The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
Nga 105,913 vlerësimet, klientët vlerësojnë Computer Security Consultants 4.9 nga 5 yje.Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
Nga 105,913 vlerësimet, klientët vlerësojnë Computer Security Consultants 4.9 nga 5 yje.My network edge relies on a Sophos XG appliance and a Fortinet FortiGate unit. Both devices are in production, but their current configuration is a mix of legacy rules and quick fixes that now interfere with performance and security. I want a seasoned firewall engineer to step in, examine every setting, correct what is wrong, and design a clean, least-privilege rule base. Scope of work • Configuration – back up the existing setups, remove or refine redundant rules, and align all interfaces, NAT, VPN, IPS and logging options with best-practice guidelines for Sophos SFOS and FortiOS. • Troubleshooting – identify and eliminate the intermittent drops we see on site-to-site VPN and outbound web traffic. Validation must include live traffic tests and log review. &bul...
I operate a cluster of Windows Server 2019 machines and need an experienced set of hands to keep everything running smoothly. Your focus will be three-fold: maintaining the servers themselves, getting our Veeam Backup & Replication environment dialled-in, and stepping in whenever a network hiccup or whitelist request appears. On the Veeam side I already have repositories in place; what’s missing is a clean, reliable backup configuration and the regular monitoring that guarantees every job finishes without warning bells. Restoration testing and documented recovery steps will be part of the routine so we can prove our RPO/RTO targets at any moment. Networking support centres on troubleshooting issues as they arise and processing whitelist updates for partners and applications tha...
I am looking for an experienced Instagram account recovery specialist to help me regain access to my business Instagram account. I currently cannot log in to my account through any method: Password reset is not working Facebook login is not working Instagram recovery page shows “No account found” However, the username and account are still visible when checked from another Instagram account Additional details: This is a business account I still have access to the original email and phone number The issue happened suddenly, likely due to hacking or unauthorized changes What I need: Proper recovery through Instagram / Meta official support Assistance with hacked account appeal and verification No fake tools or scams — only legitimate recovery methods Requireme...
I’m in the middle of an ongoing project and have run into a few stubborn issues that I can’t resolve on my own. What I need right now is straight-forward technical support with a strong focus on troubleshooting. The exact fault lines aren’t fully mapped yet—that’s why I’m turning to someone who’s comfortable methodically isolating problems, testing hypotheses, and guiding me to a clean resolution. Here’s how I picture the engagement: • You jump on a quick call or chat to gather environment details and replicate the failure. • We narrow down root causes together—whether the culprit ends up being code, configuration, network quirks, or even a hardware hiccup. • You document each fix or workaround as you go so I can re...
I need help connecting my already installed wired security cameras to my WiFi router at home. Ideal Skills and Experience: - Experience with wired security camera systems - Knowledge of WiFi network setup and configuration - Ability to troubleshoot connectivity issues - Prior work with home security systems is a plus
I need a thorough, methodical security assessment of my production-ready web application. The goal is to expose any weaknesses before launch, demonstrate real-world exploitability, and give me a clear, prioritized plan for remediation. Scope • Full application security testing: authentication, authorization logic, input validation, business-logic flows, session management, server configuration, and third-party integrations. • Black-box techniques are fine, but I can supply test credentials for deeper analysis if that helps you reach code paths hidden behind login. • Industry-standard tooling such as Burp Suite, OWASP ZAP, Nikto, or your preferred commercial scanner is expected, followed by manual verification so I’m not just getting automated false positives. ...
Desktop / System Engineer – Onsite (1-Day Assignment) We are seeking a hands-on Desktop or System Engineer to be onsite at a client location for one full day to support a small IT infrastructure refresh. You will act as the onsite engineer while a remote technical team remains on standby. Your primary responsibility will be to rack, cable, power up, and patch IT and network equipment (servers, switches, firewalls, desktops, and printers) strictly according to the diagrams and instructions provided in advance. You will also connect console or management cables to enable remote engineers to complete configuration tasks. Before wrap-up, you will perform basic end-user computing (EUC) checks, including light troubleshooting for desktops, laptops, and printers—verifying network c...
My iPhones and several smart-home devices have almost certainly been compromised. Unexplained behaviour, network slow-downs and repeated password lockouts suggest an active intrusion that I have not been able to stop remotely. I need an experienced cyber-security professional to visit in person, trace the breach and leave every device—and the Wi-Fi network itself—clean, secured and fully documented. What I expect during the visit • A thorough forensic check of each affected iPhone and the smart-home hub/gear, including router or mesh nodes you judge relevant. • Immediate containment and removal of any malicious profiles, apps, firmware or network configurations you uncover. • Clear advice on whether each device can be salvaged or should be replaced, follow...
