Computer Security Jobs

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 105,490 reviews, clients rate our Computer Security Consultants 4.9 out of 5 stars.
Hire Computer Security Consultants

Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.

Here's some projects that our expert Computer Security Consultant made real:

  • Establishing secure network infrastructure
  • Improving system performance and leveraging encryption
  • Developing security frameworks for organizations
  • Implementing authentication measures for digital identification
  • Evaluating risks of cyber incident exposure
  • Researching the latest security regulations for compliance
  • Crafting secure policies for employee engagement

Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.

With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!

From 105,490 reviews, clients rate our Computer Security Consultants 4.9 out of 5 stars.
Hire Computer Security Consultants

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    21 jobs found

    I need help finishing both my HVAT and VPAT documentation, but a few security-specific sections still need polished, audit-ready evidence. My priority is to align everything with SOC 2 requirements while also mapping the same controls to relevant ISO clauses. What still needs to be done: • A concise vulnerability risk assessment that references the high-value assets identified in the HVAT and shows clear likelihood / impact scoring. • Targeted penetration testing of the key application components called out in the VPAT, with reproducible steps and screenshots for the report. • A brief compliance audit write-up that cross-links SOC 2 controls to the corresponding ISO controls and highlights any residual gaps. Deliverables will be three stand-alone artifacts (risk assess...

    $508 Average bid
    $508 Avg Bid
    38 bids

    I need an experienced cybersecurity professional who can guide our food-manufacturing plant through the next stage of its Governance, Risk & Compliance journey. You will be the point person for building and fine-tuning our Information Security Management System with ISO 27001 as the primary framework. Day-to-day you will draw on at least four years of GRC work—ideally gained in industrial or OT-heavy settings—and a solid technical foundation in infrastructure or security operations. What matters most is deep, practical knowledge of ISO 27001. Familiarity with ISO 27005 and the NIST frameworks is important because we want our risk management and control mapping to stand up to external scrutiny. Certifications such as ISO 27001 Implementer, ISO 27005 Risk Manager and any I...

    $109 / hr Average bid
    $109 / hr Avg Bid
    20 bids

    I need an experienced cyber-security professional who can move straight past theory and actually put the right protections in place. My environment is already running, but the current safeguards are piecemeal. Your task will be to evaluate what is there, decide what is missing, and implement the controls that close those gaps—whether that involves configuring firewalls, hardening servers, enforcing least-privilege access, deploying endpoint protection, or setting up logging and alerting in a SIEM. I’m looking for measurable improvements, not just a written report. Once the new measures are live, I’ll need clear documentation of every change plus a brief hand-over session so my in-house team can maintain what you install. Deliverables • Security controls fully dep...

    $294 Average bid
    $294 Avg Bid
    14 bids

    I need a skilled network engineer to spend one full day at my client’s office acting as our hands-on field resource while my remote team drives the configuration work. Your focus will be the physical layer: • Rack and securely mount the new servers, switches, and firewalls exactly as outlined in our build guide. • Dress network and power cabling so everything is neat, labeled, and easy to trace. • Power up each device, connect the console or management interfaces, and confirm our remote team can reach them. • Run quick health checks—simple pings, basic connectivity tests, and a printer test page—to verify the environment is live. • Make sure every desktop and laptop joins the network without issues and that all printers can produce a clea...

    $37 / hr Average bid
    $37 / hr Avg Bid
    7 bids

    I need a reliable, experienced Network Engineer to be my hands on the ground for a full working day at our client’s office. My remote team will handle all configuration; your role is purely physical deployment, basic testing, and real-time feedback so we can finish the build in one visit. You will arrive with the step-by-step build guide already in hand, rack and mount the servers, switches, and firewalls, dress the power and network cabling neatly, attach console or management leads, then power everything up so we can start configuring from afar. While we work remotely, you will run quick ping and connectivity checks, confirm that each desktop or laptop grabs an IP and reaches the internet, and send a printer test page to be sure the print queue is alive. Deliverables (end of day)...

    $43 / hr Average bid
    $43 / hr Avg Bid
    5 bids

    I need help to find a hacker who compromised my computer over wifi. Requirements: - Analyze the breach and identify the hacker. - Use existing antivirus info for insights. - Provide a detailed report of findings. Ideal Skills: - Experience in cybersecurity and hacking investigations. - Proficient in analyzing antivirus data. - Strong problem-solving skills and attention to detail. Please include past work, experience, and a detailed project proposal in your application.

