Workday security jobs
I need a specialist to dive into my existing ECAAM environment and complete a full system configuration. The focus is on three core components: • Database – configure schemas, connections, and any tuning that will keep queries fast and reliable. • Network settings – set the correct ports, security rules, and routing so every ECAAM service communicates smoothly inside our LAN and from remote locations. • Software modules – verify each installed module, adjust its settings, and make sure dependencies are resolved. The installation itself is already in place; what I am missing is a clean, production-ready configuration that I can rely on without constant patch-ups. You are free to use the tools you’re most comfortable with—command-line...
...(b) aiusage Measure actual token consumption and cost on the user's Anthropic bill in both cases Test across varied workloads: short prompts, long context, streaming, tool use, vision Document the measured savings ratio with raw data Flag any discrepancy between marketed claims and measured results 3. Security testing API key handling: verify AES-256-GCM encryption at rest, audit key lifecycle, test for leakage in logs, error messages, and network traffic Authentication and session security (OWASP Top 10) Input validation, injection attacks, XSS, CSRF PII scrubbing verification — confirm the claim that prompts are scrubbed server-side before indexing Penetration testing of the key storage and retrieval path TLS configuration, headers, CSP 4. Performance and r...
My long-running website is stable and fully live, yet it now needs consistent care so it stays that way. I want a dependable professional who can slip in seamlessly, keep everything up to date, and jump in quickly whenever something breaks. Routine responsibilities include: • Security updates to core files, plugins, and any third-party integrations • Performance optimisation to ensure pages keep loading fast under varying traffic • Automated and manual backups with easy restoration points • Troubleshooting of unexpected issues as they arise • Regular plugin or module updates and general housekeeping keeping an eye on google analytics and Consoul to track I already handle content, so this role is purely technical maintenance: no design or copy wor...
Description: Looking for an experienced WordPress developer to clean and secure my website. Tasks include: Remove malware and fix security issues Perform full website security audit Remove unnecessary plugins Update plugins, themes, and WordPress core Ensure site is stable and secure after cleanup Requirements: Experience with WordPress security Knowledge of tools like Wordfence or Sucuri Quick and reliable work
I'm seeking a skilled cybersecurity professional to secure my devices. Someone has been infiltrating my macOS computer and iOS phone, and I need expert help to st...seeking a skilled cybersecurity professional to secure my devices. Someone has been infiltrating my macOS computer and iOS phone, and I need expert help to stop this. Key Requirements: - Secure my devices from unauthorized access - Identify and remove any existing malicious code - Provide a report on vulnerabilities - Recommend and implement security measures Ideal Skills and Experience: - Proven track record in cybersecurity - Expertise in macOS and iOS security - Strong knowledge of malware and intrusion detection - Ability to communicate technical details clearly Please ensure you have relevant certific...
...or inventory failures. - Third-Party Integrations: Finalize and test integrations with external logistics/delivery APIs and payment gateways. - Security Audit: Verify JWT-based authentication and Role-Based Access Control (RBAC) across all newly stabilized endpoints. - Testing Suite: Implement comprehensive JUnit and Mockito test suites to ensure 90%+ code coverage and system reliability. 4. Technical Stack Requirements(Strictly applied) - Language: Java (Latest LTS) - Framework: Spring Boot, Spring Security, Spring Data JPA, Spring Cloud. - Architecture: Microservices with RESTful APIs. - Database: MySQL with complex schema management. - Security: JWT, OAuth2. 5. Non-Functional Requirements - Scalability: Code must be cloud-ready and optimized for high concurrenc...
...business logic. Security & Compliance Every line must pass automated OWASP checks, static code analysis, and peer review. Key vault management, token-based sessions, and granular audit trails are required so the platform is ready for future PCI DSS and SOC 2 audits. Payments & Wallets The app should be architected to plug into popular mobile wallets and local payment rails (think Apple Pay, Google Pay, and regional wallets) through clear adapter classes. A sandbox integration that demonstrates at least one live mobile wallet transaction will form part of acceptance testing. Tech Stack Native Swift/Kotlin or a robust cross-platform framework like Flutter or React Native is acceptable; I’m open to your professional recommendation as long as performance,...
