Security Infrastructure Jobs

32 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Expert ($$$) - Est. Time: Less than 1 week, 10-30 hrs/week - Posted
We are looking for a fast efficient plan which provides security, speed and scalability. At this time we are currently running a few separate database servers as well as web servers in an openstack cloud environment. We are trying to organize the best plan of action which provides the fastest and most secure options for running, creating and testing wordpress sites and installations. You must have many years of experience.
Skills: Security Infrastructure Cloud Security Framework Network Administration Network Security
Hourly - Entry Level ($) - Est. Time: More than 6 months, 30+ hrs/week - Posted
Penetration Tester Penetration Tester will be carrying out penetration tests on hardware, network and applications. Carrying out security designs and audits. Aim to increase the level of security for the company’s system by identifying and analyzing existing systems. Highlight security vulnerabilities and perform security certifications. Communicate effectively with all relevant teams to improve security. Share knowledge and skills with junior members of staff. Act as a company evangelist and promote products to external parties. Carry out all relevant documentation and suggest recommendations on improvements to company procedures wherever required.
Skills: Security Infrastructure Certified Information Systems Security Professional (CISSP) Network Security Penetration Testing
Fixed-Price - Expert ($$$) - Est. Budget: $600 - Posted
Hi I'm looking of a clear crisp, to the point and practical guide for Metasploit Tutorial covering following chapters: Metasploit - Home Metasploit - Introduction Metasploit - Environment Setup Metasploit - Vulnerable Target Metasploit - Discovery Scan Metasploit - Importing Data Metasploit - Vulnerability Scan Metasploit - Vulnerability Validation Metasploit - Exploitation Metasploit - Payload Metasploit - Credentials Metasploit - Bruteforce Attacks Metasploit - MetaModules Metasploit - Social Engineering Metasploit - Reports Metasploit - Task Chains Metasploit - Data Export Metasploit - Pro Console Metasploit - Framework Metasploit - REST API
Skills: Security Infrastructure Certified Information Systems Security Professional (CISSP) Information Security Network Security
Fixed-Price - Expert ($$$) - Est. Budget: $50 - Posted
Linux Server OS : Linux (primarily CentOS, and Ubuntu). Key-pair logins, SSH, PuTTY, etc., Linux/Unix Expert with partitions; Plesk Set ups; DigitalOcean Security expert Server, Application and web (ethical hacker) Have extensive experience with virtualization technologies and cloud Experience administering application servers, web servers, and databases such as Nginx, MySQL, Druid, Hadoop, Joomla and Redis Experience with testing and automated testing tools Server selection & provisioning including application software Storage management Performance tuning Backup and Recovery OS upgrades and security patching Used tools like vagrant for partitions
Skills: Security Infrastructure Cloud Security Framework Joomla! Linux System Administration
Hourly - Intermediate ($$) - Est. Time: 1 to 3 months, Less than 10 hrs/week - Posted
Greetings, I am seeking for a skilled indivdual that have extensive experience in the following field: Software Development, MYSQL, PHP and Software protection to create a protection system for our game cheat programs. Job will include having to make the following: - Lock HWID to Account upon log in and HWID check. - IP Check - If a user has logged in from a different country/state then send an alert to the administrator as the user may have sold their account which is against my Terms and Conditions. - Forum Login (Uses forum login credentials). - Cheats package show on client based on which subscription user purchased on website - PHP back panel - To HWID reset , Ban, MOTD change, cheat status ch ange, cheat info change, cheat add, cheat remove, etc.. - Onload checks (if banned, if admin, if VIP, etc..). - Auto-Updater - Allows me to update the client without everyone having to re-download it again. - Option to Disable Loader For Maintenance. Big money to be earned here but only for the right indivdiual of course. Only looking for one person for this job.
Skills: Security Infrastructure C++ MySQL Programming PHP
Fixed-Price - Expert ($$$) - Est. Budget: $49,000 - Posted
hi Marketing and Sales Candidates, We are a Cyber Security startup looking for experienced Marketing and Sales gurus to sell our 10gigE DDoS mitigation appliances. Our appliances can also be sold as software only product for Redhat, Slackware, SuSE and Debian distro. Our DDoS Mitigation appliance collects all incoming traffic to any server. After analyzing the server type, web server, mail server, etc, all incoming TCP-based DDoS attacks against the server will be tarpit'd. DDoS mitigation can be 100% automated with "iptables-gui -doadd -autoadd" running periodically from cron. We have a couple of live DDoS Mitigation demo using tarpits at Target-Practice.net/cgi-bin/IPtables-GUI.pl or DDoS-Mitigator.net/cgi-bin/IPtables-GUI.pl In order to be a proficient sales and marketing guru, you should understand the various DDoS attack vectors and some common DDoS mitigation methodology such as those described in DDoS-Mitigator.net/Mitigation. You should be be familiar with the different DDoS competitors outlined in DDoS-Mitigator.net/Competitors. Additionally, you should know when in-house DDoS appliances are just as good or better than outsourced DDoS scrubbers for 32+ features shown in DDoS-Mitigator.net/Inhouse-vs-Cloud comparison. DDoS mitigation solutions are multi-layered solutions that would depend on the DDoS attack types and the DDoS Attacker's skill set of a script kiddies or Masters of Deception. DDoS attacks can be tcp-based, arp-based, udp-based, icmp-based, application attacks and other more common spam, virus and worm attacks. These various DDoS attacks can be simulated with DDoS-Simulator.net A simplified and generic job description for the sales position is available at DDoS-Mitigator.net/Jobs. The interview process will include telecommuting options to quantify your marketing/sales qualifications and performance. Similarly, those seeking engineering positions will be tasked to show their engineering and software programming skills. Sales commissions is always negotiable depending on your experience and sales performance DDoS-Mitigator.com for HTML5/CSS Please feel free to submit your resume to Upwork@DDoS-Mitigator.net
Skills: Security Infrastructure Information Security Internet Security Marketing strategy