Looking For A Network Security Consultant With Snort Installation Experience

Looking for a network security consultant with Snort installation experience.
We want to implement Snort into our platform, but need the guidance of a consultant to help us.
Please apply if you have experience with Snort.
Preferred candidates will be video interviewed via Skype.
Tags: It And Networking, Information Security


Similar Freelance jobs:

Database Admin

Initial position: 1. We have multiple Excel Tables from various suppliers. The columns vary from vendor to vendor. The mapping must be made clean and thoughtful. 2. We have a Lightspeed Webshop 3. We have a category structure which has to be mapped with the suppliers and the products of the suppliers. Workflow: 1. We supply you with different Excel Tables of Suppliers containing data from various products. 2. You gather all the informations together and build a complete import…
Full Description of Database Admin

Big Data Developer

Project is a business intelligence type of solution dealing with data from different sources: logs, site visitors, CRM lists or purchase history data, etc. An EMR based solution is used to analyze and develop person-based marketing campaigns that can be deployed to any of the media platforms. Tech stack: AWS: S3, EC2, Elastic Beanstalk, Aurora RDS, EMR DB: MySQL (using Aurora DB from AWS) Hadoop: Spark on top of AWS EMR ETL: Apache Nifi correction: AWS: S3, EC2, SQS, Aurora…
Full Description of Big Data Developer

Database Analyst

This role provides accurate reporting, recording, rating and tracking of donor's confidential data, and their activity. ESSENTIAL DUTIES: Support the Archdiocese and ministries with accurate and timely data exports and imports. Design and create database reports. Provide data analysis to support the Archdiocese and ministries. Responsible for supporting teams within the Office of Development with any database needs. This includes supporting the Donor Relations team and Campaigns and Appeals team. Provide documentation for complex database processes. Implement data integrity checks…
Full Description of Database Analyst

Looking For FileMaker Certified Developer

Behind our software solutions are dedicated staff members, always striving to provide best-in-class service to our clients. Are you looking for an opportunity to develop and to realize your full potential? Neo Code works with companies large and small, and we are good at juggling deadlines and priorities to keep a wide portfolio of client's excellent satisfaction. We work independently, flexible, and make time for family, friends, and other pursuits. We’re looking to hire a FileMaker Certified developer that is…
Full Description of Looking for FileMaker Certified Developer

CRM Coordinator (TEMP)

Responsibilities: Work with CRM Managers & Assoc. Managers to execute messaging plans for all games on all CRM channels Create and help manage project management needs for CRM campaign executions (via ticketing software tools) Maintain quality assurance across CRM channels and programs Assist team with reporting needs (portfolio and campaign level) Coordinate plans with various stakeholders internally and externally Be a customer advocate within Ubisoft marketing, ensuring the highest quality interactions with the customer across all CRM channels Qualifications College…
Full Description of CRM Coordinator (TEMP)

Penetration Tester Wanted For Websites

Penetration tester wanted for websites. We have several clients who want to test their website's security and for this we need penetration testers. We will provide you with website and details of what needs to be done. If possible, we will agree on terms and fees. Please contact me if you have highly experience in this. Thank you
Full Description of Penetration tester wanted for websites

Security Of Information

As a language service provider we work closely with our clients on translation of sensitive documents including PHI and Financial information. Recently clients are asking us to improve our IT security, and I have several vendor questionnaires on my desk that we need to complete successfully in order to keep their business, which means that we have to upgrade our systems to something approaching ISO 27001. 1. Assist in the development of information security program to contain: a. Security Management…
Full Description of Security of Information

Information Security

This position will allow you to use your expertise developing, implementing and ensuring compliance of IT solutions. Responsibilities: Review HIPAA breach notification rule policies and procedures. Review policies and procedures related to HIPAA Security Rule physical, administrative and technical safeguards. Provide compliance reports and participate in regular compliance meetings to discuss issues and mitigation strategies. Respond to Individuals’ privacy concerns regarding unauthorized access by family members, friends, or others. Assess and audit security requirements by studying business requirements; conducting system…
Full Description of Information Security

Information Security / Customer Service Rep

This role is able to autonomously manage and own numerous multiple-solution customers and related demands with ease. CSRs are often times the go-to person for challenging day-to-day and complex internal or external scenarios. The ability to seek and accept feedback from others while learning to provide similar feedback constructively is an important part of this role. A CSR plays an integral part in meeting all company goals: Guarantee satisfaction and value for our customers Contribute to a work environment that…
Full Description of Information Security / Customer Service Rep

Cyber Security Analyst

Seeking a Cyber Security Analyst (CSA) to provide technical analysis for IA/CS support and integration efforts. The CSA will perform in-depth analysis in various areas and technologies for DIACAP Certification and Accreditation (C&A) / RMF Assessment and Authorization (A&A). Responsibilities Reviews, updates, validates and authors Cybersecurity procedures (SOPs) as required. Reviews and maintains an inventory of authorized software. Reviews and maintains an inventory authorized external (USB) devices and media. Audits and validates configurations deployed on laptops, workstations, and servers. Audits…
Full Description of Cyber Security Analyst

Information Security Analyst

Essential Job Functions: Plan, implement, upgrade and monitor all security measures for the complete protection of company’s computer networks and retail platform for e-commerce websites for company’s products by Javascript, PHP and SQL. Monitor and manage server logs and traffic patterns to prevent application and network level cyber-attacks by Java and Wireshark; analyze vulnerability reports from anti-virus software such as MacAfee and install security patches Python and Microsoft Excel. Ensure appropriate security controls are in place that will safeguard digital…
Full Description of Information Security Analyst

Information Security Consultant

As an Information Security Consultant, you will deliver risk and compliance services/assessments to mitigate existing and future security risks. You will also propose security controls for long-term solutions in a Healthcare environment, while working closely with clients and partnering with your internal Leadership team and colleagues. Conduct information security risk assessments based on industry standards (HIPAA/HITRUST, NERC, PCI-DSS, GLBA, FFIEC, SOC2, NIST, ISO) Respond to advisory service requests to address and answer client questions and/or needs Provide information security management…
Full Description of Information Security Consultant

It Support

i am an it speacialiste i have lot of expérience in in information technology field i have ccna and ejbt certificat i can help people to improve their secyrity and fix their probleme with internet i can test peoples website to see if they are secure and did not have any security problemes
Full Description of it support

IT Cyber And Security Information Intern

You will work towards improving Company-wide solutions and contribute ideas & support to improve our data and security program. Throughout the internship you will learn to measure and monitor the progress and status of our initiatives & gain real time experience with a variety of security tools and enhance processes to drive security program value in our organization. Who are you? Concise communicator Analytical-minded & solution-dedicated Able to grasp & apply new concepts Determined to achieve results Developed time management…
Full Description of IT Cyber and Security Information Intern

Network Admin

Qualifications: ● CCNA or CCNP certification is a MUST or combo of certification and work experience. ● Routing/Switching - Strong Analytical and troubleshooting skills with Routing/Switching across platforms. ● Demonstrated proficiency in the following technologies: Spanning Tree, DHCP, TCP/IP, Routing Protocols (OSPF, RIP, EIGRP, BGP), QoS, Multicast, MPLS, VLAN and VTP, Etherchannel, VSS, SPAN / RSPAN ● Ability to handle critical customer issues/problems. ● Able to determine problems and deliver known solutions with a high level of customer satisfaction. ●…
Full Description of Network Admin


© 2005 - 2019 getFreeLancer.com
2,713 contracts/jobs/projects currently available in our database.

There are 18 users online now.
Most online ever was 1568.