Data Protection is all about safeguarding and managing, as well as controlling access to all data in order to maximize its security, integrity and availability. A Data Protection Expert is an invaluable professional who specializes in protecting this sensitive data from any form of malicious attack, enabling companies and organizations to protect their valuable information.

A Data Protection Expert is highly skilled and knowledgeable about the constant changing landscape of cyber-security technologies, frameworks and best practices. They mainly focus on using the most comprehensive security solutions to accurately identify any vulnerabilities within a system and look for possible cybercrime threats. Data Protection Experts offer their clients the expertise, skills and tailored advice to ensure the highest grade of data security, compliance and privacy.

Here's some projects that our expert Data Protection Experts made real:

  • Collecting economic development data
  • Data verification and background checks
  • Auditing in-person locations worldwide
  • Exam assistance on various topics
  • Store items data collection

With our experienced professionals of Freelancer.com, clients are sure to find the right expert who can help them secure and protect any kind of sensitive data and achieve their desired results. Our experts specialize in the aforementioned project categories among many other areas where their expertise can be valuable for your business or organization.

We invite you to post your own project on Freelancer.com and hire a Data Protection Expert today! Our community of highly skilled professionals are available to assist you with your unique challenges to ensure your success in fulfilling all objectives related with safeguarding your valuable data assets.

De 9,273 opiniones, los clientes califican nuestro Data Protection Experts 4.9 de un total de 5 estrellas.
Contratar a Data Protection Experts

Data Protection is all about safeguarding and managing, as well as controlling access to all data in order to maximize its security, integrity and availability. A Data Protection Expert is an invaluable professional who specializes in protecting this sensitive data from any form of malicious attack, enabling companies and organizations to protect their valuable information.

A Data Protection Expert is highly skilled and knowledgeable about the constant changing landscape of cyber-security technologies, frameworks and best practices. They mainly focus on using the most comprehensive security solutions to accurately identify any vulnerabilities within a system and look for possible cybercrime threats. Data Protection Experts offer their clients the expertise, skills and tailored advice to ensure the highest grade of data security, compliance and privacy.

Here's some projects that our expert Data Protection Experts made real:

  • Collecting economic development data
  • Data verification and background checks
  • Auditing in-person locations worldwide
  • Exam assistance on various topics
  • Store items data collection

With our experienced professionals of Freelancer.com, clients are sure to find the right expert who can help them secure and protect any kind of sensitive data and achieve their desired results. Our experts specialize in the aforementioned project categories among many other areas where their expertise can be valuable for your business or organization.

We invite you to post your own project on Freelancer.com and hire a Data Protection Expert today! Our community of highly skilled professionals are available to assist you with your unique challenges to ensure your success in fulfilling all objectives related with safeguarding your valuable data assets.

De 9,273 opiniones, los clientes califican nuestro Data Protection Experts 4.9 de un total de 5 estrellas.
Contratar a Data Protection Experts

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    20 trabajos encontrados

    **Looking for Email Data Contributors (Remote)** We are hiring contributors for a structured **email data submission project**. This is a **data contribution task**, where participants will export and submit business promotional emails from their own inbox following defined guidelines. --- **Project Overview** * Submit business emails in **.eml format** * Emails must be **genuinely received by you** * No scraping, purchasing, or third-party sourcing allowed --- **Scope** * Category: **Promotional emails only** (offers, newsletters, campaigns) * Language: Based on eligibility (assigned after selection) --- **Requirements** * Desktop/laptop required * No modification or editing of email files * No forwarded or replied emails (Re:/Fwd: not allowed) * Business domains only (no perso...

    $18 Average bid
    $18 Oferta promedio
    6 ofertas

    I’m organising a pre-employment vetting round for candidates based in Newcastle upon Tyne and need a reliable partner who can handle both background checks and reference checks from start to finish. Scope • Background checks – nationwide criminal record search and any other standard UK screenings you normally include. • Reference checks – contacting and documenting at least two professional referees per candidate, with written confirmation. I’ll confirm the exact number of candidates once the interview stage is complete, but please be ready to work to tight turn-around times. I will supply signed consent forms and any candidate information you require; you return a concise report for each individual (PDF is fine) that clearly states pass/fail finding...

