Spring security facebookconnect jobs
...I already trade on Binance, we can speak the same crypto language—USDT transfers, basic blockchain concepts, and exchange workflows won’t need explaining. Here’s what I expect from you: • Walk me through the sign-up flow in real time (video call or screen-share is fine). • Complete KYC and regional verification smoothly, using best practices you’ve tested yourself. • Enable all basic security layers—email/SMS confirmation and, if time allows, Google Authenticator 2FA—so the account is ready for funding the moment we finish. • Leave me with clear, written next steps for deposits, withdrawals, and any Bangladesh-specific compliance tips. You must be physically located in Bangladesh so we can match regional requir...
I’m Robert, a 57-year-old security-desk professional in Santa Monica who has always lived a quiet, substance-free life. Over the past few years I’ve been battling the effects of Havana Syndrome. I have clear photographic evidence of the physical and technological assaults, supporting medical records, and personal testimonials that document what I’m facing. My next step is to launch a GoFundMe campaign that will • raise widespread awareness about Havana Syndrome, • secure immediate financial relief for my own medical and legal expenses, and • channel funds toward research and lasting technological solutions. I need someone experienced with GoFundMe’s platform, storytelling structure, and promotion tools to turn my raw material into a per...
...“Antropologer i næringslivet”, hyperlinks to an external website are not working properly. Instead of linking externally, they redirect to a native/internal page with no content. This needs to be corrected so the links function as intended. Requirements - Strong experience with WordPress and Elementor - Ability to troubleshoot plugin/theme conflicts - Experience with backup configuration and security best practices - Clear communication about what caused the issues and how they are fixed Please include: - Relevant experience - Estimated time required - Your fixed or hourly rate...
...email accounts on the domain (e.g., info@, sales@, support@) Email must have a clean interface (e.g., Google Workspace, Microsoft 365, Zoho, or equivalent) Setup + configuration included (SPF/DKIM/DMARC properly configured for deliverability) 7) Security Requirements (Very Important) Security is a priority. Please explain your security approach. Minimum expectations: HTTPS/SSL + secure server configuration OWASP Top 10 protections Input validation + sanitization for all forms and chat Rate limiting + bot protection Admin login security (2FA preferred) Secure password storage + session management Regular dependency updates Daily/weekly backup plan (automated) Basic WAF/Firewall protection (recommended) Audit checklist before launch Deliverables ...
I need Firebase phone authentication integrated into my React web application. Additionally, I require email verification and Captcha as extra user verification methods. Key Requirements: - Implement Firebase phone authentication - Integrate with React.js - Add email verification - Implement Captcha for bot prevention Ideal Skil...verification and Captcha as extra user verification methods. Key Requirements: - Implement Firebase phone authentication - Integrate with React.js - Add email verification - Implement Captcha for bot prevention Ideal Skills and Experience: - Experience with Firebase authentication - Proficiency in React.js - Familiarity with integrating email verification and Captcha - Strong knowledge of web security best practices Please provide examples of similar ...
...Cloud). ​Code Audit & Security: Review the existing code for any backdoors, hardcoded API keys, or security vulnerabilities. ​Localization: Since the code is based on the US market, I need help adapting it (Currency conversion, Time zones, and UI/UX changes). ​API Integration: Connect the platform with relevant Stock Market APIs (like Zerodha, Angel One, or Interactive Brokers). ​Database Management: Setting up and optimizing the database (SQL/NoSQL) as per the source code architecture. ​Required Skills: ​Deep experience in Fintech/Trading application development. ​Proficiency in the tech stack used in eBroker (mention your language here: e.g., Java, Python, Node.js, or C#). ​Experience with API integrations and WebSockets for real-time data. ​Strong understanding of ...
...(currently in WordPress ), and creating new sites and interfaces on a shared modern architecture. Project Goal Design and implement a unified technical architecture for 12 ecosystem websites (RWA tokenization, MFO, investor clubs, AI, MCP, etc.). Gradually move away from a “WordPress everywhere” approach towards: a shared backend in Node.js/TypeScript, and modern frontends in React/Next.js. Strengthen security, consistency, and prepare for a future central application and mobile apps. Target Stack Backend Node.js + TypeScript ( or similar). REST and/or GraphQL APIs. Authentication, roles/permissions, multi‑site / multi‑tenant. External integrations: KYC/KYB, fintech, AI, MCP servers, etc. Web Frontend React + (SSR/SSG, SEO, multilingual, high performance). Clean, e...