Need experienced Linux System Administrator for server hardening. Tasks include security audit, firewall configuration, SSH hardening, user access control, patch management, and security monitoring setup. Must have experience with Ubuntu/CentOS and tools like Fail2ban, SELinux. Provide documentation of all changes.
I’m completing a networking and security module at school and the current assignment requires a fully-configured Cisco Packet Tracer project. If you’ve tutored or prepared Packet Tracer or such kind of assingment please help me
A recently rebuilt Windows workstation needs a bullet-proof antivirus setup carried out over a remote session. The job begins with selecting an effective AV suite (I am open to your recommendation—Norton, McAfee, Kaspersky, or another best-in-class option) and continues through full installation, optimisation, and hardening. Key protection goals • Online banking: isolate browser sessions, enable real-time phishing & key-logger defences, and verify safe-transaction modules are active. • Confidential files: enforce on-access scanning, tune heuristic settings for maximum detection, and lock down local folders with password-protected vaults or encryption available within the AV. • Google Drive sync: ensure cloud-storage scanning is enabled, block malicious file ...
Upgrade the pfss and rebuild the cluster with recovery group of 8 pfss servers,it's urgent requirement
I run a production-level Windows server that now needs steady, professional care. The box is already up and live; what I need is someone who can step in and take over the routine work that keeps it healthy and secure. Your core responsibility will be ongoing maintenance—installing patches, checking logs, pruning obsolete services, and making sure performance never drifts. In parallel, I want proactive security updates: closing vulnerabilities quickly, hardening configurations, and documenting every change so there are no surprises later. A typical month might include: • Scheduling and applying Microsoft updates with minimal downtime • Reviewing Event Viewer and other logs for early warning signs • Updating firewall rules or IPS policies when new threats emerge ...
We are currently looking for freelance Network Engineers in your city to support ongoing onsite requirements for our customers and act as the eyes and hands for the remote configuration team. Typical visit • Arrive at the customer location, meet the local contact, and review the work order • Rack, stack, and cable routers, switches, firewalls, or wireless access points exactly as marked on the network diagram. • Power on the gear, provide console access back to our remote engineers, and stay on-site while they push the configs and run their tests. • Perform basic physical troubleshooting if something doesn’t light up as expected and coordinate with the remote team until sign-off. What you need to bring Your own laptop, a console cable, and any basic hand tools y...
I’m building a Spring-based service router and need robust CSRF protection on all API endpoints. The idea is to leverage Public Key Infrastructure so that every incoming request carries a verifiable, signed token before it reaches any controller logic. Here’s the core of what I’m after: • A Spring Security configuration (Boot-compatible) that intercepts every request—GET, POST, anything—and checks a PKI-backed CSRF token. • A lightweight way for upstream services or clients to obtain and refresh that token; we can refine the flow together once you see my current architecture diagrams. • Server-side validation that ties the token to the session (or an equivalent stateless approach) so replay attacks are blocked. • Clean, readable ...
We are currently looking for freelance Network Engineers in your city to support ongoing onsite requirements for our customers and act as the eyes and hands for the remote configuration team. Typical visit • Arrive at the customer location, meet the local contact, and review the work order • Rack, stack, and cable routers, switches, firewalls, or wireless access points exactly as marked on the network diagram. • Power on the gear, provide console access back to our remote engineers, and stay on-site while they push the configs and run their tests. • Perform basic physical troubleshooting if something doesn’t light up as expected and coordinate with the remote team until sign-off. What you need to bring Your own laptop, a console cable, and any basic hand tools y...
I'm seeking a security assessment for my corporate website. The primary concern is phishing attacks. I'm looking for a detailed report and provides actionable recommendations to enhance security. Key Requirements: - Assessment of current security measures (basic) - Identification of phishing vulnerabilities - Recommendations for improvement Ideal Skills and Experience: - Experience with corporate website security - Expertise in phishing attack prevention
For this project I'm looking for a VERY competent consultant on Windows systems and (maybe) on ethical hacking. Standard approach is not useful and doesn't solve the task. I want to clarify that the request is made for purely educational and exercise purposes. The goal is to make a client accessible/usable again (ethical hacking techniques). The target client is really closed/blocked. The client is Windows 11 Enterprise 23H2 - Experience Pack 1000 - 64bit (OS build 22631.5908) Actual landscape: - Windows user is not local machine Administrator. - The local disk is encrypted via BitLocker (booting from the outside therefore does not allow reading the data); - BIOS has a password, not known; - Unauthorized applications are not allowed (no possible to install nothing more). - ...