...inside the HR team while keeping all other staff out. Because only HR will use the system, security can focus on permissions within that group—investigators, reviewers, and an admin role for configuration. If you can integrate Outlook-based email alerts and generate polished PDF reports straight from Access, all the better. Deliverables: • A well-structured .accdb file with normalized tables for cases, people, evidence, and outcomes. • User-friendly forms for creating, updating, and closing investigations. • Automated notification logic tied to case status or target dates. • Pre-built reports (open-case list, case summary, outcomes dashboard) exportable to PDF/Excel. • Role-based security limiting use to HR only, with simple instruc...
...source; what I lack is the unified pipeline that cleans, embeds, and indexes the content so the model can ground every answer in verifiable evidence. Python, LangChain (or comparable orchestration), Hugging Face transformers, and a vector store such as FAISS or Pinecone feel like the natural toolkit here, but I am open to persuasive alternatives if they improve latency or compliance. HIPAA-level security and full audit trails are non-negotiable. Deliverables • Data-ingestion and cleansing pipeline connected to all three data sources • Vector index with citations back to the original documents or EHR entries • Fine-tuned or custom-trained LLM with RAG architecture • API endpoints (REST or gRPC) plus a lightweight web demo for clinical reviewers &bul...
I need detailed floor plans for an access control system. The plans should include: - Device Placement Locations: Clearly indicate where access card readers and alarm systems will be placed. Ideal Skills and Experience: - Proficiency in creating accurate and detailed floor plans. - Experience with security systems, particularly access control. - Attention to detail to ensure all device placements are correctly represented. Looking forward to your proposals!
My main concern right now is wiping out every trace of malware or hidden backdoor on Callemout.vip. I need a seasoned WordPress security expert who can dive in, run a full-stack scan, and leave the site spotless and hard-to-break into. Here’s exactly what I expect you to handle: • Run comprehensive malware and backdoor scans, then surgically remove anything malicious you uncover. • Track down and delete any rogue admin accounts or stealth user roles. • Inspect every plugin, theme, and core file for injected code or unsafe modifications. I’m not sure which component might be compromised, so assume everything is fair game for inspection. • Hunt for sneaky cron jobs, scripted redirects, or obfuscated payloads that could resurrect the infection. ...
...the target device is busy. • Admin-only access – every setting must be visible and editable only to users with administrator capability. • Hands-free operation – once everything is configured the plugin should run on its own and silently log its work. others 1. should be able to set backup schedule, time and count 2. set location of source and destination 3. set a key for server and device security (2nd) 4. set no of atttempts if failed 5. avalable for admins only 6. set continue or stop depending on internet speed and bandwidth avialblility 7. Stop when device is buzy 8. automatically performs backups 9. record the attempts and note if successful or not 10. Check if backup is same and already has been copied. If same should not copy Deliverables 1. Ful...
...& Input via IDD (Indirect Display Driver) or Mirror Driver Project Description: We are looking for an expert Windows Systems Engineer to develop a high-performance screen capture and input injection module similar to UltraViewer, TeamViewer, or AnyDesk. The goal is to bypass the "Black Screen" limitation on secure desktops (Winlogon, UAC, and Lock Screen) without requiring the user to disable security features. The module must be able to capture pixels from the Secure Desktop (Winlogon) and inject keyboard/mouse input with high integrity, ensuring full control even when no user is logged in. Core Deliverables: Driver-Level Capture: Implementation of an Indirect Display Driver (IDD) or WDDM Mirror Driver to capture frames directly from the GPU buffer. Secure Desktop ...
...time where API limits apply). Most transformations will be handled inside CPI; Groovy scripting is essential for the complex mappings and custom header or payload manipulation we require. You should feel comfortable combining Groovy with standard mapping steps, content modifiers, value mappings, and if needed, externalized parameters so our functional team can adjust values without redeployment. Security is handled through existing certificates and OAuth tokens, but I need you to wire everything up and document the steps clearly for our Basis team. We work with REST and SOAP endpoints; RFC or IDoc adapters may come into play on the ERP side, so experience there is a plus. Deliverables • Ready-to-deploy iFlows for each interface • All custom Groovy scripts, fully c...
I'm looking for a Python script to simulate DDoS attacks for the purpose of testing defense mechanisms. The si...Detection mechanisms: How to identify DDoS attacks. - Mitigation strategies: Methods to counteract the attacks. - Attack patterns: Different types of DDoS attack vectors. The level of detail should be intermediate, providing some technical specifics without going too deep. Ideal skills and experience: - Strong proficiency in Python - Experience with DDoS attack simulations - Knowledge of network security - Ability to document the simulation process clearly I need it within 2days of posting happy to pay, and i need screenshots and explained briefly on a document with between 5-8 mistakes pointed and explained why it wouldn’t work with them Looking forward...
