
En curso
Publicado
Pagado a la entrega
Project Overview We are seeking an experienced cybersecurity professional to conduct a forensic investigation of a suspected website compromise. The environment includes: • Website hosted on AWS EC2 • Application stack: WordPress or Node.js (to be confirmed) • Nature of application: primarily static content with limited dynamic functionality An incident occurred a few weeks ago. The objective is to determine: • The likely attack vector • A timeline of events • Whether the compromise originated from: • External attacker • Insider activity • Compromised credentials ⸻ Available Data The following data sources are available: • EC2 instance logs: • Access logs (Apache/Nginx) • Error logs • System logs (subject to availability) • AWS logs: • CloudTrail logs Note: No forensic snapshot was taken at incident time. Investigation will rely on available logs and current system state. ⸻ Scope of Work The selected expert will be responsible for: 1. Log Analysis • Analyze access, error, and system logs • Identify anomalies such as unusual endpoints, payloads, or access patterns 2. AWS CloudTrail Investigation • Review API activity for: • Unauthorized access • IAM misuse / privilege escalation • Suspicious geographic access 3. Timeline Reconstruction • Build a correlated, multi-source timeline across: • Application logs • System logs • CloudTrail 4. Attack Vector Identification • Determine likely entry point: • Web vulnerabilities (plugins, APIs, misconfigurations) • Credential compromise • Infrastructure misconfiguration 5. Attribution Assessment • Provide a reasoned assessment of: • Insider vs external actor • Include: • Supporting indicators • Confidence level • Assumptions and limitations 6. Persistence & Impact Analysis • Check for: • Backdoors / web shells • Unauthorized users / SSH keys • Suspicious cron jobs or processes • File modifications 7. Remediation Recommendations • Provide clear, actionable steps for: • Immediate containment • Long-term hardening ⸻ Deliverables The final output should include: 1. Executive Incident Summary 2. Detailed Timeline of Events 3. Attack Vector Analysis 4. Attribution Assessment (with confidence levels) 5. Indicators of Compromise (IOCs) 6. Remediation & Hardening Recommendations ⸻ Required Skills • Proven experience in Digital Forensics & Incident Response (DFIR) • Hands-on expertise with: • AWS CloudTrail analysis • Linux system forensics • Experience investigating: • Web application attacks (WordPress / Node.js) • Strong understanding of: • Log correlation techniques • IAM security and access patterns • Web attack methodologies ⸻ Preferred Qualifications • Prior experience with cloud breach investigations • Relevant certifications (preferred, not mandatory): • GCFA / GCIA / GCIH • AWS Security Specialty • Experience working with incomplete or partially available logs ⸻ Engagement & Payment Approach (Outcome-Oriented) This engagement is outcome-driven, with a focus on quality and completeness of investigation rather than effort alone. • A small upfront payment will be made to initiate the engagement. • The major portion of compensation is linked to the quality and depth of deliverables, including: • Structured and correlated timeline • Evidence-backed attack vector analysis • Well-reasoned attribution assessment • Clear and actionable recommendations Clarification • We recognize that definitive attribution may not always be possible due to limitations in logs or evidence. • Evaluation will therefore be based on: • Depth and rigor of analysis • Cross-correlation of multiple data sources • Logical consistency and defensibility of conclusions • Transparency in assumptions and limitations ⸻ Engagement Model • Short-term, fixed-scope project • Remote engagement • NDA required prior to data sharing • Interim review checkpoint may be included before final submission ⸻ Screening Questions (Mandatory) Please include responses to the following: 1. Describe a similar AWS + web application incident you have investigated 2. How do you reconstruct a timeline using CloudTrail and server logs? 3. How do you differentiate between insider activity and credential compromise? 4. What common attack vectors would you evaluate first (WordPress / Node)? 5. How do you handle investigations with incomplete logs? ⸻ Important Notes • This is a forensic investigation, not a penetration test • Emphasis is on structured methodology and reasoning, not just tools • Submissions demonstrating clear investigation thinking (timeline correlation, hypothesis testing, multi-source validation) will be prioritized
ID del proyecto: 40356932
10 propuestas
Proyecto remoto
Activo hace 10 días
Fija tu plazo y presupuesto
Cobra por tu trabajo
Describe tu propuesta
Es gratis registrarse y presentar ofertas en los trabajos

