Job Title | Budget | ||||
---|---|---|---|---|---|
Cybersecurity Strategy and Infrastructure
|
10,000 USD | 59 minutes ago |
Client Rank
- Risky
1 open job
Portugal
|
||
Required Connects: 7
I am launching an online marketplace for in person workshops in Portugal called Hands On. We have a website live but are looking to have some help building some cybersecurity protocols and infrastructure. Our website is live handson.pt. Please could you provide a quote and what would be included.
Best, Tom
Skills: Security Policies & Procedures Documentation, Cybersecurity Management, Information Security, Certified Information Systems Security Professional, Information Security Audit, SOC 2 Report, AI Security, SOC 2, ISO 27001, Insurance & Risk Management, GDPR, Information Security Consultation, NIST Cybersecurity Framework, Cloud Security Framework, Governance, Risk & Compliance Software
Fixed budget:
10,000 USD
59 minutes ago
|
|||||
Cybersecurity Study Participant
|
20 USD | 4 hours ago |
Client Rank
- Excellent
$17'477 total spent
131 hires
, 47 active
206 jobs posted
64% hire rate,
3 open job
8.41 /hr avg hourly rate paid
1005 hours
4.45
of 84 reviews
Registered at: 14/05/2020
United States
|
||
Required Connects: 8
Hello Cybersecurity Professionals,
I am a PhD student conducting a study titled: Deepfake Phishing Risks: Detection, Limitations, and Countermeasures. This research aims to explore the threats posed by deepfake technology in phishing campaigns and identify effective mitigation strategies. Your expertise will provide valuable insights to advance the cybersecurity field. Key Details: Compensation: Participants will receive a small monetary reward after completing all rounds of the study questionnaires. Access to Findings: Upon completion, you will have access to the final study results, providing a deeper understanding of this emerging threat landscape. Participant Requirements: Must be at least 18 years old. Currently or previously employed in a cybersecurity role with authority to guide organizational security strategy. Hold or have held titles such as (but not limited to): Director of Information Security Chief Information Security Officer (CISO) Information Security Officer Information Security Manager Study Format: This study employs the Delphi methodology, involving multiple rounds of online questionnaires. After the initial round, you will receive anonymized feedback from your peers, and subsequent rounds will refine the responses until consensus is reached. Privacy and Ethics: This study adheres to strict ethical and privacy guidelines as established by the Institutional Review Board (IRB). By participating, you will not only contribute to the cybersecurity community but also help shape the strategies to combat deepfake phishing threats effectively. Thank you for considering this opportunity to make a meaningful impact in the fight against advanced phishing threats.
Skills: Information Security
Fixed budget:
20 USD
4 hours ago
|
|||||
Need Ethical Hacker for Security Assessment
|
65 - 150 USD
/ hr
|
6 hours ago |
Client Rank
- Risky
1 open job
United States
|
||
Required Connects: 7
Only freelancers located in the U.S. may apply.
**Job Description:**
Seeking a skilled ethical hacker for a security assessment of my partner's phone due to safety concerns for myself and my children. I worry constantly that he is doing illegal things that would put my boys and me in harm's way. I just have to know the truth. The ideal candidate should be discreet, trustworthy, and experienced in mobile device security. Please share your qualifications and prior experience in similar cases.
Skills: Security Analysis, Vulnerability Assessment, Penetration Testing, Information Security, Encryption
Hourly rate:
65 - 150 USD
6 hours ago
|
|||||
Tracking down scammers from two phone numbers
|
not specified | 6 hours ago |
Client Rank
- Risky
1 open job
Singapore
|
||
Required Connects: 5
Will provide the two Singapore numbers used by the hackers on email
Skills: Ethical Hacking, Vulnerability Assessment, Network Security, System Security, Information Security, DevOps, Python, Technical Writing, Encryption, Kali Linux, Academic Research, Web App Penetration Testing, Network Penetration Testing, System Administration
Budget:
not specified
6 hours ago
|
|||||
Hotmail account recovery
|
not specified | 8 hours ago |
Client Rank
- Medium
1 open job
United States
|
||
Required Connects: 7
It has to do with recovering my hotmail account, it has been locked for months and can’t get recover it.
