Filter

Mina senaste sökningar
Filtrera:
Budget
till
till
till
Typ
Kompetens
Språk
    Jobbstat
    2,000 threat jobb har hittats, med prissättning USD

    at "" I'm seeking a professional who can provide Marketing and sales for my Cloud and Cybersecurity Architecture services Ideal Skills: - Proven experience in Cloud Infrastructure design and Cybersecurity. - Proficiency in Cyber Threat Intelligence Analysis. - Demonstrated success in developing effective Security Strategies. - Previous experience working with small organizations is a plus. Please provide relevant samples of your previous work and outline your approach to addressing our unique needs.

    $19 / hr (Avg Bid)
    $19 / hr Snittbud
    6 bud

    I'm currently facing a few issues with my Magento 2.4 website that need immediate attention. I'm looking for a skilled and experienced Magento developer to handle the following: - Google tag isn't connecting p...process, I'll provide you with developer platform access. As for the environment, I'd prefer these fixes to be addressed on a development/staging environment. Ideal Skills: The ideal candidate for this project should have: - Proven experience with Magento 2.4, including troubleshooting and patching - Strong understanding of Google Tag Manager and URL rewriting - Experience in malware and security threat removal - Ability to work with a developer platform I value efficiency and professionalism, so if you're confident in your ability to tackle ...

    $20 / hr (Avg Bid)
    $20 / hr Snittbud
    70 bud
    Full Stack Developer (MERN) 4 dagar left
    VERIFIERAD

    ...of experience in agile development of scalable SaaS apps in the cybersecurity area: Improve our app (URL Risk assessment) Improve our app (Domain Typosquatting) Improve our project (Darknet Monitoring) Create an app "hackerview" for passive attack surfave enumeration Create an app for detecting spoofed social media profiles Create an app to scrape ransomware threat actor website and maitain stats about those sites Improve an existing app to monitor paste sites Mininmal Tech Experience: MERN, REST API (JWT), Django, Python, Github, CI/CD, Celery, Redis, Linux, Postgress, Kubernetes, Docker, Nginx, JS, HTML5, Protocols (DNS, SMTP, SSL, HTTP..).Detailed app specifications will be shared at a later stage. |--------------------------------------------------

    $53 / hr (Avg Bid)
    $53 / hr Snittbud
    71 bud

    Preferred Commnications and Wi-Fi, Inc. is looking for Watchguard firewall techs for both firewall and endpoint security pre-Install config. and support. Requirements: - In-depth knowledge of hardware firewalls ...for Watchguard firewall techs for both firewall and endpoint security pre-Install config. and support. Requirements: - In-depth knowledge of hardware firewalls and their functionalities. - Expertise in intrusion detection systems. - Experience with high-risk threat detection and response. - Capable of optimizing firewall settings for maximum security. I am looking for a professional with a sterling track record in enhancing hardware firewall intrusion detection capabilities. If you are up to the task and confident with high-risk threat management, I would like ...

    $67 / hr (Avg Bid)
    $67 / hr Snittbud
    6 bud

    As a small-scale business owner, I need a proficient cybersecurity expert to address three crucial areas of cybersecurity within my organization: network security, data protection, and threat detection. Additionally, expertise in penetration testing will be of added value. Key responsibilities will include: - Setting up and managing a secure network infrastructure to ensure protection against possible network threats. - Implementing solutions for data protection to safeguard sensitive data and reduce the risk of data breaches. - Establishing reliable threat detection mechanisms to identify and combat cyber threats before they impair our systems. - Conducting penetration testing to identify any potential vulnerabilities and strengthen our security posture. Further, to naviga...