I’m putting together a lightweight, consortium-based blockchain layer to decentralize the control plane of a software-defined vehicular ad-hoc network (VANET) for ddos attack. The architecture must place enhanced security front and center—specifically, it has to guarantee data integrity, robust authentication and strong privacy protection for every message that moves between vehicles, roadside units and cloud edges. Because we are working with a consortium blockchain, I expect permissioned membership management, rapid consensus and low latency that fits the tight timing windows of vehicular communication. Open public chains are off the table; the solution has to remain controllable by a defined set of stakeholders such as OEMs, infrastructure operators and municipalitie...
...architecture (microservices-ready) Implement secure authentication & authorization Apply industry-standard design patterns and clean architecture Ensure performance optimization and scalability Core Modules & Features: 1. Authentication & User Management User registration and login (Admin / Librarian / Student) Role-based access control (RBAC) JWT-based authentication Password encryption and security best practices 2. Book Management Add, update, delete books Book categorization (genre, author, publisher) ISBN-based management Bulk import/export (CSV/Excel) 3. Issue & Return Management Book issue/return tracking Due date management Fine calculation system History and logs 4. Search & Discovery Advanced search (title, author, category) Filters and sort...
This is a 10 - 30 USD task, If you are not willing to accept this Task Budget, Please don't Bid I want a self-contained engine that reliably boosts my Twitter presence through a controlled mix of real users and well-managed bot accounts. The goal is to lift raw follower cou...visits—visible inside native Twitter Analytics. • A dashboard or log file proving every action your code performed, with timestamps and success/fail notes. • Clear setup notes so I can redeploy the system on another VPS without hand-holding. If you have prior work with Twitter API v2, automation frameworks like Puppeteer or Selenium, or experience farming aged accounts safely, let me see it. Security, human-style timing, and the ability to fine-tune rules on the fly are far more importa...
... cabling, initial power-up, and loading a clean base image so both Fortinets run with their standard security settings; no custom firewall rules or advanced VPN features are required at this stage. Once the hardware is online you will register the Fortinet licenses, complete their basic setup wizards, confirm that traffic flows correctly through the default security profiles, and link each Fortinet to its paired uCPE. A short hand-over document outlining IP information, admin credentials, and the steps you followed will conclude the job. Deliverables: • On-site physical installation of 2 × Fortinet + 2 × uCPE • Activation and validation on our production network using standard security settings • Handover report and basic knowledge t...
My Windows-based EC2 instance was always reachable over RDP, but suddenly the connection just times out—no pop-up errors, no credential screen, nothing. I have not knowingly altered any security groups or firewall rules and I’m unsure what may have triggered the lockout. I need you to jump in, isolate the root cause, and restore Remote Desktop access quickly. That could involve checking the instance reachability checks, reviewing security-group and NACL rules for port 3389, confirming Windows firewall and network driver health, or digging into the system logs via SSM Session Manager if necessary. As soon as connectivity is back, please give me a concise summary of what went wrong and the exact steps taken so I can avoid a repeat. Deliverables: • Worki...
...must spotlight data security and privacy. I need engaging, true-to-life examples that show what can go wrong when sensitive data is mishandled (think headline breaches or small-business mishaps) and how sound practices—encryption, role-based access, regular audits—prevent disasters. Keep the technical jargon light; analogies and plain language are welcome. Deliverables • A narrative article of roughly 1,500–2,000 words in editable Doc/Google format • At least three real-life security or privacy incidents, each paired with the lesson learned • Smooth transitions between sections so the piece reads as a single, coherent story • Proper citations or links for any statistics or referenced incidents I’ll review for clarity, a...
...review escalations, and fine-tune the model as our knowledge base changes • Clear documentation covering setup, maintenance, and hand-off processes Acceptance criteria: 1. At least 80 % of routine support tickets are handled end-to-end by the AI with no human intervention. 2. Average customer response time is cut by 60 % or more compared with our current baseline. 3. All data privacy and security requirements for our industry are met, with logs and transcripts stored in an auditable manner. I’m open to your recommendations on the exact natural-language tools, frameworks, and hosting stack you prefer—whether that’s Dialogflow, Rasa, Llama 2, or a custom transformer setup—so long as the final solution is scalable and maintainable. Let me k...