    $10 - $60
    Local
    $10 - $60
    0 ofertas

    My Asus X1505Z, fitted with an M.2 SSD, is locked by BitLocker after a former employee enabled encryption and left without sharing the password or recovery key. I must regain full access to every file on the drive—there are no backups to fall back on—yet I would like the work carried out entirely through remote means. I do not have the PIN nor the recovery key for the laptop. The device was not a part of active directory and the person used his own Microsoft account. To my knowledge it is locked with PIN and TPM. I can allow remote access via Anydesk as i can boot it to Hiren or Medicat via usb. I am willing to obtain any required software in support of this recovery within reason (not more than the cost of the freelancer fee) If you have proven experience in Windows Bi...

    $344 Average bid
    $344 Oferta promedio
    24 ofertas

    I need help tightening the digital security around a growing library of photographs. My priority is data protection: the images must stay confidential, unaltered and accessible only to authorised users. Here’s what I’d like from you: • Assess the current storage workflow (local drives, cloud folders, backups) and identify vulnerabilities. • Propose and implement practical safeguards—encryption at rest/in transit, granular access controls, and tamper-evident measures. • Document every change so I can maintain the system long-term, including clear restoration steps if something ever goes wrong. If you have hands-on experience with secure photo archives, modern encryption standards (AES-256, TLS), and best-practice key management, I’d love to...

    $228 Average bid
    $228 Oferta promedio
    3 ofertas

    Consulta de Dados Pessoais e Empresariais: Garantia de Segurança e Confiabilidade Proteger sua empresa ou residência começa com a escolha certa das pessoas ao seu redor. Ao realizar contratações ou interações comerciais, é essencial garantir que não haja problemas legais ou históricos que possam colocar em risco a segurança e a integridade da sua organização ou ambiente familiar. Com minha consultoria de dados, você terá a certeza de tomar decisões mais informadas e seguras, sempre com sigilo, responsabilidade e eficiência. Serviços Oferecidos: Localização de Pessoas: Encontre indivíduos de maneira rápida e precisa, com informaç&o...

    $10 - $30
    $10 - $30
    0 ofertas
    Hesap guvenilirligi
    5 días left
    Verificado

    Sertifikali hackerlik. Veri guvenligi veri sizma testi sistem guvenilirlik testleri

    $164 Average bid
    $164 Oferta promedio
    2 ofertas

    I need a seasoned ethical hacker to perform a full-scale security audit of one of my production web applications. The primary goal is to uncover code-level vulnerabilities—anything from insecure input handling to flawed session management—and provide a clear remediation plan. While the audit may touch on broader OWASP issues, I’m specifically interested in how the current codebase could be exploited and what exact fixes will close those gaps. Here is how I see the engagement unfolding: • Conduct a thorough review of the live application and its underlying source code, using industry-standard tools such as Burp Suite, OWASP ZAP, static analysis utilities, and any custom scripts you rely on. • Deliver a detailed report that ranks each finding by severity, expl...

    $3431 Average bid
    $3431 Oferta promedio
    1 ofertas

    I'm seeking a skilled cybersecurity professional to secure my devices. Someone has been infiltrating my macOS computer and iOS phone, and I need expert help to stop this. Key Requirements: - Secure my devices from unauthorized access - Identify and remove any existing malicious code - Provide a report on vulnerabilities - Recommend and implement security measures Ideal Skills and Experience: - Proven track record in cybersecurity - Expertise in macOS and iOS security - Strong knowledge of malware and intrusion detection - Ability to communicate technical details clearly Please ensure you have relevant certifications and experience.

    $27 / hr Average bid
    $27 / hr Oferta promedio
    13 ofertas

    Saya mencari ahli yang dapat memberi saya konsultasi keamanan jaringan yang solid untuk lingkungan Perbankan dan Keuangan. Fokus utama saya adalah menilai postur keamanan saat ini, mengidentifikasi celah kritis, lalu merancang rencana mitigasi yang praktis dan siap diterapkan. Ruang lingkup singkat: • Meninjau arsitektur jaringan dan kebijakan akses yang sudah ada. • Melakukan analisis kerentanan tingkat jaringan serta pengujian penetrasi terbatas bila diperlukan. • Menyusun laporan risiko beserta rekomendasi prioritas (best practice, kepatuhan regulator, dan langkah cepat yang dapat diambil tim internal). • Sesi diskusi online untuk memaparkan temuan dan menjawab pertanyaan tim IT saya. Saya menghargai komunikasi jelas, dokumentasi terstruktur, dan pendekatan p...

