Security jobs
I’m looking to turn my concept into a fully-functioning mobile application that runs natively on both iOS and Android. Because the core feature set is still being finalised, I need a developer who is ...consistent user experience across devices, clean and well-documented code, and a development process that allows for iterative feedback. You’ll handle UI/UX implementation, core functionality, testing, and store-ready packaging; I’ll provide prompt responses and clear decisions at every milestone. If you have a solid track record shipping cross-platform apps, can walk me through best practices for security and user authentication options, and are comfortable setting up CI/CD for future updates, I’d love to hear how you’d approach the project and an es...
I’m building a browser-based application and the user interface must be its standout feature. All screens are already drafted in Figma; what I need now is production-ready code that brings those designs to life with React while talking seamlessly to a .NET back end and a...README with setup, build, and deployment steps 3. Passing unit / integration tests for critical flows 4. A deployed demo on any cloud or staging server for review Acceptance criteria • Every UI element matches the Figma design within a 2-pixel tolerance on common breakpoints • API calls return expected payloads in under 300 ms locally • No critical or high-severity issues in an automated security scan I’ll be available daily for quick feedback cycles so we can iterate fast an...
...frontend (preferably React or ) * Developing backend services and APIs (Node.js or Java preferred) * Designing and implementing the database schema (PostgreSQL or equivalent) * Implementing task workflow logic, role-based dashboards, and admin controls * Integrating payment systems (e.g., Stripe or similar) * Setting up cloud infrastructure and deployment (AWS, GCP, or equivalent) * Ensuring security best practices and performance optimization Nice-to-have experience includes building marketplace platforms, SaaS products, workflow/task management systems, or gig economy applications. The ideal candidate should be comfortable making product and technical trade-offs, not just executing instructions. Please include in your proposal: * Relevant past projects (especially marketplac...
I’m ready to turn an idea for an on-demand marketplace into a live product centred on professional servic...profile set-up and service discovery. 3. Admin dashboard to moderate profiles, handle disputes and pull basic analytics. Acceptance criteria • Both user types can create, edit and deactivate their accounts without admin help. • Every provider profile displays ratings & reviews, a portfolio gallery and an availability calendar that can be updated in real time. • Data validation, basic security hardening (OWASP top 10) and responsive design across desktop and mobile. I’m open to milestone suggestions that line up with your preferred workflow. Once we agree on the stack and timelines, I’ll supply wireframes and brand guidelines so yo...
...listing functionality * Mobile responsive design * Greek & English language support Optional (nice to have – mention separately in proposal): * Live chat support bubble * Rating / review system * Notifications (email / on-site) * Promote listing feature Important Requirements: * Clean and well-structured code (no messy plugin stacking) * Ability to scale in the future (this is very important) * Security best practices * Fast loading speed * Full ownership of code, database, and files upon completion Deliverables: * Fully working website * Admin access * Source code & database * Basic documentation or guidance Timeline: Please provide estimated delivery time. Budget: Open to offers, but looking for a cost-effective MVP first. Very Important: Please include i...
...JavaScript framework, Laravel, or a well-optimised WordPress setup—as long as performance is fast, code is clean, and future feature additions are easy. Please outline: 1. Your suggested architecture and tools. 2. How you will implement and test the predictor algorithm. 3. Timeline with key milestones from wireframes to launch. 4. Post-launch support or maintenance options. Quality UI/UX, solid security practices, and SEO-friendly structure are non-negotiable. Show me similar education or calculator projects you have delivered and let’s get started....
...who already understands theTMT sector to take full, ongoing care of our digital front door. The company website needs fresh blog articles, up-to-date product pages, and timely news releases written in clear Tamil (with concise English when necessary), plus design tweaks that keep the look modern and the navigation effortless. You will also keep the engine room humming—monitoring speed, plugins, security patches, and any technical hiccups before they reach visitors. At the same time, our LinkedIn, Facebook, and Instagram feeds must become a steady stream of relevant industry insights, project highlights, and engaging visual stories. Craft the posts, schedule them, respond to comments, and watch the analytics so we can refine the tone and timing week by week. Deliverabl...
