Hire Cyber-security Developers & Contractors in Basingstoke | LynxPro
Find Cyber-security Developers in Basingstoke
We use a highly curated database to find the candidate with the skills most suited to your business’s needs. Browse the talent below, find the perfect fit and our qualified customer service agents will take care of the rest.
Remarkable success in establishing a secure regional IT network and security infrastructure, designing and implementing novel technology solutions, and integrating effective systems to achieve ISO27001 accreditation. Strengths in providing technical support to key users while deploying modern technologies within a set framework and migration lifecycle timescales. Collaborative and articulate communicator continually focused on building relationships and promoting synergy across business lines and with clients to drive positive change.
Experience IT Security / Cyber analyst. I have both hands on and design experience for implementation and operation across the IT security estate. I am strong in network security tools and incident response and change management and control.
Past role core duties. Monitoring and creating dashboards view for SOC and management. Implementation planning for network security tools. Project security planning. Security assurance. Incident response.
I am a technically sound, self-confident, and highly motivated experienced IT Network & Security Professional. My organisational, planning & interpersonal skills have been strengthened and tested to the full with wide range of client facing roles in Global Banking Services, Financial Services, Insurance Services, and UK Government Sector. I am passionate about delivering efficient Network & Security Solutions. I am a highly energised self starter.
I have gained excellent commercial experience in IT Networking and Network Security in following disciplines:
• Professional Services, • Hosted Managed Services, • Consultancy, • Network Architecture & Design, • Leading Technical Workshops, • Requirement Gathering & Discovery Analysis, • Implementing Solution Engineering Delivery Projects, • Detailed Design Documentation, • Complex Data Centre Infrastructure Migrations, • Complex Network Security Hardware Refresh and Inline Graceful Software Upgrades, • Delivering Successful Global Disaster Recovery Network Security Platforms, • Delivering Proof of Concepts & Business Case Documentation.
Vendor Specific Technical Skills:
• Cisco Firepower FTD and FMC platforms. • Cisco - ASA/PIX Security Firewalls. • Fortigate firewalls • Paloalto firewalls • Check Point - Various Firewall Appliances, Open Servers, MDSM-Provider-1, Security Mgmt Servers, GAIA, SPLAT and IPSO OS's • Juniper - SRX Junos & SSG Netscreen Firewalls, Secure Access SSL Appliances. • Load Balancers - F5-Big IP, GTM,LTM,ASM, Irules • IPS/IDS - Check Point, Sourcefire and other multivendor • Routing & Switching - Cisco. • Multi-Vendor VPNs, MPLS, OSPF, BGP, Layer 2 & Layer 3 R&S Protocols, Layer 7 Application Security • Zscaler • McAfee - Sidewinder/TSP Enterprise Firewalls, McAfee Webwasher Web Proxy. • Red Hat Linux Skills • Others - Proofpoint Email filters, Infoblox Network Mgmt, Nortel/Meridian PBX Administration, Microsoft Win Servers Infrastructure, AD/Exchange Administration.
On a customers site defining GRC regulatory compliance aligned to ISO27001, PCI-DSS, NIST, Ofcom, Schedule 12, architecting GDPR interlocking solutions across cloud applications and cyber security frameworks for a development team plus appraise HLD, LLD, security frameworks, NFR’s and security hardening rules for a complete infrastructure refresh of 132 retail outlets. As security architect my deliverables are to assist the transformation and ultimately bringing new and innovative ideas using e2e security architecture for Network / OpenStack hardening standards, including patching, firewall hardening, WAF, DDoS for cloud PAAS, SAAS and bespoke cloud services. • Cyber survey (assessment of cyber security posture) • Infrastructure security creating (HLD, LLD, security frameworks & NFR’s • Audit, gap analysis, providing remediation with risk and legal advice. • GDPR Project/action plan and implementation of the actions/gaps in compliance • Including implementation of Information asset register and data flow mapping, • Drafting of Privacy Notices • Outlining Embedding of PIA/DPIA • Drafting of information governance policies and procedures, • Review/enhancing of SAR procedure/process, attaining addendum to contracts for GDPR • Implementation of incident management procedure (as per GDPR requirement) • The inclusion of supplier data protection and security assurance in the procurement process (as per GDPR requirement) • Updating of contracts with new data protection clause as required under GDPR, • Staff awareness and training • Co-ordinating security escalation for security steering team. • Co-ordination of compliance assurance principles for the legal, compliance and regulatory team. • Co-ordinating GDPR training for the developers more
Independent cyber security consultancy and training, specialising in supply-chain security and cyber security for smaller organisations.
Originally from a technical background, my doctoral research has pivoted me towards the strategic and human factors of cyber security. This provides me with a broad skill-set, perfect for working on the complex supply-chain issues, or with smaller organisations.
I specialise in supporting or training non-technical managers to make strategic cyber security decisions; helping large businesses develop processes for improving the security of their smallest suppliers; and helping SMEs begin developing and documenting their cyber security processes, matching the technology they use to risks such as GDPR compliance.
I can support IT teams without the capacity to have full-time specialist cyber security skills with their business, risk-evaluation and training needs.