Affordably Source Cyberterrorism Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Cyberterrorism Inquiries

Area Icon

Cyber Security Landscape

Our multinational client is working on research about the cyber security landscape particularly on firmware/hardware — at the level of the business user’s machine vs. At the network or cloud level. They are interested in speaking with experts based on the criteria below: - us based expert certified by nist (national institute of standards and technology) - expert / entrepreneur in israel but who has a focus on firmware / hardware — at the level of the business user’s machine vs. At the network or cloud level. This will be for a 1-hour webcam interview. Please provide a brief response below as to your relevance in the space. 1. Can you share your background in the overall cybersecurity landscape? 2. Can you share a holistic view as to what components are in play on the it security landscape particularly in secured-core pcs?

  1. Profile Picture

    Naresh |Advisory Board

    I can discuss the current trends, such as Zero Trust Network, Software Defined Perimeter, convergenc...

    49 Minutes Later
  2. Profile Picture

    New |

    Hi, Currently ***** one of the leading MSSP, have in-depth expertise in all the cyber secu...

    21.4 Hours Later
  3. Profile Picture

    Omri |Global IT and cyber security Manager

    1. Can you share your background in the overall cybersecurity landscape? - Yes, Global IT Infrastruc...

    1.2 Days Later
+38 Other Responses
Area Icon

Cyber Security In South Africa

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Shyam |CFO Advisor

    we are amidst investing in a South african Cyber training company and I am well versed and can disc...

    6.5 Hours Later
  2. Profile Picture

    Ramamurthy |Owner & CEO

    I am a Cyber Security specialist conducting IS audits, consultancy in IS Policy and other online sec...

    10.2 Hours Later
  3. Profile Picture

    Dr Venkat |Global Consultant

    I have some idea ,but need to work with one of our local partners in South Africa ...

    7.1 Days Later
+11 Other Responses
Area Icon

Cyber Security Software Solutions

Our client would like to speak with multiple it security decision-makers who are involved in purchasing cyber security software, solutions & services for their organization. They are aiming to better understand how businesses approach cybersecurity, the priorities and needs, and the types of solutions and services that they are currently using. This is a 1-hour paid web interview. If open to participating, please provide a brief answer to the screener below: how involved are you in making the decisions for it security? Please note that we are only interested in your personal point of view and are not seeking confidential information. Referrals are welcome.

  1. Profile Picture

    Vikas |Agile Program Manager

    Yes, I have expertise in cyber security software solutions...

    1.2 Hours Later
  2. Profile Picture

    Ben |Chief Information Security Officer

    CISO at *****f decision maker for IT security choices and spend...

    1.2 Hours Later
  3. Profile Picture

    Sam |Board Member & Chief Technology Officer

    I have extensive experience in selecting, procuring and implementing cyber security solution in larg...

    1.3 Hours Later
+59 Other Responses
Area Icon

Machine Learning For Cyber Security

Our firm is looking to do multiple paid phone consults with customers/ prior customers of email security solution products such as abnormal security. We want to speak with experts who can share their insights on purchasing criteria, use case, pros and cons, and evaluation of other vendors in this space. This would be for a 1-hour paid phone consult. Please respond with a few short statements to the questions below. 1. Were you the person personally responsible for evaluating, selecting and implementing abnormal security? Please comment about the extent of your involvement in the decision-making process. 2. Can you speak to detail about email security solution, specifically, abnormal security? Please briefly elaborate 3. Who are the other vendors that you evaluated during your decision-making process? Please comment about other vendors you evaluated closely during your buying process. *** referrals will be highly appreciated.

  1. Profile Picture

    Anand |Managing Partner

    1. Were you the person personally responsible for evaluating, selecting and implementing Abnormal Se...

    15.1 Hours Later
  2. Profile Picture

    Sven |Co-Founder & CEO

    As a former CISO I can help. 1. Were you the person personally responsible for evaluating, selectin...

    23.2 Hours Later
  3. Profile Picture

    Ankit |Director

    This is my expertise area having more than 20 years exp in this space. We are current customers of A...

