Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Fra 96,308 tilbakemeldinger, klienter rangerer våre Computer Security Consultants 4.9 av 5 stjerner.
Ansett Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

Fra 96,308 tilbakemeldinger, klienter rangerer våre Computer Security Consultants 4.9 av 5 stjerner.
Ansett Computer Security Consultants

Filter

Mine tidligere søk
Filtrer etter:
Budsjett
til
til
til
Skriv
Ferdigheter
Språk
    Jobbstatus
    22 jobber funnet

    I need an experienced systems professional who can take ownership of my production servers from the ground up. The job starts with a full audit of the existing Linux stack (Ubuntu 22.04 on AWS EC2), then moves into tightening every layer—optimising configuration, hardening services, and putting robust security controls in place. What matters most to me is confidence that the machines are patched, performance-tuned, and continuously protected. After the initial hardening you will set up real-time monitoring and alerting (Prometheus + Grafana is currently installed but not fully wired), document a clear maintenance schedule, and remain on hand for rapid incident response. Deliverables • Comprehensive audit report with recommended fixes • Implementation of agreed configu...

    $147 Average bid
    $147 Snitt bud
    32 bud

    I’m ready to build a fresh network in Cisco Packet Tracer and need an expert hand to get the topology right. The job centres on designing the entire layout from scratch; routers and switches will form the backbone—no wireless gear this round. I haven’t locked down whether the final architecture should remain a simple LAN, scale into a WAN, or blend the two, so I’m counting on your insight to recommend the cleanest, most scalable approach once you review my requirements. Here’s what I’ll look for: • A working .pkt file with every device clearly labelled, configured, and cabled • Routing (static or dynamic), VLANs, basic security, and end-to-end connectivity demonstrated in the simulation • A concise document or set of notes that explai...

    $316 Average bid
    $316 Snitt bud
    21 bud

    Title: Cybersecurity Specialist Needed to Identify and Eliminate Ongoing Device & Account Breach Description: I am looking for an experienced cybersecurity professional to help investigate and resolve a serious security issue. Last month, multiple personal accounts (including WhatsApp and other social platforms) and devices were compromised. Since then, I have: Switched to new devices Reset passwords and secured accounts Enabled basic security measures However, I still suspect unauthorized access or persistent compromise. There are concerns that my data may have been exposed or that a hidden vulnerability (malware, spyware, remote access, or account takeover method) still exists. Scope of Work: Perform a full security audit of devices and accounts Identify how the breach occurred...

    $37 / hr Average bid
    $37 / hr Snitt bud
    8 bud
    Hourly IT Security Support
    5 dager left
    Verifisert

    I run a small construction company and want to build a long-term relationship with an external IT team that bills by the hour. My most pressing need is tightening our email defences, but you will also step in whenever we face issues with phone or computer security, malware, or any attempt at hacking. For email specifically, make sure your proposal shows how you will: • stop spam and phishing before it reaches our staff, • enable encrypted communications that are simple for non-technical users, • set up access controls and ongoing monitoring so we always know who touched what and when. Beyond email, outline the tools and processes you use to harden endpoints, secure mobile devices, and perform rapid incident response. A detailed project proposal explaining your approach, ti...

    $22 / hr Average bid
    $22 / hr Snitt bud
    42 bud

    I’m expanding a full-stack cybersecurity practice and want a driven freelance closer who can own every step of the sales cycle, anywhere in the world. Your mission is simple: bring in new business for our penetration testing, security auditing, cloud security, infrastructure security, and API security services—and get paid on pure commission for every dollar you help us earn. What you’ll actually do • Identify and prospect ideal clients across any region that makes sense—North America, Europe, Asia, or elsewhere. • Run discovery calls, scope technical requirements with my engineering team, prepare proposals, and negotiate contracts until they’re signed. • Maintain your pipeline inside our CRM and deliver a concise report each week. How y...

