Cisco asa ddos attacks jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 cisco asa ddos attacks jobs found, pricing in GBP

    I'm in urgent need of an expert in malware removal to assist me with cleaning up more than 5 of my websites. The affected websites are a mix of e-commerce and blog sites. The malware has caused significant issues on these sites, including: - Phishing attacks - All sites showing a white page and appearing to be disabled Your primary task will be to conduct a thorough clean-up of these sites, ensuring all malware is removed and that the sites are restored to their original state. Ideal Skills and Experience: - Proven experience with malware removal, particularly for multiple websites - Familiarity with e-commerce and blog sites - Ability to conduct a thorough clean-up without causing any additional damage - Knowledge of security best practices to prevent future incidents

    £72 (Avg Bid)
    £72 Avg Bid
    45 bids

    ...with implementing security measures within AWS, particularly leveraging AWS WAF, AWS IP Reputation, and AWS CloudTrail. Key Responsibilities: - Implement rigorous access control policies to ensure only authorized personnel can access our resources. - Configure and fine-tune AWS WAF to establish robust web application firewall rules, block specified IP addresses, and provide protection against DDoS attacks. - Set up and monitor AWS IP Reputation, ensuring that any malicious IP addresses are effectively blocked from our system. Skills and Experience: - Proven experience in implementing AWS security measures, particularly with AWS WAF, AWS IP Reputation, and AWS CloudTrail. - Strong understanding of encryption protocols and access control policies within AWS. - Experience ...

    £372 (Avg Bid)
    £372 Avg Bid
    18 bids

    We are in search of an experienced freelancer, skilled in Bitrix24 Rest API and capable of system integra...in search of an experienced freelancer, skilled in Bitrix24 Rest API and capable of system integration. Tasks Included: * Integration of our Bitrix24 with Cisco Unified Communications Manager. Experience in these systems is a must. Skills & Experience: * Deep understanding of Bitrix24 and its Rest API. * Proven experience in Cisco Unified Communications Manager. * Dexterity in the development of custom API endpoints. * Proven ability in Bitrix24 module customization. * Background in system integration. Your responsibility will be to create a seamless and effective integration between our Bitrix24 system and Cisco UCM. Apply if you confid...

    £939 (Avg Bid)
    £939 Avg Bid
    6 bids

    WHM clearing malware, sent ddos attaks reported ip abuse

    £40 (Avg Bid)
    £40 Avg Bid
    1 bids

    I am seeking a knowledgeable freelancer to deliver a well structured and robust report on Malware, Phishing, and Ransomware cyber attacks that occur prominently in Australia. This report is aimed at the general public and should therefore be written in a comprehensible and digestible manner. The goal is to provide a surveillant scan of key issues, impacts, and potential precautions, giving readers a thoughtful understanding of these cyber threats. To accomplish this project optimally, the required skills and experience include: - Proficiency in Cybersecurity and related topics - Extensive knowledge about Malware, Phishing, and Ransomware attacks - Strong research skills, with a keen focus on Australia - Excellent writing and communication skills, with experience in makin...

    £16 (Avg Bid)
    £16 Avg Bid
    36 bids

    I'm in need of a highly qualified and certified network and security engineer. Ideally, you should have certifications from Cisco, F5, Symantec, HP, HPE, Dell, Huawei, Avaya, Fortinet, and Juniper. Key Responsibilities and Tasks: - Network design and configuration - Firewall management - Network troubleshooting - Telecommunication system setup - Network security audits - Hardware installation and maintenance - System integration - Vendor selection and management - Providing ongoing support Your background should demonstrate extensive experience with all the above functions. I'm particularly interested in freelancers who have successfully handled similar tasks in the past. Your success will hinge on your ability to improve our overall network and security infrastructure. ...

    £134 (Avg Bid)
    £134 Avg Bid
    15 bids

    I am looking to set up an Enterprise MFA VPN solution. The freelancer best suited for this role would ideally have: - Proficient knowledge in cloud and on-premises VPN setup - Experience implementing MFA VPN - Cisco ISE Authorization(Posture policies).

