Computer Security Jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    37 jobs found, pricing in GBP
    PCI Compliance Expert 6 days left
    VERIFIED

    PCI DSS, Payment Card Industry Compliance Certification Level 4 required. Looking for expert to help acquire certification [login to view URL]

    £481 (Avg Bid)
    £481 Avg Bid
    6 bids
    Illu3or network 6 days left

    It is a social network like Instagram, but it's a digital project for a virtual reality

    £64 (Avg Bid)
    £64 Avg Bid
    1 bids

    only who are expert on computer science

    £15 (Avg Bid)
    £15 Avg Bid
    6 bids

    I need a very experienced penetration tester to work with on a project.

    £183 (Avg Bid)
    £183 Avg Bid
    9 bids
    Assist in CISCO PROJECT 5 days left
    VERIFIED

    CHECK THE FILE ATTACHED PLZ AND YOU AGREE TO KEEP UP WITH ME TILL THE PRGJECT IS FININSHED . ITS CISCO BASE PROGRAMMING , ITS ALL EXPLAINED IN THE PDF AND YOU ARE TO TRANSLATE ALL THEAT TO CODE . BEAWARE THE PHOTO IS THE FINAL STAGE OF THE PROCESS AND THATS HOW THE OUTPUT SHOULD BE . PLUS YOU SHOULD DO THE SAFTY AND QUALITY PART .

    £180 (Avg Bid)
    £180 Avg Bid
    16 bids

    I have trouble transferring certain files to gmail, naver, or other mail. Requirements 1. Files can be attached by e-mail. 2. Attachment can be downloaded. 3. Can run on Windows PC. Please solve this problem. You may need to modify the source code.

    £115 (Avg Bid)
    £115 Avg Bid
    11 bids

    I have two domains with firewalls that I want through penetration testing with a detailed report.

    £158 (Avg Bid)
    £158 Avg Bid
    17 bids

    Firewall support like Sonicwall NSA, Fortigate, Cisco ASA

    £11 / hr (Avg Bid)
    £11 / hr Avg Bid
    18 bids

    We are looking for an expert security expert who can detect flaws on our database and fix them. Please contact me if you are an expert.

    £401 (Avg Bid)
    £401 Avg Bid
    23 bids

    My task is to take any network protocol and switch it's fields in the header and observe the difference in wireshark....but the output should be the same on the terminal....only the fields sequence should be modified or u can drop the redundant bits we can use any protocols like SMTP, MQTT i want 2 protocols to be done....and I want to observe the modified difference on wireshark [login to vi...

    £16 (Avg Bid)
    £16 Avg Bid
    1 bids

    September 2018 someone went through my instagram and stole my account username which was made from 3 letters, referring to my initial I have evidence about my old username which was stolen, and that after he stole he was mocking me I have all the messages I tried with instagram to return the username, even after i showed them all the images and he was teasing and mocking me later, they just ignore...

    £132 (Avg Bid)
    £132 Avg Bid
    3 bids

    I need a highly skilled penetration tester to help with some work.

    £162 (Avg Bid)
    £162 Avg Bid
    10 bids
    Forensic computing 4 days left
    VERIFIED

    Hi I need help in writing a report about forensic computing.I will send the requirements later.

    £250 (Avg Bid)
    £250 Avg Bid
    44 bids

    Need to work with the person who have a good experience in networking projects and have a good working experience in networking & storage up to layer 4 Network.

    £11 / hr (Avg Bid)
    £11 / hr Avg Bid
    11 bids

    we need many topology designs using packet tracer I need for network designs You have to do one sample work before it if u agree to do one sample work then u can apply. thanks

    £15 / hr (Avg Bid)
    £15 / hr Avg Bid
    13 bids

    Need to find an expert of Checkpoint 7XX Series (730,750, 770,790) to help me when problem with my customer. I've about 20 7xx series installed on my customers. The problem this time is to connect a Checkpoint Endpoint Security (Vpn client) and make possible pass traffic RDP and Http (now only ping pass) Need to execute a server on Remote Desktop . The Firewall has a public and static IP...

    £40 (Avg Bid)
    £40 Avg Bid
    13 bids

    In my project I have built a VNF framework over DPDK and mTCP (network stack). I want now to secure my VNF framework using Intel SGX. First step is to setup an IPSEC tunnel or a VPN tunnel between a GateWay running on a trusted machine and the enclave running on untrusted machine. The main challenge of this project I am hiring for is to transfer encrypted packet inside enclave where VNFs applicat...

    £2999 (Avg Bid)
    £2999 Avg Bid
    10 bids

    آNotes: 1- The attached file contains the idea of the project in detail. Please see it carefully. 2- Please provide me with all the implementation steps from start to finish with all the settings and the entire file in addition to recording all the steps by creating a video for all stages of implementation.

