Ασφάλεια Διαδικτύου Jobs
Internet security involve training and/or experience in the design, assessment and configuration of measures to protect both IT systems exposed to the Internet as well as the consumers of those systems. The field of internet security is highly volatile as new threats and measures develop on a daily basis, necessitating anyone tasked with it to constantly keep their skill up to date to remain effective.
This is a skill carrying high responsibility, as data compromises of either company data or personal data can incur significant reputational or financial damage. Given these risks, this skill is mandatory for any organization with an Internet presence to secure, either through their own recruitment or vetting of their suppliers.
Πρόσλαβε Internet Security ExpertsI want to hire some good ethical hacker to conduct VA/PT on web and mobile apps
Hi there, Im looking for someone to teach me pentesting. Im looking for someone who has knowledge in Nmap and other tools. Thanks
need someone expert in this field
I need someone who is expert in computer networks and have strong concepts.
I am looking for skilled ransomware virus expert, some weeks ago my excel files are encrypted from the virus. I need to decrypt my files, After attacked from the virus, I installed new OS at my PC, I have only personal virus ID and encrypted file. Please ping me only security experts. my files are encrypted with *.uyjh I have tried with "Emisoft Ecrypter for stop Djvu" program in my side, But failed. I see only this message "File: D:2222021 Error: No key for New Variant online ID: aM52ICzJQKQw5RzWb694LpEJS4hoQggGum2NGG0i Notice: this ID appears to be an online ID, decryption is impossible" Please bid only experts. Thanks.
We have clients requiring vulnerability assessment and penetration testing This is ongoing work for multiple customers
I am looking for someone to helps us build a cyber security assessment tool to be use for as a landing page on our websites and marketing. This preferred candidate need to produce the content as well.
Create virtual machines and innitiate security measures
I need an ethical hacking expert to aid me in some work
Hiring engineers who are familiar to deploy trend micro suite of solutions . On-site service preferred in SG
We have Telegram Bot set up that has trading signals coming to it. Looking for some one to setting up 3 or 4 groups and link bot into them. Need security of use setting up and detail of how you like to work. Best of luck in your bidding i have all information for you to be able to do.
Searching for an very experienced FreeIPA admin, who can consult on defining requirements and defining features to be implemented Work will be - discussion with responsible persons - definition of requirements - documentation of requirements and mapping to FreeIPA MANDATORY: you have FreeIPA experiences in multiple organizations with common pitfalls and issues of organizations Outlook: Preferably getting consultancy and afterwards help in integrating freeIPA into organization Budget? will not be disclosed, place your best bid
i need you to create a system to capturing all traffic for all the devices in my network , 24 /7 do same as this vedio
i want you to create something same as this service
We are looking for a cyber security hacker that can find and propose ways to keep our platform more secure
how to protect cloud data privacy with Homomorphic Encryption. To protect our data privacy in cloud and meanwhile allow the cloud server to process our data, the best solution is using homomorphic encryption scheme, e.g., Paillier encryption scheme, to protect our data in the cloud. In this question, you are expected to understand how homormphic encrytion technique can be used to protect your data privacy in Cloud and analyse data privacy
We search for an expert who can design a new opnSense firewall system for a datacenter. Also part of the job is to consult us in a new solution how to setup best the new network for IPv4 and IPv6. Also part of the job is to share us how you want to document NAT and firewall rules and how to ensure that they will stay documented in the future. Since we get often application/proposals of "experts" with no real hands on experience in the requested topic, please provide us: - how big is your currently maintained network with opnSense (how many IPs, how many networks, how many VLANs) - how is your opnSense connected to the internal network (bandwidth, technology, redundancy)? - how many opnSense setups have you done in the last 2 years? - how you ensure ongoing documentation of fire...