Job Title | Budget | ||||
---|---|---|---|---|---|
Cyber security posture assessment
|
250 USD | 5 days ago |
Client Rank
- Excellent
$22 191 total spent
14 hires
12 jobs posted
100% hire rate,
open job
5.00
of 8 reviews
|
||
I am seeking a cybersecurity assessment for a small business (75 people, 100 computers, 60 employee phones). We have a few in-house servers. We use MS365 and a few other homegrown and off-the-shelf software products. I am looking for someone to assess the holes in information security, do some penetration testing, and provide recommendations to fix any gaps identified.
Skills: Information Security, Vulnerability Assessment, Security Analysis, Network Security
Fixed budget:
250 USD
5 days ago
|
|||||
Scammed Crypto
|
not specified | 5 days ago |
Client Rank
- Risky
|
||
Hi Hoang,
I was scammed in a pig butcher scheme and lost $60000 usdc coin from my trust wallet thru a dapp with a token contract. Can you help me find these people with just the website address and the block explorer transactions hashgraphs to wallet address'? Thanks, Anthony
Skills: Vulnerability Assessment, Security Testing, Penetration Testing, System Security, Website Security, Information Security, Network Penetration Testing, Black Box Testing, OWASP, Web App Penetration Testing, White Box Testing, Software Testing, Security Analysis
Budget:
not specified
5 days ago
|
|||||
Certified Penetration Tester (CEH/OSCP/Comptia)
|
20 - 50 USD
/ hr
|
5 days ago |
Client Rank
- Medium
|
||
Only freelancers located in the U.S. may apply.
We are seeking a certified penetration tester to assist with an upcoming contract bid. The ideal candidate will have:
* A recognized penetration testing certification (e.g., OSCP, PNPT, CEH, etc.) * Experience working in compliance-driven health environments * A deep understanding of penetration testing methodologies and best practices * Strong communication skills to clearly document and present findings If you're detail-oriented, responsive, and confident in your ability to support a winning proposal, we’d love to hear from you.
Skills: Information Security, Penetration Testing, Vulnerability Assessment, Security Analysis, Firewall
Hourly rate:
20 - 50 USD
5 days ago
|
|||||
Check Wordpress blog / cPanel for vulnerabilities/ backdoors
|
150 USD | 5 days ago |
Client Rank
- Risky
|
||
I am in search of an experienced WordPress Security Expert to conduct a thorough security analysis of my website/ cPanel. The primary goal is to identify and rectify any vulnerabilities or potential security backdoors, ensuring the safety and integrity of the sites online presence.
The cPanel has had multiple logins with a secure password and 2FA enabled. It may have been the host so We have moved hosts with a backup of the site but need to ensure the site itself is clean without any backdoors. The site does not have any malware. Key Responsibilities: 1. Conduct a comprehensive security audit of our WordPress site. 2. Detect and rectify any security vulnerabilities or backdoors. 3. Offer recommendations for security enhancements 4. Remove any backdoors or vulnerabilities
Skills: WordPress, cPanel, PHP, MySQL, Apache HTTP Server, Backdoor Attack Mitigation, Vulnerability Assessment
Fixed budget:
150 USD
5 days ago
|
|||||
Wordpress Server and Website Security Expert - Compromised Site - Urgent
|
20 - 40 USD
/ hr
|
5 days ago |
Client Rank
- Excellent
$299 718 total spent
38 hires
19 jobs posted
100% hire rate,
open job
5.00
of 14 reviews
|
||
We have a malicious script on our site and need an expert to resolve it urgently. Site on on Wordpress. It is a backdoor injection.