I want a self-contained engine that reliably boosts my Twitter presence through a controlled mix of real users and well-managed bot accounts. The goal is to lift raw follower count while also driving up engagement rate and daily profile visits so the growth looks organic a...visits—visible inside native Twitter Analytics. • A dashboard or log file proving every action your code performed, with timestamps and success/fail notes. • Clear setup notes so I can redeploy the system on another VPS without hand-holding. If you have prior work with Twitter API v2, automation frameworks like Puppeteer or Selenium, or experience farming aged accounts safely, let me see it. Security, human-style timing, and the ability to fine-tune rules on the fly are far more important to...
...safe cutover plan, execute migration and modernization (lift-and-shift where appropriate, refactor where required), and leave us with documented, automated operations (IaC, CI/CD, observability, backup/DR, security controls). What I expect from you • Review the current EC2, RDS, and S3 configurations, then right-size or redesign them for lower cost without hurting performance. • Implement cost-saving measures such as auto-scaling policies, spot or reserved instances, storage life-cycle rules, and any other best-practice features you recommend. • Harden the setup with sensible security settings and monitoring appropriate for a healthcare product. • Provide a brief hand-over guide so my in-house team can maintain the environment once your work is...
...verification * SMS verification * Secure login system * Role-based access control --- ### 10. Security and Access Control The system must enforce strict access rules: * Sensitive data locked until payment * Proper permission handling across all roles * Secure file storage and access * Backend validation of all critical operations No reliance on frontend-only protections. --- ### 11. UI and User Experience The platform should feel premium and polished: * Clean, modern interface * Mobile responsive * Clear user flows * No broken states or unclear transitions --- ## Technical Approach The developer is free to choose the technology stack, as long as the following are achieved: * Scalability * Security * Real-time capability where required * Clean and maintainable ...
...Store-ready APK, signed and aligned • Source code repository with build instructions and a short demo video that walks through search, profile login, chat, map view, payment flow, and review submission Acceptance criteria The final build must install on Android 8.0+ devices, return relevant results within one second on a typical 4G connection, process sandbox payments successfully, and pass a brief security review for authentication and data encryption. If you already have modules covering any of these areas—search filters, in-app chat, Google Maps overlays, Stripe/PayPal payments, or a ratings widget—let me know; leveraging existing, battle-tested components will keep costs and timelines under control. I’m ready to start as soon as I see a portfolio ...
...sweep combined with a usability audit and clear bug reporting. Scope The store must run perfectly on desktop, mobile, and tablet. I’m particularly concerned with three pillars during testing: • Functionality – every link, button, form, cart action, payment flow, signup, and email trigger. • Performance – load times, asset optimisation, responsive behaviour, and any rendering glitches. • Security – obvious vulnerabilities, mixed-content warnings, insecure cookies, or anything that could jeopardise customer data. Deliverables 1. A prioritised bug list (critical, major, minor) with steps to reproduce, device/browser details, and screenshots or short Loom videos. 2. A concise UX critique highlighting friction points and quick-win i...
I have a very time-sensitive situation involving CCTV security-camera footage where the license plate on a moving car is lost in both low resolution and motion blur. My goal is a sharp, clearly readable plate, not just a slight tweak. You will receive either the full video or a set of individual frames—whichever you feel will yield the best result. Please outline the file format, frame extraction guidelines, or any metadata you need so I can prepare everything in one upload. Because the footage suffers from both resolution loss and motion streaking, I’m expecting a mix of super-resolution, de-blurring, frame stacking, or other forensic video-enhancement techniques. If you normally rely on tools such as Amped FIVE, MATLAB, Topaz, OpenCV, or custom AI models, let me kn...
