Hire the best Vulnerability Assessment Specialists in France
Check out Vulnerability Assessment Specialists in France with the skills you need for your next job.
- $120 hourly
- 5.0/5
- (49 jobs)
I will help you reach your security compliance goals. Whether SOC 2, ISO 27001, or maintaining your security as a fractional CISO, you are dealing with an Expert-Vetted consultant (less than 1% of Upwork talents). Ex-Big 4 senior consultant with 10+ years of experience in assisting clients in cybersecurity, IT compliance, AI security management and security risk assessment projects. ❗You have lost contracts because you were not certified? ❗Your clients pressure you to provide them with an information security certification (PCI-DSS, SOC 2, ISO 27001, HIPAA, FedRAMP, CMMC, ISO 42001) ? ❗You don't know what to answer to the security assessment questionnaire you recently received from your biggest client & it's taking too much time ? ❗You don't have time and resources to be consumed by compliance efforts and endless meetings? ❗You are struggling to understand the certification process, the related cost, and the timelines? ❗You just purchased a compliance tool (Drata, Vanta, Thoropass, Sprinto, OneTrust/Tugboat, SecureFrame, Strike Graph, Audit Board, TrustCloud) but don't know the next step or don't have time for it? Services provided: 📝 Policies & Procedure writing & review 📝 Security gap analysis (based on frameworks on your choice, ISO 27001, NIST, SOC 2, etc.) 📝 IT and Compliance Audits 📝 Performing Risk Assessments, risk treatments, and establishing actions plans & roadmaps. 📝 Evaluation of the existing IT security state of maturity against established standards & regulatory requirements. 📝 Organization-wide security strategy 📝 Support in Governance, Risk & Compliance (GRC) projects 📝 Cloud security governance, management and strategy 📝 Security Operations 📝 DPO service: I can provide you with assistance with regards to GDPR/CCPA compliance, policy writing/reviewing, GDPR gap assessment analysis, and accompanying you in your GDPR compliance journey and Data Privacy requirements. 📝 CISO service: I can provide you with assistance and support in defining your security strategy, putting in place action plans and following up implementation over the long run. 💥WHY ME AND NOT ANOTHER FREELANCER?💥 ✅ Big 4 consultant expertise. End-to-end managed security services. ✅ All work is completed by myself, with constant communication with you and taking into account your every remark & need. ✅ Excellent Client Reviews: I focus on providing you with VALUE and earning your TRUST. ✅ Over-Delivering: I focus on GIVING you more than what I expect to RECEIVE. I am happy when my client's expectations are exceeded. ✅ Responsiveness: All lines of communications are open, and I can be reached very easily. ✅ Kindness & Ethics: As security and compliance professional, we hold ourselves to high ethical values, treating everyone with respect, understanding and genuinely IMPROVING my client's situation. Let's get in touch. (The hourly rate shown is indicative only, as I adapt depending on the project and client's budget) Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Compliance management tools: Drata, Vanta, Onetrust Compliance Automatization - Tugboat Logic, Sprinto, SecureFrame, Thoropass (HeyLaika), Trust Cloud, Strike Graph, Audit Board, ISMS.online, Instant27001 Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS), IRAP, ISO 42001Vulnerability Assessment
Certified Information Systems Security ProfessionalInformation Security AuditCloud SecurityGovernance, Risk & Compliance SoftwareSecurity ManagementData PrivacySOC 2 ReportGDPRIT Compliance AuditRisk AssessmentISO 27001Information SecuritySecurity Policies & Procedures DocumentationInformation Security Consultation - $45 hourly
- 5.0/5
- (1 job)
I’m a Computer Science Engineer with a Master’s in Cryptography and Computer Security. Experienced in development, Azure Cloud, reverse engineering, web exploitation, network scanning, and security tools like EDR and SIEM. Passionate about cybersecurity, I actively participate in CTFs and platforms like TryHackMe and HackTheBox to continuously enhance my skills. Skilled in penetration testing and vulnerability assessments with hands-on experience in real-world security challenges.Vulnerability Assessment
