Internet Security Jobs

50 were found based on your criteria {{|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Expert ($$$) - Est. Budget: $600 - Posted
Hi I'm looking of a clear crisp, to the point and practical guide for Mobile Security Tutorial covering following chapters: Chapter 1 : Introduction To Mobile Security Chapter 2 : Mobile Platform Attack Vectors (a) What’s An Attack Vector? (b) Consequences of Attack Vectors ? (c) Anatomy of a Mobile Attack (d) How a Hacker can Profit from Mobile when Successfully Compromised (e) Vulnerable Areas in Mobile Business Environment (f) OWASP Mobile Top 10 Risks Chapter 3: App Stores And Security Issues (a) Common Security Issues Facing App Store (b) App Sandboxing Issues Chapter 4 : Introduction To Mobile Spam (a) SMS Phishing Attack (SMiShing) (Targeted Attack Scan) (b) Why SMS Phishing is Effective? (c) SMS Phishing Attack Examples (d) Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections (e) Prevention And Solutions Chapter 5(i) : Introduction To Android OS (a) Android OS Architecture (b) Android Device Administration API (c) Android Vulnerabilities (ii) Android Rooting (a) Android Rooting Tools (b) Rooting Android Phones using SuperOneClick Rooting (c) Android Phones Using Superboot (d) The Importance of Rooting Android Devices (iii) Android Trojan (a) ZitMo (ZeuS-in-the-Mobile) (b) FakeToken and TRAMP.A (c) Fakedefender and Obad (d) FakeInst and OpFake (e) AndroRAT and Dendroid Chapter 6 : Securing Android Devices (i) Google Apps Device Policy (ii) Remote Wipe Service: Remote Wipe Chapter 7 : Android Security Tools (a) DroidSheep Guard (b) TrustGo Mobile Security and Sophos Mobile Security (c) 360 security, AVL, and Avira Antivirus Security (d) Android Vulnerability Scanner: X- (e) Android Device Tracking Tools Chapter 8 : Introduction To iOS ( Apple iOS ) (i) Jailbreaking iOS (a)Types of Jailbreaking (b)Jailbreaking Techniques (c)App Platform for Jailbroaken Devices: Cydia (d)Jailbreaking Tool: Pangu (e)Untethered Jailbreaking of iOS 7.1.1/7.1.2 Using Pangu for Mac (ii)Jailbreaking Tools (a) Redsn0w and Absinthe (b) evasi0n7 and GeekSn0w (c) Sn0wbreeze and PwnageTool (d) LimeRa1n and Blackra1n Chapter 9 : Guidelines for Securing iOS Devices iOS Device Tracking Tools Chapter 10 : Introduction To Windows OS (i) Windows Phone 8 Architecture (ii) Secure Boot Process (iii) Guidelines for Securing Windows OS Devices (iv) Windows OS Device Tracking Tool: FollowMee GPS Tracker Chapter 11 : Introduction To Blackberry Operating System (i) BlackBerry Enterprise Solution Architecture ( a) Blackberry Attack Vectors (i) Malicious Code Signing (ii) JAD File Exploits and Memory/ Processes Manipulations (iii) Short Message Service (SMS) Exploits (iv) Email Exploits (v) PIM Data Attacks and TCP/IP Connections Vulnerabilities Chapter 12 : Guidelines for Securing BlackBerry Devices (a) BlackBerry Device Tracking Tools: MobileTracker and Position Logic Blackberry Tracker (b) Mobile Spyware: mSpy and StealthGenie (c) Mobile Spyware Chapter 13 : Mobile Device Management (MDM) MDM Solution: MaaS360 Mobile Device Management (MDM) MDM Solutions (a) Bring Your Own Device (BYOD) (i) BYOD Risks (ii) BYOD Policy Implementation (iii) BYOD Security Guidelines for Administrator (iv) BYOD Security Guidelines for Employee Chapter 14 : Mobile Security Guidelines and Tools (a) General Guidelines for Mobile Platform Security (b) Mobile Device Security Guidelines for Administrator (c) SMS Phishing Countermeasures (d) Mobile Protection Tool (i) BullGuard Mobile Security (ii) Lookout (iii) WISeID (iv) zIPS (e) Mobile Anti-Spyware Chapter 15 : (i) Mobile Pen Testing (a) Android Phone Pen Testing (b) iPhone Pen Testing (c) Windows Phone Pen Testing (d) BlackBerry Pen Testing (ii) Mobile Pen Testing Toolkit (a) zANTI (b) dSploit (c) Hackode (The Hacker's Toolbox) Glossary : Mobile Security Terminology
Skills: Internet Security Certified Information Systems Security Professional (CISSP) Mobile Programming Network Security
Fixed-Price - Expert ($$$) - Est. Budget: $3,500 - Posted
product management, social media, back links, content, pictures, template, portfolio, marketing, social email marketing, permalink, structure, speed is fast, user friendly, able to work with computer apple, tablet, android or apple, or any mobile device. Needs to have an account they can sign up for to show product history and purchase history and how many points they have and keep record of information for shipping and link to paypal account as well, apple page, bitcoins etc. This site needs search work, keyword phrases, super high security and let the customers know that this site is super secure and promote any special that is going on every day. This site must maintain relevant, keep it at number one. Must have great content, drop down boxes, product search, search refine, sitemap, home page, template, product page for juice, menu top and bottom, all content must be copywriter even the photos must contain watermarks and tracebacks. This site must be able to link to an app. It must have contact info and page for wholesale information entry, just have data entry for arm and customer loyalty and rewards, this site must be integrated with It needs to be able to receive payment from either check or card or cash wire transfer or direct deposit. I need this site to track inventory and shipment customer information and my information and ip address and make sure that it remains secure. I need to be able to add blog, comment, video review, product, special do live chat whatever needs to be done. I want this site linked with all social media and show the product, I want it integrated with google business, youtube and analytics. I want to see the traffic coming to my site where it is coming from and the conversion ratio to bounce and It must have 18 or older to enter. Show the disclaimer of nicotine at the bottom of the page. I need it linked to pages that I am linked to with a picture for promotional advertising. I need attributes, variations, sizes, colors, quantity, box size, weight integrated, on site set and off site, user profile and reviews, upload video content for vape squad basically everything.