    2.6 Days Later
+13 Other Responses
Area Icon

Cybersecurity Pcap/intelligence

Role summary serve as a technical architect to perform security log, pcap/intelligence analysis and detect unknown threats and will work to perform analysis of current and future advanced persistent threats role description role will be working at a client to perform analysis of current and future advanced persistent threats • experience on advanced persistent threats (apt) based on evaluations of large quantities of information to formulate actionable information to improve the information network security. • possess experience with network intelligence gathering, incident analysis, reverse engineering of attacker methods, and analytical analysis of technical and non-technical indicators of intrusion, intelligence analysis supporting computer security. • current understanding of the latest software vulnerabilities, virus/malicious code and exploits, firewalls, intrusion detection systems, automated vulnerability scanning tools, or modeling and analysis techniques. • excellent analysis and verbal/written communication skills. • experience with ci databases, splunk / arcsight, vmware, sentinel, geolocation tools. • experience with pcap analysis and net flow analysis. Role requirements required skills cybersecurity cyber forensics pcap analysis wireshark years of experience 10+ years

  1. Profile Picture

    Russell |Analyst

    Russell Stover ***** ***** Dear Sir/Madam: I am interested in the position ...

    3 Hours Later
  2. Profile Picture

    Alexander |Strategist

    Hi, I am interested in submitting for this contract. My experience with Fusion Centers, Threat Inte...

    1.3 Days Later
  3. Profile Picture

    David |Zintro Expert

    From the description, I need a bit more *****t the role. Is this only a security-related ...

    1.3 Days Later
+8 Other Responses
Area Icon

Information And Cyber Security

We are looking for it professionals working in small and mid-sized companies to discuss issues with cyber security, specifically in how they deal with the threat of 'human error' among company employees.

  1. Profile Picture

    Wayne |Lead Advisor, Advisory Board

    I've been a SME CIO for years, and dealt with human error all along. I'm NOT a full-time security gu...

    1.8 Hours Later
  2. Profile Picture

    Ramamurthy |CEO

    With my experience in IT filed for the past 25+ years and with my specialty in cyber security (I am ...

    1.9 Hours Later
  3. Profile Picture

    Merritt |Zintro Expert

    I'm a double Harvard ***** expertise exactly in this area. Glad to provide more information....

    2.1 Hours Later
+11 Other Responses
Area Icon

It Security And Data Compliance

We are looking to speak with multiple decision-makers in compliance, it, or legal job functions that have influence over the adoption and purchase of communication/collaborations tools. Desired participants should recently adopted or considering encryption for their productivity/communication/collaboration software uses. This is for a paid 1 - hour web interview. Qualifying questions 1. How would you describe your level of influence in the decision to assess, evaluate, adopt, or purchase new organization/company communication/collaboration tools? By “communication and collaboration software” we mean software enabling real-time and asynchronous collaboration, meetings, instant messaging, file sharing, etc. Would you say you? A. I am the final decision-maker b. I share in the decision making c. I have some influence d. I have little to no influence e. We do not have any productivity and collaboration software **please note that we are only interested in your personal point of view and are not seeking confidential information. ***referrals are highly appreciated

  1. Profile Picture

    Mitch |Head of IT Operations and Technology

    I am the final decision-maker...

    32 Minutes Later
  2. Profile Picture

    Martyn |Chief Information Security Officer

    B. I sit on the IT leadership team of a FTSE 250 company and make joint decisions on these things. I...

    37 Minutes Later
  3. Profile Picture

    Ritesh |COO | Global Head of Digital Technology

    Being a tech leader for over two decades, led large *****uding leading banks / payment ...

    45 Minutes Later
+43 Other Responses
Area Icon

Security Intelligence

We are looking to speak to customers of exabeam. Exabeam is a security intelligence solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Some current customers of exabeam are adp, black rock, legg mason, barclays, td ameritrade, gap, levi’s, optiv, & ebay. We are looking for customers in the u.S. Only. The typical titles would be director/vp of security, director of soc, ciso etc. This would be for a 1 hour paid phone consultation.

  1. Profile Picture

    Russell |Analyst

    Fee negotiable...

    26 Minutes Later
  2. Profile Picture

    Anand |Managing Partner

    I am a practising security consultant. I hav ...

    10.5 Hours Later
  3. Profile Picture

    Gaurav |Pharmaceutical Quality Systems Consultan

    I have twenty years of Industry experience and knowledge and can help you with this *****...

    6.8 Days Later
+26 Other Responses
Area Icon

Cyber Security

Contribute to the zintro blog! i am an independent writer for zintro. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs. Your response may be used in an article that i will write and post on the zintro blog site. If your response is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary and provides you with a great marketing opportunity to get your name and expert opinion published. Here is a sample blog: http://blog.Zintro.Com/ question: from sony to lockheed martin to pbs, cyber attacks are on the rise and increasing in sophistication. Even the us government announced that a cyber attack by a foreign government constitutes an act of war. How can companies, governments, and institutions protect themselves? How will cyber security change to meet the rising threats? If you are interested, please send me your response via znotes in the next day or two. If you have any questions, please let me know. Thank you. Maureen aylward

  1. Profile Picture

    James |President

    You cannot keep out a determined hacker. The biggest threat to security is between the keyboard and ...

