Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Not working
SalesProject ManagementBusiness Development
Penetration Testing (Network)Operating system security‎Malware DetectionIntrusion detection system (IDS)Intrusion Detection and PreventionIntrusion DetectionInformation privacy‎Incident ResponseIncident Handling & AnalysisGovernance Risk Management and Compliance (GRC)
Not working
Reinforced ConcreteSite Engineering
Not working
Security InvestigationsSecurity Operations Centre (SOC)Threat Intelligence and ModellingISO 27001Cyber EssentialsCommon Vulnerability Scoring System (CVSS)Vulnerability ManagementThreat & Vulnerability ManagementInformation privacy‎Information Security
Vulnerability ManagementFirewallsCyber EssentialsCyber StrategyPenetration Testing (Network)Risk ManagementPCI-DSSISO 27001Network Security
Not working
eBGPQualysFortinetChange ApprovalPalo Alto NetworksMicrosoftCisco LAN Access SwitchesNetwork TestingIT Monitoring Tools & ManagementSpanning-Tree (STP, RSTP)
Spring (Java)MavenOracleMongoDBDockerLinuxJavaScriptSOAPRESTNetwork Design
Not working
GrafanaGradlePrometheusMongoDBJenkinsContinuous Integration / Deployment (CI/CD)Security transformation programmesApache CassandraProjectsPerformance Testing
Not working
Project managerConstruction management
Not working
Process ImprovementTeam ManagementNetwork ImplementationNetwork SupportBusiness DevelopmentBusiness AnalysisProject Management
Business projectsPlanning & SchedulingData Centre MigrationsOffice Relocation and UpgradesIT MigrationsTrainingResource ManagementStakeholder ManagementTeam ManagementProject Reporting
Not working
Project ManagementProduct ManagementDigitalConsultancy
Not working
Project/Programme Management
Not working
FortinetCisco ISRCisco ASACisco ASRCisco FirePOWERCisco ASA5500-X SeriesCisco ASA5500 SeriesFirewallsJuniper NetworksEncryption
Security information and event management (SIEM)Threat & Vulnerability ManagementVulnerability ManagementPenetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Network)Penetration Testing (Web)Business Process ImprovementsNetwork SecurityF5 BIGiP
Cisco Branch Routers / ISRConfiguration ApprovalVPCIP TelephonyHPChange ApprovalWAN (Continental)Team ManagementSpanning-Tree (STP, RSTP)L2 VPN
Not working
SecurityMicrosoft Azure ADMicrosoft AzureDatabase DesignAzure Cloud
Not working
IT Monitoring Tools & ManagementProject ManagementTeam ManagementStakeholder ManagementChange Management
Not working
ArchitectureTelecommunication InfrastructureMicrosoft Office 365Microsoft Skype for Business 2015Microsoft Teams
Not working
Project ReportingUXTestingTechnical StrategySystem TestingProduct ManagementProduct ManagementProduct DevelopmentIT GovernanceBusiness Transformation – Driving ChangeBusiness Analysis
Not working
ISO 27001NISTIT Risk Management‎ITSECCyber Resilience ReviewCyber SecurityCyber security standardsCyber Strategy
Not working
Strategic Design and Business PlanningService DesignEnterprise ArchitectureBusiness Process
Business AnalysisAccount ManagementPre-Sales / Post-SalesProposal WritingBid / Proposal ManagementCustomer Relationship ManagementBusiness and Management ConsultancyPre-SalesSalesMicrosoft Sharepoint Online
Not working
Team ManagementStakeholder ManagementProject/Programme ManagementPre & Post SalesPlanning & SchedulingIT InfrastructureData NetworksCloud MigrationsChange ManagementApplication Development
Business Analysis
Not working
Project ManagementChange ManagementTeam Management
Not working
Network SupportSoftware DevelopmentProject ManagementProject DeliveryIT Monitoring Tools & ManagementIT MigrationsNetwork ImplementationHR
Not working
The ForemanSite Engineering