Found 71 result(s).
I need a comprehensive VAPT (Vulnerability Assessment and Penetration Testing) report for our network. The assessment is required for both internal and external networks. Key objectives: - Identify vulnerabilities - Compliance check - Performance optimization Ideal skills and experience: - Proven experience in network VAPT - Knowledge of security compliance standards - Expertise in network perf...
Delivery Time: 6 days left days
Computer Security Internet Security Network Administration Report Writing Web Security
I'm seeking experienced freelance or project-based penetration testers for my cybersecurity startup, specializing in Vulnerability Assessment and Penetration Testing (VAPT). Key Requirements: - Valid OSCP or CREST certification is a must - Expertise in VAPT for: - Web applications - Networks - Cloud infrastructures - Experience in government sector cybersecurity is highly preferred -...
Delivery Time: 4 days left days
Computer Security Internet Security Research Writing Testing / QA Web Security
I'm seeking a skilled ethical hacker to help identify vulnerabilities in my application's security. The primary goal of this project is to pinpoint weak spots that could potentially be exploited by malicious entities. Ideal candidates should have: - Extensive experience in ethical hacking, particularly within application security. - Strong skills in vulnerability assessment and penetrat...
Delivery Time: 16 hours left days
Computer Security Internet Security Research Writing Technical Writing Web Security
We need a WordPress Malware expert to help remove malware from a hacked website. We installed word fence and have scanned all the files, pages etc. We need this expert to install a clean version of WP and remove all malware. Please only apply if you can do this today and fast. Please include past experience in similar projects in your proposal.
Job Type: Hourly: $20.00 - $35.00
WordPress WordPress Malware Removal Virus Removal PHP Internet Security Security Analysis Vulnerability Assessment
I need an expert to help me with a Trojan issue. Please reach out if you're experienced in dealing with such issues.
Delivery Time: 19 hours left days
Computer Security Internet Security Linux Software Architecture Web Security
I need an expert to help me with a Trojan issue. Please reach out if you're experienced in dealing with such issues.
Delivery Time: 19 hours left days
Computer Security Internet Security Linux Software Architecture Web Security
We are urgently seeking a verified white hat hacker or cybersecurity professional with expertise in Teramind monitoring, remote access, and antivirus bypass techniques, to help us reconnect a lost remote session. Background: The monitored computer is located in Colombia, and our monitoring system (based in the USA) used Teramind’s stealth agent to ensure performance, compliance, and financi...
Delivery Time: 6 days left days
I'm in need of a professional to set up a network or hub for my Minecraft Survival server. The primary function of this network will be to facilitate seamless communication for the server, as well as ensuring smooth data sharing. Key Responsibilities: - Set up a robust network for my Minecraft Survival server. - Ensure the network supports efficient business communication, data sharing, and ...
Delivery Time: 7 hours left days
Computer Security Internet Security Linux Network Administration System Admin
My company needs an expert in cybersecurity and networking to fortify our systems against potential hacking threats. We are a small business using a mixed (Windows and Linux) system, currently protected by a hardware-based firewall. Key Responsibilities: - Assessing our current vulnerabilities, particularly in network security - Implementing robust firewall and intrusion detection systems - Desig...
Delivery Time: 4 hours left days
Cisco Computer Security Internet Security Linux Network Administration
I'm looking for an experienced ethical hacker with a strong background in social media management. The scope of the project will be primarily focused on ensuring the security of my social media accounts, potentially including Facebook, Instagram, and Twitter. Key Responsibilities: 1. Conduct security assessments to identify potential vulnerabilities. 2. Assist with account recovery if neces...
Delivery Time: 19 hours left days
Computer Security Internet Security Research Writing Social Media Marketing Web Security