    29 Minutes Later
  2. Profile Picture

    Ricardo |Co-Founder & CTO / Principal Information

    Hi Maureen, I've got another similar message from you but unfortunately I was out and was unable to...

    34 Minutes Later
  3. Profile Picture

    Hadi |Head of Security Strategy & GRC

    Hi, I am interested in helping you write the article and can input into this based on my experience ...

    1.5 Hours Later
+22 Other Responses
Area Icon

It Security Analysis And Operations

We are looking to speak with 5-8 security operations and security analysts it staff in fortune 500 organizations, people responsible for acting on indicators of attack or compromise and investigating out cyber attacks in their organization. The ideal industries of focus will be financial services (investment banks, insurance, large retail/comm banks) & healthcare (insurers, hospitals). Thank you.

  1. Profile Picture

    Patricio |IT Global Leader

    I am interested in ***** this phone consult. I am an experienced IT Security Assistant Di...

    23 Minutes Later
  2. Profile Picture

    John |Senior

    I am interested in this position....

    3.4 Hours Later
  3. Profile Picture

    David |Technical Director - Consulting

    My expertise is not in IT security - it is in development of secure products; hardware and software....

    4.3 Hours Later
+9 Other Responses
Area Icon

It Security Solution Resellers In Europe

Eu resellers of it network security solutions in europe i work for a prominent expert network working in partnership with zintro. We would like to source multiple experts on behalf of an institutional investor. Specifically, we are looking for the following type of expert: our client would like to speak with resellers of network it security solutions within europe. Please respond back with your current/ recent employment history, contact info, or linkedin profile for reference.

  1. Profile Picture

    Lee |Consultant/Owner

    Hi, I am an Infrastructure consultant specializing in VMware vSphere and *****rity solution....

    48 Minutes Later
  2. Profile Picture

    Sergey |Systems Engineer

    Hello, I'm an IT consultant specializing in Exchange/Office365/Microsoft/Azure/Virtuzalition in Cana...

    1.6 Hours Later
  3. Profile Picture

    Paul |Sr. Information Security Manager

    I'm in the USA...

    2.7 Hours Later
+6 Other Responses
Area Icon

Hr Financial And Cyber Security

Hello!   we are a global market research firm, currently looking for experts who can assist us gain a detailed understanding of the ”consulting market in us” with focus on following a)      hr consulting b)      financial consulting c)       cyber security consulting   list of requirements: ·         market size & growth (*only for financial consulting) ·         segmentation on the basis of services and end-use (*only for financial consulting)   ·         top suppliers (mainstream and diverse) and their market share (hr, financial & cyber security) ·         % contribution of supplier diversity on the overall spend  (hr, financial & cyber security) ·         are there any barriers in leveraging diverse suppliers? (hr, financial & cyber security) ·         case studies of leading banking & financial institutions using diverse suppliers for consulting services (hr, financial & cyber security) ·         leading sourcing practices - how leading companies source these categories? (engagement model, partnerships/supplier relationships, contract structures etc.) - (hr, financial & cyber security)   the main focus of our study is to identify diverse suppliers (minority-owned, women owned, veteran owned, lgbt-owned, service disabled veteran owned) in this space. We would like to engage via phone consult with experts knowledgeable about consulting service providers. Ideal candidates should have deep knowledge of industry trends and practices, key suppliers, industry partnerships, best practices etc.   we are looking for a phone consult to discuss the points mentioned above. Kindly drop in a note with your cv/relevant experience in the consulting industry, if you are interested to proceed.   best regards, thomas

  1. Profile Picture

    Shaun |Vice President

    Hi We have completed a similar project recently. Please share further details. Thanks Shaun...

    9.7 Hours Later
  2. Profile Picture

    Shyam |CFO Advisor

    Deep knowledge within HR Financial and cyber consultuing space and can assist...

    12.4 Hours Later
  3. Profile Picture

    Gautam |HR Expert

    Dear sir, I am intersted to join. Gautam Chaudhury *****...

    14 Hours Later
+14 Other Responses
See More Inquiries

Top Cyberterrorism Experts

See More Experts