Computer Security Jobs and Contests

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Sign up and start earning
Signup to start earning Are you a Computer Security Consultant? You could be earning money working on these jobs!

Browse Jobs on Freelancer

Project/Contest Description Bids/Entries Skills Started Ends Price (USD)
Cisco and Arista network administrator We're looking for a skilled network administrator that has a background of dealing with Cisco switches/routers, HP switches, Arista, and brocade routers to assist in modifying a few things on our routers and switches. Please do not apply if you do not have any network administrator skills related to this project, there is no need to waste both your time and ours, so please READ THIS FIRST, th... 8 System Admin, Linux, Computer Security, Cisco, Network Administration Feb 22, 2017 Today6d 21h $168
It is a simple tasks relating to System Safety Modelling and Modeling I need someone to tutor me on how to model the interaction between Safety Hazards and Security threats? 2 Computer Security Feb 22, 2017 Today6d 20h $169
Simple implementation of cryptography using PARI/GP Algebra System 1. design and implement (t; n) Shamir's secret sharing scheme in PARI/GP 2. . Design of One-Time Signature Schemes in PARI/GP 7 Computer Security, Algorithm, Cryptography Feb 22, 2017 Today6d 16h $271
Design & Develop Software -- 2 To Build and complete Software for Directory, online scheduling , data, client & employee management, and Payment Gateway. Please submit bid for further discussion of project. 46 PHP, Computer Security, Software Architecture, HTML5, Programming Feb 22, 2017 Today6d 12h $474
application based memory forensics topic: Application Based Memory Forensics security related forensics by using volatility.. need to create a tool for detecting the attacks from application 6 Python, Linux, Web Security, Computer Security Feb 21, 2017 Today6d 4h $65
Blog posts related to IT Security Need 600 word articles to be written for a blog on the following topics. 1. Threat Modeling 2. DDoS (brief intro) and rise in DDoS Attacks 3. Next Gen Firewalls 4. Reverse Engineering Malware 24 Computer Security, Blog, Technical Writing, Articles, Internet Security Feb 21, 2017 Feb 21, 20175d 17h $21
NAT/PAT configuration on ASA firewall I want NAT/PAT configuration on my new Cisco ASA firewall. 19 Computer Security, Cisco, Network Administration Feb 21, 2017 Feb 21, 20175d 12h $107
NAT/PAT configuration on ASA firewall I want NAT/PAT configuration on my new Cisco ASA firewall. 33 Computer Security, Cisco, Network Administration Feb 20, 2017 Feb 20, 20174d 16h $105
Malware Removal Security Expert Needed 2-20-17 Fixed Budget - $75 We have a website that is written in PHP and MySQL that has been hacked. I need an internet security expert to go in and: 1) remove the malware 2) figure out how the hackers got in and close those weaknesses 3) fix / restore / reconstruct the website. 4) close security loopholes to prevent future attacks To apply for this job you must: 1) be willing to sign a notarized non discl... 25 PHP, Web Security, Computer Security, MySQL, Internet Security Feb 19, 2017 Feb 19, 20173d 21h $120
identifying a malicious node in wireless sensor network using cryptographic technques this project is about securing aggregation wireless sensor network by detecting a malicious nose and try to maintain the network after detection. the wireless sensor network must be in a tree topology. to detect the malicious node cryptographic techniques need to be used; and to simulate this network, NS2 is to be used 6 Wireless, Computer Security, Algorithm, Cryptography, C++ Programming Feb 19, 2017 Feb 19, 20173d 16h $201
IBM Security QRadar SIEM 7.2 Administration and Configuration Training I need a tutor to train me on Siem tool i.e. IBM Security QRadar SIEM 7.2 Administration and Configuration along with basics such as IT infrastructure IT security fundamentals Linux Windows TCP/IP networking Syslogs 3 Web Security, Training, Computer Security Feb 19, 2017 Feb 19, 20173d 14h $416
Move software and data from old server to new server. Move software and data from old server to new server. 10 System Admin, Data Entry, Computer Security, Network Administration, Computer Help Feb 18, 2017 Feb 18, 20172d 22h $313
Spy on LINE Messenger and facebook messenger Getting into spouse's line messenger and various mobile messengers 2 Web Security, Mobile Phone, Computer Security Feb 18, 2017 Feb 18, 20172d 21h $646
Internet And Website Security Expert Needed 2-17-17 We have a website that is written in PHP and MySQL that has been hacked. I need an internet security expert to go in and: 1) remove the malware 2) figure out how the hackers got in and close those weakneses 3) fix / restore / reconstruct the website. To apply for this job you must: 1) be willing to sign a notarized non disclosure agreement 2) be a highly experienced expert in compu... 13 PHP, Web Security, Computer Security, MySQL, Internet Security Feb 17, 2017 Feb 17, 20172d 5h $105
Computer Forensics Will do forensics analysis on a given virtual machine image. Report findings. This is a practical scenario. 28 Linux, Computer Security, Report Writing, UNIX Feb 17, 2017 Feb 17, 20172d 4h $538
Mobile Phone, Android, Computer Security, Cryptography, Internet Security Feb 17, 2017 Feb 17, 20172d 3h
computertechniques.com [url removed, login to view] and configure system and network 2.set-up computer network 3.set-up computer server [url removed, login to view] and repair computer system 6 Computer Security, Computer Help Feb 17, 2017 Feb 17, 20171d 20h $428
Write a report on brute force and other illegal hacking tools A hacker has claimed on trial that he broke into a google, a dropbox and a yahoo account using brute force. You will provide a report that explains: a. Exactly what is brute force and how it works b. If it is possible to apply brute force to gmail, yahoo and dropbox c. What other illegal ways are used to break into email and user accounts d. if brute force was possible, how long it would tak... 34 Web Security, Computer Security, Software Architecture, Software Testing, Internet Security Feb 17, 2017 Feb 17, 20171d 18h $139
Cisco and Arista network administrator We're looking for a skilled network administrator that has a background of dealing with Cisco switches/routers, HP switches, Arista, and brocade routers to assist in modifying a few things on our routers and switches. Please do not apply if you do not have any network administrator skills related to this project, there is no need to waste both your time and ours, so please READ THIS FIRST, th... 40 System Admin, Linux, Computer Security, Cisco, Network Administration Feb 17, 2017 Feb 17, 20171d 15h $180
Web Security. Vulnerability finding in a code. Knowledge of hacking penetration tester. Easy task for the right person 23 .NET, Web Security, Computer Security, Report Writing, Internet Security Feb 17, 2017 Feb 17, 20171d 15h $37
Showing 1 to 20 of 27 entries
« 1 2 »