Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Not working
UbuntuTechnical projectsTeam ManagementStakeholder ManagementMicrosoft WindowsMicrosoft Azure ADMicrosoft AzureMalware DetectionKali LinuxISO 27001
Business AnalysisAccount ManagementPre-Sales / Post-SalesProposal WritingBid / Proposal ManagementCustomer Relationship ManagementBusiness and Management ConsultancyPre-SalesSalesMicrosoft Sharepoint Online
Not working
Team ManagementStakeholder ManagementProject/Programme ManagementPre & Post SalesPlanning & SchedulingIT InfrastructureData NetworksCloud MigrationsChange ManagementApplication Development
Business Analysis
Not working
FinanceForecasting of Costs & RevenueBudget ManagementBudget CreationClient Management - External FacingProject DeliveryContract NegotiationDeploymentMarketingStrategy
Not working
Microsoft Office 365MicrosoftMicrosoft SharepointMicrosoft VisioMicrosoft ProjectPRINCE2New BuildSoftware DevelopmentIT LifecycleIT Transition and Transformation
Risk AssessmentRisk analytics and managementPCI-DSSRisk ManagementMalware AnalysisCloud securityBiometricsMalware DetectionMobile Device Management (MDM)Data security‎
Not working
Vendor ManagementBid / Proposal ManagementStrategic Thinking / VisionStrategyProfessional ServicesAgileRoadmapRoadmapRoadmapStakeholder Communication
Not working
Stakeholder ManagementProject ManagementChange Management
Not working
AgilePlanning & SchedulingProject ManagementStakeholder ManagementStakeholder CommunicationChange Management
Not working
Project DeliveryProject/Programme ManagementTeam ManagementStakeholder ManagementProject ManagementRoadmapRegulatory AffairsTechnical StrategyRisk ManagementRisk
Not working
Network SupportTechnical projectsStakeholder ManagementProject ReportingChange Management
Not working
Technical projectsStakeholder ManagementSecurity transformation programmesMSP (Managing Successful Programmes)LeadershipCyber StrategyCyber security standardsCyberChange ManagementBusiness and Management Consultancy
Not working
Project DeliveryIT MigrationsNetwork DeploymentData CentreData NetworksNetwork Implementation
Not working
Team ManagementBusiness AnalysisProject ManagementChange DeliveryChange ManagementITCH
Not working
Operations and security managementBudget ManagementProject/Programme ScopingManaged ServiceProject DeliveryNetwork ImplementationNetwork Security
Scrum MasterWaterfallScaled Agile Framework (SAFe)AgileSoftware DevelopmentSoftware as a service (SaaS)Product DevelopmentResource ManagementRelease ManagementRelease Management
Not working
LeadershipManagement and leadershipCyber Resilience ReviewCyber Strategy
Not working
SalesBusiness DevelopmentProject ReportingTeam ManagementStakeholder Management
Not working
Process ImprovementTeam ManagementNetwork ImplementationNetwork SupportBusiness DevelopmentBusiness AnalysisProject Management
Business projectsPlanning & SchedulingData Centre MigrationsOffice Relocation and UpgradesIT MigrationsTrainingResource ManagementStakeholder ManagementTeam ManagementProject Reporting
Not working
Project ManagementProduct ManagementDigitalConsultancy
Not working
Project/Programme Management
Not working
FortinetCisco ISRCisco ASACisco ASRCisco FirePOWERCisco ASA5500-X SeriesCisco ASA5500 SeriesFirewallsJuniper NetworksEncryption
Security information and event management (SIEM)Threat & Vulnerability ManagementVulnerability ManagementPenetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Network)Penetration Testing (Web)Business Process ImprovementsNetwork SecurityF5 BIGiP
Not working
ISO 27001NISTIT Risk Management‎ITSECCyber Resilience ReviewCyber SecurityCyber security standardsCyber Strategy
Not working
Strategic Design and Business PlanningService DesignEnterprise ArchitectureBusiness Process
Not working
Security InvestigationsSecurity Operations Centre (SOC)Threat Intelligence and ModellingISO 27001Cyber EssentialsCommon Vulnerability Scoring System (CVSS)Vulnerability ManagementThreat & Vulnerability ManagementInformation privacy‎Information Security
Not working
Supplier ManagementNetwork DeploymentAgileBudget ManagementProject ManagementTechnical projectsProject ReportingPlanning & SchedulingChange ManagementStakeholder Management
Not working
Supervision