Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.

Here's some projects that our expert Network Security Consultants made real:

  • Find the source of cyber threats to enhance security
  • Create secure solutions working with double routers, VPN and firewalls
  • Produce educational materials to spread knowledge in network security field
  • Design secure computer system architectures for clients of varying sizes
  • Utilize sophisticated technologies such as SDN (Soft Defined Networks), SVM (Support Vector Machine), Machine Learning to classify traffic
  • Identify Suspicious behavior in digital data for forensic investigations
  • Enhance network security with cutting edge algorithms and software solutions
  • Test and mitigate potential cyber threats from denial of service attacks.

Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.

Daripada 21,877 ulasan, klien menilai Network Security Consultants 4.9 daripada 5 bintang.
Upah Network Security Consultants

Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.

Here's some projects that our expert Network Security Consultants made real:

  • Find the source of cyber threats to enhance security
  • Create secure solutions working with double routers, VPN and firewalls
  • Produce educational materials to spread knowledge in network security field
  • Design secure computer system architectures for clients of varying sizes
  • Utilize sophisticated technologies such as SDN (Soft Defined Networks), SVM (Support Vector Machine), Machine Learning to classify traffic
  • Identify Suspicious behavior in digital data for forensic investigations
  • Enhance network security with cutting edge algorithms and software solutions
  • Test and mitigate potential cyber threats from denial of service attacks.

Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.

Daripada 21,877 ulasan, klien menilai Network Security Consultants 4.9 daripada 5 bintang.
Upah Network Security Consultants

Tapis

Carian terbaru saya
Tapis mengikut:
Bajet
hingga
hingga
hingga
Jenis
Kemahiran
Bahasa
    Status Pekerjaan
    47 pekerjaan dijumpai
    Bug Bounty Program Setup
    6 hari left
    Disahkan

    My customer-facing web applications need a fully-fledged bug bounty program that starts with a professional security assessment. The focus is pure CyberSecurity: map the current attack surface, uncover vulnerabilities, and shape a disclosure workflow that rewards researchers responsibly. You will first perform a thorough security assessment on the live web apps, documenting every finding with severity, reproducible steps, and clear remediation advice. From those results, design the bounty structure (scope wording, reward tiers, triage flow, and response SLAs) so it can be published on platforms such as HackerOne or Bugcrowd. Deliverables • Comprehensive assessment report (OWASP Top 10 coverage, business-logic flaws, misconfigurations, etc.) • Drafted public program brief, inc...

    $110 Average bid
    $110 Avg Bida
    5 bida

    Over the past few days I have noticed a sharp, unexplained spike in direct traffic on my corporate website. The pattern is the same worldwide—thousands of repeated page views hitting the same endpoints every few minutes—yet no genuine engagement follows. Because I have no firewall, captcha, or other security layer in place, I suspect an automated script or bot is hammering the site and inflating my analytics. I need a security-minded developer to: • Analyse server logs, analytics data, and DNS records to confirm the source, volume, and behaviour of the suspicious requests. • Pinpoint whether the traffic originates from a compromised script inside the site, a third-party resource, or external botnets. • Recommend and implement practical counter-measures such...

    $12 Average bid
    $12 Avg Bida
    12 bida

    I want my new AWS account configured to host a USA-based SIP trunk through Amazon Chime. The job includes creating or hardening the AWS environment, provisioning an Amazon Chime Voice Connector, assigning U.S. numbers, and enabling both inbound and outbound calling. The trunk has to register cleanly with our existing on-premise PBX and soft-phone apps, so please allow for SIP signaling tweaks, codec selection, and basic security (TLS, SRTP, firewall rules). Once the link is live, I’ll need brief documentation of the key settings so we can maintain it internally. Deliverables • AWS account prepared with least-privilege IAM roles • Amazon Chime Voice Connector fully configured and licensed for U.S. PSTN access • SIP trunk integrated and test calls completed (in...

