Project Description
I need a certified cybersecurity professional to determine whether my personal Android phone has been subjected to unauthorized access and to help me regain full, lawful control of every component that may have been touched.
The device is the only confirmed target right now; however, if traces lead to email or social channels I will widen the scope with you. Your investigation must be forensically sound so that any evidence you uncover can stand up to scrutiny should I decide to take legal action.
I am expecting a hands-on approach that covers log collection, malware/spyware scanning, vulnerability mapping, and clear recommendations on how to close every gap you find. Where recovery steps are needed—password resets, two-factor reconfiguration, data restoration—I want you to walk me through them in real time and document each action.
Deliverables
• A concise technical report detailing findings, indicators of compromise, and risk rating
• A step-by-step remediation plan executed with me, including verification that the threat is removed
• Guidance on preserving evidence and pursuing lawful recovery if further action is required
Please be comfortable with common mobile forensics toolkits (Cellebrite, Magnet AXIOM, or similar) and be able to verify your certification (CEH, OSCP, CISSP, or equivalent). Confidentiality is essential, and I would like to begin as soon as you can schedule the initial assessment.