Found 62 result(s).
I need a comprehensive VAPT (Vulnerability Assessment and Penetration Testing) report for our network. The assessment is required for both internal and external networks. Key objectives: - Identify vulnerabilities - Compliance check - Performance optimization Ideal skills and experience: - Proven experience in network VAPT - Knowledge of security compliance standards - Expertise in network perf...
Delivery Time: 6 days left days
Computer Security Internet Security Network Administration Report Writing Web Security
I need an experienced presales design architect engineer for a residential complex project. The systems we require are CCTV and security systems, network and communication infrastructure, and audio-visual systems. Key Responsibilities: - Design and architect ELV (Extra Low Voltage) and ICT (Information and Communication Technology) systems - Ensure integrated surveillance and monitoring capabilit...
Delivery Time: 6 days left days
I am in the process of finalizing multiple acquisitions around the world, mainly in Europe, Middle East, and Africa. The entities I am acquiring have operated independently. I am seeking to have them integrated into one network for appropriate management. I am recruiting for a permanent Senior Level IT Team. I am having this project as a way to evaluate potential solutions while also discussing th...
Delivery Time: 6 days left days
Computer Security Network Administration Technical Writing VoIP
I'm seeking experienced freelance or project-based penetration testers for my cybersecurity startup, specializing in Vulnerability Assessment and Penetration Testing (VAPT). Key Requirements: - Valid OSCP or CREST certification is a must - Expertise in VAPT for: - Web applications - Networks - Cloud infrastructures - Experience in government sector cybersecurity is highly preferred -...
Delivery Time: 4 days left days
Computer Security Internet Security Research Writing Testing / QA Web Security
I'm seeking a skilled ethical hacker to help identify vulnerabilities in my application's security. The primary goal of this project is to pinpoint weak spots that could potentially be exploited by malicious entities. Ideal candidates should have: - Extensive experience in ethical hacking, particularly within application security. - Strong skills in vulnerability assessment and penetrat...
Delivery Time: 16 hours left days
Computer Security Internet Security Research Writing Technical Writing Web Security
I need a simulation to evaluate the performance of decentralized systems, specifically focusing on cloud storage methods. Key Requirements: - Simulate decentralized cloud storage systems - Focus on access control security measures Ideal Skills and Experience: - Expertise in decentralized systems and cloud storage - Strong background in performance evaluation - Knowledge of access control securit...
Delivery Time: 6 days left days
Computer Security Engineering Network Administration Research Writing Wireless
I need an expert to help me with a Trojan issue. Please reach out if you're experienced in dealing with such issues.
Delivery Time: 19 hours left days
Computer Security Internet Security Linux Software Architecture Web Security
I am looking for an expert in embedded systems and LDAP protocol to design and develop a prototype for an LDAP client. This will be for remote authentication using a Pynq Z2 board under FreeRTOS. Key Requirements: - The primary function of the LDAP client prototype will be user authentication. - It also needs to query user credentials and user roles. - Communication with the LDAP server will util...
Delivery Time: 2 days left days
C Programming Computer Security Linux Network Administration
I need an expert to help me with a Trojan issue. Please reach out if you're experienced in dealing with such issues.
Delivery Time: 19 hours left days
Computer Security Internet Security Linux Software Architecture Web Security
We are urgently seeking a verified white hat hacker or cybersecurity professional with expertise in Teramind monitoring, remote access, and antivirus bypass techniques, to help us reconnect a lost remote session. Background: The monitored computer is located in Colombia, and our monitoring system (based in the USA) used Teramind’s stealth agent to ensure performance, compliance, and financi...
Delivery Time: 6 days left days