Found 63 result(s).
I believe my ex girlfriend has learned how to code, or could possibly be with someone who does. I have been a victim phishing via email links. Since then, I've lost all 3 google accounts, email addresses, photos, contacts, 2 phones, and a laptop to malware. I have also watched the hacker take over my screen. And get right past my security undetected. He has pretended to be several different people...
Job Type: Hourly
Digital Marketing Social Media Marketing Accounting Instagram Social Media Management Ethical Hacking Facebook Page Malware Removal WordPress Malware Removal Facebook Instagram Reels Data Recovery Internet Security
I need a comprehensive VAPT (Vulnerability Assessment and Penetration Testing) report for our network. The assessment is required for both internal and external networks. Key objectives: - Identify vulnerabilities - Compliance check - Performance optimization Ideal skills and experience: - Proven experience in network VAPT - Knowledge of security compliance standards - Expertise in network perf...
Delivery Time: 6 days left days
Computer Security Internet Security Network Administration Report Writing Web Security
Large, global organization seeks a senior IT security consultant. Through rapid growth and numerous acquisitions, our company has evolved into a complex network of systems and policies across multiple entities. As a result, our security posture today is decentralized, inconsistent, and in need of transformation. We are seeking a highly experienced, technically hands-on Head of Information Security...
Job Type: Hourly: $85.00 - $100.00
Cybersecurity Management Incident Response Plan Information Security Firewall Security Analysis Penetration Testing Security Infrastructure Encryption Internet Security Network Security
I need help determine how to secure my devices. I believe my wife is behind the hacking with a few people she knows or has hired. We're getting divorced, also as he dent have unlimited money, but this has been going on is nice last September. I believe she's using various spy gadgets and spyware, but I need help finding and eliminating threats to my devices and networks. Ultimately, would love to ...
Job Type: Hourly: $30.00 - $70.00
Information Security Consultation Security Assessment & Testing Security Testing Ethical Hacking Internet Security Network Penetration Testing Penetration Testing Website Security Network Security System Security Vulnerability Assessment In
I'm seeking experienced freelance or project-based penetration testers for my cybersecurity startup, specializing in Vulnerability Assessment and Penetration Testing (VAPT). Key Requirements: - Valid OSCP or CREST certification is a must - Expertise in VAPT for: - Web applications - Networks - Cloud infrastructures - Experience in government sector cybersecurity is highly preferred -...
Delivery Time: 4 days left days
Computer Security Internet Security Research Writing Testing / QA Web Security
I'm seeking a skilled ethical hacker to help identify vulnerabilities in my application's security. The primary goal of this project is to pinpoint weak spots that could potentially be exploited by malicious entities. Ideal candidates should have: - Extensive experience in ethical hacking, particularly within application security. - Strong skills in vulnerability assessment and penetrat...
Delivery Time: 16 hours left days
Computer Security Internet Security Research Writing Technical Writing Web Security
We need a WordPress Malware expert to help remove malware from a hacked website. We installed word fence and have scanned all the files, pages etc. We need this expert to install a clean version of WP and remove all malware. Please only apply if you can do this today and fast. Please include past experience in similar projects in your proposal.
Job Type: Hourly: $20.00 - $35.00
WordPress WordPress Malware Removal Virus Removal PHP Internet Security Security Analysis Vulnerability Assessment
I need an expert to help me with a Trojan issue. Please reach out if you're experienced in dealing with such issues.
Delivery Time: 19 hours left days
Computer Security Internet Security Linux Software Architecture Web Security
I need an expert to help me with a Trojan issue. Please reach out if you're experienced in dealing with such issues.
Delivery Time: 19 hours left days
Computer Security Internet Security Linux Software Architecture Web Security
We are urgently seeking a verified white hat hacker or cybersecurity professional with expertise in Teramind monitoring, remote access, and antivirus bypass techniques, to help us reconnect a lost remote session. Background: The monitored computer is located in Colombia, and our monitoring system (based in the USA) used Teramind’s stealth agent to ensure performance, compliance, and financi...
Delivery Time: 6 days left days