The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.
Here's some projects that our expert Network Security Consultants made real:
Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.
Müşterilerimiz, Network Security Consultants freelancerlarımızı 24,754 değerlendirme içinden 5 üzerinden 4.9 ile derecelendirdi.Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.
Here's some projects that our expert Network Security Consultants made real:
Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.
Müşterilerimiz, Network Security Consultants freelancerlarımızı 24,754 değerlendirme içinden 5 üzerinden 4.9 ile derecelendirdi.My home network already runs on pfSense, but I need an experienced hand to tune it properly. The immediate priorities are: • Firewall rules – I want clear, maintainable rules that explicitly allow only the traffic I specify while leaving everything else untouched. • WireGuard VPN – configure the tunnel, keys, and routing so that remote devices can reach the LAN securely. • Traffic shaping – optimise bandwidth usage and prioritise latency-sensitive traffic. Everything should be implemented directly in the pfSense GUI, with inline comments or descriptive labels so I can understand and adjust settings later. I’ll provide current backups and remote access to the dashboard for the session. At the end I expect an updated config file plus a short chang...
Link to project Details: 1. Project Overview This project requires a comprehensive high-level design (HLD) and remote configuration for a multi-ISP, multi-floor network. The goal is to establish a robust, failover-capable environment utilizing Grandstream and TP-Link hardware. 2. Hardware Inventory The following hardware has been procured and will be physically installed prior to configuration: Router: 1x Grandstream GWN7003 Switches: 2x Grandstream GWN7801P (Managed PoE+) Access Points: * 1x Grandstream GWN7661E (In-wall) 3x TP-Link Deco Mesh Nodes (Operating in AP mode) 3. Physical Topology The site is divided into four main logical zones: Location A: Ground Floor Hardware: Switch A ISP Connection: Primary high-capacity feed (600 Mb/s). Cabling: Two existing CAT5 runs co...
I need an expert to configure Citrix Netscaler for load balancing. The primary goal is to ensure high availability for my applications. Key Requirements: - Experience with Citrix Netscaler - Expertise in configuring load balancing for high availability - Knowledge of both on-premise and cloud deployments Ideal Skills: - Networking and infrastructure knowledge - Experience with web applications, database servers, or email servers - Problem-solving skills for optimizing performance and uptime Please provide relevant experience and approach. Must be located in the US.
I'm looking for an experienced penetration tester to conduct a comprehensive review of my web application. This should involve combining automated scans with manual attacks to cover real-world threat scenarios and deliver meaningful results. Test Focus: • Authentication issues – e.g., session handling, privilege escalation • Data validation issues – injection, XSS, insecure deserialization • Security configuration issues – missing headers, weak CORS policies, outdated components • Targeted exploitation of known CVE vulnerabilities What I Expect: 1. A brief kick-off meeting to discuss scope, test environment, and NDA. 2. Execution of automated scans (e.g., with Burp Suite, OWASP ZAP) and in-depth manual testing. 3. Demonstrable exploits wi...
I need a skilled professional to install Windows Server 2025 and configure RDP and VPN. The VPN should allow multiple user connections. Requirements: - Install Windows Server 2025 - Configure Remote Desktop Protocol (RDP) - Set up VPN for multiple user connections Ideal Skills & Experience: - Extensive experience with Windows Server installations, especially 2025 - Strong knowledge of RDP and VPN configurations - Networking expertise to ensure secure and efficient multiple user connections
RDP Server Migration & VPN Configuration Summary 1. Current State Currently uses: A dedicated RDP server in Azure Installed with Mocha TN3270 for Windows 10/11 To access a State-hosted IBM Mainframe system Through a State-managed VPN connection That RDP server exists for a single purpose: To allow users to run the TN3270 client and access the State IBM mainframe. Current Network Path Workstation → RDP to Azure server → pfSense firewall in Azure → State VPN → IBM Mainframe Azure contains: A virtual network A pfSense firewall A VPN tunnel from pfSense to the State network The RDP server routes traffic through pfSense, which then routes to the State VPN. This introduces: Unnecessary infrastructure (RDP server) Additional attack surface Additional management ov...
