Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Spring (Java)MavenOracleMongoDBDockerLinuxJavaScriptSOAPRESTNetwork Design
Not working
GrafanaGradlePrometheusMongoDBJenkinsContinuous Integration / Deployment (CI/CD)Security transformation programmesApache CassandraProjectsPerformance Testing
Not working
Project managerConstruction management
Cisco Branch Routers / ISRConfiguration ApprovalVPCIP TelephonyHPChange ApprovalWAN (Continental)Team ManagementSpanning-Tree (STP, RSTP)L2 VPN
Not working
SecurityMicrosoft Azure ADMicrosoft AzureDatabase DesignAzure Cloud
Not working
SalesProject ManagementBusiness Development
Not working
Microsoft Office 365MicrosoftMicrosoft SharepointMicrosoft VisioMicrosoft ProjectPRINCE2New BuildSoftware DevelopmentIT LifecycleIT Transition and Transformation
Not working
Supervision
Not working
PrivatisationChange ManagementBudget ManagementProject ManagementChange Management
Not working
ISO 27001NISTIT Risk Management‎ITSECCyber Resilience ReviewCyber SecurityCyber security standardsCyber Strategy
Not working
Strategic Design and Business PlanningService DesignEnterprise ArchitectureBusiness Process
Not working
Quantity Surveyingcontracts managerCommercial
Not working
Third Party Risk ManagementGovernance Risk Management and Compliance (GRC)Cyber StrategyCyber Security
Not working
Team ManagementBusiness AnalysisProject ManagementChange DeliveryChange ManagementITCH
Not working
Operations and security managementBudget ManagementProject/Programme ScopingManaged ServiceProject DeliveryNetwork ImplementationNetwork Security
Not working
LeadershipManagement and leadershipCyber Resilience ReviewCyber Strategy
Not working
SalesBusiness DevelopmentProject ReportingTeam ManagementStakeholder Management
Penetration Testing (Network)Operating system security‎Malware DetectionIntrusion detection system (IDS)Intrusion Detection and PreventionIntrusion DetectionInformation privacy‎Incident ResponseIncident Handling & AnalysisGovernance Risk Management and Compliance (GRC)
Not working
Reinforced ConcreteSite Engineering
Not working
Security InvestigationsSecurity Operations Centre (SOC)Threat Intelligence and ModellingISO 27001Cyber EssentialsCommon Vulnerability Scoring System (CVSS)Vulnerability ManagementThreat & Vulnerability ManagementInformation privacy‎Information Security
Vulnerability ManagementFirewallsCyber EssentialsCyber StrategyPenetration Testing (Network)Risk ManagementPCI-DSSISO 27001Network Security
Not working
eBGPQualysFortinetChange ApprovalPalo Alto NetworksMicrosoftCisco LAN Access SwitchesNetwork TestingIT Monitoring Tools & ManagementSpanning-Tree (STP, RSTP)
IT Monitoring Tools & ManagementNetwork DesignNetwork TestingContract NegotiationMPLSProject ReportingVendor ManagementStakeholder ManagementEscalation ManagementNetwork Deployment
Not working
Stakeholder ManagementProject ManagementChange Management
Not working
AgilePlanning & SchedulingProject ManagementStakeholder ManagementStakeholder CommunicationChange Management
Not working
Project DeliveryProject/Programme ManagementTeam ManagementStakeholder ManagementProject ManagementRoadmapRegulatory AffairsTechnical StrategyRisk ManagementRisk
Not working
Network SupportTechnical projectsStakeholder ManagementProject ReportingChange Management
Not working
Technical projectsStakeholder ManagementSecurity transformation programmesMSP (Managing Successful Programmes)LeadershipCyber StrategyCyber security standardsCyberChange ManagementBusiness and Management Consultancy
Not working
Project DeliveryIT MigrationsNetwork DeploymentData CentreData NetworksNetwork Implementation