Affordably Source Advanced Persistent Threat (apt) Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Advanced Persistent Threat (apt) Inquiries

Area Icon

Zero Trust Network Solutions

We are looking for security decision makers either c-level or c-1 (meaning they directly report to the c level exec) are very or extremely knowledgeable about zero trust. The candidates must have significant influence in decisions made at organization for cybersecurity, threat protection, identity management, risk management, application security or digital forensics and incident response this is for a paid 1-hour face-to-face web interview. **please note that we are only interested in your personal point of view and are not seeking confidential information. This is not a sales solicitation. All the information you provide us is kept strictly confidential. It is used for classification purposes only. Kindly respond to the questions below as to your relevance in this space: 1. What level of authority do you have in the purchase and selection of solutions or services related to security and threat protection in your company? 2. How familiar are you with the concept of zero trust?

  1. Profile Picture

    Tim |Director of Security

    I report to the CISO and previously lead security at HealthStream. I have extensive experience in A...

    1.9 Hours Later
  2. Profile Picture

    Klint |Chief Information Security Officer, VP T

    Yes, I’m available for this...

    2 Hours Later
  3. Profile Picture

    Angel |Director Of Information Technology

    As Chief *****cer I have full authority in the purchase and selection of solutions or ser...

    2.1 Hours Later
+197 Other Responses
Area Icon

Cybersecurity Pcap/intelligence

Role summary serve as a technical architect to perform security log, pcap/intelligence analysis and detect unknown threats and will work to perform analysis of current and future advanced persistent threats role description role will be working at a client to perform analysis of current and future advanced persistent threats • experience on advanced persistent threats (apt) based on evaluations of large quantities of information to formulate actionable information to improve the information network security. • possess experience with network intelligence gathering, incident analysis, reverse engineering of attacker methods, and analytical analysis of technical and non-technical indicators of intrusion, intelligence analysis supporting computer security. • current understanding of the latest software vulnerabilities, virus/malicious code and exploits, firewalls, intrusion detection systems, automated vulnerability scanning tools, or modeling and analysis techniques. • excellent analysis and verbal/written communication skills. • experience with ci databases, splunk / arcsight, vmware, sentinel, geolocation tools. • experience with pcap analysis and net flow analysis. Role requirements required skills cybersecurity cyber forensics pcap analysis wireshark years of experience 10+ years

  1. Profile Picture

    Russell |Analyst

    Russell Stover ***** ***** Dear Sir/Madam: I am interested in the position ...

    4 Hours Later
  2. Profile Picture

    Alexander |Strategist

    Hi, I am interested in submitting for this contract. My experience with Fusion Centers, Threat Inte...

    1.3 Days Later
  3. Profile Picture

    David |Zintro Expert

    From the description, I need a bit more *****t the role. Is this only a security-related ...

    1.3 Days Later
+8 Other Responses
Area Icon

South African Cybersecurity Market & Trends

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Douglas |CEO

    I built the KPMG CyberSecurity practice and re-organized the global Deloitte cybersecurity practice....

    2.3 Hours Later
  2. Profile Picture

    Craig |Managing Director

    I had a look through the questions and yes we are actively involved in the cyber security training /...

    6.1 Days Later
+3 Other Responses
Area Icon

Intelligence Software Solutions

We are looking for multiple subject matter experts and decision-makers on intelligence software solutions who can help understand the general needs and solutions so that the solution providers could meet the needs and refine the solutions/products provided. We are not interested in ‘classic’ solutions such as firewall, anti-virus. Experts should be working in tier 1 companies in one of the following industries: critical infrastructure (energy, telecommunications, transportation), airports, large retailers, large healthcare providers or pharmaceutical manufacturers, and industrial engineering companies (that are subject to great risks if under significant threat). This is a paid 1-hour phone interview. Kindly respond with a brief answer as to your relevance in the space below: 1. Are you the main and most senior executive responsible for securing your organization from possible threats? 2. Can you provide a high-level perspective of the security/threat detection needs of large corporations subject to security threats? 3. Can ‘sophisticated’ solutions for threat detection and intelligence analytics (not ‘classic’ solutions such as firewalls, anti-virus, etc.) be relevant and help in executing your role & responsibilities? 4. Could you contribute insights regarding enterprise security needs and solutions? (answer questions such as the few examples below) - are there areas where there are no sufficient solutions for your needs? - what improvements/features would you like to see in your solution? - what is important to you when choosing a solution? **please note that we are only interested in your personal point of view and are not seeking confidential information. ***referrals are highly appreciated.

