Hire Cyber-security Developers & Contractors | LynxPro

Find Cyber-security Developers

We use a highly curated database to find the candidate with the skills most suited to your business’s needs. Browse the talent below, find the perfect fit and our qualified customer service agents will take care of the rest.

Programme Manager

Programme Manager of national and international transformation programmes and projects with over 15 years commercial and technical experience gained in senior roles working within some of the largest companies, public service and IT service providers within the UK and globally. Expertise in CxO level and general stakeholder management and delivery of complex information & cyber security, infrastructure, network, financial, service transition / integration, merger, business intelligence, EUC, telephony, office relocation and vendor management programmes and projects. Proven delivery success within structured and un-structured business critical environments for blue-chip organisations such as Bupa, Legal & General, Penguin Books, NBC television, Universal Pictures, Sapient Nitro, Coca-Cola, Manpower, Orange, ASB Bank and GE finance. Also including Datacentre’s and global delivery expertise working in the UK, USA, EMEA, China, Japan, Brazil, Russia, Singapore, Australia and New Zealand across a variety of sectors including Publishing, Media, Financial Services, Banking, Retail, Insurance, Gambling, Manufacturing, Healthcare and NZ/UK Governments. Worked with an array of project methodologies, including Prince 2, Waterfall, Agile and budgets in excess of £10m GBP. Available immediately for interviews & commencement. more
Skills
cyber-security
information-security
programme-manager
financial-services
[+] 1 more...

Software Development Team Lead

A highly focused software development team lead with experience in managing multiple software development teams and working within an agile scrum team. Organised, methodical and a keen eye for detail results in solid secure coding and reliable software programmes. Thrives in dynamic, fast-paced environments and looking for an opportunity to expand technical knowledge and to learn new languages and frameworks. more
Skills
asp.net
c#
sql
team-leader
css
html5
javascript
jquery
knockoutjs
model-view-controller
moq
psychology
scrum
unit-testing
unit-tests
visual-studio
[+] 13 more...

Network Security Consultant/ Cyber Security Engineer


I am a technically sound, self-confident, and highly motivated experienced IT Network & Security Professional. My organisational, planning & interpersonal skills have been strengthened and tested to the full with wide range of client facing roles in Global Banking Services, Financial Services, Insurance Services, and UK Government Sector. I am passionate about delivering efficient Network & Security Solutions. I am a highly energised self starter.

I have gained excellent commercial experience in IT Networking and Network Security in following disciplines:

• Professional Services,
• Hosted Managed Services,
• Consultancy,
• Network Architecture & Design,
• Leading Technical Workshops,
• Requirement Gathering & Discovery Analysis,
• Implementing Solution Engineering Delivery Projects,
• Detailed Design Documentation,
• Complex Data Centre Infrastructure Migrations,
• Complex Network Security Hardware Refresh and Inline Graceful Software Upgrades,
• Delivering Successful Global Disaster Recovery Network Security Platforms,
• Delivering Proof of Concepts & Business Case Documentation.


Vendor Specific Technical Skills:

• Cisco Firepower FTD and FMC platforms.
• Cisco - ASA/PIX Security Firewalls.
• Fortigate firewalls
• Paloalto firewalls
• Check Point - Various Firewall Appliances, Open Servers, MDSM-Provider-1, Security Mgmt Servers, GAIA, SPLAT and IPSO OS's
• Juniper - SRX Junos & SSG Netscreen Firewalls, Secure Access SSL Appliances.
• Load Balancers - F5-Big IP, GTM,LTM,ASM, Irules
• IPS/IDS - Check Point, Sourcefire and other multivendor
• Routing & Switching - Cisco.
• Multi-Vendor VPNs, MPLS, OSPF, BGP, Layer 2 & Layer 3 R&S Protocols, Layer 7 Application Security
• Zscaler
• McAfee - Sidewinder/TSP Enterprise Firewalls, McAfee Webwasher Web Proxy.
• Red Hat Linux Skills
• Others - Proofpoint Email filters, Infoblox Network Mgmt, Nortel/Meridian PBX Administration, Microsoft Win Servers Infrastructure, AD/Exchange Administration.
more
Skills
cisco-asa
firepower
fortigate
fortinet
palo-alto
aws-security
cisco
f5-bigip
it/-telecommuncation
juniper-srx
[+] 7 more...

