Anonymous Hacker Arrests
“anonymous” hacker arrests
the zintro blog needs you!
i write the zintro blog. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. If it is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary (there is no payment involved).
Question: what does the recent news that several members of the hacker group “anonymous” have been arrested mean to the future of internet security?
This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/
if you are interested, please send me your response via znotes in the next day or two. Include your full name. If you have any questions, please let me know.
maureen aylward+10 Other Responses
It Security Solution Resellers In Europe
Eu resellers of it network security solutions in europe
i work for a prominent expert network working in partnership with zintro. We would like to source multiple experts on behalf of an institutional investor.
Specifically, we are looking for the following type of expert:
our client would like to speak with resellers of network it security solutions within europe.
Please respond back with your current/ recent employment history, contact info, or linkedin profile for reference.+6 Other Responses
Cyber Security Landscape
Our multinational client is working on research about the cyber security landscape particularly on firmware/hardware — at the level of the business user’s machine vs. At the network or cloud level. They are interested in speaking with experts based on the criteria below:
- us based expert certified by nist (national institute of standards and technology)
- expert / entrepreneur in israel but who has a focus on firmware / hardware — at the level of the business user’s machine vs. At the network or cloud level.
This will be for a 1-hour webcam interview. Please provide a brief response below as to your relevance in the space.
1. Can you share your background in the overall cybersecurity landscape?
2. Can you share a holistic view as to what components are in play on the it security landscape particularly in secured-core pcs?
+38 Other Responses
hope you are doing well !!
we have an opportunity for endpoint security engineer with one of our clients in savannah, ga
please see the job details below and let me know if you would be interested in this role.
if interested, please send me a copy of your resume, your contact details, your availability and a good time to connect with you.
Title: endpoint security engineer
location: savannah, ga
job description - (endpoint security (level-2):
should have minimum 6+ years of experience in information security- endpoint security
should have good understanding on information security concepts
must have managed and have strong knowledge on following products:
sophos endpoint protection suite
sophos/ utimaco safeguard encryption
sophos log writer
sophos reporting interface
sophos port auditor
mcafee epolicy orchestrator
mcafee viruscan enterprise for storage
tenable nessus security center v5.0
should have good knowledge of configuring policies for hips, personal firewall, device & port control, data loss protection components of sophos endpoint protection suite.
Very good experience with antivirus technology, experience in handling virus outbreaks, malware cleanup, policy creation, signature update & reporting.
Should have strong knowledge on full disk encryption technology
should be willing to work in rotational shifts
excellent communication and conversation skills
strong analytical and problem solving skills
good documentation skills
should have a great customer handling skills
experience with antivirus solutions across multiple operating systems
powershell scripting experience a plus
+3 Other Responses