Seguridad Jobs
Security is a term used to describe the measures taken to protect data and systems from external threats. Security Engineers are professionals who have the expertise and skills to develop, secure and maintain systems and applications. They are essential for any business or organization that wants to protect their sensitive online information from any malicious attack or unauthorized access. Security Engineers are familiar with network architecture, firewall technology, cryptography, risk assessment and compliance procedures.
Here's some projects that our expert Security Engineers made real:
- Assured user identity authentication using cryptographic means
- Designed security protocols to understand and mitigate potential risks
- Implemented safe cloud computing solutions with robust authentication
- Developed secure authentication procedures for application development
- Carried out penetration tests on corporate networks in order to test its security
- Investigated security breaches and enabled threats resilience
- Installed virus removal software and provided reliable back up solutions
At Freelancer.com, you can find experienced Security Engineers who can help you protect your data, assess risks, and create secure systems. We have a wide range of experts who can meet your needs for security, governance and risk projects. Our Security Engineers have the knowledge, skills and experience that you need have a successful project. If you're looking for professionals who can deliver reliable security solutions, post your project on Freelancer.com today and hire a qualified Security Engineer!
De 25,602 opiniones, los clientes califican nuestro Security Engineers 4.91 de un total de 5 estrellas.Contratar a Security Engineers
Security is a term used to describe the measures taken to protect data and systems from external threats. Security Engineers are professionals who have the expertise and skills to develop, secure and maintain systems and applications. They are essential for any business or organization that wants to protect their sensitive online information from any malicious attack or unauthorized access. Security Engineers are familiar with network architecture, firewall technology, cryptography, risk assessment and compliance procedures.
Here's some projects that our expert Security Engineers made real:
- Assured user identity authentication using cryptographic means
- Designed security protocols to understand and mitigate potential risks
- Implemented safe cloud computing solutions with robust authentication
- Developed secure authentication procedures for application development
- Carried out penetration tests on corporate networks in order to test its security
- Investigated security breaches and enabled threats resilience
- Installed virus removal software and provided reliable back up solutions
At Freelancer.com, you can find experienced Security Engineers who can help you protect your data, assess risks, and create secure systems. We have a wide range of experts who can meet your needs for security, governance and risk projects. Our Security Engineers have the knowledge, skills and experience that you need have a successful project. If you're looking for professionals who can deliver reliable security solutions, post your project on Freelancer.com today and hire a qualified Security Engineer!
De 25,602 opiniones, los clientes califican nuestro Security Engineers 4.91 de un total de 5 estrellas.Contratar a Security Engineers
Implement secure workload identity for Kubernetes using SPIFFE/SPIRE. Deploy SPIRE Server and Agents, configure attestation, issue short-lived identities (SVIDs), and integrate with service-to-service authentication using mTLS. Package deployments using Helm charts for scalable and repeatable infrastructure.
I need an experienced systems professional who can take ownership of my production servers from the ground up. The job starts with a full audit of the existing Linux stack (Ubuntu 22.04 on AWS EC2), then moves into tightening every layer—optimising configuration, hardening services, and putting robust security controls in place. What matters most to me is confidence that the machines are patched, performance-tuned, and continuously protected. After the initial hardening you will set up real-time monitoring and alerting (Prometheus + Grafana is currently installed but not fully wired), document a clear maintenance schedule, and remain on hand for rapid incident response. Deliverables • Comprehensive audit report with recommended fixes • Implementation of agreed configu...
I need a concise, technically sound guide that shows forecourt operators in Europe exactly how to keep pulser tampering devices out of their fuel dispensers. The focus is on prevention rather than post-event detection, so the material should walk through proven countermeasures, hardware safeguards, software lock-outs, on-site inspection routines, and staff training practices that collectively shut down the main attack vectors. Scope • Explain how pulser manipulation is commonly attempted in European dispenser models (Gilbarco, Tokheim, Wayne, etc.) only as context for the preventive steps. • Lay out step-by-step prevention methods with references to real-world roll-outs in EU service stations where possible. • Highlight regulation or certification requirements that bols...
Saya ingin menambahkan fitur login baru berbasis media sosial pada aplikasi saya, dan pilihan saya jatuh pada Google Sign-In. Saat ini belum ada sistem autentikasi di aplikasi, jadi Anda akan membangun alur login ini dari nol. Apa yang saya butuhkan: • Tombol “Masuk dengan Google” yang mengikuti pedoman brand Google. • Implementasi OAuth 2.0 lengkap, termasuk penanganan token, refresh token, dan logout. • Pengambilan data profil dasar (nama, email, foto) dan penyimpanan aman di basis data kami. • Penanganan error yang jelas jika pengguna menolak izin atau koneksi gagal. • Dokumentasi singkat berisi langkah build, variabel lingkungan, dan cara menambah platform lain di masa depan (mis. Facebook atau LinkedIn). Teknologi backend kami fleks...
