Affordably Source Managed Security Services Providers Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Managed Security Services Providers Inquiries

Area Icon

Managed Security Services Providers

Hi all, i am looking to engage with network security experts, with experience in working with managed security service providers(mssp) who can share insights on services offered and hardware used by mssps. Thanks and regards.

  1. Profile Picture

    Vijay |Release Management, Quality Management,

    I can help on this, if you are interested. I have worked on Security steam and also on the managed s...

    4.2 Hours Later
  2. Profile Picture

    Steve |Co-Founder

    Absolutely. I've done some consulting for your company before. The engagement I had was in India s...

    2.4 Days Later
+4 Other Responses
Area Icon

It Security Solution Resellers In Europe

Eu resellers of it network security solutions in europe i work for a prominent expert network working in partnership with zintro. We would like to source multiple experts on behalf of an institutional investor. Specifically, we are looking for the following type of expert: our client would like to speak with resellers of network it security solutions within europe. Please respond back with your current/ recent employment history, contact info, or linkedin profile for reference.

  1. Profile Picture

    Lee |Consultant/Owner

    Hi, I am an Infrastructure consultant specializing in VMware vSphere and *****rity solution....

    48 Minutes Later
  2. Profile Picture

    Sergey |Systems Engineer

    Hello, I'm an IT consultant specializing in Exchange/Office365/Microsoft/Azure/Virtuzalition in Cana...

    1.6 Hours Later
  3. Profile Picture

    Paul |Sr. Information Security Manager

    I'm in the USA...

    2.7 Hours Later
+6 Other Responses
Area Icon

It Security And Data Compliance

We are looking to speak with multiple decision-makers in compliance, it, or legal job functions that have influence over the adoption and purchase of communication/collaborations tools. Desired participants should recently adopted or considering encryption for their productivity/communication/collaboration software uses. This is for a paid 1 - hour web interview. Qualifying questions 1. How would you describe your level of influence in the decision to assess, evaluate, adopt, or purchase new organization/company communication/collaboration tools? By “communication and collaboration software” we mean software enabling real-time and asynchronous collaboration, meetings, instant messaging, file sharing, etc. Would you say you? A. I am the final decision-maker b. I share in the decision making c. I have some influence d. I have little to no influence e. We do not have any productivity and collaboration software **please note that we are only interested in your personal point of view and are not seeking confidential information. ***referrals are highly appreciated

  1. Profile Picture

    Mitch |Head of IT Operations and Technology

    I am the final decision-maker...

    32 Minutes Later
  2. Profile Picture

    Martyn |Chief Information Security Officer

    B. I sit on the IT leadership team of a FTSE 250 company and make joint decisions on these things. I...

    37 Minutes Later
  3. Profile Picture

    Ritesh |COO | Global Head of Digital Technology

    Being a tech leader for over two decades, led large *****uding leading banks / payment ...

    45 Minutes Later
+43 Other Responses
Area Icon

Network Security Testing Market

We are a well established investment firm based in the us. We're looking to do some market research in the penetration testing space and would like to speak to people who have assessed, purchased, or used vendors such as core security, cigital, netspi or digital defense. We’d prefer to speak to those in the financial or retail verticals if possible. Below are some questions to ask prospective experts to help us select the ones we’d like to engage with: 1. Are you a key decision maker who manages or oversees penetration testing? 2. Do your penetration testing needs focus more around network security or application security, or both? 3. Have you chosen to utilize a penetration testing service such as core security, cigital, netspi or digital defense? 4. Please state your current title and employer. Thank you.

  1. Profile Picture

    Richard |Executive Chair

    I've sponsored and purchased both network *****ing and *****rity assessment s...

    8.3 Hours Later
  2. Profile Picture

    Anand |Managing Partner

    Have been a decision maker for the *****ing for many of the customers. Have worked with C...

    10.7 Hours Later
  3. Profile Picture

    John |Director, IT Security & Controls

    As the CISO for a publicly traded global medical devi ce manufacturer, I'm the key decision maker an...

    4.7 Days Later
+11 Other Responses
Area Icon

Amazon Cloud

Hello, i'm doing some research into the market for mssps (managed security services providers) in the i.T. Security space.....Particularly for the smb marketplace that use a lot of cloud services for hosting their data and applications. Trying to understand who the main mssps are, how they go to market, how they work with cloud services providers and other i.T. Services companies, what the outlook is for this business. Is this an area you would feel comfortable discussing?

  1. Profile Picture

    Richard |Executive Chair

    This sounds like something I could help with. Cheers, Richard...

    18.9 Hours Later
  2. Profile Picture

    Jay |Sales Consultant

    Ken -I sent you an email to you with my contact. I'm with wind stream, and we should talk about thi...

    4.9 Days Later
  3. Profile Picture

    Richard |Information Security Expert

    Rick Lawhorn has accomplished over twenty years of experience in the *****nology and info...