I’m building a new landing page for a cybersecurity services firm and need a specialist who can shape both the wireframe and the on-page copy in one cohesive pass. The goal is a clear, conversion-focused layout that feels corporate and professional from the ...containing editable design file and a separate, clearly formatted text document for the content Acceptance criteria • Layout adheres to best UX practices for B2B cybersecurity sites • Copy is original, free of jargon overload, and optimized for clarity and conversion • All agreed sections are present and visually balanced across breakpoints If you’ve produced similar landing experiences in the security or tech space, I’d love to see them. Looking forward to collaborating on a page that ...
I need help improving the audio quality of my home security camera footage. The current background and static noise makes it difficult to hear any voices at all. Requirements: - Remove static noise, indoor, and outdoor sounds. - Enhance clarity of all voices, especially during conversations. Ideal Skills & Experience: - Experience with audio editing software. - Ability to isolate and enhance specific audio frequencies. - Attention to detail to ensure natural sound quality. Please provide samples of previous similar work.
I need a complete, self-hosted email solution for a small business that I’ll be running on a Linux server (Ubuntu or CentOS—whichever you feel is best for the chosen stack). The key objective is to move away from third-party providers and gain full control over our mail, security, and data compliance. The specific mail-transfer agent is still open: Postfix, Exim, Mailcow or another proven alternative can be used, as long as the end result is stable, secure, and straightforward to maintain. What I expect from you: • A production-ready mail server configured with SMTP, IMAP/POP3, spam and virus filtering, DKIM, SPF, DMARC, and valid SSL/TLS certificates. • Simple webmail access and clear instructions so that I can add domains, users, and aliases without t...
...stable) - PM2 (or equivalent process manager) 3. Set up Nginx as a reverse proxy 4. Connect domain and configure DNS correctly 5. Install SSL certificate (Let’s Encrypt – HTTPS) 6. Fix routing / page loading issues 7. Ensure the app runs persistently (auto restart if it crashes) 8. Connect website forms to email via SMTP 9. Optimize performance (fast loading, caching if needed) 10. Basic server security: - Firewall setup - Fail2Ban (if appropriate) Bonus (Preferred but not required): - Walkthrough or instructions on how I can update/edit the site myself - Optional staging environment Requirements: - Clean, professional setup (no shortcuts) - Everything tested before completion - I want full control after deployment (no ongoing dependency) Deliverables: - Ful...
...status immediately. 2. Employers can create openings, review applicants, move them through defined hiring stages, and message candidates inside the portal. 3. Recruiters can oversee multiple employer accounts from a single dashboard. 4. All three authentication options—email/password, social, and SSO—work reliably and issue secure JWT sessions. 5. The live site meets basic OWASP Top-10 security checks and loads in under two seconds on desktop. If you have past ATS, career site, or HR tech experience, please include links or brief case studies. I’m aiming for a six-to-eight-week build and am open to discussing the tech stack you feel most confident shipping on—React, Vue, Angular, or even a full Django or Laravel solution are all possibilities. Let...
...email-and-password login backed by robust Two-Factor Authentication. • Solid API integration work—some endpoints are already documented, others will need to be explored together—so the site can talk to external services in real time. Key expectations • Clean, well-documented PHP (Laravel experience is a plus but not mandatory). • Modern JavaScript practices for any front-facing logic you touch. • Security-first mindset: hashing, input validation, CSRF protection, rate limiting, the works. • Comfortable working from a private Git repo and pushing frequent, test-covered commits. Deliverables are accepted when each feature is live on the staging server, passes my manual tests, and ships with a concise readme explaining setup and depen...