Not looking for second parties or have to buy ecrypts
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget:
not specified
8 hours ago
|
|||||
Cybersecurity Expert Needed to Track Bank Account Hacker
|
100 USD | 8 hours ago |
Client Rank
- Excellent
$22'239 total spent
51 hires
, 12 active
83 jobs posted
61% hire rate,
1 open job
4.11 /hr avg hourly rate paid
4189 hours
4.36
of 32 reviews
Registered at: 08/09/2013
United States
|
||
Required Connects: 10
I am seeking a skilled cybersecurity professional to assist in tracking a hacker who has attempted unauthorized access to my bank account. The ideal candidate should have experience in digital forensics, threat analysis, and online security protocols. Your expertise will be crucial in identifying the source of the breach and implementing measures to prevent future incidents. If you have a strong background in cybersecurity and a proven track record in similar cases, I would love to hear from you.
Skills: Encryption, Firewall, Vulnerability Assessment, Information Security, Ethical Hacking
Fixed budget:
100 USD
8 hours ago
|
|||||
Security issues
|
not specified | 9 hours ago |
Client Rank
- Risky
1 open job
Hungary
|
||
Required Connects: 5
I have an issue regarding my email and password in which i have big consequences in case i can’t log in
Skills: Security Assessment & Testing, Security Testing, Ethical Hacking, Internet Security, Network Penetration Testing, Penetration Testing, Website Security, Information Security Consultation, Network Security, System Security, Vulnerability Assessment, Information Security, Malware Removal
Budget:
not specified
9 hours ago
|
|||||
Cyber security Forensic Investigator
|
200 USD | 11 hours ago |
Client Rank
- Medium
$450 total spent
5 hires
2 jobs posted
100% hire rate,
2 open job
5.00
of 4 reviews
Registered at: 08/08/2024
Canada
|
||
Required Connects: 9
We’re looking for a Cybersecurity Forensic Investigator to dig into cyber breaches, analyze digital evidence, and help us uncover how incidents happen. You’ll use forensic tools to track down threats, figure out system vulnerabilities, and share insights to make our defenses stronger. If you’re detail-oriented, experienced in digital forensics, and comfortable handling sensitive data, we’d love to have you on the team!
Skills: Information Security, Penetration Testing, Encryption, Digital Forensics
Fixed budget:
200 USD
11 hours ago
|
|||||
PCI DSS Consultant Needed in Bangalore
|
20 - 50 USD
/ hr
|
12 hours ago |
Client Rank
- Risky
1 open job
India
|
||
Required Connects: 7
We are seeking a qualified PCI DSS consultant based in Bangalore to assist our organization in achieving compliance with PCI DSS standards. The ideal candidate will conduct a thorough assessment of our current security measures, identify gaps, and provide actionable recommendations. You will work closely with our IT and security teams to implement these changes effectively. A strong understanding of payment card security regulations is essential. If you're passionate about helping organizations secure their payment systems, we would love to hear from you.
Skills: Network Security, Firewall, Information Security, Network Administration, PCI DSS
Hourly rate:
20 - 50 USD
12 hours ago
|
|||||
Hotmail account recovery
|
not specified | 12 hours ago |
Client Rank
- Risky
1 open job
United States
|
||
Required Connects: 5
It has to do with recovering my hotmail account, it has been locked for months and can get recover it
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget:
not specified
12 hours ago
|
|||||
Security Operations Center (SOC) Analyst
|
5 - 15 USD
/ hr
|
14 hours ago |
Client Rank
- Medium
$646 total spent
4 hires
, 12 active
3 jobs posted
100% hire rate,
4 open job
Registered at: 11/07/2024
United States
|
||
Required Connects: 15
We are seeking highly skilled SOC Analysts with expertise in Microsoft Sentinel to join our cybersecurity team. This role is ideal for individuals with the Microsoft SC-200 certification, Microsoft KQL knowledge, and a passion for cyber security monitoring, threat detection, and incident response.
