Experiencing DDoS issues? → Schedule a consultation

Expert DDoS Mitigation & Application Security

Specialized consulting for Layer-7 attack mitigation, edge security optimization, and infrastructure hardening.

Client result: 76M requests/hour mitigated with zero downtime.

Available for urgent engagements. Initial response within business hours (CET).

Results-focused approach: If mitigation targets aren't met within the agreed timeframe, consultation fees are refunded.

Trusted by engineering teams at fintech, gaming, e‑commerce, iGaming, and SaaS companies.

Who This Is For

🛒 E-commerce

Cart abandonment spikes during checkout floods.

→ Keep buyers buying during attacks.

🎮 Gaming

Player rage when lobbies crash from bot swarms.

→ Stable gameplay, happy community.

💳 Fintech/API

Payment processing fails = immediate revenue loss.

→ API uptime even under targeted attacks.

🎰 iGaming/Betting

Live events disrupted by competitor attacks.

→ Uninterrupted betting during peak events.

Recent Results

(Anonymized client results with permission)

Fintech API: cut malicious RPS by 87% in 23 minutes; 5xx rate down from 12% to 0.3%.
E-commerce site: competitors sending 76M requests/hour mitigated in real-time; sales unaffected.
Ecommerce: reduced AWS egress 64% after cache & WAF tuning during Black Friday sale.

What Clients Say

Verified reviews from Upwork clients

When working with Vedran it was immediately apparent that he knew his stuff inside and out! We will very likely hook him in the future. 100% recommend.
Verified Client
Upwork Client
★★★★★
Great to work with, excellent skills and turnaround time. Solved our issues.
Verified Client
Upwork Client
★★★★★
Vedran was fantastic to work with and is a talented developer. He helped us get a site up at a critical time after a security issue. I would highly recommend and will reach out to him for future work when it comes up.
Verified Client
Upwork Client
★★★★★
Quickly helped us defend against DDoS attack and resolved new attacks very quickly. Will hopefully never have to use again! But if we do, I know where to find the guy who can protect us!
Verified Client
Upwork Client
★★★★★

View all reviews on Upwork →

Why Cloudflare alone may not be enough

Read: When Cloudflare doesn't stop L7 attacks →

Engagement Process

1

Assess

logs, top paths, traffic shape, infra map

2

Stabilize

path/method rules, rate limits, cache shields

3

Harden

bot management, origin protections, alerts

4

Hand‑off

runbook, dashboards, optional training

Technologies & Platforms

Cloudflare (WAF, Bot Management, Rate Limiting, Transform Rules), AWS Shield Advanced, Fastly, NGINX/HAProxy, Kubernetes ingress, CDNs/edge caches.

Frequently Asked Questions

Can you help right now?
Yes. Use the "I'm under attack" button for fastest response. I'll do a quick triage and start containment immediately after access is granted.
What access do you need?
Temporary access to your edge/WAF (Cloudflare/AWS/other), read‑only app logs, and someone from your team for context. If needed, I can work under NDA.
Will you replace Cloudflare/AWS Shield?
No. I tune and augment them with targeted rules and origin hardening so they block more and break less.
What if the attack is volumetric (L3/L4)?
I coordinate with your ISP/scrubbing provider and adjust L7 to minimize collateral load on origin while upstream filtering kicks in.
How much does it cost?
Clear packages: fixed‑fee for Emergency Containment, flat price for the 2‑week Sprint, monthly for Retainer. Request the current rate card via the CTA.
Will this hurt real users or SEO?
No. Rules are scoped by path/method and tested on staging/low‑risk paths first. I monitor KPIs (latency, 4xx/5xx, conversions) and roll back if needed.
Do you sign NDAs and handle PII?
Yes. I can sign your NDA/DPA. I only access what's required and provide a data‑handling summary in the runbook.

About Vedran

I'm a hands‑on engineer focused on DDoS mitigation and web performance. I combine edge configuration with application‑aware rules to neutralize Layer‑7 attacks without slowing down legitimate users.

Medium LinkedIn

Get in Touch

Share details about your infrastructure needs. Response typically within 24 hours.