15 MODULES + DUPLICATE PREVENTION OVERVIEW VENDOR NOTE: Module numbering M1-M15. All modules required for complete textile wholesale suite. ID Module Name Priority M1 Ultimate Custom Invoice (Color Status + Transport Auto-Fetch) CRITICAL M2 Textile Barcode System (Design+Lot+Qty Intel...Collection Bot HIGH M6 Monthly Ledger Confirmation WhatsApp HIGH M7 Short Payment Alert + Reason Capture HIGH M8 Last 10 Rates Popup + WhatsApp Negotiation Share MEDIUM M9 Negative Stock Blocking + Owner Override HIGH M10 Compulsory Discount in Item Master MEDIUM M11 Customer 360° Dashboard HIGH M12 Textile Intelligence Reports Pack (12 Reports) HIGH M13 Owner Dashboard (Mobile + Desktop) HIGH M14 Security + Audit Trail + Edit Log Enforcement HIGH M15 Duplicate Prevention & Data Integrity ...
...existing Linux stack (Ubuntu 22.04 on AWS EC2), then moves into tightening every layer—optimising configuration, hardening services, and putting robust security controls in place. What matters most to me is confidence that the machines are patched, performance-tuned, and continuously protected. After the initial hardening you will set up real-time monitoring and alerting (Prometheus + Grafana is currently installed but not fully wired), document a clear maintenance schedule, and remain on hand for rapid incident response. Deliverables • Comprehensive audit report with recommended fixes • Implementation of agreed configuration and security changes (SSH hardening, iptables/ufw rules, automated patching, secure backups) • Deployment or refinement ...
...Affiliate marketing (moving services, utilities, internet, etc.) Sponsored listings (apartments, real estate, local businesses) 2. TECH STACK (NO SUBSCRIPTION DEPENDENCY) WordPress CMS Theme: Must be lightweight, fast, and fully owned (NO monthly or yearly theme fees allowed) Rank Math SEO WPForms or Gravity Forms Ad Inserter (ad placement control) LiteSpeed Cache or WP Rocket (performance) Wordfence Security Google Analytics + Search Console Theme Requirement: The site must NOT depend on any subscription-based theme. Allowed approach: - Free performance themes (recommended) - Or custom-built WordPress theme Priority is speed, SEO structure, and conversion—not design templates or theme branding. Recommended Base Themes (Optional) GeneratePress (free) Astra (free) Kadence (f...
...of work – Windows Server (2019/2022) with Active Directory, Group Policy, DNS, DHCP and occasional Hyper-V guests – Linux (mainly Ubuntu LTS and CentOS) hosting web stacks in Apache/Nginx, Docker containers and a handful of cron-driven services – Network-level touches such as VPN endpoints, firewall rule edits and certificate renewals whenever they intersect with server upkeep – Routine security hardening and log review; escalate anything suspicious straight away Expected deliverables • Weekly health report that lists updates applied, incidents handled and current uptime metrics • A tested backup-and-restore run once per month, recorded step by step • Change documentation stored in the Confluence space I provide, so every twea...
I need a facial recognition system integrated into drones for secure delivery services. The system is essential for verifying identities and ensuring secure access to delivery points. Key Requirements: - Develop a robust facial recognition algorithm. - Integrate the system with drone technology. ...verifying identities and ensuring secure access to delivery points. Key Requirements: - Develop a robust facial recognition algorithm. - Integrate the system with drone technology. - Ensure real-time processing and accuracy. - Provide a user-friendly interface for monitoring. Ideal Skills and Experience: - Expertise in AI and machine learning. - Experience with drone technology. - Background in security systems. - Strong software development skills. Looking for candidates who can del...
...expect: • A modern, responsive design that guides shoppers from product page to checkout with as few clicks as possible. • WooCommerce (or an equally robust plugin) installed, configured, and stress-tested, covering taxes, shipping, and order emails. • All current products, pages, images, and blog posts migrated, cleaned up, and optimised without site downtime. • Page-speed, on-page SEO, and security best practices baked in from the start. • Room to bolt on additional payment gateways or review features later without major re-work. Deliverables: 1. Custom or premium child theme set up and branded to our guidelines. 2. Fully functional shopping cart flow, from Add-to-Cart through order confirmation. 3. Complete content and SKU migration. 4. ...
