Affordably Source Security Information Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Security Information Inquiries

Area Icon

Security Information Event Management

We need people who can help us buil next generation siem technology

  1. Profile Picture

    Ran |Information Security Consultant

    Hello, Please have a look in the following info: ♦ Current Position: IT Consultant at *****Why is t...

    1.5 Hours Later
  2. Profile Picture

    Jeff |Security and Privacy Consultant

    I believe myself to be qualified as an expert in SIEM technology. I am unclear from your brief desc...

    3.5 Hours Later
  3. Profile Picture

    Gary |President & CEO

    Hello, We propose a US company / Project Team Leader with the offshore *****, Every tim...

    7.4 Days Later
+4 Other Responses
Area Icon

Trigeo

Hi we are looking for a permanent hire or on project basis, a resource who has substantial ( at least 2-3 years) experience of managing siem ( arcsight, trigeo, rsa etc..). Salary in line with the market rates.

  1. Profile Picture

    Fareeduddin |Senior IT Security and Risk Professional

    Hi Sanjwal, Thanks for your inquiry. Please note that I have more than 3 years of experience worki...

    1.9 Hours Later
  2. Profile Picture

    Kirk |Senior Securiy Consultant

    Sanjwal, Are you looking for *****rtise or on-going management and ***** ...

    4.3 Hours Later
  3. Profile Picture

    Ravi |Manager

    Hi Sanjay, Please let me know the requirement for *****rity. Thanks & Regards, Ravi...

    16.4 Hours Later
+5 Other Responses
Area Icon

Security Policy Orchestration

Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required. Preferably looking for us based candidates. Experts should know the us market in this area well, the different solutions available, have a good understanding of large enterprises need for such a solution, along with the key market risks and threats for these vendors.

  1. Profile Picture

    Aaron |Zintro Expert

    Depending on your specific questions, I would love to help. Let me know if you'd like to set up a ca...

    3.5 Hours Later
  2. Profile Picture

    Scottard |Executive Security Strategist

    Hi, Saw your inquiry, I would like to assist you. I have over 20 years writing and automating s...

    3.5 Hours Later
  3. Profile Picture

    Ubaid |Expert Senior Consultant

    Hi, I can help you, I have more than 10 years of experiences in *****rity , technical sec...

    3.9 Hours Later
+19 Other Responses
Area Icon

Web Content Security

Hi , i'm interested in having a conversation with you about web content security - is this something with which you have familiarity? Thanks!

  1. Profile Picture

    Zainal |Regional Operation Director

    i have been in that field since 1997 yes, that is something that i have familiarity with...

    1 Hour Later
  2. Profile Picture

    Charles |Chief Executive Officer

    Hello, Yes, I welcome the opportunity to speak with you about Web Content Security. I am currently...

    1.3 Hours Later
  3. Profile Picture

    Anton |CEO

    Hi, What particular aspects of Web content security you are interested in? Best, Tony...

    1.6 Hours Later
+6 Other Responses
Area Icon

Managed Security Services

Find out information about managed security services (mss) market research in malaysia or asia pacific especially for security information events monitoring (siem) and security professional services.

  1. Profile Picture

    Ubaid |Expert Senior Consultant

    I have extensive experience of managed security services. I am certified Security ***** Ev...

    3.9 Hours Later
  2. Profile Picture

    Scott |CGO

    I have extensive, executive level experience with Managed Security Services. I am presently performi...

    9.8 Hours Later
  3. Profile Picture

    Gary |Security Services Product Manager

    Hello, Is this specific to Malaysia? I am the Security Services Manager for the ***** Minnesota...

    10.2 Hours Later
+3 Other Responses
Area Icon

Siem

Need top 100 siem vendors list

  1. Profile Picture

    Edison |Projects Manager

    Could you please send me mofe *****ir the proyecto you are devrloping Andrés you want sup...

    1.1 Hours Later
+1 Other Responses
Area Icon

Security Engineering

Looking for a senior security engineer/architect with ts/sci to perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established security and information assurance (ia) standards and regulations, and recommend mitigation strategies. The security engineer assesses and mitigates system security threats/risks throughout the program life cycle, validates system security requirements definitions and analysis, establishes system security designs, and verifies security requirements.

  1. Profile Picture

    Sergey |CMO/Project Manager

    Hi we an *****rity company comprised of highly talented CISSP and CISA certified engineer...

    8 Minutes Later
  2. Profile Picture

    Noah |Information Security Intelligence Analys

    Hello Eric, I have two initial questions for you regarding this position. First, how long is the co...

    1.5 Hours Later
  3. Profile Picture

    Asish |Chief Enterprise Architect & Data Sci

    I am ***** Bangalore(India). I will be only available for offshore work. If you are fine with o...