    $18 Average bid
    $18 Avg Bida
    8 bida

    Project Description Highlights The Mission: We are building "QuantumShield," a high-performance, user-friendly desktop application that protects sensitive SMB data against "Harvest Now, Decrypt Later" threats using standardized Post-Quantum Cryptography. Key Technical Focus: This is not a standard encryption project. We require implementation of ML-KEM (Kyber) and ML-DSA (Dilithium) within a Hybrid Cryptographic Scheme (PQC + Classical AES-256). The Deliverable: A functional MVP for Windows/macOS featuring a "One-Click Shield" drag-and-drop interface and a "Quantum Health Dashboard" that monitors file vulnerability status. Required Tech Stack: High-performance systems programming (e.g., Rust, C++, or Go) with direct experience usi...

    $6185 Average bid
    $6185 Avg Bida
    65 bida

    I need an experienced CyberArk-savvy engineer to help me eliminate a persistent 403 Forbidden error that appears when Remote Access (formerly Alero) tries to reach the “/guac/direct” endpoint on a PAM-registered server. The environment runs on Windows and the block is clearly coming from the Remote Access component itself—PVWA and PSM are working until Remote Access refuses the session. So far I have followed CyberArk’s own documentation step-by-step, but the problem remains. The logs point to trust-validation trouble with the self-signed certificates used between Remote Access, PVWA and PSM; when the containers spin up, Docker reports: INFO: Adding certificate in file /opt/trust/import/ to the OpenSSL trusted certificate authorities. INFO: Symbolic link to cert...

    $107 Average bid
    $107 Avg Bida
    24 bida

    Our office needs hands-on help with our networking gear. I want an experienced technician to come on-site, isolate the cause of several recurring connectivity drops, and complete a clean switch installation and configuration while you are here. No desktop or server work is required—this assignment is strictly about the network hardware. Scope of work • Troubleshoot the existing cabling and switch stack to stop packet loss and random outages. • Install and configure the replacement/added switches, making sure VLANs, trunk ports, and access ports match our current design. • Verify stable connectivity for every connected device once the changes are in place. • Document the final configuration and any changes you made so the next round of maintenance is straigh...

    $105 Average bid
    $105 Avg Bida
    2 bida

    I’m looking for a hands-on network technician who can take charge of every stage of our camp-wide connectivity: from the first walkthrough to the final site dismount. The work happens entirely in an outdoor site/camp environment, so you’ll need to be comfortable moving between containers, masts, and rough terrain while keeping cables tidy and hardware protected. The immediate priority is expanding and fine-tuning WiFi coverage. We have not locked in any specific access-point brand yet, so I’ll rely on your recommendations for rugged, field-proven models that integrate cleanly with standard switches and routers. Scope of work • Conduct physical site surveys to map optimal equipment locations and check existing material placement. • Install, align, and commi...

    $20 / hr Average bid
    $20 / hr Avg Bida
    3 bida

    I want my Ubuntu server configured as an OpenVPN host that lets me and a small team (fewer than ten users) connect securely from anywhere. The goal is straightforward: reliable, encrypted remote access without having to worry about manual key generation, firewall tweaks, or routing issues each time we add a new device. Here’s what I expect at the end of the job: • OpenVPN installed and running on my existing Ubuntu server (latest LTS). • User-friendly client configuration files or .ovpn bundles for up to ten devices, plus a quick guide so I can generate more later if needed. • Firewall and IP forwarding rules adjusted so traffic is tunneled safely while the rest of the server’s services keep working as they do now. • Basic security best practices ap...

    $20 Average bid
    $20 Avg Bida
    18 bida

    I’m looking to have IP cloning / masking configured on my VoIP servers so we can distribute traffic evenly and keep call quality high. Load balancing is the sole objective here—this isn’t about anonymity or region-hopping, just making sure each incoming SIP session finds the least-loaded endpoint without exposing multiple public addresses. The environment is already up and running; what I need is the networking magic that presents one or more virtual IPs while the real servers sit safely behind them. If you normally work with tools such as iptables, nftables, HAProxy, IPVS, BGP anycast, or cloud firewalls, that’s perfect—use whatever combination you trust so long as it’s stable and keeps latency low. Because the phone queues are busy, I need this done ...