...provided with the following information about a project that a team within your organisation wants to progress. Please prepare a presentation (20- 25 mins) outlining of the process you would follow in order to assess and improve the security of this project as a whole. Please focus your attention on the following: What sort of information will you need to progress your assessment and how would you obtain it? What are the key aspects of this project that need attention and how can they be addressed? What methodologies would you apply in assessing the security risks, governance, compliance? How would you recommend risks and vulnerabilities are addressed by the project? Scenario The organisation has recently proposed a new project – a generative AI driven chat b...
...multi-tenant transportation SaaS, and I need a complete quality audit finished as soon as possible—no later than 20 business days after the NDA is signed. What I expect you to cover • Functional depth first: 13 individual modules (booking, dispatch, driver tracking, pricing, invoicing, SMS/email marketing, and the rest) must be exercised in real-world workflows for all six user roles. • Security with special focus on tenant-to-tenant isolation. Authentication, authorization, injection vectors, and PCI areas still need attention, but isolation is the non-negotiable baseline. • Load and performance baselines under realistic concurrency. • Usability feedback from the perspective of each role. • Cross-browser verification (latest Chrome, Fi...
...deployment documentation Any modern, scalable stack is acceptable—common choices are React or paired with Node, Django, or Laravel on the back end, and a cloud host such as AWS or GCP, but feel free to recommend alternatives that better suit high-traffic marketplaces. Acceptance criteria: the delivered MVP must run smoothly on common browsers and current iOS/Android versions, pass standard security checks (OWASP Top 10), and include full source code with setup instructions....
...Acceptance criteria: solutions must be applicable to currently sold European dispensers, use commercially available parts or software, and be described with enough detail that an in-house maintenance team can implement them without guesswork. When you respond, please highlight previous hands-on experience preventing or auditing dispenser tampering (petroleum retail, weights & measures, instrumentation security). I am selecting based on demonstrated field experience rather than generic research ability....
I’m building a pan-India social-networking platform that will launch first in Bangalore and then scale nationwide. The site must let users schedule appointments, book paid or free consultations, and match with freelancers or jobs—all in one place. I’m looking ...across Indian tier-2 cities 2. Payment callbacks work end-to-end and remain PCI-DSS compliant 3. A pen-test shows no critical or high vulnerabilities before launch 4. “One-click” deployment provisions a fresh environment in under 30 minutes If you have hands-on experience with React, Angular, Node.js, Django, or equivalent stacks, can wire up the payment flows, and know your way around AWS security groups and cloud firewalls, let’s get started. Please outline your milestones, tool...
...ensure wide accessibility and high performance under heavy traffic. Special attention should be given to streamlined user journeys (no more than three steps per action), peak load management during match days, and data collection/analytics to monitor engagement. The solution should also include a centralized back-office for managing content, lottery draws, transactions, and users, with strong security, transparency, and reliability standards....
...this round. I haven’t locked down whether the final architecture should remain a simple LAN, scale into a WAN, or blend the two, so I’m counting on your insight to recommend the cleanest, most scalable approach once you review my requirements. Here’s what I’ll look for: • A working .pkt file with every device clearly labelled, configured, and cabled • Routing (static or dynamic), VLANs, basic security, and end-to-end connectivity demonstrated in the simulation • A concise document or set of notes that explains the design logic and key IOS commands so I can maintain or expand the network later If you’ve produced solid Packet Tracer topologies before and know your way around Cisco IOS, this should be straightforward. Tell me your t...
