Vulnerability Assessment Jobs

25 were found based on your criteria {{|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Expert ($$$) - Est. Time: Less than 1 week, Less than 10 hrs/week - Posted
Hello, I need someone to add a logo animation to a existing Android Build. We are adding our logo to a current build and need someone to recompile so we do not get signature verification errors. I need a fast turnaround. Are you interested Air5 Networks
Skills: Vulnerability assessment Android Malware Reverse engineering
Fixed-Price - Intermediate ($$) - Est. Budget: $1,000 - Posted
One of our project require help from the network security area, especially from someone who have worked in the real-life scenarios and have extensively used OpenVas,MetaExploit and other relevant technologies around it e.g. nmap,wireshark,tcp/ip. You are the professional : - Help us to prepare a sample network setup in Cloud/Lan/AWS to explore the power,and few standard experiment around OpenVas/MetaExploit. - Help us to understand the real items of the generated report, configurations and others routine items while working around it - Ever used the above technologies ( not limited to) to test real networks for penetration,vulnerability, exploitations,network security,scanners - Can give some guidance to standard professional engineer about the use of these tools (OpenVas and Metasploit) e.g. daily/quarterly routine work around this area - Provide some core -principles to keep in mind while using or applying these tools/technologies in a network. - Provide or Help in writing some related documentation e.g. design,network reports etc - Help to understand the differences in different technologies, concepts if required. - Experience in resolving security issues
Skills: Vulnerability assessment Network Security Penetration Testing Security Analysis
Fixed-Price - Expert ($$$) - Est. Budget: $1,000 - Posted
I need a way too install a application without any action required(exploit) I could buy in the black market(But we would like too keep this ethical) I need a program or a way too install a application without any action required like a CVE method or a vulnerability Microsoft Office Adobe Flash Adobe Pdf Web browsers(Chrome,Internet Explorer,Firefox) Ect Hope we get good candidates
Skills: Vulnerability assessment Adobe PDF C++ Internet Security
Fixed-Price - Intermediate ($$) - Est. Budget: $1,000 - Posted
I am looking for an experienced Network Security professional that would be interested in writing ~ 50 scripts on various topics. Each script would be aprox. 3-6 minutes of spoken content. Topics include TCP/IP Attacks, Network Application Attacks, Cryptography concepts, Endpoint attacks etc. Script must be original content, and not cut/paste. Speed of turn around is of utmost importance here.
Skills: Vulnerability assessment Certified Information Systems Security Professional (CISSP) Information Security Linux System Administration
Fixed-Price - Intermediate ($$) - Est. Budget: $30 - Posted
Hi there My name is Brian Truong and I am with a company that provides services for consulting IT Security vulnerabilities. I would like you to perform market research in this field to determine if there is a market out there for it. Please provide me with the steps that you would take to conduct the research We would also like you to provide us a quote on the price for this service Thank you Regards
Skills: Vulnerability assessment Information Security Market research Network Security
Fixed-Price - Expert ($$$) - Est. Budget: $250 - Posted
I'm looking for somebody that can test my website and remove any and all malware as well to design/install a system to prevent further intrusions/attacks and secure the website. Website has SiteLock installed and this software is reporting lots of malware but no way to permanently remove it. The website is Looking for somebody with lots of experience and proved success in this kind of work.
Skills: Vulnerability assessment Information Security Internet Security Malware