    $9 Average bid
    $9 Avg Bida
    4 bida

    I need an experienced Network Engineer who can step straight into an enterprise environment and keep our client’s infrastructure running smoothly. Day-to-day, you will handle configuration, troubleshooting, and proactive support across a mixed technology stack that centres on LAN/WLAN, VPN/MPLS, and a variety of routing protocols. The work calls for strong routing & switching skills paired with solid network security know-how. You will be the first line of defence for firewall administration and security-incident handling, so hands-on experience in both areas is critical. A current CCNA or CCNP is non-negotiable; please highlight the projects where you applied those certifications. Success in this role means: • Stable, well-documented network configurations delivered w...

    $37 / hr Average bid
    $37 / hr Avg Bida
    18 bida

    My wired Ethernet network has stopped working, and I need a skilled technician to get it back online quickly. I’ve already ruled out basic cable swaps, so I’m looking for someone who can: • Diagnose the root cause of the outage (switch, patch panel, NIC, or configuration). • Walk me through any testing steps I should perform on-site (ping, traceroute, link-light checks). • Provide clear, step-by-step instructions or remote-session support to restore connectivity. • Verify that all connected devices regain stable internet and LAN access once the fix is applied. • Offer a brief preventive checklist so I can avoid the same issue in the future. I can share photos of the rack layout, current IP scheme, and error messages from the router and switch interfac...

    $100000 Average bid
    $100000 Avg Bida
    5 bida

    I need a seasoned network and CCTV specialist to configure and oversee a real-time incident-reporting setup. My top priority is catching and reporting any unauthorized access the moment it happens, specifically at all building entrances and exits. Here’s what I’m looking for: • Audit our current camera and network layout, confirm coverage at every door, and flag blind spots. • Configure live monitoring software that can push instant notifications (email, SMS, or app-based) whenever an access breach is detected. • Fine-tune motion and analytics settings to limit false positives while still spotting genuine threats. • Set up a central dashboard so I can review live feeds, recorded clips, and incident logs in one place. • Write a concise hando...

    $556 Average bid
    $556 Avg Bida
    16 bida

    I have a small office network—fewer than twenty endpoints—that I want thoroughly examined for weaknesses. The immediate focus is a vulnerability assessment combined with a full network-security audit. Pen-testing isn’t required right now, but I would like the audit to be detailed enough that we could progress smoothly to active exploitation tests later if needed. Scope – Map every device and service, then scan using industry-standard tools such as Nmap, Nessus or OpenVAS. – Analyse configurations (firewall rules, router settings, shared resources, OS hardening) and identify misconfigurations or outdated software. – Provide a clear, prioritized remediation plan. Critical issues first, followed by medium and low-risk findings. – Conclude wit...

    $23 / hr Average bid
    $23 / hr Avg Bida
    23 bida

    I need a digital-forensics professional who can dig into a persistent, ongoing account-takeover problem that has affected both my Android and iOS devices. The attackers appear to be using SIM-swap tactics and other identity-theft angles to gain repeated access. My priority is twofold: first, trace and document the technical footprint well enough to identify the individual or group behind the breaches; second, harden every vulnerable point so the intrusions stop for good. You will have full, lawful access to my handsets, carrier logs, and any cloud backups necessary for a thorough examination. I expect you to employ industry-standard toolsets too extract, preserve, and analyze artifacts without compromising evidentiary integrity. Please keep chain-of-custody records meticulous; I may forwa...

    $1065 Average bid
    $1065 Avg Bida
    11 bida

    Job Title: Cyber Security Engineer (Checkpoint Firewall & Akamai WAF) Duration: 2 Hours per Day Budget: ₹30,000 per Month Start Date: Immediate About the Role We are looking for a skilled Cyber Security Engineer with expertise in Checkpoint Firewall and Akamai WAF to support our network security infrastructure. The ideal candidate will be responsible for managing firewall configurations, monitoring network security policies, and assisting in the implementation of web application firewall protections to safeguard enterprise systems. Key Responsibilities Configure, manage, and optimize Checkpoint Firewall environments (policy management, rule configuration, and troubleshooting). Implement and maintain Akamai Web Application Firewall (WAF) rules to protect web applications from security t...

