Save this Search
     

All JobsSecurity Engineer

 (101 results)  
Sort by:
  • Posted Date
Results for 'Security Engineer'
Fixed Price: $550 - $720   |  Posted: Aug 19, 2015  |  Ends: 1d, 3h  |   34 Proposals
We need a bespoke website for a new business. The website should be a responsive (where the server always sends the same HTML code to all devices and CSS is used to alter the rendering of the page on the device. The design should be awesome with modern 'look and feel'. The development team should be highly skilled in PHP and have experience responsive design layout. The website should be built in PHP using Bootstrap frameworks. The admin panel should be user friendly. As the website should comply with Google guidelines, The development team should refer necessary guides available online. Skills: PHP, MySQL, Bootstrap Framework, HTML 5 CSS3, JavaScript Types of Users - Customers - Admin Website Pages Home, Why Us, Services (including sub-pages: Domestic Cleaning, End of Tenancy Cleaning, Public Sector Cleaning, After Event Cleaning), Book Online, Quality, FAQ, Blog, Contact Us. Footer page: Careers, Locations, Terms & Conditions, Privacy Policy. Admin Panel - Sup...
Category: Web Programming       
Skills: MySQL Administration, HTML, PHP       

b****ost
 [?]
Sign in to view client's details.
| b****ost
|    United Kingdom
Fixed Price: Less than $500   |  Posted: Aug 18, 2015  |  Ends: 7h, 48m  |   6 Proposals
Find technical contacts (see below title examples) that use re-captcha or other captcha tools using Builtwith.com Go to builtwith.com and type in re-captcha tools and see what companies come back - include companies that are less than Alexa 20,000 - then find the corresponding emails to each company - 2 people from each company See an example below of a good search result:   [obscured]  /websitelist/reCAPTCHA We are looking to start with about 2500-3000 contacts (business emails and phone numbers) and then if the work is good, move forward with a bigger list. How long do you expect the first list of 3k to take? Technical positions: Head of Information Technology | CIO | Chief Product Officer | Owner | Director/VP Information Systems | VP/Director/Manager DevOps | CISO | VP/Director/Manager IT Security | IT Security Engineer | any IT title with "Security" in the title
Category: Data Entry       
Skills: Data Entry       

k****fer
 [?]
Sign in to view client's details.
| k****fer
|    United States
Fixed Price: Less than $500   |  Posted: Aug 18, 2015  |  Ends: 4h, 16m  |   6 Proposals
We are a Chinese company focus on design and manufacture high performance GPS tracking devices, professional 3G mobile DVR system and also provide solutions with free Web based monitoring software. We're looking for a Blogger or copywriter to create keyword-rich content to keep our audience engaged and get more traffic from search engines. Your responsibilities: - Develop content themes based on the direction and creative brief provided by our team - Write original, high-quality, SEO-friendly articles that communicate our messaging to a wide variety of audiences. - Each post should be 500-1000 words, and with photos, videos or other social medias elements. - Working experience or similar projects in security and surveillance industry will be a plus. - Contribute ideas on improving existing messaging and content Your qualifications: - Excellent writing, grammar, spelling and formatting - Strong communication skills - An exceptional portfolio that demonstrates an ability to c...
Category: Copywriting       

B****ser
 [?]
Sign in to view client's details.
| B****ser
|    China
Fixed Price: $1,000 - $5,000   |  Posted: Aug 11, 2015  |  Ends: 2d, 1h  |   10 Proposals
Hi All, We are looking for a professional network/database security expert to carry out testing on our systems to ensure they are as secure as possible. The successful candidate will be able to demonstrate the following: The ability to run sophisticated attacks against client side applications. Use fuzzers and dynamic analysis to discover vulnerabilities. Have the capability to reverse engineer binaries to find new vulnerabilities never discovered before. Exploit secured web applications. Run chained exploits to pivot from multiple exploitable systems. Attack and defeat VPNs, IDS/IPS and other security technologies. Demonstrate data capture techniques. Highly regarded skills include: Experience with at least one commercial relational database (RDBMS) platform such as Oracle, Microsoft SQL, or IBM DB/2. Familiarity with NoSQL databases. Experience with Cassandra, and proficiency in C++ Proficiency in Shell scripting (Bash, Awk, etc) Experience writing production level P...
Category: Networking & Security       

