Seasoned Sas 70 Audit Experts available for Projects, Phone Consults or Jobs

Submit an anonymous Inquiry -- Start receiving responses within a few hours

Have a need? Explain it here

Forgot password?
Submit Inquiry

By clicking Submit Inquiry you agree to our Terms VIEW

How Zintro Works

  1. 1. Provide a brief description of your needs and Zintro will match it with the most relevant Experts in our 100,000+ user network.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other and connect through Zintro.
  4. Zintro is free, anonymous and without obligation.

Need Help? A phone icon 1-877-236-7016

Recent Sas 70 Audit Inquiries

Area Icon

Sas 70 Audit

Looking for sas 70 certification irfan ***************

  1. Profile Picture

    sashidharan |Professional & Consultant

    Hi, Thanks for your inquiry. Kindly note that I was out of station. Kindly note that I'm currently...

    1.5 Days Later
  2. Profile Picture

    GregoryScott |CEO

    Hello, we should talk. I'd be happy to spend some time discussing how I may be able to assist you....

    37.9 Days Later
+3 Other Responses
Area Icon

Computer Security

Assist with protocols and develop collection tools; assist with data analysis, interpretation, reports; assist in writing final reports

  1. Profile Picture

    Scott |Chief Technology Officer

    Scott Arnett is an Information Technology & Security Professional Executive with over 30 years exper...

    18.4 Hours Later
  2. Profile Picture

    trumpgeek |IT Consultant

    Hello I am an experienced data analyst and I am familiar with analysis tools. Would be good to talk,...

    6.7 Days Later
  3. Profile Picture

    Geoff |Consultant

    Have only now seen this Inquiry (21 Dec)! From limited information supplied, I doubt that my "data ...

    16 Days Later
+3 Other Responses
Area Icon

Computer Security

Looking for analysts/experts to interview for an article about what companies should expect to pay for computing-related security expenses (i.E., software and services, not staff), based on company size, data security needs, and complexity of systems in place?

  1. Profile Picture

    emadnoorulla |Information Security Consultant

    I would be interested. Can you send me detailed information about the work?...

    6 Minutes Later
  2. Profile Picture

    Richard |Founder

    I am interested in your Computer Security Press Interview Inquiry for coyotemoon....

    7 Minutes Later
  3. Profile Picture

    michaelvien |Ethical Hacker/InfoSec Consultant

    I can definitely assist you on this....

    17 Minutes Later
+40 Other Responses
Area Icon

Cyber Security

Looking for a certifed security consultant to assist the nist 800-53 security team acheive compliance in 6 months. The assitance would be part-time as a subject matter expert.

  1. Profile Picture

    Treadstone71 |Chief Security Strategist

    19 years NIST and FISMA experience. ...

    55 Minutes Later
  2. Profile Picture

    Robert |CEO

    I am interested in working on this project. I have 25 years of experience implementing NIST guideli...

    1.3 Hours Later
  3. Profile Picture

    Yusuf |Owner/Founbder

    I am interested, in consulting for this project. I am CISSP, CISM, SAN-GNSA, and CEH certified. My b...

    8.8 Hours Later
+6 Other Responses
Area Icon

Sas 70 Audit

Does providing a website where a social security number is entered into memory but not stored on any service require that such a website be sas70 audited?

  1. Profile Picture

    ARUL |DIRECTOR

    Interested in this assignment...

    1.8 Days Later
  2. Profile Picture

    Ronald |Managing Partner

    A SAS70 audit is not required. They are more used for hosting information or infrastructure. Anyway,...

    2.9 Days Later
  3. Profile Picture

    Sherod |ISSO

    I'm not sure - I would look for PII related information related to SAS70 in a search engine - or bet...

    5 Days Later
+3 Other Responses
Area Icon

Computer Security

Trusted platform module

  1. Profile Picture

    jstollman |consultant

    What types of consulting do you need with regard to Trusted Computing Modules? I may be able to be ...

    52 Minutes Later
  2. Profile Picture

    J |Sr. Usability Engineering Consultant

    What is the task you are looking for support with? Obviously related to TPM, but otherwise this is t...

    1.2 Hours Later
  3. Profile Picture

    Mario |IT consultant and solution provider

    Hi, Can you give me more details about your inquiry? regards...

    1 Day Later
+5 Other Responses
Area Icon

Acf2

Acf2 contractor required for 12 months contract. Assist with secure audit report generation, configuration of security controls. Must be an acf2 expert. Good day rates apply.

  1. Profile Picture

    Gaston |System Programmer

    I'd like to know more about this proposal. I have a large experience on REXX and ACF2 reports genera...

