Affordably Source Malware Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Malware Inquiries

Area Icon

Anti-malware

Exploit reported by google adwords bots - appears to be changing quickly all the time. Malware. Domain suspended in adwords. Our pages are being redirected and we cannot figure out how to fix the problem.

  1. Profile Picture

    Narendra |Director

    We are a consulting company in Cyber Security... m not clear as to what problem you are facing, plea...

    1.4 Days Later
  2. Profile Picture

    sheik |security analyst

    find the malware code and remove it! As per the google adwords or adsense policy, they won't pay if...

    1.5 Days Later
+3 Other Responses
Area Icon

Public Speaking

Hello, i am looking for a industry expert to conduct a 2 day in person seminar based out of usa. Should have a minimum experience of 25-30 years and should have extensive public speaking experience. Should be able to cover few or most of the below topics: 1. Data breach response presentation 2. Data breach media response templates review 3. Law enforcement notification and liaison – who does what? 4. Cyber crime – exactly who are the bad guys and what are they looking for? 5. Cyber risk assessments – preach prevention first 6. Continuous monitoring of entire eco-system (outsource or in-house?) 7. Security operations design 8. Cyber policy review recommendations and re-design 9. Penetration testing – what should you be looking at? 10. 24/7 continuous monitoring and vulnerability scanning 11. Third party cyber audits and reviews 12. Data breach remediation 13. Identity theft guidelines, phi identification, credit monitoring and resolution 14. Cyber crime investigations 15. Computer forensics 16. Data breach incident response teams (internal/external) 17. Malware and advanced persistent threat detection 18. Data breach notifications – a timeline of events 19. Data breach notification letters to customers and regulators 20. Cyber due diligence 21. Insider threat - defend against both internal and external exposure 22. Digital fraud management reviews 23. Identify evidence, chain of custody, legal and regulatory obligation consulting

  1. Profile Picture

    Brent |CEO

    I'd be interested in hearing more about the specific needs of the engagement. Particularly, timing a...

    1 Hour Later
  2. Profile Picture

    Cyber |IT Security Analyst Consultant

    I can assist. Please provide additional details as to the 2-day seminar outline and the general ter...

    1.2 Hours Later
  3. Profile Picture

    Darko |Sales professional, Coach

    I am really sorry, but I do not have experience for the .... *****s of Expertise: data b...

    1.4 Hours Later
+12 Other Responses
Area Icon

Malwarebytes

I want to create a package with malwarebytes 2.1.6.1002 with sccm server 2012. I will need to know the command line, uninstall path, how to change detection path, how to put product id and key. Also un-check auto updates and user notification. Could you please help me with this. I really need help. Thank you mohammed

  1. Profile Picture

    David |Consultant

    Mohammed Are you using the *****l in SCCM or plain packages?...

    12.2 Hours Later
  2. Profile Picture

    Joshua |CEO

    Mohammed, Good morning. I have packaged this program for deployment via SCCM 2012 R2. I have ...

    1.7 Days Later
+2 Other Responses
Area Icon

Information Security

Hi consultant, hope you are doing well !! we have an opportunity for endpoint security engineer with one of our clients in savannah, ga please see the job details below and let me know if you would be interested in this role.  if interested, please send me a copy of your resume, your contact details, your availability and a good time to connect with you. Title: endpoint security engineer location: savannah, ga terms: contract job details: job description - (endpoint security (level-2): should have minimum 6+ years of experience in information security- endpoint security  should have good understanding on information security concepts  must have managed and have strong knowledge on following products: sophos endpoint protection suite sophos/ utimaco safeguard encryption sophos log writer sophos reporting interface sophos port auditor mcafee epolicy orchestrator mcafee viruscan enterprise for storage tenable nessus security center v5.0  should have good knowledge of configuring policies for hips, personal firewall, device & port control, data loss protection components of sophos endpoint protection suite. Very good experience with antivirus technology, experience in handling virus outbreaks, malware cleanup, policy creation, signature update & reporting. Should have strong knowledge on full disk encryption technology  should be willing to work in rotational shifts  excellent communication and conversation skills  strong analytical and problem solving skills  good documentation skills  should have a great customer handling skills  experience with antivirus solutions across multiple operating systems  powershell scripting experience a plus thanks, varish

  1. Profile Picture

    Richard |Founder

    VARISH, I am a Certified Systems Security Engineer with extensive experience with Software Developm...

    19.5 Hours Later
  2. Profile Picture

    Muhammad |Zintro Expert

    Thanks. However, we are likely to find a suitable ***** could serve as an Endpoint Securit...

