Affordably Source Siem Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here

Zintro does not display, sell or trade e-mail addresses

An eye iconForgot password?
Submit Inquiry

By clicking Submit Inquiry you agree to our TermsVIEW

or Request Pricing Information

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Siem Inquiries

Area Icon

Security Information Event Management

We need people who can help us buil next generation siem technology

  1. Profile Picture

    Ran |Information Security Consultant

    Hello, Please have a look in the following info: ♦ Current Position: IT Consultant at *****Why is t...

    27 Minutes Later
  2. Profile Picture

    Jeff |Security and Privacy Consultant

    I believe myself to be qualified as an expert in SIEM technology. I am unclear from your brief desc...

    2.5 Hours Later
  3. Profile Picture

    Gary |President & CEO

    Hello, We propose a US company / Project Team Leader with the offshore *****, Every tim...

    7.4 Days Later
+4 Other Responses
Area Icon

Managed Security Services

Find out information about managed security services (mss) market research in malaysia or asia pacific especially for security information events monitoring (siem) and security professional services.

  1. Profile Picture

    Ubaid |Expert Senior Consultant

    I have extensive experience of managed security services. I am certified Security ***** Ev...

    3.9 Hours Later
  2. Profile Picture

    Scott |CGO

    I have extensive, executive level experience with Managed Security Services. I am presently performi...

    9.8 Hours Later
  3. Profile Picture

    Gary |Security Services Product Manager

    Hello, Is this specific to Malaysia? I am the Security Services Manager for the ***** Minnesota...

    10.2 Hours Later
+3 Other Responses
Area Icon

Cybersecurity Pcap/intelligence

Role summary serve as a technical architect to perform security log, pcap/intelligence analysis and detect unknown threats and will work to perform analysis of current and future advanced persistent threats role description role will be working at a client to perform analysis of current and future advanced persistent threats • experience on advanced persistent threats (apt) based on evaluations of large quantities of information to formulate actionable information to improve the information network security. • possess experience with network intelligence gathering, incident analysis, reverse engineering of attacker methods, and analytical analysis of technical and non-technical indicators of intrusion, intelligence analysis supporting computer security. • current understanding of the latest software vulnerabilities, virus/malicious code and exploits, firewalls, intrusion detection systems, automated vulnerability scanning tools, or modeling and analysis techniques. • excellent analysis and verbal/written communication skills. • experience with ci databases, splunk / arcsight, vmware, sentinel, geolocation tools. • experience with pcap analysis and net flow analysis. Role requirements required skills cybersecurity cyber forensics pcap analysis wireshark years of experience 10+ years

  1. Profile Picture

    Russell |Analyst

    Russell Stover ***** ***** Dear Sir/Madam: I am interested in the position ...

    3 Hours Later
  2. Profile Picture

    Alexander |Strategist

    Hi, I am interested in submitting for this contract. My experience with Fusion Centers, Threat Inte...

    1.3 Days Later
  3. Profile Picture

    David |Zintro Expert

    From the description, I need a bit more *****t the role. Is this only a security-related ...

    1.3 Days Later
+8 Other Responses
Area Icon

Cybersecurity Ratings

Our client is a vc / growth equity firm looking to better understand the security ratings industry. (bitsight is the industry leader in this segment) they are looking to understand: 1) what are the most important features/characteristics of a risk-scoring solution to customers? 2) what is the size of the tam/sam? 3) who are the biggest competitors in the space from a market share perspective? 4) what differentiates bitsight from all other competitors in the market? A) go-to-market b) solution and technical differentiation (value prop) c) pricing

  1. Profile Picture

    Charles |Vice President of Government Relations &

    Happy to assist. Charles (Chuck) Brooks serves as the Vice President for Government ***** & Mark...

    2.7 Hours Later
  2. Profile Picture

    Glenn |Director

    Please call me at***** to see if I can help. Thank you ***** Glenn...

    4.4 Hours Later
  3. Profile Picture

    Steven |Founder & Principal

    Hello! I assisted a company with verifying their algorithm for such purposes. I have also worked w...

    12.8 Days Later
+6 Other Responses
Area Icon

Siem

Need top 100 siem vendors list

  1. Profile Picture

    Edison |Projects Manager

    Could you please send me mofe *****ir the proyecto you are devrloping Andrés you want sup...

    6 Minutes Later
+1 Other Responses
Area Icon

Online Cybersecurity Education

We are developing a series of undergraduate and graduate level online courses related to cybersecurity for one of our clients in the education space. The goal is to bring their cybersecurity program to a higher level. To achieve that, all courses, whether new or revisions, will be engaging, hands-on, accessible, and utilizing consistent instructional design. Simulations, toolwire labs, and mini hands-on activities will be added to most of the courses; some of the graduate and all undergraduate courses will also be aligned to industry certifications standards. The smes responsibility will be to work with our instructional designers and the college faculty to review/revise existing course outcomes and syllabus, and to either revise or create reading materials list, module notes, assignments and assessment, discussion questions, and interactive components (simulations). Sme qualifications - minimum mater’s level degree, phd preferred - experience teaching (online or in person) or designing similar courses - for certification/exam preparation courses, current certification: o sscp o hcissp o chfi o ceh o escp o security+ o network+ o linux+ - for certification/exam preparation courses, experience teaching or creating exam preparation courses - for certain courses, experience designing practical labs with toolwire scope: scope will depend on a particular course. All courses consist of 8 modules and include: - syllabus - module notes (lecture notes) - discussion questions (1 per module) - assignments - assessments (quizzes and exams) and associated rubrics certification/exam preparation courses will also include development of a practice exam (number of questions depends on the particular certification exam requirements). Some courses will include one or more of the following - simulation - hands-on activity - intensive lab (toolwire) tasks 1. Review existing course materials 2. Provide new content and changes to existing content 3. Review and edit storyboards created by our instructional designers 4. Review completed course in learning management system

  1. Profile Picture

    krag |CISM, CGEIT

    As principal author and SME for ISACA's CISM Review Manual for the past decade, author of several in...