...Dynamic forms based on the Excel structure. * Automated calculations (same as Excel or improved). * Document attachment capability (PDF, Excel, etc.). * Dashboard for progress tracking (per mission, per user). * Search and filtering functionality. * Export to Excel/PDF. 6. Data Management * Central database (SQL or equivalent). * Backup and restore system. * Multi-user concurrent access. 7. Security * Secure login system. * Role-based permissions. * Data encryption (recommended). 8. UI/UX * Clean, professional interface adapted to audit workflows. * Fast and efficient navigation (productivity-oriented). 9. Technical Expectations * Scalable architecture. * Clean, documented code. * Possibility of future integration (ERP, accounting systems, etc.). 10. Deliverables * Full...
...experienced full-stack developer who can take a product from database schema right through to polished user interfaces and have it running smoothly on every major platform we care about. The goal is a single, cohesive code-base that delivers: • Web application • Android build • iOS build You should be comfortable switching hats between back-end architecture (API design, database optimisation, security) and front-end flair (clean UI, responsive layouts, native-feeling interactions). Whether you prefer Node.js with React, Django with Flutter, or another proven stack, the emphasis is on maintainable, well-documented code that can scale. Please outline the tech stack you’d use and walk me through a recent cross-platform project where you owned both serve...
...Source code in a Git repository with clear commit history • Concise setup & deployment documentation Please attach your CV with 2-3 international projects No one will be interviewed without any international project . only developers who have handled European client are invited Acceptance Criteria The app must run end-to-end in my AWS environment, pass a quick code review for readability and security best practices, and include simple unit tests demonstrating core functionality. If this sounds like your wheelhouse, let’s talk details and timeline....
...Fields include Product, Brand, Category, Size, Price --- 6. Static Pages * Contact page with phone, address, and Google Maps * About page --- ### Technical Requirements Preferred stack: * Frontend: (React) * Backend: Node.js (Express or NestJS) * Database: PostgreSQL --- ### Performance Expectations * Must handle 10000+ products smoothly * Fast search response time --- ### Security Requirements * Secure admin login * Protected admin routes * Secure API handling --- ### UI Expectations * Clean and minimal business design * Fast and responsive * No unnecessary animations --- ### Important Notes * This is not an e-commerce website (no payments required for now) * Focus is on catalog, search, and admin control * Code should be scalable for future upgrades --- ##...
I’m looking to turn my concept into a fully-functioning mobile application that runs natively on both iOS and Android. Because the core feature set is still being finalised, I need a developer who is ...consistent user experience across devices, clean and well-documented code, and a development process that allows for iterative feedback. You’ll handle UI/UX implementation, core functionality, testing, and store-ready packaging; I’ll provide prompt responses and clear decisions at every milestone. If you have a solid track record shipping cross-platform apps, can walk me through best practices for security and user authentication options, and are comfortable setting up CI/CD for future updates, I’d love to hear how you’d approach the project and an es...
I’m building a browser-based application and the user interface must be its standout feature. All screens are already drafted in Figma; what I need now is production-ready code that brings those designs to life with React while talking seamlessly to a .NET back end and a...README with setup, build, and deployment steps 3. Passing unit / integration tests for critical flows 4. A deployed demo on any cloud or staging server for review Acceptance criteria • Every UI element matches the Figma design within a 2-pixel tolerance on common breakpoints • API calls return expected payloads in under 300 ms locally • No critical or high-severity issues in an automated security scan I’ll be available daily for quick feedback cycles so we can iterate fast an...
...frontend (preferably React or ) * Developing backend services and APIs (Node.js or Java preferred) * Designing and implementing the database schema (PostgreSQL or equivalent) * Implementing task workflow logic, role-based dashboards, and admin controls * Integrating payment systems (e.g., Stripe or similar) * Setting up cloud infrastructure and deployment (AWS, GCP, or equivalent) * Ensuring security best practices and performance optimization Nice-to-have experience includes building marketplace platforms, SaaS products, workflow/task management systems, or gig economy applications. The ideal candidate should be comfortable making product and technical trade-offs, not just executing instructions. Please include in your proposal: * Relevant past projects (especially marketplac...