B****Tay
 [?]
Sign in to view client's details.
| B****Tay
|    Australia
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Aug 11, 2015  |  Ends: 37d, 23h  |   7 Proposals
Responsible for: - Assisting in the maintenance and monitoring of keyword bids, account daily and monthly budget caps, in tune with industry know how, optimization, quality score and other important account metrics. - Managing and maintaining updates for large keyword lists. - Providing creative copy suggestions. - Assisting in the management of display network placement lists on AdWords and through other contextual advertising platforms. - Providing recommendations and execute strategies for keyword opportunities, campaign structuring, targeting, display network, and other facets of paid search in accordance with client goals. - Providing support with the generation new paid search campaigns, ad groups, and accounts and aid in the creation of new paid search marketing initiatives. - Helping with media planning and buying. - Liaise with publishers, plan and strategize media schedules. - Generating tags for publishers via 3rd party tracking tools. - Troubleshooting creatives and tags i...
Category: Search Engine Marketing       

o****ent
 [?]
Sign in to view client's details.
| o****ent *
|    Australia
Hourly Rate: $20 - $30 / hr   |  Duration: 1-2 weeks  |  Posted: Aug 11, 2015  |  Ends: 3d, 20h  |   4 Proposals
We have a misconfiguration with our Kazoo softswitch. We believe our issue may relate to our SSL Cert, AVP or SAVP when using SRTP. We have tested our Erlang OpenSource VoIP Softswitch with two popular soft phone clients. On Zoiper the issue is that we can not receive inbound connections from our Kazoo switch to our soft phone client. The soft phone sometimes rings a half ring but normal shows no signs of incoming calls. The caller is almost always instant sent to voicemail(Voicemail Works). This happens from both off net and on net incoming calls. Incoming works fine when SRTP is disabled. On client registration we sometimes get an SSL Cert Mismatch security error from our wildcard cert. We tried giving our primary kazoo server an individual domain SSL Cert but still receive occasional mismatch errors. On CSipSimple client we are able to receive notification of inbound calls. The soft phone can answer inbound calls and kazoo will receive a confirmation of call connection. However neit...
Category: Other IT & Programming       

a****2go
 [?]
Sign in to view client's details.
| a****2go
|    United States
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Aug 09, 2015  |  Ends: 66d, 6h  |   5 Proposals
An important differential: The sensor will operate as (keychain/device) alarm for vehicles, in other words, each keychain has a unique identification. A keychain vehicle alarm does not trigger another car alarm. Features of this sensor: Through the computer in the security cabin, This sensor will trigger the opening and closing of garage gate. At the same time... The computer will open the window of the security camera, will emit a sound signal, will open a small window showing the registration of owner of vehicle that are entering or exiting the garage. Automation: The car owner who has this sensor-receiver... He will have two devices: A keychain and a device installed in the car (both sensors-receivers). In the security cabin... There will be a sensor - transmitter connected to the computer. And the computer, besides beeps (show the data of the owner/show gate camera)... the computer will also open/close the gate. Both to open and close the garage door; will be automatic... In othe...
Category: Electrical       
Skills: Electrical Engineering, Electronics       

