Affordably Source Denial Of Service (dos) Attacks Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Denial Of Service (dos) Attacks Inquiries

Area Icon

Avi Networks' Modern Load Balancing

We are looking for a customer who is using avi networks’ modern load . We are interested in an it manager who manages infrastructure (branch locations, routers, and links per branch, by type) as well as any other relevant metrics or information. This is a paid 1-hour phone consultation for $250. Please provide a brief answer as to your relevance to the space below: 1. Do you use avi networks’ modern load balancing or nsx advanced load balancers? If so, how long have you been using it? 2. Can you speak about your expectations and challenges working with the solution? 3. Can you discuss the overall benefits, especially in regard to infrastructure simplification, reduction in downtime (if any), and business outcomes, as a result of implementation?

  1. Profile Picture

    Anand |Managing Partner

    1. We are usign for NSX advanced load balancers. For last 10 months 2. Yes can help in the challenge...

    2.6 Days Later
  2. Profile Picture

    Paul |Director

    Sorry, I wouldn't be a good fit for this. I don't use AVI and I don't manage infrastructure....

    2.6 Days Later
  3. Profile Picture

    Lakshmi Chandrakanth |Specialist Technical Consultant

    I dont work with AVI LBs. However I work with F5 and AWS ELBs. I have a good experience in that. ...

    2.7 Days Later
+5 Other Responses
Area Icon

Web Architecture Software

We are looking to speak to paid commercial customers of nginx (not the free open source version). We are only looking to speak to paying fortune 1000 customers at this time. Nginx enables high-performance web architectures to improve user experience, without incurring unnecessary costs in capital or time.This would be for a 1 hour paid consultation. Please respond with your answers to the questions below with a few availability windows for a paid phone consult;1. Were you the person personally responsible for evaluating, selecting and implementing nginx at your organization? Please comment on the extent of your involvement in the decision-making process.2. Can you speak to detail about nginx features/functionality? Please comment on your use of nginx.3. Who else did you evaluate besides nginx during your decision-making process? Please comment about other vendors you evaluated closely during your buying process.

  1. Profile Picture

    Vinay |Vice President

    Tom - happy to help share my knowledge...

    17.4 Hours Later
  2. Profile Picture

    Rick |Manager, IT Infrastructure

    Sure. • Design training and development programs for staff • Responsible for *****ork inf...

    18.8 Hours Later
  3. Profile Picture

    Mike |Associate Director

    I would definitely be interested....

    19.8 Hours Later
+19 Other Responses
Area Icon

It Security Analysis And Operations

We are looking to speak with 5-8 security operations and security analysts it staff in fortune 500 organizations, people responsible for acting on indicators of attack or compromise and investigating out cyber attacks in their organization. The ideal industries of focus will be financial services (investment banks, insurance, large retail/comm banks) & healthcare (insurers, hospitals). Thank you.

  1. Profile Picture

    Patricio |IT Global Leader

    I am interested in ***** this phone consult. I am an experienced IT Security Assistant Di...

    23 Minutes Later
  2. Profile Picture

    John |Senior

    I am interested in this position....

    3.4 Hours Later
  3. Profile Picture

    David |Technical Director - Consulting

    My expertise is not in IT security - it is in development of secure products; hardware and software....

    4.3 Hours Later
+9 Other Responses
Area Icon

Sql Dba

Local candidate or willing to relocate on their own. Duties include installation, configuration, integration, administration and troubleshooting of microsoft sql server database servers, infrastructure, and databases. Responsibilities: - build and support sql server systems and databases. Provide database change management services in support of customer initiatives. - administer sql server database servers on a day-to-day basis. - actively participate in, and in most cases lead troubleshooting, configuration and administrative efforts. - plan for infrastructure and operational changes such as sql server upgrades, code migrations, and applications/infrastructure upgrades. - configure, manage and troubleshoot sql server log shipping, transactional and merge replication. - troubleshoot database performance problems. Analyze performance to isolate problems. Resolve issues to restore service and maintain optimal performance. - manage support desk ticket queues and application requests. - setup of maintenance plans, scheduled jobs, etc. For sql server instances. Requirements and qualifications: - minimum 10 years industry experience systems in a 24x7 enterprise environment including at least 5 years experience supporting microsoft sql server. - expert level experience installing, configuring, managing, backup/recovery, disaster recovery, and troubleshooting microsoft sql server 2000, 2005, and 2008. - experience with microsoft windows server 2003 and 2008 high availability clustering, networking, enterprise storage systems, directory services, application and infrastructure monitoring, and server virtualization. - significant experience with sql server log shipping, transactional and/or merge replication implementations. - experience designing relational database objects such as tables, stored procedures, triggers, and ssis packages. - experience with isolation levels, locks, sql server performance tuning, and optimization. - experience with capacity planning, benchmarking, load testing, scaling, and load balancing desired. - experience with open-source databases such as mysql, postgresql a plus. - bachelor’s degree, preferably in a technical discipline, is required. Microsoft certified it professional or other industry certifications a plus. - candidates must thrive in a 24x7 environment and be available for after hours support. - excellent oral and written communication skills and the ability to work effectively across a diverse team. - candidates must be proactive, innovative, collaborative, and driven to achieve desired results.

