Computer Security Jobs and Contests

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Sign up and start earning
Sign up to start earning. Are you a Computer Security Consultant? You could be earning money working on these jobs!

Browse Jobs on Freelancer

Project/Contest Description Bids/Entries Skills Started Ends Price (USD)
Prescription Pad - EMR and Clinic Management Software It is simplest to use Prescription Pad Writing software which consolidate all processes within a practice software such as Electronic Medical Records (EMR), e-Prescription Writing, Drugs Database, Patient Management software, Clinic management software, and more. The software hepls in managing the most hectic day of the week with ease. It perform various tasks such as scheduling appointments, storing patient database including their prescriptions, reports, billing, etc. Prescription Pad Writing Software ensure 100% safe, foolproof and the chances of errors is almost null. The software coordinate and integrate to all the essential activities involved in the administration and running of a healthcare facility. It meet specified security, technology and functionality standards for managing electronic medical records. It maintain the complete patient information coupled with the electronic medical record (EMR). Prescription Pad Writing Software includes information about a particular patient, including:Total patient management system with patient contact information; once you select the follow up patient and click on the patient history button & its all previous prescription / visits would appear in chronological order along with investigations, Past and future medical facility appointments, Past medical history, Allergies, Medical progress; Patient history utility has all patients visits stored in chronological order which can be seen one by one to see patients progress, Secure storage of clinical records; Secure storage of clinical records along with all kinds of pathological reports, x-ray reports ultra sound reports etc. The software has inbuilt facility to add any kinds of new investigations or reports in future also, Reports supported by graphs; The software generate graphical reports about the required information, Brand safety; Prescription Pad Writing Software checks for brand safety on entering the safety parameters in the patient data it always automatically checks for the brand safety & warns you in case it is unsafe in such conditions and it also guide you regarding use of any new brand or drug in any disease situation, software automatically checks for drug interactions & duplications so that you can hand over a safe prescription to the patient and guide you regarding what investigation should be done in any disease situation. Prescription Pad Writing Software makes the life of both the doctors and patients easy and organized by arranging all the health and medical parameters in one place and disseminating them as and when required. Tags these are:- ePrescription, Software for Doctors, Healthcare software,Clinic Management,Patient EMR,medical practice management,medical practice management For more information pls go below:- [url removed, login to view] [url removed, login to view] 29 PHP, Computer Security, Software Architecture, Software Testing Jul 28, 2017 Today6d 18h $1086
Prescription Pad Writing Software: Safety Measures Prescription Pad Writing Software contrive by CompuRx Infotech Pvt. Ltd. is having the ability to check for drug safety at individual disease level like in case of G6PD(40 drugs contraindicated), PORPHYRIA ( 223 drugs contraindicated ), HYPERTENSION, COPD etc. as there are plenty of medicines which are contraindicated in these diverse conditions. The software checks for drug allergy, a drug allergy is the abnormal reaction of your immune system to a medication. The most common signs and symptoms of drug allergy are hives, rash or fever. A drug allergy may cause serious reactions, including anaphylaxis, a life-threatening condition that affects multiple body systems. The software also provides safety measures for drug interactions and duplications, drug intraction is Whenever two or more drugs are being taken, there is a chance that there will be an interaction among the drugs. The interaction may increase or decrease the effectiveness of the drugs or the side effects of the drugs. The likelihood of drug interactions increases as the number of drugs being taken increases. Therefore, people who take several drugs are at the greatest risk for interactions and therapeutic duplication is the practice of prescribing multiple medications for the same