c****uiz
 [?]
Sign in to view client's details.
| c****uiz
|    Brazil
Fixed Price: Not Sure   |  Posted: Jul 30, 2015  |  Ends: 56d, 7h  |   2 Proposals
Equipment: DJI Phantom 3 I have the root and password access, but I cannot find out how to access the equipment. There is a USB port going to a miniUSB that connects to the equipment, but on Windows is detecting the connection as being a Serial Port (COM3). I need some help in order to gain access to the file system from my equipment, as with regards to the access itself, I have it all (root & passwords). I have used PUTTY for Windows through the Serial connection option, and a program called "Serial" for MAC, but I am not managing to get it properly connected. I know I am doing something wrong or incorrectly, but I just don't know what and how to do it correctly. Can anyone please help me getting access to it? I own a Windows PC and a MAC, shall any of them two be easier than the other. Kind regards,
Category: Networking & Security       

n****3ga
 [?]
Sign in to view client's details.
| n****3ga
|    Austria
Fixed Price: Not Sure   |  Posted: Jul 28, 2015  |  Ends: 54d, 7h  |   13 Proposals
Need someone who is able of eliminating spam so that it does not reach our company Outlook inboxes. Right now, the majority of email in inboxes is spam. Deliverable: eliminating 99% or more of spam from reaching inbox sustained for at least 30 days without displacing legitimate emails intended for the inbox. Server is Unix/Linux. We have our own webhosting domain server that handles company email. We do not use Exchange Server. update: 1. would you solution entail purchasing any software, services, or hardware? If so, please tell me the cost of those items so that I may factor it into my decision to hire you. 2. I would want to stay with my existing hosting company. I would require that your solution would have to work with my existing hosting company where I have a virtual private server. Thank you.
Category: Networking & Security       

P****y88
 [?]
Sign in to view client's details.
| P****y88
|    United States
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Jul 22, 2015  |  Ends: 28d, 3h  |   32 Proposals
Job Profile We are looking for the system Admin who is available to work in the India working hours. The provider should be well versed with the Windows and Linux system environment and should have an eye to automate the existing manual process. Automation of the manual process is the key success parameter of this engagement. This is a long term opportunity and we are looking for a reliable company having good reputation on Elance. Qualification / Skills: Bachelor degree, with a technical major, or computer science. Systems Administration/System Engineer certification in Linux and Microsoft. Four to six years system administration experience. Solid working knowledge of VMs setup and configuration. Excellent knowledge of network management. Awarding of this project is contingent upon, freelancer agreeing with out non disclosure and IT security agreement. Thanks
Category: System Administration       

O****ixs
 [?]
Sign in to view client's details.
| O****ixs
|    United States
Fixed Price: Not Sure   |  Posted: Jul 16, 2015  |  Ends: 41d, 22h  |   4 Proposals
1 responsible for the daily maintenance and technical support of IDC server, switch, firewall, etc.; 2 on the equipment to do the upper and lower frame, configuration change, link debugging, etc.; 3 IDC operation equipment for daily inspection, security and other work; 4 responsible for the computer room continuously optimized and improved, and the problem of the potential of the IDC engine room network and server; 5 responsible for communication with the operators, and solve the related problems. Qualification requirements: 1 computer and other related professional (or IT training institutions of the outstanding students can also be considered). 2 familiar with all kinds of computer software and hardware, can be independent of the installation, commissioning and troubleshooting; 3 familiar with LAN maintenance and network security knowledge, can be skilled in the construction of local area network and network equipment maintenance and troubleshooting; 4 skilled use of LINUX/WINDOWS200...
Category: System Administration       

j****hui
 [?]
Sign in to view client's details.
| j****hui
|    Philippines
Hourly Rate: More than $50 / hr   |  Duration: Not Sure  |  Posted: Jul 13, 2015  |  Ends: 39d, 3h  |   5 Proposals
We have a set of jar files that has an algorithm that has been implemented in Java , we intend to use that jar files in Tomcat Server and also in Android application as well. We want to safe guard that Java code and java class files from decompiling or reverse engineering . We looking for very experienced java programmers to propose the solutions that will make the class files extremely safe and hack proof . Budget is not a constrain for the right person / solution . Please provide references of the past related experience.
Category: Software Application       
Skills: Java       

