Affordably Source Wireless Network Security Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Wireless Network Security Inquiries

Area Icon

Openvpn

Need to configure a tunnel between two data centers ... Open vpn is installed and awaiting configuration.

  1. Profile Picture

    Vikas |Consultant

    Hi, Do you want to establish secure channel between your company and some other provider? Please pr...

    1.2 Days Later
  2. Profile Picture

    Md Probal |Network Engineer

    Hi, I am interested to work on this project. Please let me know the following details - - Servers'...

    12.1 Days Later
+5 Other Responses
Area Icon

Aws Vpc

I have a specific need. I have openswan vpn configured and client cisco asa ipsec tunnel is up. I need to be able to route traffic from an ec2 (within the same subnet) through this openswan vpn instance back to the client site within the tunnel.

  1. Profile Picture

    Ajay |Principal Consultant

    I have been working on amazon AWS cloud since 2010 and has been one of the earliest adopters of AWS ...

    22.4 Hours Later
  2. Profile Picture

    Burton |Retired Psychologist

    I am working closely with persons whose capability is advanced with experience that ***** 40 ye...

    1.3 Days Later
+2 Other Responses
Area Icon

Security Policy Orchestration

Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required. Preferably looking for us based candidates. Experts should know the us market in this area well, the different solutions available, have a good understanding of large enterprises need for such a solution, along with the key market risks and threats for these vendors.

  1. Profile Picture

    Aaron |Zintro Expert

    Depending on your specific questions, I would love to help. Let me know if you'd like to set up a ca...

    3.5 Hours Later
  2. Profile Picture

    Scottard |Executive Security Strategist

    Hi, Saw your inquiry, I would like to assist you. I have over 20 years writing and automating s...

    3.5 Hours Later
  3. Profile Picture

    Ubaid |Expert Senior Consultant

    Hi, I can help you, I have more than 10 years of experiences in *****rity , technical sec...

    3.9 Hours Later
+19 Other Responses
Area Icon

Wireless Communications Industry

I want to convert a 4-20 ma dc signal (from a sensor) to a suitable frequency and then want to transmit that to a 10 km. Distant place through wireless transmitter and thereafter receive the frequency by a suitable receiver and then convert again the frequency into the original 4-20 ma dc signal. What type of online wireless transmission system will do the work easily?

  1. Profile Picture

    Don |Consultant

    What wireless system? CDMA, TDMA, GSM or microwave would all handle the transmission. There are sec...

    10.7 Hours Later
  2. Profile Picture

    Bobby |Sr. System Engineer and Technology Solut

    Hello, this is completely achievable with a custom engineered Scada type sysyem. In order to be able...

    1.1 Days Later
  3. Profile Picture

    James |President

    Do you want to make your own wireless link or do you want to use one of the commercial ones? There a...

    1.4 Days Later
+9 Other Responses
Area Icon

Network Security Msp

Looking for insight and perspective as to best practices and kpi metrics for the managed service provider space focused on network security. Specifically what kpis drive valuation and current market multiples applied managed service revenues (recurring), professional service revenue (1x or project based work), and hardware associated revenue (pass-through).

  1. Profile Picture

    Bobby |Sr. System Engineer and Technology Solut

    Hello, I think the project description needs some *****, especially the target market. Layo...

    6.6 Hours Later
  2. Profile Picture

    Anand |Managing Partner

    Worked in Verizon as technology head and managed Network security for fortune companies. The KPI's ...

    15.7 Hours Later
  3. Profile Picture

    Simon |Security Consultant

    Hi, Largely depends on what you are trying to do. There are a number of KPIs that can be put in p...

    16.9 Hours Later
+7 Other Responses
Area Icon

Network Security Testing Market

We are a well established investment firm based in the us. We're looking to do some market research in the penetration testing space and would like to speak to people who have assessed, purchased, or used vendors such as core security, cigital, netspi or digital defense. We’d prefer to speak to those in the financial or retail verticals if possible. Below are some questions to ask prospective experts to help us select the ones we’d like to engage with: 1. Are you a key decision maker who manages or oversees penetration testing? 2. Do your penetration testing needs focus more around network security or application security, or both? 3. Have you chosen to utilize a penetration testing service such as core security, cigital, netspi or digital defense? 4. Please state your current title and employer. Thank you.

