Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
ApacheRisk AssessmentFirewallsEmerging threatsComputer security exploits‎Microsoft Internet Information Services (IIS)TrainingRisk Assessment and AuditEducationCompliance and Audit
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
Application SecurityRed Team AssessmentsGrey Box TestingWhite box testingBlack box testingDark Web AnalysisOSINTWeb Application SecurityInfrastructure SecurityInformation Security
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
Vulnerability ManagementThreat/ Vulnerability Assessment ManagementSecurity information and event management (SIEM)Network SecurityBusiness Process ImprovementsOutpost24
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
Risk ManagementStandard of Good PracticeTraining and AwarenessCloud securityArchitecture and DesignMentoringAgileIT UpgradesRisk analytics and managementEnterprise
Make enquiry
Penetration Testing (Network)
SupportTrainingNetwork SecurityFirewall PoliciesFirewall Policy ReviewFirewallsTraining DeliveryCiscoDesignIronPort
Make enquiry
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
Data Leak PreventionCloud securityCompliance and AuditThreat/ Vulnerability Assessment ManagementRisk ManagementPolicy and strategyCyber security standardsTraining and AwarenessSecurity information and event management (SIEM)Data protection
Make enquiry
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
MentoringScope ManagementTraining and AwarenessNetwork SecurityVulnerability ManagementClient Management - Internal Facing
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
DesignCiscoCampus LAN (Large)BGPNetwork SecurityMPLSQoSImplementationData CentreAudit
Penetration Testing (Network)
Remote Access / VPNSite to Site VPNVPNNATRoutingTroubleshootingImplementationNetwork MonitoringNetwork Segregation
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
Escalation ManagementBid / Proposal ManagementProject ManagementClient Management - External FacingContract ManagementScope CreationProcess ManagementComplianceResourcingConsultancy
Make enquiry
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
Risk AssessmentArchitecture and DesignBusiness Process ImprovementsRegulatory Compliance & AuditTeam ManagementRisk Assessment and AuditRisk ManagementCloud securityCyber security standardsTraining
Penetration Testing (Network)
Vulnerability ManagementFirewallsCyber EssentialsCyber StrategyRisk ManagementPCI-DSSISO 27001Network Security
Not working
Make enquiry
Penetration Testing (Network)Penetration Testing (Systems)
Network SecurityCiscoDesignDeploymentCheck PointEscalation ManagementSupportMonitoring Tools & ManagementVMware NSXFortinet
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
Architecture and DesignIdentity and Access ManagementData security‎PCI-DSSTeam ManagementArchitectureRisk ManagementRegulatory Compliance & AuditPrivileged identity managementPriviledged Access Management
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
Stakeholder ManagementIT MigrationsRisk ManagementCyber security standardsRisk AssessmentSecurity AssuranceInformation Security ConsultancyProcess ManagementThycotic Secret ServerSplunk
Penetration Testing (Network)Penetration Testing (Web)
Access control‎Network SecurityArchitecture and DesignSSLIntrusion Detection and PreventionSplunkInfrastructure SecurityRisk Assessment and AuditMalware DetectionFirewalls
Make enquiry
Penetration Testing (Network)Penetration Testing (Systems)
Network SecurityThreat/ Vulnerability Assessment ManagementThreat management and forensicsData Leak PreventionArchitecture and DesignAuditArchitectureTraining and Awareness
Make enquiry
Penetration Testing (Network)
FortinetCisco ISRCisco ASRCisco ASAPre SalesProject ManagementDesignZyXELEncryption
Make enquiry
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
Risk AssessmentRisk ManagementVulnerability ManagementCompliance ManagementFirewallsISO 27001Architecture and DesignRisk Assessment and AuditCheck PointCisco
Make enquiry
Penetration Testing (Web)
ISO 27001Risk AssessmentRisk ManagementSecurity information and event management (SIEM)Threat/ Vulnerability Assessment ManagementRisk Assessment and AuditCompliance ManagementInformation privacy‎Privacy
Make enquiry
Penetration Testing (Network)Penetration Testing (Systems)
Network SecurityArchitecture and DesignData CentreDatacentre MigrationPCI-DSSCiscoCloud securityThreat/ Vulnerability Assessment ManagementVulnerability Management
Make enquiry
Penetration Testing (Network)
Carrier BackboneCitrix XenAppCisco MDS 9000 SeriesSUSESAPDell EMC VBlockNetAppDeploymentMicrosoft Hyper-VAruba
Make enquiry
Penetration Testing (Applications)Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
PythonIT AutomationErlangVoice / TelephonyAutomated TestingAvayaMySQLPHPStakeholder CommunicationWeb front-end
Make enquiry
Penetration Testing (Network)Penetration Testing (Systems)Penetration Testing (Web)
Visual BasicNmapNessusPortSwigger BurpMetasploitNodeJSRubyPythonProject DeliveryTraining
Make enquiry
Penetration Testing (Web)
Remote Access / VPNVisual Basic .NET Distributed ComputingDatabase AdminstrationMicrosoft Visual StudioHTMLSAPMicrosoft SQL Server MSSQLPrometheusMonitoring Tools & Management
Penetration Testing (Network)
DesignOSPFData CentreCheck PointCiscoMPLSWAN (Continental)WAN (Nationwide)WAN (Global)Cisco FirePOWER