  1. Profile Picture

    Bradley |VP – Chief Information Security Officer

    1. Are you the main and most senior executive responsible for securing your ***** possib...

    5.2 Hours Later
  2. Profile Picture

    Dr. Chitranjan |Zintro Expert

    from last 20 years i am working on for intelligence software solutions. Cyber Security are my core ...

    5.6 Hours Later
  3. Profile Picture

    Martyn |Chief Information Security Officer

    1. Are you the main and most senior executive responsible for securing your ***** possi...

    10.5 Hours Later
+10 Other Responses
Area Icon

Cyber Defense

We are looking for an expert in the field of cyber defense, specifically in the european and latin american markets. We wish to identify relevant governmental organizations & officials responsible for cyber defense budgets and initiatives, with an emphasis on decision makers & influencing figures. The most relevant countries are the uk, switzerland, germany, czech republic, brazil and mexico. It should be noted a regional expert (i.E. European market or latin american market) are also relevant. Also, the candidate doesn't need to be an expert on all countries mentioned above.

  1. Profile Picture

    Jeffrey |Chief Intelligence Officer

    Recommend *****eb/en for *****ican markets....

    2.1 Hours Later
  2. Profile Picture

    Hiro |Chief Consultant

    I will be happy to talk about what their issues may be and identify exactly what they want accuratel...

    8.6 Hours Later
  3. Profile Picture

    Anand |Managing Partner

    Can help on this discussion...

    11.8 Hours Later
+5 Other Responses
Area Icon

Customer Marketing

We are a world leader of distributed denial of service (ddos) solutions and has recently launched a market changing advanced persistent threat (apt) solution. The customer marketing manager plays a critical role in ensuring we are retaining and developing our existing clients. Responsibilities include turning our satisfied customers into our advocates and then ensuring that we are getting maximum value from their advocacy, creation/implementation of marketing activities that drive adoption of our solutions and expansion of our footprint within our customer accounts. This person will work closely with sales to create programs, identify customers and customer segments then create both programmatic loyalty and focused, individual programs among our customers. The person we are looking for to lead and champion this high profile effort must be a customer-focused marketer with an entrepreneurial spirit, an excellent achiever, communicator, writer and ambassador. This position requires creative, tactical, and quantitative skills. This is a contract position with a highly competitive comp package. We are looking for candidates near new england, but we are open to considering remote workers with a proven background in this area. Please reply with a cover note. Thanks!

  1. Profile Picture

    Donna |President - Brand Connectix

    I'd be interested in learning more about this role....

    6 Days Later
  2. Profile Picture

    Jack |Managing Director

    DoS interruption or suspension of digital services could gravely impact a network resource...its int...

    6 Days Later
  3. Profile Picture

    Herb |Senior Business Development Consultant

    My many years of business development experience have included the sales and marketing of software s...

    6.1 Days Later
+45 Other Responses
Area Icon

Cyber Security In South Africa

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Shyam |CFO Advisor

    we are amidst investing in a South african Cyber training company and I am well versed and can disc...

    6.5 Hours Later
  2. Profile Picture

    Ramamurthy |Owner & CEO

    I am a Cyber Security specialist conducting IS audits, consultancy in IS Policy and other online sec...

    10.2 Hours Later
  3. Profile Picture

    Dr Venkat |Global Consultant

    I have some idea ,but need to work with one of our local partners in South Africa ...

    7.1 Days Later
+11 Other Responses
Area Icon

Telcos Threat From Private Companies Moving To Business Plans

Key question: how are telcos facing cannibalization threat of business clients migrating to private plans in the last few years, due to competitive pressures, offerings to the private market have reduced priced and now offer high speed internet priced below plans offered to the business sector. We are seeking an interview to understand how telecom operators with robust activity in the business sector handle this conflict and avoid cannibalization (business clients preferring private offerings). The ideal candidate should have experience in a tier-1 telco (e.G. Verizon, orange, deutsche telekom, telefonica, teliasonera, etc.) and familiar with the plans and marketing to business clients. Thanks

  1. Profile Picture

    Udi |General Manager

    Hi, Are Telco's in China relevant for this research? If yes, I can help. Thanks, Udi Baran...

    6.3 Hours Later
  2. Profile Picture

    Ashish |Partner

    yes can do this...

    6.4 Hours Later
  3. Profile Picture

    Norman |Managing Director

    Good luck!...

    6.4 Hours Later
+14 Other Responses
Area Icon

It Security Analysis And Operations

We are looking to speak with 5-8 security operations and security analysts it staff in fortune 500 organizations, people responsible for acting on indicators of attack or compromise and investigating out cyber attacks in their organization. The ideal industries of focus will be financial services (investment banks, insurance, large retail/comm banks) & healthcare (insurers, hospitals). Thank you.

