Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Augmented realityBuilding and Developing NetworksGitProject/Programme ManagementJavaAndroidC++Team ManagementChange ManagementBusiness Analysis
Not working
SalesProject ManagementBusiness Development
Penetration Testing (Network)Operating system security‎Malware DetectionIntrusion detection system (IDS)Intrusion Detection and PreventionIntrusion DetectionInformation privacy‎Incident ResponseIncident Handling & AnalysisGovernance Risk Management and Compliance (GRC)
Not working
Reinforced ConcreteSite Engineering
Not working
Security InvestigationsSecurity Operations Centre (SOC)Threat Intelligence and ModellingISO 27001Cyber EssentialsCommon Vulnerability Scoring System (CVSS)Vulnerability ManagementThreat & Vulnerability ManagementInformation privacy‎Information Security
Vulnerability ManagementFirewallsCyber EssentialsCyber StrategyPenetration Testing (Network)Risk ManagementPCI-DSSISO 27001Network Security
Not working
eBGPQualysFortinetChange ApprovalPalo Alto NetworksMicrosoftCisco LAN Access SwitchesNetwork TestingIT Monitoring Tools & ManagementSpanning-Tree (STP, RSTP)
Spring (Java)MavenOracleMongoDBDockerLinuxJavaScriptSOAPRESTNetwork Design
Not working
GrafanaGradlePrometheusMongoDBJenkinsContinuous Integration / Deployment (CI/CD)Security transformation programmesApache CassandraProjectsPerformance Testing
Not working
Project managerConstruction management
Not working
Risk ManagementData AnalysisBusiness AnalysisStrategyCorporate CommunicationsStrategic Design and Business PlanningBusiness and Management ConsultancyConsultancyProject/Programme ManagementProject Delivery
Not working
Customer ServicesCustomer SuccessContact Centre
Not working
Technical Risk AdvisorRisk AppetiteRisk AnalysisCompliance ManagementContract ManagementVulnerability ManagementInformation Security Management Systems (ISMS)IT Risk Management‎Risk analytics and managementProgram Management
ShellJavaAnsiblePythonLinuxL3 VPN MulticastMulticast (PIM)Check Point R71Fortinet FortiGateJuniper Networks
Not working
Quantity Surveyingcontracts managerCommercial
Not working
Third Party Risk ManagementGovernance Risk Management and Compliance (GRC)Cyber StrategyCyber Security
IT Monitoring Tools & ManagementNetwork DesignNetwork TestingContract NegotiationMPLSProject ReportingVendor ManagementStakeholder ManagementEscalation ManagementNetwork Deployment
Not working
Planning & SchedulingBusiness AnalysisTeam ManagementStakeholder ManagementIT Monitoring Tools & ManagementNetwork SecurityIPSec
Not working
Business Analysis
Not working
Bid / Proposal ManagementChange ManagementStakeholder Management
Not working
Team ManagementStakeholder ManagementPlanning & SchedulingChange ManagementBusiness Analysis
Not working
Agilo For ScrumAgileUXTestingAtlassian ConfluenceAtlassian JiraUserTestingBusiness projectsBusiness AnalysisScrum MasterScaled Agile Framework (SAFe)
Cisco Branch Routers / ISRConfiguration ApprovalVPCIP TelephonyHPChange ApprovalWAN (Continental)Team ManagementSpanning-Tree (STP, RSTP)L2 VPN
Not working
SecurityMicrosoft Azure ADMicrosoft AzureDatabase DesignAzure Cloud
Stakeholder ManagementRisk ManagementInformation Security ConsultancySecurity AssuranceRisk AssessmentCyber security standardsPriviledged Access ManagementGeneral Data Protection Regulation (GDPR)Security Incident and Event ManagementData protection
Not working
BPMN (Business Process Model and Notation)MicrosoftGap AnalysisOrganization TransformationSix SigmaLEANChange ManagementBusiness Transformation – Driving Change
Not working
Project ManagementChange ManagementTeam Management
Not working
Network SupportSoftware DevelopmentProject ManagementProject DeliveryIT Monitoring Tools & ManagementIT MigrationsNetwork ImplementationHR
Not working
The ForemanSite Engineering