You've landed at the right place. oDesk is now Upwork. Learn about the new platform.

Internet Security Jobs

27 were found based on your criteria {{ paging.total | number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("hourly") | number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("fixed") | number:0}})
show all
only
only
only
show all
only
only
only
only
only
show all
only
only
only
Looking for the Team App?
Download the New Upwork Team App
Fixed-Price - Intermediate ($$) - Est. Budget: $50 - Posted
Deadline 8 hours: starting from the moment you accept the job. Important! Please do not work on this if you cannot replicate the problem I see. There is no point in you working on this if you can't see the problem on your computer. To Replicate: use firefox as your browser, and install Addon "user agent switcher" then visit the site after you set user agent to "googlebot 2.1" Tasks: - Located and remove Malicious Code that has infected my site. - create backup of the site before making changes. - complete within timeline - offer help to avoid future hacks. Malicious Code is being injected inside my <head> tags. I can't locate the file/code that this attack is using on my site. Note: in order to see the Malicious Code, you need to make your referrer appear to be Google Bots. The Malicious Code is visible when you visit, for example: https://www.1stamericanstorage.com/ Using referrer Googlebot 2.1 You get this code in the <head> section when you view source: <div style='display:none;'><a href='https://celluliteblog.space/how-to-get-rid-of-cellulite-look-on-buttocks'>https://celluliteblog.space/how-to-get-rid-of-cellulite-look-on-buttocks</a></div><div style='display:none;'><a href='https://fibroidinfo.pw/pedunculated-fibroid-cancer'>Subserosal Uterine Fibroid Treatment</a></div><div style='display:none;'><a href='https://fibroidsblogg.space/cancerous-fibroids'>fibroidsblogg.space</a></div><div style='display:none;'><a href='https://fibroidsblog.space/fibroid-treatments-laser'>https://fibroidsblog.space/fibroid-treatments-laser</a></div><div style='display:none;'><a href='https://fibroidsnews.space/six-small-fibroids'>https://fibroidsnews.space/six-small-fibroids</a></div><div style='display:none;'><a href='https://fibroidsonline.space/who-sells-way-to-get-rid-of-cellulite-on-thighs'>Celluliteinfo</a></div><div style='display:none;'><a href='https://xn--forbrukslnhjelpen-hrb.no/'>billigst forbrukslån</a></div><div style='display:none;'><a href='https://infoweight.pw/fibroid-degeneration-and-infection'>to</a></div><div style='display:none;'><a href='https://www.kreditthjelpen.no/kredittkort/10/Ikano-Visa'>ikano visa</a>test: . https://www.1stamericanstorage.com</div><div style='display:none;'><a href='https://netcellulite.pw/how-to-get-rid-of-cellulite-under-my-bum'>netcellulite.pw</a></div><div style='display:none;'><a href=https://nett-guiden.com/>tjene penger</a></div><div style='display:none;'><a href='https://newsthighs.pw/bargain-exercises-to-get-rid-of-cellulite-on-back-of-thighs'>newsthighs.pw</a></div><div style='display:none;'><a href='https://onlinefibroid.space/fibroids-weight-gain-in-the-abdomen'>onlinefibroid.space</a></div><div style='display:none;'><a href='https://symptomsblog.pw/cheap-fibroid-surgeons-in-new-york'>Fibroidsnews</a></div><div style='display:none;'><a href='https://techweb.no/'>hjemmeside</a></div><div style='display:none;'><a href='https://thighsweb.pw/cheap-workout-for-cellulite-on-legs'>as</a></div><div style='display:none;'><a href='https://webfibroid.pw/cheap-way-to-get-rid-of-uterine-fibroids'>webfibroid.pw</a></div><div style='display:none;'><a href='https://webfibroid.space/treating-fibroids'>Low Priced Enzymes For Fibroids</a></div>
Skills: Internet Security WordPress
Hourly - Expert ($$$) - Est. Time: Less than 1 week, 10-30 hrs/week - Posted
i need an expert in security and zoho crm. I am sure that someone is having access to my data. Mainly because the users profiles are not very well done and possibly some hacking job at the moment This is urgent
Skills: Internet Security Zoho CRM
Fixed-Price - Expert ($$$) - Est. Budget: $35 - Posted
We are in the process of starting a major release of one of our key proprietary applications. This is a MySQL database with a Ruby on Rail front end. We are looking to hire a quality assurance tester to make sure that this upgrade is as smooth as possible. The testing phase is expected to start in March 2016 and the Go Live is scheduled in July 2016.
