Search the best Encryption Jobs

Search & apply Encryption jobs online posted on Toogit, Create a free account today, & apply on the popular Encryption work that you love to do remotely.



Search Encryption Work

Watch how to apply for jobs on Toogit?

Trusted by the top innovative brands

Explore more than 10 "Encryption" expert jobs & apply for free.

SSL Certificate

Posted at 2 days ago

$19.16
Hourly
Open for hiringApply before - Aug 10, 2024

SSL Certificate We are looking for a resource for deployment of Wild Card SSL Certificate - with support for Unified Communication Certificates, Organization Validation and Wild Card for multiple domains. There are total of 48 servers. Scope of work will include the following. Full Subject Alternative Name (SAN) control Organiz...read more

Apply On This Job

Digital Forensic Expert needed to decrypt WhatsApp crypt12 file without key

Posted at 2 days ago

$28.74
Fixed
Open for hiringApply before - Jul 11, 2024

I want to retrieve the chats on the Crypt12 database file of WhatsApp. The challenge is that I do not have the cipher key which can easily help me access it through WhatsApp viewer but I have the file.

Apply On This Job

BitLocker setup and config, AD GPO security expert

Posted at 3 days ago

$19.16
Hourly
Open for hiringApply before - Jun 10, 2024

BitLocker for windows end clients - discuss options, setup and configGPO policy review and changes - windows 2016 std serverHybrid environment with DC ( 2016 windows std server ) on-premAD connect sync to AAD for SSOO365 E5 and Enterprise Mobility + Security E3 - which gives IntuneLaptops are domain joined and most of them have...read more

Apply On This Job

Exploitation of all vulnerabilities on the site

Posted at 6 days ago

$4.79
Hourly
Open for hiringApply before - May 30, 2024

It is necessary to exploit vulnerabilities on the site.- XSS vulnerabilities- MySQL injection.- DDoS protect.- Inside network,- Network.

Apply On This Job

Add a request to a python script

Posted at one week ago

$9.58
Hourly
Open for hiringApply before - Aug 6, 2024

Hii need to add a function to a my python script.It should work in this way1. send a request using 4 variables loaded in a txt file. As response you will get a new variableit must be saved in the txt 2. second a new request using 5 variables from a txt file plus another variable that must be encrypted

Apply On This Job

Email TLS Encryption

Posted at one week ago

$19.16
Hourly
Open for hiringApply before - May 19, 2024

With the TLS encryption set-up, every email between my client and my domain is automatically encrypted. I need an IT expert to help me set up the project.

Apply On This Job

SecurityOnion/Network Security Tutoring

Posted at one week ago

$19.16
Hourly
Open for hiringApply before - Jun 2, 2024

Hey, I'm trying to set up a proper security system for my home lab. I'm currently trying to set up SecurityOnion with Hyper-V but I'm unable to get anything other than OSSEC alerts in squert. I am monitoring the 1 NIC on the computer and the management NIC is using the Hyper-V virtual LAN.I am seeking someone who has a lot of ex...read more

Apply On This Job

Penetration Testing to my app, Android and iOS.

Posted at one week ago

$47.89
Fixed
Open for hiringApply before - Jul 1, 2024

I need to do PT to my fitness app, I have there images and videos, will be there subscriptions, users etc. So please tell me what can you do in this PT.The job will be available in 1 or 2 weeks.The language of the app, Android (Kotlin), iOS (Swift) and the server is AWS

Apply On This Job

Need Document description for Secure and confidential rule matching

Posted at one week ago

$478.93
Fixed
Open for hiringApply before - Jun 1, 2024

Problem statement : system that would evaluate the pattern matching signatures in insecure environments without revealing either the signatures themselves or the portions of the corpus matched by those signatures. [ONLY SCRIPT DESCRIPTION ] In the case of cyber-security, the classified information could describe the behav...read more

Apply On This Job

Need help configuring tor and git-annex to play nice

Posted at 2 weeks ago

$19.16
Hourly
Open for hiringApply before - Jul 28, 2024

I installed tor and git annex on my mac using brew. I can't use git annex's p2p features; and it seems that the culprit is tor's configuration. I need help troubleshooting.