I’m Robert, a 57-year-old security-desk professional in Santa Monica who has always lived a quiet, substance-free life. Over the past few years I’ve been battling the effects of Havana Syndrome. I have clear photographic evidence of the physical and technological assaults, supporting medical records, and personal testimonials that document what I’m facing. My next step is to launch a GoFundMe campaign that will • raise widespread awareness about Havana Syndrome, • secure immediate financial relief for my own medical and legal expenses, and • channel funds toward research and lasting technological solutions. I need someone experienced with GoFundMe’s platform, storytelling structure, and promotion tools to turn my raw material into a per...
...profile picture is stored and displayed consistently: o Use one canonical storage method (e.g., attachment ID stored in a dedicated meta key such as profile_avatar, plus a stable URL if required for CRM). o If the site also uses Featured Image for the Trainer post type, the Featured Image should mirror the same uploaded profile picture (no duplication or conflicting sources). Access control / security: • A user must only be able to edit their own profile and Trainer post. No ID spoofing through URL parameters, hidden fields, or entry IDs. ________________________________________ Technical Expectations Developer must be confident with: • Fluent Forms (user profile / registration workflows) • FluentCRM contact syncing + field mapping • WordPress user meta + post...
I run a WordPress site that relies on Wordfence for protection, and I want peace of mind that everything in the security layer is set up exactly as it should be. The focus of this engagement is a thorough quality check of all active plugins—with special attention to Wordfence configurations and any security-related interactions they may have with the rest of the stack. Here’s what I need from you: • A hands-on audit of Wordfence settings, firewall rules, malware scan schedules, and login security options, confirming each item follows current best practice and does not conflict with core WordPress functions or other plugins. • A scan of every installed plugin for known vulnerabilities, abandoned code, or permission issues that could open an ...
Project Title: High-Security Ad-Reward & MLM Ecosystem (Native Android + PHP) I’m building a secure mobile platform that combines rewarded ads, a multi-level referral system, and multiple payment wallet integrations. The system must prioritize fraud prevention, financial security, and smooth user experience. Core Features 1. Secure Payment Integrations The platform must support deposits and withdrawals through EasyPaisa, JazzCash, and USDT (TRC-20). The admin panel should allow both automated processing and manual approval for higher-value transactions to maintain security and prevent abuse. 2. Anti-Fraud & Bot Protection Strong protection against fake users and automated activity is essential. This includes Invisible reCAPTCHA v3 to silently filter ...
is seeking an experienced web application security specialist to address specific vulnerabilities identified in our recent penetration testing assessment. As a healthcare technology company specializing in innovative oral health monitoring solutions, we prioritize robust security standards and regulatory compliance. This is a focused, short-term engagement to remediate six specific security findings in our web application infrastructure. We need an independent contractor who can take full ownership of implementing these security fixes efficiently and professionally. Scope of Work - Specific Vulnerability Remediations Based on our completed Web Penetration Testing assessment, you will address the following security findings: 1.-n/a 2. Server Version D...
I already have a finished layout in hand and now need a developer to turn it into a fully-functional WordPress site that clearly explains our software solution. The site is purely informational—no e-commerce or blog—so speed, clarity and clean code matter more than complex functionality. Core pages I need ...About Us • Features • Dealer Sales Management Software (dedicated overview page) • Contact Us (simple form, no live chat) I’m not requesting interactive extras right now, just a smooth, responsive build that follows the design exactly, loads quickly and is easy for me to update later through the WordPress admin. If you can keep the theme lightweight, follow best practices for SEO and security, and hand over a short how-to for basic...
THE ULTIMATE BRAND DESCRIPTION (Anti-Cheat & Multi-Payment) Project Title: Kamyabi Cash: Secure Ad-Reward, MLM & Multi-Wallet Ecosystem 1. Secure Payment Gateways: Withdraw/Deposit: Seamless integration for EasyPaisa, JazzCash, and USDT (TRC-20). Manual & Auto Verification: Admin can manually approve high-value transactions to ensure security. 2. Anti-Cheat & Bot Protection (System Phaar Logic): Google Invisible reCAPTCHA v3: Integration of auto-captcha to block bots without disturbing real users. Ad-Fraud Protection: Strict server-side verification. If a user tries to skip a Google Video Ad or use an auto-clicker, their account will be Permanently Banned automatically. IMEI Locking: One device = One account. No duplicate accounts allowed. 3. Premium Plan & Traf...
