Computer Security Jobs and Contests

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Sign up and start earning
Sign up to start earning. Are you a Computer Security Consultant? You could be earning money working on these jobs!

Browse Jobs on Freelancer

Project/Contest Description Bids/Entries Skills Started Ends Price (USD)
Write a security engineering project Description / Scenario As a developer and security engineer, you have been asked to analyze and develop a JCA application that supports secure document/file exchange and signing. Towards this aim, the following tasks are assigned. 8 Java, Computer Security, Software Architecture May 28, 2017 Today6d 13h $77
Informática Técnico de informática 14 Windows Desktop, Computer Security, Desktop Support, Clean Technology, Computer Help May 27, 2017 Today6d $159
write and edit some software -- 3 I have a running matlab code that needs an improvement and changing some parts for optimization and performance enhancement. Freelancer applies need to have a good knowledge of the following: 1- cryptography algorithms 2- Biometric 3- Finite filed and Galois Field 4- MEX FILES USING MATLAB please contact me for more details 31 Matlab and Mathematica, Computer Security, Algorithm, Software Development, Programming May 27, 2017 May 27, 20175d 21h $1155
Security analysis -- 2 I am looking for help in conducting security analysis for cryptography system . This security analysis will be based on average min entropy . please contact me for further details. 25 Computer Security, Scientific Research, Research Writing, Mathematics, Statistical Analysis May 27, 2017 May 27, 20175d 21h $140
need to add 900 words and 4 refs budget $15 - $20 needed in next 3hrs need to add 900 words and 4 refs budget $15 - $20 needed in next 3hrs instructions for 4 refs supplied APA referencing must pass turnitin and copyscape 25 Copywriting, Research, Computer Security, Technical Writing, Research Writing May 27, 2017 May 27, 20175d 13h $24
OSCP tutor Hello! I am looking for a tutor to help me learn how to break into the practice labs I have before my test. Must be able to speak english well. Also, I would like to pay per hour and would prefer to do the tutoring [Removed for encouraging offsite communication which is against our Terms and Conditions.] where I can share screen and etc. If you are able to help me with this please reply back with "OSCP Tutor" as the first word. Thanks! 5 Web Security, Computer Security May 25, 2017 May 25, 20173d 13h $25
lock/unlock windows 10 by Bluetooth device according to the proximity The project should be write in java - eclipse. When I open the java project , automatically its show a simple user interface -GUI , with list that contains all available android devices(Bluetooth) in the area. Each row of the list should contains the name of the phone with a checkbox. In the top of the list there are two button one to connect to the selected device and the second to disconnect (max one device in the same time). After the windows 10 and the android device connected the procedure is Active. This procedure simple lock the windows when device is 10 meters from windows and unlock if not. The lock and unlock of the windows have to be the original of windows, so you have to pre-store the login and password of the user to unlock the computer when the device is close to the computer. 13 Java, Windows Desktop, Engineering, Computer Security, Software Architecture May 24, 2017 May 24, 20172d 5h $179
Penetration test Hack my software hello im looking for Penetration test for my software my software is chat room application use TCP port 5049 the reward for this test are $700 for denial-of-service attack $1500 for gain controll over my system with weakness in my software $2000 for buffer overflow attack others bug will be rewarded as their impact i will provide a test server "RDP" with working voice chat service your goal are to use wireshark or what ever to find exploit . 16 Web Security, Computer Security, Software Testing, DOS, Internet Security May 22, 2017 May 22, 20171d $1660
Write some Software I need the development of CA Identity Manager connectors for PostgreSQL 19 Java, Computer Security, Software Architecture, C++ Programming May 22, 2017 May 22, 201715h 7m $527
Web User Repairing -- 2 Hi, its not a simple direct and easy job. Need experts, please contact me. its for my own use. thanks 9 Web Security, Computer Security, Software Architecture, Website Testing, Software Development May 22, 2017 May 22, 201710h 19m -
Porta one PBX We are onboarding a new PBX and looking to have a longterm relationship. The system is a Porta one .Tech has to know this system 4 Computer Security May 22, 2017 May 22, 20173h 27m $43
cryptocurrency mining package - FUD Crypter Silent Crypto Miner + Crypto Pool setup 1. Modify (Open source crypto miner) to be silent crypto builder. 2. Crypto miner must be FUD and must be persistent. 3. Crypto miner modified to run at 40% when computer is active 80% when computer is idle. 4. Install and deploy Mining pool. - (Opensource options) 5. All miners must connect to pool. 6. Ability to remotely update miner code and FUD from server. 1 C Programming, Computer Security, Cryptography, C++ Programming, Bitcoin Apr 16, 2017 Apr 16, 2017Ended $1895
Showing 1 to 12 of 12 entries
« 1 »