    £488 (Avg Bid)
    £488 Avg Bid
    16 bids

    I am currently seeking a highly experienced cryptocurrency technician to manage the entirety of my hosting needs. This role will involve not just the set-up of my hosting, but also its ongoing maintenance and troubleshooting. The ideal candid...provide robust security measures and effective monitoring of the system. Key requirements include: - Expertise in cryptocurrency technologies, with a proven track record of past work in similar projects. - Ability to set up and install new hosting systems, as well as maintain and troubleshoot existing systems. - Strong security skills, including the ability to anticipate and prevent potential attacks or breaches. - Experience in monitoring systems and responding to incidents promptly and effectively. Let’s Make money together serious ...

    £419 (Avg Bid)
    £419 Avg Bid
    83 bids

    I currently have enhanced licenses for Cisco CUCM 11.5 and I'm seeking to upgrade to the Flex system within a month. While I've skipped explaining the specific functionalities I'm looking to add with the Flex system, ideally, the prospective freelancer should be well-experienced in transitioning from Cisco CUCM's enhanced licenses to Flex. Desired Skills and Experience: - Proficiency in Cisco CUCM 11.5 licensing and operations - Experience in upgrading to Flex system - Strong understanding of Flex system functionality options - Ability to recommend suite of functionalities to maximize collaboration, mobility and contact center features. - Ability to deliver the project within a month time frame.

    £469 (Avg Bid)
    £469 Avg Bid
    4 bids

    My project aims at developing measures to counter Zombieload side channel attacks. As techniques evolve, it's absolutely crucial to remain steps ahead of potential threats. Based on this, I am particularly interested in: - Creating a robust detection model using both hardware and software. - Utilizing distinct technologies, including Intel Performance Unite and Machine Learning algorithms as primary tools for model development. (Python, Tenser flow, Perf Linux, python PAPI) - This model will also include the analysis of Hardware Performance counters. The potential freelancer should possess a strong understanding of these tools along with expertise in cybersecurity and the development of prevention measures. A background in using network monitoring tools is also an advantage....

    £105 (Avg Bid)
    £105 Avg Bid
    17 bids

    My project aims at developing measures to counter Zombieload side channel attacks. As techniques evolve, it's absolutely crucial to remain steps ahead of potential threats. Based on this, I am particularly interested in: - Creating a robust detection model using both hardware and software. - Utilizing distinct technologies, including Intel Performance Unite and Machine Learning algorithms as primary tools for model development. (Python, Tenser flow, Perf Linux, python PAPI) - This model will also include the analysis of Hardware Performance counters. The potential freelancer should possess a strong understanding of these tools along with expertise in cybersecurity and the development of prevention measures. A background in using network monitoring tools is also an advantage....

    £80 (Avg Bid)
    £80 Avg Bid
    10 bids

    I'm seeking a professional researcher to develop a comprehensive research paper exploring the effectiveness of AI methods against multiple cyber threats in cloud environments. Here’s what I have in mind: • Focusing on the following cyber threats: - Data Breaches - Identity Theft - Malware Attacks • The research should incorporate AI methods: - Machine Learning - Deep Learning In the depth of your research, scrutinize the role of these AI methods; indicate their strengths, weaknesses and how they could mitigate the mentioned threats. Ideal Skills: • Solid understanding of Cloud Technologies • Deep knowledge of AI, machine learning, deep learning • Proficient with Research/Writing • Familiarity with cyber threats...

