Internet Security Jobs

24 were found based on your criteria {{|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Entry Level ($) - Est. Budget: $1,000 - Posted
I am looking for a unique dating website that is better than or different than any other online. With a dating game that people can pay to play and win a cash award the game will not start until the reserved is met. There will be one upgrade fee for users to play the game and to enjoy other features. I am sure the right web designer can build this website with ease there is nothing difficult about it. I will hire the right person with the right idea for this job please do not ask me to meet you on Skype I look forward from hearing from the right web designer.
Skills: Internet Security Game Design Game Testing Payment Processing
Fixed-Price - Intermediate ($$) - Est. Budget: $25,000 - Posted
It is an full integration of 3 software for online storage : i2p tahoelafs and owncloud Owncloud>nothing to do I2p>nothing to do Tahoe: All work to do plus bash scripts http://killyourtv.i2p/debian/pool/main/f/foolscap/ A patched Tahoe-LAFS exist (since 2011) made to run on the anonymous network I2P, with support for multiple introducers. There is also a build for Windows.[11] It must be downloaded from inside of the I2P network.[12] When I2P and Tahoe-LAFS are used together, the location of nodes is not known. This allows for anonymous distributed grids to be formed. In normal operation, the IP address of all the nodes is known to the introducers and any clients on the grid.
Skills: Internet Security Java JavaScript PHP
Fixed-Price - Intermediate ($$) - Est. Budget: $21,000 - Posted
【BACKGROUND INTRODUCTION】 Have you ever thought about "cracking" the visa/ticket application system using your technique? Do you see a huge and profitable market in it? Many people in developing countries chase after popular visas in developed countries. However, places for some are limited. Take Silver Fern Visa in NZ, for example -- only 300 places each year. Such visas are great opportunities for those who want to migrate to another country. They snap up sought-after visas once the applications are opened. The ones who do faster in the applications win at last. That's why there is a great opportunity in it. You must apply for a place on Embassy's website, and machine is no doubt faster than applicants themselves. What if you develop a software to help them with the applications? What if a software takes care of everything by automatically filling in information, proceed and submit the applications? You can earn a lot just by selling the places you grab. People are willing to pay, as long as you secure them a place under the quota. Some companies are already doing this job. The price for one place varies from 800 USD to 3000 USD. A lucrative business, isn't it? Imagnie that you have 100 customers... 【WHO WE ARE, WHAT WE WANT】 We are a startup based in Hong Kong. We have a great marketing and sales team. We are looking for a partner who can develop a program, e.g. a software, to help our customers grab places for these visas! 【REQUIREMENT】 1. Proficiency in coding, software developing and network operation. 2. Fast learner. 3. English literacy. Good communication skills. 4. Sense of responsibility. 【PAY】 AT LEAST 7000 USD for the first term (Australia visa system. September 2016, 20 customers). We expect three terms until Feb 2017. This is a long term cooperation -- the more systems you "crack", the more you earn. You can organize your own tech team, if necessary. 【HOW TO APPLY】 Please apply through Upwork. Tell us why you are a good candidate.
Skills: Internet Security Linux System Administration Network Programming Network Security
Fixed-Price - Expert ($$$) - Est. Budget: $49,000 - Posted
hi Marketing and Sales Candidates, We are a Cyber Security startup looking for experienced Marketing and Sales gurus to sell our 10gigE DDoS mitigation appliances. Our appliances can also be sold as software only product for Redhat, Slackware, SuSE and Debian distro. Our DDoS Mitigation appliance collects all incoming traffic to any server. After analyzing the server type, web server, mail server, etc, all incoming TCP-based DDoS attacks against the server will be tarpit'd. DDoS mitigation can be 100% automated with "iptables-gui -doadd -autoadd" running periodically from cron. We have a couple of live DDoS Mitigation demo using tarpits at or In order to be a proficient sales and marketing guru, you should understand the various DDoS attack vectors and some common DDoS mitigation methodology such as those described in You should be be familiar with the different DDoS competitors outlined in Additionally, you should know when in-house DDoS appliances are just as good or better than outsourced DDoS scrubbers for 32+ features shown in comparison. DDoS mitigation solutions are multi-layered solutions that would depend on the DDoS attack types and the DDoS Attacker's skill set of a script kiddies or Masters of Deception. DDoS attacks can be tcp-based, arp-based, udp-based, icmp-based, application attacks and other more common spam, virus and worm attacks. These various DDoS attacks can be simulated with A simplified and generic job description for the sales position is available at The interview process will include telecommuting options to quantify your marketing/sales qualifications and performance. Similarly, those seeking engineering positions will be tasked to show their engineering and software programming skills. Sales commissions is always negotiable depending on your experience and sales performance for HTML5/CSS Please feel free to submit your resume to
Skills: Internet Security Information Security Marketing strategy Sales
Fixed-Price - Expert ($$$) - Est. Budget: $355 - Posted
We are looking for a Magneto Expert that can work on the Front and back end of the site and has the knowledge and know how to work with Plesk/Virtuozzo to finish setting up our Responsive theme site. Included in this posting is a document of what is to be done, some of the things to be done is install our SSL Certificate, badge, add a couple extensions, make sure site is secured and no back doors or way in. Setup shopping cart, and a couple minor changes/updates to site. PLEASE READ ATTACHED DOCUMENT!!! The site iNodes keep getting filled up, hosting created a script to clear unnecessary iNodes out at Midnight but some how it still gets filled up so this needs fixed permanently. Payment will be made at the end, project will not be hourly only payment is at the end. Please read and understand the project, any questions please ask.
Skills: Internet Security Authorize.Net Development Cisco Certified Internetwork Expert (CCIE) Magento
Fixed-Price - Expert ($$$) - Est. Budget: $180 - Posted
we have the flow charts and written explainatin for the patent provisional the successful applicant has to demonstrate previous work in successfully writing and filing a US provisional patent the payment is $150 plus 10% of the first $200,000 or $20,000 usd when the patent is sold it would help if you had a background in internet all payments thru upwork including the bonus confidential papers sent from samuelmessingerm at at the most this is a 6 hour job including 1/1/2 hr filing in US we will send the 130 fee separately for US filing also if you are qualified you may want to assist in the sale of the IP property when you reply you must provide previous work to demonstrate proficiency
Skills: Internet Security Internet Information Services (IIS) Patent Law Physics
Fixed-Price - Expert ($$$) - Est. Budget: $500 - Posted
Hi I'm looking of a clear crisp, to the point and practical articles on Ethical Hacking related subjects covering following: (1) Reconnaissance (2) Sniffing Traffic (3) Exploitation (4) Enumerations (5) Metasploit (6) Trojan Attacks (7) TCP/IP Hijacking (8) Email Hijacking (9) Hacking Password ( Dictionary Attacks, Brute Force Attack, Rainbow Table, Phishing Attack, Counter Measures ) (10) Wireless Hacking ( Wireless Network Basics, Wireless Sniffing, Wired Equivalence Privacy, Wi-Fi Protected Access, Denial of Service Attacks, Counter Measures) All the concepts needs to be explained with example w.r.t. to a machine running Linux operating system.
Skills: Internet Security Certified Information Systems Security Professional (CISSP) Information Security Mobile Programming