Interim Information, Security, Compliance & GDPR Consultant

On a customers site defining GRC regulatory compliance aligned to ISO27001, PCI-DSS, NIST, Ofcom, Schedule 12, architecting GDPR interlocking solutions across cloud applications and cyber security frameworks for a development team plus appraise HLD, LLD, security frameworks, NFR’s and security hardening rules for a complete infrastructure refresh of 132 retail outlets. As security architect my deliverables are to assist the transformation and ultimately bringing new and innovative ideas using e2e security architecture for Network / OpenStack hardening standards, including patching, firewall hardening, WAF, DDoS for cloud PAAS, SAAS and bespoke cloud services.
• Cyber survey (assessment of cyber security posture)
• Infrastructure security creating (HLD, LLD, security frameworks & NFR’s
• Audit, gap analysis, providing remediation with risk and legal advice.
• GDPR Project/action plan and implementation of the actions/gaps in compliance
• Including implementation of Information asset register and data flow mapping,
• Drafting of Privacy Notices
• Outlining Embedding of PIA/DPIA
• Drafting of information governance policies and procedures,
• Review/enhancing of SAR procedure/process, attaining addendum to contracts for GDPR
• Implementation of incident management procedure (as per GDPR requirement)
• The inclusion of supplier data protection and security assurance in the procurement process (as per GDPR requirement)
• Updating of contracts with new data protection clause as required under GDPR,
• Staff awareness and training
• Co-ordinating security escalation for security steering team.
• Co-ordination of compliance assurance principles for the legal, compliance and regulatory team.
• Co-ordinating GDPR training for the developers
more
Skills
cyber-security
enterprise-architecture
solutions-architecture
erp-implementations
vmware-architect
[+] 2 more...

Infrastructure Architect

Experienced Enterprise, Infrastructure and Solutions Architect undertaking complex technical lead or managerial Architecture and/or Infrastructure engagements. A pragmatic approach to architecture taking account of business drivers, programme deadlines and operational support requirements. Hired and built both infrastructure and architecture teams from scratch in London and Scotland.

Extensive experience in Mergers/acquisitions/divestments/transformations, Card Acquiring/Issuing, Payments, Banking, Asset Management, Global Desktop, Security/PCI and Data Centre/Cloud migrations.

A broad and deep range of skills and knowledge covering a wide variety of infrastructure, platforms and technologies – desktop/EUC, networking, storage, servers/mainframes, virtualisation/HCI, databases, middleware, cloud and security. Extensive management, architecture, design and hands-on skills combined with many years troubleshooting complex project deliveries. Experienced in Agile and Waterfall.
more
Skills
cyber-security
infrastructure
microsoft
network
infrastructure-architect
active-directory
asi-bus
asset-and-liability-management
auditing
azure
banking-know-how
bea-weblogic-server
cisco
citrix
cobol
configuration-management
distributed-systems
edge
emv
etl---extract/transform/load
finance
firewall
ibm-cics
ibm-mainframe
ibm-mq-series
ibm-sna
ibm-websphere
java
linux
middleware/transactions
[+] 27 more...

Head of IT

I am an innovative IT strategist and functional lead with both private and public sector experience, I have built, directed, and continually optimised IT Service infrastructures supporting thousands of users throughout the UK and around the world. Remaining up-to-date on the very latest technologies and trends, I am an expert at developing and seamlessly implementing cutting-edge solutions that provide maximum value and capabilities with minimal time, effort, and costs. Highly skilled at translating complex technical concepts to non-technical audiences, I bridge the gaps between business and technology in order to unite all parties involved on common customer-focused missions, best practices, and goals.

An innate IT visionary, creative problem solver, and hands-on leader and team player, I am highly adept at managing conflicting priorities and business-critical systems in high-pressure and fast-paced environments. Enthusiastic about creating ground-breaking solutions that solve the most difficult and elusive business challenges to arise, I actively seek out new challenges, and always deliver outstanding results.

Confident in my ability to enhance IT savviness and business alignment I am a highly accomplished professional with an excellent track record of maximizing performance, cost-optimisation, customer satisfaction, and delivering complex IT programmes of work, whilst supporting 1,000s of users in diverse regional and global sectors.
more
Skills
change-management
cyber-security
itil
customer-service
cisco
edge
iso-27001
it-consulting/it-support
lawyer
ms-sharepoint-portal-server
network
process-management
risk-management/basel-ii
[+] 10 more...
FAQ
What is a cyber security developer?
Someone who wants to keep data protected and safe from people who wish to use it for purposes other than that which it is intended.
What does a cyber security developer do?
They develop a strategy to protect a company’s information from hacking to keep data secure, safe and protected.
What is the average rate for a cyber security developer?
The daily rate for Cyber Security is £500 depending on experience, company-size and location. Broken down to an hourly rate, this can equate to £50 an hour for their expertise
What should your cyber security expert know?
Coding skills, an understanding of how hacking works and how to ethically hack a system to understand the flaws in its security, as well as hold certifications in security and system architecture.