Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Architecture and DesignData security‎Identity and Access ManagementPCI-DSSCyber StrategyRegulatory Compliance & AuditMicrosoft Office 365Privileged identity managementPriviledged Access ManagementRisk Management
Risk ManagementBudget ManagementForecasting of Costs & RevenuePolicy and strategyIT SecurityData protectionTeam ManagementPrivacyITBid / Proposal Management
VLAN / 802.1qSwitchingSite to Site VPNMPLS VPNCisco VPN 3000VPNRemote Access / VPNAccess control‎EPON/GEPON (Ethernet Passive Optical Networks)Wireless
Amazon AWSSplunkVMware vSphereMicrosoft AzureSPLUNK Splunk E/S AppHashicorp VaultTerraformESX vSphereGoogle Cloud PlatformContinuous Integration / Deployment (CI/CD)
CiscoData NetworksNetwork DesignNetwork SecurityData CentreCampus LAN (Large)IPSecIT Monitoring Tools & ManagementNetwork ImplementationOSPF
PythonSubversion / SVNGitNetwork DeploymentIT Monitoring Tools & ManagementNATIPSecOSPFNetwork SecurityMPLS
CiscoFortinetFortinet FortiGateFortinet FortiManagerFortinet FortiAnalyzerFortinet NSE7WiresharkSwitchingFirewallsFirewall Policies
Cyber SecurityPenetration Testing (Web)Penetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Network)Cloud securityAzure CloudOffensive SecurityNetwork SecurityAWS security
Network SecurityCheck PointArista NetworksVPNServer Load BalancingSpanning-Tree (STP, RSTP)IT SecurityOSPFNetwork DesignNetwork Connectivity
GrafanaGradlePrometheusMongoDBJenkinsContinuous Integration / Deployment (CI/CD)Security transformation programmesApache CassandraProjectsPerformance Testing
Vulnerability ManagementFirewallsCyber EssentialsCyber StrategyPenetration Testing (Network)Risk ManagementPCI-DSSISO 27001Network Security
Network ImplementationCiscoData NetworksNetwork SecurityF5Network DesignCheck PointFirewall PoliciesData CentreQoS
RFP / ProcurementCloud ComputingPCI-DSSF5Microsoft AzureAmazon AWSLinux FoundationArchitectureProof of ConceptPre-Sales / Post-Sales
SSL VPNFirewall PoliciesNetwork SecurityNetwork SupportNetwork ImplementationNetwork DeploymentIT Monitoring Tools & ManagementRSA SecurIDBitdefenderKaspersky
IPSecFirewall PoliciesIT Monitoring Tools & ManagementNetwork DesignNetwork SupportNetwork ImplementationData NetworksCiscoNetwork SecurityCCIE Security
SecurityCyberSecurity Operations Centre (SOC)Incident ResponseThreat & Vulnerability ManagementForensicsCyber security standardsThreat HuntingPCI AuditEvent Monitoring
WirelessNetwork TestingWAN (Global)MPLSJuniper NetworksDNSCisco ASAIPSecCampus LAN (Large)Network Deployment
Security EngineeringSecurity ArchitectureCyber StrategySecurity Operations Centre (SOC)VPNNetwork DesignNetwork SecurityIT Monitoring Tools & ManagementCryptography‎Data Leak Prevention
Network SecurityData Networks
Microsoft Exchange ServerMicrosoft Exchange OnlineMicrosoft Office 365Microsoft OfficeActive Directory
ConsultancyISO 27001Information SecurityThird Party Security Audit3rd-Party Security RiskIT SecuritySecurity transformation programmesSecurity Operations Centre (SOC)Network SecurityTraining and Awareness
Microsoft Windows 2008R2SplunkMicrosoft Systems CentreMicrosoft Windows 8Microsoft Windows 7Microsoft Windows 10AkamaiTraining and AwarenessTrainingGovernance
ISO 27001
OSPFBGPIPSecDNSCisco Nexus 5000 SeriesCisco Nexus 2000 SeriesCisco FEXF5 LTMArista Networks 7500 SeriesArista Networks EOS
PythonPostgreSQLAI / Machine LearningData ScienceData MiningData ExtractionBig DataData AnalysisSQLAWS S3