Save this Search
     

All JobsSecurity Engineer

 (97 results)  
Sort by:
  • Posted Date
Results for 'Security Engineer'
Fixed Price: $500 - $1,000   |  Posted: 7h, 10m ago  |  Ends: 14d, 16h  |   1 Proposal
Implementing type1/type 2 hypervisor environment and stimulate an attacks in VM environment. 1. A well design/diagram 2. A well implemented/implementation of a multi tenancy environment (bear metal or hosted) 3. Testing /stimulating an attack eg, side channel attacks, vm escape, or any possible attacks in vm environment 4. A well documented and screenshots of implementation including screenshots of all attacks successful/unsuccessful. 5. implementing IDS if possible to monitor the server environment for attacks 5 analyses Maximum of 40 pages AND Maximum of 2 weeks.
Category: Networking & Security       

p****ura
 [?]
Sign in to view client's details.
| p****ura
|    Belgium
Fixed Price: Not Sure   |  Posted: 8h, 30m ago  |  Ends: 15h, 29m  |   16 Proposals
Seeking a developer or group of developers to improve, modernize, and re-do   [obscured]   (also   [obscured]  ) Must be 1. tagged and SEO optimized 2. integrated with PayPal and Amazon Pay 3. mobile-optimized 4. easy to update 5. secure I am not particular to any language or method
Category: Website Design       

a****mp1
 [?]
Sign in to view client's details.
| a****mp1
|    United States
Hourly Rate: More than $50 / hr   |  Duration: Not Sure  |  Posted: 10h, 7m ago  |  Ends: 14d, 13h  |   1 Proposal
Senior noSQL Engineer/Administrator LOS ANGELES, CA Direct Hire We're recruiting for a skilled Sr. noSQL Engineer/Administrator to join the team! Candidates for this position should have a good understanding of noSQL database concepts and technologies in general. They should have significant experience with UNIX/Linux systems, administering various noSQL stores such as MongoDB, Cassandra, Redis, Voldemort, etc. RESPONSIBILITIES: Manage overall noSQL solution and lead centre of excellence for noSQL databases Install and configure new noSQL solutions based on best practices Perform day to day NoSQL database administration on existing databases including implementing patches and upgrades as needed Work with development team in optimizing usage and upgrading client libraries Participate as a member of the engineering teams for database-related tasks Develop, test, and implement the appropriate backup procedures Des...
Category: Software Application       
Skills: NoSQL       

a****w68
 [?]
Sign in to view client's details.
| a****w68
|    India
Hourly Rate: Not Sure   |  Duration: 1-3 months  |  Posted: 15h, 54m ago  |  Ends: 14d, 8h  |   0 Proposals
My client is looking for IT support engineers for customers in the telecommunications industry. Your Tasks: ? responsibility for design, development and advancement of Cisco network infrastructure and network security in LAN and WAN environments ? Support activities and problem solving at the second level ? advice and support of our faculties to all aspects of operational business, including Scaling, performance and network security ? Acquisition of IT projects to continuously improve the existing IT infrastructures ? Contact and support of external service providers Your Profile: ? Experience as a system administrator or network engineer in the design and operation of networks, VPNs ? Technology experience in the field of Cisco and Checkpoint / WatchGuard ? A Cisco CCNP or CCIE certification is a plus ? Experience in the management and implementation of complex IT projects with desirable external providers ? Good command of German and English, spoken and written Project details: Lo...
Category: Technical Support       
Skills: Cisco, Network Security       
Preferred Location: Germany

M****a81
 [?]
Sign in to view client's details.
| M****a81
|    United Kingdom
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: 16h, 5m ago  |  Ends: 14d, 7h  |   47 Proposals
Company Description: Hello! We are a boutique web design and online marketing company. We cater to corporate clients and consider ourselves to be more than just the services we provide. Character, Integrity and Personality is our mantra! We are fun to work with and love collaborating with great people! Summary: Responsible for improving a company's organic search results. Creates and launches SEO campaigns, identifies areas of improvement, runs PPC campaigns, and attempts to improve the clients' sites' rankings in major search engines. Primary responsibilities: - Review and analyze client sites for areas that need to improved, deleted, or revised. - Prepare detailed strategy reports. - Identify the least expensive but most powerful and profitable keywords for client sites. - Run pay-per-click campaigns. - Improve a company's organic search results. - Write effective headlines, body copy, and websites. - Ensure websites are filled with optimal keywords. - Place keywords appropriate...
Category: Search Engine Marketing       

