Source Sas 70 Audit Experts for your Project, Phone Consult or Job

Submit an anonymous Inquiry -- Start receiving responses within a few hours

Have a need? Explain it here

Zintro does not display, sell or trade e-mail addresses

An eye iconForgot password?
Submit Inquiry

By clicking Submit Inquiry you agree to our TermsVIEW

or Request a Demo

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Sas 70 Audit Inquiries

Area Icon

Computer Security In Insurance

Looking for experts in cyber security insurance law

  1. Profile Picture

    Rahul |Chief Technical Officer

    Thanks for your message. We have expertise and experience in Cyber Security domain including ISO 270...

    4.8 Hours Later
  2. Profile Picture

    Norman |Consultant

    Sir, There is no detail visible in your inquiry on Zintro thus difficult to know what to respond. I ...

    7.2 Hours Later
  3. Profile Picture

    Bryan |InfoSec

    I can help in external security. ...

    7.8 Hours Later
+6 Other Responses
Area Icon

Computer Security

The zintro blog needs you! i am looking for your expert opinion on the news below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. You will be named in the article and a link to your profile will be included. Your contribution is voluntary (there is no direct payment involved but you will get lots of traffic to your profile). If interested please send me your response via znotes within the next few days. Programmer khalil shreateh posted a notice on zuckerberg's wall pointing out the security vulnerability on facebook that allows people to post on anyone's wall. Technology companies have become more open to help from independent hackers and facebook encourages reports about security vulnerabilities. Facebook pays at least $500 to people who report security problems but shreateh's account was temporarily disabled. How should computer security be handled? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ please include your full name, we will link it to your profile, getting you more presence on zintro. If you have any questions, let me know. Thank you! idil kan

  1. Profile Picture

    Burton |Retired Psychologist

    When I was using a Windows-based system with 300,000 known viruses and was invaded by hackers, every...

    42 Minutes Later
  2. Profile Picture

    Lindsey |Experienced MBA Marketer

    Hi Idil, Here is my response, thanks for the consideration! Computer and specifically internet se...

    1.1 Days Later
+2 Other Responses
Area Icon

Pharma It Security

Hi, i need sourcing specific insights on 'it security' from a pharmaceutical company point of view. Below are the key queries. 1. How the large pharmaceuticals companies procure 'it security' solutions? What are the recent trends being witnessed in the market? A. Bundled with it services? B. Software and hardware/devices are procured separately? C. Different suppliers for standard security solutions and high security (for research work) solutions? D. Engaging with a msp? 2. What are the key technology advancements? 3. Is there some instances where the companies have shifted to cloud based solutions? 4. What is virtual security operations center? How is it evolving? 5. How the direct sourcing of it services by business managers are evolving? 6. How the companies are assuring it security across the supply chain? Case studies. 7. Do the companies procure it security services or they procure it security solutions? 8. What are the key contract terms and slas? 9. What are the best practices? How the category is evolving? 10. What are the cost savings and negotiation opportunities? Thanks and regards, gaurav

    +undefined Other Responses
    Area Icon

    Security Policy Orchestration

    Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required. Preferably looking for us based candidates. Experts should know the us market in this area well, the different solutions available, have a good understanding of large enterprises need for such a solution, along with the key market risks and threats for these vendors.

      +undefined Other Responses
      Area Icon

      Computer Security

      Trusted platform module

      1. Profile Picture

        jeff |consultant

        What types of consulting do you need with regard to Trusted Computing Modules? I may be able to be ...

        52 Minutes Later
      2. Profile Picture

        John |Sr. Usability Engineering Consultant

        What is the task you are looking for support with? Obviously ***** TPM, but otherwise this is t...

        1.2 Hours Later
      3. Profile Picture

        Mario |IT consultant and solution provider

        Hi, Can you give me more details about your inquiry? regards...

        1 Day Later
      +5 Other Responses
      Area Icon

      Computer Security

      Looking for analysts/experts to interview for an article about what companies should expect to pay for computing-related security expenses (i.E., software and services, not staff), based on company size, data security needs, and complexity of systems in place?

      1. Profile Picture

        Emad Sayed |Information Security Consultant

        I would be interested. Can you send me detailed *****t the work?...

        6 Minutes Later
      2. Profile Picture

        Richard |Founder

        I am interested in your Computer Security Press Interview Inquiry for coyotemoon....

        7 Minutes Later
      3. Profile Picture

        Michael |Ethical Hacker/InfoSec Consultant

        I can definitely assist you on this....

        17 Minutes Later
      +40 Other Responses
      Area Icon

      Network Security Testing Market

      We are a well established investment firm based in the us. We're looking to do some market research in the penetration testing space and would like to speak to people who have assessed, purchased, or used vendors such as core security, cigital, netspi or digital defense. We’d prefer to speak to those in the financial or retail verticals if possible. Below are some questions to ask prospective experts to help us select the ones we’d like to engage with: 1. Are you a key decision maker who manages or oversees penetration testing? 2. Do your penetration testing needs focus more around network security or application security, or both? 3. Have you chosen to utilize a penetration testing service such as core security, cigital, netspi or digital defense? 4. Please state your current title and employer. Thank you.

