Search & apply Encryption jobs online posted on Toogit, Create a free account today, & apply on the popular Encryption work that you love to do remotely.
Posted at one day ago
We have a Web App, and off late, we have found the below concerning activities:1. Scrapers (Of Russian origin) have created fake profiles on both sides of our marketplace, which needs to stop2. Scrapers have been able to post projects on our web app, without signing up, from their local servers3. Scrapers have been able to do ac...read more
Apply On This JobPosted at one week ago
To whom it may concern,Recently my Instagram got hacked and also my email. I have been in contact with AOL and Instagram but they have not been the best helpers... I would love to have my email back because it has personal information. They also changed my phone number and recovery emailThanks
Apply On This JobPosted at one week ago
>>> Problem statement : system that would evaluate the pattern matching signatures in insecure environments without revealing either the signatures themselves or the portions of the corpus matched by those signatures. [ONLY SCRIPT DESCRIPTION ] In the case of cyber-security, the classified information could describe the b...read more
Posted at 2 weeks ago
Private/sensitive work regarding coding. I will share remaining details with shortlisted candidates through Toogit chat.
Apply On This JobPosted at 3 weeks ago
I'm looking for experts with experience in cybersecurity, SaMD and digital health.Experience within the Medical Device industry is valuable but not a deal breaker.
Apply On This JobPosted at 3 weeks ago
Someone to draw me a picture of atrailer backed to the dock with a dock plate behind the trailer and a forklift
Apply On This JobPosted at one month ago
Currently our file system is encrypted. We need ethical hackers to decrypt and get the data backup.
Apply On This JobPosted at one month ago
Someone to draw me a picture of atrailer backed to the dock with a dock plate behind the trailer and a forklift
Apply On This JobPosted at 2 months ago
Wanted to know the daily SOC operations and how to manage the SIEM for daily operations and best practices.
Apply On This JobPosted at 3 months ago
Private/sensitive work regarding coding. I will share remaining details with shortlisted candidates through Toogit chat.
Apply On This JobPosted at 3 months ago
I want to retrieve the chats on the Crypt12 database file of WhatsApp. The challenge is that I do not have the cipher key which can easily help me access it through WhatsApp viewer but I have the file.
Apply On This JobPosted at 3 months ago
I need someone who understands digital forensics. the task is to answer the question about forensics. if you don't have any knowledge of forensics analysis then please don't apply.I will provide you with a mock paper (interview questions) to complete before i hire you as part of interview. if you are not prepared then please don...read more
Apply On This JobPosted at 4 months ago
Looking for someone to remove malware from wordpress site. Need it completely removed without damaging the core files.
Apply On This JobPosted at 5 months ago
I am looking for a standard document to send a client when they don't follow my suggestions. Example would be if a customer does not want to backup their systems. The format would something like:1. Our Advice.....2. Risks if advice not followed....Looking for topics like Security Awareness Training, Backups, AntiVirus, MFA,...read more
Posted at 5 months ago
I need to do PT to my fitness app, I have there images and videos, will be there subscriptions, users etc. So please tell me what can you do in this PT.The job will be available in 1 or 2 weeks.The language of the app, Android (Kotlin), iOS (Swift) and the server is AWS
Apply On This JobPosted at 5 months ago
A reverse engineer who is excellent with unpacking and deobfuscating code (electron JS applications). One who can mimic authentication endpoints to yield a true response. We will be creating a similar patcher that will mimic the authentication and we will be creating our own authentication to call upon our authentication server...read more
Apply On This JobPosted at 7 months ago
Currently our file system is encrypted. We need ethical hackers to decrypt and get the data backup.
Apply On This JobPosted at 8 months ago
I am looking for a standard document to send a client when they don't follow my suggestions. Example would be if a customer does not want to backup their systems. The format would something like:1. Our Advice.....2. Risks if advice not followed....Looking for topics like Security Awareness Training, Backups, AntiVirus, MFA,...read more
Posted at 9 months ago
I have an external drive which is encrypted with a complex password using Bitlocker. The task is to unlock the drive without affecting the contents. No recovery code is available.May be Brute Force should work. I must say that password is complex to match.
Apply On This JobPosted at 9 months ago
I need to do PT to my fitness app, I have there images and videos, will be there subscriptions, users etc. So please tell me what can you do in this PT.The job will be available in 1 or 2 weeks.The language of the app, Android (Kotlin), iOS (Swift) and the server is AWS
Apply On This JobCreate a free profile to broadcast your skills, experience, and desired pay rate to clients with Encryption expertise. You choose the payment method that's best for you to easily get paid for your online work.