...the complete migration and setup process professionally. **Scope of Work:** * Migrate existing data from Odoo Online to Odoo On-Premise * Install and configure Odoo on a dedicated server (Linux preferred) * Ensure all current modules, products, accounting data, and configurations are transferred correctly * Set up PostgreSQL and optimize performance * Configure domain, SSL, backup system, and security * Provide basic documentation and guidance for future maintenance **Current Situation:** * Actively using Odoo Online * Data includes inventory, sales, accounting, and product records * Business operations must continue without major downtime **Expected Outcome:** * Fully functional on-premise Odoo instance * Stable, secure, and optimized performance * Smooth migration with ze...
I want a personal chatbot connected to my own WhatsApp number that quietly reads new messages throughout the day, then sends me one concise end-of-day summary straight back into the same chat. Although the bot must be authorised to access my Yahoo Mail inbox (IMAP/POP or official API) as well as my WhatsApp mes...configurable hour; if the device is offline, the summary must queue and send as soon as the connection returns. • Simple command set (e.g. “/summary now”, “/pause”, “/settings”) handled inside the same chat. Deliverable is a fully working bot with documented setup steps and minimal ongoing maintenance. Please attach a detailed project proposal covering your chosen tech stack, hosting idea, security approach and rough timeline ...
...Option for manual approval or instant posting • Track free vs paid posts • Payment history inside admin panel Content control and safety features: • Automatic harmful text filtering • Abuse and hate speech detection • Spam detection • Duplicate content detection • Keyword blacklist system • Optional link blocking • Image moderation check • Auto-flag suspicious submissions • CAPTCHA to prevent bots Security requirements: • Secure API key storage • SSL enabled • Rate limiting • IP logging • Role-based admin access I already have: • Facebook page • Instagram Business account • Meta API keys • Stripe account Please review and confirm the technical approach before starting. Thank you. ...
I’m ready to launch a personal blog and need someone who...long as I can easily publish new posts, manage categories, and integrate basic SEO tools once the project is complete. Key deliverables • Brand starter kit: logo, color palette, and typography guidelines • Custom, mobile-friendly blog theme reflecting the agreed professional style • CMS setup and configuration (WordPress, Ghost, or similar) with essential plugins for SEO, analytics, and security • Basic page set-up (Home, About, Blog feed, Contact) plus one sample article as a template • Social sharing buttons and newsletter signup integration • Brief hand-off guide or walkthrough so I can update content confidently If you have previous examples of sleek blogs you’ve la...
I’m looking for a seasoned penetration tester to perform a focused security assessment on our live SaaS web application. The scope is firmly set on web application pentesting, zeroing in on session management. Your mission is to uncover and demonstrate any weaknesses that could enable session hijacking or cross-site request forgery (CSRF). You’ll work against a production-like staging instance with a demo user account I provide. A black-box approach is fine, but authenticated testing is mandatory so you can probe cookie handling, token rotation, SameSite settings, and logout logic. Feel free to wield Burp Suite, OWASP ZAP, or comparable tooling as long as your methodology aligns with the OWASP Testing Guide and PTES best practices. Deliverables • Execu...
...implications for the broader cybersecurity community. • Applying consistent in-text citations and a complete reference list (APA preferred). • Delivering an original, plagiarism-free document ready for journal submission, with opportunities for iterative feedback until it reads smoothly and meets all formatting requirements. Experience writing technical papers on cyber threats or adjacent security topics is essential, as is the ability to translate complex concepts into clear, authoritative prose. If that sounds like your skill set, I look forward to collaborating and seeing this research reach its final form....
...full scope is detailed in the attached SOW, including (but not limited to): Document upload & processing (PDF, OCR, Office formats) AI translation engine integration Layout & formatting preservation In-browser editor and review interface Export to PDF / DOCX / PPTX / XLSX Team collaboration & role-based access Credit-based billing system (Stripe or equivalent) User & admin dashboards Security, privacy, and compliance requirements API & webhook support Deployment & DevOps considerations Applicants are expected to propose an implementation approach aligned with the SOW. Required Experience We are looking for senior-level expertise. Please apply only if you have experience with: Full-stack web application development (SaaS) Complex document pr...