I’m ready to turn an idea for an on-demand marketplace into a live product centred on professional servic...profile set-up and service discovery. 3. Admin dashboard to moderate profiles, handle disputes and pull basic analytics. Acceptance criteria • Both user types can create, edit and deactivate their accounts without admin help. • Every provider profile displays ratings & reviews, a portfolio gallery and an availability calendar that can be updated in real time. • Data validation, basic security hardening (OWASP top 10) and responsive design across desktop and mobile. I’m open to milestone suggestions that line up with your preferred workflow. Once we agree on the stack and timelines, I’ll supply wireframes and brand guidelines so yo...
...listing functionality * Mobile responsive design * Greek & English language support Optional (nice to have – mention separately in proposal): * Live chat support bubble * Rating / review system * Notifications (email / on-site) * Promote listing feature Important Requirements: * Clean and well-structured code (no messy plugin stacking) * Ability to scale in the future (this is very important) * Security best practices * Fast loading speed * Full ownership of code, database, and files upon completion Deliverables: * Fully working website * Admin access * Source code & database * Basic documentation or guidance Timeline: Please provide estimated delivery time. Budget: Open to offers, but looking for a cost-effective MVP first. Very Important: Please include i...
...JavaScript framework, Laravel, or a well-optimised WordPress setup—as long as performance is fast, code is clean, and future feature additions are easy. Please outline: 1. Your suggested architecture and tools. 2. How you will implement and test the predictor algorithm. 3. Timeline with key milestones from wireframes to launch. 4. Post-launch support or maintenance options. Quality UI/UX, solid security practices, and SEO-friendly structure are non-negotiable. Show me similar education or calculator projects you have delivered and let’s get started....
...who already understands theTMT sector to take full, ongoing care of our digital front door. The company website needs fresh blog articles, up-to-date product pages, and timely news releases written in clear Tamil (with concise English when necessary), plus design tweaks that keep the look modern and the navigation effortless. You will also keep the engine room humming—monitoring speed, plugins, security patches, and any technical hiccups before they reach visitors. At the same time, our LinkedIn, Facebook, and Instagram feeds must become a steady stream of relevant industry insights, project highlights, and engaging visual stories. Craft the posts, schedule them, respond to comments, and watch the analytics so we can refine the tone and timing week by week. Deliverabl...
...safe cutover plan, execute migration and modernization (lift-and-shift where appropriate, refactor where required), and leave us with documented, automated operations (IaC, CI/CD, observability, backup/DR, security controls). What I expect from you • Review the current EC2, RDS, and S3 configurations, then right-size or redesign them for lower cost without hurting performance. • Implement cost-saving measures such as auto-scaling policies, spot or reserved instances, storage life-cycle rules, and any other best-practice features you recommend. • Harden the setup with sensible security settings and monitoring appropriate for a healthcare product. • Provide a brief hand-over guide so my in-house team can maintain the environment once your work is...
...verification * SMS verification * Secure login system * Role-based access control --- ### 10. Security and Access Control The system must enforce strict access rules: * Sensitive data locked until payment * Proper permission handling across all roles * Secure file storage and access * Backend validation of all critical operations No reliance on frontend-only protections. --- ### 11. UI and User Experience The platform should feel premium and polished: * Clean, modern interface * Mobile responsive * Clear user flows * No broken states or unclear transitions --- ## Technical Approach The developer is free to choose the technology stack, as long as the following are achieved: * Scalability * Security * Real-time capability where required * Clean and maintainable ...
...Store-ready APK, signed and aligned • Source code repository with build instructions and a short demo video that walks through search, profile login, chat, map view, payment flow, and review submission Acceptance criteria The final build must install on Android 8.0+ devices, return relevant results within one second on a typical 4G connection, process sandbox payments successfully, and pass a brief security review for authentication and data encryption. If you already have modules covering any of these areas—search filters, in-app chat, Google Maps overlays, Stripe/PayPal payments, or a ratings widget—let me know; leveraging existing, battle-tested components will keep costs and timelines under control. I’m ready to start as soon as I see a portfolio ...
I need support submitting 100 job applications on the applicant's behalf. I will give you the résum...What you’ll do • Log in with the credentials or guest options I provide. • Complete each form accurately, attach the resume and hit submit. • Record every submission in a shared spreadsheet (company, role, date, confirmation link or screenshot). Accuracy is critical here; I’m paying per correctly filed application, so attention to detail and basic familiarity with portals like Indeed, Lever, Workday, and Greenhouse will make this quick work. If these terms fit and you can finish all 50 applications within a week of receiving the materials, let’s get started. If there are any questions on the application that are not my screening answer...
