The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
From 105,938 reviews, clients rate our Computer Security Consultants 4.9 out of 5 stars.Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
From 105,938 reviews, clients rate our Computer Security Consultants 4.9 out of 5 stars.Need experienced Linux System Administrator for server hardening. Tasks include security audit, firewall configuration, SSH hardening, user access control, patch management, and security monitoring setup. Must have experience with Ubuntu/CentOS and tools like Fail2ban, SELinux. Provide documentation of all changes.
I’m completing a networking and security module at school and the current assignment requires a fully-configured Cisco Packet Tracer project. If you’ve tutored or prepared Packet Tracer or such kind of assingment please help me
A recently rebuilt Windows workstation needs a bullet-proof antivirus setup carried out over a remote session. The job begins with selecting an effective AV suite (I am open to your recommendation—Norton, McAfee, Kaspersky, or another best-in-class option) and continues through full installation, optimisation, and hardening. Key protection goals • Online banking: isolate browser sessions, enable real-time phishing & key-logger defences, and verify safe-transaction modules are active. • Confidential files: enforce on-access scanning, tune heuristic settings for maximum detection, and lock down local folders with password-protected vaults or encryption available within the AV. • Google Drive sync: ensure cloud-storage scanning is enabled, block malicious file ...
Upgrade the pfss and rebuild the cluster with recovery group of 8 pfss servers,it's urgent requirement
I run a production-level Windows server that now needs steady, professional care. The box is already up and live; what I need is someone who can step in and take over the routine work that keeps it healthy and secure. Your core responsibility will be ongoing maintenance—installing patches, checking logs, pruning obsolete services, and making sure performance never drifts. In parallel, I want proactive security updates: closing vulnerabilities quickly, hardening configurations, and documenting every change so there are no surprises later. A typical month might include: • Scheduling and applying Microsoft updates with minimal downtime • Reviewing Event Viewer and other logs for early warning signs • Updating firewall rules or IPS policies when new threats emerge ...
We are currently looking for freelance Network Engineers in your city to support ongoing onsite requirements for our customers and act as the eyes and hands for the remote configuration team. Typical visit • Arrive at the customer location, meet the local contact, and review the work order • Rack, stack, and cable routers, switches, firewalls, or wireless access points exactly as marked on the network diagram. • Power on the gear, provide console access back to our remote engineers, and stay on-site while they push the configs and run their tests. • Perform basic physical troubleshooting if something doesn’t light up as expected and coordinate with the remote team until sign-off. What you need to bring Your own laptop, a console cable, and any basic hand tools y...
I’m building a Spring-based service router and need robust CSRF protection on all API endpoints. The idea is to leverage Public Key Infrastructure so that every incoming request carries a verifiable, signed token before it reaches any controller logic. Here’s the core of what I’m after: • A Spring Security configuration (Boot-compatible) that intercepts every request—GET, POST, anything—and checks a PKI-backed CSRF token. • A lightweight way for upstream services or clients to obtain and refresh that token; we can refine the flow together once you see my current architecture diagrams. • Server-side validation that ties the token to the session (or an equivalent stateless approach) so replay attacks are blocked. • Clean, readable ...
We are currently looking for freelance Network Engineers in your city to support ongoing onsite requirements for our customers and act as the eyes and hands for the remote configuration team. Typical visit • Arrive at the customer location, meet the local contact, and review the work order • Rack, stack, and cable routers, switches, firewalls, or wireless access points exactly as marked on the network diagram. • Power on the gear, provide console access back to our remote engineers, and stay on-site while they push the configs and run their tests. • Perform basic physical troubleshooting if something doesn’t light up as expected and coordinate with the remote team until sign-off. What you need to bring Your own laptop, a console cable, and any basic hand tools y...
I'm seeking a security assessment for my corporate website. The primary concern is phishing attacks. I'm looking for a detailed report and provides actionable recommendations to enhance security. Key Requirements: - Assessment of current security measures (basic) - Identification of phishing vulnerabilities - Recommendations for improvement Ideal Skills and Experience: - Experience with corporate website security - Expertise in phishing attack prevention
For this project I'm looking for a VERY competent consultant on Windows systems and (maybe) on ethical hacking. Standard approach is not useful and doesn't solve the task. I want to clarify that the request is made for purely educational and exercise purposes. The goal is to make a client accessible/usable again (ethical hacking techniques). The target client is really closed/blocked. The client is Windows 11 Enterprise 23H2 - Experience Pack 1000 - 64bit (OS build 22631.5908) Actual landscape: - Windows user is not local machine Administrator. - The local disk is encrypted via BitLocker (booting from the outside therefore does not allow reading the data); - BIOS has a password, not known; - Unauthorized applications are not allowed (no possible to install nothing more). - ...