...header behaviour and a clear footer with key links. • Style every button, form and call-to-action so they feel native to the theme. • Position placeholder text blocks and image areas so I can simply drop our final copy and photos in later. • Optimise every element for seamless viewing on mobile, tablet and desktop, testing across common browsers. • Configure essential plugins (caching, security, SEO basics) to ensure good load speed and core web vitals. Deliverables & acceptance 1. A fully functional WordPress site on our server matching the theme’s demo and the points above. 2. Responsive checks showing no layout breaks on major devices. 3. An export or brief noting any plugins/settings you added so we can maintain them. All copy and...
...data transformations, data quality checks, and reconciliation logic aligned with Finance business rules. * Monitor, debug, and optimize data pipeline performance and reliability. * Develop and maintain data mappings, workflow scripts, and reusable integration templates in OCI DI. * Collaborate with Finance data owners, analysts, and architects to ensure accurate and timely data delivery. * Apply security best practices, including data masking, encryption, and access control within OCI. • Document data flow designs, technical configurations, and operational procedures. Required Qualifications * 6–8 years of experience in data integration and ETL/ELT development, with at least 3+ years in Oracle Cloud Infrastructure (OCI). * Strong hands-on experience with OCI Data Inte...
...healthcare security and audit requirements. Scope of work • Configure and customise Service Cloud and Experience (Community) Cloud to surface patient-facing and clinic-facing pages behind robust login policies. • Develop Apex-based REST services and call-outs that integrate directly with external health systems; bullet-proof error-handling frameworks are the non-negotiable focus. • Write triggers and service classes that respect Platform Encryption, Field Audit Trail and all CRUD/FLS checks. • Deliver unit tests with >90 % coverage, paying special attention to edge cases around therapy-scheduling rules. • Package and deploy through our existing Git-based CI/CD pipeline, providing TDDs and traceability matrices for validation audits. Accepta...
...with Cassandra/PostgreSQL/Redis, RabbitMQ + WebSockets, Docker, CI/CD, HTTPS endpoint, and APM). 1. Hybrid database approach Distributed Cluster. 2. Containerize the application with Docker and automate builds via Maven or Gradle. 3. Primary Databases for Chat History Cassandra (NoSQL) 4. Secondary Databases PostgreSQL (for users Metadata) on the codebase’s data model. 5. Backed Language: Spring Boot Java 21/25 with RabbitMQ,and Maven or Gradle configuratio 6. Redis : Presence/Session 7. Real-time: WebSockets for bidirectional communication 8. also preferred APM (Prometheus + Grafana, ELK stack, OpenTelemetry, New Relic, cloud-native dashboard 9. Set up a CI/CD pipeline (GitHub Actions, GitLab CI, or similar) that performs unit tests, static code analysis, and push-bu...
I need a cl...easy for visitors to navigate and digest. Here’s what I already know I’ll need: • A responsive design that looks great on desktop, tablet, and mobile. • Clear navigation with logically grouped pages (Home, Your Home's Value, Our Blog, Join Our Team, Contact Us, plus any sections you recommend). • Basic on-page SEO best practices baked in from the start. • Fast loading times and solid security fundamentals. • No php. Must be compatible with Windows Server from GoDaddy I will provide the written content and any brand assets I have; you’ll handle design, development, and configuration until the site is live on my hosting. No WordPress or Webflow. Only custom HTML/CSS, etc.). Provide the approximate timeline, and...
# Project Requirement: Deep Learning Side-Channel Analysis Pipeline for 3DES Smartcards ## Project Overview We are seeking an experienced security engineer / machine learning specialist to update and correct an existing Deep Learning-based Side-Channel Analysis (SCA) pipeline for Triple-DES (3DES) smartcards. The current pipeline successfully recovers session keys from known-input traces but produces incorrect 3DES keys when applied to blind forensic traces, despite achieving 100% attack success rate. ## Background The existing pipeline implements a hypothesis-based profiling attack using Multi-Layer Perceptrons (MLP) to extract 3DES session keys (K_ENC, K_MAC, K_DEK) from electromagnetic traces. While the system achieves 100% recovery on standard datasets (Mastercard/Vi...
