Internet Security Jobs

92 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Intermediate ($$) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
We have several websites running wordpress on GoDaddy Cpanel. We have the need immediate need to: 1. Migrate from Wordpress Hosting to Linux Hosting within same Cpanel Account. 2. Backup and reinstall website(s) 3. Consolidate and assist in process of getting websites organized. 4. Create necessary databases as needed We recently transferred some domains to a new account. On an ongoing basis: 1. You will run and maintain updates as needed - Plugins, Wordpress Updates, etc 2. Make recommendations on performance enhancements 3. Make recommendations on security improvements 4. Make recommendations on cost saving features 5. Maintain security 6. Run and Test QA There is not much work initially so I expect you to be honest with time expectation. I also know that the ongoing monthly relationship will be minimal but I would like to keep an active open engagement as the business is built.
Skills: Internet Security Data Backup Database Administration English
Fixed-Price - Expert ($$$) - Est. Budget: $1,000 - Posted
We need an expert who suggest and setup a professional encryption system for our company. Environment: mainly Windows Computers, some Debian Desktop computers and Debian 2 Servers. We prefer standard alone software or software with server running on a linux server. The workers at the company should not be able to to copy or send any data from the computer. You should suggest a very safe solution, assist us to buy it and make about 3 or more installation for us via remote control.
Skills: Internet Security Cryptography Linux System Administration Network Security
Fixed-Price - Expert ($$$) - Est. Budget: $40 - Posted
Website has been suspended from host due to Malware/suspicious content. Firstly I would like to remove the Malware plus know how it got in and how to stop future breaches with security suggestions. Files in question are: /paypal.com-secure.verified-by.paypal.cgi-bin.dispute-account /update-your-paypal-informations.secure.verified-by.paypal Only highly experienced candidates with a high quality score and history will be considered. We run a web company and this is one of our own websites so we are also looking for someone we can add to our team for future issues. Thanks
Skills: Internet Security Malware
Fixed-Price - Intermediate ($$) - Est. Budget: $330 - Posted
Hello ,, I looking for a professional security specialized in decryption process to find the private key of this encryption , and finally write his code & creating a tool for decryption these files I will provide you with 1- The encrypted file & Its Original file 2- The code virus file (Public Key ) . Note : This fixed price is just a start .If you could prove your skills to fix that we can make another good deal for you and me . Thanks
Skills: Internet Security Certified Information Systems Security Professional (CISSP) Information Security Malware
Fixed-Price - Expert ($$$) - Est. Budget: $150 - Posted
Hello, Our IT security / penetration testing company is looking for a technical blogger, who can talk about security topics such as: penetration testing / vulnerability assessments website security CMS security such as Drupal / Joomla / WordPress network security Kali Linux or Linux security topics Security Tools and ethical hacking techniques etc etc We have £100/$150 per month to spend and would expect 2-3 good articles per month. I am only interested in people who have excellent English skills, and English needs to be a first language so ideally looking for someone from the UK or USA. We would not want any of the blog posts to be copied from articles online, the work has to be genuine and unique. You can view our blog here: www.security-audit.com/blog Thanks and good luck Rob
Skills: Internet Security Blog Writing Security Analysis