    £16 / hr (Avg Bid)
    £16 / hr Avg Bid
    43 bids

    For your quote to be considered please start with "I am a Cisco Professional" I'm looking for a professional who can assist me in installing Windows Server OS on my Cisco UCS C220 server as soon as possible. We have the server and have configured the LSI Virtual Drives when we try to install the OS we get Driver IRQL error with "What Failed " For someone who is experiences this should be a quick one

    £17 (Avg Bid)
    £17 Avg Bid
    4 bids

    I'm in need of a...help install and set up an Alcatel PBX system for a medium-sized enterprise. The project also involves integrating this PBX system with VoIP services. This will be remote project, our team will give you access from the site. Key Responsibilities: - Configuration of Alcatel PBX system OXO408 - Integration of the PBX system with VoIP services along with call recording. - Integration with existing Cisco IP Telephony Ideal skills for this job include: - Profound understanding of Alcatel PBX systems. - Experience with VoIP services integration. - Prior work on medium-sized enterprise deployments. Your expertise in these areas will help us to establish a reliable communication system for our business, ensuring seamless connection with our clients and within ou...

    £119 (Avg Bid)
    £119 Avg Bid
    5 bids

    I am seeking a skilled and experienced developer to create an interactive learning tool for IT students focused on ASA's Basic Setup Configuration. The ideal candidate for this project should: - Be proficient in the development of interactive learning tools - Have a solid understanding of ASA's Basic Setup Configuration - Have experience creating educational material for IT students The learning tool should include quizzes and tests to ensure understanding and retention of material. Additionally, proficiency in creating visually engaging and user-friendly interfaces is needed. Please provide examples of previous work in this area. Preference will be given to those with a background in IT or networking, and have experience making complex concepts accessible and engaging for st...

    £121 (Avg Bid)
    £121 Avg Bid
    15 bids

    ...devices (desktop, mobile, tablet). Secure and reliable platform. 2. Easy navigation allows users to find the information they need. 3. The website page should be designed as per the prototype prepared on our side. The prototype shall include Images and Content for the website. 4. The project includes Database configuration and setup. 5. Security features that defend the website against brute force attacks and malware infection will be configured and set up. 6. Sitemap configuration 7. WhatsApp floating icon integration Pages on the website: It is required to develop approximately 10 (ten) pages for the website. Content in General: 1. Introduction 2. About Us 3. Access to the knowledge base 4. Support 5. Location 6. Pricing 7. Training 8. Webinar Websites for reference (Simil...

    £10 / hr (Avg Bid)
    £10 / hr Avg Bid
    13 bids

    I'm looking for a highly skilled machine learning expert to develop a solution that leverages supervised learning techniques to detect different types of side channel attacks . The solution should ideally be capable of adapting to various datasets. Key Responsibilities: - Development of detection model using supervised learning. - The model should be designed to adapt and learn from different datasets. - collecting data from Hardware level Ideal Skills & Experience: - Expertise in Machine Learning is mandatory, specifically in supervised learning techniques. - A strong understanding of cybersecurity and side channel attacks is required. - Familiarity with various datasets and hands-on experience in working with them. - A strong understanding of Microarchitecture...

    £376 (Avg Bid)
    £376 Avg Bid
    31 bids

    University Assignment: Flask Web Application for Secure Authentication System ONLY BID IF YOU CAN DO IT. Go to Template Folder to see the code and use Docker to run it. It should take 2-3 hours to do it. Need it ASAP. Project O...authentication (2FA) using a popular service like Google Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session rate limiting effectively. Recovery Options: - Generate recovery keys using () with at least 20 bits of entropy. - Ensure recovery keys are delivered securely and are single-use. - Hash recovery keys using Argon2 with individual salts. - Explore implementing HSTS to prevent downgrade attac...

    £19 (Avg Bid)
    £19 Avg Bid
    33 bids

    I have a AWS Infrastructure setup project requiring expertise in Cloudfront NLB and protection using WAF. As the goal is targeted at content distribution and load balancing, proficiency in these areas is ...access website on EC2 IIS with custom ports like 8080, 5440 etc and not standard 80 or 443. User will be providing url with port number and on IIS different website is binded with different port number. For WAF, protective measures against DDoS attacks, SQL injections, and XSS attacks are necessary. Thus, an understanding of these areas is also needed. Skills and experience: - Proficient in AWS services (Amazon EC2, ELB, Cloudfront and Amazon S3) - Knowledge of Cloudfront NLB - Experience with WAF - Understanding of DDoS attacks, SQL injections, and...

