Security Engineering Jobs

11 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Expert ($$$) - Est. Budget: $600 - Posted
Hi I'm looking of a clear crisp, to the point and practical guide for Metasploit Tutorial covering following chapters: Metasploit - Home Metasploit - Introduction Metasploit - Environment Setup Metasploit - Vulnerable Target Metasploit - Discovery Scan Metasploit - Importing Data Metasploit - Vulnerability Scan Metasploit - Vulnerability Validation Metasploit - Exploitation Metasploit - Payload Metasploit - Credentials Metasploit - Bruteforce Attacks Metasploit - MetaModules Metasploit - Social Engineering Metasploit - Reports Metasploit - Task Chains Metasploit - Data Export Metasploit - Pro Console Metasploit - Framework Metasploit - REST API
Skills: Security Engineering Certified Information Systems Security Professional (CISSP) Information Security Network Security
Hourly - Intermediate ($$) - Est. Time: Less than 1 month, 10-30 hrs/week - Posted
Looking for an experienced video analytics developer to assist in developing video analytics for that will identify person(s) wearing specific make, model, and coloring of high visibility traffic vests used when working on or around railroad lines and bridges. The analytics will need to identify these individuals wearing this specific vest style and prevent the motion detection analytics and other used analytics from initiating an alarm on the system when a person wearing this vest stands, loiters, or passes line barriers at or near the static, ptz, and/or thermal imaging cameras. This is one analytic that will be needed for this project. Depending upon the capabilities of the developer hired, there may be additional work on this project in other areas of video analytics.
Skills: Security Engineering Analytics Artificial Intelligence Machine learning
Fixed-Price - Expert ($$$) - Est. Budget: $500 - Posted
Hi I'm looking of a clear crisp, to the point and practical articles on Ethical Hacking related subjects covering following: (1) Reconnaissance (2) Sniffing Traffic (3) Exploitation (4) Enumerations (5) Metasploit (6) Trojan Attacks (7) TCP/IP Hijacking (8) Email Hijacking (9) Hacking Password ( Dictionary Attacks, Brute Force Attack, Rainbow Table, Phishing Attack, Counter Measures ) (10) Wireless Hacking ( Wireless Network Basics, Wireless Sniffing, Wired Equivalence Privacy, Wi-Fi Protected Access, Denial of Service Attacks, Counter Measures) All the concepts needs to be explained with example w.r.t. to a machine running Linux operating system.
Skills: Security Engineering Certified Information Systems Security Professional (CISSP) Information Security Internet Security
Fixed-Price - Expert ($$$) - Est. Budget: $200 - Posted
Hello, i need you to check fully my PHP website, and Database. I want that the website dont have any trouble with securtiy. You should check if evrything is fine programmed, and if it is safe. Also you should check if the encryption is maked good.
Skills: Security Engineering Security Analysis
Fixed-Price - Expert ($$$) - Est. Budget: $600 - Posted
Hi I'm looking of a clear crisp, to the point and practical guide for Mobile Security Tutorial covering following chapters: Chapter 1 : Introduction To Mobile Security Chapter 2 : Mobile Platform Attack Vectors (a) What’s An Attack Vector? (b) Consequences of Attack Vectors ? (c) Anatomy of a Mobile Attack (d) How a Hacker can Profit from Mobile when Successfully Compromised (e) Vulnerable Areas in Mobile Business Environment (f) OWASP Mobile Top 10 Risks Chapter 3: App Stores And Security Issues (a) Common Security Issues Facing App Store (b) App Sandboxing Issues Chapter 4 : Introduction To Mobile Spam (a) SMS Phishing Attack (SMiShing) (Targeted Attack Scan) (b) Why SMS Phishing is Effective? (c) SMS Phishing Attack Examples (d) Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections (e) Prevention And Solutions Chapter 5(i) : Introduction To Android OS (a) Android OS Architecture (b) Android Device Administration API (c) Android Vulnerabilities (ii) Android Rooting (a) Android Rooting Tools (b) Rooting Android Phones using SuperOneClick Rooting (c) Android Phones Using Superboot (d) The Importance of Rooting Android Devices (iii) Android Trojan (a) ZitMo (ZeuS-in-the-Mobile) (b) FakeToken and TRAMP.A (c) Fakedefender and Obad (d) FakeInst and OpFake (e) AndroRAT and Dendroid Chapter 6 : Securing Android Devices (i) Google Apps Device Policy (ii) Remote Wipe Service: Remote Wipe Chapter 7 : Android Security Tools (a) DroidSheep Guard (b) TrustGo Mobile Security and Sophos Mobile Security (c) 360 security, AVL, and Avira Antivirus Security (d) Android Vulnerability Scanner: X- (e) Android Device Tracking Tools Chapter 8 : Introduction To iOS ( Apple iOS ) (i) Jailbreaking iOS (a)Types of Jailbreaking (b)Jailbreaking Techniques (c)App Platform for Jailbroaken Devices: Cydia (d)Jailbreaking Tool: Pangu (e)Untethered Jailbreaking of iOS 7.1.1/7.1.2 Using Pangu for Mac (ii)Jailbreaking Tools (a) Redsn0w and Absinthe (b) evasi0n7 and GeekSn0w (c) Sn0wbreeze and PwnageTool (d) LimeRa1n and Blackra1n Chapter 9 : Guidelines for Securing iOS Devices iOS Device Tracking Tools Chapter 10 : Introduction To Windows OS (i) Windows Phone 8 Architecture (ii) Secure Boot Process (iii) Guidelines for Securing Windows OS Devices (iv) Windows OS Device Tracking Tool: FollowMee GPS Tracker Chapter 11 : Introduction To Blackberry Operating System (i) BlackBerry Enterprise Solution Architecture ( a) Blackberry Attack Vectors (i) Malicious Code Signing (ii) JAD File Exploits and Memory/ Processes Manipulations (iii) Short Message Service (SMS) Exploits (iv) Email Exploits (v) PIM Data Attacks and TCP/IP Connections Vulnerabilities Chapter 12 : Guidelines for Securing BlackBerry Devices (a) BlackBerry Device Tracking Tools: MobileTracker and Position Logic Blackberry Tracker (b) Mobile Spyware: mSpy and StealthGenie (c) Mobile Spyware Chapter 13 : Mobile Device Management (MDM) MDM Solution: MaaS360 Mobile Device Management (MDM) MDM Solutions (a) Bring Your Own Device (BYOD) (i) BYOD Risks (ii) BYOD Policy Implementation (iii) BYOD Security Guidelines for Administrator (iv) BYOD Security Guidelines for Employee Chapter 14 : Mobile Security Guidelines and Tools (a) General Guidelines for Mobile Platform Security (b) Mobile Device Security Guidelines for Administrator (c) SMS Phishing Countermeasures (d) Mobile Protection Tool (i) BullGuard Mobile Security (ii) Lookout (iii) WISeID (iv) zIPS (e) Mobile Anti-Spyware Chapter 15 : (i) Mobile Pen Testing (a) Android Phone Pen Testing (b) iPhone Pen Testing (c) Windows Phone Pen Testing (d) BlackBerry Pen Testing (ii) Mobile Pen Testing Toolkit (a) zANTI (b) dSploit (c) Hackode (The Hacker's Toolbox) Glossary : Mobile Security Terminology
Skills: Security Engineering Certified Information Systems Security Professional (CISSP) Internet Security Mobile Programming
Fixed-Price - Expert ($$$) - Est. Budget: $200 - Posted
I need a Java developer with extensive security knowledge to build a secure authentication mechanism using Java to use with my website. Right now I'm using a simple service that returns a session identifier appended to the url, but this can easily be faked if I copy/paste this url into another device, system accepts authentication. I switched to a cookie-based solution but again.. it's not secure. So, please only bid if you really know about the subject. Please describe a short and clear technical solution proposal to solve this. Will hire the best and SECURE proposal.
Skills: Security Engineering Java
Fixed-Price - Expert ($$$) - Est. Budget: $3,000 - Posted
Job Title: Solutions Engineer Department: Solutions Engineering & Services Reports To: CTO & VP of IT Engineering Cornerstone has formed an amazing team of IT consultants, architects, and engineers with deep and broad knowledge in the technologies we specialize in. Having formed a team that loves to work together, we are looking to expand our team with those that will contribute knowledge, experience, and energy into our group. Many will apply but only a select few will truly be up for the challenge. Are you ready? We regularly do projects that include firewalls (SonicWall, Palo Alto Networks, Cisco ASA, and Fortinet) and need a remote firewall expert to perform the work for us. Work will include setup, configuration, deployment, and testing of various firewalls and firewall features. All work to be performed remotely for customers in Silicon Valley, CA. Some work may need to be done onsite. The following qualifications are REQUIRED. Skilled in and experienced with: - Firewalls: SonicWall, Fortinet, Cisco ASA, Palo Alto Networks - VPN tunnels with clients and site-to-site VPNs - AD Integration - Deployment and installation of firewall reporting systems (e.g. Sonicwall GMS) Logistics of the project: We normally have an onsite architect that specified the solution and will do the knowledge transfer. ********** Company Background ******************* Cornerstone Technologies LLC is a fast growing IT Engineering Services company in Silicon Valley, CA. Founded in 2007, the company has established itself with a strong reputation in developing and architecting IT solutions for medium to large, multinational companies. We are at team of experienced IT-centric professionals that care deeply about doing things right for our customers.
Skills: Security Engineering Active Directory Firewall Network Administration