Affordably Source Cybersecurity Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Cybersecurity Inquiries

Area Icon

Cybersecurity Pcap/intelligence

Role summary serve as a technical architect to perform security log, pcap/intelligence analysis and detect unknown threats and will work to perform analysis of current and future advanced persistent threats role description role will be working at a client to perform analysis of current and future advanced persistent threats • experience on advanced persistent threats (apt) based on evaluations of large quantities of information to formulate actionable information to improve the information network security. • possess experience with network intelligence gathering, incident analysis, reverse engineering of attacker methods, and analytical analysis of technical and non-technical indicators of intrusion, intelligence analysis supporting computer security. • current understanding of the latest software vulnerabilities, virus/malicious code and exploits, firewalls, intrusion detection systems, automated vulnerability scanning tools, or modeling and analysis techniques. • excellent analysis and verbal/written communication skills. • experience with ci databases, splunk / arcsight, vmware, sentinel, geolocation tools. • experience with pcap analysis and net flow analysis. Role requirements required skills cybersecurity cyber forensics pcap analysis wireshark years of experience 10+ years

  1. Profile Picture

    Russell |Analyst

    Russell Stover ***** ***** Dear Sir/Madam: I am interested in the position ...

    4 Hours Later
  2. Profile Picture

    Alexander |Strategist

    Hi, I am interested in submitting for this contract. My experience with Fusion Centers, Threat Inte...

    1.3 Days Later
  3. Profile Picture

    David |Zintro Expert

    From the description, I need a bit more *****t the role. Is this only a security-related ...

    1.3 Days Later
+8 Other Responses
Area Icon

Electric Transmission Utility Cyber Security

We are looking for multiple experts who can speak about the cyber security spending habits of electric transmission utilities. We are interested with heads of cyber security within the electric transmission industry. This is a paid 1-hour phone consult. Kindly respond with a brief answer to the space below: 1. Do you have clear visibility into and an understanding of your utility's electrical transmission cyber security spending habits? 2. Do you know the breakdown of your cybersecurity spending by key metrics such as: total spending, average spending per substation, spending on external managed services providers, spending on internal it team resources versus spending on external vendors, etc.?

  1. Profile Picture

    Eric |

    Thanks for thinking of me, but I don't have the experience you're looking for. Regards, Eric...

    2 Hours Later
  2. Profile Picture

    William |Owner

    I ***** inquiry to me. However, this consult topic is not in my area of expertise. ...

    2.1 Hours Later
  3. Profile Picture

    Bradley |VP – Chief Information Security Officer

    I have expertise in cyber security spending habits, but not at an electric transmission utility....

    2.5 Hours Later
+15 Other Responses
Area Icon

Trends & Preferences Of Managed Cybersecurity Services

Scope: the main objective of this study is to understand the trends and preferences for managed cybersecurity services for “global 2000” companies the study intends to understand: • key managed cyber security services being consumed by large corporations – “global 2000” companies • key features or capabilities preferred in the managed cyber security services being consumed (for managed detection and response, threat intelligence service, siem as a service, threat hunting, vulnerability management, and penetration testing • preferred pricing models / price points for managed cyber security services • estimated distribution of companies (from global 2000) between those undertaking end-to-end cybersecurity transformation, and those undertaking limited/targeted cybersecurity transformation focus geography: us, western europe (uk, germany, france) business focus: • managed cybersecurity services (managed detection and response, threat intelligence, siem, threat hunting, vulnerability management, penetration testing) number of experts: 5 timeframe: 20th january, 2021 expert job title(s): • from managed security service providers (mssps) and cybersecurity consulting companies (sample set of people): - account managerso sales managers/directors/vps - manager (threat intelligence sales) - cybersecurity sales specialist - any other relevant/related roles • from channel partners for mssps and consulting companies - senior manager (corporate sales) - strategic account manager - others relevant/related roles • other independent consultants and experts managed cybersecurity (especially for “global 2000” companies’ segment) * we need to include current and former employees from the following companies: - mssps (priority list of companies): fireye inc., secureworks inc., red canary, crowdstrike, deepwatch inc. - consulting companies (priority list of companies): ey, deloitte, accenture, pwc, mandiant - can include (second priority) other such mssps and consulting companies that provide managed cybersecurity services to "global 2000" companies. Survey type: telephonic survey duration: approx. 30-35 minutes screening questions: 1. Would you be able to share insights on the (based on the key pointers for discussion mentioned) below? Key pointers for discussion: • key managed cyber security services being consumed by large corporations – “global 2000” companies • key features or capabilities preferred in the cyber security services being consumed (for managed detection and response, threat intelligence service, managed siem, threat hunting, vulnerability management, and penetration testing • preferred pricing models / price points of the managed cyber security services • differences in preferences of services, between companies undertaking end-to-end cybersecurity transformation, and those undertaking limited/targeted cybersecurity transformation

  1. Profile Picture

    Fabrizio |Information Security Architect and CISO

    Happy to consult...