Beyond the immediate responsibilities, this position offers growth opportunities into specialized areas such as incident response, security automation, and detection engineering for those who demonstrate strong technical abilities and a proactive mindset. We are hiring for the following shifts: Graveyard: 12a-8a PST Day: 8a-4p PST Swing: 4p to 12a PST Flex: as-needed basis, during holidays or when other analysts are sick Responsibilities -Monitor, investigate, and respond to security events. -Articulate thorough investigation notes for each alert processed. -Develop and tune detection rules, playbooks, and alerting mechanisms to reduce false positives and improve alert accuracy. -Collaborate with other team members to enhance the SOC's detection and response capabilities. -Contribute to ongoing projects involving the tuning and optimization of alerts. -Create dashboards to track metrics, such as MTTR. -Provide recommendations for strengthening the organization's security posture. -Stay informed about emerging threats, vulnerabilities, and technologies in cybersecurity. What We’re Looking For Preferred Certifications: Microsoft SC-200 (Security Operations Analyst) Microsoft AZ-500 (Azure Security Engineer Associate). Microsoft SC-100 (Cybersecurity Architect Expert). -Hands-on experience with Microsoft Sentinel or similar SIEM tools. -Strong knowledge of incident response, threat detection, and security monitoring. -Proven ability to optimize and fine-tune alerts for better detection accuracy. -Familiarity with cloud environments, especially Microsoft Azure Security. -Previous experience in demanding 24x7x365 environments Future Growth Opportunities This role is designed with a clear path for career advancement. Candidates who excel in their responsibilities and contribute to SOC operations may have the opportunity to transition into roles such as: -Tier 2 or Tier 3 Analyst -Incident Response Specialist -Security Automation Engineer -Detection Engineer -Lead/Supervisor We value individuals who bring innovative ideas and a collaborative spirit to our dynamic, fast-paced environment. Why Join Us? -Be part of a forward-thinking cybersecurity team with opportunities for professional growth. -Receive access to world class training from senior leadership and training organizations such as SANS. -Enjoy a competitive compensation and benefits package. -If you're a motivated and skilled cybersecurity professional looking for a role that offers both challenge and growth, we'd love to hear from you!
Skills: Information Security, Phishing Detection, Cyber Incident Response, Security Automation, Detection Engineering, Security Analysis
Hourly rate:
5 - 15 USD
14 hours ago
|
|||||
Help with a loved ones email access
|
not specified | 15 hours ago |
Client Rank
- Risky
1 open job
United States
|
||
Required Connects: 5
I need to get a password from a dead relative to get his medical and insurance documents in order. We never recovered his cell phone or personal computer. Not really sure how to retrieve the icloud password if I don't have the supporting equipment. Anyone else out there had to do this before? Any help would be greatly appreciated.
Skills: Security Assessment & Testing, Security Testing, Ethical Hacking, Internet Security, Network Penetration Testing, Penetration Testing, Website Security, Information Security Consultation, Network Security, System Security, Vulnerability Assessment, Information Security, Malware Removal
Budget:
not specified
15 hours ago
|
|||||
Information Assurance and Risk Management Project
|
10 - 30 USD | 16 hours ago |
Client Rank
- Medium
$438 total spent
1 hires
1 open job
5.00
of 2 reviews
Registered at: 29/11/2023
United States
|
||
I'm seeking assistance for my final project in Information Assurance and Risk Management. The specifics of the project haven't been fully defined yet, so there's room for creativity and expertise input.
