Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

A partir das avaliações de 106,031, os clientes avaliam nosso Computer Security Consultants 4.9 de 5 estrelas.
Contratar Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

A partir das avaliações de 106,031, os clientes avaliam nosso Computer Security Consultants 4.9 de 5 estrelas.
Contratar Computer Security Consultants

Filtro

Minhas pesquisas recentes
Filtrar por:
Orçamento
para
para
para
Tipo
Habilidades
Idiomas
    Estado do Trabalho
    23 trabalhos encontrados

    Upgrade the pfss and rebuild the cluster with recovery group of 8 pfss servers,it's urgent requirement

    $68 Average bid
    $68 Média
    2 ofertas

    I run a production-level Windows server that now needs steady, professional care. The box is already up and live; what I need is someone who can step in and take over the routine work that keeps it healthy and secure. Your core responsibility will be ongoing maintenance—installing patches, checking logs, pruning obsolete services, and making sure performance never drifts. In parallel, I want proactive security updates: closing vulnerabilities quickly, hardening configurations, and documenting every change so there are no surprises later. A typical month might include: • Scheduling and applying Microsoft updates with minimal downtime • Reviewing Event Viewer and other logs for early warning signs • Updating firewall rules or IPS policies when new threats emerge ...

    $193 Average bid
    $193 Média
    12 ofertas

    We are currently looking for freelance Network Engineers in your city to support ongoing onsite requirements for our customers and act as the eyes and hands for the remote configuration team. Typical visit • Arrive at the customer location, meet the local contact, and review the work order • Rack, stack, and cable routers, switches, firewalls, or wireless access points exactly as marked on the network diagram. • Power on the gear, provide console access back to our remote engineers, and stay on-site while they push the configs and run their tests. • Perform basic physical troubleshooting if something doesn’t light up as expected and coordinate with the remote team until sign-off. What you need to bring Your own laptop, a console cable, and any basic hand tools y...

    $474 Average bid
    $474 Média
    14 ofertas

    I’m building a Spring-based service router and need robust CSRF protection on all API endpoints. The idea is to leverage Public Key Infrastructure so that every incoming request carries a verifiable, signed token before it reaches any controller logic. Here’s the core of what I’m after: • A Spring Security configuration (Boot-compatible) that intercepts every request—GET, POST, anything—and checks a PKI-backed CSRF token. • A lightweight way for upstream services or clients to obtain and refresh that token; we can refine the flow together once you see my current architecture diagrams. • Server-side validation that ties the token to the session (or an equivalent stateless approach) so replay attacks are blocked. • Clean, readable ...

    $9 Average bid
    $9 Média
    8 ofertas

    We are currently looking for freelance Network Engineers in your city to support ongoing onsite requirements for our customers and act as the eyes and hands for the remote configuration team. Typical visit • Arrive at the customer location, meet the local contact, and review the work order • Rack, stack, and cable routers, switches, firewalls, or wireless access points exactly as marked on the network diagram. • Power on the gear, provide console access back to our remote engineers, and stay on-site while they push the configs and run their tests. • Perform basic physical troubleshooting if something doesn’t light up as expected and coordinate with the remote team until sign-off. What you need to bring Your own laptop, a console cable, and any basic hand tools y...

    $25 / hr Average bid
    $25 / hr Média
    10 ofertas

    I'm seeking a security assessment for my corporate website. The primary concern is phishing attacks. I'm looking for a detailed report and provides actionable recommendations to enhance security. Key Requirements: - Assessment of current security measures (basic) - Identification of phishing vulnerabilities - Recommendations for improvement Ideal Skills and Experience: - Experience with corporate website security - Expertise in phishing attack prevention

    $100 Average bid
    $100 Média
    14 ofertas

    I want a thorough penetration test against my organisation’s external-facing infrastructure with the sole objective of uncovering every exploitable vulnerability before anyone else does. The scope is limited to the public IP ranges and cloud assets I will provide; nothing on the internal network is in play this time. You are free to use the standard toolkit—Nmap, Nessus, Burp Suite, Metasploit, custom scripts—so long as the testing remains non-disruptive and fully documented. OWASP and PTES methodology are both acceptable; feel free to blend them if it yields deeper coverage. Deliverables I need: • An executive-level summary that highlights critical findings in plain language. • A detailed technical report listing each vulnerability, proof-of-concept evide...

    $622 Average bid
    $622 Média
    23 ofertas

    For this project I'm looking for a VERY competent consultant on Windows systems and (maybe) on ethical hacking. Standard approach is not useful and doesn't solve the task. I want to clarify that the request is made for purely educational and exercise purposes. The goal is to make a client accessible/usable again (ethical hacking techniques). The target client is really closed/blocked. The client is Windows 11 Enterprise 23H2 - Experience Pack 1000 - 64bit (OS build 22631.5908) Actual landscape: - Windows user is not local machine Administrator. - The local disk is encrypted via BitLocker (booting from the outside therefore does not allow reading the data); - BIOS has a password, not known; - Unauthorized applications are not allowed (no possible to install nothing more). - ...

