Information Security Freelance Jobs

Find Information Security jobs online. Work from home and earn money online.
Signup for free to get access to all filter attributes and instant notifications when new jobs are posted.
Setup filter



Get access to over 30+ filter attributes, setup instant notifications, integrate with your CRM and marketing tools, and more.
Start free trial
48 projects published for past 72 hours.
Job Title Budget
Cybersecurity Strategy and Infrastructure
10,000 USD 59 minutes ago
Client Rank - Risky

Payment method not verified
1 open job
PT Portugal
Risky
Required Connects: 7
I am launching an online marketplace for in person workshops in Portugal called Hands On. We have a website live but are looking to have some help building some cybersecurity protocols and infrastructure. Our website is live handson.pt. Please could you provide a quote and what would be included.

Best,
Tom
Skills: Security Policies & Procedures Documentation, Cybersecurity Management, Information Security, Certified Information Systems Security Professional, Information Security Audit, SOC 2 Report, AI Security, SOC 2, ISO 27001, Insurance & Risk Management, GDPR, Information Security Consultation, NIST Cybersecurity Framework, Cloud Security Framework, Governance, Risk & Compliance Software
Fixed budget: 10,000 USD
59 minutes ago
  • IT & Networking, Information Security & Compliance
Cybersecurity Study Participant
20 USD 4 hours ago
Client Rank - Excellent

Payment method verified
$17'477 total spent
131 hires , 47 active
206 jobs posted
64% hire rate, 3 open job
8.41 /hr avg hourly rate paid
1005 hours
4.45 of 84 reviews
Registered at: 14/05/2020
US United States
Excellent
Required Connects: 8
Hello Cybersecurity Professionals,

I am a PhD student conducting a study titled:
Deepfake Phishing Risks: Detection, Limitations, and Countermeasures.

This research aims to explore the threats posed by deepfake technology in phishing campaigns and identify effective mitigation strategies. Your expertise will provide valuable insights to advance the cybersecurity field.

Key Details:
Compensation: Participants will receive a small monetary reward after completing all rounds of the study questionnaires.
Access to Findings: Upon completion, you will have access to the final study results, providing a deeper understanding of this emerging threat landscape.
Participant Requirements:

Must be at least 18 years old.
Currently or previously employed in a cybersecurity role with authority to guide organizational security strategy.
Hold or have held titles such as (but not limited to):
Director of Information Security
Chief Information Security Officer (CISO)
Information Security Officer
Information Security Manager

Study Format:
This study employs the Delphi methodology, involving multiple rounds of online questionnaires. After the initial round, you will receive anonymized feedback from your peers, and subsequent rounds will refine the responses until consensus is reached.

Privacy and Ethics:
This study adheres to strict ethical and privacy guidelines as established by the Institutional Review Board (IRB).

By participating, you will not only contribute to the cybersecurity community but also help shape the strategies to combat deepfake phishing threats effectively.

Thank you for considering this opportunity to make a meaningful impact in the fight against advanced phishing threats.
Skills: Information Security
Fixed budget: 20 USD
4 hours ago
  • IT & Networking, Information Security & Compliance
Need Ethical Hacker for Security Assessment
65 - 150 USD / hr
6 hours ago
Client Rank - Risky

Payment method not verified
1 open job
US United States
Risky
Required Connects: 7
Only freelancers located in the U.S. may apply.
**Job Description:**

Seeking a skilled ethical hacker for a security assessment of my partner's phone due to safety concerns for myself and my children. I worry constantly that he is doing illegal things that would put my boys and me in harm's way. I just have to know the truth. The ideal candidate should be discreet, trustworthy, and experienced in mobile device security. Please share your qualifications and prior experience in similar cases.
Skills: Security Analysis, Vulnerability Assessment, Penetration Testing, Information Security, Encryption
Hourly rate: 65 - 150 USD
6 hours ago
  • IT & Networking, Information Security & Compliance
Tracking down scammers from two phone numbers
not specified 6 hours ago
Client Rank - Risky

Payment method not verified
1 open job
SG Singapore
Risky
Required Connects: 5
Will provide the two Singapore numbers used by the hackers on email
Skills: Ethical Hacking, Vulnerability Assessment, Network Security, System Security, Information Security, DevOps, Python, Technical Writing, Encryption, Kali Linux, Academic Research, Web App Penetration Testing, Network Penetration Testing, System Administration
Budget: not specified
6 hours ago
  • IT & Networking, Information Security & Compliance
Hotmail account recovery
not specified 8 hours ago
Client Rank - Medium

Payment method verified
1 open job
US United States
Medium
Required Connects: 7
It has to do with recovering my hotmail account, it has been locked for months and can’t get recover it.