Skills: Cybersecurity Management, Network Security, Network Administration, Security Analysis, System Administration
Hourly rate:
20 - 40 USD
5 days ago
|
|||||
Professional Hacker
|
not specified | 4 days ago |
Client Rank
- Risky
|
||
Job Description
• Ethical hacking and penetration testing • Vulnerability assessment • Malware analysis • Work with other penetration testers and information security analysts • Web application security • Social engineering • Database security • Reverse engineering • Network security • Threat modelling and risk assessment Job Qualifications and Skill Sets • Bachelor’s degree in computer science, information technology security, or related field • Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) • Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring • Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking • Experience with common network infrastructure and security tools • Familiarity with web applications, including HTTP and SQL injection attacks • Knowledge of security testing methodologies in accordance with the EC-Council • Ability to work in a fast-paced environment
Skills: Penetration Testing, Security Analysis
Budget:
not specified
4 days ago
|
|||||
Mobile App Security Expert Needed for Security Audit & Protection
|
120 USD | 4 days ago |
Client Rank
- Excellent
$1 149 total spent
27 hires
28 jobs posted
96% hire rate,
open job
4.57
of 14 reviews
|
||
Description:
We are looking for an experienced mobile app security expert to review and enhance the security of our React Native app before publishing on the Google Play Store. The app involves sensitive user data, so we want to ensure strong protection against vulnerabilities, hacking, and compliance issues. Responsibilities: Conduct a security audit of our mobile app and backend. Identify and fix vulnerabilities (API security, authentication, data encryption, etc.). Implement best practices for Play Store security compliance. Ensure protection against SQL injection, XSS, and other attacks. Suggest secure authentication methods (OAuth, JWT, Play Integrity API, etc.). Requirements: Proven experience in mobile app security (Android, React Native, APIs). Expertise in encryption, secure authentication, and Google Play security policies. Experience with penetration testing and vulnerability assessments. Strong understanding of backend security and API protection. Project Type: One-time audit & implementation, with potential for future security reviews. Please apply with examples of previous security audits, penetration testing experience, or apps you've secured.
Skills: Penetration Testing, Security Analysis, Encryption, Network Security, Vulnerability Assessment, Application Security, Firewall
Fixed budget:
120 USD
4 days ago
|
|||||
Small Business Cybersecurity
|
20 - 50 USD
/ hr
|
4 days ago |
Client Rank
- Good
$1 383 total spent
7 hires
15 jobs posted
47% hire rate,
open job
5.00
of 5 reviews
|
||
Seeking cybersecurity help for my small business. Need best practices advice for router/firewall, email, Shopify, mobile, etc. Would like to be taught penetration testing techniques for after job is completed
Skills: Information Security, Firewall, Encryption, Internet Security, Security Analysis, Network Security
Hourly rate:
20 - 50 USD
4 days ago
|
|||||
Cybersecurity Investigator Needed for Full Device & Account Forensics (Ongoing Attacks)
|
75 - 150 USD
/ hr
|
4 days ago |
Client Rank
- Risky
|
||
Only freelancers located in the U.S. may apply.
Job Description:
We are seeking an experienced cybersecurity expert to investigate and resolve a series of suspected intrusions affecting both a personal device and multiple online accounts. The situation: • A Windows computer has been showing signs of infection, including unusual downloads, system lag, and suspicious activity • Several online accounts (Facebook, Dropbox, email) have experienced unauthorized access or data loss • There may be signs of remote access, spyware, or malware being installed • Login IPs and device history show unknown connections • The goal is to find out what happened, how deep it goes, and how to fully secure the system and accounts Tasks include: • Full forensic analysis of the affected Windows device • Tracing suspicious logins or IPs across multiple accounts • Malware/rootkit detection and removal • Device fingerprint and network analysis • Provide a summary or full report of findings (what happened, when, and by who if possible) • Ongoing consultation on how to stay protected and monitor for further activity Ideal candidate: • Deep experience in digital forensics, incident response, and malware analysis • Can explain findings clearly and give actionable steps • Has experience working with personal security breaches, not just enterprise • Discreet, professional, and able to begin quickly This can be done remotely. Please include your relevant experience and estimated time needed based on our description. We’re looking to start ASAP.