I need someone to walk me through, or remotely handle, the full configuration of Scan-to-Folder on a Ricoh multifunction printer so that every scan lands in a shared network folder on my Windows 10 machine. The target folder already sits on a network drive, so the job includes: • Confirming folder sharing & NTFS permissions over SMB • Entering the correct path, user credentials, and port settings in the Ricoh web interface or on-panel menu • Testing with a live scan to prove that files arrive without errors or authentication prompts Please bring prior experience with Ricoh devices (model-specific quirks, TLS/SMB v1 vs v2 issues, etc.) and be comfortable using remote-access tools if needed. The task is considered complete once a PDF shows up in the specified folde...
I’m expanding Eigen Computing’s stealth-mode R&D team and need senior-level talent who can tackle optimisation at scale. We are building a hardware-accelerated probabilistic engine that runs QUBO/Ising workloads for Logistics, Finance, and Cyber-Intelligence, and I’m open to engaging specialists across several tracks: • ML Engineer – craft graph neural networks and matrix-compression pipelines that translate complex optimisation problems into sparse, hardware-friendly representations. • FPGA Engineer – write VHDL/Verilog kernels for AWS F1, pushing the solver to micro-second latency. • Backend Architect – design a high-performance API layer in Go, Rust or Python that orchestrates FPGA instances, manages job queues and exposes RE...
We are looking for a freelance Network Engineer to provide onsite support at a client location for a one-day network activity. You will work as the onsite engineer while a remote team provides guidance and configuration support. Responsibilities Rack, cable, and power on network equipment (switches, routers, firewalls) Patch network cables as per provided diagrams Connect console or management cables for remote access Perform basic network connectivity checks Assist the remote team during troubleshooting or validation Provide a brief end-of-day handover and status update Deliverables Network equipment installed, powered on, and accessible to the remote team Confirmation of basic network connectivity Short summary of work completed and any issues observed Requirements Hands-on ...
I’m a computer-science student up against a deadline on a small networking assignment and I simply no longer have the hours to finish it properly. The scope is modest—nothing enterprise-level—but I still need a clean, working solution that I can submit with confidence. Here’s what I’ll hand over the moment we start: • The original brief from my instructor (topology requirements, IP addressing rules, and any grading rubrics). • Any partial work I’ve already done. What I need back from you: • A complete, functional design or configuration that satisfies every point in the brief. • A short write-up (plain text or PDF) that explains the choices made so I can discuss them if asked. • All supporting files: diagrams (Visio, PNG,...
I will perform a professional security scan of your website using Kali Linux tools. The service includes a detailed PDF report highlighting vulnerabilities and practical solutions to improve your website security. Fast and reliable service guaranteed. Suitable for WordPress and custom websites. أقوم بإجراء فحص أمني احترافي لموقعك باستخدام أدوات Kali Linux. الخدمة تشمل تقرير PDF مفصل يوضح الثغرات والحلول العملية لتحسين أمان الموقع. خدمة سريعة وموثوقة. مناسبة لمواقع WordPress والمواقع المخصصة
I run a five-person company and want our office network professionally managed. The focus is network management—we have switched from am it management co because of the pricing Here’s what the engagement looks like: • Conduct a quick audit of our existing switches, router, Wi-Fi and cabling. • Design and implement an access-control scheme (role-based, VLANs or equivalent) that keeps internal resources locked down without disrupting day-to-day work. • Set up continuous performance monitoring with clear dashboards and automated alerts. • Provide rapid troubleshooting and root-cause analysis whenever speeds drop or users lose connection. The environment is small—one office, with three remote employees , a handful of laptops, —so solutions...
I need an expert who has successfully navigated Amazon’s SP-API PII approval process to walk my team and me through it from start to finish. Our SP-API application is already created but still sits in a “not verified” state, and we want to clear every compliance hurdle so we can lawfully retrieve PII and use it to deliver genuinely personalized customer interactions that elevate our support experience. You’ll explain each Amazon security requirement in plain language, help us prepare the technical and policy documentation, and review our architecture for encryption, data retention, network controls, and logging. Once everything is in place, you’ll guide us through the submission steps, respond to any follow-up questions from Amazon, and stay with us until app...
