Affordably Source Bigfix Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Bigfix Inquiries

Area Icon


We are looking to speak with cios of medium and large companies that have experience using or have evaluated bigfix, inc. . .

  1. Profile Picture

    Todd |VP Technical Operations

    Sorry, no experience with BigFix. Lots of Internet Security/SaaS experience - if that's helpful....

    6.2 Days Later
  2. Profile Picture

    Andrei |Owner

    Sorry , i never worked with Big Fix , but regarding Internet Security; Network Security; Informatio...

    20 Days Later
  3. Profile Picture

    Brian |Principal

    CStoner, Thank you for your inquiry. I am not familiar with BigFix and cannot provide assistance in...

    26.3 Days Later
+3 Other Responses
Area Icon

It Security And Data Compliance

We are looking to speak with multiple decision-makers in compliance, it, or legal job functions that have influence over the adoption and purchase of communication/collaborations tools. Desired participants should recently adopted or considering encryption for their productivity/communication/collaboration software uses. This is for a paid 1 - hour web interview. Qualifying questions 1. How would you describe your level of influence in the decision to assess, evaluate, adopt, or purchase new organization/company communication/collaboration tools? By “communication and collaboration software” we mean software enabling real-time and asynchronous collaboration, meetings, instant messaging, file sharing, etc. Would you say you? A. I am the final decision-maker b. I share in the decision making c. I have some influence d. I have little to no influence e. We do not have any productivity and collaboration software **please note that we are only interested in your personal point of view and are not seeking confidential information. ***referrals are highly appreciated

  1. Profile Picture

    Mitch |Head of IT Operations and Technology

    I am the final decision-maker...

    32 Minutes Later
  2. Profile Picture

    Martyn |Chief Information Security Officer

    B. I sit on the IT leadership team of a FTSE 250 company and make joint decisions on these things. I...

    37 Minutes Later
  3. Profile Picture

    Ritesh |COO | Global Head of Digital Technology

    Being a tech leader for over two decades, led large *****uding leading banks / payment ...

    45 Minutes Later
+43 Other Responses
Area Icon

Information Security And Privacy

We are a leading webinar publisher (wholly owned by the financial times) and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “how information security and privacy will impact your bottom line as a gc”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information contact me

  1. Profile Picture

    ANDREW R. |CTO/Chief Enterprise Architect & CSO

    I can certainly lead such a webinar....

    1.5 Hours Later
  2. Profile Picture

    E |Senior Disaster Recovery Planner

    Inforamtion Security and Privacy are at the top of the list for many *****. Technology and ...

    1.7 Hours Later
  3. Profile Picture

    Robert |Columnist

    I would be happy to speak with you about such a webinar. I have been a Contributor to the "Computer ...

    1.9 Hours Later
+7 Other Responses
Area Icon

Security Policy Orchestration

Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required. Preferably looking for us based candidates. Experts should know the us market in this area well, the different solutions available, have a good understanding of large enterprises need for such a solution, along with the key market risks and threats for these vendors.

  1. Profile Picture

    Aaron |Zintro Expert

    Depending on your specific questions, I would love to help. Let me know if you'd like to set up a ca...

    3.5 Hours Later
  2. Profile Picture

    Scottard |Executive Security Strategist

    Hi, Saw your inquiry, I would like to assist you. I have over 20 years writing and automating s...

    3.5 Hours Later
  3. Profile Picture

    Ubaid |Expert Senior Consultant

    Hi, I can help you, I have more than 10 years of experiences in *****rity , technical sec...

    3.9 Hours Later
+19 Other Responses
Area Icon

Anonymous Hacker Arrests

“anonymous” hacker arrests the zintro blog needs you! i write the zintro blog. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. If it is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary (there is no payment involved). Question: what does the recent news that several members of the hacker group “anonymous” have been arrested mean to the future of internet security? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ if you are interested, please send me your response via znotes in the next day or two. Include your full name. If you have any questions, please let me know. Thank you! maureen aylward

  1. Profile Picture

    Pablo |Information Security Specialist

    What does the recent news that several members of the hacker group “Anonymous” have been arrested me...

    14 Minutes Later
  2. Profile Picture

    Aaron |Senior Application Developer

    Hello Maureen, How soon do you need the article and is it ok if it is over 3 paragraphs long say 4?...