    £122 (Avg Bid)
    £122 Avg Bid
    31 bids

    ...add excessive bloat. 2.4 - Use a CDN to distribute the load, reduce latency, and improve the speed of content delivery globally. 2.5 - Regularly clean the database to remove unnecessary data and keep the website running smoothly. 3. Security Measures 3.1 - Implement SSL certificate. 3.2 - Install and configure a reputable security plugin to protect against common threats, such as brute force attacks, malware, and hacks. 3.3 - WordPress theme should not be without license 3.4 - Regular backup plugin should be added 4. Testing and Quality Assurance 4.1 - We will check compatibility and responsive design before handover. 4.2 - Website should be 95% + compatible and good as per GTmetrix and Google PageSpeed Insights and we will not take handover until and unless these terms are m...

    £258 (Avg Bid)
    £258 Avg Bid
    92 bids

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts and elements. These are specified in the file. - Application Language: The application is developed in JavaScript. Your Responsibilities: - Review the current application setup and assess the specific requirements for the CSP. - Implement the CSP accordingly, ensuring that only self-hosted scripts and elements are permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functi...

    £10 (Avg Bid)
    £10 Avg Bid
    13 bids

    ..."extract live" from each specific site all the games/slots on their site, and include game picture, description, etc. - will also show user ratings for each game (to rate and/or review a game you must create a account then you will be able to rate games and leave reviews for game *possibly to require entering a bet id to post a review?* **and some sort of prevention/security to prevent types of attacks with bots or other methods to skew ratings** - ability to sort games, top rated, most reviewed, most discussed, etc. - a type of forum, chat, or comment section(s) where discussion can be shared Tips, methods, winnings, losings, rants, raves, etc. - user system to include a ranking/leveling profile that will level up/rank up the more that you post, rate, review, etc. T...

    £1091 (Avg Bid)
    £1091 Avg Bid
    125 bids

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    £102 (Avg Bid)
    £102 Avg Bid
    20 bids

    I'm urgently looking for a skilled professional to help me secure my website against DDoS attacks, specifically focusing on DNS amplification. work over any disk only must be now !

    £38 (Avg Bid)
    £38 Avg Bid
    50 bids

    experienced network specialist, well-versed in Cisco ISE and firewall configurations for an enterprise level network. We're currently experiencing network connectivity issues and require assistance with firewall configurations and overall network security.

    £380 (Avg Bid)
    £380 Avg Bid
    29 bids

    Cisco Packet Tracer make the activity lab

    £35 (Avg Bid)
    £35 Avg Bid
    1 bids

    I am in need of a proficient security expert to help tackle my final project geared towards creating a low-interactive honeypot. This honeypot is intended to guard real networks by focusing on detection of Brute Force Attacks specifically. The honeypot should be designed for the Linux operating system and created to effectively emulate SSH. I require that you have: 1. the built should be on CML 2. Skill in SSH protocol 3. Experience in creating low-interactive honeypots 4. The ability to focus on detecting Brute Force Attacks 5. Should specific documentation design, developments, and testing : Chapter 4 — Design 4.1 Introduction 4.2 Interface Design 4.3 System Design 4.4 Summary -------------------- Chapter 5 — Development 5.1 Introduction 5.2 Interface De...

    £152 (Avg Bid)
    £152 Avg Bid
    4 bids

    ...Verification Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application’s integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses Heartbleed vulnerability. SSPoS protocol is successfully v...

