Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

De 55,509 opiniones, los clientes califican nuestro Internet Security Experts 4.9 de un total de 5 estrellas.
Contratar a Internet Security Experts

Internet Security is a highly important arena of information technology, which involves the prevention of data, systems and networks from malicious intrusions and other cyber attacks. An Internet Security Expert is tasked with employing a broad range of defensive and analytical measures to protect the confidentiality, integrity and availability of computer systems, networks and data. With their expertise in Information Assurance (IA), these professionals use their knowledge in cyber intelligence and counterintelligence, firewall protection, authentication mechanisms, intrusion detection systems (IDS) and much more to protect clients from cyber-attacks while keeping an eye out for potential weaknesses.

Here's some projects that our expert Internet Security Experts made real:

  • Developing security protocols for actors in online communications
  • Implementing technical solutions to protect company email addresses against malicious entities
  • Crafting secure networks for serviced-based organizations to ensure data cannot be manipulated or destroyed
  • Working on IT audits for data recovery companies to ensure their infrastructure is correctly documented with appropriate security measures in place.
  • Locating sources of hacker activity to make sure the client’s system or network remains safe from unauthorized access
  • Troubleshooting WordPress security issues to safeguard companies from hackers
  • Cleaning up any threats of malware and safeguarding websites against future infections.

As clearly illustrated by this list of projects, an Internet Expert can be a valuable asset to any organization that relies heavily on digital methods of communication. By enlisting the help of these experts, clients can protect their networks and data without wasting resources on ineffective solutions. And with Freelancer.com, clients can make use of its platform to find the professional whom they believe can make their dreams come true. So if you’re looking for an Internet Security Expert, feel free to post your project on Freelancer.com and start your journey running towards a secure future!

De 55,509 opiniones, los clientes califican nuestro Internet Security Experts 4.9 de un total de 5 estrellas.
Contratar a Internet Security Experts

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    19 trabajos encontrados

    I need an experienced systems professional who can take ownership of my production servers from the ground up. The job starts with a full audit of the existing Linux stack (Ubuntu 22.04 on AWS EC2), then moves into tightening every layer—optimising configuration, hardening services, and putting robust security controls in place. What matters most to me is confidence that the machines are patched, performance-tuned, and continuously protected. After the initial hardening you will set up real-time monitoring and alerting (Prometheus + Grafana is currently installed but not fully wired), document a clear maintenance schedule, and remain on hand for rapid incident response. Deliverables • Comprehensive audit report with recommended fixes • Implementation of agreed configu...

    $127 Average bid
    $127 Oferta promedio
    23 ofertas

    Title: Cybersecurity Specialist Needed to Identify and Eliminate Ongoing Device & Account Breach Description: I am looking for an experienced cybersecurity professional to help investigate and resolve a serious security issue. Last month, multiple personal accounts (including WhatsApp and other social platforms) and devices were compromised. Since then, I have: Switched to new devices Reset passwords and secured accounts Enabled basic security measures However, I still suspect unauthorized access or persistent compromise. There are concerns that my data may have been exposed or that a hidden vulnerability (malware, spyware, remote access, or account takeover method) still exists. Scope of Work: Perform a full security audit of devices and accounts Identify how the breach occurred...

    $37 / hr Average bid
    $37 / hr Oferta promedio
    8 ofertas
    Hourly IT Security Support
    6 días left
    Verificado

    I run a small construction company and want to build a long-term relationship with an external IT team that bills by the hour. My most pressing need is tightening our email defences, but you will also step in whenever we face issues with phone or computer security, malware, or any attempt at hacking. For email specifically, make sure your proposal shows how you will: • stop spam and phishing before it reaches our staff, • enable encrypted communications that are simple for non-technical users, • set up access controls and ongoing monitoring so we always know who touched what and when. Beyond email, outline the tools and processes you use to harden endpoints, secure mobile devices, and perform rapid incident response. A detailed project proposal explaining your approach, ti...

    $22 / hr Average bid
    $22 / hr Oferta promedio
    41 ofertas

    I need an experienced security expert to evaluate the network layer of our multiplayer game infrastructure. This evaluation is limited to penetration testing and does not include reverse engineering or anti-cheat development. The evaluation must cover three core activities: port scanning (mapping all exposed services), vulnerability scanning (identifying exploitable weaknesses), and intrusion detection testing (evaluating the responsiveness of our current monitoring systems to actual attack patterns). Vulnerability reproduction needs to be written into a simple user interface script. You will be using a test copy of the production environment for the evaluation, which includes the login server, matchmaking server, and in-game transaction server. Upon completion of the testing, I expect to...

    $165 Average bid
    $165 Oferta promedio
    20 ofertas

    We are looking for an experienced Carbonio expert to review, troubleshoot, and optimize our current email system. Scope of work: • Review our existing Carbonio CE installation and configuration • Diagnose issues with specific domains that did not migrate correctly • Identify bugs, misconfigurations, or performance issues • Fix problems where possible or provide clear solutions/workarounds • Optimize system performance, stability, and security • Verify DNS configuration • Ensure all services are running correctly • Provide recommendations and best practices Current situation: • Migration to Carbonio CE already completed • Some domains are not functioning correctly after migration Environment: • Please send us a message for details su...

