Source Network Security Experts for your Project, Phone Consult or Job

Submit an anonymous Inquiry -- Start receiving responses within a few hours

Have a need? Explain it here

Zintro does not display, sell or trade e-mail addresses

An eye iconForgot password?
Submit Inquiry

By clicking Submit Inquiry you agree to our TermsVIEW

or Request Pricing Information

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Network Security Inquiries

Area Icon

Bigfix

We are looking to speak with cios of medium and large companies that have experience using or have evaluated bigfix, inc. . .

  1. Profile Picture

    Todd |VP Technical Operations

    Sorry, no experience with BigFix. Lots of Internet Security/SaaS experience - if that's helpful....

    6.2 Days Later
  2. Profile Picture

    Andrei |Owner

    Sorry , i never worked with Big Fix , but regarding Internet Security; Network Security; Informatio...

    20 Days Later
  3. Profile Picture

    Brian |Principal

    CStoner, Thank you for your inquiry. I am not familiar with BigFix and cannot provide assistance in...

    26.3 Days Later
+3 Other Responses
Area Icon

Information Security

Hi consultant, hope you are doing well !! we have an opportunity for endpoint security engineer with one of our clients in savannah, ga please see the job details below and let me know if you would be interested in this role.  if interested, please send me a copy of your resume, your contact details, your availability and a good time to connect with you. Title: endpoint security engineer location: savannah, ga terms: contract job details: job description - (endpoint security (level-2): should have minimum 6+ years of experience in information security- endpoint security  should have good understanding on information security concepts  must have managed and have strong knowledge on following products: sophos endpoint protection suite sophos/ utimaco safeguard encryption sophos log writer sophos reporting interface sophos port auditor mcafee epolicy orchestrator mcafee viruscan enterprise for storage tenable nessus security center v5.0  should have good knowledge of configuring policies for hips, personal firewall, device & port control, data loss protection components of sophos endpoint protection suite. Very good experience with antivirus technology, experience in handling virus outbreaks, malware cleanup, policy creation, signature update & reporting. Should have strong knowledge on full disk encryption technology  should be willing to work in rotational shifts  excellent communication and conversation skills  strong analytical and problem solving skills  good documentation skills  should have a great customer handling skills  experience with antivirus solutions across multiple operating systems  powershell scripting experience a plus thanks, varish

  1. Profile Picture

    Richard |Founder

    VARISH, I am a Certified Systems Security Engineer with extensive experience with Software Developm...

    19.5 Hours Later
  2. Profile Picture

    Muhammad |Zintro Expert

    Thanks. However, we are likely to find a suitable ***** could serve as an Endpoint Securit...

    1.1 Days Later
+3 Other Responses
Area Icon

Information And Cyber Security

We are looking for it professionals working in small and mid-sized companies to discuss issues with cyber security, specifically in how they deal with the threat of 'human error' among company employees.

  1. Profile Picture

    Wayne |CDO

    I've been a SME CIO for years, and dealt with human error all along. I'm NOT a full-time security gu...

    1.8 Hours Later
  2. Profile Picture

    Ramamurthy |CEO

    With my experience in IT filed for the past 25+ years and with my specialty in cyber security (I am ...

    1.9 Hours Later
  3. Profile Picture

    Merritt |Zintro Expert

    I'm a double Harvard ***** expertise exactly in this area. Glad to provide more information....

    2.1 Hours Later
+11 Other Responses
Area Icon

Senior Network

We have an immediate opening with one of our client. Kindly confirm your interest by replying to this inquiry with your updated resume and convenient time/number to discuss further. You can mail me via zintroin case if you are not currently available or not interested in the below position, i apologize for the inconvenience and request you to forward my mail to your friends or colleagues whom you feel would excel this opportunity job title   :senior network engineer (10 + yrs) location    :san ramon , ca terms       :long term contract  role summary/purpose: -senior network engineer responsible for implementing, operating and supporting multi-tenant, scalable network solutions. -the role will routinely review, analyze and recommend network improvements to ensure that the network can scale with the needs of the applications and services riding on it.   job description  - routing expertise – cisco & juniper routers and switches - ibgp, ebgp, ospf, is-is with hands-on experience managing enterprise wan - mpls, ipsec tunnel, ssl vpn, firewall, and dns - firewall & dns expertise - palo alto & f5 firewall - infoblox dns & ipam solutions - project management – must know agile to drive teams backlog - track and update the user stories to ensure the project(sprint iteration) is delivered with agreed content on time - monitor and optimize network performance and assure network security in a high availability environment. -work with telecom providers to report, troubleshoot, and resolve wan related issues. - enforce and execute user policies and procedures regarding the use of network resources. - provide on-call support to the first level support  requirements:  - bachelor's degree in information systems, information technology, computer science or engineering from an accredited college or university or equivalent experience - minimum 5+ years of experience supporting large enterprise network infrastructure (e.G. At a fortune 500 company) - must have 1-2 years of project management experience in agile methodology to help drive the day-to-day backlog\ 

  1. Profile Picture

    John |Zintro Expert

    JOHN D. DAUS 2053 Crossing ***** Vienna, VA ***** Phone: ***** Email: *****...

    1.6 Hours Later
  2. Profile Picture

    Walid |Network Architect

    Resume attached...