Information SecurityCybersecurity MonitoringCybersecurity ManagementSOC 2 ReportIncident Response Readiness AssessmentCrowdStrikeSOC 2SOC 1Risk AssessmentRisk ManagementSOC 3 ReportPenetration TestingSOC 3Cyber Threat Intelligence - $20 hourly
- 5.0/5
- (11 jobs)
Looking for a reliable cybersecurity professional to secure your digital assets, assess vulnerabilities, or test your systems against real-world attacks? You're in the right place. I'm a cybersecurity enthusiast and practitioner specialized in: ✅ Penetration Testing (Web, Network, APIs) ✅ Vulnerability Assessment & Reporting ✅ Threat Detection & Log Analysis (SIEM/Wazuh) ✅ Security Hardening (Linux/Windows) ✅ Red Team Techniques (privilege escalation, enumeration) Whether you're a startup wanting to secure your first product or an enterprise needing a pentest report — I bring technical precision and professional communication. 💬 Let’s discuss your project — I’ll treat your systems like my own. Secure systems. Peace of mind. Delivered.Vulnerability Assessment
Red Team AssessmentWeb App Penetration TestingNetwork SecurityPenetration Testing - $60 hourly
- 0.0/5
- (0 jobs)
Welcome! I’m a cybersecurity consultant specializing in ethical hacking, web application security, and OSINT investigations. I help companies protect their systems by uncovering vulnerabilities before attackers do. I combine hands-on experience in penetration testing, bug bounty hunting, and security audits with clear, actionable reports – whether you’re a SaaS startup, public sector client, or building your first MVP. ⸻ 🔧 Services I Offer • Manual penetration testing (Web, API, WordPress, Networks) • OSINT & attack surface mapping • Security audits (ISO 27001, SOC 2, GDPR readiness) • Bug bounty-style vulnerability assessments • PoC-based reports with step-by-step remediation ⸻ ✅ Why Work With Me • eLearnSecurity eJPT certified • Top 5% TryHackMe user – completed multiple hands-on learning paths • Experience with real-world web app audits (public reports available) • Proficient with Burp Suite, Metasploit, Nmap, Hydra, Python & Bash • Consulted for SaaS startups and public sector on security & compliance ⸻ 🚀 Currently working on • CompTIA Security+ certification • Freelance pentests & compliance audits for real clients ⸻ 📁 Let’s work together Whether you need a quick vulnerability scan or a full-scale security audit, I’ll deliver clear, actionable insights – not just generic scan results. Let’s make your product safer – before someone tests it for you. 📄 Portfolio: pkieszek.github.io/portfolio/Vulnerability Assessment
Python ScriptLinux System AdministrationMetasploitSOC 2ISO 27001Security TestingInformation Security ConsultationWeb Application SecurityEthical HackingInformation Security AuditPenetration Testing - $75 hourly
- 0.0/5
- (0 jobs)
Consultant senior en cybersécurité avec plus de 12 ans d'expérience dans les environnements critiques (SecOps, SOC, gestion des vulnérabilités, réponse à incident). Certifié GCFA, CEH, CHFI, CAISP, j’accompagne les entreprises dans la sécurisation de leurs infrastructures traditionnelles comme intelligentes (IA/ML), avec un focus récent sur les risques liés à l’intelligence artificielle et aux systèmes automatisés.Vulnerability Assessment
Security Operation CenterSecurity EngineeringPenetration TestingIncident Response Plan - $50 hourly
- 0.0/5
- (0 jobs)
In today's digital landscape, cyber threats are more sophisticated than ever. It's crucial for businesses of all sizes to implement robust security measures to protect their data and systems. I'm an experienced cybersecurity consultant with over 10 years' experience in the industry. I help companies identify, assess and mitigate their cyber risks by providing cyber risk auditing and pentesting services.Vulnerability Assessment
Google Cloud PlatformWeb Application FirewallUbuntuDebianCloud SecurityInformation SecurityCompliance - $85 hourly
- 0.0/5
- (0 jobs)
