{"id":698,"date":"2026-01-12T20:00:48","date_gmt":"2026-01-12T20:00:48","guid":{"rendered":"https:\/\/zencybersecurity.com\/?post_type=product&#038;p=698"},"modified":"2026-01-15T13:43:35","modified_gmt":"2026-01-15T13:43:35","slug":"sr-security-consulting","status":"publish","type":"product","link":"https:\/\/zencybersecurity.com\/index.php\/product\/sr-security-consulting\/","title":{"rendered":"Sr Security Consulting"},"content":{"rendered":"<p>There are use cases where you may want some additional time adding features and capabilities to other security solutions that are not covered in the services provided by Zen Cyber Security (ie. firewalls, environment audits, network upgrades\/assessments, etc).\u00a0 \u00a0Our Senior Security Consulting Engineers have over ten years of technical IT experience.\u00a0 They have worked in all verticals available to us in the USA!\u00a0 If you would like specialized security consulting for your special project or deployment let us know.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are use cases where you may want some additional time adding features and capabilities to other security solutions that are not covered in the services provided by Zen Cyber Security (ie. firewalls, environment audits, network upgrades\/assessments, etc).\u00a0 \u00a0Our Senior Security Consulting Engineers have over ten years of technical IT experience.\u00a0 They have worked in all verticals available to us in the USA!\u00a0 If you would like specialized security consulting for your special project or deployment let us know.<\/p>\n","protected":false},"featured_media":780,"comment_status":"open","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"product_brand":[],"product_cat":[20],"product_tag":[],"class_list":{"0":"post-698","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-service","8":"first","9":"instock","10":"virtual","11":"purchasable","12":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product\/698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=698"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/media\/780"}],"wp:attachment":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=698"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product_brand?post=698"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product_cat?post=698"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product_tag?post=698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}