...high-volume Handwriting service first. Your task is to help me secure direct clients—ideally in the UK, USA or any other international market—quickly. I’m ready to move the moment prospects are identified, onboarded and contracts are signed, so speed is important. Key details you may need when approaching prospects: • End-to-end fulfilment handled entirely in-house (no subcontracting). • Robust security, NDA compliance and 24/6 support. • Scalable capacity for large batches or ongoing handwriting projects. Acceptance criteria 1. A vetted list of qualified leads (decision makers with a verified need for handwriting services). 2. At least one signed service agreement or purchase order accepted by both parties. 3. Transfer of all dis...
I am looking to develop a fully functional, production-ready non-custodial cryptocurrency wallet mobile application. The app must provide secure and reliable wallet functionality, following industry standards for security and performance, comparable in structure (but not scope) to Trust. Core Features: Wallet creation (secure generation of seed phrase / mnemonic) Wallet import (restore using seed phrase) Display wallet address and QR code Display on-chain balance (Ethereum network initially) Send and receive transactions Transaction history Technical Requirements: Must use for wallet generation, signing, and transaction handling Use Infura or Alchemy for blockchain RPC connectivity Non-custodial architecture (private keys generated and stored locally on device only) Secure stor...
...days free trial Then paid subscription required. Subscription Plans: K5 Daily K25 Weekly K80 Monthly Required Payment Methods: Airtel Money MTN Mobile Money Zamtel Kwacha (optional later) Need automatic account unlock after payment. Subscription Logic Required User pays Access activated automatically Expiry countdown Renew reminders Grace offline mode (2–3 days) Server validation when online Security / Protection Need protection against abuse: Account-based access Device linking Premium lock system Secure backend validation API protection Admin Panel (Preferred) Need web dashboard to manage: Users Active subscriptions Payments Notifications Reports Support tickets Analytics UI/UX Requirements App must be: Very simple Fast Clean modern design Easy for non-techn...
Make a party flyer with text: GRACECHELLA Grace’s Sweet Sixteen | June 20 | 5:30PM “SHE CAME. SHE SLAYED. SHE BLEW OUT THE CANDLES.” Saturday, June 20 | 5:30PM till late Flower crowns required. Glitter is the dress code. Hearts on full send. DRESS CODE: Festival goddess meets bir...5:30PM till late Flower crowns required. Glitter is the dress code. Hearts on full send. DRESS CODE: Festival goddess meets birthday royalty. Fringe, feathers, sequins. If Coachella threw up on you, you’re in. ENTRY FEE: A polaroid of your worst school photo. The birthday girl keeps the receipts. IT’S NOT A PARTY. IT’S A PILGRIMAGE. GRACE TURNS 16 - BE THERE OR BE NOWHERE. RSVP essential | Security on the Door 255 Wimbledon Drive. Point Panda. If you’re...
...when someone tries to reach the ERP URL, the prompt must enforce multi-factor authentication and allow the session to open only if the request comes from one of our office computers on our Wi-Fi network. Anything originating elsewhere—home, café, mobile hotspot—should be denied outright. Here is what I need from you as the security specialist familiar with Cloudflare Access, Gateway, and device posture rules: • Configure the domain inside Cloudflare, enabling the security features that sit in front of the ERP server (Firewall, WAF, DDoS protection). • Create an Access policy that ties identity (Google Workspace / Azure AD, or another SSO you recommend) to mandatory MFA. TOTP or push-based authenticators are both acceptable. • Whiteli...
...Recent) and custom "Music on Hold." * Security: Implementation of a VoIP-specific firewall, Fail2Ban, and SIP port obfuscation to prevent unauthorized access. * System Features: Enablement of Call Recording, Voicemail-to-Email, and Call Transfer capabilities. * ------------------------------ ## 2. Project Deliverables 1. Fully Operational PBX: A live, tested Asterisk system capable of handling [X] concurrent calls. 2. Configuration Documentation: A technical document detailing the IP addresses, SIP credentials, extension list, and Dialplan logic. 3. Admin Operations Guide: A "How-To" manual for common tasks (e.g., adding/removing agents, changing IVR recordings, accessing call logs). 4. Security Audit Report: Confirmation of active secu...
