Loading...
Network Security
Menu136 experts in Network Security topic
-
PHPete HerzogResearcher Scientist Hacker Security Professional • BarcelonaCo-founder and Managing Director of the non-profit research organization, ISECOM. Created and develops the OSSTMM, international standard for security testing and analysis (300k downloads/month) and Hacker Highschool security awareness for teens (200k downloads/month). Work in advanced research for security, fraud, and trust. Over 20 years security consulting experience for companies needing quality security and secrecy to protect R&D and financial info - such as car manufacturers, pharmaceuticals, universities, Wall St. firms, start-ups, and tech companies. Provided loss analysis for chain stores and restaurants and help build a secure culture (security awareness) at businesses. Provided schools consulting in handling cyberbullying and teen security awareness.Network Security • Information Security • Internet Entrepreneur • Computer Security • Security • Vulnerability Assessment • Information Security Management • Security Audits • Penetration Testing • Risk Assessment •$1/min per minute5.0 20 29
-
DFDaniel FreedmanHigh-tech entrepreneur, VC, Mentor, Executive • Newport Beach, CaliforniaI'm a serial high-tech entrepreneur who has started, financed, grown, and sold companies in the networking and security sectors. Today, I lead and advise high-growth management teams, putting his public company executive management and private company entrepreneurship experience to work. I'm 54, and I live in Newport Beach, California. I hold Bachelors and Masters degrees in Computer Science from the University of Calgary. Experience Venture Advisor, iNovia Capital (http://inovia.vc), 2008 - present. iNovia manages about $1.2 billion in capital across five funds. My role is to work with portfolio companies on strategy, sales, and marketing, and also to review and provide feedback on each investment iNovia makes. VP Security Products, McAfee, 1996-1997 At McAfee (then the 10th largest PC software company in the world), I held responsibility for expanding the company’s offerings beyond anti-virus, to cover the entire network security and encryption sectors. Co-Founder, Launchworks, 1999 I co-founded and sat as a board member of Launchworks, Canada’s highly acclaimed keiretsu-style venture investment house. Launchworks made 11 investments prior to the Internet crash of 2000, and had three successful exits after that crash, including IPO’s of Guest-Tek (the largest in-room Internet provider in the world), 180 Connect (6,000 employees, $400m in revenues, the largest installer of satellite television reception equipment, ultimately sold to DirecTV), and the acquisition by Computer Associates of Control-F1. Co-Founder and CEO, Jasomi Networks, 2001-2005 I co-founded and led Internet telephony equipment provider Jasomi Networks, and grew it into an award- winning multi-million dollar leader in that industry, before it was successfully acquired by Ditech Networks in 2005. Co-Founder and CEO, FSA Corporation, 1989-1996 I founded and grew the company into a profitable, internationally recognized network security product powerhouse serving Fortune 100 companies. Some of its product lines were acquired from 1994-1996 by Unison Tymlabs (now IBM) and Symark Software (now BeyondTrust), and the entire company was acquired in 1996 by McAfee.Network Security • Start-ups • Venture Capital • VoIP • Distributed Systems • Telecommunications • Mergers • System Administration • Venture Financing • Security •$2.50/min per minute5.0 2 1
-
TBTony BenoyA budding engineer and a geek to the core • DelhiWhat am I good at? Computers Computers and Computers Details in computers Anything and I promise I'll sort it out for youNetwork Security • Linux • Networking • Programming • Computer Science • Microsoft Office • Windows • Computer Security • Computer Hardware • Computers •$1/min per minute5.0 1 1
-
