Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Not working
Make enquiry
ISO/IEC 27002
Network SecurityCiscoNetwork DeploymentNetwork DesignCheck PointEscalation ManagementNetwork SupportIT Monitoring Tools & ManagementFortinetVMware NSX
ISO/IEC 27002
Penetration Testing (Network)Operating system security‎Malware DetectionIntrusion detection system (IDS)Intrusion Detection and PreventionIntrusion DetectionInformation privacy‎Incident ResponseIncident Handling & AnalysisGovernance Risk Management and Compliance (GRC)
ISO/IEC 27002
AgileCloud securityMentoringArchitecture and DesignRisk ManagementStandard of Good PracticeTraining and AwarenessIT UpgradesAmazon AWSScrum Master
ISO/IEC 27002
Stakeholder ManagementRisk ManagementInformation Security ConsultancySecurity AssuranceRisk AssessmentCyber security standardsIT MigrationsPriviledged Access ManagementGeneral Data Protection Regulation (GDPR)Data protection
Make enquiry
ISO/IEC 27002
Network SecurityArchitecture and DesignPCI-DSSData CentreDatacentre MigrationCiscoISO 27001Cyber security standardsPenetration Testing (Network)
Make enquiry
ISO/IEC 27002
ISO 27001Security information and event management (SIEM)Risk ManagementRisk AssessmentRisk Assessment and AuditData protectionPrivacyPenetration Testing (Web)Threat & Vulnerability ManagementInformation privacy‎
Make enquiry
ISO/IEC 27002
Risk AssessmentRisk ManagementCompliance ManagementVulnerability ManagementCheck PointCiscoCisco ASAPolicy and strategyAccess control‎Risk Assessment and Audit
ISO/IEC 27002
Escalation ManagementBid / Proposal ManagementProject ManagementClient Management - External FacingContract ManagementScope CreationProcess ManagementComplianceResourcingConsultancy
Make enquiry
ISO/IEC 27002
Risk AssessmentBusiness Process ImprovementsArchitecture and DesignRegulatory Compliance & AuditTeam ManagementRisk ManagementCloud securityRisk Assessment and AuditCyber security standardsRisk analytics and management
Make enquiry
ISO/IEC 27002
Cloud securityData Leak PreventionPolicy and strategyCyber security standardsThreat & Vulnerability ManagementRisk ManagementCompliance and AuditRisk Assessment and AuditArchitecture and DesignData protection
ISO/IEC 27002
Architecture and DesignIdentity and Access ManagementPCI-DSSData security‎Regulatory Compliance & AuditCyber StrategyPrivileged identity managementPriviledged Access ManagementRisk ManagementData Leak Prevention
ISO/IEC 27002
Microsoft Windows 2008R2SplunkMicrosoft Systems CentreMicrosoft Windows 8Microsoft Windows 7Microsoft Windows 10AkamaiTraining and AwarenessTrainingGovernance
ISO/IEC 27002
Budget ManagementRisk ManagementForecasting of Costs & RevenuePolicy and strategyData protectionIT SecurityTeam ManagementITPrivacyBid / Proposal Management
Make enquiry
ISO/IEC 27002
Risk AssessmentCompliance and AuditISO 27001Cyber security standardsInformation SecurityKali LinuxProject ManagementData security‎Cyber Strategy