d****777
 [?]
Sign in to view client's details.
| d****777
|    Canada
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: 19h, 44m ago  |  Ends: 14d, 4h  |   1 Proposal
I am looking for someone that understands an HSS - how it works and what the FRAUD and HACKING RISKS ARE For an HSS. Experience or information about the risk to a WIRED HSS (Cable, DSL, Fiber) and a WIRELESS HSS (LTE) would be best. The presetnation i am looking for has this basic outline> 1. WHat is an HSS 2. What is the purpose 3. How does it fit into a wired - NGN network architecture 4. How does it fit into a wireless - 4G LTE architecture 5. What are the legitimate fraud risks to be considered 6. How can these risks be detected? 7. How can these risks be prevented ? If you have any knowledge or experience, let us know. We need this info fast.
Category: Networking & Security       

r****son
 [?]
Sign in to view client's details.
| r****son
|    United States
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: 19h, 49m ago  |  Ends: 14d, 4h  |   1 Proposal
I am looking for someone with experience converting an HLR to HSS. I need a brief presentation (45 minutes) that covers the following outline: 1. WHat is an HLR 2. WHat is an HSS 3. Why do a conversion 4. WHat are the major issues with an HLR to HSS Conversion 5. WHat are the practical problems and challenges faced 6. How long does it take 7. What can go wrong 8. How do you verify that it was done properly If you have some experience or background let us know. WE need the presenttion and info quickly (In less than 1 week). thanks
Category: Networking & Security       

r****son
 [?]
Sign in to view client's details.
| r****son
|    United States
Fixed Price: $500 - $1,000   |  Posted: Aug 03, 2015  |  Ends: 13d, 19h  |   4 Proposals
Required: individual or group of networking and security professionals to perform penetration testing and breach simulation of network based on a young implementation of Oracle PeopleSoft HRMS. Job Description: We're looking for a network & security professional to run some penetration tests on a fresh implementation of Oracle PeopleSoft HRMS. The network consists of 1 server running WebLogic on Apache server which is accessible via WWW. Physical access is not required. Your responsibilities: - Analyze network for vulnerabilities and exploitable threats - Identify possible entry-points to this server and demonstrate undetected proof-of-concept penetration - Test social engineering attacks on key individuals for this purposes (to be discussed) - Make recommendations for improving infrastructure based on findings Your qualifications: - Experience with Oracle PeopleSoft or similar WebLogic systems (preferred but not required) - Networking & Security certifications or ...
Category: Networking & Security       

a****tic
 [?]
Sign in to view client's details.
| a****tic
|    Pakistan
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Aug 03, 2015  |  Ends: 13d, 18h  |   3 Proposals
Requirements: The candidate will integrate software developed internally and by other developers into a layered software architecture within a managed software baseline. The candidate will plan and oversee the development of software, hardware, network, security, and database systems to customer specifications with minimal supervision. The candidate may lead teams of 3 or 4 software engineers. The candidate will interact with Government customers as well as representatives of other software development contractors. Responsibilities: The candidate will develop new features, and diagnose and fix software defects for a large-scale distributed application. Duties involve inspecting delivered software for interface compliance, assessing integration effort required, making recommendations to the customer, and integrating software into the managed software baseline. The candidate will execute UML design and documentation, Java coding and testing, support for integration and testing, managin...
Category: Software Application       

z****030
 [?]
Sign in to view client's details.
| z****030
|    United States
Fixed Price: About $20   |  Posted: Aug 03, 2015  |  Ends: 13d, 17h  |   3 Proposals
we have a website and want some one to place hard core security measures for the login and secure area of the website
Category: Networking & Security       