I’m a cybersecurity architect with over 8 years of experience designing, implementing, and maintaining secure infrastructures for clients in critical industries (defense, banking, healthcare, aviation, maritime). I specialize in perimeter and endpoint protection (Firewall, EDR/XDR), Zero Trust architecture, cloud security (AWS, Azure), and vulnerability management. I hold certifications from leading vendors including Sophos (Instructor – Firewall/Endpoint/Email), Palo Alto PCNSA, Fortinet NSE, Illumio, and Cisco (CCNP). What I offer: Security architecture design (on-prem & cloud) Solution integration: Firewalls, Endpoint protection, Email security, WAF, SD-WAN Zero Trust implementation (ZTNA, Illumio, Trend Micro ZTPA) Vulnerability scanning (Qualys, Nexus), compliance and audits Documentation (HLD, LLD, procedures), training & support Available for long- or short-term missions. Fluent in French, professional level in English. Remote, hybrid, or onsite (France).Vulnerability Assessment
Information SecuritySplunkTechnical WritingCloud SecurityWeb Application FirewallMicrosoft Endpoint ManagerFortinetSophos Sophos UTMWAN OptimizationZero Trust ArchitectureNetwork AdministrationNetwork SecurityNetwork ArchitectureCybersecurity Monitoring - $100 hourly
- 0.0/5
- (0 jobs)
Certified Cybersecurity Consultant (ISO 27001, ISO 27005) with 9+ years of experience. I help businesses secure their IT systems, applications, APIs, and cloud environments (AWS, Azure). Expertise: security audits, risk management, ISO/GDPR/PCI DSS compliance, application security & DevSecOps. Clear, actionable deliverables tailored to your needs. Let’s work together to secure your projects!Vulnerability Assessment
RESTful ArchitectureProblem SolvingISO 27001Risk AnalysisRisk AssessmentData Analytics & Visualization SoftwareCybersecurity MonitoringCybersecurity ManagementCybersecurity ToolSecurity Assessment & TestingSecurity TestingSecurity AnalysisArchitectureInformation Security - $35 hourly
- 5.0/5
- (2 jobs)
Hello! I’m Abdellah Belouali, an experienced Linux and Cybersecurity Engineer. With over 10 years of hands-on experience, I specialize in providing top-notch IT solutions and services across various industries. My mission is to help clients secure their digital assets and ensure seamless IT operations through expert systems administration, network management, and cybersecurity practices. What I Do Best Linux System Administration: I excel in managing Linux-based systems, ensuring they run smoothly and securely. My expertise includes server installation, configuration, and maintenance, providing robust and reliable environments for your applications. Cybersecurity: As a certified eJPT , I have a deep understanding of cybersecurity principles. I specialize in vulnerability assessment, penetration testing, and implementing security measures to protect your systems from threats. Network Security: With extensive experience in network security, I can design and implement secure network architectures. My skills include firewall management, intrusion detection and prevention, and network configuration and troubleshooting. Application Deployment: I am adept at deploying applications on various server environments. From setting up web servers like Apache and Nginx to managing databases such as MySQL and PostgreSQL, I ensure your applications are deployed efficiently and securely. Cloud Infrastructure: I have hands-on experience with cloud platforms like AWS and Azure. I can help you leverage cloud services for scalable and cost-effective IT solutions, including cloud security, virtualization, and containerization using Docker and Kubernetes. System Integration: I specialize in integrating diverse IT systems to work seamlessly together. Whether it's integrating new software with existing systems or ensuring compatibility between different platforms, I provide comprehensive integration solutions. Key Skills Linux System Administration Server Installation and Configuration Application Deployment Scripting (Bash, Python, Ruby ) Web Server Management (Apache, Nginx) Database Management (MySQL, PostgreSQL) Virtualization (VMware, KVM) Cloud Infrastructure (AWS, Azure) Containerization (Docker, Kubernetes) System Monitoring and Performance Tuning Configuration Management (Ansible, Puppet, Chef) Backup and Recovery Solutions User and Access Management Network Configuration and Troubleshooting Security Hardening and ComplianceVulnerability Assessment