    6.9 Days Later
+5 Other Responses
Area Icon

Cyber Security Services Project

We are looking for multiple participants based in canada. Our client is conducting this market research study and would like to invite you to participate in our research to learn how companies choose third party providers for managed security services. They are looking for participants who recently evaluated third party managed security providers. This is for a paid 1-hour phone interview. **please note that we are only interested in your personal point of view and are not seeking confidential information. This is not a sales solicitation. All the information you provide us is kept strictly confidential. It is used for classification purposes only. Kindly respond to the questions below as to your relevance in this space: 1. Have you recently participated in the evaluation of third-party managed security providers? Yes/no 2. For the managed security service you evaluated, which of the following best describes the scope of services you were seeking from the third party: a. Standard security – my own it staff monitors, manages and resolves incidents or problems, plus manages moves / adds / changes b. Fully managed security – a service provider proactively monitors, manages and resolves incidents or problems, plus manages moves / adds / changes c. Neither

  1. Profile Picture

    Jonathan |Senior Manager

    1. Yes 2. B...

    2.5 Days Later
  2. Profile Picture

    Jeffrey L. |CEO | Founder | Principal Cybersecurity

    1. Yes 2. A...

    2.5 Days Later
  3. Profile Picture

    Jim |Sr. Cyber Security Principal Architect

    I have 23 years experience in Cybersecurity....

    2.5 Days Later
+303 Other Responses
Area Icon

Cyber Security Landscape

Our multinational client is working on research about the cyber security landscape particularly on firmware/hardware — at the level of the business user’s machine vs. At the network or cloud level. They are interested in speaking with experts based on the criteria below: - us based expert certified by nist (national institute of standards and technology) - expert / entrepreneur in israel but who has a focus on firmware / hardware — at the level of the business user’s machine vs. At the network or cloud level. This will be for a 1-hour webcam interview. Please provide a brief response below as to your relevance in the space. 1. Can you share your background in the overall cybersecurity landscape? 2. Can you share a holistic view as to what components are in play on the it security landscape particularly in secured-core pcs?

  1. Profile Picture

    Naresh |Advisory Board

    I can discuss the current trends, such as Zero Trust Network, Software Defined Perimeter, convergenc...

    49 Minutes Later
  2. Profile Picture

    New |

    Hi, Currently ***** one of the leading MSSP, have in-depth expertise in all the cyber secu...

    21.4 Hours Later
  3. Profile Picture

    Omri |Global IT and cyber security Manager

    1. Can you share your background in the overall cybersecurity landscape? - Yes, Global IT Infrastruc...

    1.2 Days Later
+38 Other Responses
Area Icon

Managed Security Services

Find out information about managed security services (mss) market research in malaysia or asia pacific especially for security information events monitoring (siem) and security professional services.

  1. Profile Picture

    Ubaid |Expert Senior Consultant

    I have extensive experience of managed security services. I am certified Security ***** Ev...

    3.9 Hours Later
  2. Profile Picture

    Scott |CGO

    I have extensive, executive level experience with Managed Security Services. I am presently performi...

    9.8 Hours Later
  3. Profile Picture

    Gary |Security Services Product Manager

    Hello, Is this specific to Malaysia? I am the Security Services Manager for the ***** Minnesota...

    10.2 Hours Later
+3 Other Responses
Area Icon

Network Security Msp

Looking for insight and perspective as to best practices and kpi metrics for the managed service provider space focused on network security. Specifically what kpis drive valuation and current market multiples applied managed service revenues (recurring), professional service revenue (1x or project based work), and hardware associated revenue (pass-through).

  1. Profile Picture

    Bobby |Sr. System Engineer and Technology Solut

    Hello, I think the project description needs some *****, especially the target market. Layo...

    6.6 Hours Later
  2. Profile Picture

    Anand |Managing Partner

    Worked in Verizon as technology head and managed Network security for fortune companies. The KPI's ...

    15.7 Hours Later
  3. Profile Picture

    Simon |Security Consultant

    Hi, Largely depends on what you are trying to do. There are a number of KPIs that can be put in p...