MHMohammed HamadaI am VoIP, AD, Exchange, UC Expert • Istanbul, TurkeyI have been in the IT industry for about 14 years. I worked in several countries full time and provided IT consultancy to many clients at the same time by phone and remote support. My expertise areas cover Unified Communication - Deploying, Configuration and/or Migration of Lync Server (2010/2013/ Skype for Business) Standard and Enterprise. - Microsoft Office 365 management and Integration with Lync on premise and vice versa. - Hybrid Deployment with Lync and Office 365 (Split domain). - Enterprise Voice integration between Lync with VoIP Gateways (Patton & Sonus, Cisco). - TMG deployment and configuration for Lync/Exchange/CRM/ADFS - ADFS deployment and Integration for CRM/Office 365. - Unified Exchange Integration for Lync 2010/2013. - Exchange Server deployment, Configuration, Migration and Hybrid deployment. VoIP - Deployment and Configuration of Soft PBX (3CX, Brekeke, SnomOne) - Configuring and managing VoIP Gateways (Sonus gateways, Patton Smartnodes). - Integrating PBXes with VoIP gateways or UC Enterprise Solutions. - Recertification of VoIP Gateways. - Integration and interoperability between Legacy PBXes, Soft PBXes, SIP trunks. - Deployment and configuration of Call Centers e.g. (MAX ACD, TEGSOFT). Security - Deployment, Configuration and management of Firewalls e.g. (Checkpoint, Cisco ASA, Pfsense, Untangle, TMG 2010, ISA ..etc) - IDS installation, configuration on Firewall systems and independence servers. (Snort). - Virus, Malware removal. Long term experience providing support on Forums. VoIP/IP Phones - Configuration and troubleshooting of IP phones (SNOM, HP) - Providing technical support. (Online and on-site).Network Security • Active Directory • VoIP • Hardware • Windows • Windows Server • DNS • Security • Network Administration • DHCP •$1/min per minute5.0 3 2
-
AMAdrian MikeliunasInformation Security Consultant • McLean, VACertified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Security Standards Council Quality Security Assessor (PCI QSA), and a Certified Linux Professional and Instructor (CLP).Network Security • Information Security • Computer Security • Security • Vulnerability Assessment • Security Audits • Penetration Testing • CISSP • Risk Assessment • ISO 27001 •$1.67/min per minute5.0 3 0
-
GBGuy BalzamInformation security and product expert • Tel Aviv, IsraelIsrael air force IT unit veteran, Chief Security Officer of ELAL Israeli Airlines, Product Manager of a leading information security product and two times startup founderNetwork Security • Lean startup • Startups • Product Management • Cloud Computing • Mobile applications • Information Security • Security • Identity Management •$1.67/min per minute4.7 3 4
-
RPRohan PintoSolutions Architect at City of Mississauga • Toronto, Canada AreaIdentity Management & Security Architect Senior Identity and Access Management Architect specialized in architecting, implementing and deploying large-scale Identity Management and Authentication and Authorization (RBAC,ABAC, RiskBAC,TrustBAC) infrastructures with specific interests involving Security, Identity, Federation and Access Management and Web 2.0 based systems. Strong technologist with both the strategic vision and tactical intelligence to lead technology-based growth initiatives grounded solidly on business value. Extensive experience and knowledge in all phases of project life cycle management using agile process methodologies with an emphasis on practical application to improve security and compliance. Strong technical leadership in large project environments. Deep expertise in large-scale distributed system architectures that utilize Open Standards, Web Services, Java, and Open Source Technologies. Specialties Identity Management - Sun IdM, Vitria, Apere IDM, ICRare Federation and Access Management - Sun Access Manager, OpenSSO, Siteminder, Oblix, IBM Tivoli AM, CardSpace Risk and Compliance - Sun Role Manager Enterprise Java (J2EE/EE) and Web services (SOAP, WS Security) Web Development - PHP, Python, Java, RoR Methodology and Governance Project Management and Leadership Open source and Open standard technologies AJAX (jQuery/YUI), OSGI,C/C++,ESB,SCA,HL7, TIBCONetwork Security • Java • Security • Security Management • Application Security • LDAP • SAML • IDM • Workflow Analysis • Data Security •$4.17/min per minute4.2 5 36
