Connect with Network Security Experts for your Project, Phone Consult or Job

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here

Zintro does not display, sell or trade e-mail addresses

An eye iconForgot password?
Submit Inquiry

By clicking Submit Inquiry you agree to our TermsVIEW

or Request Pricing Information

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Network Security Inquiries

Area Icon

Bigfix

We are looking to speak with cios of medium and large companies that have experience using or have evaluated bigfix, inc. . .

  1. Profile Picture

    Todd |VP Technical Operations

    Sorry, no experience with BigFix. Lots of Internet Security/SaaS experience - if that's helpful....

    6.2 Days Later
  2. Profile Picture

    Andrei |Owner

    Sorry , i never worked with Big Fix , but regarding Internet Security; Network Security; Informatio...

    20 Days Later
  3. Profile Picture

    Brian |Principal

    CStoner, Thank you for your inquiry. I am not familiar with BigFix and cannot provide assistance in...

    26.3 Days Later
+3 Other Responses
Area Icon

Network Security Msp

Looking for insight and perspective as to best practices and kpi metrics for the managed service provider space focused on network security. Specifically what kpis drive valuation and current market multiples applied managed service revenues (recurring), professional service revenue (1x or project based work), and hardware associated revenue (pass-through).

  1. Profile Picture

    Bobby |Sr. System Engineer and Technology Solut

    Hello, I think the project description needs some *****, especially the target market. Layo...

    6.6 Hours Later
  2. Profile Picture

    Anand |Co-Founder

    Worked in Verizon as technology head and managed Network security for fortune companies. The KPI's ...

    15.7 Hours Later
  3. Profile Picture

    Simon |Security Consultant

    Hi, Largely depends on what you are trying to do. There are a number of KPIs that can be put in p...

    16.9 Hours Later
+7 Other Responses
Area Icon

Cyber Security In South Africa

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Shyam |CFO Advisor

    we are amidst investing in a South african Cyber training company and I am well versed and can disc...

    6.5 Hours Later
  2. Profile Picture

    Ramamurthy |Owner & CEO

    I am a Cyber Security specialist conducting IS audits, consultancy in IS Policy and other online sec...

    10.2 Hours Later
  3. Profile Picture

    Dr Venkat |Global Consultant

    I have some idea ,but need to work with one of our local partners in South Africa ...

    7.1 Days Later
+11 Other Responses
Area Icon

Network Security Testing Market

We are a well established investment firm based in the us. We're looking to do some market research in the penetration testing space and would like to speak to people who have assessed, purchased, or used vendors such as core security, cigital, netspi or digital defense. We’d prefer to speak to those in the financial or retail verticals if possible. Below are some questions to ask prospective experts to help us select the ones we’d like to engage with: 1. Are you a key decision maker who manages or oversees penetration testing? 2. Do your penetration testing needs focus more around network security or application security, or both? 3. Have you chosen to utilize a penetration testing service such as core security, cigital, netspi or digital defense? 4. Please state your current title and employer. Thank you.

  1. Profile Picture

    Richard |Executive Chair

    I've sponsored and purchased both network *****ing and *****rity assessment s...

    8.3 Hours Later
  2. Profile Picture

    Anand |Co-Founder

    Have been a decision maker for the *****ing for many of the customers. Have worked with C...

    10.7 Hours Later
  3. Profile Picture

    John |Director, IT Security & Controls

    As the CISO for a publicly traded global medical devi ce manufacturer, I'm the key decision maker an...

    4.7 Days Later
+11 Other Responses
Area Icon

Security Policy Orchestration

Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required. Preferably looking for us based candidates. Experts should know the us market in this area well, the different solutions available, have a good understanding of large enterprises need for such a solution, along with the key market risks and threats for these vendors.

  1. Profile Picture

    Aaron |Zintro Expert

    Depending on your specific questions, I would love to help. Let me know if you'd like to set up a ca...

    3.5 Hours Later
  2. Profile Picture

    Scottard |Executive Security Strategist

    Hi, Saw your inquiry, I would like to assist you. I have over 20 years writing and automating s...

    3.5 Hours Later
  3. Profile Picture

    Ubaid |Expert Senior Consultant

    Hi, I can help you, I have more than 10 years of experiences in *****rity , technical sec...

