Security Engineer Jobs

29 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Expert ($$$) - Est. Time: More than 6 months, 30+ hrs/week - Posted
We are looking for a Reverse Engineer (Software Developer) for one of our customers in Brussels, Belgium. A job position is available to join the penetration testing team which offers an independent evaluation of the security measures in a product by attacking and reverse engineering the existing protection. The team is also responsible for organizing the cumulated knowledge about existing hacks and potential vulnerabilities in specific targets. Finally, auxiliary tools will be developed as part of the execution and automation of the attack vectors. In general, the following activities are expected to be executed by the new team member: - Hands on security testing/reverse engineering (a.k.a. penetration testing) - Development of helper security verification tools - Documentation of knowledge and findings in the form of guidelines, checklists and examples to be used by development teams Job requirements: - Experience with reverse engineering tools and techniques: - Debuggers, decompilers, disassemblers, deobfuscators - Static and dynamic binary analysis, binary injection - Packet sniffers - Excellent analytical skills - Good C/assembly development skills - Experience with both Linux and Windows OS - Good writing skills - Fluent English Start: a.s.a.p. Duration: parttime / fulltime, 12 months with an option to extend Location: Brussels, Belgium
Skills: Security Engineering Assembly Language C Penetration Testing
Hourly - Expert ($$$) - Est. Time: Less than 1 month, Less than 10 hrs/week - Posted
We are looking for a qualified expert in the digital signature space who can help guide our company's finishing touches on our own web-based digital signature application. Qualified applicants MUST know American contract law as it relates to digital signatures and MUST have experience guiding esignature companies or developing them. Please tell me what are the main components of a valid digital signature, and your experience implementing or overseeing these. Qualified applicants will be followed up and receive additional requirements.
Skills: Security Engineering Adobe PDF PHP
Fixed-Price - Expert ($$$) - Est. Budget: $400 - Posted
Hi I'm looking of a clear crisp, to the point and practical guide for Malware Removal Tutorial covering following chapters. You can suggest an addition and subtraction in the TOC before we proceed to write this tutorial Malware Overview How Malware works? Types of Malware's Viruses, Spyware & Malware Malware detection techniques Preparation for Removal Malware Removal Process Malware Protection Managing Malware Risks Walware Removal Tools Root-Kit McAfee Stinger HijackThis Malwarebytes Anti-Malware BitDefender Internet Security Panda Free Antivirus Spybot Search & Destroy Ad-Aware Free Antivirus+ AVG Antivirus 2015 SUPERAntiSpyware Microsoft Security Essentials.
Skills: Security Engineering Antispam and Antivirus Certified Information Systems Security Professional (CISSP) Information Security
Hourly - Entry Level ($) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
We want to take seamonkey or Firefox and create a new version of the TOR browser The new features we want to add to this portable artifact software are: Being Portable To use HAproxy or Foxyproxy to being able to go TOR,I2P,, Freenet,Zeronet and other hidden services. To have installed some security functions like addons. To have capability to being update without breaking itself. To be customized for portability and antivirus 2 Versions of the portable framework a) Windows xp,7,10 portability is required. b) Linux Ubuntu debian portability is required.
Skills: Security Engineering Browserify C++ haproxy
Fixed-Price - Expert ($$$) - Est. Budget: $200 - Posted
We need a security expert with very strong security skills within banking and finance. This is a job to respond to a security review on future secuirty initiatives. There will be a report to read and about 12 questions each with varying degrees of complexity. This is also about 2 factor authentication and payments security authentication for each recommendation which you make after reading the review your response must be in the following format respond to the question stated;  indicate the specific point to which a comment relates;  contain a clear rationale;  provide evidence to support the views expressed/ rationale proposed; and  describe any alternative regulatory choices we should consider. This work for the right person can be done in a day or so. depending on your skills and knowledge
Skills: Security Engineering Certified Information Systems Security Professional (CISSP) Information Security Internet Security
Fixed-Price - Expert ($$$) - Est. Budget: $500 - Posted
I have lost the bitlocker password for a USB driver which has important information i would like to retrieve. i know it is virtually impossible to break the bitlocker encryption, however, i do remember the password structure. It is something around: P@ssw0rd!1 P@ssW0rd!1 p@ssW0rd!1 p@ssword!1 And so on and so forth. Maybe 1/2/3/4 extra characters in the end, but not more than that. I am not sure which letters are uppercase or lowercase, or whether it's using @/a/A, or o/O/0. But i'm 100% positive the word is "Password" spelled in some way and there might be up to 4 characters extra after the "Password". I know for a fact that it makes the decryption a lot easier by some type of brute-force, probably using a script to generate all the possible combinations for "Password + 4 characters" and running them against the bitlocker encryption. Are you up to this challenge? ;)
Skills: Security Engineering Bash shell scripting Unix