-
NGNathan GibsonDesMoines, IowaInformation Security, Risk, and Regulatory advisor, Ethical Hacker, and threat and vulnerability management expert. NIST Certification & Accreditation Specialist.Network Security • Training • Computer Forensics • Risk Management • Security • Policy • Vulnerability Assessment • Penetration Testing • CISSP • Information Assurance •$2/min per minute5.0 2 6
-
DCDavid ClarkeGDPR , Cyber Security "Top 50 Global Experts" • London***How To GUARANTEE You can Make Your GDPR, Data Protection, Security, ISO27001, Cyber Essentials PAINLESS: Let's Talk, 23 FREE Technologies in Data and Cyber protection that will make you feel shocked! see link below https://gdpruk.eu/index.php/23-free-data-cyber-protection-technologies/ Avoid the Following RISKS. ~~~Fines, Loss of Business, Enforcement Action, BreachLess Liability, Breach Losses~~~ #Breaches are now reportable (72 Hours) (59,000 reported in Europe so far) #Class Actions/Group Actions for GDPR (Happening now all over the world) #Incorrect Privacy Notices (Emma's Diaries and others) #Risk Of Data Breach is $7% UK Government Figures #3rd Party Contract Checks by Data Protection Authorities, Danish DPA #Privacy Notice Checks By Data Protection Authorities #Complaints by Consumers over 40,000 in the UK so far, ***Alignment with Data Protection will REQUIRE ....... • GDPR Awareness Article 39, Article 47 - Legal Requirement • Breach Notification Procedure process Article 33, Article 34 - Legal Requirement • Data Protection Impact Assessment DPIA Article 35 - Legal Requirement • Record Of Processing Article 30 - Legal Requirement • Data protection Maturity Assessment Article 5 + Security Audits/ISO27001/PC-DSS/GDPR Cyber Security and Data protection Risk Management Policy and Procedure review (Security Policy, Retention Policy, Data Protection Policy etc..) Expected by the GDPR and Data Protection Legislation. No Matter what your situation GDPR alignment and direction of GDPR can be always improved, Because I have done this many times for all types of businesses and size of business. If YOU were to do only one thing I would suggest a FIXED Price Data Protection/GDPR maturity audit which highlights any gaps in your businesses Data protection program and planning and enables the risks to be managed. Book a call for FREE on https://clarity.fm/1davidclarke/BookAcall "Top 50 Global Experts" "Top 10 Risk Compliance Regtech" David Clarke is the Founder of GDPR Technology Forum over 18500 members https://www.linkedin.com/groups/12017677 and an internationally known GDPR and security advisor. He is recognized as one of the top 10 influencers by Thompson Reuter’s “Top 30 most influential thought-leaders and thinkers on social media, in risk management, compliance and regtech in the UK” and is in the the top 50 list of Global Experts by Kingston Technology. For more information, visit his Linkedin https://www.linkedin.com/in/1davidclarke and follow him on Twitter at @1DavidClarke 84k FollowersNetwork Security • Information Security • Security • Data Privacy • PCI DSS • Information Security Management • Security Management • Governance • Compliance • ISO 27001 •$1/min per minute5.0 5 2
-
OEOfer ElzamSan Francisco Bay AreaSecurity, cloud, and product visionary. Start-up advisory. Angel Investor. I can help identify unique opportunities in my areas of expertise and reach product and strategy clarity and focus.Network Security • Product Management • SaaS • Cloud Computing • Information Security • Product Marketing • Cloud Security • Computer Security • Security • Internet Security •$3.33/min per minute5.0 3 4
-
