Internet Security Jobs

89 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Entry Level ($) - Est. Time: 1 to 3 months, 10-30 hrs/week - Posted
The job is to continue development of already in production service that provides authentication function to end-users and WebAPI for their UI. We use Java, Spring, Hibernate. Good HTTP knowledge is a must to apply to this job. REST, OWASP, JPA are another needed skills. Our team works 8x5 standard office working hours (Moscow timezone), so help from the team is available during these hours. Requirements are available, dev environment setup is automated (vagrant+Ansible+autotests), so project onboarding is comparatively quick.
Skills: Internet Security Java REST Spring Framework
Hourly - Expert ($$$) - Est. Time: Less than 1 week, Less than 10 hrs/week - Posted
I am looking for a security architect who could help us with security advice on an Internet of Things solution we are building for a customer of us. Customer sells machines worldwide and would like to connect machines to read data and to update the machines remotely. The machines are in ownership of companies (end-user), and customer wants to update these complex machines remotely. But machines are not connected to "safe" internet connections. Machines are updates by following process. End-user downloads software on PC or Mobile (semi-automatically), and software is then distributed to machine by bluetooth or wire. We are looking for a trusted solution to make sure the package sent to the PC/Mobile and to the machine is the authentic package and no hacker is influencing the process. So we need a security design to prove package authenticy on untrusted networks. If you have experience in this field, please contact me.
Skills: Internet Security Network Security Security Engineering
Hourly - Entry Level ($) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
We required to implement: Snort BroIDS Suricata This use cases: Protecting a web from attacks Protecting a browser from being exploited Protecting a user to detect traffic coming from his computer/server detected as backdoor Any ideas to help us? Welcome!
Skills: Internet Security Certified Information Systems Security Professional (CISSP) Cloud Security Framework Information Security
Hourly - Entry Level ($) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
We want to take TOR browser Firefox and create a new version with new features we want to add to this portable artifact: Being Portable . To use HAproxy or Foxyproxy to being able to route http to TOR, I2P, Freenet, Zeronet and other hidden services. To have installed some security functions like addons. To have capability to being update without breaking itself. To be customized for portability and antivirus 2 Versions of the portable framework a) Windows xp,7,10 portability is required. b) Linux Ubuntu Debian portability is required. We wont built a browser from scratch we use existing one firefox The target is to build a portable framework in a usb stick that can run in linux and Windows that have the capability to runs under authenticated corporate proxy via some automated adjustments by initial GUI wizards.The browswer can use i2p,freenet and tor natively and those engines need to take the proxy settings from the initial wizard The browsers knows how to route every different dartknet with tolos like foxyproxy Additional project targets: The browser need to be deactivated hsts Need to retrieve a CA from another machine via ssh and install it automatically from the GUI in the initial wizard. The browser need to have a small wizard initially The browsers: Linux and windows need to be embed in a usbstick encrypted with an existing encryption framework we could use that also need to be portable Is the dev of a privacy tool and is a long time project, and we can use a lot of pre existing project to continue dev them or use them as basement of ideas. We don't dev things from scratch we don't have time. We will use and adjust existing code https://github.com/Librerouter/Librekernel/edit/gh-pages/Corp-bypasser.md
Skills: Internet Security Browserify C++ haproxy
Hourly - Intermediate ($$) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
We have several websites running wordpress on GoDaddy Cpanel. We have the need immediate need to: 1. Migrate from Wordpress Hosting to Linux Hosting within same Cpanel Account. 2. Backup and reinstall website(s) 3. Consolidate and assist in process of getting websites organized. 4. Create necessary databases as needed We recently transferred some domains to a new account. On an ongoing basis: 1. You will run and maintain updates as needed - Plugins, Wordpress Updates, etc 2. Make recommendations on performance enhancements 3. Make recommendations on security improvements 4. Make recommendations on cost saving features 5. Maintain security 6. Run and Test QA There is not much work initially so I expect you to be honest with time expectation. I also know that the ongoing monthly relationship will be minimal but I would like to keep an active open engagement as the business is built.
Skills: Internet Security Data Backup Database Administration English
Fixed-Price - Expert ($$$) - Est. Budget: $1,000 - Posted
We need an expert who suggest and setup a professional encryption system for our company. Environment: mainly Windows Computers, some Debian Desktop computers and Debian 2 Servers. We prefer standard alone software or software with server running on a linux server. The workers at the company should not be able to to copy or send any data from the computer. You should suggest a very safe solution, assist us to buy it and make about 3 or more installation for us via remote control.
Skills: Internet Security Cryptography Linux System Administration Network Security
Fixed-Price - Expert ($$$) - Est. Budget: $40 - Posted
Website has been suspended from host due to Malware/suspicious content. Firstly I would like to remove the Malware plus know how it got in and how to stop future breaches with security suggestions. Files in question are: /paypal.com-secure.verified-by.paypal.cgi-bin.dispute-account /update-your-paypal-informations.secure.verified-by.paypal Only highly experienced candidates with a high quality score and history will be considered. We run a web company and this is one of our own websites so we are also looking for someone we can add to our team for future issues. Thanks
Skills: Internet Security Malware