        +undefined Other Responses
        Area Icon

        Hr Financial And Cyber Security

        Hello!   we are a global market research firm, currently looking for experts who can assist us gain a detailed understanding of the ”consulting market in us” with focus on following a)      hr consulting b)      financial consulting c)       cyber security consulting   list of requirements: ·         market size & growth (*only for financial consulting) ·         segmentation on the basis of services and end-use (*only for financial consulting)   ·         top suppliers (mainstream and diverse) and their market share (hr, financial & cyber security) ·         % contribution of supplier diversity on the overall spend  (hr, financial & cyber security) ·         are there any barriers in leveraging diverse suppliers? (hr, financial & cyber security) ·         case studies of leading banking & financial institutions using diverse suppliers for consulting services (hr, financial & cyber security) ·         leading sourcing practices - how leading companies source these categories? (engagement model, partnerships/supplier relationships, contract structures etc.) - (hr, financial & cyber security)   the main focus of our study is to identify diverse suppliers (minority-owned, women owned, veteran owned, lgbt-owned, service disabled veteran owned) in this space. We would like to engage via phone consult with experts knowledgeable about consulting service providers. Ideal candidates should have deep knowledge of industry trends and practices, key suppliers, industry partnerships, best practices etc.   we are looking for a phone consult to discuss the points mentioned above. Kindly drop in a note with your cv/relevant experience in the consulting industry, if you are interested to proceed.   best regards, thomas

        1. Profile Picture

          Shaun |Director

          Hi We have completed a similar project recently. Please share further details. Thanks Shaun...

          9.7 Hours Later
        2. Profile Picture

          Shyam |VP of Finance

          Deep knowledge within HR Financial and cyber consultuing space and can assist...

          12.4 Hours Later
        3. Profile Picture

          Gautam |HR Expert

          Dear sir, I am intersted to join. Gautam Chaudhury *****...

          14 Hours Later
        +14 Other Responses
        Area Icon

        Computer Security

        Assist with protocols and develop collection tools; assist with data analysis, interpretation, reports; assist in writing final reports

        1. Profile Picture

          Lito |IT Consultant

          Hello I am an experienced *****yst and I am familiar with analysis tools. Would be good to talk,...

          6.7 Days Later
        2. Profile Picture

          Geoffrey |Consultant

          Have only now seen this Inquiry (21 Dec)! From limited *****lied, I doubt that my "data ...

          16 Days Later
        +2 Other Responses
        Area Icon


        Acf2 contractor required for 12 months contract. Assist with secure audit report generation, configuration of security controls. Must be an acf2 expert. Good day rates apply.

        1. Profile Picture

          Arup Kanti |IT Support Engineer

          62.9 Days Later
        +1 Other Responses
        Area Icon

        Information Security

        Hi we are currently looking for partners,associates in the field of information security to expand our business. We have been into this for last 8 years and are looking for big time expansion by tying up with interested organizations.

        1. Profile Picture

          Mike |Senior Consultant

          Where is the location?...

          12 Minutes Later
        2. Profile Picture

          Ajay |Principal Consultant

          Hello, My name is Ajay Porus and I have started my new firm in field of *****rity recent...

          59 Minutes Later
        3. Profile Picture

          krag |CISM, CGEIT

          Having been involved in *****rity for better than three decades, I'm always interested in...

          1.1 Hours Later
        +21 Other Responses
        Area Icon

        Cyber Security

        The zintro blog needs you!i am looking for your expert opinion on the news below.Your response may be used in an article that i will write and post on the zintro site.Your contribution is voluntary,and while there is no direct payment involved,getting your name and expert opinion published on our blog is a great marketing opportunity that will increase the amount of traffic to your expert profile. As a featured expert,you will be named and a link to your profile will be included.Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ if interested,please send me your one-to-three paragraph response to the following news via znotes within the next few days: the guardian exposed the nsa’s most widespread surveillance program: xkeyscore. According to glenn greenwald, the program can store any information that can be extracted, which includes “nearly everything a typical user does on the internet,” and can also provide real-time surveillance of a target's internet activity for approximately 150 sites and 700 servers worldwide.Is this an invasion of privacy or a necessary security measure? Please include your full name so we can link it to your expert profile and get you more presence on zintro.Let me know if you have any questions. Thank you! gabriela meller

        1. Profile Picture

          Michael |Owner

          As a NYS licensed psychologist, certified forensic consultant and author of the new ***** ...

          1.2 Hours Later
        2. Profile Picture

          Dennis |President

          Do not believe what the NSA or supposed NSA whistleblowers tell you because 1) the NSA lies on purpo...

          3.1 Hours Later
        3. Profile Picture

          Douglas |CEO

          Re Cyber Security (XKeyscore) Is this an invasion of privacy or a necessary security measure. On th...

          7.2 Days Later
        +5 Other Responses
        See More Inquiries

        Top Sas 70 Audit Experts

        See More Experts