Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Not working
Make enquiry
ArchitectureNetwork DesignFirewall PoliciesCampus LAN (Large)Campus LAN (Small)Campus LAN (Medium)Network SupportNetwork ImplementationData CentreCisco ASA
Not working
Make enquiry
Project ManagementIncident ManagementSecurity information and event management (SIEM)
Make enquiry
Network SupportChange ApprovalFirewall PoliciesNetwork TestingNetwork ImplementationConfiguration ApprovalCampus LAN (Small)Campus LAN (Medium)ArchitectureVPC
(ISC)² Certified Information Systems Security Professional (CISSP)
Network SupportVPNNetwork SecurityNetwork DesignSSLIPSecNetwork ImplementationFirewall PoliciesData CentreConfiguration Approval
IPSecBGPTCP/IPIPv4AnycastFirewall Policy ReviewFirewallsInfrastructure SecurityArchitecture and DesignCloud security
Team ManagementData CentreSupplier ManagementResource ManagementIT InfrastructureBudget ManagementData NetworksNetworksInfrastructureProject Delivery
Network SecurityNetwork SupportIPSecVPNCheck PointF5WiresharkJuniper Networks SSGJuniper Networks SRXCisco ASA
Penetration Testing (Network)Operating system security‎Malware DetectionIntrusion detection system (IDS)Intrusion Detection and PreventionIntrusion DetectionInformation privacy‎Incident ResponseIncident Handling & AnalysisGovernance Risk Management and Compliance (GRC)
Cisco Branch Routers / ISRConfiguration ApprovalVPCIP TelephonyHPChange ApprovalWAN (Continental)Team ManagementSpanning-Tree (STP, RSTP)L2 VPN
(ISC)² Certified Information Systems Security Professional (CISSP)
Cisco ASA5500-X SeriesCisco 7600 SeriesCisco 3900 SeriesCisco Catalyst 4500 SeriesCisco Wireless Controllers 8500 SeriesCisco Wireless Controllers 5000 SeriesCisco Wireless Controllers 2500 SeriesCisco Voice GatewaysCisco Unified CommunicationsCisco NX-OS
Network SecurityIPSecDNSCheck Point 4400Check Point Provider-1Check PointBlue CoatNetwork TestingNetwork SupportProof of Concept
Access control‎Network SecurityArchitecture and DesignSSLIntrusion Detection and PreventionInfrastructure SecuritySplunkRisk Assessment and AuditMalware DetectionFirewalls
(ISC)² Certified Information Systems Security Professional (CISSP)
Business projectsPlanning & SchedulingData Centre MigrationsOffice Relocation and UpgradesIT MigrationsTrainingResource ManagementStakeholder ManagementTeam ManagementProject Reporting
Vulnerability ManagementThreat & Vulnerability ManagementSecurity information and event management (SIEM)Penetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Network)Penetration Testing (Web)Business Process ImprovementsNetwork SecurityF5 BIGiP
AgileCloud securityMentoringArchitecture and DesignRisk ManagementStandard of Good PracticeTraining and AwarenessIT UpgradesAmazon AWSScrum Master
Team ManagementArchitecture and DesignCompliance and AuditGeneral Data Protection Regulation (GDPR)ISO 27001Infrastructure SecurityNetwork SecurityBankingInformation Security3rd-Party Security Risk
PrivacyThird Party Risk ManagementCyber Resilience Review
Budget ManagementRisk ManagementForecasting of Costs & RevenuePolicy and strategyData protectionIT SecurityTeam ManagementITPrivacyBid / Proposal Management
Architecture and DesignIdentity and Access ManagementPCI-DSSData security‎Regulatory Compliance & AuditCyber StrategyPrivileged identity managementPriviledged Access ManagementRisk ManagementData Leak Prevention
Cisco ASAPalo Alto NetworksMcAfeeCheck PointNetscreenJuniper Networks SRXCiscoCisco Catalyst 6500 FWSMBluecatNetwork Deployment
Team ManagementArchitectureScripting and programmingCode testing and deploymentApache JMeterHTTPHTTPSTest ArchitectTest ManagementSelenium WebDriver
VLAN / 802.1qSwitchingSite to Site VPNMPLS VPNCisco VPN 3000VPNRemote Access / VPNAccess control‎EPON/GEPON (Ethernet Passive Optical Networks)Wireless
Amazon AWSSplunkVMware vSphereMicrosoft AzureSPLUNK Splunk E/S AppHashicorp VaultTerraformESX vSphereGoogle Cloud PlatformContinuous Integration / Deployment (CI/CD)
CiscoData NetworksNetwork DesignNetwork SecurityData CentreCampus LAN (Large)IPSecIT Monitoring Tools & ManagementNetwork ImplementationOSPF
PythonSubversion / SVNGitNetwork DeploymentIT Monitoring Tools & ManagementNATIPSecOSPFNetwork SecurityMPLS
CiscoFortinetFortinet FortiGateFortinet FortiManagerFortinet FortiAnalyzerFortinet NSE7WiresharkSwitchingFirewallsFirewall Policies
Stakeholder ManagementRisk ManagementInformation Security ConsultancySecurity AssuranceRisk AssessmentCyber security standardsIT MigrationsPriviledged Access ManagementGeneral Data Protection Regulation (GDPR)Data protection
Network SecurityCheck PointArista NetworksVPNServer Load BalancingSpanning-Tree (STP, RSTP)IT SecurityOSPFNetwork DesignNetwork Connectivity
Cyber SecurityPenetration Testing (Web)Penetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Network)Cloud securityAzure CloudOffensive SecurityNetwork SecurityAWS security