    1.1 Days Later
+3 Other Responses
Area Icon

Encryption Virus

I don't know if you can help with this issue. I was subject to a ransom encryption virus. It impacted the back up drive as well. The ransom was paid and the link was taken down. Do you offer services to help decrypt without a key or back up?

  1. Profile Picture

    Johnathan |Information Security Analyst II

    *****'re probably out of luck. There's a slight chance if the malware left behind a key....

    32 Minutes Later
  2. Profile Picture

    Clarence |Consultant

    Check historical backups they may be ok....

    45 Minutes Later
  3. Profile Picture

    Eric |Managing Partner

    agree - how many ***** does the backup tree goes...hope it's more than 1...start with th...

    4.2 Hours Later
+4 Other Responses
Area Icon

Cyber Security

We require a subject matter expert in cyber security, more specifically ransomware as a guest/keynote speaker in a webinar planned for sept 22. The sme must have relevant experience in online & data security, solid communication skills and good understanding of ransomware attacks.

  1. Profile Picture

    John |President & Chief Forensic Examiner

    I was part of *****r which took down Cryptolocker and I run the Ransomware Working Group, a...

    1.3 Hours Later
  2. Profile Picture

    Raghavan |Principal

    I bring in SME expertise in malware security trends (trojan and ransomware) and have architected sec...

    3.3 Hours Later
  3. Profile Picture

    Anthony |Principal Consultant

    I am a software development professional with 20+ years in Med Device, Healthcare IT space. I held ...

    3.4 Hours Later
+17 Other Responses
Area Icon

Cyber Security Incident

We would like to speak with multiple experts and understand in detail some of their insights and experience from selecting vendors for these panels. Expert must be with the top 15 cyber insurance carrier and must be considered as a senior professional in the industry. More importantly, the expert must be in the leadership position of the cyber insurance division at one of the top 15-20 insurance carriers who are heavily involved in directly selecting or influencing the selection of vendors for incident response services for clients. These pre-approved lists are generally known as "cyber incident response vendor panels". Discussion points: a. Most common areas of friction between insurance carriers and incident response vendors b. What advice would you give a new company looking to join an insurance carrier’s vendor panel? C. What role do claims managers have in influencing vendor selection? D. How do you evaluate a vendor’s worthiness for participation on your panel? A. What is the process? B. How long does the process take to add a new vendor? C. What are the key things you are looking for and red flags that you are watching closely? E. What is the average hourly rate for your incident response vendors on the panel (for services such as: digital forensics, incident response, malware reverse engineering, ransomware recovery, etc) a. How does a lower hourly rate influence your willingness to work with a vendor? F. How do weigh the size of a larger vendor compared to a smaller vendor (ie verizon or crowdstrike versus a competent and experienced 10 person outfit). A. Do you care about whether the incident response company is using third-party tools and products for the incident versus their own tools? G. How often do you approve off-panel vendors for the work in one of your claims? H. Are there certain carriers or law firms that you think everyone else follows with respect to their vendor panel? A. Which insurance carriers have the most demanding standards for incident response vendor panels? B. Which insurance carriers have the most lenient standards for incident response vendor panels? I. What law firms do you think do the best job or have the best team with respect to incident response? This is for 60 mins paid phone consultation. To show your relevance in this space, please answer the questions below: 1. Do you presently have a cybersecurity incident response vendor panel? 2. Do you have direct involvement in the selection of vendors on the incident response vendor panel (specifically for digital forensics and ransomware response companies)? 3. Can you provide a detailed understanding of the criteria for selection on the vendor panel? 4. Can you share your opinions of the leading incident response vendors for digital forensics? 5. Can you thoroughly talk about all the discussion points mentioned above? *please note that we are only interested in your personal point of view and are not seeking confidential information. This is not a sales solicitation. All the information you provide us is kept strictly confidential. It is used for classification purposes*

  1. Profile Picture

    Timothy |President

    This is an extremely high bar for this inquiry, I can speak to some of this with 10+ years of cybers...

    3.1 Hours Later
  2. Profile Picture

    Robert |VP, Head of Middle Markets - Cyber & Pro

    Thanks very much for reaching out. I would be interested in ***** can we discuss the de...

    18.9 Hours Later
  3. Profile Picture

    Sebastian |Cyber Risk

    Yes I am able to discuss above point...

