Computer Security Projects
Looking for freelance Computer Security jobs and project work? PeoplePerHour has you covered.
Help With Finalising NHS Data Security & Protection Assessment
Hello, I am the owner of a small courier brokerage that serves the healthcare sector, including NHS trusts. We are currently in the process of completing an NHS assessment for Data Security and Protection, and I am looking for a specialist who can assist us in finalising the assessment. PROJECT DETAILS Our company has made significant progress in the NHS assessment, but we require expert assistance with the following specific tasks to ensure full compliance: 1. Information Asset Register (IAR) and Record of Processing Activities (ROPA) • We need to create an IAR and ROPA. The IAR should detail where and how personal and sensitive information is held and safeguarded within our organisation. Similarly, the ROPA should provide clear insights into the types of personal data shared externally, including methods and security measures. • Both documents should be in line with current data protection legislation and reflect the latest operational realities of our business. • Templates and guidelines are available below, but professional expertise is required to tailor these to our specific operational context. https://www.digitalcarehub.co.uk/data-security-protecting-my-information/how-to-document-your-data-processing/ 2. Training Needs Analysis for Data Security and Protection • A document relating to our training needs analysis specific to data security, protection, and cyber security is required. This analysis must reflect the current requirements of our staff, including any new roles or changes in data handling processes. • The document should be prepared for annual review and approval by our designated data security officer. • A template is available below. https://www.digitalcarehub.co.uk/resource/training-needs-analysis/ REQUIREMENTS • Proven experience in data security compliance, particularly within the UK and NHS frameworks. • Familiarity with NHS data protection assessments and requirements. • Excellent documentation and communication skills. PROJECT TIMELINE We are looking to complete this project within the next 2 weeks. APPLICATION INSTRUCTIONS If you are interested in this project, please submit a proposal with the following: • A brief outline of your experience with NHS data security and protection requirements. • Your approach to ensuring compliance in a small business setting. Thank you for considering this opportunity. Martin PS: PS: Disregard the budget listed for this project; it was entered merely for placement purposes.
3 days ago12 proposalsRemoteopportunity
I need help in creating a software
We are seeking a skilled software developer to create a cutting-edge solution that can bypass current security protocols. The software should be designed to provide unauthorized access to protected systems or networks. The ideal candidate should have a strong understanding of computer security, programming languages, and algorithms. The project requires a high level of creativity, attention to detail, and the ability to work independently. The successful candidate will have the opportunity to make a significant impact on the security industry and contribute to the development of new technologies.
23 days ago11 proposalsRemoteopportunity
Microsoft 365 Power Platform - Adding Guests to multiple groups
We're looking for a solution that uses M365 Power app that: Allows authenticated internal admin users (a security group) to Invite and add Guests to the tenant. The admin can see a list of Microsoft Teams > Channels to which they can add the Guest to. On Submission the request needs to be approved by a member of a group with mail notification that approval has occured. Guest User details require: Firstname / Lastname Email Address Sponsor Some additonal Information: Teams Channels and security groups already exist. Teams and Channels are Private. In some cases there are multiple security groups that handle acces to a Team and Channel, so the permissions logic might look something like: Team 1 Channel 1- Channel Specific Security Group Channel 2 - Channel specific security Group + Additional Group(s)
6 days ago14 proposalsRemoteTechnical Writing on Computer Architecture and Operating Systems
Objective: The primary goal of this project is to develop comprehensive and authoritative written content covering key areas of Computer Architecture and Operating Systems. This project strictly prohibits the use of ChatGPT or any AI-enabled solutions for content creation, ensuring the authenticity and originality of the information. Project Scope: The freelancer will be responsible for creating detailed, accurate, and engaging content covering the following topics: 1. The Fundamentals of Computer Architecture: Basic computer model and essential components Understanding of binary, switching, and logic in computing architecture Performance metrics, including speed and processor frequency Performance definition, program translation into instructions, and CPU-memory tradeoffs 2. Memory and Systems: Types of memory, technology, capability, and performance issues Memory configurations for optimal performance Cache memory, memory hierarchy, and cost-performance tradeoff 3. Building the System: System integration concepts, motherboards, servers, bus systems Data storage systems, including SSDs, magnetic disks, and RAID systems Selection and evaluation of storage components and interfaces 4. Exploring Operating Systems: Operating systems models, types, and standards (Linux, DOS, OSX, RTOS) Program execution, scheduling, resource utilization, and memory management Recent processor developments supporting OS capabilities 5. Operating Systems to Files: Detailed analysis of operating system functionalities and file management 6. Network Concepts and Technology: Basics of computer networking, performance evaluation, and resource economy 7. Security: Understanding system vulnerabilities, common threats, and mitigation strategies Freelancer Qualifications: Proven expertise in Computer Science, specifically in Computer Architecture and Operating Systems Strong technical writing skills with the ability to simplify complex concepts Commitment to delivering plagiarism-free and original content without the use of AI tools Submission Requirements: A brief outline of your approach to covering each topic listed in the scope Selection Criteria: Proposals will be evaluated based on the freelancer’s expertise, proposed approach to the project, quality of writing samples (if available).