    $228 Average bid
    $228 Snitt bud
    4 bud

    I need an experienced security expert to evaluate the network layer of our multiplayer game infrastructure. This evaluation is limited to penetration testing and does not include reverse engineering or anti-cheat development. The evaluation must cover three core activities: port scanning (mapping all exposed services), vulnerability scanning (identifying exploitable weaknesses), and intrusion detection testing (evaluating the responsiveness of our current monitoring systems to actual attack patterns). Vulnerability reproduction needs to be written into a simple user interface script. You will be using a test copy of the production environment for the evaluation, which includes the login server, matchmaking server, and in-game transaction server. Upon completion of the testing, I expect to...

    $164 Average bid
    $164 Snitt bud
    21 bud

    I run several Windows 11 PCs that should be able to see one another on the local network, yet every time I try to connect I’m prompted for a username and password that the system then refuses. File-sharing, printer access and even simple ping tests fail at the credential stage, so I’m clearly missing something in the authentication chain. I’ve already cycled through the usual fixes: reset all network settings, recreated and changed user credentials, restarted every device on the switch and even tweaked a few Group Policy and security settings. None of it has stuck. Because I’ve done a fair bit of leg-work, I’m after someone who can go deeper—spot a mis-set SMB policy, a credentials manager glitch, a firewall rule, or whatever else is blocking the handsh...

    $21 Average bid
    $21 Snitt bud
    12 bud

    I’m enrolled in an online security course and the Capture-the-Flag component is very challenging. Your role is to coach me through these CTF tasks, sharpening technique rather than simply handing over flags. During live screen-share sessions, I want you to help me: - navigate through multiple machines and OS (Windows and Linux) - navigate various exploits (metasploit, kali) basd on the unique machine environment - navigate different clues and dead ends We can schedule focused virtual meetings around specific machines and exploits and walk through challenges. If this sounds like your kind of deep dive, let’s connect and plan the first walkthrough.

    $20 / hr Average bid
    $20 / hr Snitt bud
    13 bud

    Join our mission to make the digital world safer! As a Bug Bounty–Focused Security Analyst, you’ll work closely with our global community of ethical hackers, helping identify, validate, and escalate real-world vulnerabilities — ensuring organizations stay ahead of evolving cyber threats. Your Role Review, validate, and triage vulnerability reports submitted by bug bounty hunters. Assess the impact and severity of findings, including CVSS scoring. Collaborate directly with ethical hackers to reproduce and understand vulnerabilities. Provide clear, actionable remediation guidance to clients. Perform targeted penetration testing to support and verify bug bounty findings. Identify duplicate, false positive, and low-quality submissions efficiently. Contribute to improving b...

    $565 Average bid
    $565 Snitt bud
    11 bud

    I'm seeking an experienced network specialist to design a robust home network. The primary use will be for working from home, and it needs to support more than 10 devices. Key Requirements: - High-speed and reliable connectivity - Create a supply list - Ability to handle multiple devices without lag Ideal Skills: - Proven experience in designing home networks - Strong knowledge of security protocols - Ability to create a scalable network solution Please include your past work and relevant experience in your application.

    $377 Average bid
    $377 Snitt bud
    28 bud

    More details: Which specific areas do you need mentorship in? Configuration issues, Security policies, Traffic management What kind of configuration issues are you facing? This question was skipped by the user Which specific security policies do you need help with? This question was skipped by the user

    $85 Average bid
    $85 Snitt bud
    6 bud

    We are a startup working on a highly confidential and private internal project. Due to the sensitive nature of this initiative, we require a highly experienced Cybersecurity Specialist with strong expertise in advanced security testing and simulation techniques. This is not a basic vulnerability scanning or standard assessment role. We need an expert capable of performing comprehensive, advanced-level security testing against robust environments while maintaining complete confidentiality. Project Duration: 2 to 3 months (possible extension based on project needs) Compensation: ₹3,00,000 per month (premium budget for the right expert with proven advanced skills) Key Requirements: 5+ years of hands-on experience in advanced cybersecurity testing and security operations Must hold advance...