    19.6 Hours Later
+14 Other Responses
Area Icon

Audio Recording

My computer audio pops, clicks and stutters. I'm using ableton live 8 to record original multitrack music. Sometimes it records the clicks and pops, other times it doesn't. The stutters definitely throw off my performance timing. I don't think it was doing this when i first got it—i know it wasn't doing it this much. My live sets are usually about six tracks (small). I get audio stalls and sputters when the api a2d is off and i'm using the internal clock even watching a youtube video or playing an mp3 off my hard drive using windows media player. My computer: 1) windows 7 serv pack 1 2) intel core 2 quad cpu 3) installed ram 4 gb (3 usable) 4) 32 bit os 5) m-audio 1010lt using s/pdif input 6) mic pre and digital convertor api a2d 7) 600 gb hard drive (434 gb free) samsung hg642jj ata to try to solve this, so far i have: 1) done the tone test (in ableton) to set the buffer and doubled the amount of buffer the test indicated i needed. 2) reinstalled the audio and video drivers (nvidia ge force?) on my computer. 3) scanned the computer for malware with two different programs 4) double checked my hardware setup in ableton according to the directions 5) disabled every effect/plugin on a live set to make sure it wasn't those bogging the cpu down.

  1. Profile Picture

    Robert |Sr. Audio Engineer

    Hi, One suggestion I would try is see if you get the same pop etc when recording analogue? It sound...

    20 Minutes Later
  2. Profile Picture

    S |

    Are you recording to the internal hard drive? If you can, you should up the RAM to 8GB....

    1.4 Hours Later
  3. Profile Picture

    Jim |President

    Far as I can tell from what you've said, it sounds like the internal clock is set incorrectly. I wou...

    8.5 Hours Later
+10 Other Responses
Area Icon

Kaspersky

My company is deploying kaspersky and we are looking for a technical consultant to manage the project. This person needs to have experience with kaspersky security center 10 with both anti-virus and encryption using kaspersky security center – other like applications should not be considered – we want clearly someone with experience with our exact toolset.

  1. Profile Picture

    David |Owner

    I specifically have experience with Kaspersky Security Center 10. I have another client that has tha...

    3.8 Hours Later
  2. Profile Picture

    Adrian |Zintro Expert

    Hello, I have just received this inquiry from one of my colleagues that has an account on zintro fo...

    5.5 Days Later
+2 Other Responses
Area Icon

Antivirus Software

I have developed software which is certified by digicert which is launching this week. I was told by my attorney that there is a process by which to get whitelisted or atleast stay in good standing with the 37 anti virus companies which is done via email mostly. I was told there is weekly maintenance that needs to be done and i need someone to help guide me exactly what needs to be done.

  1. Profile Picture

    Carmelo |CEO

    Hi Anti534M24, Can you please send me more *****t your software and what it does? I want ...

    8.9 Hours Later
  2. Profile Picture

    sheik |security analyst

    it is really simple- submit your sample in virus total, bit9 whitelisting, mcaffee whitelist- they w...

    55.5 Days Later
+2 Other Responses
Area Icon

Computer Operating Systems

We have a client who has been charged with operating a malware from a server here in atlanta, ga. He says that the server they found is not the same one the accused him of controlling. He also claims he was not developing software, just cracking existing software, when we go to visit him, it's hard to know what he means because we are not well versed on computer systems. He says that a linux systems administration expert is what we need. We need someone who will work for court appointed wages and also be willing to visit jails and testify in federal court if need be.

  1. Profile Picture

    David |IT Director

    I have over 20 years of Linux *****rience, going back to the earliest releases on flop...

    1.2 Hours Later
  2. Profile Picture

    Muhammad Waseem |Broadcast IT Consultant

    Dear Clieant, I have arround 7 years of experience in Linux ***** Malware analysis.I ha...

    20.6 Hours Later
+2 Other Responses
Area Icon

Network Security

We are bringing a new integrated siem/ips/fw to market. If you are familiar with archsight/nitro solutions, we perform better. Rigorously stress-tested for known and evolving threats, the xxxxxxx delivers a new level of security designed to address zero day attacks, known viruses, malware, as well as advanced criminal and state sponsored cyber-warfare now common place. It provides carrier grade reliability and world class security integrated with advanced business solutions. We are looking for assistance in locating biz dev partners and opportunities. If you have any advice or interested in learning more please contact us.

  1. Profile Picture

    Gary |Security Services Product Manager

    Hello, We use ArcSight for SIEM. We collect IPS, FW, and have started to collect/***** fo...

    1.6 Days Later
  2. Profile Picture

    Tom |CEO/Owner/Operations

    I would like to learn more about the Network Security ***** ***** skills in many ar...

    2.2 Days Later
  3. Profile Picture

    TOCHUKWU SUNDAY |CEO/ VP SALES / STRATEGIC

    i can be of use to you if you can meet me in Lagos Nigeria office for meetings with thsoe me & the r...

    6 Days Later
+9 Other Responses
See More Inquiries

Top Malware Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+