Not looking for second parties or have to buy ecrypts
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget: not specified
8 hours ago
  • Customer Service, Customer Service & Tech Support
Cybersecurity Expert Needed to Track Bank Account Hacker
100 USD 8 hours ago
Client Rank - Excellent

Payment method verified
$22'239 total spent
51 hires , 12 active
83 jobs posted
61% hire rate, 1 open job
4.11 /hr avg hourly rate paid
4189 hours
4.36 of 32 reviews
Registered at: 08/09/2013
US United States
Excellent
Required Connects: 10
I am seeking a skilled cybersecurity professional to assist in tracking a hacker who has attempted unauthorized access to my bank account. The ideal candidate should have experience in digital forensics, threat analysis, and online security protocols. Your expertise will be crucial in identifying the source of the breach and implementing measures to prevent future incidents. If you have a strong background in cybersecurity and a proven track record in similar cases, I would love to hear from you.
Skills: Encryption, Firewall, Vulnerability Assessment, Information Security, Ethical Hacking
Fixed budget: 100 USD
8 hours ago
  • IT & Networking, Information Security & Compliance
Security issues
not specified 9 hours ago
Client Rank - Risky

Payment method not verified
1 open job
HU Hungary
Risky
Required Connects: 5
I have an issue regarding my email and password in which i have big consequences in case i can’t log in
Skills: Security Assessment & Testing, Security Testing, Ethical Hacking, Internet Security, Network Penetration Testing, Penetration Testing, Website Security, Information Security Consultation, Network Security, System Security, Vulnerability Assessment, Information Security, Malware Removal
Budget: not specified
9 hours ago
  • IT & Networking, Information Security & Compliance
Cyber security Forensic Investigator
200 USD 11 hours ago
Client Rank - Medium

Payment method verified
$450 total spent
5 hires
2 jobs posted
100% hire rate, 2 open job
5.00 of 4 reviews
Registered at: 08/08/2024
CA Canada
Medium
Required Connects: 9
We’re looking for a Cybersecurity Forensic Investigator to dig into cyber breaches, analyze digital evidence, and help us uncover how incidents happen. You’ll use forensic tools to track down threats, figure out system vulnerabilities, and share insights to make our defenses stronger. If you’re detail-oriented, experienced in digital forensics, and comfortable handling sensitive data, we’d love to have you on the team!
Skills: Information Security, Penetration Testing, Encryption, Digital Forensics
Fixed budget: 200 USD
11 hours ago
  • IT & Networking, Information Security & Compliance
PCI DSS Consultant Needed in Bangalore
20 - 50 USD / hr
12 hours ago
Client Rank - Risky

Payment method not verified
1 open job
IN India
Risky
Required Connects: 7
We are seeking a qualified PCI DSS consultant based in Bangalore to assist our organization in achieving compliance with PCI DSS standards. The ideal candidate will conduct a thorough assessment of our current security measures, identify gaps, and provide actionable recommendations. You will work closely with our IT and security teams to implement these changes effectively. A strong understanding of payment card security regulations is essential. If you're passionate about helping organizations secure their payment systems, we would love to hear from you.
Skills: Network Security, Firewall, Information Security, Network Administration, PCI DSS
Hourly rate: 20 - 50 USD
12 hours ago
  • IT & Networking, Information Security & Compliance
Hotmail account recovery
not specified 12 hours ago
Client Rank - Risky

Payment method not verified
1 open job
US United States
Risky
Required Connects: 5
It has to do with recovering my hotmail account, it has been locked for months and can get recover it
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget: not specified
12 hours ago
  • Customer Service, Customer Service & Tech Support
Security Operations Center (SOC) Analyst
5 - 15 USD / hr
14 hours ago
Client Rank - Medium

Payment method verified
$646 total spent
4 hires , 12 active
3 jobs posted
100% hire rate, 4 open job
no reviews
Registered at: 11/07/2024
US United States
Medium
Required Connects: 15
We are seeking highly skilled SOC Analysts with expertise in Microsoft Sentinel to join our cybersecurity team. This role is ideal for individuals with the Microsoft SC-200 certification, Microsoft KQL knowledge, and a passion for cyber security monitoring, threat detection, and incident response.