    £113 (Avg Bid)
    £113 Avg Bid
    8 bids

    Seeking a diligent, research-minded writer to explore the intricate world of asthma fo...“you”), and verb tense shifts. (Get a friend’s perspective.) Fix them. What are the main activities and activators that cause asthma problems and asthma attacks to many people like me and how can it be minimized. I have chosen this topic because I personally struggle with asthma, and I have started to overcome it in little steps at a time. I definitely have a long way to go but from where I'm at now compared to 6 years ago is night and day. I can include that asthma is a genetic disease, but it can be controlled with different exercises and how it can be traumatic. I hope to discover the main triggers and activators of asthma and asthma attacks to people. I wan...

    £101 (Avg Bid)
    £101 Avg Bid
    58 bids

    I'm searching for an expert to help me set up a honeypot in Cisco Modelling Labs (v2.6.0). The primary purpose is to monitor network traffic, identify, and capture any malicious activities that happen within the network. It can be a low or low-medium interaction honeypot. As a beginner, I require an individual with skills and experience to navigate these systems. Mastery of Linux server for implementing the honeypot is essential due to its build on a Linux system. Need it completed before the end of April. Key Competencies: - Expertise in Cisco Modelling Labs - Proficiency in with Linux - Understanding of network monitoring and security principles - Ability to train a beginner on how to run the honeypot with documentation (pictures) of how the honeypot was created.

    £141 (Avg Bid)
    £141 Avg Bid
    9 bids

    ...data scientist or machine learning engineer to develop a model for classifying various types of attacks on a KDD dataset. The ideal candidate will have extensive knowledge in the use of autoencoders for feature extraction and GRU models. Key project elements include: * Professionals will need to implement an autoencoder for feature extraction with the core goal of reducing data dimensionality. Prior experience in working with high-dimensional data and in deploying autoencoders is necessary. * Subsequently, the system built should be capable of classifying Denial of Service (DoS), User to Root (U2R), and Probe attacks within the KDD dataset. Good working knowledge of GRU models and the mentioned attacks is required. * The project includes steps to ensure the accurac...

    £27 (Avg Bid)
    £27 Avg Bid
    8 bids

    ...functionality to be accessible both as an app and a website. The app should be compatible with both Android and iOS platforms, thus requiring proficiency in cross-platform app development. Key quantum encryption technologies for integration include: - Quantum Key Distribution (QKD): To ensure secure encryption keys are used. - Quantum Side-Channel Attacks Protection: To ensure robust defense mechanisms against potential quantum attacks. - Quantum Secure Direct Communication (QSDC): To allow direct transfer of cryptocurrency without risk of eavesdropping. Proficiency in blockchain technology, cryptocurrency, quantum encryption, cross-platform mobile app development, and web development are essential for this project. Successfully delivering on this project will r...

    £3703 (Avg Bid)
    £3703 Avg Bid
    32 bids

    Study the scenario NOTE: You will use this scenario to answer the rest of the project. You are supposed to use Cisco Packet Tracer in this project. Belmand College Belmand College is a registered private higher education institution in South Africa. It specializes in training IT Diplomas and Professional Courses with its Campus located in Midrand, Midrand Campus has 3 buildings which houses the different departments, lecture rooms and labs. Building A houses the IT Department, Library and Main Administration, the other buildings B and C houses lecture rooms and labs. The college has a total enrollment of about 2000 students. They have over 100 employees which includes admin employees, full-time lecturers and part time lecturers are hired every semester. They are currently u...

    £20 (Avg Bid)
    £20 Avg Bid
    14 bids

    I'm on the hunt for a skilled blockchain developer who can create a cryptocurrency token based on the Binance Smart Chain for me. Key responsibilities would include: - Designing and implementing the token based on the ERC-20 Standard. - Ensuring the utmost security measures are in place to prevent any potential attacks. - Testing the token to assure smooth navigation and error-free functionality. Since it's a cryptocurrency token development task, freelancers who have profound knowledge and previous involvement in blockchain technology and the Binance Smart Chain specifically would be ideal. Expert-level capability in the creation and deployment of ERC-20 standard tokens is crucial too. If you possess these skills, I'd love to hear more about your previous exper...

