Affordably Source Wannacry Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Wannacry Inquiries

Area Icon

Cybersecurity Pcap/intelligence

Role summary serve as a technical architect to perform security log, pcap/intelligence analysis and detect unknown threats and will work to perform analysis of current and future advanced persistent threats role description role will be working at a client to perform analysis of current and future advanced persistent threats • experience on advanced persistent threats (apt) based on evaluations of large quantities of information to formulate actionable information to improve the information network security. • possess experience with network intelligence gathering, incident analysis, reverse engineering of attacker methods, and analytical analysis of technical and non-technical indicators of intrusion, intelligence analysis supporting computer security. • current understanding of the latest software vulnerabilities, virus/malicious code and exploits, firewalls, intrusion detection systems, automated vulnerability scanning tools, or modeling and analysis techniques. • excellent analysis and verbal/written communication skills. • experience with ci databases, splunk / arcsight, vmware, sentinel, geolocation tools. • experience with pcap analysis and net flow analysis. Role requirements required skills cybersecurity cyber forensics pcap analysis wireshark years of experience 10+ years

  1. Profile Picture

    Russell |Analyst

    Russell Stover ***** ***** Dear Sir/Madam: I am interested in the position ...

    4 Hours Later
  2. Profile Picture

    Alexander |Strategist

    Hi, I am interested in submitting for this contract. My experience with Fusion Centers, Threat Inte...

    1.3 Days Later
  3. Profile Picture

    David |Zintro Expert

    From the description, I need a bit more *****t the role. Is this only a security-related ...

    1.3 Days Later
+8 Other Responses
Area Icon

Trends & Preferences Of Managed Cybersecurity Services

Scope: the main objective of this study is to understand the trends and preferences for managed cybersecurity services for “global 2000” companies the study intends to understand: • key managed cyber security services being consumed by large corporations – “global 2000” companies • key features or capabilities preferred in the managed cyber security services being consumed (for managed detection and response, threat intelligence service, siem as a service, threat hunting, vulnerability management, and penetration testing • preferred pricing models / price points for managed cyber security services • estimated distribution of companies (from global 2000) between those undertaking end-to-end cybersecurity transformation, and those undertaking limited/targeted cybersecurity transformation focus geography: us, western europe (uk, germany, france) business focus: • managed cybersecurity services (managed detection and response, threat intelligence, siem, threat hunting, vulnerability management, penetration testing) number of experts: 5 timeframe: 20th january, 2021 expert job title(s): • from managed security service providers (mssps) and cybersecurity consulting companies (sample set of people): - account managerso sales managers/directors/vps - manager (threat intelligence sales) - cybersecurity sales specialist - any other relevant/related roles • from channel partners for mssps and consulting companies - senior manager (corporate sales) - strategic account manager - others relevant/related roles • other independent consultants and experts managed cybersecurity (especially for “global 2000” companies’ segment) * we need to include current and former employees from the following companies: - mssps (priority list of companies): fireye inc., secureworks inc., red canary, crowdstrike, deepwatch inc. - consulting companies (priority list of companies): ey, deloitte, accenture, pwc, mandiant - can include (second priority) other such mssps and consulting companies that provide managed cybersecurity services to "global 2000" companies. Survey type: telephonic survey duration: approx. 30-35 minutes screening questions: 1. Would you be able to share insights on the (based on the key pointers for discussion mentioned) below? Key pointers for discussion: • key managed cyber security services being consumed by large corporations – “global 2000” companies • key features or capabilities preferred in the cyber security services being consumed (for managed detection and response, threat intelligence service, managed siem, threat hunting, vulnerability management, and penetration testing • preferred pricing models / price points of the managed cyber security services • differences in preferences of services, between companies undertaking end-to-end cybersecurity transformation, and those undertaking limited/targeted cybersecurity transformation

  1. Profile Picture

    Fabrizio |Information Security Architect and CISO

    Happy to consult...

    23.7 Hours Later
  2. Profile Picture

    Scott |Director of IT

    Hello, would be happy to provide cyber security info and managed services info about a smaller non-p...