Ideal Skills: - Strong background in Information Assurance and Risk Management - Excellent research and analytical skills - Ability to create engaging presentations or case studies - Knowledge of data protection, threat mitigation and compliance - Understanding of the target audience, primarily academic peers and industry professionals Experience: - Previous project or case study in the field - Experience presenting to professionals or academics - Demonstrated understanding of current trends in information security and risk management. Skills: Research, Technical Writing, Report Writing, Research Writing, Business Writing
Fixed budget:
10 - 30 USD
16 hours ago
|
|||||
Help me recover my stolen pokemon go account
|
not specified | 17 hours ago |
Client Rank
- Risky
1 open job
United Kingdom
|
||
Required Connects: 5
Hi
I hope this message finds you well. I’m reaching out because I’ve been struggling to recover my Pokémon GO account, and I’m wondering if you might be able to help. I’ve been playing Pokémon GO since its launch in 2016, and over the years, I’ve invested a lot of time and money into the game, creating countless memories along the way. Unfortunately, my account was hacked in August 2024. The hacker changed the email associated with the account, modified the username, and even deleted some of the items and progress I had worked so hard for. I contacted Niantic, the creators of the game, but they informed me that they couldn’t assist further and suggested I create a new account. Starting over feels incredibly disheartening, as that account holds so much sentimental value to me. I’ve exhausted every official avenue and don’t know where else to turn. I would be incredibly grateful if you could help me recover the account or offer any advice on what to do next. Thank you so much for your time, and I appreciate any assistance you can provide.
Skills: Security Assessment & Testing, Security Testing, Ethical Hacking, Internet Security, Network Penetration Testing, Penetration Testing, Website Security, Information Security Consultation, Network Security, System Security, Vulnerability Assessment, Information Security, Malware Removal
Budget:
not specified
17 hours ago
|
|||||
Question: Accessing Old Text Messages
|
not specified | 18 hours ago |
Client Rank
- Risky
1 open job
United States
|
||
Required Connects: 5
I want help acquiring old text messages I sent in 2022 and 2023 from my cell phone. I still have this phone number. I am in the process of writing a book and need this information for context. My phone carrier, Verizon, has been a nightmare, telling me I need a subpoena or an open court case to request this. My attorney told me that a forensic investigator could assist me by accessing my phone records. Is this request possible?
Skills: Network Security, WordPress, Virus Removal, Penetration Testing, Information Security, Web Application Security, Malware Removal, Digital Forensics, Kali Linux, System Security, Cybersecurity Tool, Vulnerability Assessment, WordPress Malware Removal, Security Analysis
Budget:
not specified
18 hours ago
|
|||||
Cybersecurity Expert Needed for Ethical Hacking Consultations
|
40 - 70 USD
/ hr
|
1 day ago |
Client Rank
- Risky
1 open job
India
|
||
Required Connects: 7
We are seeking a skilled ethical hacker or cybersecurity expert to assist us in assessing and enhancing our security protocols. Your primary responsibilities will include performing penetration testing, identifying vulnerabilities, and providing actionable recommendations to strengthen our defenses against cyber threats. A strong understanding of network security, threat analysis, and risk assessment is essential. The ideal candidate will have a proven track record in ethical hacking and a passion for keeping systems secure.
Skills: Vulnerability Assessment, Encryption, Information Security, Firewall, Security Analysis
Hourly rate:
40 - 70 USD
1 day ago
|
|||||
Experienced Ethical Hacker for Web Penetration Testing
|
500 USD | 1 day ago |
Client Rank
- Good
$5'847 total spent
26 hires
, 11 active
52 jobs posted
50% hire rate,
4 open job
16.34 /hr avg hourly rate paid
316 hours
4.19
of 14 reviews
Registered at: 13/07/2020
United States
|
||
Required Connects: 10
We are seeking a skilled ethical hacker to conduct comprehensive web penetration testing on our systems. The ideal candidate will have a strong understanding of web vulnerabilities and the ability to identify security weaknesses. You will be responsible for testing, reporting, and recommending solutions for our web applications. A proactive approach and strong communication skills are essential for collaborating with our development team. If you are passionate about cybersecurity and have a proven track record in ethical hacking, we would love to hear from you!
