Freelance Cybersecurity Specialists in Toulouse
Freelance Cybersecurity Specialists in Toulouse
Sign Up
Post a job
Sign Up
Log In
Filters
2
Projects
People
Results that are similar to your search
Similar results
Jason Smyth
pro
Copthorne, UK
Cyber expert specialising in Azure Security Services.
$10k+
Earned
4x
Hired
5.0
Rating
13
Followers
Follow
Message
Cyber expert specialising in Azure Security Services.
0
Extended Interview Process for CrowdStrike SIEM Specialist
0
5
0
Setting up and optimising Microsoft Sentinel
0
33
0
Configure SIEM Security Operation using Microsoft Sentinel
0
26
0
Set up Microsoft Sentinel and Microsoft 365 Lighthouse
0
22
Cybersecurity Specialist
(6)
Follow
Message
Gary Szaszik
pro
London, UK
B2B Websites for Complex Industrial & Defense Companies
25
Followers
expert
Follow
Message
B2B Websites for Complex Industrial & Defense Companies
18
Cybersecurity website hero concept This concept was designed to address clarity issues in the existing site. The product and its proprietary technology weren’t coming through clearly, which made it hard for visitors to understand what the platform actually does or why it’s different. Another key challenge was visibility and conversion. Important information was missing, and there was no clear path for interested users to get in touch or take the next step. The goal of this hero was to clearly explain the product, introduce technical depth gradually, surface credibility early, and guide the right users toward action. It didn’t ship in this form as we chose a different visual direction, but it reflects how we approach complex cybersecurity products: clarity first, depth second.
18
160
30
Cybersecurity website hero concept This concept was designed to address clarity issues in the existing site. The product and its proprietary technology weren’t coming through clearly, which made it hard for visitors to understand what the platform actually does or why it’s different. Another key challenge was visibility and conversion. Important information was missing, and there was no clear path for interested users to get in touch or take the next step. The goal of this hero was to clearly explain the product, introduce technical depth gradually, surface credibility early, and guide the right users toward action. It didn’t ship in this form as we chose a different visual direction, but it reflects how we approach complex cybersecurity products: clarity first, depth second.
2
30
234
22
Cybersecurity website hero concept This concept was designed to address clarity issues in the existing site. The product and its proprietary technology weren’t coming through clearly, which made it hard for visitors to understand what the platform actually does or why it’s different. Another key challenge was visibility and conversion. Important information was missing, and there was no clear path for interested users to get in touch or take the next step. The goal of this hero was to clearly explain the product, introduce technical depth gradually, surface credibility early, and guide the right users toward action. It didn’t ship in this form as we chose a different visual direction, but it reflects how we approach complex cybersecurity products: clarity first, depth second.
22
188
16
Cybersecurity website hero concept This concept was designed to address clarity issues in the existing site. The product and its proprietary technology weren’t coming through clearly, which made it hard for visitors to understand what the platform actually does or why it’s different. Another key challenge was visibility and conversion. Important information was missing, and there was no clear path for interested users to get in touch or take the next step. The goal of this hero was to clearly explain the product, introduce technical depth gradually, surface credibility early, and guide the right users toward action. It didn’t ship in this form as we chose a different visual direction, but it reflects how we approach complex cybersecurity products: clarity first, depth second.
2
16
126
Cybersecurity Specialist
(4)
Follow
Message
Dragos Moruz
Timișoara, Romania
Seasoned cybersecurity leader.
5.0
Rating
3
Followers
Follow
Message
Seasoned cybersecurity leader.