...on my private VPN server. The server is already up and running; what I’m missing is the bot layer that can execute scripted jobs reliably and remain reachable through the VPN’s secure tunnel. Here’s what I expect from you: set up the bot framework (Python or Node.js with Docker is fine—use what you’re fastest with), connect it to the server’s existing environment, harden the configuration for security, and leave me with clear, step-by-step documentation so I can add or adjust tasks later on. Once you’re done, the bot should start automatically on reboot and log its activity to a file I can review. If you’ve deployed similar automation bots before and are comfortable working over SSH on a VPN-only machine, this should be a straight...
...Football/Soccer, Tennis, Cricket and Baseball, with the flexibility to plug in additional sports later. Core experience Real-time match feeds should drive live odds that update instantly on screen, and users must be able to register, verify their identity, fund their wallet and withdraw winnings without leaving the app. Smooth navigation, push notifications for goals or set points, and rigorous security are non-negotiable. Payments Deposits and withdrawals have to work through Crypto, Visa/Mastercard as well as Google Pay and Apple Pay. I will supply the acquiring accounts and any necessary API keys; you will wire them into a single wallet system that automatically converts, records and settles each transaction. Tech & compliance Please choose a modern tech stack tha...
This is a green-field initiative: a single application that must operate seamlessly across web, desktop and mobile. The work begins with a clean sheet of paper and ends with a production-ready release. Scope • Shape the high-level architecture—data models, service boundaries, scalability, security and deployment strategy. • Select and justify the tech stack (e.g., React, Vue, Angular, Flutter, Electron, Node, .NET, Go, or another combination you have proven in production). • Implement the entire solution: front-end UI, back-end APIs, database schema, automated tests and CI/CD pipeline. • Deliver code that is clean, documented and ready for hand-over. Deliverables 1. Architecture blueprint (diagram + written rationale). 2. Source code for web, ...
...environment and give it a thorough security scrub at the same time. Before the move, the site must be scanned, cleaned of every trace of malware, and hardened so the problem doesn’t return. I haven’t settled on a new provider yet and would value your advice—please suggest a host that will noticeably improve performance and still fit a reasonable monthly cost. Once we agree on the target platform, I’ll supply full cPanel / SSH credentials for both the old and the new servers. Deliverables • Complete malware removal with a clean-site report • Recommendation and setup of the new hosting account (migration, DNS, SSL, email if needed) • Seamless transfer of the WordPress install, database, and media without downtime • Post-migrat...
...Digital Enablement Program (tools offered by independent partners) No misleading claims (no guarantee of funding, jobs, or legal outcomes) Developer must ensure legal disclaimer placement is professionally integrated. Deliverables Complete WordPress website (on our hosting server) Theme setup & customization Plugin configuration Content formatting (content will be provided) Basic on-page SEO setup Security configuration Backup setup Training session (1–2 hours screen share) Timeline Expected completion: 3–4 weeks Budget Please provide fixed quote with milestone breakdown) Developer Requirements Minimum 3+ years WordPress experience Experience with non-profit / professional websites preferred Strong UI/UX understanding Clean coding practices Good communicati...
...and technical support assistance for web and digital-related tasks. The work may include troubleshooting technical issues, assisting with website management, fixing basic HTML and JavaScript errors, and handling simple debugging tasks. The freelancer may also help with documentation, organizing technical files, and providing clear instructions or reports for completed tasks. Knowledge of web security basics, network fundamentals, and system troubleshooting is a plus. Additional tasks may include assisting with digital tools such as Figma for layout support, CapCut for basic video editing, and managing or supporting content on platforms like YouTube and Instagram. Familiarity with AI tools such as ChatGPT and chatbot systems for workflow support or automation ideas is preferred....
Job Title: Full Stack Developer – Angular 20+ & Spring Boot (Java 17) Experience:- 8+ years of experience in Full Stack Development Working Hours: 2 hours per day Budget: ₹24,000 per month Project Overview We are looking for a skilled Full Stack Developer to support ongoing development activities as part of the current sprint focused on AWS and Azure cloud migration. The candidate will be responsible for contributing to application development, enhancement, and migration-related tasks in a cloud-enabled environment. Key Technical Skills Frontend: Angular 20 Backend: Java 17 Framework: Spring Boot API Development: RESTful Web Services Database: MySQL, PostgreSQL, or equivalent relational databases Cloud Exposure: AWS and/or Azure (preferred) Version control using ...
