Found 46 result(s).
Expert Cybersecurity Engineer | Penetration Tester | IT Support | Secure Code Review" Description: Freelance Cybersecurity & IT Support Professional with hands-on experience in: Penetration Testing (Web/Mobile/Network) – eCPPTv2, PJPT, eJPT certified. Vulnerability Assessment & Patch Management – Proficient in Kali Linux, Burp Suite, Snort, Wireshark. Secure Code Revi...
Delivery Time: 6 days left days
Linux Penetration Testing Software Testing Test Automation Web Security
Job Overview: We are looking for an experienced Cybersecurity Consultant to provide guidance on implementing a Zero Trust security model and recommend the best tools for our security needs. This is a consultation-based engagement focused on discussing best practices, security strategies, and tool selection, without requiring an in-depth assessment of our current systems. Key Responsibilities: Prov...
Job Type: Hourly
Cloud Security Framework Information Security Vulnerability Assessment Penetration Testing Network Security Encryption Security Analysis Firewall Web Application Security Security Infrastructure
I am seeking an ethical hacker to conduct penetration testing on my web applications. The areas that need thorough testing include: - Login processes: Ensuring security during user sign-in. - Data handling and storage: Verifying the security of data processing and storage systems. - User authorization: Assessing the robustness of access control measures. Main Skills Required are usually DDoS defe...
Delivery Time: 1 day left days
Need someone to read this pen test and review it for authenticity. Please provide a detailed explanation of why it is real or why it is fake. We are looking to submit this with a lawsuit tomorrow or as soon as possible. Having more experts put their stamp of approval on it would make a huge difference in the eyes of the court .
Job Type: Fixed price
Kali Linux Penetration Testing Vulnerability Assessment Ethical Hacking Information Security Security Analysis
Use Kali linux to recreate what the pen test shows. Follow the path that is meant for law enforcement to have a guide they can copy to get to the evidence. Then provide details on how it is real or how it is fake. Please be as descriptive as possible.
Job Type: Fixed price
I need someone to help me get my tiktok back. It was hacked about a month ago and I’ve been unable to get it back. The person changed everything from my username to phone number to email. It was connected to my facebook and when i press login with Facebook it takes it through till it asks for a two step verification that the hacker decided to put. So there is no way for me to go through. I would h...
Job Type: Hourly: $10.00 - $10.00
PHP Network Security Internet Security Vulnerability Assessment Penetration Testing Security Analysis Ethical Hacking Information Security Firewall
The Senior Information Systems Security Officer (ISSO) will be responsible for ensuring the integrity, confidentiality, and availability of our information systems. You will be expected to lead the 4-week LiSaaS authorization process, manage FIPS 199 Security Categorization for systems, oversee vulnerability scanning using tools like Invicti and Nessus, and coordinate SOC 2/ISO 27001 compliance.
Job Type: Hourly: $50.00 - $60.00
PHP ISO 27001 Information Security Penetration Testing Security Analysis Network Security
I have a few old social media accounts on multiple platforms, including Instagram, Facebook, TikTok, and Twitter that my boyfriend has been logged out of four years and needs help being deleted.
Job Type: Hourly
System Security Security Assessment & Testing Security Testing Ethical Hacking Internet Security Network Penetration Testing Penetration Testing Website Security Information Security Consultation Network Security Vulnerability Assessment In
Gala_Layo is a leading cybersecurity solutions provider, dedicated to delivering top-tier security services to industries including US State and Federal Agencies, Municipalities, Education, Transit, Utilities, Healthcare, Insurance, Finance, Technology, and more. We are expanding our team and are looking for highly skilled professionals who can match the caliber of solutions we offer and help us g...
Job Type: Hourly: $25.00 - $75.00
Cybersecurity Management Information Security Penetration Testing Security Assessment & Testing Security Policies & Procedures Documentation Project Management
I'm looking for a developer to create a Windows-compatible program in C++. The program will use graphic cards and should be complex, flexible, and robust, functioning as a password generator based on user input and converting the generated passwords into SHA256 hashes for comparison with a list of given hashes. The primary purpose of this tool is for penetration testing. Key Requirements: - ...
Delivery Time: 3 hours left days
C Programming C++ Programming CUDA Penetration Testing Software Architecture