    23.7 Hours Later
  2. Profile Picture

    Scott |Director of IT

    Hello, would be happy to provide cyber security info and managed services info about a smaller non-p...

    23.7 Hours Later
  3. Profile Picture

    Salil |President/CEO & Founder

    Happy to consult....

    23.8 Hours Later
+101 Other Responses
Area Icon

Cyber Security Incident

We would like to speak with multiple experts and understand in detail some of their insights and experience from selecting vendors for these panels. Expert must be with the top 15 cyber insurance carrier and must be considered as a senior professional in the industry. More importantly, the expert must be in the leadership position of the cyber insurance division at one of the top 15-20 insurance carriers who are heavily involved in directly selecting or influencing the selection of vendors for incident response services for clients. These pre-approved lists are generally known as "cyber incident response vendor panels". Discussion points: a. Most common areas of friction between insurance carriers and incident response vendors b. What advice would you give a new company looking to join an insurance carrier’s vendor panel? C. What role do claims managers have in influencing vendor selection? D. How do you evaluate a vendor’s worthiness for participation on your panel? A. What is the process? B. How long does the process take to add a new vendor? C. What are the key things you are looking for and red flags that you are watching closely? E. What is the average hourly rate for your incident response vendors on the panel (for services such as: digital forensics, incident response, malware reverse engineering, ransomware recovery, etc) a. How does a lower hourly rate influence your willingness to work with a vendor? F. How do weigh the size of a larger vendor compared to a smaller vendor (ie verizon or crowdstrike versus a competent and experienced 10 person outfit). A. Do you care about whether the incident response company is using third-party tools and products for the incident versus their own tools? G. How often do you approve off-panel vendors for the work in one of your claims? H. Are there certain carriers or law firms that you think everyone else follows with respect to their vendor panel? A. Which insurance carriers have the most demanding standards for incident response vendor panels? B. Which insurance carriers have the most lenient standards for incident response vendor panels? I. What law firms do you think do the best job or have the best team with respect to incident response? This is for 60 mins paid phone consultation. To show your relevance in this space, please answer the questions below: 1. Do you presently have a cybersecurity incident response vendor panel? 2. Do you have direct involvement in the selection of vendors on the incident response vendor panel (specifically for digital forensics and ransomware response companies)? 3. Can you provide a detailed understanding of the criteria for selection on the vendor panel? 4. Can you share your opinions of the leading incident response vendors for digital forensics? 5. Can you thoroughly talk about all the discussion points mentioned above? *please note that we are only interested in your personal point of view and are not seeking confidential information. This is not a sales solicitation. All the information you provide us is kept strictly confidential. It is used for classification purposes*

  1. Profile Picture

    Timothy |President

    This is an extremely high bar for this inquiry, I can speak to some of this with 10+ years of cybers...

    3.1 Hours Later
  2. Profile Picture

    Robert |VP, Head of Middle Markets - Cyber & Pro

    Thanks very much for reaching out. I would be interested in ***** can we discuss the de...

    18.9 Hours Later
  3. Profile Picture

    Sebastian |Cyber Risk

    Yes I am able to discuss above point...

    19.6 Hours Later
+14 Other Responses
Area Icon

South African Cybersecurity Market & Trends

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Douglas |CEO

    I built the KPMG CyberSecurity practice and re-organized the global Deloitte cybersecurity practice....

    2.3 Hours Later
  2. Profile Picture

    Craig |Managing Director

    I had a look through the questions and yes we are actively involved in the cyber security training /...

    6.1 Days Later
+3 Other Responses
Area Icon

Cyber Security Landscape

Our multinational client is working on research about the cyber security landscape particularly on firmware/hardware — at the level of the business user’s machine vs. At the network or cloud level. They are interested in speaking with experts based on the criteria below: - us based expert certified by nist (national institute of standards and technology) - expert / entrepreneur in israel but who has a focus on firmware / hardware — at the level of the business user’s machine vs. At the network or cloud level. This will be for a 1-hour webcam interview. Please provide a brief response below as to your relevance in the space. 1. Can you share your background in the overall cybersecurity landscape? 2. Can you share a holistic view as to what components are in play on the it security landscape particularly in secured-core pcs?

  1. Profile Picture

    Naresh |Advisory Board

    I can discuss the current trends, such as Zero Trust Network, Software Defined Perimeter, convergenc...

    1.8 Hours Later
  2. Profile Picture

    New |

    Hi, Currently ***** one of the leading MSSP, have in-depth expertise in all the cyber secu...

    22.4 Hours Later
  3. Profile Picture

    Omri |Global IT and cyber security Manager

    1. Can you share your background in the overall cybersecurity landscape? - Yes, Global IT Infrastruc...

    1.2 Days Later
+38 Other Responses
Area Icon

Cyber Security In The Aviation Industry

We are looking for *cyber security* experts in the *aviation industry* who can provide information on the market size, technological trends, pain points of the main market players, and more.

