Cloud Security Framework Jobs

16 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Expert ($$$) - Est. Budget: $500 - Posted
Looking for some one who can write a research paper not more then 12 pages. it should be finished by 10the of September and it should not be a theoretical paper. it should be it a complete paper with proper algorithm, experiment, charts and flows, graphs, results and everything. The research area is Mobile Cloud Computing Security
Skills: Cloud Security Framework Article Writing Computer Networking Information Security
Hourly - Expert ($$$) - Est. Time: 3 to 6 months, Less than 10 hrs/week - Posted
We produce software for a publicly-traded American company. We are using our own proprietary software but need to take some steps to ensure that our database, servers, and code are properly secure and can pass some internal, as well as their audits. We are particularly concerned about our software's ability to be certified as "SOX Compliant". We are looking for a security expert who can simultaneously find the the vulnerabilities in our software, and then recommend solutions for them. Our team will need guidance and direction in hardening all aspects of the software. I would expect you to have certifications and demonstrated expertise in the field of data and software security. Please share your experience, and how you could help us secure our software to satisfy our growing list of clients.
Skills: Cloud Security Framework Security Analysis Security Engineering
Fixed-Price - Expert ($$$) - Est. Budget: $250 - Posted
Need experienced Google Cloud expert who can: 1. Set permissions for outside developers 2. Modify permissions 3. Create new servers/backup servers 4. Fully explain how the Google Cloud works The selected candidate will work with our team and teach us how to assign users, create servers, create permissions.
Skills: Cloud Security Framework
Fixed-Price - Intermediate ($$) - Est. Budget: $125 - Posted
We have a completed Android app that encrypts data and GPS location of our users in a secure manner. We alone have the ability to retrieve data. The qualified candidate will be able to develop the iOS equivalent from the Android APK including all its security features and upon completion and accepted, upload the iOS app to the iTunes store (APPLE). We will choose a candidate based on competency and experience, in addition to English communication abilities. In addition, the qualified candidate will be able to upload our app to the iPhone and Android app stores. We will choose a candidate based on competency and experience, in addition to English communication abilities. ***NOTE*** Current app builds for Android are considered complete at this time but not yet uploaded to Store. We require someone who can handle the back-end security requirements as described above. Lastly, we will require the right candidate to be familiar with uploading apps to the App Store and Play Store. This is an immediate requirement. Note that some development work for iOS has been completed and is available for review, but requires modification to match existing Android APK.
Skills: Cloud Security Framework Android App Development GPS Development Information Security
Hourly - Intermediate ($$) - Est. Time: Less than 1 week, Less than 10 hrs/week - Posted
Need someone to help secure my AWS account and follow attached instructions. Please document steps taken and confirm that each item has been completed. Will also need to setup alerts for new instances and bandwidth thresholds. I will provide remote access via teamviewer.
Skills: Cloud Security Framework Amazon EC2 Amazon Web Services AWS Lambda
Fixed-Price - Expert ($$$) - Est. Budget: $1,000 - Posted
A UAE based company is seeking an experienced Data Security Consultant to work as a freelance consultant to perform the following: The consultant will work with the team in Dubai, UAE on specific projects as an Enterprise data security technology subject matter expert and analyzes information security data to assess threats, vulnerabilities and risks to the client environment. The position must do so in accordance with the enterprise strategy, the local Technology Governance Risk and Control policies. Candidates for this position are expected to be experts in the data security space with extensive and deep knowledge to independently conduct more complex activities. ​ • Provide consultation and advice for moderate to high complexity risk and security project development and implementation. • Determine information gaps on threats and vulnerabilities and consults with key stakeholders • Provide efforts to correlate multiple sources of threat intelligence, electronic markers and global activities to produce appropriate risk relationships • Design and build the architecture for deploying an enterprise level application in a private cloud at a client environment • Perform security program reviews and pre –audit preparedness reviews • Prepare audit report on web application/network/mobile penetration testing • Prepare audit report on Vulnerability assessment of network devices/databases/webserver/application server • Develop IT risks mitigation plans and recommend applicable Security Controls • Consult on best current practices for cyber security solutions, data security policy development, implementation and review ​ • Bachelor’s Degree or equivalent experience or a minimum of 10+ years of IT experience with 5+ years in information security. • Solid verbal and written communications skills in English. • Excellent communication and presentation skills. This entails the ability to communicate complex security based topics in a clear and concise manner to both technical and non-technical audiences • Understanding of analytical hardware and software tools. • Certifications such as CISSP, CISA, CEH, CPT, SAN, GIAC or equivalent preferred. • Knowledge on NESA, ISO 27001, 27005 and PCI • In-depth understanding and prior operational use of open source (OSINT), human intelligence (HUMINT) and other threat intelligence data sources. • Understanding of HTML, SQL, and data manipulation methodologies. • In-depth understanding of cyber security analytics and cyber security operations including knowledge of incident management processes and procedures. • Familiarity with intrusion detection/prevention technologies, firewalls, security even management tool sets, log parsing and reporting.