1
Free Vulnerability Scanning Demo - Instant Security Insight
1
25
2
Firewall Configuration & Rule Review
2
11
1
Cybersecurity Dissertation Consultation – Research Direction
1
24
1
Web application pentesting for Evoque Group
1
10
Cybersecurity Specialist
(9)
Follow
Message
Amatullah Campbell
pro
London, UK
Cybersecurity GRC Consultant | Ex-Accenture
Follow
Message
Cybersecurity GRC Consultant | Ex-Accenture
0
Cybersecurity Project Manager for a UK Government client on behalf of Accenture. My duties included the following: ▪ Led key projects aligned with the client's strategic goals, showcasing project leadership and strategic alignment capabilities. ▪ Successfully led and managed three major projects, ensuring they met important client milestones and demonstrated effective project coordination and management skills. ▪ Prepared critical documents necessary for the delivery and completion of program milestones, evidencing meticulous organizational skills and attention to detail. ▪ Actively steered discussions with project directors and stakeholders, showcasing skills in strategic communication and influence at senior management levels. ▪ Worked in close collaboration with senior stakeholders, ensuring alignment with strategic goals and successful achievement of key program milestones, reflecting a strong capacity for teamwork and stakeholder management. Key outcomes included: ▪ Successfully delivered three major cybersecurity projects simultaneously for a UK Government client, demonstrating the ability to manage complexity, competing priorities and high-stakes deadlines in a regulated environment. ▪ Ensured all projects met critical client milestones, directly contributing to programme progression and client confidence in delivery. ▪ Produced critical programme documentation that underpinned milestone delivery, ensuring governance, accountability and audit trails were maintained to the standard expected of a UK Government engagement.
0
101
0
Technical Writing for a major Retail client that was on the verge of going Public on behalf of Accenture. Working with the Cybersecurity Programme Manager to unify and capture the deployment of several cybersecurity tools (Tanium, Crowdstrike, Tenable) across 120+ organisations. My duties included the following: ▪ Supported the programme lead by documenting all SOPs, policies and standards as required by the Cyber team. ▪ Conducted business requirement gathering sessions to develop subsequent documentation such as skills matrix, roles and responsibilities, RACIs and RAID logs. ▪ Supported on project management tasks such as maintaining the RAID logs, overseeing cyber tool deployment and updated status reports. Key outcomes included: ▪ Created a documentation foundation that the team could operate from independently, reducing reliance on tribal knowledge. ▪ Translated stakeholder needs into structured deliverables — moving from raw requirements to tangible outputs like skills matrices, RACIs, and roles & responsibilities. ▪ Supported successful cyber tool deployment by providing oversight and coordination, contributing to the programme's technical execution.
0
53
0
Cybersecurity Strategy Consulting and Project Management for an airline that was in its start-up phase in the Middle East on behalf of Accenture. My duties included the following: - Leading the Cyber GRC project to build the cybersecurity function for an aviation client, filling a critical security gap and laying groundwork for sustained cyber resilience. - Developing and implementing a cybersecurity strategy and roadmap aligned with ISO 27001 and region-specific regulations. - Executing a specialised threat profiling exercise, developing a unique threat landscape and identifying risks and vulnerabilities specific to the aviation sector. - Creating a detailed cybersecurity strategy and roadmap with an executive summary, ensuring alignment with client objectives and clarity for C-suite stakeholders. Key outcomes included: - Established a cybersecurity function from the ground up, giving the client a formal security posture where none previously existed. - Reduced organisational risk exposure by identifying aviation-specific threats before they could be exploited. - Positioned the client for long-term cyber resilience rather than reactive, ad hoc security responses.
0
62
0
Business Analyst for a UK Government client that were migrating their on prem data centres to Azure cloud. My duties included the following: - Conducted structured requirements gathering workshops across three senior business departments, engaging stakeholders at varying levels to elicit, validate and prioritise business and functional requirements. - Facilitated workshops and interviews with senior stakeholders to capture current-state processes and define future-state needs. - Translated business requirements into clear, actionable documentation including use cases, user stories and acceptance criteria for development and project teams. - Developed and maintained a requirements traceability matrix to ensure all business needs were mapped to corresponding deliverables and solutions. Key outcomes included: - Reduced ambiguity at the outset of the project by establishing clear, agreed requirements before any development or delivery work commenced, minimising the risk of costly rework downstream. - Produced structured, professional BA artefacts: use cases, user stories and acceptance criteria, that gave delivery teams a clear and unambiguous brief to work from - Ensured full requirements traceability, meaning every business need could be tracked through to a corresponding deliverable, supporting accountability and quality assurance.
