Zero Trust Network Solutions
We are looking for security decision makers either c-level or c-1 (meaning they directly report to the c level exec) are very or extremely knowledgeable about zero trust. The candidates must have significant influence in decisions made at organization for cybersecurity, threat protection, identity management, risk management, application security or digital forensics and incident response
this is for a paid 1-hour face-to-face web interview.
**please note that we are only interested in your personal point of view and are not seeking confidential information. This is not a sales solicitation. All the information you provide us is kept strictly confidential. It is used for classification purposes only.
Kindly respond to the questions below as to your relevance in this space:
1. What level of authority do you have in the purchase and selection of solutions or services related to security and threat protection in your company?
2. How familiar are you with the concept of zero trust?
+197 Other ResponsesCybersecurity Pcap/intelligence
Role summary
serve as a technical architect to perform security log, pcap/intelligence analysis and detect unknown threats and will work to perform analysis of current and future advanced persistent threats
role description
role will be working at a client to perform analysis of current and future advanced persistent threats • experience on advanced persistent threats (apt) based on evaluations of large quantities of information to formulate actionable information to improve the information network security. • possess experience with network intelligence gathering, incident analysis, reverse engineering of attacker methods, and analytical analysis of technical and non-technical indicators of intrusion, intelligence analysis supporting computer security. • current understanding of the latest software vulnerabilities, virus/malicious code and exploits, firewalls, intrusion detection systems, automated vulnerability scanning tools, or modeling and analysis techniques. • excellent analysis and verbal/written communication skills. • experience with ci databases, splunk / arcsight, vmware, sentinel, geolocation tools. • experience with pcap analysis and net flow analysis.
Role requirements
required skills
cybersecurity
cyber forensics
pcap analysis
wireshark
years of experience
10+ years
+8 Other ResponsesSouth African Cybersecurity Market & Trends
We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services
- what is the awareness level of the cyber threat in south africa? Of the government and the general public
- how does the government implement legislations and regulations regarding cyber security in the country?
- how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country?
- who are the leading local vendors for cyber training and consultation services?
- are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers?
We are willing to pay a generous honorarium for each 45 - 60 minute call.
Thanks!
+3 Other ResponsesIntelligence Software Solutions
We are looking for multiple subject matter experts and decision-makers on intelligence software solutions who can help understand the general needs and solutions so that the solution providers could meet the needs and refine the solutions/products provided. We are not interested in ‘classic’ solutions such as firewall, anti-virus.
Experts should be working in tier 1 companies in one of the following industries: critical infrastructure (energy, telecommunications, transportation), airports, large retailers, large healthcare providers or pharmaceutical manufacturers, and industrial engineering companies (that are subject to great risks if under significant threat).
This is a paid 1-hour phone interview. Kindly respond with a brief answer as to your relevance in the space below:
1. Are you the main and most senior executive responsible for securing your organization from possible threats?
2. Can you provide a high-level perspective of the security/threat detection needs of large corporations subject to security threats?
3. Can ‘sophisticated’ solutions for threat detection and intelligence analytics (not ‘classic’ solutions such as firewalls, anti-virus, etc.) be relevant and help in executing your role & responsibilities?
4. Could you contribute insights regarding enterprise security needs and solutions? (answer questions such as the few examples below)
- are there areas where there are no sufficient solutions for your needs?
- what improvements/features would you like to see in your solution?
- what is important to you when choosing a solution?
**please note that we are only interested in your personal point of view and are not seeking confidential information.
***referrals are highly appreciated.
+10 Other ResponsesCyber Defense
We are looking for an expert in the field of cyber defense, specifically in the european and latin american markets.
We wish to identify relevant governmental organizations & officials responsible for cyber defense budgets and initiatives, with an emphasis on decision makers & influencing figures.
The most relevant countries are the uk, switzerland, germany, czech republic, brazil and mexico. It should be noted a regional expert (i.E. European market or latin american market) are also relevant. Also, the candidate doesn't need to be an expert on all countries mentioned above.
+5 Other ResponsesCustomer Marketing
We are a world leader of distributed denial of service (ddos) solutions and has recently launched a market changing advanced persistent threat (apt) solution.
The customer marketing manager plays a critical role in ensuring we are retaining and developing our existing clients.