a month ago19 proposalsRemoteopportunity
Secure workspace solution for remote workers
I am working with a few remote workers on a couple of personal projects and would like to preserve data and confidentiality. So instead of them working on their personal devices, I would like them to connect remotely to a virtual machine and still be able to access & work on documents and codes, from where they cannot download to their personal machines. Something like Citrix but very cost effective, since this is a personal low-budget project. Can you help with the solution design and implementation?
24 days ago8 proposalsRemoteOPC UA - Client Python script
Hi, I need help with OPC UA Client python script. My issues are with the security policy which is rejected from the server, depsides the certificates are added to trusted.
6 days ago16 proposalsRemoteMachine Learning Engineer
We are seeking a highly skilled and motivated Machine Learning Engineer to join our team and contribute to the development of cutting-edge solutions for child safety applications. As a Machine Learning Engineer, you will be responsible for: ● Training and enhancing machine learning models using image-based data on TensorFlow. ● Evaluating and enhancing the performance of existing ML models, identifying opportunities for targeted advancements. ● Advising and guiding on the full ML development lifecycle, from conception to deployment, ensuring robust, efficient, and scalable solutions. ● Developing strategies for continual model training and retraining to adapt to evolving data patterns and threats, including training models in remote and sensitive environments. ● Innovating and exploring new ML development pathways, including the integration of open-source multi-modal models for advanced image and video classification tasks. ● Customising and fine-tuning state-of-the-art ML models to align with company-specific use cases and client needs. ● Architecting and implementing solutions for on-device model deployment, emphasising user privacy and data security. ● Creating and maintaining model deployment packages, such as SDKs and Docker containers, for seamless client integration. ● Collaborating cross-functionally with product managers, software engineers, and other stakeholders to integrate ML solutions into our product suite. ● Staying abreast of the latest ML technologies and methodologies, advocating for the adoption of industry-best practices. Qualifications: ● Bachelor's or Master's degree in Computer Science, Engineering, or related field. ● Proven experience in machine learning model development and deployment, particularly with TensorFlow. ● Strong programming skills in Python and proficiency in ML libraries such as TensorFlow, PyTorch, or Keras. ● Experience with image-based data and advanced image processing techniques. ● Knowledge of model evaluation metrics, optimization algorithms, and deep learning architectures. ● Familiarity with cloud platforms for model deployment (e.g., AWS, Google Cloud). ● Ability to work independently and collaboratively in a fast-paced environment. ● Excellent communication skills and the ability to explain complex concepts to non-technical stakeholders. Bonus Skills: ● Experience with on-device model deployment and edge computing. ● Familiarity with privacy-preserving ML techniques and data security protocols. ● Knowledge of open-source ML models and their integration into custom applications. If you are passionate about leveraging machine learning for child safety applications and are excited to work on impactful projects, we encourage you to apply and be part of our innovative team!
5 days ago17 proposalsRemoteopportunity
Expert Needed to Unlock iPhone XS Activation Lock
I require the services of a knowledgeable individual or team with experience in unlocking the activation lock on an iPhone XS. The device is powered by an A12 Bionic chip and is currently on iOS version 17.4.1. The preferred method of unlocking is through the IMEI number, but I am open to other effective solutions. Key Requirements: Proven track record in bypassing iPhone activation locks. Familiarity with the A12 Bionic chip and iOS 17.4.1. Ability to provide a secure and reliable unlocking method without data loss. Project Goals: Successfully unlock the activation lock on the iPhone XS. Maintain the integrity and security of the device post-unlock. Budget: Flexible, based on the method and experience of the freelancer. Project Duration: To be completed as soon as possible, with a focus on efficiency and success rate. Interested parties are encouraged to contact with a brief overview of their approach and past experiences related to similar tasks. Thank you for your time and I look forward to your proposals.
