Security Engineering Jobs

35 were found based on your criteria {{|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Expert ($$$) - Est. Time: Less than 1 week, Less than 10 hrs/week - Posted
I am looking for a security architect who could help us with security advice on an Internet of Things solution we are building for a customer of us. Customer sells machines worldwide and would like to connect machines to read data and to update the machines remotely. The machines are in ownership of companies (end-user), and customer wants to update these complex machines remotely. But machines are not connected to "safe" internet connections. Machines are updates by following process. End-user downloads software on PC or Mobile (semi-automatically), and software is then distributed to machine by bluetooth or wire. We are looking for a trusted solution to make sure the package sent to the PC/Mobile and to the machine is the authentic package and no hacker is influencing the process. So we need a security design to prove package authenticy on untrusted networks. If you have experience in this field, please contact me.
Skills: Security Engineering Internet Security Network Security
Hourly - Entry Level ($) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
We required to implement: Snort BroIDS Suricata This use cases: Protecting a web from attacks Protecting a browser from being exploited Protecting a user to detect traffic coming from his computer/server detected as backdoor Any ideas to help us? Welcome!
Skills: Security Engineering Certified Information Systems Security Professional (CISSP) Cloud Security Framework Information Security
Hourly - Entry Level ($) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
We want to take TOR browser Firefox and create a new version with new features we want to add to this portable artifact: Being Portable . To use HAproxy or Foxyproxy to being able to route http to TOR, I2P, Freenet, Zeronet and other hidden services. To have installed some security functions like addons. To have capability to being update without breaking itself. To be customized for portability and antivirus 2 Versions of the portable framework a) Windows xp,7,10 portability is required. b) Linux Ubuntu Debian portability is required. We wont built a browser from scratch we use existing one firefox The target is to build a portable framework in a usb stick that can run in linux and Windows that have the capability to runs under authenticated corporate proxy via some automated adjustments by initial GUI wizards.The browswer can use i2p,freenet and tor natively and those engines need to take the proxy settings from the initial wizard The browsers knows how to route every different dartknet with tolos like foxyproxy Additional project targets: The browser need to be deactivated hsts Need to retrieve a CA from another machine via ssh and install it automatically from the GUI in the initial wizard. The browser need to have a small wizard initially The browsers: Linux and windows need to be embed in a usbstick encrypted with an existing encryption framework we could use that also need to be portable Is the dev of a privacy tool and is a long time project, and we can use a lot of pre existing project to continue dev them or use them as basement of ideas. We don't dev things from scratch we don't have time. We will use and adjust existing code
Skills: Security Engineering Browserify C++ haproxy
Hourly - Expert ($$$) - Est. Time: 3 to 6 months, 10-30 hrs/week - Posted
Hi I need a trainer and experienced professional to train my admins about hacking , secure applications etc also this might lead to vulnerability test We use backtrack5, Katana, kali linux also if you have any new tools you can advise We looks for deep things, not an xss, sql injections etc so expert required [ black or white hat or gray hat doesnt matter ] thanks
Skills: Security Engineering Certified Information Systems Security Professional (CISSP) Growth Hacking
Fixed-Price - Entry Level ($) - Est. Budget: $10 - Posted
Hello, my computer is attached by that virus and i have removed it by kaspersky. But some data have been encrypted to zepto file. I have attached one sample 2 files, one is zepto and one is excel. So, i need a tool, guide to encrypt file zepto to excel. my budget is too low, so, i only need help with some free tool. the files is too big, cant attach, so, if someone want to try, ping me and i will send. thanks, Seok Jan Min
Skills: Security Engineering
Fixed-Price - Intermediate ($$) - Est. Budget: $1,000 - Posted
One of our project require help from the network security area, especially from someone who have worked in the real-life scenarios and have extensively used OpenVas,MetaExploit and other relevant technologies around it e.g. nmap,wireshark,tcp/ip. You are the professional : - Help us to prepare a sample network setup in Cloud/Lan/AWS to explore the power,and few standard experiment around OpenVas/MetaExploit. - Help us to understand the real items of the generated report, configurations and others routine items while working around it - Ever used the above technologies ( not limited to) to test real networks for penetration,vulnerability, exploitations,network security,scanners - Can give some guidance to standard professional engineer about the use of these tools (OpenVas and Metasploit) e.g. daily/quarterly routine work around this area - Provide some core -principles to keep in mind while using or applying these tools/technologies in a network. - Provide or Help in writing some related documentation e.g. design,network reports etc - Help to understand the differences in different technologies, concepts if required. - Experience in resolving security issues