  1. Profile Picture

    Joseph |CTO

    At Global Digital Forensics we have conducted security assessments for *****stry clients in...

    7.6 Hours Later
  2. Profile Picture

    Richard |Consultant - Aviation

    I have done an extensive research on cyber security in the *****stry and would like to know ...

    1.4 Days Later
  3. Profile Picture

    Jeffrey L. |Principal Cybersecurity Engineer

    I have worked in the *****space industry for roughly 10 years doing cyber security. My most...

    1.5 Days Later
+4 Other Responses
Area Icon

Cyber Security

We require a subject matter expert in cyber security, more specifically ransomware as a guest/keynote speaker in a webinar planned for sept 22. The sme must have relevant experience in online & data security, solid communication skills and good understanding of ransomware attacks.

  1. Profile Picture

    John |President & Chief Forensic Examiner

    I was part of *****r which took down Cryptolocker and I run the Ransomware Working Group, a...

    2.3 Hours Later
  2. Profile Picture

    Raghavan |Principal

    I bring in SME expertise in malware security trends (trojan and ransomware) and have architected sec...

    4.3 Hours Later
  3. Profile Picture

    Anthony |Principal Consultant

    I am a software development professional with 20+ years in Med Device, Healthcare IT space. I held ...

    4.4 Hours Later
+17 Other Responses
Area Icon

Cyber Security In South Africa

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Shyam |CFO Advisor

    we are amidst investing in a South african Cyber training company and I am well versed and can disc...

    6.5 Hours Later
  2. Profile Picture

    Ramamurthy |Owner & CEO

    I am a Cyber Security specialist conducting IS audits, consultancy in IS Policy and other online sec...

    10.2 Hours Later
  3. Profile Picture

    Dr Venkat |Global Consultant

    I have some idea ,but need to work with one of our local partners in South Africa ...

    7.1 Days Later
+11 Other Responses
Area Icon

Cyber Security Software Solutions

Our client would like to speak with multiple it security decision-makers who are involved in purchasing cyber security software, solutions & services for their organization. They are aiming to better understand how businesses approach cybersecurity, the priorities and needs, and the types of solutions and services that they are currently using. This is a 1-hour paid web interview. If open to participating, please provide a brief answer to the screener below: how involved are you in making the decisions for it security? Please note that we are only interested in your personal point of view and are not seeking confidential information. Referrals are welcome.

  1. Profile Picture

    Vikas |Enterprise Architect

    Yes, I have expertise in cyber security software solutions...

    2.2 Hours Later
  2. Profile Picture

    Ben |Chief Information Security Officer

    CISO at *****f decision maker for IT security choices and spend...

    2.2 Hours Later
  3. Profile Picture

    Sam |Board Member & Chief Technology Officer

    I have extensive experience in selecting, procuring and implementing cyber security solution in larg...

    2.3 Hours Later
+59 Other Responses
Area Icon

Cyber-security In Pharma Mfg

We are looking for an expert with relevance experience in the field of cyber-security in manufacturing (specific focus on pharmaceutical and food industries). We seek expert insights on the following queries as below: 1. How can a manufacturer ensure security of data when operating using remote access? Please provide examples specific to industries mentioned above. 2. What are the best practices for data security with respect to data sharing via cloud? 3. Are there any regulations to ensure cyber data security in sensitive manufacturing operations? Experts with relevant experience, kindly contact us. Thanks!

  1. Profile Picture

    D. Chris |Information Technology Security Manager

    1. Encryption both end to end and the ***** is not specific to any industry as it is good pract...

    1.4 Hours Later
  2. Profile Picture

    Annamalai |Cybersecurity & Cloud Management/Migrati

    Here is what we are doing for a BioTech manufacturing Co. in WestCoast. (1) Just VPN won't do. Y...

    1.5 Hours Later
  3. Profile Picture

    Eric |

    I have 25+ years of cybersecurity experience and can answer your remote access and cloud sharing que...

    2.7 Hours Later
+21 Other Responses
Area Icon

Cybersecurity

Looking for a cyber security expert who can assist in evaluation early stage investments for an established vc.

  1. Profile Picture

    Jeffrey |Chief Intelligence Officer

    Ready for a consult as a small business in cyber security and intelligence ...

    4 Hours Later
  2. Profile Picture

    Johnathan |Information Security Analyst II

    Certified *****ems Security Professional (CISSP) here, ready to help *****ucts an...

    4.1 Hours Later
  3. Profile Picture

    Richard |Executive Chair

    Have done this often before for venture funds in US and Canada. Experience: - built and successfull...

    4.4 Hours Later
+35 Other Responses
See More Inquiries

Top Cybersecurity Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+