I’m looking for an experienced security tester to run a full-scale penetration test on my web application stack. Web security is the only focus here, so please come prepared with a proven methodology that aligns with OWASP-Top-10 practices and the latest exploits in mind. Scope • Map and enumerate the application, then attempt to exploit any weakness you find—authentication, sessions, input validation, business logic, configuration, the works. • Produce a concise, evidence-based report that ranks each finding by risk, explains impact, and includes clear remediation steps my dev team can action immediately. • A short retest is expected once fixes are applied. Tools you’re comfortable with matter to me. If Burp Suite Pro, OWASP ZAP, Metasploit, Nessus...
My site already runs through Cloudflare and basic protection is in place, yet I know the platform can do much more for security. I want a seasoned Cloudflare specialist to go through my current setup, tighten every loose end, and leave me with a hardened configuration I can trust. Scope of work • Firewall rules – Review what I have, remove redundancies, and add precise allow/deny rules and rate limits that match real-world traffic patterns without blocking legitimate users. • SSL/TLS – Move the zone to the most secure Full (Strict) mode, renew or generate any required origin certificates, enforce HSTS and secure ciphers, and confirm end-to-end encryption is flawless. • Bot management – Configure Bot Fight Mode and related features so genuine traffic ...
Looking for experienced and time served cctv and access control freelance installation engineers. Experience of Avigilon, Pelco, Gallagher and typically large systems above 100 cameras in size. Start to finish, Installation and commissioning, is a requirement.
I’m looking for someone who can get the Scan-to-Folder function working on a Ricoh Aficio MP C2800 that’s already networked and printing fine to a Windows PC. The goal is simple: every time we scan, the machine should drop a single PDF into a shared folder on our local network that all staff can reach. You’ll need to create or verify the Windows SMB share, adjust permissions, enter the correct path and credentials through the device’s Web Image Monitor, then test from the copier’s panel to prove that multi-page documents arrive as one consolidated PDF. Deliverables • Full configuration of Scan-to-Folder on the Ricoh MP C2800 • Verified Windows shared folder with proper access rights • Address-book shortcut on the copier for one-touch...
I’m working on a project using the AVR-IoT Cellular Mini (Sequans Monarch 2 modem) where I customized the Arduino-based firmware myself to periodically send GPS latitude and longitude data to my backend (BE) over HTTPS. The goal is to push GPS data (lat/long + timestamp) to a REST API endpoint within a specific time interval and verify that the data is successfully received and visible on the backend. However, I’m currently blocked by a TLS issue when trying to configure the CA certificate for HTTPS. When I attempt to add the root CA certificate (ISRG Root X1 – Let’s Encrypt) into the device/modem, I receive an error stating: “CA certificate input too long” Because of this: The TLS handshake fails. The HTTPS request does not complete. The endpoint i...
We are looking for an experienced IT Systems Administrator who specializes in: Microsoft Intune (endpoint security, device compliance, configuration profiles) Microsoft 365 administration (Exchange Online, Teams, SharePoint, OneDrive, Entra ID / Azure AD) Windows device onboarding, security baselines, BitLocker, Defender, and software deployment Scope of work includes: Setting up and enforcing endpoint security and compliance policies for laptops Creating and managing Intune configuration profiles and app deployments Hardening devices with Defender, BitLocker, and other M365 security tools Supporting user onboarding, access control, and general M365 administration Providing documentation for setup and ongoing maintenance Requirements: Proven experience with Intune and Microsoft ...
Necesito que un especialista configure mi router Mikrotik para ofrecer acceso a internet en una red 100 % inalámbrica mediante fichas impresas. Alcance: • Crear y activar un portal Hotspot que me permita tener control total de usuarios: límites individuales de velocidad, número de dispositivos y posibilidad de deshabilitar o renovar cuentas en cualquier momento. • Diseñar la plantilla de voucher e integrar la generación automática de fichas impresas (username, contraseña, tiempo o datos, código de barras/QR si es conveniente). • Ajustar colas, perfiles y reglas de firewall para que cada ficha respete el ancho de banda asignado y evitar que los usuarios compartan la conexión. • Redactar una guía...