    5.4 Hours Later
  3. Profile Picture

    Navin |Zintro Expert

    Hello, We can help you. Let us know. Navin...

    45.9 Days Later
+7 Other Responses
Area Icon

Cybersecurity

We are a us based investment firm that is looking to speak with candidates would be very experienced in it, cybersecurity, network monitoring, etc. This could be chief technology officer, chief information officer, chief security officer, cybersecurity product specialist, head of sales for cybersecurity or similar company (i likely don’t know all relevant job titles, but hopefully this is directionally helpful). Ideally we wish to speak with managers / executives within an organization responsible for evaluation and purchase of it / cybersecurity products and services (customer perspective) – in particular, it would be great if we could get this perspective from someone familiar with these processes in a small/medium enterprise or a federal agency. These experts should be familiar with the evolving approach to managing cybersecurity risks – someone who understands how cybersecurity used to be approached, how it is approached today and how it might change going forward (general industry expertise) as well as familiarity with cybersecurity within the context of the “internet of things” – any insight into how these devices are being protected and how this approach may change. And with the selling process for it / cybersecurity products and services, especially as it relates to small / medium enterprises and federal agencies.Please include a few lines on your experience as it pertains to the above spec. Thank you.

    +undefined Other Responses
    Area Icon

    Network Security Msp

    Looking for insight and perspective as to best practices and kpi metrics for the managed service provider space focused on network security. Specifically what kpis drive valuation and current market multiples applied managed service revenues (recurring), professional service revenue (1x or project based work), and hardware associated revenue (pass-through).

      +undefined Other Responses
      Area Icon

      Cyber Security

      Contribute to the zintro blog! i am an independent writer for zintro. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs. Your response may be used in an article that i will write and post on the zintro blog site. If your response is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary and provides you with a great marketing opportunity to get your name and expert opinion published. Here is a sample blog: http://blog.Zintro.Com/ question: from sony to lockheed martin to pbs, cyber attacks are on the rise and increasing in sophistication. Even the us government announced that a cyber attack by a foreign government constitutes an act of war. How can companies, governments, and institutions protect themselves? How will cyber security change to meet the rising threats? If you are interested, please send me your response via znotes in the next day or two. If you have any questions, please let me know. Thank you. Maureen aylward

      1. Profile Picture

        James |President

        You cannot keep out a determined hacker. The biggest threat to security is between the keyboard and ...

        29 Minutes Later
      2. Profile Picture

        Ricardo |Co-Founder & CTO / Principal Information

        Hi Maureen, I've got another similar message from you but unfortunately I was out and was unable to...

        34 Minutes Later
      3. Profile Picture

        Hadi |Information Security Management Consulta

        Hi, I am interested in helping you write the article and can input into this based on my experience ...

        1.5 Hours Later
      +22 Other Responses
      Area Icon

      Network Security Policy

      Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required.

        +undefined Other Responses
        Area Icon

        Security Policy Orchestration

        Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required. Preferably looking for us based candidates. Experts should know the us market in this area well, the different solutions available, have a good understanding of large enterprises need for such a solution, along with the key market risks and threats for these vendors.

          +undefined Other Responses
          Area Icon

          Information And Cyber Security

          We are a prominent nyc-based expert network and an authorized zintro partner. Our client has a need to to conduct phone consults with multiple experts knowledgeable about information and cyber security. Ideal candidates must have a deep knowledge of various technologies used in the space from a c-level perspective. The client is not interested in talking with those currently or within the last six employed at a public company. This project has a budget.

          1. Profile Picture

            Igor |Zintro Expert

            I am an Enterprise Security Architect - Independent contractor. Clients are banks/brokerages/insuran...

            26 Minutes Later
          2. Profile Picture

            ron |President

            Not quite sure what you are looking to accomplish. Are you in need of a McAfee Certified Cyber Intel...

            33 Minutes Later
          3. Profile Picture

            Aric |Field Sales Manager

            Thank you for the opportunity but I am no longer involved with IAM....

            33 Minutes Later
          +22 Other Responses
          Area Icon

          Cyber Security In South Africa

          We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

            +undefined Other Responses
            Area Icon

            Pharma It Security

            Hi, i need sourcing specific insights on 'it security' from a pharmaceutical company point of view. Below are the key queries. 1. How the large pharmaceuticals companies procure 'it security' solutions? What are the recent trends being witnessed in the market? A. Bundled with it services? B. Software and hardware/devices are procured separately? C. Different suppliers for standard security solutions and high security (for research work) solutions? D. Engaging with a msp? 2. What are the key technology advancements? 3. Is there some instances where the companies have shifted to cloud based solutions? 4. What is virtual security operations center? How is it evolving? 5. How the direct sourcing of it services by business managers are evolving? 6. How the companies are assuring it security across the supply chain? Case studies. 7. Do the companies procure it security services or they procure it security solutions? 8. What are the key contract terms and slas? 9. What are the best practices? How the category is evolving? 10. What are the cost savings and negotiation opportunities? Thanks and regards, gaurav

              +undefined Other Responses
              See More Inquiries

              Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together.

              Top Network Security Experts

              See More Experts
              Share
              LinkedInTwitterFacebookGoogle+