    £461 (Avg Bid)
    £461 Avg Bid
    2 bids
    Ph.D. SYN0PSIS on IoT 3 days left
    VERIFIED

    Ph.D. SYN0PSIS on IoT Domain: computer Engg Advanced topic

    £82 (Avg Bid)
    £82 Avg Bid
    6 bids

    My task is to take any network protocol and switch it's fields in the header and observe the difference in wireshark....but the output should be the same on the terminal....only the fields sequence should be modified or u can drop the redundant bits we can use any protocols like SMTP, MQTT i want 2 protocols to be done....and I want to observe the modified difference on wireshark [login to vi...

    £125 (Avg Bid)
    £125 Avg Bid
    3 bids

    I am looking for a competent OSINT researcher and or IT analyst to initially complete a small assignment identifying the person(s) controlling a WordPress site which is published in Australia but with DNS registration in the US. The site has been set up to mask the author and administrator/controller. A range of checks have already been performed although I'm looking for someone who can go we...

    £33 / hr (Avg Bid)
    Local
    £33 / hr Avg Bid
    9 bids

    Hello! I am looking for an ethical hacking and oscp certified candidate having great knowledge of penetration testing for the perpose of teaching for ethical hacking contact only for banglore city person at india. Thanks! Skills: Computer Security, Web Security

    £253 (Avg Bid)
    £253 Avg Bid
    2 bids
    C++, coding 1 day left

    Security building with codes and

    £82 (Avg Bid)
    £82 Avg Bid
    12 bids

    Implement a communication infrastructure that uses AES to encrypt the traffic between two nodes A and B with the next characteristics. Lets consider a nod KM(key manager) that has three keys:K1,K2 and K3. K1 is linked with the CBC operating mode. K2 is linked with the OFB operating [login to view URL] is used for encrypting the keys K1 and K2. K3 is owned from the start by node A. In o...

    £96 (Avg Bid)
    £96 Avg Bid
    2 bids

    I wanna learn ethical hacking. I know many terms like social engineering, phishing, brute force etc. I want to learn advance

    £13 / hr (Avg Bid)
    £13 / hr Avg Bid
    9 bids

    I want you to make a detailed tutorial video on how to be super secure and accomplish as much privacy as possible.

    £15 (Avg Bid)
    £15 Avg Bid
    6 bids

    Hello, I’m looking for someone help me in AODV protocol according my requirements by using Ns2 and C++ backbone

    £349 (Avg Bid)
    £349 Avg Bid
    15 bids

    Number of days - 4 days Number of hours - 8 hours each day Total - 32 hours Mode - Digital medium Number of Participants - 1

    £313 (Avg Bid)
    £313 Avg Bid
    2 bids

    Topic- An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing.

    £74 (Avg Bid)
    £74 Avg Bid
    6 bids
    Cyber_security 1 day left
    VERIFIED

    your research paper should address one of the following perspectives: 2400 words • Security • Forensics and law • Black market You can choose the topic and the perspective that interests you most. For example, if you are interested in the encryption algorithms used by crypto-currencies then your topic and perspective would be “Crypto-currencies and Cybercrime” and &ldq...

    £25 (Avg Bid)
    £25 Avg Bid
    15 bids

    need to Use organization's current system security (if this is not available find one on the Internet), and create a system security plan that is appropriate for the environment under consideration. Use the "System Security Plan Template," to complete this assignment. Make sure to include screenshots (as applicable). Refer to the "System Security Plan file attached, when work...

    £151 (Avg Bid)
    £151 Avg Bid
    20 bids

    Need someone who has knowledge in computer science, distributed systems, cloud computing. to write an essay for " hurdles that are involved in information centric networking"

    £42 (Avg Bid)
    £42 Avg Bid
    49 bids

    Hello, I'm looking for some one help me in a project on Black Hole Attacks prevention issues in MANET BY USING AODV protocol. tools NS2, OTCL, C OR C++

    £396 (Avg Bid)
    £396 Avg Bid
    10 bids

    The task is to take any two network protocol and switch it's fields in the header and observe the difference in wireshark. Some ideas to apply [login to view URL] bits within certain fields, sequence [login to view URL] bits [login to view URL] bits [login to view URL] or redundant 5. remove redundant bits 6. packet compression [login to view URL] and relation with fields in the packet

    £32 (Avg Bid)
    £32 Avg Bid
    9 bids

    Ruko 3 lantai. Butuh instalasi LAN yang rapi.

    £192 - £577
    £192 - £577
    0 bids

    Top Computer Security Community Articles