Connect with Cyberterrorism Experts for your Project, Phone Consult or Job

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here

Zintro does not display, sell or trade e-mail addresses

An eye iconForgot password?
Submit Inquiry

By clicking Submit Inquiry you agree to our TermsVIEW

or Request Pricing Information

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Cyberterrorism Inquiries

Area Icon

Cybersecurity Pcap/intelligence

Role summary serve as a technical architect to perform security log, pcap/intelligence analysis and detect unknown threats and will work to perform analysis of current and future advanced persistent threats role description role will be working at a client to perform analysis of current and future advanced persistent threats • experience on advanced persistent threats (apt) based on evaluations of large quantities of information to formulate actionable information to improve the information network security. • possess experience with network intelligence gathering, incident analysis, reverse engineering of attacker methods, and analytical analysis of technical and non-technical indicators of intrusion, intelligence analysis supporting computer security. • current understanding of the latest software vulnerabilities, virus/malicious code and exploits, firewalls, intrusion detection systems, automated vulnerability scanning tools, or modeling and analysis techniques. • excellent analysis and verbal/written communication skills. • experience with ci databases, splunk / arcsight, vmware, sentinel, geolocation tools. • experience with pcap analysis and net flow analysis. Role requirements required skills cybersecurity cyber forensics pcap analysis wireshark years of experience 10+ years

  1. Profile Picture

    Russell |Analyst

    Russell Stover ***** ***** Dear Sir/Madam: I am interested in the position ...

    3 Hours Later
  2. Profile Picture

    Alexander |Strategist

    Hi, I am interested in submitting for this contract. My experience with Fusion Centers, Threat Inte...

    1.3 Days Later
  3. Profile Picture

    David |Zintro Expert

    From the description, I need a bit more *****t the role. Is this only a security-related ...

    1.3 Days Later
+8 Other Responses
Area Icon

Information And Cyber Security

We are looking for it professionals working in small and mid-sized companies to discuss issues with cyber security, specifically in how they deal with the threat of 'human error' among company employees.

  1. Profile Picture

    Wayne |CDO

    I've been a SME CIO for years, and dealt with human error all along. I'm NOT a full-time security gu...

    1.8 Hours Later
  2. Profile Picture

    Ramamurthy |CEO

    With my experience in IT filed for the past 25+ years and with my specialty in cyber security (I am ...

    1.9 Hours Later
  3. Profile Picture

    Merritt |Zintro Expert

    I'm a double Harvard ***** expertise exactly in this area. Glad to provide more information....

    2.1 Hours Later
+11 Other Responses
Area Icon

Machine Learning For Cyber Security

Our firm is looking to do multiple paid phone consults with customers/ prior customers of email security solution products such as abnormal security. We want to speak with experts who can share their insights on purchasing criteria, use case, pros and cons, and evaluation of other vendors in this space. This would be for a 1-hour paid phone consult. Please respond with a few short statements to the questions below. 1. Were you the person personally responsible for evaluating, selecting and implementing abnormal security? Please comment about the extent of your involvement in the decision-making process. 2. Can you speak to detail about email security solution, specifically, abnormal security? Please briefly elaborate 3. Who are the other vendors that you evaluated during your decision-making process? Please comment about other vendors you evaluated closely during your buying process. *** referrals will be highly appreciated.

  1. Profile Picture

    Anand |Co-Founder

    1. Were you the person personally responsible for evaluating, selecting and implementing Abnormal Se...

    15.1 Hours Later
  2. Profile Picture

    Sven |Co-Founder & CEO

    As a former CISO I can help. 1. Were you the person personally responsible for evaluating, selectin...

    23.2 Hours Later
  3. Profile Picture

    Ankit |Director

    This is my expertise area having more than 20 years exp in this space. We are current customers of A...

    2.6 Days Later
+13 Other Responses
Area Icon

Network Security Testing Market

We are a well established investment firm based in the us. We're looking to do some market research in the penetration testing space and would like to speak to people who have assessed, purchased, or used vendors such as core security, cigital, netspi or digital defense. We’d prefer to speak to those in the financial or retail verticals if possible. Below are some questions to ask prospective experts to help us select the ones we’d like to engage with: 1. Are you a key decision maker who manages or oversees penetration testing? 2. Do your penetration testing needs focus more around network security or application security, or both? 3. Have you chosen to utilize a penetration testing service such as core security, cigital, netspi or digital defense? 4. Please state your current title and employer. Thank you.