  1. Profile Picture

    Richard |Executive Chair

    I've sponsored and purchased both network *****ing and *****rity assessment s...

    8.3 Hours Later
  2. Profile Picture

    Anand |Managing Partner

    Have been a decision maker for the *****ing for many of the customers. Have worked with C...

    10.7 Hours Later
  3. Profile Picture

    John |Director, IT Security & Controls

    As the CISO for a publicly traded global medical devi ce manufacturer, I'm the key decision maker an...

    4.7 Days Later
+11 Other Responses
Area Icon

Senior Network

We have an immediate opening with one of our client. Kindly confirm your interest by replying to this inquiry with your updated resume and convenient time/number to discuss further. You can mail me via zintroin case if you are not currently available or not interested in the below position, i apologize for the inconvenience and request you to forward my mail to your friends or colleagues whom you feel would excel this opportunity job title   :senior network engineer (10 + yrs) location    :san ramon , ca terms       :long term contract  role summary/purpose: -senior network engineer responsible for implementing, operating and supporting multi-tenant, scalable network solutions. -the role will routinely review, analyze and recommend network improvements to ensure that the network can scale with the needs of the applications and services riding on it.   job description  - routing expertise – cisco & juniper routers and switches - ibgp, ebgp, ospf, is-is with hands-on experience managing enterprise wan - mpls, ipsec tunnel, ssl vpn, firewall, and dns - firewall & dns expertise - palo alto & f5 firewall - infoblox dns & ipam solutions - project management – must know agile to drive teams backlog - track and update the user stories to ensure the project(sprint iteration) is delivered with agreed content on time - monitor and optimize network performance and assure network security in a high availability environment. -work with telecom providers to report, troubleshoot, and resolve wan related issues. - enforce and execute user policies and procedures regarding the use of network resources. - provide on-call support to the first level support  requirements:  - bachelor's degree in information systems, information technology, computer science or engineering from an accredited college or university or equivalent experience - minimum 5+ years of experience supporting large enterprise network infrastructure (e.G. At a fortune 500 company) - must have 1-2 years of project management experience in agile methodology to help drive the day-to-day backlog\ 

  1. Profile Picture

    John |Founder

    JOHN D. DAUS 2053 Crossing ***** Vienna, VA ***** Phone: ***** Email: *****...

    1.6 Hours Later
  2. Profile Picture

    Walid |Network Architect

    Resume attached...

    5.4 Hours Later
  3. Profile Picture

    Navin |Vice President

    Hello, We can help you. Let us know. Navin...

    45.9 Days Later
+7 Other Responses
Area Icon

Wireless Mesh Networks

We are looking to do multiple paid phone consultation with experts with extensive knowledge in the manufacturing and designing of point-to-point, point-to-multipoint, and wireless mesh networks. We would like to understand the value proposition of these solutions relative to private and public cellular and wi-fi networks, especially in the application of vehicle automation, video surveillance, and passenger wi-fi. Finally, we would like to understand the impact of 5g’s release on the competitive positioning for these solutions. This would be for a 1 - hour paid phone consultation. Please respond with a few brief statements as to your relevance in this space. 1. What is the extent of your experience with designing, implementing, and monitoring wireless networks for use in long distance or remote area applications? 2. Would you be able to give an overview on performance comparison of mesh networks (throughput and latency) and its key differentiators relative to lte? Please answer briefly. 3. Can you share your insights on the competitive advantages and the effectiveness of mesh networks relative to its competitors (cellular, wifi, wireline) and how the 5g release can impact these? 4. Kindly rate your familiarity with industry participants (1 not familiar, 5 very familiar) a. Proxim wireless b. Engenius c. Fluidmesh d. Moxa e. Axxcss wireless / moseley

  1. Profile Picture

    Joeval |LatAm, New Business

    Comments below: 1. What is the extent of your experience with designing, implementing, and monitori...

    2 Hours Later
  2. Profile Picture

    Mauricio |RF Design and Optimization Lead Engineer

    1. I worked as a network design engineer for 5 years in a company that managed a point-to-multipoint...

    3 Hours Later
  3. Profile Picture

    Albert |Deputy Director

    Hello, I am working on these technologies and I am familiar with their design and standardisation. I...