Skills: Internet Security Ruby on Rails Usability testing
Fixed-Price - Expert ($$$) - Est. Budget: $500 - Posted
Hi I'm looking of a clear crisp, to the point and practical guide for Mobile Security Tutorial covering following chapters: Chapter 1 : Introduction To Mobile Security Chapter 2 : Mobile Platform Attack Vectors (a) What’s An Attack Vector? (b) Consequences of Attack Vectors ? (c) Anatomy of a Mobile Attack (d) How a Hacker can Profit from Mobile when Successfully Compromised (e) Vulnerable Areas in Mobile Business Environment (f) OWASP Mobile Top 10 Risks Chapter 3: App Stores And Security Issues (a) Common Security Issues Facing App Store (b) App Sandboxing Issues Chapter 4 : Introduction To Mobile Spam (a) SMS Phishing Attack (SMiShing) (Targeted Attack Scan) (b) Why SMS Phishing is Effective? (c) SMS Phishing Attack Examples (d) Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections (e) Prevention And Solutions Chapter 5(i) : Introduction To Android OS (a) Android OS Architecture (b) Android Device Administration API (c) Android Vulnerabilities (ii) Android Rooting (a) Android Rooting Tools (b) Rooting Android Phones using SuperOneClick Rooting (c) Android Phones Using Superboot (d) The Importance of Rooting Android Devices (iii) Android Trojan (a) ZitMo (ZeuS-in-the-Mobile) (b) FakeToken and TRAMP.A (c) Fakedefender and Obad (d) FakeInst and OpFake (e) AndroRAT and Dendroid Chapter 6 : Securing Android Devices (i) Google Apps Device Policy (ii) Remote Wipe Service: Remote Wipe Chapter 7 : Android Security Tools (a) DroidSheep Guard (b) TrustGo Mobile Security and Sophos Mobile Security (c) 360 security, AVL, and Avira Antivirus Security (d) Android Vulnerability Scanner: X- (e) Android Device Tracking Tools Chapter 8 : Introduction To iOS ( Apple iOS ) (i) Jailbreaking iOS (a)Types of Jailbreaking (b)Jailbreaking Techniques (c)App Platform for Jailbroaken Devices: Cydia (d)Jailbreaking Tool: Pangu (e)Untethered Jailbreaking of iOS 7.1.1/7.1.2 Using Pangu for Mac (ii)Jailbreaking Tools (a) Redsn0w and Absinthe (b) evasi0n7 and GeekSn0w (c) Sn0wbreeze and PwnageTool (d) LimeRa1n and Blackra1n Chapter 9 : Guidelines for Securing iOS Devices iOS Device Tracking Tools Chapter 10 : Introduction To Windows OS (i) Windows Phone 8 Architecture (ii) Secure Boot Process (iii) Guidelines for Securing Windows OS Devices (iv) Windows OS Device Tracking Tool: FollowMee GPS Tracker Chapter 11 : Introduction To Blackberry Operating System (i) BlackBerry Enterprise Solution Architecture ( a) Blackberry Attack Vectors (i) Malicious Code Signing (ii) JAD File Exploits and Memory/ Processes Manipulations (iii) Short Message Service (SMS) Exploits (iv) Email Exploits (v) PIM Data Attacks and TCP/IP Connections Vulnerabilities Chapter 12 : Guidelines for Securing BlackBerry Devices (a) BlackBerry Device Tracking Tools: MobileTracker and Position Logic Blackberry Tracker (b) Mobile Spyware: mSpy and StealthGenie (c) Mobile Spyware Chapter 13 : Mobile Device Management (MDM) MDM Solution: MaaS360 Mobile Device Management (MDM) MDM Solutions (a) Bring Your Own Device (BYOD) (i) BYOD Risks (ii) BYOD Policy Implementation (iii) BYOD Security Guidelines for Administrator (iv) BYOD Security Guidelines for Employee Chapter 14 : Mobile Security Guidelines and Tools (a) General Guidelines for Mobile Platform Security (b) Mobile Device Security Guidelines for Administrator (c) SMS Phishing Countermeasures (d) Mobile Protection Tool (i) BullGuard Mobile Security (ii) Lookout (iii) WISeID (iv) zIPS (e) Mobile Anti-Spyware Chapter 15 : (i) Mobile Pen Testing (a) Android Phone Pen Testing (b) iPhone Pen Testing (c) Windows Phone Pen Testing (d) BlackBerry Pen Testing (ii) Mobile Pen Testing Toolkit (a) zANTI (b) dSploit (c) Hackode (The Hacker's Toolbox) Glossary : Mobile Security Terminology
Skills: Internet Security Certified Information Systems Security Professional (CISSP) Mobile Programming Network Security
Fixed-Price - Intermediate ($$) - Est. Budget: $50 - Posted
Research level: Medium Words: 800 Minimum Style: Informative/Journalistic Topics: Produce Your Own Native English: Yes Experience: Technology (Security/Big Data/IoT Experts) Benefits: Write For Well Known Community/Fix Rate + Bonus On Traffic Volume (Important)/Fast Growth - Higher Paying Assignments We are a growing technology community that is always on the lookout for Skilled, Efficient, Intelligent and compelling writers who can write naturally and effectively about trends in the world of new technology. The fixed rate per article is negotiable after a certain period of time is met. When applying consider the fact that the rate is a fixed rate + bonus on traffic volumes generated to your articles. This could substantially increase your rate of pay if people start discussing your work. If you plan on writing just for the fixed rate, it will best to not apply. We will require published samples of your work in order to be considered. The fixed rate is per article.