0
47
Cybersecurity Specialist
(3)
Follow
Message
Ahmed Khan
Lahore, Pakistan
Cybersecurity specialist with ability to identify flaws
New to Contra
Follow
Message
Cybersecurity specialist with ability to identify flaws
0
I discovered a stored cross-site scripting (XSS) vulnerability in a practice web application's comment section that allowed me to inject malicious JavaScript that would execute in any user's browser. By submitting a comment containing a script payload, I successfully stole session cookies from other users and could have hijacked their accounts, performed actions on their behalf, or defaced the website. This finding was documented in a comprehensive report including proof-of-concept screenshots showing cookie theft, CVSS risk scoring of 6.5 (Medium), and step-by-step remediation guidance including input sanitization and output encoding. This assessment demonstrates my ability to find client-side vulnerabilities that can compromise every user visiting the site.
0
6
0
I discovered a SQL injection vulnerability in a practice web application that allowed me to bypass the login system and access the entire user database without any credentials. By inserting a simple payload into the username field, I successfully logged in as the first user in the database and extracted sensitive information including usernames, password hashes, and user email addresses. This finding was documented in a detailed report with proof-of-concept screenshots, risk analysis showing potential data breach impact, and step-by-step remediation guidance including parameterized queries and input validation. This assessment demonstrates my ability to find critical database vulnerabilities that could expose thousands of customer records.
0
8
0
During a security assessment of a practice web application, I discovered an exposed FTP directory with directory listing enabled, revealing multiple sensitive files including a password database, backup configurations, compiled source code, and error logs. After finding a clue in robots.txt, I navigated to the /ftp directory and documented over ten exposed files with their associated risks. My final report included an executive summary, detailed findings with screenshots, risk ratings for each exposed file, and step-by-step remediation guidance including disabling directory listing and removing sensitive data. This finding highlights how simple misconfigurations can lead to critical data exposure.
0
14
0
I discovered an Insecure Direct Object Reference (IDOR) vulnerability in a practice web application that allowed unauthorized users to access other people's private snippets simply by changing a number in the URL. Using whatweb and manual inspection, I identified parameter tampering points and successfully accessed private data for five different users without authentication. The finding was documented in a comprehensive report including executive summary, technical details with screenshots, CVSS risk scoring, and step-by-step remediation instructions. This assessment demonstrates my ability to find broken access controls that automated tools miss and deliver clear, actionable fixes.
0
18
Cybersecurity Specialist
(4)
Follow
Message
TRUSTLAYER LABS
Hyderabad, India
VAPT Specialist helping SaaS & FinTech companies secure Web
New to Contra
Follow
Message
VAPT Specialist helping SaaS & FinTech companies secure Web
0
Conducted security assessment for a SaaS platform to identify vulnerabilities across application, API, and cloud infrastructure. Focus was on securing early-stage products handling user authentication, data storage, and third-party integrations. Assessment covered: • Authentication and authorization security review • API security testing • Cloud configuration security checks • Data protection risk analysis • OWASP Top 10 vulnerability assessment • Business logic security review Approach included manual penetration testing and configuration analysis to identify risks commonly exploited in SaaS environments. Deliverables: • Startup-friendly security report • Risk prioritization based on business impact • Actionable remediation checklist • Recommendations for secure architecture improvements Tools used: Burp Suite Postman OWASP ZAP Nmap Outcome: Helped startup strengthen security foundation, improve user trust, and prepare for enterprise client security requirements.