indication without a clear distinction of when one agent should be administered over another. In these case software automatically gives you full details of the type of drug allergy, interaction and duplication by pop up massages if there is any. Prescription Pad writing software also checks for safety profile of brands regarding pregnancy, lactation, children, elderly, hepatic insufficiency, renal insufficiency, pulmonary insufficiency & warns you in case it is unsafe in a particular situation. Tags these are:- ePrescription, Software for Doctors, Healthcare software,Clinic Management,Patient EMR,medical practice management,medical practice management For more information pls go below:- [url removed, login to view] [url removed, login to view] 16 PHP, Computer Security, Software Architecture, Software Testing Jul 28, 2017 Today6d 18h $532
Theory in Computation. -- 2 If you are professional in computer science please let me know. This is more about regular languages 20 Computer Security, C++ Programming Jul 28, 2017 Today6d 15h $30
Business Contingency/ Continuity Plan - Cyber Attack In approximately 10-12 double-spaced pages discuss the planning steps, possible recovery options, and recommended testing requirements needed to support a successful business contingency/continuity of operations environment. Finally, the paper should include your recommendation for a proposed 24-month cycle business contingency testing plan -- what should be tested and how the test should be conducted. Perhaps ranking possible critical corporate assets with the type of testing (i.e., plan reviews, table-top exercises, or perhaps up to and including full blown backup and recovery tests) You should take into consideration costs associated with the recommended testing process -- not only personnel and equipment but also production costs. 36 Computer Security, Research Writing Jul 27, 2017 Today6d 6h $104
Computer Security 1:Hardware and Software Requirements Deliverable: DDC Warehouse Network Closet [url removed, login to view] ([url removed, login to view] KB) group project network hardware and software Ist_7040-group -project-base 2:group project presentation 7040-week-4 group project presenatation requirements 3:Project IP Addressing for Network Data and Telecom This assignment is to create a spreadsheet listing the IP ranges for wired (static and DHCP); wireless; and telecom. 4:deliverables reference: below is the image attachment of deliverables. complete 1,2,3. below attached files are related to project, what ever mentioned below the numbers are related to that project, plz follow all the rules specified in the below attachments. 19 Computer Security, Report Writing, Electrical Engineering, Artificial Intelligence Jul 27, 2017 Today6d $142
Need my CV made Hello, I am a telecommunication graduate and now I need a job focussed CV writing. I am looking for a person who has experience in computer security, cyber security or ethical hacking who can write my tailored CV 22 Proofreading, Computer Security, Resumes Jul 27, 2017 Jul 27, 20175d 16h $17
Attack my website I have a few websites and I need to test. I need someone who is smart and can get to the website. let me know your price. 19 System Admin, Web Security, Computer Security, Software Architecture, Website Management Jul 26, 2017 Jul 26, 20175d 9h $138
IT Security consultant - Penetration Tester - owasp specialist in Belgium ONLY We are looking for a pentest (pentest web application) owasp specialist for specific short missions of few days. It must be executed from a belgian office so only people who are living in Belgium or abroad (and come to belgium for execution of the work) are allowed to make a bit. Please describe your experience, only senior are needed (no junior/beginners) 2 Web Security, Computer Security, Internet Security Jul 26, 2017 Jul 26, 20175d 5h $42
Write some Software I want to make an antivirus, based only on heuristic scan (Algorithms) and not on hashes, I want the software to look user friendly and have different scan options (Full, Quick, etc..) 11 C Programming, Python, Computer Security, Algorithm, Internet Security Jul 26, 2017 Jul 26, 20175d $549
Computer security expert required I need a Computer security expert for my current projects. If you have knowledge please bid. Details will be shared in message with the freelancers. 13 Engineering, Computer Security, Programming Jul 26, 2017 Jul 26, 20175d -
computer security using Anb tool simulation the title of simulation is :EMV Protocol Verifications Using AnB Tool upon Visa Card im looking for an a programmer expert on computer security concepts to do the simulation using ANB tool to apply EMV protocol verification 6 Engineering, Computer Security, Programming Jul 26, 2017 Jul 26, 20175d $485
