Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Make enquiry
Infrastructure Security
Cyber security standardsPrivileged identity managementWeb Application SecurityData Leak PreventionIntrusion PreventionSecurity ArchitectureFirewall Policy ReviewNetwork SecurityNetwork DesignArchitecture
Not working
Make enquiry
Infrastructure Security
Network SecurityIPSecVPNSSLIT Monitoring Tools & ManagementCisco ASAArchitectureNetwork DesignCisco 7600 SeriesData Centre
Infrastructure Security
Penetration Testing (Network)Operating system security‎Malware DetectionIntrusion detection system (IDS)Intrusion Detection and PreventionIntrusion DetectionInformation privacy‎Incident ResponseIncident Handling & AnalysisGovernance Risk Management and Compliance (GRC)
Infrastructure Security
Access control‎Network SecurityArchitecture and DesignSSLIntrusion Detection and PreventionSplunkRisk Assessment and AuditMalware DetectionFirewalls
Infrastructure Security
Cyber SecurityPenetration Testing (Web)Penetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Network)Cloud securityAzure CloudOffensive SecurityNetwork SecurityAWS security
Infrastructure Security
Team ManagementArchitecture and DesignCompliance and AuditGeneral Data Protection Regulation (GDPR)ISO 27001Network SecurityBankingInformation Security3rd-Party Security Risk
Make enquiry
Infrastructure Security
WirelessNetwork SupportRADIUSNetwork ImplementationNetwork DesignCiscoCisco Identity Services EngineCisco ISEAccess control‎Check Point
Infrastructure Security
AgileCloud securityMentoringArchitecture and DesignRisk ManagementStandard of Good PracticeTraining and AwarenessIT UpgradesAmazon AWSScrum Master
Not working
Make enquiry
Infrastructure Security
Network SecurityCiscoNetwork DeploymentNetwork DesignCheck PointEscalation ManagementNetwork SupportIT Monitoring Tools & ManagementFortinetVMware NSX
Infrastructure Security
Network SecurityIPSecDNSCheck Point 4400Check Point Provider-1Check PointBlue CoatNetwork TestingNetwork SupportProof of Concept
Infrastructure Security
Risk AssessmentPCI-DSSRisk analytics and managementRisk ManagementBiometricsMobile Device Management (MDM)Malware DetectionMalware AnalysisCloud securityData security‎
Infrastructure Security
Network SecurityNetwork SupportIPSecVPNCheck PointF5WiresharkJuniper Networks SSGJuniper Networks SRXCisco ASA
Infrastructure Security
IPSecBGPTCP/IPIPv4AnycastFirewall Policy ReviewFirewallsArchitecture and DesignCloud security
Infrastructure Security
Escalation ManagementBid / Proposal ManagementProject ManagementClient Management - External FacingContract ManagementScope CreationProcess ManagementComplianceResourcingConsultancy
Infrastructure Security
Architecture and DesignIdentity and Access ManagementPCI-DSSData security‎Regulatory Compliance & AuditCyber StrategyPrivileged identity managementPriviledged Access ManagementRisk ManagementData Leak Prevention
Infrastructure Security
Risk AssessmentRisk ManagementSupplier ManagementCyber security standardsDistributed Denial of Service (DDoS)Regulatory Compliance & AuditIncident ManagementRisk analytics and managementPolicy and strategyRisk Management Document Set (RMADS)
Make enquiry
Infrastructure Security
Data CentreCampus LAN (Small)FirewallsVPNIT Monitoring Tools & ManagementArchitectureCiscoEndpoint SecurityProof of ConceptBIND
Infrastructure Security
Microsoft Windows 2008R2SplunkMicrosoft Systems CentreMicrosoft Windows 8Microsoft Windows 7Microsoft Windows 10AkamaiTraining and AwarenessTrainingGovernance
Make enquiry
Infrastructure Security
Risk AssessmentBusiness Process ImprovementsArchitecture and DesignRegulatory Compliance & AuditTeam ManagementRisk ManagementCloud securityRisk Assessment and AuditCyber security standardsRisk analytics and management
Make enquiry
Infrastructure Security
ISO 27001Security information and event management (SIEM)Risk ManagementRisk AssessmentRisk Assessment and AuditData protectionPrivacyPenetration Testing (Web)Threat & Vulnerability ManagementInformation privacy‎
Make enquiry
Infrastructure Security
Cloud securityData Leak PreventionPolicy and strategyCyber security standardsThreat & Vulnerability ManagementRisk ManagementCompliance and AuditRisk Assessment and AuditArchitecture and DesignData protection
Make enquiry
Infrastructure Security
Penetration Testing (Network)Penetration Testing (Systems)Network SecurityData Leak PreventionThreat management and forensicsThreat & Vulnerability ManagementAuditArchitectureArchitecture and DesignTraining and Awareness
Make enquiry
Infrastructure Security
Network SecurityArchitecture and DesignPCI-DSSData CentreDatacentre MigrationCiscoISO 27001ISO/IEC 27002Cyber security standardsPenetration Testing (Network)
Make enquiry
Infrastructure Security
Compliance ManagementClient Management - External FacingIT SecurityContract ManagementSupplier ManagementGovernanceAccess control‎Budget ManagementClient Management - Internal FacingRisk Assessment
Make enquiry
Infrastructure Security
Scope ManagementMentoringPenetration Testing (Network)Client Management - External FacingClient Management - Internal FacingPenetration Testing (Web)Penetration Testing (Systems)Penetration Testing (Applications)Training and AwarenessNetwork Security
Make enquiry
Infrastructure Security
Team ManagementPlanning & SchedulingProject ReportingIT Monitoring Tools & ManagementNetwork DesignFirewall PoliciesIP TelephonyServer Load BalancingArchitectureNetwork Implementation
Make enquiry
Infrastructure Security
Emerging threatsData protectionCyber StrategySystems SecurityGovernance Risk Management and Compliance (GRC)Threat & Vulnerability ManagementRisk ManagementArchitecture and DesignNetwork Security
Infrastructure Security
Data CentreVoice / TelephonyMPLSNetwork DesignNetwork ImplementationIT InfrastructureF5Juniper NetworksCheck PointNetwork Support
Infrastructure Security
Cyber security standardsCyber StrategyData Leak PreventionIT Risk Management‎GovernanceThreat Intelligence and ModellingSecurity transformation programmesArchitecture and DesignTOGAFPolicy and strategy
Make enquiry
Infrastructure Security
WiresharkBGPIPv4DNSSSLVPNTCP/IPIPSecIntrusion Detection and PreventionCloud security