Search & apply Encryption jobs online posted on Toogit, Create a free account today, & apply on the popular Encryption work that you love to do remotely.
Posted at 2 days ago
SSL Certificate We are looking for a resource for deployment of Wild Card SSL Certificate - with support for Unified Communication Certificates, Organization Validation and Wild Card for multiple domains. There are total of 48 servers. Scope of work will include the following. Full Subject Alternative Name (SAN) control Organiz...read more
Apply On This JobPosted at 2 days ago
I want to retrieve the chats on the Crypt12 database file of WhatsApp. The challenge is that I do not have the cipher key which can easily help me access it through WhatsApp viewer but I have the file.
Apply On This JobPosted at 3 days ago
BitLocker for windows end clients - discuss options, setup and configGPO policy review and changes - windows 2016 std serverHybrid environment with DC ( 2016 windows std server ) on-premAD connect sync to AAD for SSOO365 E5 and Enterprise Mobility + Security E3 - which gives IntuneLaptops are domain joined and most of them have...read more
Posted at 6 days ago
It is necessary to exploit vulnerabilities on the site.- XSS vulnerabilities- MySQL injection.- DDoS protect.- Inside network,- Network.
Apply On This JobPosted at one week ago
Hii need to add a function to a my python script.It should work in this way1. send a request using 4 variables loaded in a txt file. As response you will get a new variableit must be saved in the txt 2. second a new request using 5 variables from a txt file plus another variable that must be encrypted
Apply On This JobPosted at one week ago
With the TLS encryption set-up, every email between my client and my domain is automatically encrypted. I need an IT expert to help me set up the project.
Apply On This JobPosted at one week ago
Hey, I'm trying to set up a proper security system for my home lab. I'm currently trying to set up SecurityOnion with Hyper-V but I'm unable to get anything other than OSSEC alerts in squert. I am monitoring the 1 NIC on the computer and the management NIC is using the Hyper-V virtual LAN.I am seeking someone who has a lot of ex...read more
Apply On This JobPosted at one week ago
I need to do PT to my fitness app, I have there images and videos, will be there subscriptions, users etc. So please tell me what can you do in this PT.The job will be available in 1 or 2 weeks.The language of the app, Android (Kotlin), iOS (Swift) and the server is AWS
Apply On This JobPosted at one week ago
Problem statement : system that would evaluate the pattern matching signatures in insecure environments without revealing either the signatures themselves or the portions of the corpus matched by those signatures. [ONLY SCRIPT DESCRIPTION ] In the case of cyber-security, the classified information could describe the behav...read more
Apply On This JobPosted at 2 weeks ago
I installed tor and git annex on my mac using brew. I can't use git annex's p2p features; and it seems that the culprit is tor's configuration. I need help troubleshooting.
Apply On This JobPosted at 2 weeks ago
-Design, test, implement and secure the operating systems, networks and database-Carry out risk analysis and assessments as well as operation and maintenance of application security tools-Other security tasks include network access, architecture, firewall and data traffic-Carry out security audits, vulnerability testing and code...read more
Apply On This JobPosted at 2 weeks ago
I have MS Excel file which is password protected and encrypted. I lost the password, and I am trying to recover the password. I am looking for someone who can recover or break the password of the file.
Apply On This JobPosted at 4 weeks ago
Our company has staff in 10 countries, some in satellite offices and some working from home. We need two solutions either on the same server infrastructure or different.1 - VPN: some staff require access to our development and production environment in AWS as well as other platforms. We need them only accessing those resources...read more
Apply On This JobPosted at 4 weeks ago
We are looking to transition the IT infrastructure currently managed internally to anexternal managed service provider. This also includes bringing power up-to-speed withindustry-standard best practices. The service provider must provide a written Service LevelAgreement (SLA), which covers security concerns, risks, liability, co...read more
Apply On This JobPosted at one month ago
5+ years PKI, Encryption Architecture, Software Development experience5+ years Java, Python or C+ experience automating Network and Cloud security Cisco, AWS, GCP Networks and Cloud Security Experience (Nice to have)SIP, Unified Communications, R &S working knowledge (preferred to have)Network Penetration, Ethical hacking and En...read more
Apply On This JobPosted at one month ago
To whom it may concern,Recently my Instagram got hacked and also my email. I have been in contact with AOL and Instagram but they have not been the best helpers... I would love to have my email back because it has personal information. They also changed my phone number and recovery emailThanks
Apply On This JobPosted at one month ago
Ensuring secure network safety and protection of any cyber linkage
Apply On This JobPosted at one month ago
I have a password protected word file in .docx format and I forget password of the same.Please help me for the same.
Apply On This JobPosted at one month ago
We need a Gap Analysis Report which shows Security Gaps and their Severity for one of our systems. Since the work is urgent, the consultant will need to complete the assessment in 3 to 5 days.
Posted at one month ago
>>> Problem statement : system that would evaluate the pattern matching signatures in insecure environments without revealing either the signatures themselves or the portions of the corpus matched by those signatures. [ONLY SCRIPT DESCRIPTION ] In the case of cyber-security, the classified information could describe the b...read more
Create a free profile to broadcast your skills, experience, and desired pay rate to clients with Encryption expertise. You choose the payment method that's best for you to easily get paid for your online work.