Skills: Internet Security Business Management Content Management System COSMO-RS Chemical Engineering
Hourly - Expert ($$$) - Est. Time: Less than 1 month, 10-30 hrs/week - Posted
We are launching a new e-commerce website and looking for experienced technical web QA testers to give us constructive feedback as we prepare to go live. The usual QA testing — test in multiple browsers, various screen sizes, detailed QA report, bug description and feedback for user experience. In addition, we would like feedback for load testing to ensure we are prepared to handle high traffic. And test hacking into our site to ensure site security.
Skills: Internet Security Load testing Software QA Testing
Fixed-Price - Expert ($$$) - Est. Budget: $100 - Posted
I'm having trouble with webpage in on our intranet where the webpage is not displaying correct in Internet Explorer 11 but it's fine in Chrome and Firefox. This webpage used to work OK in both systems. The system is setup in IIS. You should be familiar with Internet Explorer, Chrome, Dev Tools for both, IIS, Security Settings, Compatibility Settings, possible Group Policies to make this work. You take you less than 1 hour to resolve. Must resolve in order to get compensated. Paul
Skills: Internet Security Internet Information Services (IIS) JavaScript
Hourly - Expert ($$$) - Est. Time: Less than 1 month, Less than 10 hrs/week - Posted
We are looking for an experienced Network Security Consultant, who will analyze and consult us to enhance our current security practices and to use the latest techniques to mitigate the security risks. Requirements : 8+ years of practical experience in information security and administration, including penetration testing and incident response. Expert with Network security engineering experience with Juniper SRX, Cisco ASA/ Pix firewalls Strong knowledge on IDS/IPS, DDOS and traffic mitigation techniques Experience working with distributed, complex enterprise deployments including: multi-tiered environments, virtualization technologies, operating systems, routing, monitoring, storage connectivity, capacity planning, backups, network security Security certifications (CISA, CISM, CISSP, CEH, ISSA, ISACA, SANS, etc.) are a plus to show a well-rounded security background.
Skills: Internet Security Cloud Security Framework Information Security Network Security
Hourly - Intermediate ($$) - Est. Time: More than 6 months, 30+ hrs/week - Posted
We have a team of experts in Security and looking to add additional headcount to the team. The candidate should understand Linux, Windows and have a very good networking background with good core skills in the cyber security space. They will be part of a team to monitor security for clients all over the world.
Skills: Internet Security Certified Information Systems Security Professional (CISSP) Linux System Administration Network Security
Fixed-Price - Expert ($$$) - Est. Budget: $3,900 - Posted
Our company name is Hapi Networks, this is our logo-> :) We believe our product and team are incredible and will help many people. We're seeking a beyond awesome developer(s) that has expertise and can quickly build the following: 1. JHipster Java Backend Spring Boot/MVC/Security/Data, Postgres, Hazelcast, elastic cloud, AngularJS 2 Admin Panel 2. Ionic 2 Mobile App (~15 screens) GPS, Camera, Payment, Internationalization 3. AngularJS 2 Customer Website (~4 static, ~2 dynamic pages) Industry best practices (e.g. self documenting code, unit, itest, end-to-end tests) are required. The mockups and JHipster core are nearly complete and good enough to get started on the project right away. Our coders are busy with other things but can help out if needed (you should be able to handle 95%+ of the work).
Skills: Internet Security Amazon EC2 Android AngularJS
Fixed Price Budget - Entry Level ($) - $1 to $300 - Posted
Hello, I have many websites, some of them are done from scratch and others with frameworks or cms. I would like an expert in security to prevent me from hacking, fishing, and other network vulnerabilities that could make the website slow or that can put a virus on website killing the seo. I would like someone expert who can analysis those vulnerabilities, tell us what kind of vulnerabilties we have and to protect us from them. After the security done, we will try the security and it should be safe.
Skills: Internet Security Information Security