Cyber Security Developer

Hire Cyber Security Developers

We use a highly curated database to find the candidate with the skills most suited to your business’s needs. Browse the talent below, find the perfect fit and our qualified customer service agents will take care of the rest.

  • Home
  • >
  • Cyber Security Developers
Get in touch

A Cyber Security Professional with deep understanding of Information technology. Proficient knowledge of cyber threats and attacks ranging from denial of service attacks, code injection, Malware and Viruses and solutions such as Encryption, installation of appropriate security measures, drafting security control strategies, compliance to standards, evaluation of risks and managing the risks to an acceptable level, Database administration, System Administration.

A goal-oriented problem solver who uses strong analytical skills to resolve complex problems to create effective and efficient design solutions that bring about process improvement and high-quality deliverables. A team player who loves challenges and craves continuous career growth and development, seeking a position with more responsibilities and wants to grow career wise in the field of Cyber Security. Capable of performing at highest standards and learning new business skills coupled with excellent communication skills.

business-analysis
cyber-security
it-consulting
penetration-testing
soc
client-support
project-management
risk-management
[+] 5 more...
[-] less

Results-oriented consultant with over twenty years’ experience in Information Technology, specializing in information Security for over thirteen years. Proven expertise in achieving effective transitions to secure and quality systems. Credited with strong ability to identify trends, develop competitive strategies and execute strategically planned projects. Extensive background leading programs with cross-organizational, multi-national and cross-cultural teams for high-profile clients. Accomplished taking programs from concept to design to launch. Experienced managing remote technical teams to achieve initiatives. Technical proficiency in architecture, virtualization, PCI DSS v3, NIST, ITIL, GDPR, SIEM, NIST, HIPAA, New York State Section 500 Information Security and ISO 27001.

firewall
gdpr
incident-management
pci-dss
security-consultant
auditing
change-management
checkpoint
finance
iso-27001
it-consulting/it-support
microsoft-azure
microsoft-office
ms-active-directory
network
nist
security
security-/-cryptography
[+] 15 more...
[-] less

I provide assessments of network and web infrastructure along with detailed reports and proposed solutions.

cyber-security
python
security-consultant
analyst
c#
c++
computer-science
cybersecurity-analyst
html
[+] 6 more...
[-] less

A Highly motivated individual with 15 years experience in designing & delivering cyber security projects. SC cleared.

aws-certified
checkpoint
cisa
crisc
iso-27001
auditing
change-management
cisco
devops
devops-security
docker
firepower
firewall
git
html/xhtml
http
java
javascript
ms-sql-server
mysql
network
oracle
palo-alto
php
python
retailer
smtp
splunk
sql
sun-os-/-solaris
[+] 27 more...
[-] less

A Certified Cyber Security Professional with expertise in Incidence Response, malware Analysis, Monitoring network-based IDS/IPS, Proven record of evaluating system vulnerability, compiling actionable analysis, reporting threats, and recommending security improvements. Ability to quickly assess and troubleshoot complex problems involving a wide variety of information systems, work independently on large-scale projects, and thrive under pressure in fast-pace environments.

Application-Support
MS-Windows-Server
Linux
VMware
Citrix
Hyper-V
Windows
Mac-OS
Apple-iOS
MS-Active-Directory
WAN/LAN
VPN
TCP/IP
SQL
Cisco
Firewall
Storage
ISO-27001
COBIT
Artificial-Intelligence
Incident-Management
Forensic
SCCM
Auditing
Asset-and-Liability-Management
Network
Splunk
Windows-XP/2000/Vista
Windows-7
MS-Office
[+] 27 more...
[-] less

Independent cyber security consultancy and training, specialising in supply-chain security and cyber security for smaller organisations.

Originally from a technical background, my doctoral research has pivoted me towards the strategic and human factors of cyber security. This provides me with a broad skill-set, perfect for working on the complex supply-chain issues, or with smaller organisations.

I specialise in supporting or training non-technical managers to make strategic cyber security decisions; helping large businesses develop processes for improving the security of their smallest suppliers; and helping SMEs begin developing and documenting their cyber security processes, matching the technology they use to risks such as GDPR compliance.

I can support IT teams without the capacity to have full-time specialist cyber security skills with their business, risk-evaluation and training needs.

cyber-security
requirement-management
risk-management
incident-response
supply-chain-management
[+] 2 more...
[-] less
What is a cyber security developer?

Someone who wants to keep data protected and safe from people who wish to use it for purposes other than that which it is intended.

What does a cyber security developer do?
What is the average rate for a cyber security developer?
What should your cyber security expert know?