MAMoustafa AHMED HASSANHead of CyberSecurity Solutions Engineering • Cairo- Managed cyber security solutions are as follows:• SentinelOne EDR• McAfee IPS, Arbor Anti-DDoS, Vectra AI NDR• OT (Operational Technology) Security Nozomi, MS Defender, CiscoCyberVision• BlueCoat ProxySG, Cisco WSA, F5 BigIP• Juniper SRX, Palo Alto Firewalls• SASE (SWG, ZTNA, CASB, FWaaS) and DLP Solutions (Zscaler, Palo AltoPrisma - SDWAN, Netskope, and Cisco Umbrella) • Ivanti Pulse Secure and Thales Safenet Identity and Access Management• Creating on-prem and cloud cybersecurity solutions built on Azure, AWS, orGCP• Vulnerability Management via continuous identification, evaluation, andmitigation• A team of developers focused on building secure and efficient full-stack ELKlog management and monitoring platforms using Python, JavaScript, Node.js,and containers incorporating DevSecOps tools and principles throughout thedevelopment lifecycle.• Developing automation using Ansible and AI/ML-integrated CI/CD pipelinesto streamline SOC processes like alert handling and playbook creation.Collaborating with technical leads to ensure automation adheres to customerrequirements and best practices, integrating security tools and services intothe ELK SIEM, SOAR or CTI solutions.• Lab Testing and Validation- Manage employee hiring, onboarding, and offboarding processes for theteam. Page 1 of 5 - Supervise activities between internal and external resources, and facilitatesmooth workflow for service delivery.- Develop team training plan, and ensure all team received the requiredbusiness, interpersonal skills, technical training, coaching and mentoring. - Constantly monitor, measuring and guide team towards compliance toprocedures, performance targets, short and long-term goals and overall KPIsset for the department and for team individuals.- Estimate yearly CAPEX/OPEX.- Revise team ISO 27001 compliancy with CIO and report back any threats &risks detected.Network Security • Information Technology • Information Security • Cloud Services • Cloud Security • DevOps • Computer Security • Information Security Management • Security Management •$1.67/min per minute5.0 1 1
-
AEAndrew EngelTechnologist • Canton, OHYoung entrepreneur. Helped start and run a ISP from the ground up providing new services to the under served. IT professional with a zest for innovation.Network Security • Active Directory • Networking • VoIP • Routing Protocols • Microsoft Exchange • 3D Printing • Network Design • Wireless Broadband • Routing •$1.67/min per minute5.0 2 1
-
ALAdrian LamoThreat analyst & staple of "top-10" hacker lists • Washington, DCI'm a former hacker who regularly appears on hacker-related "top-10" lists (which I don't take very seriously, but find amusing enough to mention). I now work in journalism, writing, and penetration testing, with a focus on national security issues. My work has been published in (inter alia) Forbes, The Guardian, Newsweek, Time, Network World, PandoDaily, Mobile Magazine, Pentest Magazine, and 2600 Magazine. My writing on Quora often receives over 2,000,000 views a month. I worked with Army CID on the investigation of Wikileaks and Chelsea Manning (and in fact initiated the latter) among other cases, and continue to liaise with public and private concerns on infosec and natsec concerns.Network Security • Hacking • Information Security • Computer Security • Cyberlaw • Defense • National Security •$2.92/min per minute5.0 4 2
-
RSRadu StanescuSenior Information Security Consultant • Bucharest, BrusselsSenior Information Security Consultant for several Govermental Institutions. Cybersecurity Entrepreneur. Cybersecurity MentorNetwork Security • Information Security • Computer Security • Information Security Management • Security Management • IT Security Best Practices • Internet Security •$3.33/min per minute5.0 1 1
-
JAJared AblonExited Bootstrapped Startup, CISO of the year • Santa Monica, CAFounder and CEO at HackEDU. Successfully grew and sold to private equity for high 8 figure exit. CISO of the Year award recipient - Los Angeles Business Journal Fourteen years of experience in cutting edge technology with proven expertise in solving complex security problems for the U.S. Government as a Senior Leader. CISSP, MBA, and MS in Applied and Computational Mathematics focusing on computer/cyber security; management; risk assessment; cryptanalysis; and entrepreneurship. I help companies improve risk management, increase security efficacy, streamline security operations, and enable business flexibility. I speak the language of business while understanding the latest security threats. Specialties: Cyber Security Leader, Information Security, Application Security, Network Security, Security Operations Center (SOC), Penetration Testing, Forensics, Encryption, CISO, C, Perl, PHP, Python, HTML, Windows, Unix, Mac OS. Certified Information Systems Security Professional (CISSP).Network Security • Information Security • Cloud Security • Computer Security • Security • Information Security Management • Security Management • Internet Security •$16.67/min per minute5.0 1 1
