Device protection through physical and software means. Security examples include software encryption, keys, and secure protocols for data transfer

Hire Security Engineers

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    9 jobs found, pricing in USD

    This is a small demo project where a SOC II report has to be made for an imaginary company. The starter_template has been provided where most of the work is already done. Only there is need for a small addition.

    $12 (Avg Bid)
    $12 Avg Bid
    3 bids

    A simple react webapp, with no or minimal UI. Just to connect MQTT Broker using npm mqtt library. **TLS connection should be done only, using certificates, user name, password and secure Port. / We already have working code of react app connecting to broker and working properly. But it is withour TLS connection. Front end - React back end - Golang

    $26 (Avg Bid)
    $26 Avg Bid
    1 bids

    Looking for someone to contribute original articles on themes of Security Operations such as: SIEM Threat Hunting Azure Sentinel ArcSight / Exabeam / Logrhythm / Elastic Sigma SOC tools, processes or standards Anything else Security Operations related Particularly interested in detailed technical articles, write ups of your GIt projects etc Full attribution to author and links to blogs / git etc....

    $107 (Avg Bid)
    $107 Avg Bid
    31 bids

    I need some help with finding importers or buyer of WTMD Walkthrough Metal Detector CEIA. Warranty Buyers / Importers will got under factory prices. Brand : CEIA - Italy Owner Location : Jakarta, Indonesia Type : Walkthrough Metal Detector SMD600 Plus Stock : 6 unit Condition : New I will give commission $100/unit until transaction success

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    Minium 3 to 4 year experience and hindi Lang Must Indian are allowed Mature Person Required for our startup Complete Knowledge About Amazon Web service with Mongo db , mongodb 8 plus Aws Sever Managed Security For App and server server down and all that managed server upgrade server maintain server proper configuration and manage process

    $8 / hr (Avg Bid)
    $8 / hr Avg Bid
    6 bids

    help in writing the flowing concepts deeply and in professional to get more knowledge. and more notes will be given if bids received. Literature Review 2.1 Types of security attacks 2.2 Different approaches in security testing for a system.  Manual inspections & reviews. ...  Threat modeling. ...  Code review.  Penetration testing 2.3 attack trees 2.4 Analysis of attack tree 2.5 Satisfiabi...

    $326 (Avg Bid)
    $326 Avg Bid
    43 bids
    about literature review 4 days left
    VERIFIED

    help in writing the flowing concepts deeply and in professional to get more knowledge. and more notes will be given if bids received. Literature Review 2.1 Types of security attacks 2.2 Different approaches in security testing for a system.  Manual inspections & reviews. ...  Threat modeling. ...  Code review.  Penetration testing 2.3 attack trees 2.4 Analysis of attack tree 2.5 Satisfi...

    $128 (Avg Bid)
    $128 Avg Bid
    61 bids

    I'm looking for someone who has experience in A.R.E and is good. There is an android app that should add features such as downloading and enlarging profile photos and video players.

    $1140 (Avg Bid)
    $1140 Avg Bid
    14 bids

    vulnerability fix in wordpress site - remediation required

    $62 (Avg Bid)
    $62 Avg Bid
    13 bids

    Top Security Community Articles