Security Jobs

66 were found based on your criteria

  • Fixed-Price – Est. Budget: $900.00 Posted
    The scope of work involves modifying and adding to an existing website built on bootstrap 3, jQuery, css3 and other technologies. Further the backend work to support the front end has to be implemented as well. Much of the backend is present but adding new functionality to the front end means adding new logic to the back end. The backend is build using Spring REST services, Hibernate, Maven and Apache Solr. Experience in healthcare projects is a plus along with ...
  • Fixed-Price – Est. Budget: $100.00 Posted
    I have a Python course that needs updated screenshots and debugging of some of the scripts to ensure that they run properly on Ubuntu 12.04. The focus of the course is using Python for IT Security tasks (log parsing, port scanning, web app security, malware analysis and other IT Security tasks). You will be tasked with the following: 1. Verifying that all scripts run properly on the course virtual machine. Fixing them if they don't run properly. 2 ...
  • Fixed-Price – Est. Budget: $350.00 Posted
    Project Description: i need a programmer who would be able to program a cyrpter , which is based on C++ , Delphi ,C codes to be able to cyrpt an exe file to exe without changing the program it self , the Cyrpter has to be 100% FUD - No AV will detect it! With AES and RC4 Encryption System With 256-Bit Password - Amazingly secure your file The Cyrpter would have an internal sub and be able to change the ICON The crypter needs ...
  • Hourly – Less than 1 month – 30+ hrs/week – Posted
    Looking for a software engineer who can help us with some development work. We need to build a fairly simple web application where a user sees all data for their offices and can edit this data if they see any errors (We already have this data in our database). Once the data has been approved by the user, it needs to be published to various sources such as Google+, Yelp, etc, using their APIs. This is the initial task at ...
  • Hourly – More than 6 months – 10-30 hrs/week – Posted
    advanced security software use heuristics to identify malware. This type of detection technology can be difficult to understand but it does an effective job identifying malware that could potentially damage your device and your personal data. used to recognize characteristics of malware that might otherwise go undetected. Instead of looking for virus signatures, which many security software applications do, heuristic scanning looks at the traits of a file and identifies specific commands or characteristics that could signal a potential threat ...
  • Fixed-Price – Est. Budget: $100.00 Posted
    Autopost adds into website in bulk all weeks long then, delete then and repost then again after few days or a week. I ll give you CSV with 300 add you need to take the picture from my site . Securtity rules knowned : geographical, IP history, long last cookies, tilte duplicate content ,mail confirmation, non human behavior I need support for 1 month and half after software is delivered until it is stable .and fully functionable. This will be the last ...
  • Fixed-Price – Est. Budget: $200.00 Posted
    I need a working demonstration of a Spring Data Jpa repository with Spring Security annotations (defining method level security) applied which are correctly enforced when exposing the repository via the Spring Data Rest servlet. Dependencies: Spring 3.2.4.RELEASE Spring Security 3.2.0.RC1 Spring Data Rest 1.4.1.RELEASE Spring Data Rest Webmvc 1.1.0.M1 Deliverables 1 x Domain Object 1 x Repository 1 x RepositoryCustom 1 x RepositoryImpl 1 x RepositoryHandler 1 x ...
  • Hourly – Less than 1 week – Less than 10 hrs/week – Posted
    Project: 1. Researching and writing requirements for various firewalls. 2. What this means is that if you were a procurement officer for a company and you wanted to purchase a firewall, the first thing you would have to do would be to produce a requirements document which would describe your companies firewall requirements as they pertained to the type of firewall you were going to buy. Please do not apply for this position unless you meet all the qualifications. Requirements ...
loading