Internet Security Jobs

44 were found based on your criteria {{|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Intermediate ($$) - Est. Budget: $80 - Posted
We need one or more authors to write two cyber-security articles for our blog. The author(s) must be (a) domain expert(s) with experience in cyber-security. The article will be hosted under your name so you can expect a global readership to consume your content. Topic #1 TOP 20 INTERVIEW QUESTIONS AND ANSWERS FOR CYBER-SECURITY PROFESSIONALS Theme: Top 20 interview questions and model answers for cyber-security interviews. References (to supplant your own research): information-security- interview-questions/ security-information- analyst-interview- questions/ analyst-interview- questions- SRCH_KO0,22.htm?countryRedirect=true interview-questions/ Guidelines: 1. US English only. The article should be written for an American readership. 2. Style guide: Chicago Manual or equivalent. 3. Design: infographics and supporting visuals are welcome. 4. Word-count: 1000-1200 _________________________________________________________________________ Topic #2 COMPANIES HIRING ETHICAL HACKERS Theme: An overview of top companies worldwide that hire professionals holding an ethical hacking certification. Broad strokes/points to cover: Which companies are hiring certified ethical hackers? What are their salaries, perks, responsibilities? How is certified training helping candidates land their dream roles at these multinational companies? Which of these companies do learners aspire to work at? Reference articles (to supplant your research): (Please use these for reference on the companies hiring ethical hackers only – the article needs to focus on this theme alone and must NOT meander into advice for building a career in ethical hacking or the like) Job portals like Glassdoor, Monster, and Dice Guidelines: 1. US English only. The article should be written for an American readership. 2. Style guide: Chicago Manual or equivalent. 3. Design: infographics and supporting visuals are welcome. 4. Word-count: 1000-1200 _____________________________________________________________________
Skills: Internet Security Content Writing Information Security Network Security
Fixed-Price - Intermediate ($$) - Est. Budget: $500 - Posted
Build a CI/CD pipeline that follows the guidelines for good test-driven development for a microservices based system that runs with docker containers. The Cluster will need: - json configuration files for each microservice, depending of its characteristics - Persistent storage for Cassandra - Persistent storage for MySQL - reverse proxying and networking between the services inside DC/OS Currently the system has 15 microservices, public and private.
Skills: Internet Security Docker Network Engineering Microsoft Windows Azure
Fixed-Price - Expert ($$$) - Est. Budget: $150 - Posted
To create a multiple choice questions test on Ethical Hacking . Questions count – 60 The quality of questions should be such that only the candidates well aware about the practical aspects of the subject should be able to pass. Type - Questions divided into three levels- medium, hard,too hard Multiple Choice questions required to be developed with copyright free original content . The questions can have MCQ's based on practical knowledge(image based,code snippets) as well on the topic. The questions to have minimum four answer options each. No True and False Statements. No Trivia questions. Review: The subject matter expert will be required to review the test on the live server and point out any corrections, once the test is uploaded Feedback: The subject matter expert will make revisions to the feedback shared for the content developed before final approval. The subject matter expert will help us in resolving any feedback received from the test takers within 3 months of uploading the test. Steps: Deliverable: Required in a word file in the required format (format will be provided) 1. Signing the NDA 2. Develop questions as per the agreed upon test outline. 3. Submit the deliverable in a word file 4. Run the test and review the questionnaire once live 6. Point out any improvements/errors during the final review.
Skills: Internet Security Certified Information Systems Security Professional (CISSP) Firewall Network Security
Fixed-Price - Expert ($$$) - Est. Budget: $800 - Posted
I have a Samsung Galaxy S7 with an unknown password/passcode. I have made a RAW image file of the entire 32GB memory. I would like the image file decrypted/encryption removed. As part of this project ,i would like a program/utility developed to do this again for other image files and the full source code provided to me. Other experts claim this can be done and have been able to do this. This is being used only for ethical purposes. No upfront payment will be offered, only payment upon testing the solution. If you can show me your solution works, 50% will be paid then 50% will be paid once the source code has been provided to me, then after it has been received and confirmed to be a valid source code for the software, the remaining 50% will be completed. I need this completed within 7 days.
Skills: Internet Security Data Analytics Data Encoding Security Analysis
Fixed-Price - Intermediate ($$) - Est. Budget: $300 - Posted
The goal : Control the wifi light switches using our own app. Current Scenario: We currently have wifi controlled light switches, which needs home wifi to work wirelessly , the manufacture has an app to control the switches. Which is basically turing them off & on wirelessly using wifi. The set up has there parts, 1. App. 2. Hoem router 3. Wifi Switches. I need to create an app which would control the switches. I will provide you the link to already existing app. Some documentation from the manufacturer of the switches. Will provide the switches if you need to test them.
Skills: Internet Security Network Pentesting Network Security Penetration Testing