    $966 (Avg Bid)
    $966 Snittbud
    7 bud

    ...Attitudes, Conservative and Liberal Ideologies. I have put two starter refernces we must put in this report, but also you must find four to five references to include in this essay. Those are the report that canbe usuful: - Not All Ideologies are Created Equal: Epistemic, Existential, and Relational Needs Predict System Justifying Attitudes - Motivated Closed-Mindedness Mediates the Effect of Threat on Political Conservatism H. Thórisdóttir, J. Jost - The Politics of Fear: Is There an Ideological Asymmetry in Existential Motivation? J. Jost, Chadly Stern, Nicholas O. Rule, Joanna Sterling An attempt to clarify the link between cognitive style and political ideology: A non-western replication and extension Onurcan Yilmaz, S. A. Saribay Reflective liberals an...

    $254 (Avg Bid)
    $254 Snittbud
    52 bud

    I am looking to develop an AIOPS system that primarily focuses on user behavior logs for proactive monitoring. Here's a brief outline of my requirements: - The main objective is automated incident management, efficient anomaly detection, active threat detection and generating tailored training programs to teach the solution. - The system should exclusively work with user behavior logs. Ideal candidates will have a proven track record in implementing similar systems and should have extensive experience working with AIOPS systems, threat detection, and manual neutralization strategies. Knowledge and experience with user behavior logs will be a significant advantage.

    $2078 (Avg Bid)
    $2078 Snittbud
    36 bud

    ...email could be a legit email, ould be spam or a real phish. The email is sent directly from the user's email client yo our admin consol. Then, the emails gets deleted from the user's inbox. - User notification: A pop-up window should appear to confirm the report. Additional Features: - An email template should open for the user to provide additional details. This can help in further analyzing the threat and improve our phishing prevention systems. - The add-in must be published and available in the Office Store so that Office administrators can easily install it. - The add-in must work in both desktop (Windows y MacOS) and mobile environments (Android and iOS). Ideal Skills: - Proficiency in Microsoft Outlook and Office 365 add-in development. - Experience in API int...

    $474 (Avg Bid)
    $474 Snittbud
    53 bud

    My project aims to develop an advanced cybersecurity resilience solution ensuring enhanced threat detection, streamlined incident response, data protection, and secured critical infrastructure. Primary Outcomes: - Create a system capable of detecting threats in an advanced and sophisticated manner - Develop smooth and efficient incident responses to mitigate risks as soon as they are detected - Incorporate layers of security for the comprehensive protection of data - Deeply integrate security processes to protect crucial infrastructure Key Focus Areas: This project will prioritize: - Enhancing threat detection - Streamlining the process of incident response - Protection of critical data - Secure the critical infrastructure Target Audience: This solution is initially targe...

    $364 (Avg Bid)
    $364 Snittbud
    13 bud

    I am seeking to acquire a comprehensive list of 10,000 fake domains associated specifically Saudi Arabia with phishing scams. This list will primarily serve the purpose of security testing. The focus of this task will be on the accumulation of domains, with no requirement for a detailed description of each domain's potential threat level. The ideal freelancer for this job would have a strong background in cyber security and a profound understanding of Web Scraping, phishing scams.

    $290 (Avg Bid)
    $290 Snittbud
    21 bud

    I'm in need of a highly-skilled professional who specializes in Azure Security Engineering and ForgeRock Training. Key tasks include: - Azure security configuration - Conducting vulnerability assessments - Undertaking threat hunting exercises Additionally, expertise in ForgeRock training covering the following topics will greatly benefit my team: - Identity and Access Management (IAM) - Single Sign-On (SSO) - User Provisioning The ideal candidate is required to hold an 'Azure Security Engineer Certification'. This certification will give me confidence in your capabilities to successfully execute the necessary tasks. Your adeptness in handling Azure security coupled with your ability to impart crucial knowledge in ForgeRock makes you an integral team player for ...

