Decision Makers

Executive Partner
Ted Harrington is responsible for making strategically essential choices for Independent Security Evaluators. E-mail: t****@icloud.com, is available on Connexy.
Senior Software Engineer
This Senior Software Engineer is in charge of making strategically essential decisions for Independent Security Evaluators. E-mail: e****@yahoo.com, is available on Connexy.
Business Manager
This Business Manager is responsible for choosing essential development path for Independent Security Evaluators. E-mail: k****@gmx.com, is available on Connexy.
Founder And Chief Executive Officer
They oversee the company's entire resources and activities and communicate with the board of director. E-mail: j****@gmx.com, is available on Connexy.
Computer & Network Security
Laura Belkot is in control of choosing strategically important development path. E-mail: l****@gmail.com, is available on Connexy.

Company Details

Last Update
Jul 14, 2022
Location
4901 Springarden Dr SUITE 200, Baltimore, MD 21209
Industry
Computer & Network Security
Specialties
Architecture review
Penetration testing
Source Code review
Cryptographic Protocol & Algorithm Review
Founded
2005
Number of Employee
11-50 employees
NAICS
334 - Computer and Electronic Product Manufacturing

FAQs about decision-makers at Independent Security Evaluators

Where is Independent Security Evaluators`s office currently situated?

Independent Security Evaluators operates in Baltimore, Maryland.

What's the industry affiliated with Independent Security Evaluators?

The industry in which Independent Security Evaluators operates is Computer & Network Security.

Who are the decision-makers in Independent Security Evaluators?

The decision-makers of the company are Ersin Domangue, Ted Harrington etc.

What are the professions of the main decision-makers in Independent Security Evaluators?

The professions of the company decision-makers are Executive Partner or Senior Software Engineer etc.

What are the specialties of Independent Security Evaluators?

The specialties for Independent Security Evaluators are Architecture review, Penetration testing, Source Code review, Cryptographic Protocol & Algorithm Review, and Third Party Evaluation
Login