Hire Cyber-security Developers & Contractors | LynxPro

Find Cyber-security Developers

We use a highly curated database to find the candidate with the skills most suited to your business’s needs. Browse the talent below, find the perfect fit and our qualified customer service agents will take care of the rest.

Cyber Security Consultant

A Highly motivated individual with 15 years experience in designing & delivering cyber security projects. SC cleared. more
Skills
aws-certified
checkpoint
cisa
crisc
iso-27001
auditing
change-management
cisco
devops
devops-security
docker
firepower
firewall
git
html/xhtml
http
java
javascript
ms-sql-server
mysql
network
oracle
palo-alto
php
python
retailer
smtp
splunk
sql
sun-os-/-solaris
[+] 27 more...

Infrastructure Architect

Experienced Enterprise, Infrastructure and Solutions Architect undertaking complex technical lead or managerial Architecture and/or Infrastructure engagements. A pragmatic approach to architecture taking account of business drivers, programme deadlines and operational support requirements. Hired and built both infrastructure and architecture teams from scratch in London and Scotland.

Extensive experience in Mergers/acquisitions/divestments/transformations, Card Acquiring/Issuing, Payments, Banking, Asset Management, Global Desktop, Security/PCI and Data Centre/Cloud migrations.

A broad and deep range of skills and knowledge covering a wide variety of infrastructure, platforms and technologies – desktop/EUC, networking, storage, servers/mainframes, virtualisation/HCI, databases, middleware, cloud and security. Extensive management, architecture, design and hands-on skills combined with many years troubleshooting complex project deliveries. Experienced in Agile and Waterfall.
more
Skills
cyber-security
infrastructure
microsoft
network
infrastructure-architect
active-directory
asi-bus
asset-and-liability-management
auditing
azure
banking-know-how
bea-weblogic-server
cisco
citrix
cobol
configuration-management
distributed-systems
edge
emv
etl---extract/transform/load
finance
firewall
ibm-cics
ibm-mainframe
ibm-mq-series
ibm-sna
ibm-websphere
java
linux
middleware/transactions
[+] 27 more...

Head of IT

I am an innovative IT strategist and functional lead with both private and public sector experience, I have built, directed, and continually optimised IT Service infrastructures supporting thousands of users throughout the UK and around the world. Remaining up-to-date on the very latest technologies and trends, I am an expert at developing and seamlessly implementing cutting-edge solutions that provide maximum value and capabilities with minimal time, effort, and costs. Highly skilled at translating complex technical concepts to non-technical audiences, I bridge the gaps between business and technology in order to unite all parties involved on common customer-focused missions, best practices, and goals.

An innate IT visionary, creative problem solver, and hands-on leader and team player, I am highly adept at managing conflicting priorities and business-critical systems in high-pressure and fast-paced environments. Enthusiastic about creating ground-breaking solutions that solve the most difficult and elusive business challenges to arise, I actively seek out new challenges, and always deliver outstanding results.

Confident in my ability to enhance IT savviness and business alignment I am a highly accomplished professional with an excellent track record of maximizing performance, cost-optimisation, customer satisfaction, and delivering complex IT programmes of work, whilst supporting 1,000s of users in diverse regional and global sectors.
more
Skills
change-management
cyber-security
itil
customer-service
cisco
edge
iso-27001
it-consulting/it-support
lawyer
ms-sharepoint-portal-server
network
process-management
risk-management/basel-ii
[+] 10 more...

Cyber Security and Information Assurance Consultant

Fraser is a multi-skilled information security specialist who holds Senior CCP certifications in the SIRA and IA Auditor roles.

Fraser is highly skilled in the application of compliance review & risk management techniques during legislative and systems development having assisted many projects to implement security during the accreditation, design and implementation stages. He has a wealth of experience in system security review, testing and improvement. He has a special interest in physical security assessment and compliance audit activities.

He has developed and delivered training in compliance, information assurance and security issues to Government and industry, including taking the lead role in the development of mandatory legislative and security training for persons possessing significant radiation sources.

Fraser has a deep knowledge of ISO27001 demonstrated by having passed The Certification Body's ISO27001 Principle Auditor (Certification & Compliance) course and has updated this qualification to include the 27001:2013 standard and holds CSTAR certification.
more
Skills
auditing
cyber-security
information-security
risk-management/basel-ii
consultancy
security-/-cryptography
security-consultant
[+] 4 more...

Head of Cyber Security / consultant

Highly experienced Cyber Security consultant, with over 20 years experience. In depth knowledge of Cyber Security security, Risk, Auditing, Governance, ISO27001, NIST. Worked in a range of business sectors from IT/Telecoms through to government agencies. Currently hold a valid SC clearance. more
Skills
auditing
cyber-security
governance
iso-27001
risk-&-security-management
cobit
cybersecurity-analyst
incident-management
pci-dss
risk-applications
security-/-cryptography
vpn
[+] 9 more...

Security Architect

Establish Senior Infrastructure & Security Manager, with extensive previous experience as a senior Infrastructure engineer.
Practical, hands-on Infrastructure Security manager, expert in managing Server networks and Cyber Security platforms.
Currently employed by the largest principal private pension schemes for universities & other higher education institutions in the UK. Universities Superannuation Scheme (USS) is now one of the biggest pension schemes in the UK in assets under management with a value excess over £60bn
Supporting multi-site Datacenter’s, within the UK including disaster recovery sites.
Acknowledged for capacity to execute detailed and complex design plans, and logically affect solutions focused on long-term system sustainability, stability, and growth.
Extensive change control background has prompted capacity to translate technical jargon into layman’s terms and align management directives to the realities of technology.
Tenacious and intuitive problem-solver, “fire-fighter,” and team leader averting issues prior to impact on customers or operations. Effective working solo or as an active team participant/leader.
A hands-on leader, experienced in motivating and developing teams, resourceful, adaptable and strongly driven to deliver results.
Excellent inter-personal and communication skills and liaise with different stakeholders, customers’ needs and business requirements.

Accreditation in EC-Council Ethical Hacking
Accreditation in Comptia CASP
more
Skills
cyber-security
infrastructure
security-consultant
infrastructure-architect
infrastructure-manager
auditing
cisco
citrix
distributed-systems
edge
ethical-hacker
firewall
incident-management
it/-telecommuncation
mpls
ms-active-directory
ms-exchange-server
network
penetration-testing
sd-wan
soc
splunk
vmware
wan/lan
[+] 21 more...
FAQ
What is a cyber security developer?
Someone who wants to keep data protected and safe from people who wish to use it for purposes other than that which it is intended.
What does a cyber security developer do?
They develop a strategy to protect a company’s information from hacking to keep data secure, safe and protected.
What is the average rate for a cyber security developer?
The daily rate for Cyber Security is £500 depending on experience, company-size and location. Broken down to an hourly rate, this can equate to £50 an hour for their expertise
What should your cyber security expert know?
Coding skills, an understanding of how hacking works and how to ethically hack a system to understand the flaws in its security, as well as hold certifications in security and system architecture.