    $330 Average bid
    $330 Média
    36 ofertas
    PAM Engineer for Delinea Systems
    4 dias left
    Verificado

    I need an experienced Privileged Access Management engineer who can immediately take ownership of our Delinea Secret Server and Endpoint Privilege Manager landscape. Your first responsibility will be the daily care-and-feeding of the vault itself—credential onboarding, policy tuning, monitoring, and rapid troubleshooting—so that administrators, service accounts, and applications can continue to work without interruption. Beyond steady-state operations, I want you to drive the next wave of improvements that will make life easier for our users. The priority is clear: simplify access without diluting security. That means reviewing our current request workflows, tightening least-privilege rules, and automating as much of the approval and credential rotation process as possible whi...

    $276 Average bid
    $276 Média
    2 ofertas

    I need a hands-on network engineer for a single day of onsite work. Your main task will be to rack, stack, power up, and cable two types of devices—routers and switches—exactly as shown in the network diagram. Once everything is patched, you’ll open console access so our remote team can jump in and finish the configuration. Deliverables for the day • Routers and switches physically installed, powered, and neatly patched • Verified console connectivity for each device • Any laptop or printer glitches resolved or clearly documented • A brief hand-off report summarizing what was done and noting anything that needs follow-up Bring your own basic toolkit (screwdrivers, cable tester, console cable, etc.) and be comfortable working independently whi...

    $42 / hr Average bid
    $42 / hr Média
    11 ofertas

    Desktop / System Engineer – Onsite (1-Day Assignment) We are seeking a hands-on Desktop or System Engineer to be onsite at a client location for one full day to support a small IT infrastructure refresh. You will act as the onsite engineer while a remote technical team remains on standby. Your primary responsibility will be to rack, cable, power up, and patch IT and network equipment (servers, switches, firewalls, desktops, and printers) strictly according to the diagrams and instructions provided in advance. You will also connect console or management cables to enable remote engineers to complete configuration tasks. Before wrap-up, you will perform basic end-user computing (EUC) checks, including light troubleshooting for desktops, laptops, and printers—verifying network c...

    $11 / hr Average bid
    $11 / hr Média
    6 ofertas

    I'm seeking a forensic expert to conduct a thorough audit of my personal cell phone. This audit is crucial for security and privacy verification. Key requirements: - Detailed examination of all third-party secret messaging apps, including but not limited to: - WhatsApp - Signal - Telegram - Snapchat - Viber - Line - Access and analyze call history, text messages, photos, and videos as needed. - Provide a complete report of findings. Ideal skills and experience: - Proven expertise in digital forensics - Familiarity with a wide range of messaging apps - Strong analytical skills - Ability to maintain confidentiality and security Looking forward to your proposals.

    $462 Average bid
    $462 Média
    26 ofertas
    HTML & CSS Website -- 2
    4 dias left
    Verificado

    need a simple static website created using HTML and CSS only for a university assignment. Requirements: • The website must follow the 2025 Summer Semester Assignment Specifications (including minor updates up to Week 7). • It must align with the marking guidelines / rubrics for the assignment. • Content and structure should be based on the documents provided in the folder “Files for the Summer Semester Assignment”. • The website should include multiple pages (for example: Home, About, Assignment Information). • Use clean and well-structured HTML with an external CSS file. • Basic styling is required (layout, fonts, colours). • No JavaScript is required. • Any images used should be placed in an images folder. • All files (HT...

    $99 Average bid
    $99 Média
    22 ofertas
    HTML & CSS Website
    4 dias left
    Verificado

    need a simple static website created using HTML and CSS only for a university assignment. Requirements: • The website must follow the 2025 Summer Semester Assignment Specifications (including minor updates up to Week 7). • It must align with the marking guidelines / rubrics for the assignment. • Content and structure should be based on the documents provided in the folder “Files for the Summer Semester Assignment”. • The website should include multiple pages (for example: Home, About, Assignment Information). • Use clean and well-structured HTML with an external CSS file. • Basic styling is required (layout, fonts, colours). • No JavaScript is required. • Any images used should be placed in an images folder. • All files (HT...

    $98 Average bid
    $98 Média
    31 ofertas
    Wordpress Security Manager
    4 dias left
    Verificado

    looking for an experience wordpress security manager. need to have experience with email security, website security, server security. must speak english and have proven experience.

    $12 / hr Average bid
    $12 / hr Média
    128 ofertas
    Cloudflare Origin IP Discovery
    3 dias left
    Verificado

    I am conducting an authorised security assessment on a website that currently sits behind Cloudflare. The owner has given me written permission to verify how well the service hides the origin server, and my first objective is simple: locate the true, routable IP address of that server. What I need from you • Discover the origin IP without disrupting production traffic or triggering any Cloudflare security events. • Confirm that browsing directly to the uncovered IP renders the site identically to the public domain (same content, layout, and functionality). • Provide a concise report describing the exact approach—whether you relied on passive DNS enumeration (dig, SecurityTrails, Shodan etc.), historical records, sub-domain leakage, server misconfiguration, or ...