Skills: Security Engineering Network Security Penetration Testing Security Analysis
Fixed-Price - Intermediate ($$) - Est. Budget: $330 - Posted
Hello ,, I looking for a professional security specialized in decryption process to find the private key of this encryption , and finally write his code & creating a tool for decryption these files I will provide you with 1- The encrypted file & Its Original file 2- The code virus file (Public Key ) . Note : This fixed price is just a start .If you could prove your skills to fix that we can make another good deal for you and me . Thanks
Skills: Security Engineering Certified Information Systems Security Professional (CISSP) Information Security Internet Security
Fixed-Price - Intermediate ($$) - Est. Budget: $100 - Posted
We are an information security company looking for a strong technical writer to join our team. The work will be writing technical blog posts on a number of security topics including, but not limited to: - Security best practices - Cloud security - Understanding digital risk (what is it, how to defend against it?) - Security education - Biggest threats you face online - Analysis of security breaches (what happened, how could it be avoided) - PCI, SOC, Critical Security Controls - what are these things, why are they important? - Best sources to keep up with security threats - Healthcare Security - HIPAA/HITRUST/HITEC - HITRUST: the next generation of healthcare security - e-commerce Security - Cybersecurity Insurance - what is it, do you need it? - Security topics of your choosing (if relevant to what we do) Essential Skills: - Strong technical skills. Specifically looking for someone who has worked in IT Security before. - Excellent written and editing skills. You writing should be able to talk to the readers. - Self directed and able to work with little oversight. You are a curious person who has no problem doing research if you're unfamiliar with a topic. Want to write about something you think would be good for our blog--let us know and go for it! - Must be comfortable receiving feedback. Please reply with some samples of your work and your pricing (I entered an arbitrary value for this posting). All work MUST be Copyscape passed. We are looking for someone to work with long term. Also, please include the word "Banana" in your starting sentence when applying. Thanks, Eric
Skills: Security Engineering Blog Writing Information Security Internet Security
Fixed-Price - Expert ($$$) - Est. Budget: $1,000 - Posted
TAD Group has an exciting opportunity for a Cyber Security Penetration Tester to join our team. Simulating a cyber attack under controlled conditions is the best way to know how potential intruders will actually approach networks. TAD Group is a company which delivers network, application, wireless, and social engineering engagements to evaluate the cyber security level of the key systems and infrastructure of our clients. Responsibilities: • Perform formal penetration tests on web-based applications, networks and computer systems • Conduct physical security assessments of servers, systems and network devices • Design and create new penetration tools and tests • Probe for vulnerabilities in web applications, fat/thin client applications and standard applications • Pinpoint methods that cyber attackers could use to exploit weaknesses and logic flaws • Employ social engineering to uncover security holes (e.g. poor user security practices or password policies) • Incorporate business considerations (e.g. loss of earnings due to downtime, cost of engagement, etc.) into cyber security strategies • Research, document and discuss cyber security findings with management and IT teams • Review and define requirements for cyber security solutions • Work on improvements for cyber security services, including the continuous enhancement of existing methodology material and supporting assets • Provide feedback and verification as an organization fixes security issues Requirements: • Bachelor’s degree in Computer Science, Information Systems, Engineering, Telecommunications, or similar field required. • At least 1 year of cyber security-related experience with practice in penetration testing and vulnerability assessments. • Windows, UNIX and Linux operating systems • Experience with penetration testing of popular Content Management Systems (Wordpress, Joomla, etc.) • C, C++, C#, Java, PHP • Network servers and networking tools (e.g. Nessus, nmap, Burp, etc.) • Computer hardware and software systems • Web-based applications • Cyber security tools and products (Fortify, AppScan, etc.) • Vulnerability analysis and reverse engineering • Metasploit framework • Cryptography principles • Strong reporting and written documentation experience We offer: • A competitive remuneration package • A new team working in a visionary company with big potential • Flexible working hours (we focus on results) • Training and certification We would love to hear about your skills and your experience, as well as any questions you might have. We are willing to pay monthly salary and accommodation in Bulgaria while in test period and after permanent contract. The salaries start from $1000 upwards + accommodation + free meals. Only short-listed candidates will be contacted. All applications will be treated in strictest confidentiality.
Skills: Security Engineering Internet Security Network Security Security Analysis