Internet Security Jobs

78 were found based on your criteria {{|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Intermediate ($$) - Est. Budget: $80 - Posted
We need one or more authors to write two cyber-security articles for our blog. The author(s) must be (a) domain expert(s) with experience in cyber-security. The article will be hosted under your name so you can expect a global readership to consume your content. Topic #1 TOP 20 INTERVIEW QUESTIONS AND ANSWERS FOR CYBER-SECURITY PROFESSIONALS Theme: Top 20 interview questions and model answers for cyber-security interviews. References (to supplant your own research): information-security- interview-questions/ security-information- analyst-interview- questions/ analyst-interview- questions- SRCH_KO0,22.htm?countryRedirect=true interview-questions/ Guidelines: 1. US English only. The article should be written for an American readership. 2. Style guide: Chicago Manual or equivalent. 3. Design: infographics and supporting visuals are welcome. 4. Word-count: 1000-1200 _________________________________________________________________________ Topic #2 COMPANIES HIRING ETHICAL HACKERS Theme: An overview of top companies worldwide that hire professionals holding an ethical hacking certification. Broad strokes/points to cover: Which companies are hiring certified ethical hackers? What are their salaries, perks, responsibilities? How is certified training helping candidates land their dream roles at these multinational companies? Which of these companies do learners aspire to work at? Reference articles (to supplant your research): (Please use these for reference on the companies hiring ethical hackers only – the article needs to focus on this theme alone and must NOT meander into advice for building a career in ethical hacking or the like) Job portals like Glassdoor, Monster, and Dice Guidelines: 1. US English only. The article should be written for an American readership. 2. Style guide: Chicago Manual or equivalent. 3. Design: infographics and supporting visuals are welcome. 4. Word-count: 1000-1200 _____________________________________________________________________
Skills: Internet Security Content Writing Information Security Network Security
Fixed-Price - Intermediate ($$) - Est. Budget: $500 - Posted
Build a CI/CD pipeline that follows the guidelines for good test-driven development for a microservices based system that runs with docker containers. The Cluster will need: - json configuration files for each microservice, depending of its characteristics - Persistent storage for Cassandra - Persistent storage for MySQL - reverse proxying and networking between the services inside DC/OS Currently the system has 15 microservices, public and private.
Skills: Internet Security Docker Network Engineering Microsoft Windows Azure
Fixed-Price - Expert ($$$) - Est. Budget: $150 - Posted
To create a multiple choice questions test on Ethical Hacking . Questions count – 60 The quality of questions should be such that only the candidates well aware about the practical aspects of the subject should be able to pass. Type - Questions divided into three levels- medium, hard,too hard Multiple Choice questions required to be developed with copyright free original content . The questions can have MCQ's based on practical knowledge(image based,code snippets) as well on the topic. The questions to have minimum four answer options each. No True and False Statements. No Trivia questions. Review: The subject matter expert will be required to review the test on the live server and point out any corrections, once the test is uploaded Feedback: The subject matter expert will make revisions to the feedback shared for the content developed before final approval. The subject matter expert will help us in resolving any feedback received from the test takers within 3 months of uploading the test. Steps: Deliverable: Required in a word file in the required format (format will be provided) 1. Signing the NDA 2. Develop questions as per the agreed upon test outline. 3. Submit the deliverable in a word file 4. Run the test and review the questionnaire once live 6. Point out any improvements/errors during the final review.
Skills: Internet Security Certified Information Systems Security Professional (CISSP) Firewall Network Security
Hourly - Entry Level ($) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
Hello, We are running about 20 different Wordpress pages and several of them have been malware infected. This needs to be removed and secured for future. After that you need to check google search results, as some of the infected pages have been indexed by google and redirect the visitors to strange pages. We will move some of the domains to a new server as well, so you need to know how to do this as well. Most of the pages are hosted on Bluehost. You need to have a lot of Wordpress experience and must know how to move domains. We need someone who monitors the pages later on a ongoing basis, optimizes performance and solve problems, if the arise, fast. When the "clean up" job is done there will be a ongoing monitoring of 1-2 hrs/week. Thanks
Skills: Internet Security Malware WordPress
Hourly - Entry Level ($) - Est. Time: 1 to 3 months, Less than 10 hrs/week - Posted
Hi I am looking for a watchguard firewall expert to give advice and troubleshoot the setup of devices around our company. We commonly experience customers complaining about slow speeds after a watchguard has been installed on their site. You would need to be experienced with watchguard products and advance firewall configurations. You will also need a good understanding of different link speeds, QoS, VPN and traffic management. This will be an ongoing job and will be contacted on an adhoc basis as needed.
Skills: Internet Security Firewall Network Monitoring Network Planning
Hourly - Intermediate ($$) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
I have limited computer experience and am growing increasingly concerned about computer security. I am looking for an internet security expert to teach me everything I need to know. They key requirement is that the expert has knowledge of ALL OF THE FACTORS necessary to protect your identity and be completely anonymous online. The job requirements are knowledge of and experience with the following: VPN PGP Virtual Box Linux ISO image and signature verification Whole disk encryption and file shredding Encrypted drive backup Persistence Javascript vulnerabilities and removing personal metadata from files Virus and malware protection Anonymous Bitcoin wallet setup General security when posting online Mobile security Tracking cookies Knowledge of government surveillance capabilities & evasion strategy ...and all other components of internet security. Other requirements: Sensitivity to my status as a novice in the realm of internet security Friendly demeanor Intelligence Strong respect for the agent-client relationship and its fundamental fiduciary duties One last note: I appreciate smart people and am glad to reward them for the gift of their hard-earned knowledge.
Skills: Internet Security Information Security Network Security