A****tya
 [?]
Sign in to view client's details.
| A****tya
|    India
Hourly Rate: $20 - $30 / hr   |  Duration: Not Sure  |  Posted: Jul 10, 2015  |  Ends: 36d, 3h  |   7 Proposals
Bosco Home Services is looking for someone local to Mississauga or Greater Toronto Area that can visit on site quarterly to maintain our current networking as a whole. This would include all 20+ workstations: - are protected from spyware, virus, and any unwanted programs - have all the same software loaded and running properly on all stations - occasionally add new workstations Entry level networking: We use Microsoft 360 Email and run the latest Exchange Server Software
Category: Networking & Security       
Preferred Location: Canada

R****Toe
 [?]
Sign in to view client's details.
| R****Toe
|    Canada
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Jul 03, 2015  |  Ends: 28d, 23h  |   60 Proposals
Do you develop and execute SEO strategies for increasing site traffic through organic search listings using white hat SEO tactics? If you answered "Yes", then there is a long-term project that's perfect for you: We need specialists applying results-focused strategies to fuel SEO strategies and generate leads. The project is to: 1. Manage SEO campaigns, including selecting target keywords, generate on-page and off-page recommendations, review code and designs, grow authority through link building and increase digital marketing generated leads. 2. Monitor webmaster tools data for crawl issues and opportunities, implement different strategies such as rich snippets, no-follow and canonical tags, video ranking and content improvements to secure the desired organic search positions. You must have proven success in SEO strategy development and execution. When bidding, provide samples of previous successful campaign and strategies that directly relate to how you are going to ...
Category: Search Engine...       
Skills: Internet Marketing, Lead Generation       

V****LLC
 [?]
Sign in to view client's details.
| V****LLC
|    United States
Fixed Price: Not Sure   |  Posted: Jul 02, 2015  |  Ends: 28d, 7h  |   13 Proposals
POSITION PURPOSE: The incumbent will report to the Head of Technical Department; and will manage the Network Services (NS) The job is a permanent position in Gambia West Africa. This young dynamic company will provide salary accommodation, expenses and travel to your home country once a year section responsible for all aspects of the Network Resources and related Services. CHARACTERISTIC DUTIES AND RESPONSIBILITIES: The following represents the characteristic duties and responsibilities to be carried out by the successful candidate: ? Assumes responsible for the uptime, maintenance, expansion, security and optimal performance of the Local Area Network (LAN) and Wide Area Network (WAN) ? Assumes responsible for the design/update and preparation of logical diagrams and related documentation for the existing and planned corporate and backbone network infrastructure, access points, devices, and nodes ? Assumes responsible for design, configuration, implementation and support of network ...
Category: Networking & Security       
Preferred Location: India/Southern Asia, Eastern Asia, Africa

S****ell
 [?]
Sign in to view client's details.
| S****ell
Fixed Price: Not Sure   |  Posted: Jul 02, 2015  |  Ends: 28d, 4h  |   6 Proposals
Sysomos is a world leader in social intelligence, offering a suite of powerful products that help companies measure and articulate social media success, harness the power of community and influencers, and find the conversations and topics online that matter most to their business. With nearly 2,000 customers and four offices worldwide, Sysomos gives businesses the power to end irrelevance and equip today's social customer with the information, products, and services they need, in real-time. Join one of the most dynamic, growing and dedicated teams in social technology. We are looking for a Frontend Engineer to join the development team in Toronto. Key responsibilities will include creation of new UI feature sets in our core product offerings. Bridging the gap between creative ideation and functional, cutting-edge, web standards. Being involved in weekly tech shares and code reviews and staying abreast of the latest in front-end technology developments involving everything from Node ...
Category: Web Programming       
Skills: CSS, Javascript, HTML5, Node.js, AngularJS       
Preferred Location: Canada

