Source Sas 70 Audit Experts for your Project, Phone Consult or Job

Submit an anonymous Inquiry -- Start receiving responses within a few hours

Have a need? Explain it here

Zintro does not display, sell or trade e-mail addresses

An eye iconForgot password?
Submit Inquiry

By clicking Submit Inquiry you agree to our TermsVIEW

or Request Pricing Information

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Sas 70 Audit Inquiries

Area Icon

Computer Security In Insurance

Looking for experts in cyber security insurance law

  1. Profile Picture

    Rahul |Chief Technical Officer

    Thanks for your message. We have expertise and experience in Cyber Security domain including ISO 270...

    4.8 Hours Later
  2. Profile Picture

    Norman |Consultant

    Sir, There is no detail visible in your inquiry on Zintro thus difficult to know what to respond. I ...

    7.2 Hours Later
  3. Profile Picture

    Bryan |InfoSec

    I can help in external security. ...

    7.8 Hours Later
+6 Other Responses
Area Icon

Computer Security

The zintro blog needs you! i am looking for your expert opinion on the news below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. You will be named in the article and a link to your profile will be included. Your contribution is voluntary (there is no direct payment involved but you will get lots of traffic to your profile). If interested please send me your response via znotes within the next few days. Programmer khalil shreateh posted a notice on zuckerberg's wall pointing out the security vulnerability on facebook that allows people to post on anyone's wall. Technology companies have become more open to help from independent hackers and facebook encourages reports about security vulnerabilities. Facebook pays at least $500 to people who report security problems but shreateh's account was temporarily disabled. How should computer security be handled? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ please include your full name, we will link it to your profile, getting you more presence on zintro. If you have any questions, let me know. Thank you! idil kan

  1. Profile Picture

    Burton |Retired Psychologist

    When I was using a Windows-based system with 300,000 known viruses and was invaded by hackers, every...

    42 Minutes Later
  2. Profile Picture

    Lindsey |Experienced MBA Marketer

    Hi Idil, Here is my response, thanks for the consideration! Computer and specifically internet se...

    1.1 Days Later
+2 Other Responses
Area Icon

Pharma It Security

Hi, i need sourcing specific insights on 'it security' from a pharmaceutical company point of view. Below are the key queries. 1. How the large pharmaceuticals companies procure 'it security' solutions? What are the recent trends being witnessed in the market? A. Bundled with it services? B. Software and hardware/devices are procured separately? C. Different suppliers for standard security solutions and high security (for research work) solutions? D. Engaging with a msp? 2. What are the key technology advancements? 3. Is there some instances where the companies have shifted to cloud based solutions? 4. What is virtual security operations center? How is it evolving? 5. How the direct sourcing of it services by business managers are evolving? 6. How the companies are assuring it security across the supply chain? Case studies. 7. Do the companies procure it security services or they procure it security solutions? 8. What are the key contract terms and slas? 9. What are the best practices? How the category is evolving? 10. What are the cost savings and negotiation opportunities? Thanks and regards, gaurav

    +undefined Other Responses
    Area Icon

    Information Security

    Hi we are currently looking for partners,associates in the field of information security to expand our business. We have been into this for last 8 years and are looking for big time expansion by tying up with interested organizations.

    1. Profile Picture

      Mike |Senior Consultant

      Where is the location?...

      12 Minutes Later
    2. Profile Picture

      Ajay |Principal Consultant

      Hello, My name is Ajay Porus and I have started my new firm in field of *****rity recent...

      59 Minutes Later
    3. Profile Picture

      krag |CISM, CGEIT

      Having been involved in *****rity for better than three decades, I'm always interested in...

      1.1 Hours Later
    +21 Other Responses
    Area Icon

    Computer Security

    Trusted platform module

    1. Profile Picture

      jeff |consultant

      What types of consulting do you need with regard to Trusted Computing Modules? I may be able to be ...

      52 Minutes Later
    2. Profile Picture

      John |Sr. Usability Engineering Consultant

      What is the task you are looking for support with? Obviously ***** TPM, but otherwise this is t...

      1.2 Hours Later
    3. Profile Picture

      Mario |IT consultant and solution provider

      Hi, Can you give me more details about your inquiry? regards...

      1 Day Later
    +5 Other Responses
    Area Icon

    Computer Security

    Looking for analysts/experts to interview for an article about what companies should expect to pay for computing-related security expenses (i.E., software and services, not staff), based on company size, data security needs, and complexity of systems in place?

    1. Profile Picture

      Emad Sayed |Information Security Consultant

      I would be interested. Can you send me detailed *****t the work?...

