Security logs jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    1,738 security logs jobs found, pricing in USD
    Trophy icon Logo for Shop.se 18 days left

    ...like [login to view URL] want to stand for, be identified with. 1. All in one place, stop searching, this is it! (If you want it- shop have it) 2. Top Value 3. Simplicity 4. Trust, security, confidence, relyable partner, 5. Not the cheapest, not expensive but simply affordable, where you quickly find what you want to buy without hassle. [login to view URL] We are a Swedish

    $110 (Avg Bid)
    Guaranteed
    $110 Avg Bid
    146 entries

    ...added by customer. Staff must approve for beneficiary activation before it can be used for transferring funds. Customer gets to know his last login date and time each time he logs in. Customer can check last 10 transactions made with their account. Customer can check their account statement within a date range. Customer can request for ATM and Cheque

    $282 (Avg Bid)
    $282 Avg Bid
    15 bids

    A drupal website has been hacked (crypto jacking campaign). We are looking for a security specialist to look inside the logs: When the hacked occured; Which changes have been made What was the attack vector Remediation plan Write a report in English Very urgent

    $245 (Avg Bid)
    $245 Avg Bid
    10 bids

    ...mobile - customer tax code / social security number Constraints: - portal user can create only one customer and only one contact inside it - portal user can modify only own customer / contact - portal user cannot delete previous records - portal user cannot see other users or customers - every time a user logs in he sees the customer that he created

    $168 (Avg Bid)
    $168 Avg Bid
    13 bids
    Powershell 1 day left

    ...([login to view URL]) 12.4. Display the contents of the above CSV file on the console window 12.5. Show the newest 20 logs of the Application event logs that are older than 2 weeks 12.6. List the latest 20 Success and Failure Audit events in the Security Log 12.7. List the latest 10 events in the Windows PowerShell event log 12.8. Install any 3 of the following

    $191 (Avg Bid)
    $191 Avg Bid
    7 bids

    A Responsive web Dashboard will be developed to showcase the agent data, this dashboard can be accessed after registration only, a user having valid username and password can access this dashboard from a web browser. The AGENT will be an exe, that will run on an individual computer and capture activities and save it to cloud database. List of API's will be provided that will get filters as i...

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    23 bids

    ...attacks are one of the most dangerous security threats, in which attackers aim to break down the victim’s computer network or cyber system and interrupt their services. MEC systems are especially vulnerable to distributed DoS attacks, in which some distributed edge devices that are not well protected by security protocols can be easily compromised and

    $304 / hr (Avg Bid)
    $304 / hr Avg Bid
    11 bids

    ...attacks are one of the most dangerous security threats, in which attackers aim to break down the victim’s computer network or cyber system and interrupt their services. MEC systems are especially vulnerable to distributed DoS attacks, in which some distributed edge devices that are not well protected by security protocols can be easily compromised and

    $502 (Avg Bid)
    $502 Avg Bid
    17 bids

    my website is under attack, when i search in httpd logs it shows my server ip is atackking with brute force requesting an php url , but is not thats why fail2ban and apache mod_evasive cant blokecked. NOTE: i need to know from wich ip they atacking or stop that attack, please i need p[eople who has experience this before

    $126 (Avg Bid)
    $126 Avg Bid
    25 bids

    We have a need to archive Cloudflare logs into s3 buckets, the logs are in json and there are a number of sites. This could also be pulled into AWS Athena or dumped into s3. Cloudflare is pull only so this will need to be a lambda job. We do not need to transform or alter this data, simply store it. We will need to store all attributes or allow it to

    $150 (Avg Bid)
    $150 Avg Bid
    8 bids

    The project’s primary goals consist of: A robust and effective web based online banking system. Extending functionality without compromising the security. Personal banking services that gives you complete control over all your banking demands online. Simple and easy user interface to work with. Online Banking features: Registration for online

    $620 (Avg Bid)
    $620 Avg Bid
    11 bids

    ...attacks are one of the most dangerous security threats, in which attackers aim to break down the victim’s computer network or cyber system and interrupt their services. MEC systems are especially vulnerable to distributed DoS attacks, in which some distributed edge devices that are not well protected by security protocols can be easily compromised and

    $518 (Avg Bid)
    $518 Avg Bid
    17 bids

    Need to translate French hand written aircraft logs and records to English

    $365 (Avg Bid)
    $365 Avg Bid
    39 bids

    Hello, I run a WP website hosted on a shared Sitegrounds hosting and controlled from my Win 10 PC. I think I might have been compromised, looking for security expert, ethical hacker or white hat to review logs, review server safety and help secure it against future intrusions please.

    $461 (Avg Bid)
    $461 Avg Bid
    14 bids

    app pages : - Intro page - Enter company code and user code page - List of calls and duration and type page - When user make a call the app will ask him if business call or private call - The app will save number and ask once for each number - The app database will save the below : - Company code, user code, Call number, duration, date , private , business , sent . - At the top of app the...

    $202 (Avg Bid)
    $202 Avg Bid
    37 bids

    ...communication skills. The successful candidate will be responsible for the Installation, maintenance and supporting of the SEAL environment, ensuring its operational readiness (security, health and performance), executing documents/data loads and handling ingestion exceptions. Must be capable of working independently and collaboratively. Responsibilities

    $577 (Avg Bid)
    $577 Avg Bid
    2 bids

    ...communication skills. The successful candidate will be responsible for the Installation, maintenance and supporting of the SEAL environment, ensuring its operational readiness (security, health and performance), executing documents/data loads and handling ingestion exceptions. Must be capable of working independently and collaboratively. Responsibilities

    $568 (Avg Bid)
    $568 Avg Bid
    5 bids

    ...authentication is finished. 2. Authentication should happen securely a) The implicit grant from the server supports CSRF validation, that should be implemented. b) Other security practices should be implemented. 3. The tokens should be stored securely. (On the bid, please mention where you are going to store the tokens and how you are going to make

    $1119 (Avg Bid)
    $1119 Avg Bid
    39 bids

    I have a very stable old joomla site i want accurate analytics from. I am using a relatively new open source program Matomo which has instructions on how to take the information direct from log files. It has instructions but when command line stuff comes into it I get left behind. Looking for someone to follow instructions to set this up for me. I already have the program install so you just need ...

    $745 (Avg Bid)
    $745 Avg Bid
    7 bids