Skills: Penetration Testing, Vulnerability Assessment, Security Analysis, Information Security, Network Security
Fixed budget:
500 USD
1 day ago
|
|||||
Cyber Security Expert Trainer Needed for Penetration Testing Classes
|
not specified | 1 day ago |
Client Rank
- Excellent
$4'510 total spent
200 hires
, 12 active
287 jobs posted
70% hire rate,
2 open job
9.26 /hr avg hourly rate paid
44 hours
4.98
of 170 reviews
Registered at: 04/12/2009
Finland
|
||
Required Connects: 15
We're on the lookout for an awesome cyber security trainer who knows their stuff when it comes to penetration testing or red teaming. We want someone who's not just knowledgeable but also great at making classes fun and informative. If you've got a portfolio that shows off your skills and past training gigs, plus your pricing, we'd love to hear from you! Help us empower folks with the essential tools they need to tackle cyber security challenges!
Skills: Information Security, Encryption, Vulnerability Assessment, Penetration Testing, Network Security, Kali Linux, ISO 27001, Security Infrastructure, Security Analysis, Firewall
Budget:
not specified
1 day ago
|
|||||
IT Expert/Ethical Hacker needed to help me overcome error message
|
250 USD | 1 day ago |
Client Rank
- Medium
$96 total spent
4 hires
32 jobs posted
13% hire rate,
1 open job
4.50
of 2 reviews
Registered at: 17/01/2018
Nigeria
|
||
Required Connects: 9
I need an IT expert/ethical hacker to assist me submit a visa application on the VFS Global website.
I'm trying to submit an application but am experiencing a bug that is preventing me from submitting my application. Attached is a screenshot of the error message I'm getting. I need urgent help, and am happy to pay $250 for this. Visit this link: https://visas-immigration.service.gov.uk/resume/c5bc9b7b-0316-4291-a1c7-994d60b85335 Password: Ianotoole1540% Now click on "Provide documents & biometrics" and you'll be taken to VFS website. Now try booking a date between Tuesday, 10th Dec to Friday 13th Dec. for location: Lagos (Ikeja). Book a regular appointment (free) and be sure to select self-upload of docs (free). Now try booking me a slot. You will encounter the error message in the attachment. I need your help to overcome that error message in the screenshot. If you feel my posted budget is not enough for this, let me know your asking price, and I'll seriously consider it if you can do this Message me!
Skills: Ethical Hacking, Encryption, Network Security, Information Security, Security Analysis, Firewall, Linux System Administration
Fixed budget:
250 USD
1 day ago
|
|||||
Job Title: Forensic Analysis and Commentary on Outlook Emails
|
not specified | 1 day ago |
Client Rank
- Medium
$27 total spent
1 hires
3 jobs posted
33% hire rate,
2 open job
10.00 /hr avg hourly rate paid
2 hours
5.00
of 1 reviews
Registered at: 21/05/2024
India
|
||
Required Connects: 9
We are seeking a skilled digital forensics expert to perform two tasks:
1. Analysis of Outlook Email Format • Provide a comprehensive technical report on the structure, encoding, and metadata of Outlook emails stored in PST/OST format. • Include details on how to extract, interpret, and validate key metadata (e.g., headers, timestamps, sender/recipient information, etc.) for forensic purposes. • Highlight any common anomalies or red flags to look out for in email analysis. 2. Review and Commentary on an Existing Email Analysis Report • Provide expert commentary on the findings of an already-prepared email analysis report (without identifying the author). • Critically assess whether the analysis was thorough, accurate, and in line with digital forensic best practices. • Offer recommendations for improvement or alternative approaches if necessary. Requirements: • Proven experience in digital forensics and email analysis, particularly with Outlook PST/OST formats. • Familiarity with industry-standard tools such as FTK, EnCase, or SleuthKit/Autopsy. • Strong understanding of email metadata, headers, and forensic methodologies. • Ability to deliver a clear, concise, and professional report. Deliverables: • A detailed technical report on Outlook email format and forensic considerations. • A critical review of the provided email analysis report, including strengths, weaknesses, and suggestions for improvement. Budget: Flexible depending on experience and quality of deliverables. Timeline: Report and commentary are required within 10 days of accepting the project. Additional Notes: Confidentiality is critical. The provided analysis report must be reviewed without referencing the identity of its preparer or affiliated organization. Please confirm your agreement to this confidentiality requirement in your proposal.
