Internet Security Jobs

Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

From 64,166 reviews, clients rate our Internet Security Experts 4.9 out of 5 stars.
Hire Internet Security Experts

Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

From 64,166 reviews, clients rate our Internet Security Experts 4.9 out of 5 stars.
Hire Internet Security Experts

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    12 jobs found

    Need experienced Linux System Administrator for server hardening. Tasks include security audit, firewall configuration, SSH hardening, user access control, patch management, and security monitoring setup. Must have experience with Ubuntu/CentOS and tools like Fail2ban, SELinux. Provide documentation of all changes.

    £325 Average bid
    £325 Avg Bid
    43 bids

    I'm seeking a security assessment for my corporate website. The primary concern is phishing attacks. I'm looking for a detailed report and provides actionable recommendations to enhance security. Key Requirements: - Assessment of current security measures (basic) - Identification of phishing vulnerabilities - Recommendations for improvement Ideal Skills and Experience: - Experience with corporate website security - Expertise in phishing attack prevention

    £76 Average bid
    £76 Avg Bid
    16 bids
    HTML & CSS Website -- 2
    2 days left
    Verified

    need a simple static website created using HTML and CSS only for a university assignment. Requirements: • The website must follow the 2025 Summer Semester Assignment Specifications (including minor updates up to Week 7). • It must align with the marking guidelines / rubrics for the assignment. • Content and structure should be based on the documents provided in the folder “Files for the Summer Semester Assignment”. • The website should include multiple pages (for example: Home, About, Assignment Information). • Use clean and well-structured HTML with an external CSS file. • Basic styling is required (layout, fonts, colours). • No JavaScript is required. • Any images used should be placed in an images folder. • All files (HT...

    £73 Average bid
    £73 Avg Bid
    22 bids
    HTML & CSS Website
    2 days left
    Verified

    need a simple static website created using HTML and CSS only for a university assignment. Requirements: • The website must follow the 2025 Summer Semester Assignment Specifications (including minor updates up to Week 7). • It must align with the marking guidelines / rubrics for the assignment. • Content and structure should be based on the documents provided in the folder “Files for the Summer Semester Assignment”. • The website should include multiple pages (for example: Home, About, Assignment Information). • Use clean and well-structured HTML with an external CSS file. • Basic styling is required (layout, fonts, colours). • No JavaScript is required. • Any images used should be placed in an images folder. • All files (HT...

    £72 Average bid
    £72 Avg Bid
    31 bids
    Wordpress Security Manager
    2 days left
    Verified

    looking for an experience wordpress security manager. need to have experience with email security, website security, server security. must speak english and have proven experience.

    £9 / hr Average bid
    £9 / hr Avg Bid
    128 bids

    I am conducting an authorised security assessment on a website that currently sits behind Cloudflare. The owner has given me written permission to verify how well the service hides the origin server, and my first objective is simple: locate the true, routable IP address of that server. What I need from you • Discover the origin IP without disrupting production traffic or triggering any Cloudflare security events. • Confirm that browsing directly to the uncovered IP renders the site identically to the public domain (same content, layout, and functionality). • Provide a concise report describing the exact approach—whether you relied on passive DNS enumeration (dig, SecurityTrails, Shodan etc.), historical records, sub-domain leakage, server misconfiguration, or ...

    £17 Average bid
    £17 Avg Bid
    13 bids

    I’m preparing to replace our legacy MPLS links with the SD-WAN service we’ve already contracted and need an on-site engineer in Hyderabad, Telangana to drive the entire cut-over. The environment is small—fewer than 50 routers, switches, firewalls, and edge devices—but the migration still has to be planned and executed with zero-downtime goals. Here’s what I expect: • Audit the current MPLS topology and document every dependency. • Translate existing QoS, security and routing policies into the new SD-WAN orchestrator. • Build and stage configs on the vendor-supplied edge appliances. • Coordinate with our carrier and internal teams to schedule and perform the live switchover. • Validate traffic flow, fail-over behavior, and app...

    £394 Average bid
    £394 Avg Bid
    5 bids

    I need a seasoned PHP security specialist to comb through an existing application, locate and remove every hidden backdoor, then harden the code so it stands up to malicious probing—SQL Injection is my top worry. Once the cleanup is finished, you’ll redeploy the patched build to my live PHP stack and confirm that all features operate normally under real traffic. A successful engagement means: • a brief, private report pinpointing each issue you discovered and how you neutralised it • a fully patched source tree returned to me, ready for version control • the application running stably on my server, with verification that the fixes prevent the SQL Injection vectors you identified Please come prepared with practical exploitation knowledge, the usual security ...

    £80 Average bid
    £80 Avg Bid
    49 bids

    I need a thorough security analysis of my Windows 11 PC to determine if it was compromised, enabling account theft. Key tasks: - Log file analysis - Registry analysis Ideal skills and experience: - Expertise in Windows 11 security - Proficient in log file and registry analysis - Experience with cybersecurity and threat detection - Ability to provide a detailed report of findings

    £125 Average bid
    £125 Avg Bid
    31 bids
    Secure My WordPress Site
    23 hours left
    Verified

    Project Overview I’m looking for an experienced WordPress developer to perform a forensic audit and cleanup of a site that previously used custom developer-created code and automation. After a hosting migration, the site experienced admin access issues, login loops, and plugin behaviour reverting unexpectedly. Hosting support stabilised access but confirmed that custom plugins and non-standard configurations existed and fall outside their support scope. An automated deployment mechanism has been removed, but I need confirmation that no residual scripts, hooks, or configurations remain that could overwrite files, revert settings, or affect admin access. Scope Audit custom plugins, theme code, and mu-plugins Check for role/capability filters and forced redirects As...

    £6081 Average bid
    £6081 Avg Bid
    161 bids

    My private server farm runs entirely on Windows Server 2019/2022 and I want a single, reliable point of contact to keep it both secure and resilient. Day-to-day, you will be hardening the network with advanced threat-detection practices—think real-time log analysis, strict firewall policy reviews, prompt patching, and well-documented incident response plans. All data protection flows through Veeam. I rely on daily image-level backups, off-site replication, and periodic restore tests, so you’ll need to stay on top of job success reports, storage consumption, and any failure remediation without waiting for me to ask. Support is part of the arrangement: when an issue or change request lands in the ticket queue, I expect timely follow-through and clear communication until closure...

    £178 Average bid
    £178 Avg Bid
    46 bids

    RedHat Expertise is an external offensive security firm specializing in authorized human-layer security assessments. We support organizations by simulating real-world social engineering and phishing attack paths that internal security teams cannot ethically or operationally conduct themselves. As we prepare for upcoming client engagements, we are seeking two experienced contractors to join our vetted pool and support future assessment work. All engagements are: Fully authorized Clearly scoped Legally approved Ethics-driven Scope of Work Contractors may be engaged to: Design realistic phishing scenarios aligned with client environments Execute authorized phishing simulations using approved tooling Develop social engineering pretexts (email, phone, workflow-based) Analyze human respon...

    £798 Average bid
    £798 Avg Bid
    24 bids

    Recommended Articles Just for You