Data Breach Investigation & Assessment
Description
Budget: ₹1500 - ₹12500
A recent alert suggests that sensitive information has leaked through one of our third-party applications, and I need a seasoned cyber-security specialist to get to the bottom of it. The immediate priority is a full vulnerability assessment that pinpoints exactly how the breach occurred, how far the compromise extends, and what data may still be exposed.
Affected system • Third-party applications
Scope of work
- Perform a comprehensive vulnerability assessment of every relevant integration point, using industry-standard tools such as Burp Suite, OWASP ZAP, or equivalents.
- Gather and preserve forensic evidence that shows the attack vector, data accessed, and timeline of events.
- Deliver a clear, prioritized remediation plan with step-by-step fixes and suggested hardening measures.
- Re-test once patches are applied and provide a final confirmation report that our environment is secure.
Acceptance criteria • Written assessment detailing each discovered vulnerability, risk level, and proof-of-concept where applicable. • Log files, packet captures, or screenshots supporting your findings. • Remediation checklist mapped to CVSS scores, demonstrating closure of all critical and high-risk issues. • A concise executive summary suitable for non-technical stakeholders.
Please outline your methodology, preferred toolset, and estimated timeline so we can move quickly to contain and eradicate the breach.
Skills
Want AI to find more roles like this?
Upload your CV once. Get matched to relevant assignments automatically.