Security Analysis Jobs

62 were found based on your criteria {{|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Intermediate ($$) - Est. Time: 1 to 3 months, 10-30 hrs/week - Posted
We require an Iraqi Arabic and English fluent researcher to find recent and current (2015-2016), compelling, primary source, credible materials about the political, social and security conditions in Iraq - the whole of Iraq, and especially Basra and Basrah Province. This is for the purposes of a refugee claim/complementary protection claim. The client has recommended that we engage an Iraqi researcher, who intimately understands the conditions in Iraq. We need to find evidence to show specific targeting of the following classes of people in Iraq: o People who have worked as Iraqi/US/UK government linked contractors; o People with imputed political opinions – supporting the Iraqi government, and foreign governments – especially those of the USA and the UK o Non-practising Shia Muslims o Shia Muslims, in the context of the fatwa issued by Shia leading cleric Grand Ayatollah Ali Al-Sistani السيد علي الحسيني السيستاني  That the fatwa means that able bodied Shia males of fighting age will be conscripted and forced to fight against the Sunni Da’Esh/ISIL/ISIS, wherever they might be in Iraq, in the ongoing religious war – that this fatwa applies to the entirety of Iraq  If Shia Muslims do not fight as ordered, they will be perceived as against the fatwa and against Shia Islam, and will be targeted because of this o Failed asylum seekers returning to Iraq We need to find current evidence of: o The deteriorating security situation in Basra and Iraq generally – including the withdrawal of Iraqi military forces to the offensive in the North, and the subsequent tribal fighting and in-fighting amongst resurging tribes (families) in the South and throughout Iraq  Including the resurgence of Muqtada al Sadr, and the Mahdi Army, which was a major threat to Basra previously o Risk of kidnapping in Basra due to lawlessness and the deteriorating security situation o Any and all other current and foreseeable future threats to the safety people returning to Iraq. Materials in Arabic should be those that are otherwise unavailable in English, especially local Iraqi Arabic articles from credible sources, evidencing the above. We will arrange translations as necessary.
Skills: Security Analysis Arabic English International Law
Hourly - Intermediate ($$) - Est. Time: Less than 1 week, Less than 10 hrs/week - Posted
Security Specialist with 2 years experience in Web hosting and Linux Server Management. Wordpress security/Malware Removal/Wordpress hacked recovery. Wordpress website migration/transfer/cloning. Google Blacklist/warning removal. Web/Graphic designing. Database management.
Skills: Security Analysis
Hourly - Expert ($$$) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
We are looking for somebody with experience in linux netwokring troubleshooting for : ecapguardian Nginx reverse url rewrites squid advanced Iptables and open dpi advanced Dockers Snort,suricata,broids elastic Hardening apps and OS Antiexploitation tools like SElinux,Apparmor,grSecurity
Skills: Security Analysis Docker Embedded Linux haproxy
Hourly - Intermediate ($$) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
Netfone require a PHP/MySQL dev with a strong Linux background, understanding of networking protocols and security principles. Asterisk knowledge is a strong advantage. Your communication will be excellent, and you will be online for short Skype chats at some point 7am to 7pm New Zealand time. Availability in case of emergencies 24/7 is an advantage (hardly ever required).
Skills: Security Analysis Asterisk MySQL Programming PHP
Fixed-Price - Expert ($$$) - Est. Budget: $150 - Posted
To create a multiple choice questions test on Ethical Hacking . Questions count – 60 The quality of questions should be such that only the candidates well aware about the practical aspects of the subject should be able to pass. Type - Questions divided into three levels- medium, hard,too hard Multiple Choice questions required to be developed with copyright free original content . The questions can have MCQ's based on practical knowledge(image based,code snippets) as well on the topic. The questions to have minimum four answer options each. No True and False Statements. No Trivia questions. Review: The subject matter expert will be required to review the test on the live server and point out any corrections, once the test is uploaded Feedback: The subject matter expert will make revisions to the feedback shared for the content developed before final approval. The subject matter expert will help us in resolving any feedback received from the test takers within 3 months of uploading the test. Steps: Deliverable: Required in a word file in the required format (format will be provided) 1. Signing the NDA 2. Develop questions as per the agreed upon test outline. 3. Submit the deliverable in a word file 4. Run the test and review the questionnaire once live 6. Point out any improvements/errors during the final review.
Skills: Security Analysis Certified Information Systems Security Professional (CISSP) Firewall Internet Security
Fixed-Price - Expert ($$$) - Est. Budget: $800 - Posted
I have a Samsung Galaxy S7 with an unknown password/passcode. I have made a RAW image file of the entire 32GB memory. I would like the image file decrypted/encryption removed. As part of this project ,i would like a program/utility developed to do this again for other image files and the full source code provided to me. Other experts claim this can be done and have been able to do this. This is being used only for ethical purposes. No upfront payment will be offered, only payment upon testing the solution. If you can show me your solution works, 50% will be paid then 50% will be paid once the source code has been provided to me, then after it has been received and confirmed to be a valid source code for the software, the remaining 50% will be completed. I need this completed within 7 days.
Skills: Security Analysis Data Analytics Data Encoding Internet Security