We are a stealth-mode Deep Tech startup developing a computational engine designed to solve massive-scale problems. While our current applications focus on logistics and finance, we are looking to explore the strategic implications of our technology within the Cybersecurity and Cryptography sectors. We are NOT looking for a developer or a technical writer. We are seeking a Strategic Consultant or Business Development Expert with a deep, pre-existing network in the cyber-intelligence and cryptographic security communities. Your Role: • Provide high-level market insights on current bottlenecks in cryptographic analysis and network security. • Identify key stakeholders and strategic entry points for a novel computational approach in these sectors. • Facilitate initial high-le...
I want to browse safely from any hotel or coworking space by tunnelling all my traffic back to a small VPN server that will live in my house. The job has two parts: • Hardware advice – point me to a compact, reliable travel router and the best-value home server (could be a Raspberry Pi, mini-PC, dedicated router or NAS) plus any cables, power adapters, or memory cards I should add to the shopping cart. • Full setup – install and configure the VPN on the home unit, flash/configure the travel router, and hand me clear, copy-paste-ready instructions for connecting both my laptops/desktops and my iOS/Android phones. Secure browsing is the main goal, so strong encryption, a clean firewall policy, and DNS leak protection are mandatory. I’m flexible on protocol; if...
We are currently looking for an experienced Freelance Network & OT Cybersecurity Engineer (10+ years of experience) to support a network architecture redesign and cybersecurity implementation for an industrial environment. Scope of Work 1. Network Architecture The current infrastructure consists of a flat network. We are looking to redesign the architecture into a structured and segmented network. The proposed design should include: • A hierarchical network architecture (Core / Distribution / Access layers) per site • Segmentation between sites while allowing controlled sharing of selected networks • Design and placement of industrial firewalls • Secure interconnection between the sites • Migration plan for existing switches (reuse where possible and replace...
Job Title: Senior Network EngineerCompany: Advance2000 – A leading provider of high-performance Private Cloud Computing, managed IT services, cybersecurity, and strategic IT solutions for businesses, with a strong focus on the AEC (Architecture, Engineering, and Construction) industry and beyond. For over 30 years, we've delivered secure, scalable, and resilient IT environments from our US-based data centers, empowering clients to focus on growth without technology : Fully Remote (US-based preferred; strong preference for candidates in Eastern or Central Time Zones for team collaboration and 24/7 support alignment)Employment Type: Full-TimeReports to: Director of Engineering / IT Infrastructure ManagerAbout the Role Advance2000 is seeking an experienced Senior Network Engineer w...
Estoy buscando un profesional con experiencia comprobable en Hummingbot y trading automatizado con criptomonedas para realizar la instalación completa del cliente de Hummingbot siguiendo la guía oficial: El trabajo incluye: Instalación y configuración correcta de Hummingbot en un VPS. Configuración inicial para operar con exchanges como Binance, KuCoin u otros. Verificación de que el bot funcione correctamente y pueda ejecutar estrategias. Explicación básica del funcionamiento y de los comandos principales. Recomendación de proveedores de VPS adecuados para este tipo de uso. Muy importante: El profesional debe indicarme qué proveedor de VPS utilizar, ya que algunas plataformas como Binance pueden bloquear ciertas...
I am looking for secure, temporary access to a live Sage X3 V12 Command Line Interface that I can reach remotely. My immediate need is to run Data migration jobs, Automating reports and a few Custom script execution scenarios inside a dedicated Testing environment. The CLI must expose the Finance and Inventory modules so I can validate scripts against real tables and standard functions. A standalone app or jump-box style VM is fine, provided it already has the V12 runtimes and the usual X3 utilities pre-configured. Deliverables I expect: • Connection details (host, port, user, password or key) with any VPN instructions • Confirmation that the Finance and Inventory folders are available and compile cleanly • Ability to launch the CLI and run a sample data-load, a ...
I need a comprehensive Wireshark portfolio to showcase my technical proficiency to university teachers. The portfolio should include: - Captured Packet Analysis - Network Troubleshooting Examples - Protocol Dissection Examples Ideal Skills and Experience: - Expertise in Wireshark - Strong understanding of network protocols - Experience in network troubleshooting - Ability to present information clearly and professionally Please provide detailed and well-organized examples for each category.