Skills: Information Security, Digital Forensics, Network Security, Ethical Hacking, Security Analysis
Hourly rate:
75 - 150 USD
4 days ago
|
|||||
IT Risk and Security Consultant – Help Protect Our Company Data and Assets
|
100 USD | 4 days ago |
Client Rank
- Excellent
$110 303 total spent
105 hires
164 jobs posted
64% hire rate,
open job
4.99
of 79 reviews
|
||
We are seeking an experienced IT Risk and Security Consultant to help our growing company protect its digital and physical assets, reduce vulnerabilities, and improve internal protocols to safeguard against potential data risks.
We’re looking to take proactive and comprehensive steps to strengthen our information security, internal controls, and overall risk management. As we grow, we want to ensure that company data and assets are well-protected and that we have the right systems in place to prevent unauthorized access or misuse of sensitive information. Key Responsibilities: - Evaluate our current IT infrastructure and identify security weaknesses - Develop a risk management plan and actionable steps to mitigate threats - Advise on internal protocols for employee access, data handling, and monitoring - Recommend tools, technologies, or systems to better secure digital data (e.g., DLP, monitoring tools, access control) - Provide guidance on physical security policies if needed (e.g., for device access, office entry, etc.) - Assist in drafting or updating company policies related to data security, confidentiality, and employee onboarding/offboarding - Help train or educate leadership or staff on security best practices Ideal Candidate Should Have: - Proven experience in IT risk management, cybersecurity, or information security consulting - Knowledge of compliance and data protection standards (e.g., GDPR, SOC 2, etc.) - Familiarity with small to mid-sized businesses and their challenges - Ability to work with leadership to implement practical, cost-effective solutions - Excellent communication skills and high integrity Bonus if you have: - Experience with insider threat prevention - Worked with startups or small companies in scaling securely - Background in HR compliance or legal aspects of employee data theft Project Scope: We are open to both hourly consulting or a fixed-scope audit and recommendation project. 💼 Budget: We are starting with an initial budget of $100 for this consultation and initial recommendations. Depending on feedback, impact, and successful implementation, we may award a higher fixed-fee payout or additional follow-up work.
Skills: Database Security, Security Assessment & Testing, Security Testing, Incident Response Plan, Configuration Management, Information Security Consultation, Security Policies & Procedures Documentation, Information Security, Vulnerability Assessment, Security Analysis
Fixed budget:
100 USD
4 days ago
|
|||||
Cell phone photo
|
not specified | 4 days ago |
Client Rank
- Risky
|
||
Hi! I need to get a photo that was unsent from an iPhone. I have an old device that hasn’t been updated to the latest software. Is there a way to get that photo?
Skills: Network Penetration Testing, OWASP, Cloud Security, Security Analysis, Ethical Hacking, Web Application Security, NIST SP 800-53, Vulnerability Assessment, Penetration Testing, Application Security, OpenVAS
Budget:
not specified
4 days ago
|
|||||
Duplicate Wordpress site, update and secure the site, migrate traffic to the new site
|
14 - 30 USD
/ hr
|
4 days ago |
Client Rank
- Excellent
$4 757 total spent
15 hires
20 jobs posted
75% hire rate,
open job
4.99
of 13 reviews
|
||
Duplicate a Wordpress website for my small business. Update all application components to the latest secure versions. Add captcha to web form. Do security analysis of new website. Redirect traffic from old website to new website. Shut down old website. Add SPF record to my DNS.
Skills: WordPress, Web Development
Hourly rate:
14 - 30 USD
4 days ago
|
|||||
Ethical hacker rqd to find security loop holes
|
800 USD | 3 days ago |
Client Rank
- Excellent
$137 532 total spent
206 hires
218 jobs posted
94% hire rate,
open job
4.90
of 124 reviews
|
||
We need a ln ethical hacker to find security vulnerabilities in our client gaming project.
