Security Engineering Jobs

28 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Expert ($$$) - Est. Time: Less than 1 month, Less than 10 hrs/week - Posted
We are looking for a qualified expert in the digital signature space who can help guide our company's finishing touches on our own web-based digital signature application. Qualified applicants MUST know American contract law as it relates to digital signatures and MUST have experience guiding esignature companies or developing them. Please tell me what are the main components of a valid digital signature, and your experience implementing or overseeing these. Qualified applicants will be followed up and receive additional requirements.
Skills: Security Engineering Adobe PDF PHP
Fixed-Price - Expert ($$$) - Est. Budget: $400 - Posted
Hi I'm looking of a clear crisp, to the point and practical guide for Malware Removal Tutorial covering following chapters. You can suggest an addition and subtraction in the TOC before we proceed to write this tutorial Malware Overview How Malware works? Types of Malware's Viruses, Spyware & Malware Malware detection techniques Preparation for Removal Malware Removal Process Malware Protection Managing Malware Risks Walware Removal Tools Root-Kit McAfee Stinger HijackThis Malwarebytes Anti-Malware BitDefender Internet Security Panda Free Antivirus Spybot Search & Destroy Ad-Aware Free Antivirus+ AVG Antivirus 2015 SUPERAntiSpyware Microsoft Security Essentials.
Skills: Security Engineering Antispam and Antivirus Certified Information Systems Security Professional (CISSP) Information Security
Hourly - Entry Level ($) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
We want to take seamonkey or Firefox and create a new version of the TOR browser The new features we want to add to this portable artifact software are: Being Portable To use HAproxy or Foxyproxy to being able to go TOR,I2P,, Freenet,Zeronet and other hidden services. To have installed some security functions like addons. To have capability to being update without breaking itself. To be customized for portability and antivirus 2 Versions of the portable framework a) Windows xp,7,10 portability is required. b) Linux Ubuntu debian portability is required.
Skills: Security Engineering Browserify C++ haproxy
Fixed-Price - Expert ($$$) - Est. Budget: $200 - Posted
We need a security expert with very strong security skills within banking and finance. This is a job to respond to a security review on future secuirty initiatives. There will be a report to read and about 12 questions each with varying degrees of complexity. This is also about 2 factor authentication and payments security authentication for each recommendation which you make after reading the review your response must be in the following format respond to the question stated;  indicate the specific point to which a comment relates;  contain a clear rationale;  provide evidence to support the views expressed/ rationale proposed; and  describe any alternative regulatory choices we should consider. This work for the right person can be done in a day or so. depending on your skills and knowledge
Skills: Security Engineering Certified Information Systems Security Professional (CISSP) Information Security Internet Security
Fixed-Price - Expert ($$$) - Est. Budget: $500 - Posted
I have lost the bitlocker password for a USB driver which has important information i would like to retrieve. i know it is virtually impossible to break the bitlocker encryption, however, i do remember the password structure. It is something around: P@ssw0rd!1 P@ssW0rd!1 p@ssW0rd!1 p@ssword!1 And so on and so forth. Maybe 1/2/3/4 extra characters in the end, but not more than that. I am not sure which letters are uppercase or lowercase, or whether it's using @/a/A, or o/O/0. But i'm 100% positive the word is "Password" spelled in some way and there might be up to 4 characters extra after the "Password". I know for a fact that it makes the decryption a lot easier by some type of brute-force, probably using a script to generate all the possible combinations for "Password + 4 characters" and running them against the bitlocker encryption. Are you up to this challenge? ;)
Skills: Security Engineering Bash shell scripting Unix
Hourly - Expert ($$$) - Est. Time: 3 to 6 months, Less than 10 hrs/week - Posted
We produce software for a publicly-traded American company. We are using our own proprietary software but need to take some steps to ensure that our database, servers, and code are properly secure and can pass some internal, as well as their audits. We are particularly concerned about our software's ability to be certified as "SOX Compliant". We are looking for a security expert who can simultaneously find the the vulnerabilities in our software, and then recommend solutions for them. Our team will need guidance and direction in hardening all aspects of the software. I would expect you to have certifications and demonstrated expertise in the field of data and software security. Please share your experience, and how you could help us secure our software to satisfy our growing list of clients.
Skills: Security Engineering Cloud Security Framework Security Analysis