Beyond the immediate responsibilities, this position offers growth opportunities into specialized areas such as incident response, security automation, and detection engineering for those who demonstrate strong technical abilities and a proactive mindset.

We are hiring for the following shifts:
Graveyard: 12a-8a PST
Day: 8a-4p PST
Swing: 4p to 12a PST
Flex: as-needed basis, during holidays or when other analysts are sick

Responsibilities
-Monitor, investigate, and respond to security events.
-Articulate thorough investigation notes for each alert processed.
-Develop and tune detection rules, playbooks, and alerting mechanisms to reduce false positives and improve alert accuracy.
-Collaborate with other team members to enhance the SOC's detection and response capabilities.
-Contribute to ongoing projects involving the tuning and optimization of alerts.
-Create dashboards to track metrics, such as MTTR.
-Provide recommendations for strengthening the organization's security posture.
-Stay informed about emerging threats, vulnerabilities, and technologies in cybersecurity.

What We’re Looking For
Preferred Certifications:
Microsoft SC-200 (Security Operations Analyst)
Microsoft AZ-500 (Azure Security Engineer Associate).
Microsoft SC-100 (Cybersecurity Architect Expert).

-Hands-on experience with Microsoft Sentinel or similar SIEM tools.
-Strong knowledge of incident response, threat detection, and security monitoring.
-Proven ability to optimize and fine-tune alerts for better detection accuracy.
-Familiarity with cloud environments, especially Microsoft Azure Security.
-Previous experience in demanding 24x7x365 environments

Future Growth Opportunities
This role is designed with a clear path for career advancement. Candidates who excel in their responsibilities and contribute to SOC operations may have the opportunity to transition into roles such as:

-Tier 2 or Tier 3 Analyst
-Incident Response Specialist
-Security Automation Engineer
-Detection Engineer
-Lead/Supervisor

We value individuals who bring innovative ideas and a collaborative spirit to our dynamic, fast-paced environment.

Why Join Us?
-Be part of a forward-thinking cybersecurity team with opportunities for professional growth.
-Receive access to world class training from senior leadership and training organizations such as SANS.
-Enjoy a competitive compensation and benefits package.
-If you're a motivated and skilled cybersecurity professional looking for a role that offers both challenge and growth, we'd love to hear from you!
Skills: Information Security, Phishing Detection, Cyber Incident Response, Security Automation, Detection Engineering, Security Analysis
Hourly rate: 5 - 15 USD
14 hours ago
  • IT & Networking, Information Security & Compliance
Help with a loved ones email access
not specified 15 hours ago
Client Rank - Risky

Payment method not verified
1 open job
US United States
Risky
Required Connects: 5
I need to get a password from a dead relative to get his medical and insurance documents in order. We never recovered his cell phone or personal computer. Not really sure how to retrieve the icloud password if I don't have the supporting equipment. Anyone else out there had to do this before? Any help would be greatly appreciated.
Skills: Security Assessment & Testing, Security Testing, Ethical Hacking, Internet Security, Network Penetration Testing, Penetration Testing, Website Security, Information Security Consultation, Network Security, System Security, Vulnerability Assessment, Information Security, Malware Removal
Budget: not specified
15 hours ago
  • IT & Networking, Information Security & Compliance
Information Assurance and Risk Management Project
10 - 30 USD 16 hours ago
Client Rank - Medium

Payment method verified
$438 total spent
1 hires
1 open job
5.00 of 2 reviews
Registered at: 29/11/2023
US United States
Medium
I'm seeking assistance for my final project in Information Assurance and Risk Management. The specifics of the project haven't been fully defined yet, so there's room for creativity and expertise input.

