Cybersecurity Expert for BLE Device Sweep, Surveillance Detection & Device Hardening (Henderson)

California Posted 7 days ago systems/​networking

About This Job

Hello,

This position is not for an IT help desk role. I am seeking an individual with a practical understanding of forensic tracking, counter-surveillance techniques, and device security hardening.

If you are the type of person who finds genuine satisfaction in assisting others through intricate, high-stakes technological challenges with a strong sense of ethics, then I am interested in collaborating with you.

Background

I am currently managing an ongoing situation involving unauthorized access to my personal devices and remote surveillance, which I have linked to a former landlord. This is an active and real scenario, and I have already engaged specialists in cybercrime.

At present, all of my personal belongings are secured in an isolated POD storage unit. My objective is to locate and remove any potentially planted hardware before I relocate. My mobile phone is consistently detecting numerous spoofed Bluetooth Low Energy (BLE) devices. I require assistance in performing a physical sweep of my environment and in learning how to conduct such sweeps independently.

This role is hands-on. You must possess the ability to investigate thoroughly and be willing to explain your methods as we proceed.

Required Assistance

  • Conducting a physical sweep to locate and remove BLE or other concealed surveillance devices.
  • Instructing me on how to perform these sweeps using tools you deem suitable for this context.
  • Auditing and enhancing the security configuration of my iPhone, Mac computer, and network setup.
  • Reviewing systems for backdoors, Man-in-the-Middle (MITM) activities, and BLE spoofing devices.
  • Assisting in the removal or identification of unauthorized elements such as mobileconfig profiles, rogue security certificates, firmware injections, and other indicators of compromise.
  • Teaching me how to recognize vulnerabilities, interpret system logs using recommended tools, monitor signal activity, and proactively guard against future attacks.

Hands-on experience in the following areas would be advantageous:

  • Locating and identifying Bluetooth and BLE devices.
  • Detecting and dismantling covert surveillance infrastructure.
  • Hardening security for iOS and macOS systems.
  • Terminating remote access, removing telemetry data, and configuring firewalls.
  • Practical use of tools such as Raspberry Pi, Flipper Zero, Ubertooth, or similar equipment.

Experience with mobileconfig profiles, AirPlay or Bluetooth hijacking, packet sniffing, and MITM detection is considered a plus.

Firmware Concerns

Certain devices appear to have been loaded with custom firmware, and there is evidence suggesting persistent, unauthorized firmware activity.

I am looking for someone who comprehends:

  • Flashed or rogue firmware on consumer electronics.
  • The behavior of BLE chipsets (e.g., ESP32, NRF52, AM335x).
  • Low-level backdoor entry points on smart controllers and other Internet of Things (IoT) hardware.
  • Safe methods for detecting, analyzing, and removing or replacing such backdoors.

NDA and Work Agreement Required

Given the sensitive nature of this case and the information it involves, you must be prepared to sign a non-disclosure agreement (NDA) and a basic work agreement before commencing. This step is to protect both parties and to ensure confidentiality and accountability for the duration of the engagement.

If you are not comfortable with this requirement, this position is not suitable for you.

Application Process

If this project aligns with your skills and interests, please submit your application by providing the following information:

  • Your professional background (formal education or self-taught experience are both acceptable).
  • Your specific experience with Bluetooth and Radio Frequency (RF) tools (e.g., Flipper Zero, Raspberry Pi, Ubertooth, Wireshark).
  • Your availability for the current week.
  • Your desired compensation (further details are provided below).

Compensation

This is a serious matter, and I am fully prepared to offer fair compensation for your time, expertise, and results. If you are the right candidate and can provide genuine assistance in resolving this situation, I am committed to allocating the necessary resources to exit this compromised state. A generous bonus will be offered upon the successful identification, removal, and hardening of all security issues.

In your response, please include your:

  • Preferred hourly rate.
  • Flat project fee, if applicable.
  • Or, your standard pricing model for work of this nature.

I recognize that entering into a working relationship in this context requires a significant degree of trust. I am aware that involving the wrong individual could further jeopardize my safety, privacy, or assets.

For your information, I have already implemented extensive precautionary measures. My most sensitive data, accounts, and assets are no longer accessible from my current environment and are now being managed securely by a third party. Therefore, if your intention is to exploit this situation or provide misleading information, please do not waste your time, as you will not succeed.

Thank you.

Location

M
Nathan Chavez
Member since 2015
★★★★ (4.2)

Safety Tips

  • Don't send money without seeing item.
  • Meet in a safe, public place.
  • Check item thoroughly before paying.
  • Beware of overly low offers.