    3.9 Hours Later
+19 Other Responses
Area Icon

Information And Cyber Security

We are looking for it professionals working in small and mid-sized companies to discuss issues with cyber security, specifically in how they deal with the threat of 'human error' among company employees.

  1. Profile Picture

    Wayne |CDO

    I've been a SME CIO for years, and dealt with human error all along. I'm NOT a full-time security gu...

    1.8 Hours Later
  2. Profile Picture

    Ramamurthy |CEO

    With my experience in IT filed for the past 25+ years and with my specialty in cyber security (I am ...

    1.9 Hours Later
  3. Profile Picture

    Merritt |Zintro Expert

    I'm a double Harvard ***** expertise exactly in this area. Glad to provide more information....

    2.1 Hours Later
+11 Other Responses
Area Icon

Senior Network

We have an immediate opening with one of our client. Kindly confirm your interest by replying to this inquiry with your updated resume and convenient time/number to discuss further. You can mail me via zintroin case if you are not currently available or not interested in the below position, i apologize for the inconvenience and request you to forward my mail to your friends or colleagues whom you feel would excel this opportunity job title   :senior network engineer (10 + yrs) location    :san ramon , ca terms       :long term contract  role summary/purpose: -senior network engineer responsible for implementing, operating and supporting multi-tenant, scalable network solutions. -the role will routinely review, analyze and recommend network improvements to ensure that the network can scale with the needs of the applications and services riding on it.   job description  - routing expertise – cisco & juniper routers and switches - ibgp, ebgp, ospf, is-is with hands-on experience managing enterprise wan - mpls, ipsec tunnel, ssl vpn, firewall, and dns - firewall & dns expertise - palo alto & f5 firewall - infoblox dns & ipam solutions - project management – must know agile to drive teams backlog - track and update the user stories to ensure the project(sprint iteration) is delivered with agreed content on time - monitor and optimize network performance and assure network security in a high availability environment. -work with telecom providers to report, troubleshoot, and resolve wan related issues. - enforce and execute user policies and procedures regarding the use of network resources. - provide on-call support to the first level support  requirements:  - bachelor's degree in information systems, information technology, computer science or engineering from an accredited college or university or equivalent experience - minimum 5+ years of experience supporting large enterprise network infrastructure (e.G. At a fortune 500 company) - must have 1-2 years of project management experience in agile methodology to help drive the day-to-day backlog\ 

  1. Profile Picture

    John |Founder

    JOHN D. DAUS 2053 Crossing ***** Vienna, VA ***** Phone: ***** Email: *****...

    1.6 Hours Later
  2. Profile Picture

    Walid |Network Architect

    Resume attached...

    5.4 Hours Later
  3. Profile Picture

    Navin |Vice President

    Hello, We can help you. Let us know. Navin...

    45.9 Days Later
+7 Other Responses
Area Icon

It Security Solution Resellers In Europe

Eu resellers of it network security solutions in europe i work for a prominent expert network working in partnership with zintro. We would like to source multiple experts on behalf of an institutional investor. Specifically, we are looking for the following type of expert: our client would like to speak with resellers of network it security solutions within europe. Please respond back with your current/ recent employment history, contact info, or linkedin profile for reference.

  1. Profile Picture

    Lee |Consultant/Owner

    Hi, I am an Infrastructure consultant specializing in VMware vSphere and *****rity solution....

    48 Minutes Later
  2. Profile Picture

    Sergey |Systems Engineer

    Hello, I'm an IT consultant specializing in Exchange/Office365/Microsoft/Azure/Virtuzalition in Cana...

    1.6 Hours Later
  3. Profile Picture

    Paul |Sr. Information Security Manager

    I'm in the USA...