-
KPKier Prior-WilliamsExperienced DNS Consultant • Reading, UKSubject Matter Expert Consultant in all things DNS, DHCP, and IPAM. Learn how to make your business more Secure, Resilient and Integrated.Network Security • Information Security • Domain Names • DNS • Solution Architecture • Computer Security •$1/min per minute5.0 1 1
-
SMScott Myers25+ Years as an Infosec Expert (CISSP,CISM,PCIP) • Columbus, Ohio, USAOwner of dFensive, CISO/CTO of Pattern Group - Over 25 years providing practical technical solutions for Startup/Small/Medium Business owners. I specialize in helping you leverage what's already in place to achieve your current and future objectives.Network Security • Open Source • Information Technology • Information Security • Data Privacy • PCI DSS • Penetration Testing • Vulnerability Management • Career Counseling • Data Security •$2/min per minute5.0 1 1
-
MSMohammed SamyNetwork and Security Consultant • cairoI'm a Network and Security Consultant with 13 years of Experience Managing Security and Network teams to achieve best practices for IT projects.Network Security • Networking • Information Security • Cloud Security • Computer Security • Information Security Management • Internet Security •$2/min per minute— — 0
-
DKDaniel KuykendallEntrepreneur, Advisor & Cyber Security Expert • Los Angeles, CAEntrepreneur + Leader + Investor + Advisor Industry leader in Application Security for over 25 years, with a total of 30 years in tech. Currently serves as CTO for IoTSecure, which provides an innovative solution for identification AND protection of IoT devices of all kinds. Dan also launched informXR which is the first Enterprise Data Platform for XR. Finally, Dan regularly spends time advising startup leaders and teaching software development leadership. Dan started in cyber security at Foundstone in 2000 until he co-founded and became CEO of NT OBJECTives. He served at NTO until acquired by Rapid7 in 2015 where he served as Senior Director of Application Security Products until 2023.Network Security • Software Development • Software Engineering • Information Security • Augmented Reality • Software Design • Application Development • Information Security Management • Internet Security • Virtual Reality •$7.50/min per minute— — 0
-
TATauseef AhmadSecurity ExpertI am an E-Commerce Expert Like in listening of product's Expert in recovering Social media accounts such as google mail, Facebook, Instagram, TikTok, YouTube etc you can get me any info about that. Also social media promotion expert Graphics Designing Expert.Network Security • Social Media Marketing • Graphic Design • Social Networking •$1.67/min per minute— — 0
-
ZWZain WalkerOffering tailored cybersecurity assessments • Dallas, TXCybersecurity Expert | Principal Security Analyst | Security Consultant | Author | Content CreatorNetwork Security • Information Security • Cloud Security • Computer Security • Information Security Management • Security Audits • Security Management •$2.50/min per minute— — 0
-
MSMateen ShaikhCyber Security Specialist • MumbaiGreetings! I'm Mateen Ahmed, a fervent Network Security professional with a steadfast commitment to securing businesses against the ever-evolving landscape of digital threats. From my early curiosity in hacking ignited by movies and media, I've journeyed to become a formidable force in information security. 🚀 Proven Track Record: Throughout my journey, I've undertaken numerous projects that attest to my prowess in the defensive security realm. My accomplishments are a testament to my ability to provide effective solutions that ensure businesses are well-prepared to counteract cyber threats. 🔑 Key Skills: Incident Response & Investigation Threat Hunting & SIEM Management Compliance & Risk Assessment Phishing, Malware Analysis & Detection Cloud Security (Azure, AWS & GCP) Network Security & Penetration Testing Linux Command Line & Scripting (SQL, PowerShell, Python)Network Security • Information Security • Cloud Security • Engineering • Malware Analysis • Vulnerability Assessment • Penetration Testing • Incident Management • Threat & Vulnerability Management • Cyberlaw •$1/min per minute— — 0