...sweep combined with a usability audit and clear bug reporting. Scope The store must run perfectly on desktop, mobile, and tablet. I’m particularly concerned with three pillars during testing: • Functionality – every link, button, form, cart action, payment flow, signup, and email trigger. • Performance – load times, asset optimisation, responsive behaviour, and any rendering glitches. • Security – obvious vulnerabilities, mixed-content warnings, insecure cookies, or anything that could jeopardise customer data. Deliverables 1. A prioritised bug list (critical, major, minor) with steps to reproduce, device/browser details, and screenshots or short Loom videos. 2. A concise UX critique highlighting friction points and quick-win i...
I need support submitting 100 job applications on the applicant's behalf. I will give you the résu...do • Log in with the credentials or guest options I provide. • Complete each form accurately, attach the résumé, and hit submit. • Record every submission in a shared spreadsheet (company, role, date, confirmation link or screenshot). Accuracy is critical here; I’m paying per correctly filed application, so attention to detail and basic familiarity with portals like LinkedIn, Indeed, Lever, Workday, and Greenhouse will make this quick work. If these terms fit and you can finish all 100 applications within a week of receiving the materials, let’s get started. If there are any questions on the application that are not my screenin...
I have a very time-sensitive situation involving CCTV security-camera footage where the license plate on a moving car is lost in both low resolution and motion blur. My goal is a sharp, clearly readable plate, not just a slight tweak. You will receive either the full video or a set of individual frames—whichever you feel will yield the best result. Please outline the file format, frame extraction guidelines, or any metadata you need so I can prepare everything in one upload. Because the footage suffers from both resolution loss and motion streaking, I’m expecting a mix of super-resolution, de-blurring, frame stacking, or other forensic video-enhancement techniques. If you normally rely on tools such as Amped FIVE, MATLAB, Topaz, OpenCV, or custom AI models, let me kn...
I’m building a new landing page for a cybersecurity services firm and need a specialist who can shape both the wireframe and the on-page copy in one cohesive pass. The goal is a clear, conversion-focused layout that feels corporate and professional from the ...containing editable design file and a separate, clearly formatted text document for the content Acceptance criteria • Layout adheres to best UX practices for B2B cybersecurity sites • Copy is original, free of jargon overload, and optimized for clarity and conversion • All agreed sections are present and visually balanced across breakpoints If you’ve produced similar landing experiences in the security or tech space, I’d love to see them. Looking forward to collaborating on a page that ...
I need help improving the audio quality of my home security camera footage. The current background and static noise makes it difficult to hear any voices at all. Requirements: - Remove static noise, indoor, and outdoor sounds. - Enhance clarity of all voices, especially during conversations. Ideal Skills & Experience: - Experience with audio editing software. - Ability to isolate and enhance specific audio frequencies. - Attention to detail to ensure natural sound quality. Please provide samples of previous similar work.
I need a complete, self-hosted email solution for a small business that I’ll be running on a Linux server (Ubuntu or CentOS—whichever you feel is best for the chosen stack). The key objective is to move away from third-party providers and gain full control over our mail, security, and data compliance. The specific mail-transfer agent is still open: Postfix, Exim, Mailcow or another proven alternative can be used, as long as the end result is stable, secure, and straightforward to maintain. What I expect from you: • A production-ready mail server configured with SMTP, IMAP/POP3, spam and virus filtering, DKIM, SPF, DMARC, and valid SSL/TLS certificates. • Simple webmail access and clear instructions so that I can add domains, users, and aliases without t...
...stable) - PM2 (or equivalent process manager) 3. Set up Nginx as a reverse proxy 4. Connect domain and configure DNS correctly 5. Install SSL certificate (Let’s Encrypt – HTTPS) 6. Fix routing / page loading issues 7. Ensure the app runs persistently (auto restart if it crashes) 8. Connect website forms to email via SMTP 9. Optimize performance (fast loading, caching if needed) 10. Basic server security: - Firewall setup - Fail2Ban (if appropriate) Bonus (Preferred but not required): - Walkthrough or instructions on how I can update/edit the site myself - Optional staging environment Requirements: - Clean, professional setup (no shortcuts) - Everything tested before completion - I want full control after deployment (no ongoing dependency) Deliverables: - Ful...