    11 Minutes Later
  2. Profile Picture

    Arup |IT Support Engineer

    ae.linkedin.com/in/arupbissan/...

    62.9 Days Later
+2 Other Responses
Area Icon

Cyber Security

The zintro blog needs you!i’m looking for your expert opinion on the news below and a written response that is one to three paragraphs long.Your response may be used in an article that i will write and post on the zintro site.You will be named in the article and a link to your profile will be included.Your contribution is voluntary(there is no direct payment involved,but you will get lots of traffic to your expert profile).If interested,please send me your response via znotes within the next few days. The washington post reported on a program called prism,which gives the national security agency direct access to internet companies’ servers.Google and apple denied that relationship with the government.Facebook says that it doesn’t provide the government with direct access to its servers and microsoft claims that it only provides customer data when there is a legal order.What’s the extent of the nsa’s reach into the communications in the us? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ please include your full name,we will link it to your profile,getting you more presence on zintro.If you have any questions,please let me know. Thank you! idil kan

  1. Profile Picture

    Chip |Managing Partner and Director of Researc

    Hello Idil, Thank you for your inquiry. I am very interested to participate in this project. Plea...

    5 Minutes Later
  2. Profile Picture

    Robert |systems engineering

    not interested...

    24 Minutes Later
  3. Profile Picture

    kenhuangus |Director

    I am interested in contributing....

    1.9 Hours Later
+6 Other Responses
Area Icon

Computer Security In Insurance

Looking for experts in cyber security insurance law

  1. Profile Picture

    rahulmehta |Chief Technical Officer

    Thanks for your message. We have expertise and experience in Cyber Security domain including ISO 270...

    4.8 Hours Later
  2. Profile Picture

    Norman_Crocker |Consultant

    Sir, There is no detail visible in your inquiry on Zintro thus difficult to know what to respond. I ...

    7.2 Hours Later
  3. Profile Picture

    d5eba30e |InfoSec

    I can help in external security. ...

    7.8 Hours Later
+6 Other Responses
Area Icon

Computer Security

The zintro blog needs you! i am looking for your expert opinion on the news below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. You will be named in the article and a link to your profile will be included. Your contribution is voluntary (there is no direct payment involved but you will get lots of traffic to your profile). If interested please send me your response via znotes within the next few days. Programmer khalil shreateh posted a notice on zuckerberg's wall pointing out the security vulnerability on facebook that allows people to post on anyone's wall. Technology companies have become more open to help from independent hackers and facebook encourages reports about security vulnerabilities. Facebook pays at least $500 to people who report security problems but shreateh's account was temporarily disabled. How should computer security be handled? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ please include your full name, we will link it to your profile, getting you more presence on zintro. If you have any questions, let me know. Thank you! idil kan

  1. Profile Picture

    ABC4All |Co-Founder

    When I was using a Windows-based system with 300,000 known viruses and was invaded by hackers, every...

    42 Minutes Later
  2. Profile Picture

    LD |Experienced MBA Marketer

    Hi Idil, Here is my response, thanks for the consideration! Computer and specifically internet se...

    1.1 Days Later
+2 Other Responses
Area Icon

Information Security Automation

I am looking for subject matter expertise in 'information security automation'. If you posses such expertise please reach out to me

  1. Profile Picture

    Scott |Principal Consultant

    Hi, I have knowledge & expertise in "Information Security Automation". There are many aspects to au...

    14 Minutes Later
  2. Profile Picture

    Neira |Managing Director

    Hi, I can help......

    21 Minutes Later
  3. Profile Picture

    jstollman |consultant

    I am unclear on exactly what you are looking for, but believe that I can be of assistance. I help f...

    37 Minutes Later
+10 Other Responses
Area Icon

It Security

I am looking for an it consultant with the following it security clearance certifications who is available to work on site (travel) and remotely as needed. Cism certified information security manager cisa certified information systems auditor cgeit certified in the governance of enterprise it

  1. Profile Picture

    Information |Manager Information Security

    Hi, My nearly 14 years of experience in Infrastructure Management, Security Management, Cyber Foren...

    12 Minutes Later
  2. Profile Picture

    Rohit |Managing Partner & Director

    Hi we can assist in your requirements. I represent a firm of management consultants and we have an a...

    36 Minutes Later
  3. Profile Picture

    jstollman |consultant

    From your brief description, it appears that you are looking for assistance assessing the security o...

    1.9 Hours Later
+17 Other Responses
See More Inquiries

Top Sas 70 Audit Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+