    $6 / hr (Avg Bid)
    $6 / hr Snittbud
    3 bud

    I am looking for a comp...create a demo page similar to ''. The functionalities of this page should include: - Website vulnerability scanning - Threat analysis and security grading The critical aspect that the demo page should highlight is the threat analysis and security grading of website vulnerability scanning. As for the presentation of penetration testing results, they should be displayed in a textual format. Candidates should have strong skills and experience in web development, security grading, and vulnerability scanning. A thorough understanding of threat analysis is also crucial for this project. Your ability to effectively transform complex data into understandable textual narratives will be highly valued.

    $168 (Avg Bid)
    $168 Snittbud
    17 bud
    Trophy icon flyer program Avslutades left

    ...to the living continues in new and powerful ways. Lesson 3 The Mourning After What is the Jewish grieving process and what is the significance of its various traditions? This lesson provides a meaningful Jewish perspective on grief itself, as well as practical shiva etiquette both for mourners and for those who wish to comfort them. Lesson 4 Where We Go The promise of heaven and the threat of hell have driven humankind for centuries. Discover what Jews believe about where every soul goes and how Kaddish is just one method that aids a soul in reaching true peace. Lesson 5 Where We Go Again Reincarnation: more than a fascinating topic, Judaism provides a practical way to imagine this mystical process, and explains why it is important both to departed souls and ...

    $75 (Avg Bid)
    Garanterad
    $75
    134 bidrag

    I need a PowerPoint presentation that encapsulates my scientific research talk on 'Threat Modeling for Mobile Health Systems'. This presentation should be a concise 15 slides with an emphasis on a design that's not just appealing, but professional and fitting to the subject matter. The color scheme I'm looking for should be aligned with computer science aesthetics. Key elements of this project: - Translate my detailed research talk into a 15-slide PowerPoint presentation - Design the slides in a manner that's professional and visually appealing - Utilize a color scheme that fits the subject matter and is aligned with computer science aesthetics The ideal freelancer for this job would: - Have experience in designing professional and engaging PowerPoint pres...

    $20 (Avg Bid)
    $20 Snittbud
    17 bud

    I am looking for a web security expert, who can solve the reputation and suspicious tag on our web app links. Off recently few customers in US region are getting blocked from accessing our links, they are shown potential threat in the links

    $76 (Avg Bid)
    $76 Snittbud
    8 bud

    ...penetration testing on our network and system infrastructure. The primary objective of this task is to find potential security vulnerabilities. - Task Details: Your work will involve identifying weaknesses that could possibly be exploited to undermine our security controls and then testing how effective these controls truly are. - Approach: Please prioritize any vulnerabilities found according to threat severity level. I'm looking to focus on the most critical threats before handling the lesser ones. - Necessary Skills: Previous experience in network security, vulnerability assessment, and penetration testing is critical. You need to demonstrate a strong understanding of network and system infrastructure, its vulnerabilities, and security control mechanisms. This t...

    $107 (Avg Bid)
    $107 Snittbud
    17 bud

    I'm seeking a v2x security expert to conduct in-depth research on threat detection within the v2x technology landscape. This position is for a 3-year period and will focus on the following areas: - Threat Detection: The primary objective is to identify and analyze potential threats to v2x systems. Specifically, I am concerned about Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. The ideal candidate should have: - A strong background in v2x security research, with a focus on threat detection. - Extensive knowledge and experience in Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. - Experience presenting and publishing research at conferences like USENIX and NDSS. - The ability to produce high-quality research papers and p...

    $1255 (Avg Bid)
    $1255 Snittbud
    9 bud

    ...ensure functionality, reliability, and security. Required Skills and Qualifications Splunk Development: Proven experience in developing Splunk apps and custom SPL commands. API Integration: Experience with RESTful API integration and handling JSON data. Frontend Development: Skills in HTML, CSS, and JavaScript for UI design within Splunk. Cybersecurity Knowledge: Understanding of cybersecurity and threat analysis. Problem Solving: Ability to troubleshoot and resolve issues during development. Communication: Strong communication skills for clear documentation and regular updates. Project Timeline The project is expected to be completed within 2 months from the start date. Application Requirements Proposal: Outline of your approach to the project, including any initial ideas for ...