Skills: Internet Security Article Writing Big Data Chicago Manual of Style
Fixed-Price - Entry Level ($) - Est. Budget: $500 - Posted
I need to create a proxy or VPN server that can be used to anonymously browse big websites (ie. Amazon). It must be able to create proxies and the big websites must not recognize that it is all originating from one user. The proxy server we set up cannot be large data center IPs, must be residential. This is to ensure that it is not blacklisted. This will be the first time attempting this project so I will need to consult with you on what would be the best way to set this up. Please write what experience you have with maintaining or setting up proxies, or other projects for internet privacy. Also please write what would be your suggestions to make this work.
Skills: Internet Security Network Security Virtual Private Server (VPS) VPN
Hourly - Expert ($$$) - Est. Time: 1 to 3 months, 10-30 hrs/week - Posted
We are a cloud software firm that serves hospitals. We are looking to develop formal policies that will guide all of our employees on maintaining a secure work environment and protect data on our desktop workstations and our servers. Project will include: Review our security policies and information security plan. Write procedures for auditing, breach, incident response, disposable media and risk management. Write employee handbook and employee training plan and materials. Write risk assessment for a new cloud infrastructure. Review our data encryption, data loss prevention and network monitoring infrastructure plans. You will be asked to answer the following questions when submitting a proposal: Have you taken any Upwork tests and done well on them that you think are relevant to this job? Why did you apply to this particular job? Which part of this project do you think will take the most time? Are you familiar with HIPAA? Are you familiar with DLP programs?
Skills: Internet Security Cloud Security Framework Disaster recovery Information Security
Hourly - Intermediate ($$) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
I'm looking for a cyber partner to help in researching, writing and bringing to life articles, reviews and blogs about Recruitment, Talent Branding and world class rock and roll leadership! My business operates from the UAE but work get's published from UK to Australia. Requirements: Ability to bring my words to life ensuring they are aligned with our tone of voice and brand at all times Ensuring all work is SEO friendly. Let's get to the top of the page all the time! Strong interest passion and hopefully good experience within either a HR, Recruitment or Branding capacity. More passion we have the better! And if you don't have experience in these industries then that's fine - but at least know what it's like to work for a company that was amazing and another company that let it's staff down... at least then you will understand how super important this stuff is! Amazing research skills. I need a partner to dig around the internet with me finding out the latest crazes in recruitment, social media recruitment campaigns through to employer branding initiatives. I am bored with reading the same old stuff about the same old companies. Let's shake it up! All in all, if you love anything to do with Employer Branding, Recruitment and Talent then this will be your kind of thing. In an ideal world you will also have the ability to take over all social media channels to but it's not essential! What is essential is making our reviews dance!
Skills: Internet Security Blog Writing Content Writing Creative writing
Hourly - Intermediate ($$) - Est. Time: 3 to 6 months, 10-30 hrs/week - Posted
I am in the process of writing a custom API, which will most likely be housed within AWS. Security is not my strength so I need someone to test the security of the API, especially the login/credentials endpoint. I'd like someone who will intermittently test the endpoints while the features are updated. Paramount skills: Network security Knowledge of common network attacks and ways to prevent damage AWS knowledge is a plus Test automation and script writing is a must Most of the work is done after 5PM (EST) and on weekends so I am flexible with time. This will also be a long-term project with minimal weekly work.
Skills: Internet Security Amazon Web Services API Development Automated Testing
Looking for the Team App?
Download the New Upwork Team App
Fixed Price Budget - ${{ job.amount.amount | number:0 }} to ${{ job.maxAmount.amount | number:0 }} Fixed-Price - Est. Budget: ${{ job.amount.amount | number:0 }} Open to Suggestion Hourly - Est. Time: {{ [job.duration, job.engagement].join(', ') }} - Posted
Skills: {{ skill.prettyName }}
Looking for the Team App?
Download the New Upwork Team App