I'm looking for a skilled developer to create a USDT wallet management software. The software should be compatible with Windows and Linux platforms. Essential features include: - Secure multi-signature support - Comprehensive transaction history - User-friendly address book Ideal skills and experience: - Expertise in cryptocurrency wallet development - Proficiency in cross-platform software development - Strong security protocols and encryption knowledge Please provide examples of previous similar work.
I have an app developed using Base44 that requires checking by an experienced professional for errors and optimisations. Given the sensitivity of data being processed, would also appreciate someone to recommend security best practices. You’re welcome to continue using Base44 or whatever tool you prefer. Deliverables - Update to existing Base44 app with clean commented code - Implementation of security best practices to ensure data privacy - Brief changelog explaining key fixes and why they were made - Final pass showing the app running error-free after your updates If you’re comfortable navigating a medium-sized project and take pride in tidy code, I’d love your help.
I run several small-to-medium workloads on AWS Lightsail and I’m looking for ongoing, hands-on help keeping everything running smoothly. The instances all use Amazon Linux, so you should be comfortable in that environment and with the Lightsail console, CLI, and relevant AWS services that integrate with it. Here’s what I need from you: • Server setup – create, clone, or resize Lightsail instances as new projects come online, configure static IPs and DNS zones, and ensure automatic backups are in place. • Performance optimization – fine-tune instance plans, networking, and application-level settings so we squeeze maximum speed from the current footprint before scaling up. • Security configurations – harden Amazon Linux, manage SSH keys, set...
I run an online retail operation powered by CS-Cart and I need a reliable developer who can look after both the storefront and the dedicated server on a rolling, month-to-month basis. Each month you will be responsible for: • Updating and maintaining the website so the core, add-ons, and any custom code stay current and fully functional. • Managing and optimizing the server (we’re on a Linux stack) to keep load times low, monitor resources, and fine-tune performance settings as traffic fluctuates. • Handling security and bug fixes promptly—this includes applying CS-Cart patches, conducting routine vulnerability scans, and resolving any issues before they reach production. I expect one scheduled maintenance window every month, plus the flexibility to jump in...
Our five stores is on Magento 2.4.7-p1 and I need two things handled in one go. First, the PayPal module must be upgraded to the this release. Second, the site is suffering from a malware injection that calls out to lanhd6549tdhse.top. I need every trace of that removed—files, database entries, cron jobs, whatever is hiding it—followed by a clean security scan and basic hardening so it does not reappear.
My personal profile was taken over: I can no longer log in, profile details were altered, the interface language switched, and friends have seen suspicious activity coming from the account. I exhausted Facebook’s self-service recovery steps and still have not reached a human at Meta, so this is my last resort. I need someone who truly understands Facebook’s security workflows, identity-verification channels, and escalation paths. Your mission is to pursue every legitimate option to restore my access. If that proves impossible, I expect a clear explanation of why, backed by evidence of each avenue you tried. Deliverables • Full restoration of the account, or • A concise report detailing all steps taken, Meta responses, and the definitive reason recovery fai...
I’m ready to take my i-gaming operation to the next level with a full-scale casino aggregator engine and I need a developer or team that can deliver a production-ready platform from the ground up. Core scope The build must seamlessly pull in third-party casino content through robust game integration, manage players efficiently with a secure user management system, and handle deposits, withdrawals, and reconciliations via fault-tolerant payment processing. Beyond those essentials, I also require risk management controls to flag suspicious behaviour, clean and well-commented API documentation for future partners, effortless support for multiple domains, and a white-label-ready architecture. Everything has to respond beautifully on mobile as well as desktop. Key deliverables &bull...
I already have Proxmox VE 9 installed on an OVH dedicated box; I now need an experienced hand to bring the deployment to production-ready status. The job centres on three areas: • Storage – carve up the local disks into a resilient ZFS pool and document the exact pool layout and scrub schedule. • Networking – create a clean bridged setup with VLANs so that I can segment guests appropriately while keeping OVH’s network expectations intact (failover MACs, gateway handling, etc.). • Security – activate and tune Proxmox’s built-in firewall rules, lock down SSH, and ensure the web console is reachable only from my chosen WAN IPs or over Tailscale/another lightweight VPN. When the work is finished I expect a short, step-by-step write-up detailin...
I need an experienced security specialist to bring my Microsoft 365 Business Premium environment (fewer than ten users) into full alignment with ISO 27001. The key areas I'm looking to cover are: 1 Clear Desk & Clear Screen Policy 2 Acceptable Use Of IT Assest Policy 3 Procedure Of User Access Management 4 Procudure Of Third Party Security 5 Vulnerability Management Process 6 Password Policy 7 Management Review Process 8 Mobile Usage & Electronic Media Policy 9 Teleworking Policy 10 Archival, Retention and Disposal Policy 11 Data Protection Policy 12 Information Continuity and Application Security Measure 13 System Configuration Standard IT Procudure Documents 1 Approved Software List 2 Asset Inventory 3 Deploying Anti Virus for Desktop 4 Workstation End ...