    £667 (Avg Bid)
    £667 Avg Bid
    24 bids

    I'm looking for a skilled professional to conduct a network security test on our workstations using...vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with significant experience and expertise in network security testing to ensu...

    £52 (Avg Bid)
    £52 Avg Bid
    15 bids

    I'm looking to modify the SAAS-BOILERPLATE open-source project to create an interactive membership website for indie filmmakers and film students. NOTE...and AWS as well as SVG animations - A HTML5/css introduction page implemented as a responsive design ready for webdesigner collaboration (squarespace has an interesting version that is attached below to the project) IDEAL FREELANCER PROFILE: - Have previous experience with backend development using Laravel PHP - security-focused emphasis on security against attacks on webapps - experience minimizing the attack surface of webapps - Understand how to integrate video hosting in SaaS

    £445 (Avg Bid)
    Featured
    £445 Avg Bid
    64 bids

    I am seeking a skilled freelancer to help me create a data collection tool for an intrusion detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key ta...detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key tasks include: - Designing a new normal and attack dataset using Mininet WiFi - The focus is on detecting Denial of Service (DoS) and Man-in-the-Middle (MitM) attacks Ideal candidates should have experience: - Building intrusion detection systems - Working with Mininet WiFi - Handling network traffic data - Familiarity with DoS and MitM attacks This tool will greatly aid in identifying and preventing future network attacks by providing stru...

    £282 (Avg Bid)
    £282 Avg Bid
    3 bids

    I'm in need o...black-box penetration testing on a WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial for ...

    £75 (Avg Bid)
    £75 Avg Bid
    29 bids

    I'm in need of an hack...penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial for ...

    £261 (Avg Bid)
    £261 Avg Bid
    23 bids

    I need a technical consultation for current project to migrate UCS Manager to Cisco Intersite. Please be someone with a expertise level.

    £66 (Avg Bid)
    £66 Avg Bid
    5 bids

    ...add excessive bloat. 2.4 - Use a CDN to distribute the load, reduce latency, and improve the speed of content delivery globally. 2.5 - Regularly clean the database to remove unnecessary data and keep the website running smoothly. 3. Security Measures 3.1 - Implement SSL certificate. 3.2 - Install and configure a reputable security plugin to protect against common threats, such as brute force attacks, malware, and hacks. 3.3 - WordPress theme should not be without license 3.4 - Regular backup plugin should be added 4. Testing and Quality Assurance 4.1 - We will check compatibility and responsive design before handover. 4.2 - Website should be 95% + compatible and good as per GTmetrix and Google PageSpeed Insights and we will not take handover until and unless these terms are m...

    £267 (Avg Bid)
    £267 Avg Bid
    124 bids

    I am looking for a certified ethical hacker (CEH) and pentester. The main objectives of the project are to identify vulnerabilities, assess the overall security, and develop countermeasures to prevent attacks. Scope of the project will involve: - Scanning and analyzing network infrastructure - Testing and exploiting our web applications - Conducting a social engineering assessment The ideal candidate should have a proven track record in cybersecurity and be able to demonstrate their expertise in identifying vulnerabilities and implementing effective security measures.

    £181 (Avg Bid)
    £181 Avg Bid
    11 bids

    My WordPress website has been flagged by Avast as potentially having malware. It's imperative that I get a professional to check and remove any malware as soon as possible. Key responsibilities: - Conduct a thorough check of the WordPress site and server for viruses, Trojans, and/or spyware - Remove any identified malware - Implement security measures to prevent future attacks Ideal Skills and Experience: - Proven experience in cleaning WordPress sites from malware - In-depth knowledge of various types of malware - Familiarity with Avast and other antivirus software - Strong understanding of WordPress security protocols and best practices Please bid only if you can start immediately and have a track record of success in similar projects.