I need a high-performance, lightweight quick commerce application designed for rapid local deliveries. The app must provide a seamless experience for customers to order groceries and daily essentials from their phones, specifically optimized for the Indian market. Core Pillars (Non-Negotiable) 1. Smooth Catalog & Friction-free ...order flow. • Complete Source Code and Build Instructions. • Brief Technical Hand-off document (Architecture, API keys management, etc.). Acceptance Criteria • App must install and run with zero lag on budget Android devices. • End-to-End Test: Successful checkout using a test UPI ID/Card. • Real-time Update: Adding/Deleting products in the admin panel reflects instantly on the user app. • Basic security check for data priv...
...Zynga login details + chip balance) Customers can submit their Zynga account details through the panel Automatic chip transfer from my source accounts to customer accounts using: Fast Transfer / Meet in Table method Empty Table method (support both) Queue system (to avoid sending too many transfers at once and reduce ban risk) Log system – show success/fail for each transfer with timestamps Basic security (hiding passwords, session management, anti-ban protections) Responsive design (works well on mobile too) Ability to set different chip amounts and prices Additional (nice to have): Auto refresh balance after transfer Notification when transfer is completed Simple dashboard to see total chips transferred today Important Notes: The panel is for personal use only (I wil...
...and resolve a serious security issue. Last month, multiple personal accounts (including WhatsApp and other social platforms) and devices were compromised. Since then, I have: Switched to new devices Reset passwords and secured accounts Enabled basic security measures However, I still suspect unauthorized access or persistent compromise. There are concerns that my data may have been exposed or that a hidden vulnerability (malware, spyware, remote access, or account takeover method) still exists. Scope of Work: Perform a full security audit of devices and accounts Identify how the breach occurred Detect any malware, spyware, or unauthorized access Secure all accounts (social, email, iCloud, etc.) Provide steps to fully eliminate the threat Recommend long-term ...
...notes. I am keeping payment off-site for now, so no processor is required—simplicity and reliability matter most. Technical expectations • WordPress, Webflow, or another modern CMS is fine as long as I can make small edits myself later. • Optimised imagery, alt tags, and clean URL structure for search performance. • Lightweight code and caching so Core Web Vitals stay in the green. • Security basics (HTTPS, anti-spam on forms). Deliverables 1. Fully deployed, live website on my hosting. 2. Reservation form with functioning availability calendar. 3. On-page SEO setup (titles, descriptions, alt text, sitemap). 4. One-hour hand-over call or video walkthrough so I can manage content. I already have high-resolution photos, a logo, and copy ...
Project Description: I am looking for a WordPress expert to fix loading issues and security vulnerabilities on my real estate websites. A previous assessment of my cPanel shows several outdated sites and plugins, a malware infection, and a conflict caused by two separate WordPress installations running on the same domain. Scope of Work: Malware & Virus Removal: Manually scrub the hosting environment, files, and databases to remove all viruses. Do not tell me to contact the host; I need you to do this. WP Installation Fix: Resolve the conflict caused by having two WordPress setups on the same domain. Clean up the directory structure so only the correct version is live. Updates & Maintenance: Update WordPress core, all plugins, and themes to the latest versions while ensur...
...wp‑admin (no critical errors) Proper PHP compatibility handling Clean reinstall of theme and plugins if needed Site appearance and structure must match the original exactly WooCommerce donation workflow must be verified (Stripe & PayPal) No data loss (products, orders, donations, content) Important Constraints ❌ No DNS changes ❌ No MX/email changes (email is on Google Workspace) ❌ No cache or security plugins unless discussed âś… Minimal, controlled access will be provided âś… GreenGeeks site remains online for comparison Ideal Candidate Proven experience with WordPress on Azure App Service (not just shared hosting) Comfortable handling PHP 7.x → 8.x compatibility Experience with WooCommerce + Elementor Able to explain technical decisions clearly Focused on stability a...