a****oup
 [?]
Sign in to view client's details.
| a****oup *
|    United Kingdom
Hourly Rate: $40 - $50 / hr   |  Duration: 1-2 weeks  |  Posted: Aug 03, 2015  |  Ends: 13d, 17h  |   12 Proposals
we have a need for ssl vpn configurations on a cisco asa 5512 model. we are having an issue with how our gateways are configured for our existing ipsec vpn tunnels and we want to overlay an additional capability to do ssl vpn for some of our remote workers. beyond this we have about 12 spokes running off our 5512 to remote sites. we want to configure spoke to spoke routing from the core.
Category: Networking & Security       
Skills: Cisco, Security Engineering, VPN       

j****rav
 [?]
Sign in to view client's details.
| j****rav *
|    United States
Hourly Rate: More than $50 / hr   |  Duration: Not Sure  |  Posted: Aug 03, 2015  |  Ends: 13d, 13h  |   9 Proposals
I have IT company in Los Angeles area and need engineer who is extremely good at HyperV, Vmware, SAN's, etc. Currently have client that is down. Need IT person who is local in Los Angeles and can go onsite to work with customers.
Category: Networking & Security       

C****015
 [?]
Sign in to view client's details.
| C****015
|    United States
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Aug 02, 2015  |  Ends: 27d, 23h  |   2 Proposals
Blow our minds and design a Sparx Smart System for Pets! Imagine that you are on your way home and you want to adjust the temperature before you get home or turn on the lights or feed your dog, make coffee, play music or unlock your garage door. You reach for your smart phone, open a SparxSmart app and you do your smart thing. Or imagine that you go on vacation and realize that you forgot to turn off the AC (like me). You simply reach for your smart phone, click and voila! You've just saved yourself $200 and also saved the environment from adding redundant carbon emissions. Now, imagine the future - your house learns from you what you like and so when you arrive home, it greets you and adjusts your living space, just the way you like it. Once integrated in our daily lives, Sparx Smart offers convenience, security, energy saving and intelligence. Our spaces of the future will be responsive, adjustable, dynamic and will evolve, wherever we are. Say hello to Sparx, Say hello to the F...
Category: Product Design       

A****QLD
 [?]
Sign in to view client's details.
| A****QLD
|    China
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Aug 02, 2015  |  Ends: 12d, 21h  |   16 Proposals
Hi, I need to check security of my website already hacked and fix all vulnerabilities to prevent eventual attacks
Category: Networking & Security       

m****r47
 [?]
Sign in to view client's details.
| m****r47
|    France
Hourly Rate: Less than $10 / hr   |  Duration: Not Sure  |  Posted: Aug 02, 2015  |  Ends: 12d, 20h  |   4 Proposals
Information Operations is a category of direct and indirect support operations for the United States Military. By definition in Joint Publication 3-13, "IO are described as the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own."[1] Information Operations (IO) are actions taken to affect adversary information and information systems while defending one's own information and information systems. or rumors deliberately spread widely to influence opinions.[1]
Category: Contract Manufacturing       
Skills: Processing       

o****ssa
 [?]
Sign in to view client's details.
| o****ssa
|    Algeria
Fixed Price: $450 or less   |  Posted: Aug 02, 2015  |  Ends: 12d, 13h  |   4 Proposals
The work consists of a small test or exam to test the skills of the employee. in the area of computer security and skills to develop solutions to work on solutions that will offer long term if you are selected, and pass our test
Category: Networking & Security       

C****900
 [?]
Sign in to view client's details.
| C****900
|    Honduras
Fixed Price: Less than $500   |  Posted: Aug 02, 2015  |  Ends: 12d, 9h  |   15 Proposals
I'm looking for someone to help me develop a visual prototype (and subsequently a physical prototype) for a bicycle security product. This product needs to be light weight, durable, aesthetically pleasing and secure. Once I have selected the most suitable designer I can provide more information about the product, under NDA. The prototype will be used to assess manufacturing costs and product potential.
Category: Product Design       

d****rez
 [?]
Sign in to view client's details.
| d****rez
|    United Kingdom
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Aug 01, 2015  |  Ends: 11d, 18h  |   1 Proposal
need to test the skills to make some changes to a website i own. I want to make some modifications into a .cgi proxy and javascript knowledge is also required. Only very high advanced skills AS for beginners or average it will be only time loss and it will not be able to solve the task as is complicated so stay away. ONLY EXPERTS PLEASE! Also I need full time job for this tasks as I am in a rush.
Category: Networking & Security       

