Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Cloud security
AgileMentoringArchitecture and DesignRisk ManagementStandard of Good PracticeTraining and AwarenessIT UpgradesAmazon AWSScrum Master
Cloud security
Risk AssessmentPCI-DSSRisk analytics and managementRisk ManagementBiometricsMobile Device Management (MDM)Malware DetectionMalware AnalysisData security‎
Cloud security
Penetration Testing (Network)Operating system security‎Malware DetectionIntrusion detection system (IDS)Intrusion Detection and PreventionIntrusion DetectionInformation privacy‎Incident ResponseIncident Handling & AnalysisGovernance Risk Management and Compliance (GRC)
Cloud security
Cyber SecurityPenetration Testing (Web)Penetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Network)Azure CloudOffensive SecurityNetwork SecurityAWS security
Cloud security
RFP / ProcurementCloud ComputingPCI-DSSF5Microsoft AzureAmazon AWSLinux FoundationArchitectureProof of ConceptPre-Sales / Post-Sales
Cloud security
Security EngineeringSecurity ArchitectureCyber StrategySecurity Operations Centre (SOC)VPNNetwork DesignNetwork SecurityIT Monitoring Tools & ManagementCryptography‎Data Leak Prevention
Not working
Make enquiry
Cloud security
Network SecurityCiscoNetwork DeploymentNetwork DesignCheck PointEscalation ManagementNetwork SupportIT Monitoring Tools & ManagementFortinetVMware NSX
Cloud security
Architecture and DesignIdentity and Access ManagementPCI-DSSData security‎Regulatory Compliance & AuditCyber StrategyPrivileged identity managementPriviledged Access ManagementRisk ManagementData Leak Prevention
Cloud security
Network SecurityIPSecDNSCheck Point 4400Check Point Provider-1Check PointBlue CoatNetwork TestingNetwork SupportProof of Concept
Cloud security
IPSecBGPTCP/IPIPv4AnycastFirewall Policy ReviewFirewallsInfrastructure SecurityArchitecture and Design
Cloud security
Escalation ManagementBid / Proposal ManagementProject ManagementClient Management - External FacingContract ManagementScope CreationProcess ManagementComplianceResourcingConsultancy
Cloud security
Access control‎Network SecurityArchitecture and DesignSSLIntrusion Detection and PreventionInfrastructure SecuritySplunkRisk Assessment and AuditMalware DetectionFirewalls
Cloud security
Team ManagementArchitecture and DesignCompliance and AuditGeneral Data Protection Regulation (GDPR)ISO 27001Infrastructure SecurityNetwork SecurityBankingInformation Security3rd-Party Security Risk
Cloud security
Risk AssessmentRisk ManagementSupplier ManagementCyber security standardsDistributed Denial of Service (DDoS)Regulatory Compliance & AuditIncident ManagementRisk analytics and managementPolicy and strategyRisk Management Document Set (RMADS)
Cloud security
Amazon AWSSplunkVMware vSphereMicrosoft AzureSPLUNK Splunk E/S AppHashicorp VaultTerraformESX vSphereGoogle Cloud PlatformContinuous Integration / Deployment (CI/CD)
Make enquiry
Cloud security
Risk AssessmentBusiness Process ImprovementsArchitecture and DesignRegulatory Compliance & AuditTeam ManagementRisk ManagementRisk Assessment and AuditCyber security standardsRisk analytics and management
Make enquiry
Cloud security
Data Leak PreventionPolicy and strategyCyber security standardsThreat & Vulnerability ManagementRisk ManagementCompliance and AuditRisk Assessment and AuditArchitecture and DesignData protection
Cloud security
Microsoft Windows 2008R2SplunkMicrosoft Systems CentreMicrosoft Windows 8Microsoft Windows 7Microsoft Windows 10AkamaiTraining and AwarenessTrainingGovernance
Make enquiry
Cloud security
Network SecurityArchitecture and DesignPCI-DSSData CentreDatacentre MigrationCiscoISO 27001ISO/IEC 27002Cyber security standardsPenetration Testing (Network)
Make enquiry
Cloud security
Risk AssessmentRisk ManagementCompliance ManagementVulnerability ManagementCheck PointCiscoCisco ASAPolicy and strategyAccess control‎Risk Assessment and Audit
Make enquiry
Cloud security
Firewall PoliciesData CentreArchitectureNetwork Access Control (NAC)WirelessNetAppNetwork DesignNetwork ImplementationCisco Nexus 7000 SeriesCisco Nexus 5000 Series
Make enquiry
Cloud security
Penetration Testing (Network)Penetration Testing (Systems)Network SecurityData Leak PreventionThreat management and forensicsThreat & Vulnerability ManagementAuditArchitectureArchitecture and DesignTraining and Awareness
Make enquiry
Cloud security
Compliance ManagementClient Management - External FacingIT SecurityContract ManagementSupplier ManagementGovernanceAccess control‎Budget ManagementClient Management - Internal FacingRisk Assessment
Make enquiry
Cloud security
Remote Access / VPNVisual Basic .NET Distributed ComputingDatabase AdminstrationMicrosoft Visual StudioHTMLSAPMicrosoft SQL Server MSSQLPrometheusIT Monitoring Tools & Management
Make enquiry
Cloud security
Cisco Nexus 9000 SeriesCisco Nexus 7000 SeriesCisco Catalyst 6500 SeriesIT Monitoring Tools & ManagementCisco ASR 1000 SeriesCheck PointNetwork DeploymentNetwork DesignNetwork ImplementationWAN (Continental)
Make enquiry
Cloud security
Azure CloudAWS S3FortinetPalo Alto NetworksCisco ACIDevOpsJuniper NetworksProof of ConceptWAN (Global)
Make enquiry
Cloud security
WiresharkBGPIPv4DNSSSLVPNTCP/IPIPSecIntrusion Detection and Prevention
Make enquiry
Cloud security
DevSecOpsContainerizationCloud SecurityAmazon (AWS) Elastic Container Registry (ECR)
Cloud security
Network DesignOSPFData CentreCiscoCheck PointMPLSWAN (Continental)WAN (Nationwide)WAN (Global)Cisco ISE