Internet Security Jobs

85 were found based on your criteria {{|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Expert ($$$) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
The target is to build a portable framework in a usb stick that can run in linux and Windows that have the capability to runs under non admin environment and bypass some of the restrictions in the host system via either portable run time envinronment or via portability binary ofuscation for the apps we are going to run. The main target is making the encryption to the usb portable and usable.
Skills: Internet Security Browserify C++ haproxy
Fixed-Price - Intermediate ($$) - Est. Budget: $80 - Posted
We need one or more authors to write two cyber-security articles for our blog. The author(s) must be (a) domain expert(s) with experience in cyber-security. The article will be hosted under your name so you can expect a global readership to consume your content. Topic #1 TOP 20 INTERVIEW QUESTIONS AND ANSWERS FOR CYBER-SECURITY PROFESSIONALS Theme: Top 20 interview questions and model answers for cyber-security interviews. References (to supplant your own research): information-security- interview-questions/ security-information- analyst-interview- questions/ analyst-interview- questions- SRCH_KO0,22.htm?countryRedirect=true interview-questions/ Guidelines: 1. US English only. The article should be written for an American readership. 2. Style guide: Chicago Manual or equivalent. 3. Design: infographics and supporting visuals are welcome. 4. Word-count: 1000-1200 _________________________________________________________________________ Topic #2 COMPANIES HIRING ETHICAL HACKERS Theme: An overview of top companies worldwide that hire professionals holding an ethical hacking certification. Broad strokes/points to cover: Which companies are hiring certified ethical hackers? What are their salaries, perks, responsibilities? How is certified training helping candidates land their dream roles at these multinational companies? Which of these companies do learners aspire to work at? Reference articles (to supplant your research): (Please use these for reference on the companies hiring ethical hackers only – the article needs to focus on this theme alone and must NOT meander into advice for building a career in ethical hacking or the like) Job portals like Glassdoor, Monster, and Dice Guidelines: 1. US English only. The article should be written for an American readership. 2. Style guide: Chicago Manual or equivalent. 3. Design: infographics and supporting visuals are welcome. 4. Word-count: 1000-1200 _____________________________________________________________________
Skills: Internet Security Content Writing Information Security Network Security
Fixed-Price - Intermediate ($$) - Est. Budget: $500 - Posted
Build a CI/CD pipeline that follows the guidelines for good test-driven development for a microservices based system that runs with docker containers. The Cluster will need: - json configuration files for each microservice, depending of its characteristics - Persistent storage for Cassandra - Persistent storage for MySQL - reverse proxying and networking between the services inside DC/OS Currently the system has 15 microservices, public and private.
Skills: Internet Security Docker Network Engineering Microsoft Windows Azure
Fixed-Price - Expert ($$$) - Est. Budget: $150 - Posted
To create a multiple choice questions test on Ethical Hacking . Questions count – 60 The quality of questions should be such that only the candidates well aware about the practical aspects of the subject should be able to pass. Type - Questions divided into three levels- medium, hard,too hard Multiple Choice questions required to be developed with copyright free original content . The questions can have MCQ's based on practical knowledge(image based,code snippets) as well on the topic. The questions to have minimum four answer options each. No True and False Statements. No Trivia questions. Review: The subject matter expert will be required to review the test on the live server and point out any corrections, once the test is uploaded Feedback: The subject matter expert will make revisions to the feedback shared for the content developed before final approval. The subject matter expert will help us in resolving any feedback received from the test takers within 3 months of uploading the test. Steps: Deliverable: Required in a word file in the required format (format will be provided) 1. Signing the NDA 2. Develop questions as per the agreed upon test outline. 3. Submit the deliverable in a word file 4. Run the test and review the questionnaire once live 6. Point out any improvements/errors during the final review.
Skills: Internet Security Certified Information Systems Security Professional (CISSP) Firewall Network Security
Hourly - Entry Level ($) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
Hello, We are running about 20 different Wordpress pages and several of them have been malware infected. This needs to be removed and secured for future. After that you need to check google search results, as some of the infected pages have been indexed by google and redirect the visitors to strange pages. We will move some of the domains to a new server as well, so you need to know how to do this as well. Most of the pages are hosted on Bluehost. You need to have a lot of Wordpress experience and must know how to move domains. We need someone who monitors the pages later on a ongoing basis, optimizes performance and solve problems, if the arise, fast. When the "clean up" job is done there will be a ongoing monitoring of 1-2 hrs/week. Thanks
Skills: Internet Security Malware WordPress
Hourly - Entry Level ($) - Est. Time: 1 to 3 months, Less than 10 hrs/week - Posted
Hi I am looking for a watchguard firewall expert to give advice and troubleshoot the setup of devices around our company. We commonly experience customers complaining about slow speeds after a watchguard has been installed on their site. You would need to be experienced with watchguard products and advance firewall configurations. You will also need a good understanding of different link speeds, QoS, VPN and traffic management. This will be an ongoing job and will be contacted on an adhoc basis as needed.
Skills: Internet Security Firewall Network Monitoring Network Planning
Fixed-Price - Expert ($$$) - Est. Budget: $800 - Posted
I have a Samsung Galaxy S7 with an unknown password/passcode. I have made a RAW image file of the entire 32GB memory. I would like the image file decrypted/encryption removed. As part of this project ,i would like a program/utility developed to do this again for other image files and the full source code provided to me. Other experts claim this can be done and have been able to do this. This is being used only for ethical purposes. No upfront payment will be offered, only payment upon testing the solution. If you can show me your solution works, 50% will be paid then 50% will be paid once the source code has been provided to me, then after it has been received and confirmed to be a valid source code for the software, the remaining 50% will be completed. I need this completed within 7 days.
Skills: Internet Security Data Analytics Data Encoding Security Analysis