  1. Profile Picture

    Abi |SQL Server DBA

    Hello, i am interested in this and let me know if it can be done remote. I am looking for a remote D...

    7.9 Hours Later
  2. Profile Picture

    Carl |Dir

    Why was I selected for this assignment as a potential match? Carl...

    11.8 Hours Later
  3. Profile Picture

    Azhar |Database Administrator

    Hi, I am interested in the position, I have experience of about 7 years in the said field and I am l...

    1.6 Days Later
+6 Other Responses
Area Icon

Wireless Network Security

Expert in wireless network security project on wireless intrusion prevention system design and build up.

  1. Profile Picture

    Jeff |General Manager

    I have not been an expert witness before but I am a wireless expert. I engineer wired and wireless n...

    2.4 Hours Later
  2. Profile Picture

    Andre |Managing Director

    Am interested in your request, specifically to whether this a commerical environment or must conform...

    7.8 Hours Later
  3. Profile Picture


    I have completed several wireless projects, on cisco equipment, kindly if you can send me details fo...

    19.5 Hours Later
+4 Other Responses
Area Icon


I've setup snort on windows server 2012 but my rules don't seem to work. I've tried a test rule which logs everything and this worked fine. But when i attack the system with a nmap port scan or a dos attack with loic this doesn't get logged. Can you help me setup snort so it logs dos and ddos attacks?

  1. Profile Picture

    Dennis |President

    tree frog enter prises...

    3.8 Hours Later
  2. Profile Picture

    Mehrdad |Founder/Principal Senior Consultant

    Hello, As your technology consultant provider, we believe our success depends on the ability to prov...

    4.3 Days Later
+4 Other Responses
Area Icon

Vpn Infrasctructure

We are developing a commercial vpn product which will be launched on google and apple app stores. We are looking for someone who can help us design the vpn infrastructure which can handle tens of thousands of users in most cost effective way. We are fine with the client end (google and android apps) but need guidance on server end. We would expect answers to all areas of infrastructure like choice of vps server provider, load balancing, security etc. If you have previous experience of working on network infrastructure of any existing commercial product then that will be a big plus.

  1. Profile Picture

    Mark |Technical Expert

    Sorry, my area of expertise is optics, scanners and precision mechanics. This project is out of my s...

    11.3 Hours Later
  2. Profile Picture

    Md Probal |Network Engineer

    Well, I would advise you to go for Amazon EC2 for server hosting with their DNS hosting from route53...

    1 Day Later
  3. Profile Picture

    Peter |Zintro Expert

    Dear Sirs, I have programmers who can address your needs. However, I would need more details to figu...

    1.2 Days Later
+4 Other Responses
Area Icon

Network Architecture

Senior network architect - must have experience leading a team! we currently have an opening with our client for network architect contract position - yonkers. The position is a 6 month contract position. A partial job description is below. If you are interested please let me know. This is a very high level architect position and candidate will be thoroughly screened. Position description: the senior expert in field of technology and business. Provides guidance to team or department and is an internal consultant to other teams within the organization. Provide expertise on design and planning. Perform system and problem analysis to develop solutions for new systems requirements or enhancements to existing systems. Address problem analysis, review the proposed solutions, and recommend joint problem resolution and review. Work with project managers to assist in the project planning process. May be required to lead teams and function as a project manager. Lead teams and provides direction, ensuring projects are on track and are not delayed by technical issues. Work closely and coordinate with internal management on project actions and recommendations. Provide timely, effective, and professional customer support. Communicate with client management on issues and ensure problem resolutions. May participate in on-call support. The chief technical architect designates the it architect as a member of the technical architecture team. Required skills: - designs and coordinates the implementation of the company’s internet perimeter infrastructure, including firewalls, bgp routing, dmz network monitoring. - design vpn(ipsec, sslvpn, l2l tunnels) configurations and implement them throughout the corporation. - design and development on internet infrastructure solutions that are highly available and support business continuity requirements. - design and development of network load balancing solutions. - technical knowledge of checkpoint and cisco firewalls. - technical knowledge of vpn/remote access solutions. - technical knowledge of cisco routing and switching

  1. Profile Picture

    Ilham |DGM - IT Delivery Management

    Dear, From my earlier experience till now, I got broader and wider technical and business perspecti...

    21.8 Hours Later
  2. Profile Picture

    balaji |CTO

    Hi Contact me I have 16+years of ISP and *****re experience, i can help you....