    $1943 Average bid
    $1943 Snitt bud
    5 bud

    We are looking for a highly experienced Kubernetes/Linux engineer to test a confidential technical environment involving Kubernetes ingress and production-style troubleshooting. You must be very comfortable with Linux, Kubernetes, kubectl, and understand what realistic command outputs, remediation paths, and incident workflows should look like inside a large engineering organisation. We are specifically looking for someone who has worked in real production environments and has previous on-call or incident-response experience. This is not an implementation or support role. Your job will be to act as an experienced engineer, work through a technical setup, and give direct feedback on and whether the workflow reflects how things are actually handled. We especially want someone confident eno...

    $9 / hr Average bid
    $9 / hr Snitt bud
    21 bud

    أبحث عن مهندس أمن شبكات محترف (Senior) لديه خبرة عملية قوية، ليقدم تدريب فردي (1-on-1) عن بُعد عبر Zoom، بحيث يرافقني خطوة بخطوة في سيناريوهات واقعية على مستوى Enterprise، حتى أصل إلى مستوى احترافي في Palo Alto (مستوى PCNSE)، مع بناء أساس قوي في Routing بمستوى CCNP. مستواي الحالي CCNA مع خبرة عملية في الـ Firewall، لذلك لن نركز على الأساسيات النظرية، بل سنبدأ مباشرة بالتطبيق العملي. سيتم تنفيذ جميع الأعمال داخل بيئة EVE-NG، حيث نقوم ببناء Lab متكامل وتطويره تدريجيًا، بدءًا من تصميم بسيط (HQ / Branch / ISP)، وصولاً إلى بيئة Production كاملة تشمل Firewalls، Routing باستخدام BGP، VPN بأنواعه (IPSec و SSL)، بالإضافة إلى سيناريوهات Prisma Access. المحاور الرئيسية: إعدادات Palo Alto المتقدمة (Policies, NAT, Threat Prevention, Log Analysis) مهارات Troubleshooting بشكل متقدم، خصوصًا تحليل Pac...

    $427 Average bid
    $427 Snitt bud
    11 bud
    SIM Procurement in Cambodia
    2 dager left
    Verifisert

    Job Title SIM Card Procurement Specialist (Cambodia – Smart Network, Security Testing) Project Overview We are looking for a reliable freelancer based in Cambodia to support us with Smart network SIM card procurement for mobile network security and antifraud testing. This is a procurement-only project with potential for future collaboration if needed. Scope of Work: Procure Smart (Cambodia) SIM cards only Ensure SIMs are: Properly registered and activated Able to receive SMS and voice Confirm that SIM cards are functioning correctly on the Smart network Share required SIM details and confirm readiness for testing Important Usage Note: The SIM cards will be used strictly for mobile network testing purposes, focused on: Security analysis Antifraud testing OTP/SMS delivery validati...

    $85 Average bid
    $85 Snitt bud
    4 bud

    I am seeking a professional US-Based consultation to evaluate and potentially challenge a significant failure in Information Security governance and Incident Response (IR) at a major R1 university. I am currently navigating a situation involving a persistent, log-evasive intrusion where the institution has leveraged the significant power asymmetry inherent in large bureaucracies to circumvent accountability. I am looking for CISO-level expertise to dismantle a "no record found" defense that was manufactured through intentional administrative delay. **The core pillars of this case include:** * **Failure of Notice:** The institution was provided with explicit, immediate notice of a breach and data loss on 11/27. Despite this "on-notice" status, they remained unresponsive ...

