Freelance Cybersecurity Specialists in Los Angeles
Freelance Cybersecurity Specialists in Los Angeles
Sign Up
Post a job
Sign Up
Log In
Filters
2
Projects
People
Results that are similar to your search
Similar results
Jason Smyth
PRO
Copthorne, UK
Cyber expert specialising in Azure Security Services.
$5k+
Earned
12x
Hired
5.0
Rating
13
Followers
Follow
Message
Cyber expert specialising in Azure Security Services.
0
Extended Interview Process for CrowdStrike SIEM Specialist
0
1
0
Setting up and optimising Microsoft Sentinel
0
31
0
Configure SIEM Security Operation using Microsoft Sentinel
0
24
0
Set up Microsoft Sentinel and Microsoft 365 Lighthouse
0
21
Cybersecurity Specialist
(6)
Follow
Message
Gary Szaszik
PRO
London, UK
B2B Websites for Complex Industrial & Defense Companies
17
Followers
Follow
Message
B2B Websites for Complex Industrial & Defense Companies
18
Cybersecurity website hero concept This concept was designed to address clarity issues in the existing site. The product and its proprietary technology weren’t coming through clearly, which made it hard for visitors to understand what the platform actually does or why it’s different. Another key challenge was visibility and conversion. Important information was missing, and there was no clear path for interested users to get in touch or take the next step. The goal of this hero was to clearly explain the product, introduce technical depth gradually, surface credibility early, and guide the right users toward action. It didn’t ship in this form as we chose a different visual direction, but it reflects how we approach complex cybersecurity products: clarity first, depth second.
18
153
30
Cybersecurity website hero concept This concept was designed to address clarity issues in the existing site. The product and its proprietary technology weren’t coming through clearly, which made it hard for visitors to understand what the platform actually does or why it’s different. Another key challenge was visibility and conversion. Important information was missing, and there was no clear path for interested users to get in touch or take the next step. The goal of this hero was to clearly explain the product, introduce technical depth gradually, surface credibility early, and guide the right users toward action. It didn’t ship in this form as we chose a different visual direction, but it reflects how we approach complex cybersecurity products: clarity first, depth second.
2
30
292
22
Cybersecurity website hero concept This concept was designed to address clarity issues in the existing site. The product and its proprietary technology weren’t coming through clearly, which made it hard for visitors to understand what the platform actually does or why it’s different. Another key challenge was visibility and conversion. Important information was missing, and there was no clear path for interested users to get in touch or take the next step. The goal of this hero was to clearly explain the product, introduce technical depth gradually, surface credibility early, and guide the right users toward action. It didn’t ship in this form as we chose a different visual direction, but it reflects how we approach complex cybersecurity products: clarity first, depth second.
22
199
16
Cybersecurity website hero concept This concept was designed to address clarity issues in the existing site. The product and its proprietary technology weren’t coming through clearly, which made it hard for visitors to understand what the platform actually does or why it’s different. Another key challenge was visibility and conversion. Important information was missing, and there was no clear path for interested users to get in touch or take the next step. The goal of this hero was to clearly explain the product, introduce technical depth gradually, surface credibility early, and guide the right users toward action. It didn’t ship in this form as we chose a different visual direction, but it reflects how we approach complex cybersecurity products: clarity first, depth second.
2
16
142
Cybersecurity Specialist
(4)
Follow
Message
Dragos Moruz
Timișoara, Romania
Seasoned cybersecurity leader.
5.0
Rating
3
Followers
Follow
Message
Seasoned cybersecurity leader.
1
Free Vulnerability Scanning Demo - Instant Security Insight
1
23
1
Firewall Configuration & Rule Review
1
8
1
Automated Vulnerability Scanning and Security Assessment
1
6
1
Web application pentesting for Evoque Group
1
8
Cybersecurity Specialist
(9)
Follow
Message
Steve Wachira
PRO
Worcester, USA
5 years of experience as a Software Engineer for startups.
New to Contra
Follow
Message
5 years of experience as a Software Engineer for startups.
0
The Official VibeCheck Funnel Site
0
2
1
The self-audit tool for Vibe Coding.
