C Jobs

7 were found based on your criteria

  • Hourly – 1 to 3 months – 10-30 hrs/week – Posted
    Looking for Vulnerability Engineer to access one of our test servers to access database before we put system on network. - CEH certified - Understands NBNS "Net Bios Name Server exploit - Ability to provide reports after extraction of database - Assess information to prepare to solve problem - Provide Identification - TLSv1.2 exploit - password generator knowledge - Perl scripting knowledge to generate against passwd file - collect crackable hashes on network. **Must provide Full analysis on Servers before receiving payment Negotiate Percentage for Task / Contract Required ...
  • Fixed-Price – Est. Budget: $30.00 Posted
    Network programming, additionaly we have the python implementation for the program
  • Fixed-Price – Est. Budget: $15.00 Posted
    Network programming, additionaly we have the python implementation for the program
  • Hourly – More than 6 months – 30+ hrs/week – Posted
    Industry: Finance Position Title: Sr. RHEL Engineer Type of Position: 6 month temp to perm Location: Remote = 25-40% travel Job Description: RHEL Engineer Role/Responsibilities : The Lead Consultant Provides technical leadership on implementation projects and performs detailed technical tasks at client sites. Provides specialized technical training and provides support services for FICO software solutions. This includes remote and on-site client installations and configurations, documentation of the installation instructions, training clients on maintaining the systems, and updating internal documentation on client ...
  • Hourly – More than 6 months – 30+ hrs/week – Posted
    Cyber Security company is seeking a Mid-level to Senior-level Reverse Engineer/Malware Analyst to join our team. Summary: The employee shall support malware analysis as part of incident analysis. The employee shall develop a standard process for and support the capture and analysis of software artifacts suspected of being malicious code. Requirements: - Knowledge of industry accepted standards and best practices related to incident response operations. - Demonstrates knowledge in information technologies to include computer hardware and software, operating systems, and networking ...
loading