Skills: Ethical Hacking, Penetration Testing, Security Analysis, Vulnerability Assessment
Fixed budget:
800 USD
3 days ago
|
|||||
eSIM to Physical SIM Copier Software
|
~158 - 473 USD | 3 days ago |
Client Rank
- Excellent
$48 092 total spent
81 hires
, 9 active
9 open job
4.97
of 13 reviews
Registered at: 05/01/2023
|
||
I need a skilled software developer to create a desktop application that can transfer eSIM information to a physical SIM card.
Key Requirements: - The application should be compatible with Windows, macOS, and Linux operating systems. - The software must ensure the integrity and accuracy of the copied information. Ideal Skills: - Proficiency in desktop application development. - Previous experience in developing SIM related software would be highly beneficial. - Strong understanding of multi-OS compatibility is a must. While the primary function of the software is to copy eSIM data, I am open to suggestions for additional features, including but not limited to user authentication, data encryption, and activity logging. A proactive approach and ability to incorporate these elements will be advantageous. Skills: Windows Desktop, Internet of Things (IoT), Wireless Network Security Analysis, Desktop Application, Mobile Accessibility
Fixed budget:
250 - 750 AUD
3 days ago
|
|||||
eSIM to Physical SIM Copier Software -- 2
|
~158 - 473 USD | 3 days ago |
Client Rank
- Excellent
$48 092 total spent
81 hires
, 9 active
9 open job
4.97
of 13 reviews
Registered at: 05/01/2023
|
||
I need a skilled software developer to create a desktop application that can transfer eSIM information to a physical SIM card.
Key Requirements: - The application should be compatible with Windows, macOS, and Linux operating systems. - The software must ensure the integrity and accuracy of the copied information. Ideal Skills: - Proficiency in desktop application development. - Previous experience in developing SIM related software would be highly beneficial. - Strong understanding of multi-OS compatibility is a must. While the primary function of the software is to copy eSIM data, I am open to suggestions for additional features, including but not limited to user authentication, data encryption, and activity logging. A proactive approach and ability to incorporate these elements will be advantageous. Skills: Windows Desktop, Internet of Things (IoT), Wireless Network Security Analysis, Desktop Application, Mobile Accessibility
Fixed budget:
250 - 750 AUD
3 days ago
|
|||||
eSIM to Physical SIM Copier Software..
|
~158 - 473 USD | 3 days ago |
Client Rank
- Excellent
$48 092 total spent
81 hires
, 9 active
11 open job
4.97
of 13 reviews
Registered at: 05/01/2023
|
||
I need a skilled software developer to create a desktop application that can transfer eSIM information to a physical SIM card.
Key Requirements: - The application should be compatible with Windows, macOS, and Linux operating systems. - The software must ensure the integrity and accuracy of the copied information. Ideal Skills: - Proficiency in desktop application development. - Previous experience in developing SIM related software would be highly beneficial. - Strong understanding of multi-OS compatibility is a must. While the primary function of the software is to copy eSIM data, I am open to suggestions for additional features, including but not limited to user authentication, data encryption, and activity logging. A proactive approach and ability to incorporate these elements will be advantageous. Skills: Windows Desktop, Internet of Things (IoT), Wireless Network Security Analysis, Desktop Application, Mobile Accessibility
Fixed budget:
250 - 750 AUD
3 days ago
|
|||||
I need to hire a hacker for recovering my hacked mail account
|
not specified | 3 days ago |
Client Rank
- Risky
|
||
My Google account containing so much private info was hacked 2 days ago, the one who hacked it, performed a factory reset through find my device, wherever that email was logged in that every single device has been factory reset ... I seek for your help, please help me recovering my mail, I have my old password, and hacker changed phone number, email, recovery email and all, if you can help me please help me
Reply as soon as possible ~regards
Skills: Penetration Testing, Network Security, Security Testing, Vulnerability Assessment, Information Security, Certified Information Systems Security Professional, Information Security Audit, Web Application Security, OWASP, Website Security, Ethical Hacking, Security Analysis, Kali Linux, Encryption, Metasploit, Firewall
Budget:
not specified
3 days ago
|
|||||
Cybersecurity Expert Needed for Account Security Assessment
|
100 USD | 2 days ago |
Client Rank
- Risky
|
||
We are looking for a cybersecurity expert to assist in hacking social media accounts that aimed at teenagers sex trade in Saudi Arabia.
