Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Make enquiry
ISO 27001
IT Monitoring Tools & ManagementIT AutomationNetwork SupportNetworkingInfrastructureNetworksService DesignClient Management - External FacingClient Management - Internal FacingTeam Management
ISO 27001
Budget ManagementRisk ManagementTrainingWebMentoringForecasting of Costs & RevenueRoadmapAgileIT Transition and TransformationScrum Master
Not working
Make enquiry
ISO 27001
Network SecurityCiscoNetwork DeploymentNetwork DesignCheck PointEscalation ManagementNetwork SupportIT Monitoring Tools & ManagementFortinetVMware NSX
ISO 27001
Stakeholder CommunicationPMIInternational BusinessPMI-Project Management InstituteTeam and Project LeadershipProject/Programme ManagementProject ReportingIntegrationProject ManagementAgile
ISO 27001
Penetration Testing (Network)Operating system security‎Malware DetectionIntrusion detection system (IDS)Intrusion Detection and PreventionIntrusion DetectionInformation privacy‎Incident ResponseIncident Handling & AnalysisGovernance Risk Management and Compliance (GRC)
ISO 27001
Vulnerability ManagementFirewallsCyber EssentialsCyber StrategyPenetration Testing (Network)Risk ManagementPCI-DSSNetwork Security
ISO 27001
RFP / ProcurementCloud ComputingPCI-DSSF5Microsoft AzureAmazon AWSLinux FoundationArchitectureProof of ConceptPre-Sales / Post-Sales
ISO 27001
PCI-DSSGap AnalysisGovernance Risk Management and Compliance (GRC)Service Delivery ManagementNetworking / Presentations
ISO 27001
AgileCloud securityMentoringArchitecture and DesignRisk ManagementStandard of Good PracticeTraining and AwarenessIT UpgradesAmazon AWSScrum Master
ISO 27001
Team ManagementArchitecture and DesignCompliance and AuditGeneral Data Protection Regulation (GDPR)Infrastructure SecurityNetwork SecurityBankingInformation Security3rd-Party Security Risk
Make enquiry
ISO 27001
Security information and event management (SIEM)Risk ManagementRisk AssessmentRisk Assessment and AuditData protectionPrivacyPenetration Testing (Web)Threat & Vulnerability ManagementInformation privacy‎
ISO 27001
Data Protection Act (DPA)SQLAgileC#ScrumAPIAtlassian JiraGitMicrosoft ExcelMicrosoft Word
Make enquiry
ISO 27001
InfrastructureWAN (Global)WAN (Nationwide)WAN (Continental)Data CentreCampus LAN (Large)Campus LAN (Small)Campus LAN (Medium)IT TransformationVoice / Telephony
Make enquiry
ISO 27001
Network SecurityIT Monitoring Tools & ManagementFirewall PoliciesJuniper NetworksCheck PointData CentreNetwork DesignAvayaMobile security‎
Make enquiry
ISO 27001
Network SecurityArchitecture and DesignPCI-DSSData CentreDatacentre MigrationCiscoISO/IEC 27002Cyber security standardsPenetration Testing (Network)
Make enquiry
ISO 27001
Cloud securityData Leak PreventionPolicy and strategyCyber security standardsThreat & Vulnerability ManagementRisk ManagementCompliance and AuditRisk Assessment and AuditArchitecture and DesignData protection
Make enquiry
ISO 27001
Risk AssessmentRisk ManagementCompliance ManagementVulnerability ManagementCheck PointCiscoCisco ASAPolicy and strategyAccess control‎Risk Assessment and Audit
ISO 27001
Data NetworksNetwork DeploymentBGPCheck PointArista Networks 7050X SeriesAuditCisco Catalyst 4500 SeriesRequirements CaptureCiscoDNS
ISO 27001
Risk AssessmentPCI-DSSRisk analytics and managementRisk ManagementBiometricsMobile Device Management (MDM)Malware DetectionMalware AnalysisCloud securityData security‎
Make enquiry
ISO 27001
Penetration Testing (Network)Penetration Testing (Systems)Network SecurityData Leak PreventionThreat management and forensicsThreat & Vulnerability ManagementAuditArchitectureArchitecture and DesignTraining and Awareness
ISO 27001
Budget ManagementRisk ManagementForecasting of Costs & RevenuePolicy and strategyData protectionIT SecurityTeam ManagementITPrivacyBid / Proposal Management
Make enquiry
ISO 27001
Risk AssessmentBusiness Process ImprovementsArchitecture and DesignRegulatory Compliance & AuditTeam ManagementRisk ManagementCloud securityRisk Assessment and AuditCyber security standardsRisk analytics and management
ISO 27001
Vulnerability ManagementThreat & Vulnerability ManagementSecurity information and event management (SIEM)Penetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Network)Penetration Testing (Web)Business Process ImprovementsNetwork SecurityF5 BIGiP
ISO 27001
SIPVoice / TelephonyIP TelephonyAvayaUnified CommunicationsArchitectureMicrosoft Lync Server 2010Network DesignCisco CUCM Call ManagerNortel
Make enquiry
ISO 27001
Compliance ManagementClient Management - External FacingIT SecurityContract ManagementSupplier ManagementGovernanceAccess control‎Budget ManagementClient Management - Internal FacingRisk Assessment
ISO 27001
Microsoft Windows 2008R2SplunkMicrosoft Systems CentreMicrosoft Windows 8Microsoft Windows 7Microsoft Windows 10AkamaiTraining and AwarenessTrainingGovernance
ISO 27001
Cyber security standardsCyber StrategyData Leak PreventionIT Risk Management‎GovernanceThreat Intelligence and ModellingSecurity transformation programmesArchitecture and DesignTOGAFPolicy and strategy
ISO 27001
Risk AssessmentRisk ManagementSupplier ManagementCyber security standardsDistributed Denial of Service (DDoS)Regulatory Compliance & AuditIncident ManagementRisk analytics and managementPolicy and strategyRisk Management Document Set (RMADS)
ISO 27001
Escalation ManagementBid / Proposal ManagementProject ManagementClient Management - External FacingContract ManagementScope CreationProcess ManagementComplianceResourcingConsultancy
Make enquiry
ISO 27001
Security InvestigationsSecurity Operations Centre (SOC)Threat Intelligence and ModellingCyber EssentialsCommon Vulnerability Scoring System (CVSS)Vulnerability ManagementThreat & Vulnerability ManagementInformation privacy‎Information Security