    $8 Average bid
    $8 Avg Bida
    5 bida

    Project Title: Web Security Audit & Penetration Testing for Marketplace Website Description: We are preparing to launch a new online marketplace platform and are looking for an experienced web security specialist to perform a full security review of the site. The goal is to identify any vulnerabilities and ensure the platform is secure before public launch. Scope of work: • Perform a full security audit of the web application • Conduct penetration testing to identify vulnerabilities • Review authentication, API security, and database access • Check for common vulnerabilities (OWASP Top 10) • Identify potential risks in front-end and back-end architecture • Provide a clear report outlining vulnerabilities and recommended fixes Important: • You must hav...

    $524 Average bid
    $524 Avg Bida
    158 bida

    I need an expert to configure FreeRADIUS to act as a proxy. Requirements: - Support for PAP/CHAP authentication protocols. - Proxy to an LDAP backend for authentication. - Handle username and password user information. Ideal Skills and Experience: - Proficient in FreeRADIUS configuration. - Experience with LDAP integration. - Knowledge of PAP/CHAP protocols.

    $150 Average bid
    $150 Avg Bida
    20 bida

    I’m ready to launch a production-grade web application on AWS and need the underlying infrastructure designed and built with security and high availability at its core. The workload will run on EC2, and general-purpose instances are fine; the focus is on a rock-solid architecture, not exotic hardware profiles. Here’s what I have in mind: a VPC with public and private subnets spread across at least two Availability Zones, an Application Load Balancer in front, Auto Scaling groups to keep capacity healthy, and tight security groups plus IAM roles that follow least-privilege rules. Logging to S3, monitoring and alerts through CloudWatch, and encrypted traffic everywhere (ACM certificates, HTTPS, TLS-enabled internal hops) are all must-haves. Wherever possible, I’d like the ...

    $202 Average bid
    $202 Avg Bida
    30 bida

    I need Microsoft Intune fully configured so that both Windows and macOS devices can be enrolled smoothly and kept secure. The scope covers initial setup of enrollment profiles, creation of security and compliance policies, and Azure AD Conditional Access rules that gate company resources and SaaS apps behind device-health checks. Everything must support a BYOD model without exposing corporate data. Key points I want addressed • Autopilot/Company Portal enrollment flows for Windows and macOS • Baseline compliance settings (password, encryption, OS update cadence) and security baselines tuned to our environment • Conditional Access policies that tie sign-in to device compliance status • Application protection policies so corporate data stays within managed containe...

    $406 Average bid
    $406 Avg Bida
    30 bida

    Scenario Background: The scenario assumes that you are working as a security expert for a fictional company, Acme Coffee Company. The company includes several roles, including Bruno (CEO), Spike (Vice President of Sales), Eilik and Eilika (Sales), Loki (System Administrator), and Avery (Marketing). Loki has built a new company server, and Bruno has hired you to conduct a comprehensive security analysis and assessment of that server and submit a complete report. The final report should include your findings, techniques, graphics, and methodology, along with recommendations for improving any security issues identified. Video Overview: The instructor explains that the final project will provide a target machine personally built by the instructor to represent the Acme company environment. Yo...

    $135 Average bid
    $135 Avg Bida
    10 bida

    Se requiere especialista en ciberseguridad / redes / seguridad informática para desarrollar la parte práctica de un trabajo personal. El proyecto consiste en la implementación y validación técnica de una arquitectura Zero Trust en un entorno virtualizado, comparándola con una arquitectura tradicional basada en VPN. ALCANCE DEL TRABAJO El freelancer deberá: 1. Construir laboratorio virtual Crear entorno simulado de red empresarial. Implementar: Servidor de autenticación (IAM o similar). Servidor de aplicaciones. Segmentación de red. Endpoint remoto. Gateway o firewall. Puede utilizar herramientas como: VMware, VirtualBox, GNS3, Proxmox, Azure Lab, AWS Lab u otra propuesta técnicamente viable. 2. Implementar arquite...