Skills: Information Security, Vulnerability Assessment, Security Analysis, Encryption, Internet Security
Fixed budget:
100 USD
2 days ago
|
|||||
Ethical Hacker
|
20 - 50 USD
/ hr
|
2 days ago |
Client Rank
- Risky
|
||
I want to do security analysis and vulnerability testing of my websites.
Skills: Ethical Hacking, Penetration Testing, Security Analysis, Encryption
Hourly rate:
20 - 50 USD
2 days ago
|
|||||
Gmail Account Recovery and Security Enhancement
|
15 - 48 USD
/ hr
|
1 day ago |
Client Rank
- Risky
|
||
We are seeking an expert to assist with Gmail account recovery and implement robust security measures to protect against hacking attempts. The ideal candidate should have experience in account recovery processes, as well as strategies to enhance security settings. Your expertise will help ensure that our Gmail account remains secure and accessible. Please provide details of your previous experience in similar tasks.
Skills: Ethical Hacking, Information Security, Internet Security, Security Analysis, Penetration Testing
Hourly rate:
15 - 48 USD
1 day ago
|
|||||
To remove picture from facebook.
|
not specified | 1 day ago |
Client Rank
- Risky
|
||
I need a picture of my wife removed form facebook, its her mugshot picture and I am trying to get a job and it seems attached to my our face book as soon as you type our last name there it is. Plus there are a lot of comments on it that are not very nice.
Skills: Vulnerability Assessment, Security Testing, Penetration Testing, System Security, Website Security, Information Security, Network Penetration Testing, Black Box Testing, OWASP, Web App Penetration Testing, White Box Testing, Software Testing, Security Analysis
Budget:
not specified
1 day ago
|
|||||
Seeking Experienced Ethical Hackers for Security Assessment
|
10,000 USD | 1 day ago |
Client Rank
- Risky
$584 total spent
1 hires
32 jobs posted
3% hire rate,
open job
1.00
of 1 reviews
|
||
We are looking for skilled ethical hackers. The ideal candidates will utilize their expertise to identify vulnerabilities, perform penetration testing, and provide actionable insights to If you have a proven track record in ethical hacking and a passion for cybersecurity, we want to hear from you!
Skills: Vulnerability Assessment, Information Security, Encryption, Penetration Testing, Security Analysis
Fixed budget:
10,000 USD
1 day ago
|
|||||
NIST CSF Risk Quantification and Assessment Expert Needed
|
350 USD | 1 day ago |
Client Rank
- Excellent
$7 457 total spent
40 hires
34 jobs posted
100% hire rate,
open job
4.97
of 29 reviews
|
||
We are seeking a skilled professional to assist with the grouping of NIST Cybersecurity Framework (CSF) Security Awareness and Training risks. The ideal candidate will conduct comprehensive risk quantification and qualitative assessments to ensure that our organization effectively identifies and manages potential threats. You should have a strong understanding of NIST CSF principles and experience in risk management methodologies. Your insights will be crucial in strengthening our cybersecurity posture.
Skills: Vulnerability Assessment, Information Security, ISO 27001, Security Analysis, Penetration Testing
Fixed budget:
350 USD
1 day ago
|
|||||
Cybersecurity Advisor - Threat Detection/Incident Response
|
50 - 100 USD
/ hr
|
1 day ago |
Client Rank
- Medium
2 jobs posted
open job
|
||
Only freelancers located in the U.S. may apply.