Hire an Android Developer very expert in android chat application hi , am searching for Hire an Android Developer very expert in android chat application like whatsapp thanks 149 Android, Computer Security, Network Administration, Internet Security, Mobile App Testing Jul 26, 2017 Jul 26, 20174d 19h $53
pfsense firewall I want to setup pfsense firewall Captive Portal, squid, squid reports (Using Names, not IP addresses), Squid guard integrated with openDNS and a separate group that bypasses content filter 5 Computer Security Jul 26, 2017 Jul 26, 20174d 17h $90
intrusion detection The project need to be finished by black hat . 1. The requirements of the actual use of hacking attacks on the site of the non-destructive nature of the site of the offensive test, the main analysis includes information collection class, configuration management class (HTTP method testing, information disclosure, etc.), authentication class (user enumeration, Password verification, password reset test, etc.), session class (cookie test, session fixed test, etc.), authorization class (URL override, path traversal, business logic, file download test, etc.), data validation class (SQL injection, cross station Scripting, code injection, URL jump, file upload test, etc.), system application vulnerabilities and other content testing and [url removed, login to view] are better of a black hat 2. Use the Business Security Assessment Tool to exploit vulnerabilities within the scope of the assessment target and verify vulnerabilities such as Web application vulnerabilities, host operating system vulnerabilities, database vulnerabilities, weak passwords, information disclosure, and improper configuration 32 PHP, Web Security, Computer Security, MySQL, Internet Security Jul 25, 2017 Jul 25, 20174d 11h $2733
AnB Tool upon Visa Card im looking for an expert in computer security to use ANB tool to built a simulation model of security called : EMV Protocol Verifications Using AnB Tool upon Visa Card 3 Engineering, Computer Security, Programming Jul 25, 2017 Jul 25, 20174d 10h $195
open vpn C Sharp Developer open vpn We are looking for open vpn for server and client to build secure tunnel for windows 10, iPhone and android application. We are looking to transfer voice, text and all internet communications. We are looking to make a similar app like expressVPN. You check their site out. We have a simple test. We will run a test of your client to your vpn server. We would like to test your work before we hire you. The app must have built in C sharp. You must speak English. We are looking to add to our team. I have included a link about us and how we work. I have included a test. We have found there many coders that cannot code. Please show us that can complete the sample test. Watch the videos and good luck. [url removed, login to view] [url removed, login to view] HR staff ai@[url removed, login to view] 10 C Programming, Computer Security, Software Architecture, C++ Programming, OpenSSL Jul 25, 2017 Jul 25, 20174d 9h $10
Remote & Onsite IT Support We're looking for security minded folks to help us support our small to mid-sized clients. Need experience with Active Directory, group policy, windows server/desktop support, network support, and more. Experience w/ MacOS a plus. You must have your own vehicle & clean driving record, ability to go onsite as needed (though most work will be remote), and comfortable completing a background check. Women and other underrepresented minorities are strongly encouraged to apply! 10 System Admin, Computer Security, Technical Support, Desktop Support, Windows Server Jul 25, 2017 Jul 25, 20174d 3h $43
Computer networking: arp cache poisoning Implement either of detection , mitigation or prevention scheme of arp cache poisoning 4 Computer Security Jul 25, 2017 Jul 25, 20174d 1h $108
Cryptography analysis ( Chaos-BasedCryptography) analysis and simulate Cryptography analysis ( Chaos-BasedCryptography) , more details in the chat 7 Web Security, Computer Security, Cryptography Jul 25, 2017 Jul 25, 20173d 23h $159
Lost Cpanel login recreation I need someone to re-create a Campanile login which I lose. Someone who is familiar in logging of cpanel where the password is lost. 19 PHP, Web Security, Computer Security, Software Testing Jul 25, 2017 Jul 25, 20173d 21h $20
