Hire Cyber-security Developers & Contractors | LynxPro

Find Cyber-security Developers

We use a highly curated database to find the candidate with the skills most suited to your business’s needs. Browse the talent below, find the perfect fit and our qualified customer service agents will take care of the rest.

Information Security Officer

A unique security professional with over 14 years’ experience of a blend of Cyber and Information Security experience across Financial, Defence, Police Constabularies, Energy, Telecommunications, Pharmaceutical, Legal & Entertainment Industries. Strategic thinker with a proven ability to innovate, proven ability to wear multiple hats for leading Global Security Transformation Programmes, Security Migration/Integration Projects, Cyber Security Audits, Risk Management & Consultancy/Advisory Services. A motivated, dedicated individual accompanied with excellent leadership skills that can communicate, collaborate at all seniority levels with outstanding stakeholder management abilities who can clearly and accurately articulate complex threats and risks, controls and mitigations. Also, participated in the Cyber Security panel at the European Security Summit. more
Skills
auditing
change-management
cisco
finance
firewall
forensic
iso-27001
it/-telecommuncation
landscaping
ms-active-directory
pharmacy
risk-management/basel-ii
security-/-cryptography
[+] 10 more...

Software Engineer

An enthusiastic and ambitious Computer Science graduate with vast commercial experience. A computer literate individual who also possesses excellent communication skills, both verbal and written. An adaptable individual and enthusiastic team player with a ‘can do approach, who is additionally able to work independently and under pressure. Searching for a full-time position in the IT industry, with the prospect of professional development and career progression.
more
Skills
java
sql
software-developer
.net
computer-science
html/xhtml
it-consulting/it-support
itil
machine-learning
marketing/market-research/advertising
model-view-controller
ms-office
php
[+] 10 more...

Information Security Analyst

• Review, analyze and interpret the logs captured in SIEM using console for the real time log
• Monitoring and creating Dashboards for Malware, Threats and other Attacks alerts.
• Coordinate with technology towers for the issue remediation and suggesting control measure to Avoid the same in future.


Support security incident response processes in the event of a security breach by providing incident reporting.
• Coordinating with client Information Security Head for security incident notifications received from Client with high radars.
• Implement and manage a security incident management process according to the Security Policy.
• Providing periodic trending problem reports. Create and maintain a Security Incident log that is also provided to client Information Security to Facilitate historical analysis.
Diagnose and resolve issues and problems with the clients’ information technology systems
involving several processes. Investigating causes, analyzing and diagnosing the problem and
repairing or providing detailed alternative solutions.
Working with teams to block Malicious URLs and IPs.
Participate in Change Control Board and infrastructure design processes to review and
Approve/disapprove any system changes to the equipment and software that potentially have
Information security ramification.
Conduct network vulnerability assessments using tools (Nessus and Nmap) to evaluate attack
vectors, identify system vulnerabilities and develop remediation plans and security procedures.
Performing application vulnerability assessments to provide a comprehensive view of the clients`
application weaknesses that are exposed to threats.
Configure scheduled automated scans to scan equipment in accordance with the Security Policy
and the Service Levels, with results documented and communicated to server management for
identified risk reduction activities.
Identify new security vulnerabilities and verify vulnerable systems are secured and patched in
a timely manner to mitigate all associated threats, in compliance with the Security Policy.
Identified vulnerabilities, recommend corrective measures and ensure the adequacy of existing
information security controls.
Generate and present reports on security vulnerabilities ,
monitoring security operations centre for devices such as Firewalls, IDS, IPS, Database, UNIX
and Windows Servers, Configuring log collection to Q-radar from various types of event sources.
Log correlation and real time threat management using Q-radar Console.

• Review and analysis of Daily, Weekly & Monthly reports. Investigate on anomalies reported,
eliminate false positives and provide a detailed view to the client with the impact &
Recommended actions.
• Conduct routine performance optimization and rule base/config cleanup. Detecting Phishing and then coordination with ISP to block it.
• Proxy logs monitoring.
• Interaction with client for any issues.
• Preparing Daily Incident report, Weekly Incident Report and Monthly Incident Report
Conduct network vulnerability assessments using tools to evaluate attack vectors, identify system Vulnerabilities and develop remediation plans and security procedures.
• Performing application vulnerability assessments to provide a comprehensive view of the clients Application weaknesses that are exposed to threats.
• Configure scheduled automated scans to scan equipment in accordance with the Security Policy and the Service Levels, with results documented and communicated to server management for Identified risk reduction activities.
•Identify new security vulnerabilities and verify vulnerable systems are secured and patched
In a timely manner to mitigate all associated threats, in compliance with the Security Policy.
• Identified vulnerabilities, recommend corrective measures and ensure the adequacy of existing Information security controls.

• Generate and present reports on security vulnerabilities.
• Installing configuring, managing and supporting Blue Coat checkpoint and Palo Alto security network appliances.
• Assists in planning, implementation, installation, administration, monitoring, maintenance, and performing upgrades of client firewalls Checkpoint Provider environment, Cisco ASA/FWSM Juniper SRX.


Experience with application load balancers Cisco CSS, CSM, Citrix NetScaler's.
WAF- filters, monitors, and blocks HTTP/S traffic to and from a web application to protect against malicious attempts to compromise the system or exfiltrate data. By inspecting HTTP/S traffic, prevent web application attacks such as
Cross-site scripting XSS, SQL injection Cookie poisoning Invalid input Layer 7 DoS brute force and credential stuffing web scraping
more
Skills
network-administration
cyber-security
information-security
business-processing
ethical-hacker
configuration-management
[+] 3 more...

IT Network & Security Manager

Remarkable success in establishing a secure regional IT network and security infrastructure, designing and implementing novel technology solutions, and integrating effective systems to achieve ISO27001 accreditation. Strengths in providing technical support to key users while deploying modern technologies within a set framework and migration lifecycle timescales. Collaborative and articulate communicator continually focused on building relationships and promoting synergy across business lines and with clients to drive positive change. more
Skills
network
risk-management/basel-ii
cyber-security
network-development
business-economics
change-management
electronic-/-electrical-engineering
linux
wan/lan
windows
windows-xp/2000/vista
[+] 8 more...

Cyber Security Consultant

I provide assessments of network and web infrastructure along with detailed reports and proposed solutions. more
Skills
cyber-security
python
security-consultant
analyst
c#
c++
computer-science
cybersecurity-analyst
html
[+] 6 more...

Senior Security Specialist

Highly analytical, solutions-oriented cybersecurity engineer with nine years of experience leading successful technical solutions for industry leaders.

Proven ability to design and regulate critical security programs and campaigns with the high-tech operational supervision of incidents and emergency disaster recovery.

Recognised for directing risk management initiatives, while establishing and implementing key information security objectives and control frameworks.

Adept at cross-functional collaboration with diverse teams and prompt communications with stakeholders.
more
Skills
it-security
security-consultant
senior-security
application-security
auditing
computer-science
incident-management
industrial-engineering
linux
network
network-security
risk-management/basel-ii
security
vmware
windows
[+] 12 more...
FAQ
What is a cyber security developer?
Someone who wants to keep data protected and safe from people who wish to use it for purposes other than that which it is intended.
What does a cyber security developer do?
They develop a strategy to protect a company’s information from hacking to keep data secure, safe and protected.
What is the average rate for a cyber security developer?
The daily rate for Cyber Security is £500 depending on experience, company-size and location. Broken down to an hourly rate, this can equate to £50 an hour for their expertise
What should your cyber security expert know?
Coding skills, an understanding of how hacking works and how to ethically hack a system to understand the flaws in its security, as well as hold certifications in security and system architecture.