    $30 Average bid
    $30 Oferta promedio
    1 ofertas

    A full-scope penetration test is required on my production web application with special attention paid to authentication and authorization workflows, input validation and sanitization routines, session management, and any additional vectors you deem necessary for a modern OWASP-aligned assessment. Automated scanning is welcome, yet the emphasis should remain on thorough manual exploitation using tools such as Burp Suite, Kali Linux, or equivalents, so that business-logic flaws are uncovered alongside technical ones. Please include a redacted sample or concise summary of past work that demonstrates report structure, depth of findings, and remediation guidance. No other application materials are necessary at this stage. Deliverables expected: • An executive summary and detailed ...

    $263 Average bid
    $263 Oferta promedio
    27 ofertas

    تمت مشاركة مقطع خاص بشخص يهمني على موقع إباحي مجاني يمكن لأي زائر الوصول إليه من دون تسجيل دخول. لا أملك حسابًا هناك ولا أعرف شيئًا عن شروط استخدام المنصة، ومع ذلك أحتاج أن يُزال الفيديو نهائيًا في أسرع وقت وأن أحصل على خطة واضحة تمنع ظهوره أو إعادة نشره مستقبلًا. أبحث عن مختص لديه خبرة فعلية في إجراءات الإزالة من المواقع الإباحية المجانية، سواء عبر مخاطبة الإدارة مباشرة، استخدام قوانين الخصوصية أو حقوق النشر (DMCA أو ما يعادلها)، أو الضغط التقني-القانوني حتى يُحذف الرابط والنسخ المكررة بالكامل من خوادمهم وأي شبكة توزع المحتوى. بعد الحذف أريد تقريرًا موجزًا يشرح ما تم، وروابط التحقق، ونصائح عملية أتبعها إذا حاول أحدهم نشر المقطع مرة أخرى، بما في ذلك نماذج رسائل جاهزة وخطوات رصد تلقائي لإعادة الرفع. سأعتبر المهمة مكتملة عند: • اختفاء الفيديو والرابط الأصلي من الموقع وعدم ظهوره في الب...

    $182 Average bid
    $182 Oferta promedio
    4 ofertas

    Someone has taken my personal photos and opened an Instagram account in my name. I need concrete proof of who is behind the profile—specifically the person’s real, legal name and their current location. At the moment I have no useful leads beyond the existence of the fake account, so the investigation will have to start from scratch. I am expecting a concise report that includes: • The verified full name of the individual operating the Instagram profile • A traceable location (city and—if reasonably obtainable—street-level accuracy) backed by clear evidence or data points Please outline the methods you plan to use (OSINT, metadata analysis, reverse-image search, social-graph research, etc.) and an estimated timeline. All work must remain within ...

    $15 Average bid
    $15 Oferta promedio
    5 ofertas

    Title: Cybersecurity Specialist Needed to Identify and Eliminate Ongoing Device & Account Breach Description: I am looking for an experienced cybersecurity professional to help investigate and resolve a serious security issue. Last month, multiple personal accounts (including WhatsApp and other social platforms) and devices were compromised. Since then, I have: Switched to new devices Reset passwords and secured accounts Enabled basic security measures However, I still suspect unauthorized access or persistent compromise. There are concerns that my data may have been exposed or that a hidden vulnerability (malware, spyware, remote access, or account takeover method) still exists. Scope of Work: Perform a full security audit of devices and accounts Identify how the breach occurred...

    $36 / hr Average bid
    $36 / hr Oferta promedio
    11 ofertas

    I need an experienced security expert to evaluate the network layer of our multiplayer game infrastructure. This evaluation is limited to penetration testing and does not include reverse engineering or anti-cheat development. The evaluation must cover three core activities: port scanning (mapping all exposed services), vulnerability scanning (identifying exploitable weaknesses), and intrusion detection testing (evaluating the responsiveness of our current monitoring systems to actual attack patterns). Vulnerability reproduction needs to be written into a simple user interface script. You will be using a test copy of the production environment for the evaluation, which includes the login server, matchmaking server, and in-game transaction server. Upon completion of the testing, I expect to...