    $23 Average bid
    $23 Média
    13 ofertas

    I’m looking for an experienced desktop-support professional who can step in and look after every aspect of my Windows machines. I run a mix of personal PCs and small-office workstations, so the environment shifts between home-use convenience and business-grade reliability. The immediate focus is twofold: • Installation & setup – clean OS installs, driver configuration, user profiles, network printers and the usual security hardening that keeps a fresh Windows system stable from day one. • Troubleshooting & repair – when updates break drivers, applications refuse to launch, or performance drops unexpectedly, I need someone who can diagnose quickly, walk me through fixes, and document what was done so I can reference it later. Most tasks can be handle...

    $261 Average bid
    $261 Média
    26 ofertas

    Desktop / System Engineer – Onsite (1-Day Assignment) We are seeking a hands-on Desktop or System Engineer to be onsite at a client location for one full day to support a small IT infrastructure refresh. You will act as the onsite engineer while a remote technical team remains on standby. Your primary responsibility will be to rack, cable, power up, and patch IT and network equipment (servers, switches, firewalls, desktops, and printers) strictly according to the diagrams and instructions provided in advance. You will also connect console or management cables to enable remote engineers to complete configuration tasks. Before wrap-up, you will perform basic end-user computing (EUC) checks, including light troubleshooting for desktops, laptops, and printers—verifying network c...

    $37 / hr Average bid
    $37 / hr Média
    9 ofertas

    I need a thorough security analysis of my Windows 11 PC to determine if it was compromised, enabling account theft. Key tasks: - Log file analysis - Registry analysis Ideal skills and experience: - Expertise in Windows 11 security - Proficient in log file and registry analysis - Experience with cybersecurity and threat detection - Ability to provide a detailed report of findings

    $170 Average bid
    $170 Média
    31 ofertas

    My private server farm runs entirely on Windows Server 2019/2022 and I want a single, reliable point of contact to keep it both secure and resilient. Day-to-day, you will be hardening the network with advanced threat-detection practices—think real-time log analysis, strict firewall policy reviews, prompt patching, and well-documented incident response plans. All data protection flows through Veeam. I rely on daily image-level backups, off-site replication, and periodic restore tests, so you’ll need to stay on top of job success reports, storage consumption, and any failure remediation without waiting for me to ask. Support is part of the arrangement: when an issue or change request lands in the ticket queue, I expect timely follow-through and clear communication until closure...

    $243 Average bid
    $243 Média
    46 ofertas

    RedHat Expertise is an external offensive security firm specializing in authorized human-layer security assessments. We support organizations by simulating real-world social engineering and phishing attack paths that internal security teams cannot ethically or operationally conduct themselves. As we prepare for upcoming client engagements, we are seeking two experienced contractors to join our vetted pool and support future assessment work. All engagements are: Fully authorized Clearly scoped Legally approved Ethics-driven Scope of Work Contractors may be engaged to: Design realistic phishing scenarios aligned with client environments Execute authorized phishing simulations using approved tooling Develop social engineering pretexts (email, phone, workflow-based) Analyze human respon...

    $1086 Average bid
    $1086 Média
    24 ofertas

    I need an experienced security engineer to SOC 2 compliance. We have our servers hosted at AWS but we need AWS’s SOC 2 does NOT cover these which we need. 1. Authentication and Authorization ( SIEM) Secure configuration of AWS resources 2. Logging and Monitoring & Incident Report Setup only (Alerting and Incident Response you have to hire soc analyst) 3. MFA setup (two users) User access management (IAM, MFA, least privilege) 4. Privileged Access Management (SIEM) 5. Vulnerability Management Setup (Free 5-10 assets only) 6. Map AWS to SOC 2 controls 7. Change Management and Deployments Vendor management (yes, AWS counts as a vendor) ------------------------ Auditors will ask and we need to be able to answer the following. “How does your company ensure security on AW...

    $528 Average bid
    $528 Média
    63 ofertas

    I need help with my ethical hacking homework, specifically in network security. The task involves penetration testing on a Local Area Network (LAN). Requirements: - Expertise in ethical hacking and penetration testing. - In-depth knowledge of network security protocols. - Ability to identify and exploit vulnerabilities within a LAN. Ideal Skills: - Certified Ethical Hacker (CEH) or equivalent certification. - Experience with penetration testing tools (e.g., Metasploit, Nmap). - Strong understanding of network architecture and security measures. Please provide a detailed plan and any relevant experience.

    $451 Average bid
    $451 Média
    29 ofertas

    Artigos Recomendados Só para Você