    $304 (Avg Bid)
    $304 Snittbud
    33 bud

    I'm looking to create a comprehensive platform specifically designed for pilot training. This platform should be equipped with key features including interactive tests and quizz...specifically designed for pilot training. This platform should be equipped with key features including interactive tests and quizzes, engaging video lessons, and live Q&A sessions. Additionally, an integral part of this platform will be the incorporation of threat assessments such as risk assessment procedures and threat detection. I'm keen on working with developers who have experience in educational platforms particularly with creating interactive tests and content, implementing video/real-time capabilities, and integrating risk/threat assessment protocols. A deep understandin...

    $879 (Avg Bid)
    Sekretessavtal
    $879 Snittbud
    17 bud

    ...consulting firm dedicated to empowering companies by safeguarding their digital assets from malicious hackers. With a team of expert ethical hackers, strategists, and consultants, we collaborate seamlessly to construct impregnable security frameworks that are virtually impenetrable. We are passionate about providing innovative solutions to our clients and staying ahead of the ever-evolving cyber threat landscape. Position Overview: We are seeking a dynamic and results-driven Digital Marketing & Sales Specialist to join our team. The ideal candidate will have a strong background in digital marketing, lead generation, and sales, with a focus on the cybersecurity industry. They will be responsible for developing and executing digital marketing strategies to drive lead generatio...

    $133 (Avg Bid)
    $133 Snittbud
    36 bud

    ...skilled cybersecurity analyst to conduct an in-depth comparative analysis of various threat intelligence platforms. The primary goal of this project is to evaluate and document the distinct strengths and weaknesses of each platform, focusing on their data sources, collection methods, and analysis/reporting capabilities. Platforms for Analysis: The analysis should cover the following threat intelligence platforms: 1. IBM QRadar 2. Recorded Future 3. Microsoft Azure Sentinel 4. Crowdstrike 5. AlienVault 6. Trend Micro 7. VirusTotal 8. Kaspersky Key Areas of Focus: - Data Sources and Collection Methods: Understand and evaluate how each platform gathers and utilizes data for threat intelligence. - Analysis and Reporting Capabi...

    $281 (Avg Bid)
    $281 Snittbud
    21 bud

    I'm seeking a designer who can design five image-based posts for Facebook. The focus will be on raising awareness about threats to Amazon Brand Stores. (Key responsibilities: - Develop five relevant, eye-catching images. - Ensure each image encapsulates the specified threats. - Design posts that effectively raise awareness about these challenges. Ideal Skills: - Strong graphic design and image editing. - Familiar with Facebook posting guidelines. - Understands Amazon Brand Store challenges. - Content creation with an education and awareness focus.)

    $35 (Avg Bid)
    $35 Snittbud
    18 bud

    ...create a captivating cover for a fantasy book, embodying a unique juxtaposition of ethereal elegance and mysterious menace. The cover should prominently feature angels and vampires, rendered in a complimentary mix of grace and foreboding. Key requirements: - An enchanting portrayal of angels, embodying elegance and ethereal beauty. - A menacing depiction of vampires, preserving the mystery and threat they represent. - The composition should masterfully meld both entities, showcasing their contrasting natures but also their potential harmony. - Utilisation of vibrant colors and dramatic shadows to enhance the cover appeal. Ideal skills: - Expertise in digital illustration or painting, with a body of work showcasing ability to create detailed, engaging fantasy characters. - Pre...

    $105 (Avg Bid)
    $105 Snittbud
    50 bud

    I need a 10-20 page research paper on Cyber Threat Intelligence (CTI) that will be submitted for publication in an IEEE journal. The paper must be written in an academic style and be suitable for a readership of fellow researchers in the field. Requirements: - Expertise in Cyber Threat Intelligence: You should have a solid understanding of the theory and practice of CTI, including its applications and methodologies. - Academic Writing Skills: Ability to write in an engaging, clear, and academically rigorous style. - IEEE Publication Experience: Preferably, you should have previous experience with IEEE publications and be familiar with their submission requirements. Please submit a proposal detailing your relevant experience in this field, along with a timeline for completi...