Ideal Skills:
- Strong background in Information Assurance and Risk Management
- Excellent research and analytical skills
- Ability to create engaging presentations or case studies
- Knowledge of data protection, threat mitigation and compliance
- Understanding of the target audience, primarily academic peers and industry professionals

Experience:
- Previous project or case study in the field
- Experience presenting to professionals or academics
- Demonstrated understanding of current trends in information security and risk management.

Skills: Research, Technical Writing, Report Writing, Research Writing, Business Writing
Fixed budget: 10 - 30 USD
16 hours ago
  • Writing & Content, Research, Technical Writing, Report Writing, Research Writing, Business Writing
Help me recover my stolen pokemon go account
not specified 17 hours ago
Client Rank - Risky

Payment method not verified
1 open job
GB United Kingdom
Risky
Required Connects: 5
Hi

I hope this message finds you well. I’m reaching out because I’ve been struggling to recover my Pokémon GO account, and I’m wondering if you might be able to help.

I’ve been playing Pokémon GO since its launch in 2016, and over the years, I’ve invested a lot of time and money into the game, creating countless memories along the way. Unfortunately, my account was hacked in August 2024. The hacker changed the email associated with the account, modified the username, and even deleted some of the items and progress I had worked so hard for.

I contacted Niantic, the creators of the game, but they informed me that they couldn’t assist further and suggested I create a new account. Starting over feels incredibly disheartening, as that account holds so much sentimental value to me.

I’ve exhausted every official avenue and don’t know where else to turn. I would be incredibly grateful if you could help me recover the account or offer any advice on what to do next.

Thank you so much for your time, and I appreciate any assistance you can provide.
Skills: Security Assessment & Testing, Security Testing, Ethical Hacking, Internet Security, Network Penetration Testing, Penetration Testing, Website Security, Information Security Consultation, Network Security, System Security, Vulnerability Assessment, Information Security, Malware Removal
Budget: not specified
17 hours ago
  • IT & Networking, Information Security & Compliance
Question: Accessing Old Text Messages
not specified 18 hours ago
Client Rank - Risky

Payment method not verified
1 open job
US United States
Risky
Required Connects: 5
I want help acquiring old text messages I sent in 2022 and 2023 from my cell phone. I still have this phone number. I am in the process of writing a book and need this information for context. My phone carrier, Verizon, has been a nightmare, telling me I need a subpoena or an open court case to request this. My attorney told me that a forensic investigator could assist me by accessing my phone records. Is this request possible?
Skills: Network Security, WordPress, Virus Removal, Penetration Testing, Information Security, Web Application Security, Malware Removal, Digital Forensics, Kali Linux, System Security, Cybersecurity Tool, Vulnerability Assessment, WordPress Malware Removal, Security Analysis
Budget: not specified
18 hours ago
  • IT & Networking, Information Security & Compliance
Cybersecurity Expert Needed for Ethical Hacking Consultations
40 - 70 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
1 open job
IN India
Risky
Required Connects: 7
We are seeking a skilled ethical hacker or cybersecurity expert to assist us in assessing and enhancing our security protocols. Your primary responsibilities will include performing penetration testing, identifying vulnerabilities, and providing actionable recommendations to strengthen our defenses against cyber threats. A strong understanding of network security, threat analysis, and risk assessment is essential. The ideal candidate will have a proven track record in ethical hacking and a passion for keeping systems secure.
Skills: Vulnerability Assessment, Encryption, Information Security, Firewall, Security Analysis
Hourly rate: 40 - 70 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Experienced Ethical Hacker for Web Penetration Testing
500 USD 1 day ago
Client Rank - Good

Payment method verified
$5'847 total spent
26 hires , 11 active
52 jobs posted
50% hire rate, 4 open job
16.34 /hr avg hourly rate paid
316 hours
4.19 of 14 reviews
Registered at: 13/07/2020
US United States
Good
Required Connects: 10
We are seeking a skilled ethical hacker to conduct comprehensive web penetration testing on our systems. The ideal candidate will have a strong understanding of web vulnerabilities and the ability to identify security weaknesses. You will be responsible for testing, reporting, and recommending solutions for our web applications. A proactive approach and strong communication skills are essential for collaborating with our development team. If you are passionate about cybersecurity and have a proven track record in ethical hacking, we would love to hear from you!
Skills: Penetration Testing, Vulnerability Assessment, Security Analysis, Information Security, Network Security
Fixed budget: 500 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Cyber Security Expert Trainer Needed for Penetration Testing Classes
not specified 1 day ago
Client Rank - Excellent