    23.7 Hours Later
  3. Profile Picture

    Salil |President/CEO & Founder

    Happy to consult....

    23.8 Hours Later
+101 Other Responses
Area Icon

Cybersecurity Policy Update

We are a leading webinar publisher (wholly owned by the financial times)and an authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “what general counsel need to know about updating cyber security policies”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information, please send your resume and any relevant information.

  1. Profile Picture

    Janet |Owner, Attorney, CIPP

    Hello - I have written in the area of cybersecurity and have worked on *****rsecurity polici...

    4 Hours Later
  2. Profile Picture

    Not |Consultant

    Your area of interest is a sweet-spot for me. I have advised executives and CSOs and CISO on this t...

    4.3 Hours Later
  3. Profile Picture

    Peter |Principal

    I would have an interest. I have presented many times on-line and countless times in person....

    5.9 Hours Later
+11 Other Responses
Area Icon

Cybersecurity

Seeking thought leaders in cybersecurity i am looking to interview entrepreneurs who are building cutting edge cyber security solutions for various segments of the market. I am only interested in those who already have customers and at least some revenue. The market, of course, is crowded, so we’d need to understand what is unique, how you differentiate, etc. Pitching instructions: please outline the specific story angle, value proposition, target market, differentiation vis-a-vis competitors, as well as revenue level and customer validation situation. The blog is read by tons of vcs in the technology industry, and the publicity we can create for you may very likely help you attract investor attention if that’s something you desire. Our media work is aligned with our core mission of helping entrepreneurs build successful companies. Also, articles we develop through these interviews often get repackaged for the syndication partners. The blog was named by forbes in the top 100 blog for entrepreneurs. Contact: sramana

  1. Profile Picture

    Neira |Managing Director

    Hello Sramana, can you give me the address of the blog? Kind regards, Neira...

    2.2 Hours Later
  2. Profile Picture

    James |Chief Architect

    I lead the Hartford Chapter of OWASP which is a 501c3 *****sed on *****rity. ...

    2.7 Hours Later
  3. Profile Picture

    Ramamurthy |Owner & CEO

    I am a Executive member (Treasurer) of Cyber Society of India (Cysi) and am actively conducting sess...

    3.7 Hours Later
+3 Other Responses
Area Icon

Online Cybersecurity Education

We are developing a series of undergraduate and graduate level online courses related to cybersecurity for one of our clients in the education space. The goal is to bring their cybersecurity program to a higher level. To achieve that, all courses, whether new or revisions, will be engaging, hands-on, accessible, and utilizing consistent instructional design. Simulations, toolwire labs, and mini hands-on activities will be added to most of the courses; some of the graduate and all undergraduate courses will also be aligned to industry certifications standards. The smes responsibility will be to work with our instructional designers and the college faculty to review/revise existing course outcomes and syllabus, and to either revise or create reading materials list, module notes, assignments and assessment, discussion questions, and interactive components (simulations). Sme qualifications - minimum mater’s level degree, phd preferred - experience teaching (online or in person) or designing similar courses - for certification/exam preparation courses, current certification: o sscp o hcissp o chfi o ceh o escp o security+ o network+ o linux+ - for certification/exam preparation courses, experience teaching or creating exam preparation courses - for certain courses, experience designing practical labs with toolwire scope: scope will depend on a particular course. All courses consist of 8 modules and include: - syllabus - module notes (lecture notes) - discussion questions (1 per module) - assignments - assessments (quizzes and exams) and associated rubrics certification/exam preparation courses will also include development of a practice exam (number of questions depends on the particular certification exam requirements). Some courses will include one or more of the following - simulation - hands-on activity - intensive lab (toolwire) tasks 1. Review existing course materials 2. Provide new content and changes to existing content 3. Review and edit storyboards created by our instructional designers 4. Review completed course in learning management system

  1. Profile Picture

    krag |CISM, CGEIT

    As principal author and SME for ISACA's CISM Review Manual for the past decade, author of several in...