    $130 (Avg Bid)
    $130 Snittbud
    27 bud

    I'm specifically targeting BandCamp for an online sales drive of my two albums. My strategy involves a triple-threat approach, using social media promotion, an email marketing campaign, and other innovative strategies that can boost my visibility and sales. Ideal Skills and Experience: - Expertise in BandCamp album promotions - Proficiency in social media marketing, particularly in relation to music promotion. - Strong background in email marketing - Ability to suggest and implement additional effective promotional strategies. - Prior experience in the music industry would be a plus. Tasks Include: - Driving album sales through BandCamp - Organizing and managing a social media campaign - Creating and executing an email marketing strategy - Proposing and implementi...

    $94 (Avg Bid)
    $94 Snittbud
    12 bud

    I need IEEE format paper and PPT related to A secure and Robust framework with threat modeling in a Mobile-government.

    $60 (Avg Bid)
    $60 Snittbud
    1 bud

    ...table with key insights ⚡ Fast, expert research & delivery Order now & unlock cybersecurity knowledge! Tags: cybersecurity, research, CIA, IEEE, analysis, comparison - Identifying potential vulnerabilities in multiple IoT in smart city systems - Analyzing existing cybersecurity measures - Proposing enhanced security solutions The ideal candidate will understand A secure and Robust framework with threat modeling in a Mobile-government, their potential vulnerabilities, and possible solutions. Your role would also involve aiding in comparison and assessment of different cybersecurity measures. specific area of this topic: you will need to find it out of the 5 articles after you get them out of the internet. share them with first and we will agree on them. Research foc...

    $100 (Avg Bid)
    $100 Snittbud
    32 bud

    I'm currently in need of a script writer for my youtube video who has the talent for turning data and objectives into a compelling infographic script. This script will focus on storytelling and should cater towards imparting educational content. Topic - NEURALINK: The Biggest Threat to Humanity! Ideal Candidate: - Excellent writing skills - An understanding of data visualization - Experience with infographic script writing - Background in crafting educational stories Responsibilities: - Develop a script for an infographic - Use storytelling to present an educational narrative - Ensure script visually translates into an infographic effectivel - attach your work experience in on script writing The goal is to use engaging storytelling to present an academic theme in an eng...

    $12 (Avg Bid)
    $12 Snittbud
    16 bud

    ...Most of the employees agreed that AvantPharm was a great place to work. The company paid well, treated employees with respect, and had high standards for quality assurance and customer service. Over the last several years, however, rumors began to spread among various departments that Mark’s philosophy of running financially “lean” with regard to staffing and critical project initiatives was a threat to the stability of the organization. The manager of IT, Jane Smith, was one of the first people to voice her concerns. In each of the last 4 years, Jane’s IT budget was reduced in order to redirect additional funding to Research & Development. As a result of these cuts, the IT department had not increased headcount in the last 2 years, nor was there any m...

    $19 (Avg Bid)
    $19 Snittbud
    95 bud

    I am looking for a professionals and experienced cybersecurity sales freelancer to help me expand my client base. My company specializes in providing threat intelligence and table top exercises services. Key Responsibilities: - Research and identify potential clients in the technology sector - Reach out to these clients and pitch our cybersecurity services - Conduct sales meetings independently with minimal guidance Ideal Candidate: - Proven experience in cybersecurity sales, especially in the technology sector - Strong understanding of threat intelligence and table top exercises - Ability to communicate complex technical concepts in a clear and concise manner - Self-driven and able to work independently - Familiarity with intermediate level of cybersecurity expertise - Ex...

