Internet Security Jobs

47 were found based on your criteria {{|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Entry Level ($) - Est. Time: 1 to 3 months, 30+ hrs/week - Posted
Hello, I search a very good developper for create a add-on and create a new plugin for Wordpress. The add-on plugin is for UserPro plugin. The freelance need the skill on security web, for change the source gateway payement, in the plugin UserPro Payement. 2 month work. URGENT Best regards Thomas BONSIRVEN
Skills: Internet Security PHP WordPress
Fixed-Price - Intermediate ($$) - Est. Budget: $30 - Posted
Hello, It seems that two of my websites (wordpress based) have been infected. I need someone expert who can help me in cleaning these malware. I would like a long-term solution that prevents this recurring breach and shores up any other vulnerabilities. I have other websites too, so that would be an ongoing task for the person with best expertise. Thanks
Skills: Internet Security WordPress
Fixed-Price - Expert ($$$) - Est. Budget: $600 - Posted
Hi I'm looking of a clear crisp, to the point and practical guide for Mobile Security Tutorial covering following chapters: Chapter 1 : Introduction To Mobile Security Chapter 2 : Mobile Platform Attack Vectors (a) What’s An Attack Vector? (b) Consequences of Attack Vectors ? (c) Anatomy of a Mobile Attack (d) How a Hacker can Profit from Mobile when Successfully Compromised (e) Vulnerable Areas in Mobile Business Environment (f) OWASP Mobile Top 10 Risks Chapter 3: App Stores And Security Issues (a) Common Security Issues Facing App Store (b) App Sandboxing Issues Chapter 4 : Introduction To Mobile Spam (a) SMS Phishing Attack (SMiShing) (Targeted Attack Scan) (b) Why SMS Phishing is Effective? (c) SMS Phishing Attack Examples (d) Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections (e) Prevention And Solutions Chapter 5(i) : Introduction To Android OS (a) Android OS Architecture (b) Android Device Administration API (c) Android Vulnerabilities (ii) Android Rooting (a) Android Rooting Tools (b) Rooting Android Phones using SuperOneClick Rooting (c) Android Phones Using Superboot (d) The Importance of Rooting Android Devices (iii) Android Trojan (a) ZitMo (ZeuS-in-the-Mobile) (b) FakeToken and TRAMP.A (c) Fakedefender and Obad (d) FakeInst and OpFake (e) AndroRAT and Dendroid Chapter 6 : Securing Android Devices (i) Google Apps Device Policy (ii) Remote Wipe Service: Remote Wipe Chapter 7 : Android Security Tools (a) DroidSheep Guard (b) TrustGo Mobile Security and Sophos Mobile Security (c) 360 security, AVL, and Avira Antivirus Security (d) Android Vulnerability Scanner: X- (e) Android Device Tracking Tools Chapter 8 : Introduction To iOS ( Apple iOS ) (i) Jailbreaking iOS (a)Types of Jailbreaking (b)Jailbreaking Techniques (c)App Platform for Jailbroaken Devices: Cydia (d)Jailbreaking Tool: Pangu (e)Untethered Jailbreaking of iOS 7.1.1/7.1.2 Using Pangu for Mac (ii)Jailbreaking Tools (a) Redsn0w and Absinthe (b) evasi0n7 and GeekSn0w (c) Sn0wbreeze and PwnageTool (d) LimeRa1n and Blackra1n Chapter 9 : Guidelines for Securing iOS Devices iOS Device Tracking Tools Chapter 10 : Introduction To Windows OS (i) Windows Phone 8 Architecture (ii) Secure Boot Process (iii) Guidelines for Securing Windows OS Devices (iv) Windows OS Device Tracking Tool: FollowMee GPS Tracker Chapter 11 : Introduction To Blackberry Operating System (i) BlackBerry Enterprise Solution Architecture ( a) Blackberry Attack Vectors (i) Malicious Code Signing (ii) JAD File Exploits and Memory/ Processes Manipulations (iii) Short Message Service (SMS) Exploits (iv) Email Exploits (v) PIM Data Attacks and TCP/IP Connections Vulnerabilities Chapter 12 : Guidelines for Securing BlackBerry Devices (a) BlackBerry Device Tracking Tools: MobileTracker and Position Logic Blackberry Tracker (b) Mobile Spyware: mSpy and StealthGenie (c) Mobile Spyware Chapter 13 : Mobile Device Management (MDM) MDM Solution: MaaS360 Mobile Device Management (MDM) MDM Solutions (a) Bring Your Own Device (BYOD) (i) BYOD Risks (ii) BYOD Policy Implementation (iii) BYOD Security Guidelines for Administrator (iv) BYOD Security Guidelines for Employee Chapter 14 : Mobile Security Guidelines and Tools (a) General Guidelines for Mobile Platform Security (b) Mobile Device Security Guidelines for Administrator (c) SMS Phishing Countermeasures (d) Mobile Protection Tool (i) BullGuard Mobile Security (ii) Lookout (iii) WISeID (iv) zIPS (e) Mobile Anti-Spyware Chapter 15 : (i) Mobile Pen Testing (a) Android Phone Pen Testing (b) iPhone Pen Testing (c) Windows Phone Pen Testing (d) BlackBerry Pen Testing (ii) Mobile Pen Testing Toolkit (a) zANTI (b) dSploit (c) Hackode (The Hacker's Toolbox) Glossary : Mobile Security Terminology
Skills: Internet Security Certified Information Systems Security Professional (CISSP) Mobile Programming Network Security
Fixed-Price - Expert ($$$) - Est. Budget: $3,500 - Posted
product management, social media, back links, content, pictures, template, portfolio, marketing, social email marketing, permalink, structure, speed is fast, user friendly, able to work with computer apple, tablet, android or apple, or any mobile device. Needs to have an account they can sign up for to show product history and purchase history and how many points they have and keep record of information for shipping and link to paypal account as well, apple page, bitcoins etc. This site needs search work, keyword phrases, super high security and let the customers know that this site is super secure and promote any special that is going on every day. This site must maintain relevant, keep it at number one. Must have great content, drop down boxes, product search, search refine, sitemap, home page, template, product page for juice, menu top and bottom, all content must be copywriter even the photos must contain watermarks and tracebacks. This site must be able to link to an app. It must have contact info and page for wholesale information entry, just have data entry for arm and customer loyalty and rewards, this site must be integrated with It needs to be able to receive payment from either check or card or cash wire transfer or direct deposit. I need this site to track inventory and shipment customer information and my information and ip address and make sure that it remains secure. I need to be able to add blog, comment, video review, product, special do live chat whatever needs to be done. I want this site linked with all social media and show the product, I want it integrated with google business, youtube and analytics. I want to see the traffic coming to my site where it is coming from and the conversion ratio to bounce and It must have 18 or older to enter. Show the disclaimer of nicotine at the bottom of the page. I need it linked to pages that I am linked to with a picture for promotional advertising. I need attributes, variations, sizes, colors, quantity, box size, weight integrated, on site set and off site, user profile and reviews, upload video content for vape squad basically everything.
Skills: Internet Security Business Management Content Management System COSMO-RS Chemical Engineering
Hourly - Expert ($$$) - Est. Time: Less than 1 month, 10-30 hrs/week - Posted
We are launching a new e-commerce website and looking for experienced technical web QA testers to give us constructive feedback as we prepare to go live. The usual QA testing — test in multiple browsers, various screen sizes, detailed QA report, bug description and feedback for user experience. In addition, we would like feedback for load testing to ensure we are prepared to handle high traffic. And test hacking into our site to ensure site security.
Skills: Internet Security Load testing Software QA Testing