Web Application Penetration Testing of a Website Hello, We are looking to hire someone to help conduct a Web Application Penetration Test against a website of ours. We are only looking for a basic test, and not in depth, of our public facing website. The website contains about 6 pages with about 5 forms that can be submitted by the user. If interested, please let us know (1) how much you charge, or if you have multiple levels of penetration testing (from basic to more detailed), (2) how much each level costs, and (3) what type of report we would receive after you complete the penetration test. Thanks, 50 Web Security, Computer Security, Software Architecture, Software Testing Jul 25, 2017 Jul 25, 20173d 20h $591
technical report - urgently Choose a security vulnerability. Develop a test environment to demonstrate the chosen vulnerability Main activities to do : 1. Choose a significant and a most relevant CVE (vulnerability), we prefer a CVE of 2016 or 2017. Include the details about things like impact etc. 2. Briefly explain and document the source of the chosen vulnerability and the causes in one page roughly(A direct copy of CVE report is not allowed) 3. Identify a system or systems where this vulnerability currently exist. 4. Build a test environment which is vulnerable to chosen issue. The test environment should be saved as a Virtual box VM image. Credential for the test environment must be More details will be given later 9 Linux, Computer Security, Report Writing, Internet Security Jul 25, 2017 Jul 25, 20173d 18h -
Theory in Computation. If you are professional in computer science please let me know. This is more about regular languages 23 Computer Security, C++ Programming Jul 25, 2017 Jul 25, 20173d 15h $37
Find open ports and be able to open ports on laptop connected via a mobile Hello, I need someone to teach me to how to open ports on a windows 7 and 10 desktop on a laptop connected to the internet via a mobile phone. I need someone who knows how to open ports or find ports with cellphone connections not internet provider router. I am working in remote areas where the only internet access is available via a mobile phone and I need to be able to find and to open ports to run software on the lap top which is connected to the internet via a mobile phone. Thank you 16 Web Security, Computer Security, Network Administration, Programming Jul 24, 2017 Jul 24, 20173d 4h $77
Someone recorded my phone conversations and text messages. I want to know how it happened and prevent it from happening again Someone has tempered with my phone calls and secretly recorded phone calls, texts and hacked into my e-mail and Facebook. I want to know how it happened and prevent it from happening in future. 10 Computer Security Jul 24, 2017 Jul 24, 20172d 23h $979
how to write i want to know the steps to academic artical writing 0 Computer Security Jul 24, 2017 Jul 24, 20172d 17h -
Need Computer Security expert I have project to be done on computer networking. Before that you need to send me the answers of my queries in the sample attached so that I can chose the correct person. Its urgent 18 Computer Security, Software Architecture, Cisco, VoIP, Cryptography Jul 23, 2017 Jul 23, 20172d 12h $46
I want to block x15 IP addresses from using my site hi, I'm looking to block approx 15-20 IP addresses from my site. I need someone to help me identify the IP addresses of the people I wish to ban from my site. I have emails from them but I think the emails only provide the IP of the server of the email provider. So I need help with that. Maybe using whoreadme or similar? 19 PHP, Web Security, Computer Security, Software Architecture, Internet Security Jul 23, 2017 Jul 23, 20172d 5h $46
Using AnB Tool ON computer security im looking for an expert in computer security to use ANB tool to built a simulation model of security called : EMV Protocol Verifications Using AnB Tool upon Visa Card 7 Engineering, Computer Security Jul 23, 2017 Jul 23, 20172d 3h $244
Write some Software We need a commercial grade antivirus for enterprise use, With an easy to use GUI interface, Based on algorithms and hashes (provide a hash database), with different scanning options (Quick, Full, Folder, Etc..) 16 C Programming, Java, Python, Computer Security, Algorithm Jul 23, 2017 Jul 23, 20172d $549
Setup private proxies to run instagram software Hi, I require someone to setup varies private proxy from multiple locations to run the Instagram software. 25-50 required Kind regards, Liam 7 C Programming, Computer Security Jul 23, 2017 Jul 23, 20171d 13h $131
