including any focus areas (e.g., machine learning, natural language processing) and certifications learners can earn. • AI Solution Development: Describe how we can ...

    $25 (Avg Bid)
    $25
    13 bidrag

    I am dealing with an issue where my Wordpress website has been hacked. It seems to be linked with the appearance of a malicious plugin on my site. I have isolated the plugin and partially decoded it. Fully decoding this plugin to discover what is does and eliminate the threat is the primary goal of this project. The ideal candidate will: - Have extensive experience dealing with Wordpress and a solid understanding of its plugin system. - Proven expertise in website security, specifically in tackling and resolving hacking issues. - Possess the ability to quickly uncover and understand malicious code in plugins. - Be able to work promptly, as it is urgent to resolve these issues and restore the website performance. Please ensure to include your experience dealing with website hackin...

    $42 (Avg Bid)
    $42 Snitt bud
    20 bud

    Topp threat artikler