    15 Minutes Later
  3. Profile Picture

    TAIYE |President & Founder

    Please contact me at your earliest convenience....

    29 Minutes Later
+10 Other Responses
Area Icon

Technical Writing On Internet Security Architecture

Hope this message finds you well!  we have a new research project that may fall within your area of expertise. We are seeking an experienced technical writer who could write a white paper on industrial internet security architecture project. We are looking for someone with technical knowledge who has experience writing white papers.  as a first step, could you please confirm this is within your area of expertise and you are interested in learning more about this engagement as i would like to connect you with one of our team leaders who can explain this engagement in more detail.  thank you in advance, and we are looking forward to hearing from you. 

  1. Profile Picture

    Robert |Columnist

    I will be happy to speak with you on researching and authoring a White Paper on Industrial Internet ...

    46 Minutes Later
  2. Profile Picture

    Adam |Performance Development Professional

    I'd welcome the chance to help you achieve more, work less and *****n. I've spent years w...

    2.9 Hours Later
  3. Profile Picture

    Peter |Principal

    I think I fit the bill. I have Internet security and white paper writing experience....

    4.6 Hours Later
+13 Other Responses
Area Icon

Information Security

Hi consultant, hope you are doing well !! we have an opportunity for endpoint security engineer with one of our clients in savannah, ga please see the job details below and let me know if you would be interested in this role.  if interested, please send me a copy of your resume, your contact details, your availability and a good time to connect with you. Title: endpoint security engineer location: savannah, ga terms: contract job details: job description - (endpoint security (level-2): should have minimum 6+ years of experience in information security- endpoint security  should have good understanding on information security concepts  must have managed and have strong knowledge on following products: sophos endpoint protection suite sophos/ utimaco safeguard encryption sophos log writer sophos reporting interface sophos port auditor mcafee epolicy orchestrator mcafee viruscan enterprise for storage tenable nessus security center v5.0  should have good knowledge of configuring policies for hips, personal firewall, device & port control, data loss protection components of sophos endpoint protection suite. Very good experience with antivirus technology, experience in handling virus outbreaks, malware cleanup, policy creation, signature update & reporting. Should have strong knowledge on full disk encryption technology  should be willing to work in rotational shifts  excellent communication and conversation skills  strong analytical and problem solving skills  good documentation skills  should have a great customer handling skills  experience with antivirus solutions across multiple operating systems  powershell scripting experience a plus thanks, varish

  1. Profile Picture

    Richard |Founder

    VARISH, I am a Certified Systems Security Engineer with extensive experience with Software Developm...

    19.5 Hours Later
  2. Profile Picture

    Muhammad |Zintro Expert

    Thanks. However, we are likely to find a suitable ***** could serve as an Endpoint Securit...

    1.1 Days Later
+3 Other Responses
Area Icon

It Security Analysis And Operations

We are looking to speak with 5-8 security operations and security analysts it staff in fortune 500 organizations, people responsible for acting on indicators of attack or compromise and investigating out cyber attacks in their organization. The ideal industries of focus will be financial services (investment banks, insurance, large retail/comm banks) & healthcare (insurers, hospitals). Thank you.

  1. Profile Picture

    Patricio |IT Global Leader

    I am interested in ***** this phone consult. I am an experienced IT Security Assistant Di...

    23 Minutes Later
  2. Profile Picture

    John |Senior

    I am interested in this position....

    3.4 Hours Later
  3. Profile Picture

    David |Technical Director - Consulting

    My expertise is not in IT security - it is in development of secure products; hardware and software....

    4.3 Hours Later
+9 Other Responses
Area Icon

It Security Solution Resellers In Europe

Eu resellers of it network security solutions in europe i work for a prominent expert network working in partnership with zintro. We would like to source multiple experts on behalf of an institutional investor. Specifically, we are looking for the following type of expert: our client would like to speak with resellers of network it security solutions within europe. Please respond back with your current/ recent employment history, contact info, or linkedin profile for reference.

  1. Profile Picture

    Lee |Consultant/Owner

    Hi, I am an Infrastructure consultant specializing in VMware vSphere and *****rity solution....

    48 Minutes Later
  2. Profile Picture

    Sergey |Systems Engineer

    Hello, I'm an IT consultant specializing in Exchange/Office365/Microsoft/Azure/Virtuzalition in Cana...