Hello, I’m a Cyber Security & Digital Forensics Consultant with 9+ years of DFIR experience, including cloud (AWS) breach investigations and web application compromises. Your requirement for a structured, evidence-driven investigation aligns strongly with my core expertise. I will follow a forensic methodology focused on log correlation, hypothesis testing, and evidence validation to reconstruct the incident, identify the attack vector, and deliver defensible conclusions. Approach: Deep analysis of EC2 logs (access, error, system) and anomaly detection CloudTrail investigation for IAM misuse, suspicious API activity, and geo anomalies Multi-source timeline reconstruction (application + system + AWS logs) Identification of entry point (web vuln, credentials, misconfig) Persistence & impact analysis (web shells, cron jobs, SSH keys, file integrity) Clear attribution assessment with confidence levels Actionable remediation & hardening roadmap. Deliverables: ✔ Executive summary (non-technical) ✔ Correlated timeline of events ✔ Attack vector & IOC analysis ✔ Attribution assessment (with assumptions & limitations) ✔ Remediation recommendations Regards Kajal Majhi Cyber Security and Digital Forensics consultant
₹8.000 INR en 7 días
4,8
4,8
10 freelancers están ofertando un promedio de ₹2.615 INR por este trabajo

With an extensive background in DevOps Engineering and specialization in AWS services, such as CloudTrail analysis, I bring to the table an array of skills perfect for the forensic investigation you need. Handling high-traffic applications has made me particularly skilled in analyzing access logs, identifying anomalies, and pinpointing potential risk vectors. In fact, a lot of my work revolves around log correlation techniques which will undeniably be applicable to your project where we're heavily relying on available logs. Additionally, my experience in backend development, specifically with Node.js and WordPress, provides me with a comprehensive understanding of web application attacks and vulnerabilities that may have been exploited to compromise your site. I'll be able to identify any plugins or APIs that could have been misused or if it was a case of credentials being compromised. To offer you some more peace of mind, I am also particularly adept at operating with incomplete or partially available logs. This means no matter what limitations we face, I am experienced enough to dig deep into possible sources and use every available piece of information to build a well-structured and correlated timeline for you. Ultimately, my divergent skill-set offered through AWS certifications and hands-on experience is precisely what your forensic cybersecurity investigation requires.
₹1.500 INR en 7 días
4,0
4,0

Hello, With over 9 years of experience in software engineering, I have honed my technological prowess, and I am confident that it matches the requirements of your project. Having worked on diverse tech projects, from AI to Blockchain, I bring a complementary skill set for the forensic cybersecurity investigation. My ability to analyze and interpret complex data for actionable insights, as well as solid background in AWS CloudTrail analysis and Linux system forensics, will be invaluable for this endeavor. Web application attacks are no stranger to me; I have prior experience investigating security breaches on WordPress or Node.js platforms specifically. With respect to incomplete or partially available logs, I'm a resourceful investigator skilled in leveraging available sources effectively to build comprehensive timelines and evidence-backed conclusions. Moreover, my deep understanding of log correlation techniques and IAM security patterns ensures that not even the most subtle anomalies go unnoticed. The outcome-driven approach aligns with my work style, so you can be assured that the quality and depth of deliverables will not be compromised. My strength lies in logical consistency and defensible conclusions - skills necessitated when definitive attribution might not always be possible. Let's work together to untangle this complex issue and ensure safeguards for your website going forward. It would be an honor to put my expertise at your project's disposal. Thanks!
₹600 INR en 6 días
0,0
0,0

Hello, This aligns perfectly with my DFIR experience in AWS environments. I’ve investigated EC2-hosted WordPress/Node.js compromises using CloudTrail + server logs, even without snapshots, and delivered evidence-backed timelines and attack vectors. Approach: - Correlate CloudTrail, access/error/system logs for a unified timeline - Detect anomalies (suspicious endpoints, payloads, geo access) - Analyze IAM activity for misuse or privilege escalation - Identify entry point (plugin/API vuln, creds, misconfig) - Check persistence (web shells, cron jobs, SSH keys, file changes) - Provide attribution (insider vs external) with confidence levels - Deliver clear remediation & hardening steps Screening Answers: 1. Handled AWS breach via vulnerable WP plugin → shell upload + IAM misuse 2. Timeline via timestamp normalization + cross-log correlation 3. Insider vs creds: behavior patterns, IP/geolocation, IAM anomalies 4. First checks: outdated plugins, exposed APIs, weak IAM, leaked creds 5. Incomplete logs: inference + pattern analysis + hypothesis validation I focus on structured, defensible findings—not assumptions. Happy to explain the full investigation flow in a quick demo. Can we connect today?
₹1.050 INR en 7 días
0,0
0,0

