Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Not working
Vendor ManagementBid / Proposal ManagementStrategic Thinking / VisionStrategyProfessional ServicesAgileRoadmapRoadmapRoadmapStakeholder Communication
Not working
Stakeholder ManagementProject ManagementChange Management
Not working
AgilePlanning & SchedulingProject ManagementStakeholder ManagementStakeholder CommunicationChange Management
Not working
Team ManagementStakeholder ManagementData ScienceData AnalysisAI / Machine Learning
Not working
Data CentreNetwork DeploymentSupplier ManagementTechnical projectsProject ReportingPlanning & SchedulingNetwork ImplementationTeam ManagementChange ManagementMicrosoft
NATWAN (Nationwide)Network SupportNetwork DesignFirewall PoliciesNetwork ImplementationMPLSNetwork DeploymentBGPNetwork Security
Not working
Supplier ManagementNetwork DeploymentAgileBudget ManagementProject ManagementTechnical projectsProject ReportingPlanning & SchedulingChange ManagementStakeholder Management
Not working
Process ImprovementTeam ManagementNetwork ImplementationNetwork SupportBusiness DevelopmentBusiness AnalysisProject Management
Business projectsPlanning & SchedulingData Centre MigrationsOffice Relocation and UpgradesIT MigrationsTrainingResource ManagementStakeholder ManagementTeam ManagementProject Reporting
Not working
Agilo For ScrumAgileUXTestingAtlassian ConfluenceAtlassian JiraUserTestingBusiness projectsBusiness AnalysisScrum MasterScaled Agile Framework (SAFe)
Not working
FinanceForecasting of Costs & RevenueBudget ManagementBudget CreationClient Management - External FacingProject DeliveryContract NegotiationDeploymentMarketingStrategy
Not working
Microsoft Office 365MicrosoftMicrosoft SharepointMicrosoft VisioMicrosoft ProjectPRINCE2New BuildSoftware DevelopmentIT LifecycleIT Transition and Transformation
Risk AssessmentPCI-DSSRisk analytics and managementRisk ManagementMalware AnalysisCloud securityBiometricsMalware DetectionMobile Device Management (MDM)Data security‎
Not working
IT Monitoring Tools & ManagementProject ManagementTeam ManagementStakeholder ManagementChange Management
Cisco Branch Routers / ISRConfiguration ApprovalVPCIP TelephonyHPChange ApprovalWAN (Continental)Team ManagementSpanning-Tree (STP, RSTP)L2 VPN
Not working
SecurityMicrosoft Azure ADMicrosoft AzureDatabase DesignAzure Cloud
Not working
StrategyEnterprise ArchitectureAI / Machine Learning
Not working
Not working
UbuntuTechnical projectsTeam ManagementStakeholder ManagementMicrosoft WindowsMicrosoft Azure ADMicrosoft AzureMalware DetectionKali LinuxISO 27001
Business AnalysisAccount ManagementPre-Sales / Post-SalesProposal WritingBid / Proposal ManagementCustomer Relationship ManagementBusiness and Management ConsultancyPre-SalesSalesMicrosoft Sharepoint Online
Not working
Team ManagementStakeholder ManagementProject/Programme ManagementPre & Post SalesPlanning & SchedulingIT InfrastructureData NetworksCloud MigrationsChange ManagementApplication Development
Spring (Java)MavenOracleMongoDBDockerLinuxJavaScriptSOAPRESTNetwork Design
Not working
GrafanaGradlePrometheusMongoDBJenkinsContinuous Integration / Deployment (CI/CD)Security transformation programmesApache CassandraProjectsPerformance Testing
Not working
Project managerConstruction management
Not working
SalesProject ManagementBusiness Development
Penetration Testing (Network)Operating system security‎Malware DetectionIntrusion detection system (IDS)Intrusion Detection and PreventionIntrusion DetectionInformation privacy‎Incident ResponseIncident Handling & AnalysisGovernance Risk Management and Compliance (GRC)
Not working
Reinforced ConcreteSite Engineering
Not working
Security InvestigationsSecurity Operations Centre (SOC)Threat Intelligence and ModellingISO 27001Cyber EssentialsCommon Vulnerability Scoring System (CVSS)Vulnerability ManagementThreat & Vulnerability ManagementInformation privacy‎Information Security
Vulnerability ManagementFirewallsCyber EssentialsCyber StrategyPenetration Testing (Network)Risk ManagementPCI-DSSISO 27001Network Security