Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Strategy
Supplier ManagementChange ManagementBid / Proposal ManagementProject ManagementProcess ManagementContract NegotiationService Delivery ManagementProcess ImprovementContract Management
Strategy
Scope CreationUser Acceptance TestingPlanning & SchedulingXMLUMLMicrosoft VisioMicrosoft ProjectBusiness projectsTrainingResourcing
Strategy
Business AnalysisClient Management - Internal FacingBusiness Transformation – Driving ChangeClient Management - External FacingBudget ManagementStakeholder ManagementBusiness Development – Market ExpansionChange ManagementBusiness and Management Consultancy
Strategy
Voice / TelephonyArchitectureNetwork DesignWAN (Nationwide)MPLSRoadmapWirelessNetwork DeploymentNetwork Implementation
Strategy
IT Monitoring Tools & ManagementNetwork DesignNetwork ImplementationNetwork Support
Strategy
Project ManagementData security‎Data Storage / SANContract ManagementContract NegotiationNetworksArchitecture and DesignSupplier ManagementIT Migrations
Strategy
Financial ComplianceComplianceProduct ManagementProduct DevelopmentModels & AnalyticsAccounting & FinanceBusiness AnalysisIT Monitoring Tools & ManagementNetwork Implementation
Strategy
Team ManagementData CentreSupplier ManagementResource ManagementIT InfrastructureBudget ManagementData NetworksNetworksInfrastructureProject Delivery
Make enquiry
Strategy
Stakeholder ManagementTeam ManagementPlanning & SchedulingMicrosoft ProjectStakeholder CommunicationChange ManagementProject ReportingProject ManagementProjectsProcess Creation
Make enquiry
Strategy
Stakeholder ManagementIT InfrastructureData CentreIT OperationsEscalation ManagementTechnical ProjectsProject ManagementClient Management - Internal FacingIT SecurityData Networks
Make enquiry
Strategy
FinanceForecasting of Costs & RevenueBudget ManagementBudget CreationClient Management - External FacingProject DeliveryContract NegotiationDeploymentMarketing
Make enquiry
Strategy
InfrastructureWAN (Global)WAN (Nationwide)WAN (Continental)Data CentreCampus LAN (Large)Campus LAN (Small)Campus LAN (Medium)IT TransformationVoice / Telephony
Strategy
Team ManagementBudget ManagementForecasting of Costs & RevenueRisk ManagementProject ReportingIT InfrastructureIT MigrationsTechnical projectsStakeholder ManagementData Centre Migrations
Make enquiry
Strategy
Forecasting of Costs & RevenueIncident ManagementTeam ManagementIT Monitoring Tools & ManagementClient Management - External FacingBudget ManagementChange ApprovalVoice / TelephonyProcess ManagementCisco
Make enquiry
Strategy
CiscoCisco Aironet Access PointsCheck PointHPAvayaMicrosoftService TransitionClient Management - Internal FacingScope ManagementScope Creation
Strategy
Team ManagementArchitecture and DesignCompliance and AuditGeneral Data Protection Regulation (GDPR)ISO 27001Infrastructure SecurityNetwork SecurityBankingInformation Security3rd-Party Security Risk
Make enquiry
Strategy
VMwareSymantec Endpoint SecuritySymantec Backup ExecSolarWindsSalesforceRSAHPCiscoMicrosoftCabling
Make enquiry
Strategy
Team ManagementStakeholder ManagementSQLSoftware Quality Assurance (QA/SDET)Screening (Transactions/Payments)QA & QCProject/Programme ManagementProgram ManagementProduct Management
Make enquiry
Strategy
Vendor ManagementBid / Proposal ManagementStrategic Thinking / VisionProfessional ServicesAgileRoadmapRoadmapRoadmapStakeholder Communication
Make enquiry
Strategy
Scope ManagementMentoringPenetration Testing (Network)Client Management - External FacingClient Management - Internal FacingPenetration Testing (Web)Penetration Testing (Systems)Penetration Testing (Applications)Training and AwarenessNetwork Security
Strategy
Stakeholder ManagementBloombergMiFiD IITrainingTrading/BrokingRegulatory ComplianceMicrosoft VisioMicrosoft ProjectMicrosoft WindowsDeployment
Strategy
Penetration Testing (Network)Operating system security‎Malware DetectionIntrusion detection system (IDS)Intrusion Detection and PreventionIntrusion DetectionInformation privacy‎Incident ResponseIncident Handling & AnalysisGovernance Risk Management and Compliance (GRC)
Make enquiry
Strategy
MentoringTeam ManagementTest Driven Development (TDD)Stakeholder ManagementAgileScrum MasterSoftware Quality Assurance (QA/SDET)KanbanProject ReportingAutomated Testing
Strategy
AuditEnterprise Risk AssessmentITProject ManagementAgileIT SecurityModels & AnalyticsCyber security standardsBig Data SecurityForecasting of Costs & Revenue
Strategy
ArchitectureNetwork DesignConsultancyNetwork SecurityFirewall PoliciesStakeholder ManagementVendor ManagementSegmentationEndpoint SecurityData Centre
Make enquiry
Strategy
Process ManagementMarketingPipeline ManagementForecasting of Costs & RevenueTrainingSalesConsultancySalesforceScope ManagementProblem Management
Make enquiry
Strategy
Technical Risk AdvisorRisk AppetiteRisk AnalysisCompliance ManagementContract ManagementVulnerability ManagementInformation Security Management Systems (ISMS)IT Risk Management‎Risk analytics and managementProgram Management
Strategy
Budget ManagementRisk ManagementForecasting of Costs & RevenuePolicy and strategyData protectionIT SecurityTeam ManagementITPrivacyBid / Proposal Management
Strategy
Planning & SchedulingStakeholder ManagementTeam ManagementBusiness projectsBudget ManagementSupplier ManagementProject ReportingData CentreIT MigrationsIT Transition and Transformation
Strategy
Field MarketingEvent ManagementCorporate CommunicationsCopy EditingCopywritingContent ProductionChannel MarketingBrand AwarenessDigital MarketingWriting and Content