    $341 Average bid
    $341 Avg Bid
    29 bids

    **Title:** Mitsubishi CNC M80 Password Recovery - Encrypted DAT File **Category:** Electrical Engineering > Industrial Automation **Budget:** $150-$500 (willing to pay more for fast solution) **Description:** I have a Mitsubishi Electric M80 CNC machine that is password locked and I need urgent help to regain access. **Background:** The previous operator set a system password and it was never documented. The machine is currently locked and preventing us from accessing critical functions, causing production delays. **Technical Details:** - Machine: Mitsubishi M80 CNC - Model: FCA80LH-4 - Serial Number: M30147623YN - Unit: FCU8-MU515 - Controller Version: WN769 F (Ver.4.02) - NC OS: BND-2000W001-F7 - PLC: BND-2023W003-A0B **What I Have:** - Encrypted file (65 bytes) - Photos of ma...

    $436 Average bid
    $436 Avg Bid
    16 bids

    I'm looking for someone who understands how to configure a GL-iNet GL-MT6000 (Flip 2) router to connect to and work through a foreign VPN. I need to understand what settings to use, which provider/hosting provider to use, and which package to choose to connect the VPN to the router. I also need to understand how to resolve potential leaks, stress testing, and so on. After connecting the router and installing the VPN, I need to make sure there are no issues that could reveal my current location, and that everything works reliably.

    $28 Average bid
    $28 Avg Bid
    10 bids

    I’m looking for a specialist to run a full health-check on my Local Area Network. The priority is to verify that everything works as intended and to pinpoint any performance bottlenecks that might slow users down. Security is being handled separately, so your focus will be strictly on functionality and performance. The job involves testing end-to-end connectivity, measuring throughput and latency at peak and off-peak times, and confirming that current configurations on switches, routers, and access points align with best practices. I expect you to use industry-standard network diagnostic tools—think Wireshark, iPerf, or SolarWinds—but you’re free to bring in any utilities you trust as long as the results are clearly documented. Deliverables • A concise repo...

    $19 / hr Average bid
    $19 / hr Avg Bid
    10 bids

    I have already completed the technical investigation of a recent security alert: the endpoint protection platform flagged an executable that tried to tamper with system files and phone home to an external server. I verified the hash, monitored live-system behaviour, confirmed the activity as malicious, quarantined the file and rescanned the host to ensure it is now clean. What I need next is a professionally written incident report that translates those raw findings into a clear narrative for both management and technical stakeholders. The document should outline the timeline of events, the investigation methodology, indicators of compromise, remediation actions taken, and practical recommendations to harden the environment against similar threats. Where helpful, map tactics to MITRE ATT&...

    $10 / hr Average bid
    $10 / hr Avg Bid
    12 bids

    You are a senior cybersecurity + machine learning engineer. Build a practical, runnable, end-to-end Transformer-based Web Application Firewall (AI-WAF) prototype suitable for Smart India Hackathon / ISRO SIH demonstration. The system must implement the full pipeline: Log Ingestion → Parsing → Normalization → Tokenization → Transformer Training → Multi-Class Attack Classification → Anomaly Scoring → Real-Time Non-Blocking Inference → Alerting & Logging → Incremental Fine-Tuning ======================================== 1. CORE FUNCTIONAL REQUIREMENTS ======================================== A. Multi-Class Attack Detection The Transformer model must classify HTTP requests into: - BENIGN - SQL_INJECTION - XSS - COMMAND_INJECTION - PATH_TR...

    $59 Average bid
    $59 Avg Bid
    8 bids

    I hold written authorization from the system owner and need an experienced ethical-hacking professional to carry out a controlled breach of our production environment. The assignment goes beyond a traditional penetration test: I want you to replicate a real-world, end-to-end intrusion scenario so we can measure how our monitoring, logging and incident-response teams react under pressure. Scope • Obtain initial access using any non-destructive vector you discover (phishing simulation, misconfigurations, credential weakness, etc.). • Laterally move, escalate privileges and demonstrate data access without altering or deleting information. • Leave tamper-proof evidence (flags) in pre-agreed directories so we can verify compromise. • Conclude with a thorough report that det...

    $10 / hr Average bid
    $10 / hr Avg Bid
    9 bids
    Literature analysis writing
    3 days left
    Verified

    I want professional english writing for a phd level dissertation.

    $112 Average bid
    $112 Avg Bid
    58 bids

    I’m ready to move from concept to a fully functioning Wide Area Network and need an experienced networking specialist to guide every step. The job starts with assessing my current sites and bandwidth needs, then designing a scalable WAN topology that keeps latency low and uptime high. From there you’ll source or specify the right hardware, configure routing, implement security policies, test end-to-end connectivity, and leave me with clear documentation so my team can handle routine maintenance. If you’ve rolled out multi-site WANs before and can communicate technical details in plain language, let’s talk timelines and milestones.