    $9 / hr (Avg Bid)
    $9 / hr Snittbud
    9 bud
    Cryptocurrency Avslutades left

    ...Features: To enhance the trading experience and meet the needs of both novice and experienced traders, the platform will incorporate advanced trading features such as limit orders, market orders, stop-loss orders, and margin trading. These features will empower users to execute trades with precision and flexibility. Security and Compliance: Security is paramount in the cryptocurrency space, where the threat of hacking and theft is ever-present. Our platform will implement industry-leading security measures, including encryption, two-factor authentication (2FA), and cold storage for storing user funds. Additionally, we will ensure compliance with regulatory requirements, including anti-money laundering (AML) and know your customer (KYC) regulations, to mitigate legal and reputati...

    $20 / hr (Avg Bid)
    $20 / hr Snittbud
    23 bud

    Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application’s integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses H...

    $140 (Avg Bid)
    $140 Snittbud
    8 bud
    error message Avslutades left

    Hi Indra P., for some reasons I am not able to message you. i got this error "not allow to send message to this threat. " and not want you to think I ignore you. but not sure how to communicate with you. please email me if you need me. thanks

    $20 (Avg Bid)
    $20 Snittbud
    1 bud
    Craft a Phishing Email Avslutades left

    ...of available information from Wi-Fi networks to which you are not connected surprise you? Scroll back to the first column of information. Under SSID, is there a service set identifier for each network? Why would an SSID not appear? Does disabling the broadcast of the SSID name give any enhanced level of security? Why or why not? Note the value under the column MAC Address. How could a threat actor use this information? Under RSSI, the signal strength is displayed. (Lower numbers indicate a stronger signal.) The Frequency column displays the frequency on which the network is transmitting, and the Channel column gives the corresponding channel. Click Channel to sort the channels. Is there any channel overlap? How could this be a problem? Double-click the Wi-Fi networ...

    $16 (Avg Bid)
    $16 Snittbud
    6 bud

    ...cloud platforms such as AWS, Azure, and Google Cloud, as well as private and hybrid cloud environments. Managed cloud services may include migration assistance, security management, performance optimization, and cost optimization. Security Services: Managed security service providers (MSSPs) specialize in protecting organizations from cyber threats by offering a range of security services such as threat monitoring and detection, vulnerability assessments, incident response, and compliance management. MSSPs help businesses strengthen their security posture and mitigate the risk of data breaches and other security incidents. Backup and Disaster Recovery: Managed backup and disaster recovery services provide businesses with reliable and comprehensive solutions for protecting their...

    $16 / hr (Avg Bid)
    Sekretessavtal
    $16 / hr Snittbud
    37 bud

    As a firm highly invested in our online security, we're seeking a skilled cyber security professional to undertake a one-off project centered around the analysis of our firewall logs. Primary tasks will include: - Detailed analysis of our firewall logs - Identification of potential threats within these logs - Ge...analysis of our firewall logs - Identification of potential threats within these logs - Generation of comprehensive reports on any security incidents discovered We require these reports to be delivered, conveniently and in an easily navigable format, via Excel spreadsheets. Ideal candidates will possess experience in cyber security, specifically with a focus on firewall log interpretation and threat detection, alongside robust knowledge of Excel for report produ...

    $19 (Avg Bid)
    $19 Snittbud
    23 bud

    ...conducted by an unknown company. While living an ordinary life in a city filled with technology, she is suddenly abducted by a group of agents working for Neocron. Forced to work for Neocron to develop an advanced threat system capable of disabling and destroying any new technologies produced by a rival company known as "Cyberdyn," Evangeline initially refuses but finds herself trapped in an isolated environment within a secret laboratory. Amidst this, Evangeline discovers her ability to control electrical energy and manipulate electronic devices with a mere touch, making her a threat and terror to the lab personnel. She manages to escape with the help of an unexpected ally, a scientist working within the company who opposes its policies. Led by the former all...

