Cyber Security Developer contractors in London

Hire Cyber Security Developers in London

We use a highly curated database to find the candidate with the skills most suited to your business’s needs. Browse the talent below, find the perfect fit and our qualified customer service agents will take care of the rest.

Get in touch

A Cyber Security Professional with deep understanding of Information technology. Proficient knowledge of cyber threats and attacks ranging from denial of service attacks, code injection, Malware and Viruses and solutions such as Encryption, installation of appropriate security measures, drafting security control strategies, compliance to standards, evaluation of risks and managing the risks to an acceptable level, Database administration, System Administration.

A goal-oriented problem solver who uses strong analytical skills to resolve complex problems to create effective and efficient design solutions that bring about process improvement and high-quality deliverables. A team player who loves challenges and craves continuous career growth and development, seeking a position with more responsibilities and wants to grow career wise in the field of Cyber Security. Capable of performing at highest standards and learning new business skills coupled with excellent communication skills.

business-analysis
cyber-security
it-consulting
penetration-testing
soc
client-support
project-management
risk-management
[+] 5 more...
[-] less

Results-oriented consultant with over twenty years’ experience in Information Technology, specializing in information Security for over thirteen years. Proven expertise in achieving effective transitions to secure and quality systems. Credited with strong ability to identify trends, develop competitive strategies and execute strategically planned projects. Extensive background leading programs with cross-organizational, multi-national and cross-cultural teams for high-profile clients. Accomplished taking programs from concept to design to launch. Experienced managing remote technical teams to achieve initiatives. Technical proficiency in architecture, virtualization, PCI DSS v3, NIST, ITIL, GDPR, SIEM, NIST, HIPAA, New York State Section 500 Information Security and ISO 27001.

firewall
gdpr
incident-management
pci-dss
security-consultant
auditing
change-management
checkpoint
finance
iso-27001
it-consulting/it-support
microsoft-azure
microsoft-office
ms-active-directory
network
nist
security
security-/-cryptography
[+] 15 more...
[-] less

A Highly motivated individual with 15 years experience in designing & delivering cyber security projects. SC cleared.

aws-certified
checkpoint
cisa
crisc
iso-27001
auditing
change-management
cisco
devops
devops-security
docker
firepower
firewall
git
html/xhtml
http
java
javascript
ms-sql-server
mysql
network
oracle
palo-alto
php
python
retailer
smtp
splunk
sql
sun-os-/-solaris
[+] 27 more...
[-] less

A Certified Cyber Security Professional with expertise in Incidence Response, malware Analysis, Monitoring network-based IDS/IPS, Proven record of evaluating system vulnerability, compiling actionable analysis, reporting threats, and recommending security improvements. Ability to quickly assess and troubleshoot complex problems involving a wide variety of information systems, work independently on large-scale projects, and thrive under pressure in fast-pace environments.

Application-Support
MS-Windows-Server
Linux
VMware
Citrix
Hyper-V
Windows
Mac-OS
Apple-iOS
MS-Active-Directory
WAN/LAN
VPN
TCP/IP
SQL
Cisco
Firewall
Storage
ISO-27001
COBIT
Artificial-Intelligence
Incident-Management
Forensic
SCCM
Auditing
Asset-and-Liability-Management
Network
Splunk
Windows-XP/2000/Vista
Windows-7
MS-Office
[+] 27 more...
[-] less

A highly skilled I.T person with 19 years of experience. My expertise is in configuration and trouble-shooting of TCP/ IP, Cisco routers, switches and firewalls. Working on large scale Active Directory Implementation and migration projects.

Along with the above technical skills I have established expertise on implementing a ISO / IEC 27001 Information Security Management System from start to finish. Evaluation of required vulnerabilities, controls, mitigations and Remediation reports. Expertise on all aspects of Information Systems Audit and compliance.

Well versed with UK Government CESG standard, Security Policy Framework Requirements, Good Practice Guides and Architectural patterns and Information Assurance compliance.

cisa
cyber-security
firewall
network
risk-management
apple-ios
auditing
bgp
cisco
citrix
ethernet
it-consulting/it-support
itil
linux
ms-active-directory
novell
novell-groupwise
splunk
veeam
vmware
vpn
wan/lan
webservices
windows
[+] 21 more...
[-] less

Working with business service lines to deliver the migration of Production Clearing services into a secure environment and applying security policies as per ACPR audit, CBES and other regulatory bodies audit requirements to reduce risk within the clearing service. Producing Senior stakeholder reporting on progress. Managing 3rd party suppliers and internal teams to deliver the programme of work using established project management processes and abiding by company policies.

banking
it-project-management
risk-management
auditing
banking-know-how
biology
change-management
cisco
enterprise-content-management
finance
firewall
it-consulting/it-support
jakarta-ant
linux
mathematics
microsoft-lync
ms-project
ms-sharepoint-portal-server
network
risk-management/basel-ii
supply/vendor-management
telematics
vmware
vpn
wan/lan
windows
[+] 23 more...
[-] less