1
1
0
Just pushed a fresh update to VibeCheck 🚀 It now fully supports vibe-coded apps built with Lovable Cloud, including their newest project structure and deploy flow. If you’re building on Lovable, you can now run a full self-audit in seconds: secrets, prompts, risks, everything. More updates coming this week.
0
37
0
LinkedIn Connection Tutorial for Trender.ai
0
1
Cybersecurity Specialist
(3)
Follow
Message
Andrey Pautov
Tel Aviv-Yafo, Israel
CyberSecurity expert
Follow
Message
CyberSecurity expert
0
SOC Tier 1: Security Monitoring and Incident Response
0
14
0
The Ultimate Guide to Metasploit: Part 1
0
2
0
Automating Static Malware Analysis with Python Tools
0
1
0
Passwords Cracking: Full Guide with Real-Life Examples
0
0
Cybersecurity Specialist
(4)
Follow
Message
Paul Abulu Jr
Washington, USA
Cybersecurity| Robotics, Machine Learning & AI
Follow
Message
Cybersecurity| Robotics, Machine Learning & AI
0
Robotics: Fundamentals, Safety, and Security
0
19
0
Computer Vision Basics: No Math, No Code
0
18
0
The Personal IoT Security Playbook: A Beginner’s Guide
0
22
0
Personal Data on Wheels: 5 Steps to Protect Your Data
0
10
Cybersecurity Specialist
(4)
Follow
Message
Sumalya Chatterjee
Kolkata, India
Expert Next.js Frontend Developer – Fast & Responsive
New to Contra
Follow
Message
Expert Next.js Frontend Developer – Fast & Responsive
1
Privacy Permission Dashboard – Firefox Extension
1
0
1
Link Abyss – Broken Link Detector Firefox Extension
1
0
1
Best Cookie Editor – Advanced Cookie Management Extension
1
2
1
Subdomain Finder Firefox Extension Development
1
0
Cybersecurity Specialist
(6)
Follow
Message
Chimdiebube Egereonu
Owerri, Nigeria
Web Security Analyst & OSINT Specialist
New to Contra
Follow
Message
Web Security Analyst & OSINT Specialist
1
WordPress Security Hardening & Malware Prevention Security audit for a business portfolio website running legacy infrastructure. Findings: Outdated Software: Identified CMS version 4 years out of date, exposing the site to known CVEs. Plugin Vulnerabilities: Detected vulnerable versions of Elementor susceptible to Stored XSS. Directory Traversal: Public access enabled on plugin directories. Solution: Provided a roadmap for updating the core CMS, patching plugins, and implementing .htaccess rules to block directory browsing.
1
8
1
Critical Information Disclosure (Server Logs) Identified a Critical (P1) data leak in an educational management portal. The Finding: Exposed Laravel Debug Logs (laravel.log). Technical Details: The server was misconfigured to allow public "Directory Listing" on the storage folder. This exposed a 5MB log file containing: Full Database Schema. Backend Stack Traces. Hardcoded default user credentials. Remediation: Advised the internal team to disable directory indexing and restrict access to the /storage/ directory immediately.
1
9
1
WAF Bypass & XSS Discovery for E-Commerce Platform Conducted a black-box security assessment for a high-traffic e-commerce marketplace (10M+ users). The Finding: Reflected Cross-Site Scripting (XSS) in the search functionality. Technical Details: The application employed a Web Application Firewall (WAF) that stripped standard XSS vectors (parentheses). I successfully bypassed this filter using ES6 Template Literals (backticks) to execute JavaScript. Impact: Reported a P2 Vulnerability that could allow account takeover via session cookie theft. Status: Reported via Vulnerability Disclosure Program (VDP).
1
13
2
Custom OSINT Automation Tool (Python) I developed a custom Python utility to automate the reconnaissance phase of security assessments. Problem: Manual Google Dorking and server status checking consumes valuable time during an audit. Solution: I wrote a Python script utilizing urllib and webbrowser modules to: Automate complex Google Dork queries for finding exposed environment files and admin panels. Batch-process server status checks (HTTP 200/403/404) to identify live targets instantly. Outcome: Reduced reconnaissance time by 90% for large-scope targets.
2
10
Cybersecurity Specialist
(4)
Follow
Message
Explore people