    2 Hours Later
  2. Profile Picture

    Yevgen |Scientific Director

    Hello. We are ready to help. Online training services ( 15 years), so our experts can help you. Dr.E...

    3.2 Hours Later
  3. Profile Picture

    Not |Consultant

    Kevin G. Coleman is a seasoned technology professional with a comprehensive background in technology...

    6.8 Hours Later
+11 Other Responses
Area Icon

South African Cybersecurity Market & Trends

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Douglas |CEO

    I built the KPMG CyberSecurity practice and re-organized the global Deloitte cybersecurity practice....

    1.3 Hours Later
  2. Profile Picture

    Craig |Managing Director

    I had a look through the questions and yes we are actively involved in the cyber security training /...

    6 Days Later
+3 Other Responses
Area Icon

Cybersecurity

Looking for a cyber security expert who can assist in evaluation early stage investments for an established vc.

  1. Profile Picture

    Jeffrey |Chief Security Strategist

    Ready for a consult as a small business in cyber security and intelligence ...

    4 Hours Later
  2. Profile Picture

    Johnathan |Information Security Analyst II

    Certified *****ems Security Professional (CISSP) here, ready to help *****ucts an...

    4.1 Hours Later
  3. Profile Picture

    Richard |Executive Chair

    Have done this often before for venture funds in US and Canada. Experience: - built and successfull...

    4.4 Hours Later
+35 Other Responses
Area Icon

Trigeo

Hi we are looking for a permanent hire or on project basis, a resource who has substantial ( at least 2-3 years) experience of managing siem ( arcsight, trigeo, rsa etc..). Salary in line with the market rates.

  1. Profile Picture

    Fareeduddin |Senior IT Security and Risk Professional

    Hi Sanjwal, Thanks for your inquiry. Please note that I have more than 3 years of experience worki...

    1.9 Hours Later
  2. Profile Picture

    Kirk |Senior Securiy Consultant

    Sanjwal, Are you looking for *****rtise or on-going management and ***** ...

    4.3 Hours Later
  3. Profile Picture

    Ravi |Manager

    Hi Sanjay, Please let me know the requirement for *****rity. Thanks & Regards, Ravi...

    16.4 Hours Later
+5 Other Responses
Area Icon

Network Security

We are bringing a new integrated siem/ips/fw to market. If you are familiar with archsight/nitro solutions, we perform better. Rigorously stress-tested for known and evolving threats, the xxxxxxx delivers a new level of security designed to address zero day attacks, known viruses, malware, as well as advanced criminal and state sponsored cyber-warfare now common place. It provides carrier grade reliability and world class security integrated with advanced business solutions. We are looking for assistance in locating biz dev partners and opportunities. If you have any advice or interested in learning more please contact us.

  1. Profile Picture

    Gary |Security Services Product Manager

    Hello, We use ArcSight for SIEM. We collect IPS, FW, and have started to collect/***** fo...

    1.6 Days Later
  2. Profile Picture

    Tom |CEO/Owner/Operations

    I would like to learn more about the Network Security ***** ***** skills in many ar...

    2.2 Days Later
  3. Profile Picture

    TOCHUKWU SUNDAY |CEO/ VP SALES / STRATEGIC

    i can be of use to you if you can meet me in Lagos Nigeria office for meetings with thsoe me & the r...

    6 Days Later
+9 Other Responses
Area Icon

Cyber Security Landscape

Our multinational client is working on research about the cyber security landscape particularly on firmware/hardware — at the level of the business user’s machine vs. At the network or cloud level. They are interested in speaking with experts based on the criteria below: - us based expert certified by nist (national institute of standards and technology) - expert / entrepreneur in israel but who has a focus on firmware / hardware — at the level of the business user’s machine vs. At the network or cloud level. This will be for a 1-hour webcam interview. Please provide a brief response below as to your relevance in the space. 1. Can you share your background in the overall cybersecurity landscape? 2. Can you share a holistic view as to what components are in play on the it security landscape particularly in secured-core pcs?

  1. Profile Picture

    Naresh |Chief Technology Officer

    I can discuss the current trends, such as Zero Trust Network, Software Defined Perimeter, convergenc...

    49 Minutes Later
  2. Profile Picture

    New |

    Hi, Currently ***** one of the leading MSSP, have in-depth expertise in all the cyber secu...

    21.4 Hours Later
  3. Profile Picture

    Omri |Global IT and cyber security Manager

    1. Can you share your background in the overall cybersecurity landscape? - Yes, Global IT Infrastruc...

    1.2 Days Later
+38 Other Responses
Area Icon

Cybersecurity Training

Can you please help me with cyber security awareness model?

  1. Profile Picture

    Richard |CIO, VP, Director, Executive Director

    I wrote cyber certs for CompTIA, and developed 14 other ***** them. Knowledgeable of Do...

    41 Minutes Later
  2. Profile Picture

    Darian |Sustainable IT Solutions Strategist

    Can you provide more detail as well as the expected wage? Thank you, Darian...

    6.2 Hours Later
  3. Profile Picture

    Derek |President/Managing Partner

    There are many possible models that would be beneficial to understanding cyber security, especially ...

    2.9 Days Later
+5 Other Responses
See More Inquiries

Top Siem Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+