    2 Hours Later
  2. Profile Picture

    Yevgen |Scientific Director

    Hello. We are ready to help. Online training services ( 15 years), so our experts can help you. Dr.E...

    3.2 Hours Later
  3. Profile Picture

    Not |Consultant

    Kevin G. Coleman is a seasoned technology professional with a comprehensive background in technology...

    6.8 Hours Later
+11 Other Responses
Area Icon

Ksa Cybersecurity Ecosystem

-timeframe: start/deadline? 7th april – 25th april -number of completes: how many participants would you like to interview/collaborate with? 1-2 -project type: phone/webcam interview or greater involvement? Telephonic interview -geography: which particular country/regional experience is preferred? Kingdom of saudi arabia (ksa) -brief summary statement of your need: we are looking at understanding cybersecurity ecosystem (focus on next-generation firewalls, multi-factor authentication, cybersecurity trainings) in ksa. We are particularly looking to understand if vision 2030 initiatives have had a direct or indirect impact on cybersecurity market in ksa -industries/sectors -which segments do participants need experience from? Experience in cybersecurity consulting with knowledge of ngfws and authenticators -organizations of interest: interested in recent-former experience from particular organizations? Cybersecurity consultants/ experts in ksa -organizations to avoid: (your target, partners, perspectives you've already covered, etc) na -seniority / experience level: entry/manager/director/vp/cxos? How many years of experience with the topic area? Director, vps, avps, senior managers, managers, consultants, industry experts -title/role/function: business (sales/marketing) ?, technical (it/engineering/ops) ?, other?: business, sales, marketing or technology (must have knowledge of cybersecurity ecosystem in ksa -would you like recording and transcription? No -remain anonymous? No -any pre-task/homework participants need to complete or review? No - screening questions: what questions would you like us to qualify candidates with? 1. Can you give us an overview of the ecosystem for cybersecurity in ksa with a focus on next-generation firewalls and multi-factor authenticators? What are the features that one must look at while evaluating an ngfw and multi-factor authenticators? What are the typical differentiating functions of ngfw versions (number of nodes, ram capacity, integration options, etc.)? 2. Can you give an overview of cybersecurity training in ksa? Which agencies are known for providing cybersecurity training in ksa and how are they typically deployed? What are the trends that trigger growth in the market for training currently and what are the future trends? 3. What are the cybersecurity needs for government and defense sector agencies in ksa? What are the companies that provide cybersecurity solutions to government and defense clients in ksa? 4. What is the impact of vision 2030 on cybersecurity in ksa? What are the key initiatives that have a pressing impact in the cybersecurity space?

  1. Profile Picture

    Muhammed |Product & Technology Management

    Yes, I’m open to discuss. ...

    1.5 Hours Later
  2. Profile Picture

    Erol |Director Of Technology

    ....

    5.1 Hours Later
  3. Profile Picture

    Rohit |Lead Security Architect

    I have more then 15 years of experience in cyber security and *****r *****rams...

    30.2 Days Later
+12 Other Responses
Area Icon

Cybersecurity Ratings

Our client is a vc / growth equity firm looking to better understand the security ratings industry. (bitsight is the industry leader in this segment) they are looking to understand: 1) what are the most important features/characteristics of a risk-scoring solution to customers? 2) what is the size of the tam/sam? 3) who are the biggest competitors in the space from a market share perspective? 4) what differentiates bitsight from all other competitors in the market? A) go-to-market b) solution and technical differentiation (value prop) c) pricing

  1. Profile Picture

    Charles |Vice President of Government Relations &

    Happy to assist. Charles (Chuck) Brooks serves as the Vice President for Government ***** & Mark...

    3.7 Hours Later
  2. Profile Picture

    Glenn |Director

    Please call me at***** to see if I can help. Thank you ***** Glenn...

    5.4 Hours Later
  3. Profile Picture

    Steven |Founder & Principal

    Hello! I assisted a company with verifying their algorithm for such purposes. I have also worked w...