I need an experienced Privileged Access Management engineer who can immediately take ownership of our Delinea Secret Server and Endpoint Privilege Manager landscape. Your first responsibility will be the daily care-and-feeding of the vault itself—credential onboarding, policy tuning, monitoring, and rapid troubleshooting—so that administrators, service accounts, and applications can continue to work without interruption. Beyond steady-state operations, I want you to drive the next wave of improvements that will make life easier for our users. The priority is clear: simplify access without diluting security. That means reviewing our current request workflows, tightening least-privilege rules, and automating as much of the approval and credential rotation process as possible whi...
I need a hands-on network engineer for a single day of onsite work. Your main task will be to rack, stack, power up, and cable two types of devices—routers and switches—exactly as shown in the network diagram. Once everything is patched, you’ll open console access so our remote team can jump in and finish the configuration. Deliverables for the day • Routers and switches physically installed, powered, and neatly patched • Verified console connectivity for each device • Any laptop or printer glitches resolved or clearly documented • A brief hand-off report summarizing what was done and noting anything that needs follow-up Bring your own basic toolkit (screwdrivers, cable tester, console cable, etc.) and be comfortable working independently whi...
Desktop / System Engineer – Onsite (1-Day Assignment) We are seeking a hands-on Desktop or System Engineer to be onsite at a client location for one full day to support a small IT infrastructure refresh. You will act as the onsite engineer while a remote technical team remains on standby. Your primary responsibility will be to rack, cable, power up, and patch IT and network equipment (servers, switches, firewalls, desktops, and printers) strictly according to the diagrams and instructions provided in advance. You will also connect console or management cables to enable remote engineers to complete configuration tasks. Before wrap-up, you will perform basic end-user computing (EUC) checks, including light troubleshooting for desktops, laptops, and printers—verifying network c...
I'm seeking a forensic expert to conduct a thorough audit of my personal cell phone. This audit is crucial for security and privacy verification. Key requirements: - Detailed examination of all third-party secret messaging apps, including but not limited to: - WhatsApp - Signal - Telegram - Snapchat - Viber - Line - Access and analyze call history, text messages, photos, and videos as needed. - Provide a complete report of findings. Ideal skills and experience: - Proven expertise in digital forensics - Familiarity with a wide range of messaging apps - Strong analytical skills - Ability to maintain confidentiality and security Looking forward to your proposals.
need a simple static website created using HTML and CSS only for a university assignment. Requirements: • The website must follow the 2025 Summer Semester Assignment Specifications (including minor updates up to Week 7). • It must align with the marking guidelines / rubrics for the assignment. • Content and structure should be based on the documents provided in the folder “Files for the Summer Semester Assignment”. • The website should include multiple pages (for example: Home, About, Assignment Information). • Use clean and well-structured HTML with an external CSS file. • Basic styling is required (layout, fonts, colours). • No JavaScript is required. • Any images used should be placed in an images folder. • All files (HT...
need a simple static website created using HTML and CSS only for a university assignment. Requirements: • The website must follow the 2025 Summer Semester Assignment Specifications (including minor updates up to Week 7). • It must align with the marking guidelines / rubrics for the assignment. • Content and structure should be based on the documents provided in the folder “Files for the Summer Semester Assignment”. • The website should include multiple pages (for example: Home, About, Assignment Information). • Use clean and well-structured HTML with an external CSS file. • Basic styling is required (layout, fonts, colours). • No JavaScript is required. • Any images used should be placed in an images folder. • All files (HT...
looking for an experience wordpress security manager. need to have experience with email security, website security, server security. must speak english and have proven experience.
I am conducting an authorised security assessment on a website that currently sits behind Cloudflare. The owner has given me written permission to verify how well the service hides the origin server, and my first objective is simple: locate the true, routable IP address of that server. What I need from you • Discover the origin IP without disrupting production traffic or triggering any Cloudflare security events. • Confirm that browsing directly to the uncovered IP renders the site identically to the public domain (same content, layout, and functionality). • Provide a concise report describing the exact approach—whether you relied on passive DNS enumeration (dig, SecurityTrails, Shodan etc.), historical records, sub-domain leakage, server misconfiguration, or ...