...status immediately. 2. Employers can create openings, review applicants, move them through defined hiring stages, and message candidates inside the portal. 3. Recruiters can oversee multiple employer accounts from a single dashboard. 4. All three authentication options—email/password, social, and SSO—work reliably and issue secure JWT sessions. 5. The live site meets basic OWASP Top-10 security checks and loads in under two seconds on desktop. If you have past ATS, career site, or HR tech experience, please include links or brief case studies. I’m aiming for a six-to-eight-week build and am open to discussing the tech stack you feel most confident shipping on—React, Vue, Angular, or even a full Django or Laravel solution are all possibilities. Let...
...email-and-password login backed by robust Two-Factor Authentication. • Solid API integration work—some endpoints are already documented, others will need to be explored together—so the site can talk to external services in real time. Key expectations • Clean, well-documented PHP (Laravel experience is a plus but not mandatory). • Modern JavaScript practices for any front-facing logic you touch. • Security-first mindset: hashing, input validation, CSRF protection, rate limiting, the works. • Comfortable working from a private Git repo and pushing frequent, test-covered commits. Deliverables are accepted when each feature is live on the staging server, passes my manual tests, and ships with a concise readme explaining setup and depen...
15 MODULES + DUPLICATE PREVENTION OVERVIEW VENDOR NOTE: Module numbering M1-M15. All modules required for complete textile wholesale suite. ID Module Name Priority M1 Ultimate Custom Invoice (Color Status + Transport Auto-Fetch) CRITICAL M2 Textile Barcode System (Design+Lot+Qty Intel...Collection Bot HIGH M6 Monthly Ledger Confirmation WhatsApp HIGH M7 Short Payment Alert + Reason Capture HIGH M8 Last 10 Rates Popup + WhatsApp Negotiation Share MEDIUM M9 Negative Stock Blocking + Owner Override HIGH M10 Compulsory Discount in Item Master MEDIUM M11 Customer 360° Dashboard HIGH M12 Textile Intelligence Reports Pack (12 Reports) HIGH M13 Owner Dashboard (Mobile + Desktop) HIGH M14 Security + Audit Trail + Edit Log Enforcement HIGH M15 Duplicate Prevention & Data Integrity ...
...existing Linux stack (Ubuntu 22.04 on AWS EC2), then moves into tightening every layer—optimising configuration, hardening services, and putting robust security controls in place. What matters most to me is confidence that the machines are patched, performance-tuned, and continuously protected. After the initial hardening you will set up real-time monitoring and alerting (Prometheus + Grafana is currently installed but not fully wired), document a clear maintenance schedule, and remain on hand for rapid incident response. Deliverables • Comprehensive audit report with recommended fixes • Implementation of agreed configuration and security changes (SSH hardening, iptables/ufw rules, automated patching, secure backups) • Deployment or refinement ...
...Affiliate marketing (moving services, utilities, internet, etc.) Sponsored listings (apartments, real estate, local businesses) 2. TECH STACK (NO SUBSCRIPTION DEPENDENCY) WordPress CMS Theme: Must be lightweight, fast, and fully owned (NO monthly or yearly theme fees allowed) Rank Math SEO WPForms or Gravity Forms Ad Inserter (ad placement control) LiteSpeed Cache or WP Rocket (performance) Wordfence Security Google Analytics + Search Console Theme Requirement: The site must NOT depend on any subscription-based theme. Allowed approach: - Free performance themes (recommended) - Or custom-built WordPress theme Priority is speed, SEO structure, and conversion—not design templates or theme branding. Recommended Base Themes (Optional) GeneratePress (free) Astra (free) Kadence (f...
...of work – Windows Server (2019/2022) with Active Directory, Group Policy, DNS, DHCP and occasional Hyper-V guests – Linux (mainly Ubuntu LTS and CentOS) hosting web stacks in Apache/Nginx, Docker containers and a handful of cron-driven services – Network-level touches such as VPN endpoints, firewall rule edits and certificate renewals whenever they intersect with server upkeep – Routine security hardening and log review; escalate anything suspicious straight away Expected deliverables • Weekly health report that lists updates applied, incidents handled and current uptime metrics • A tested backup-and-restore run once per month, recorded step by step • Change documentation stored in the Confluence space I provide, so every twea...