Information Technology Reports I have a bulk order of projects related to Information technology, computer science, networking, project management, software development and I need writers with background and expertise in these areas to work with me for the next 3 months. My budget is $4 per page. Writers must be conversant with academic writing, Harvard referencing and deliverying of contents that are plagiarism-free. 40 Computer Security, Technical Writing, Report Writing, Research Writing, Software Development Jul 22, 2017 Jul 22, 20171d 8h $109
iptables firewall It´s a linux firewall, IPTables based, running on a 12.3 opensuse version. Standard configuration, DMZ, internal network and external network. It´s should be done on FWBuilder and should be bussisnes oriented, should have 4 subnetwork levels, each one should have different restrictions, from no access to outside networks only DMZ and local networks (level 1) to full access to outside networks and locals (level 4). It´s should be able to grant priority to realtime apps over the others, like grant the video-confference conection over the rest of the conections. 20 System Admin, Linux, Web Security, Computer Security, Network Administration Jul 22, 2017 Jul 22, 20171d 2h $145
Write a small script Need this small program done for a small business 39 C Programming, Java, Computer Security, C++ Programming Jul 21, 2017 Jul 21, 20179h 54m $30
Image encryption/decryption using AES Hello, I need a matlab code to encrypt and decrypt an input image with a key using AES algorithm. The program can visualize (show) both the encrypted and decrypted images. Thanks 39 Matlab and Mathematica, Computer Security Jul 21, 2017 Jul 21, 20171h 50m $146
Encrypted Ransomware Removal My server got infected with Ransomware. Attached are 4 sample files. If you can decrypt then I will give you access to my pc to fix the rest. Attached files include. 1) HTML message form the hacker 2) Good original file 3) 2 encrypted files. 15 System Admin, Computer Security, C# Programming, Database Programming, Internet Security Jul 21, 2017 Jul 21, 2017Ended $591
Design a Client Piece Software using C++ that will carry out an FTP Dictionary Attack and also interrogate the contents of a vulnerable FTP directory structure You are required to design and build a client piece of software that runs on an Ubuntu installation of Linux. The application must be written in C using the Sockets API it is permissible for you to use the provided Sockets Client Framework and to adapt it to fit NOTE: This program should be written as a utility program that accepts command line parameters NOT as an interactive program. 4 C Programming, Web Security, Computer Security, Ubuntu, Internet Security Jul 20, 2017 Jul 20, 2017Ended $46
Translate IT requirement document -- 3 The IT requirement document is made to inform IT experts before they install our software. This document needs to be translated to French, Italian, German 55 Translation, Computer Security, German, French, Italian Jul 20, 2017 Jul 20, 2017Ended $24
Create medico-legal report writing software READ CAREFULLY AND DO RESEARCH BEFORE APPLYING, ....Application must open with "We wish to apply to participate in creating medical software..." Client wants an interactive software that can be downloaded form her site. It is for medical/psychological evaluation purposes. It is also medico-legal report writing software Adaptable for desk top, tablet and mobile Must be data-secure. Should be expandable to add features and new sections to the platform Consider adding feature for input via audio dictation KEY WORDS: // Intelligent* // Interactive* // Owner must be able to make changes and updates* // look should be interesting and Professional Here are 2 sample sites that boast of similar software: [url removed, login to view] (called X-Port) [url removed, login to view] For more ideas you can look at these other non-medical interactive sites: [url removed, login to view] [url removed, login to view] Output may resemble this: [url removed, login to view] 15 PHP, Computer Security, User Interface / IA, Software Architecture, Website Testing Jul 19, 2017 Jul 19, 2017Ended $273
Entropy analysis -- 3 I am looking for help in conducting analysis . This analysis will be based on average min entropy . please contact me for further details. 21 Computer Security, Algorithm, Cryptography, Mathematics, Statistical Analysis Jul 19, 2017 Jul 19, 2017Ended $165
PEN Tester / Ethical Hacker Hello, I look for someone who can test security for private computers and find vulnarabilites to fix them. Must have several years of experience in the field of IT security/ PEN testing. !!!IMPORTANT: start your application with the word: "ethical" to prove you have read the description 34 Web Security, Computer Security, Internet Security Jul 19, 2017 Jul 19, 2017Ended $55
