Hire Freelance CyberArk Developers and Engineers
James Chai
James is a senior security engineer specializing in security infrastructure systems. His expertise encompasses intrusion detection systems (IDS) and intrusion prevention systems (IPS), CyberArk, access control, vulnerability management, and Jamf. A Cisco Certified Network Associate (CCNA) and Certified Ethical Hacker (CEH), he is known for his quick learning and project management skills. James is proficient in Python and Bash coding and has experience running proof of concepts.
Show MoreKarl Marx Thangappan
Karl is a security architect and cloud engineer with 14+ years of experience in the IT industry. He specializes in product security and compliance, cybersecurity, DevSecOps, auditing, system automation, business continuity, and database management. Karl is also working as a security consultant and blog writer to share knowledge about AWS, Azure, GCP, database, and Oracle Apps DBA.
Show MoreMartin Redmond
Martin is a cross-functional executive with expertise in risk management and process improvement, data privacy laws, cyber security products, security program leadership, IT Ops, cloud computing and migration, digital transformation, product, service, innovation management, mobility, big data analytics, DevSecOps, ITILv4, SOC, fraud, APT, forensic, malware, IIoT, CoT and contract and vendor negotiations. Martin has also experience in achieving compliance with multiple risk management frameworks.
Show MoreMarius-Alexandru A Voinescu
Marius-Alexandru is an experienced IAM engineer, an Okta Certified Administrator, and a CNSS Certified Network Security Specialist with a strong background in law. He is highly skilled in designing and architecting the Okta product into business infrastructure, be it on-premises, cloud, or hybrid. Marius-Alexandru enjoys learning about cybersecurity and ethical hacking and how they can be applied in our day-to-day lives and work.
Show MoreDon Kuecker
Don identifies company security risks and creates mitigation strategies using the tools and applications most appropriate for their environment. He implements technologies to address security requirements for existing legacy technologies, merging business concerns and migrations to new strategies such as cloud offerings and their subsequent iterations. Don establishes consensus between departments and business entities based upon solid communication skills and current security risk knowledge.
Show MoreSev Kelian
Sev is a strategically focused technologist experienced in cyber and cloud technology management and 20 years of experience in the financial services industry. He's adept at building strong relationships to drive value while maintaining secure infrastructure, cloud, data, and app platforms. Sev also excels at defining and modernizing cloud and cyber strategies, architecture and delivering DevSecOps processes via the automatic acceleration of cloud adoption.
Show MoreZeta Kovacs
Zeta is a highly motivated professional who loves to learn new things and thrives on challenges. His extensive IT experience encompasses diverse projects and roles over the years, with a particular focus on cloud computing, infrastructure automation, and security. Zeta prefers coding in Python but also has experience with other languages.
Show MoreSalam Houchou
Salam is an IT security architect and consultant in information, cyber, and cloud security. With 20 years of experience, a master's degree in cyber security, and Microsoft Azure, GCP, and AWS security certifications, he excels in designing and implementing initiatives to manage security risks and compliance while maximizing safety and security expectations. Salam is keen on re-organizing, streamlining, and strengthening existing operations by implementing cutting-edge, cost-effective solutions.
Show MoreGökhan Gököz
Gökhan has over 15 years of implementation experience in identity management, middleware, and security solutions. A hard-working and determined professional, he works with different products in a process-oriented manner and adapts quickly. During his career, Gökhan has gained both short and long-term contract-based experience working with various customers and in different sectors. With his vast experience, he will be a great addition to any team.
Show MoreElhadji Birahim NDIAYE
Elhadji is an architect and senior project manager with over ten years of experience in IT, cybersecurity, and infrastructure. He has numerous certifications (PMP, CISM, CISA, AWS-SAP, CCIE Written Sec, CCDP, CCNP Sec, CCNP Datacenter, WSFE, and ACFE, to name a few). He customizes long-term solutions for clients while ensuring immediate fixes. Elhadji has written cybersecurity programs and processes, redesigned architecture, completed audits, and implemented data centers in various sectors.
Show MoreGökay Pekşen
Gökay is a senior manager and principal advisor specializing in cyber security, information security, audit, and standards and regulations. He is highly skilled in enterprise security architecture and an expert in delivering sustainable protection and enhancing reputation and digital existence while enabling risk mitigation to prevent financial loss. Gökay has been working with different technologies, programming languages, and frameworks and is willing to embrace new and challenging projects.
Show MoreDiscover More CyberArk Developers in the Toptal Network
Start Hiring