    £100 (Avg Bid)
    £100 Avg Bid
    170 bids

    ...developer, with strong proficiency in developing dynamic, engaging, and user-friendly business websites, primarily centered around information technology services. Key Areas: - Showcase Services: Foremost, the website should beautifully present my key services which are Cybersecurity Managed Solutions ,Vulnerability Assessment and management, disaster recovery as a service, SOC as a service, DDoS mitigation, penetration testing, cloud computing security, and Incident Response. - Lead Generation: A flawless mechanism for capturing leads and inquiries is essential. Thus, effective CTAs, contact forms, and pop-ups, etc., should be correctly integrated. - Website Features: The website must feature video content to grab the attention of the viewer, must feature case studies, cl...

    £383 (Avg Bid)
    £383 Avg Bid
    116 bids

    I'm looking for a network specialist to set up my pfsense for public subnet, prioritizing network security. Specifically, my main concerns are: - Malware attacks - Distributed Denial of Service (DDoS) attacks - Intrusion attempts The setup should be designed to accommodate more than 50 connected devices. The ideal freelancer for this project should have advanced knowledge and experience in network security, specifically in dealing with the aforementioned threats. A strong background in pfsense setup and load balancing is also essential.

    £134 (Avg Bid)
    £134 Avg Bid
    9 bids

    I urgently need an experienced Cisco Webex Programmer that can handle a specific task. The task involves writing a script, as well as establishing an xapi event for the UI. This should result in switching the inputs on the Cisco Webex Dual 70. This change should be triggered by user interaction. This is a task for an experienced programmer only, ideally with a strong history of Cisco Webex custom integration. Those with proficiency in user access control and meeting scheduling and management are highly sought. The job will require expert problem-solving and technical skills. Main Tasks: - Write a coded script - Implement an xapi event for the UI Trigger Condition: User interaction Prior Expertise: - Cisco Webex programming - User access control - Meeting sc...

    £407 (Avg Bid)
    £407 Avg Bid
    59 bids

    ...credit card mass attempt attacks on my ecommerce site. I have already implemented SSL certificate, Firewall, CVD, and recapcha as security measures, as well equipped my site with stricter user authentication. However, despite these measures, the issue persists. I am looking for a highly skilled professional with a strong background in ecommerce cybersecurity: - Expertise in designing and implementing robust ecommerce security protocols - Experience in guarding against credit card mass attempt attacks - Strong knowledge of SSL certificates, Firewalls, CVD, recapcha and more - Experience with advanced user authentication mechanisms The successful freelancer will need to conduct a security audit, identify loopholes, and strengthen security to stop these attacks...

    £14 / hr (Avg Bid)
    £14 / hr Avg Bid
    58 bids

    ...key requirements for this project include: 1. Security Enhancements: - Encryption of data; implementing a powerful encryption mechanism to shield sensitive data - Authentication and authorization; setting up a robust security system to authenticate users and authorize necessary permissions - Protection against SQL Injection; applying various techniques to guard against SQL injection attacks, ensuring database security 2. Efficient Data Load Management: - The APIs should be designed to fetch data as needed from the MySQL database, ensuring fast and efficient loading to uphold user experience 3. Data Handling: - The REST APIs will primarily handle JSON data, thus proficiency in handling, parsing and manipulating JSON data is critical The ideal candidate should...

    £21 (Avg Bid)
    £21 Avg Bid
    12 bids

    I'm looking for an expert in large format ASA 3D printing to print two predesigned objects. The material choice is essential as they are custom pool parts and need to be UV stable and have a relatively smooth finish. - Proficient skills in ASA 3D printing - Experience in prototyping, specifically machine parts - Ability to achieve a moderate level of detail in produced parts I need two parts printed from each file (4 pats in total). I have two files that have been custom designed to retro fit a 1960's pool where no parts are available. The material choice of ASA resin is based on the ability to tolerate UV exposure in a salt water pool. The stl files are to scale and must remain dimensionally stable. The end goal is to receive a well-executed product th...

    £468 (Avg Bid)
    £468 Avg Bid
    30 bids