    12.8 Days Later
+6 Other Responses
Area Icon

Cyber Security Landscape

Our multinational client is working on research about the cyber security landscape particularly on firmware/hardware — at the level of the business user’s machine vs. At the network or cloud level. They are interested in speaking with experts based on the criteria below: - us based expert certified by nist (national institute of standards and technology) - expert / entrepreneur in israel but who has a focus on firmware / hardware — at the level of the business user’s machine vs. At the network or cloud level. This will be for a 1-hour webcam interview. Please provide a brief response below as to your relevance in the space. 1. Can you share your background in the overall cybersecurity landscape? 2. Can you share a holistic view as to what components are in play on the it security landscape particularly in secured-core pcs?

  1. Profile Picture

    Naresh |Advisory Board

    I can discuss the current trends, such as Zero Trust Network, Software Defined Perimeter, convergenc...

    1.8 Hours Later
  2. Profile Picture

    New |

    Hi, Currently ***** one of the leading MSSP, have in-depth expertise in all the cyber secu...

    22.4 Hours Later
  3. Profile Picture

    Omri |Global IT and cyber security Manager

    1. Can you share your background in the overall cybersecurity landscape? - Yes, Global IT Infrastruc...

    1.2 Days Later
+38 Other Responses
Area Icon

South African Cybersecurity Market & Trends

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Douglas |CEO

    I built the KPMG CyberSecurity practice and re-organized the global Deloitte cybersecurity practice....

    2.3 Hours Later
  2. Profile Picture

    Craig |Managing Director

    I had a look through the questions and yes we are actively involved in the cyber security training /...

    6.1 Days Later
+3 Other Responses
Area Icon

Cybersecurity

Looking for a cyber security expert who can assist in evaluation early stage investments for an established vc.

  1. Profile Picture

    Jeffrey |Chief Intelligence Officer

    Ready for a consult as a small business in cyber security and intelligence ...

    4 Hours Later
  2. Profile Picture

    Johnathan |Information Security Analyst II

    Certified *****ems Security Professional (CISSP) here, ready to help *****ucts an...

    4.1 Hours Later
  3. Profile Picture

    Richard |Executive Chair

    Have done this often before for venture funds in US and Canada. Experience: - built and successfull...

    4.4 Hours Later
+35 Other Responses
Area Icon

Cybersecurity Training

Can you please help me with cyber security awareness model?

  1. Profile Picture

    Richard |CIO, VP, Director, Executive Director

    I wrote cyber certs for CompTIA, and developed 14 other ***** them. Knowledgeable of Do...

    1.7 Hours Later
  2. Profile Picture

    Darian |Sustainable IT Solutions Strategist

    Can you provide more detail as well as the expected wage? Thank you, Darian...

    7.2 Hours Later
  3. Profile Picture

    Derek |President/Managing Partner

    There are many possible models that would be beneficial to understanding cyber security, especially ...

    2.9 Days Later
+5 Other Responses
Area Icon

Cyber Security Software Solutions

Our client would like to speak with multiple it security decision-makers who are involved in purchasing cyber security software, solutions & services for their organization. They are aiming to better understand how businesses approach cybersecurity, the priorities and needs, and the types of solutions and services that they are currently using. This is a 1-hour paid web interview. If open to participating, please provide a brief answer to the screener below: how involved are you in making the decisions for it security? Please note that we are only interested in your personal point of view and are not seeking confidential information. Referrals are welcome.

  1. Profile Picture

    Vikas |Enterprise Architect

    Yes, I have expertise in cyber security software solutions...

    2.2 Hours Later
  2. Profile Picture

    Ben |Chief Information Security Officer

    CISO at *****f decision maker for IT security choices and spend...

    2.2 Hours Later
  3. Profile Picture

    Sam |Board Member & Chief Technology Officer

    I have extensive experience in selecting, procuring and implementing cyber security solution in larg...

    2.3 Hours Later
+59 Other Responses
See More Inquiries

Top Wannacry Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+