Hire Cyber Security Developers & Contractors in London | LynxPro
Find Cyber Security Developers in London
We use a highly curated database to find the candidate with the skills most suited to your business’s needs. Browse the talent below, find the perfect fit and our qualified customer service agents will take care of the rest.
A Cyber Security Professional with deep understanding of Information technology. Proficient knowledge of cyber threats and attacks ranging from denial of service attacks, code injection, Malware and Viruses and solutions such as Encryption, installation of appropriate security measures, drafting security control strategies, compliance to standards, evaluation of risks and managing the risks to an acceptable level, Database administration, System Administration.
A goal-oriented problem solver who uses strong analytical skills to resolve complex problems to create effective and efficient design solutions that bring about process improvement and high-quality deliverables. A team player who loves challenges and craves continuous career growth and development, seeking a position with more responsibilities and wants to grow career wise in the field of Cyber Security. Capable of performing at highest standards and learning new business skills coupled with excellent communication skills.
I have managed large Information departments and specialised in Information Management and Governance including; Information Risk Assessment, Cyber Security, Data Protection, BI, Data Warehouse, Data Flow Mapping of Information Assets, GDPR readiness, undertaking audits, training, planning and Records Management Consultancy. I have managed BI, Data Warehouse, Systems Development, Information Governance and Analytics teams. I have also produced Information Strategies within the NHS and private health sectors. I have managed 14 GDPR compliance projects.
I have more than 25 years project and staff management and experience, up to Managing Director level, managing large business change and transformation as well as highly technical IT ones with budgets over £50 million and User populations of more than 4,000 (both COTS and in-house developed) and using Waterfall, Agile, DSDM and PRINCE2 methodologies. I have implemented ISO 9001, 15489 and 27001 quality systems as well as Cyber Essentials.
I also specialise in producing Business Cases and setting up and managing PMOs and mentoring staff.
Results-oriented consultant with over twenty years’ experience in Information Technology, specializing in information Security for over thirteen years. Proven expertise in achieving effective transitions to secure and quality systems. Credited with strong ability to identify trends, develop competitive strategies and execute strategically planned projects. Extensive background leading programs with cross-organizational, multi-national and cross-cultural teams for high-profile clients. Accomplished taking programs from concept to design to launch. Experienced managing remote technical teams to achieve initiatives. Technical proficiency in architecture, virtualization, PCI DSS v3, NIST, ITIL, GDPR, SIEM, NIST, HIPAA, New York State Section 500 Information Security and ISO 27001.
A Certified Cyber Security Professional with expertise in Incidence Response, malware Analysis, Monitoring network-based IDS/IPS, Proven record of evaluating system vulnerability, compiling actionable analysis, reporting threats, and recommending security improvements. Ability to quickly assess and troubleshoot complex problems involving a wide variety of information systems, work independently on large-scale projects, and thrive under pressure in fast-pace environments.
A highly skilled I.T person with 19 years of experience. My expertise is in configuration and trouble-shooting of TCP/ IP, Cisco routers, switches and firewalls. Working on large scale Active Directory Implementation and migration projects.
Along with the above technical skills I have established expertise on implementing a ISO / IEC 27001 Information Security Management System from start to finish. Evaluation of required vulnerabilities, controls, mitigations and Remediation reports. Expertise on all aspects of Information Systems Audit and compliance.
Well versed with UK Government CESG standard, Security Policy Framework Requirements, Good Practice Guides and Architectural patterns and Information Assurance compliance.