Affordably Source Network Security Devices Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Network Security Devices Inquiries

Area Icon

Network Security Msp

Looking for insight and perspective as to best practices and kpi metrics for the managed service provider space focused on network security. Specifically what kpis drive valuation and current market multiples applied managed service revenues (recurring), professional service revenue (1x or project based work), and hardware associated revenue (pass-through).

  1. Profile Picture

    Bobby |Sr. System Engineer and Technology Solut

    Hello, I think the project description needs some *****, especially the target market. Layo...

    6.6 Hours Later
  2. Profile Picture

    Anand |Managing Partner

    Worked in Verizon as technology head and managed Network security for fortune companies. The KPI's ...

    15.7 Hours Later
  3. Profile Picture

    Simon |Security Consultant

    Hi, Largely depends on what you are trying to do. There are a number of KPIs that can be put in p...

    16.9 Hours Later
+7 Other Responses
Area Icon

Information Security

Hi consultant, hope you are doing well !! we have an opportunity for endpoint security engineer with one of our clients in savannah, ga please see the job details below and let me know if you would be interested in this role.  if interested, please send me a copy of your resume, your contact details, your availability and a good time to connect with you. Title: endpoint security engineer location: savannah, ga terms: contract job details: job description - (endpoint security (level-2): should have minimum 6+ years of experience in information security- endpoint security  should have good understanding on information security concepts  must have managed and have strong knowledge on following products: sophos endpoint protection suite sophos/ utimaco safeguard encryption sophos log writer sophos reporting interface sophos port auditor mcafee epolicy orchestrator mcafee viruscan enterprise for storage tenable nessus security center v5.0  should have good knowledge of configuring policies for hips, personal firewall, device & port control, data loss protection components of sophos endpoint protection suite. Very good experience with antivirus technology, experience in handling virus outbreaks, malware cleanup, policy creation, signature update & reporting. Should have strong knowledge on full disk encryption technology  should be willing to work in rotational shifts  excellent communication and conversation skills  strong analytical and problem solving skills  good documentation skills  should have a great customer handling skills  experience with antivirus solutions across multiple operating systems  powershell scripting experience a plus thanks, varish

  1. Profile Picture

    Richard |Founder

    VARISH, I am a Certified Systems Security Engineer with extensive experience with Software Developm...

    19.5 Hours Later
  2. Profile Picture

    Muhammad |Zintro Expert

    Thanks. However, we are likely to find a suitable ***** could serve as an Endpoint Securit...

    1.1 Days Later
+3 Other Responses
Area Icon

Network Security

Hi all, i am looking to engage with experts with expertise in network security who can provide insights on the different segments in network security and the vendor landscape for the various components involved in network security. Thanks and regards.

  1. Profile Picture

    Richard |Executive Chair

    I have been a CEO in the Network Security space and **********rity and Cloud Security ...

    1.6 Hours Later
  2. Profile Picture

    Bob |R2 Drones Services

    Greetings. I have considerable expertise and market knowledge in this area. Please provide addition...

    1.6 Hours Later
  3. Profile Picture

    Steve |Co-Founder

    Greetings, you could not have come to a better place. I have worked as the chief of marketing for ...

    1.4 Days Later
+12 Other Responses
Area Icon

Cisco Router

Somebody local in central new york that knows cisco routers.

  1. Profile Picture

    Probal |Network Engineer

    Hi, You can contact me over S*K*Y*P*E and my id is p*r*o*bal*_ra*h*m*an . Please omit the stars in b...

    9.4 Hours Later
  2. Profile Picture

    IMMANUEL |MECHANICAL & MARINE ENGINEERING

    Cannot be of any help in NY right now it's winter and I live in Tx but with family in NY!!...

    17.1 Days Later
+3 Other Responses
Area Icon

Senior Network

We have an immediate opening with one of our client. Kindly confirm your interest by replying to this inquiry with your updated resume and convenient time/number to discuss further. You can mail me via zintroin case if you are not currently available or not interested in the below position, i apologize for the inconvenience and request you to forward my mail to your friends or colleagues whom you feel would excel this opportunity job title   :senior network engineer (10 + yrs) location    :san ramon , ca terms       :long term contract  role summary/purpose: -senior network engineer responsible for implementing, operating and supporting multi-tenant, scalable network solutions. -the role will routinely review, analyze and recommend network improvements to ensure that the network can scale with the needs of the applications and services riding on it.   job description  - routing expertise – cisco & juniper routers and switches - ibgp, ebgp, ospf, is-is with hands-on experience managing enterprise wan - mpls, ipsec tunnel, ssl vpn, firewall, and dns - firewall & dns expertise - palo alto & f5 firewall - infoblox dns & ipam solutions - project management – must know agile to drive teams backlog - track and update the user stories to ensure the project(sprint iteration) is delivered with agreed content on time - monitor and optimize network performance and assure network security in a high availability environment. -work with telecom providers to report, troubleshoot, and resolve wan related issues. - enforce and execute user policies and procedures regarding the use of network resources. - provide on-call support to the first level support  requirements:  - bachelor's degree in information systems, information technology, computer science or engineering from an accredited college or university or equivalent experience - minimum 5+ years of experience supporting large enterprise network infrastructure (e.G. At a fortune 500 company) - must have 1-2 years of project management experience in agile methodology to help drive the day-to-day backlog\ 

  1. Profile Picture

    John |Founder

    JOHN D. DAUS 2053 Crossing ***** Vienna, VA ***** Phone: ***** Email: *****...

    1.6 Hours Later
  2. Profile Picture

    Walid |Network Architect

    Resume attached...