    22.5 Hours Later
+2 Other Responses
Area Icon


Configure load balancing for http & https. Need to have 3 servers running to process load and need to have session persistence maintained

  1. Profile Picture

    Zainal |Regional Operation Director

    let me know if its available is it hardwared LB or Software?...

    4.7 Days Later
+1 Other Responses
Area Icon

Cyber Security

Contribute to the zintro blog! i am an independent writer for zintro. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs. Your response may be used in an article that i will write and post on the zintro blog site. If your response is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary and provides you with a great marketing opportunity to get your name and expert opinion published. Here is a sample blog: http://blog.Zintro.Com/ question: from sony to lockheed martin to pbs, cyber attacks are on the rise and increasing in sophistication. Even the us government announced that a cyber attack by a foreign government constitutes an act of war. How can companies, governments, and institutions protect themselves? How will cyber security change to meet the rising threats? If you are interested, please send me your response via znotes in the next day or two. If you have any questions, please let me know. Thank you. Maureen aylward

  1. Profile Picture

    James |President

    You cannot keep out a determined hacker. The biggest threat to security is between the keyboard and ...

    1.5 Hours Later
  2. Profile Picture

    Ricardo |Co-Founder & CTO / Principal Information

    Hi Maureen, I've got another similar message from you but unfortunately I was out and was unable to...

    1.6 Hours Later
  3. Profile Picture

    Hadi |Head of Security Strategy & GRC

    Hi, I am interested in helping you write the article and can input into this based on my experience ...

    2.5 Hours Later
+22 Other Responses
Area Icon

Network Architecture

We have an opportunity for a network architect for one of our clients in miami, fl / teaneck, nj. Please see the job details below and let me know via zintro if you would be interested in this role and your availability for the initial interview. ​title: network architect location: miami, fl / teaneck, nj terms: contract / contract to hire / fulltime job details: essential experience: (must have skills) ccie with 10+ years of experience preffered. Cisco wifi (wcs, mse, 802.11n, wips, etc…) tipping point ips 400/600 cisco blade center 3020 switches and strong experience with hp 7000 enclosure configuration and overall architecture strong cisco routing, switching, load balancing and asa/pix firewalling experience f5 big-ip 8800 load balancers juniper as 4500 ssl vpn appliances websense v10000 appliances juniper sbr (steel belted radius) trend micro virus walls wireshark/sniffer ability to be available on-call 24x7 every other week and respond within 15 minutes. That includes weekend and holidays responsible for architecting and driving the tactical implementation and support of all network and telecommunications hardware, software and related equipment in an environment requiring 24x7x365 (1.) incident management + change management (planning & execution) on - call escalation ticket quality process adherence & security compliance customer feedback ( appreciations, csat survey results) kb preparation and review, knowlegde sharing & documentation root cause analysis / problem management + capicity / architectural management sla compliance for tickets value add training / mentoring

  1. Profile Picture

    AuroSys |COO

    Hello, We are a New York based leader in technology services and professionals and we have served c...

    5.7 Hours Later
  2. Profile Picture

    Tejaskumar |Network and System Consultant, business,

    Yes I can help you with this as I have experience of setting up network infrastructure for big organ...

    14.3 Hours Later
+2 Other Responses
Area Icon

Mobile Security

The target of the security team is to improve the security of terminal products and to reduce vulnerabilities; therefore we are at the moment transforming into agile lean procedures. Requirements qualifications: 8+ years work (rd) experience within well known terminal industry 5+ years experience in security audits, vulnerability assessment and penetration testing; familiar with terminal product architecture, operating systems, and security features, android is preferred.
 Familiar with one of the security technology such as: trustzone, drm, mobile payment security and byod security.
 Prior experience in handling penetration testing on mobile network, o/s , apps; understand the general methods used to attack terminal, including jailbreaking, rooting, sidejacking, and web application attacks
ability to conduct security assessment for mobile apps, web services / apis (wp8 android)
 ability to cooperate with a team of international experts including marketing, rd and standardization

  1. Profile Picture

    Brent |CEO

    Is this a contract position or full time? Myself and my team have these experiences, but we are only...

    1.2 Hours Later
  2. Profile Picture

    Sam |Technology Consultant & Strategist

    Dear Sir/Madam: I saw your inquiry regarding Mobile Security experts. I was the VP of Engineering ...

    1.2 Hours Later
  3. Profile Picture

    Shridhar |Director

    hi, We can work on this project successfully. we have served client in US, and middle east governmen...

    2.6 Hours Later
+3 Other Responses
See More Inquiries

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even DNS root servers. One common method of attack involves saturating the target (victim) machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. Denial-of-service attacks are considered violations of the IAB's Internet Proper Use Policy. They also commonly constitute violations of the laws of individual nations.[1]

Top Denial Of Service (dos) Attacks Experts

See More Experts