...preferred Must be able to implement: • chat interface • session history • basic controls (model selection, logs) 6. Messaging Integration (Telegram Required) Experience with: Telegram Bot API Ability to: • create bots • handle commands • connect bot to backend agent system 7. Security Awareness (Important) The candidate must understand: • API key management • environment variables (.env) • access control • limiting execution permissions OpenClaw agents can execute commands — security is critical. EXPERIENCE PROFILE WE ARE LOOKING FOR Strong candidates typically have: 1. 3+ years backend or DevOps experience 2. Proven VPS/cloud deployments 3. Experience integrating AI APIs 4. Built au...
...recommendations for these integrations, including language, framework, and onboarding considerations. • A risk and dependency matrix covering authentication flows, data privacy, versioning of third-party APIs, and fallback strategies. • A concise action plan I can hand to the development team for the next milestone. While integration is the headline topic, I’m happy to touch on scalability and security best practices as they relate to those interfaces. To help me choose the right consultant, please include links or brief summaries of past work where you architected or advised on platforms that stitched together multiple services—bonus points if it involved payments or marketplace features. I’m aiming for actionable guidance, clear diagrams, and ...
...articles section (for SEO) - Contact page IMPORTANT: The structure must allow me to easily add new locations and businesses using templates. --- SEO Requirements: - SEO plugin setup (Yoast or RankMath) - Proper page structure (H1, H2, URLs, meta titles) - Google-friendly setup --- Performance: - Optimised for speed (especially mobile) - Image optimisation + caching setup --- Security: - Basic security plugin setup - Backup system configured --- Training: I require a short video or live walkthrough showing how to: - Edit pages - Add new business listings - Add blog posts - Update content and images --- Deliverables: - Full website with admin access - All themes/plugins installed and licensed - No hard-coded elements (must be editable) --- When applying, p...
...bulk-upload workflow are important from day one. The store must accept payments through Razorpay as the primary gateway. I may add PayPal or Stripe later, so structuring the checkout to accommodate additional gateways without a full rebuild will be a plus. Your work should cover theme setup (responsive, fast, and conversion-oriented), product and category architecture, shipping and tax configuration, security hardening, and any essential plugins. Once everything is live, a quick hand-off session or concise documentation will make sure I can manage routine updates myself. If you’ve built similar WordPress + WooCommerce sites, especially for physical-product businesses in this size range, I’d love to see them and hear how you kept them fast and user-friendly....
I need a complete AWS infrastructure designed, deployed, and handed over so the environment is secure, scalable, and easy to expand as my application grows. The build should follow best-practice architecture patterns—isolated VPC, public/private subnets, security groups, IAM roles with least privilege, and automated provisioning through CloudFormation or Terraform. High availability, basic monitoring, and cost-optimised sizing are all expected. Please centre your proposal on the depth of your AWS infrastructure experience. Point me to comparable environments you have implemented, any relevant certifications, and the typical timeframes you achieve. A brief outline of the toolset you prefer (IaC framework, CI/CD stack, logging/monitoring choices) will help me gauge fit. Delive...
I run a small construction company and want to build a long-term relationship with an external IT team that bills by the hour. My most pressing need is tightening our email defences, but you will also step in whenever we face issues with phone or computer security, malware, or any attempt at hacking. For email specifically, make sure your proposal shows how you will: • stop spam and phishing before it reaches our staff, • enable encrypted communications that are simple for non-technical users, • set up access controls and ongoing monitoring so we always know who touched what and when. Beyond email, outline the tools and processes you use to harden endpoints, secure mobile devices, and perform rapid incident response. A detailed project proposal explaining your appro...
Top security Community Articles
Secret to Success: Make Real Friends
Starting up as an entrepreneur or a freelancer isn’t easy. Harder still is going at it alone.