Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Make enquiry
Risk AssessmentRisk ManagementCompliance ManagementVulnerability ManagementCheck PointCiscoCisco ASAPolicy and strategyAccess control‎Risk Assessment and Audit
Make enquiry
Penetration Testing (Network)Penetration Testing (Systems)Network SecurityData Leak PreventionThreat management and forensicsThreat & Vulnerability ManagementAuditArchitectureArchitecture and DesignTraining and Awareness
Make enquiry
ForcepointPalo Alto NetworksVulnerability ManagementEthical HackingThreat Intelligence and ModellingThreat HuntingThreat & Vulnerability ManagementSymantec AntivirusIPSSecurity Operations Centre (SOC)
Make enquiry
Make enquiry
InfrastructureWAN (Global)WAN (Nationwide)WAN (Continental)Data CentreCampus LAN (Large)Campus LAN (Small)Campus LAN (Medium)IT TransformationVoice / Telephony
Make enquiry
Network DesignNetworksNetwork ConnectivityNetwork ImplementationL3 VPNOSPFNTP / PTPMPLSL2 SecurityFirewall Policies
Make enquiry
Firewall PoliciesData CentreArchitectureNetwork Access Control (NAC)WirelessNetAppNetwork DesignNetwork ImplementationCisco Nexus 7000 SeriesCisco Nexus 5000 Series
Make enquiry
OSPFNetwork DesignNetwork ImplementationData NetworksCiscoVLAN / 802.1qEIGRPNetwork SecurityNATBGP
Make enquiry
ShellPerlRed Hat LinuxPythonSQLMySQLAutomationSybaseScripting and programmingMicrosoft SQL Server MSSQL
Make enquiry
Compliance ManagementClient Management - External FacingIT SecurityContract ManagementSupplier ManagementGovernanceAccess control‎Budget ManagementClient Management - Internal FacingRisk Assessment
Make enquiry
Scope ManagementMentoringPenetration Testing (Network)Client Management - External FacingClient Management - Internal FacingPenetration Testing (Web)Penetration Testing (Systems)Penetration Testing (Applications)Training and AwarenessNetwork Security
Make enquiry
Service Level AgreementProcess OptimizationProcess ManagementProcess Modelling / DesignProblem ManagementITILIT GovernanceIncident ManagementCOBITChange Management
Make enquiry
Network SecurityArchitecture and DesignPCI-DSSData CentreDatacentre MigrationCiscoISO 27001ISO/IEC 27002Cyber security standardsPenetration Testing (Network)
Make enquiry
Network SupportNetwork SecurityNetwork ImplementationNetwork Deployment
Make enquiry
Stakeholder ManagementBusiness Analysisprocess analysisGap AnalysisRegulatory Compliance & AuditProcess Modelling / DesignGeneral Data Protection Regulation (GDPR)BSI AccreditationBusiness ApplicationsProcess Improvement
Make enquiry
Remote Access / VPNVisual Basic .NET Distributed ComputingDatabase AdminstrationMicrosoft Visual StudioHTMLSAPMicrosoft SQL Server MSSQLPrometheusIT Monitoring Tools & Management
Make enquiry
eBGPQualysFortinetChange ApprovalPalo Alto NetworksMicrosoftCisco LAN Access SwitchesNetwork TestingIT Monitoring Tools & ManagementSpanning-Tree (STP, RSTP)
Make enquiry
Project/Programme Management
Make enquiry
Network SupportBGPCyber security standardsCiscoDNSIPSecNetwork ImplementationIT Monitoring Tools & ManagementFirewall PoliciesNetwork Security
Palo Alto NetworksF5 GTMBlue Coat ProxySGCheck Point R77F5 LTMF5 ViprionJuniper Networks SRXData CentreDDoS PreventionCisco Nexus Series
Make enquiry
Network DesignNetwork DeploymentPre-Sales / Post-SalesVPNFirewall PoliciesMPLSNetwork SecurityBGPOSPFWireless
Make enquiry
Risk AssessmentCompliance and AuditISO/IEC 27002ISO 27001Cyber security standardsInformation SecurityKali LinuxProject ManagementData security‎Cyber Strategy
Make enquiry
BYODAAARedHat Enterprise Linux 6.xDebian LinuxCisco FirePOWERCisco Firepower Threat Defence (FTD)Cisco ISECisco WirelessCampus LAN (Large)Network Implementation
Make enquiry
Make enquiry
Planning & SchedulingCampus LAN (Large)Network SecurityData NetworksSupplier ManagementChange ManagementCiscoVMwareStakeholder ManagementBudget Management
Stakeholder CommunicationPMIInternational BusinessPMI-Project Management InstituteTeam and Project LeadershipProject/Programme ManagementProject ReportingIntegrationProject ManagementAgile
Make enquiry
Make enquiry
Security ArchitectureApplication SecurityBusiness Process ImprovementsIncident Handling & AnalysisBusiness AnalysisIdentity and Access ManagementVMwareWAN (Nationwide)MicrosoftIPSec
IT Monitoring Tools & ManagementNetwork DesignNetwork TestingContract NegotiationMPLSProject ReportingEscalation ManagementVendor ManagementStakeholder ManagementNetwork Deployment
Make enquiry
Team ManagementStakeholder ManagementPlanning & SchedulingProject ReportingProject ManagementTechnical projectsIT InfrastructureSupplier ManagementNetwork ImplementationUnified Communications