Skills: Cloud Security Framework Firewall Information Security
Fixed-Price - Intermediate ($$) - Est. Budget: $300 - Posted
Looking for a AWS solutions architect for a 1 month project. This contracts includes multiple sub-projects. Must be experienced with AWS RDS, encrypting... Please note we are creating a Rich Internet Application, not a website/blog/etc. The job is about building a simple Rich Internet application. The purpose is for users to fill in different forms with personal information. The forms should be encrypted, and sent via an encrypted communication to the database. We wishes to implement load balancer and RDS in AWS. Forms has to be able to be consulted by third parties via a web platform through a one time authorization code (OTAC) sent via email.
Skills: Cloud Security Framework Amazon EC2 Amazon Relational Database Service
Fixed-Price - Intermediate ($$) - Est. Budget: $100 - Posted
I have a client who requires a cloud folder system set up in his small business. The cloud system must have easy use permission control on certain folders. It must in real time edit and save documents in cloud. Without the need to download document first. It must be easy to use and create unlimited folders and sub folders. Please contact if you can hep in this project
Skills: Cloud Security Framework
Hourly - Entry Level ($) - Est. Time: More than 6 months, Less than 10 hrs/week - Posted
We are a small tech company currently seeking a reliable Microsoft Azure administrator to monitor & support two private cloud networks on an ongoing basis. Additionally, we have pending tasks that we want to complete, so we would like you to be available to begin work ASAP. Your proposal *MUST* include provisions for the following: * Leveraging available resources (such as our MSDN subscription benefits, for example) to allow for some degree of 24/7/365 monitoring and has the ability to alert system stakeholders for current, imminent or potential issues. * Periodic verification that scheduled backups are running as expected, and reach full completion on a daily basis. * Security: Make sure all patches, safeguards and protections are in place to keep the environment secure, and to address any known vulnerabilities. * Communicate directly with the owner of our organization and provide reports that are easily understandable to a non-technical person. Also, there are a number of additional requirements for prospective applicants: --> You MUST be available to support ad-hoc requests and investigate network failures or other problems within a mutually agreed-upon timeframe during our regular business hours: Monday through Friday 8:30AM - 5:00PM, eastern US daylight time (GMT-4). --> For each task or request, we will describe each task that we ask you to complete, and will set a deadline for completion that is mutually agreed upon. Consequently, we ask that CONSISTENTLY complete your work within the timeframe promised. --> Your proposal should clearly state your fee to provide this service. We expect proposals will specify an hourly fee for the time you work on our tasks, but if your proposal includes any fixed/recurring costs, please specify the amount and explain the reason(s) for it. --> Finally, you MUST have a strong working knowledge of the Azure platform, its components, Powershell scripting, rapid deployments of virtual machines, cost structures/pricing models, and architecting multiple connected environments. You must be fluent in English and have excellent communication skills (written and oral). References are encouraged, but not required.
Skills: Cloud Security Framework Microsoft Active Directory Microsoft Virtual Server Microsoft Windows Powershell