You've landed at the right place. oDesk is now Upwork. Learn about the new platform.

Network Security Jobs

105 were found based on your criteria {{ paging.total | number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("hourly") | number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("fixed") | number:0}})
show all
only
only
only
show all
only
only
only
only
only
show all
only
only
only
Looking for the Team App?
Download the New Upwork Team App
Hourly - Expert ($$$) - Est. Time: 1 to 3 months, 30+ hrs/week - Posted
For one of our customers we are looking for a Palo Alto Networks Firewall Consultant to help them cleaning up Firewalls and make configuration changes. - Candidate Ideally based in California to be able to do some onsite trips or at least US based and willing to fly to California on occasions - US citizen or full work permit holder - Project Length: 2 months initially, likely follow up work Skills: - Very good skills on PAN Firewalls (preferably certified) - Fixing overlapping URLs - Rule configuration - Best practices
Skills: Network Security Firewall
Hourly - Expert ($$$) - Est. Time: 1 to 3 months, 30+ hrs/week - Posted
For one of our customers in the Washington DC Metro area, we look for a senior InfoSec consultant preferably CISSP on a contract basis to perform a GAP analysis Experience around Physical Security?(Access Control, CCTV etc.) Experience around Security Policies Experience around Security Audits and GAP Analysis Experience around ISO 27001 Experience around PCI Compliance Experience around HIPAA Compliance Experience around NIST Experience around FISMA Experience in Risk Management Experience around Network Security Architecture (i.e. Cisco, Juniper etc.) Excellent customer facing skills Excellent documentation skills Must be US citizen or legal resident with work permit in the US The role will be 2 - 3 months initially with a good chance of extension. Delegates don't have to live in DC, but it should be commutable (Maryland, Virginia etc.)
  • Number of freelancers needed: 2
Skills: Network Security Certified Information Systems Security Professional (CISSP) ITIL PCI Compliance
Hourly - Expert ($$$) - Est. Time: More than 6 months, 30+ hrs/week - Posted
Candidate will work in a team environment supporting network access control efforts and network security processes including Firewall Access Requests ( analysis, policy enforcement, education ), ACL maintenance, and provide support for all network access control project efforts and support. Candidate is expected to participate in a rotating on-call schedule providing 24/7 support no more than once a month. Education, Experience, and Certification • Bachelors degree in telecommunications, computer science, information technology or 5+ years of progressive technical training/experience is required • 5+ year experience in information security discipline with focus on network security theory and practice Required Skills • Strong working knowledge of Network Access Control and associated technologies. Experience with Cisco Identity Services Engine, Forescout, or Aruba a strong plus • Good working knowledge of Cisco ASAs including software versions 7.x, 8.x and 9.x. • In-depth understanding of the OSI Reference Model and its security implications • In-depth knowledge of networking, principles of routing, internet services and protocols and their security implications • Possess effective verbal and written communications as well as strong organizational skills • Must be capable of working well independently as well as in a highly collaborative team environment • Must be capable of designing, configuring, and maintaining network security devices with adherence to industry, best practice, and PCI standards. Desired Skills • Strong working knowledge of remote access types and their security implications • Working knowledge of various encryption algorithms and techniques • Working knowledge in system, UNIX, Windows, and network device administration • Experienced in the creation of technical documentation including discovery of devices, visio.
Skills: Network Security Cisco ASA cisco routers
Hourly - Intermediate ($$) - Est. Time: More than 6 months, Less than 10 hrs/week - Posted
Hello, I have a number of Wordpress sites running on Nginx on Unix in the Amazon cloud environment. I am currently using one security expert who is having trouble locking down the site. He is more of an analyst and does scans and adds plugins and looks at the Unix server settings and Nginx settings, but he is not a programmer and he is not very fast. What I am needing is someone who fully understands php code issues as they relate to the typical exploiting problems, like SQL Injection, XSS, CSRF Injection and more; AND knows how to fix them (modify the code without just throwing the code out completely), to plug the holes so there are no more exploitable holes. I would prefer if you are also an expert in Nginx and Unix and the Amazon back end. There sites are live in production sites and need to be secured and maintained. Thanks!