I need an experienced Privileged Access Management engineer who can immediately take ownership of our Delinea Secret Server and Endpoint Privilege Manager landscape. Your first responsibility will be the daily care-and-feeding of the vault itself—credential onboarding, policy tuning, monitoring, and rapid troubleshooting—so that administrators, service accounts, and applications can continue to work without interruption. Beyond steady-state operations, I want you to drive the next wave of improvements that will make life easier for our users. The priority is clear: simplify access without diluting security. That means reviewing our current request workflows, tightening least-privilege rules, and automating as much of the approval and credential rotation process as possible whi...
I need a hands-on network engineer for a single day of onsite work. Your main task will be to rack, stack, power up, and cable two types of devices—routers and switches—exactly as shown in the network diagram. Once everything is patched, you’ll open console access so our remote team can jump in and finish the configuration. Deliverables for the day • Routers and switches physically installed, powered, and neatly patched • Verified console connectivity for each device • Any laptop or printer glitches resolved or clearly documented • A brief hand-off report summarizing what was done and noting anything that needs follow-up Bring your own basic toolkit (screwdrivers, cable tester, console cable, etc.) and be comfortable working independently whi...
Desktop / System Engineer – Onsite (1-Day Assignment) We are seeking a hands-on Desktop or System Engineer to be onsite at a client location for one full day to support a small IT infrastructure refresh. You will act as the onsite engineer while a remote technical team remains on standby. Your primary responsibility will be to rack, cable, power up, and patch IT and network equipment (servers, switches, firewalls, desktops, and printers) strictly according to the diagrams and instructions provided in advance. You will also connect console or management cables to enable remote engineers to complete configuration tasks. Before wrap-up, you will perform basic end-user computing (EUC) checks, including light troubleshooting for desktops, laptops, and printers—verifying network c...
I'm seeking a forensic expert to conduct a thorough audit of my personal cell phone. This audit is crucial for security and privacy verification. Key requirements: - Detailed examination of all third-party secret messaging apps, including but not limited to: - WhatsApp - Signal - Telegram - Snapchat - Viber - Line - Access and analyze call history, text messages, photos, and videos as needed. - Provide a complete report of findings. Ideal skills and experience: - Proven expertise in digital forensics - Familiarity with a wide range of messaging apps - Strong analytical skills - Ability to maintain confidentiality and security Looking forward to your proposals.
need a simple static website created using HTML and CSS only for a university assignment. Requirements: • The website must follow the 2025 Summer Semester Assignment Specifications (including minor updates up to Week 7). • It must align with the marking guidelines / rubrics for the assignment. • Content and structure should be based on the documents provided in the folder “Files for the Summer Semester Assignment”. • The website should include multiple pages (for example: Home, About, Assignment Information). • Use clean and well-structured HTML with an external CSS file. • Basic styling is required (layout, fonts, colours). • No JavaScript is required. • Any images used should be placed in an images folder. • All files (HT...
need a simple static website created using HTML and CSS only for a university assignment. Requirements: • The website must follow the 2025 Summer Semester Assignment Specifications (including minor updates up to Week 7). • It must align with the marking guidelines / rubrics for the assignment. • Content and structure should be based on the documents provided in the folder “Files for the Summer Semester Assignment”. • The website should include multiple pages (for example: Home, About, Assignment Information). • Use clean and well-structured HTML with an external CSS file. • Basic styling is required (layout, fonts, colours). • No JavaScript is required. • Any images used should be placed in an images folder. • All files (HT...
looking for an experience wordpress security manager. need to have experience with email security, website security, server security. must speak english and have proven experience.
I am conducting an authorised security assessment on a website that currently sits behind Cloudflare. The owner has given me written permission to verify how well the service hides the origin server, and my first objective is simple: locate the true, routable IP address of that server. What I need from you • Discover the origin IP without disrupting production traffic or triggering any Cloudflare security events. • Confirm that browsing directly to the uncovered IP renders the site identically to the public domain (same content, layout, and functionality). • Provide a concise report describing the exact approach—whether you relied on passive DNS enumeration (dig, SecurityTrails, Shodan etc.), historical records, sub-domain leakage, server misconfiguration, or ...
I’m looking for an experienced desktop-support professional who can step in and look after every aspect of my Windows machines. I run a mix of personal PCs and small-office workstations, so the environment shifts between home-use convenience and business-grade reliability. The immediate focus is twofold: • Installation & setup – clean OS installs, driver configuration, user profiles, network printers and the usual security hardening that keeps a fresh Windows system stable from day one. • Troubleshooting & repair – when updates break drivers, applications refuse to launch, or performance drops unexpectedly, I need someone who can diagnose quickly, walk me through fixes, and document what was done so I can reference it later. Most tasks can be handle...
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.