• Hourly: $15.00 - $45.00
  • Expert
  • Est. time: Less than 1 month, Less than 30 hrs/week

We are seeking an expert in Microsoft to assess the security of our account and determine if it has been compromised. We would like to assess what files were affected and how to fix any issues with the account. Additionally, we need assistance organizing our Microsoft work files between accounts to improve efficiency and accessibility. The ideal candidate should have a deep understanding of Microsoft security features and be experienced in managing and organizing files within the Microsoft ecosystem. This is a great opportunity for someone who can provide comprehensive insights and implement effective strategies to enhance the security of our account while optimizing our file management system. If you have the expertise and skills required, we look forward to hearing from you.

Information SecurityWindows ServerOffice 365Vulnerability AssessmentApplication SecurityInternet SecurityInformation Security Audit
Posted 4 days ago
  • Hourly
  • Intermediate
  • Est. time: More than 6 months, Less than 30 hrs/week

We are a small company of about 50 users. All of our employees are utilizing laptops and located around the US. We are in need of someone that we can call upon whenever there is a hardware related issue that our internal software team cannot handle. This may include troubleshooting Chrome, Microsoft 365, and any Windows or home network related issues. Ideally, while we have employees in other time zones, we would like this person to be available Monday-Friday 8AM-5PM CST. We would like for billing to be only as a as needed basis. Meaning, billed only for the hours utilized.

Internet SecuritySecurity AnalysisLinux System AdministrationLAMP AdministrationNetwork AdministrationTechnical SupportWindows AdministrationHelpdeskMicrosoft WindowsData RecoveryOffice 365Incident ManagementMicrosoft Active DirectoryDatabase AdministrationMicrosoft Azure
Posted 6 days ago
  • Fixed price
  • Intermediate
  • Est. budget: $50.00

I am needing a person to hack into a. External Harddrice

Penetration TestingNetwork SecurityVulnerability AssessmentIncident Response PlanApplication SecuritySecurity Assessment & TestingEncryptionInformation SecuritySecurity AnalysisInternet SecurityGDPRPolicy WritingDefense Federal Acquisition Regulation SupplementHIPAACertified Information Systems Security Professional
  • Fixed price
  • Expert
  • Est. budget: $500.00

1. CAPTCHA or other anti-spam measures to be implemented to prevent spam and filter out automated spam submissions. 2. Content management system. 3. Install the necessary patches and software plugins for regularly scheduled updates to protect against malware. 4. Anti-virus and anti-malware solutions. 5. A trusted Web Application Firewall (WAF) to filter and monitor incoming web traffic, blocking suspicious requests and known attack patterns. 6. The ability to perform routine security scans and audits to regularly scan websites for vulnerabilities, malware, and security weaknesses. 7. Implement Secure Authentication Mechanisms to use robust authentication methods such as multi-factor authentication (MFA) unique and complex passwords. 8. Limitations on login attempts and monitoring for suspicious login activity. 9. Capabilities to ensure the encryption of sensitive data in the usage of HTTPS (SSL/TLS) to encrypt data and sensitive information transmitted between the user’s browser and my server or host, especially for the encryption of sensitive user information, payment details, and login credentials. 10. Inability or unavailability to store plaintext passwords. 11. A recommended secure web hosting provider that offers advanced security features, providing DDoS protection, firewalls, and intrusion detection systems (IDS). 12. Capabilities for regularly scheduled backup of the website that can quickly restore the website in case of a security incident, secured storage areas for backups away from the production environment, and the testing of the restoration process periodically.

WordPressWebsite SecurityInternet SecurityWeb DevelopmentWeb Design
Posted 2 weeks ago
  • Hourly: $20.00 - $100.00
  • Expert
  • Est. time: 1 to 3 months, 30+ hrs/week

We are looking to improve cyber security for our business

Information SecurityEncryptionFirewallPenetration TestingKali LinuxNetwork SecuritySecurity AnalysisInternet Security
Posted 2 weeks ago
  • Hourly
  • Intermediate
  • Est. time: Less than 1 month, Less than 30 hrs/week

Ethical hacking. Need a partners messenger, Facebook, emails, web history, text messages, photos, iPhone hack. Suspected of cheating. Would like all information as possible.

Information SecurityDigital MarketingSocial Media ManagementEthical HackingFacebook PageFacebookData RecoveryInternet SecurityChat & Messaging SoftwareEmail
  • Hourly: $30.00 - $100.00
  • Expert
  • Est. time: Less than 1 month, Less than 30 hrs/week

the shipping system we use at work is connected via sql to the database on the server. The shipping ap can be installed on a pc at home. But connecting it to the sql and ability to print locally (at home) and the concerns for security is the challenge.

VPNInternet SecurityRemote Connection Support
  • Fixed price
  • Expert
  • Est. budget: $600.00

I am currently facing challenges in securing a position within the cybersecurity field. To enhance my prospects, I am seeking a knowledgeable and experienced tutor who can offer comprehensive mentorship. My goal is to obtain relevant cybersecurity certifications and gain practical, hands-on training tailored specifically to roles as a Security Operations Center (SOC) Analyst. Additionally, I require assistance in refining my resume to better reflect my skills and qualifications. I am eager to develop a deep understanding of the following key areas: - Strategies for Cybersecurity Defense and Incident Response. - Mastery of SIEM Tools with a focus on Splunk. - In-depth Malware Analysis and Endpoint Security techniques. - Analysis of Network Traffic and Event Data. - Operating Systems fundamentals, particularly Windows and Linux. - Familiarity with key standards and frameworks, including NIST SP 800-53, ISO27001, PCI DSS, and the Cyber Kill Chain. - Engaging in Proactive Threat Hunting and Compromise Research. - Understanding DNS and Email Security Protocols, including DMARC, SPF, and DKIM. - Skills in Vulnerability Management using tools like Qualys, Nmap, and Nessus. - Competence in Endpoint Detection and Response (EDR) tools such as Carbon Black and CrowdStrike. - Knowledge in Network Detection Response systems, notably Fidelis. - A strong foundation in TCP/IP and Networking Concepts. - Exceptional Time Management and Conflict Resolution skills. I am looking for a mentor who can provide structured guidance and insights into the complexities of the cybersecurity domain, helping me to not only acquire theoretical knowledge but also practical expertise critical for an SOC Analyst role.

Security AnalysisNetwork SecurityInformation SecurityCybersecurity ManagementCertified Information Systems Security ProfessionalCertified Information Security ManagerInternet SecurityDigital ForensicsSecurity EngineeringPenetration Testing
Jobs Per Page: Â