Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Make enquiry
Not working
Risk AssessmentRisk ManagementCompliance ManagementVulnerability ManagementCheck PointCiscoCisco ASAPolicy and strategyAccess control‎Risk Assessment and Audit
Make enquiry
Not working
Penetration Testing (Network)Penetration Testing (Systems)Data Leak PreventionNetwork SecurityAuditArchitectureThreat management and forensicsThreat & Vulnerability ManagementSecurity information and event management (SIEM)Architecture and Design
Make enquiry
Not working
ForcepointPalo Alto NetworksVulnerability ManagementEthical HackingThreat Intelligence and ModellingThreat HuntingThreat & Vulnerability ManagementSymantec AntivirusIPSSecurity Operations Centre (SOC)
Make enquiry
Not working
Make enquiry
Not working
Network DesignNetworksNetwork ConnectivityNetwork ImplementationL3 VPNOSPFNTP / PTPMPLSL2 SecurityFirewall Policies
Make enquiry
Not working
InfrastructureWAN (Global)WAN (Nationwide)WAN (Continental)Data CentreCampus LAN (Large)Campus LAN (Small)Campus LAN (Medium)IT TransformationVoice / Telephony
Make enquiry
Not working
Firewall PoliciesData CentreArchitectureNetwork Access Control (NAC)WirelessNetAppNetwork ImplementationNetwork DesignCisco Nexus 7000 SeriesCisco Nexus 5000 Series
Make enquiry
Not working
CiscoData NetworksNetwork ImplementationNetwork DesignOSPFVLAN / 802.1qEIGRPNATNetwork SecurityBGP
Make enquiry
Not working
Service Level AgreementProcess OptimizationProcess ManagementProcess Modelling / DesignProblem ManagementITILIT GovernanceIncident ManagementCOBITChange Management
Make enquiry
Not working
Scope ManagementMentoringPenetration Testing (Network)Client Management - External FacingClient Management - Internal FacingTraining and AwarenessNetwork SecurityBudget ManagementForecasting of Costs & RevenueService Reporting
Make enquiry
Not working
Network SecurityArchitecture and DesignPCI-DSSData CentreDatacentre MigrationCiscoISO 27001ISO/IEC 27002Cyber security standardsPenetration Testing (Network)
Make enquiry
Not working
Network SupportNetwork SecurityNetwork ImplementationNetwork Deployment
Make enquiry
Not working
Compliance ManagementIT SecuritySupplier ManagementContract ManagementClient Management - External FacingBudget ManagementClient Management - Internal FacingGovernanceData Leak PreventionTeam Management
Make enquiry
Not working
Stakeholder ManagementBusiness Analysisprocess analysisGap AnalysisRegulatory Compliance & AuditProcess Modelling / DesignGeneral Data Protection Regulation (GDPR)BSI AccreditationBusiness ApplicationsProcess Improvement
Make enquiry
Not working
eBGPQualysFortinetChange ApprovalPalo Alto NetworksMicrosoftCisco LAN Access SwitchesNetwork TestingIT Monitoring Tools & ManagementSpanning-Tree (STP, RSTP)
Make enquiry
Not working
Project/Programme Management
Make enquiry
Not working
Network SupportBGPCyber security standardsCiscoDNSIPSecNetwork ImplementationIT Monitoring Tools & ManagementFirewall PoliciesNetwork Security
Make enquiry
Palo Alto NetworksJuniper Networks SRXF5 ViprionF5 LTMF5 GTMCheck Point R77Blue Coat ProxySGDDoS PreventionCisco Nexus SeriesF5 Application Security Manager (ASM)
Make enquiry
Not working
Remote Access / VPNVisual Basic .NET Distributed ComputingDatabase AdminstrationMicrosoft Visual StudioHTMLSAPMicrosoft SQL Server MSSQLPrometheusIT Monitoring Tools & Management
Make enquiry
Not working
Risk AssessmentCompliance and AuditISO/IEC 27002ISO 27001Cyber security standardsInformation SecurityKali LinuxProject ManagementData security‎Cyber Strategy
Make enquiry
Not working
Network DesignNetwork DeploymentPre-Sales / Post-SalesVPNFirewall PoliciesMPLSNetwork SecurityBGPOSPFWireless
Make enquiry
Not working
BYODAAARedHat Enterprise Linux 6.xDebian LinuxCisco FirePOWERCisco Firepower Threat Defence (FTD)Cisco ISECisco WirelessCampus LAN (Large)Network Implementation
Make enquiry
Not working
Make enquiry
Not working
Planning & SchedulingCampus LAN (Large)Network SecurityData NetworksSupplier ManagementChange ManagementCiscoVMwareStakeholder ManagementBudget Management
Make enquiry
Not working
Security ArchitectureApplication SecurityBusiness Process ImprovementsIncident Handling & AnalysisBusiness AnalysisIdentity and Access ManagementVMwareWAN (Nationwide)MicrosoftIPSec
Make enquiry
Not working
Make enquiry
IT Monitoring Tools & ManagementNetwork DesignNetwork TestingContract NegotiationMPLSProject ReportingVendor ManagementStakeholder ManagementEscalation ManagementNetwork Deployment
Make enquiry
Stakeholder CommunicationPMIInternational BusinessPMI-Project Management InstituteTeam and Project LeadershipProject/Programme ManagementProject ReportingIntegrationProject ManagementAgile
Make enquiry
Not working
Team ManagementStakeholder ManagementPlanning & SchedulingProject ReportingProject ManagementTechnical projectsIT InfrastructureSupplier ManagementNetwork ImplementationUnified Communications
Make enquiry
Not working