b****t11
 [?]
Sign in to view client's details.
| b****t11
|    Norway
Fixed Price: Not Sure   |  Posted: Aug 01, 2015  |  Ends: 26d, 17h  |   5 Proposals
I am seeking an experienced Computer security, academic researcher and writer for a PhD. level literature for a theoretical model topic that I will provide and discuss with the selected provider at a later stage. I will provide the topic and a general outline for you to construct in proper Harvard citations. Articles will be provided, however I would expect that the selected provider has access to the latest reviewed U.S. and U.K. journals so that all the documents are up to date. English should be to be really good or your native language and I would prefer to hire an applicant who has their Masters and/or Ph.D. Computer Engineering. Note that I am looking for someone that can write very well and in a clear and concise way. Preference will given to applicants that have can provide evidence of published journal for which they are listed as authors or who are heavily involved in academic research. This is going to be on a monthly basis for one year this is not a one time job. Also not...
Category: Academic Writing       

x****M7x
 [?]
Sign in to view client's details.
| x****M7x
|    United Arab Emirates
Fixed Price: $40 - $100   |  Posted: Jul 31, 2015  |  Ends: 10d, 12h  |   13 Proposals
our site has malware issue reported on google webmaster tools need someone to clean it up immediately
Category: Networking & Security       
Preferred Location: North America, Western Europe, Eastern Europe

h****eme
 [?]
Sign in to view client's details.
| h****eme
|    United States
Hourly Rate: $20 - $30 / hr   |  Duration: 4-6 months  |  Posted: Jul 31, 2015  |  Ends: 25d, 12h  |   3 Proposals
Long term contract ? remote work for US Citizens only. Please send your updates resume and desired hourly rate if interested. Thanks! Security Consultant Security professional with significant previous consulting or contract experience In depth knowledge of network and web application security In depth knowledge of Next-Generation / Unified Threat Management (UTM) type firewalls such as Palo Alto, WatchGuard, SonicWALL, and Cisco. Experience with security tools such as Metasploit, Burp Proxy, NMAP, Nessus, Kali Linux, PowerShell scripts, and LanSweeper toolsets used in the context of internal and external security assessments 5+ years implementing, securing, and troubleshooting Firewalls, proxy servers, and other network security devices 5+ years' experience performing security assessments including network vulnerability assessments, penetration testing, web application assessments, wireless vulnerability assessments In depth ...
Category: Networking & Security       
Preferred Location: North America

J****014
 [?]
Sign in to view client's details.
| J****014
|    United States
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Jul 31, 2015  |  Ends: 10d, 10h  |   33 Proposals
Gradient Labs develops advanced applications using web technologies and iOS. All of these are backed by Amazon Web Services. Our engineering operation is getting more complex as various applications need to scale and we develop new applications. We seek a part-time senior engineer with significant DevOps experience, excellent architectural and documentation skills (we would like to review sample system architecture diagrams), and demonstrated skill designing and implementing scalable AWS-backed services. Requirements: - Continuous testing and deployment for complex clustered apps - Proficiency with docker and CoreOS/fleet/etcd - Expert AWS knowledge - Experience with high load/scale and troubleshooting outages and erratic server behaviours - Deep grasp of Linux, especially Debian-based distros (we use Ubuntu containers) - Excellent knowledge of shell scripting - Understanding of git fundamentals and working knowledge of using feature branches and GitHub - Administration and customizat...
Category: System Administration       

g****abs
 [?]
Sign in to view client's details.
| g****abs
|    United States
Fixed Price: $20 - $100   |  Posted: Jul 30, 2015  |  Ends: 10d, 0h  |   5 Proposals
Hi, I need an experienced professional in Computer forensics who can complete two assignment (study) within a specific time. Willing to pay $$. FTK and EnCase experience needed. Serious professional only please
Category: Networking & Security       
Skills: PHP, Security Analysis, Security Engineering       

r****a87
 [?]
Sign in to view client's details.
| r****a87
|    United States
Symbol Key
Payment method not yet verified
Payment verified
Purchased $1-$500
Purchased $500-$5,000
Purchased more than $5,000
You have already submitted a
proposal to this job