2 days ago4 proposalsRemoteClassic ASP
We use CDO to send emails from our classic asp pages using our gmail accounts smtp. But Google are switching this off soon and we need to use Oauth2. https://workspaceupdates.googleblog.com/2023/09/winding-down-google-sync-and-less-secure-apps-support.html I need help implementing this within out pages. Can you assist? Thank you Julian
5 days ago2 proposalsRemoteJoint / Guided AZURE Server Deployment
I need to set up a simple enterprise AZURE server to host a server-side Google Tag Manager (GTM), and need someone who is an absolute "boss level" Azure admin to help me with this. Experts with Microsoft Azure enterprise development required. You must be very conversant with Azure, have set up server instances with scaling, security, health checks etc. for large enterprises with complicated security requirements, and ideally know how to write up detailed requirements specifications and plan server architecture. IMPORTANT NOTE: You will not be given any access. All work will be done by me, with you on a Teams call with sharing screens, where you will guide me. First part of the project will be to write up the detailed spec and setup plan. Second part will be the actual setup. Work will be done side-by-side, with you assisting me with setup and testing environments. This will be a one-off project, but will most likely lead to an on-going programme over a number of months, with the right person. You will not be given direct access to the Azure environment, but will view my screen and tell me how to set up. This is very important. The average time for the first part is expected to be around 20 hours, and the expected on-going monthly project time requirement will average 2 hours per month.
a day ago11 proposalsRemoteElegant Online Course Cover Design
I am seeking a skilled graphic designer to create a bold and vibrant cover page for my online course. This is aimed at educating and informing, so the design should attractively encapsulate this objective. What you will need: - Expertise in creating vibrant, appealing graphics that catch the eye. - Familiarity with designing content for Facebook, Instagram, and LinkedIn, as the course will be advertised on these platforms. The target for the online course is for Condominium Managers and Staff The title of the course is " Condominium Security for Managers and Staff" The subtitle is "How to make your condo safer by looking at it with security eyes" The company name of the sponsor is 3D Security and Emergency Response Services The presenter is Scott Hill, CPP, RCM, PSP
18 days ago20 proposalsRemoteWeb Scraping
Hi, I want to scrape data from justdial.com. It is showing only 100 records per 1 query but I need to bypass the security and scrape 1k-2k records instead of 100. Can anyone help? FYI, It is a business directory like yelp, yellowpages etc.
12 days ago29 proposalsRemoteCreate a TRX(TRON) vanity address generator
I am hiring a professional developer to create a TRON vanity address generator, here are some basic details; 1) runs on Linux 2) compatible with multiple (in parallel) Nvidia GPUS, using CUDA/OpenCL 3)When a matching address is found, store the corresponding private key securely.
10 days ago10 proposalsRemoteUniversity Website Development
I need a skilled developer to create a comprehensive website for my university. Key Features: - **Course Information**: The website should have a structured presentation of our available course offerings. - **Student Portal**: It should include a rich student portal with the following features: - **Course Enrollment**: A hassle-free course registration system. - **Grades and Transcripts**: A secure section where students can access their grades and transcripts. - **Discussion Forums**: A platform for students to interact and discuss. User Access: - **Students**: They should be able to access the student portal to register for courses and track their academic progress. - **Admin and Super Admin**: They should be able to manage and monitor the portal, as well as provide necessary support to students. Ideal Skills: - Experience in creating dynamic and interactive websites. - Proficiency in developing secure user portals. - Understanding of user experience (UX) design principles for educational platforms. - Familiarity with back-end systems for managing user accounts and course data. Please provide examples of similar projects you've worked on and outline your proposed approach to this project.
5 days ago41 proposalsRemoteopportunity
Support new business to reach students and graduates in the UK
I have recently launched a small UK-based business providing CV, cover letter, and interview preparation services to students and graduates (higher education). I am hoping to work with a freelancer who has marketing experience with this specific audience, a well established network in this field, or both! My primary objectives are to explore strategies for making my company website and Instagram page more visible to this specific audience, and to secure more customers. If you are familiar with this type of customer and have ideas, please get in touch and we will agree a proposal accordingly.
18 hours ago11 proposalsRemoteAnthropomorphic Character Development
Character development for animation project Art Skills: Understand bodies, sizes, and angles. Design characters to give them their own personality and style. Show feelings and expressions in your characters to bring them to life. 3D Modeling and Animation: Use computer programs like Blender or Maya to turn drawings into 3D models. Make your models look real with details like fur, skin, and textures. Learn animation to make your characters move and express themselves. Anthropomorphic Knowledge: Imagine animals acting like people— that's anthropomorphic!