    3.4 Hours Later
+35 Other Responses
Area Icon

Virtual Private Networks

I need advise and a consultant to set up a small open vpn and router configuration for a office in the caribbean we have 3 persons in the road looking for sales and need to get access to the office pbx

  1. Profile Picture

    Eric |Security Engineer

    Hi- This sounds like an interesting project. Do you have any ideas on what kind of equipment you m...

    5.3 Hours Later
  2. Profile Picture

    Md Probal |Network Engineer

    Hi, You need to have either an windows server 2012 or 2008 and you can install OpenVPN on ***** ...

    7.5 Hours Later
  3. Profile Picture

    Preston |CEO

    Would love to help you solve your issue. How can I reach you? ...

    1.2 Days Later
+8 Other Responses
Area Icon

Virtual Private Networks (vpn)

Because of chinese government's blocking on youtube,my friends and i would like to set up a public vpn network in hong kong and sell membership services to those internet users in china. Will you consult on this kind of project?

  1. Profile Picture

    David |IT Director

    I have experience with using VPN in Hong Kong to bypass the "Great Firewall of China". My former ...

    44 Minutes Later
  2. Profile Picture

    Andrew |Senior Wifi Engineer

    There are already many services available like this... WWW.hideyourass.com is one that comes to mind...

    3.3 Hours Later
  3. Profile Picture

    Eric |Security Engineer

    Yes, I'd like a little more detail on exactly what you want to do. Setting up a "public VPN" is a l...

    22.3 Hours Later
+6 Other Responses
Area Icon

Network Security Auditing

We need a seasoned security expert to come physically to our los angeles based center and perform a security audit and network evaluation. We have need of an experience professional to do a full network discovery with an emphasis on uncovering potential vulnerabilities and inherent design flaws with our layout. Scope of work to include an external penetration test as well as internal auditing with recommendations and a plan of action to be laid out.

  1. Profile Picture

    Ryan |President

    I ***** compliance for my clients domestic and *****h encompasses full securit...

    29 Minutes Later
  2. Profile Picture

    Satyen |Zintro Expert

    Hi, I am based in LA and Security expert to conduct Security Assessment, Security Audit and Assessm...

    7.7 Hours Later
  3. Profile Picture

    PRakash |Information security sme

    Hi, We offer Virtual CISO services which include various *****rity services with continu...

    12.3 Hours Later
+8 Other Responses
Area Icon

Email Security

I'm looking to speak with it professionals familiar with providers of email security, web filtering, data loss prevention and/or mobile security. I'm only interested in respondents who have been involved in the decision making process or have experience evaluating vendors so consultant need not submit a proposal. Look forward to chatting. Thank you

  1. Profile Picture

    Anton |CEO

    Hi, how re you? I'm ***** Validroid.com. I'm an expert in mobile security. Haven't got w...

    39 Minutes Later
  2. Profile Picture

    Zainal |Regional Operation Director

    im in the field from 1997 feel free to contact me...

    1.2 Hours Later
  3. Profile Picture

    Ramana |CTO & Chief Architect

    Hi, I can help you here. Please feel free to contact me. -Ramana...

    14.8 Hours Later
+11 Other Responses
See More Inquiries

the prevention of unauthorized access or damage to computers using wireless networks. Wireless networks are very common, both for organizations and individuals. Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking has many security issues. Hackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into wired networks. As a result, it's very important that enterprises define effective wireless security policies that guard against unauthorized access to important resources. The risks to users of wireless technology have increased as the service has become more popular. There were relatively few dangers when wireless technology was first introduced. Crackers had not yet had time to latch on to the new technology and wireless was not commonly found in the work place. However, there are a great number of security risks associated with the current wireless protocols and encryption methods, and in the carelessness and ignorance that exists at the user and corporate IT level. Cracking methods have become much more sophisticated and innovative with wireless. Cracking has also become much easier and more accessible with easy-to-use Windows-based and Linux-based tools being made available on the web at no charge. Some organizations that have no wireless access points installed do not feel that they need to address wireless security concerns. In-Stat MDR and META Group have estimated that 95% of all corporate laptop computers that were planned to be purchased in 2005 were equipped with wireless. Issues can arise in a supposedly non-wireless organization when a wireless laptop is plugged into the corporate network. A cracker could sit out in the parking lot and gather info from it through laptops and/or other devices as handhelds, or even break in through his wireless card-equipped laptop and gain access to the wired network.

Top Wireless Network Security Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+