CompanyRemote

Forensic Analysis of Compromised PC and iPhone

Project-Based

Description

Forensic Expert is required to examine a Computer System and a Mobile Phone running iOS for evidence of compromise. The candidate is expected to perform a forensically sound acquisition of the laptop’s storage (a bit‑for‑bit image or clone) without altering original data. -Follow recognized best practices (e.g., ISO/IEC 27037, ACPO guidelines, or local equivalent) on evidence handling, chain of custody, and documentation. -Conduct investigation to ascertain intrusion or compromise. -Analyze logs, network activity, user accounts, processes, browser history, downloads, and artifacts (Prefetch, MFT, Registry, etc.) to identify signs of compromise or intrusion. -Produce a written forensic report that includes: -Scope and limitations of the examination. -Detailed methodology and tools used (e.g., EnCase, FTK, Autopsy, etc.). -Chronology of findings, with timestamps and evidence locations. -An expert opinion on whether the laptop was compromised and the likely nature of the intrusion. -Chain‑of‑custody documentation for all devices and media. -Such reports are routinely accepted in court when prepared by qualified expert witnesses (often EnCE, CCE, CISSP, or other recognized certifications). The forensic expert must be based in the United States. Budget: USD 250–750 Skills: Computer Security, Digital Forensics, Certified Ethical Hacking, Forensic Consulting, Risk Assessment, Investigation

Skills

Ethical HackingComputer SecurityRisk AssessmentSecurityInvestigationForensic ConsultingiOSCertified Ethical HackingDigital Forensics

Want AI to find more roles like this?

Upload your CV once. Get matched to relevant assignments automatically.

Try personalized matching