Freelance Cybersecurity Specialists
Freelance Cybersecurity Specialists
Sign Up
Post a job
Sign Up
Log In
Filters
1
Projects
People
Jason Smyth
PRO
Derbyshire, UK
Cyber expert specialising in Azure Security Services.
$5k+
Earned
12x
Hired
5.0
Rating
11
Followers
Follow
Message
Cyber expert specialising in Azure Security Services.
0
Extended Interview Process for CrowdStrike SIEM Specialist
0
0
0
Setting up and optimising Microsoft Sentinel
0
30
0
Configure SIEM Security Operation using Microsoft Sentinel
0
23
0
Set up Microsoft Sentinel and Microsoft 365 Lighthouse
0
20
Cybersecurity Specialist
(6)
Follow
Message
Dragos Moruz
Timișoara, Romania
Seasoned cybersecurity leader.
5.0
Rating
3
Followers
Follow
Message
Seasoned cybersecurity leader.
1
Free Vulnerability Scanning Demo - Instant Security Insight
1
23
1
Firewall Configuration & Rule Review
1
8
1
Automated Vulnerability Scanning and Security Assessment
1
6
1
Web application pentesting for Evoque Group
1
6
Cybersecurity Specialist
(9)
Follow
Message
Chimdiebube Egereonu
Owerri, Nigeria
Web Security Analyst & OSINT Specialist
New to Contra
Follow
Message
Web Security Analyst & OSINT Specialist
1
WordPress Security Hardening & Malware Prevention Security audit for a business portfolio website running legacy infrastructure. Findings: Outdated Software: Identified CMS version 4 years out of date, exposing the site to known CVEs. Plugin Vulnerabilities: Detected vulnerable versions of Elementor susceptible to Stored XSS. Directory Traversal: Public access enabled on plugin directories. Solution: Provided a roadmap for updating the core CMS, patching plugins, and implementing .htaccess rules to block directory browsing.
1
5
1
Critical Information Disclosure (Server Logs) Identified a Critical (P1) data leak in an educational management portal. The Finding: Exposed Laravel Debug Logs (laravel.log). Technical Details: The server was misconfigured to allow public "Directory Listing" on the storage folder. This exposed a 5MB log file containing: Full Database Schema. Backend Stack Traces. Hardcoded default user credentials. Remediation: Advised the internal team to disable directory indexing and restrict access to the /storage/ directory immediately.
1
7
1
WAF Bypass & XSS Discovery for E-Commerce Platform Conducted a black-box security assessment for a high-traffic e-commerce marketplace (10M+ users). The Finding: Reflected Cross-Site Scripting (XSS) in the search functionality. Technical Details: The application employed a Web Application Firewall (WAF) that stripped standard XSS vectors (parentheses). I successfully bypassed this filter using ES6 Template Literals (backticks) to execute JavaScript. Impact: Reported a P2 Vulnerability that could allow account takeover via session cookie theft. Status: Reported via Vulnerability Disclosure Program (VDP).
1
7
1
Custom OSINT Automation Tool (Python) I developed a custom Python utility to automate the reconnaissance phase of security assessments. Problem: Manual Google Dorking and server status checking consumes valuable time during an audit. Solution: I wrote a Python script utilizing urllib and webbrowser modules to: Automate complex Google Dork queries for finding exposed environment files and admin panels. Batch-process server status checks (HTTP 200/403/404) to identify live targets instantly. Outcome: Reduced reconnaissance time by 90% for large-scope targets.
1
4
Cybersecurity Specialist
(4)
Follow
Message
Andrey Pautov
Tel Aviv-Yafo, Israel
CyberSecurity expert
Follow
Message
CyberSecurity expert
0
SOC Tier 1: Security Monitoring and Incident Response
0
12
0
The Ultimate Guide to Metasploit: Part 1
0
2
0
Automating Static Malware Analysis with Python Tools
0
1
0
Passwords Cracking: Full Guide with Real-Life Examples
0
0
Cybersecurity Specialist
(4)
Follow
Message
Paul Abulu Jr
Washington, USA
Cybersecurity| Robotics, Machine Learning & AI
Follow
Message
Cybersecurity| Robotics, Machine Learning & AI
0
Robotics: Fundamentals, Safety, and Security
0
19
0
Computer Vision Basics: No Math, No Code
0
17
0
The Personal IoT Security Playbook: A Beginner’s Guide
0
22
0
Personal Data on Wheels: 5 Steps to Protect Your Data
0
10
Cybersecurity Specialist
(4)
Follow
Message
Sumalya Chatterjee
Kolkata, India
Expert Next.js Frontend Developer – Fast & Responsive
New to Contra
Follow
Message
Expert Next.js Frontend Developer – Fast & Responsive
1
Privacy Permission Dashboard – Firefox Extension
1
0
1
Link Abyss – Broken Link Detector Firefox Extension
1
0
1
Best Cookie Editor – Advanced Cookie Management Extension
1
1
1
Subdomain Finder Firefox Extension Development
1
0
Cybersecurity Specialist
(6)
Follow
Message
Mateen Shaikh
Mumbai, India
Out-of-the-box Security Solutions
Follow
Message
Out-of-the-box Security Solutions
0
Log Analysis & Threat Detection Enhancement
0
34
0
Compliance Auditing & Application Integration
0
6
0
Optimized Incident Response and IAM Systems
0
7
0
Firewall Security Enhancement and Threat Detection
0
9
Cybersecurity Specialist
(5)
Follow
Message
Fabrizio Di Carlo
PRO
Frankfurt, Germany
CISO Services: Bridging Tech & Business Needs
Follow
Message
CISO Services: Bridging Tech & Business Needs
0
Securing Cloud Infrastructure for an E-commerce Platform
0
14
0
Cybersecurity Strategy and Implementation for a Tech Startup
0
7
1
Enhancing Cyber Resilience for a Financial Services Firm
1
11
View more →
Cybersecurity Specialist
(3)
Follow
Message
Explore people