j****s88
 [?]
Sign in to view client's details.
| j****s88
|    Canada
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Jun 27, 2015  |  Ends: 23d, 8h  |   17 Proposals
READ THE ENTIRE DESCRIPTION BEFORE BIDDING I need Information Security Experts who specialize in the following to answer very tough Information Security Questions from potential clients. You must hold at least one information security related certification in order to bid for this project. I need 24/7 availability so please indicate the times in which you could be available. The format of our relationship will be based on how many questions and how fast you can answer my potential clients questions about information security. You will be required to respond and answer the questions in 10 minutes or less. Expertise in any or all of the following is required: When bidding please indicate which area you are an expert in. I am not sure whether I will pay per hour or a fixed amount per week. This will be finalized once I choose the right freelancer. Accountability and responsibility Apps Authentication and identity management Best practices Bugs! Business continuity BYOD (Bring You...
Category: Networking & Security       

m****ame
 [?]
Sign in to view client's details.
| m****ame
|    United States
Fixed Price: $500 - $1,000   |  Posted: Jun 15, 2015  |  Ends: 11d, 3h  |   13 Proposals
We are searching for talented and proactive recruitment freelancers, who would like to participate in an exciting IT recruitment prospect for the state of Alabama. The goal of this project is to prospect technical people (engineers and project managers) who would like to work in Birmingham and Boston. The scope of the location to find candidates can be wider: whole USA. The profiles are very generic and are focused on 7 main technologies and 4 levels of seniority. Technologies: - Java Development - Web Development - Cobol Development - Mobile Development (Android/iOs) - IT Security Analysts - SQA Analysts - Cloud Development Seniority: - Junior level (1-3 years) - Medium (3-7 years) - Senior (+8years) - Project Managers We are looking for a total of 280 potential candidates. We would need your help sending us the resumes from the candidates that you consider valid and...
Category: Recruiting       

C****non
 [?]
Sign in to view client's details.
| C****non
|    Spain
Fixed Price: Not Sure   |  Posted: Jun 14, 2015  |  Ends: 10d, 3h  |   13 Proposals
Network Administration Windows Servers Editions Active Directory Exchange Server Lync Server CISCO (CCNA) HUAWEI (HCNA) Monitoring ....
Category: Technical Support       
Preferred Location: North America, Western Europe, Eastern Europe, Central & South America

m****rya
 [?]
Sign in to view client's details.
| m****rya
|    United Arab Emirates
Fixed Price: Not Sure   |  Posted: Jun 10, 2015  |  Ends: 6d, 13h  |   15 Proposals
Looking for an expert in IT security to perform assessment of an application. Must have relevant previous experience.
Category: Networking & Security       

n****unj
 [?]
Sign in to view client's details.
| n****unj
|    United States
Fixed Price: $1,000 - $5,000   |  Posted: May 29, 2015  |  Ends: 3d, 1h  |   8 Proposals
On behalf of Check Point Software Technologies (  [obscured]  / )Ciklum is looking for Reverse Engineer to join Dnepr team on full-time basis. As a developer you will be part of Check Point's research group of Mobile Threat Prevention department of mobile researchers, malware analysts and security specialists. You will get extensive research and development experience and a deep understanding of the mobile threat-scape to the role. Responsibilities: In the role of Reverse Engineer you will make researches and investigations in collaboration with other reverse engineers. Requirements: ? Previous proven experience in Reverse Engineering (RE) and security research ? Experience with IDA Pro, JEB or equivalent disassembly tools ? Experience in writing code in JAVA, Python ? Good skills in English, both verbally and in writing ? Team player who see the value of good communication with teammates ? A university or Master degree in Computer Engineering or equivalent Desirable: ? D...
Category: Mobile Applications       
Skills: Android, Reverse Engineering       
Preferred Location: Ukraine

n****xin
 [?]
Sign in to view client's details.
| n****xin
|    Ukraine
Symbol Key
Payment method not yet verified
Payment verified
Purchased $1-$500
Purchased $500-$5,000
Purchased more than $5,000
You have already submitted a
proposal to this job