Skills: Technical Writing, Intrusion Prevention System, Information Technology, Intrusion Detection System, Network Security, Computer Network, Digital Forensics, Website Security, Kali Linux, PfSense, Network Analysis, Ethical Hacking, Information Security, Wireshark, Snort
Budget:
not specified
1 day ago
|
|||||
Removal
|
not specified | 1 day ago |
Client Rank
- Risky
1 open job
Registered at: 07/12/2024
United Kingdom
|
||
Required Connects: 7
Remove an explicit photo of me off the internet. The internet in question is fastimages (dot) org
Please let me know if you are able to remove thumbnails off of this website I’m unsure of the skills you’d need for this so ignore the ones I have added
Skills: Information Security, SOC 2 Report, ISO 27001, Governance, Risk Management & Compliance, Compliance, Information Security Audit, Data Privacy, NIST SP 800-53, GDPR, HIPAA, NIST Cybersecurity Framework, Security Framework, Microsoft SQL Server, Risk Management, CMMC
Budget:
not specified
1 day ago
|
|||||
Assistance Needed for Recovering Hacked Instagram Account
|
15 - 50 USD
/ hr
|
1 day ago |
Client Rank
- Risky
1 open job
Australia
|
||
Required Connects: 7
I am seeking an experienced hacker to help me regain access to my hacked Instagram account. The account is crucial for my personal and professional communications, and I need someone with proven skills in account recovery and digital security. Please provide your expertise, previous success stories, and any relevant tools you plan to use to assist with this issue.
Skills: Ethical Hacking, Instagram, Social Media Management, Information Security
Hourly rate:
15 - 50 USD
1 day ago
|
|||||
ISO 27002 Compliance Consultant for Human Resources Security
|
5 USD | 1 day ago |
Client Rank
- Risky
1 open job
Saudi Arabia
|
||
Required Connects: 6
We are seeking an experienced consultant to help us implement Human Resources security measures in accordance with ISO 27002 standards. The ideal candidate will have a strong background in information security and human resources, with the ability to assess current practices, develop compliant policies, and provide training and guidance to our HR team. Your expertise will be crucial in ensuring our HR processes align with best practices in information security management. If you possess deep knowledge of ISO 27002 and experience in HR security protocols, we want to hear from you!
Skills: ISO 27001, Information Security, Vulnerability Assessment, HIPAA, ISO 9001
Fixed budget:
5 USD
1 day ago
|
|||||
Website maintenance and security
|
20 - 50 USD
/ hr
|
1 day ago |
Client Rank
- Risky
1 open job
Canada
|
||
Required Connects: 7
Implement changes per my request.
Keep software up to date Wordpress Plugins Theme (possibly upgrade theme) Performed a few searches for my site on Google and Bing browsers so that the site appears in search in response to changes to Google/Bing that change titles and descriptions Basic on-page SEO using Yoast plugin.
Skills: WordPress, Website Security, Web Development, Internet Security, Information Security
Hourly rate:
20 - 50 USD
1 day ago
|
|||||
Data scraping
|
not specified | 1 day ago |
Client Rank
- Medium
1 open job
United States
|
||
Required Connects: 6
I am trying to hire someone to find the email/phone number of an Instagram account that is defaming me. Instagram will not take down the account because they say it does not meet the requirements for harassment, but this account is using my full name and a photo of me that is only accessible from a private instagram. Therefore, I have reason to believe it is someone known to me and want to look into what kind of legal action is plausible. Are you able to pull this type of data?
Skills: Penetration Testing, Network Security, Security Testing, Vulnerability Assessment, Information Security, Certified Information Systems Security Professional, Information Security Audit, Web Application Security, OWASP, Website Security
Budget:
not specified
1 day ago
|
|||||
Teach us Pen-Testing (Web Application Penetration Testing)
|
300 USD | 1 day ago |
Client Rank
- Excellent
$348'572 total spent
47 hires
70 jobs posted
67% hire rate,
2 open job
14.04 /hr avg hourly rate paid
23651 hours
4.95
of 40 reviews
Registered at: 09/08/2017
United States
|
||
Featured
Required Connects: 10
We are seeking a skilled and experienced penetration tester to perform a comprehensive security assessment of our systems in a collaborative, hands-on manner. This is not a typical penetration testing assignment—we want to actively observe, learn, and participate in the process as you execute the tests.
