Security Engineer Jobs

12 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Intermediate ($$) - Est. Time: Less than 1 month, 10-30 hrs/week - Posted
Looking for an experienced video analytics developer to assist in developing video analytics for that will identify person(s) wearing specific make, model, and coloring of high visibility traffic vests used when working on or around railroad lines and bridges. The analytics will need to identify these individuals wearing this specific vest style and prevent the motion detection analytics and other used analytics from initiating an alarm on the system when a person wearing this vest stands, loiters, or passes line barriers at or near the static, ptz, and/or thermal imaging cameras. This is one analytic that will be needed for this project. Depending upon the capabilities of the developer hired, there may be additional work on this project in other areas of video analytics.
Skills: Security Engineering Analytics Artificial Intelligence Machine learning
Fixed-Price - Expert ($$$) - Est. Budget: $500 - Posted
Hi I'm looking of a clear crisp, to the point and practical articles on Ethical Hacking related subjects covering following: (1) Reconnaissance (2) Sniffing Traffic (3) Exploitation (4) Enumerations (5) Metasploit (6) Trojan Attacks (7) TCP/IP Hijacking (8) Email Hijacking (9) Hacking Password ( Dictionary Attacks, Brute Force Attack, Rainbow Table, Phishing Attack, Counter Measures ) (10) Wireless Hacking ( Wireless Network Basics, Wireless Sniffing, Wired Equivalence Privacy, Wi-Fi Protected Access, Denial of Service Attacks, Counter Measures) All the concepts needs to be explained with example w.r.t. to a machine running Linux operating system.
Skills: Security Engineering Certified Information Systems Security Professional (CISSP) Information Security Internet Security
Fixed-Price - Expert ($$$) - Est. Budget: $200 - Posted
Hello, i need you to check fully my PHP website, and Database. I want that the website dont have any trouble with securtiy. You should check if evrything is fine programmed, and if it is safe. Also you should check if the encryption is maked good.
Skills: Security Engineering Security Analysis
Fixed-Price - Expert ($$$) - Est. Budget: $600 - Posted
Hi I'm looking of a clear crisp, to the point and practical guide for Mobile Security Tutorial covering following chapters: Chapter 1 : Introduction To Mobile Security Chapter 2 : Mobile Platform Attack Vectors (a) What’s An Attack Vector? (b) Consequences of Attack Vectors ? (c) Anatomy of a Mobile Attack (d) How a Hacker can Profit from Mobile when Successfully Compromised (e) Vulnerable Areas in Mobile Business Environment (f) OWASP Mobile Top 10 Risks Chapter 3: App Stores And Security Issues (a) Common Security Issues Facing App Store (b) App Sandboxing Issues Chapter 4 : Introduction To Mobile Spam (a) SMS Phishing Attack (SMiShing) (Targeted Attack Scan) (b) Why SMS Phishing is Effective? (c) SMS Phishing Attack Examples (d) Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections (e) Prevention And Solutions Chapter 5(i) : Introduction To Android OS (a) Android OS Architecture (b) Android Device Administration API (c) Android Vulnerabilities (ii) Android Rooting (a) Android Rooting Tools (b) Rooting Android Phones using SuperOneClick Rooting (c) Android Phones Using Superboot (d) The Importance of Rooting Android Devices (iii) Android Trojan (a) ZitMo (ZeuS-in-the-Mobile) (b) FakeToken and TRAMP.A (c) Fakedefender and Obad (d) FakeInst and OpFake (e) AndroRAT and Dendroid Chapter 6 : Securing Android Devices (i) Google Apps Device Policy (ii) Remote Wipe Service: Remote Wipe Chapter 7 : Android Security Tools (a) DroidSheep Guard (b) TrustGo Mobile Security and Sophos Mobile Security (c) 360 security, AVL, and Avira Antivirus Security (d) Android Vulnerability Scanner: X- (e) Android Device Tracking Tools Chapter 8 : Introduction To iOS ( Apple iOS ) (i) Jailbreaking iOS (a)Types of Jailbreaking (b)Jailbreaking Techniques (c)App Platform for Jailbroaken Devices: Cydia (d)Jailbreaking Tool: Pangu (e)Untethered Jailbreaking of iOS 7.1.1/7.1.2 Using Pangu for Mac (ii)Jailbreaking Tools (a) Redsn0w and Absinthe (b) evasi0n7 and GeekSn0w (c) Sn0wbreeze and PwnageTool (d) LimeRa1n and Blackra1n Chapter 9 : Guidelines for Securing iOS Devices iOS Device Tracking Tools Chapter 10 : Introduction To Windows OS (i) Windows Phone 8 Architecture (ii) Secure Boot Process (iii) Guidelines for Securing Windows OS Devices (iv) Windows OS Device Tracking Tool: FollowMee GPS Tracker Chapter 11 : Introduction To Blackberry Operating System (i) BlackBerry Enterprise Solution Architecture ( a) Blackberry Attack Vectors (i) Malicious Code Signing (ii) JAD File Exploits and Memory/ Processes Manipulations (iii) Short Message Service (SMS) Exploits (iv) Email Exploits (v) PIM Data Attacks and TCP/IP Connections Vulnerabilities Chapter 12 : Guidelines for Securing BlackBerry Devices (a) BlackBerry Device Tracking Tools: MobileTracker and Position Logic Blackberry Tracker (b) Mobile Spyware: mSpy and StealthGenie (c) Mobile Spyware Chapter 13 : Mobile Device Management (MDM) MDM Solution: MaaS360 Mobile Device Management (MDM) MDM Solutions (a) Bring Your Own Device (BYOD) (i) BYOD Risks (ii) BYOD Policy Implementation (iii) BYOD Security Guidelines for Administrator (iv) BYOD Security Guidelines for Employee Chapter 14 : Mobile Security Guidelines and Tools (a) General Guidelines for Mobile Platform Security (b) Mobile Device Security Guidelines for Administrator (c) SMS Phishing Countermeasures (d) Mobile Protection Tool (i) BullGuard Mobile Security (ii) Lookout (iii) WISeID (iv) zIPS (e) Mobile Anti-Spyware Chapter 15 : (i) Mobile Pen Testing (a) Android Phone Pen Testing (b) iPhone Pen Testing (c) Windows Phone Pen Testing (d) BlackBerry Pen Testing (ii) Mobile Pen Testing Toolkit (a) zANTI (b) dSploit (c) Hackode (The Hacker's Toolbox) Glossary : Mobile Security Terminology
Skills: Security Engineering Certified Information Systems Security Professional (CISSP) Internet Security Mobile Programming
Fixed-Price - Expert ($$$) - Est. Budget: $200 - Posted
I need a Java developer with extensive security knowledge to build a secure authentication mechanism using Java to use with my website. Right now I'm using a simple service that returns a session identifier appended to the url, but this can easily be faked if I copy/paste this url into another device, system accepts authentication. I switched to a cookie-based solution but again.. it's not secure. So, please only bid if you really know about the subject. Please describe a short and clear technical solution proposal to solve this. Will hire the best and SECURE proposal.
Skills: Security Engineering Java