I need a clear, professionally-written blueprint that I can hand straight to my developers so they can begin building a cyber-security application. The document must spell out scope, objectives, high-level architecture and phased milestones while keeping two pillars front-and-centre: network security and data security. Key modules to be covered in the scope are user authentication, real-time threat detection and automated vulnerability scanning. For each of these I expect you to describe functionality, recommended technology stacks, integration points, basic data flows and any compliance considerations (e.g. NIST CSF, ISO 27001, OWASP). Diagrams—UML, context or sequence—are important where they add clarity. Please base the structure on industry best-pra...
I need an experienced Cloudflare specialist to turn on and properly configure the Web Application Firewall for my live site. You wi... and tune the rule sets so that genuine traffic continues to flow while malicious requests are blocked. We’re having an issue on the website where it looks like bots are triggering/clicking the “Call” button, which is inflating our call conversions. Our campaign report is showing 541 conversions, and we definitely didn’t receive that many real calls. Someone suggested using Cloudflare as a security platform: Are you familiar with this? Let me know if you have recommendations, and if this is something you can implement for our site. Please bid with "Cloudflare and AWS task I can do right away in $10"
...correct the path, and let Softaculous perform the upgrade without disturbing users. While you are inside cPanel, I also want the file structure tidied up. In particular, there are many old backup files scattered around; please locate and remove them safely so the home directory is clean and the disk quota drops. No mailbox or database work is required—this job is strictly about the file structure. Security is another priority. SiteLock is already attached to , but I would like you to confirm the configuration is complete. After that, extend the same SiteLock protection to 3foldtraining.com. Important notes • This is admin/setup work only; no code changes. • I do not have a recent backup, so the very first step is to create a full cPanel backup and download ...
...app-level tweaks—I need the entire stack compiled, optimized and ready to flash on prototype hardware. Here’s the scope in plain terms • Port and configure the latest stable Android source to our device’s chipset (Qualcomm Snapdragon 7-series). • Integrate all required low-level drivers supplied by the hardware vendor—camera, modem, GPU and power management must work flawlessly. • Apply security hardening at kernel and SELinux levels, keeping Google CTS compliance in mind so we can pass certification later on. • Deliver a clean build environment (AOSP + proprietary blobs) and a reproducible build script so my in-house team can generate future releases on their own. • Produce a flashable image, recovery partition and OTA ...
I have a live iGaming website running on a VPS that needs a full technical audit and stabilization. The previous developer left the project incomplete, and there are several issues affecting reliability and performance. ​ Key tasks include (but are not limited to): ​ Review current Node.js backend architecture and code quality. Audit server configuration, SSL setup, and security hardening. Identify and fix errors causing downtime, slow responses, or failed requests. Ensure payment flows, wallets, and game logic run reliably (no rebuild, focus on stabilization). Set up logging/monitoring and recommend best practices for long‑term stability. Requirements: Strong experience with Node.js on production systems. ​ Solid knowledge of VPS/server administration and SSL configuration...
Completes website design and development using Divi 5.
A fully-featured web application built with on the front end and Firebase on the back end is ready for a full test pass and in-depth review. I need solid, actionable insight into the following key areas: • User authentication — with extra attention on security vulnerabilities and the entire login / signup flow • Core database reads, writes, and edge-case operations • Overall UI/UX design consistency and clarity • API's checks and testing: Stripe, Shippo, Google Map Please explore the app as a real user would, attempt common abuse scenarios around authentication, stress-test critical database interactions, and note interface friction points or visual glitches. A concise test report (markdown or Google Doc) that includes reproduction steps, scree...
I’m ready to launch an online store and n...sites you’ve delivered, outline the parts you handled personally, and share any standout results such as conversion improvements or speed gains. I’m far more interested in that than a lengthy generic pitch. Deliverables • Production-ready WordPress + WooCommerce installation • Custom or child theme with clean, responsive design • Essential plugins configured (payments, shipping, taxes, security, caching) • Basic on-page SEO and performance tuning • Handover guide so I can add products and manage orders myself Brand assets, copy and product data will be supplied once we kick off; you’ll manage setup, configuration, testing and launch. Tell me what else you need to quote accurate...
...smoothly. • Recommend a few solid, well-supported themes that we can quickly tailor to the modern, clean aesthetic I’m after; once we pick one, implement it and tweak colors, fonts, and layout as needed. • Configure payments and shipping: help me scope the gateways (likely Stripe / PayPal) and delivery options, then set them up if possible within this phase. • Optimise basic performance and security (caching plugin, SSL, spam protection) so the site is stable from day one. Collaboration style I want to work side by side—screen-shares or staged check-ins—so I understand what’s being done and can eventually take the reins when we go live. Clear explanations and best-practice guidance are important to me. Deliverables 1. Fully fun...