0
8
0
Web Application Security Testing – OWASP Top 10 Description Performed comprehensive Web Application Security Testing to identify vulnerabilities that could expose sensitive data or compromise application integrity. Testing methodology followed OWASP Top 10 security standards focusing on the most critical risks in modern web applications. Scope included: • SQL Injection vulnerability testing • Cross-Site Scripting (XSS) detection • Authentication and session management testing • Security misconfiguration analysis • Sensitive data exposure risks • Cross-Site Request Forgery (CSRF) testing • Broken access control validation Manual penetration testing combined with automated scanning tools helped simulate real-world attack scenarios. Deliverables: • Detailed VAPT report with risk severity levels • Proof of Concept (PoC) for identified vulnerabilities • Step-by-step remediation guidance • Security best practice recommendations Tools used: Burp Suite OWASP ZAP Nikto Nmap Outcome: Improved application security posture and ensured readiness for client security audits and compliance requirements.
0
10
0
VAPT Security Testing – Project Description Conducted end-to-end Vulnerability Assessment & Penetration Testing (VAPT) to identify security weaknesses in web applications, APIs, and backend systems. Testing focused on OWASP Top 10 vulnerabilities and real-world attack scenarios that could impact confidentiality, integrity, and availability of sensitive data. Scope included: • Authentication and session management testing • Authorization and access control validation • Input validation and injection vulnerability testing • Security misconfiguration assessment • Sensitive data exposure analysis • API endpoint security testing • Business logic vulnerability testing Methodology involved a combination of automated scanning tools and manual penetration testing techniques to simulate attacker behavior. Key outcomes: • Identified critical, high, and medium risk vulnerabilities • Delivered detailed security assessment report • Provided Proof of Concept (PoC) for vulnerabilities • Shared clear remediation guidance for development teams • Improved overall application security posture Tools used: Burp Suite OWASP ZAP Nmap Nikto Postman Result: Strengthened application security, reduced risk of cyber attacks, and improved readiness for compliance and client security audits.
0
13
0
Performed comprehensive API Security Testing to identify vulnerabilities that could expose sensitive data or allow unauthorized access. Assessment focused on OWASP API Top 10 risks including: • Broken Object Level Authorization (BOLA) • Broken Authentication • Excessive Data Exposure • Security Misconfiguration • Injection vulnerabilities • Improper Rate Limiting Testing methodology included manual penetration testing and automated vulnerability scanning to simulate real-world attack scenarios. Key outcomes: • Identified critical and high-risk vulnerabilities • Provided detailed remediation guidance for developers • Improved API security posture and reduced risk of data breaches • Ensured compliance readiness for security audits Deliverables included: • Detailed VAPT report • Risk severity classification • Proof of concept (PoC) for vulnerabilities • Step-by-step mitigation recommendations Tools used: Burp Suite, Postman, OWASP ZAP, Nmap
0
15
Cybersecurity Specialist
(4)
Follow
Message
Godfrey Ofure
Lagos, Nigeria
UI/UX DESIGNER | WEBSITE DEVELOPER | Figma | Framer Expert
New to Contra
Follow
Message
UI/UX DESIGNER | WEBSITE DEVELOPER | Figma | Framer Expert
0
Cyber Security Platform - UI/UX Design by AmazingUI
0
0
0
Cybersecurity Dashboard App Development | Ronas IT
0
0
0
AI Agent App – Drive to Gmail Experience by AmazingUI
0
2
0
AI Agent for Tech Teams - UI/UX & Interaction Design
0
0
Cybersecurity Specialist
(3)
Follow
Message
Andrey Pautov
Tel Aviv-Yafo, Israel
CyberSecurity expert
Follow
Message
CyberSecurity expert
0
SOC Tier 1: Security Monitoring and Incident Response
0
22
0
The Ultimate Guide to Metasploit: Part 1
0
4
0
Automating Static Malware Analysis with Python Tools
0
1
0
Passwords Cracking: Full Guide with Real-Life Examples
0
1
Cybersecurity Specialist
(4)
Follow
Message
Explore people