    1.6 Hours Later
  3. Profile Picture

    Paul |Sr. Information Security Manager

    I'm in the USA...

    2.7 Hours Later
+6 Other Responses
Area Icon

Cyber Security Landscape

Our multinational client is working on research about the cyber security landscape particularly on firmware/hardware — at the level of the business user’s machine vs. At the network or cloud level. They are interested in speaking with experts based on the criteria below: - us based expert certified by nist (national institute of standards and technology) - expert / entrepreneur in israel but who has a focus on firmware / hardware — at the level of the business user’s machine vs. At the network or cloud level. This will be for a 1-hour webcam interview. Please provide a brief response below as to your relevance in the space. 1. Can you share your background in the overall cybersecurity landscape? 2. Can you share a holistic view as to what components are in play on the it security landscape particularly in secured-core pcs?

  1. Profile Picture

    Naresh |Advisory Board

    I can discuss the current trends, such as Zero Trust Network, Software Defined Perimeter, convergenc...

    49 Minutes Later
  2. Profile Picture

    New |

    Hi, Currently ***** one of the leading MSSP, have in-depth expertise in all the cyber secu...

    21.4 Hours Later
  3. Profile Picture

    Omri |Global IT and cyber security Manager

    1. Can you share your background in the overall cybersecurity landscape? - Yes, Global IT Infrastruc...

    1.2 Days Later
+38 Other Responses
Area Icon

Network Security Msp

Looking for insight and perspective as to best practices and kpi metrics for the managed service provider space focused on network security. Specifically what kpis drive valuation and current market multiples applied managed service revenues (recurring), professional service revenue (1x or project based work), and hardware associated revenue (pass-through).

  1. Profile Picture

    Bobby |Sr. System Engineer and Technology Solut

    Hello, I think the project description needs some *****, especially the target market. Layo...

    6.6 Hours Later
  2. Profile Picture

    Anand |Managing Partner

    Worked in Verizon as technology head and managed Network security for fortune companies. The KPI's ...

    15.7 Hours Later
  3. Profile Picture

    Simon |Security Consultant

    Hi, Largely depends on what you are trying to do. There are a number of KPIs that can be put in p...

    16.9 Hours Later
+7 Other Responses
Area Icon

Senior Network

We have an immediate opening with one of our client. Kindly confirm your interest by replying to this inquiry with your updated resume and convenient time/number to discuss further. You can mail me via zintroin case if you are not currently available or not interested in the below position, i apologize for the inconvenience and request you to forward my mail to your friends or colleagues whom you feel would excel this opportunity job title   :senior network engineer (10 + yrs) location    :san ramon , ca terms       :long term contract  role summary/purpose: -senior network engineer responsible for implementing, operating and supporting multi-tenant, scalable network solutions. -the role will routinely review, analyze and recommend network improvements to ensure that the network can scale with the needs of the applications and services riding on it.   job description  - routing expertise – cisco & juniper routers and switches - ibgp, ebgp, ospf, is-is with hands-on experience managing enterprise wan - mpls, ipsec tunnel, ssl vpn, firewall, and dns - firewall & dns expertise - palo alto & f5 firewall - infoblox dns & ipam solutions - project management – must know agile to drive teams backlog - track and update the user stories to ensure the project(sprint iteration) is delivered with agreed content on time - monitor and optimize network performance and assure network security in a high availability environment. -work with telecom providers to report, troubleshoot, and resolve wan related issues. - enforce and execute user policies and procedures regarding the use of network resources. - provide on-call support to the first level support  requirements:  - bachelor's degree in information systems, information technology, computer science or engineering from an accredited college or university or equivalent experience - minimum 5+ years of experience supporting large enterprise network infrastructure (e.G. At a fortune 500 company) - must have 1-2 years of project management experience in agile methodology to help drive the day-to-day backlog\ 

  1. Profile Picture

    John |Founder

    JOHN D. DAUS 2053 Crossing ***** Vienna, VA ***** Phone: ***** Email: *****...

    1.6 Hours Later
  2. Profile Picture

    Walid |Network Architect

    Resume attached...

    5.4 Hours Later
  3. Profile Picture

    Navin |Vice President

    Hello, We can help you. Let us know. Navin...

    45.9 Days Later
+7 Other Responses
See More Inquiries

Top Bigfix Experts

See More Experts