Security Infrastructure Jobs

41 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Entry Level ($) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
We required to implement: Snort BroIDS Suricata This use cases: Protecting a web from attacks Protecting a browser from being exploited Protecting a user to detect traffic coming from his computer/server detected as backdoor Any ideas to help us? Welcome!
Skills: Security Infrastructure Certified Information Systems Security Professional (CISSP) Cloud Security Framework Information Security
Fixed-Price - Expert ($$$) - Est. Budget: $1,000 - Posted
We need an expert who suggest and setup a professional encryption system for our company. Environment: mainly Windows Computers, some Debian Desktop computers and Debian 2 Servers. We prefer standard alone software or software with server running on a linux server. The workers at the company should not be able to to copy or send any data from the computer. You should suggest a very safe solution, assist us to buy it and make about 3 or more installation for us via remote control.
Skills: Security Infrastructure Cryptography Internet Security Linux System Administration
Fixed-Price - Intermediate ($$) - Est. Budget: $330 - Posted
Hello ,, I looking for a professional security specialized in decryption process to find the private key of this encryption , and finally write his code & creating a tool for decryption these files I will provide you with 1- The encrypted file & Its Original file 2- The code virus file (Public Key ) . Note : This fixed price is just a start .If you could prove your skills to fix that we can make another good deal for you and me . Thanks
Skills: Security Infrastructure Certified Information Systems Security Professional (CISSP) Information Security Internet Security
Hourly - Intermediate ($$) - Est. Time: Less than 1 month, Less than 10 hrs/week - Posted
Hi, We are looking for a programmed secure hardware to be installed between my broadband & WIFI router. I want all the Internet usage to be logged & stored on redundant mainframe servers or any other server from where I can pull up information. You should program the application in such a way that each user activity is recorded separately & each user gets a unique time bound password to login. We are open for any existing open source software as well which need to be programmed so that we can utilize it and can implement it in my customers environment. Some features to be included: • It should helps in establishing brand image, security, tracking and other features gives look and feel of a big and professionally managed organization. Thus boosting faith and confidence of customers. • All users using my public WIFI are greeted by your customized Web page. • A page asks for registration details or signing in if user is already registered. • Detailed MIS of all the users who used my public WIFI So I will have track of my users, their usage & their contact details. I should be able to get detailed logs with date, time of usage, mobile no., Mac no. and duration of usage. • Never busy and always available. It can distribute my bandwidth evenly or I can allocate as per the user requirements. • Ability to set my peak hours after peak hours I can reduce bandwidth allocation to public. • Partially over the cloud, No major cost or any hardware is required, It can be up and working within 72 hours of sign up. • It should be capable of recording live usage, you can have quality checks in place and an eye on performance. • Track my bandwidth, and I should be able to limit your daily / weekly and monthly usage. Please do not bid if you have not worked on any such project earlier. Thanks.
Skills: Security Infrastructure Application Programming Product Development Software Defined Networking (SDN)
Hourly - Intermediate ($$) - Est. Time: Less than 1 week, 10-30 hrs/week - Posted
Resource: We are looking for MAC IT support for application setup, security, communications, logging, and other initial system configuration tasks. This is a hands-on role with a small initial scope focusing on basic, up-and-running conditions for our local network. Environment: We have a small, heterogeneous network with Local, Remote, and Cloud Systems that need to be integrated for PG Admin and pgsql management tools and operations. Currently we have Windows Server, a server-sized MAC, and a Dell server running RHEL. However the primary target for the scope of this proposal is the MAC Security: The MAC needs firewalls and virus and intrusion security configuration. The router has a firewall and an OpenVPN access that works but needs hardening. Communications: The primary objective includes establishing connectivity among all systems for terminal communications by Putty and VNC PG Admin, pgsql, and GUI DB Tools. All systems should be enabled for communication and bi-directional remote Postgres interactions. Logging: Logs for Postgres and the primary security systems should be located logically and be exposed through well-known display features and roll-over procedures. We intend this work should be specified in advance, include a review of the systems and the specific technical operations to be performed, and should proceed quickly to the goals as specified. Specifications, schedule, and time and effort logging will be communicated exclusively using our Jira instance and configurations and other assets will be managed on our Bitbucket instance. Please provide us with specific assurances that you feel capable of meeting the requirements and why you believe you have those capabilities. You may also refer us to descriptions of your previous jobs, but we will pay more attention to those who respond with specifics about our requirements.
Skills: Security Infrastructure Mac OSX Administration PostgreSQL Administration System Administration
Fixed-Price - Expert ($$$) - Est. Budget: $1,000 - Posted
I need a way too install a application without any action required(exploit) I could buy in the black market(But we would like too keep this ethical) I need a program or a way too install a application without any action required like a CVE method or a vulnerability Microsoft Office Adobe Flash Adobe Pdf Web browsers(Chrome,Internet Explorer,Firefox) Ect Hope we get good candidates
Skills: Security Infrastructure Adobe PDF C++ Internet Security
Hourly - Expert ($$$) - Est. Time: Less than 1 week, 10-30 hrs/week - Posted
We want to make a scalable architecture that we will provide to companies ( Wifi operators, DSL / mobile-4G operators). The purpose is to modify web pages content on the fly. We want to provide our customers a dockerized solution that - Filtre the traffic a keep only HTML pages. - Check in a database what to modify (input / output) for the http request IP router. - Modify the content Your design needs to be compatible with all existing solutions (modem, routers, wifi operators, mobile operators …) Use case: - I connect to the VM1 - I type : curl « http://www.yahoo.com » (example) - All the « THE » word in the page content are replaced by the word AAA. - I connect to the VM2 - I type : curl « http://www.yahoo.com » - All the « THE » word in the page content are replaced by the word BBB. ALL gif,png, video etc… will be directly return. Only html pages will be processed. Requirements We need a high scalable architecture without any single point of failure. High performance database & Caching, but we also need a very simple system. We need an IT specialist/dev who have more than 5 years of experience in Network/IP architecture (wifi, isp, ...) to design this system. We will provide on AWS all VM needed to simulate the architecture (client/router/lb etc…) We want : - The freelancer provides us a document with his design proposition (text + schema) - A small simulation (prototype) with VM on Aws (like the above usecase) Find attached a small diagram of our need.
Skills: Security Infrastructure Docker Load Balancing Network Design