我手上有一个具体的网页游戏站点,需要对它进行一次聚焦性的安全测试。目标是找出并复现「访问控制漏洞」,并最终提供一份可复用的脚本或小程序,帮助我在之后的版本中快速验证漏洞是否仍然存在。 重点说明 1. 站点类型:网页游戏。 2. 漏洞方向:我最关心的是访问控制层面的缺陷。 3. 其他说明:提问时我把“特定游戏网站”写在了漏洞类型一栏——请以此理解为“目标已锁定的单一站点”。 交付物 • 渗透测试步骤与发现过程的技术报告(含关键截图、复测方法)。 • 可执行的 PoC 脚本 / 程序,要求: – 一键运行即可验证漏洞是否存在; – 控制台输出清晰,必要时附使用说明。 合作须知 • 所有测试必须在我授权的演示环境中进行,严禁对正式生产环境造成干扰。 • 请在开始前与我确认测试窗口与目标域名。 • 代码可用 Python、Go 或您擅长的语言编写,只要依赖简单、易复现即可。 如果你在网页游戏安全、访问控制绕过或自动化 PoC 编写方面有成熟经验,就联系我讨论更多细节。
I want to move our small team fully onto Microsoft 365 and need someone who can take the lead from day one. The job starts with building a clean tenant, creating user accounts and mailboxes, and then configuring both SharePoint and OneDrive so our files are organised and permissions make sense. Security is just as important. I expect: • Regular, automated backups of mail, SharePoint and OneDrive content • Multi-Factor Authentication enforced across every account • Solid threat-detection and response policies tuned for Microsoft 365 Once everything is live, I’ll rely on you for ongoing remote support—solving device or account issues, troubleshooting connectivity, rolling out small changes and generally keeping the environment healthy. Quick, clear comm...
I need a seasoned security professional who can step in at a moment’s notice to keep our Netskope and Check Point estate running flawlessly. The immediate priority is true on-demand technical support: when an alert spikes, a policy breaks, or a new SaaS application appears, I want to know you can connect, troubleshoot, and restore full protection without delay. Most of the work centers on the Netskope CASB/SWG stack and perimeter firewalls running Gaia OS. You should be comfortable tracing traffic through both platforms, fine-tuning policies, fixing rule-base anomalies, and explaining the changes you make so my in-house team stays in the loop. Experience with broader cloud security architectures is a plus; it often helps when integrations with Azure AD or AWS accounts start acting u...
I need an experienced security specialist to carry out a thorough review of our bank system’s defences, with the spotlight on the core database and the overall security architecture that surrounds it. This is not a simple camera-or-alarm health check; instead, I want the underlying structure, data flows, and access logic examined for weaknesses that could compromise customer information or interrupt critical services. Scope of work • Map the current database design, supporting servers, and connected services. • Perform vulnerability assessments and penetration tests against these elements, documenting every finding with clear evidence. • Evaluate encryption, key management, privileged-user policies, and change-management procedures to be sure they align with m...
My existing site is pure custom HTML, CSS, and vanilla JavaScript. I now need an add-on, self-contained contest area that will run every four months and then reset itself for the next round. Core features • User flow: email-and-password sign-up, automatic registration-fee payment (gateway is flexible—happy to hear whether PayPal, Stripe, or another reliable option fits best), and an upload panel limited to four photos plus one short video per entrant. • Admin console: full CRUD over user accounts and all uploaded media, plus a single-click purge that clears entries and user records at the end of each contest cycle. • Public gallery: a responsive thumbnail grid that shows every submitted video; clicking a thumb should launch the clip in a lightbox or similar over...
We are running a fast-growing WooCommerce-based bookstore () with a large catalog (100000+ products) and high growth targets. Our infrastructure is already upgraded to a high-performance setup, and we are looking for an experienced DevOps + WooCommerce performance expert to manage, optimize, and maintain the system. Current Infrastructure: Bare Metal Dedicated Server 32 Core CPU 128 GB RAM 2 TB SSD (RAID-1) Separate Servers: Redis Server (8 Core, 16 GB RAM) Typesense Server (8 Core, 16 GB RAM) CDN: Multi-location CDN with active sync Image optimization enabled Scope of Work: Server Management & Monitoring Monitor uptime, CPU, RAM usage Handle crashes, downtime, and scaling issues Optimize Nginx/Apache, PHP, MySQL WooCommerce Performance Optimization Speed optimization (target: <2 se...
Summary I am building an SEO-driven education discovery platform that helps students find and compare university programs across 30 countries. It will generate leads for my existing education consultancy business. This is not a brochure website. It is a data-heavy, search-first product with monetization tiers and payment integration. Please visit (reference website) to understand the project before applying. What Already Exists 100,000 programs across 1,000 universities in 30 countries – structured Excel data ready for migration. ------------------------------------------------------------ Core Features Required: - 1. Search & Discovery: - Filtered search – country, degree level, fees, duration, intake month. (Suggest a search engine similar to Elasticsearch) - All filt...
Artículos recomendados solo para ti
How user testing can make your product great
Get your product into the hands of test users and you'll walk away with valuable insights that could make the difference between success and failure.