Responsibilities include turning our satisfied customers into our advocates and then ensuring that we are getting maximum value from their advocacy, creation/implementation of marketing activities that drive adoption of our solutions and expansion of our footprint within our customer accounts. This person will work closely with sales to create programs, identify customers and customer segments then create both programmatic loyalty and focused, individual programs among our customers. The person we are looking for to lead and champion this high profile effort must be a customer-focused marketer with an entrepreneurial spirit, an excellent achiever, communicator, writer and ambassador. This position requires creative, tactical, and quantitative skills.
This is a contract position with a highly competitive comp package. We are looking for candidates near new england, but we are open to considering remote workers with a proven background in this area.
Please reply with a cover note. Thanks!
+45 Other ResponsesCyber Security In South Africa
We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services
- what is the awareness level of the cyber threat in south africa? Of the government and the general public
- how does the government implement legislations and regulations regarding cyber security in the country?
- how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country?
- who are the leading local vendors for cyber training and consultation services?
- are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers?
We are willing to pay a generous honorarium for each 45 - 60 minute call.
Thanks!
+11 Other ResponsesTelcos Threat From Private Companies Moving To Business Plans
Key question: how are telcos facing cannibalization threat of business clients migrating to private plans
in the last few years, due to competitive pressures, offerings to the private market have reduced priced and now offer high speed internet priced below plans offered to the business sector.
We are seeking an interview to understand how telecom operators with robust activity in the business sector handle this conflict and avoid cannibalization (business clients preferring private offerings).
The ideal candidate should have experience in a tier-1 telco (e.G. Verizon, orange, deutsche telekom, telefonica, teliasonera, etc.) and familiar with the plans and marketing to business clients.
Thanks
+14 Other ResponsesIt Security Analysis And Operations
We are looking to speak with 5-8 security operations and security analysts it staff in fortune 500 organizations, people responsible for acting on indicators of attack or compromise and investigating out cyber attacks in their organization.
The ideal industries of focus will be financial services (investment banks, insurance, large retail/comm banks) & healthcare (insurers, hospitals).
Thank you.
+9 Other ResponsesThreat Detection Using Artificial Intelligence
We are looking for experts in "threat detection using artificial intelligence" to provide commentary and insights towards a startup that strives to make the world safer by developing an ai platform that detects threats on social media.
We are an angel investing platform dedicated to connecting deep-tech startups with angel investors. By deep-tech we mean startups founded on scientific breakthroughs and technological innovations that create lasting impact on mankind.
As a participating expert* in this process, your involvement is limited to answering anywhere between 8-12 investor-submitted questions. This takes about 45 minutes (+/-) . Once you are vetted, we send those questions via a web form for your responses. If your contribution is published, it will be view-able by potential investors in this startup, giving you an opportunity to make connections, socialize virtually, and gain bragging rights in a vibrant entrepreneurial and angel investing community.
*at this point, we cannot guarantee any monetary reimbursement. You do get insights to new upcoming technologies in your field and a tremendous networking opportunity!
+11 Other ResponsesPublic Speaking
Hello,
i am looking for a industry expert to conduct a 2 day in person seminar based out of usa. Should have a minimum experience of 25-30 years and should have extensive public speaking experience. Should be able to cover few or most of the below topics:
1. Data breach response presentation
2. Data breach media response templates review
3. Law enforcement notification and liaison – who does what?
4. Cyber crime – exactly who are the bad guys and what are they looking for?
5. Cyber risk assessments – preach prevention first
6. Continuous monitoring of entire eco-system (outsource or in-house?)
7. Security operations design
8. Cyber policy review recommendations and re-design
9. Penetration testing – what should you be looking at?
10. 24/7 continuous monitoring and vulnerability scanning
11. Third party cyber audits and reviews
12. Data breach remediation
13. Identity theft guidelines, phi identification, credit monitoring and resolution
14. Cyber crime investigations
15. Computer forensics
16. Data breach incident response teams (internal/external)
17. Malware and advanced persistent threat detection
18. Data breach notifications – a timeline of events
19. Data breach notification letters to customers and regulators
20. Cyber due diligence
21. Insider threat - defend against both internal and external exposure
22. Digital fraud management reviews
23. Identify evidence, chain of custody, legal and regulatory obligation consulting
+12 Other ResponsesTrademark And Copyright Threats
We are a leading webinar publisher (wholly owned by the financial times)and a authorized zintro partner.
We are seeking an expert to lead a 60-minute webinar on the topic of “responding to trademark and copyright threats as general counsel”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future.
The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations.
+10 Other Responses