      6 Minutes Later
    2. Profile Picture

      Richard |Founder

      I am interested in your Computer Security Press Interview Inquiry for coyotemoon....

      7 Minutes Later
    3. Profile Picture

      Michael |Ethical Hacker/InfoSec Consultant

      I can definitely assist you on this....

      17 Minutes Later
    +40 Other Responses
    Area Icon

    Network Security Testing Market

    We are a well established investment firm based in the us. We're looking to do some market research in the penetration testing space and would like to speak to people who have assessed, purchased, or used vendors such as core security, cigital, netspi or digital defense. We’d prefer to speak to those in the financial or retail verticals if possible. Below are some questions to ask prospective experts to help us select the ones we’d like to engage with: 1. Are you a key decision maker who manages or oversees penetration testing? 2. Do your penetration testing needs focus more around network security or application security, or both? 3. Have you chosen to utilize a penetration testing service such as core security, cigital, netspi or digital defense? 4. Please state your current title and employer. Thank you.

      +undefined Other Responses
      Area Icon

      Security Policy Orchestration

      Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required. Preferably looking for us based candidates. Experts should know the us market in this area well, the different solutions available, have a good understanding of large enterprises need for such a solution, along with the key market risks and threats for these vendors.

        +undefined Other Responses
        Area Icon

        Computer Security

        Assist with protocols and develop collection tools; assist with data analysis, interpretation, reports; assist in writing final reports

        1. Profile Picture

          Lito |IT Consultant

          Hello I am an experienced *****yst and I am familiar with analysis tools. Would be good to talk,...

          6.7 Days Later
        2. Profile Picture

          Geoffrey |Consultant

          Have only now seen this Inquiry (21 Dec)! From limited *****lied, I doubt that my "data ...

          16 Days Later
        +2 Other Responses
        Area Icon


        Acf2 contractor required for 12 months contract. Assist with secure audit report generation, configuration of security controls. Must be an acf2 expert. Good day rates apply.

        1. Profile Picture

          Arup Kanti |IT Support Engineer

          62.9 Days Later
        +1 Other Responses
        Area Icon

        Security Intelligence

        We are looking to speak to customers of exabeam. Exabeam is a security intelligence solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Some current customers of exabeam are adp, black rock, legg mason, barclays, td ameritrade, gap, levi’s, optiv, & ebay. We are looking for customers in the u.S. Only. The typical titles would be director/vp of security, director of soc, ciso etc. This would be for a 1 hour paid phone consultation.

          +undefined Other Responses
          Area Icon

          Hr Financial And Cyber Security

          Hello!   we are a global market research firm, currently looking for experts who can assist us gain a detailed understanding of the ”consulting market in us” with focus on following a)      hr consulting b)      financial consulting c)       cyber security consulting   list of requirements: ·         market size & growth (*only for financial consulting) ·         segmentation on the basis of services and end-use (*only for financial consulting)   ·         top suppliers (mainstream and diverse) and their market share (hr, financial & cyber security) ·         % contribution of supplier diversity on the overall spend  (hr, financial & cyber security) ·         are there any barriers in leveraging diverse suppliers? (hr, financial & cyber security) ·         case studies of leading banking & financial institutions using diverse suppliers for consulting services (hr, financial & cyber security) ·         leading sourcing practices - how leading companies source these categories? (engagement model, partnerships/supplier relationships, contract structures etc.) - (hr, financial & cyber security)   the main focus of our study is to identify diverse suppliers (minority-owned, women owned, veteran owned, lgbt-owned, service disabled veteran owned) in this space. We would like to engage via phone consult with experts knowledgeable about consulting service providers. Ideal candidates should have deep knowledge of industry trends and practices, key suppliers, industry partnerships, best practices etc.   we are looking for a phone consult to discuss the points mentioned above. Kindly drop in a note with your cv/relevant experience in the consulting industry, if you are interested to proceed.   best regards, thomas

          1. Profile Picture

            Shaun |Director

            Hi We have completed a similar project recently. Please share further details. Thanks Shaun...

            9.7 Hours Later
          2. Profile Picture

            Shyam |VP of Finance

            Deep knowledge within HR Financial and cyber consultuing space and can assist...

            12.4 Hours Later
          3. Profile Picture

            Gautam |HR Expert

            Dear sir, I am intersted to join. Gautam Chaudhury *****...

            14 Hours Later
          +14 Other Responses
          See More Inquiries

          Top Sas 70 Audit Experts

          See More Experts