    $40 / hr Average bid
    $40 / hr Snitt bud
    10 bud
    Recover Hacked Facebook Account
    1 dag left
    Verifisert

    My personal profile was taken over: I can no longer log in, profile details were altered, the interface language switched, and friends have seen suspicious activity coming from the account. I exhausted Facebook’s self-service recovery steps and still have not reached a human at Meta, so this is my last resort. I need someone who truly understands Facebook’s security workflows, identity-verification channels, and escalation paths. Your mission is to pursue every legitimate option to restore my access. If that proves impossible, I expect a clear explanation of why, backed by evidence of each avenue you tried. Deliverables • Full restoration of the account, or • A concise report detailing all steps taken, Meta responses, and the definitive reason recovery fai...

    $147 Average bid
    $147 Snitt bud
    8 bud

    Saya mencari seorang profesional pemasaran digital berpengalaman untuk meningkatkan keterlibatan akun Twitter brand kami. Target utamanya adalah menghidupkan percakapan, memperluas jangkauan organik, dan membuat audiens rutin berinteraksi melalui konten teks dan thread yang relevan serta memikat. Lingkup kerja: • Audit cepat atas performa Twitter saat ini, termasuk tone of voice dan postingan paling efektif. • Perancangan kalender konten satu bulan penuh berisi thread, polling, dan cuitan singkat pendukung. • Penulisan dan optimasi ±10–15 thread bermutu tinggi setiap bulan, lengkap dengan hook, CTA, dan penggunaan hashtag strategis. • Monitoring metrik keterlibatan harian, analisis mingguan di Google Analytics & Twitter Analytics, lalu laporan ri...

    $17 / hr Average bid
    $17 / hr Snitt bud
    7 bud

    I need an experienced security specialist to bring my Microsoft 365 Business Premium environment (fewer than ten users) into full alignment with ISO 27001. The key areas I'm looking to cover are: 1 Clear Desk & Clear Screen Policy 2 Acceptable Use Of IT Assest Policy 3 Procedure Of User Access Management 4 Procudure Of Third Party Security 5 Vulnerability Management Process 6 Password Policy 7 Management Review Process 8 Mobile Usage & Electronic Media Policy 9 Teleworking Policy 10 Archival, Retention and Disposal Policy 11 Data Protection Policy 12 Information Continuity and Application Security Measure 13 System Configuration Standard IT Procudure Documents 1 Approved Software List 2 Asset Inventory 3 Deploying Anti Virus for Desktop 4 Workstation End ...

    $206 Average bid
    $206 Snitt bud
    26 bud

    We are looking for a highly experienced Kubernetes/Linux engineer to test a confidential technical environment involving Kubernetes ingress and production-style troubleshooting. You must be very comfortable with Linux, Kubernetes, kubectl, and understand what realistic command outputs, remediation paths, and incident workflows should look like inside a large engineering organisation. We are specifically looking for someone who has worked in real production environments and has previous on-call or incident-response experience. This is not an implementation or support role. Your job will be to act as an experienced engineer, work through a technical setup, and give direct feedback on and whether the workflow reflects how things are actually handled. We especially want someone confident eno...

    $187 Average bid
    $187 Snitt bud
    43 bud

    My Android phone may be compromised. I'm seeing strange apps or messages. Key requirements: - Identify and remove any hacks - Ensure phone security - Provide a report on findings Ideal skills and experience: - Experience with Android security - Familiarity with malware removal - Strong troubleshooting skills

    $125 Average bid
    $125 Snitt bud
    24 bud

    I need an experienced security specialist to carry out a thorough review of our bank system’s defences, with the spotlight on the core database and the overall security architecture that surrounds it. This is not a simple camera-or-alarm health check; instead, I want the underlying structure, data flows, and access logic examined for weaknesses that could compromise customer information or interrupt critical services. Scope of work • Map the current database design, supporting servers, and connected services. • Perform vulnerability assessments and penetration tests against these elements, documenting every finding with clear evidence. • Evaluate encryption, key management, privileged-user policies, and change-management procedures to be sure they align with m...

    $1045 Average bid
    $1045 Snitt bud
    12 bud

    Anbefalte artikler for deg