Payment method verified
$4'510 total spent
200 hires , 12 active
287 jobs posted
70% hire rate, 2 open job
9.26 /hr avg hourly rate paid
44 hours
4.98 of 170 reviews
Registered at: 04/12/2009
FI Finland
Excellent
Required Connects: 15
We're on the lookout for an awesome cyber security trainer who knows their stuff when it comes to penetration testing or red teaming. We want someone who's not just knowledgeable but also great at making classes fun and informative. If you've got a portfolio that shows off your skills and past training gigs, plus your pricing, we'd love to hear from you! Help us empower folks with the essential tools they need to tackle cyber security challenges!
Skills: Information Security, Encryption, Vulnerability Assessment, Penetration Testing, Network Security, Kali Linux, ISO 27001, Security Infrastructure, Security Analysis, Firewall
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
IT Expert/Ethical Hacker needed to help me overcome error message
250 USD 1 day ago
Client Rank - Medium

Payment method verified
$96 total spent
4 hires
32 jobs posted
13% hire rate, 1 open job
4.50 of 2 reviews
Registered at: 17/01/2018
NG Nigeria
Medium
Required Connects: 9
I need an IT expert/ethical hacker to assist me submit a visa application on the VFS Global website.

I'm trying to submit an application but am experiencing a bug that is preventing me from submitting my application.
Attached is a screenshot of the error message I'm getting.

I need urgent help, and am happy to pay $250 for this.

Visit this link:
https://visas-immigration.service.gov.uk/resume/c5bc9b7b-0316-4291-a1c7-994d60b85335

Password: Ianotoole1540%

Now click on "Provide documents & biometrics" and you'll be taken to VFS website.

Now try booking a date between Tuesday, 10th Dec to Friday 13th Dec. for location: Lagos (Ikeja).
Book a regular appointment (free) and be sure to select self-upload of docs (free).

Now try booking me a slot.
You will encounter the error message in the attachment.
I need your help to overcome that error message in the screenshot.

If you feel my posted budget is not enough for this, let me know your asking price, and I'll seriously consider it if you can do this

Message me!
Skills: Ethical Hacking, Encryption, Network Security, Information Security, Security Analysis, Firewall, Linux System Administration
Fixed budget: 250 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Job Title: Forensic Analysis and Commentary on Outlook Emails
not specified 1 day ago
Client Rank - Medium

Payment method verified
$27 total spent
1 hires
3 jobs posted
33% hire rate, 2 open job
10.00 /hr avg hourly rate paid
2 hours
5.00 of 1 reviews
Registered at: 21/05/2024
IN India
Medium
Required Connects: 9
We are seeking a skilled digital forensics expert to perform two tasks:
1. Analysis of Outlook Email Format
• Provide a comprehensive technical report on the structure, encoding, and metadata of Outlook emails stored in PST/OST format.
• Include details on how to extract, interpret, and validate key metadata (e.g., headers, timestamps, sender/recipient information, etc.) for forensic purposes.
• Highlight any common anomalies or red flags to look out for in email analysis.
2. Review and Commentary on an Existing Email Analysis Report
• Provide expert commentary on the findings of an already-prepared email analysis report (without identifying the author).
• Critically assess whether the analysis was thorough, accurate, and in line with digital forensic best practices.
• Offer recommendations for improvement or alternative approaches if necessary.

Requirements:

• Proven experience in digital forensics and email analysis, particularly with Outlook PST/OST formats.
• Familiarity with industry-standard tools such as FTK, EnCase, or SleuthKit/Autopsy.
• Strong understanding of email metadata, headers, and forensic methodologies.
• Ability to deliver a clear, concise, and professional report.

Deliverables:

• A detailed technical report on Outlook email format and forensic considerations.
• A critical review of the provided email analysis report, including strengths, weaknesses, and suggestions for improvement.

Budget:

Flexible depending on experience and quality of deliverables.

Timeline:

Report and commentary are required within 10 days of accepting the project.