9 days ago17 proposalsRemoteRecruitment of Sales Manager & Lettings Manager for Real Estate
We are seeking someone to assist with the recruitment of a lettings manager and a sales manager for our real estate company based in South East London. Both hires will be tasked with launching the lettings and sales service so experience and headhunting is crucial. They will need to be able to build a team They will need secure property listings We are seeking guidance on the salary and package required to recruit the role we need and for someone to proceed with the full recruitment process from writing the job description, screening the applicants and providing a shortlist of candidates then to handle negotiation and offer management
18 hours ago4 proposalsRemoteopportunitypre-funded
Intelligent search on documents in my cloud
My name is Salvatore, I am an Electronics Engineer and I am looking for an artificial intelligence programmer expert in LLM to work with one of my computer engineer collaborators. I don't need online lessons. I need to use LLM APIs that could be LangChain or whatever to train on a folder of files and be able to query them and most likely use something from the open source AI Bloom on my project. I inserted my docx and pdf documents into the cloud. On the site I created a search bar that I use to write what I want to search for in my documents (in italian language). The query/search occurs on all documents and not on one at a time. I want to improve the search in the sense that if I don't write exactly the sentence contained in one of the documents, the database needs to be made intelligent and understand what topic I'm looking for in my documents.
5 days ago19 proposalsRemoteProperty Managers
The requirements for the applicant include strong attention to details, college degree, access to email and knowledge of use a device (computer or phone), basic software tools (Microsoft Office - Word & Excel). We need fast, accurate and specialized members. 4Responsibilities • Gathering data from one source (Google Drive) to enter into document management (databases or partner websites by case) • Checking and reviewing documents for accuracy and completion • Attaching supporting files to the document management • Searching for additional information for documents that are incomplete • Verifying, correct, and delete unnecessary data, or combine data
5 days ago13 proposalsRemoteAWS Expert
The AWS person must be able to perform the following tasks 1. Supernal-AI-Hub-App and Account Settings Platform (ASP): - Hosted on existing Amazon EC2 instance. - Ensure granular control over the hosting environment. - Configure security groups, IAM roles, and security measures for sensitive data handling. - Implement monitoring and management tools like AWS CloudWatch for performance monitoring and alerts. - Establish seamless communication between EC2 and EKS environments through appropriate networking configurations (e.g., VPC peering, API Gateway, PrivateLink). 2. Launchpad App: - Utilize Elastic Load Balancing to distribute traffic across multiple EC2 instances. - Configure Auto Scaling groups for dynamic scaling based on traffic demands. - Implement health checks and alarms for fault tolerance and high availability. - Set up security measures such as security groups, IAM roles, and SSL certificates for secure communication. 3. Vendor Success Platform (VSP), Customer Success Platform (CSP), and Product Information Management (PIM) Application: - Move these three applications to a single Amazon EKS cluster. - Utilize Kubernetes for container orchestration, enabling features like self-healing, automated rollouts, scaling, etc. - Configure Kubernetes services for each application within the EKS cluster. - Implement proper resource management and scaling policies for efficient resource utilization. - Set up monitoring and logging solutions compatible with Kubernetes (e.g., Prometheus, Fluentd, Elasticsearch, Kibana). - Ensure seamless integration between EKS services and the EC2-hosted applications. - Implement security measures such as IAM roles for service accounts, Kubernetes RBAC, network policies, etc., to secure containerized applications. - Apply consistent security policies across EC2 and EKS environments, including encryption, access controls, and compliance measures. - Implement CI/CD pipelines for automated deployments and updates of containerized applications. - Configure DNS routing or service discovery mechanisms for accessing the PIM application from VSP and CSP. 4. Overall Considerations: - Implement unified monitoring and management tools compatible with both EC2 and EKS environments for comprehensive insights. - Apply consistent security and compliance measures across both environments using AWS services such as IAM, Security Groups, AWS Shield, etc. - Perform thorough testing and validation of the hybrid setup to ensure seamless operation and minimal disruption during migration. - Document the setup, configurations, and operational procedures for future reference and troubleshooting. - Continuously monitor and optimize resource usage, security posture, and performance of the hosted applications on AWS.
25 days ago15 proposalsRemote