    5.4 Hours Later
  3. Profile Picture

    Navin |Vice President

    Hello, We can help you. Let us know. Navin...

    45.9 Days Later
+7 Other Responses
Area Icon

Network Security Auditing

We need a seasoned security expert to come physically to our los angeles based center and perform a security audit and network evaluation. We have need of an experience professional to do a full network discovery with an emphasis on uncovering potential vulnerabilities and inherent design flaws with our layout. Scope of work to include an external penetration test as well as internal auditing with recommendations and a plan of action to be laid out.

  1. Profile Picture

    Ryan |President

    I ***** compliance for my clients domestic and *****h encompasses full securit...

    29 Minutes Later
  2. Profile Picture

    Satyen |Zintro Expert

    Hi, I am based in LA and Security expert to conduct Security Assessment, Security Audit and Assessm...

    7.7 Hours Later
  3. Profile Picture

    PRakash |Information security sme

    Hi, We offer Virtual CISO services which include various *****rity services with continu...

    12.3 Hours Later
+8 Other Responses
Area Icon

Wireless Network Security

Expert in wireless network security project on wireless intrusion prevention system design and build up.

  1. Profile Picture

    Jeff |General Manager

    I have not been an expert witness before but I am a wireless expert. I engineer wired and wireless n...

    2.4 Hours Later
  2. Profile Picture

    Andre |Managing Director

    Am interested in your request, specifically to whether this a commerical environment or must conform...

    7.8 Hours Later
  3. Profile Picture

    USMAN |DIRECTOR/CIO TECHNICAL

    I have completed several wireless projects, on cisco equipment, kindly if you can send me details fo...

    19.5 Hours Later
+4 Other Responses
Area Icon

Router Configuration

I recently upgraded my router from a mega 100wr to d-link(model dsl-2750u)but the problem i have is that the new router cannot connect wirelessly. The rj45 cable has to be plugged in for the router to work

  1. Profile Picture

    Probal |Network Engineer

    Have you already resolved your issue?...

    10.4 Hours Later
  2. Profile Picture

    sateesh |Broadcast Engineer

    Please check wireless is enabled or not...

    11.6 Hours Later
  3. Profile Picture

    Anton |Chief Technology Officer

    To my knowledge no DSL modem/router ***** will allow you to do *****lessly. ...

    1.2 Days Later
+5 Other Responses
Area Icon

Network Security Testing Market

We are a well established investment firm based in the us. We're looking to do some market research in the penetration testing space and would like to speak to people who have assessed, purchased, or used vendors such as core security, cigital, netspi or digital defense. We’d prefer to speak to those in the financial or retail verticals if possible. Below are some questions to ask prospective experts to help us select the ones we’d like to engage with: 1. Are you a key decision maker who manages or oversees penetration testing? 2. Do your penetration testing needs focus more around network security or application security, or both? 3. Have you chosen to utilize a penetration testing service such as core security, cigital, netspi or digital defense? 4. Please state your current title and employer. Thank you.

  1. Profile Picture

    Richard |Executive Chair

    I've sponsored and purchased both network *****ing and *****rity assessment s...

    8.3 Hours Later
  2. Profile Picture

    Anand |Managing Partner

    Have been a decision maker for the *****ing for many of the customers. Have worked with C...

    10.7 Hours Later
  3. Profile Picture

    John |Director, IT Security & Controls

    As the CISO for a publicly traded global medical devi ce manufacturer, I'm the key decision maker an...

    4.7 Days Later
+11 Other Responses
Area Icon

Endpoint Security And Data Risk Management

We are looking to speak to a former salesperson who worked at absolute software within the last 3-5 years. We would like to better understand the sales process, interaction with oem partners, and value proposition made to potential customers. Thank you.

  1. Profile Picture

    Justin |Senior Account Executive

    Hello: I have worked at 2 of the 3 largest OEM's over the last 15 years so do have distinct knowledg...

    1.2 Days Later
  2. Profile Picture

    Scott |Account Manager

    Hi Jon, Yes I am willing to participate. My role at Absolute Software was Territory Sales Manager...

    4.9 Days Later
  3. Profile Picture

    Ian |Regional Senior Sales Manager

    Good Afternoon, I would be willing to speak with you regarding the Absolute sales process, working w...

    5.1 Days Later
+38 Other Responses
Area Icon

Wireshark

We need some help setting up filters and alarms in wireshark to monitor inbound and outbound router activity.

  1. Profile Picture

    thomas |CISO

    can you be more specific as to how this is to be accomplished...

    5.8 Hours Later
  2. Profile Picture

    Thomas |Geek

    Hello! Would love to be considered for this job, if it's still available. I have a wide range of...

    1.8 Days Later
+3 Other Responses
Area Icon

Wifi

We have a sky router with tp link plug - in extenders around the house, however, our signal still drops out, losing our wifi, and our ability to download tv programmes or use the internet. Do you have a solution?

  1. Profile Picture

    Anand |GM/VP- Network Operation

    Hi , I am Intrested. Best Regards Anand +91 *****...

    2.7 Hours Later
  2. Profile Picture

    Mohamad |Wireless Consultant

    TP Link Routers are not the best. I've always had problems with them. Anyways, let me know if you ar...

    3.3 Hours Later
  3. Profile Picture

    William |Wireless Consultant- domestic and intern

    Yes, If you have ATT service, go out and buy a cell extender. They cost about $50, and will also dra...

    5.6 Hours Later
+4 Other Responses
See More Inquiries

firewall and virtual private network (VPN) appliances, cryptographic accelerator cards, card-based network access systems, and other network security hardware.

Top Network Security Devices Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+