I need a thorough, professional penetration test that zeroes in on database security. The work will involve actively probing our live environment for misconfigurations, permission-escalation paths, injection points, improper encryption, and any other weakness that a determined attacker might exploit. Scope • Assess the entire database layer—from connection strings and authentication flows to stored procedures and backup endpoints—without disrupting business operations. • Document every finding with reproducible steps, risk ratings, and clear remediation guidance. • Validate fixes with a follow-up retest so we can close the loop confidently. Deliverables 1. Methodology outline (tools, test phases, compliance references). 2. Vulnerability assessment...
I already have a Contabo server standing by and simply need a clean, production-ready ViciDial stack on it. The job covers: • Installing the latest stable ViciDial (with Asterisk and its dependencies) from scratch. • Optimising the underlying Linux distro you feel is most reliable for call-centre workloads. • Hardening the box with a well-tested firewall configuration—CSF, UFW, iptables, or a similar solution is fine—as long as only the ports Vicidial, SSH and web administration actually require remain open. • Verifying that the web interface, database, and telephony services all start automatically after a reboot and that calls can be placed through a demo campaign. • Supplying a concise hand-off sheet: all commands run, credentials created, a...
I already have a functioning codebase that reaches Amazon endpoints, but I now need to harden and streamline the network layer. The top priority is Optimized Proxy Deployment: spinning up several proxy servers on AWS, each tied to its own Elastic IP and placed in regions nearest to the Amazon infrastructure we query. The target footprint is roughly 100 static IPs—half reserved for one domain and half kept in a common pool. Every outbound call must rotate to the next address so no two consecutive requests share the same IP, keeping average round-trip latency between 150 ms and 300 ms. When Amazon responds with a 429, the system should swap both the IP and candidateId instantly, with zero observable delay to the application. A second goal is lowering the overhead around our creat...
I need a technician to rebuild my home control panel. The systems involved include TV, network control box, fiber optic, and Cat5 connections. Key Requirements: - Rework existing connections or install new ones - Ensure proper integration and functionality of all systems - Maintain a tidy and organized setup Ideal Skills and Experience: - Experience with home networking and wiring - Knowledge of TV and fiber optic installations Rework existing box as everything works fine. Or provide new box to house upgraded switches etc. - Attention to detail and problem-solving skills Please provide a portfolio or examples of similar work.
I need an experienced freelancer to set up a home media server on Windows, primarily for streaming media. Requirements: - Use Plex, Kodi, or Emby for media server software - Configure for optimal streaming performance - Ensure secure access and user-friendly interface Ideal Skills and Experience: - Proficiency in Windows OS - Experience with media server software - Strong networking and security knowledge Please provide examples of similar work done.
I'm seeking urgent cyber security assistance for my personal computer and android. I need a professional to secure my device and protect my data. Key Requirements: Virus removal Malware removal Penetrating testing Network security Ideal Skills and Experience: - Proven expertise in cyber security - Experience with personal computers - Ability to work quickly and efficiently - Strong knowledge of virus removal and data protection measures Please provide a detailed plan of action and estimated timeline.
Enterprise Network & Security Architect (Mentor-Based) Virtual Enterprise Home Lab Design & Guided Implementation Project Overview I am an IT student in Germany building a fully virtual enterprise-style home lab for hands-on learning. This lab will simulate a small-to-mid enterprise network using virtualization technologies. The objective is not just implementation, but deep architectural understanding and guided learning. I am looking for an experienced Network & Security Engineer who can: • Design the full enterprise-style architecture • Guide me step-by-step through implementation • Explain design decisions and security reasoning • Review my configurations • Provide structured documentation templates • Conduct live knowledge-transfer sessio...
We are looking for a freelance Network Engineer for a single-day onsite visit at our client’s office. The primary responsibility will be the physical deployment of network hardware, including routers, switches, and wireless access points. Rack and mount network equipment Connect power and data cables Patch copper and fiber connections according to the provided diagrams Label all cabling properly Verify console access to each device so our NOC team can complete remote configuration No configuration work is required onsite — this is strictly physical installation and verification. Scope of Work: Rack, stack, and cable routers, switches, and WAPs Connect and verify power to all devices Patch and label copper/fiber connections per diagrams Confirm console connectivity for remot...
