Vulnerability assessment Jobs

15 were found based on your criteria

  • Fixed-Price – Est. Budget: $35.00 Posted
    I would need a Linux Administrator who knows how use Linux OS (SIFT Linux) and a strong background in Forensics. (NOTE: I will provide you the Linux OS (SIFT Linux VMware and that Assignment Task (.doc)). I need you to use the "SIFT Linux operating system VMware" to answer all the questions in the Assignment, Plus I will provide you the "Hard Drive" that you need to scan and answer the questions. Provide items: Image Hard Drive, VMware SIFT Linux ...
  • Hourly – Less than 1 month – 10-30 hrs/week – Posted
    We are looking for an Expert IT Security Consultant to conduct Web Application Vulnerability and Assessment. We need someone who can provide the best services to secure and harden our networks, databases, and applications on the cloud. Statement of Work: - Analyze the security aspect of our information infrastructure and recommend best solutions and countermeasures for our business. - Perform penetration testing to measure the depth of vulnerability present in our IT infrastructure. Identify loopholes in our web applications deployed on networked ...
  • Fixed-Price – Est. Budget: $500.00 Posted
    My company provides vulnerability assessment service for android and iphone applications in japan. We are looking for a highly skilled penetration auditor to perform black box test on some social game applications. Candidates must have ability for reverse engineering and need to be very familiar with mobile application vulnerabilities. We will pay $500 per application.
  • Fixed-Price – Est. Budget: $2,500.00 Posted
    I\'m looking for a team of developers to develop a small internet and data security application for my small company. The appl. will work exactly like other antivirus and help as an antivirus, vulnerability assessment , internet security app. The app,should work exactly like Mcafe or norton antivirus etc. Will welcome developers with relevant experience. Donot apply if you do not have relevant experience. Also attach company profile.
  • Fixed-Price – Est. Budget: $100.00 Posted
    Hey, We have a Joomla site that has been hacked by our previous developer. The hacked site is a contest site where users can enter entries to the contests. The developer is able to add 10,000 tickets, 50,000 tickets and as many as he wants some how. There is some backdoor he is getting through and doing this. Maybe a script in our code? Maybe some remote SQL connection? We've already deleted all FTP accounts, changed all ...
  • Fixed-Price – Est. Budget: $200.00 Posted
    I'm setting up a phpfox site. I saw some spam show up in the security llog a few days back. I'm concerned that the site might have a malware infect or might have been compromised in some way. I want to do a complete risk assessment on my server and website to make sure its secure and free of vulnerabilities. I want a i) Complete Web Application Security Assessment ii) Penetration Testing to identify vulnerabilities In your bid ...
  • Fixed-Price – Est. Budget: $50.00 Posted
    Unzip > Open Mixer.exe > ID test02 > PW 123456 > Enter When click ACCUEIL go to http://www.77pb.com/site/ need change to http://www.mixmasteronline.net/ When click FAQ go to http://www.77pb.com/site/ need change to http://www.mixmasteronline.net/faqs/ In the middle have a website load iframe http://www.77pb.com/patch/ need change to http://www.mixmasteronline.net/mixer/ Send me tutorial how changes was done in technical speaking or make a software allow ...
  • Hourly – Less than 1 month – 10-30 hrs/week – Posted
    We are an IT services firm in the Charlotte, North Carolina area and we have a customer for whom we'd like to do an in-depth review of network security. We envision doing a penetration analysis, a review of network segmentation (DMZ), firewall rules, and intrusion prevention/detection recommendations. The customer would like to investigate abnormal traffic that occurred in the recent past as well as identify weaknesses in their current security model and build these recommended improvements into a ...
  • Hourly – Less than 1 week – Less than 10 hrs/week – Posted
    We are looking for a Security Analyst. Job Duties Conduct operating system, application, and database vulnerability assessments (to include system configuration checks) on various Information Systems Analyze vulnerability assessment results, and provide subsequent reports Work alongside system administrators to validate and remediate identified vulnerabilities Conduct research on current vulnerabilities and exploits using publicly available, trusted resources Author information security notifications based on vulnerabilities applicable to the environment and track compliance for notifications requiring corrective action Brief management on current vulnerabilities ...
  • Fixed-Price – Est. Budget: $5.00 Posted
    I need a security researcher to find NEW bugs in common popular software. If you find a bug, case details should be as technical as possible and ideally include proof-of-concept code to trigger the issue. Insights into additional attack vectors are valued as we aim to create robust vulnerability protection filters. $5 for the first security flaw submitted If successful, we can renegotiate for the next submission. ANSWER THESE QUESTIONS WITH THE BUG SUBMISSION PLEASE! 1. Is the affected product ...
loading