I approach incident response using structured DFIR methodology focused on log correlation, hypothesis validation, and defensible conclusions. For this investigation, I will: • Analyze access, error, and system logs to identify anomalies (unusual endpoints, payloads, user agents) • Investigate CloudTrail logs for unauthorized API activity, IAM misuse, and suspicious access patterns • Correlate all sources into a unified timeline to reconstruct attacker activity • Identify the most likely attack vector (web vuln, credential compromise, or misconfiguration) • Assess attribution (external vs insider vs credential misuse) with clear confidence levels • Check for persistence (web shells, SSH keys, cron jobs, file changes) • Provide actionable remediation for containment and hardening Screening: 1. Experience: Investigated cloud-hosted web incidents involving credential abuse and vulnerable endpoints using log correlation. 2. Timeline: Normalize timestamps and correlate events via IPs, user agents, and API activity. 3. Attribution: Behavioral anomalies (geo, timing, access patterns) vs normal usage. 4. Vectors: WordPress (plugins, XML-RPC), Node (APIs, deps), plus IAM/SSH issues. 5. Incomplete logs: Use cross-source validation and clearly state assumptions. I can share initial findings in 2–3 days and deliver a full report in 5 days.
₹1.300 INR en 5 días
0,0
0,0

Hi, I believe I’d be a good fit for this investigation because I have experience working on Linux and AWS-based web server compromises, including WordPress and Node.js environments. In similar cases, I’ve used Apache/Nginx logs, system logs, and CloudTrail to reconstruct what happened, identify the likely entry point, and determine whether the issue came from an external attacker, leaked credentials, or internal activity. I also check for persistence such as web shells, suspicious users, SSH keys, cron jobs, and modified files. Since there was no snapshot taken, I understand this investigation will depend heavily on log correlation and the current system state. That’s something I’m comfortable with — even with incomplete logs, I focus on building a clear timeline, validating findings across multiple sources, and being transparent about confidence levels and limitations. My approach would be to: Review web, system, and CloudTrail logs Reconstruct a detailed timeline Identify the most likely attack vector Assess insider vs credential compromise vs external actor Provide clear remediation and hardening recommendations I’m comfortable signing an NDA and can also provide an interim update before the final report. Thanks!
₹1.000 INR en 7 días
0,0
0,0

With more than a decade of experience in cybersecurity, including penetration testing and data recovery, I believe I am the perfect fit for conducting this forensic investigation. My expertise lies specifically in Cloud Security - a crucial aspect for this project since your AWS EC2-hosted website was compromised. Additionally, having worked with both Linux systems and Web application attacks (including WordPress and Node.js), I am well-versed in the environment you describe. This familiarity will undoubtably speed up the investigative process. One of my biggest assets is my proactive approach to security analyses. Rather than just focusing on access logs, I dig deeper and analyze system logs, API activities, and more, to truly understand the dynamics of an attack. Furthermore, my capabilities extend past mere analysis; I can reconstruct a detailed, correlated timeline across different data sources using my strong understanding of log correlation techniques. Understanding that results are paramount to you, I've structured my payment approach around quality rather than just effort. This means that not only do I have the required skill set for this investigation but also a vested interest in delivering accurate yet detailed results. So let's begin unpuzzling this incident together!
₹1.050 INR en 7 días
0,0
0,0

Pune, India
Forma de pago verificada
Miembro desde dic 29, 2025
₹12500-37500 INR
₹600-1500 INR
₹600-1500 INR
₹600-1500 INR
₹12500-37500 INR
$250-750 CAD
₹1500-12500 INR
$8-15 USD /hora
₹12500-37500 INR
₹600-1500 INR
₹600-1500 INR
₹1500-12500 INR
₹12500-37500 INR
$15-25 USD /hora
₹600-1500 INR
₹600-1500 INR
$250-750 USD
$25-50 USD /hora
£250-750 GBP
₹600-1500 INR
₹37500-75000 INR
₹400000-500000 INR
$30-50 USD /hora
₹1250-2500 INR /hora
₹12500-37500 INR