Remote Network And System Administration Job In IT And Networking

Consultant needed to perform security gap assessment for our system.

Find more Network And System Administration remote jobs posted recently Worldwide

We need a Gap Analysis Report which shows Security Gaps and their Severity for one of our systems. Since the work is urgent, the consultant will need to complete the assessment in 3 to 5 days.
About the recuiter
Member since Nov 11, 2022
Monika Putri
from Vermont, United States

Open for hiringApply before - Sep 1, 2024

Work from Anywhere

40 hrs / week

Hourly Type

Remote Job

$19.05

Cost

Offer to work on this project closes in 20 days!
Are you interested in this Opportunity?

Looking for help? Checkout our video tutorial
How to search and apply for jobs

How to apply? Do you have more questions about the Job?
See frequently asked questions

Similar Projects

Recover personal email account for a penetration test

I need an IT expert helping to recover access to MY email account for security test purposes.
If this is successful, it will be an ongoing job.

Apply only if you have experience in similar fields.

Digital Forensic Expert needed to decrypt WhatsApp crypt12 file without key

I want to retrieve the chats on the Crypt12 database file of WhatsApp. The challenge is that I do not have the cipher key which can easily help me access it through WhatsApp viewer but I have the file.

Cyber Security Company to Market in the US

Cybersecurity is one of the fastest growing industries in the US. Im looking for an established cybersecurity company currently providing managed/email/cloud security services to market and sell their services.

My company will function as...read more

INFORMATION SECURITY CONSULTANT – Remote working / London

A London based client is seeking an Information Security Consultant to support their solar system technologies team and Information technology department by providing a cyber security strategy and setting roadmap for their business.
The role off...read more

Cyber Security - Penetration Testing

1. Determine the applicable Risk Management Framework(s)
2. Determine the attack surface
3. Perform a policy/configuration and documentation review
4. Run a vulnerability assessment at HQ and the colocation facility
5. Create a Cybers...read more