Skills: Network Security Amazon Web Services JavaScript Linux System Administration
Fixed-Price - Expert ($$$) - Est. Budget: $500 - Posted
Hi I'm looking of a clear crisp, to the point and practical guide for Mobile Security Tutorial covering following chapters: Chapter 1 : Introduction To Mobile Security Chapter 2 : Mobile Platform Attack Vectors (a) What’s An Attack Vector? (b) Consequences of Attack Vectors ? (c) Anatomy of a Mobile Attack (d) How a Hacker can Profit from Mobile when Successfully Compromised (e) Vulnerable Areas in Mobile Business Environment (f) OWASP Mobile Top 10 Risks Chapter 3: App Stores And Security Issues (a) Common Security Issues Facing App Store (b) App Sandboxing Issues Chapter 4 : Introduction To Mobile Spam (a) SMS Phishing Attack (SMiShing) (Targeted Attack Scan) (b) Why SMS Phishing is Effective? (c) SMS Phishing Attack Examples (d) Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections (e) Prevention And Solutions Chapter 5(i) : Introduction To Android OS (a) Android OS Architecture (b) Android Device Administration API (c) Android Vulnerabilities (ii) Android Rooting (a) Android Rooting Tools (b) Rooting Android Phones using SuperOneClick Rooting (c) Android Phones Using Superboot (d) The Importance of Rooting Android Devices (iii) Android Trojan (a) ZitMo (ZeuS-in-the-Mobile) (b) FakeToken and TRAMP.A (c) Fakedefender and Obad (d) FakeInst and OpFake (e) AndroRAT and Dendroid Chapter 6 : Securing Android Devices (i) Google Apps Device Policy (ii) Remote Wipe Service: Remote Wipe Chapter 7 : Android Security Tools (a) DroidSheep Guard (b) TrustGo Mobile Security and Sophos Mobile Security (c) 360 security, AVL, and Avira Antivirus Security (d) Android Vulnerability Scanner: X- (e) Android Device Tracking Tools Chapter 8 : Introduction To iOS ( Apple iOS ) (i) Jailbreaking iOS (a)Types of Jailbreaking (b)Jailbreaking Techniques (c)App Platform for Jailbroaken Devices: Cydia (d)Jailbreaking Tool: Pangu (e)Untethered Jailbreaking of iOS 7.1.1/7.1.2 Using Pangu for Mac (ii)Jailbreaking Tools (a) Redsn0w and Absinthe (b) evasi0n7 and GeekSn0w (c) Sn0wbreeze and PwnageTool (d) LimeRa1n and Blackra1n Chapter 9 : Guidelines for Securing iOS Devices iOS Device Tracking Tools Chapter 10 : Introduction To Windows OS (i) Windows Phone 8 Architecture (ii) Secure Boot Process (iii) Guidelines for Securing Windows OS Devices (iv) Windows OS Device Tracking Tool: FollowMee GPS Tracker Chapter 11 : Introduction To Blackberry Operating System (i) BlackBerry Enterprise Solution Architecture ( a) Blackberry Attack Vectors (i) Malicious Code Signing (ii) JAD File Exploits and Memory/ Processes Manipulations (iii) Short Message Service (SMS) Exploits (iv) Email Exploits (v) PIM Data Attacks and TCP/IP Connections Vulnerabilities Chapter 12 : Guidelines for Securing BlackBerry Devices (a) BlackBerry Device Tracking Tools: MobileTracker and Position Logic Blackberry Tracker (b) Mobile Spyware: mSpy and StealthGenie (c) Mobile Spyware Chapter 13 : Mobile Device Management (MDM) MDM Solution: MaaS360 Mobile Device Management (MDM) MDM Solutions (a) Bring Your Own Device (BYOD) (i) BYOD Risks (ii) BYOD Policy Implementation (iii) BYOD Security Guidelines for Administrator (iv) BYOD Security Guidelines for Employee Chapter 14 : Mobile Security Guidelines and Tools (a) General Guidelines for Mobile Platform Security (b) Mobile Device Security Guidelines for Administrator (c) SMS Phishing Countermeasures (d) Mobile Protection Tool (i) BullGuard Mobile Security (ii) Lookout (iii) WISeID (iv) zIPS (e) Mobile Anti-Spyware Chapter 15 : (i) Mobile Pen Testing (a) Android Phone Pen Testing (b) iPhone Pen Testing (c) Windows Phone Pen Testing (d) BlackBerry Pen Testing (ii) Mobile Pen Testing Toolkit (a) zANTI (b) dSploit (c) Hackode (The Hacker's Toolbox) Glossary : Mobile Security Terminology
Skills: Network Security Certified Information Systems Security Professional (CISSP) Internet Security Mobile Programming
Fixed-Price - Intermediate ($$) - Est. Budget: $50 - Posted
Research level: Medium Words: 800 Minimum Style: Informative/Journalistic Topics: Produce Your Own Native English: Yes Experience: Technology (Security/Big Data/IoT Experts) Benefits: Write For Well Known Community/Fix Rate + Bonus On Traffic Volume (Important)/Fast Growth - Higher Paying Assignments We are a growing technology community that is always on the lookout for Skilled, Efficient, Intelligent and compelling writers who can write naturally and effectively about trends in the world of new technology. The fixed rate per article is negotiable after a certain period of time is met. When applying consider the fact that the rate is a fixed rate + bonus on traffic volumes generated to your articles. This could substantially increase your rate of pay if people start discussing your work. If you plan on writing just for the fixed rate, it will best to not apply. We will require published samples of your work in order to be considered. The fixed rate is per article.
Skills: Network Security Article Writing Big Data Chicago Manual of Style
Looking for the Team App?
Download the New Upwork Team App
Fixed Price Budget - ${{ job.amount.amount | number:0 }} to ${{ job.maxAmount.amount | number:0 }} Fixed-Price - Est. Budget: ${{ job.amount.amount | number:0 }} Open to Suggestion Hourly - Est. Time: {{ [job.duration, job.engagement].join(', ') }} - Posted
Skills: {{ skill.prettyName }}
Looking for the Team App?
Download the New Upwork Team App