    $27 / hr (Avg Bid)
    $27 / hr Snittbud
    13 bud

    ...governance and compliance processes with Purview can lead to operational efficiencies and cost savings. Microsoft Purview in Action: Use Cases Regulatory Compliance: How organizations use Purview for GDPR, HIPAA, CCPA, and other regulatory compliances. Data Discovery and Classification: Real-world examples of how businesses leverage Purview to discover, classify, and protect sensitive data. Insider Threat Detection: Case studies on detecting and mitigating insider threats using Purview. Cross-platform Data Governance: Examples of Purview managing data across cloud and on-premises environments, including third-party cloud services. Getting Started with Microsoft Purview Step-by-Step Guide: A basic guide on how to start using Microsoft Purview, including setup and configuration...

    $27 (Avg Bid)
    $27 Snittbud
    24 bud

    I'm looking for a capable PHP developer who can enhance my existing Acelle mail application with new features. The main agenda for this projec...application with new features. The main agenda for this project is to bolster user experience as a cold mail outreach. Therefore, a significant experience in improving software's intuitiveness and usability would be a boon. Knowledge on Acelle Mail's workings, email marketing, and customer-centric design is desired. What I am looking for - a sequence feature which will go to the user as a threat or chain not as a completely new email - AI integration for email first-line creation. . A demonstrated experience in driving customer-centric software projects will be a plus point. Let's improve the user experience of ...

    $70 (Avg Bid)
    $70 Snittbud
    10 bud

    A personal existing instance MISP virtual machine running on TrueNAS Core at home. To be configured remotely via SHH over an OpenVPN connection, over via screen sharing. You must possess extensive knowledge in both MISP and Virus Total API and ideally have previous experience with similar integrations. The successful freelancer shou...via screen sharing. You must possess extensive knowledge in both MISP and Virus Total API and ideally have previous experience with similar integrations. The successful freelancer should be capable enough to carry out this integration seamlessly using an existing API key. Please ensure you fully understand the specified requirements prior to bidding for the project. Demonstrated experience in threat intelligence platforms or cybersecurity would be a ...

    $38 (Avg Bid)
    $38 Snittbud
    9 bud

    I'm on the lookout for a seasoned professional who possesses a high level of expertise in c...Assessment and improvement of network security - Implementation of secure protocols, with a specific focus on http3 - Thorough analysis and counteracting of cyber security threats - Network traffic analysis under attack conditions Ideal Skills and Experience: - Profound knowledge in network security and cyber security - An adept understanding and experience in http3 - Proven experience in security threat mitigation - Prior experience handling network traffic analysis under attack conditions Please note that only candidates with expert-level experience in the above-mentioned fields will be considered. This project demands the highest level of proficiency and professional acumen in com...

    $28 / hr (Avg Bid)
    $28 / hr Snittbud
    21 bud

    I'm in need of a security expert to properly configure Fail2ban on my Ubuntu server that is dedicated to filter and protect my OpenVPN setup. Your task will be to ensure that Fail2ban effectively mitigates the threat of: - Brute force attacks - DDoS attacks - Unauthorized login attempts Ideal Skills Include: - Strong knowledge of Ubuntu - Experience setting up and configuring Fail2ban - Understanding of NGINX Note: I am running a NGINX service with free openvpn for a local and private tunnel between The Server and many clients from a script.

    $33 (Avg Bid)
    $33 Snittbud
    10 bud

    I am in need of a scholarly piece focused specifically on detailed architectural models for security threat detection in logistics operation. The main objective of this research paper is not simply a theoretical analysis; the architectural model should be accompanied with a deep learning model for practical implementation. Key features of this assignment: 1. Comprehensive Threat Analysis: This paper will require an in-depth analysis of diverse security threats, according to benchmarks, that could compromise logistics systems. 2. Architectural Model: The crux of this paper will be the proposal of a thorough architectural model designed to detect and mitigate these security threats. 3. Implementation of DL Model: The project will also involve designing and implementing a d...

