Remote Network And System Administration Job In IT And Networking

Internet security expert needed to help me catch a hacker!

Find more Network And System Administration remote jobs posted recently Worldwide

Ex partner had access to all account passwords and is suspected to have enabled herself to remote access our Mac computers from her home Windows PC and or possibly her Android device. We have some logs of suspicious activity going on here on the office iMac computers, but the most significant thing was found in her mobile phones history.

The following url shows up in her history several times around the time she was suspected of suspicious activities

If you simply past the code into a browser it comes up with an error message. Apparently cloudfront is an amazon based service used for illegitimate purposes. I do have access to more data from her devices which may be of some use. It may be too late but I may also be able to gain access to the devices which are suspected to have been involved.

Im not tech savvy enough to make much more sense out of this. I have hired some IT consultants to make things here at the office secure from further attack, but Id still like to know precisely what she has done, how she has done it and ideally find some evidence - at least enough to satisfy my own personal curiosity for peace of mind.

What Im after is some basic advice and consultation that can help me lead to something beyond the clues Ive already gathered.
About the recuiter
Member since Mar 14, 2020
Rsa Web Source
from Quebec, Canada

Open for hiringApply before - May 25, 2024

Work from Anywhere

40 hrs / week

Hourly Type

Remote Job

$26.83

Cost

Offer to work on this project closes in 7 days!
Are you interested in this Opportunity?

Looking for help? Checkout our video tutorial
How to search and apply for jobs

How to apply? Do you have more questions about the Job?
See frequently asked questions

Similar Projects

Blockchain based secure cloud storage

we need a block chain based security approach with enhanced user revocation approach wherein multi optimal optimization approach will use for storage of encrypted file blocks which can avoid the repetition of storing the same file block. Here each us...read more

Cyber Security Ethical Hacker Needed

* $500 for 1 days work.
* A particular individual has used their android mobile, Windows PC and router at home to log into the computer network at the office. We need someone to be able to go through the files on both the target and suspected dev...read more

NEED MOBILE LANDLINE PROXIES MADE IN U.S

I need mobile landline proxies made for me in specific states in the U.S. They also need to be able to reset i.p on command preferably with a url.

Azure intune and IT security Audit and security policies

Setup and configure Azure intune and security policies around O365 and on-prem, someone who can do IT audit and point out gaps and suggestions and setup

write RPA in cloud 5,000-words article to train people on RPA using the cloud

DELIVERABLES:

+5,000 article educating RPA and tech leads and business analysts on how to set up and run RPA in the cloud (and RPA as a Service)
+ 10-15 topics
+ Each section should include diagrams and visuals to help explain your c...read more