  1. Profile Picture

    Richard |Executive Chair

    I've sponsored and purchased both network *****ing and *****rity assessment s...

    8.3 Hours Later
  2. Profile Picture

    Anand |Co-Founder

    Have been a decision maker for the *****ing for many of the customers. Have worked with C...

    10.7 Hours Later
  3. Profile Picture

    John |Director, IT Security & Controls

    As the CISO for a publicly traded global medical devi ce manufacturer, I'm the key decision maker an...

    4.7 Days Later
+11 Other Responses
Area Icon

Cyber Security

Contribute to the zintro blog! i am an independent writer for zintro. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs. Your response may be used in an article that i will write and post on the zintro blog site. If your response is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary and provides you with a great marketing opportunity to get your name and expert opinion published. Here is a sample blog: http://blog.Zintro.Com/ question: from sony to lockheed martin to pbs, cyber attacks are on the rise and increasing in sophistication. Even the us government announced that a cyber attack by a foreign government constitutes an act of war. How can companies, governments, and institutions protect themselves? How will cyber security change to meet the rising threats? If you are interested, please send me your response via znotes in the next day or two. If you have any questions, please let me know. Thank you. Maureen aylward

  1. Profile Picture

    James |President

    You cannot keep out a determined hacker. The biggest threat to security is between the keyboard and ...

    29 Minutes Later
  2. Profile Picture

    Ricardo |Co-Founder & CTO / Principal Information

    Hi Maureen, I've got another similar message from you but unfortunately I was out and was unable to...

    34 Minutes Later
  3. Profile Picture

    Hadi |Head of Security Strategy & GRC

    Hi, I am interested in helping you write the article and can input into this based on my experience ...

    1.5 Hours Later
+22 Other Responses
Area Icon

It Security Analysis And Operations

We are looking to speak with 5-8 security operations and security analysts it staff in fortune 500 organizations, people responsible for acting on indicators of attack or compromise and investigating out cyber attacks in their organization. The ideal industries of focus will be financial services (investment banks, insurance, large retail/comm banks) & healthcare (insurers, hospitals). Thank you.

  1. Profile Picture

    Patricio |IT Global Leader

    I am interested in ***** this phone consult. I am an experienced IT Security Assistant Di...

    23 Minutes Later
  2. Profile Picture

    Delyan |Senior IT Security Analyst

    I am interested in this position....

    3.4 Hours Later
  3. Profile Picture

    David |Technical Director - Consulting

    My expertise is not in IT security - it is in development of secure products; hardware and software....

    4.3 Hours Later
+9 Other Responses
Area Icon

Security Intelligence

We are looking to speak to customers of exabeam. Exabeam is a security intelligence solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Some current customers of exabeam are adp, black rock, legg mason, barclays, td ameritrade, gap, levi’s, optiv, & ebay. We are looking for customers in the u.S. Only. The typical titles would be director/vp of security, director of soc, ciso etc. This would be for a 1 hour paid phone consultation.

  1. Profile Picture

    Russell |Analyst

    Fee negotiable...

    26 Minutes Later
  2. Profile Picture

    Anand |Co-Founder

    I am a practising security consultant. I hav ...

    10.5 Hours Later
  3. Profile Picture

    Gaurav |Pharmaceutical Quality Systems Consultan

    I have twenty years of Industry experience and knowledge and can help you with this *****...

    6.8 Days Later
+26 Other Responses
Area Icon

Network Security Msp

Looking for insight and perspective as to best practices and kpi metrics for the managed service provider space focused on network security. Specifically what kpis drive valuation and current market multiples applied managed service revenues (recurring), professional service revenue (1x or project based work), and hardware associated revenue (pass-through).

  1. Profile Picture

    Bobby |Sr. System Engineer and Technology Solut

    Hello, I think the project description needs some *****, especially the target market. Layo...

    6.6 Hours Later
  2. Profile Picture

    Anand |Co-Founder

    Worked in Verizon as technology head and managed Network security for fortune companies. The KPI's ...

    15.7 Hours Later
  3. Profile Picture

    Simon |Security Consultant

    Hi, Largely depends on what you are trying to do. There are a number of KPIs that can be put in p...