    $642 (Avg Bid)
    $642 Snittbud
    32 bud

    I am in need of a skilled cybersecurity professional with specific experience in DDoS threats. The purpose of this project is to capture and analyze DDoS attack traffic from our corporate network. With your help, I aim to: - Identify patterns that indicate a potential DDoS threat - Understand our network's vulnerabilities to these specific attacks - Develop a proactive defense system through learned network behavior Please note, this project requires experience with corporate network environments, analysis of DDoS network traffic, and a deep understanding of network defense systems.

    $224 (Avg Bid)
    $224 Snittbud
    11 bud

    As your client, I expect a professional freelancer to efficiently take on the critical tasks of network threat analysis, implementing secure network protocols, while also conducting comprehensive security audits. Key tasks will involve: - Network Threat Analysis: To identify potential vulnerabilities and provide proactive action plans. - Secure Network Protocols Implementation: A key step to ensure the safety of our network and reduce potential threats. - Performing Security Audits: To assess the efficacy of the secure protocols implemented and suggest improvements if required. Strong expertise in network security is greatly preferred. Showcase your past work relevant to these tasks to increase your chances in our evaluation process. Your relevant experience in this fi...

    $140 (Avg Bid)
    $140 Snittbud
    36 bud

    ...through an insurance solution. Here's a snapshot of what I'm looking for: - We'd like the icon to the left of the example attached to be the outline of the State of Michigan - A unique and professional logo encapsulating the strength and security offered by our business insurance program. - The logo should signify our core values and mission, which is to protect businesses from the ever-looming threat of cyber-attacks. Ideal skills and experience for the job would include: - Proven experience in graphic design or similar field. - A strong portfolio demonstrating logo design skills. - Understanding of brand continuity and visual communication. - Knowledge of color psychology and its implementation. If you have a knack for transforming visions into compelling vi...

    $100 (Avg Bid)
    Garanterad
    $100
    313 bidrag

    I need a knowledgeable freelancer to create dynamic and engaging info-graphics that bring information security awareness to life. These should focus on, but not restrict to: - Cyber attacks and threat mitigation - Privacy laws and data protection - Safe online habits and phishing The target audience will stretch from employees and students to the general public. All designs must be delivered in PDF format. Ideal candidates should have prior experience in graphic design, a keen attention to detail, and a solid understanding of cybersecurity concepts. Previous experience in creating info-graphics for a similar audience will be appreciated. Your ability to translate complex info into easily digestible and visual formats will be crucial for this role.

    $82 (Avg Bid)
    $82 Snittbud
    137 bud

    I'm urgently in need of a cyber security expert to guide me through my high-level educational assessments. Key Areas for Assistance: • Authentication • Access Control • Operating System Security • Vulnerabilities • Cryptography • Public Key Infrastructure • Threat Modelling Ideal Candidate Qualifications: • Demonstrated experience in network, information, and application security • Proven track record in dealing with the specified key areas • Ability to provide comprehensive, understandable guidance Please note that the timeline is critical and I need someone who can start immediately. Provide your experience and expertise in these areas. Looking forward to your bids.

    $91 (Avg Bid)
    $91 Snittbud
    28 bud

    I'm in need of a server manager with intermediate-level cybersecurity and Linux experience to effectively monitor the security of my server. Key responsibilities include: - Ongoing security monitoring of the server and Wordpress websites - Threat identification and mitigation - Advise on potential security upgrades - Ensure the safety of sensitive information It is essential for potential freelancers to understand the Linux operating system thoroughly, and have a sound understanding of server cpanel and Vesta Cp. The ideal candidate should bring a proactive approach to identify and fix security weaknesses, offering consistent updates and reports on server security status. Be patient honest and always willing to go an extra mile for longterm work relationship

    $52 (Avg Bid)
    $52 Snittbud
    19 bud

    Topp threat community artiklar