Freelance Security Managers in Toulouse
Freelance Security Managers in Toulouse
Sign Up
Post a job
Sign Up
Log In
Filters
2
Projects
People
Results that are similar to your search
Similar results
Dragos Moruz
Timișoara, Romania
Seasoned cybersecurity leader.
5.0
Rating
2
Followers
Follow
Message
Seasoned cybersecurity leader.
1
Free Vulnerability Scanning Demo - Instant Security Insight
1
24
1
SDLC Security Integration and Review
1
14
1
Security Testing for iOS and Android Mobile Applications
1
13
1
Automated Vulnerability Scanning and Security Assessment
1
6
Security Manager
(5)
Follow
Message
Ahmed Khan
Lahore, Pakistan
Cybersecurity specialist with ability to identify flaws
New to Contra
Follow
Message
Cybersecurity specialist with ability to identify flaws
0
I discovered a stored cross-site scripting (XSS) vulnerability in a practice web application's comment section that allowed me to inject malicious JavaScript that would execute in any user's browser. By submitting a comment containing a script payload, I successfully stole session cookies from other users and could have hijacked their accounts, performed actions on their behalf, or defaced the website. This finding was documented in a comprehensive report including proof-of-concept screenshots showing cookie theft, CVSS risk scoring of 6.5 (Medium), and step-by-step remediation guidance including input sanitization and output encoding. This assessment demonstrates my ability to find client-side vulnerabilities that can compromise every user visiting the site.
0
3
0
I discovered a SQL injection vulnerability in a practice web application that allowed me to bypass the login system and access the entire user database without any credentials. By inserting a simple payload into the username field, I successfully logged in as the first user in the database and extracted sensitive information including usernames, password hashes, and user email addresses. This finding was documented in a detailed report with proof-of-concept screenshots, risk analysis showing potential data breach impact, and step-by-step remediation guidance including parameterized queries and input validation. This assessment demonstrates my ability to find critical database vulnerabilities that could expose thousands of customer records.
0
4
0
During a security assessment of a practice web application, I discovered an exposed FTP directory with directory listing enabled, revealing multiple sensitive files including a password database, backup configurations, compiled source code, and error logs. After finding a clue in robots.txt, I navigated to the /ftp directory and documented over ten exposed files with their associated risks. My final report included an executive summary, detailed findings with screenshots, risk ratings for each exposed file, and step-by-step remediation guidance including disabling directory listing and removing sensitive data. This finding highlights how simple misconfigurations can lead to critical data exposure.
0
11
0
I discovered an Insecure Direct Object Reference (IDOR) vulnerability in a practice web application that allowed unauthorized users to access other people's private snippets simply by changing a number in the URL. Using whatweb and manual inspection, I identified parameter tampering points and successfully accessed private data for five different users without authentication. The finding was documented in a comprehensive report including executive summary, technical details with screenshots, CVSS risk scoring, and step-by-step remediation instructions. This assessment demonstrates my ability to find broken access controls that automated tools miss and deliver clear, actionable fixes.
0
14
Security Manager
(4)
Follow
Message
Fida Marwat
Phase 1 Pakistan Town, Pakistan
UI/UX Designer | WordPress, Shopify, React, Tailwind/Boots.
8
Followers
Follow
Message
UI/UX Designer | WordPress, Shopify, React, Tailwind/Boots.
0
Information System Unified Risk Governance & Evaluation
0
9
0
Document Management System
0
1
0
Transparent Hands App
0
3
0
Patient Recruitment Management System (PRMS)
0
3
Security Manager
(2)
Follow
Message
Detlef Wolter
Campinas, Brazil
Great support turns customers into your cost-free marketers
Follow
Message
Great support turns customers into your cost-free marketers
0
Yubo - User Safety Specialist
0
6
0
Voggt - Customer Support/Safety
0
5
0
Amazon's DSP Program Time and Attendance Expert - TSM
0
8
0
Smylor - Dental Treatment Marketplace
0
5
Security Manager
(2)
Follow
Message
Mateen Shaikh
Mumbai, India
Out-of-the-box Security Solutions
Follow
Message
Out-of-the-box Security Solutions
1
Healthcare Cybersecurity Enhancement Initiative
1
11
0
Optimized Incident Response and IAM Systems
0
7
0
Firewall Security Enhancement and Threat Detection
0
12
0
Log Analysis & Threat Detection Enhancement
0
38
Security Manager
(3)
Follow
Message
Fabrizio Di Carlo
pro
Frankfurt, Germany
CISO Services: Bridging Tech & Business Needs
Follow
Message
CISO Services: Bridging Tech & Business Needs
0
Securing Cloud Infrastructure for an E-commerce Platform
0
17
0
Cybersecurity Strategy and Implementation for a Tech Startup
0
9
1
Enhancing Cyber Resilience for a Financial Services Firm
1
12
View more →
Security Manager
(3)
Follow
Message
Muhamed Ali
Egypt
Versatile Cybersecurity & HR Expert
Follow
Message
Versatile Cybersecurity & HR Expert
0
Training project , Enhancing Security Awareness: Understanding t
0
7
0
Onsite Network Pentest
0
7
0
Onion Circuit for a special purpose research client
0
7
View more →
Security Manager
(2)
Follow
Message
Radu Stan
Bucharest, Romania
Cybersecurity expert specializing in Third Party Risk Assess
Follow
Message
Cybersecurity expert specializing in Third Party Risk Assess
0
Strategic Cybersecurity Framework Implementation
0
10
0
Cybersecurity Maturity Model Development
0
5
0
Comprehensive Third Party Risk Assessment Template Development
0
8
View more →
Security Manager
(2)
Follow
Message
Explore people