Remote Network And System Administration Job In IT And Networking

Internet security expert needed to help me catch a hacker!

Find more Network And System Administration remote jobs posted recently Worldwide

Ex partner had access to all account passwords and is suspected to have enabled herself to remote access our Mac computers from her home Windows PC and or possibly her Android device. We have some logs of suspicious activity going on here on the office iMac computers, but the most significant thing was found in her mobile phones history.

The following url shows up in her history several times around the time she was suspected of suspicious activities

If you simply past the code into a browser it comes up with an error message. Apparently cloudfront is an amazon based service used for illegitimate purposes. I do have access to more data from her devices which may be of some use. It may be too late but I may also be able to gain access to the devices which are suspected to have been involved.

Im not tech savvy enough to make much more sense out of this. I have hired some IT consultants to make things here at the office secure from further attack, but Id still like to know precisely what she has done, how she has done it and ideally find some evidence - at least enough to satisfy my own personal curiosity for peace of mind.

What Im after is some basic advice and consultation that can help me lead to something beyond the clues Ive already gathered.
About the recuiter
Member since Sep 16, 2017
Divya Pradhan
from Delhi, India

Open for hiringApply before - Aug 12, 2024

Work from Anywhere

40 hrs / week

Hourly Type

Remote Job

$26.84

Cost

Offer to work on this project closes in 39 days!
Are you interested in this Opportunity?

Looking for help? Checkout our video tutorial
How to search and apply for jobs

How to apply? Do you have more questions about the Job?
See frequently asked questions

Similar Projects

Breach management and security compliance plan for SaaS company

Part A: Vulnerability Testing and Disaster Plan: Create a plan for regular vulnerability testing and Business Continuity and Disaster Recovery Plan.
> Creating a disaster recovery plan: Internal human resources to set up and business continuity...read more

Setup Proxy Server

create proxy server on my centos vps. what i will provide:
-IP host & the script.
-document reference (to ease the work)
-Teamviewer key to give access to my windows vps

what you will do is only need to run putty & install my sc...read more

Breach management and security compliance plan for SaaS company

Part A: Vulnerability Testing and Disaster Plan: Create a plan for regular vulnerability testing and Business Continuity and Disaster Recovery Plan.
> Creating a disaster recovery plan: Internal human resources to set up and business continuity...read more

Design Secure AES Block Cipher

Objective is to design and implement a block cipher (AES) resistant to physical attacks (side-channel
attacks) such as CPA (Correlation Power Analysis) so it become impractical* to recover the secret
key.

Additional information:
...read more

NEED MOBILE LANDLINE PROXIES MADE IN U.S

I need mobile landline proxies made for me in specific states in the U.S. They also need to be able to reset i.p on command preferably with a url.