Additional Notes:

Confidentiality is critical. The provided analysis report must be reviewed without referencing the identity of its preparer or affiliated organization. Please confirm your agreement to this confidentiality requirement in your proposal.
Skills: Technical Writing, Intrusion Prevention System, Information Technology, Intrusion Detection System, Network Security, Computer Network, Digital Forensics, Website Security, Kali Linux, PfSense, Network Analysis, Ethical Hacking, Information Security, Wireshark, Snort
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
Removal
not specified 1 day ago
Client Rank - Risky

Payment method not verified
1 open job
no reviews
Registered at: 07/12/2024
GB United Kingdom
Risky
Required Connects: 7
Remove an explicit photo of me off the internet. The internet in question is fastimages (dot) org

Please let me know if you are able to remove thumbnails off of this website

I’m unsure of the skills you’d need for this so ignore the ones I have added
Skills: Information Security, SOC 2 Report, ISO 27001, Governance, Risk Management & Compliance, Compliance, Information Security Audit, Data Privacy, NIST SP 800-53, GDPR, HIPAA, NIST Cybersecurity Framework, Security Framework, Microsoft SQL Server, Risk Management, CMMC
Budget: not specified
1 day ago
  • IT & Networking, DevOps & Solution Architecture
Assistance Needed for Recovering Hacked Instagram Account
15 - 50 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
1 open job
AU Australia
Risky
Required Connects: 7
I am seeking an experienced hacker to help me regain access to my hacked Instagram account. The account is crucial for my personal and professional communications, and I need someone with proven skills in account recovery and digital security. Please provide your expertise, previous success stories, and any relevant tools you plan to use to assist with this issue.
Skills: Ethical Hacking, Instagram, Social Media Management, Information Security
Hourly rate: 15 - 50 USD
1 day ago
  • IT & Networking, Information Security & Compliance
ISO 27002 Compliance Consultant for Human Resources Security
5 USD 1 day ago
Client Rank - Risky

Payment method not verified
1 open job
SA Saudi Arabia
Risky
Required Connects: 6
We are seeking an experienced consultant to help us implement Human Resources security measures in accordance with ISO 27002 standards. The ideal candidate will have a strong background in information security and human resources, with the ability to assess current practices, develop compliant policies, and provide training and guidance to our HR team. Your expertise will be crucial in ensuring our HR processes align with best practices in information security management. If you possess deep knowledge of ISO 27002 and experience in HR security protocols, we want to hear from you!
Skills: ISO 27001, Information Security, Vulnerability Assessment, HIPAA, ISO 9001
Fixed budget: 5 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Website maintenance and security
20 - 50 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
1 open job
CA Canada
Risky
Required Connects: 7
Implement changes per my request.
Keep software up to date
Wordpress
Plugins
Theme (possibly upgrade theme)
Performed a few searches for my site on Google and Bing browsers so that the site appears in search in response to changes to Google/Bing that change titles and descriptions
Basic on-page SEO using Yoast plugin.
Skills: WordPress, Website Security, Web Development, Internet Security, Information Security
Hourly rate: 20 - 50 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Data scraping
not specified 1 day ago
Client Rank - Medium

Payment method verified
1 open job
US United States
Medium
Required Connects: 6
I am trying to hire someone to find the email/phone number of an Instagram account that is defaming me. Instagram will not take down the account because they say it does not meet the requirements for harassment, but this account is using my full name and a photo of me that is only accessible from a private instagram. Therefore, I have reason to believe it is someone known to me and want to look into what kind of legal action is plausible. Are you able to pull this type of data?
Skills: Penetration Testing, Network Security, Security Testing, Vulnerability Assessment, Information Security, Certified Information Systems Security Professional, Information Security Audit, Web Application Security, OWASP, Website Security
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
Teach us Pen-Testing (Web Application Penetration Testing)
300 USD 1 day ago
Client Rank - Excellent

Payment method verified
$348'572 total spent
47 hires
70 jobs posted
67% hire rate, 2 open job
14.04 /hr avg hourly rate paid
23651 hours
4.95 of 40 reviews
Registered at: 09/08/2017
US United States
Excellent
Featured
Required Connects: 10
We are seeking a skilled and experienced penetration tester to perform a comprehensive security assessment of our systems in a collaborative, hands-on manner. This is not a typical penetration testing assignment—we want to actively observe, learn, and participate in the process as you execute the tests.