I am preparing for the CompTIA Security+ certification and want targeted, exam-style tutoring that zeroes in on Network Security—specifically firewalls and VPNs. The goal is to master the current exam objectives, clear up any conceptual gaps, and build enough confidence to score well on test day. Sessions should be live, interactive, and paced to my schedule. I learn best when theory is tied directly to hands-on examples, so walking through real-world firewall rules, VPN configurations, and related packet-flow scenarios is essential. Explanations must stay aligned with the Security+ wording and depth so I recognize the phrasing when it appears on the exam. Deliverables: • A structured lesson plan broken into manageable milestones • Live tutoring sessions with screen-sha...
My personal blog runs on a standard LAMP stack and I want a clear, ethical snapshot of its current security posture. The focus is on preventing data breaches and blocking any avenue for unauthorized access; malware checks are welcome but secondary. Scope You will carry out a legally authorised vulnerability assessment that covers: • A surface scan of the domain and sub-domains, mapping open ports and exposed services. • Manual and automated testing against the OWASP Top 10, using tools such as Burp Suite Community/Pro, OWASP ZAP, Nikto, or similar. • SSL/TLS configuration review, confirming protocol versions, cipher strength, and certificate chain integrity. • Inspection of server and application misconfigurations that could lead to privilege escalation, credenti...
ALFA NETWORKS ADAPTOR OR SIMILAR IS A REQUIREMENT I need a cyber sec expert who already owns an Alfa Networks USB adapter (or a comparable injection-capable card) to carry out a controlled WiFi-based denial-of-service exercise. The goal is to you use the Kali Live boot with persistence USB stick, and the Alfa Networks adaptor, to launch a Denial-of-Service attack on your own mobile phone (or smart TV etc) in order to prevent it accessing your home WiFi. its just a simulation so we only need 4 screenshots. I ordered my alfa networks adaptor but it got delayed with the shipment so now need help if you own one. ALFA NETWORKS ADAPTOR OR SIMILAR IS A REQUIREMENT
I need help recovering my hacked personal Outlook email account. The hacker accessed my contacts, and I want to secure my account and restore my privacy. Key Requirements: - Experience with Outlook email recovery - Ability to secure hacked accounts - Knowledge of protecting sensitive information Ideal Skills: - Cybersecurity expertise - Familiarity with email service protocols - Strong problem-solving skills Please provide a brief overview of your experience and approach.
I’m seeking a seasoned Pre-Sales Cybersecurity Engineer who can jump in part-time and strengthen our sales motion with large-enterprise prospects. You’ll own the technical conversation from first discovery through contract signature, translating complex security capabilities into clear business value. Your day-to-day will revolve around three core outcomes: • Technical presentations that engage executive and engineering audiences, highlighting our strengths across Network Security, Endpoint Security, and Cloud Security. • Accurate, persuasive responses to RFPs and RFIs, complete with architecture diagrams, deployment options, and measurable ROI statements. • Robust demo and lab environments you build, tune, and maintain so prospects can test drive features ...
Penetration Test of the IT/OT System of a Photovoltaic Power Plant and Battery Energy Storage System 1. Subject of the Contract The subject of this contract is the execution of a comprehensive penetration test of the IT/OT infrastructure of a photovoltaic power plant and battery energy storage system to assess its resilience against cyberattacks and unauthorized remote control. The test must simulate real-world cyberattack scenarios, focusing on the possibility of: Unauthorized remote access Takeover of device control Manipulation of energy production or storage Disruption of system availability Exploitation of communication interfaces Leakage of sensitive data 2. Scope of Testing The test shall include: 2.1 External Testing Simulation of attacks from the public internet Analy...
Hi I will share the details with the shortlisted candidates. Thanks
This project covers the end-to-end creation of a brand-new Local Area Network for our premises. The environment will serve daily operations for both computers and servers as well as our shared printers and scanners, so stability, speed, and clean segmentation matter. The scope begins with planning: assessing the floor layout, sizing the switch stack, deciding on cable runs, and selecting hardware that fits future growth. Layer-2 and Layer-3 configuration must follow best practices—think VLAN separation for user groups, QoS where printing traffic needs it, and a security baseline that shuts unused ports, enforces 802.1X, and applies sensible ACLs at the edge. During implementation, I expect neat rack work, labelled cabling, and documented configurations (Cisco-style CLI or equivalen...