The ultimate goal is to perform a pen test on one of our products AND learn more about your workflow, methodologies, and tools. We have provided you with an extensive list of tests to execute (Appendix 1 in the attached JD), but we encourage you to supplement this list with additional tests based on your expertise. The entire process will be observed, recorded, and analyzed. For more information, please refer to the attached long-form job description. If you’re passionate about ethical hacking and enjoy sharing your knowledge, we’d love to hear from you!
Skills: Penetration Testing, Information Security, Security Analysis, Vulnerability Assessment, Web Application Security, Network Security, Application Security
Fixed budget:
300 USD
1 day ago
|
|||||
WordPress Security Expert Needed to Restore Hacked Blogs
|
100 USD | 2 days ago |
Client Rank
- Excellent
$38'004 total spent
31 hires
, 1 active
15 jobs posted
100% hire rate,
1 open job
22.57 /hr avg hourly rate paid
1354 hours
4.00
of 30 reviews
Registered at: 16/11/2019
Germany
|
||
Required Connects: 10
I am looking for an experienced WordPress security specialist to help recover and secure three of my blogs, intimarzt.de, smarthealth.de and online-hautarzt.net, which have been compromised. Both sites are either redirecting to fraudulent pages or are unresponsive. Your expertise is essential to identify vulnerabilities, remove malware, and ensure that the sites are fully operational again. Please provide examples of previous work in similar situations. I need someone reliable who can start immediately and ensure robust security measures moving forward. I will provide FTP access. Please also install security features so this is prevented from happening again.
Skills: WordPress, Internet Security, Security Analysis, Information Security
Fixed budget:
100 USD
2 days ago
|
|||||
SOC report
|
5 - 100 USD
/ hr
|
2 days ago |
Client Rank
- Excellent
$6'323 total spent
12 hires
, 3 active
43 jobs posted
28% hire rate,
1 open job
23.75 /hr avg hourly rate paid
224 hours
4.94
of 12 reviews
Registered at: 01/12/2021
United States
|
||
Required Connects: 15
Only freelancers located in the U.S. may apply.
I am looking for someone to conduct a SOC report on my company, i do insurance. im looking on about the cost and how much time would it take you to run a SOC report. Companies i am dealing with need a SOC report
Skills: ISO 27001, Information Security, Vulnerability Assessment, Security Analysis, Kali Linux, Penetration Testing, Academic Writing, Report Writing, Information Security Audit, Security Infrastructure
Hourly rate:
5 - 100 USD
2 days ago
|
|||||
I need to login to my instagram account
|
not specified | 2 days ago |
Client Rank
- Risky
1 open job
Malaysia
|
||
Required Connects: 5
i already knew a password but the account have a two authentication , i dont have a code.Can u help me to get my account back?
Skills: Information Security, SOC 2 Report, ISO 27001, Governance, Risk Management & Compliance, Compliance, Information Security Audit, Data Privacy, NIST SP 800-53, GDPR, HIPAA, NIST Cybersecurity Framework, Security Framework, Microsoft SQL Server, Risk Management, CMMC
Budget:
not specified
2 days ago
|
|||||
Hacking a Scammers website
|
not specified | 2 days ago |
Client Rank
- Risky
1 open job
India
|
||
Required Connects: 5
Hi mate, my name is Pritpal Singh. I currently finding a Professional Hacker, which can solve my problem. Actually I became a victim of a fraud/scammer website, in which I have deposited all my savings. So I want someone who can hack that website and help me to get my money back. And I think you will be best for this work. I can pay you good amount for this work.
Skills: Encryption, Information Security, Teaching Algebra, Mathematics Tutoring, C++, Proofreading, Cryptography, Calculus, Elliptic Curve Cryptography, Mathematics
Budget:
not specified
2 days ago
|
Streamline your Upwork workflow and boost your earnings with our smart job search and filtering tools. Find better clients and land more contracts.