Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Not working
Data NetworksIT Monitoring Tools & ManagementNetwork SecurityNetflowQoSDDoS PreventionData CentreIP SLACampus LAN (Small)Campus LAN (Medium)
IT Monitoring Tools & ManagementNetwork ImplementationCisco
Not working
Process ImprovementTeam ManagementNetwork ImplementationNetwork SupportBusiness DevelopmentBusiness AnalysisProject Management
Business projectsPlanning & SchedulingData Centre MigrationsOffice Relocation and UpgradesIT MigrationsTrainingResource ManagementStakeholder ManagementTeam ManagementProject Reporting
Not working
Network ImplementationIPSecIT Monitoring Tools & ManagementNATNetwork SecurityNetwork TestingOSPFNetwork SupportFirewall PoliciesDNS
Not working
Project ReportingStakeholder ManagementTeam ManagementPlanning & SchedulingProcess ImprovementRisk ManagementTrainingMentoringTechnical projectsIT Upgrades
NetworksIT OperationsTrainingResourcingProject DeliveryPre-SalesProject ManagementService Delivery ManagementDeploymentTrading Floor & Platforms
IBM MQMySQLIBM DB2Akka (toolkit)Amazon Web ServicesAWS S3Amazon (AWS) EC2AWS LambdaAWS SNSAWS SQS
Not working
ArchitectureMicrosoft Hyper-VMicrosoft Windows ServerMicrosoft Windows 10Windows EngineeringWindows Group Policy ManagementMicrosoft Azure ADMicrosoft AzureMicrosoft Office 365Microsoft SCCM
Not working
FirewallsFirewall Policy ReviewRapid7ISOTrainingCisco ASARoot Cause AnalysisSecurity information and event management (SIEM)Vulnerability ManagementIntrusion detection system (IDS)
Not working
Not working
PRINCE2Data CentreBid / Proposal ManagementForecasting of Costs & RevenueTechnical projectsAXELOSNew BuildIT UpgradesProject ReportingRegulatory Compliance
Not working
Threat Intelligence and ModellingRisk AssessmentIncident ResponseIncident Management
ArchitectureCisco IWANSD-WANNetwork DesignIT Monitoring Tools & ManagementFirewall PoliciesVirtualisedCampus LAN (Small)WAN (Nationwide)WAN (Continental)
Not working
Network DesignFirewall PoliciesData NetworksData CentreNetwork SecurityBGPLogRhythmAmazon AWSDarktraceCisco ACS
Not working
Visual BasicNmapNessusPortSwigger BurpMetasploitNodeJSRubyPythonProject DeliveryTraining
Cyber SecurityPenetration Testing (Web)Penetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Network)Cloud securityAzure CloudOffensive SecurityNetwork SecurityAWS security
SDHOptical Transport NetworksHuawei RTNHuawei PTNDWDMMPLS VPNMPLSISISBGPData Networks
Not working
HPHP DL ProliantMicrosoft Windows ServerMicrosoft Windows Server 2016Microsoft Windows 10CitrixRedHatMicrosoft OfficeMicrosoft Exchange Server 2007VMware ESXi5
AuditEnterprise Risk AssessmentITProject ManagementAgileIT SecurityModels & AnalyticsCyber security standardsBig Data SecurityForecasting of Costs & Revenue
Cloud Native ComputingCloud SecurityArchitectureMicroservicesJenkinsMicrosoftMicrosoft Windows ServerVisual Basic .NET ASP.NETPHP
Not working
Team ManagementStakeholder ManagementPlanning & Scheduling
NetworksAmazon AWSDatabase AdminstrationAnsible
Juniper Networks SRXTrend Micro Deep SecurityRIPSSLCisco ME SeriesiPerfJunosF5PCI-DSSData Networks
Not working
Enterprise ArchitectureBusiness and Management ConsultancyP2P Payments
Not working
Cloud securityData Leak PreventionCyber security standardsRisk ManagementPolicy and strategyThreat & Vulnerability ManagementCompliance and AuditRisk Assessment and AuditArchitecture and DesignData protection
Not working
SDLCNetwork SecurityIT Monitoring Tools & ManagementFirewall PoliciesDevSecOpsNetwork DeploymentAmazon AWS
Not working
WebsenseWiresharkVMware WorkstationVMware ESXi5.5VMware ESXi5VMwareUbiquitiUbiquiti LAN Access SwitchesSUSESquid Proxy
Not working
Priviledged Access ManagementIdentity and Access Management