Cybersecurity Advisor - Threat Detection/Incident Response
Location: Remote (USA only) Employment type: Project-based but with the potential for standby support in case of future incidents. Job Overview: We are seeking a highly skilled and proactive Cybersecurity Advisor to collaborate with our team. In this role, you will play a key part in developing a comprehensive security framework that we can implement across the organization. Your expertise will be instrumental in strengthening our security posture and ensuring the protection of our internal systems and client data from potential threats, including data breaches, malware attacks, and other cybersecurity incidents. Key Responsibilities: - Evaluate and strengthen the company’s security posture by identifying vulnerabilities in existing systems and implementing strategies for improvement. - Provide staff and departmental training on incident response protocols and best practices. - Develop and maintain comprehensive reports for internal teams and, when necessary, regulatory agencies. - Monitor security alerts, analyze system logs, and conduct forensic investigations to identify and respond to potential security threats. - Lead incident response efforts during cybersecurity breaches or attacks, ensuring effective containment, eradication, recovery, and post-incident evaluation. - Oversee and coordinate data breach investigations, identifying root causes, system vulnerabilities, and recommending preventive measures. Qualifications: - Must be a U.S. citizen. - Proven experience in cybersecurity incident response and handling data breaches. - Strong understanding of security frameworks, standards, and regulatory compliance. - Expertise in security event logging and data analysis. - Experience with tools and technologies used in cybersecurity threat detection, incident response, and logging systems. - Strong problem-solving skills and the ability to remain calm under pressure. - Excellent communication skills. - Certifications in cybersecurity are highly preferred. - Experience in the MSP industry is a plus, but not required.
Skills: Incident Response Plan, Malware Removal, Application Security, Penetration Testing, Vulnerability Assessment, Security Analysis, Information Security Audit, Network Security, Encryption
Hourly rate:
50 - 100 USD
1 day ago
|
|||||
Cloud Security Analyst Needed for Comprehensive Security Assessment
|
20 - 50 USD
/ hr
|
1 day ago |
Client Rank
- Risky
|
||
We are seeking a skilled Cloud Security Analyst to conduct a thorough assessment of our cloud infrastructure. The ideal candidate will evaluate security measures, identify vulnerabilities, and recommend best practices to enhance our cloud security posture. You will work closely with our IT team to ensure compliance with industry standards and regulations. Familiarity with various cloud platforms and security tools is essential. If you have a passion for cloud security and the skills to back it up, we want to hear from you!
Skills: Vulnerability Assessment, Information Security, Penetration Testing, Security Analysis, Network Security
Hourly rate:
20 - 50 USD
1 day ago
|
|||||
Ruder Cyber Tech Sleuths: Your Trusted Partner for Cryptocurrency Asset Recovery.
|
50 - 80 USD
/ hr
|
1 day ago |
Client Rank
- Risky
|
||
Welcome to RUDER CYBER TECH SLEUTHS . We are a team of brilliant hackers Welcome to RUDER CYBER TECH SLEUTHS! We are a dedicated team of skilled hackers available 24/7 to assist you. Our range of services is extensive, and our process is straightforward, ensuring a smooth experience for every client.
You can hire a hacker for various needs, including: - Crypto scam recovery - Social media account hacks - Email and phone hacks - Credit score improvement - Academic score upgrades - Monitoring your partner's activities Feel free to reach out to us for more details, and we will be happy to help you resolve your issues. Our team consists of professionals with experience from high-profile digital security firms, bringing over 25 years of expertise to meet your needs. Tele gram : @rudercybersleuths
Skills: Information Security, Vulnerability Assessment, Encryption, Security Analysis, Network Security
Hourly rate:
50 - 80 USD
1 day ago
|
|||||
eSIM to Physical SIM Copier Software -- 3
|
~156 - 469 USD | 21 hours ago |
Client Rank
- Excellent
$48 092 total spent
81 hires
, 9 active
12 open job
4.97
of 13 reviews
Registered at: 05/01/2023
|
||
I need a skilled software developer to create a desktop application that can transfer eSIM information to a physical SIM card.