I would like to hire a Computer Security Consultant Penetration Testing and Risk Assessment of internal network of small to medium banking and financial institution. 10 Computer Security, Report Writing, Risk Management, Internet Security Jul 19, 2017 Jul 19, 2017Ended $2090
Fill in a Spreadsheet with Data i have 148 profile sheets (screen shots)....all the same format and I need to put this into an excel spread sheet. 41 Data Entry, Excel, Computer Security Jul 19, 2017 Jul 19, 2017Ended $19
Recovery files encrypted from virus My pc got a virus which blocked this file with a password [url removed, login to view](!! to get password email id 408746937 to eucodes17@[url removed, login to view] !!).exe I need to recovery this file. 10 Web Security, Computer Security, Internet Security Jul 19, 2017 Jul 19, 2017Ended $430
Recover files encrypted by Aleta Server was hit by Aleta Ransomeware I need help to decrypt it back 6 Python, Computer Security Jul 19, 2017 Jul 19, 2017Ended $545
set up secure websites (https) and multfactor authentication Phase 1: Design (word document) and impact (cost) of MFA and HTTPS implementation for multiple websites on shared servers. Phase 2: Implement MFA and HTTPS please in your response offer total offering for this project and split phase 1 and phase 2 costs. 16 Web Security, Computer Security Jul 19, 2017 Jul 19, 2017Ended $161
Write some Software I have a free lance opportunity for developing a code related to web and internet security. 16 Web Security, Computer Security, Internet Security Jul 19, 2017 Jul 19, 2017Ended $1428
Sell something for me All kind of Computer accessories 4 Sales, Computer Security Jul 19, 2017 Jul 19, 2017Ended $625
I would like to hire an Article Writer You will investigate technical problems of operating systems, and provide a written report. Your research should focus on an in-depth topic about theories, algorithms, approaches, mechanisms, or implementation of one of the following fields of operating systems: - process management - process and thread - CPU scheduling - synchronization - deadlock handling - storage management - main memory - virtual memory - file systems - mass-storage and I/O - protection and security - distributed, real-time, and multimedia systems Your topic could come from a sub-problem of cutting-edge research problems discussed in the literature (i.e., investigating a technical problem). You must also properly cite any viewpoints, methods, algorithms, data, results, figures, tables, etc. that you borrow from other papers or contributors that you discuss or include in your paper/report. All references cited should be published, or at least be publicly available, stable, and accessible online (referenced in APA or IEEE Style). Your investigation will be based on recent publications (i.e., published in the past five years) such as journal/conference papers and technical documents, and the applicable software packages (open source preferred). You are encouraged to read some papers about new techniques in operating systems. Once you have chosen your topic, you need to identify meaningful, feasible outcomes for your research on the topic. Overall, the outcomes should interest and benefit the professional community of operating system research and development. Some possible outcomes: - analysis, findings, and discovery of problems. - results of your tests, surveys, and comparative analysis. - proposals for new or improved methods, algorithms, etc. - meaningful implementation plans. - insight on future directions. Present the outcomes of your research in a 10- to 15-page paper written in a journal or conference paper format. References should be cited using APA or IEEE Style. Your paper should include the following sections: - Title - Abstract - Introduction/background: - Methods - Results and findings - Related work - Conclusion and future work - References - Appendix 53 Computer Security, Research Writing, Content Writing Jul 18, 2017 Jul 18, 2017Ended $101
Windows 2008 Server Security We have 7 servers running Windows 2008 Enterprise Server, hosted in the USA. We are looking a person with extensive experience with Windows security, Firewall, RDT Gateway, Policies etc to audit our servers and ensure they are well secured. We need the person to document the security implementation so our IT staff can learn from you. Please only bid on this project if you have proven experience with server security. 39 System Admin, Web Security, Computer Security, Windows Server, Internet Security Jul 18, 2017 Jul 18, 2017Ended $1078
Showing 1 to 50 of 102 entries
« 1 2 3 »