    $21 / hr Average bid
    $21 / hr Avg Bida
    9 bida
    White-Box Web App Penetration
    3 hari left
    Disahkan

    I am ready to put my in-house web application through a thorough white-box penetration test and need a seasoned ethical hacker to run point. Because I can supply source code, architecture docs, and admin-level credentials, you will have full visibility to explore logic flaws, insecure configurations, and anything else that could turn into a real-world exploit. A key requirement is prior experience registering newly discovered vulnerabilities in official government vulnerability databases or repositories; I will rely on you not only to uncover issues but also to craft the correct disclosure package so the finding can be submitted and tracked according to policy. Scope • Inspect the entire codebase, APIs, and third-party integrations. • Execute manual and automated testing us...

    $205 Average bid
    Perjanjian Kerahsiaan
    $205 Avg Bida
    20 bida

    I’m looking for someone who has already rolled out operating-system hardening at scale—ideally across a thousand endpoints or more—to bring that same discipline to our Windows 10 environment. The goal is to lock down every production workstation without disrupting daily workflows, then document the process so it can be repeated and audited. Scope • Windows 10 on the following device types: – Desktops – Laptops – Tablets What you’ll actually do First, review our current build images and live machines, measure them against the latest CIS Benchmarks and Microsoft security baselines, and identify all gaps. Next, create a hardened baseline that can be enforced through Group Policy, Intune, or a scripted solution—whichever ...

    $240 Average bid
    $240 Avg Bida
    7 bida

    I want my iPhone hardened so it stops listening to—or broadcasting—every kind of beacon signal and ignores any future provisioning attempts. The focus is on three specific vectors: Wi-Fi beacons, Bluetooth beacons and location-based beacons. Here’s what I need from you: • A step-by-step configuration (or profile) that disables discovery, advertising and scanning for the three beacon types, while still letting me keep everyday services such as calls, basic data and SMS working. • Clear instructions on blocking carrier or remote-management provisioning without jail-breaking the device, or an alternative secure method if a profile alone cannot achieve this. • A short call or screen-share session so I can replicate the changes on any future iOS update...

    $452 Average bid
    $452 Avg Bida
    64 bida

    I need a skilled IT developer to create a robust access control system. The software should integrate the following key features: - Biometric authentication - RFID card access - Remote access capabilities Ideal skills and experience: - Expertise in software development, particularly in security systems - Experience with biometric and RFID technologies - Strong background in developing remote access functionalities - Knowledge of database management for secure data handling - Ability to deliver a user-friendly interface Looking for someone who can ensure high-security standards and is able to work within my budget. Please provide examples of similar projects you've completed.

    $70546 Average bid
    $70546 Avg Bida
    116 bida

    TÉRMINOS DE REFERENCIA Servicio de Análisis de Vulnerabilidades y Pruebas de Intrusión para Infraestructura Tecnológica 1. OBJETIVO DE LA CONTRATACIÓN Contratar un servicio especializado de Análisis de Vulnerabilidades y Pruebas de Intrusión que permita evaluar el nivel de seguridad en: • Defensa perimetral • Redes internas • Sistemas operativos • Aplicaciones web publicadas • Aplicaciones móviles • Sistemas de información y equipos de comunicación 2. PLAZO DE PRESTACIÓN DEL SERVICIO El servicio deberá ejecutarse en un plazo máximo de 45 días calendario. 3. DESCRIPCIÓN DEL SERVICIO Actividades • Evaluar el nivel de seguridad en aplicaciones web, activo...

    $1478 Average bid
    $1478 Avg Bida
    11 bida

    Looking for a CCNA certified expert Strong hands-on experience with lab-based questions in live practice test Proven ability to solve simulation-based scenarios in real time Capable of providing accurate and reliable solutions on the spot Good analytical and problem-solving skills

    $6 / hr Average bid
    $6 / hr Avg Bida
    10 bida

    My phone and Mac-based computer were recently compromised and I am seeing clear signs of unauthorized access, suspicious background activity, and some missing files. I need an experienced ethical hacker or cybersecurity specialist who can remotely examine both devices, identify every backdoor or malicious profile, recover any lost data where possible, and lock everything back down so I am fully in control again. Your work will involve a forensic sweep of macOS (and the companion phone, likely iOS) to trace how the intruder got in, remove any malware or configuration profiles they left behind, and then hard-harden the system—ensuring strong authentication, updated firmware, and airtight network settings. Please be comfortable using common incident-response tooling such as Wireshark, ...

