Find & apply on latest Vulnerability Assessment open jobs posted on Toogit, Create a free account today, & apply on the popular Vulnerability Assessment work that you love to do remotely.
Fixed - Posted at 2 days ago
We need a white paper that documents and outlines the types of security systems and processes that our company has in place. This is a document that we will use as a marketing tool for acquiring customers and answering questions.We are looking for a competent technical writer who can assimilate all of the information we provide...read more
Easy ApplyFixed - Posted at 3 days ago
I am looking for a standard document to send a client when they don't follow my suggestions. Example would be if a customer does not want to backup their systems. The format would something like:1. Our Advice.....2. Risks if advice not followed....Looking for topics like Security Awareness Training, Backups, AntiVirus, MFA,...read more
Hourly - Posted at 4 days ago
Looking for Azure security consultant to implement best practices for all Azure resources.Knowledge of Azure AD, Azure Security Center and Azure Sentinel required.
Fixed - Posted at one week ago
Digital security assignment. Please read project file.
Easy ApplyHourly - Posted at one week ago
We are a small IoT company about to release our first IoT product, consisting of a hardware platform, mobile application, and cloud backend. We want to ensure security at every level. We're looking for an expert in modern IoT security to give guidance throughout the development process and audit our final solution.Applicants wil...read more
Hourly - Posted at 2 weeks ago
Looking for a security expert to provide recommendations and perform security audits for our platform, which is built from a backend which serves API and a mobile app that consumes this API.
Easy ApplyFixed - Posted at 2 weeks ago
1- Social Media account creation and tasks automation for marketing purposes.2- Campaigns Management and reporting.
Easy ApplyHourly - Posted at 2 weeks ago
Expert at all things authentication, authorization and SSO. - okta - OpenID connect - Oauth2 - JWT - SAML - RBAC - ldap - able to code - microservices - Kubernetes - service mesh (optional)
Fixed - Posted at 2 weeks ago
Looking for a Metasploit scan against our server stacks. The test would review both the external and internal vulnerabilities of two different stack setups. Result would be a PDF report, with an extra payment if re-testing is required after remediation
Easy ApplyFixed - Posted at 2 weeks ago
We are developing a health education website that requires users to enter PHI. Need assistance with certifying website is HIPAA compliant.
Easy ApplyCreate a free profile to broadcast your skills, experience, and desired pay rate to clients.
You choose the payment method that's best for you to easily get paid for your work.