    16.9 Hours Later
+7 Other Responses
Area Icon

Cyber Security In South Africa

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Shyam |CFO Advisor

    we are amidst investing in a South african Cyber training company and I am well versed and can disc...

    6.5 Hours Later
  2. Profile Picture

    Ramamurthy |Owner & CEO

    I am a Cyber Security specialist conducting IS audits, consultancy in IS Policy and other online sec...

    10.2 Hours Later
  3. Profile Picture

    Dr Venkat |Global Consultant

    I have some idea ,but need to work with one of our local partners in South Africa ...

    7.1 Days Later
+11 Other Responses
Area Icon

It Security Solution Resellers In Europe

Eu resellers of it network security solutions in europe i work for a prominent expert network working in partnership with zintro. We would like to source multiple experts on behalf of an institutional investor. Specifically, we are looking for the following type of expert: our client would like to speak with resellers of network it security solutions within europe. Please respond back with your current/ recent employment history, contact info, or linkedin profile for reference.

  1. Profile Picture

    Lee |Consultant/Owner

    Hi, I am an Infrastructure consultant specializing in VMware vSphere and *****rity solution....

    48 Minutes Later
  2. Profile Picture

    Sergey |Systems Engineer

    Hello, I'm an IT consultant specializing in Exchange/Office365/Microsoft/Azure/Virtuzalition in Cana...

    1.6 Hours Later
  3. Profile Picture

    Paul |Sr. Information Security Manager

    I'm in the USA...

    2.7 Hours Later
+6 Other Responses
Area Icon

Hr Financial And Cyber Security

Hello!   we are a global market research firm, currently looking for experts who can assist us gain a detailed understanding of the ”consulting market in us” with focus on following a)      hr consulting b)      financial consulting c)       cyber security consulting   list of requirements: ·         market size & growth (*only for financial consulting) ·         segmentation on the basis of services and end-use (*only for financial consulting)   ·         top suppliers (mainstream and diverse) and their market share (hr, financial & cyber security) ·         % contribution of supplier diversity on the overall spend  (hr, financial & cyber security) ·         are there any barriers in leveraging diverse suppliers? (hr, financial & cyber security) ·         case studies of leading banking & financial institutions using diverse suppliers for consulting services (hr, financial & cyber security) ·         leading sourcing practices - how leading companies source these categories? (engagement model, partnerships/supplier relationships, contract structures etc.) - (hr, financial & cyber security)   the main focus of our study is to identify diverse suppliers (minority-owned, women owned, veteran owned, lgbt-owned, service disabled veteran owned) in this space. We would like to engage via phone consult with experts knowledgeable about consulting service providers. Ideal candidates should have deep knowledge of industry trends and practices, key suppliers, industry partnerships, best practices etc.   we are looking for a phone consult to discuss the points mentioned above. Kindly drop in a note with your cv/relevant experience in the consulting industry, if you are interested to proceed.   best regards, thomas

  1. Profile Picture

    Shaun |Vice President

    Hi We have completed a similar project recently. Please share further details. Thanks Shaun...

    9.7 Hours Later
  2. Profile Picture

    Shyam |CFO Advisor

    Deep knowledge within HR Financial and cyber consultuing space and can assist...

    12.4 Hours Later
  3. Profile Picture

    Gautam |HR Expert

    Dear sir, I am intersted to join. Gautam Chaudhury *****...

    14 Hours Later
+14 Other Responses
Area Icon

Security Policy Orchestration

Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required. Preferably looking for us based candidates. Experts should know the us market in this area well, the different solutions available, have a good understanding of large enterprises need for such a solution, along with the key market risks and threats for these vendors.

  1. Profile Picture

    Aaron |Zintro Expert

    Depending on your specific questions, I would love to help. Let me know if you'd like to set up a ca...

    3.5 Hours Later
  2. Profile Picture

    Scottard |Executive Security Strategist

    Hi, Saw your inquiry, I would like to assist you. I have over 20 years writing and automating s...

    3.5 Hours Later
  3. Profile Picture

    Ubaid |Expert Senior Consultant

    Hi, I can help you, I have more than 10 years of experiences in *****rity , technical sec...

    3.9 Hours Later
+19 Other Responses
See More Inquiries

Top Cyberterrorism Experts

See More Experts