Apply On This Job

Systems Security Specialist (Ethical Hacker)

Posted at 2 weeks ago

$19.16
Hourly
Open for hiringApply before - Jul 26, 2024

-Design, test, implement and secure the operating systems, networks and database-Carry out risk analysis and assessments as well as operation and maintenance of application security tools-Other security tasks include network access, architecture, firewall and data traffic-Carry out security audits, vulnerability testing and code...read more

Apply On This Job

Recover or break password of excel file (.xlsx) (fees negotiable)

Posted at 2 weeks ago

$95.79
Fixed
Open for hiringApply before - May 26, 2024

I have MS Excel file which is password protected and encrypted. I lost the password, and I am trying to recover the password. I am looking for someone who can recover or break the password of the file.

Apply On This Job

Install Linux Based VPN and Webfiltering Solution for distributed work force

Posted at 4 weeks ago

$19.16
Hourly
Open for hiringApply before - Jun 15, 2024

Our company has staff in 10 countries, some in satellite offices and some working from home. We need two solutions either on the same server infrastructure or different.1 - VPN: some staff require access to our development and production environment in AWS as well as other platforms. We need them only accessing those resources...read more

Apply On This Job

IT Infrastructure Management

Posted at 4 weeks ago

$19.16
Hourly
Open for hiringApply before - Jun 14, 2024

We are looking to transition the IT infrastructure currently managed internally to anexternal managed service provider. This also includes bringing power up-to-speed withindustry-standard best practices. The service provider must provide a written Service LevelAgreement (SLA), which covers security concerns, risks, liability, co...read more

Apply On This Job

PKI, Encryption Developer with strong Java, Python, C+

Posted at one month ago

$26.82
Hourly
Open for hiringApply before - Jun 11, 2024

5+ years PKI, Encryption Architecture, Software Development experience5+ years Java, Python or C+ experience automating Network and Cloud security Cisco, AWS, GCP Networks and Cloud Security Experience (Nice to have)SIP, Unified Communications, R &S working knowledge (preferred to have)Network Penetration, Ethical hacking and En...read more

Apply On This Job

Hacked Email Recovery

Posted at one month ago

$383.14
Fixed
Open for hiringApply before - Jun 9, 2024

To whom it may concern,Recently my Instagram got hacked and also my email. I have been in contact with AOL and Instagram but they have not been the best helpers... I would love to have my email back because it has personal information. They also changed my phone number and recovery emailThanks

Apply On This Job

Data Extraction

Posted at one month ago

$19.16
Hourly
Open for hiringApply before - Jun 8, 2024

Ensuring secure network safety and protection of any cyber linkage

Apply On This Job

Ethical Hacker needed for recover my ms word .docx file password.

Posted at one month ago

$9.58
Hourly
Open for hiringApply before - Jun 8, 2024

I have a password protected word file in .docx format and I forget password of the same.Please help me for the same.

Apply On This Job

Consultant needed to perform security gap assessment for our system.

Posted at one month ago

$19.16
Hourly
Open for hiringApply before - Jun 6, 2024

We need a Gap Analysis Report which shows Security Gaps and their Severity for one of our systems. Since the work is urgent, the consultant will need to complete the assessment in 3 to 5 days.

Apply On This Job

Need Document description for Secure and confidential rule matching

Posted at one month ago

$478.93
Fixed
Open for hiringApply before - Jul 6, 2024

>>> Problem statement : system that would evaluate the pattern matching signatures in insecure environments without revealing either the signatures themselves or the portions of the corpus matched by those signatures. [ONLY SCRIPT DESCRIPTION ] In the case of cyber-security, the classified information could describe the b...read more

Apply On This Job

Want to work on more Encryption jobs?

Sign-up

How to start your next job?

Create a free profile to broadcast your skills, experience, and desired pay rate to clients with Encryption expertise. You choose the payment method that's best for you to easily get paid for your online work.

Toogit Payment Protection
Toogit payment protection ensures that the work doesn't go unpaid.