    16.9 Hours Later
+7 Other Responses
Area Icon

Trends & Preferences Of Managed Cybersecurity Services

Scope: the main objective of this study is to understand the trends and preferences for managed cybersecurity services for “global 2000” companies the study intends to understand: • key managed cyber security services being consumed by large corporations – “global 2000” companies • key features or capabilities preferred in the managed cyber security services being consumed (for managed detection and response, threat intelligence service, siem as a service, threat hunting, vulnerability management, and penetration testing • preferred pricing models / price points for managed cyber security services • estimated distribution of companies (from global 2000) between those undertaking end-to-end cybersecurity transformation, and those undertaking limited/targeted cybersecurity transformation focus geography: us, western europe (uk, germany, france) business focus: • managed cybersecurity services (managed detection and response, threat intelligence, siem, threat hunting, vulnerability management, penetration testing) number of experts: 5 timeframe: 20th january, 2021 expert job title(s): • from managed security service providers (mssps) and cybersecurity consulting companies (sample set of people): - account managerso sales managers/directors/vps - manager (threat intelligence sales) - cybersecurity sales specialist - any other relevant/related roles • from channel partners for mssps and consulting companies - senior manager (corporate sales) - strategic account manager - others relevant/related roles • other independent consultants and experts managed cybersecurity (especially for “global 2000” companies’ segment) * we need to include current and former employees from the following companies: - mssps (priority list of companies): fireye inc., secureworks inc., red canary, crowdstrike, deepwatch inc. - consulting companies (priority list of companies): ey, deloitte, accenture, pwc, mandiant - can include (second priority) other such mssps and consulting companies that provide managed cybersecurity services to "global 2000" companies. Survey type: telephonic survey duration: approx. 30-35 minutes screening questions: 1. Would you be able to share insights on the (based on the key pointers for discussion mentioned) below? Key pointers for discussion: • key managed cyber security services being consumed by large corporations – “global 2000” companies • key features or capabilities preferred in the cyber security services being consumed (for managed detection and response, threat intelligence service, managed siem, threat hunting, vulnerability management, and penetration testing • preferred pricing models / price points of the managed cyber security services • differences in preferences of services, between companies undertaking end-to-end cybersecurity transformation, and those undertaking limited/targeted cybersecurity transformation

  1. Profile Picture

    Fabrizio |Information Security Architect and CISO

    Happy to consult...

    23.7 Hours Later
  2. Profile Picture

    Scott |Director of IT

    Hello, would be happy to provide cyber security info and managed services info about a smaller non-p...

    23.7 Hours Later
  3. Profile Picture

    Salil |President/CEO & Founder

    Happy to consult....

    23.8 Hours Later
+92 Other Responses
Area Icon

Senior Network

We have an immediate opening with one of our client. Kindly confirm your interest by replying to this inquiry with your updated resume and convenient time/number to discuss further. You can mail me via zintroin case if you are not currently available or not interested in the below position, i apologize for the inconvenience and request you to forward my mail to your friends or colleagues whom you feel would excel this opportunity job title   :senior network engineer (10 + yrs) location    :san ramon , ca terms       :long term contract  role summary/purpose: -senior network engineer responsible for implementing, operating and supporting multi-tenant, scalable network solutions. -the role will routinely review, analyze and recommend network improvements to ensure that the network can scale with the needs of the applications and services riding on it.   job description  - routing expertise – cisco & juniper routers and switches - ibgp, ebgp, ospf, is-is with hands-on experience managing enterprise wan - mpls, ipsec tunnel, ssl vpn, firewall, and dns - firewall & dns expertise - palo alto & f5 firewall - infoblox dns & ipam solutions - project management – must know agile to drive teams backlog - track and update the user stories to ensure the project(sprint iteration) is delivered with agreed content on time - monitor and optimize network performance and assure network security in a high availability environment. -work with telecom providers to report, troubleshoot, and resolve wan related issues. - enforce and execute user policies and procedures regarding the use of network resources. - provide on-call support to the first level support  requirements:  - bachelor's degree in information systems, information technology, computer science or engineering from an accredited college or university or equivalent experience - minimum 5+ years of experience supporting large enterprise network infrastructure (e.G. At a fortune 500 company) - must have 1-2 years of project management experience in agile methodology to help drive the day-to-day backlog\ 

  1. Profile Picture

    John |Founder

    JOHN D. DAUS 2053 Crossing ***** Vienna, VA ***** Phone: ***** Email: *****...

    1.6 Hours Later
  2. Profile Picture

    Walid |Network Architect

    Resume attached...

    5.4 Hours Later
  3. Profile Picture

    Navin |Vice President

    Hello, We can help you. Let us know. Navin...

    45.9 Days Later
+7 Other Responses
Area Icon

Avi Networks' Modern Load Balancing

We are looking for a customer who is using avi networks’ modern load . We are interested in an it manager who manages infrastructure (branch locations, routers, and links per branch, by type) as well as any other relevant metrics or information. This is a paid 1-hour phone consultation for $250. Please provide a brief answer as to your relevance to the space below: 1. Do you use avi networks’ modern load balancing or nsx advanced load balancers? If so, how long have you been using it? 2. Can you speak about your expectations and challenges working with the solution? 3. Can you discuss the overall benefits, especially in regard to infrastructure simplification, reduction in downtime (if any), and business outcomes, as a result of implementation?

  1. Profile Picture

    Anand |Managing Partner

    1. We are usign for NSX advanced load balancers. For last 10 months 2. Yes can help in the challenge...

    2.6 Days Later
  2. Profile Picture

    Paul |Director

    Sorry, I wouldn't be a good fit for this. I don't use AVI and I don't manage infrastructure....

    2.6 Days Later
  3. Profile Picture

    Lakshmi Chandrakanth |Specialist Technical Consultant

    I dont work with AVI LBs. However I work with F5 and AWS ELBs. I have a good experience in that. ...

    2.7 Days Later
+5 Other Responses
See More Inquiries

Top Managed Security Services Providers Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+