Hire Cyber-security Developers & Contractors | LynxPro
Find Cyber-security Developers
We use a highly curated database to find the candidate with the skills most suited to your business’s needs. Browse the talent below, find the perfect fit and our qualified customer service agents will take care of the rest.
A unique security professional with over 14 years’ experience of a blend of Cyber and Information Security experience across Financial, Defence, Police Constabularies, Energy, Telecommunications, Pharmaceutical, Legal & Entertainment Industries. Strategic thinker with a proven ability to innovate, proven ability to wear multiple hats for leading Global Security Transformation Programmes, Security Migration/Integration Projects, Cyber Security Audits, Risk Management & Consultancy/Advisory Services. A motivated, dedicated individual accompanied with excellent leadership skills that can communicate, collaborate at all seniority levels with outstanding stakeholder management abilities who can clearly and accurately articulate complex threats and risks, controls and mitigations. Also, participated in the Cyber Security panel at the European Security Summit.
An enthusiastic and ambitious Computer Science graduate with vast commercial experience. A computer literate individual who also possesses excellent communication skills, both verbal and written. An adaptable individual and enthusiastic team player with a ‘can do approach, who is additionally able to work independently and under pressure. Searching for a full-time position in the IT industry, with the prospect of professional development and career progression. more
• Review, analyze and interpret the logs captured in SIEM using console for the real time log • Monitoring and creating Dashboards for Malware, Threats and other Attacks alerts. • Coordinate with technology towers for the issue remediation and suggesting control measure to Avoid the same in future.
Support security incident response processes in the event of a security breach by providing incident reporting. • Coordinating with client Information Security Head for security incident notifications received from Client with high radars. • Implement and manage a security incident management process according to the Security Policy. • Providing periodic trending problem reports. Create and maintain a Security Incident log that is also provided to client Information Security to Facilitate historical analysis. Diagnose and resolve issues and problems with the clients’ information technology systems involving several processes. Investigating causes, analyzing and diagnosing the problem and repairing or providing detailed alternative solutions. Working with teams to block Malicious URLs and IPs. Participate in Change Control Board and infrastructure design processes to review and Approve/disapprove any system changes to the equipment and software that potentially have Information security ramification. Conduct network vulnerability assessments using tools (Nessus and Nmap) to evaluate attack vectors, identify system vulnerabilities and develop remediation plans and security procedures. Performing application vulnerability assessments to provide a comprehensive view of the clients` application weaknesses that are exposed to threats. Configure scheduled automated scans to scan equipment in accordance with the Security Policy and the Service Levels, with results documented and communicated to server management for identified risk reduction activities. Identify new security vulnerabilities and verify vulnerable systems are secured and patched in a timely manner to mitigate all associated threats, in compliance with the Security Policy. Identified vulnerabilities, recommend corrective measures and ensure the adequacy of existing information security controls. Generate and present reports on security vulnerabilities , monitoring security operations centre for devices such as Firewalls, IDS, IPS, Database, UNIX and Windows Servers, Configuring log collection to Q-radar from various types of event sources. Log correlation and real time threat management using Q-radar Console.
• Review and analysis of Daily, Weekly & Monthly reports. Investigate on anomalies reported, eliminate false positives and provide a detailed view to the client with the impact & Recommended actions. • Conduct routine performance optimization and rule base/config cleanup. Detecting Phishing and then coordination with ISP to block it. • Proxy logs monitoring. • Interaction with client for any issues. • Preparing Daily Incident report, Weekly Incident Report and Monthly Incident Report Conduct network vulnerability assessments using tools to evaluate attack vectors, identify system Vulnerabilities and develop remediation plans and security procedures. • Performing application vulnerability assessments to provide a comprehensive view of the clients Application weaknesses that are exposed to threats. • Configure scheduled automated scans to scan equipment in accordance with the Security Policy and the Service Levels, with results documented and communicated to server management for Identified risk reduction activities. •Identify new security vulnerabilities and verify vulnerable systems are secured and patched In a timely manner to mitigate all associated threats, in compliance with the Security Policy. • Identified vulnerabilities, recommend corrective measures and ensure the adequacy of existing Information security controls.
• Generate and present reports on security vulnerabilities. • Installing configuring, managing and supporting Blue Coat checkpoint and Palo Alto security network appliances. • Assists in planning, implementation, installation, administration, monitoring, maintenance, and performing upgrades of client firewalls Checkpoint Provider environment, Cisco ASA/FWSM Juniper SRX.
Experience with application load balancers Cisco CSS, CSM, Citrix NetScaler's. WAF- filters, monitors, and blocks HTTP/S traffic to and from a web application to protect against malicious attempts to compromise the system or exfiltrate data. By inspecting HTTP/S traffic, prevent web application attacks such as Cross-site scripting XSS, SQL injection Cookie poisoning Invalid input Layer 7 DoS brute force and credential stuffing web scraping more
Remarkable success in establishing a secure regional IT network and security infrastructure, designing and implementing novel technology solutions, and integrating effective systems to achieve ISO27001 accreditation. Strengths in providing technical support to key users while deploying modern technologies within a set framework and migration lifecycle timescales. Collaborative and articulate communicator continually focused on building relationships and promoting synergy across business lines and with clients to drive positive change.