    9.2 Hours Later
+9 Other Responses
Area Icon

Cyber Security

Subject: consulting opportunity re: cyber security description: seeking subject matter experts (smes) to assess novel intellectual property (ip) in the above field, and determine its commercial viability (i.E., licensing, new products/services, and/or start-up opportunities. -the assessments will be brief engagements, 2-6 hours and on a intermittent basis, e.G. One/month or once every couple months ... The engagements are dependent on frequency of clients submitting applications to be assessed -work will be online and telephone. Qualifications: bachelor’s degree, minimum 10+ years in the field, with broad overview of the cyber security field. Preferably u.S.-based consultancies. Areas of expertise: looking for smes with strong r&d/technical background, and smes with direct experience in product development and commercialization in the field, including entrepreneurial experience. (or combination of technical side and commercialization side

  1. Profile Picture

    Dennis |President

    I can *****tographic algorithms, not necessarily to declare them safe and effective, but to ...

    1.4 Hours Later
  2. Profile Picture

    Charles |Chief Executive Officer

    Hello, Thank you for your inquiry regarding Cyber Security and SMEs. I believe I can assist you wi...

    3.1 Hours Later
  3. Profile Picture

    Narendra |Director

    Hello, We are a consulting company specialising in Cyber Security *****liance and Ne...

    15.1 Hours Later
+7 Other Responses
Area Icon

Network Security

We are bringing a new integrated siem/ips/fw to market. If you are familiar with archsight/nitro solutions, we perform better. Rigorously stress-tested for known and evolving threats, the xxxxxxx delivers a new level of security designed to address zero day attacks, known viruses, malware, as well as advanced criminal and state sponsored cyber-warfare now common place. It provides carrier grade reliability and world class security integrated with advanced business solutions. We are looking for assistance in locating biz dev partners and opportunities. If you have any advice or interested in learning more please contact us.

  1. Profile Picture

    Gary |Security Services Product Manager

    Hello, We use ArcSight for SIEM. We collect IPS, FW, and have started to collect/***** fo...

    1.6 Days Later
  2. Profile Picture

    Tom |CEO/Owner/Operations

    I would like to learn more about the Network Security ***** ***** skills in many ar...

    2.2 Days Later
  3. Profile Picture

    TOCHUKWU SUNDAY |CEO/ VP SALES / STRATEGIC

    i can be of use to you if you can meet me in Lagos Nigeria office for meetings with thsoe me & the r...

    6.1 Days Later
+9 Other Responses
Area Icon

Information And Data Securities

Looking for information security data classification expert.

  1. Profile Picture

    Faisal |Consultant

    Dear Sir/Madam, With reference to your inquiry regarding ***** *****rities, I would l...

    1.7 Hours Later
  2. Profile Picture

    Robert |CEO

    I am an expert in these areas. What exactly are you looking for?...

    1.8 Hours Later
  3. Profile Picture

    Cristian |Senior Security Engineer

    Hello! I am interested and would like to hear more details....

    2.5 Hours Later
+8 Other Responses
Area Icon

It Security

I am looking for an it consultant with the following it security clearance certifications who is available to work on site (travel) and remotely as needed. Cism certified information security manager cisa certified information systems auditor cgeit certified in the governance of enterprise it

  1. Profile Picture

    Ariben |Manager Information Security

    Hi, My nearly 14 years of experience in Infrastructure Management, Security Management, Cyber Foren...

    1.2 Hours Later
  2. Profile Picture

    Rohit |Managing Partner & Director

    Hi we can assist in your requirements. I represent a firm of management consultants and we have an a...

    1.6 Hours Later
  3. Profile Picture

    Chet |CISO

    Do not have the CGEIT but could obtain it quickly. Have CISSP, CISM, CISA, GSNA, ITIL and a expired...

    8.4 Hours Later
+16 Other Responses
Area Icon

Information Security And Privacy

We are a leading webinar publisher (wholly owned by the financial times) and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “how information security and privacy will impact your bottom line as a gc”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information contact me

  1. Profile Picture

    ANDREW R. |CTO/Chief Enterprise Architect & CSO

    I can certainly lead such a webinar....

    2.5 Hours Later
  2. Profile Picture

    E |Senior Disaster Recovery Planner

    Inforamtion Security and Privacy are at the top of the list for many *****. Technology and ...

    2.7 Hours Later
  3. Profile Picture

    Robert |Columnist

    I would be happy to speak with you about such a webinar. I have been a Contributor to the "Computer ...

    2.9 Hours Later
+7 Other Responses
See More Inquiries

Top Security Information Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+