    $165 Average bid
    $165 Avg Bida
    18 bida

    We need a new junior-level developer with good experience in wireshark, GNS3 and other network installations We need work at low budget and for long term

    $4 / hr Average bid
    $4 / hr Avg Bida
    21 bida
    ISSABEL VOIP
    2 hari left
    Disahkan

    Project Title: Full Issabel 5 PBX Deployment: Installation, Trunks & Extensions Project Overview I am seeking a VoIP specialist to perform a complete installation of Issabel 5 on an AlmaLinux 8 cloud instance. Beyond the base installation, the freelancer will configure the initial telephony architecture, including SIP trunks for external connectivity and internal extensions for users. Detailed Scope of Work 1. Server Installation & Hardening Perform a clean installation of Issabel 5 on AlmaLinux 8 using the official net-install script. Configure Fail2ban and firewall rules to block unauthorized SIP and SSH attempts. Set secure passwords for the Linux root, MariaDB, and Issabel web admin. 2. SIP Trunk Configuration Connect the PBX to my chosen VoIP provider using a SIP trunk....

    $41 Average bid
    $41 Avg Bida
    13 bida

    Project Overview Designed and implemented an intelligent DDoS detection and mitigation framework for Software-Defined Networking (SDN) based Vehicular Ad-hoc Networks (VANETs) to ensure secure, reliable, and low-latency vehicle-to-infrastructure (V2I) communication. The system leverages SDN’s centralized control to dynamically monitor network traffic and mitigate DDoS attacks in real time, ensuring uninterrupted safety-critical vehicular services. Key Innovations: SDN-Based Centralized Security Control OpenFlow-enabled SDN controller Global view of VANET traffic behavior Intelligent DDoS Detection Flow-level traffic analysis Anomaly detection using ML / Deep Learning (LSTM Autoencoder / Hybrid model) Real-Time Mitigation Strategy Malicious vehicle flow isolation Dynamic ru...

    $85 Average bid
    $85 Avg Bida
    10 bida

    I need an expert to configure Citrix Netscaler for load balancing. The primary goal is to ensure high availability for my applications. Key Requirements: - Experience with Citrix Netscaler - Expertise in configuring load balancing for high availability - Knowledge of both on-premise and cloud deployments Ideal Skills: - Networking and infrastructure knowledge - Experience with web applications, database servers, or email servers - Problem-solving skills for optimizing performance and uptime Please provide relevant experience and approach. Must be located in the US.

    $53 / hr Average bid
    $53 / hr Avg Bida
    16 bida

    I need a skilled professional to install Windows Server 2025 and configure RDP and VPN. The VPN should allow multiple user connections. Requirements: - Install Windows Server 2025 - Configure Remote Desktop Protocol (RDP) - Set up VPN for multiple user connections Ideal Skills & Experience: - Extensive experience with Windows Server installations, especially 2025 - Strong knowledge of RDP and VPN configurations - Networking expertise to ensure secure and efficient multiple user connections

    $90 Average bid
    $90 Avg Bida
    23 bida

    RDP Server Migration & VPN Configuration Summary 1. Current State Currently uses: A dedicated RDP server in Azure Installed with Mocha TN3270 for Windows 10/11 To access a State-hosted IBM Mainframe system Through a State-managed VPN connection That RDP server exists for a single purpose: To allow users to run the TN3270 client and access the State IBM mainframe. Current Network Path Workstation → RDP to Azure server → pfSense firewall in Azure → State VPN → IBM Mainframe Azure contains: A virtual network A pfSense firewall A VPN tunnel from pfSense to the State network The RDP server routes traffic through pfSense, which then routes to the State VPN. This introduces: Unnecessary infrastructure (RDP server) Additional attack surface Additional management ov...