The ultimate goal is to perform a pen test on one of our products AND learn more about your workflow, methodologies, and tools.

We have provided you with an extensive list of tests to execute (Appendix 1 in the attached JD), but we encourage you to supplement this list with additional tests based on your expertise. The entire process will be observed, recorded, and analyzed.

For more information, please refer to the attached long-form job description.

If you’re passionate about ethical hacking and enjoy sharing your knowledge, we’d love to hear from you!
Skills: Penetration Testing, Information Security, Security Analysis, Vulnerability Assessment, Web Application Security, Network Security, Application Security
Fixed budget: 300 USD
1 day ago
  • IT & Networking, Information Security & Compliance
WordPress Security Expert Needed to Restore Hacked Blogs
100 USD 2 days ago
Client Rank - Excellent

Payment method verified
$38'004 total spent
31 hires , 1 active
15 jobs posted
100% hire rate, 1 open job
22.57 /hr avg hourly rate paid
1354 hours
4.00 of 30 reviews
Registered at: 16/11/2019
DE Germany
Excellent
Required Connects: 10
I am looking for an experienced WordPress security specialist to help recover and secure three of my blogs, intimarzt.de, smarthealth.de and online-hautarzt.net, which have been compromised. Both sites are either redirecting to fraudulent pages or are unresponsive. Your expertise is essential to identify vulnerabilities, remove malware, and ensure that the sites are fully operational again. Please provide examples of previous work in similar situations. I need someone reliable who can start immediately and ensure robust security measures moving forward. I will provide FTP access. Please also install security features so this is prevented from happening again.
Skills: WordPress, Internet Security, Security Analysis, Information Security
Fixed budget: 100 USD
2 days ago
  • IT & Networking, Information Security & Compliance
SOC report
5 - 100 USD / hr
2 days ago
Client Rank - Excellent

Payment method verified
$6'323 total spent
12 hires , 3 active
43 jobs posted
28% hire rate, 1 open job
23.75 /hr avg hourly rate paid
224 hours
4.94 of 12 reviews
Registered at: 01/12/2021
US United States
Excellent
Required Connects: 15
Only freelancers located in the U.S. may apply.
I am looking for someone to conduct a SOC report on my company, i do insurance. im looking on about the cost and how much time would it take you to run a SOC report. Companies i am dealing with need a SOC report
Skills: ISO 27001, Information Security, Vulnerability Assessment, Security Analysis, Kali Linux, Penetration Testing, Academic Writing, Report Writing, Information Security Audit, Security Infrastructure
Hourly rate: 5 - 100 USD
2 days ago
  • IT & Networking, Information Security & Compliance
I need to login to my instagram account
not specified 2 days ago
Client Rank - Risky

Payment method not verified
1 open job
MY Malaysia
Risky
Required Connects: 5
i already knew a password but the account have a two authentication , i dont have a code.Can u help me to get my account back?
Skills: Information Security, SOC 2 Report, ISO 27001, Governance, Risk Management & Compliance, Compliance, Information Security Audit, Data Privacy, NIST SP 800-53, GDPR, HIPAA, NIST Cybersecurity Framework, Security Framework, Microsoft SQL Server, Risk Management, CMMC
Budget: not specified
2 days ago
  • IT & Networking, Information Security & Compliance
Hacking a Scammers website
not specified 2 days ago
Client Rank - Risky

Payment method not verified
1 open job
IN India
Risky
Required Connects: 5
Hi mate, my name is Pritpal Singh. I currently finding a Professional Hacker, which can solve my problem. Actually I became a victim of a fraud/scammer website, in which I have deposited all my savings. So I want someone who can hack that website and help me to get my money back. And I think you will be best for this work. I can pay you good amount for this work.
Skills: Encryption, Information Security, Teaching Algebra, Mathematics Tutoring, C++, Proofreading, Cryptography, Calculus, Elliptic Curve Cryptography, Mathematics
Budget: not specified
2 days ago
  • IT & Networking, Information Security & Compliance
Call to action
Freelancing is a business
Make it more profitable with Vollna

Streamline your Upwork workflow and boost your earnings with our smart job search and filtering tools. Find better clients and land more contracts.