KibanaELK StackWeb ServerKali LinuxRed Hat Enterprise LinuxAnsiblePythonBash ProgrammingScriptingSystem AdministrationWeb Application SecurityPenetration TestingCybersecurity ToolLinux System Administration - $30 hourly
- 0.0/5
- (0 jobs)
**I only bid on that project which I can deliver with complete satisfaction.** If your Instagram or facebook is hacked and your email and number changed and facing 2fa so you are in the right place. For Hacked Account Recovery I Take Fix Price Which I Discuss before Start Project* I can provide solutions with the following: ✅Social media accounts setup and integration ✅ Social Media Management ✅ Social Media Optimization ✅ Social Media Error Fixing ✅ Instagram Recovery ✅ Assistance with hacked Instagram account ✅ Assitance with stolen Facebook account ✅ Facebook business page recovery ✅ Accounting ✅ Social media account recovery ✅ 2FA solution ✅ Google My Business ✅ Virtual Assitance ✅ All kinds of Social accounts Retrieve and All sorts of Error Fixing and name a few & I will let you know my experience. I am always eager to learn new skill. In response to your expectations: 1. I have expertise in the area required by you. 2. I can start the project immediately and complete your milestone as per your timeline. I believe communication is a key to any successful project, and I'd like to start things off on the right foot, but suggesting we schedule a call to discuss the project further. This will enable us to make sure that we communicate well and are completely comfortable with the scope of the project. Please let me know the time that works best for you and I will make sure that I make myself available. Thank you for your time and consideration.Vulnerability Assessment
Security Assessment & TestingInternet SecurityNetwork Penetration TestingData RecoveryGrowth HackingHackerRankInformation Security ConsultationSecurity TestingSystem SecurityNetwork SecurityPenetration TestingInformation SecurityEthical Hacking - $25 hourly
- 0.0/5
- (1 job)
Cybersecurity Consultant | Founder @ SoterSec | Offensive Security & Web Audits I'm the founder of SoterSec, a cybersecurity company providing penetration tests, vulnerability assessments, and phishing simulations for SMEs and public organizations in France and across Europe. I personally handle technical missions such as web application audits, CVE exploitation, and OSINT analysis. For larger projects, I collaborate with trusted experts (Red Team / AD / web security) under strict contracts to ensure quality and fast delivery. What I do best: Web app security audits (XSS, LFI, RCE, auth bypass…) Network/infra pentesting (Nmap, Metasploit, Wireshark, AD) Custom scripts for scanning, automation and exploitation (Python, Bash) WordPress/Cloud misconfig detection & reporting Phishing simulations with landing pages + report I deliver clear reports, PoC examples, and actionable fixes. Let’s secure your assets — the right way.Vulnerability Assessment
Cybersecurity ToolNetwork SecurityMetasploitInformation SecurityPenetration Testing - $30 hourly
- 0.0/5
- (1 job)
Currently transitioning from a corporate role while seeking new impactful opportunities in the cybersecurity field. Cybersecurity Engineer | Pentester : Specialized in offensive security, with proven expertise in penetration testing, vulnerability exploitation, and secure system implementation. Skilled in identifying and mitigating security risks through advanced offensive techniques, reverse engineering, and custom tool development. Experienced in developing secure systems and providing innovative solutions to address complex cybersecurity challenges. Programming & Scripting: Python, C/C++, Java, SQL, Powershell, Bash, Assembly, Racket, Smalltalk. Software Development: Object-oriented programming, system design. Languages: French (Native), English (Fluent)Vulnerability Assessment
JavaScriptAssembly LanguageReverse EngineeringSecurity TestingSecurity EngineeringNetwork SecurityPenetration TestingJavaC++CPythonSoftware Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.