...deadline crossed Final escalation: Notify full internal team 3. WhatsApp Integration Integrate with WhatsApp Business API Send internal reminder alerts Send escalation alerts No external WhatsApp messaging required 4. Admin Dashboard We need a simple web dashboard showing: Total emails received Assigned tasks Pending tasks Overdue tasks Response time per employee Escalation history 5. Security Requirements System must not send emails outside company domain without approval All actions must be logged Role-based access control Director-level override access Preferred Technical Stack (Open to Suggestions) Python / Node.js backend Google Workspace API (Gmail API) WhatsApp Business API Database (PostgreSQL / MySQL) Web dashboard (React or simple UI framework) ...
I’m setting up a government-supported cybersecurity SaaS that serves Emirati organisations through the MZN x Hub71 Programme. The vision is to release an MVP that focuses first on automated threat detection and user-facing awareness dashboards, then iterate toward full...Once in market, we’ll leverage the Hub71 network for pilots and seed funding, so your work will be on display from day one. Deliverables (MVP phase) • End-to-end platform blueprint and tech stack decision • Core threat-detection engine with real-time alerting • Awareness dashboard (web) ready for live demos • Secure cloud deployment and hand-off documentation If you’ve already led a security product from zero to production, know how to pass compliance audits, and can s...
We are building a structured AI-powered call routing system in South Africa. The system must: • Integrate with existing PBX systems via call forwarding or SIP • Use a South African virtual number • Route inbound calls through an AI voice receptionist • Identify query type • Provide structured information • Escalate security-related matters • Send SMS notifications when required • Log call analytics This is NOT a chatbot project. This is a voice AI + VoIP routing infrastructure project. Technical Requirements: Developer must have experience with: • SIP / VoIP integration • PBX systems (3CX, Yeastar, Telkom, etc.) • Twilio or similar telephony APIs • AI voice agent implementation • Call forwarding configuration &bu...
I need a certified ethical hacker to run a full-cycle social-engineering engagement focused exclusively on phishing simulation. The objective is to gauge how many employees interact with malicious-looking emails, identify patterns behind unsafe clicks or credential submissions, and turn those findings into actionable security awareness improvements. The work involves designing realistic phishing scenarios aligned with our business context, sending the campaign through a managed platform (GoPhish, King Phisher, or similar), silently harvesting the metrics, and then compiling a thorough post-test report. No destructive payloads or system exploitation are allowed—this is a people-centric test only. Deliverables • Campaign design document outlining themes, targets, schedu...
I need a certified ethical hacker to run a full-cycle social-engineering engagement focused exclusively on phishing simulation. The objective is to gauge how many employees interact with malicious-looking emails, identify patterns behind unsafe clicks or credential submissions, and turn those findings into actionable security awareness improvements. The work involves designing realistic phishing scenarios aligned with our business context, sending the campaign through a managed platform (GoPhish, King Phisher, or similar), silently harvesting the metrics, and then compiling a thorough post-test report. No destructive payloads or system exploitation are allowed—this is a people-centric test only. Deliverables • Campaign design document outlining themes, targets, schedu...
I'm looking for a skilled developer to create a comprehensive web-based ERP application for our laundry business. The system should streamline our operations with key features such as: - Order Management: Track and manage all customer orders efficiently. - Inventory Tracking: Monitor stock levels and manage supplies. - Customer Management: Maintain detaile...functionalities for financial management. Ideal Skills and Experience: - Proven experience in developing web-based ERP systems. - Strong background in order management and inventory tracking modules. - Familiarity with accounting software integration. - Excellent customer management system development skills. Please provide examples of similar projects you've completed and your approach to ensuring data security and...
We need someone to structure and set up a smooth base for our running IT system and security settings, moreover like a IT support person. Scope of Work: Structure and manage Google Workspace admin, 2FA enforcement, data management, and security settings End-to-end JumpCloud setup, SSO configuration, and access control framework Streamline tool integrations (Google Workspace, Keka, Slack, etc.) via APIs Build onboarding/offboarding IT access process Create role-based access matrix and security policies Identify gaps and establish a strong, scalable IT security foundation Outcome Expected: Smooth IT operations Secure and controlled access environment Documented processes and structured system setup