    $164 Average bid
    $164 Oferta promedio
    21 ofertas

    Project Brief (Summary): Authorized Token Exposure Testing Platform Goal Develop a security testing tool to identify insecure handling of API tokens, session tokens, and credentials in web apps and APIs— Mainly Telgram HTTP API tokens Core Functions Scan for phishing websites…, - Traffic Analysis: Inspect and replay HTTP requests to detect tokens in headers, cookies, and responses - Client-Side Scanning: Identify tokens or secrets in JavaScript, LocalStorage, SessionStorage, and frontend code - Endpoint Discovery: Map API endpoints and classify authentication requirements - Token Inspection: Decode and analyze JWTs (expiry, scope, sensitivity) - Auth Testing: Validate whether APIs correctly enforce authentication and authorization - Offline Analysis: Support...

    $138 Average bid
    $138 Oferta promedio
    72 ofertas

    Social Media Policy Specialist – Defamation & Impersonation Account Takedown Job Description: I am looking for a Social Media Specialist or Digital Rights Expert who is highly experienced in Meta’s (Facebook) Community Standards and reporting mechanisms. We are currently dealing with a serious case of digital harassment and defamation involving two specific Facebook pages: A Fake/Impersonation Page: Used to spread false information, blackmail, and damage family reputation. A Personal Account: Used to manage the fake page and facilitate illegal activities (linked to a criminal case with a final court ruling). Your Responsibility: Analyze the content on both pages to identify all violations of Meta's Terms of Service (Harassment, Bullying, Impersonation, Illegal Ac...

    $158 Average bid
    $158 Oferta promedio
    16 ofertas
    Review My LINDDUN Analysis
    1 día left
    Verificado

    I have completed a LINDDUN-based privacy risk analysis and now need an academically experienced specialist to validate every step, from the underlying threat-modeling logic through to the final mitigation plan. The material is in a single document and covers all seven LINDDUN categories, but I am especially concerned about how I have handled Threat Modeling, the Privacy Risk Assessment itself, and the Mitigation Strategies that flow from it. Please pay particular attention to the threats of Linkability, Identifiability, and Detectability. I want to be sure that the assumptions behind each risk score are defensible, that the reasoning chains are intact, and that the counter-measures I propose are both technically sound and properly mapped back to the identified threats. What I expect from...

    $20 / hr Average bid
    $20 / hr Oferta promedio
    25 ofertas

    **Title:** Senior Full-Stack Auditor & Technical Overseer ( / Supabase / Lovable) **Project Overview:** We are building *Smart Connect Solutions*, a professional service-based marketplace focused on HR and on-demand services. The frontend and initial logic have been generated using AI (), and we are now looking for a highly experienced Senior Full-Stack Developer to act as a long-term Technical Consultant and Auditor. This is not a traditional development role. Instead, we are seeking a “Technical Guardian” who ensures the platform remains scalable, secure, and well-architected as we grow. --- **Key Responsibilities:** * **Code Audit:** Review and validate code exported from Lovable to ensure quality, performance, and security best practices. * **Architecture & ...

    $187 Average bid
    $187 Oferta promedio
    205 ofertas

    I need an experienced security professional to spend time in our Delhi NCR office and harden every layer of our development environment, starting with the laptops my engineers use daily. Immediate focus – securing laptops Please arrive ready to implement or advise on: • Prevent data/code leakage • Restrict USB, file sharing, and all external uploads • Control developer access with screen recording Activity monitoring is the key restriction I want enforced from day one. You may bring your own preferred EDR/DLP toolset or work with ours; what matters is that the controls are provably effective and centrally managed. Broader scope during the same engagement Once the endpoints are locked down, I’ll move straight to: – Rolling out Data Loss Preve...

    $80 Average bid
    $80 Oferta promedio
    9 ofertas
    Excel VBA 600 INR
    13 horas left
    Verificado

    We need an Excel VBA quotation system (offline) for a windows & doors company. The system must include: A protected Admin Pricing Sheet where only admin can control all prices (designs, materials, colors, glass, screens, key lock, installation rates, delivery rate). A Customer Database where users can add customers, but cannot edit or delete them without admin approval. Customers must be searchable and auto-filled into quotations. A Quotation system where: - Quotation number is automatic - Date is automatic - Expiry date is +15 days - User selects customer, adds salesperson name and remarks Each quotation must support multiple line items. Each line includes: Design, Material, Color, Glass, optional Screen, optional Key Lock, Width, Height, Quantity. The system must automatically...

    $11 Average bid
    $11 Oferta promedio
    17 ofertas

    Artículos recomendados solo para ti