  1. Profile Picture

    Patricio |IT Global Leader

    I am interested in ***** this phone consult. I am an experienced IT Security Assistant Di...

    23 Minutes Later
  2. Profile Picture

    John |Senior

    I am interested in this position....

    3.4 Hours Later
  3. Profile Picture

    David |Technical Director - Consulting

    My expertise is not in IT security - it is in development of secure products; hardware and software....

    4.3 Hours Later
+9 Other Responses
Area Icon

Threat Detection Using Artificial Intelligence

We are looking for experts in "threat detection using artificial intelligence" to provide commentary and insights towards a startup that strives to make the world safer by developing an ai platform that detects threats on social media. We are an angel investing platform dedicated to connecting deep-tech startups with angel investors. By deep-tech we mean startups founded on scientific breakthroughs and technological innovations that create lasting impact on mankind. As a participating expert* in this process, your involvement is limited to answering anywhere between 8-12 investor-submitted questions. This takes about 45 minutes (+/-) . Once you are vetted, we send those questions via a web form for your responses. If your contribution is published, it will be view-able by potential investors in this startup, giving you an opportunity to make connections, socialize virtually, and gain bragging rights in a vibrant entrepreneurial and angel investing community. *at this point, we cannot guarantee any monetary reimbursement. You do get insights to new upcoming technologies in your field and a tremendous networking opportunity!

  1. Profile Picture

    Shrisha |Professor and Research Consultant

    I am interested. I have worked in AI and have had a PhD student write a thesis on *****...

    4.1 Hours Later
  2. Profile Picture

    Russell |Analyst

    I may be able to help. While an intern at the Open Source Intelligence Exchange we worked on evalua...

    4.2 Hours Later
  3. Profile Picture

    Frank |COE

    I have trained neural networks in an ***** detecting insolvencies among ***** World Ba...

    4.2 Hours Later
+11 Other Responses
Area Icon

Public Speaking

Hello, i am looking for a industry expert to conduct a 2 day in person seminar based out of usa. Should have a minimum experience of 25-30 years and should have extensive public speaking experience. Should be able to cover few or most of the below topics: 1. Data breach response presentation 2. Data breach media response templates review 3. Law enforcement notification and liaison – who does what? 4. Cyber crime – exactly who are the bad guys and what are they looking for? 5. Cyber risk assessments – preach prevention first 6. Continuous monitoring of entire eco-system (outsource or in-house?) 7. Security operations design 8. Cyber policy review recommendations and re-design 9. Penetration testing – what should you be looking at? 10. 24/7 continuous monitoring and vulnerability scanning 11. Third party cyber audits and reviews 12. Data breach remediation 13. Identity theft guidelines, phi identification, credit monitoring and resolution 14. Cyber crime investigations 15. Computer forensics 16. Data breach incident response teams (internal/external) 17. Malware and advanced persistent threat detection 18. Data breach notifications – a timeline of events 19. Data breach notification letters to customers and regulators 20. Cyber due diligence 21. Insider threat - defend against both internal and external exposure 22. Digital fraud management reviews 23. Identify evidence, chain of custody, legal and regulatory obligation consulting

  1. Profile Picture

    Brent |CEO

    I'd be interested in hearing more about the specific needs of the engagement. Particularly, timing a...

    1 Hour Later
  2. Profile Picture

    Cyber |IT Security Analyst Consultant

    I can assist. Please provide additional details as to the 2-day seminar outline and the general ter...

    1.2 Hours Later
  3. Profile Picture

    Darko |Sales professional, Coach

    I am really sorry, but I do not have experience for the .... *****s of Expertise: data b...

    1.4 Hours Later
+12 Other Responses
Area Icon

Trademark And Copyright Threats

We are a leading webinar publisher (wholly owned by the financial times)and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “responding to trademark and copyright threats as general counsel”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations.

  1. Profile Picture

    Bill |Senior Vice President

    While a legal ***** this is important, I would also urge you to look at how the licensin...

    3.2 Hours Later
  2. Profile Picture

    Lindsey |Lead Consultant

    Hello, I would love to be considered for this presentation. I have been working with trademarks for...

    3.3 Hours Later
  3. Profile Picture

    Robert |Member of the Board of Directors

    Hello, I have a proven track record of building an IP fence around the companies I ran and and then ...

    7.5 Hours Later
+10 Other Responses
See More Inquiries

Top Advanced Persistent Threat (apt) Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+