I’m looking for an experienced desktop-support professional who can step in and look after every aspect of my Windows machines. I run a mix of personal PCs and small-office workstations, so the environment shifts between home-use convenience and business-grade reliability. The immediate focus is twofold: • Installation & setup – clean OS installs, driver configuration, user profiles, network printers and the usual security hardening that keeps a fresh Windows system stable from day one. • Troubleshooting & repair – when updates break drivers, applications refuse to launch, or performance drops unexpectedly, I need someone who can diagnose quickly, walk me through fixes, and document what was done so I can reference it later. Most tasks can be handle...
Desktop / System Engineer – Onsite (1-Day Assignment) We are seeking a hands-on Desktop or System Engineer to be onsite at a client location for one full day to support a small IT infrastructure refresh. You will act as the onsite engineer while a remote technical team remains on standby. Your primary responsibility will be to rack, cable, power up, and patch IT and network equipment (servers, switches, firewalls, desktops, and printers) strictly according to the diagrams and instructions provided in advance. You will also connect console or management cables to enable remote engineers to complete configuration tasks. Before wrap-up, you will perform basic end-user computing (EUC) checks, including light troubleshooting for desktops, laptops, and printers—verifying network c...
I need a thorough security analysis of my Windows 11 PC to determine if it was compromised, enabling account theft. Key tasks: - Log file analysis - Registry analysis Ideal skills and experience: - Expertise in Windows 11 security - Proficient in log file and registry analysis - Experience with cybersecurity and threat detection - Ability to provide a detailed report of findings
My private server farm runs entirely on Windows Server 2019/2022 and I want a single, reliable point of contact to keep it both secure and resilient. Day-to-day, you will be hardening the network with advanced threat-detection practices—think real-time log analysis, strict firewall policy reviews, prompt patching, and well-documented incident response plans. All data protection flows through Veeam. I rely on daily image-level backups, off-site replication, and periodic restore tests, so you’ll need to stay on top of job success reports, storage consumption, and any failure remediation without waiting for me to ask. Support is part of the arrangement: when an issue or change request lands in the ticket queue, I expect timely follow-through and clear communication until closure...
RedHat Expertise is an external offensive security firm specializing in authorized human-layer security assessments. We support organizations by simulating real-world social engineering and phishing attack paths that internal security teams cannot ethically or operationally conduct themselves. As we prepare for upcoming client engagements, we are seeking two experienced contractors to join our vetted pool and support future assessment work. All engagements are: Fully authorized Clearly scoped Legally approved Ethics-driven Scope of Work Contractors may be engaged to: Design realistic phishing scenarios aligned with client environments Execute authorized phishing simulations using approved tooling Develop social engineering pretexts (email, phone, workflow-based) Analyze human respon...
I need an experienced security engineer to SOC 2 compliance. We have our servers hosted at AWS but we need AWS’s SOC 2 does NOT cover these which we need. 1. Authentication and Authorization ( SIEM) Secure configuration of AWS resources 2. Logging and Monitoring & Incident Report Setup only (Alerting and Incident Response you have to hire soc analyst) 3. MFA setup (two users) User access management (IAM, MFA, least privilege) 4. Privileged Access Management (SIEM) 5. Vulnerability Management Setup (Free 5-10 assets only) 6. Map AWS to SOC 2 controls 7. Change Management and Deployments Vendor management (yes, AWS counts as a vendor) ------------------------ Auditors will ask and we need to be able to answer the following. “How does your company ensure security on AW...
I’m rolling out Trend Micro EDR across a medium-enterprise environment that is almost entirely Windows based, and I need an expert to get every core security policy dialed in from day one. My immediate priorities are: • Threat Detection rules that balance rigorous protection with sensible noise levels • Data Loss Prevention configurations tailored to our departmental data flows • Application Control policies that lock down unauthorized software without hindering productivity You’ll work directly in our cloud console, map the policies to our existing AD structure, and document the rationale behind each setting so my team can manage it going forward. A brief hand-over session to walk through the configuration is part of the engagement. If you’ve d...
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.