Key Requirements: - The application should be compatible with Windows, macOS, and Linux operating systems. - The software must ensure the integrity and accuracy of the copied information. Ideal Skills: - Proficiency in desktop application development. - Previous experience in developing SIM related software would be highly beneficial. - Strong understanding of multi-OS compatibility is a must. While the primary function of the software is to copy eSIM data, I am open to suggestions for additional features, including but not limited to user authentication, data encryption, and activity logging. A proactive approach and ability to incorporate these elements will be advantageous. Skills: Windows Desktop, Internet of Things (IoT), Wireless Network Security Analysis, Desktop Application, Mobile Accessibility
Fixed budget:
250 - 750 AUD
21 hours ago
|
|||||
Systems and Security Director Needed for Integrated Security Solutions
|
40 - 70 USD
/ hr
|
19 hours ago |
Client Rank
- Risky
|
||
We are seeking an experienced Systems and Security Director to oversee the integration and security of our employee systems and POS systems. The ideal candidate will have a proven track record in developing and implementing security strategies, ensuring data protection, and managing system integrations. You will work closely with our IT team to ensure seamless operations while maintaining the highest security standards. If you are diligent, detail-oriented, and have a solid understanding of system security best practices, we would love to hear from you!
Skills: Network Security, Information Security, Vulnerability Assessment, Firewall, Security Analysis
Hourly rate:
40 - 70 USD
19 hours ago
|
|||||
I’ve been hacked & want to know by who
|
not specified | 13 hours ago |
Client Rank
- Risky
|
||
I’ve been hacked & have been receiving threats ! I’ve been receiving threatening messages & so has my family members. I just want to trace the number that has been messaging me.
Skills: Penetration Testing, Information Security, Vulnerability Assessment, Application Security, System Security, Firewall, Ethical Hacking, Security Analysis, Security Infrastructure, Security Testing, Internet Security, Database Security, Security Assessment & Testing
Budget:
not specified
13 hours ago
|
|||||
Penetration Testing for a Web application
|
not specified | 13 hours ago |
Client Rank
- Risky
|
||
ethically stress test a QA website by simulating high volumes of realistic user traffic using advanced tools and proxy-based techniques. Your goal is to identify performance bottlenecks, server limitations, or potential failure points by gradually increasing load until the website slows down or returns errors. You aim to mimic real user behavior, including browsing, clicking, scrolling, and interacting with APIs or forms, rather than just sending empty requests. You intend to bypass superficial CDN layers (if any) and apply intelligent proxy rotation to simulate traffic from thousands of unique IP addresses. Ultimately, your objective is to expose how the backend handles pressure under near-real-world conditions, helping improve scalability and infrastructure readiness.
Skills: C++, C#, Windows App Development, Ethical Hacking, Application Security, Encryption, Security Testing, System Security, Information Security, Article Writing, Desktop Application, Security Analysis, Security Assessment & Testing, Penetration Testing, Writing, Virus Removal
Budget:
not specified
13 hours ago
|
|||||
Malware testing for detection and response
|
300 USD | 4 hours ago |
Client Rank
- Excellent
$101 651 total spent
70 hires
148 jobs posted
47% hire rate,
open job
4.89
of 41 reviews
|
||
Looking someone to evaluate an new EDR solution, against other EDRs, under different frameworks, Testing scope will be provided, Looking someone who can work with offshore team and complete the testing, we need someone who knows how to work with offshore developers and get desired results, this may become on going task once we go for proper certifications
Skills: Information Security, Network Security, Penetration Testing, Security Analysis, Internet Security
Fixed budget:
300 USD
4 hours ago
|
Streamline your Upwork workflow and boost your earnings with our smart job search and filtering tools. Find better clients and land more contracts.