Hi I will share the details with the shortlisted candidates. Thanks
Conduct a CREST‑approved penetration test covering OWASP Top 10, infrastructure, and API endpoints. Provide a full report and remediation guidance. You must be UK‑based and able to invoice us as a self‑employed contractor or registered business. You will be working as part of a small team during an intensive 2‑week delivery sprint. Deliverables: Pen test plan Full CREST report Remediation list Optional retest (if included in your service)
ALFA NETWORKS ADAPTOR OR SIMILAR IS A REQUIREMENT I need a cyber sec expert who already owns an Alfa Networks USB adapter (or a comparable injection-capable card) to carry out a controlled WiFi-based denial-of-service exercise. The goal is to you use the Kali Live boot with persistence USB stick, and the Alfa Networks adaptor, to launch a Denial-of-Service attack on your own mobile phone (or smart TV etc) in order to prevent it accessing your home WiFi. its just a simulation so we only need 4 screenshots. I ordered my alfa networks adaptor but it got delayed with the shipment so now need help if you own one. ALFA NETWORKS ADAPTOR OR SIMILAR IS A REQUIREMENT
I have several Cisco-based lab and production environments that need hands-on attention from someone who already feels at home with CCNA-level work. Over the next few weeks I’ll be refining network configuration, tightening security, and—most importantly—sorting out a few stubborn routing-protocol issues that keep popping up. Here’s the situation: • Network configuration needs polishing on a mix of Catalyst switches and ISR routers, including VLAN planning, trunking, and interface tuning. • Day-to-day troubleshooting consumes far too much time; I want clear root-cause analysis when links flap, routes disappear, or access lists misbehave. • Security hardening is overdue—standard ACLs are in place, but I need smarter filtering and a quick r...
Saya mencari seorang ahli jaringan yang dapat menyusun proposal komprehensif untuk peningkatan infrastruktur jaringan kami, dengan penekanan khusus pada kecepatan dan kinerja. Lingkup yang saya butuhkan meliputi: • Audit singkat kondisi jaringan saat ini (topologi, perangkat aktif, jalur komunikasi). • Rekomendasi teknis peningkatan – perangkat keras, konfigurasi, dan arsitektur yang diusulkan. • Proyeksi peningkatan throughput serta metrik performa lain yang relevan. • Estimasi biaya perangkat & lisensi beserta timeline implementasi bertahap. • Rencana mitigasi risiko dan strategi rollback bila diperlukan. Proposal harus ditulis jelas, mudah dipahami tim manajemen non-teknis, namun tetap menyertakan detail teknis yang cukup untuk tim TI i...
I need help installing routers for a series of small communication-network rollouts. Each day’s route will be planned in advance, and the actual on-site work rarely exceeds one to two hours. Your role is straightforward: pick up the assigned router, travel to the client location, mount the unit, connect it to the existing cabling, confirm internet connectivity, then send me a quick photo and speed-test screenshot before leaving. The schedule is flexible as long as the job is finished on the agreed day; I issue payment weekly, starting at 25 000 ₽, and increase it for consistently smooth, on-time work. What matters most to me is punctuality—I’d rather reschedule than keep a client waiting—and complete honesty about any delays or technical issues you encounter. Basi...
I have a WebRTC soft-phone built with JsSIP that needs to register to an Asterisk 18 server over WSS. SIP credentials are confirmed correct, yet the browser console shows an authentication failure. The signalling path is protected with TLS certificates, so the problem is somewhere in the certificate handling or the way Asterisk presents the challenge. Your job is to trace and eliminate the registration failure, then hand back a clean configuration and proof that the client can successfully register and place a test call. Environment details you will touch: – Asterisk 18 (pjsip stack enabled) – JsSIP running in a standard browser (wss://) – TLS with server and client certificates already issued Acceptance criteria: • JsSIP completes REGISTER without 401/403 r...
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.