Certified Information Systems Security Professional (CISSP)

Migration Mpsl To Sd-wan -- 2
1st I have received from the internet service provider the allocated WAN IP along for all our branches (Sydney, Melbourne, Brisbane, Perth and Adelaide along with other configuration information, so we can now begin the 1st phase to pre-configure 4 new Sophos XG125W routers, after that I will ship them to the respective branches. the 5th router is currently in use at the head office (Sydney) with the old IPS setting .We can still pre-configure another interface with the new…
Full Description of Migration MPSL to SD-WAN -- 2
Found A Malicious Script In Linux Server
I have been noticing weird behavior in my server. I found some weird scripts last time, deleted them, installed clamAV and did a full scan, found no malware. I found scripts now recently again that seem to be trying to change my (super user's) password, disabling https and secure checkout in our e-commerce website that runs on CS-Cart. Here is a snippet of the script ibb.co/kcMqnz8 I have given access to developers and other relevant people in the past but…
Full Description of Found a malicious script in Linux server
Energy-efficient Implementation Of Ephemeral Ecdh Key Exchange Using Lightweight Elliptic Curves For Use In Iot.
We need to pick the method from paper 1 and light weight elliptic curves from paper 2. Implement ecdh using the method picked for those lightweight elliptic curves We need to implement fixed-base comb method for fixed base scalar multiplication, Montgomery ladder method for variable base scalar multiplication .we need to identify whether the additional scalar multiplication is fixed or variable or anything else To get the properties of mote curves, identify a library that supports more curves *Mote curves…
Full Description of Energy-Efficient Implementation of Ephemeral ECDH Key Exchange using…
Microsoft Azure Cloud Security Architect
Overall 10+ years experience in Technology with extensive experience in cloud solutions (Azure) • Extensive experience in cloud based DDoS protection services  • Knowledge of network based, system level, and application layer attacks and mitigation methods • Experience with the implementation of security solutions in an enterprise cloud based environment • Experience with a broad range of security technologies including, SAST, DLP, IDS/IPS, IAM, Certificate Management • Knowledge of Azure security strategies and tools • Strong knowledge of technology and…
Full Description of Microsoft Azure Cloud Security Architect
Write A Thorough Cyber Threat Report With Given Findings
I am looking for someone to help me write a cyber threat report with given findings. We need the report to contain lots of content and explanations about past threats and business risks of each risk/finding. Total of 4 findings.
Full Description of Write a thorough cyber threat report with given…
Code Signing Service Needed
I have a .xlsm file packaged as a .exe. Let’s calll it abc.exe . Now I have this abc.exe file packaged into an installer xyz.exe. xyz.exe also installs a software package. This file is available to download on my website. I do not want a new user to receive the “windows smartscreen” warning. How can I do so?
Full Description of Code signing service needed
© 2006 — 2024 hirelancer.com is an affiliate website, listing the freelance projects. We are collaborating with other sites like getFreelancer.com. Feel free to bid on any project and good luck! You will need register first, before bidding or posting projects. Basic memberhsip is always free. We might earn commissions from referring you. You will never ever pay additional fees for we referred you.