    $33 / hr Average bid
    $33 / hr Oferta promedio
    28 ofertas

    I need an experienced security professional to spend time in our Delhi NCR office and harden every layer of our development environment, starting with the laptops my engineers use daily. Immediate focus – securing laptops Please arrive ready to implement or advise on: • Prevent data/code leakage • Restrict USB, file sharing, and all external uploads • Control developer access with screen recording Activity monitoring is the key restriction I want enforced from day one. You may bring your own preferred EDR/DLP toolset or work with ours; what matters is that the controls are provably effective and centrally managed. Broader scope during the same engagement Once the endpoints are locked down, I’ll move straight to: – Rolling out Data Loss Preve...

    $80 Average bid
    $80 Oferta promedio
    9 ofertas

    Join our mission to make the digital world safer! As a Bug Bounty–Focused Security Analyst, you’ll work closely with our global community of ethical hackers, helping identify, validate, and escalate real-world vulnerabilities — ensuring organizations stay ahead of evolving cyber threats. Your Role Review, validate, and triage vulnerability reports submitted by bug bounty hunters. Assess the impact and severity of findings, including CVSS scoring. Collaborate directly with ethical hackers to reproduce and understand vulnerabilities. Provide clear, actionable remediation guidance to clients. Perform targeted penetration testing to support and verify bug bounty findings. Identify duplicate, false positive, and low-quality submissions efficiently. Contribute to improving b...

    $547 Average bid
    $547 Oferta promedio
    10 ofertas

    I want to run a small-scale proof of concept—no more than five endpoints (Windows, Mac laptops, windows server and mobile device iPhone and Android) —to show how Microsoft Defender with VPN and Intune can secure and manage various devices. On the Defender side: real-time threat protection, vulnerability management dashboards, and endpoint detection and enrollment. Enable web protection using Microsoft defender VPN to encrypt all Internet traffic from and to device Current setup: Entra ID setup and sync with on-premise AD accounts These activities are done prod systems so credentials cannot be shared, all the work must be done using screen sharing tools like anydesk, teamviewer, rustdesk or similar (only screen sharing)

    $136 Average bid
    $136 Oferta promedio
    23 ofertas
    Remove Google Malware Warning
    4 días left
    Verificado

    My corporate site has just been labelled “dangerous” by Google with a specific malware warning, so customers are now greeted with a red-screen block. I need someone who has hands-on experience cleaning infected sites and getting that warning lifted fast. You will be expected to: • Identify every malicious script, file or database entry • Clean or replace the affected code without breaking any front-end or back-end functionality • Secure the server so the infection does not return (harden CMS, update plugins, patch vulnerabilities, tighten permissions, etc.) • Submit a successful reconsideration request in Google Search Console and show the site back in “No issues detected” status I will give you full hosting and Search Console access as ...

    $130 Average bid
    $130 Oferta promedio
    204 ofertas

    More details: Which specific areas do you need mentorship in? Configuration issues, Security policies, Traffic management What kind of configuration issues are you facing? This question was skipped by the user Which specific security policies do you need help with? This question was skipped by the user

    $85 Average bid
    $85 Oferta promedio
    6 ofertas

    We are a startup working on a highly confidential and private internal project. Due to the sensitive nature of this initiative, we require a highly experienced Cybersecurity Specialist with strong expertise in advanced security testing and simulation techniques. This is not a basic vulnerability scanning or standard assessment role. We need an expert capable of performing comprehensive, advanced-level security testing against robust environments while maintaining complete confidentiality. Project Duration: 2 to 3 months (possible extension based on project needs) Compensation: ₹3,00,000 per month (premium budget for the right expert with proven advanced skills) Key Requirements: 5+ years of hands-on experience in advanced cybersecurity testing and security operations Must hold advance...

    $1943 Average bid
    $1943 Oferta promedio
    5 ofertas

    I’m looking for an experienced ethical hacker who can also roll up their sleeves and work directly on the codebase. Your first priority will be to probe our existing applications and utilities for security weaknesses, then patch or refactor the vulnerable components yourself. You will work from user stories and specs that I provide, translating them into secure, efficient software. Day-to-day you’ll be analysing requirements, recommending upgrades, collaborating with the rest of the dev team, and documenting everything—from flowcharts and user guides to the exact remediation steps you take. Routine maintenance and performance tuning are part of the remit as well. A solid command of Java and Python is essential, and you should feel at home in relational databases lik...