-
SHSaleh HussaryA Highly experienced IT professional • SofiaA Highly experienced IT professional with over two decades of experience in the IT field, I have a deep understanding of production environments. I am skilled at implementing solutions ensuring smooth and secure operation. Currently Leading Avatrade’ 's IT security and network unit, my role is pivotal in safeguarding intellectual assets and bolstering organizational resilience. The focus lies on enhancing service availability and continuous improvement, as evidenced by the highly successful oversight of cybersecurity standards compliance and the cybersecurity Awareness program. This role is the culmination of my dedication to driving information security across dynamic environments. A strategic approach to network architecture and policy design complements my competencies in securing cloud and on-premises infrastructures. My contribution extends to nurturing a culture of security awareness and aligning technological advancements with organizational goals. At Avatrade, we are committed to fortifying defenses and fostering a secure, innovative workspace. Experience Avatrade – (March 2021 – Present) Deputy CISO, Head of Information Technology Security Celcom – (March 2016 - March 2021) Senior IT Consultant, Network Security Systems Engineer Global Cloud Ltd - (June 2013 - March 2021) Co-founder & SRE & CTO IBM – (September 2013 - May 2015) Systems, Network and Security Engineer 013 NetVision – (March 2007 - August 2013) IT Specialist ArtOfNet – (2004 - 2007) Founder and CTO Actcom – (2003 – 2006) HelpDesk Team Leader NetVision – (1999 -2002) Senior Support Team, Projects Team Education Israel Technion (2022-2023) CISO -CISM – Chief Information Security Officer Training Ruppin Academic Center (2016-2019) Bachelor of Business Administration (B.B.A.), Business Administration and Management, General. RIPE NCC ACADEMY Barcelona (2017) Advanced BGP Workshop; IPV6; DNSSEC RedHat QA Campus London (2016) OpenStack Administrator, OpenStack Installation, Manage, Troubleshoot, Clustering, Storage integration...Ceph, GlusterFS John Bryce (2000 - 2016) VCP, MCSE, WEBMASTER, CCNA, CCSA, CCSE, RHCSA, RHCE, System, Networking, Security, Web development ORT BRAUDE COLLEGE (2001 - 2004) Bachelor's degree, Software EngineeringNetwork Security • Information Security • Production • Computer Security • Information Security Management • Network Design • Web Traffic • Load Balancing • Developers •$1.67/min per minute— — 0
-
TMTswelelopele MoreiSecurity Engineer • South AfricaAs a Security Engineer, I specialise in designing and implementing robust security systems to protect computer networks, systems, and data from cyber threats. With extensive experience in the field, I possess expertise in threat analysis, penetration testing, incident response, and security architecture. My passion lies in staying ahead of emerging threats and technologies, ensuring the security and privacy of individuals and organizations. I hold relevant certifications and a degree in a related field, and I'm dedicated to continually advancing my skills and knowledge to tackle the ever-evolving landscape of cyber security.Network Security • Active Directory • Information Security • Cloud Security •$1.67/min per minute— — 0
-
KPKennedy Pichon YeungHere to provide advice on IT or Cyber-security • New ZealandExtensive experience in Cyber security, from penetration testing to information securityNetwork Security • Information Security • Computer Security • Security •$1/min per minute— — 0
the startups.com platform
Copyright © 2025 Startups.com. All rights reserved.