    $571 Average bid
    $571 Avg Bida
    28 bida
    Ricoh Scan-to-Folder Setup
    1 hari left
    Disahkan

    I need someone to walk me through, or remotely handle, the full configuration of Scan-to-Folder on a Ricoh multifunction printer so that every scan lands in a shared network folder on my Windows 10 machine. The target folder already sits on a network drive, so the job includes: • Confirming folder sharing & NTFS permissions over SMB • Entering the correct path, user credentials, and port settings in the Ricoh web interface or on-panel menu • Testing with a live scan to prove that files arrive without errors or authentication prompts Please bring prior experience with Ricoh devices (model-specific quirks, TLS/SMB v1 vs v2 issues, etc.) and be comfortable using remote-access tools if needed. The task is considered complete once a PDF shows up in the specified folde...

    $37 Average bid
    $37 Avg Bida
    9 bida

    I’m expanding Eigen Computing’s stealth-mode R&D team and need senior-level talent who can tackle optimisation at scale. We are building a hardware-accelerated probabilistic engine that runs QUBO/Ising workloads for Logistics, Finance, and Cyber-Intelligence, and I’m open to engaging specialists across several tracks: • ML Engineer – craft graph neural networks and matrix-compression pipelines that translate complex optimisation problems into sparse, hardware-friendly representations. • FPGA Engineer – write VHDL/Verilog kernels for AWS F1, pushing the solver to micro-second latency. • Backend Architect – design a high-performance API layer in Go, Rust or Python that orchestrates FPGA instances, manages job queues and exposes RE...

    $19 Average bid
    $19 Avg Bida
    21 bida

    We are looking for a freelance Network Engineer to provide onsite support at a client location for a one-day network activity. You will work as the onsite engineer while a remote team provides guidance and configuration support. Responsibilities Rack, cable, and power on network equipment (switches, routers, firewalls) Patch network cables as per provided diagrams Connect console or management cables for remote access Perform basic network connectivity checks Assist the remote team during troubleshooting or validation Provide a brief end-of-day handover and status update Deliverables Network equipment installed, powered on, and accessible to the remote team Confirmation of basic network connectivity Short summary of work completed and any issues observed Requirements Hands-on ...

    $35 / hr Average bid
    $35 / hr Avg Bida
    10 bida

    I’m a computer-science student up against a deadline on a small networking assignment and I simply no longer have the hours to finish it properly. The scope is modest—nothing enterprise-level—but I still need a clean, working solution that I can submit with confidence. Here’s what I’ll hand over the moment we start: • The original brief from my instructor (topology requirements, IP addressing rules, and any grading rubrics). • Any partial work I’ve already done. What I need back from you: • A complete, functional design or configuration that satisfies every point in the brief. • A short write-up (plain text or PDF) that explains the choices made so I can discuss them if asked. • All supporting files: diagrams (Visio, PNG,...

    $121 Average bid
    $121 Avg Bida
    29 bida

    I will perform a professional security scan of your website using Kali Linux tools. The service includes a detailed PDF report highlighting vulnerabilities and practical solutions to improve your website security. Fast and reliable service guaranteed. Suitable for WordPress and custom websites. أقوم بإجراء فحص أمني احترافي لموقعك باستخدام أدوات Kali Linux. الخدمة تشمل تقرير PDF مفصل يوضح الثغرات والحلول العملية لتحسين أمان الموقع. خدمة سريعة وموثوقة. مناسبة لمواقع WordPress والمواقع المخصصة

    $49 Average bid
    $49 Avg Bida
    8 bida

    I run a five-person company and want our office network professionally managed. The focus is network management—we have switched from am it management co because of the pricing Here’s what the engagement looks like: • Conduct a quick audit of our existing switches, router, Wi-Fi and cabling. • Design and implement an access-control scheme (role-based, VLANs or equivalent) that keeps internal resources locked down without disrupting day-to-day work. • Set up continuous performance monitoring with clear dashboards and automated alerts. • Provide rapid troubleshooting and root-cause analysis whenever speeds drop or users lose connection. The environment is small—one office, with three remote employees , a handful of laptops, —so solutions...