    $454 Average bid
    $454 Oferta promedio
    98 ofertas

    أبحث عن مهندس أمن شبكات محترف (Senior) لديه خبرة عملية قوية، ليقدم تدريب فردي (1-on-1) عن بُعد عبر Zoom، بحيث يرافقني خطوة بخطوة في سيناريوهات واقعية على مستوى Enterprise، حتى أصل إلى مستوى احترافي في Palo Alto (مستوى PCNSE)، مع بناء أساس قوي في Routing بمستوى CCNP. مستواي الحالي CCNA مع خبرة عملية في الـ Firewall، لذلك لن نركز على الأساسيات النظرية، بل سنبدأ مباشرة بالتطبيق العملي. سيتم تنفيذ جميع الأعمال داخل بيئة EVE-NG، حيث نقوم ببناء Lab متكامل وتطويره تدريجيًا، بدءًا من تصميم بسيط (HQ / Branch / ISP)، وصولاً إلى بيئة Production كاملة تشمل Firewalls، Routing باستخدام BGP، VPN بأنواعه (IPSec و SSL)، بالإضافة إلى سيناريوهات Prisma Access. المحاور الرئيسية: إعدادات Palo Alto المتقدمة (Policies, NAT, Threat Prevention, Log Analysis) مهارات Troubleshooting بشكل متقدم، خصوصًا تحليل Pac...

    $427 Average bid
    $427 Oferta promedio
    11 ofertas
    Recover Hacked Facebook Account
    1 día left
    Verificado

    My personal profile was taken over: I can no longer log in, profile details were altered, the interface language switched, and friends have seen suspicious activity coming from the account. I exhausted Facebook’s self-service recovery steps and still have not reached a human at Meta, so this is my last resort. I need someone who truly understands Facebook’s security workflows, identity-verification channels, and escalation paths. Your mission is to pursue every legitimate option to restore my access. If that proves impossible, I expect a clear explanation of why, backed by evidence of each avenue you tried. Deliverables • Full restoration of the account, or • A concise report detailing all steps taken, Meta responses, and the definitive reason recovery fai...

    $147 Average bid
    $147 Oferta promedio
    8 ofertas

    I need an experienced security specialist to bring my Microsoft 365 Business Premium environment (fewer than ten users) into full alignment with ISO 27001. The key areas I'm looking to cover are: 1 Clear Desk & Clear Screen Policy 2 Acceptable Use Of IT Assest Policy 3 Procedure Of User Access Management 4 Procudure Of Third Party Security 5 Vulnerability Management Process 6 Password Policy 7 Management Review Process 8 Mobile Usage & Electronic Media Policy 9 Teleworking Policy 10 Archival, Retention and Disposal Policy 11 Data Protection Policy 12 Information Continuity and Application Security Measure 13 System Configuration Standard IT Procudure Documents 1 Approved Software List 2 Asset Inventory 3 Deploying Anti Virus for Desktop 4 Workstation End ...

    $206 Average bid
    $206 Oferta promedio
    26 ofertas

    I’m looking for a professional Network Security engineer (not just a trainer) to provide 1-on-1 coaching with a strong focus on real-world, hands-on experience. My goal is to reach an advanced level in Network Security, with a primary focus on Palo Alto (PCNSE level), supported by solid CCNP-level networking knowledge. My current level is intermediate (CCNA + firewall experience), and I’m not looking for basic theory. I want to strengthen my practical skills, especially in troubleshooting and real enterprise scenarios. The training must be hands-on using EVE-NG, building a full topology that grows over time (HQ, Branch, ISP, Firewall, VPN, etc.). Key focus areas: - Palo Alto advanced configuration (Policies, NAT, VPN, Threat Prevention, Logs) - Troubleshooting (this is crit...

    $1147 Average bid
    $1147 Oferta promedio
    12 ofertas

    I need an experienced security specialist to carry out a thorough review of our bank system’s defences, with the spotlight on the core database and the overall security architecture that surrounds it. This is not a simple camera-or-alarm health check; instead, I want the underlying structure, data flows, and access logic examined for weaknesses that could compromise customer information or interrupt critical services. Scope of work • Map the current database design, supporting servers, and connected services. • Perform vulnerability assessments and penetration tests against these elements, documenting every finding with clear evidence. • Evaluate encryption, key management, privileged-user policies, and change-management procedures to be sure they align with m...

    $1045 Average bid
    $1045 Oferta promedio
    12 ofertas

    I’m looking for an experienced ethical hacker or cybersecurity professional who can teach me the fundamentals and practical skills. Topics I want to cover: • Basics of cybersecurity & ethical hacking • How VPNs work (proper usage, limitations—not illegal use) • Online privacy & digital footprint protection • Network security fundamentals • OSINT (open-source intelligence) basics • Social media security & account protection • Understanding how attacks happen (phishing, etc.) and how to defend against them I prefer: • 1-on-1 sessions (Zoom/Google Meet) • Practical demonstrations + real-world examples • Step-by-step learning plan Goal: • Learn cybersecurity for personal knowledge and protection Pleas...

    $27 / hr Average bid
    $27 / hr Oferta promedio
    21 ofertas

    I need a an ethical hacker for pen testing and cyber security issues.

    $156 Average bid
    $156 Oferta promedio
    50 ofertas

    Artículos recomendados solo para ti