Internet Security Jobs

93 were found based on your criteria {{|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Expert ($$$) - Est. Budget: $150 - Posted
I have a data processing application running in my home that I use to gather specific files from several sources on the web, run some processing, and produce daily reports from the processed data. I then push these files to a web server (dedicated server hosted by Codero). My single client then visits my website and pulls the files on a daily basis. I am creating a new portal that will point to the source database directly, and allow the client to pull their own files and browse and pull the intermediate data for reporting and analysis. Since this is my only client, I would like to eliminate the web server, and either host the whole app on the remote server or use something like AWS. I need the connection to be secure, and access limited to the client and to me. The system should be cheap and secure (always, right?) I would like someone to take a look at the more detailed system architecture (provided once selected) and produce a 1 to 3 page report providing some options and reasonable guidance on implementation (or links to available guides). You should have knowledge in web security, Amazon AWS, redundancy (database replication), virtualization, and server hosting.
Skills: Internet Security Amazon Web Services Data Backup database management
Hourly - Entry Level ($) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
We want to take TOR browser Firefox and create a new version with new features we want to add to this portable artifact: Being Portable . To use HAproxy or Foxyproxy to being able to route http to TOR, I2P, Freenet, Zeronet and other hidden services. To have installed some security functions like addons. To have capability to being update without breaking itself. To be customized for portability and antivirus 2 Versions of the portable framework a) Windows xp,7,10 portability is required. b) Linux Ubuntu Debian portability is required. We wont built a browser from scratch we use existing one firefox The target is to build a portable framework in a usb stick that can run in linux and Windows that have the capability to runs under authenticated corporate proxy via some automated adjustments by initial GUI wizards.The browswer can use i2p,freenet and tor natively and those engines need to take the proxy settings from the initial wizard The browsers knows how to route every different dartknet with tolos like foxyproxy Additional project targets: The browser need to be deactivated hsts Need to retrieve a CA from another machine via ssh and install it automatically from the GUI in the initial wizard. The browser need to have a small wizard initially The browsers: Linux and windows need to be embed in a usbstick encrypted with an existing encryption framework we could use that also need to be portable Is the dev of a privacy tool and is a long time project, and we can use a lot of pre existing project to continue dev them or use them as basement of ideas. We don't dev things from scratch we don't have time. We will use and adjust existing code
Skills: Internet Security Browserify C++ haproxy
Hourly - Intermediate ($$) - Est. Time: 3 to 6 months, Less than 10 hrs/week - Posted
I am looking for 3 dedicated freelance writers to help put together a book on cyber extortion. The book will have 9 chapters total, each chapter containing 35-45 pages. There is already a set schedule so the freelancer will just need to deliver the pages needed per chapter. I will send the detailed outline for the book separately, but here's a quick summary for what we want to achieve: --- Digital Extortion- This will be a step-by-step guide that will start with the fundamentals digital or cyber extortion and the various techniques used by hackers to demand ransom from an organization. We will also focus on types of ransomware and how it can infect your computer, mobile, cloud, server and IoT. This practical guide will teach the readers how to eliminate such attacks. We will be leveraging many open source tools. Audience: We will be targeting IT security managers, IT security engineers, security analysts, and professionals who have heard of digital extortion but are not aware of its various types, techniques, and its business impact. They are eager to avoid such attacks on themselves or their organizations.
Skills: Internet Security Content Writing Technical writing
Fixed-Price - Intermediate ($$) - Est. Budget: $50 - Posted
Hi, I have been using many proxy bypass tools like HMA, & so many & they get blacklisted soon. So I want to have my own way of creating a server quickly & have proxies. Message me in details if you can setup this for me & let me know what I must have webhost etc... Thanks
Skills: Internet Security haproxy
Hourly - Intermediate ($$) - Est. Time: 3 to 6 months, 10-30 hrs/week - Posted
You should have following skills and minimum 5 years of experience in Internet security and IT field. - AWS security - linux security for cloud app - security audits - back up - firewalls, ports, hacking attack alert tools etc We need someone to do security audits and help us improve our already strong security.
Skills: Internet Security Amazon Web Services Information Security