    $26 Average bid
    $26 Avg Bid
    13 bids

    I’m putting together an in-depth, case study–style report on a real-world data breach that struck the healthcare sector. The goal is to walk readers through the timeline of the incident, the technical and procedural gaps that allowed it to happen, the immediate response, and the long-term remediation steps. Accuracy and authenticity matter: I will provide raw notes, public disclosures, and redacted internal memos once we start, but I’m relying on your cybersecurity and information-management expertise to shape them into a compelling, well-structured narrative. Here’s what I’m after: • A 3,000–4,000-word report formatted for executive readership but detailed enough for security teams. • Clear articulation of attack vectors, compromise indi...

    $123 Average bid
    $123 Avg Bid
    68 bids

    I’m looking for an online tutor based in India who can guide me through intermediate-level administration of both Linux and Windows Server environments. On the Linux side I want practical, session-based coaching in system administration, security and firewall management, and shell scripting. For Windows Server, the focus should be Active Directory management, server configuration and deployment, plus security and patch management. Each topic needs to be demonstrated live, with time for me to replicate the steps on my own lab machines during or immediately after the call. We can meet on Zoom or Google Meet for 2–3 hours a week, preferably evenings or weekends. Deliverables • A structured lesson plan that maps out the sequence of sessions • Recordings or sess...

    $2 / hr Average bid
    $2 / hr Avg Bid
    7 bids

    I’ve built a custom web application and it’s almost ready for production. Before the public rollout, I want a rigorous penetration test that will expose any weakness and help tighten every layer of security. The assessment must be hands-on and realistic, covering the full stack rather than a purely theoretical review. Scope My priorities are clear: • Code review – comb through the source for injection points, authentication flaws, insecure dependencies, and logic errors. • Network-level probing – map open ports, misconfigured firewalls, and potential lateral-movement paths. • Server configuration – evaluate patch levels, TLS setup, permissions, and hardening of the underlying OS and web server. Primary Goal The sole purpose is to imp...

    $1126 Average bid
    $1126 Avg Bid
    24 bids

    We are seeking a reliable IT team to support our medical centre with comprehensive, end-to-end IT services. This would include setting up, managing, maintaining, and regularly updating all aspects of our IT infrastructure, including networks, servers (on-site and / or cloud-based), workstations, computers, printers, and all connectivity systems. We require ongoing management of firewalls, cybersecurity protections, antivirus and anti-malware systems, data encryption, secure remote access, backups and disaster recovery solutions, and proactive monitoring to prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection re...

    $491 Average bid
    $491 Avg Bid
    25 bids

    We are seeking a reliable IT team to support our medical centre with comprehensive, end-to-end IT services. This would include setting up, managing, maintaining, and regularly updating all aspects of our IT infrastructure, including networks, servers (on-site and / or cloud-based), workstations, computers, printers, and all connectivity systems. We require ongoing management of firewalls, cybersecurity protections, antivirus and anti-malware systems, data encryption, secure remote access, backups and disaster recovery solutions, and proactive monitoring to prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection re...

    $478 Average bid
    $478 Avg Bid
    33 bids

    I need a MeshCentral/Windows systems engineer to optimize a Windows 11 lab remote-support setup. When Secure Exam Browser (SEB) enters protected mode, remote desktop may go black (expected). I need a compliant solution: stable agent deployment, correct permissions/consent, TLS/relay configuration, and a documented pre-exam support workflow + troubleshooting checklist. No bypass of SEB protections. Deliverables: working MeshCentral config, agent install package/script, and step-by-step documentation.” I am looking for a Windows Systems Engineer to help configure a MeshCentral server for advanced remote support. We are experiencing an issue where the remote screen goes blank when the client system switches to an isolated/secure desktop session (such as UAC prompts or custom secure shel...

    $548 Average bid
    $548 Avg Bid
    6 bids

    I need help tracing harassment issues related to cyberstalking. I suspect my LinkedIn account has been compromised, and I'm receiving harassment on email and other online platforms. Key tasks include: - Investigating unauthorized logins and profile changes on my LinkedIn. - Identifying sources of harassment on email and other platforms. - Providing a report of findings and recommendations to secure my accounts. Ideal skills and experience: - Experience with cybersecurity - Familiarity with LinkedIn security protocols - Strong investigative skills - Ability to provide clear, actionable reports

    $26 / hr Average bid
    $26 / hr Avg Bid
    27 bids

    Recommended Articles Just for You