    2.7 Hours Later
+6 Other Responses
Area Icon

Information Security

Hi consultant, hope you are doing well !! we have an opportunity for endpoint security engineer with one of our clients in savannah, ga please see the job details below and let me know if you would be interested in this role.  if interested, please send me a copy of your resume, your contact details, your availability and a good time to connect with you. Title: endpoint security engineer location: savannah, ga terms: contract job details: job description - (endpoint security (level-2): should have minimum 6+ years of experience in information security- endpoint security  should have good understanding on information security concepts  must have managed and have strong knowledge on following products: sophos endpoint protection suite sophos/ utimaco safeguard encryption sophos log writer sophos reporting interface sophos port auditor mcafee epolicy orchestrator mcafee viruscan enterprise for storage tenable nessus security center v5.0  should have good knowledge of configuring policies for hips, personal firewall, device & port control, data loss protection components of sophos endpoint protection suite. Very good experience with antivirus technology, experience in handling virus outbreaks, malware cleanup, policy creation, signature update & reporting. Should have strong knowledge on full disk encryption technology  should be willing to work in rotational shifts  excellent communication and conversation skills  strong analytical and problem solving skills  good documentation skills  should have a great customer handling skills  experience with antivirus solutions across multiple operating systems  powershell scripting experience a plus thanks, varish

  1. Profile Picture

    Richard |Founder

    VARISH, I am a Certified Systems Security Engineer with extensive experience with Software Developm...

    19.5 Hours Later
  2. Profile Picture

    Muhammad |Zintro Expert

    Thanks. However, we are likely to find a suitable ***** could serve as an Endpoint Securit...

    1.1 Days Later
+3 Other Responses
Area Icon

Cyber Security

Contribute to the zintro blog! i am an independent writer for zintro. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs. Your response may be used in an article that i will write and post on the zintro blog site. If your response is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary and provides you with a great marketing opportunity to get your name and expert opinion published. Here is a sample blog: http://blog.Zintro.Com/ question: from sony to lockheed martin to pbs, cyber attacks are on the rise and increasing in sophistication. Even the us government announced that a cyber attack by a foreign government constitutes an act of war. How can companies, governments, and institutions protect themselves? How will cyber security change to meet the rising threats? If you are interested, please send me your response via znotes in the next day or two. If you have any questions, please let me know. Thank you. Maureen aylward

  1. Profile Picture

    James |President

    You cannot keep out a determined hacker. The biggest threat to security is between the keyboard and ...

    29 Minutes Later
  2. Profile Picture

    Ricardo |Co-Founder & CTO / Principal Information

    Hi Maureen, I've got another similar message from you but unfortunately I was out and was unable to...

    34 Minutes Later
  3. Profile Picture

    Hadi |Head of Security Strategy & GRC

    Hi, I am interested in helping you write the article and can input into this based on my experience ...

    1.5 Hours Later
+22 Other Responses
Area Icon

Single Sign-on And User Management

We are looking to speak to customers of auth0. Auth0 is a cloud service that provides a set of unified apis and tools that instantly enables single sign-on and user management for any application, api or iot device. We are looking for customers preferably in the u.S./canada. The typical titles would be it operations, software engineering, product management, director/vp of security, vp of information security, director of soc, ciso etc. This would be for a 1 hour paid phone consultation.

  1. Profile Picture

    Ramana |CTO & Chief Architect

    I have the expertise. Please feel free to contact me to discuss further. ...

    2.1 Hours Later
  2. Profile Picture

    Jeremy |Product & Platform Strategy Consultant

    I have worked on APIs and developer ***** over a decade, namely building and leading Box's d...

    2.1 Hours Later
  3. Profile Picture

    Fares |Principal Consultant & Owner

    interested and available...

    19.2 Hours Later
+26 Other Responses
Area Icon

Anonymous Hacker Arrests

“anonymous” hacker arrests the zintro blog needs you! i write the zintro blog. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. If it is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary (there is no payment involved). Question: what does the recent news that several members of the hacker group “anonymous” have been arrested mean to the future of internet security? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ if you are interested, please send me your response via znotes in the next day or two. Include your full name. If you have any questions, please let me know. Thank you! maureen aylward

  1. Profile Picture

    Pablo |Information Security Specialist

    What does the recent news that several members of the hacker group “Anonymous” have been arrested me...

    14 Minutes Later
  2. Profile Picture

    Aaron |Senior Application Developer

    Hello Maureen, How soon do you need the article and is it ok if it is over 3 paragraphs long say 4?...

    15 Minutes Later
  3. Profile Picture

    TAIYE |President & Founder

    Please contact me at your earliest convenience....

    29 Minutes Later
+10 Other Responses
See More Inquiries

Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together.

Top Network Security Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+