    $32 / hr Average bid
    $32 / hr Avg Bida
    17 bida

    I need an expert who has successfully navigated Amazon’s SP-API PII approval process to walk my team and me through it from start to finish. Our SP-API application is already created but still sits in a “not verified” state, and we want to clear every compliance hurdle so we can lawfully retrieve PII and use it to deliver genuinely personalized customer interactions that elevate our support experience. You’ll explain each Amazon security requirement in plain language, help us prepare the technical and policy documentation, and review our architecture for encryption, data retention, network controls, and logging. Once everything is in place, you’ll guide us through the submission steps, respond to any follow-up questions from Amazon, and stay with us until app...

    $603 Average bid
    $603 Avg Bida
    15 bida

    I’m looking for an experienced security tester to run a full-scale penetration test on my web application stack. Web security is the only focus here, so please come prepared with a proven methodology that aligns with OWASP-Top-10 practices and the latest exploits in mind. Scope • Map and enumerate the application, then attempt to exploit any weakness you find—authentication, sessions, input validation, business logic, configuration, the works. • Produce a concise, evidence-based report that ranks each finding by risk, explains impact, and includes clear remediation steps my dev team can action immediately. • A short retest is expected once fixes are applied. Tools you’re comfortable with matter to me. If Burp Suite Pro, OWASP ZAP, Metasploit, Nessus...

    $10 / hr Average bid
    $10 / hr Avg Bida
    22 bida

    My site already runs through Cloudflare and basic protection is in place, yet I know the platform can do much more for security. I want a seasoned Cloudflare specialist to go through my current setup, tighten every loose end, and leave me with a hardened configuration I can trust. Scope of work • Firewall rules – Review what I have, remove redundancies, and add precise allow/deny rules and rate limits that match real-world traffic patterns without blocking legitimate users. • SSL/TLS – Move the zone to the most secure Full (Strict) mode, renew or generate any required origin certificates, enforce HSTS and secure ciphers, and confirm end-to-end encryption is flawless. • Bot management – Configure Bot Fight Mode and related features so genuine traffic ...

    $51 / hr Average bid
    $51 / hr Avg Bida
    39 bida

    Looking for experienced and time served cctv and access control freelance installation engineers. Experience of Avigilon, Pelco, Gallagher and typically large systems above 100 cameras in size. Start to finish, Installation and commissioning, is a requirement.

    $11721 Average bid
    Tempatan
    $11721 Avg Bida
    2 bida

    I’m looking for someone who can get the Scan-to-Folder function working on a Ricoh Aficio MP C2800 that’s already networked and printing fine to a Windows PC. The goal is simple: every time we scan, the machine should drop a single PDF into a shared folder on our local network that all staff can reach. You’ll need to create or verify the Windows SMB share, adjust permissions, enter the correct path and credentials through the device’s Web Image Monitor, then test from the copier’s panel to prove that multi-page documents arrive as one consolidated PDF. Deliverables • Full configuration of Scan-to-Folder on the Ricoh MP C2800 • Verified Windows shared folder with proper access rights • Address-book shortcut on the copier for one-touch...

    $8 / hr Average bid
    $8 / hr Avg Bida
    13 bida

    We are looking for an experienced IT Systems Administrator who specializes in: Microsoft Intune (endpoint security, device compliance, configuration profiles) Microsoft 365 administration (Exchange Online, Teams, SharePoint, OneDrive, Entra ID / Azure AD) Windows device onboarding, security baselines, BitLocker, Defender, and software deployment Scope of work includes: Setting up and enforcing endpoint security and compliance policies for laptops Creating and managing Intune configuration profiles and app deployments Hardening devices with Defender, BitLocker, and other M365 security tools Supporting user onboarding, access control, and general M365 administration Providing documentation for setup and ongoing maintenance Requirements: Proven experience with Intune and Microsoft ...

    $8 / hr Average bid
    $8 / hr Avg Bida
    27 bida

    Artikel yang Disyorkan Hanya untuk Anda